
The ISA Global Security Alliance (ISAGCA) and the ISA Security Compliance Institute (ISCI) have announced the release of a co-sponsored Industrial Internet of Things (IIoT) product certification study entitled, “IIoT Component Certification Based on the ISA/IEC 62443 Standard.”
The report, the first in a two-part study, evaluates the urgent need for industry vetted IIoT product certification programs, with the goal of determining the applicability of the ISA/IEC 62443 series of standards and certifications to commercial off-the-shelf (COTS) IIoT components and gateways.
The second part of the study, due out later this year, answers the same questions for IIOT system offerings (solutions) and analyzes the use of IIOT solutions for process control.
“During a certification roadmap meeting two years ago, ISCI asset owners noted the high volume of new IIoT offerings from the supplier community and sought a standards-based scheme for certifying the cybersecurity of these new offerings,” said ISA Managing Director Andre Ristaino, who oversees both ISAGCA and ISCI. “Our supplier members were equally interested in this, so ISAGCA and ISCI jointly funded the two-part study to answer the questions.”
In 2016, ISCI completed a rigorous study on the applicability of ISA/IEC 62443 to automation and control systems in smart building technology. The positive report conclusions were vetted by smart building subject matter experts, resulting in the accelerated adoption of the ISA/IEC 62443 standards by product suppliers in this industry sector.
“As an organization, we are committed to reporting on the applicability of this powerful series of standards to new industry sectors and publicly sharing the results,” said Eric Cosman, ISA99 Committee Co-chairman. “Through the results of these rigorous studies, we are able to confirm the broad applicability of these standards to many technologies and sectors.”
You can download the study here.
. For more information about ISAGCA, visit www.isa.org/isagca.
Fachartikel

Globale Expansion in der generativen KI: ein Jahr des Wachstums, der Neueinsteiger und der Angriffe

Cloud-Sicherheitslösungen der nächsten Generation

Sehen, was Angreifer sehen: Wie Sie mit Angriffsdiagrammen Cyber-Bedrohungen immer einen Schritt voraus sind

Bereits bekannt ausgenutzte Schwachstellen

Warum es eine schlechte Idee ist, Geheimnisse zu teilen, selbst über die sichersten Apps
Studien

Netskope Threat Labs: GenAI-Daten-Uploads haben sich innerhalb eines Jahres verdreißigfacht; 75 % der Unternehmen verwenden Apps mit integrierten GenAI-Funktionen

Digitaler Verbraucherschutz: BSI-Jahresrückblick 2024

Keyfactor-Studie: 18 Prozent aller Online-Zertifikate bergen Sicherheitsrisiken – Unternehmen müssen handeln

Gartner-Umfrage: Nur 14% der Sicherheitsverantwortlichen können Datensicherheit und Geschäftsziele erfolgreich vereinen

Zunehmende Angriffskomplexität
Whitepaper

Mit der CISO 2025-Checkliste sind Sie Cyber-Bedrohungen immer einen Schritt voraus

Die Anzahl der Chief Legal Officers, die weltweit für die Cybersicherheit in Unternehmen verantwortlich sind, ist seit 2020 um 23 % gestiegen

Adversarial Machine Learning: Eine Klassifizierung und Terminologie von Angriffen und Gegenmaßnahmen

HP warnt: „Ich bin kein Roboter“ CAPTCHAs können Malware verbreiten
