2:I[231,["231","static/chunks/231-835e4e133e174214.js","244","static/chunks/app/services/iec-62443/page-da4cb33a11f9fa78.js"],""] 3:I[9275,[],""] 4:I[1343,[],""] 5:I[1495,["231","static/chunks/231-835e4e133e174214.js","173","static/chunks/173-75b0fc52072d60c2.js","185","static/chunks/app/layout-d43cda5ff6a0b0b5.js"],"default"] 6:I[8173,["231","static/chunks/231-835e4e133e174214.js","173","static/chunks/173-75b0fc52072d60c2.js","185","static/chunks/app/layout-d43cda5ff6a0b0b5.js"],"Image"] 0:["EQ628jkRUOoPiH_ipYx43",[[["",{"children":["services",{"children":["iec-62443",{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",{"children":["services",{"children":["iec-62443",{"children":["__PAGE__",{},[["$L1",[["$","section",null,{"className":"relative bg-brand-offwhite border-b border-brand-border py-24 overflow-hidden","children":[["$","div",null,{"className":"absolute inset-0 opacity-[0.03]","style":{"backgroundImage":"linear-gradient(rgba(255,101,10,0.6) 1px, transparent 1px), linear-gradient(90deg, rgba(255,101,10,0.6) 1px, transparent 1px)","backgroundSize":"60px 60px"}}],["$","div",null,{"className":"container-page relative","children":["$","div",null,{"className":"max-w-3xl","children":[["$","span",null,{"className":"badge badge-orange mb-4 inline-block","children":"IEC 62443-4"}],["$","h1",null,{"className":"text-4xl md:text-6xl font-bold text-brand-dark mb-6 font-heading","children":["Component Security",["$","br",null,{}],["$","span",null,{"className":"text-brand-accent","children":"for Industrial Devices"}]]}],["$","p",null,{"className":"text-xl text-brand-body leading-relaxed mb-8","children":"We help device manufacturers implement cybersecurity into their products — from structured threat modeling using STRIDE to hands-on implementation of security controls, aligned with IEC 62443-4-1 and IEC 62443-4-2."}],["$","div",null,{"className":"flex flex-wrap gap-4","children":[["$","$L2",null,{"href":"/contact","className":"btn-primary","children":"Request a Consultation"}],["$","$L2",null,{"href":"/blog","className":"btn-secondary","children":"Read Our Insights"}]]}]]}]}]]}],["$","section",null,{"className":"bg-brand-light border-b border-brand-border","children":["$","div",null,{"className":"container-page py-16","children":["$","div",null,{"className":"grid md:grid-cols-2 gap-12 items-start","children":[["$","div",null,{"children":[["$","h2",null,{"className":"text-2xl font-bold text-brand-dark mb-4 font-heading","children":"IEC 62443-4 at a Glance"}],["$","p",null,{"className":"text-brand-body leading-relaxed mb-4","children":"IEC 62443-4 defines security requirements at the component level — for the devices themselves, and for the processes used to develop them. Part 4-1 covers the secure development lifecycle; Part 4-2 defines the technical security requirements that a component must meet to achieve a given Security Level (SL 1–4)."}],["$","p",null,{"className":"text-brand-body leading-relaxed","children":"Security requirements in 4-2 are organized across seven Foundational Requirements (FRs). We assess your device against all seven and prioritize findings by risk."}]]}],["$","div",null,{"className":"space-y-2","children":[["$","div","FR 1",{"className":"flex items-center gap-4 py-2 border-b border-brand-border last:border-0","children":[["$","span",null,{"className":"text-xs font-bold font-mono text-brand-accent w-10 flex-shrink-0","children":"FR 1"}],["$","span",null,{"className":"text-sm text-brand-body","children":"Identification & Authentication Control"}]]}],["$","div","FR 2",{"className":"flex items-center gap-4 py-2 border-b border-brand-border last:border-0","children":[["$","span",null,{"className":"text-xs font-bold font-mono text-brand-accent w-10 flex-shrink-0","children":"FR 2"}],["$","span",null,{"className":"text-sm text-brand-body","children":"Use Control"}]]}],["$","div","FR 3",{"className":"flex items-center gap-4 py-2 border-b border-brand-border last:border-0","children":[["$","span",null,{"className":"text-xs font-bold font-mono text-brand-accent w-10 flex-shrink-0","children":"FR 3"}],["$","span",null,{"className":"text-sm text-brand-body","children":"System Integrity"}]]}],["$","div","FR 4",{"className":"flex items-center gap-4 py-2 border-b border-brand-border last:border-0","children":[["$","span",null,{"className":"text-xs font-bold font-mono text-brand-accent w-10 flex-shrink-0","children":"FR 4"}],["$","span",null,{"className":"text-sm text-brand-body","children":"Data Confidentiality"}]]}],["$","div","FR 5",{"className":"flex items-center gap-4 py-2 border-b border-brand-border last:border-0","children":[["$","span",null,{"className":"text-xs font-bold font-mono text-brand-accent w-10 flex-shrink-0","children":"FR 5"}],["$","span",null,{"className":"text-sm text-brand-body","children":"Restricted Data Flow"}]]}],["$","div","FR 6",{"className":"flex items-center gap-4 py-2 border-b border-brand-border last:border-0","children":[["$","span",null,{"className":"text-xs font-bold font-mono text-brand-accent w-10 flex-shrink-0","children":"FR 6"}],["$","span",null,{"className":"text-sm text-brand-body","children":"Timely Response to Events"}]]}],["$","div","FR 7",{"className":"flex items-center gap-4 py-2 border-b border-brand-border last:border-0","children":[["$","span",null,{"className":"text-xs font-bold font-mono text-brand-accent w-10 flex-shrink-0","children":"FR 7"}],["$","span",null,{"className":"text-sm text-brand-body","children":"Resource Availability"}]]}]]}]]}]}]}],["$","section",null,{"className":"container-page py-24","children":[["$","div",null,{"className":"mb-16","children":[["$","h2",null,{"className":"section-title","children":"Our IEC 62443-4 Services"}],["$","p",null,{"className":"section-subtitle","children":"From threat modeling to verified implementation — we work directly with your development team to build security into your device."}]]}],["$","div",null,{"className":"grid md:grid-cols-2 gap-6","children":[["$","div","IEC 62443-4-1: Secure Development Lifecycle",{"className":"card","children":[["$","h3",null,{"className":"text-lg font-semibold text-brand-dark mb-3 font-heading","children":"IEC 62443-4-1: Secure Development Lifecycle"}],["$","p",null,{"className":"text-brand-body text-sm leading-relaxed mb-4","children":"Establish a product security development process aligned with IEC 62443-4-1. We review and improve your existing SDL — covering security requirements, threat modeling, secure design, implementation guidelines, verification, and vulnerability management."}],["$","ul",null,{"className":"space-y-2","children":[["$","li","SDL gap assessment against 4-1 practices",{"className":"flex items-center gap-2 text-xs text-brand-body","children":[["$","svg",null,{"className":"w-3.5 h-3.5 text-brand-accent flex-shrink-0","fill":"none","viewBox":"0 0 24 24","stroke":"currentColor","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":2.5,"d":"M5 13l4 4L19 7"}]}],"SDL gap assessment against 4-1 practices"]}],["$","li","Process improvement recommendations",{"className":"flex items-center gap-2 text-xs text-brand-body","children":[["$","svg",null,{"className":"w-3.5 h-3.5 text-brand-accent flex-shrink-0","fill":"none","viewBox":"0 0 24 24","stroke":"currentColor","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":2.5,"d":"M5 13l4 4L19 7"}]}],"Process improvement recommendations"]}],["$","li","Security documentation templates",{"className":"flex items-center gap-2 text-xs text-brand-body","children":[["$","svg",null,{"className":"w-3.5 h-3.5 text-brand-accent flex-shrink-0","fill":"none","viewBox":"0 0 24 24","stroke":"currentColor","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":2.5,"d":"M5 13l4 4L19 7"}]}],"Security documentation templates"]}]]}]]}],["$","div","IEC 62443-4-2: Component Security Requirements",{"className":"card","children":[["$","h3",null,{"className":"text-lg font-semibold text-brand-dark mb-3 font-heading","children":"IEC 62443-4-2: Component Security Requirements"}],["$","p",null,{"className":"text-brand-body text-sm leading-relaxed mb-4","children":"Evaluate and specify security requirements at the component level. We assess your device against the IEC 62443-4-2 technical security requirements across all Foundational Requirements and target Security Levels."}],["$","ul",null,{"className":"space-y-2","children":[["$","li","Component security requirements specification",{"className":"flex items-center gap-2 text-xs text-brand-body","children":[["$","svg",null,{"className":"w-3.5 h-3.5 text-brand-accent flex-shrink-0","fill":"none","viewBox":"0 0 24 24","stroke":"currentColor","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":2.5,"d":"M5 13l4 4L19 7"}]}],"Component security requirements specification"]}],["$","li","FR/SL gap analysis",{"className":"flex items-center gap-2 text-xs text-brand-body","children":[["$","svg",null,{"className":"w-3.5 h-3.5 text-brand-accent flex-shrink-0","fill":"none","viewBox":"0 0 24 24","stroke":"currentColor","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":2.5,"d":"M5 13l4 4L19 7"}]}],"FR/SL gap analysis"]}],["$","li","Compensating control recommendations",{"className":"flex items-center gap-2 text-xs text-brand-body","children":[["$","svg",null,{"className":"w-3.5 h-3.5 text-brand-accent flex-shrink-0","fill":"none","viewBox":"0 0 24 24","stroke":"currentColor","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":2.5,"d":"M5 13l4 4L19 7"}]}],"Compensating control recommendations"]}]]}]]}],["$","div","STRIDE Threat Modeling",{"className":"card","children":[["$","h3",null,{"className":"text-lg font-semibold text-brand-dark mb-3 font-heading","children":"STRIDE Threat Modeling"}],["$","p",null,{"className":"text-brand-body text-sm leading-relaxed mb-4","children":"Structured threat analysis of your industrial device using the STRIDE methodology. We identify threats across Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege — and derive security requirements from the findings."}],["$","ul",null,{"className":"space-y-2","children":[["$","li","Data flow diagrams and trust boundaries",{"className":"flex items-center gap-2 text-xs text-brand-body","children":[["$","svg",null,{"className":"w-3.5 h-3.5 text-brand-accent flex-shrink-0","fill":"none","viewBox":"0 0 24 24","stroke":"currentColor","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":2.5,"d":"M5 13l4 4L19 7"}]}],"Data flow diagrams and trust boundaries"]}],["$","li","STRIDE threat register",{"className":"flex items-center gap-2 text-xs text-brand-body","children":[["$","svg",null,{"className":"w-3.5 h-3.5 text-brand-accent flex-shrink-0","fill":"none","viewBox":"0 0 24 24","stroke":"currentColor","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":2.5,"d":"M5 13l4 4L19 7"}]}],"STRIDE threat register"]}],["$","li","Security requirements derived from threats",{"className":"flex items-center gap-2 text-xs text-brand-body","children":[["$","svg",null,{"className":"w-3.5 h-3.5 text-brand-accent flex-shrink-0","fill":"none","viewBox":"0 0 24 24","stroke":"currentColor","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":2.5,"d":"M5 13l4 4L19 7"}]}],"Security requirements derived from threats"]}]]}]]}],["$","div","Security Implementation in Devices",{"className":"card","children":[["$","h3",null,{"className":"text-lg font-semibold text-brand-dark mb-3 font-heading","children":"Security Implementation in Devices"}],["$","p",null,{"className":"text-brand-body text-sm leading-relaxed mb-4","children":"Hands-on support for implementing security controls directly into your device firmware and software. We work with your development team to integrate authentication, access control, secure communication, and logging — correctly and efficiently."}],["$","ul",null,{"className":"space-y-2","children":[["$","li","Security architecture for the device",{"className":"flex items-center gap-2 text-xs text-brand-body","children":[["$","svg",null,{"className":"w-3.5 h-3.5 text-brand-accent flex-shrink-0","fill":"none","viewBox":"0 0 24 24","stroke":"currentColor","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":2.5,"d":"M5 13l4 4L19 7"}]}],"Security architecture for the device"]}],["$","li","Implementation guidance per control",{"className":"flex items-center gap-2 text-xs text-brand-body","children":[["$","svg",null,{"className":"w-3.5 h-3.5 text-brand-accent flex-shrink-0","fill":"none","viewBox":"0 0 24 24","stroke":"currentColor","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":2.5,"d":"M5 13l4 4L19 7"}]}],"Implementation guidance per control"]}],["$","li","Security verification test cases",{"className":"flex items-center gap-2 text-xs text-brand-body","children":[["$","svg",null,{"className":"w-3.5 h-3.5 text-brand-accent flex-shrink-0","fill":"none","viewBox":"0 0 24 24","stroke":"currentColor","children":["$","path",null,{"strokeLinecap":"round","strokeLinejoin":"round","strokeWidth":2.5,"d":"M5 13l4 4L19 7"}]}],"Security verification test cases"]}]]}]]}]]}]]}],["$","section",null,{"className":"bg-brand-light border-y border-brand-border","children":["$","div",null,{"className":"container-page py-24","children":[["$","div",null,{"className":"text-center mb-16","children":[["$","h2",null,{"className":"section-title","children":"How We Work"}],["$","p",null,{"className":"section-subtitle mx-auto text-center","children":"A structured process from scoping to verified security implementation."}]]}],["$","div",null,{"className":"grid md:grid-cols-5 gap-6","children":[["$","div","01",{"className":"relative","children":[["$","div",null,{"className":"hidden md:block absolute top-6 left-full w-full h-px bg-brand-border z-0","style":{"width":"calc(100% - 3rem)","left":"3rem"}}],["$","div",null,{"className":"relative z-10","children":[["$","div",null,{"className":"w-12 h-12 rounded-xl bg-brand-accent-light border border-brand-accent/30 flex items-center justify-center text-brand-accent font-bold text-sm mb-4 font-heading","children":"01"}],["$","h4",null,{"className":"text-brand-dark font-semibold text-sm mb-2 font-heading","children":"Scope & Context"}],["$","p",null,{"className":"text-brand-body text-xs leading-relaxed","children":"Define the component boundary, intended use environment, and target Security Level."}]]}]]}],["$","div","02",{"className":"relative","children":[["$","div",null,{"className":"hidden md:block absolute top-6 left-full w-full h-px bg-brand-border z-0","style":{"width":"calc(100% - 3rem)","left":"3rem"}}],["$","div",null,{"className":"relative z-10","children":[["$","div",null,{"className":"w-12 h-12 rounded-xl bg-brand-accent-light border border-brand-accent/30 flex items-center justify-center text-brand-accent font-bold text-sm mb-4 font-heading","children":"02"}],["$","h4",null,{"className":"text-brand-dark font-semibold text-sm mb-2 font-heading","children":"Threat Modeling"}],["$","p",null,{"className":"text-brand-body text-xs leading-relaxed","children":"STRIDE analysis to identify threats, attack vectors, and required mitigations."}]]}]]}],["$","div","03",{"className":"relative","children":[["$","div",null,{"className":"hidden md:block absolute top-6 left-full w-full h-px bg-brand-border z-0","style":{"width":"calc(100% - 3rem)","left":"3rem"}}],["$","div",null,{"className":"relative z-10","children":[["$","div",null,{"className":"w-12 h-12 rounded-xl bg-brand-accent-light border border-brand-accent/30 flex items-center justify-center text-brand-accent font-bold text-sm mb-4 font-heading","children":"03"}],["$","h4",null,{"className":"text-brand-dark font-semibold text-sm mb-2 font-heading","children":"Requirements"}],["$","p",null,{"className":"text-brand-body text-xs leading-relaxed","children":"Derive security requirements from threat findings and 4-2 Foundational Requirements."}]]}]]}],["$","div","04",{"className":"relative","children":[["$","div",null,{"className":"hidden md:block absolute top-6 left-full w-full h-px bg-brand-border z-0","style":{"width":"calc(100% - 3rem)","left":"3rem"}}],["$","div",null,{"className":"relative z-10","children":[["$","div",null,{"className":"w-12 h-12 rounded-xl bg-brand-accent-light border border-brand-accent/30 flex items-center justify-center text-brand-accent font-bold text-sm mb-4 font-heading","children":"04"}],["$","h4",null,{"className":"text-brand-dark font-semibold text-sm mb-2 font-heading","children":"Implementation"}],["$","p",null,{"className":"text-brand-body text-xs leading-relaxed","children":"Hands-on support implementing security controls into your device."}]]}]]}],["$","div","05",{"className":"relative","children":[false,["$","div",null,{"className":"relative z-10","children":[["$","div",null,{"className":"w-12 h-12 rounded-xl bg-brand-accent-light border border-brand-accent/30 flex items-center justify-center text-brand-accent font-bold text-sm mb-4 font-heading","children":"05"}],["$","h4",null,{"className":"text-brand-dark font-semibold text-sm mb-2 font-heading","children":"Verification"}],["$","p",null,{"className":"text-brand-body text-xs leading-relaxed","children":"Test and verify that implemented controls meet the specified requirements."}]]}]]}]]}]]}]}],["$","section",null,{"className":"container-page py-24","children":["$","div",null,{"className":"rounded-2xl bg-brand-dark p-12 text-center relative overflow-hidden","children":[["$","div",null,{"className":"absolute top-0 right-0 w-64 h-64 bg-brand-accent/10 rounded-full blur-3xl"}],["$","div",null,{"className":"relative","children":[["$","h2",null,{"className":"text-3xl font-bold text-white mb-4 font-heading","children":"Building security into your industrial device?"}],["$","p",null,{"className":"text-white/60 mb-8 max-w-xl mx-auto","children":"Whether you need a STRIDE threat model, a 4-2 gap assessment, or hands-on implementation support — we work directly with your engineering team."}],["$","$L2",null,{"href":"/contact","className":"btn-primary","children":"Get in Touch"}]]}]]}]}]]],null],null]},["$","$L3",null,{"parallelRouterKey":"children","segmentPath":["children","services","children","iec-62443","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined","styles":null}],null]},["$","$L3",null,{"parallelRouterKey":"children","segmentPath":["children","services","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined","styles":null}],null]},[["$","html",null,{"lang":"en","children":["$","body",null,{"children":[["$","$L5",null,{}],["$","main",null,{"className":"pt-16","children":["$","$L3",null,{"parallelRouterKey":"children","segmentPath":["children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":"404"}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],"notFoundStyles":[],"styles":null}]}],["$","footer",null,{"className":"bg-brand-footer mt-24","children":["$","div",null,{"className":"container-page py-16","children":[["$","div",null,{"className":"grid grid-cols-1 md:grid-cols-4 gap-12","children":[["$","div",null,{"className":"md:col-span-2","children":[["$","div",null,{"className":"flex items-center mb-4","children":["$","$L6",null,{"src":"/logo.png","alt":"Alsensio","width":140,"height":42,"className":"h-9 w-auto object-contain brightness-0 invert"}]}],["$","p",null,{"className":"text-brand-footer-muted text-sm leading-relaxed max-w-sm","children":"Industrial cybersecurity and functional safety consulting. We help OT/ICS organizations achieve IEC 62443 and IEC 61508 compliance through hands-on technical implementation."}],["$","div",null,{"className":"flex gap-4 mt-6","children":["$","a",null,{"href":"https://www.linkedin.com/company/18158810","target":"_blank","rel":"noopener noreferrer","className":"text-brand-footer-muted hover:text-brand-accent transition-colors","aria-label":"LinkedIn","children":["$","svg",null,{"className":"w-5 h-5","fill":"currentColor","viewBox":"0 0 24 24","children":["$","path",null,{"d":"M20.447 20.452h-3.554v-5.569c0-1.328-.027-3.037-1.852-3.037-1.853 0-2.136 1.445-2.136 2.939v5.667H9.351V9h3.414v1.561h.046c.477-.9 1.637-1.85 3.37-1.85 3.601 0 4.267 2.37 4.267 5.455v6.286zM5.337 7.433a2.062 2.062 0 01-2.063-2.065 2.064 2.064 0 112.063 2.065zm1.782 13.019H3.555V9h3.564v11.452zM22.225 0H1.771C.792 0 0 .774 0 1.729v20.542C0 23.227.792 24 1.771 24h20.451C23.2 24 24 23.227 24 22.271V1.729C24 .774 23.2 0 22.222 0h.003z"}]}]}]}]]}],[["$","div","Services",{"children":[["$","h4",null,{"className":"text-white font-semibold text-sm mb-4 font-heading","children":"Services"}],["$","ul",null,{"className":"space-y-3","children":[["$","li","/services/iec-62443",{"children":["$","$L2",null,{"href":"/services/iec-62443","className":"text-brand-footer-muted hover:text-brand-accent text-sm transition-colors","children":"IEC 62443 Consulting"}]}],["$","li","/services/iec-61508",{"children":["$","$L2",null,{"href":"/services/iec-61508","className":"text-brand-footer-muted hover:text-brand-accent text-sm transition-colors","children":"IEC 61508 Consulting"}]}]]}]]}],["$","div","Company",{"children":[["$","h4",null,{"className":"text-white font-semibold text-sm mb-4 font-heading","children":"Company"}],["$","ul",null,{"className":"space-y-3","children":[["$","li","/blog",{"children":["$","$L2",null,{"href":"/blog","className":"text-brand-footer-muted hover:text-brand-accent text-sm transition-colors","children":"Blog"}]}],["$","li","/contact",{"children":["$","$L2",null,{"href":"/contact","className":"text-brand-footer-muted hover:text-brand-accent text-sm transition-colors","children":"Contact"}]}]]}]]}]]]}],["$","div",null,{"className":"border-t border-white/10 mt-12 pt-8 flex flex-col sm:flex-row justify-between items-center gap-4","children":[["$","p",null,{"className":"text-brand-footer-muted text-xs","children":["© ",2026," Alsensio. All rights reserved."]}],["$","div",null,{"className":"flex items-center gap-4 text-brand-footer-muted text-xs","children":[["$","span",null,{"children":"IEC 62443 · IEC 61508 · OT/ICS Security"}],["$","$L2",null,{"href":"/impressum","className":"hover:text-brand-accent transition-colors","children":"Legal Notice"}],["$","$L2",null,{"href":"/privacy-policy","className":"hover:text-brand-accent transition-colors","children":"Privacy Policy"}]]}]]}]]}]}]]}]}],null],null],[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/64f30663f8b7844a.css","precedence":"next","crossOrigin":"$undefined"}]],"$L7"]]]] 7:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}],["$","meta","1",{"charSet":"utf-8"}],["$","title","2",{"children":"IEC 62443-4 Component Security Consulting | Alsensio"}],["$","meta","3",{"name":"description","content":"IEC 62443-4 consulting for device manufacturers — STRIDE threat modeling, security requirements specification, and hands-on implementation of security into industrial components."}],["$","meta","4",{"name":"keywords","content":"IEC 62443,IEC 61508,OT cybersecurity,ICS security,functional safety,industrial cybersecurity,IACS security,SIL assessment,cybersecurity consulting"}],["$","meta","5",{"name":"robots","content":"index, follow"}],["$","meta","6",{"property":"og:title","content":"IEC 62443-4 Component Security Consulting | Alsensio"}],["$","meta","7",{"property":"og:description","content":"IEC 62443-4 consulting for device manufacturers — STRIDE threat modeling, security requirements specification, and hands-on implementation of security into industrial components."}],["$","meta","8",{"property":"og:site_name","content":"Alsensio"}],["$","meta","9",{"property":"og:locale","content":"en_US"}],["$","meta","10",{"property":"og:type","content":"website"}],["$","meta","11",{"name":"twitter:card","content":"summary"}],["$","meta","12",{"name":"twitter:title","content":"IEC 62443-4 Component Security Consulting | Alsensio"}],["$","meta","13",{"name":"twitter:description","content":"IEC 62443-4 consulting for device manufacturers — STRIDE threat modeling, security requirements specification, and hands-on implementation of security into industrial components."}]] 1:null