In ISA/IEC 62443, Security Levels (SL) serve as standardized metrics to measure a system's capability to resist threats. Asset owners play a critical role in determining appropriate security levels based on business priorities, risk levels, and the potential impacts of security breaches.
This section will be explained in clear and logical steps with beginner-friendly details.
Security Levels (SLs) are used to categorize and measure how resilient a system or zone within IACS is to specific types of cyber threats. The SLs guide asset owners in selecting the appropriate security controls for different parts of the system.
The four security levels in ISA/IEC 62443 are:
| Security Level (SL) | Definition | Protection Objectives | Example Threats |
|---|---|---|---|
| SL1 | Protection against basic errors and simple attacks. | Protect from accidental errors and basic threats. | Human errors, accidental data deletion. |
| SL2 | Protection against simple malicious attackers. | Counter low-skilled attackers with limited capabilities. | Automated scripts, basic malware, network scanning. |
| SL3 | Protection against moderately skilled attackers. | Resist skilled attackers using advanced tools. | Targeted attacks, penetration tools, remote Trojans. |
| SL4 | Protection against highly complex attacks. | Defend against advanced persistent threats (APT) and nation-state attacks. | APT attacks, nation-state actors. |
| Category of Security Controls | SL1 | SL2 | SL3 | SL4 |
|---|---|---|---|---|
| Access Control | Basic authentication | Role-Based Access Control (RBAC) | Strong authentication, multi-factor MFA | Strong authentication with hardware security modules (HSM) |
| Network Security | Basic firewall | Network segmentation, simple firewalls | Encrypted communications, IDS | Advanced firewalls, Advanced Threat Protection (ATP) |
| System Integrity | Basic checks | File integrity checks | Real-time integrity monitoring | Advanced real-time integrity protection |
| Event Monitoring & Response | Logging | Automated log analysis | Real-time monitoring and alerts | Automated response, advanced event correlation analysis |
Asset owners are responsible for ensuring that their IACS systems meet appropriate security levels. To determine the correct SL for zones and conduits, asset owners follow a structured process.
The first step is to identify the critical assets in the IACS system, including hardware, software, and data.
Categorize Assets:
Assets are grouped based on their function and importance:
Assess Asset Importance:
Analyze the impact on the business if an asset is compromised:
In this step, asset owners analyze the threats that assets may face.
Identify Threat Types:
Threat Modeling:
Use techniques such as attack path analysis to determine:
Risk assessment quantifies the threats and vulnerabilities to prioritize mitigation.
Risk Formula:
Steps to Assess Risk:
Based on the results of the risk assessment and the criticality of assets, assign appropriate Security Levels (SL) to each zone and conduit.
| Asset | Potential Threats | Risk Level | Assigned Security Level |
|---|---|---|---|
| Production Control Network (PLC) | Malicious attacks, remote intrusion | High Risk | SL3 |
| SCADA Database | Data leakage, data tampering | Medium Risk | SL2 |
| Field Sensors | Accidental failures, human errors | Low Risk | SL1 |
Deploy security controls corresponding to the determined Security Level:
| Category | SL1 | SL2 | SL3 | SL4 |
|---|---|---|---|---|
| Access Control | Basic authentication | RBAC | Strong authentication, MFA | HSM-based authentication, MFA |
| Network Security | Basic firewall | Network segmentation | IDS, encrypted communication | Advanced firewalls, ATP |
| System Integrity | Basic checks | File integrity verification | Real-time integrity monitoring | Advanced real-time integrity protection |
| Event Monitoring | Simple logging | Automated log analysis | Real-time monitoring and alerting | Advanced event correlation and response |
Asset owners hold the ultimate responsibility for determining and implementing appropriate security levels. Their responsibilities include:
The ISA/IEC 62443-3-3 standard introduces a structured method to help asset owners define Security Levels (SLs) using Foundational Requirements (FRs) and their corresponding Security Requirements (SRs).
| FR Code | Foundational Requirement | Purpose |
|---|---|---|
| FR1 | Identification and Authentication Control | Ensure only authorized users and devices can access the system |
| FR2 | Use Control | Restrict system access and privileges based on user roles and tasks |
| FR3 | System Integrity | Ensure systems and software remain unaltered and function as intended |
| FR4 | Data Confidentiality | Protect sensitive information from unauthorized disclosure |
| FR5 | Restricted Data Flow | Control how data moves between zones and systems |
| FR6 | Timely Response to Events | Detect, report, and respond quickly to security-related events |
| FR7 | Resource Availability | Ensure system availability even under attack or during failure conditions |
Each SL (from SL1 to SL4) specifies a different depth of implementation for each SR. For example:
When determining required SLs, asset owners must not only set a general SL (e.g., SL2) for a zone but also ensure that the corresponding SRs under each FR are fully implemented.
While "Risk = Threat × Vulnerability × Impact" is a conceptual model, ISA/IEC 62443 encourages a simplified quantitative model:
Risk = Likelihood × Impact
This formula helps prioritize security investment based on real-world risk rather than theoretical possibility.
| Asset | Likelihood | Impact | Risk Score |
|---|---|---|---|
| SCADA database | High | High | High |
| HMI workstation | Medium | Low | Medium |
| Sensor data | Low | Low | Low |
Asset owners use this formula during risk assessment (usually in collaboration with integrators) to assign SLs and justify which zones require enhanced protections.
While asset owners hold final responsibility for defining SLs, effective security planning is not a solo effort. ISA/IEC 62443 emphasizes cross-role collaboration across the security lifecycle.
| Stakeholder | Role in SL Decision-Making |
|---|---|
| Asset Owner | Leads SL determination based on business goals, risk tolerance, and operational requirements |
| System Integrator | Assesses network architecture, recommends segmentation, and implements controls aligned with SL |
| Product Supplier | Provides components (e.g., PLCs, HMIs) that are certified or tested for required SL capabilities |
| Maintenance Provider | Assures ongoing compliance with SLs through updates, monitoring, and incident handling |
This multi-role engagement supports consistency, interoperability, and accountability, which is a core value in ISA/IEC 62443.
| Topic | Enhancement Summary |
|---|---|
| FR/SR Integration | Asset owners must implement FR-aligned SRs based on the SL assigned to each zone or conduit |
| Risk Formula Expansion | Introduced "Risk = Likelihood × Impact" for practical risk prioritization during SL decisions |
| Stakeholder Collaboration | Highlighted how Asset Owners work with Integrators, Suppliers, and Maintainers throughout SL planning |
What is the primary purpose of security levels (SL1–SL4) in ISA/IEC 62443?
Security levels define the degree of protection required to defend a control system against attackers with different capabilities and resources.
ISA/IEC 62443 defines four security levels that correspond to increasing attacker sophistication. SL1 protects against casual or accidental violations, while SL2 addresses intentional attacks with limited resources. SL3 targets attackers with moderate skills and access to ICS knowledge, and SL4 protects against highly sophisticated attackers with significant resources. Asset owners determine the appropriate security level through risk assessment by evaluating threats, vulnerabilities, and potential consequences. The chosen level drives the security requirements that must be implemented within the system architecture. A common mistake is assuming higher security levels should always be applied; instead, the appropriate level must balance operational feasibility with risk tolerance and business impact.
Demand Score: 85
Exam Relevance Score: 90
How do asset owners determine the target security level (SL-T) for a control system?
Asset owners determine the target security level by conducting a risk assessment that evaluates threats, vulnerabilities, and potential operational consequences.
The ISA/IEC 62443 framework recommends determining the target security level (SL-T) during the risk assessment process. Asset owners analyze possible threat actors, system vulnerabilities, and the potential impact of cyber incidents on safety, production, and regulatory compliance. The resulting risk evaluation determines the required level of protection for each zone within the control system architecture. SL-T becomes a design requirement that guides system architecture, control selection, and vendor specifications. Different zones within the same facility may require different security levels depending on their function and criticality. A common mistake is applying the same security level to the entire network without considering system segmentation and risk differences.
Demand Score: 83
Exam Relevance Score: 88
Why might different zones in the same industrial facility require different security levels?
Different zones may have varying operational criticality, exposure to external networks, and potential impact if compromised.
In industrial environments, systems perform diverse functions such as real-time control, monitoring, engineering configuration, or corporate integration. These functions carry different risk levels. For example, a safety instrumented system controlling hazardous processes requires stronger protection than a monitoring workstation used for reporting. ISA/IEC 62443 allows asset owners to assign different security levels to different zones based on risk assessment results. This approach ensures that security controls are proportionate to the potential impact of compromise. Implementing uniform security levels across all zones may either overburden less critical systems or underprotect critical ones.
Demand Score: 80
Exam Relevance Score: 84
What is the difference between target security level (SL-T) and achieved security level (SL-A)?
SL-T represents the required level of protection identified during risk assessment, while SL-A reflects the level actually implemented and verified in the system.
During system design, organizations define a target security level based on risk evaluation and business requirements. This level establishes the cybersecurity capabilities that must be implemented. After deployment, audits and validation activities evaluate the implemented controls to determine the achieved security level. If SL-A falls below SL-T, additional controls or system improvements may be required. This distinction helps organizations track whether security objectives defined during risk assessment have been properly implemented in operational systems.
Demand Score: 78
Exam Relevance Score: 86
How does business risk influence the required security level for a control system?
Business risk determines the acceptable level of potential operational, financial, or safety impact, which directly influences the required security level.
In ISA/IEC 62443, cybersecurity decisions must align with organizational risk tolerance and operational priorities. Systems that support critical production processes, safety functions, or regulatory compliance may require higher security levels because the consequences of compromise are severe. Conversely, systems with limited operational impact may justify lower protection levels. Asset owners evaluate factors such as production downtime, environmental hazards, safety risks, and regulatory obligations. These factors shape the acceptable risk threshold and guide the selection of security levels for each zone within the architecture.
Demand Score: 77
Exam Relevance Score: 83