How IEC 62443 Is Structured: Documents, Roles, and Responsibilities
An overview of the structure of IEC 62443, from documents and roles to the central role of secure product development.
IEC 62443
Daniel Yagüe
1/21/20264 min read


IEC 62443 is often mentioned as if it were a single standard, but in reality it is a series of documents, each one addressing a specific aspect of industrial cybersecurity.
This design is intentional. Industrial environments involve multiple actors, different responsibilities, and different phases across the lifecycle of systems and products. A single document could not realistically cover governance, system design, secure development, and operational responsibilities without becoming either too abstract or too rigid.
By structuring the standard as a series, IEC 62443 allows each role to focus on what is relevant to them, while still aligning with a shared framework. Asset owners, product suppliers, integrators, and service providers are all addressed, but not in the same way or at the same level of detail.
This modular approach is one of the reasons IEC 62443 scales well across industries and organizations.
The Four Main Categories
To make the series usable in practice, IEC 62443 groups its documents into four main categories. These categories represent different layers of industrial cybersecurity, rather than isolated topics.
The General category establishes the foundations. It defines concepts, terminology, and principles that apply across the entire series. Without this shared language, the rest of the standard becomes difficult to interpret consistently.
The Policies and Procedures category focuses on how cybersecurity is managed at an organizational level. This is where governance, responsibilities, and operational processes are defined. It is intentionally less about technology and more about how cybersecurity is planned, implemented, and maintained over time.
The System Requirements category addresses the security of industrial control systems as a whole. It covers how systems are designed and assessed from a cybersecurity perspective, including risk assessment and system-level security requirements.
Finally, the Component Requirements category focuses on individual products and components. It addresses how products are developed securely and which technical security capabilities they must implement.
Together, these categories link organizational intent, system design, and product development into a coherent framework.
International Standards, Technical Reports, and Technical Specifications
Not all IEC 62443 documents serve the same purpose, and understanding this distinction avoids a lot of confusion. Some documents are International Standards. These define formal requirements or guidelines and are typically used as the basis for certification and compliance activities.
Other documents are Technical Reports. These provide context, explanations, and best practices. They are not prescriptive and are not intended to be used directly for certification, but they support interpretation and implementation.
Then there are Technical Specifications, which define more detailed technical requirements, often in areas where practices are still evolving. They tend to be more specific than technical reports, but not always as mature as full international standards.
Assuming that all IEC 62443 documents are meant to be implemented or audited in the same way is a common mistake. Each document type has a different role within the series.
Roles Defined by IEC 62443
IEC 62443 places strong emphasis on clear role definition, because cybersecurity responsibilities in industrial environments are distributed across multiple parties.
The Asset Owner is accountable for the industrial automation and control system and is responsible for defining security objectives and ensuring that cybersecurity is addressed throughout the lifecycle.
The Product Supplier develops and supports components or systems. This role is responsible for secure development practices and for implementing technical security capabilities in products.
The Integration Service Provider designs, installs, configures, and tests automation solutions, playing a critical role in how systems are assembled and deployed.
The Maintenance Service Provider supports operation and maintenance activities over time and directly influences how security is sustained in practice.
Clear role separation matters because it establishes accountability and avoids security gaps between organizational boundaries.
From Components to Systems to Industrial Automation
IEC 62443 also provides a structured way to understand how industrial systems are built and deployed.
At the most basic level, there are components. These include embedded devices, host devices, network devices, and software applications, typically developed by product suppliers.
When components are combined, they form a system or control system. This system may be delivered as a packaged solution by a supplier.
Once that system is deployed and integrated into a specific facility, including safety and control functions, it becomes an automation solution. When all automation solutions within a facility are considered together, they form the Industrial Automation and Control System (IACS).
Each step introduces new responsibilities and cybersecurity considerations, which is why IEC 62443 addresses all of them explicitly.
The Core Dependency of the IEC 62443 Series
Although IEC 62443 covers organizational governance, system security, and operational aspects, the core of the series is about designing and building secure products.
Most of the framework ultimately converges on one objective: ensuring that industrial products and components are designed, developed, and maintained in a secure way.
This is where IEC 62443-4-1 and IEC 62443-4-2 become central.
IEC 62443-4-1 defines how a product must be developed securely. It establishes the requirements for a secure development lifecycle, covering design, implementation, testing, vulnerability handling, and maintenance.
IEC 62443-4-2 defines what security capabilities the product must implement at a technical level.
The relationship between them is not optional and not interchangeable. Technical security requirements only make sense if they are produced and maintained through a compliant development process. This is why certification cannot start with technical controls alone.
In practice, IEC 62443 uses organizational and system-level requirements to support and enforce secure product development, not to replace it. Understanding this dependency clarifies why process comes first and why 4-1 and 4-2 are the backbone of the entire series.
