{"id":1322,"date":"2026-01-11T22:07:23","date_gmt":"2026-01-11T21:07:23","guid":{"rendered":"https:\/\/digitale-faszination.de\/2026\/01\/11\/draft-en-50742\/"},"modified":"2026-01-13T21:47:05","modified_gmt":"2026-01-13T20:47:05","slug":"draft-en-50742","status":"publish","type":"post","link":"https:\/\/digitale-faszination.de\/en\/2026\/01\/11\/draft-en-50742\/","title":{"rendered":"EN 50742: New draft standard for cybersecurity of machines"},"content":{"rendered":"\n<p>The new <strong>EU Machinery Regulation (EU) 2023\/1230<\/strong> introduces binding <strong>cybersecurity requirements for machinery<\/strong> for the first time. It applies to <strong>all machinery placed on the market from 20 January 2027 onwards<\/strong>. <\/p>\n\n<p>Cybersecurity thus becomes an explicit part of the regulatory framework for machine manufacturers \u2013 <strong>not as a general IT security requirement<\/strong>, but only <strong>where cyberattacks can affect the safety of machinery<\/strong>.<\/p>\n\n<p>To specify these new legal requirements, the <strong>harmonised standard EN 50742 \u201cProtection against corruption\u201d<\/strong> is currently under development. The draft standard is currently available only in English, for example via <strong>BSI<\/strong> and <strong>DIN Media<\/strong>. A German version is expected shortly.  <\/p>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n<h2 class=\"wp-block-heading\">What does the draft standard EN 50742 regulate?<\/h2>\n\n<p>EN 50742 defines requirements and recommendations to <strong>prevent accidental and intentional (including malicious) manipulation of machinery<\/strong> that could lead to hazardous situations.<\/p>\n\n<p>The scope of the standard includes <strong>hardware components, software and data<\/strong>, if they could influence the <strong>safety<\/strong> of the machine.<\/p>\n\n<p>EN 50742 is therefore not a <strong>general cybersecurity standard<\/strong>, but a <strong>machine-specific standard focused on safety-related parts of machinery and machinery components<\/strong>.<\/p>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n<h2 class=\"wp-block-heading\">Key insight of the standard<\/h2>\n\n<p>One central statement of EN 50742 is:<\/p>\n\n<p><strong>Vulnerabilities do not create new hazards,<br \/>but their exploitation can compromise existing protective measures.<\/strong><\/p>\n\n<p>For this reason, the standard consistently builds on the <strong>established safety process<\/strong> that machine manufacturers already apply today.<\/p>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n<h2 class=\"wp-block-heading\">Procedure according to EN 50742<\/h2>\n\n<p>The standard defines a clearly structured sequence of steps:<\/p>\n\n<h3 class=\"wp-block-heading\">1. Risk assessment according to ISO 12100<\/h3>\n\n<p>First, a <strong>risk assessment according to ISO 12100<\/strong> must be performed.<br \/>As before, <strong>all potential hazards of the machine are identified<\/strong> and <strong>appropriate protective measures<\/strong> are defined.<\/p>\n\n<p>This risk assessment forms the <strong>basis<\/strong> for all subsequent steps.<\/p>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n<h3 class=\"wp-block-heading\">2. Definition of the Security Context<\/h3>\n\n<p>The next step is to define the <strong>Security Context<\/strong> of the machine.<\/p>\n\n<p>The Security Context describes the <strong>conditions under which the cybersecurity of the machine is ensured<\/strong>. In cybersecurity, the Security Context corresponds to what is referred to in safety standards as the \u201cintended use\u201d. <\/p>\n\n<p>The Security Context must be clearly defined and <strong>documented in the operating instructions<\/strong>.<\/p>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n<h3 class=\"wp-block-heading\">3. Threat assessment<\/h3>\n\n<p>Based on the <strong>Security Context<\/strong> as well as the identified <strong>hazards and protective measures<\/strong>, <strong>a Threat Assessment<\/strong> must then be carried out.<\/p>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n<h2 class=\"wp-block-heading\">Principles for handling vulnerabilities<\/h2>\n\n<p>For dealing with identified vulnerabilities, EN 50742 defines three clear principles:<\/p>\n\n<ol class=\"wp-block-list\">\n<li><strong>Eliminate<\/strong><br \/>Vulnerabilities must be eliminated wherever they can lead to hazardous situations.<\/li>\n\n\n\n<li><strong>Mitigate<\/strong><br \/>If elimination is not possible, vulnerabilities must be mitigated.<\/li>\n\n\n\n<li><strong>Inform<\/strong><br \/>For all remaining vulnerabilities, the user information must contain all necessary details on appropriate countermeasures.<\/li>\n<\/ol>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n<h2 class=\"wp-block-heading\">Two alternative implementation approaches<\/h2>\n\n<p>For the practical implementation of the requirements, EN 50742 provides two equivalent alternatives:<\/p>\n\n<h3 class=\"wp-block-heading\">Alternative A \u2013 EN 50742 based approach<\/h3>\n\n<p>This approach is aimed at companies that <strong>do not already work according to the IEC 62443 series of standards<\/strong>.<\/p>\n\n<p>Using the parameters:<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Exposure Level<\/strong><\/li>\n\n\n\n<li><strong>Attacker Capability Score<\/strong><\/li>\n\n\n\n<li><strong>Window of Opportunity Score<\/strong><\/li>\n<\/ul>\n\n<p>an <strong>Attack Potential<\/strong> is determined.<\/p>\n\n<p>In combination with the Severity Level derived from the ISO 12100 risk assessment, a<br \/><strong>Safety-Related Security Requirement (SRSL) <\/strong>is defined.<\/p>\n\n<p>For each SRSL, the standard specifies concrete requirements, for example for<strong> authentication<\/strong>.<\/p>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n<h3 class=\"wp-block-heading\">Alternative B &#8211; IEC 62443 based approach<\/h3>\n\n<p>Companies already applying <strong>IEC 62443<\/strong> may use this approach:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Implementation of a secure development process according to <strong>IEC 62443-4-1<\/strong><\/li>\n\n\n\n<li>Implementation of machine requirements according to <strong>IEC 62443-3-3<\/strong><\/li>\n\n\n\n<li>Implementation of component requirements according to <strong>IEC 62443-4-2<\/strong><\/li>\n<\/ul>\n\n<p>For each requirement, the necessary <strong>Security Level<\/strong> is defined.<\/p>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n<h2 class=\"wp-block-heading\">Supporting annexes of the standard<\/h2>\n\n<p>The draft standard includes several practical annexes:<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Annex A<\/strong>: Examples of logging formats<\/li>\n\n\n\n<li><strong>Annex B<\/strong>: Threat assessment<\/li>\n\n\n\n<li><strong>Annex C<\/strong>: Threat modelling for safety systems<\/li>\n\n\n\n<li><strong>Annex D<\/strong>: List of threats and possible mitigations<\/li>\n<\/ul>\n\n<p>These annexes support manufacturers in the practical implementation of the standard.<\/p>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n<h2 class=\"wp-block-heading\">Why machine manufacturers should act now<\/h2>\n\n<p>With the draft of <strong>EN 50742<\/strong>, a concrete basis is available for the first time to implement the <strong>cybersecurity requirements of the Machinery Regulation<\/strong> in practice.<\/p>\n\n<p>Even though the final version of the standard may still be several months away, <strong>waiting is the wrong approach<\/strong>:<br \/>All machinery and safety-related components placed on the market <strong>after 20 January 2027<\/strong> must comply with the requirements of the Machinery Regulation \u2013 including its cybersecurity aspects.<\/p>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n<h2 class=\"wp-block-heading\">Support for implementation<\/h2>\n\n<p>We support <strong>machine manufacturers and component suppliers<\/strong> with our <strong>decades of experience in cybersecurity and automation technology<\/strong> in implementing EN 50742.<\/p>\n\n<p>Use our <a href=\"https:\/\/digitale-faszination.de\/en\/request\/\" data-type=\"page\" data-id=\"233\">contact form<\/a> to get in touch \u2013 our ISO 3691-4 expert will respond promptly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new EU Machinery Regulation (EU) 2023\/1230 introduces binding cybersecurity requirements for machinery for the first time. It applies to all machinery placed on the market from 20 January 2027 onwards. Cybersecurity thus becomes an explicit part of the regulatory framework for machine manufacturers \u2013 not as a general IT security requirement, but only where&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/digitale-faszination.de\/en\/2026\/01\/11\/draft-en-50742\/\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":1321,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1322","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nicht-kategorisiert"],"_links":{"self":[{"href":"https:\/\/digitale-faszination.de\/en\/wp-json\/wp\/v2\/posts\/1322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitale-faszination.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitale-faszination.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitale-faszination.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/digitale-faszination.de\/en\/wp-json\/wp\/v2\/comments?post=1322"}],"version-history":[{"count":5,"href":"https:\/\/digitale-faszination.de\/en\/wp-json\/wp\/v2\/posts\/1322\/revisions"}],"predecessor-version":[{"id":1339,"href":"https:\/\/digitale-faszination.de\/en\/wp-json\/wp\/v2\/posts\/1322\/revisions\/1339"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitale-faszination.de\/en\/wp-json\/wp\/v2\/media\/1321"}],"wp:attachment":[{"href":"https:\/\/digitale-faszination.de\/en\/wp-json\/wp\/v2\/media?parent=1322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitale-faszination.de\/en\/wp-json\/wp\/v2\/categories?post=1322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitale-faszination.de\/en\/wp-json\/wp\/v2\/tags?post=1322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}