Applicable Standard Parts
BTP maps to four standard parts across three distinct ISA/IEC 62443 stakeholder roles:| Persona | Standard Parts |
|---|---|
| Manufacturers / Product Suppliers | 62443-4-1 (SDL), 62443-4-2 (Component Requirements) |
| System Integrators / Service Providers | 62443-2-4 (Service Provider Program), 62443-3-3 (System Requirements) |
| Asset Owners | 62443-2-1 (Asset Owner Program), 62443-2-3 (Patch Management), 62443-3-3 (System Requirements) |
| Standard Part | Title | BTP Relevance |
|---|---|---|
| IEC 62443-4-1 | Secure Product Development Lifecycle Requirements | Primary — BTP supports all 8 SDL practices as a binary verification layer |
| IEC 62443-4-2 | Technical Security Requirements for IACS Components | Primary — BTP verifies component-level security posture |
| IEC 62443-2-3 | Patch Management in the IACS Environment (TR) | Primary — SBOM + VEX enable patch applicability assessment |
| IEC 62443-2-4 | Security Program Requirements for IACS Service Providers | Primary — BTP enables independent third-party binary verification |
| IEC 62443-3-3 | System Security Requirements and Security Levels | Primary — BTP provides SL-3/SL-4 assurance evidence for system-level SRs |
| IEC 62443-2-1 | Security Program Requirements for IACS Asset Owners | Supporting — BTP evidence supports risk-based procurement and continuous compliance |
Coverage Summary
| Requirement Area | Standard Reference | BTP Coverage |
|---|---|---|
| Third-party component inventory (SBOM) | 62443-4-1 Practice 2 | Full |
| Binary integrity verification | 62443-4-1 Practice 4 / 62443-4-2 CR 3.4 | Full |
| Unsafe function / prohibited API detection | 62443-4-1 Practice 4 | Full |
| Binary hardening verification (ASLR, stack canaries, NX, PIE, RELRO, CFI) | 62443-4-1 Practice 3 / 62443-4-2 CR 3.x | Full |
| Security verification & vulnerability testing | 62443-4-1 Practice 5 | Full |
| CVE tracking and vulnerability disclosure | 62443-4-1 Practice 6 | Full |
| Patch status communication (VEX) | 62443-4-1 Practice 7 / 62443-2-3 | Full |
| Cryptographic material inventory (CBOM) | 62443-4-2 FR 4 (DC) / 62443-4-1 Practice 2 | Full |
| Weak / non-compliant cryptography detection | 62443-4-2 CR 4.1–4.3 | Full |
| Post-quantum cryptography readiness | 62443-4-2 FR 4 (future) | Full |
| Supply chain integrity and tampering detection | 62443-4-1 Practice 2 / FR 3 (SI) | Partial |
| Vulnerability exploitability assessment (Reachability) | 62443-4-2 FR 3 (SI) / 62443-2-3 | Full |
| CISA KEV-tracked vulnerability prioritization | 62443-2-3 | Full |
| Cross-image patch regression tracking | 62443-4-1 Practice 7 / 62443-2-3 | Full |
| Malicious code detection | 62443-4-2 FR 3 (SI) | Full |
| Suspicious code and obfuscation detection | 62443-4-2 FR 3 (SI) | Full |
| UEFI / firmware-specific vulnerability classes | 62443-4-2 EDR requirements | Full |
| Hardcoded credential and secret detection | 62443-4-2 FR 1 (IAC) | Partial |
| Access control enforcement | 62443-4-2 FR 2 (UC) | Evidence |
| Network segmentation and data flow control | 62443-4-2 FR 5 (RDF) | Not Covered |
| Vulnerability intelligence for incident response (VEX, CISA KEV, reachability) | 62443-4-2 FR 6 (TRE) | Partial |
| Patching downtime reduction via reachability prioritization | 62443-4-2 FR 7 (RA) | Partial |
| Third-party binary malware verification (SP.03.02) | 62443-2-4 | Full |
| Third-party CVE monitoring incl. undisclosed dependencies (SP.09.01) | 62443-2-4 | Full |
| SL-3/SL-4 malicious code protection (SR 3.2) | 62443-3-3 | Full |
| Binary configuration and hardening verification (SR 7.6) | 62443-3-3 | Partial |
| Risk-based procurement via binary SBOM delta | 62443-2-1 | Evidence |
| Continuous compliance verification before OT deployment | 62443-2-1 | Evidence |
IEC 62443-4-1: Secure Product Development Lifecycle
IEC 62443-4-1 defines 8 SDL practices that product suppliers must implement. BTP supports all 8 practices as a binary verification layer in the development pipeline.Practice 1 — Security Management
Practice 1 — Security Management
- BTP enforces RBAC with granular roles across organization, product, and image scopes, supporting separation of duties requirements.
- SSO (SAML/OIDC) and mandatory MFA enforce identity governance requirements.
- SOC 2 Type 2 certification (available at trust.binarly.io) provides independent third-party attestation of BTP’s security controls.
- On-premises deployment option (Binarly v3) supports air-gapped or isolated environments required for sensitive ICS product development.
- API-driven CI/CD integration supports systematic SDL enforcement rather than ad-hoc scanning.
Practice 2 — Security Requirements Specification
Practice 2 — Security Requirements Specification
- Binary-derived SBOM (CycloneDX and SPDX): generated from actual compiled binaries rather than vendor-declared manifests, revealing components regardless of documentation accuracy. This satisfies the component inventory obligation for downstream integrators and asset owners.
- CBOM (CycloneDX): cryptographic material inventory of every algorithm, protocol, key, and certificate in the binary, used to assess cryptographic security requirements (FR 4).
- Transitive dependency tracking: 8 linkage types (direct, static, dynamic, build, derived, vendored, project, unspecified) provide full traceability of how third-party components are incorporated.
- Dependency vulnerability mapping: CVE exposure for all detected components including nested transitive dependencies.
| Artifact | Format | Relevant 62443-4-1 Requirement |
|---|---|---|
| SBOM | CycloneDX, SPDX | Maintain software component inventory; assess third-party component security requirements |
| CBOM | CycloneDX | Identify cryptographic requirements for all dependencies |
| Findings Report | PDF, JSON, CSV | Document security issues from third-party and open-source dependencies |
Practice 3 — Secure by Design
Practice 3 — Secure by Design
| Mitigation | Finding Class | Architecture |
|---|---|---|
| Stack canary / SSP | mitigation/missing-stack-canaries | POSIX |
| ASLR / PIE | mitigation/posix/pie-disabled | POSIX |
| NX / DEP | mitigation/posix/nx-disabled | POSIX |
| RELRO | mitigation/posix/relro-disabled | POSIX |
| Fortify Source | mitigation/posix/fortify-source-disabled | POSIX |
| Control Flow Integrity | mitigation/missing-control-flow-integrity | POSIX / UEFI |
| UEFI Memory Protection | mitigation/uefi/memory-protection-misconfiguration | UEFI |
| Microcode updates | mitigation/uefi/outdated-intel-microcode-version | UEFI |
- Unstripped binaries exposing symbol information (
weakness/posix/not-stripped) - RPATH issues enabling library injection attacks (
weakness/posix/rpath-set) - Linux kernel hardening configuration findings (
weakness/linux/kernel-configuration)
Practice 4 — Secure Implementation
Practice 4 — Secure Implementation
weakness/posix/unsafe-functions/summary: detects use ofstrcpy,sprintf,gets, and other functions prohibited by secure coding standards (CERT C, MISRA)- Unsafe function usage maps directly to the “prohibited functions list” requirement in 62443-4-1 Practice 4
- Compiled binary analysis catches issues that source-level SAST misses (inlined functions, LTO artifacts, compiler-introduced patterns)
- Works without access to source code — critical for third-party component verification
- Supports architectures used in IACS: x86, ARM32/64, Xtensa
- UEFI SMM handler vulnerabilities: SMRAM corruption, SMM callouts, unsafe pointer dereferences
- Malicious or suspicious code patterns: packed ELF, code obfuscation, ifuncs abuse, PT_NOTE conversion to PT_LOAD
Practice 5 — Security Verification and Validation Testing
Practice 5 — Security Verification and Validation Testing
- Known vulnerability detection (CVE-mapped) with confidence scoring derived from detection method reliability
- Unknown vulnerability detection via FwHunt/VulHunt rules for zero-day class vulnerabilities in UEFI, BMC, and embedded firmware
| Reachability Tier | Exploitability Assessment | V&V Relevance |
|---|---|---|
| Direct | Reachable from main/entry-point | Highest priority for V&V |
| Exported | Reachable from exported interfaces | High — exploitable from component boundary |
| Referenced | Reachable via code references | Medium — requires component interaction |
| Undetermined | Cannot be statically determined | Requires dynamic testing to resolve |
- Cross-image comparison via the Compare feature and the Compare Findings API tracks security regressions between builds to confirm previously remediated vulnerabilities have not been reintroduced.
Practice 6 — Management of Security-Related Issues
Practice 6 — Management of Security-Related Issues
Practice 7 — Security Update Management
Practice 7 — Security Update Management
- Scan the patched binary and compare against the pre-patch baseline using the Compare Findings feature
- API endpoint:
POST /api/v4/grids/findings:gridListwith filters for both image IDs provides machine-readable delta output for automated patch verification in release pipelines (see Compare Findings API)
- Update VEX status from
under_investigation→affected→fixedas patches progress - VEX artifacts accompany firmware update packages to inform downstream asset owners of what was remediated
- SBOM enables asset owners to determine whether a patched component is present in their deployed systems
- VEX with
fixedstatus and component version range data enables patch prioritization without requiring manual analysis
- Dependency findings identify components with known EOL status where the CVE backlog has ceased to be addressed by upstream maintainers
Practice 8 — Security Guidelines
Practice 8 — Security Guidelines
| Artifact | Content | Security Guideline Use |
|---|---|---|
| SBOM (CycloneDX / SPDX) | Complete software component inventory | Enables asset owners to assess CVE exposure in their deployment |
| CBOM (CycloneDX) | Cryptographic algorithm, key, certificate inventory | Informs cryptographic configuration guidance and PQC migration planning |
| VEX (OpenVEX / CycloneDX) | Vulnerability exploitability status | Documents known vulnerability handling for integrators |
| PQC Compliance Report (PDF / JSON) | NIST-aligned post-quantum readiness assessment | Executive summary + algorithm migration timeline for customers |
| Findings Report (PDF / JSON / CSV) | Full security posture with severity and confidence | Hardening guidance evidence package for integrators |
IEC 62443-4-2: Component Security Requirements
IEC 62443-4-2 defines Component Requirements (CRs) for embedded devices (EDR), host devices (HDR), network devices (NDR), and software applications (SAR) across the 7 Foundational Requirements (FRs) at Security Levels 1–4.FR 1 — Identification and Authentication Control (IAC)
FR 1 — Identification and Authentication Control (IAC)
| Finding Class | CR Violation | Description |
|---|---|---|
secret/credentials | CR 1.5 — Authenticator management | Hardcoded usernames and passwords in binary |
secret/api-credentials | CR 1.5 | Hardcoded API keys and service credentials |
secret/private-key | CR 1.5 | Embedded private keys that compromise PKI-based authentication |
secret/leaked | CR 1.5 | Credentials confirmed active/valid via external validation |
secret/oauth-token | CR 1.5 | OAuth and JWT tokens embedded in firmware |
crypto/certificate-expired | CR 1.8 — PKI certificates | Expired authentication certificates |
crypto/certificate-self-signed | CR 1.8 | Self-signed certificates bypassing trust chain |
crypto/certificate-untrusted-root | CR 1.8 | Certificates not anchored to trusted roots |
crypto/weak-rsa-parameters | CR 1.8 | RSA keys below minimum strength requirements |
FR 2 — Use Control (UC)
FR 2 — Use Control (UC)
- Granular RBAC: Admin, Analyst, and Viewer roles scoped to Organization, Product, and Image levels
- All access decisions are logged; audit trail is available for compliance review
- Mandatory MFA and SSO (SAML/OIDC) enforce authentication before use control is applied
FR 3 — System Integrity (SI)
FR 3 — System Integrity (SI)
- UEFI Secure Boot bypass vulnerabilities:
vulnerability/uefi/secure-boot-bypass - PKfail and related supply chain compromise of platform keys:
supply-chain/pkfail - UEFI boot script vulnerabilities enabling pre-boot compromise
- BootGuard policy violations
mitigation/missing-control-flow-integrity: Control Flow Integrity absent — enables hijacking of execution after integrity bypassmitigation/uefi/memory-protection-misconfiguration: UEFI memory protection policies not enforcedweakness/posix/not-stripped: Symbols present, reducing reverse engineering barrier for integrity attacks
malware/known-malware: Binary contains signatures matching known malicious firmware implantsmalware/uefi-hook-installation: Hooks into UEFI boot services — hallmark of firmware persistence implantsmalware/malicious-behavior: Behavioral patterns indicative of malicious intentsuspicious/packed-elf: Binary packing used to evade integrity scanningsuspicious/obfuscated-code: Code obfuscation inconsistent with legitimate firmwaresuspicious/reverse-text: Anti-analysis technique indicating potential tamperingsuspicious/pt-note-conversion: PT_NOTE to PT_LOAD conversion — common ELF rootkit technique
- Detection of weak or absent integrity mechanisms in protocol implementations
- POSIX and UEFI-level unsafe operations enabling memory corruption attacks against integrity controls
FR 4 — Data Confidentiality (DC)
FR 4 — Data Confidentiality (DC)
| Finding Class | FR 4 Violation |
|---|---|
crypto/weak-hash-algorithm | Insecure hashing (MD5, SHA-1) for data integrity/confidentiality |
crypto/weak-encryption-algorithm | DES, 3DES, RC4, or other deprecated ciphers |
crypto/weak-mac-algorithm | Weak HMAC or MAC constructions |
crypto/deprecated-protocol | SSL 2.0, SSL 3.0, TLS 1.0, TLS 1.1 |
crypto/weak-rsa-parameters | RSA keys below 2048-bit (CR 4.3 minimum) |
crypto/weak-ec-parameters | EC curves below recommended strength |
| Finding Class | FR 4 Violation |
|---|---|
crypto/certificate-expired | Expired TLS/signing certificates |
crypto/certificate-self-signed | Self-signed certs bypassing trust chain |
crypto/certificate-untrusted-root | Certificates from non-trusted anchors |
secret/private-key | Private keys embedded in firmware — catastrophic DC failure |
crypto/pkcs7-weak-signature | Weakly signed code or data bundles |
- Executive summary with compliance status vs. NIST PQC standards (FIPS 203/204/205)
- Per-algorithm migration urgency ratings
- Component-level quantum exposure inventory from CBOM
FR 5 — Restricted Data Flow (RDF)
FR 5 — Restricted Data Flow (RDF)
secret/credentials) that could undermine intended network segmentation controls.FR 6 — Timely Response to Events (TRE)
FR 6 — Timely Response to Events (TRE)
- VEX documents with
under_investigationandaffectedstatus formalize the identification phase of incident response for known vulnerability classes - CISA KEV integration flags findings requiring mandatory 14-day remediation per CISA BOD 22-01
- Reachability analysis contextualizes urgency: Direct reachability findings require immediate response; undetermined reachability enables risk-based prioritization
FR 7 — Resource Availability (RA)
FR 7 — Resource Availability (RA)
- Reduces unnecessary patching downtime: By classifying vulnerabilities as Direct, Exported, Referenced, or Undetermined reachability, BTP allows operators to defer patching of unreachable code without compromising the system’s security posture.
- DoS-relevant vulnerability isolation: CVSS Availability Impact filtering (CVSS Vector Filtering) isolates findings that directly threaten availability, such as those causing resource exhaustion or service disruption.
- Vulnerability classes threatening availability: Missing mitigations (CFI, stack canaries) enable memory corruption attacks weaponizable for DoS; specific CVE classes are flagged with CVSS Impact scores indicating availability impact.
IEC 62443-2-4: Service Provider Requirements
IEC 62443-2-4 defines the security program capabilities that system integrators and service providers must offer when delivering integration and maintenance activities to IACS asset owners. It requires service providers to independently verify that the components they integrate are free from malicious code and continuously monitored for new vulnerabilities — without necessarily having access to vendor source code. Service providers can fulfill these obligations with BTP’s black-box binary analysis:| 62443-2-4 Requirement | BTP Capability |
|---|---|
| SP.03.02 — Malware Protection: Verify that delivered third-party software is free from malicious code and firmware implants | BTP scans any binary image without source code access, detecting firmware backdoors, UEFI implants, supply chain tampering, and suspicious code patterns across all 238 finding classes |
| SP.09.01 — Vulnerability Monitoring: Maintain continuous monitoring of third-party components for newly disclosed CVEs, including vulnerabilities not disclosed by the original vendor | Binary-derived SBOM reveals statically linked dependencies that vendor manifests routinely omit; BTP maps CVE exposure across all detected components including hidden transitive dependencies |
| Patch applicability assessment before deployment | SBOM + VEX enable service providers to determine whether a vendor-issued patch applies to their specific integrated configuration before scheduling disruptive maintenance windows |
| Independent verification of vendor security claims | Binary-derived SBOM delta vs. vendor-declared SBOM surfaces undisclosed components, flagging supply chain risk that vendor self-attestation would not reveal |
IEC 62443-3-3: System Security Requirements
IEC 62443-3-3 defines 110 system-level Security Requirements (SRs) across the 7 Foundational Requirements at Security Levels 1–4. BTP maps directly to the SRs where binary analysis provides concrete verification evidence, particularly at SL-3 and SL-4 where defense against intentional attacks is required.| SR | Title | BTP Coverage | BTP Capability |
|---|---|---|---|
| SR 3.2 | Malicious Code Protection | Full | Semantic malware detection identifies firmware implants, backdoors, and Secure Boot bypasses (e.g., LogoFAIL, PKfail) that signature-based AV misses. Provides the higher assurance level required for SL-3/SL-4, where protection against sophisticated intentional violations is mandated. |
| SR 7.6 | Network and Security Configuration Settings | Partial | BTP extracts configuration metadata from binaries — insecure protocol configurations (SSL/TLS versions, deprecated ciphers), hardening status (RELRO, PIE, NX), and credential artifacts — to verify that third-party software meets the hardening baseline mandated by the system design. Active network configuration enforcement is outside BTP’s scope. |
| SR 3.4 | Software and Information Integrity | Full | Detects integrity violations in firmware binaries: unsigned code, missing CFI, tampered binaries (obfuscated/packed/reversed code), and supply chain compromise artifacts. |
| SR 1.1 / SR 1.5 | Human User Identification / Authenticator Management | Partial | Detects hardcoded credentials, embedded private keys, and expired PKI certificates in system components that violate authentication integrity requirements. Runtime IAC enforcement is outside scope. |
IEC 62443-2-3: Patch Management
IEC 62443-2-3 is a Technical Report defining patch management requirements for IACS asset owners and the obligations of product suppliers to support patching activities. BTP supports both product suppliers (demonstrating patch delivery) and asset owners (assessing patch applicability and urgency):For Product Suppliers
| 62443-2-3 Requirement | BTP Capability |
|---|---|
| Maintain component inventory subject to patching | Binary-derived SBOM provides ground-truth component list with versions |
| Communicate CVE exposure to asset owners | VEX documents communicate affected / fixed / not_affected status per CVE per component version |
| Verify patch efficacy | Cross-image comparison confirms vulnerability resolution between pre-patch and post-patch builds |
| Document patch scope | Findings delta report identifies exactly which vulnerabilities were remediated in each release |
For Asset Owners
| 62443-2-3 Requirement | BTP Capability |
|---|---|
| Assess patch applicability to deployed systems | SBOM enables matching vendor-issued SBOMs against known component inventory |
| Prioritize patches by exploitability | VEX affected status + Reachability tier + CVSS vector filtering enables risk-based prioritization |
| Prioritize mandatory patches | CISA KEV integration flags actively exploited vulnerabilities requiring mandatory remediation |
| Document patching decisions | Findings export (PDF / JSON / CSV) provides auditable record of known vulnerabilities and remediation status |
Generating ISA/IEC 62443 Compliance Artifacts
BTP generates all standard-required compliance artifacts via API or UI export.Upload and scan the firmware binary
Known Limitations
The following ISA/IEC 62443 requirements are outside BTP’s scope as a binary analysis platform:| Requirement Area | Standard Reference | Recommended Approach |
|---|---|---|
| Network segmentation, zone/conduit enforcement | FR 5 (RDF) | Industrial firewalls, unidirectional gateways, network security monitoring platforms |
| Real-time operational event monitoring and SIEM | FR 6 (TRE) | Industrial SIEM, OT-aware IDS (e.g., Claroty, Dragos, Nozomi) |
| Redundancy, failover, and uptime monitoring | FR 7 (RA) — operational | Infrastructure redundancy design, HA platforms, availability monitoring |
| Access control enforcement and RBAC in firmware | FR 1/2 (IAC/UC) | Runtime security testing, source code review, penetration testing |
| Security management policies and governance | 62443-4-1 Practice 1 | GRC platforms, policy management tools |
| Threat modeling and security requirements definition | 62443-4-1 Practice 2 | Threat modeling tools (STRIDE, PASTA), security requirements management |
| Active penetration testing and fuzz testing | 62443-4-1 Practice 5 | Dynamic testing tools, dedicated firmware pentest engagements |
| Organizational patch management workflows | 62443-2-3 (procedural) | Vulnerability management platforms, asset owner patch workflows |
| Service provider governance, contracts, and audit programs | 62443-2-4 (non-technical) | Contract requirements, service provider audit programs, GRC platforms |
| Asset owner security program governance | 62443-2-1 (non-technical) | GRC platforms, CSMS/Security Program management tools |