Back to Resources
Field Note March 2026 10 min read

IEC 62443 in Plain English: What Operators Actually Need to Know

The 62443 family is sprawling. We cut it down to the zones, conduits, and security levels that most heavy manufacturers will actually be audited on.

C

Cascadia OT Security

Compliance Readiness

CORPORATEIT / DMZOT SUPERVISORYOT CONTROLDefense in depthEach ring is an enforceableboundary with its own controls.ZONE MODEL4 BOUNDARIES

If you have been handed an IEC 62443 readiness requirement and the first thing you did was search for the standard, you already know the problem: IEC 62443 is not a standard. It is a family of about 14 documents, totaling thousands of pages, aimed at at least four different audiences. It is not written to be read cover-to-cover.

This post gives you the working subset. Enough to have an informed conversation with an auditor, an integrator, or your own leadership.

The documents that actually matter to operators

If you run an industrial facility — as opposed to manufacturing industrial equipment or designing control systems — the documents you are most likely to be assessed against are:

The others are mostly for product vendors and system integrators. You will reference them; you will not typically be audited against them.

The two concepts that do 80% of the work

Zones and conduits

A zone is a grouping of assets with common security requirements. A conduit is the controlled communication path between zones. That's it. The power of the model is that once you have defined zones and conduits, you have a shared language for talking about which controls go where and who owns what.

In practice, the zones in a heavy manufacturer typically map to: corporate IT, industrial DMZ, operations zone, process control zone, safety instrumented system. Each zone has a defined security level target. Each conduit between zones has a documented ruleset.

Security Levels (SL 1 through 4)

Each zone gets a target security level. The levels roughly correspond to:

Most facilities we work with land on SL 2 for most zones, SL 3 for critical process zones. SL 4 is rare and typically applies only to specific safety-critical contexts.

The 62443 foundational requirements

62443-3-3 defines seven foundational requirements (FRs). At a high level:

Each FR contains system requirements (SRs) with requirement enhancements that scale with target security level. When someone says "we are 62443 SL 2 in this zone," what they mean is that the controls in the relevant FRs meet the SL-2 requirement for that zone.

How to actually get started

If you are staring at a 62443 readiness requirement, this is the order of operations we use with clients:

Steps 1–3 can usually be completed in 4–6 weeks. Step 4 takes another 2–3 weeks. Steps 5–6 are where most of the time and cost go — typically 3–9 months depending on starting state.

The takeaway

62443 is not a pass/fail document. It is a framework for talking about industrial cybersecurity in a common language. The audit value is real, but the operational value — having a shared vocabulary for zones, conduits, and security levels — is higher.

If you have a 62443 requirement from a customer, insurer, or regulator, we do readiness work and gap assessments.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call