The Problem Every IEC 62443 Practitioner Knows
If you have ever conducted a risk assessment under IEC 62443-3-2, you have faced this moment: ZCR 5.1 requires you to “identify threats” for each zone and conduit. The standard tells you that you must identify threats. It does not tell you what they are.
This is not an oversight. It is a design choice — IEC 62443 deliberately leaves the threat taxonomy open, pointing practitioners toward external references (ISO 27005, NIST, etc.) or their own judgment. The reasoning is sound: flexibility allows adaptation to diverse industrial contexts. But the consequence is equally real: two competent assessors, looking at the same PLC in the same zone, may produce fundamentally different threat lists. Their risk assessments become non-comparable. Their Security Level Targets (SL-T) rest on different foundations. And nobody can tell whether the gap is a difference in perspective or a difference in completeness.
The Top Level Cyber Threat Clusters (TLCTC) framework, version 2.0, was built to solve exactly this kind of problem — not just for IEC 62443, but for every standard that mandates threat identification without providing a structured, cause-oriented taxonomy. This article explains why TLCTC and IEC 62443 are natural complements, how their core architectural concepts map onto each other, and what a v2.0-equipped risk assessment looks like in practice.
Why a Taxonomy Gap Matters in Industrial Environments
Before diving into the framework comparison, it is worth understanding why the absence of a fixed taxonomy creates specific problems in IEC 62443 contexts.
IEC 62443-3-2 structures risk assessment around zones (groupings of assets sharing common security requirements) and conduits (communication channels connecting zones). Each zone and conduit receives a Security Level Target (SL-T) based on the threats it faces, the vulnerabilities present, and the consequences of compromise. The SL-T then drives the selection of security requirements from IEC 62443-3-3 (system-level) and 62443-4-2 (component-level).
The logical chain is: Threats → Risk → SL-T → Requirements → Controls.
But without a defined threat taxonomy, the first link in this chain is unstable. Different assessors may categorize the same attack differently, list threats at inconsistent levels of granularity, or — most commonly — conflate threats with outcomes (“ransomware,” “data breach”) or with threat actors (“insider,” “nation-state”). The result is that SL-T assignments, which should be driven by systematic threat analysis, become functions of the assessor’s experience and vocabulary rather than of the actual threat landscape.
IEC 62443 also defines four Security Levels (SL-1 through SL-4), each corresponding to a threat actor profile with increasing capability and motivation. This actor-centric scaling creates a second problem: it ties defensive requirements to who might attack, rather than to how they would attack. A script kiddie using a publicly available exploit against a PLC firmware vulnerability and an APT group using the same exploit trigger the same generic vulnerability — the defense required is identical regardless of the actor’s badge.
TLCTC v2.0: What It Is and What It Is Not
TLCTC is a cause-oriented, actor-agnostic framework that classifies cyber threats by the generic vulnerability each attack step exploits. It is built on ten axioms that constrain interpretation and prevent the semantic drift that plagues cybersecurity terminology. The framework is anchored in a Bow-Tie risk model that enforces strict separation between causes (threats), events (system compromise), and consequences (data risk events and business impacts).
TLCTC is not an ICS-specific framework. It does not need to be. Its first axiom (Axiom I: No System-Type Differentiation) states that the 10 generic vulnerabilities apply identically across all IT system types — a PLC, a cloud instance, and a smartphone face the same categories of threat, expressed through different operational contexts. This universality is a feature, not a limitation: it means TLCTC provides consistent threat language across the IT/OT boundary, exactly where IEC 62443 practitioners need it most.
The 10 Axioms — Why Consistency Is Guaranteed
The axioms are organized in four groups, and each one addresses a specific source of semantic confusion:
Scope Axioms — What TLCTC Covers
Axiom I (No System-Type Differentiation): Generic IT assets define the scope. Sector labels (“ICS,” “IoT,” “cloud”) do not create new threat classes. A buffer overflow in a PLC firmware and a buffer overflow in a web server exploit the same generic vulnerability: code flaws in server-side software (#2).
Axiom II (Client–Server Model): All digital interactions are abstracted as sender–receiver (client–server) relationships. This maps directly to IEC 62443’s view of communication between components, but provides a classification anchor: which side of the interaction contains the flaw determines the cluster (#2 vs. #3).
Separation Axioms — What TLCTC Distinguishes
Axiom III (Causes, Not Outcomes): Threats are not outcomes. “Ransomware” is not a threat cluster — it is a consequence of an attack sequence. “Data breach” is not a threat — it is a data risk event. TLCTC classifies the mechanisms (causes), and records outcomes separately. This directly addresses IEC 62443’s tendency to blur threat identification with consequence assessment.
Axiom IV (Not Threat Actors): Actor identity does not determine threat classification. Whether the attacker is an insider, a hacktivist, or a nation-state APT, the generic vulnerability exploited is the same. This challenges IEC 62443’s actor-centric Security Level model by demonstrating that defensive requirements should be anchored in what is exploited, not who exploits it.
Axiom V (Not Control Failure): Control failures (“missing MFA,” “unpatched server”) are not threats — they are conditions that allow threats to succeed. Mixing control risk with threat classification creates circular reasoning: you cannot identify threats by listing the controls you lack.
Classification Axioms — How TLCTC Classifies
Axiom VI (Single-Cluster Rule): Each atomic attack step maps to exactly one cluster, defined by the one generic vulnerability it initially exploits. This is what guarantees non-overlapping categories and makes classification deterministic.
Axiom VII (Initial-Vulnerability Rule): The attack vector is defined by the initial generic vulnerability targeted, not by the eventual outcome. A phishing email that leads to malware execution starts as #9 (Social Engineering), not #7 (Malware).
Axiom VIII (Strategic–Operational Layering): The 10 clusters are the stable strategic layer. Each cluster can be decomposed into operational sub-threats (TLCTC-XX.YY) for detailed analysis, without changing the top-level classification. This two-layer structure mirrors the governance/operations split in IEC 62443 (risk assessment at zone level vs. technical requirements at component level).
Sequence Axioms — How TLCTC Models Attack Progression
Axiom IX (Sequence + Velocity): Clusters chain into attack paths, and the time between steps (Attack Velocity, Δt) determines which defensive responses are structurally viable.
Axiom X (Credential Duality): Credential acquisition (e.g., via phishing) maps to the enabling cluster (#9); credential use always maps to #4 (Identity Theft). This prevents the common error of classifying credential theft as “just phishing.”
The 10 Clusters — A Quick Reference
| # | Cluster | Generic Vulnerability | Topology |
|---|---|---|---|
| #1 | Abuse of Functions | Insufficient restriction on scope of legitimate functionality | Internal |
| #2 | Exploiting Server | Code flaws in server-side software | Internal |
| #3 | Exploiting Client | Code flaws in client-side software | Internal |
| #4 | Identity Theft | Insufficient protection of identity credentials and session tokens | Internal |
| #5 | Man in the Middle | Unprotected or insufficiently protected communication channels | Internal |
| #6 | Flooding Attack | Finite capacity of system resources | Internal |
| #7 | Malware | Intended code execution capabilities of systems | Internal |
| #8 | Physical Attack | Physical accessibility of hardware and facilities | Bridge |
| #9 | Social Engineering | Human psychological susceptibilities and trust | Bridge |
| #10 | Supply Chain Attack | Organizational dependencies on third-party components | Bridge |
The “Topology” column is a v2.0 concept explained in detail below.
Architectural Correspondence: IEC 62443 ↔ TLCTC v2.0
The most compelling argument for integrating TLCTC into IEC 62443 workflows is not that TLCTC provides a threat list — any taxonomy does that. It is that the two frameworks share deep architectural parallels that make integration natural rather than forced.
Zones and Conduits ↔ Responsibility Spheres and Domain Boundaries
IEC 62443’s foundational concept is the zone: a grouping of assets under a common security policy, with communication between zones flowing through conduits. The boundary between zones is the critical architectural element — it is where security requirements change, where controls are concentrated, and where trust assumptions must be validated.
TLCTC v2.0 introduces a directly analogous concept: Responsibility Spheres and Domain Boundaries. A Responsibility Sphere (denoted @Entity — e.g., @Org, @Vendor, @Org(OT), @Org(IT)) represents the organizational owner of a domain with its own control regime: its own policies, monitoring, enforcement, and accountability. A Domain Boundary exists wherever the control regime changes.
In an IEC 62443 architecture, each zone maps to a Responsibility Sphere (or a sub-sphere within a larger organization), and each conduit represents a Domain Boundary crossing. The TLCTC v2.0 notation provides a formal mechanism to express this in attack paths:
||[context][@Source→@Target]||
For example, an attack crossing from the corporate IT network into the OT process control zone would be annotated:
#4 ||[network][@Org(IT)→@Org(OT)]|| → #1
This tells you: stolen credentials (#4) were used to cross the IT/OT boundary, entering a different control regime, followed by abuse of legitimate engineering functions (#1) on the OT side. For an IEC 62443 practitioner, this notation directly identifies which conduit was exploited and which zone transition occurred — information that is immediately actionable for zone/conduit redesign.
Bridge vs. Internal Topology ↔ Zone Perimeter vs. Interior Threats
TLCTC v2.0 classifies each cluster as either Bridge or Internal based on whether the generic vulnerability inherently enables crossing domain boundaries:
Bridge Clusters (#8 Physical Attack, #9 Social Engineering, #10 Supply Chain): These threats originate from outside the software domain’s control regime. A phishing email targets human psychology (a different control regime than firewall rules). A compromised vendor update exploits third-party governance (a different control regime than the victim’s patch management). Physical access bypasses logical controls entirely.
Internal Clusters (#1–#7): These threats operate within the software domain’s attack surfaces. A buffer overflow, a credential replay, a DDoS flood — all exploit weaknesses in the digital infrastructure governed by the same control regime.
This maps directly onto IEC 62443’s zone architecture. Bridge threats are primarily perimeter threats: they cross zone boundaries and conduits. Internal threats are primarily interior threats: they exploit weaknesses within a zone. An IEC 62443 assessor who understands this distinction can immediately structure their ZCR 5.1 threat identification:
- For each conduit: prioritize bridge cluster analysis (#8, #9, #10) and any internal clusters that could traverse the communication path (#5, #4).
- For each zone interior: prioritize internal cluster analysis (#1 through #7) based on the assets present.
- For supply chain conduits (vendor access, remote maintenance, update channels): #10 analysis is mandatory, with explicit identification of the Trust Acceptance Event (TAE) — the point where the organization accepts and acts on third-party content.
Security Levels ↔ Velocity Classes
IEC 62443 defines four Security Levels (SL-1 through SL-4), scaled by threat actor capability. TLCTC v2.0 defines four Velocity Classes (VC-1 through VC-4), scaled by the defender’s available response time:
| Velocity Class | Typical Δt | Threat Dynamics | Primary Defense Mode |
|---|---|---|---|
| VC-1: Strategic | Days → Months | Slow transitions, long dwell | Log retention, threat hunting, strategic monitoring |
| VC-2: Tactical | Hours | Human-operated transitions | SIEM alerting, analyst triage, guided response |
| VC-3: Operational | Minutes | Automatable transitions | SOAR/EDR automation, rapid containment, prebuilt playbooks |
| VC-4: Real-Time | Seconds → Milliseconds | Machine-speed transitions | Architecture, circuit breakers, rate-limits, hardening |
If a critical transition in the attack path is VC-3 or faster, purely human response is structurally insufficient. Controls must be automated or architectural.
This has direct implications for Security Level assignment. A zone containing a PLC with a remotely exploitable firmware vulnerability (#2) faces a potential VC-4 transition if exploitation leads to immediate code execution (#7). No SIEM alert, no analyst triage, no incident response playbook will prevent the damage — only architectural controls (network segmentation, application whitelisting, protocol-aware firewalls) can structurally address a VC-4 edge. In IEC 62443 terms, this demands SL-3 or SL-4 requirements for that zone.
Conversely, a supply chain threat (#10) where a compromised vendor update is distributed over weeks (VC-1) allows for entirely different defensive strategies: SBOM analysis, vendor attestation, behavioral monitoring of update content. The time window for detection and response is fundamentally different.
Velocity Classes do not replace Security Levels — they inform them with a mechanism-based rationale. Instead of asking “how capable is the attacker?” (which you cannot know), you ask “how much time do we have between attack steps?” (which you can measure or estimate). This shifts SL-T assignment from speculative actor profiling to empirical threat dynamics.
The R-* Classification Rules: Making Threat Identification Deterministic
One of the most significant v2.0 additions is a set of normative classification rules (R-* rules) that resolve ambiguous cases. These are the operational backbone of consistent classification — and they are precisely what IEC 62443’s “identify threats” requirement needs but does not provide.
R-ROLE (#2 vs. #3): Is the exploited component in server-role (accepts inbound requests) or client-role (consumes external content)? Server-role → #2. Client-role → #3. The same software product may be server-role in one interaction and client-role in another.
R-CRED (Credential Acquisition vs. Use): Stealing credentials is mapped to the enabling cluster (e.g., #9 for phishing). Using stolen credentials is always #4. This prevents the common error of classifying an entire attack as “phishing” when the actual system compromise occurs through credential misuse.
R-EXEC (Foreign Executable Content): If Foreign Executable Content (FEC) executes, a #7 Malware step must be recorded as its own step — in addition to the enabling cluster. This is mandatory, not optional. An exploit (#2 or #3) that leads to code execution produces a path like #2 → #7, never just #2.
R-FLOOD (Capacity vs. Defect): Volume exhaustion exceeding finite resources → #6. Implementation defect causing crash/hang at normal volume → #2 or #3 (per R-ROLE). This distinction matters enormously in ICS: a ReDoS attack against a protocol parser is not a flooding attack — it exploits a code flaw.
R-SUPPLY (Trust Acceptance Event): #10 is placed at the Trust Acceptance Event (TAE) — the moment where the organization acts on third-party content (installs, applies, executes, attaches privileges). The dwell time before the TAE, inside the vendor’s sphere, is often the most important detection window.
R-HUMAN, R-PHYSICAL, R-ABUSE: Psychological manipulation → #9 (subsequent technical steps are separate). Physical interaction → #8 (subsequent technical steps are separate). Legitimate capability misused without code flaws → #1.
For an IEC 62443 assessor, these rules transform threat identification from a judgment call into a decision procedure. Given any attack scenario, the R-* rules produce a deterministic classification. Two assessors applying the rules to the same scenario will arrive at the same attack path.
Data Risk Events: Separating What Happens from Why It Happens
IEC 62443 uses seven Foundational Requirements (FR1–FR7) that are partially aligned with the CIA triad but extend it for control system contexts. TLCTC v2.0 records outcomes as Data Risk Events (DRE) using a compact notation appended to attack steps:
+ [DRE: C]— Loss of Confidentiality (data exposure)+ [DRE: I]— Loss of Integrity (data/logic modification)+ [DRE: A]— Loss of Availability (service disruption)+ [DRE: C, I]— Combined outcomes
DRE tags are explicitly not attack steps. They are annotations that record what happened as a consequence of the threat — they live on the right side of the Bow-Tie model. This enforces Axiom III (Causes, Not Outcomes) at the notation level and prevents the common IEC 62443 mistake of treating “data breach” or “denial of service” as threats rather than as consequences.
The separation matters for control mapping. Preventive controls address the threat (left side of the Bow-Tie: the cluster). Detective and corrective controls address the event and consequences (right side: the DRE). Confusing the two leads to misallocated security investment.
Practical Application: Multi-Stage ICS Attack with Full v2.0 Notation
Consider a realistic attack against an industrial control system, analyzed with the full v2.0 toolset. The scenario: an attacker targets a chemical processing plant’s Distributed Control System (DCS) through a compromised engineering workstation.
Attack Narrative
- The attacker sends a spear-phishing email to a control systems engineer, with an attachment impersonating a vendor technical bulletin.
- The engineer opens the document, which exploits a vulnerability in the PDF reader on the engineering workstation.
- The exploit delivers and executes a custom payload (fileless malware using PowerShell).
- The malware harvests cached domain credentials from the engineering workstation.
- Using the harvested credentials, the attacker authenticates to the DCS engineering interface via the plant’s remote access conduit.
- The attacker uses the legitimate DCS engineering software to modify control logic on several PLCs.
TLCTC v2.0 Attack Path
#9 ||[email][@External→@Org(Eng)]||
→[Δt=2h] #3
→[Δt=seconds] #7
→[Δt=30m] #4 + [DRE: C]
→[Δt=4h] #4 ||[remote-access][@Org(IT)→@Org(OT)]||
→[Δt=15m] #1 + [DRE: I]
Step-by-Step Classification (with R-* Rules)
Step 1: #9 Social Engineering
The phishing email targets human psychology (generic vulnerability: human psychological susceptibilities). Per R-HUMAN, the psychological manipulation is #9; all subsequent technical steps are separate. The domain boundary operator records that this is a bridge step crossing from the attacker’s sphere into the organization’s engineering environment.
Step 2: #3 Exploiting Client [Δt=2h]
The PDF reader vulnerability is a client-side code flaw. Per R-ROLE, the PDF reader is in client-role (it consumes external content), so this is #3, not #2. The Δt of approximately 2 hours (time between receiving the email and opening the attachment) places this edge in VC-2 (Tactical) — SIEM alerting and analyst triage could theoretically intervene here.
Step 3: #7 Malware [Δt=seconds]
Per R-EXEC, the execution of Foreign Executable Content (the PowerShell payload) must be recorded as a #7 step. The enabling step was #3, producing the sequence #3 → #7. The Δt of seconds makes this edge VC-4 (Real-Time) — no human intervention is possible between exploitation and code execution. Only architectural controls (application whitelisting, script execution policies) could prevent this transition.
Step 4: #4 Identity Theft + [DRE: C] [Δt=30m]
Per R-CRED, the acquisition of credentials is a consequence of the preceding steps (the malware harvested them). This step records the use of those credentials within the local domain. The [DRE: C] tag records that credential exposure is a Loss of Confidentiality. The Δt of 30 minutes is VC-3 (Operational) — automated detection (EDR behavioral analysis, credential access alerting) is the viable defense mode.
Step 5: #4 Identity Theft with Domain Boundary [Δt=4h]
The attacker uses the same stolen credentials to authenticate across the IT/OT boundary via the remote access conduit. This is another #4 step (same cluster appearing twice — permitted per v2.0 rules when the context changes). The domain boundary operator ||[remote-access][@Org(IT)→@Org(OT)]|| identifies exactly which IEC 62443 conduit is being crossed. The Δt of 4 hours (VC-2, Tactical) represents a critical detection window: the attacker waited before pivoting, and this dwell time is where cross-zone monitoring and anomaly detection should trigger.
Step 6: #1 Abuse of Functions + [DRE: I] [Δt=15m]
The attacker uses the legitimate DCS engineering interface to modify PLC logic. No exploit, no malware, no code flaw — the attacker abuses the designed functionality of the engineering software. Per R-ABUSE, this is #1. The [DRE: I] tag records Loss of Integrity (control logic tampered). The Δt of 15 minutes is VC-3 — change detection, logic integrity monitoring, and approval workflows for control logic modifications could catch this.
What This Analysis Tells an IEC 62443 Assessor
Zone-specific threat profiles:
- The Engineering Workstation zone faces #9 (bridge entry), #3, #7, and #4.
- The DCS/PLC zone faces #4 (credential-based access) and #1 (function abuse).
- The threats are different per zone, and so the SL-T should be different.
Conduit-specific risks:
- The email conduit is the bridge entry point (#9). Controls: email filtering, attachment sandboxing, awareness training.
- The remote-access conduit between IT and OT is crossed by #4. Controls: MFA, just-in-time access, session monitoring, network segmentation.
Velocity-driven control prioritization:
- The
#3 →[Δt=seconds] #7edge is VC-4: only architectural/preventive controls work (application whitelisting, endpoint hardening). No detection-and-response capability can close this gap. - The
#4 →[Δt=4h] #4edge is VC-2: this is the best detection opportunity in the entire chain. Cross-zone authentication monitoring and impossible-travel detection should be invested in heavily. - The
#4 →[Δt=15m] #1edge is VC-3: automated alerts on control logic changes and configuration integrity monitoring are structurally viable here.
Bow-Tie control alignment:
- Prevention (left side): Email filtering (#9), PDF reader patching/sandboxing (#3), application whitelisting (#7), MFA (#4), least-privilege on DCS engineering access (#1).
- Detection (center): EDR on engineering workstation (#3, #7), credential access monitoring (#4), cross-zone authentication alerting (#4 at boundary), control logic change detection (#1).
- Mitigation (right side): Credential rotation (address [DRE: C]), control logic rollback from known-good backups (address [DRE: I]).
Integration Approach: Enhancing IEC 62443 with TLCTC
The integration does not require replacing IEC 62443 processes. It enhances them at specific decision points.
ZCR 5.1 (Identify Threats): Use TLCTC as the Taxonomy
Instead of assembling ad-hoc threat lists, apply the 10 clusters systematically to each zone and conduit. For every zone, ask: which of the 10 generic vulnerabilities are present in the assets within this zone? This produces a complete, non-overlapping threat profile that is consistent across assessors, sites, and audits.
For conduits, focus on bridge clusters (#8, #9, #10) and communication-path threats (#5) by default, then add any internal clusters that could traverse the conduit based on the protocols and services in use.
ZCR 5.2 (Identify Vulnerabilities): Map to Generic Vulnerabilities
TLCTC’s generic vulnerabilities provide a structured vocabulary for vulnerability identification. Rather than listing CVEs in isolation, group vulnerabilities by the generic vulnerability they instantiate. This connects specific vulnerabilities to the cluster they enable, which in turn connects to the threat profile from ZCR 5.1.
ZCR 5.5–5.6 (Determine Risk, Determine SL-T): Use Velocity Classes
Supplement IEC 62443’s actor-centric SL model with velocity-based reasoning. For each identified threat path, estimate the Δt at critical transitions and determine the Velocity Class. If any critical edge is VC-3 or VC-4, the SL-T for that zone must account for the need for automated or architectural controls — which typically means SL-3 or SL-4 requirements.
ZCR 5.8 (Evaluate Countermeasures): Map Controls to Clusters
Use the TLCTC Bow-Tie model to align countermeasures with specific clusters. Each countermeasure should address a specific generic vulnerability (preventive), a specific detection gap (detective), or a specific data risk event (corrective). This prevents the common problem of listing controls without clear traceability to the threats they address.
ZCR 6.1 (Cybersecurity Requirements Specification): Use Attack Path Notation
Document threat scenarios using TLCTC v2.0 attack path notation with domain boundary operators. This provides a machine-readable, standardized format that makes requirements traceable and auditable. It also makes risk assessments comparable across different zones, different sites, and different assessment cycles.
Addressing the “Universality Question”
IEC 62443 practitioners sometimes ask: “If TLCTC is not designed specifically for ICS, how can it be adequate for our environment?”
The answer lies in Axiom I and the two-layer architecture. The 10 strategic clusters and their generic vulnerabilities are universal because they describe how systems are attacked, not what systems look like. A PLC is attacked through the same generic vulnerabilities as any other computer — code flaws (#2), physical access (#8), supply chain compromise (#10), credential misuse (#4). What differs is the operational context: which protocols are in use, what the physical environment looks like, what the consequences of compromise are.
TLCTC handles this through its operational layer (TLCTC-XX.YY sub-clusters). The v2.0 whitepaper includes a detailed PLC case study showing five attack variants — engineering abuse (#4 → #1 → #7), service exploit (#2 → #7), supply chain firmware (#10 → #7), physical access (#8 → #7), and social engineering (#9 → #1 or #9 → #7) — all classified using the same rules that apply to any IT system. The operational sub-clustering allows ICS-specific refinement (e.g., distinguishing protocol-layer exploits from application-layer exploits within #2) without breaking the strategic framework.
Universality is not a weakness. It is the property that allows TLCTC to provide consistent threat language across the IT/OT boundary — the exact boundary where IEC 62443 practitioners need interoperability most.
Conclusion: Two Frameworks, One Coherent Risk Picture
IEC 62443 provides the industry-specific architecture: zones, conduits, security levels, foundational requirements, and a structured risk assessment process. What it lacks is a threat taxonomy that makes its own threat identification requirement (ZCR 5.1) consistently executable.
TLCTC v2.0 provides exactly that taxonomy, with guarantees of consistency (axioms), deterministic classification (R-* rules), temporal intelligence (velocity classes and Δt), architectural awareness (bridge/internal topology, domain boundaries), and formal notation for documenting threat scenarios as shareable, machine-readable attack paths.
The integration is natural because the architectural concepts align:
| IEC 62443 Concept | TLCTC v2.0 Concept |
|---|---|
| Zone | Responsibility Sphere (@Entity) |
| Conduit | Domain Boundary (‖[context][@Source→@Target]‖) |
| Security Level (SL-1 to SL-4) | Velocity Class (VC-1 to VC-4) as mechanism-based rationale |
| Foundational Requirements (FR1–FR7) | Data Risk Events (DRE: C, I, A) + Cluster-specific controls |
| Threat identification (ZCR 5.1) | 10 Clusters with R-* classification rules |
| Risk = Threat × Vulnerability × Consequence | Bow-Tie: Threats (cause) → Event → Consequences (effect) |
Together, these frameworks provide a complete risk analysis pipeline: TLCTC identifies and structures the threats; IEC 62443 provides the industrial architecture and control requirements. Neither alone is sufficient. Together, they give ICS practitioners what they need: a rigorous, repeatable, and comparable approach to industrial cybersecurity risk assessment.
The TLCTC v2.0 whitepaper, glossary, and JSON architecture specification are available at tlctc.net. The framework is released under CC BY 4.0 licensing.