{"id":408978,"date":"2024-10-20T05:33:22","date_gmt":"2024-10-20T05:33:22","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-tr-63283-32022\/"},"modified":"2024-10-26T10:09:55","modified_gmt":"2024-10-26T10:09:55","slug":"bsi-pd-iec-tr-63283-32022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-tr-63283-32022\/","title":{"rendered":"BSI PD IEC TR 63283-3:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions, abbreviated terms and acronyms 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 3.2 Abbreviated terms and acronyms 4 Smart Manufacturing challenges for cybersecurity <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5 Systems engineering <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Tables Table 1 \u2013 ISO\/IEC\/IEEE 15288 System engineering process <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6 Applying IEC 62443 (all parts) to smart manufacturing 6.1 General Figures Figure 1 \u2013 The IEC 62443 series <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.2 Relation to ISO\/IEC 27000 (all parts) Figure 2 \u2013 Details of the application of individual parts of IEC 62443by different roles during the individual life cycles of automation assets <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 6.3 Reference model 6.4 Foundational requirements <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 6.5 Zones and conduits in system of systems 6.6 Security risk assessment and security levels 6.7 Security lifecycle <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 6.8 Auditing and logging 6.9 Conclusion 7 Smart Manufacturing security threats 7.1 General <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7.2 Use case view on cybersecurity 7.2.1 General 7.2.2 Use case \u201cManufacturing of individualized products\u201d Figure 3 \u2013 Use case \u201cManufacturing of individualized products\u201d <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Table 2 \u2013 Use case \u201cManufacturing of individualized products\u201d <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.2.3 Use case \u201cStandardization of production technologies\u201d Figure 4 \u2013 Use case \u201cStandardization of production technologies\u201d <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 7.2.4 Use case \u201cFlexible scheduling and resource allocation\u201d Figure 5 \u2013 Use case \u201cFlexible scheduling and resource allocation\u201d Table 3 \u2013 Use case \u201cStandardization of production technologies\u201d <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 7.2.5 Use case \u201cModularization of production system\u201d Figure 6 \u2013 Use case \u201cModularization of production system\u201d Table 4 \u2013 Use case \u201cFlexible Scheduling and resource allocation\u201d <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Table 5 \u2013 Use case \u201cModularization of production system\u201d <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 7.2.6 Use case \u201cFeedback loops\u201d <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 7.2.7 Use case \u201cSimulation in operation\u201d Figure 7 \u2013 Use case \u201cFeedback loops\u201d Table 6 \u2013 Use Case \u201cFeedback loops\u201d <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Figure 8 \u2013 Use case \u201cSimulation in operation\u201d Table 7 \u2013 Use case \u201cSimulation in operation\u201d <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 7.2.8 Use case \u201cSimulation in design and engineering\u201d 7.2.9 Use cases \u201cUpdate and functional scalability of production resources\u201d and \u201cDevice configuration\u201d Figure 9 \u2013 Use case \u201cSimulation in design and engineering\u201d Table 8 \u2013 Use case \u201cSimulation in design and engineering\u201d <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 7.2.10 Use case \u201cInformation extraction from production systems\u201d Table 9 \u2013 Use case \u201cUpdate and functional scalability of production resources\u201d,Use case \u201cDevice configuration\u201d <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Figure 10 \u2013 Use case \u201cInformation extraction from production systems\u201d Table 10 \u2013 Use case \u201cInformation extraction from production systems\u201d <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 7.2.11 Use case \u201cSelf-optimization of production resources\u201dUse case \u201cOptimization of operation through machine learning\u201dUse case \u201cOptimization in design and engineering through machine learning\u201d 7.2.12 Use case \u201cDesign for energy efficiency\u201dUse case \u201cOptimization of energy\u201d Table 11 \u2013 Use case \u201cMachine learning\u201d <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 7.2.13 Use case \u201cSeamless models\u201d Table 12 \u2013 Use case \u201cDesign for energy efficiency\u201d, Use case \u201cOptimization of energy\u201d <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 7.3 Smart Manufacturing lifecycle view on cybersecurity Figure 11 \u2013 From Value Streams to Value Networks Table 13 \u2013 Use case \u201cSeamless models\u201d <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 8 Summary of challenges 8.1 General Table 14 \u2013 Smart Manufacturing Lifecycle View on Cybersecurity <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 8.2 Identification and Authentication Control (AC) 8.3 Use Control (UC) Table 15 \u2013 Identification and Authentication Control (AC) challenges <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Figure 12 \u2013 Lifecycles, users\/stakeholders, granted privileges, and views Table 16 \u2013 Use Control (UC) challenges <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 8.4 Data and System Integrity (DI) Table 17 \u2013 Data and System Integrity (DI) challenges <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 8.5 Data Confidentiality (DC) 8.5.1 General 8.5.2 Intended Use Figure 13 \u2013 Privacy and Intended Use Table 18 \u2013 Data Confidentiality (DC) challenges regarding privacy <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 8.5.3 Data Confidentiality 8.6 Restricted Data Flow (RDF) 8.7 Timely Response to Events (TRE) Table 19 \u2013 Data Confidentiality (DC) requirements other than privacy Table 20 \u2013 Restricted Data Flow (RDF) challenges <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 8.8 Resource Availability (RA) Table 21 \u2013 Timely Response to Events (TRE) challenges Table 22 \u2013 Resource Availability (RA) challenges <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | Annex A (informative)Mapping use cases to foundational requirements Table A.1 \u2013 Mapping use cases to foundational requirements <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | Annex B (informative)Secure identities <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Industrial-process measurement, control and automation. Smart manufacturing – Challenges for Cybersecurity<\/b><\/p>\n |