Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.rootkey.ai/llms.txt

Use this file to discover all available pages before exploring further.

Overview

IEC 62443 is the international standard series for security in Industrial Automation and Control Systems (IACS). It defines security requirements for operators (asset owners), system integrators, and product suppliers across operational technology (OT) environments - including SCADA systems, PLCs, DCS, and industrial networking equipment. IEC 62443 is directly referenced in NIS2 for operators of essential services with OT/ICS infrastructure, and in national regulations across the EU, US, and Asia-Pacific for critical infrastructure sectors. A core requirement across multiple IEC 62443 parts is data integrity - ensuring that sensor readings, control commands, operational events, and audit logs have not been tampered with between generation and analysis. This is precisely the problem ROOTKey is designed to solve.

Standard Structure and Coverage

IEC 62443 is structured as a series of parts, grouped into four series:
SeriesScopeROOTKey relevance
IEC 62443-1 (General)Concepts, terminology, requirementsArchitecture guidance
IEC 62443-2 (Policies & Procedures)Security management requirementsLog and record protection
IEC 62443-3 (System)System-level security requirementsSecurity Level data integrity
IEC 62443-4 (Component)Component-level security requirementsDevice data integrity

Security Requirements Coverage

IEC 62443-3-3: System Security Requirements and Security Levels

The most operationally relevant part for asset owners. Security Requirements (SR) addressed by ROOTKey:
RequirementDescriptionROOTKey capability
SR 2.8Audit log accessibilityBlockchain-anchored logs accessible to authorised parties independently
SR 2.9Audit log protectionAnchored at emission - logs cannot be altered after generation
SR 2.10Support for auditsFull audit trail verifiable by auditors without access to OT systems
SR 3.3Security functionality verificationAnchored configuration records prove which security settings were active at each time
SR 6.1Audit log accessibilityLogs anchored at source are permanently retrievable - not subject to storage failure
SR 6.2Continuous monitoringAnalytics API confirms anchoring is continuous - gaps indicate potential tampering or failure

IEC 62443-2-1: Security Management System

RequirementROOTKey capability
Security event recordingAnchor SCADA and OT events at emission - tamper-evident at source
Incident response recordsImmutable incident records with blockchain timestamps
Change management recordsAnchored change approvals and implementation evidence

OT Deployment Architecture

IEC 62443 requirements apply to environments where installing new software on devices is often not possible, and where network changes carry significant operational risk. ROOTKey’s MQTT-based deployment is designed specifically for this constraint:

No device modification required

Devices publish to their existing MQTT topics. ROOTKey’s bridge subscribes at the OT/IT boundary - devices are unaware of anchoring.

OT network isolation preserved

The bridge handles outbound connectivity at the defined OT/IT boundary - no new network paths into the OT zone required.

No latency impact

Anchoring is asynchronous - device operation and response times are unaffected.

Protocol native

MQTT is the native protocol of most OT environments - no protocol translation required in the OT zone.
→ See also: MQTT Deployment Guide · IoT & Industrial use case

Security Level Coverage

IEC 62443 defines Security Levels (SL 1–4) based on the sophistication of the threat actor being defended against. ROOTKey’s data integrity layer supports:
Security LevelThreat profileROOTKey contribution
SL 1Unintentional or casual violationSHA-256 integrity verification detects accidental data corruption
SL 2Intentional violation using simple meansBlockchain anchoring prevents undetected tampering by insiders
SL 3Sophisticated intentional attackIndependent blockchain verification means tampering cannot be concealed even by the data owner
SL 4State-sponsored, highly sophisticatedEU-sovereign deployment (EBSI + OVH) removes dependency on non-EU infrastructure for critical national infrastructure

Applicable Sectors

SectorIEC 62443 applicability
Energy (generation, transmission, distribution)Direct - SCADA and EMS integrity
Water and wastewaterDirect - treatment plant and monitoring
Oil and gasDirect - pipeline SCADA and safety systems
ManufacturingDirect - PLC and DCS integrity
Transport (rail, maritime, aviation)Direct - signalling and control
Chemicals and pharmaceuticalsDirect - batch and process control

Request an OT integration consultation

Our team will assess your OT topology, MQTT infrastructure, and IEC 62443 scope - and design a ROOTKey integration that fits without disruption.

IoT & Industrial use case

Full implementation guide for IEC 62443-aligned OT data integrity anchoring.