Skip to main content
Reference

Security Level

The IEC 62443 measure of how capable an adversary the system is sized to repel — SL 1 stops typos, SL 4 stops nation-states. Expressed as a vector across the seven Foundational Requirements.

Also: SL, SL-T, SL-C, SL-A, Security Level Target, Security Level Capability, Security Level Achieved

A Security Level is the IEC 62443 measure of how capable an adversary a zone, conduit, or component is sized to repel. It is the answer to the question “protect against whom?” expressed on a four-point scale, evaluated per Foundational Requirement.

The four levels

SLAdversary the controls must repel
SL 1Casual or coincidental violation — typos, wrong-button presses, the operator who doesn’t know they’re doing harm.
SL 2Intentional violation using simple means with low resources, generic skills, low motivation. The opportunistic insider, the script-kiddie.
SL 3Intentional violation using sophisticated means with moderate resources, IACS-specific skills, moderate motivation. The skilled hacktivist, the targeted criminal.
SL 4Intentional violation using sophisticated means with extended resources, IACS-specific skills, high motivation. The nation-state.

Each step up costs disproportionately more to deliver. Most substation OT designs in GB transmission and distribution land at SL 2 across the board with SL 3 selectively on conduits where a forged frame trips primary plant.

SL-T, SL-C, SL-A — three different things

The single letters matter:

  • SL-TTarget. What the design says you need. Set during risk assessment under 62443-3-2, per zone and per conduit.
  • SL-CCapability. What a component or system can deliver out of the box, certified against 62443-4-2 (components) or 62443-3-3 (systems). The vendor’s claim.
  • SL-AAchieved. What is actually in place once configuration, integration, and operational practice are taken into account. Always ≤ SL-C, often < SL-C because the deployable feature was switched off for compatibility reasons.

The gap between SL-T and SL-A is the residual risk register. Compensating controls live in that gap.

The SL is a vector, not a scalar

A real Security Level is expressed as a seven-element vector — one number per Foundational Requirement:

SL-T(Z-PROC) = { 2, 2, 3, 1, 2, 2, 2 }
                IAC UC SI DC RDF TRE RA

Reading: the process-bus zone must repel SL-2 adversaries against Identification & Authentication Control, SL-3 against System Integrity, SL-1 against Data Confidentiality (the SV stream isn’t sensitive — only forge-resistance matters), and so on.

Most procurement language collapses this to a single scalar (“we need SL 2”) which is technically meaningless but operationally common. The vector is what 62443-3-3 actually mandates.

The seven Foundational Requirements

Every SL claim is evaluated against these seven:

FRNameWhat it covers
FR1Identification & Authentication Control (IAC)Knowing which user, device, or process is acting.
FR2Use Control (UC)Enforcing what an authenticated principal is allowed to do.
FR3System Integrity (SI)Detecting and preventing unauthorised modification of data, code, configuration.
FR4Data Confidentiality (DC)Preventing disclosure of data in transit and at rest.
FR5Restricted Data Flow (RDF)Enforcing the zone-and-conduit model on the wire — only documented conduits exist.
FR6Timely Response to Events (TRE)Detection, logging, and response capability.
FR7Resource Availability (RA)Resilience against resource-exhaustion and denial-of-service.

For the substation-and-control-centre context, FR3 and FR5 are usually the dominant constraints; FR4 is selectively applied (operator session traffic yes, SV stream no); FR7 is often deferred to the network design rather than the application.

Where the SL maps to mechanism

The SL number is a requirement; it doesn’t tell you how. The “how” comes from elsewhere:

  • For DNP3 and IEC 60870-5-104 conduits — IEC 62351-5 Secure Authentication closes the FR3 / FR4 gap.
  • For GOOSE and SVIEC 62351-6 embedded HMAC closes the FR3 gap.
  • For MMS station-bus traffic — IEC 62351-3 (TLS) plus IEC 62351-4 close the FR1 / FR3 / FR4 gap.
  • For RBAC under FR2 — IEC 62351-8 supplies the role vocabulary.

The 62443 SL number says what protection is required; the 62351 family says what mechanism delivers it on the wire. The two standards are designed to be read together.