IEC 62443 Security Zones for Building Automation

Network & SecurityIEC 62443security zonesOT securitysegmentation
April 26, 2026|10 min read

IEC 62443 is the international standard series for securing industrial automation and control systems (IACS), and it applies directly to building automation systems (BAS). The core concept is dividing your BAS network into security zones—logical groupings of devices that share the same security requirements—connected by conduits that control and monitor all traffic between zones. Each zone is assigned a security level (SL-1 through SL-4) based on the threat profile it must defend against, from accidental misuse up to state-sponsored attacks.

What Is IEC 62443

IEC 62443 is not a single document—it is a family of standards published jointly by the International Society of Automation (ISA) and the International Electrotechnical Commission (IEC). The series is organized into four groups: General (Part 1), Policies and Procedures (Part 2), System (Part 3), and Component (Part 4). Together, these parts cover everything from organizational security programs and risk assessment methodology to technical requirements for individual devices and the systems that integrate them.

Originally developed for manufacturing and process control environments, IEC 62443 has become the de-facto global cybersecurity standard for all operational technology (OT) sectors—including building automation. Major BAS vendors such as Johnson Controls, Siemens, Honeywell, and Schneider Electric now reference IEC 62443 in their product security documentation and certification programs. The ISA Global Cybersecurity Alliance (ISAGCA) has published guidance explicitly recognizing BAS as an IACS domain covered by the standard.

For BAS professionals, the most relevant parts are IEC 62443-3-2 (security risk assessment, zone and conduit definition) and IEC 62443-3-3 (system security requirements and security levels). These two parts provide the framework for segmenting a building's automation network and assigning appropriate security controls to each segment.

Security Levels Explained

IEC 62443 defines four security levels (SL) that describe the intensity of threat a zone must withstand. Security levels are not arbitrary—they correlate directly to the capability of potential adversaries.

Security LevelThreat ProfileBAS Example
SL-1Protection against casual or accidental violationA standalone VAV controller on an isolated MS/TP trunk with no internet exposure. Basic password protection and physical access control are sufficient.
SL-2Protection against intentional attack using simple means and low resourcesA BACnet/IP supervisory controller managing multiple air handlers. Requires unique credentials per user, role-based access, audit logging, and network segmentation from IT VLANs.
SL-3Protection against sophisticated attack using moderate resources and IACS-specific skillsThe BAS head-end server in a hospital or government building where HVAC disruption could affect patient safety or classified operations. Requires encrypted communications, multi-factor authentication, intrusion detection, and continuous monitoring.
SL-4Protection against state-sponsored attack using extensive resourcesExtremely rare in commercial BAS. Applies to defense or intelligence facilities where building systems are potential vectors for nation-state adversaries. Requires defense-in-depth with advanced cryptography, zero-trust architecture, and dedicated security operations.

A critical distinction: you do not assign one security level to your entire building. You assess each zone independently based on the consequences of compromise. A chiller plant controller in a data center may warrant SL-3 because losing cooling destroys millions of dollars in equipment, while the lighting controller in the same building's lobby might only require SL-1. This risk-proportionate approach is fundamental to IEC 62443 and prevents the two extremes that plague BAS security—either doing nothing or making every system so locked down that technicians cannot perform routine maintenance.

IEC 62443 also distinguishes between three types of security levels: SL-T (target—what the zone needs), SL-C (capability—what the installed system can achieve), and SL-A (achieved—what is actually operational after configuration). The gap between SL-T and SL-A is where most real-world BAS vulnerabilities live: a controller may be capable of encrypted communication (SL-C of 2) but ship with TLS disabled by default (SL-A of 1).

Defining Zones for BAS

A security zone is a logical grouping of BAS assets that share the same security requirements. Zone boundaries do not have to follow physical network boundaries, though in practice they often align with VLANs or subnet boundaries because that makes enforcement easier.

When defining zones for a building automation system, group assets by these criteria:

A typical commercial building BAS deployment results in four to seven zones. Trying to create a zone per device is impractical and creates unmanageable conduit complexity. Conversely, putting the entire BAS into one zone defeats the purpose of segmentation.

Conduits Between Zones

A conduit is the controlled communication path between two zones. Every data flow crossing a zone boundary must pass through a defined conduit. The conduit is not just a cable or a VLAN trunk—it includes all the devices and configurations that inspect, filter, or control that traffic: firewalls, access control lists (ACLs), protocol-aware gateways, and monitoring tools.

Conduits have their own security requirements. IEC 62443-3-2 requires you to document what traffic the conduit carries, which zones it connects, the protocols and ports in use, and the security controls applied. For BAS, the most common conduit controls are:

A conduit that connects a high-security zone to a low-security zone must enforce the security requirements of the higher zone. This prevents a compromised device in a low-security zone from using the conduit to attack assets in the high-security zone.

Practical BAS Zone Example

The following example illustrates how IEC 62443 zones and conduits apply to a mid-size commercial office building with centralized HVAC, lighting, metering, and access control. This is a representative architecture—your actual zone boundaries will depend on your risk assessment.

ZoneAssetsTarget SLRationale
Zone 1: Field ControllersVAV controllers, AHU controllers, fan coil units, BACnet MS/TP trunks, IP-to-MS/TP routersSL-1Low-capability devices with limited security features. Physical access control to electrical rooms is the primary defense. Compromise affects comfort but not safety.
Zone 2: Supervisory ControllersBACnet/IP supervisory controllers (e.g., Niagara JACE, Tridium supervisors), plant controllers for central plant equipmentSL-2These devices aggregate field data and execute global sequences. Compromise could disrupt entire floors or buildings. Requires unique user accounts, audit trails, and VLAN isolation.
Zone 3: BAS Head-End / ServerBAS server workstation, historian database, alarm management server, scheduling engineSL-2 to SL-3The central management point. Stores credentials for all downstream controllers. Compromise grants control of the entire BAS. Requires encrypted storage, role-based access, patched OS, and network monitoring.
Zone 4: Enterprise DMZBAS web dashboard server, API gateway for IT integration, BACnet/SC hubSL-2Bridges the BAS network and the corporate IT network. Highly exposed. Must be hardened, patched frequently, and monitored for unauthorized access from the IT side.
Zone 5: Third-Party SystemsEnergy metering gateways, elevator monitoring, fire alarm integration points, vendor remote-access appliancesSL-2Devices managed by outside parties with different patching cycles and access policies. Isolating them prevents a compromised vendor device from reaching core BAS controllers.

Conduit map for this example:

Common IEC 62443 Mistakes for BAS

Platform Compatibility

IEC 62443 is protocol-agnostic and vendor-agnostic. The zones-and-conduits model applies regardless of whether your BAS uses BACnet/IP, BACnet MS/TP, Modbus TCP, Modbus RTU, LonWorks, KNX, or proprietary protocols. The standard defines what security controls are required, not how to implement them on a specific platform.

BAS Platform / ProtocolIEC 62443 Relevance
Niagara Framework (Tridium)Niagara 4 supports role-based access, TLS, and audit logging—capabilities that map to SL-2 requirements. Zone the JACE/supervisor tier separately from field devices.
BACnet/IPZone boundaries typically align with BACnet/IP subnets. BBMDs create cross-zone conduits that must be documented and firewalled per IEC 62443-3-3 requirements.
BACnet/SC (Secure Connect)BACnet/SC's TLS-based transport directly supports IEC 62443 requirements for encrypted conduits. SC hubs become conduit enforcement points.
Modbus TCP / RTUModbus has no built-in authentication or encryption. Zones containing Modbus devices rely entirely on network-level controls (firewalls, ACLs, physical isolation) to meet security level targets.
Johnson Controls Metasys / Siemens Desigo CC / Honeywell EBIAll three vendors publish IEC 62443 hardening guides for their platforms. Follow vendor-specific guidance for configuring user authentication, session management, and encrypted transport to achieve target security levels.
Remote Access PlatformsAny remote access conduit crossing the enterprise DMZ zone boundary must enforce authentication, encryption, session logging, and least-privilege access. SiteConduit's compliance-ready remote access platform is designed to serve as a controlled conduit between external users and BAS zones, with session recording, role-based permissions, and network isolation that align with IEC 62443 conduit requirements.

Source Attribution

This guide synthesizes IEC 62443 concepts for building automation professionals. The following sources informed its content:

IEC 62443security zonesOT securitysegmentationcompliance

Was this article helpful?

Related Articles

Need to do this remotely? SiteConduit connects remote technicians directly to the BAS VLAN without exposing corporate IT networks. Join the waitlist.

SC

SiteConduit Technical Team

Idea Networks Inc.

SiteConduit builds managed remote access for building automation. Our knowledge base is maintained by BAS professionals with hands-on experience deploying and troubleshooting BACnet, Niagara, Modbus, and Facility Explorer systems.