Back to Resources
Field Note June 2025 7 min read

ISA/IEC 62443-2-4: Holding OT Integrators Accountable

The 62443 standard requires system integrators to meet specific security competencies. We explain the framework and its implications for vendor management.

C

Cascadia OT Security

Compliance Readiness

LEVEL 5Corporate / ERPLEVEL 4Business SystemsLEVEL 3.5Industrial DMZLEVEL 3Operations · MES · HistorianLEVEL 2SCADA · HMILEVEL 1PLC · RTU · ControllersLEVEL 0Process · Sensors · ActuatorsPURDUE MODELDMZ = CONTROL PLANE

ISA/IEC 62443 is becoming the de facto global standard for industrial control system security. Part 2-4 of the standard specifically addresses the competencies and practices required of system integrators—the companies that design, build, and implement control systems for industrial operators. If you're selecting an integrator, contracting with one, or evaluating your current integrators' security practices, understanding 62443-2-4 is essential. It's also a tool for holding vendors accountable to a clear standard.

Many organizations are unaware that 62443-2-4 exists or what it requires of integrators. Yet regulatory bodies in Europe and increasingly in the US are referencing 62443 in their guidance and expectations. NERC CIP implicitly expects control system integrators to follow secure development practices aligned with 62443. NIS2 mentions 62443 by name. If you're selecting integrators, you should evaluate them against 62443 criteria, and you should expect them to be certified or at least to demonstrate compliance with the standard.

What 62443-2-4 Requires of Integrators

The standard requires integrators to have competent personnel (trained and certified in security practices), secure development practices (threat modeling, secure coding, security testing), secure supply chain practices, and incident management capability. Integrators must perform security assessments of components they integrate. They must maintain documentation of their practices and be willing to audit and certify their compliance.

The standard also requires integrators to establish a security lifecycle for the products and systems they deliver. This means integrators must update customers when vulnerabilities are discovered, must provide patching or workarounds, and must support security maintenance throughout the product lifecycle. Many traditional integrators treated delivery as the end of their involvement. 62443 changes that—integrators have ongoing responsibility for security.

Practical Implications for Operator Procurement

Building Vendor Security Accountability

The industrial sector is moving toward expecting integrators to meet 62443 standards. Organizations that build this expectation into their vendor selection and contracting now will be ahead of the curve. Organizations that don't will find themselves with vendors who lack security competency and can't support modern compliance requirements.

We help industrial organizations understand 62443 requirements, evaluate integrators against the standard, and build vendor security programs that hold integrators accountable. Contact us to assess your integrator security practices.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call