⚙️ IEC 62443 Toolkit

Validate IEC 62443 IACS Security Requirements
with AI-Powered OT/ICS Tabletop Exercises

The IEC 62443 series defines requirements for Industrial Automation and Control Systems (IACS) security, covering the full supply chain from asset owners to component suppliers. CyberICS provides purpose-built exercises mapped to IEC 62443-2-1 CSMS requirements, Security Levels SL-1 through SL-4, and all seven Foundational Requirements (FR1–FR7) — with audit-ready evidence for ISASecure certification programmes.

IEC 62443-2-1 — IACS Cybersecurity Management System
Security Levels SL-1 through SL-4
FR 1–FR 7 — All Foundational Requirements Covered
ISASecure CSMS Certification Evidence
EN / FR / PT / ES / DE / IT — Multi-Language
Start Free — 3 Exercises Included 📋 Take IEC 62443 Assessment → Talk to Team
Compliance Note: IEC 62443 compliance requires engagement with a qualified ISA/IEC 62443 assessor. CyberICS exercise evidence supports your CSMS documentation and readiness activities but does not constitute formal ISASecure certification or a Security Level determination. Consult a certified IEC 62443 assessor for official Security Level assessments and certification readiness reviews.
Standard Series

IEC 62443 Standard Series — Your Compliance Roadmap

The IEC 62443 series spans four parts covering concepts, policies, systems, and components. CyberICS exercises directly support Parts 2 and 3 requirements.

Part 1 — Concepts & Models

62443-1-x: Foundations & Terminology

Establishes common terminology, risk assessment methodology, and the security lifecycle concept that underpins all subsequent parts. Part 1 defines the scope and vocabulary for IACS security across asset owners, integrators, and component suppliers.

  • Unified IACS security terminology
  • Risk assessment methodology baseline
  • Security lifecycle framework
  • Foundation for all other parts
CyberICS exercises apply Part 1 terminology throughout scenario briefings and AI-generated After Action Reports.
Part 2 — Policies & Procedures ★ Primary

62443-2-x: CSMS & Security Management

Requirements for the Cybersecurity Management System (CSMS). IEC 62443-2-1 is the primary operational standard for asset owners, defining CSMS elements, policies, and procedures. Requirement SP.03.01 (security programme management) is addressed through structured exercise evidence demonstrating a functioning security programme.

  • IEC 62443-2-1 CSMS requirements
  • SP.03.01 security programme evidence
  • Patch management & maintenance procedures
  • Incident response and recovery policies
Tabletop exercises directly produce 62443-2-1 CSMS documentation evidence for incident response testing obligations.
Part 3 — Systems

62443-3-x: System Security Requirements

The zone and conduit model (IEC 62443-3-3 clause 4.3.3) defines how IACS systems are segmented and how Security Level targets are assigned per zone. Part 3 maps system security requirements to Security Level targets and achieved levels — forming the basis for gap analysis between current and target security posture.

  • Zone & conduit model (clause 4.3.3)
  • Security Level target vs. achieved analysis
  • System security requirements (SR)
  • Security assurance levels per zone
Zone breach scenarios in CyberICS directly test the conduit controls and Security Level assumptions defined in Part 3.
Part 4 — Components

62443-4-x: Component Security Requirements

Component-level security requirements for products and embedded systems. Part 4 applies to component suppliers and addresses software development lifecycle, embedded security features, and component security assurance levels. CyberICS embedded exercises test component failure scenarios and failure mode responses relevant to Part 4 validation.

  • Component security requirements (CR)
  • Software development security (SDL)
  • Embedded security feature validation
  • Component failure mode response exercises
Firmware and component manipulation scenarios test detection and response to Part 4 component integrity failures.
Security Levels & Foundational Requirements

IEC 62443 Security Levels & FR Coverage

Every CyberICS exercise is mapped to one or more Foundational Requirements and aligned to a target Security Level — giving you structured evidence for SL gap analysis and CSMS documentation.

Security Level Definitions

SL-1 — Basic SL-2 — Medium SL-3 — High SL-4 — Very High
Security Level 1
SL-1 — Basic

Protection against casual or coincidental violation. Suitable for systems where the primary threat is unintentional actions by authorised users or simple, opportunistic attacks with low motivation and skill.

Security Level 2
SL-2 — Medium

Protection against intentional violation using simple means. Adversary has low resources, generic IACS skills, and low motivation. Represents the baseline Security Level for most critical infrastructure environments.

Security Level 3
SL-3 — High

Protection against intentional violation using sophisticated means. Adversary has moderate resources, IACS-specific skills, and moderate motivation. Required for environments with significant public safety or national security impact.

Security Level 4
SL-4 — Very High

Protection against intentional violation using sophisticated means with extended resources. Nation-state level adversary capability. Reserved for the most critical IACS assets where compromise could cause catastrophic consequences.

Foundational Requirements (FR 1 – FR 7)

IEC 62443 Foundational Requirements Reference

All seven Foundational Requirements are covered across the CyberICS scenario library. Each exercise maps to one or more FRs, producing targeted evidence for your IEC 62443 CSMS documentation.

FR Title Requirement Description CyberICS Exercise Coverage
FR 1 Identification & Authentication Control Unique identification of all users, devices, and software processes that use the IACS; authentication of identity prior to granting access Credential abuse and identity spoofing scenarios exercise detection of authentication failures and IAM procedure gaps
FR 2 Use Control Enforce the privileges of authenticated entities; ensure that only authorised actions are permitted, including use restrictions on devices and software Privilege escalation exercises test authorisation controls and validate least-privilege enforcement in IACS environments
FR 3 System Integrity Ensure the integrity of the IACS by protecting against unauthorised change; detect and report integrity violations Supply chain compromise and firmware manipulation exercises test integrity verification procedures and change detection workflows
FR 4 Data Confidentiality Ensure the confidentiality of information on communication channels and in data repositories to the degree necessary to protect the IACS from compromise Data exfiltration scenarios exercise classification procedures, historian data protection, and confidentiality incident response
FR 5 Restricted Data Flow Segment the IACS using zones and conduits to limit unnecessary data flow; prevent information from passing to or from unauthorised sources Zone and conduit breach exercises directly test the effectiveness of network segmentation controls and conduit configuration
FR 6 Timely Response to Events Respond to security violations by notifying proper authorities; reporting evidence of the violation; and taking timely corrective action Incident response exercises measure detection-to-response timelines against SL targets; AI AAR produces event response documentation for CSMS records
FR 7 Resource Availability Ensure the availability of the IACS to legitimate entities including personnel, devices, and communications infrastructure under all intended operating conditions Denial-of-service and cascading failure exercises test availability response procedures and resilience under SL-3 and SL-4 threat scenarios

IEC 62443 reference: 62443-2-1 CSMS clause SP.03.01 (Security Programme) is directly evidenced through CyberICS structured exercise programme records. Zone segmentation requirements are governed by 4.3.3 of the IEC 62443 series.

Platform Capabilities

How CyberICS Supports Your IEC 62443 CSMS Programme

Three core capabilities work together to deliver, document, and evidence your IEC 62443-2-1 CSMS obligations and Security Level readiness.

⚙️
FR 6 · FR 7 · CSMS Clause 4

Structured IACS Exercise Execution

Live Session mode delivers real-time, multi-participant IACS tabletop exercises with timestamped participant records. All steps, responses, and facilitator actions are logged — creating auditable CSMS documentation for IEC 62443-2-1 compliance.

  • Timestamped participant join and response records
  • Step-by-step IACS scenario walkthrough log
  • Session duration and completion metadata
  • Scored participant responses for benchmarking
📋
62443-2-1 · SP.03.01 Evidence

AI-Generated After Action Report

Immediately after each exercise, CyberICS generates a structured AAR documenting gaps, recommendations, and IEC 62443 FR references — in the language your team worked in. AAR output serves directly as SP.03.01 security programme evidence.

  • Structured gap analysis with IEC 62443 FR references
  • Security Level gap assessment per identified deficiency
  • Corrective action recommendations with priority ranking
  • Multilingual output (EN/FR/PT/ES/DE/IT)
📄
All FR 1–FR 7 Coverage

IEC 62443 Compliance Evidence Package

The Compliance Dashboard generates per-framework IEC 62443 evidence packages — a 6-page audit PDF covering exercise log, FR 1–FR 7 controls coverage, Security Level gap analysis, remediation plan, and attestation page for auditor review.

  • Exercise date, scope, and participant records
  • IEC 62443 FR 1–FR 7 controls coverage map
  • Security Level current vs. target gap analysis
  • Attestation page for ISASecure programme files
Evidence Artifacts

Audit-Ready IEC 62443 Documentation

Every CyberICS exercise generates four categories of compliance evidence supporting IEC 62443-2-1 CSMS demonstration requirements and ISASecure programme documentation.

📄
CSMS Exercise Evidence

62443-2-1 CSMS documentation package. AI-generated PDF with FR gap analysis, corrective actions, and Security Level references available within minutes of exercise completion.

62443-2-1 CSMS Clause
🔒
Security Level Assessment

Current vs. Target Security Level gap analysis per zone. Maps identified deficiencies to the SL delta and provides prioritised remediation to close the gap.

SL-1 through SL-4
🗂️
Foundational Requirements Matrix

FR 1–7 coverage evidence per exercise. Each exercise maps to one or more Foundational Requirements with coverage status and gap documentation for CSMS records.

FR 1 – FR 7 Complete
🏆
ISASecure Programme Support

SP.03.01 security programme evidence package demonstrating a structured, recurring exercise programme aligned to ISASecure CSMS certification requirements.

SP.03.01 Evidence
Scenario Library

IEC 62443-Aligned IACS Scenarios Across Critical Sectors

Six high-fidelity IEC 62443 scenarios covering the most common IACS threat vectors — mapped to specific Foundational Requirements and Security Level targets.

Manufacturing
FR 5 · FR 2
Zone & Conduit Breach

Threat actor pivots from DMZ into control zone via misconfigured conduit. Tests zone segmentation enforcement and access control procedures mapped to IEC 62443 clause 4.3.3.

FR 5 FR 2 SL-2 Target
Oil & Gas
FR 3 · FR 6
Safety Instrumented System Bypass

Attacker manipulates SIS ladder logic during a maintenance window. Tests SIS security procedures, integrity verification, and timely response to events under FR 6 requirements.

FR 3 FR 6 SL-3 Target
Chemical
FR 3 · FR 7
PLC Firmware Manipulation

Rogue firmware deployed to a remote PLC array via a compromised maintenance laptop. Tests firmware verification procedures, system integrity controls, and availability response under FR 7.

FR 3 FR 7 SL-2 Target
Water Utility
FR 1 · FR 2
OT Credential Harvesting

Phishing campaign harvests SCADA operator credentials. Tests identity management procedures, MFA gaps, and privileged account controls mapped to IEC 62443 FR 1 and FR 2 requirements.

FR 1 FR 2 SL-2 Target
Electric Utility
FR 4 · FR 5
Historian Data Exfiltration

Adversary extracts 18 months of grid operational data through a misconfigured historian DMZ. Tests data classification, confidentiality controls, and network segmentation mapped to FR 4 and FR 5.

FR 4 FR 5 SL-2 Target
Transportation
FR 6 · FR 7
Multi-Site Cascading Failure

Coordinated disruption across control centres triggers cascading failures. Tests mutual aid procedures, recovery operations, and SL-3 escalation procedures for FR 6 timely response and FR 7 availability.

FR 6 FR 7 SL-3 Target

Plus 59 additional scenarios across Manufacturing, Pharma, Oil & Gas, Chemical, and more. Browse the full library →

Explore the Full Regulatory Toolkit Library

CyberICS exercise evidence maps to multiple frameworks simultaneously. One exercise program — complete regulatory coverage.

Ready to Validate Your IEC 62443 IACS Security Posture?

Start with 3 free exercises aligned to FR1–FR7 — no credit card required.

Also explore: NIST SP 800-82 Toolkit  ·  NIST CSF 2.0 Toolkit  ·  NERC CIP Toolkit