{"id":51306,"date":"2026-02-23T17:16:49","date_gmt":"2026-02-23T16:16:49","guid":{"rendered":"https:\/\/www.gt-engineering.it\/?post_type=normativa_tecnica&#038;p=51306"},"modified":"2026-02-23T17:16:51","modified_gmt":"2026-02-23T16:16:51","slug":"les-exigences-fondamentales-fr-foundation-requirements","status":"publish","type":"normativa_tecnica","link":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/","title":{"rendered":"Les exigences fondamentales (FR \u2013 Foundation Requirements)"},"content":{"rendered":"\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n        \n                    <div\n                class=\"h-auto mb-6 md:mb-4 lg:mb-8 xl:mb-9  float-right ml-6 md:ml-4 lg:ml-8 xl:ml-9 overflow-hidden shadow-content-image w-full md:w-1\/2\"\n            >\n                \r\n\r\n    \r\n        \r\n            \r\n                \r\n                    <picture\r\n                        class=\"\"\r\n                                            >\r\n                                                                                                        <source\r\n                                media=\"(max-width: 150px)\"\r\n                                width=\"150\"\r\n                                height=\"150\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/ipotesi-immagine-sezione-The-Foundation-Requirements-FR-150x150.png.webp\"\r\n                                type=\"image\/webp\"\r\n                            \/>\r\n                                                                                <source\r\n                                media=\"(max-width: 300px)\"\r\n                                width=\"300\"\r\n                                height=\"200\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/ipotesi-immagine-sezione-The-Foundation-Requirements-FR-300x200.png.webp\"\r\n                                type=\"image\/webp\"\r\n                            \/>\r\n                                                                                <source\r\n                                media=\"(max-width: 768px)\"\r\n                                width=\"768\"\r\n                                height=\"512\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/ipotesi-immagine-sezione-The-Foundation-Requirements-FR-768x512.png.webp\"\r\n                                type=\"image\/webp\"\r\n                            \/>\r\n                                                                                <source\r\n                                media=\"(max-width: 1024px)\"\r\n                                width=\"1024\"\r\n                                height=\"683\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/ipotesi-immagine-sezione-The-Foundation-Requirements-FR-1024x683.png.webp\"\r\n                                type=\"image\/webp\"\r\n                            \/>\r\n                                                                            <img\r\n                            class=\"a-image transparent border-image h-auto  w-full\"\r\n                                                        alt=\"IEC 62443 Foundation Requirements\"\r\n                                                        srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/ipotesi-immagine-sezione-The-Foundation-Requirements-FR.png.webp\"\r\n                                                        title=\"ipotesi immagine sezione The Foundation Requirements (FR)\"\r\n                                                        type=\"image\/webp\"\r\n                        \/>\r\n                    <\/picture>\r\n\r\n                \r\n\r\n                    \r\n    \r\n            <\/div>\n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p>En s\u00e9curit\u00e9 fonctionnelle, pour atteindre un certain niveau de SIL, des concepts tels que les <strong>D\u00e9faillances Al\u00e9atoires et les D\u00e9faillances Syst\u00e9matiques<\/strong> jouent un r\u00f4le fondamental.<\/p>\n<p>En s\u00e9curit\u00e9 des IACS (ou s\u00e9curit\u00e9 OT), un niveau \u00e9lev\u00e9 de protection est atteint gr\u00e2ce \u00e0 un ensemble d\u2019\u00ab outils \u00bb ou de \u00ab techniques \u00bb appel\u00e9s exigences fondamentales (Foundation Requirements \u2013 FR). Chaque FR d\u00e9crit une caract\u00e9ristique ou une \u00ab protection \u00bb que l\u2019IACS doit poss\u00e9der.<\/p>\n<p>La norme IEC 62443 d\u00e9finit <strong>7 exigences fondamentales (FRs)<\/strong> qui constituent la structure centrale des exigences de s\u00e9curit\u00e9 au niveau syst\u00e8me et composant. Chaque exigence fondamentale traite d\u2019un <strong>aspect diff\u00e9rent de la cybers\u00e9curit\u00e9<\/strong> et, ensemble, elles forment un cadre complet de d\u00e9fense en profondeur.<\/p>\n<ol>\n<li><strong>FR 1 \u2013 Identification et authentification (IAC)<\/strong> : garantit que les utilisateurs et les dispositifs sont correctement identifi\u00e9s et authentifi\u00e9s.<\/li>\n<li><strong>FR 2 \u2013 Contr\u00f4le d\u2019usage (UC)<\/strong> : garantit que les utilisateurs authentifi\u00e9s ne peuvent effectuer que les actions autoris\u00e9es.<\/li>\n<li><strong>FR 3 \u2013 Int\u00e9grit\u00e9 du syst\u00e8me (SI)<\/strong> : prot\u00e8ge le syst\u00e8me contre les modifications non autoris\u00e9es ou les codes malveillants.<\/li>\n<li><strong>FR 4 \u2013 Confidentialit\u00e9 des donn\u00e9es (DC)<\/strong> : prot\u00e8ge les donn\u00e9es sensibles contre toute divulgation non autoris\u00e9e.<\/li>\n<li><strong>FR 5 \u2013 Flux de donn\u00e9es restreint (RDF)<\/strong> : contr\u00f4le et limite les communications entre zones et conduits.<\/li>\n<li><strong>FR 6 \u2013 R\u00e9ponse rapide aux \u00e9v\u00e9nements (TRE)<\/strong> : garantit que le syst\u00e8me peut d\u00e9tecter, signaler et r\u00e9pondre aux \u00e9v\u00e9nements de s\u00e9curit\u00e9.<\/li>\n<li><strong>FR 7 \u2013 Disponibilit\u00e9 des ressources (RA)<\/strong> : garantit que le syst\u00e8me continue de fonctionner m\u00eame en conditions d\u00e9favorables (par exemple, attaques par d\u00e9ni de service \u2013 DoS).<\/li>\n<\/ol>\n<p>Ci-apr\u00e8s, elles sont d\u00e9crites plus en d\u00e9tail.<\/p>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n\n\n\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n                    <div class=\"mb-6 relative w-full md:mb-4 lg:mb-8 xl:mb-9\">\n                \n        <div                class=\"m-headings\"\n            >\n    \n    \n<h2 class=\"a-heading text-primary font-heading text-lg lg:text-xl font-normal mt-2 first:mt-0\">\n                    FR 1 \u2013 Identification et authentification (IAC)    <\/h2>\n        <\/div>\n                <\/div>\n        \n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p><strong>Objectif :<\/strong> Garantir que tous les utilisateurs, dispositifs et entit\u00e9s logicielles sont correctement identifi\u00e9s et authentifi\u00e9s avant d\u2019acc\u00e9der au syst\u00e8me.<\/p>\n<p><strong>Description :<\/strong> Cette exigence garantit que seules les entit\u00e9s autoris\u00e9es peuvent acc\u00e9der aux ressources du syst\u00e8me. Elle inclut des m\u00e9canismes tels que les noms d\u2019utilisateur et mots de passe, les certificats, les jetons ou d\u2019autres m\u00e9thodes d\u2019authentification. L\u2019authentification doit \u00eatre adapt\u00e9e au niveau de risque et peut s\u2019appliquer aux personnes, aux dispositifs ou aux applications.<\/p>\n<p>Une identification et une authentification robustes emp\u00eachent les acc\u00e8s non autoris\u00e9s et les usurpations d\u2019identit\u00e9, qui constituent souvent les premi\u00e8res \u00e9tapes des cyberattaques.<\/p>\n<p><strong>Exemples de mesures de contr\u00f4le :<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Comptes utilisateurs uniques (pas d\u2019identifiants partag\u00e9s)<\/li>\n<li>Politiques de mots de passe robustes ou utilisation de certificats<\/li>\n<li>Authentification multifacteur lorsque requise<\/li>\n<li>Authentification des dispositifs pour l\u2019acc\u00e8s au r\u00e9seau<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n\n\n\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n                    <div class=\"mb-6 relative w-full md:mb-4 lg:mb-8 xl:mb-9\">\n                \n        <div                class=\"m-headings\"\n            >\n    \n    \n<h2 class=\"a-heading text-primary font-heading text-lg lg:text-xl font-normal mt-2 first:mt-0\">\n                    FR 2 \u2013 Contr\u00f4le d\u2019usage (UC)    <\/h2>\n        <\/div>\n                <\/div>\n        \n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p><strong>Objectif :<\/strong> Garantir que les utilisateurs authentifi\u00e9s ne puissent effectuer que les actions pour lesquelles ils sont autoris\u00e9s.<\/p>\n<p><strong>Description :<\/strong> Le contr\u00f4le d\u2019usage se concentre sur l\u2019autorisation plut\u00f4t que sur l\u2019authentification. Une fois qu\u2019un utilisateur ou un syst\u00e8me est authentifi\u00e9, ses actions doivent \u00eatre limit\u00e9es conform\u00e9ment aux r\u00f4les et aux permissions d\u00e9finis. Cela r\u00e9duit les usages inappropri\u00e9s accidentels et limite l\u2019impact potentiel de l\u2019utilisation d\u2019identifiants compromis.<\/p>\n<p><strong>Exemples de mesures de contr\u00f4le :<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Listes de contr\u00f4le d\u2019acc\u00e8s (ACL)<\/li>\n<li>S\u00e9paration des privil\u00e8ges (op\u00e9rateur vs ing\u00e9nieur vs administrateur)<\/li>\n<li>Restrictions d\u2019acc\u00e8s aux fonctions critiques pour la s\u00e9curit\u00e9<\/li>\n<li>Application du principe du moindre privil\u00e8ge<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n\n\n\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n                    <div class=\"mb-6 relative w-full md:mb-4 lg:mb-8 xl:mb-9\">\n                \n        <div                class=\"m-headings\"\n            >\n    \n    \n<h2 class=\"a-heading text-primary font-heading text-lg lg:text-xl font-normal mt-2 first:mt-0\">\n                    FR 3 \u2013 Int\u00e9grit\u00e9 du syst\u00e8me (SI)    <\/h2>\n        <\/div>\n                <\/div>\n        \n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p><strong>Objectif :<\/strong> Prot\u00e9ger le syst\u00e8me contre toute modification non autoris\u00e9e ou involontaire.<\/p>\n<p><strong>Description :<\/strong> L\u2019int\u00e9grit\u00e9 du syst\u00e8me garantit que les logiciels, firmwares, configurations et donn\u00e9es restent fiables et non alt\u00e9r\u00e9s, sauf si les modifications sont autoris\u00e9es. Cela inclut la protection contre les logiciels malveillants, les modifications non autoris\u00e9es de configuration et les alt\u00e9rations malveillantes.<\/p>\n<p><strong>Exemples de mesures de contr\u00f4le :<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>D\u00e9marrage s\u00e9curis\u00e9 (secure boot) et v\u00e9rifications d\u2019int\u00e9grit\u00e9 du firmware<\/li>\n<li>D\u00e9tection et pr\u00e9vention des logiciels malveillants<\/li>\n<li>Gestion des configurations et tra\u00e7abilit\u00e9 des modifications<\/li>\n<li>Signature du code et v\u00e9rification des mises \u00e0 jour<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n\n\n\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n                    <div class=\"mb-6 relative w-full md:mb-4 lg:mb-8 xl:mb-9\">\n                \n        <div                class=\"m-headings\"\n            >\n    \n    \n<h2 class=\"a-heading text-primary font-heading text-lg lg:text-xl font-normal mt-2 first:mt-0\">\n                    FR 4 \u2013 Confidentialit\u00e9 des donn\u00e9es (DC)    <\/h2>\n        <\/div>\n                <\/div>\n        \n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p><strong>Objectif :<\/strong> Emp\u00eacher l\u2019acc\u00e8s non autoris\u00e9 aux informations sensibles.<\/p>\n<p><strong>Description :<\/strong> Cette exigence garantit que les donn\u00e9es sensibles \u2014 telles que les donn\u00e9es op\u00e9rationnelles, les identifiants ou les informations propri\u00e9taires \u2014 sont prot\u00e9g\u00e9es contre toute divulgation non autoris\u00e9e. Bien que la confidentialit\u00e9 soit souvent moins critique que la disponibilit\u00e9 dans les environnements OT, elle demeure essentielle pour pr\u00e9venir l\u2019espionnage et les attaques lat\u00e9rales.<\/p>\n<p><strong>Exemples de mesures de contr\u00f4le :<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Chiffrement des donn\u00e9es en transit et au repos<\/li>\n<li>Protocoles de communication s\u00e9curis\u00e9s<\/li>\n<li>Contr\u00f4les d\u2019acc\u00e8s aux d\u00e9p\u00f4ts de donn\u00e9es sensibles<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n\n\n\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n                    <div class=\"mb-6 relative w-full md:mb-4 lg:mb-8 xl:mb-9\">\n                \n        <div                class=\"m-headings\"\n            >\n    \n    \n<h2 class=\"a-heading text-primary font-heading text-lg lg:text-xl font-normal mt-2 first:mt-0\">\n                    FR 5 \u2013 Flux de donn\u00e9es restreint (RDF)    <\/h2>\n        <\/div>\n                <\/div>\n        \n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p><strong>Objectif :<\/strong> Contr\u00f4ler et limiter les chemins de communication \u00e0 l\u2019int\u00e9rieur et entre les syst\u00e8mes.<\/p>\n<p><strong>Description :<\/strong> Cette exigence impose la segmentation du syst\u00e8me en zones et en conduits, garantissant que les flux de donn\u00e9es ne circulent que l\u00e0 o\u00f9 cela est explicitement autoris\u00e9. Elle minimise la propagation des attaques et limite l\u2019ampleur des cons\u00e9quences en cas de compromission.<\/p>\n<p><strong>Exemples de mesures de contr\u00f4le :<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Segmentation et zonage du r\u00e9seau<\/li>\n<li>Pare-feu et passerelles de s\u00e9curit\u00e9 industrielles<\/li>\n<li>Liste blanche des chemins de communication et des protocoles<\/li>\n<li>Zones d\u00e9militaris\u00e9es (DMZ) entre les r\u00e9seaux IT et OT<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n\n\n\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n                    <div class=\"mb-6 relative w-full md:mb-4 lg:mb-8 xl:mb-9\">\n                \n        <div                class=\"m-headings\"\n            >\n    \n    \n<h2 class=\"a-heading text-primary font-heading text-lg lg:text-xl font-normal mt-2 first:mt-0\">\n                    FR 6 \u2013 R\u00e9ponse rapide aux \u00e9v\u00e9nements (TRE)    <\/h2>\n        <\/div>\n                <\/div>\n        \n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p><strong>Objectif :<\/strong> Garantir la d\u00e9tection, la notification et la r\u00e9ponse rapides aux \u00e9v\u00e9nements de cybers\u00e9curit\u00e9.<\/p>\n<p><strong>Description :<\/strong> Les syst\u00e8mes doivent \u00eatre capables de d\u00e9tecter des activit\u00e9s anormales ou malveillantes et de g\u00e9n\u00e9rer des alertes afin que les op\u00e9rateurs puissent intervenir avant que des dommages ne surviennent. Cela inclut les m\u00e9canismes de journalisation (logging), de surveillance et d\u2019alarme.<\/p>\n<p><strong>Exemples de mesures de contr\u00f4le :<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Journalisation des \u00e9v\u00e9nements de s\u00e9curit\u00e9 et g\u00e9n\u00e9ration d\u2019alertes<\/li>\n<li>Syst\u00e8mes de d\u00e9tection d\u2019intrusion (IDS)<\/li>\n<li>Synchronisation temporelle pour une corr\u00e9lation pr\u00e9cise des \u00e9v\u00e9nements<\/li>\n<li>Proc\u00e9dures de r\u00e9ponse aux incidents<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n\n\n\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n                    <div class=\"mb-6 relative w-full md:mb-4 lg:mb-8 xl:mb-9\">\n                \n        <div                class=\"m-headings\"\n            >\n    \n    \n<h2 class=\"a-heading text-primary font-heading text-lg lg:text-xl font-normal mt-2 first:mt-0\">\n                    FR 7 \u2013 Disponibilit\u00e9 des ressources (RA)    <\/h2>\n        <\/div>\n                <\/div>\n        \n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p><strong>Objectif :<\/strong> Garantir que le syst\u00e8me reste op\u00e9rationnel et r\u00e9silient en conditions d\u00e9favorables.<\/p>\n<p><strong>Description :<\/strong> La disponibilit\u00e9 des ressources vise \u00e0 prot\u00e9ger le syst\u00e8me contre les conditions de d\u00e9ni de service, les d\u00e9faillances d\u2019\u00e9quipements ou l\u2019\u00e9puisement des ressources. Elle est particuli\u00e8rement critique dans les environnements industriels o\u00f9 les interruptions peuvent avoir des cons\u00e9quences en mati\u00e8re de s\u00e9curit\u00e9 ou d\u2019impact \u00e9conomique.<\/p>\n<p><strong>Exemples de mesures de contr\u00f4le :<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>M\u00e9canismes de redondance et de basculement (failover)<\/li>\n<li>Gestion de la capacit\u00e9 et contr\u00f4le de la charge<\/li>\n<li>Protection contre les attaques par d\u00e9ni de service (DoS)<\/li>\n<li>Alimentation de secours et chemins de communication redondants<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n","protected":false},"excerpt":{"rendered":"<p>En s\u00e9curit\u00e9 fonctionnelle, pour atteindre un certain niveau de SIL, des concepts tels que les D\u00e9faillances Al\u00e9atoires et les D\u00e9faillances Syst\u00e9matiques jouent un r\u00f4le fondamental.<\/p>\n","protected":false},"author":2,"featured_media":51307,"parent":51244,"menu_order":3,"template":"","meta":{"_acf_changed":false,"footnotes":""},"normative-tecniche":[165],"class_list":["post-51306","normativa_tecnica","type-normativa_tecnica","status-publish","has-post-thumbnail","hentry","tipologia_normativa-normes-iec"],"acf":{"sottotitolo":"","allegati":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les exigences fondamentales (FR \u2013 Foundation Requirements) - Gt-Engineering<\/title>\n<meta name=\"description\" content=\"Exigences fondamentales IEC 62443 : cadre de cybers\u00e9curit\u00e9 IACS couvrant authentification, int\u00e9grit\u00e9, confidentialit\u00e9 et disponibilit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les exigences fondamentales (FR \u2013 Foundation Requirements) - Gt-Engineering\" \/>\n<meta property=\"og:description\" content=\"Exigences fondamentales IEC 62443 : cadre de cybers\u00e9curit\u00e9 IACS couvrant authentification, int\u00e9grit\u00e9, confidentialit\u00e9 et disponibilit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/\" \/>\n<meta property=\"og:site_name\" content=\"Gt-Engineering\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-23T16:16:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-copertina-FR-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/\",\"url\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/\",\"name\":\"Les exigences fondamentales (FR \u2013 Foundation Requirements) - Gt-Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-copertina-FR.png\",\"datePublished\":\"2026-02-23T16:16:49+00:00\",\"dateModified\":\"2026-02-23T16:16:51+00:00\",\"description\":\"Exigences fondamentales IEC 62443 : cadre de cybers\u00e9curit\u00e9 IACS couvrant authentification, int\u00e9grit\u00e9, confidentialit\u00e9 et disponibilit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/#primaryimage\",\"url\":\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-copertina-FR.png\",\"contentUrl\":\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-copertina-FR.png\",\"width\":1536,\"height\":1024,\"caption\":\"La norme IEC 62443 d\u00e9finit 7 exigences fondamentales (FRs)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.gt-engineering.it\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Normes techniques\",\"item\":\"https:\/\/www.gt-engineering.it\/fr\/normative-tecniche\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Normes IEC\",\"item\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"S\u00e9rie IEC 62443\",\"item\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Les exigences fondamentales (FR \u2013 Foundation Requirements)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/#website\",\"url\":\"https:\/\/www.gt-engineering.it\/fr\/\",\"name\":\"Gt-Engineering\",\"description\":\"bizonweb\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gt-engineering.it\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les exigences fondamentales (FR \u2013 Foundation Requirements) - Gt-Engineering","description":"Exigences fondamentales IEC 62443 : cadre de cybers\u00e9curit\u00e9 IACS couvrant authentification, int\u00e9grit\u00e9, confidentialit\u00e9 et disponibilit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/","og_locale":"fr_FR","og_type":"article","og_title":"Les exigences fondamentales (FR \u2013 Foundation Requirements) - Gt-Engineering","og_description":"Exigences fondamentales IEC 62443 : cadre de cybers\u00e9curit\u00e9 IACS couvrant authentification, int\u00e9grit\u00e9, confidentialit\u00e9 et disponibilit\u00e9.","og_url":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/","og_site_name":"Gt-Engineering","article_modified_time":"2026-02-23T16:16:51+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-copertina-FR-1024x683.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/","url":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/","name":"Les exigences fondamentales (FR \u2013 Foundation Requirements) - Gt-Engineering","isPartOf":{"@id":"https:\/\/www.gt-engineering.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/#primaryimage"},"image":{"@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-copertina-FR.png","datePublished":"2026-02-23T16:16:49+00:00","dateModified":"2026-02-23T16:16:51+00:00","description":"Exigences fondamentales IEC 62443 : cadre de cybers\u00e9curit\u00e9 IACS couvrant authentification, int\u00e9grit\u00e9, confidentialit\u00e9 et disponibilit\u00e9.","breadcrumb":{"@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/#primaryimage","url":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-copertina-FR.png","contentUrl":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2026\/02\/immagine-copertina-FR.png","width":1536,"height":1024,"caption":"La norme IEC 62443 d\u00e9finit 7 exigences fondamentales (FRs)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/les-exigences-fondamentales-fr-foundation-requirements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.gt-engineering.it\/fr\/"},{"@type":"ListItem","position":2,"name":"Normes techniques","item":"https:\/\/www.gt-engineering.it\/fr\/normative-tecniche\/"},{"@type":"ListItem","position":3,"name":"Normes IEC","item":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/"},{"@type":"ListItem","position":4,"name":"S\u00e9rie IEC 62443","item":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-iec\/serie-iec-62443\/"},{"@type":"ListItem","position":5,"name":"Les exigences fondamentales (FR \u2013 Foundation Requirements)"}]},{"@type":"WebSite","@id":"https:\/\/www.gt-engineering.it\/fr\/#website","url":"https:\/\/www.gt-engineering.it\/fr\/","name":"Gt-Engineering","description":"bizonweb","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gt-engineering.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica\/51306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica"}],"about":[{"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/types\/normativa_tecnica"}],"author":[{"embeddable":true,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":2,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica\/51306\/revisions"}],"predecessor-version":[{"id":51316,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica\/51306\/revisions\/51316"}],"up":[{"embeddable":true,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica\/51244"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/media\/51307"}],"wp:attachment":[{"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/media?parent=51306"}],"wp:term":[{"taxonomy":"tipologia_normativa","embeddable":true,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normative-tecniche?post=51306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}