Target SL 2 for most OT networks
SL 2 protects against motivated individuals. Most industrial networks target SL 2. Safety systems and critical infrastructure target SL 3.
The previous sections covered specific attack types and defenses. IEC 62443 provides the overarching framework that ties them together — a structured approach to assessing risk, defining security requirements, and verifying compliance across the entire industrial automation and control system.
Before IEC 62443, every vendor and asset owner approached OT security differently. Some applied IT security frameworks that did not account for availability requirements. Others had no framework at all. IEC 62443 created a common language and a structured methodology that works for asset owners, system integrators, and product suppliers.
Key term:
IEC 62443 defines four Security Levels (SL) based on the threat actor and the resources they would need to mount a successful attack:
| Level | Threat Actor | Description |
|---|---|---|
| SL 1 | Casual violation | Untrained users, accidental misuse |
| SL 2 | Intentional violation | Motivated individuals with basic skills |
| SL 3 | Sophisticated attacks | Skilled attackers with resources |
| SL 4 | State-sponsored attacks | Nation-state actors with significant resources |
Most industrial networks target SL 2. Critical infrastructure (power grids, water treatment) targets SL 3.
IEC 62443-3-2 defines Security Zones and Conduits. A zone is a group of assets with the same security requirements and threat exposure. A conduit is a communication path between zones, controlled by firewalls or data diodes.
This maps directly to the Purdue Model: each Purdue level is a security zone, and the connections between levels are conduits.
Hirschmann switches certified to IEC 62443-4-2 SL 2 provide:
| Requirement | HiOS Feature |
|---|---|
| Unique identification | Each switch has a unique identity |
| Authenticator management | Password policies, certificate support |
| Use control | Role-based access (admin, operator, read-only) |
| Audit log | All configuration changes and access attempts logged |
| Communication integrity | HTTPS, SSH, SNMPv3 |
| Session lock | Automatic timeout after inactivity |
Target SL 2 for most OT networks
SL 2 protects against motivated individuals. Most industrial networks target SL 2. Safety systems and critical infrastructure target SL 3.
Zones and conduits map to VLANs and firewalls
Each zone is a VLAN or network segment. Each conduit is a firewall rule set. The IEC 62443 model translates directly into network configuration.
The IEC 62443 framework defines what to protect and how. The next section covers practical hardening — the specific configuration steps that implement the framework on Hirschmann switches and PLCs.