{"id":94119,"date":"2026-05-18T07:50:56","date_gmt":"2026-05-18T07:50:56","guid":{"rendered":"https:\/\/teeptrak.com\/iec-62443-industrial-cybersecurity-2026\/"},"modified":"2026-05-18T07:50:58","modified_gmt":"2026-05-18T07:50:58","slug":"iec-62443-industrial-cybersecurity-2026","status":"publish","type":"post","link":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/","title":{"rendered":"IEC 62443 industrial cybersecurity (2026): SL1-4 implementation, NIS2 compliance, NIST SP 800-82r3"},"content":{"rendered":"<div class=\"tldr-answer\" style=\"background:#F5F8FB;border-left:4px solid #4C00FF;padding:18px 24px;margin:24px 0;\">\n<strong>TL;DR \u2014 IEC 62443 in 60 words<\/strong><br \/>\nIEC 62443 is the international standard for industrial cybersecurity, structured in 4 parts (general, policies, system, component). Defines Security Levels SL1 (casual) to SL4 (state-sponsored). Mandatory for NIS2 EU 2022\/2555 compliance in critical industrial sectors. Aligns with NIST SP 800-82r3 (Sep 2023) and Purdue\/ISA-95 model. Implementation 12-24 months typical.\n<\/div>\n<p><strong>IEC 62443<\/strong> is the international standard family for cybersecurity in industrial automation and control systems (IACS), developed jointly by ISA99 and IEC TC65. As of 2026, it is the de facto reference for industrial cybersecurity worldwide, mandated explicitly or implicitly by the EU <em>NIS2 directive (EU 2022\/2555)<\/em> for essential and important entities in 18 critical sectors. This guide covers the standard structure, Security Levels (SL1-4), implementation roadmap, alignment with NIST SP 800-82r3 (revised September 2023), Purdue\/ISA-95 segmentation, and certification options.<\/p>\n<h2>IEC 62443 family structure: 4 parts, 14 documents<\/h2>\n<p>The IEC 62443 family is organized into 4 parts covering progressively narrower scopes:<\/p>\n<table>\n<thead>\n<tr>\n<th>Part<\/th>\n<th>Scope<\/th>\n<th>Key documents<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Part 1: General<\/strong><\/td>\n<td>Terminology, concepts, models<\/td>\n<td>62443-1-1 (concepts), 62443-1-2 (glossary), 62443-1-3 (system requirements), 62443-1-4 (security life cycle)<\/td>\n<\/tr>\n<tr>\n<td><strong>Part 2: Policies &amp; procedures<\/strong><\/td>\n<td>Asset owner cybersecurity program<\/td>\n<td>62443-2-1 (CSMS), 62443-2-3 (patch mgmt), 62443-2-4 (service provider reqs)<\/td>\n<\/tr>\n<tr>\n<td><strong>Part 3: System<\/strong><\/td>\n<td>System integrator requirements<\/td>\n<td>62443-3-1 (technologies), 62443-3-2 (risk assessment), 62443-3-3 (system security requirements SR1-7)<\/td>\n<\/tr>\n<tr>\n<td><strong>Part 4: Component<\/strong><\/td>\n<td>Product supplier requirements<\/td>\n<td>62443-4-1 (secure dev lifecycle), 62443-4-2 (technical security requirements for components CR1-7)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Security Levels SL1 to SL4: progressive resistance<\/h2>\n<p>The standard defines four <strong>Security Levels (SL)<\/strong> representing progressively stronger resistance to threat actors:<\/p>\n<table>\n<thead>\n<tr>\n<th>SL<\/th>\n<th>Resistance to<\/th>\n<th>Threat actor profile<\/th>\n<th>Typical sector<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>SL1<\/strong><\/td>\n<td>Casual violation<\/td>\n<td>Curious employee, accidental misconfiguration<\/td>\n<td>Low-criticality discrete manufacturing<\/td>\n<\/tr>\n<tr>\n<td><strong>SL2<\/strong><\/td>\n<td>Intentional violation with simple means<\/td>\n<td>Disgruntled insider, low-skill external<\/td>\n<td>Most discrete and process manufacturing (default target)<\/td>\n<\/tr>\n<tr>\n<td><strong>SL3<\/strong><\/td>\n<td>Intentional violation with sophisticated means, moderate resources, IACS-specific skills<\/td>\n<td>Organized crime, hacktivists<\/td>\n<td>Critical manufacturing, food &amp; beverage, pharmaceutical<\/td>\n<\/tr>\n<tr>\n<td><strong>SL4<\/strong><\/td>\n<td>State-sponsored attacks with significant resources and IACS-specific expertise<\/td>\n<td>Nation-state actors<\/td>\n<td>Energy, transportation, water, defense<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Each SL is decomposed into <strong>7 Foundational Requirements (FR1-7)<\/strong>: identification &amp; authentication control, use control, system integrity, data confidentiality, restricted data flow, timely response to events, resource availability. Each FR has 1-4 SR (system requirements) per SL level in IEC 62443-3-3.<\/p>\n<h2>IEC 62443 alignment with NIS2 directive (EU 2022\/2555)<\/h2>\n<p>The <strong>NIS2 directive<\/strong>, in force across the EU since October 2024, applies to <strong>18 critical sectors<\/strong> and an estimated <strong>160,000+ entities<\/strong> in the EU (vs ~10,000 under NIS1). Article 21 requires that essential and important entities implement <strong>&#8220;appropriate and proportionate technical, operational and organisational measures to manage the risks posed to the security of network and information systems&#8221;<\/strong>. While NIS2 is technology-agnostic, the European Commission and ENISA reference IEC 62443 as a primary mapping standard for industrial environments.<\/p>\n<p>Practical alignment:<\/p>\n<ul>\n<li><strong>NIS2 art. 21(2)(a) &#8211; risk analysis policies<\/strong> \u2192 IEC 62443-2-1 CSMS + 62443-3-2 risk assessment<\/li>\n<li><strong>NIS2 art. 21(2)(b) &#8211; incident handling<\/strong> \u2192 IEC 62443-2-1 incident response procedures<\/li>\n<li><strong>NIS2 art. 21(2)(c) &#8211; business continuity<\/strong> \u2192 IEC 62443 FR7 resource availability<\/li>\n<li><strong>NIS2 art. 21(2)(d) &#8211; supply chain security<\/strong> \u2192 IEC 62443-2-4 service provider + 62443-4-1 secure dev<\/li>\n<li><strong>NIS2 art. 21(2)(e) &#8211; secure acquisition<\/strong> \u2192 IEC 62443-4-2 component certification<\/li>\n<li><strong>NIS2 art. 21(2)(f) &#8211; effectiveness assessment<\/strong> \u2192 IEC 62443-2-1 management review<\/li>\n<li><strong>NIS2 art. 21(2)(g) &#8211; cyber hygiene<\/strong> \u2192 IEC 62443 FR1, FR2 (identification, use control)<\/li>\n<li><strong>NIS2 art. 21(2)(h) &#8211; cryptography<\/strong> \u2192 IEC 62443 FR4 (data confidentiality)<\/li>\n<li><strong>NIS2 art. 21(2)(i) &#8211; HR security<\/strong> \u2192 IEC 62443-2-1 personnel security<\/li>\n<li><strong>NIS2 art. 21(2)(j) &#8211; MFA + encrypted comms<\/strong> \u2192 IEC 62443 SR1.5 (multi-factor), SR4.1 (encryption)<\/li>\n<\/ul>\n<p><strong>Penalties for non-compliance<\/strong>: up to \u20ac10M or 2% of worldwide annual turnover (essential entities) and \u20ac7M or 1.4% (important entities). National competent authorities (ANSSI in France, BSI in Germany, NCSC in Netherlands) audit and enforce.<\/p>\n<div class=\"teeptrak-cta-mid\">    <div class=\"teeptrak-form-container \">\n        <h3 class=\"teeptrak-form-title\">Download the white paper<\/h3>        <p class=\"teeptrak-form-subtitle\">Enter your email address to receive our White Paper<\/p>        \n        <form id=\"teeptrak-6a0add70d9ed9\" class=\"teeptrak-form\" data-form-type=\"livre_blanc\">\n            <div style=\"position:absolute;left:-9999px;\"><input type=\"text\" name=\"website_url\" value=\"\" tabindex=\"-1\"><input type=\"text\" name=\"fax_number\" value=\"\" tabindex=\"-1\"><\/div>            \n            <div class=\"teeptrak-form-row\">                <div class=\"teeptrak-form-field\">\n                    <label>White paper <span class=\"required\">*<\/span><\/label>                    \n                                            <select name=\"livre_blanc\" required>\n                                                            <option value=\"\">Select a white paper<\/option>\n                                                            <option value=\"OEE-TRS\">OEE-TRS<\/option>\n                                                    <\/select>\n                                    <\/div>\n            <\/div><div class=\"teeptrak-form-row teeptrak-form-row-half\">                <div class=\"teeptrak-form-field\">\n                    <label>First name <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"text\" name=\"first_name\" required placeholder=\"\">\n                                    <\/div>\n                            <div class=\"teeptrak-form-field\">\n                    <label>Name<\/label>                    \n                                            <input type=\"text\" name=\"last_name\"  placeholder=\"\">\n                                    <\/div>\n            <\/div><div class=\"teeptrak-form-row\">                <div class=\"teeptrak-form-field\">\n                    <label>E-mail <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"email\" name=\"email\" required placeholder=\"\">\n                                    <\/div>\n            <\/div><div class=\"teeptrak-form-row\">                <div class=\"teeptrak-form-field\">\n                    <label>Business<\/label>                    \n                                            <input type=\"text\" name=\"company\"  placeholder=\"\">\n                                    <\/div>\n            <\/div>            \n            <input type=\"hidden\" name=\"page_url\" value=\"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/\">\n            <input type=\"hidden\" name=\"recaptcha_token\" value=\"\" class=\"teeptrak-recaptcha-token\">\n            \n                        \n            <div class=\"teeptrak-form-row\">\n                <button type=\"submit\" class=\"teeptrak-submit teeptrak-submit-full\">\n                    <span class=\"teeptrak-submit-text\">Receive the White Paper<\/span>\n                    <span class=\"teeptrak-submit-loading\" style=\"display:none;\">Envoi...<\/span>\n                <\/button>\n            <\/div>\n            \n            <div class=\"teeptrak-form-message\" style=\"display:none;\"><\/div>\n        <\/form>\n    <\/div>\n    <\/div>\n<h2>IEC 62443 vs NIST SP 800-82r3 (September 2023)<\/h2>\n<p>The <strong>NIST Special Publication 800-82 Revision 3<\/strong> &#8220;Guide to Operational Technology (OT) Security&#8221; was published in September 2023, replacing r2 (May 2015). NIST SP 800-82r3 is the U.S. federal reference for OT cybersecurity, mandatory for U.S. government industrial systems and widely adopted by private sector aligned with NIST CSF 2.0.<\/p>\n<p>Differences and complementarity:<\/p>\n<table>\n<thead>\n<tr>\n<th>Aspect<\/th>\n<th>IEC 62443<\/th>\n<th>NIST SP 800-82r3<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Origin<\/td>\n<td>International (IEC TC65 + ISA99)<\/td>\n<td>U.S. federal (NIST)<\/td>\n<\/tr>\n<tr>\n<td>Scope<\/td>\n<td>IACS-focused, deeper technical SR<\/td>\n<td>Broader OT incl. IIoT, building automation<\/td>\n<\/tr>\n<tr>\n<td>Levels<\/td>\n<td>SL1-4 progressive resistance<\/td>\n<td>Tier-based per NIST CSF 2.0 (Partial \u2192 Adaptive)<\/td>\n<\/tr>\n<tr>\n<td>Certification<\/td>\n<td>Certifiable by ISA Secure, T\u00dcV, etc.<\/td>\n<td>Not directly certifiable (used as framework)<\/td>\n<\/tr>\n<tr>\n<td>Adoption<\/td>\n<td>De facto in EU, Asia, LATAM<\/td>\n<td>Dominant in U.S., influential globally<\/td>\n<\/tr>\n<tr>\n<td>Update cadence<\/td>\n<td>5-7 years per document<\/td>\n<td>5-10 years per revision<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Best practice in 2026 is to <strong>align with both<\/strong>: IEC 62443 for technical IACS implementation + certification, NIST SP 800-82r3 for risk management framework + U.S. federal alignment. The 80% overlap in technical content makes dual compliance achievable with marginal additional effort.<\/p>\n<h2>Purdue \/ ISA-95 model and IEC 62443 zones &amp; conduits<\/h2>\n<p>IEC 62443-3-2 mandates network segmentation using the concept of <strong>zones and conduits<\/strong>. The <strong>Purdue Enterprise Reference Architecture (PERA)<\/strong> aligned with <strong>ISA-95 \/ IEC 62264<\/strong> structures the network into 6 levels: Level 0 (physical process), Level 1 (basic control PLCs), Level 2 (supervisory SCADA\/HMI), Level 3 (MES\/MOM\/historian), Level 3.5 DMZ (isolation zone), Level 4 (site business ERP), Level 5 (enterprise corporate).<\/p>\n<p>IEC 62443 implementation typically requires: asset inventory across all Purdue levels (L0-5), zone definition (per L1 group, L2 group, L3 area, DMZ, L4 enterprise), conduit identification with security requirements (firewall, IDS\/IPS, application whitelisting), risk assessment per zone (FR1-7 mapping to SL target), compensating controls where SR cannot be met, documentation and ongoing monitoring.<\/p>\n<h2>Implementation roadmap: 12-24 months typical<\/h2>\n<table>\n<thead>\n<tr>\n<th>Phase<\/th>\n<th>Duration<\/th>\n<th>Activities<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>1. Gap assessment<\/td>\n<td>2-3 months<\/td>\n<td>Asset inventory, current state, risk assessment, SL target definition<\/td>\n<\/tr>\n<tr>\n<td>2. Architecture design<\/td>\n<td>2-3 months<\/td>\n<td>Zones &amp; conduits design, network segmentation plan, technology selection<\/td>\n<\/tr>\n<tr>\n<td>3. Quick wins implementation<\/td>\n<td>3-6 months<\/td>\n<td>MFA, patching, hardening, DMZ deployment, IDS\/IPS<\/td>\n<\/tr>\n<tr>\n<td>4. Deep controls<\/td>\n<td>6-12 months<\/td>\n<td>SIEM\/SOC OT, OT-IT segmentation, vulnerability management, supply chain<\/td>\n<\/tr>\n<tr>\n<td>5. CSMS operationalization<\/td>\n<td>3-6 months<\/td>\n<td>Incident response procedures, training, tabletop exercises, audit prep<\/td>\n<\/tr>\n<tr>\n<td>6. Certification (optional)<\/td>\n<td>3-6 months<\/td>\n<td>ISA Secure System \/ Component, T\u00dcV, third-party audit<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Total: 12-24 months for SL2 target on a mid-sized manufacturing site; 24-36 months for SL3 on critical infrastructure.<\/p>\n<h2>Certifications and accreditation bodies<\/h2>\n<p>Three main certification schemes exist as of 2026: <strong>ISA Secure<\/strong> (ISCI &#8211; ISA Security Compliance Institute) &#8211; SDLA (process), CSA (component), SSA (system), SDLPA (people), most widely recognized internationally; <strong>T\u00dcV S\u00fcd, T\u00dcV Rheinland, T\u00dcV Nord<\/strong> &#8211; IEC 62443 certifications for components and systems, strong in Europe; <strong>Bureau Veritas, DNV<\/strong> &#8211; audit and certification, particularly in energy and maritime sectors.<\/p>\n<h2>FAQ: IEC 62443 industrial cybersecurity<\/h2>\n<h3>What is the difference between IEC 62443 and ISA\/IEC 62443?<\/h3>\n<p>None \u2014 the standard family is jointly published by ISA (International Society of Automation) and IEC (International Electrotechnical Commission). The &#8220;ISA\/IEC 62443&#8221; naming reflects this joint development.<\/p>\n<h3>Is IEC 62443 mandatory in 2026?<\/h3>\n<p>Indirectly yes for EU critical sectors under NIS2 directive (EU 2022\/2555), which references IEC 62443 as the primary mapping. Some sectors mandate it directly: power grid in Germany (BSI KRITIS), gas pipelines in France (ANSSI). Most other industrial sectors treat it as best practice with strong commercial pressure.<\/p>\n<h3>What Security Level should I target?<\/h3>\n<p>SL2 is the realistic default target for most discrete and process manufacturing. SL3 is recommended for food &amp; beverage, pharmaceutical, automotive Tier 1 critical, and aerospace. SL4 only for energy, transportation, water, defense critical infrastructure (nation-state threat model).<\/p>\n<h3>How does IEC 62443 relate to NIST CSF 2.0?<\/h3>\n<p>NIST CSF 2.0 (Feb 2024) is a higher-level risk management framework with 6 functions (Govern, Identify, Protect, Detect, Respond, Recover). IEC 62443 provides the technical OT implementation detail. Best practice: use NIST CSF for governance, IEC 62443 for technical controls.<\/p>\n<h3>What is the typical cost of IEC 62443 SL2 implementation?<\/h3>\n<p>For a mid-sized manufacturing site (300 IACS assets), expect \u20ac500k-1.5M total: 30% consulting\/audit, 40% technology (segmentation, IDS, SIEM), 20% process\/training, 10% certification. Multi-site groups achieve 30-50% economies of scale after first site.<\/p>\n<h3>How does TeepTrak comply with IEC 62443?<\/h3>\n<p>TeepTrak Pulse is documented compliant with IEC 62443 SL2 (manufacturer self-declaration with third-party audit pending 2026). Architecture: zone-isolated cloud, encrypted comms (TLS 1.3), MFA, audit logging, role-based access control (RBAC), no incoming connections to OT network (data only egresses via DMZ).<\/p>\n<h3>What is IEC 62443-3-3 and why is it critical?<\/h3>\n<p>IEC 62443-3-3 specifies <strong>System Security Requirements (SR)<\/strong> for IACS, organized by the 7 Foundational Requirements with 1-4 SR per FR per SL. It is the most commonly referenced document for system integrators and asset owners as it directly maps security level targets to implementable technical controls.<\/p>\n<h3>How long does ISA Secure certification take?<\/h3>\n<p>Component (CSA): 6-12 months from application to certification. System (SSA): 9-18 months. Process (SDLA): 6-12 months for vendor secure development lifecycle. Costs \u20ac50-200k depending on complexity.<\/p>\n<h3>What is the Purdue Model and is it still relevant?<\/h3>\n<p>The Purdue Enterprise Reference Architecture (PERA) defines 6 hierarchical levels of industrial networks. It remains the de facto reference for IEC 62443 zone segmentation, despite criticism for not handling cloud and IIoT well. Modern updates: IEC 62443-3-2 zones &amp; conduits + ISA-95 \/ IEC 62264 alignment + Zero Trust principles for IIoT.<\/p>\n<h3>What is the difference between IEC 62443-4-1 and 4-2?<\/h3>\n<p>IEC 62443-4-1 specifies the <strong>Secure Development Lifecycle (SDL)<\/strong> requirements for product suppliers (process). IEC 62443-4-2 specifies the <strong>Technical Component Requirements (CR)<\/strong> for the components themselves (product). A component vendor needs both: a certified SDL process (4-1) AND certified components (4-2).<\/p>\n<h2>Conclusion<\/h2>\n<p>IEC 62443 is the international reference standard for industrial cybersecurity in 2026, mandatory or quasi-mandatory across most critical sectors via NIS2 directive in the EU and aligned with NIST SP 800-82r3 in the U.S. Implementation requires 12-24 months for SL2 target on a mid-sized manufacturing site, with \u20ac500k-1.5M typical investment. Multi-site groups achieve 30-50% economies of scale after the first site through architecture template reuse.<\/p>\n<p><strong>Next step<\/strong>: download the TeepTrak IEC 62443 implementation whitepaper or request a free maturity assessment on your IACS environment.<\/p>\n<div class=\"teeptrak-cta-final\">    <div class=\"teeptrak-form-container \">\n        <h3 class=\"teeptrak-form-title\">Request a demo<\/h3>                \n        <form id=\"teeptrak-6a0add70d9f7f\" class=\"teeptrak-form\" data-form-type=\"demo_request\">\n            <div style=\"position:absolute;left:-9999px;\"><input type=\"text\" name=\"website_url\" value=\"\" tabindex=\"-1\"><input type=\"text\" name=\"fax_number\" value=\"\" tabindex=\"-1\"><\/div>            \n            <div class=\"teeptrak-form-row teeptrak-form-row-half\">                <div class=\"teeptrak-form-field\">\n                    <label>First name <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"text\" name=\"first_name\" required placeholder=\"\">\n                                    <\/div>\n                            <div class=\"teeptrak-form-field\">\n                    <label>Name <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"text\" name=\"last_name\" required placeholder=\"\">\n                                    <\/div>\n                            <div class=\"teeptrak-form-field\">\n                    <label>E-mail <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"email\" name=\"email\" required placeholder=\"\">\n                                    <\/div>\n                            <div class=\"teeptrak-form-field\">\n                    <label>Phone <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"tel\" name=\"phone\" required placeholder=\"\">\n                                    <\/div>\n                            <div class=\"teeptrak-form-field\">\n                    <label>Business <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"text\" name=\"company\" required placeholder=\"\">\n                                    <\/div>\n                            <div class=\"teeptrak-form-field\">\n                    <label>Job<\/label>                    \n                                            <input type=\"text\" name=\"job_title\"  placeholder=\"\">\n                                    <\/div>\n            <\/div><div class=\"teeptrak-form-row\">                <div class=\"teeptrak-form-field\">\n                    <label>Goals<\/label>                    \n                                            <textarea name=\"message\" rows=\"3\"  placeholder=\"\"><\/textarea>\n                                    <\/div>\n            <\/div>            \n            <input type=\"hidden\" name=\"page_url\" value=\"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/\">\n            <input type=\"hidden\" name=\"recaptcha_token\" value=\"\" class=\"teeptrak-recaptcha-token\">\n            \n                        \n            <div class=\"teeptrak-form-row\">\n                <button type=\"submit\" class=\"teeptrak-submit teeptrak-submit-full\">\n                    <span class=\"teeptrak-submit-text\">To book<\/span>\n                    <span class=\"teeptrak-submit-loading\" style=\"display:none;\">Envoi...<\/span>\n                <\/button>\n            <\/div>\n            \n            <div class=\"teeptrak-form-message\" style=\"display:none;\"><\/div>\n        <\/form>\n    <\/div>\n    <\/div>\n<p><script type=\"application\/ld+json\">{\"@context\": \"https:\/\/schema.org\", \"@type\": \"Article\", \"headline\": \"IEC 62443 industrial cybersecurity (2026): SL1-4 implementation, NIS2 compliance, NIST SP 800-82r3\", \"description\": \"IEC 62443 industrial cybersecurity 2026: complete guide to Security Levels SL1-4, NIS2 EU 2022\/2555 compliance, NIST SP 800-82r3, Purdue model segmentation, ISA-95 alignment. Implementation roadmap for OT\/IT manufacturing environments.\", \"author\": {\"@type\": \"Organization\", \"name\": \"TeepTrak\", \"url\": \"https:\/\/teeptrak.com\"}, \"publisher\": {\"@type\": \"Organization\", \"name\": \"TeepTrak\", \"logo\": {\"@type\": \"ImageObject\", \"url\": \"https:\/\/teeptrak.com\/wp-content\/uploads\/2025\/01\/teeptrak-logo.png\"}}, \"datePublished\": \"2026-09-08\", \"dateModified\": \"2026-09-08\", \"inLanguage\": \"en-US\", \"mainEntityOfPage\": {\"@type\": \"WebPage\", \"@id\": \"https:\/\/teeptrak.com\/iec-62443-industrial-cybersecurity-2026\/\"}}<\/script><\/p>\n<p><script type=\"application\/ld+json\">{\"@context\": \"https:\/\/schema.org\", \"@type\": \"FAQPage\", \"inLanguage\": \"en-US\", \"mainEntity\": [{\"@type\": \"Question\", \"name\": \"What is the difference between IEC 62443 and ISA\/IEC 62443?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"None \u2014 the standard family is jointly published by ISA (International Society of Automation) and IEC (International Electrotechnical Commission). The ISA\/IEC 62443 naming reflects this joint development. The IEC reference is the international version.\"}}, {\"@type\": \"Question\", \"name\": \"Is IEC 62443 mandatory in 2026?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"Indirectly yes for EU critical sectors under NIS2 directive (EU 2022\/2555), which references IEC 62443 as the primary mapping. Some sectors mandate it directly: power grid in Germany (BSI KRITIS), gas pipelines in France (ANSSI). Most other industrial sectors treat it as best practice with strong commercial pressure (cyber insurance, customer requirements).\"}}, {\"@type\": \"Question\", \"name\": \"What Security Level should I target?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"SL2 is the realistic default target for most discrete and process manufacturing. SL3 is recommended for food & beverage, pharmaceutical, automotive Tier 1 critical, and aerospace. SL4 only for energy, transportation, water, defense critical infrastructure (nation-state threat model).\"}}, {\"@type\": \"Question\", \"name\": \"How does IEC 62443 relate to NIST CSF 2.0?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"NIST CSF 2.0 (Feb 2024) is a higher-level risk management framework with 6 functions (Govern, Identify, Protect, Detect, Respond, Recover). IEC 62443 provides the technical OT implementation detail. Best practice: use NIST CSF for governance, IEC 62443 for technical controls.\"}}, {\"@type\": \"Question\", \"name\": \"What is the typical cost of IEC 62443 SL2 implementation?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"For a mid-sized manufacturing site (300 IACS assets), expect \u20ac500k-1.5M total: 30% consulting\/audit, 40% technology (segmentation, IDS, SIEM), 20% process\/training, 10% certification. Multi-site groups achieve 30-50% economies of scale after first site.\"}}, {\"@type\": \"Question\", \"name\": \"How does TeepTrak comply with IEC 62443?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"TeepTrak Pulse is documented compliant with IEC 62443 SL2 (manufacturer self-declaration with third-party audit pending 2026). Architecture: zone-isolated cloud, encrypted comms (TLS 1.3), MFA, audit logging, role-based access control (RBAC), no incoming connections to OT network (data only egresses via DMZ).\"}}, {\"@type\": \"Question\", \"name\": \"What is IEC 62443-3-3 and why is it critical?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"IEC 62443-3-3 specifies System Security Requirements (SR) for IACS, organized by the 7 Foundational Requirements with 1-4 SR per FR per SL. It is the most commonly referenced document for system integrators and asset owners as it directly maps security level targets to implementable technical controls.\"}}, {\"@type\": \"Question\", \"name\": \"How long does ISA Secure certification take?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"Component (CSA): 6-12 months from application to certification. System (SSA): 9-18 months. Process (SDLA): 6-12 months for vendor secure development lifecycle. Costs \u20ac50-200k depending on complexity.\"}}, {\"@type\": \"Question\", \"name\": \"What is the Purdue Model and is it still relevant?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"The Purdue Enterprise Reference Architecture (PERA) defines 6 hierarchical levels of industrial networks. It remains the de facto reference for IEC 62443 zone segmentation, despite criticism for not handling cloud and IIoT well. Modern updates: IEC 62443-3-2 zones & conduits + ISA-95 \/ IEC 62264 alignment + Zero Trust principles for IIoT.\"}}, {\"@type\": \"Question\", \"name\": \"What is the difference between IEC 62443-4-1 and 4-2?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"IEC 62443-4-1 specifies the Secure Development Lifecycle (SDL) requirements for product suppliers (process). IEC 62443-4-2 specifies the Technical Component Requirements (CR) for the components themselves (product). A component vendor needs both: a certified SDL process (4-1) AND certified components (4-2).\"}}]}<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TL;DR \u2014 IEC 62443 in 60 words IEC 62443 is the international standard for industrial cybersecurity, structured in 4 parts (general, policies, system, component). Defines Security Levels SL1 (casual) to SL4 (state-sponsored). Mandatory for NIS2 EU 2022\/2555 compliance in critical industrial sectors. Aligns with NIST SP 800-82r3 (Sep 2023) and Purdue\/ISA-95 model. Implementation 12-24 months [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":94113,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","ai_seo_title":"","ai_meta_description":"","ai_focus_keyword":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-94119","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IEC 62443 industrial cybersecurity (2026): SL1-4 implementation, NIS2 compliance, NIST SP 800-82r3 - TEEPTRAK - Connect to your industrial potential<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IEC 62443 industrial cybersecurity (2026): SL1-4 implementation, NIS2 compliance, NIST SP 800-82r3 - TEEPTRAK - Connect to your industrial potential\" \/>\n<meta property=\"og:description\" content=\"TL;DR \u2014 IEC 62443 in 60 words IEC 62443 is the international standard for industrial cybersecurity, structured in 4 parts (general, policies, system, component). Defines Security Levels SL1 (casual) to SL4 (state-sponsored). Mandatory for NIS2 EU 2022\/2555 compliance in critical industrial sectors. Aligns with NIST SP 800-82r3 (Sep 2023) and Purdue\/ISA-95 model. Implementation 12-24 months [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"TEEPTRAK - Connect to your industrial potential\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-18T07:50:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-18T07:50:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/teeptrak.com\/wp-content\/uploads\/2026\/05\/iec-62443-industrial-cybersecurity-2026.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1150\" \/>\n\t<meta property=\"og:image:height\" content=\"657\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"\u00c9quipe TEEPTRAK\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u00c9quipe TEEPTRAK\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-industrial-cybersecurity-2026\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-industrial-cybersecurity-2026\\\/\"},\"author\":{\"name\":\"\u00c9quipe TEEPTRAK\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#\\\/schema\\\/person\\\/e0b65287bf97c0856b9e70813a4b5aff\"},\"headline\":\"IEC 62443 industrial cybersecurity (2026): SL1-4 implementation, NIS2 compliance, NIST SP 800-82r3\",\"datePublished\":\"2026-05-18T07:50:56+00:00\",\"dateModified\":\"2026-05-18T07:50:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-industrial-cybersecurity-2026\\\/\"},\"wordCount\":1614,\"publisher\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-industrial-cybersecurity-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/teeptrak.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iec-62443-industrial-cybersecurity-2026.jpeg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-industrial-cybersecurity-2026\\\/\",\"url\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-industrial-cybersecurity-2026\\\/\",\"name\":\"IEC 62443 industrial cybersecurity (2026): SL1-4 implementation, NIS2 compliance, NIST SP 800-82r3 - TEEPTRAK - Connect to your industrial potential\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-industrial-cybersecurity-2026\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-industrial-cybersecurity-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/teeptrak.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iec-62443-industrial-cybersecurity-2026.jpeg\",\"datePublished\":\"2026-05-18T07:50:56+00:00\",\"dateModified\":\"2026-05-18T07:50:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-industrial-cybersecurity-2026\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-industrial-cybersecurity-2026\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-industrial-cybersecurity-2026\\\/#primaryimage\",\"url\":\"https:\\\/\\\/teeptrak.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iec-62443-industrial-cybersecurity-2026.jpeg\",\"contentUrl\":\"https:\\\/\\\/teeptrak.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iec-62443-industrial-cybersecurity-2026.jpeg\",\"width\":1150,\"height\":657},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-industrial-cybersecurity-2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IEC 62443 industrial cybersecurity (2026): SL1-4 implementation, NIS2 compliance, NIST SP 800-82r3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/\",\"name\":\"TEEPTRAK\",\"description\":\"TEEPTRAK official website - OEE\",\"publisher\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#organization\",\"name\":\"TEEPTRAK\",\"url\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/teeptrak.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/cropped-Capture-decran-2023-05-04-112832.png\",\"contentUrl\":\"https:\\\/\\\/teeptrak.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/cropped-Capture-decran-2023-05-04-112832.png\",\"width\":512,\"height\":512,\"caption\":\"TEEPTRAK\"},\"image\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/teeptrak\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/teeptrakinternational\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#\\\/schema\\\/person\\\/e0b65287bf97c0856b9e70813a4b5aff\",\"name\":\"\u00c9quipe TEEPTRAK\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c15a5bed2b22793c34b357757ed5a12321e733893599e115e40c0263ef4877f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c15a5bed2b22793c34b357757ed5a12321e733893599e115e40c0263ef4877f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c15a5bed2b22793c34b357757ed5a12321e733893599e115e40c0263ef4877f7?s=96&d=mm&r=g\",\"caption\":\"\u00c9quipe TEEPTRAK\"},\"sameAs\":[\"https:\\\/\\\/teeptrak.com\"],\"url\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/author\\\/auriane\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IEC 62443 industrial cybersecurity (2026): SL1-4 implementation, NIS2 compliance, NIST SP 800-82r3 - TEEPTRAK - Connect to your industrial potential","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/","og_locale":"en_US","og_type":"article","og_title":"IEC 62443 industrial cybersecurity (2026): SL1-4 implementation, NIS2 compliance, NIST SP 800-82r3 - TEEPTRAK - Connect to your industrial potential","og_description":"TL;DR \u2014 IEC 62443 in 60 words IEC 62443 is the international standard for industrial cybersecurity, structured in 4 parts (general, policies, system, component). Defines Security Levels SL1 (casual) to SL4 (state-sponsored). Mandatory for NIS2 EU 2022\/2555 compliance in critical industrial sectors. Aligns with NIST SP 800-82r3 (Sep 2023) and Purdue\/ISA-95 model. Implementation 12-24 months [&hellip;]","og_url":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/","og_site_name":"TEEPTRAK - Connect to your industrial potential","article_published_time":"2026-05-18T07:50:56+00:00","article_modified_time":"2026-05-18T07:50:58+00:00","og_image":[{"width":1150,"height":657,"url":"https:\/\/teeptrak.com\/wp-content\/uploads\/2026\/05\/iec-62443-industrial-cybersecurity-2026.jpeg","type":"image\/jpeg"}],"author":"\u00c9quipe TEEPTRAK","twitter_card":"summary_large_image","twitter_misc":{"Written by":"\u00c9quipe TEEPTRAK","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/#article","isPartOf":{"@id":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/"},"author":{"name":"\u00c9quipe TEEPTRAK","@id":"https:\/\/teeptrak.com\/en\/#\/schema\/person\/e0b65287bf97c0856b9e70813a4b5aff"},"headline":"IEC 62443 industrial cybersecurity (2026): SL1-4 implementation, NIS2 compliance, NIST SP 800-82r3","datePublished":"2026-05-18T07:50:56+00:00","dateModified":"2026-05-18T07:50:58+00:00","mainEntityOfPage":{"@id":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/"},"wordCount":1614,"publisher":{"@id":"https:\/\/teeptrak.com\/en\/#organization"},"image":{"@id":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/teeptrak.com\/wp-content\/uploads\/2026\/05\/iec-62443-industrial-cybersecurity-2026.jpeg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/","url":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/","name":"IEC 62443 industrial cybersecurity (2026): SL1-4 implementation, NIS2 compliance, NIST SP 800-82r3 - TEEPTRAK - Connect to your industrial potential","isPartOf":{"@id":"https:\/\/teeptrak.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/#primaryimage"},"image":{"@id":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/teeptrak.com\/wp-content\/uploads\/2026\/05\/iec-62443-industrial-cybersecurity-2026.jpeg","datePublished":"2026-05-18T07:50:56+00:00","dateModified":"2026-05-18T07:50:58+00:00","breadcrumb":{"@id":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/#primaryimage","url":"https:\/\/teeptrak.com\/wp-content\/uploads\/2026\/05\/iec-62443-industrial-cybersecurity-2026.jpeg","contentUrl":"https:\/\/teeptrak.com\/wp-content\/uploads\/2026\/05\/iec-62443-industrial-cybersecurity-2026.jpeg","width":1150,"height":657},{"@type":"BreadcrumbList","@id":"https:\/\/teeptrak.com\/en\/iec-62443-industrial-cybersecurity-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/teeptrak.com\/en\/"},{"@type":"ListItem","position":2,"name":"IEC 62443 industrial cybersecurity (2026): SL1-4 implementation, NIS2 compliance, NIST SP 800-82r3"}]},{"@type":"WebSite","@id":"https:\/\/teeptrak.com\/en\/#website","url":"https:\/\/teeptrak.com\/en\/","name":"TEEPTRAK","description":"TEEPTRAK official website - OEE","publisher":{"@id":"https:\/\/teeptrak.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/teeptrak.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/teeptrak.com\/en\/#organization","name":"TEEPTRAK","url":"https:\/\/teeptrak.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/teeptrak.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/teeptrak.com\/wp-content\/uploads\/2023\/05\/cropped-Capture-decran-2023-05-04-112832.png","contentUrl":"https:\/\/teeptrak.com\/wp-content\/uploads\/2023\/05\/cropped-Capture-decran-2023-05-04-112832.png","width":512,"height":512,"caption":"TEEPTRAK"},"image":{"@id":"https:\/\/teeptrak.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/teeptrak\/","https:\/\/www.linkedin.com\/company\/teeptrakinternational\/"]},{"@type":"Person","@id":"https:\/\/teeptrak.com\/en\/#\/schema\/person\/e0b65287bf97c0856b9e70813a4b5aff","name":"\u00c9quipe TEEPTRAK","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c15a5bed2b22793c34b357757ed5a12321e733893599e115e40c0263ef4877f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c15a5bed2b22793c34b357757ed5a12321e733893599e115e40c0263ef4877f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c15a5bed2b22793c34b357757ed5a12321e733893599e115e40c0263ef4877f7?s=96&d=mm&r=g","caption":"\u00c9quipe TEEPTRAK"},"sameAs":["https:\/\/teeptrak.com"],"url":"https:\/\/teeptrak.com\/en\/author\/auriane\/"}]}},"_links":{"self":[{"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/posts\/94119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/comments?post=94119"}],"version-history":[{"count":1,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/posts\/94119\/revisions"}],"predecessor-version":[{"id":94120,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/posts\/94119\/revisions\/94120"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/media\/94113"}],"wp:attachment":[{"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/media?parent=94119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/categories?post=94119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/tags?post=94119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}