For industry & SMEs with OT environments
Implementing IEC 62443? Don't start from scratch.
A complete kit of Word policies, procedures and an Excel self-assessment for industrial cybersecurity. Ready to adapt to your OT environment. No consultancy hours, no empty templates — just a workable foundation for your IACS security programme.
- One-time €199
- Instant download
- Unlimited internal use
What you get
One package. Everything you need to start.
Templates drafted by OT engineers, security specialists and auditors based on the structure of IEC 62443-2-1, 2-4 and 3-3. Ready to use in your organisation.
25+ Word templates
Policies, procedures and registers covering the full IEC 62443 structure for asset owners and system integrators.
Excel self-assessment
A workable overview of all System Requirements (SRs) and Foundational Requirements. Determine your Security Level and build an action plan.
Aligned with IEC 62443
Structured according to the main clauses of IEC 62443-2-1 (CSMS) and the FRs of 3-3. Combines well with ISO 27001 or NIS2.
Written in plain language
No impenetrable standard jargon. Documents that OT technicians, IT and management actually read and use.
Who it's for
Built for industry, OT teams and system integrators.
Whether you drive an IEC 62443 trajectory yourself or support an external consultant — this package saves you weeks of work.
Asset owners (industry & utilities)
A starting point for your CSMS that you don't have to draw up yourself first.
OT & automation teams
Clearly document how zones, conduits and assets are managed and secured.
System integrators (62443-2-4)
Show clients that you operate according to the requirements for service providers.
Consultants & auditors
Speed up your projects and focus on advice instead of drafting templates.
Packages
Pick what fits your trajectory.
- Full implementation steps and templates
- Validated by a CISO
- Ready to use for any team
- Unlimited internal use
- First line: implementation helpdesk
- Second line: CISO advice
- Quick access to expertise
- Requires the Implementation Toolkit
- Independent internal audit
- Comprehensive final report
- Risk assessment & recommendations
- Auditor ≠ implementer
Toolkit orders are processed via our external sales platform. Support and audit on request.
Ready to get your OT cybersecurity in order?
One package, everything at hand. Start today, without consultancy hours.