Skip to main content

IEC 62443 Compliance Mapping

Breakwater is designed to help organizations meet the requirements of IEC 62443 (Industrial Automation and Control Systems Security). This document maps Breakwater features to specific IEC 62443-3-3 system requirements.

Security Requirements Mapping

FR 1 — Identification and Authentication Control

RequirementDescriptionBreakwater Feature
SR 1.1Human user identification and authenticationClerk auth with email/password + OAuth
SR 1.1 RE 1Unique identification and authenticationPer-user Clerk accounts, no shared credentials
SR 1.2Software process identification and authenticationGateway tunnel certificates, Collector site tokens
SR 1.3Account managementClerk user management, role assignment
SR 1.5Authenticator managementClerk handles password policies, MFA tokens
SR 1.7Strength of password-based authenticationConfigurable via Clerk password policies
SR 1.9Strength of public key authenticationCurve25519 keypairs
SR 1.13Access via untrusted networksEncrypted tunnel for all remote access

FR 2 — Use Control

RequirementDescriptionBreakwater Feature
SR 2.1Authorization enforcementRBAC (Admin, Engineer, Vendor, Auditor, Operator)
SR 2.2Wireless use controlN/A (encrypted tunnels)
SR 2.5Session lockConfigurable inactivity timeout on Channel sessions
SR 2.6Remote session terminationAdmin can terminate any active session
SR 2.8Auditable eventsFull session recording + audit log
SR 2.8 RE 1Centrally managed auditCloud-centralized audit log across all sites
SR 2.9Audit storage protectionImmutable log shipping, write-once recording storage
SR 2.12Non-repudiationSession recordings tied to authenticated user identity

FR 3 — System Integrity

RequirementDescriptionBreakwater Feature
SR 3.1Communication integrityEncrypted tunnel (Poly1305 MAC) + TLS 1.3
SR 3.2Malicious code protectionCoastal IDS with OT rulesets
SR 3.3Security functionality verificationGateway heartbeat monitoring, health checks
SR 3.4Software and information integrityFirmware version tracking in Manifest

FR 5 — Restricted Data Flow

RequirementDescriptionBreakwater Feature
SR 5.1Network segmentationGateway enforces Purdue-level boundaries
SR 5.2Zone boundary protectionChannel proxy router restricts lateral movement
SR 5.3General purpose person-to-person communication restrictionsChannel only permits configured protocols per device
SR 5.4Application partitioningModular architecture (Helm, Manifest, Lookout, etc.)

FR 7 — Resource Availability

RequirementDescriptionBreakwater Feature
SR 7.1Denial of service protectionRate limiting, Tunnel anti-replay
SR 7.2Resource managementConcurrent session limits per device
SR 7.6Network and security configuration settingsCentralized policy management in Channel

Compliance Reporting

Breakwater can generate compliance reports showing:

  • Active access policies and their IEC 62443 mapping
  • Session history with recording status
  • Audit log summaries for review periods
  • Device inventory with vulnerability status

Contact support@techgonecoastal.com for custom compliance report templates.