{"id":94242,"date":"2026-05-18T09:39:53","date_gmt":"2026-05-18T09:39:53","guid":{"rendered":"https:\/\/teeptrak.com\/iec-62443-3-3-system-requirements-2026\/"},"modified":"2026-05-18T09:39:55","modified_gmt":"2026-05-18T09:39:55","slug":"iec-62443-3-3-system-requirements-2026","status":"publish","type":"post","link":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/","title":{"rendered":"IEC 62443-3-3 system security requirements (2026): SR1-7, FR mapping, SL implementation guide"},"content":{"rendered":"<div class=\"tldr-answer\" style=\"background:#F5F8FB;border-left:4px solid #4C00FF;padding:18px 24px;margin:24px 0;\">\n<strong>TL;DR \u2014 IEC 62443-3-3 in 60 words<\/strong><br \/>\nIEC 62443-3-3:2013 specifies System Security Requirements (SR) for IACS, organized by 7 Foundational Requirements (FR1-7). Each FR contains 1-4 SR per Security Level (SL1-4), totaling 100+ technical controls. Most-referenced document for system integrators and asset owners. Required for NIS2 EU 2022\/2555 article 21 compliance and ISA Secure System Security Assurance (SSA) certification.\n<\/div>\n<p><strong>IEC 62443-3-3:2013<\/strong> &#8220;System security requirements and security levels&#8221; is the most operationally critical document of the IEC 62443 family. While IEC 62443-1 establishes terminology and IEC 62443-2 covers policy\/procedures, IEC 62443-3-3 specifies the actual <strong>technical controls<\/strong> that an Industrial Automation and Control System (IACS) must implement to achieve a target Security Level (SL1, SL2, SL3, or SL4). For system integrators (Capgemini, Atos, Siemens PSI, Yokogawa, Honeywell PMC, Aveva Select Partners), this is the day-to-day reference. For asset owners (manufacturers), it defines the contractual security baseline. This guide details the 7 Foundational Requirements, the SR catalog (100+ controls), implementation patterns, and mapping to NIS2 EU 2022\/2555 Article 21.<\/p>\n<h2>The 7 Foundational Requirements (FR1-7)<\/h2>\n<p>IEC 62443-3-3 organizes all System Requirements into 7 Foundational Requirements:<\/p>\n<table>\n<thead>\n<tr>\n<th>FR<\/th>\n<th>Title<\/th>\n<th>Number of SR<\/th>\n<th>Key intent<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>FR1<\/strong><\/td>\n<td>Identification and Authentication Control (IAC)<\/td>\n<td>13 SR<\/td>\n<td>Authenticate humans + devices + software before access<\/td>\n<\/tr>\n<tr>\n<td><strong>FR2<\/strong><\/td>\n<td>Use Control (UC)<\/td>\n<td>12 SR<\/td>\n<td>Authorize actions per role \/ privilege (RBAC, ABAC)<\/td>\n<\/tr>\n<tr>\n<td><strong>FR3<\/strong><\/td>\n<td>System Integrity (SI)<\/td>\n<td>9 SR<\/td>\n<td>Detect\/prevent unauthorized changes to firmware, OS, application, data<\/td>\n<\/tr>\n<tr>\n<td><strong>FR4<\/strong><\/td>\n<td>Data Confidentiality (DC)<\/td>\n<td>3 SR<\/td>\n<td>Encrypt data at rest, in transit, sensitive information protection<\/td>\n<\/tr>\n<tr>\n<td><strong>FR5<\/strong><\/td>\n<td>Restricted Data Flow (RDF)<\/td>\n<td>4 SR<\/td>\n<td>Network segmentation (zones &amp; conduits), DMZ, application whitelisting<\/td>\n<\/tr>\n<tr>\n<td><strong>FR6<\/strong><\/td>\n<td>Timely Response to Events (TRE)<\/td>\n<td>2 SR<\/td>\n<td>Audit logs, monitoring, alerting, incident detection<\/td>\n<\/tr>\n<tr>\n<td><strong>FR7<\/strong><\/td>\n<td>Resource Availability (RA)<\/td>\n<td>8 SR<\/td>\n<td>Backup, recovery, DoS protection, failover, restore<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Total: 51 SR, each with 1-4 Requirement Enhancements (RE) per Security Level \u2192 ~100 implementable technical controls at SL2, increasing to ~150 at SL4.<\/p>\n<h2>System Requirement notation and reading the standard<\/h2>\n<p>SR notation follows the pattern <strong>SR FR.SubFR REn<\/strong> where:<\/p>\n<ul>\n<li><strong>FR<\/strong> = Foundational Requirement number (1-7)<\/li>\n<li><strong>SubFR<\/strong> = Sub-requirement number within the FR<\/li>\n<li><strong>REn<\/strong> = Requirement Enhancement level (RE1, RE2, RE3)<\/li>\n<\/ul>\n<p>Example: <strong>SR 1.1 RE1<\/strong> = First sub-requirement of FR1 (Identification &amp; Authentication Control), with Requirement Enhancement level 1. Reading the standard: SR 1.1 base = required at SL1 (and above). SR 1.1 RE1 = required additionally at SL2 (and above). SR 1.1 RE2 = required additionally at SL3 (and above). SR 1.1 RE3 = required additionally at SL4.<\/p>\n<h2>FR1 &#8211; Identification and Authentication Control (IAC) detail<\/h2>\n<p>FR1 contains 13 SR addressing how IACS authenticates users, devices, and software before granting access:<\/p>\n<table>\n<thead>\n<tr>\n<th>SR<\/th>\n<th>Title<\/th>\n<th>Required from SL<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>SR 1.1<\/td>\n<td>Human user identification and authentication<\/td>\n<td>SL1<\/td>\n<\/tr>\n<tr>\n<td>SR 1.1 RE1<\/td>\n<td>Unique identification and authentication<\/td>\n<td>SL2<\/td>\n<\/tr>\n<tr>\n<td>SR 1.1 RE2<\/td>\n<td>Multifactor authentication for untrusted networks<\/td>\n<td>SL3<\/td>\n<\/tr>\n<tr>\n<td>SR 1.1 RE3<\/td>\n<td>Multifactor authentication for all networks<\/td>\n<td>SL4<\/td>\n<\/tr>\n<tr>\n<td>SR 1.2<\/td>\n<td>Software process and device identification and authentication<\/td>\n<td>SL2<\/td>\n<\/tr>\n<tr>\n<td>SR 1.3<\/td>\n<td>Account management<\/td>\n<td>SL1<\/td>\n<\/tr>\n<tr>\n<td>SR 1.4<\/td>\n<td>Identifier management<\/td>\n<td>SL1<\/td>\n<\/tr>\n<tr>\n<td>SR 1.5<\/td>\n<td>Authenticator management<\/td>\n<td>SL1<\/td>\n<\/tr>\n<tr>\n<td>SR 1.5 RE1<\/td>\n<td>Hardware security for authenticators<\/td>\n<td>SL3<\/td>\n<\/tr>\n<tr>\n<td>SR 1.6<\/td>\n<td>Wireless access management<\/td>\n<td>SL2<\/td>\n<\/tr>\n<tr>\n<td>SR 1.7<\/td>\n<td>Strength of password-based authentication<\/td>\n<td>SL1<\/td>\n<\/tr>\n<tr>\n<td>SR 1.8<\/td>\n<td>Public key infrastructure (PKI) certificates<\/td>\n<td>SL2<\/td>\n<\/tr>\n<tr>\n<td>SR 1.9<\/td>\n<td>Strength of public key authentication<\/td>\n<td>SL2<\/td>\n<\/tr>\n<tr>\n<td>SR 1.10<\/td>\n<td>Authenticator feedback<\/td>\n<td>SL2<\/td>\n<\/tr>\n<tr>\n<td>SR 1.11<\/td>\n<td>Unsuccessful login attempts<\/td>\n<td>SL1<\/td>\n<\/tr>\n<tr>\n<td>SR 1.12<\/td>\n<td>System use notification<\/td>\n<td>SL1<\/td>\n<\/tr>\n<tr>\n<td>SR 1.13<\/td>\n<td>Access via untrusted networks<\/td>\n<td>SL3<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Practical implementation FR1 at SL2: unique identification + MFA for engineering workstations + RBAC role definitions + PKI certificates for device authentication + audit trail of login attempts.<\/p>\n<div class=\"teeptrak-cta-mid\">    <div class=\"teeptrak-form-container \">\n        <h3 class=\"teeptrak-form-title\">Download the white paper<\/h3>        <p class=\"teeptrak-form-subtitle\">Enter your email address to receive our White Paper<\/p>        \n        <form id=\"teeptrak-6a0af1d58609e\" class=\"teeptrak-form\" data-form-type=\"livre_blanc\">\n            <div style=\"position:absolute;left:-9999px;\"><input type=\"text\" name=\"website_url\" value=\"\" tabindex=\"-1\"><input type=\"text\" name=\"fax_number\" value=\"\" tabindex=\"-1\"><\/div>            \n            <div class=\"teeptrak-form-row\">                <div class=\"teeptrak-form-field\">\n                    <label>White paper <span class=\"required\">*<\/span><\/label>                    \n                                            <select name=\"livre_blanc\" required>\n                                                            <option value=\"\">Select a white paper<\/option>\n                                                            <option value=\"OEE-TRS\">OEE-TRS<\/option>\n                                                    <\/select>\n                                    <\/div>\n            <\/div><div class=\"teeptrak-form-row teeptrak-form-row-half\">                <div class=\"teeptrak-form-field\">\n                    <label>First name <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"text\" name=\"first_name\" required placeholder=\"\">\n                                    <\/div>\n                            <div class=\"teeptrak-form-field\">\n                    <label>Name<\/label>                    \n                                            <input type=\"text\" name=\"last_name\"  placeholder=\"\">\n                                    <\/div>\n            <\/div><div class=\"teeptrak-form-row\">                <div class=\"teeptrak-form-field\">\n                    <label>E-mail <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"email\" name=\"email\" required placeholder=\"\">\n                                    <\/div>\n            <\/div><div class=\"teeptrak-form-row\">                <div class=\"teeptrak-form-field\">\n                    <label>Business<\/label>                    \n                                            <input type=\"text\" name=\"company\"  placeholder=\"\">\n                                    <\/div>\n            <\/div>            \n            <input type=\"hidden\" name=\"page_url\" value=\"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/\">\n            <input type=\"hidden\" name=\"recaptcha_token\" value=\"\" class=\"teeptrak-recaptcha-token\">\n            \n                        \n            <div class=\"teeptrak-form-row\">\n                <button type=\"submit\" class=\"teeptrak-submit teeptrak-submit-full\">\n                    <span class=\"teeptrak-submit-text\">Receive the White Paper<\/span>\n                    <span class=\"teeptrak-submit-loading\" style=\"display:none;\">Envoi...<\/span>\n                <\/button>\n            <\/div>\n            \n            <div class=\"teeptrak-form-message\" style=\"display:none;\"><\/div>\n        <\/form>\n    <\/div>\n    <\/div>\n<h2>FR2 &#8211; Use Control (UC) detail<\/h2>\n<p>FR2 contains 12 SR addressing authorization of actions once authenticated:<\/p>\n<table>\n<thead>\n<tr>\n<th>SR<\/th>\n<th>Title<\/th>\n<th>Required from SL<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>SR 2.1<\/td>\n<td>Authorization enforcement<\/td>\n<td>SL1<\/td>\n<\/tr>\n<tr>\n<td>SR 2.1 RE1<\/td>\n<td>Authorization enforcement for all users<\/td>\n<td>SL2<\/td>\n<\/tr>\n<tr>\n<td>SR 2.1 RE2<\/td>\n<td>Permission mapping to roles<\/td>\n<td>SL3<\/td>\n<\/tr>\n<tr>\n<td>SR 2.2<\/td>\n<td>Wireless use control<\/td>\n<td>SL2<\/td>\n<\/tr>\n<tr>\n<td>SR 2.3<\/td>\n<td>Use control for portable and mobile devices<\/td>\n<td>SL2<\/td>\n<\/tr>\n<tr>\n<td>SR 2.4<\/td>\n<td>Mobile code<\/td>\n<td>SL2<\/td>\n<\/tr>\n<tr>\n<td>SR 2.5<\/td>\n<td>Session lock<\/td>\n<td>SL1<\/td>\n<\/tr>\n<tr>\n<td>SR 2.6<\/td>\n<td>Remote session termination<\/td>\n<td>SL2<\/td>\n<\/tr>\n<tr>\n<td>SR 2.7<\/td>\n<td>Concurrent session control<\/td>\n<td>SL3<\/td>\n<\/tr>\n<tr>\n<td>SR 2.8<\/td>\n<td>Auditable events<\/td>\n<td>SL1<\/td>\n<\/tr>\n<tr>\n<td>SR 2.9<\/td>\n<td>Audit storage capacity<\/td>\n<td>SL1<\/td>\n<\/tr>\n<tr>\n<td>SR 2.10<\/td>\n<td>Response to audit processing failures<\/td>\n<td>SL1<\/td>\n<\/tr>\n<tr>\n<td>SR 2.11<\/td>\n<td>Timestamps<\/td>\n<td>SL2<\/td>\n<\/tr>\n<tr>\n<td>SR 2.12<\/td>\n<td>Non-repudiation<\/td>\n<td>SL3<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>FR3 &#8211; System Integrity (SI) and FR4 &#8211; Data Confidentiality (DC)<\/h2>\n<p>FR3 contains 9 SR for system integrity: communication integrity (SR 3.1), malicious code protection (SR 3.2), security functionality verification (SR 3.3), software and information integrity (SR 3.4), input validation (SR 3.5), deterministic output (SR 3.6), error handling (SR 3.7), session integrity (SR 3.8), protection of audit information (SR 3.9). Practical implementation at SL2 typically involves: TLS 1.3 for comms, antivirus + EDR on engineering workstations, signed firmware updates, application allowlisting, secure boot for embedded devices.<\/p>\n<p>FR4 contains 3 SR for data confidentiality: information confidentiality (SR 4.1, encryption at rest + transit), information persistence (SR 4.2, secure erasure), cryptographic key management (SR 4.3, key lifecycle). Implementation at SL2: TLS 1.3 + AES-256 at rest + KMS solution (HashiCorp Vault, AWS KMS, Azure Key Vault).<\/p>\n<h2>FR5 &#8211; Restricted Data Flow (RDF) and FR6 &#8211; Timely Response to Events (TRE)<\/h2>\n<p>FR5 contains 4 SR for restricted data flow, mandating network segmentation per IEC 62443-3-2 zones &amp; conduits model: network segmentation (SR 5.1), zone boundary protection (SR 5.2), general purpose person-to-person communication restrictions (SR 5.3), application partitioning (SR 5.4). Implementation: Purdue model levels L0-L3 + L3.5 DMZ + L4-L5 enterprise, with firewalls + IDS\/IPS at conduit boundaries, application allowlisting on engineering workstations, dedicated jump hosts for remote access.<\/p>\n<p>FR6 contains 2 SR for timely response: audit log accessibility (SR 6.1), continuous monitoring (SR 6.2). Implementation: SIEM aggregation (Splunk, IBM QRadar, Microsoft Sentinel, Elastic, Wazuh) + SOC OT (security operations center for OT) + UEBA (user and entity behavior analytics) + threat hunting.<\/p>\n<h2>FR7 &#8211; Resource Availability (RA) detail<\/h2>\n<p>FR7 contains 8 SR addressing system availability and DoS resilience: denial of service protection (SR 7.1), resource management (SR 7.2), control system backup (SR 7.3), control system recovery and reconstitution (SR 7.4), emergency power (SR 7.5), network and security configuration settings (SR 7.6), least functionality (SR 7.7), control system component inventory (SR 7.8). Implementation at SL2: tested backup procedures (daily + weekly + monthly), documented recovery RTO\/RPO targets, UPS + generator for critical control systems, hardening baseline per CIS Benchmark \/ NIST SP 800-53, asset inventory continuously maintained.<\/p>\n<h2>Mapping IEC 62443-3-3 SR to NIS2 Article 21 obligations<\/h2>\n<p>NIS2 directive EU 2022\/2555 Article 21 mandates 10 categories of cybersecurity measures. Each maps directly to IEC 62443-3-3 SR:<\/p>\n<table>\n<thead>\n<tr>\n<th>NIS2 Article 21(2)<\/th>\n<th>Mandate<\/th>\n<th>IEC 62443-3-3 SR mapping<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>(a)<\/td>\n<td>Risk analysis policies<\/td>\n<td>SR 2.8 (auditable events), SR 6.1 (audit log access)<\/td>\n<\/tr>\n<tr>\n<td>(b)<\/td>\n<td>Incident handling<\/td>\n<td>SR 6.1, SR 6.2 (continuous monitoring)<\/td>\n<\/tr>\n<tr>\n<td>(c)<\/td>\n<td>Business continuity<\/td>\n<td>SR 7.3 (backup), SR 7.4 (recovery), SR 7.5 (emergency power)<\/td>\n<\/tr>\n<tr>\n<td>(d)<\/td>\n<td>Supply chain security<\/td>\n<td>Maps to IEC 62443-2-4 + 62443-4-1 (component supplier reqs)<\/td>\n<\/tr>\n<tr>\n<td>(e)<\/td>\n<td>Secure acquisition<\/td>\n<td>Maps to IEC 62443-4-2 (component certification)<\/td>\n<\/tr>\n<tr>\n<td>(f)<\/td>\n<td>Effectiveness assessment<\/td>\n<td>SR 3.3 (security functionality verification)<\/td>\n<\/tr>\n<tr>\n<td>(g)<\/td>\n<td>Cyber hygiene<\/td>\n<td>SR 1.x (FR1 IAC), SR 2.x (FR2 UC), SR 3.2 (malicious code)<\/td>\n<\/tr>\n<tr>\n<td>(h)<\/td>\n<td>Cryptography<\/td>\n<td>SR 4.1 (information confidentiality), SR 4.3 (key management)<\/td>\n<\/tr>\n<tr>\n<td>(i)<\/td>\n<td>HR security<\/td>\n<td>SR 1.3 (account management), SR 1.4 (identifier management)<\/td>\n<\/tr>\n<tr>\n<td>(j)<\/td>\n<td>MFA + encrypted communications<\/td>\n<td>SR 1.1 RE2\/RE3 (MFA), SR 3.1 (communication integrity)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>ISA Secure System Security Assurance (SSA) certification<\/h2>\n<p>ISA Secure SSA is the international certification scheme for systems claiming IEC 62443-3-3 compliance. Three certification levels: SSA-Level 1 (basic), SSA-Level 2 (default target for most manufacturing), SSA-Level 3 (critical infrastructure). Process: 9-18 months from application to certification by accredited lab (ExidaCEE, T\u00dcV S\u00fcd, T\u00dcV Rheinland, Bureau Veritas). Cost: \u20ac50-200k depending on system complexity. Annual surveillance audits required to maintain certification.<\/p>\n<p>Most major industrial automation vendors hold SSA certification on flagship products: Siemens (SIMATIC PCS 7, SIMATIC S7-1500), Rockwell Automation (ControlLogix, FactoryTalk), ABB (System 800xA), Yokogawa (CENTUM VP), Honeywell (Experion PKS), Schneider Electric (EcoStruxure).<\/p>\n<h2>Implementation roadmap for IEC 62443-3-3 SL2 target<\/h2>\n<p>A realistic 12-18 month implementation roadmap for a mid-sized manufacturing site:<\/p>\n<table>\n<thead>\n<tr>\n<th>Phase<\/th>\n<th>Duration<\/th>\n<th>Key activities (SR addressed)<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>1. Gap assessment<\/td>\n<td>2-3 months<\/td>\n<td>Asset inventory (SR 7.8), risk assessment per zone (62443-3-2), SL target validation<\/td>\n<\/tr>\n<tr>\n<td>2. Quick wins<\/td>\n<td>2-4 months<\/td>\n<td>MFA deployment (SR 1.1 RE1), password policy (SR 1.5, SR 1.7), session lock (SR 2.5)<\/td>\n<\/tr>\n<tr>\n<td>3. Network segmentation<\/td>\n<td>3-6 months<\/td>\n<td>Zones &amp; conduits (SR 5.1), DMZ (SR 5.2), firewalls + IDS\/IPS, jump hosts<\/td>\n<\/tr>\n<tr>\n<td>4. Monitoring + audit<\/td>\n<td>2-4 months<\/td>\n<td>SIEM aggregation (SR 6.1), continuous monitoring (SR 6.2), auditable events (SR 2.8)<\/td>\n<\/tr>\n<tr>\n<td>5. Cryptography<\/td>\n<td>2-3 months<\/td>\n<td>TLS 1.3 deployment (SR 4.1, SR 3.1), KMS rollout (SR 4.3), PKI (SR 1.8)<\/td>\n<\/tr>\n<tr>\n<td>6. Backup\/recovery<\/td>\n<td>2-3 months<\/td>\n<td>Backup procedures (SR 7.3), recovery testing (SR 7.4), DoS protection (SR 7.1)<\/td>\n<\/tr>\n<tr>\n<td>7. Continuous improvement<\/td>\n<td>Ongoing<\/td>\n<td>Vulnerability mgmt, patch mgmt, periodic audits, certification<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>FAQ: IEC 62443-3-3 system security requirements<\/h2>\n<h3>What is the difference between IEC 62443-3-2 and 62443-3-3?<\/h3>\n<p>IEC 62443-3-2 covers <strong>risk assessment + zones &amp; conduits design<\/strong> (the &#8220;what to protect&#8221;). IEC 62443-3-3 covers <strong>technical system requirements<\/strong> (the &#8220;how to protect&#8221;). 3-2 is the methodology; 3-3 is the catalog of technical controls. Both required for complete IEC 62443 implementation.<\/p>\n<h3>How many System Requirements are there in IEC 62443-3-3?<\/h3>\n<p>IEC 62443-3-3:2013 defines 51 base System Requirements across 7 Foundational Requirements. With Requirement Enhancements (RE1, RE2, RE3) added for higher Security Levels, total implementable controls reach approximately 100 at SL2, 130 at SL3, 150 at SL4.<\/p>\n<h3>What is the difference between SL1, SL2, SL3, SL4 in practice?<\/h3>\n<p>SL1 = casual violation (curious employee). SL2 = intentional with simple means (default target for most manufacturing). SL3 = intentional with IACS-specific skills (critical manufacturing, pharma, F&amp;B). SL4 = state-sponsored attacks (energy, defense, water). Each SL adds approximately 20-30% more controls than the previous.<\/p>\n<h3>Is IEC 62443-3-3 mandatory under NIS2?<\/h3>\n<p>NIS2 directive EU 2022\/2555 is technology-agnostic but ENISA references IEC 62443 as primary mapping standard for industrial environments. NIS2 Article 21 obligations map directly to IEC 62443-3-3 SR (see mapping table above). In practice, EU industrial manufacturers achieving NIS2 compliance via IEC 62443-3-3 SL2 is the default approach.<\/p>\n<h3>How does IEC 62443-3-3 differ from IEC 62443-4-2?<\/h3>\n<p>IEC 62443-3-3 specifies <strong>system-level<\/strong> requirements (the integrated IACS). IEC 62443-4-2 specifies <strong>component-level<\/strong> Component Requirements (CR) for individual products (PLCs, HMIs, embedded devices). Component vendors certify per 4-2; system integrators certify per 3-3.<\/p>\n<h3>What is the cost of implementing IEC 62443-3-3 SL2?<\/h3>\n<p>For a mid-sized manufacturing site (300 IACS assets), typical investment \u20ac500k-1.5M total: 30% consulting\/audit, 40% technology (segmentation, IDS, SIEM, MFA), 20% process\/training, 10% certification. Multi-site groups achieve 30-50% economies of scale after first site.<\/p>\n<h3>What about IEC 62443-3-3 implementation for legacy systems?<\/h3>\n<p>Legacy systems (pre-IEC 62443, often 15-25 years old) frequently cannot meet all SR directly. Approach: implement <strong>compensating controls<\/strong> per IEC 62443-3-2 risk assessment \u2014 e.g., network segmentation isolates legacy zone, jump host enforces MFA externally, SIEM monitors legacy zone egress. Document compensating controls in System Security Assurance dossier.<\/p>\n<h3>What tools support IEC 62443-3-3 implementation?<\/h3>\n<p>SIEM: Splunk, IBM QRadar, Microsoft Sentinel, Elastic, Wazuh. IDS\/IPS: Claroty, Nozomi Networks, Dragos, Tenable.ot, Forescout SilentDefense, Tripwire Industrial Visibility. Network segmentation: Fortinet FortiGate Rugged, Cisco Industrial Security, Palo Alto Industrial. SOAR: Splunk Phantom, Palo Alto XSOAR. KMS: HashiCorp Vault, AWS KMS, Azure Key Vault.<\/p>\n<h3>How does TeepTrak comply with IEC 62443-3-3?<\/h3>\n<p>TeepTrak Pulse architecture aligns with IEC 62443-3-3 SL2: FR1 (MFA, PKI for device auth), FR2 (RBAC, audit trail SR 2.8), FR3 (TLS 1.3 comms, signed firmware updates), FR4 (AES-256 encryption at rest, TLS 1.3 in transit), FR5 (zone-isolated cloud, no inbound to OT), FR6 (SIEM-ready audit logs), FR7 (multi-region backup, DoS protection AWS Shield). SSA certification audit planned 2026.<\/p>\n<h3>What is the timeline to achieve IEC 62443-3-3 SL2 compliance?<\/h3>\n<p>12-18 months typical for SL2 target on a mid-sized manufacturing site, structured as: gap assessment (2-3 months), quick wins (2-4 months), network segmentation (3-6 months), monitoring + audit (2-4 months), cryptography (2-3 months), backup\/recovery (2-3 months), continuous improvement (ongoing). Multi-site groups: 30-50% time reduction on subsequent sites via template reuse.<\/p>\n<h2>Conclusion<\/h2>\n<p>IEC 62443-3-3:2013 is the operational backbone of industrial cybersecurity implementation in 2026, with 51 System Requirements and approximately 100-150 implementable controls depending on target Security Level. Default SL2 target for most manufacturing achievable in 12-18 months with \u20ac500k-1.5M investment, mapping directly to NIS2 Article 21 obligations. Certification via ISA Secure SSA available through accredited labs. Multi-site groups achieve significant economies of scale.<\/p>\n<p><strong>Next step<\/strong>: download the TeepTrak IEC 62443-3-3 SR catalog implementation whitepaper or request a free SL2 gap assessment on your IACS environment.<\/p>\n<div class=\"teeptrak-cta-final\">    <div class=\"teeptrak-form-container \">\n        <h3 class=\"teeptrak-form-title\">Request a demo<\/h3>                \n        <form id=\"teeptrak-6a0af1d58611f\" class=\"teeptrak-form\" data-form-type=\"demo_request\">\n            <div style=\"position:absolute;left:-9999px;\"><input type=\"text\" name=\"website_url\" value=\"\" tabindex=\"-1\"><input type=\"text\" name=\"fax_number\" value=\"\" tabindex=\"-1\"><\/div>            \n            <div class=\"teeptrak-form-row teeptrak-form-row-half\">                <div class=\"teeptrak-form-field\">\n                    <label>First name <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"text\" name=\"first_name\" required placeholder=\"\">\n                                    <\/div>\n                            <div class=\"teeptrak-form-field\">\n                    <label>Name <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"text\" name=\"last_name\" required placeholder=\"\">\n                                    <\/div>\n                            <div class=\"teeptrak-form-field\">\n                    <label>E-mail <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"email\" name=\"email\" required placeholder=\"\">\n                                    <\/div>\n                            <div class=\"teeptrak-form-field\">\n                    <label>Phone <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"tel\" name=\"phone\" required placeholder=\"\">\n                                    <\/div>\n                            <div class=\"teeptrak-form-field\">\n                    <label>Business <span class=\"required\">*<\/span><\/label>                    \n                                            <input type=\"text\" name=\"company\" required placeholder=\"\">\n                                    <\/div>\n                            <div class=\"teeptrak-form-field\">\n                    <label>Job<\/label>                    \n                                            <input type=\"text\" name=\"job_title\"  placeholder=\"\">\n                                    <\/div>\n            <\/div><div class=\"teeptrak-form-row\">                <div class=\"teeptrak-form-field\">\n                    <label>Goals<\/label>                    \n                                            <textarea name=\"message\" rows=\"3\"  placeholder=\"\"><\/textarea>\n                                    <\/div>\n            <\/div>            \n            <input type=\"hidden\" name=\"page_url\" value=\"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/\">\n            <input type=\"hidden\" name=\"recaptcha_token\" value=\"\" class=\"teeptrak-recaptcha-token\">\n            \n                        \n            <div class=\"teeptrak-form-row\">\n                <button type=\"submit\" class=\"teeptrak-submit teeptrak-submit-full\">\n                    <span class=\"teeptrak-submit-text\">To book<\/span>\n                    <span class=\"teeptrak-submit-loading\" style=\"display:none;\">Envoi...<\/span>\n                <\/button>\n            <\/div>\n            \n            <div class=\"teeptrak-form-message\" style=\"display:none;\"><\/div>\n        <\/form>\n    <\/div>\n    <\/div>\n<p><script type=\"application\/ld+json\">{\"@context\": \"https:\/\/schema.org\", \"@type\": \"Article\", \"headline\": \"IEC 62443-3-3 system security requirements (2026): SR1-7, FR mapping, SL implementation guide\", \"description\": \"IEC 62443-3-3:2013 system security requirements 2026: 7 Foundational Requirements (FR1-7), System Requirements (SR1.1-7.6), Security Levels SL1-4 implementation. Detailed mapping to NIS2 EU 2022\/2555 article 21. Practical guide for IACS system integrators.\", \"author\": {\"@type\": \"Organization\", \"name\": \"TeepTrak\", \"url\": \"https:\/\/teeptrak.com\"}, \"publisher\": {\"@type\": \"Organization\", \"name\": \"TeepTrak\", \"logo\": {\"@type\": \"ImageObject\", \"url\": \"https:\/\/teeptrak.com\/wp-content\/uploads\/2025\/01\/teeptrak-logo.png\"}}, \"datePublished\": \"2026-11-10\", \"dateModified\": \"2026-11-10\", \"inLanguage\": \"en-US\", \"mainEntityOfPage\": {\"@type\": \"WebPage\", \"@id\": \"https:\/\/teeptrak.com\/iec-62443-3-3-system-requirements-2026\/\"}}<\/script><\/p>\n<p><script type=\"application\/ld+json\">{\"@context\": \"https:\/\/schema.org\", \"@type\": \"FAQPage\", \"inLanguage\": \"en-US\", \"mainEntity\": [{\"@type\": \"Question\", \"name\": \"What is the difference between IEC 62443-3-2 and 62443-3-3?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"IEC 62443-3-2 covers risk assessment + zones & conduits design (the what to protect). IEC 62443-3-3 covers technical system requirements (the how to protect). 3-2 is the methodology; 3-3 is the catalog of technical controls. Both required for complete IEC 62443 implementation.\"}}, {\"@type\": \"Question\", \"name\": \"How many System Requirements are there in IEC 62443-3-3?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"IEC 62443-3-3:2013 defines 51 base System Requirements across 7 Foundational Requirements. With Requirement Enhancements (RE1, RE2, RE3) added for higher Security Levels, total implementable controls reach approximately 100 at SL2, 130 at SL3, 150 at SL4.\"}}, {\"@type\": \"Question\", \"name\": \"What is the difference between SL1, SL2, SL3, SL4 in practice?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"SL1 = casual violation (curious employee). SL2 = intentional with simple means (default target for most manufacturing). SL3 = intentional with IACS-specific skills (critical manufacturing, pharma, F&B). SL4 = state-sponsored attacks (energy, defense, water). Each SL adds approximately 20-30% more controls than the previous.\"}}, {\"@type\": \"Question\", \"name\": \"Is IEC 62443-3-3 mandatory under NIS2?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"NIS2 directive EU 2022\/2555 is technology-agnostic but ENISA references IEC 62443 as primary mapping standard for industrial environments. NIS2 Article 21 obligations map directly to IEC 62443-3-3 SR. In practice, EU industrial manufacturers achieving NIS2 compliance via IEC 62443-3-3 SL2 is the default approach.\"}}, {\"@type\": \"Question\", \"name\": \"How does IEC 62443-3-3 differ from IEC 62443-4-2?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"IEC 62443-3-3 specifies system-level requirements (the integrated IACS). IEC 62443-4-2 specifies component-level Component Requirements (CR) for individual products (PLCs, HMIs, embedded devices). Component vendors certify per 4-2; system integrators certify per 3-3.\"}}, {\"@type\": \"Question\", \"name\": \"What is the cost of implementing IEC 62443-3-3 SL2?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"For a mid-sized manufacturing site (300 IACS assets), typical investment \u20ac500k-1.5M total: 30% consulting\/audit, 40% technology (segmentation, IDS, SIEM, MFA), 20% process\/training, 10% certification. Multi-site groups achieve 30-50% economies of scale after first site.\"}}, {\"@type\": \"Question\", \"name\": \"What about IEC 62443-3-3 implementation for legacy systems?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"Legacy systems (pre-IEC 62443, often 15-25 years old) frequently cannot meet all SR directly. Approach: implement compensating controls per IEC 62443-3-2 risk assessment \u2014 e.g., network segmentation isolates legacy zone, jump host enforces MFA externally, SIEM monitors legacy zone egress. Document compensating controls in System Security Assurance dossier.\"}}, {\"@type\": \"Question\", \"name\": \"What tools support IEC 62443-3-3 implementation?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"SIEM: Splunk, IBM QRadar, Microsoft Sentinel, Elastic, Wazuh. IDS\/IPS: Claroty, Nozomi Networks, Dragos, Tenable.ot, Forescout SilentDefense, Tripwire Industrial Visibility. Network segmentation: Fortinet FortiGate Rugged, Cisco Industrial Security, Palo Alto Industrial. SOAR: Splunk Phantom, Palo Alto XSOAR. KMS: HashiCorp Vault, AWS KMS, Azure Key Vault.\"}}, {\"@type\": \"Question\", \"name\": \"How does TeepTrak comply with IEC 62443-3-3?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"TeepTrak Pulse architecture aligns with IEC 62443-3-3 SL2: FR1 (MFA, PKI for device auth), FR2 (RBAC, audit trail SR 2.8), FR3 (TLS 1.3 comms, signed firmware updates), FR4 (AES-256 encryption at rest, TLS 1.3 in transit), FR5 (zone-isolated cloud, no inbound to OT), FR6 (SIEM-ready audit logs), FR7 (multi-region backup, DoS protection AWS Shield). SSA certification audit planned 2026.\"}}, {\"@type\": \"Question\", \"name\": \"What is the timeline to achieve IEC 62443-3-3 SL2 compliance?\", \"acceptedAnswer\": {\"@type\": \"Answer\", \"text\": \"12-18 months typical for SL2 target on a mid-sized manufacturing site, structured as: gap assessment (2-3 months), quick wins (2-4 months), network segmentation (3-6 months), monitoring + audit (2-4 months), cryptography (2-3 months), backup\/recovery (2-3 months), continuous improvement (ongoing). Multi-site groups: 30-50% time reduction on subsequent sites via template reuse.\"}}]}<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TL;DR \u2014 IEC 62443-3-3 in 60 words IEC 62443-3-3:2013 specifies System Security Requirements (SR) for IACS, organized by 7 Foundational Requirements (FR1-7). Each FR contains 1-4 SR per Security Level (SL1-4), totaling 100+ technical controls. Most-referenced document for system integrators and asset owners. Required for NIS2 EU 2022\/2555 article 21 compliance and ISA Secure System [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":94235,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","ai_seo_title":"","ai_meta_description":"","ai_focus_keyword":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-94242","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IEC 62443-3-3 system security requirements (2026): SR1-7, FR mapping, SL implementation guide - TEEPTRAK - Connect to your industrial potential<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IEC 62443-3-3 system security requirements (2026): SR1-7, FR mapping, SL implementation guide - TEEPTRAK - Connect to your industrial potential\" \/>\n<meta property=\"og:description\" content=\"TL;DR \u2014 IEC 62443-3-3 in 60 words IEC 62443-3-3:2013 specifies System Security Requirements (SR) for IACS, organized by 7 Foundational Requirements (FR1-7). Each FR contains 1-4 SR per Security Level (SL1-4), totaling 100+ technical controls. Most-referenced document for system integrators and asset owners. Required for NIS2 EU 2022\/2555 article 21 compliance and ISA Secure System [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"TEEPTRAK - Connect to your industrial potential\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-18T09:39:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-18T09:39:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/teeptrak.com\/wp-content\/uploads\/2026\/05\/iec-62443-3-3-system-requirements-2026.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1150\" \/>\n\t<meta property=\"og:image:height\" content=\"657\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"\u00c9quipe TEEPTRAK\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u00c9quipe TEEPTRAK\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-3-3-system-requirements-2026\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-3-3-system-requirements-2026\\\/\"},\"author\":{\"name\":\"\u00c9quipe TEEPTRAK\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#\\\/schema\\\/person\\\/e0b65287bf97c0856b9e70813a4b5aff\"},\"headline\":\"IEC 62443-3-3 system security requirements (2026): SR1-7, FR mapping, SL implementation guide\",\"datePublished\":\"2026-05-18T09:39:53+00:00\",\"dateModified\":\"2026-05-18T09:39:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-3-3-system-requirements-2026\\\/\"},\"wordCount\":1937,\"publisher\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-3-3-system-requirements-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/teeptrak.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iec-62443-3-3-system-requirements-2026.jpeg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-3-3-system-requirements-2026\\\/\",\"url\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-3-3-system-requirements-2026\\\/\",\"name\":\"IEC 62443-3-3 system security requirements (2026): SR1-7, FR mapping, SL implementation guide - TEEPTRAK - Connect to your industrial potential\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-3-3-system-requirements-2026\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-3-3-system-requirements-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/teeptrak.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iec-62443-3-3-system-requirements-2026.jpeg\",\"datePublished\":\"2026-05-18T09:39:53+00:00\",\"dateModified\":\"2026-05-18T09:39:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-3-3-system-requirements-2026\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-3-3-system-requirements-2026\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-3-3-system-requirements-2026\\\/#primaryimage\",\"url\":\"https:\\\/\\\/teeptrak.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iec-62443-3-3-system-requirements-2026.jpeg\",\"contentUrl\":\"https:\\\/\\\/teeptrak.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/iec-62443-3-3-system-requirements-2026.jpeg\",\"width\":1150,\"height\":657},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/iec-62443-3-3-system-requirements-2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IEC 62443-3-3 system security requirements (2026): SR1-7, FR mapping, SL implementation guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/\",\"name\":\"TEEPTRAK\",\"description\":\"TEEPTRAK official website - OEE\",\"publisher\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#organization\",\"name\":\"TEEPTRAK\",\"url\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/teeptrak.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/cropped-Capture-decran-2023-05-04-112832.png\",\"contentUrl\":\"https:\\\/\\\/teeptrak.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/cropped-Capture-decran-2023-05-04-112832.png\",\"width\":512,\"height\":512,\"caption\":\"TEEPTRAK\"},\"image\":{\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/teeptrak\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/teeptrakinternational\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/#\\\/schema\\\/person\\\/e0b65287bf97c0856b9e70813a4b5aff\",\"name\":\"\u00c9quipe TEEPTRAK\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c15a5bed2b22793c34b357757ed5a12321e733893599e115e40c0263ef4877f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c15a5bed2b22793c34b357757ed5a12321e733893599e115e40c0263ef4877f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c15a5bed2b22793c34b357757ed5a12321e733893599e115e40c0263ef4877f7?s=96&d=mm&r=g\",\"caption\":\"\u00c9quipe TEEPTRAK\"},\"sameAs\":[\"https:\\\/\\\/teeptrak.com\"],\"url\":\"https:\\\/\\\/teeptrak.com\\\/en\\\/author\\\/auriane\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IEC 62443-3-3 system security requirements (2026): SR1-7, FR mapping, SL implementation guide - TEEPTRAK - Connect to your industrial potential","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/","og_locale":"en_US","og_type":"article","og_title":"IEC 62443-3-3 system security requirements (2026): SR1-7, FR mapping, SL implementation guide - TEEPTRAK - Connect to your industrial potential","og_description":"TL;DR \u2014 IEC 62443-3-3 in 60 words IEC 62443-3-3:2013 specifies System Security Requirements (SR) for IACS, organized by 7 Foundational Requirements (FR1-7). Each FR contains 1-4 SR per Security Level (SL1-4), totaling 100+ technical controls. Most-referenced document for system integrators and asset owners. Required for NIS2 EU 2022\/2555 article 21 compliance and ISA Secure System [&hellip;]","og_url":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/","og_site_name":"TEEPTRAK - Connect to your industrial potential","article_published_time":"2026-05-18T09:39:53+00:00","article_modified_time":"2026-05-18T09:39:55+00:00","og_image":[{"width":1150,"height":657,"url":"https:\/\/teeptrak.com\/wp-content\/uploads\/2026\/05\/iec-62443-3-3-system-requirements-2026.jpeg","type":"image\/jpeg"}],"author":"\u00c9quipe TEEPTRAK","twitter_card":"summary_large_image","twitter_misc":{"Written by":"\u00c9quipe TEEPTRAK","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/#article","isPartOf":{"@id":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/"},"author":{"name":"\u00c9quipe TEEPTRAK","@id":"https:\/\/teeptrak.com\/en\/#\/schema\/person\/e0b65287bf97c0856b9e70813a4b5aff"},"headline":"IEC 62443-3-3 system security requirements (2026): SR1-7, FR mapping, SL implementation guide","datePublished":"2026-05-18T09:39:53+00:00","dateModified":"2026-05-18T09:39:55+00:00","mainEntityOfPage":{"@id":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/"},"wordCount":1937,"publisher":{"@id":"https:\/\/teeptrak.com\/en\/#organization"},"image":{"@id":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/teeptrak.com\/wp-content\/uploads\/2026\/05\/iec-62443-3-3-system-requirements-2026.jpeg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/","url":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/","name":"IEC 62443-3-3 system security requirements (2026): SR1-7, FR mapping, SL implementation guide - TEEPTRAK - Connect to your industrial potential","isPartOf":{"@id":"https:\/\/teeptrak.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/#primaryimage"},"image":{"@id":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/teeptrak.com\/wp-content\/uploads\/2026\/05\/iec-62443-3-3-system-requirements-2026.jpeg","datePublished":"2026-05-18T09:39:53+00:00","dateModified":"2026-05-18T09:39:55+00:00","breadcrumb":{"@id":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/#primaryimage","url":"https:\/\/teeptrak.com\/wp-content\/uploads\/2026\/05\/iec-62443-3-3-system-requirements-2026.jpeg","contentUrl":"https:\/\/teeptrak.com\/wp-content\/uploads\/2026\/05\/iec-62443-3-3-system-requirements-2026.jpeg","width":1150,"height":657},{"@type":"BreadcrumbList","@id":"https:\/\/teeptrak.com\/en\/iec-62443-3-3-system-requirements-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/teeptrak.com\/en\/"},{"@type":"ListItem","position":2,"name":"IEC 62443-3-3 system security requirements (2026): SR1-7, FR mapping, SL implementation guide"}]},{"@type":"WebSite","@id":"https:\/\/teeptrak.com\/en\/#website","url":"https:\/\/teeptrak.com\/en\/","name":"TEEPTRAK","description":"TEEPTRAK official website - OEE","publisher":{"@id":"https:\/\/teeptrak.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/teeptrak.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/teeptrak.com\/en\/#organization","name":"TEEPTRAK","url":"https:\/\/teeptrak.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/teeptrak.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/teeptrak.com\/wp-content\/uploads\/2023\/05\/cropped-Capture-decran-2023-05-04-112832.png","contentUrl":"https:\/\/teeptrak.com\/wp-content\/uploads\/2023\/05\/cropped-Capture-decran-2023-05-04-112832.png","width":512,"height":512,"caption":"TEEPTRAK"},"image":{"@id":"https:\/\/teeptrak.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/teeptrak\/","https:\/\/www.linkedin.com\/company\/teeptrakinternational\/"]},{"@type":"Person","@id":"https:\/\/teeptrak.com\/en\/#\/schema\/person\/e0b65287bf97c0856b9e70813a4b5aff","name":"\u00c9quipe TEEPTRAK","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c15a5bed2b22793c34b357757ed5a12321e733893599e115e40c0263ef4877f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c15a5bed2b22793c34b357757ed5a12321e733893599e115e40c0263ef4877f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c15a5bed2b22793c34b357757ed5a12321e733893599e115e40c0263ef4877f7?s=96&d=mm&r=g","caption":"\u00c9quipe TEEPTRAK"},"sameAs":["https:\/\/teeptrak.com"],"url":"https:\/\/teeptrak.com\/en\/author\/auriane\/"}]}},"_links":{"self":[{"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/posts\/94242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/comments?post=94242"}],"version-history":[{"count":1,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/posts\/94242\/revisions"}],"predecessor-version":[{"id":94244,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/posts\/94242\/revisions\/94244"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/media\/94235"}],"wp:attachment":[{"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/media?parent=94242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/categories?post=94242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teeptrak.com\/en\/wp-json\/wp\/v2\/tags?post=94242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}