62443-3-3 © IEC:2013(E) – 3 –
Rationale and supplemental guidance ....................................................... 30 5.8.2
Requirement enhancements ...................................................................... 30 5.8.3
Security levels ........................................................................................... 30 5.8.4
5.9
SR 1.7 – Strength of password-based authentication ............................................. 30
Requirement .............................................................................................. 30 5.9.1
Rationale and supplemental guidance ....................................................... 30 5.9.2
Requirement enhancements ...................................................................... 31 5.9.3
Security levels ........................................................................................... 31 5.9.4
5.10
SR 1.8 – Public key infrastructure (PKI) certificates ............................................... 31
Requirement .............................................................................................. 31 5.10.1
Rationale and supplemental guidance ....................................................... 31 5.10.2
Requirement enhancements ...................................................................... 32 5.10.3
Security levels ........................................................................................... 32 5.10.4
5.11
SR 1.9 – Strength of public key authentication ...................................................... 32
Requirement .............................................................................................. 32 5.11.1
Rationale and supplemental guidance ....................................................... 32 5.11.2
Requirement enhancements ...................................................................... 33 5.11.3
Security levels ........................................................................................... 33 5.11.4
5.12
SR 1.10 – Authenticator feedback ......................................................................... 33
Requirement .............................................................................................. 33 5.12.1
Rationale and supplemental guidance ....................................................... 33 5.12.2
Requirement enhancements ...................................................................... 33 5.12.3
Security levels ........................................................................................... 33 5.12.4
5.13
SR 1.11 – Unsuccessful login attempts .................................................................. 34
Requirement .............................................................................................. 34 5.13.1
Rationale and supplemental guidance ....................................................... 34 5.13.2
Requirement enhancements ...................................................................... 34 5.13.3
Security levels ........................................................................................... 34 5.13.4
5.14
SR 1.12 – System use notification ......................................................................... 34
Requirement .............................................................................................. 34 5.14.1
Rationale and supplemental guidance ....................................................... 34 5.14.2
Requirement enhancements ...................................................................... 35 5.14.3
Security levels ........................................................................................... 35 5.14.4
5.15
SR 1.13 – Access via untrusted networks .............................................................. 35
Requirement .............................................................................................. 35 5.15.1
Rationale and supplemental guidance ....................................................... 35 5.15.2
Requirement enhancements ...................................................................... 35 5.15.3
Security levels ........................................................................................... 35 5.15.4
6
FR 2 – Use control ......................................................................................................... 36
6.1 Purpose and SL-C(UC) descriptions ...................................................................... 36
6.2 Rationale ............................................................................................................... 36
6.3 SR 2.1 – Authorization enforcement ...................................................................... 36
Requirement .............................................................................................. 36 6.3.1
Rationale and supplemental guidance ....................................................... 36 6.3.2
Requirement enhancements ...................................................................... 37 6.3.3
Security levels ........................................................................................... 37 6.3.4
6.4
SR 2.2 – Wireless use control ............................................................................... 37
Requirement .............................................................................................. 37 6.4.1
Rationale and supplemental guidance ....................................................... 38 6.4.2