The security standards for industrial control systems are an important part of the security assurance system for industrial control systems. They play multiple roles in promoting, standardizing, and guiding the security protection work of industrial control systems in various industries. Due to the late overall start of the security protection construction for industrial control systems in China, the security standards for industrial control systems are also obviously lagging behind. In recent years, with the acceleration of the formulation of industrial control system security standards led by the Information Security Standards Committee, the security standards system for industrial control systems in China has gradually entered the “fast lane,” with a large number of security standards being released successively. To help various industries and enterprises gain a deeper understanding of industrial control security standards, Winut has launched a series of articles titled “Understanding Industrial Control System Security Standards,” which will provide a detailed interpretation of the existing industrial control system security standards in multiple issues.

“This standard specifies the rules and methods for classifying the information security levels of industrial control systems based on risk assessment, proposing a classification model and classification elements, including the importance of industrial control system assets, the potential impact of existing risks, and the degree of information security threats that need to be resisted. It also proposes the characteristics of four levels of information security for industrial control systems.”

The information security levels of industrial control systems in the Classification Guidelines are defined based on risk impact levels and are divided into four levels. At the same time, the characteristics of industrial control systems at levels 1-4 are defined, primarily distinguishing and defining characteristics based on the degree of impact after damage, the degree of threat resistance, security protection capabilities, and regulatory intensity, providing significant level differences for the protection granularity of industrial enterprises and the intensity of regulatory oversight, thus providing a reference for users and regulatory units.
Security Level |
Impact Degree After Damage |
Threat Resistance Degree |
Security Protection Capability |
Regulatory Oversight |
Level 1 Industrial Control System |
Will cause damage to the general industrial production operations or damage to the legitimate rights and interests and important properties of citizens, enterprises, and other organizations, but will not harm national security (especially national economic security), environmental safety, social order, public interest, and human life. |
Should enable the industrial control system to resist malicious threats from individuals with limited resources, general environmental threats, general accidental threats, and other threats of comparable harm level. |
Should at least have a basic understanding of system assets, operational environments, and security risks, take basic information security control measures, detect system anomalies and security incidents, and execute and maintain emergency response capabilities. |
Should receive protection and management from the enterprise according to national management norms and technical standards. |
Level 2 Industrial Control System |
Will cause significant damage to general industrial production operations, or damage to key areas of industrial production operations, or serious damage to the legitimate rights and interests and important properties of citizens, enterprises, and other organizations, or damage to environmental safety, social order, public interest, and human life, but will not harm national security (especially national economic security). |
Should enable the industrial control system to resist malicious threats from organized groups with moderate resources, general environmental threats, serious accidental threats, and other threats of comparable harm level. |
Should at least have a relatively comprehensive understanding of system assets, operational environments, and security risks; initially establish a risk management strategy; take relatively comprehensive information security control measures; timely detect system anomalies and security incidents; execute and maintain emergency response capabilities to prevent incidents from escalating and mitigate impacts; and basically restore the operation of industrial control systems affected by security incidents. |
The information security of Level 2 industrial control systems should be protected and managed by the enterprise in accordance with national management norms and technical standards, as well as under the guidance of national authorities and information security regulatory departments. |
Level 3 Industrial Control System |
Will cause significant damage to key areas of industrial production operations, or loss to critical areas of industrial production operations, or serious damage to environmental safety, social order, public interest, and human life, or damage to national security (especially national economic security). |
Should enable the industrial control system to resist malicious threats from hostile organizations and organized groups with moderate resources, serious environmental threats, particularly severe accidental threats, and other threats of comparable harm level. |
Should at least have a comprehensive understanding of system assets, operational environments, and security risks; establish a risk management strategy; implement information security governance; take comprehensive information security control measures; ensure consistency with the organization’s risk management strategy; timely and comprehensively monitor system anomalies and security incidents; execute and maintain emergency response capabilities to prevent incidents from escalating and mitigate impacts; and restore the operation of industrial control systems affected by security incidents. |
Should receive protection and management from the enterprise according to national management norms and technical standards, as well as supervision and inspection from national authorities and information security regulatory departments. |
Level 4 Industrial Control System |
Will cause significant damage to critical areas of industrial production operations, or particularly severe damage to environmental safety, social order, public interest, and human life, or serious damage to national security (especially national economic security). |
Should enable the industrial control system to resist malicious threats from hostile organizations with abundant resources, particularly severe environmental threats, particularly severe accidental threats, and other threats of comparable harm level. |
Should at least have a comprehensive understanding of system assets, operational environments, and security risks; establish a comprehensive risk management strategy; implement information security governance; take comprehensive information security control measures; ensure consistency with the organization’s risk management strategy; continuously and comprehensively monitor system anomalies and security incidents; take necessary response measures; execute and maintain emergency response capabilities to prevent incidents from escalating and mitigate impacts; and timely restore the operation of industrial control systems affected by security incidents. |
Should receive management from the enterprise according to national management norms and technical standards, as well as enhanced supervision and inspection from national authorities and information security regulatory departments. |

Importance of Industrial Control System Assets |
Industry Field of Industrial Control Systems |
|||
General Area |
Key Area |
Critical Area |
||
Asset Value |
General asset role value and general acquisition value |
1 |
2 |
3 |
Asset role value is general and acquisition value is very high |
2 |
3 |
4 |
|
Asset role value is moderate |
2 |
3 |
4 |
|
Asset role value is very high |
3 |
4 |
5 |
Potential Impact Degree After Harm |
Degree of Harm |
|||
General Damage |
Serious Damage |
Particularly Serious Damage |
||
Harmed Object |
Industrial control system and related production device safety |
1 |
2 |
3 |
Industrial production safety and the legitimate rights and interests and important property security of citizens, enterprises, and other organizations |
1 |
2 |
3 |
|
Social order, public interest, environmental safety, and human life safety |
2 |
3 |
4 |
|
National Security (especially national economic security) |
3 |
4 |
5 |

Likelihood of Information Security Incidents |
Ease of Exploitability of Inherent Vulnerabilities |
|||
Low |
Medium |
High |
||
Threat Occurrence Frequency |
Low |
1 |
2 |
3 |
Medium |
2 |
3 |
4 |
|
High |
3 |
4 |
5 |
Asset Importance Characteristic Value |
Potential Impact Degree After Harm Characteristic Value |
Degree of Information Security Threats to Resist Characteristic Value |
||||
1 |
2 |
Level 1 (1) |
Level 1 (2) |
Level 1 (3) |
Level 1 (4) |
Level 2 (5) |
2 |
1 |
Level 1 (2) |
Level 1 (3) |
Level 1 (4) |
Level 2 (5) |
Level 2 (6) |
3 |
1 |
Level 1 (3) |
Level 1 (4) |
Level 2 (5) |
Level 2 (6) |
Level 2 (7) |
4 |
1 |
Level 1 (4) |
Level 2 (5) |
Level 2 (6) |
Level 2 (7) |
Level 3 (8) |
5 |
1 |
Level 2 (5) |
Level 2 (6) |
Level 2 (7) |
Level 3 (8) |
Level 3 (9) |
1 |
2 |
Level 1 (3) |
Level 1 (4) |
Level 2 (5) |
Level 2 (6) |
Level 2 (7) |
2 |
2 |
Level 1 (4) |
Level 2 (5) |
Level 2 (6) |
Level 2 (7) |
Level 3 (8) |
3 |
2 |
Level 2 (5) |
Level 2 (6) |
Level 2 (7) |
Level 3 (8) |
Level 3 (9) |
4 |
2 |
Level 2 (6) |
Level 2 (7) |
Level 3 (8) |
Level 3 (9) |
Level 3 (10) |
5 |
2 |
Level 2 (7) |
Level 3 (8) |
Level 3 (9) |
Level 3 (10) |
Level 4 (11) |
1 |
3 |
Level 1 (3) |
Level 1 (4) |
Level 2 (5) |
Level 2 (6) |
Level 2 (7) |
2 |
3 |
Level 1 (4) |
Level 2 (5) |
Level 2 (6) |
Level 2(7) |
Level 3 (8) |
3 |
3 |
Level 2 (5) |
Level 2 (6) |
Level 2 (7) |
Level 3 (8) |
Level 3 (9) |
4 |
3 |
Level 2 (6) |
Level 2 (7) |
Level 3 (8) |
Level 3 (9) |
Level 3 (10) |
5 |
3 |
Level 2 (7) |
Level 3 (8) |
Level 3 (9) |
Level 3 (10) |
Level 4 (11) |
1 |
4 |
Level 1 (4) |
Level 2 (5) |
Level 2 (6) |
Level 2 (7) |
Level 3 (8) |
2 |
4 |
Level 2 (5) |
Level 2 (6) |
Level 2 (7) |
Level 3 (8) |
Level 3 (9) |
3 |
4 |
Level 2 (6) |
Level 2 (7) |
Level 3 (8) |
Level 3 (9) |
Level 3 (10) |
4 |
4 |
Level 2 (7) |
Level 3 (8) |
Level 3 (9) |
Level 3 (10) |
Level 4 (11) |
5 |
4 |
Level 3 (8) |
Level 3 (9) |
Level 3 (10) |
Level 4 (11) |
Level 4 (12) |

The Classification Guidelines provide rules and methods for classifying information security levels based on the risk impact of industrial control systems, propose classification models and elements, and clarify the characteristics of potential risk impacts, information security threats, information security capabilities, and information security management across various levels of industrial control systems. They are applicable to industrial automation production enterprises and relevant administrative management departments, providing guidance for the classification of information security levels in industrial control systems, and can also provide more scientific and accurate classification methods and guidance for numerous industrial enterprises in the process of establishing security protection, especially compliance with graded protection.


Beijing Winut Technology Co., Ltd. (hereinafter referred to as “Winut”) is a leading enterprise in industrial control network security in China, one of the six companies in the world to receive the ISASecure CRT Tool certification from the International Society of Automation, and the only founding member of the Global Cybersecurity Alliance (GCA) of the International Society of Automation (ISA) in the Asia-Pacific region.
As a national high-tech enterprise, Winut focuses on innovative “white environment” overall solutions and has independently developed a full range of dedicated products for industrial control network security, holding 52 invention patents, 50 software copyrights, and 52 original vulnerability proofs as core intellectual property. Winut actively leads and participates in the formulation of national and industry standards in the field of industrial control network security, and has been invited to successfully complete network security tasks for major events such as the 70th anniversary of New China, the 19th National Congress of the Communist Party of China, and the Two Sessions, receiving high recognition from national government departments such as the Central Cyberspace Affairs Commission, the Ministry of Public Security, and the Ministry of Industry and Information Technology. To date, Winut has successfully provided comprehensive and effective security guarantees for over 1,000 industrial enterprises in key national industries such as electric power, rail transit, petroleum and petrochemicals, military industry, tobacco, municipal administration, smart manufacturing, and metallurgy.
Winut is committed to its mission of “focusing on industrial control and safeguarding security,” dedicated to ensuring the cybersecurity of critical information infrastructure in China!



Channel Cooperation Consulting: Mr. Zhang 18201311186
Manuscript Cooperation: WeChat: Luo_xiaoran