The paper trail under inspection¶
You have assets, threats, and controls mapped. Now the question is: can you prove it? Auditing is not about theory; it is about evidence. Every control, every mitigation, every claimed security measure must be traceable and verifiable. Gaps in documentation are as fatal as gaps in configuration.
Evidence types to check¶
Logs
System logs (controllers, SCADA, HMIs)
Network device logs (firewalls, switches, segmentation devices)
Security monitoring / SIEM alerts
Gap check: Missing logs, incomplete retention periods, or unassigned log owners are findings. Confirm logging covers all critical assets and events relevant to IEC 62443 requirements.
Device configurations
Baseline settings, secure defaults, firmware versions
Change history and configuration snapshots
Gap check: Untracked or undocumented changes, missing version records, or unmanaged devices are immediate gaps.
Network diagrams
Logical and physical topology, VLANs, zones, firewalls, and segmentation
Mapping of assets to zones
Gap check: Devices in the register not on diagrams, discrepancies between diagrams and deployed topology, or undocumented segmentation rules are findings.
Maintenance and lifecycle records
Updates, patches, preventative maintenance schedules
Decommissioning steps for retired assets
Gap check: Any lifecycle step not documented is a vulnerability. Confirm records exist for all controllers, sensors, and field devices.
Training and personnel documentation
Evidence of operator/engineer training, role awareness, incident response rehearsals
Gap check: Missing or outdated training records, unclear role responsibilities, or untested response procedures are findings.
Policy and procedure documentation
Asset management, change management, access control, network management, incident response
Gap check: Controls claimed in IEC 62443 mappings must have supporting policies. Missing or inconsistent documentation is a finding.
Practical gap‑spotting approach¶
Walk through each control and threat: is there documented evidence for it?
Ask: if an auditor asked for proof tomorrow, could you produce it immediately?
Cross-check assets ↔ controls ↔ logs/records ↔ diagrams. Anything missing is a gap.
Verify ownership: each piece of evidence should have a responsible party. Ambiguity is a finding.
Treat this page as a checklist for post-deployment inspection: if a threat exists without documented mitigation, monitoring, or ownership, it is a gap that must be closed before anyone audits the system.