{"id":51284,"date":"2026-02-23T11:51:27","date_gmt":"2026-02-23T10:51:27","guid":{"rendered":"https:\/\/www.gt-engineering.it\/?post_type=normativa_tecnica&#038;p=51284"},"modified":"2026-03-03T10:04:40","modified_gmt":"2026-03-03T09:04:40","slug":"iec-62443-3-2","status":"publish","type":"normativa_tecnica","link":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/","title":{"rendered":"IEC 62443-3-2"},"content":{"rendered":"\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n        \n                    <div\n                class=\"h-auto mb-6 md:mb-4 lg:mb-8 xl:mb-9  float-right ml-6 md:ml-4 lg:ml-8 xl:ml-9 overflow-hidden shadow-content-image w-full md:w-1\/3\"\n            >\n                \r\n\r\n    \r\n        \r\n            \r\n                \r\n                    <picture\r\n                        class=\"\"\r\n                                            >\r\n                                                                                                        <source\r\n                                media=\"(max-width: 150px)\"\r\n                                width=\"150\"\r\n                                height=\"150\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-2-seconda-opzione-150x150.png.webp\"\r\n                                type=\"image\/webp\"\r\n                            \/>\r\n                                                                                <source\r\n                                media=\"(max-width: 270px)\"\r\n                                width=\"270\"\r\n                                height=\"300\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-2-seconda-opzione-270x300.png.webp\"\r\n                                type=\"image\/webp\"\r\n                            \/>\r\n                                                                                <source\r\n                                media=\"(max-width: 768px)\"\r\n                                width=\"768\"\r\n                                height=\"854\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-2-seconda-opzione-768x854.png.webp\"\r\n                                type=\"image\/webp\"\r\n                            \/>\r\n                                                                                <source\r\n                                media=\"(max-width: 921px)\"\r\n                                width=\"921\"\r\n                                height=\"1024\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-2-seconda-opzione-921x1024.png.webp\"\r\n                                type=\"image\/webp\"\r\n                            \/>\r\n                                                                            <img\r\n                            class=\"a-image transparent border-image h-auto  w-full\"\r\n                                                        alt=\"Serie 62443-3-2\"\r\n                                                        srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-2-seconda-opzione.png.webp\"\r\n                                                        title=\"immagine 2 seconda opzione\"\r\n                                                        type=\"image\/webp\"\r\n                        \/>\r\n                    <\/picture>\r\n\r\n                \r\n\r\n                    \r\n    \r\n            <\/div>\n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p>L\u2019IEC 62443-3-2 est la norme qui d\u00e9finit comment r\u00e9aliser une analyse de risque d\u2019un IACS.<\/p>\n<p>La norme est \u00e9labor\u00e9e par le m\u00eame comit\u00e9 technique de l\u2019IEC qui d\u00e9veloppe les normes de s\u00e9curit\u00e9 fonctionnelle IEC 61508 et la s\u00e9rie IEC 61511 (IEC TC 65). Cela signifie qu\u2019elle est davantage adapt\u00e9e aux risques des grandes installations chimiques qu\u2019aux risques li\u00e9s \u00e0 une machine telle qu\u2019une machine de transfert ou un laminoir.<\/p>\n<p>Dans tous les cas, il n\u2019existe pas de recette simple pour s\u00e9curiser un syst\u00e8me d\u2019automatisation et de contr\u00f4le industriel (IACS), et cela pour de bonnes raisons. La s\u00e9curit\u00e9 est une question de gestion des risques. Chaque IACS pr\u00e9sente un risque diff\u00e9rent pour l\u2019organisation en fonction des menaces auxquelles il est expos\u00e9, de la probabilit\u00e9 que ces menaces surviennent, des vuln\u00e9rabilit\u00e9s inh\u00e9rentes au syst\u00e8me et des cons\u00e9quences en cas de compromission. En outre, chaque organisation qui poss\u00e8de et exploite un IACS a une tol\u00e9rance au risque diff\u00e9rente.<\/p>\n<p>La norme d\u00e9finit un ensemble de mesures d\u2019ing\u00e9nierie destin\u00e9es \u00e0 guider une organisation dans le processus d\u2019\u00e9valuation des risques d\u2019un IACS particulier et dans l\u2019identification et l\u2019application de contre-mesures de s\u00e9curit\u00e9 afin de r\u00e9duire ces risques \u00e0 des niveaux tol\u00e9rables.<\/p>\n<blockquote><p><em>[IEC 62443-3-3: 2009] \u00a0<strong>3 Termes, d\u00e9finitions, termes abr\u00e9g\u00e9s, acronymes et conventions<\/strong><\/em><\/p>\n<p><strong><em>3.1.6 Contre-mesure.<\/em><\/strong><em> Action, dispositif, proc\u00e9dure ou technique qui r\u00e9duit une menace, une vuln\u00e9rabilit\u00e9 ou les cons\u00e9quences d\u2019une attaque en l\u2019\u00e9liminant ou en la pr\u00e9venant, en minimisant les dommages qu\u2019elle peut causer, ou en la d\u00e9tectant et en la signalant afin que des actions correctives puissent \u00eatre prises.<\/em><\/p><\/blockquote>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n\n\n\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n                    <div class=\"mb-6 relative w-full md:mb-4 lg:mb-8 xl:mb-9\">\n                \n        <div                class=\"m-headings\"\n            >\n    \n    \n<h2 class=\"a-heading text-primary font-heading text-lg lg:text-xl font-normal mt-2 first:mt-0\">\n                    Champ d\u2019application de la norme    <\/h2>\n        <\/div>\n                <\/div>\n        \n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p>Cette partie de l\u2019IEC 62443 \u00e9tablit des exigences pour :<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>d\u00e9finir un syst\u00e8me consid\u00e9r\u00e9 (SUC) pour un syst\u00e8me d\u2019automatisation et de contr\u00f4le industriel (IACS) ;<\/li>\n<li>partitionner le SUC en zones et conduits ;<\/li>\n<li>\u00e9valuer le risque pour chaque zone et conduit ;<\/li>\n<li>\u00e9tablir le niveau de s\u00e9curit\u00e9 cible (SL-T) pour chaque zone et conduit ;<\/li>\n<li>documenter les exigences de s\u00e9curit\u00e9.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<blockquote><p><em>[IEC 62443-3-3: 2009] <strong>3 Termes, d\u00e9finitions, termes abr\u00e9g\u00e9s, acronymes et conventions<\/strong><\/em><\/p>\n<p><strong><em>3.1.1 Canal.<\/em><\/strong><em> Lien de communication logique ou physique sp\u00e9cifique entre des actifs.<\/em><\/p>\n<p><strong><em>3.1.3 Conduit.<\/em><\/strong><em> Regroupement logique de canaux de communication partageant des exigences de s\u00e9curit\u00e9 communes et reliant deux ou plusieurs zones.<\/em><\/p>\n<p><strong><em>3.1.25 Zone.<\/em><\/strong><em> Regroupement d\u2019actifs logiques ou physiques bas\u00e9 sur le risque ou d\u2019autres crit\u00e8res, tels que la criticit\u00e9 des actifs, la fonction op\u00e9rationnelle, l\u2019emplacement physique ou logique, les acc\u00e8s requis (par exemple, principe du moindre privil\u00e8ge) ou l\u2019organisation responsable.<\/em><\/p>\n<p><em>Note 1 \u00e0 l\u2019entr\u00e9e : Collection d\u2019actifs logiques ou physiques repr\u00e9sentant le partitionnement d\u2019un syst\u00e8me consid\u00e9r\u00e9 sur la base de leurs exigences de s\u00e9curit\u00e9 communes, de leur criticit\u00e9 (par exemple, impact financier, sanitaire, s\u00e9curitaire ou environnemental \u00e9lev\u00e9), de leur fonctionnalit\u00e9 et de leurs relations logiques et physiques (y compris leur localisation).<\/em><\/p><\/blockquote>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n\n\n\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n                    <div class=\"mb-6 relative w-full md:mb-4 lg:mb-8 xl:mb-9\">\n                \n        <div                class=\"m-headings\"\n            >\n    \n    \n<h2 class=\"a-heading text-primary font-heading text-lg lg:text-xl font-normal mt-2 first:mt-0\">\n                    L\u2019\u00e9valuation initiale des risques    <\/h2>\n        <\/div>\n                <\/div>\n        \n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p>L\u2019objectif de <strong>l\u2019\u00e9valuation initiale des risques en cybers\u00e9curit\u00e9<\/strong> est d\u2019obtenir une premi\u00e8re compr\u00e9hension du risque maximal que le SUC repr\u00e9sente pour l\u2019organisation en cas de compromission. Celui-ci est g\u00e9n\u00e9ralement \u00e9valu\u00e9 en termes d\u2019impacts sur la sant\u00e9, la s\u00e9curit\u00e9, l\u2019environnement, l\u2019interruption d\u2019activit\u00e9, la perte de production, la qualit\u00e9 des produits, les aspects financiers, juridiques, r\u00e9glementaires, la r\u00e9putation, etc. Cette \u00e9valuation aide \u00e0 prioriser les analyses de risques d\u00e9taill\u00e9es et facilite le regroupement des actifs en zones et conduits au sein du SUC.<\/p>\n<p>L\u2019\u00e9valuation initiale des risques permet un meilleur regroupement des actifs en zones et conduits. Cela est n\u00e9cessaire pour identifier les actifs partageant des exigences de s\u00e9curit\u00e9 communes et pour permettre l\u2019identification de mesures de s\u00e9curit\u00e9 communes requises pour att\u00e9nuer les risques. L\u2019affectation des actifs IACS aux zones et conduits peut \u00eatre ajust\u00e9e en fonction des r\u00e9sultats de l\u2019analyse de risques d\u00e9taill\u00e9e.<\/p>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n\n\n\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n                    <div class=\"mb-6 relative w-full md:mb-4 lg:mb-8 xl:mb-9\">\n                \n        <div                class=\"m-headings\"\n            >\n    \n    \n<h2 class=\"a-heading text-primary font-heading text-lg lg:text-xl font-normal mt-2 first:mt-0\">\n                    L\u2019\u00e9valuation d\u00e9taill\u00e9e des risques    <\/h2>\n        <\/div>\n                <\/div>\n        \n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p>L\u2019objectif principal de l\u2019\u00e9valuation d\u00e9taill\u00e9e des risques selon l\u2019IEC 62443-3-2 est de :<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Identifier les menaces de cybers\u00e9curit\u00e9 pesant sur l\u2019IACS<\/li>\n<li>\u00c9valuer l\u2019impact potentiel des incidents cybern\u00e9tiques sur la s\u00e9curit\u00e9, les op\u00e9rations et l\u2019activit\u00e9<\/li>\n<li>D\u00e9terminer les niveaux de s\u00e9curit\u00e9 cibles appropri\u00e9s (SL-T) pour chaque partie du syst\u00e8me<\/li>\n<li>Fournir des \u00e9l\u00e9ments tra\u00e7ables pour d\u00e9finir les exigences de s\u00e9curit\u00e9 du syst\u00e8me<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>L\u2019\u00e9valuation est fond\u00e9e sur le risque, ce qui signifie que les mesures de s\u00e9curit\u00e9 sont proportionnelles aux cons\u00e9quences et \u00e0 la probabilit\u00e9 des menaces cybern\u00e9tiques.<\/p>\n<p>Quelques <strong>exemples de descriptions de menaces sont<\/strong>:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Un employ\u00e9 non malveillant acc\u00e8de physiquement \u00e0 la zone de contr\u00f4le du proc\u00e9d\u00e9 et branche une cl\u00e9 USB sur l\u2019un des ordinateurs ;<\/li>\n<li>Une personne de support autoris\u00e9e acc\u00e8de logiquement \u00e0 la zone de contr\u00f4le du proc\u00e9d\u00e9 \u00e0 l\u2019aide d\u2019un ordinateur portable infect\u00e9 ;<\/li>\n<li>Un employ\u00e9 non malveillant ouvre un courriel d\u2019hame\u00e7onnage compromettant ses identifiants d\u2019acc\u00e8s.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>L\u2019objectif est de d\u00e9terminer le niveau de s\u00e9curit\u00e9 requis pour chaque zone et conduit. Il n\u2019existe pas de syst\u00e8me de <strong>contr\u00f4le s\u00e9curis\u00e9 \u00e0 100 %,<\/strong> tout comme il n\u2019existe pas de syst\u00e8me de contr\u00f4le s\u00fbr \u00e0 100 %. La s\u00e9rie IEC 62443 d\u00e9finit quatre niveaux de s\u00e9curit\u00e9.<\/p>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n","protected":false},"excerpt":{"rendered":"<p>L\u2019IEC 62443-3-2 est la norme qui d\u00e9finit comment r\u00e9aliser une analyse de risque d\u2019un IACS.<\/p>\n","protected":false},"author":2,"featured_media":51279,"parent":51244,"menu_order":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"normative-tecniche":[165],"class_list":["post-51284","normativa_tecnica","type-normativa_tecnica","status-publish","has-post-thumbnail","hentry","tipologia_normativa-normes-iec"],"acf":{"sottotitolo":"","allegati":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IEC 62443-3-2 - Gt-Engineering<\/title>\n<meta name=\"description\" content=\"IEC 62443-3-2 d\u00e9finit une m\u00e9thode bas\u00e9e sur les risques pour \u00e9valuer et r\u00e9duire les risques de cybers\u00e9curit\u00e9 dans les IACS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IEC 62443-3-2 - Gt-Engineering\" \/>\n<meta property=\"og:description\" content=\"IEC 62443-3-2 d\u00e9finit une m\u00e9thode bas\u00e9e sur les risques pour \u00e9valuer et r\u00e9duire les risques de cybers\u00e9curit\u00e9 dans les IACS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Gt-Engineering\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-03T09:04:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-3-parte.png\" \/>\n\t<meta property=\"og:image:width\" content=\"906\" \/>\n\t<meta property=\"og:image:height\" content=\"724\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/\",\"url\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/\",\"name\":\"IEC 62443-3-2 - Gt-Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-3-parte.png\",\"datePublished\":\"2026-02-23T10:51:27+00:00\",\"dateModified\":\"2026-03-03T09:04:40+00:00\",\"description\":\"IEC 62443-3-2 d\u00e9finit une m\u00e9thode bas\u00e9e sur les risques pour \u00e9valuer et r\u00e9duire les risques de cybers\u00e9curit\u00e9 dans les IACS.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/#primaryimage\",\"url\":\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-3-parte.png\",\"contentUrl\":\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-3-parte.png\",\"width\":906,\"height\":724,\"caption\":\"IEC 62443-3-2 is the standard that defines how to run a risk assessment of an IACS.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.gt-engineering.it\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Normes techniques\",\"item\":\"https:\/\/www.gt-engineering.it\/fr\/normative-tecniche\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Normes IEC\",\"item\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"S\u00e9rie IEC 62443\",\"item\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"IEC 62443-3-2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/#website\",\"url\":\"https:\/\/www.gt-engineering.it\/fr\/\",\"name\":\"Gt-Engineering\",\"description\":\"bizonweb\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gt-engineering.it\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IEC 62443-3-2 - Gt-Engineering","description":"IEC 62443-3-2 d\u00e9finit une m\u00e9thode bas\u00e9e sur les risques pour \u00e9valuer et r\u00e9duire les risques de cybers\u00e9curit\u00e9 dans les IACS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/","og_locale":"fr_FR","og_type":"article","og_title":"IEC 62443-3-2 - Gt-Engineering","og_description":"IEC 62443-3-2 d\u00e9finit une m\u00e9thode bas\u00e9e sur les risques pour \u00e9valuer et r\u00e9duire les risques de cybers\u00e9curit\u00e9 dans les IACS.","og_url":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/","og_site_name":"Gt-Engineering","article_modified_time":"2026-03-03T09:04:40+00:00","og_image":[{"width":906,"height":724,"url":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-3-parte.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/","url":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/","name":"IEC 62443-3-2 - Gt-Engineering","isPartOf":{"@id":"https:\/\/www.gt-engineering.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/#primaryimage"},"image":{"@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-3-parte.png","datePublished":"2026-02-23T10:51:27+00:00","dateModified":"2026-03-03T09:04:40+00:00","description":"IEC 62443-3-2 d\u00e9finit une m\u00e9thode bas\u00e9e sur les risques pour \u00e9valuer et r\u00e9duire les risques de cybers\u00e9curit\u00e9 dans les IACS.","breadcrumb":{"@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/#primaryimage","url":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-3-parte.png","contentUrl":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-3-parte.png","width":906,"height":724,"caption":"IEC 62443-3-2 is the standard that defines how to run a risk assessment of an IACS."},{"@type":"BreadcrumbList","@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/iec-62443-3-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.gt-engineering.it\/fr\/"},{"@type":"ListItem","position":2,"name":"Normes techniques","item":"https:\/\/www.gt-engineering.it\/fr\/normative-tecniche\/"},{"@type":"ListItem","position":3,"name":"Normes IEC","item":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/"},{"@type":"ListItem","position":4,"name":"S\u00e9rie IEC 62443","item":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/"},{"@type":"ListItem","position":5,"name":"IEC 62443-3-2"}]},{"@type":"WebSite","@id":"https:\/\/www.gt-engineering.it\/fr\/#website","url":"https:\/\/www.gt-engineering.it\/fr\/","name":"Gt-Engineering","description":"bizonweb","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gt-engineering.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica\/51284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica"}],"about":[{"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/types\/normativa_tecnica"}],"author":[{"embeddable":true,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":2,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica\/51284\/revisions"}],"predecessor-version":[{"id":51451,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica\/51284\/revisions\/51451"}],"up":[{"embeddable":true,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica\/51244"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/media\/51279"}],"wp:attachment":[{"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/media?parent=51284"}],"wp:term":[{"taxonomy":"tipologia_normativa","embeddable":true,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normative-tecniche?post=51284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}