{"id":767,"date":"2024-12-04T10:00:00","date_gmt":"2024-12-04T10:00:00","guid":{"rendered":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/"},"modified":"2024-12-04T10:00:00","modified_gmt":"2024-12-04T10:00:00","slug":"iec-62443-ciberseguridad-ot","status":"publish","type":"post","link":"https:\/\/jacar.es\/en\/iec-62443-ciberseguridad-ot\/","title":{"rendered":"IEC 62443: OT Cybersecurity Explained for IT Teams"},"content":{"rendered":"<p><strong>IEC 62443<\/strong> is the international standard for cybersecurity in <strong>industrial control systems<\/strong> (ICS). Critical for plants, utilities, infrastructure. Parallels ISO 27001 for IT but adapted to OT specifics: safety, realtime, legacy equipment. With NIS2 push, companies with OT must master this. This article is an IT-team-friendly overview.<\/p>\n<h2 id=\"why-it-teams-should-know\">Why IT Teams Should Know<\/h2>\n<ul>\n<li><strong>IT\/OT convergence<\/strong>: blurred lines.<\/li>\n<li><strong>NIS2 obliges<\/strong> many companies to integrate OT security.<\/li>\n<li><strong>Coordination<\/strong>: IT cybersecurity must align with OT.<\/li>\n<li><strong>Audit<\/strong>: IT teams increasingly audit OT.<\/li>\n<\/ul>\n<h2 id=\"iec-62443-structure\">IEC 62443 Structure<\/h2>\n<p>Series of standards:<\/p>\n<ul>\n<li><strong>62443-1-x<\/strong>: general (terminology, concepts).<\/li>\n<li><strong>62443-2-x<\/strong>: policies and procedures.<\/li>\n<li><strong>62443-3-x<\/strong>: system requirements.<\/li>\n<li><strong>62443-4-x<\/strong>: component requirements.<\/li>\n<\/ul>\n<p>Comprehensive.<\/p>\n<h2 id=\"zones-and-conduits\">Zones and Conduits<\/h2>\n<p>Core concept: segment networks into <strong>zones<\/strong>, connect via <strong>conduits<\/strong>:<\/p>\n<ul>\n<li><strong>Zone<\/strong>: group of assets with similar security requirements.<\/li>\n<li><strong>Conduit<\/strong>: network path between zones with defined security.<\/li>\n<li><strong>Trust boundaries<\/strong>: explicit.<\/li>\n<\/ul>\n<p>Similar to IT DMZ but formalised.<\/p>\n<h2 id=\"purdue-model\">Purdue Model<\/h2>\n<p>Reference architecture:<\/p>\n<ul>\n<li><strong>Level 0<\/strong>: sensors, actuators.<\/li>\n<li><strong>Level 1<\/strong>: PLCs, RTUs.<\/li>\n<li><strong>Level 2<\/strong>: SCADA, HMI.<\/li>\n<li><strong>Level 3<\/strong>: manufacturing operations (MES).<\/li>\n<li><strong>Level 3.5<\/strong>: DMZ.<\/li>\n<li><strong>Level 4-5<\/strong>: enterprise IT.<\/li>\n<\/ul>\n<p>IEC 62443 conceptually incorporates Purdue.<\/p>\n<h2 id=\"security-levels-sl\">Security Levels (SL)<\/h2>\n<p>62443 defines 4 SLs:<\/p>\n<ul>\n<li><strong>SL 1<\/strong>: protection against casual\/inadvertent.<\/li>\n<li><strong>SL 2<\/strong>: intentional with simple means.<\/li>\n<li><strong>SL 3<\/strong>: intentional with sophisticated means.<\/li>\n<li><strong>SL 4<\/strong>: intentional sophisticated + extensive resources.<\/li>\n<\/ul>\n<p>Assess zone SL target, implement matching controls.<\/p>\n<h2 id=\"roles\">Roles<\/h2>\n<p>Framework distinguishes:<\/p>\n<ul>\n<li><strong>Asset owner<\/strong>: operates system.<\/li>\n<li><strong>System integrator<\/strong>: builds.<\/li>\n<li><strong>Product supplier<\/strong>: makes components.<\/li>\n<\/ul>\n<p>Each has distinct obligations. Clear responsibility separation.<\/p>\n<h2 id=\"foundational-requirements\">Foundational Requirements<\/h2>\n<p>7 foundational requirements (FRs):<\/p>\n<ol type=\"1\">\n<li><strong>Identification and Authentication Control (IAC)<\/strong>.<\/li>\n<li><strong>Use Control (UC)<\/strong>.<\/li>\n<li><strong>System Integrity (SI)<\/strong>.<\/li>\n<li><strong>Data Confidentiality (DC)<\/strong>.<\/li>\n<li><strong>Restricted Data Flow (RDF)<\/strong>.<\/li>\n<li><strong>Timely Response to Events (TRE)<\/strong>.<\/li>\n<li><strong>Resource Availability (RA)<\/strong>.<\/li>\n<\/ol>\n<p>Basis for all assessments.<\/p>\n<h2 id=\"security-program-csms\">Security Program (CSMS)<\/h2>\n<p>Cybersecurity Management System (CSMS):<\/p>\n<ul>\n<li><strong>Risk assessment<\/strong>.<\/li>\n<li><strong>Security program definition<\/strong>.<\/li>\n<li><strong>Implementation<\/strong>.<\/li>\n<li><strong>Maintenance<\/strong>.<\/li>\n<li><strong>Improvement<\/strong>.<\/li>\n<\/ul>\n<p>Similar ISO 27001 ISMS but OT-focused.<\/p>\n<h2 id=\"certification\">Certification<\/h2>\n<p>Available certifications:<\/p>\n<ul>\n<li><strong>IEC 62443-2-4<\/strong>: system integrator.<\/li>\n<li><strong>IEC 62443-3-3<\/strong>: system.<\/li>\n<li><strong>IEC 62443-4-1<\/strong>: secure development lifecycle.<\/li>\n<li><strong>IEC 62443-4-2<\/strong>: component.<\/li>\n<\/ul>\n<p>Industry demands increasingly.<\/p>\n<h2 id=\"vs-iso-27001\">vs ISO 27001<\/h2>\n<p>Comparative:<\/p>\n<table>\n<thead>\n<tr class=\"header\">\n<th>Aspect<\/th>\n<th>IEC 62443<\/th>\n<th>ISO 27001<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr class=\"odd\">\n<td>Focus<\/td>\n<td>OT \/ industrial<\/td>\n<td>IT \/ info security<\/td>\n<\/tr>\n<tr class=\"even\">\n<td>Safety<\/td>\n<td>Critical<\/td>\n<td>Not primary<\/td>\n<\/tr>\n<tr class=\"odd\">\n<td>Legacy equipment<\/td>\n<td>Handles<\/td>\n<td>Less<\/td>\n<\/tr>\n<tr class=\"even\">\n<td>Realtime<\/td>\n<td>Considered<\/td>\n<td>No<\/td>\n<\/tr>\n<tr class=\"odd\">\n<td>Certifications<\/td>\n<td>Multiple<\/td>\n<td>ISMS<\/td>\n<\/tr>\n<tr class=\"even\">\n<td>Complementary<\/td>\n<td>Yes<\/td>\n<td>Yes<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Use both: ISO 27001 enterprise, 62443 OT zones.<\/p>\n<h2 id=\"nis2-alignment\">NIS2 Alignment<\/h2>\n<p>NIS2 mandates OT security. 62443:<\/p>\n<ul>\n<li><strong>Recognised framework<\/strong>.<\/li>\n<li><strong>Compliance evidence<\/strong> with NIS2.<\/li>\n<li><strong>Risk management<\/strong>: 62443 provides methodology.<\/li>\n<\/ul>\n<p>62443 adoption accelerates NIS2 compliance.<\/p>\n<h2 id=\"it-ot-coordination\">IT-OT Coordination<\/h2>\n<p>Where IT teams help OT:<\/p>\n<ul>\n<li><strong>Network segmentation<\/strong> via VLANs, firewalls.<\/li>\n<li><strong>Monitoring<\/strong>: SIEM ingests OT logs.<\/li>\n<li><strong>Incident response<\/strong> procedure alignment.<\/li>\n<li><strong>Patch management<\/strong>: different cadence but coordinated.<\/li>\n<li><strong>Identity management<\/strong>: across domains.<\/li>\n<\/ul>\n<p>Where IT shouldn\u2019t: don\u2019t change OT without understanding impact.<\/p>\n<h2 id=\"common-it-mistakes\">Common IT Mistakes<\/h2>\n<ul>\n<li><strong>Patch aggressively<\/strong>: OT patches require coordination with safety.<\/li>\n<li><strong>Rolling updates<\/strong>: OT systems may require specific windows.<\/li>\n<li><strong>IT-grade crypto<\/strong>: OT may need lighter (realtime constraints).<\/li>\n<li><strong>\u201cIT best practices\u201d blindly applied<\/strong>: may break OT.<\/li>\n<\/ul>\n<p>Respect OT expertise.<\/p>\n<h2 id=\"relevant-technologies\">Relevant Technologies<\/h2>\n<ul>\n<li><strong>Industrial firewalls<\/strong>: Moxa, Hirschmann.<\/li>\n<li><strong>Data diodes<\/strong>: unidirectional for critical.<\/li>\n<li><strong>Industrial IDS<\/strong>: Claroty, Nozomi, Dragos.<\/li>\n<li><strong>SIEM OT integration<\/strong>: Splunk, QRadar OT modules.<\/li>\n<li><strong>OT patch management<\/strong>: specialised tools.<\/li>\n<\/ul>\n<p>Specific tech stack.<\/p>\n<h2 id=\"implementation-phases\">Implementation Phases<\/h2>\n<p>Typical org journey:<\/p>\n<ol type=\"1\">\n<li><strong>Asset inventory<\/strong> OT (often poor).<\/li>\n<li><strong>Zone\/conduit diagram<\/strong>.<\/li>\n<li><strong>Risk assessment<\/strong>.<\/li>\n<li><strong>Gap analysis<\/strong> vs 62443.<\/li>\n<li><strong>Control implementation<\/strong> priorities.<\/li>\n<li><strong>Continuous improvement<\/strong>.<\/li>\n<\/ol>\n<p>Typically years-long.<\/p>\n<h2 id=\"budget-considerations\">Budget Considerations<\/h2>\n<ul>\n<li><strong>Consultancy<\/strong>: expert analysis.<\/li>\n<li><strong>Tech stack<\/strong>: firewalls, IDS, monitoring.<\/li>\n<li><strong>Training<\/strong>: OT + IT cross-pollination.<\/li>\n<li><strong>Certification<\/strong>: if pursued.<\/li>\n<\/ul>\n<p>Significant but justified vs incident cost.<\/p>\n<h2 id=\"recent-updates\">Recent Updates<\/h2>\n<ul>\n<li><strong>IEC 62443-2-1<\/strong>: 2024 update.<\/li>\n<li><strong>Cloud OT<\/strong>: emerging considerations.<\/li>\n<li><strong>Wireless<\/strong>: private 5G integration.<\/li>\n<li><strong>Remote access<\/strong>: vendor access management.<\/li>\n<\/ul>\n<p>Evolving standard.<\/p>\n<h2 id=\"integration-with-other-frameworks\">Integration with Other Frameworks<\/h2>\n<ul>\n<li><strong>NIST CSF<\/strong>: complementary, US-centric.<\/li>\n<li><strong>ISO 27001<\/strong>: ISMS layer.<\/li>\n<li><strong>NERC CIP<\/strong>: North American utility.<\/li>\n<li><strong>CIS Controls<\/strong>: tactical guidance.<\/li>\n<\/ul>\n<p>Most enterprises mix.<\/p>\n<h2 id=\"conclusion\">Conclusion<\/h2>\n<p>IEC 62443 is serious framework for OT cybersecurity. For IT teams in companies with industrial operations, understanding is essential. IT\/OT convergence + NIS2 push force this. Not \u201cadopt everything overnight\u201d \u2014 years-long gradual journey. IT teams contribute: segmentation, monitoring, incident response. OT teams own: actual OT operations, specific controls. Coordination matters. With increasing industrial attacks (Colonial Pipeline, Oldsmar, others), this isn\u2019t theoretical \u2014 urgent.<\/p>\n<p>Follow us on jacar.es for more on IEC 62443, OT security, and NIS2.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IEC 62443 is the industrial cybersecurity framework. How IT teams can apply it and coordinate with OT without collision.<\/p>\n","protected":false},"author":1,"featured_media":768,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,19],"tags":[710,711,90,450,712],"class_list":["post-767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industria-4-0","category-tecnologia","tag-iec-62443","tag-industrial-cybersecurity","tag-nis2","tag-ot-security","tag-purdue"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"en","enabled_languages":["es","en"],"languages":{"es":{"title":true,"content":true,"excerpt":true},"en":{"title":true,"content":true,"excerpt":true}}},"gutentor_comment":0,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IEC 62443: OT Cybersecurity Explained for IT Teams - Jacar<\/title>\n<meta name=\"description\" content=\"IEC 62443 explained: zones, conduits, security levels, roles. How it aligns with ISO 27001 and NIS2 for coordinated OT\/IT.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IEC 62443: OT Cybersecurity Explained for IT Teams - Jacar\" \/>\n<meta property=\"og:description\" content=\"IEC 62443 explained: zones, conduits, security levels, roles. How it aligns with ISO 27001 and NIS2 for coordinated OT\/IT.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/\" \/>\n<meta property=\"og:site_name\" content=\"Jacar\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-04T10:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\/wp-content\/uploads\/2020\/09\/favicon.png\" \/>\n\t<meta property=\"og:image:width\" content=\"252\" \/>\n\t<meta property=\"og:image:height\" content=\"229\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"javi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"javi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jacar.es\\\/iec-62443-ciberseguridad-ot\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/iec-62443-ciberseguridad-ot\\\/\"},\"author\":{\"name\":\"javi\",\"@id\":\"https:\\\/\\\/jacar.es\\\/#\\\/schema\\\/person\\\/54a7f7b4224b38fafc9866eb3e614208\"},\"headline\":\"IEC 62443: OT Cybersecurity Explained for IT Teams\",\"datePublished\":\"2024-12-04T10:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/iec-62443-ciberseguridad-ot\\\/\"},\"wordCount\":1285,\"publisher\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/iec-62443-ciberseguridad-ot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/20053137\\\/jwp-1848217-24717.jpg\",\"keywords\":[\"iec 62443\",\"industrial cybersecurity\",\"nis2\",\"ot security\",\"purdue\"],\"articleSection\":[\"Industria 4.0\",\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\\\/\\\/jacar.es\\\/iec-62443-ciberseguridad-ot\\\/\",\"url\":\"https:\\\/\\\/jacar.es\\\/iec-62443-ciberseguridad-ot\\\/\",\"name\":\"IEC 62443: OT Cybersecurity Explained for IT Teams - Jacar\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/iec-62443-ciberseguridad-ot\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/iec-62443-ciberseguridad-ot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/20053137\\\/jwp-1848217-24717.jpg\",\"datePublished\":\"2024-12-04T10:00:00+00:00\",\"description\":\"IEC 62443 explained: zones, conduits, security levels, roles. How it aligns with ISO 27001 and NIS2 for coordinated OT\\\/IT.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/iec-62443-ciberseguridad-ot\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jacar.es\\\/iec-62443-ciberseguridad-ot\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/jacar.es\\\/iec-62443-ciberseguridad-ot\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/20053137\\\/jwp-1848217-24717.jpg\",\"contentUrl\":\"https:\\\/\\\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/20053137\\\/jwp-1848217-24717.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Panel industrial con indicadores luminosos representando sistema de control\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jacar.es\\\/iec-62443-ciberseguridad-ot\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/jacar.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IEC 62443: ciberseguridad OT explicada para equipos IT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jacar.es\\\/#website\",\"url\":\"https:\\\/\\\/jacar.es\\\/\",\"name\":\"Jacar\",\"description\":\"Passion for Technology\",\"publisher\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jacar.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/jacar.es\\\/#organization\",\"name\":\"Jacar\",\"url\":\"https:\\\/\\\/jacar.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/jacar.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/jacar.es\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/favicon.png\",\"contentUrl\":\"https:\\\/\\\/jacar.es\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/favicon.png\",\"width\":252,\"height\":229,\"caption\":\"Jacar\"},\"image\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/javiercanetearroyo\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/jacar.es\\\/#\\\/schema\\\/person\\\/54a7f7b4224b38fafc9866eb3e614208\",\"name\":\"javi\",\"sameAs\":[\"https:\\\/\\\/jacar.es\"],\"url\":\"https:\\\/\\\/jacar.es\\\/en\\\/author\\\/javi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IEC 62443: OT Cybersecurity Explained for IT Teams - Jacar","description":"IEC 62443 explained: zones, conduits, security levels, roles. How it aligns with ISO 27001 and NIS2 for coordinated OT\/IT.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/","og_locale":"en_US","og_type":"article","og_title":"IEC 62443: OT Cybersecurity Explained for IT Teams - Jacar","og_description":"IEC 62443 explained: zones, conduits, security levels, roles. How it aligns with ISO 27001 and NIS2 for coordinated OT\/IT.","og_url":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/","og_site_name":"Jacar","article_published_time":"2024-12-04T10:00:00+00:00","og_image":[{"width":252,"height":229,"url":"https:\/\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\/wp-content\/uploads\/2020\/09\/favicon.png","type":"image\/png"}],"author":"javi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"javi","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/#article","isPartOf":{"@id":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/"},"author":{"name":"javi","@id":"https:\/\/jacar.es\/#\/schema\/person\/54a7f7b4224b38fafc9866eb3e614208"},"headline":"IEC 62443: OT Cybersecurity Explained for IT Teams","datePublished":"2024-12-04T10:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/"},"wordCount":1285,"publisher":{"@id":"https:\/\/jacar.es\/#organization"},"image":{"@id":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/#primaryimage"},"thumbnailUrl":"https:\/\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\/wp-content\/uploads\/2024\/12\/20053137\/jwp-1848217-24717.jpg","keywords":["iec 62443","industrial cybersecurity","nis2","ot security","purdue"],"articleSection":["Industria 4.0","Tecnolog\u00eda"],"inLanguage":"en-US"},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/","url":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/","name":"IEC 62443: OT Cybersecurity Explained for IT Teams - Jacar","isPartOf":{"@id":"https:\/\/jacar.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/#primaryimage"},"image":{"@id":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/#primaryimage"},"thumbnailUrl":"https:\/\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\/wp-content\/uploads\/2024\/12\/20053137\/jwp-1848217-24717.jpg","datePublished":"2024-12-04T10:00:00+00:00","description":"IEC 62443 explained: zones, conduits, security levels, roles. How it aligns with ISO 27001 and NIS2 for coordinated OT\/IT.","breadcrumb":{"@id":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/#primaryimage","url":"https:\/\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\/wp-content\/uploads\/2024\/12\/20053137\/jwp-1848217-24717.jpg","contentUrl":"https:\/\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\/wp-content\/uploads\/2024\/12\/20053137\/jwp-1848217-24717.jpg","width":1200,"height":800,"caption":"Panel industrial con indicadores luminosos representando sistema de control"},{"@type":"BreadcrumbList","@id":"https:\/\/jacar.es\/iec-62443-ciberseguridad-ot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/jacar.es\/"},{"@type":"ListItem","position":2,"name":"IEC 62443: ciberseguridad OT explicada para equipos IT"}]},{"@type":"WebSite","@id":"https:\/\/jacar.es\/#website","url":"https:\/\/jacar.es\/","name":"Jacar","description":"Passion for Technology","publisher":{"@id":"https:\/\/jacar.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacar.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacar.es\/#organization","name":"Jacar","url":"https:\/\/jacar.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacar.es\/#\/schema\/logo\/image\/","url":"https:\/\/jacar.es\/wp-content\/uploads\/2020\/09\/favicon.png","contentUrl":"https:\/\/jacar.es\/wp-content\/uploads\/2020\/09\/favicon.png","width":252,"height":229,"caption":"Jacar"},"image":{"@id":"https:\/\/jacar.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/in\/javiercanetearroyo\/"]},{"@type":"Person","@id":"https:\/\/jacar.es\/#\/schema\/person\/54a7f7b4224b38fafc9866eb3e614208","name":"javi","sameAs":["https:\/\/jacar.es"],"url":"https:\/\/jacar.es\/en\/author\/javi\/"}]}},"_links":{"self":[{"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/posts\/767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/comments?post=767"}],"version-history":[{"count":0,"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/posts\/767\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/media\/768"}],"wp:attachment":[{"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/media?parent=767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/categories?post=767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/tags?post=767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}