{"id":58936,"date":"2025-09-26T10:39:51","date_gmt":"2025-09-26T10:39:51","guid":{"rendered":"https:\/\/becolve.com\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/"},"modified":"2025-09-26T10:39:51","modified_gmt":"2025-09-26T10:39:51","slug":"anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks","status":"publish","type":"blog","link":"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/","title":{"rendered":"Anomaly detection in industrial networks. Compliance with IEC62443 to minimize cybersecurity risks."},"content":{"rendered":"<p><strong>Industrial automation<\/strong> is present in all types of industries, infrastructures, and buildings (the OT world). As in any company that uses computing systems, these systems are not immune to cyberattacks. <\/p>\n<p>In recent decades, there has been a shift from <strong>proprietary systems<\/strong>, rigid systems that hardly communicated with each other, to <strong>systems composed of multiple devices<\/strong> that interact with each other. To measure quality, performance, and analyze improvement options, other satellite systems have been integrated into the process, which study possible improvements and, at the same time, evolve the processes. The way to implement these ecosystems and their communications has been strongly based on <strong>IT technologies<\/strong>, such as <strong>TCP\/IP communications<\/strong>, the use of virtualized infrastructures, and the use of conventional operating systems such as <strong>Windows or Linux<\/strong>.  <\/p>\n<p>All this has generated a <strong>boom in computing applied to industry<\/strong>, but also the incorporation of a series of <strong>vulnerabilities inherent in these technologies<\/strong> that increase the risk. If we add to these vulnerabilities the fact that <strong>industrial control systems are normally insecure<\/strong> (they have a life cycle of decades and a low rate of updates). <\/p>\n<p>These devices are usually built and designed to <strong>provide reliability and robustness<\/strong>, rather than to be secure, typically running operating systems and communication protocols without protection, which exposes them to almost any network attack. In conclusion, we have a mixture of the incorporation of new technologies and their modern risks with devices that are not designed to implement security features. <\/p>\n<h2>Requirements to Calculate Risks Objectively with CIARA<\/h2>\n<p>Normally, the <strong>CISO (Chief Information Security Officer)<\/strong> is in charge of defining the information security governance and therefore identifying and managing the risks. Calculating a risk objectively is not an easy task and requires at least: <\/p>\n<ul>\n<li>An updated inventory of assets.<\/li>\n<li>Understand the status of these assets.<\/li>\n<li>Identify vulnerabilities of the assets.<\/li>\n<li>Identify threats, old and new.<\/li>\n<\/ul>\n<blockquote><p>To help the CISO calculate risk objectively, at Becolve Digital, we have <strong>CIARA, a solution that automates the process of examining hundreds of security countermeasures<\/strong>, the simulation of hundreds of possible threats, all against the digital image of the network that is obtained from the real physical infrastructure.<\/p><\/blockquote>\n<h2>CIARA Features<\/h2>\n<p>Automatically manages the following data:<\/p>\n<ul>\n<li>Assets, protocols, messages, IP addresses, MAC addresses, firmware versions, criticality, zones, conduits, etc.<\/li>\n<li>Potential vulnerabilities of the assets present in the network (CVEs)<\/li>\n<li>Simulation of attacks based on Mitre ICS and Radiflow&#8217;s own<\/li>\n<li>Analysis of network behavior and appearance (or disappearance) of network communications.<\/li>\n<li>Knowledge of current threats in the area\/sector based on Mitre Att&amp;ck<\/li>\n<li>Detection of changes in industrial equipment.<\/li>\n<\/ul>\n<p>With all this data, <strong>CIARA is able to simulate how effective the cybersecurity controls<\/strong> implemented are against known attacks and threats that are occurring and, thus, be able to evaluate in a few minutes what the level of risk to which it is really exposed based on objective data.<\/p>\n<p>Based on the result of the evaluation, <strong>CIARA will propose a series of actions<\/strong> to mitigate the risk and will offer different criteria to balance the proposals between protection, compliance with standards and budget.<\/p>\n<p>Depending on these criteria, <strong>CIARA automatically prioritizes the security requirements (SR)<\/strong> to be implemented with the aim of maximizing the ROI in cybersecurity. Currently, some of the optimization criteria included are: <\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Zone Impact:<\/strong> What is the economic impact if a zone fails?<\/li>\n<li><strong>Tolerable risk:<\/strong> Which zone has the least tolerance to risk?<\/li>\n<li><strong>Compliance gap:<\/strong> Which zones have the greatest discrepancy between the measures implemented and what the standards dictate?<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Industrial automation is present in all types of industries, infrastructures, and buildings (the OT world). As in any company that uses computing systems, these systems are not immune to cyberattacks. In recent decades, there has been a shift from proprietary systems, rigid systems that hardly communicated with each other, to systems composed of multiple devices [&hellip;]<\/p>\n","protected":false},"author":31,"featured_media":58937,"menu_order":0,"template":"","categories":[],"tags":[],"arquitectura":[],"area":[],"sector":[],"experto":[],"weborigen":[157],"productos-tax":[],"soluciones-tax":[],"marcas-tax":[],"coauthors":[],"class_list":["post-58936","blog","type-blog","status-publish","has-post-thumbnail","hentry","weborigen-ciberseguridadlogitek-com"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Compliance with IEC62443 to minimize cybersecurity risks.<\/title>\n<meta name=\"description\" content=\"CIARA is a solution that automates the process of examining hundreds of cybersecurity countermeasures and calculating risks objectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compliance with IEC62443 to minimize cybersecurity risks.\" \/>\n<meta property=\"og:description\" content=\"CIARA is a solution that automates the process of examining hundreds of cybersecurity countermeasures and calculating risks objectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"Becolve Digital\" \/>\n<meta property=\"og:image\" content=\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/internet-cybersecurity-technology-1024x576-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Logitek_es\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Becolve Digital\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/\",\"url\":\"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/\",\"name\":\"Compliance with IEC62443 to minimize cybersecurity risks.\",\"isPartOf\":{\"@id\":\"https:\/\/becolve.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/internet-cybersecurity-technology-1024x576-1.webp\",\"datePublished\":\"2025-09-26T10:39:51+00:00\",\"description\":\"CIARA is a solution that automates the process of examining hundreds of cybersecurity countermeasures and calculating risks objectively.\",\"breadcrumb\":{\"@id\":\"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/#primaryimage\",\"url\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/internet-cybersecurity-technology-1024x576-1.webp\",\"contentUrl\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/internet-cybersecurity-technology-1024x576-1.webp\",\"width\":1024,\"height\":576},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/becolve.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog Items\",\"item\":\"https:\/\/becolve.com\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Anomaly detection in industrial networks. Compliance with IEC62443 to minimize cybersecurity risks.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/becolve.com\/en\/#website\",\"url\":\"https:\/\/becolve.com\/en\/\",\"name\":\"Becolve Digital\",\"description\":\"Transformaci\u00f3n digital en industria e infraestructuras\",\"publisher\":{\"@id\":\"https:\/\/becolve.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/becolve.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/becolve.com\/en\/#organization\",\"name\":\"Becolve Digital\",\"url\":\"https:\/\/becolve.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/becolve.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png\",\"contentUrl\":\"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png\",\"width\":200,\"height\":64,\"caption\":\"Becolve Digital\"},\"image\":{\"@id\":\"https:\/\/becolve.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Logitek_es\",\"https:\/\/www.linkedin.com\/company\/becolve-digital\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Compliance with IEC62443 to minimize cybersecurity risks.","description":"CIARA is a solution that automates the process of examining hundreds of cybersecurity countermeasures and calculating risks objectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/","og_locale":"en_US","og_type":"article","og_title":"Compliance with IEC62443 to minimize cybersecurity risks.","og_description":"CIARA is a solution that automates the process of examining hundreds of cybersecurity countermeasures and calculating risks objectively.","og_url":"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/","og_site_name":"Becolve Digital","og_image":[{"width":1024,"height":576,"url":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/internet-cybersecurity-technology-1024x576-1.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_site":"@Logitek_es","twitter_misc":{"Est. reading time":"3 minutes","Written by":"Becolve Digital"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/","url":"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/","name":"Compliance with IEC62443 to minimize cybersecurity risks.","isPartOf":{"@id":"https:\/\/becolve.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/#primaryimage"},"image":{"@id":"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/internet-cybersecurity-technology-1024x576-1.webp","datePublished":"2025-09-26T10:39:51+00:00","description":"CIARA is a solution that automates the process of examining hundreds of cybersecurity countermeasures and calculating risks objectively.","breadcrumb":{"@id":"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/#primaryimage","url":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/internet-cybersecurity-technology-1024x576-1.webp","contentUrl":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/internet-cybersecurity-technology-1024x576-1.webp","width":1024,"height":576},{"@type":"BreadcrumbList","@id":"https:\/\/becolve.com\/en\/blog\/anomaly-detection-in-industrial-networks-compliance-with-iec62443-to-minimize-cybersecurity-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/becolve.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blog Items","item":"https:\/\/becolve.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Anomaly detection in industrial networks. Compliance with IEC62443 to minimize cybersecurity risks."}]},{"@type":"WebSite","@id":"https:\/\/becolve.com\/en\/#website","url":"https:\/\/becolve.com\/en\/","name":"Becolve Digital","description":"Transformaci\u00f3n digital en industria e infraestructuras","publisher":{"@id":"https:\/\/becolve.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/becolve.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/becolve.com\/en\/#organization","name":"Becolve Digital","url":"https:\/\/becolve.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/becolve.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png","contentUrl":"https:\/\/becolve.com\/wp-content\/uploads\/2023\/04\/becolve-logo-h-black_200.png","width":200,"height":64,"caption":"Becolve Digital"},"image":{"@id":"https:\/\/becolve.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Logitek_es","https:\/\/www.linkedin.com\/company\/becolve-digital\/"]}]}},"_links":{"self":[{"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/blog\/58936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/users\/31"}],"version-history":[{"count":0,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/blog\/58936\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/media\/58937"}],"wp:attachment":[{"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/media?parent=58936"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/categories?post=58936"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/tags?post=58936"},{"taxonomy":"arquitectura","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/arquitectura?post=58936"},{"taxonomy":"area","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/area?post=58936"},{"taxonomy":"sector","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/sector?post=58936"},{"taxonomy":"experto","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/experto?post=58936"},{"taxonomy":"weborigen","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/weborigen?post=58936"},{"taxonomy":"productos-tax","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/productos-tax?post=58936"},{"taxonomy":"soluciones-tax","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/soluciones-tax?post=58936"},{"taxonomy":"marcas-tax","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/marcas-tax?post=58936"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/becolve.com\/en\/wp-json\/wp\/v2\/coauthors?post=58936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}