Official website

Doména gov.sk je oficálna

Toto je oficiálna webová stránka orgánu verejnej moci Slovenskej republiky. Oficiálne stránky využívajú najmä doménu gov.sk. Odkazy na jednotlivé webové sídla orgánov verejnej moci nájdete na tomto odkaze.

This page is secured

Buďte pozorní a vždy sa uistite, že zdieľate informácie iba cez zabezpečenú webovú stránku verejnej správy SR. Zabezpečená stránka vždy začína https:// pred názvom domény webového sídla.

  1. Home
  2. STN EN IEC 62443-2-1

STN EN IEC 62443-2-1

Back

Electronic version (pdc file)

Add to Cart
Name: STN EN IEC 62443-2-1
Validity: Valid
Number of pages: 98
Language:
EN
Paper: 31,80€
Electronic version a) Only read (without ability to print and copy) 28,62€
b) Without ability to print, with ability to copy (printscreen) 31,80€
c) With ability to print and copy (printscreen) 41,34€
Slovak title Informačná bezpečnosť priemyselných automatizačných a riadiacich systémov. Časť 2-1: Požiadavky na bezpečnostné programy pre vlastníkov aktív IACS
English title Security for industrial automation and control systems - Part 2-1: Security program requirements for IACS asset owners
Release Date: 01. 12. 2024
Date of withdrawal:
ICS: 25.040.40, 35.100.05
Sorting character/National clasification code 36 9060
Level of incorporation: idt EN IEC 62443-2-1:2024, idt IEC 62443-2-1:2024
Official Journal 11/24
Amendments
Replaced by:
Repleces:
Note in Official Journal:
Subject of the standard: IEC 62443-2-1:2024 specifies asset owner security program (SP) policy and procedure requirements for an industrial automation and control system (IACS) in operation. This document uses the broad definition and scope of what constitutes an IACS as described in IEC TS 62443-1-1. In the context of this document, asset owner also includes the operator of the IACS. This document recognizes that the lifespan of an IACS can exceed twenty years, and that many legacy systems contain hardware and software that are no longer supported. Therefore, the SP for most legacy systems addresses only a subset of the requirements defined in this document. For example, if IACS or component software is no longer supported, security patching requirements cannot be met. Similarly, backup software for many older systems is not available for all components of the IACS.
Preview: Náhľad normy (PDF)