Submitted:
18 February 2026
Posted:
25 February 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Background and Related Work
1.1.1. Maintenance Engineering, Quality and Resilience
1.1.2. Industrial Cybersecurity Standards: IEC 62443 Series
1.1.3. EU Cyber Resilience Act and Regulatory Context
1.1.4. ISO/IEC 17025 in Cybersecurity Testing
2. Materials and Methods
2.1. Research Design
2.2. Data Analysis
2.2.1. Dataset Preparation and Anonymization
- ETSI TS 103 701 assessment workbook [33] (EN 303 645 aligned), including an Implementation Conformance Statement (ICS) view, an assessment view with verdicts per test case and per test group, and a reviewed “final review” version.
- IEC 62443 program audit action plan: a nonconformity-driven improvement log (NCR-based) capturing findings and corrective actions related to methodology completeness, TRF/report integrity, and evidence traceability.
- ISO/IEC 17025 internal audit report: internal audit scope, nonconformities, corrective actions, and closure dates used as a proxy for management-system “maintenance” responsiveness.
- Laboratory method and toolchain governance artefacts (ISO/IEC 17025 clause instantiations), including a method selection/verification/validation procedure, a method validation form, a controlled list of cybersecurity test methods, and a Used Computer Master List supporting controlled toolchains.
2.2.2. Quantitative Analysis
- applicability/claim status (Claimed: Yes/No/blank for conditional not applicable),
- requirement type (Mandatory vs Recommended; Conditional flags),
- support indicator (evidence present vs not),
- verdict at test group level (PASS / FAIL / INCONCLUSIVE / NO / NA),
- reviewer comment presence (notes and review columns).
- Conformity Statement Ambiguity Index (CSAI): measures how often a conformity statement cannot be made because decision rules and evidence are insufficient [34].
- Verdict transition counts (draft → reviewed): a transition matrix capturing how many provisions changed from INCONCLUSIVE/FAIL to PASS (or remained unresolved).
- Evidence traceability ratio (ETSI review items): proportion of reviewer-flagged items where the final review explicitly references concrete evidence artefacts (e.g., document references, captures) [35].
2.2.3. Qualitative Analysis
- Method governance & validation depth (method selection, verification, validation, deviations)
- Technical records & traceability (what evidence supports each verdict, how it is referenced)
- Reporting integrity & decision rules (how verdicts are derived and stated)
- Nonconforming work / corrective action (how gaps are tracked and closed)
- Plan: scope definition, requirement selection, decision rules, milestones
- Do: controlled execution, toolchain baselines, evidence collection
- Check: peer review, consistency checks, re-evaluation triggers
- Act: corrective actions, template updates, governance refinements
3. Results
3.1. Coverage of ISO/IEC 17025 Requirements with Cybersecurity Artefacts
- Method identification and control: a controlled List of Methods assigns internal identifiers to cybersecurity activities (e.g., ETSI/RED-aligned testing, IEC 62443 process/product assessments, vulnerability testing/pentesting). This supports repeatability by anchoring each project to a defined method baseline rather than relying on informal “test approach” narratives.
- Method verification/validation governance: a formal method procedure explicitly requires validation depth proportional to changes in scope and deviations and recognizes performance characteristics relevant to cybersecurity testing (e.g., robustness, repeatability/reproducibility, and uncertainty in results interpretation).
- Toolchain control: the presence of a Used Computer Master List and authorised usage records provides a lightweight mechanism to document test environment identity and software update state—critical in cybersecurity testing where scanner versions, firmware images, and tool configurations can change outcomes.
- Project workflow integration: the RED/ETSI/IEC 62443 work instruction includes explicit steps from application evaluation to conformity assessment, report packaging, and technical review/closeout. This creates a direct governance bridge between ISO/IEC 17025 management controls and cybersecurity assurance deliverables.
3.2. ETSI TS 103 701 (EN 303 645 Aligned) Assessment Outcomes
3.2.1. Dataset Structure
- Applicable/claimed: 40 provisions
- Not claimed: 6 provisions
- Blank/not applicable (conditional not met / out of scope): 22 provisions
3.2.2. Draft vs. Reviewed Verdict Distributions
| Verdict category | Draft assessment | Reviewed assessment |
| PASS | 0 | 38 |
| INCONCLUSIVE | 40 | 2 |
| FAIL | 1 | 1 |
| NO (explicit “not claimed”) | 0 | 5 |
3.2.3. Verdict Transition Analysis
| Transition | Count |
| INCONCLUSIVE → PASS | 37 |
| FAIL → PASS | 1 |
| INCONCLUSIVE → INCONCLUSIVE | 2 |
| INCONCLUSIVE → FAIL | 1 |
| NA → NA | 22 |
| NA → NO | 5 |
3.2.4. Ambiguity Reduction Indicator
3.2.5. Reviewer Comments and Evidence Traceability
- ~75% referenced IXIT updates (documentation additions to support repeatable testing), and
- ~83% referenced specific evidence artefacts (e.g., named documents, captures), indicating strengthened traceability.
3.3. IEC 62443 Audit Action Plan Results
- Methodology/workflow incompleteness (NCR 3 dominant): The methodology was in draft status and missing explicit steps (e.g., identifying requirements in scope and maturity level for the chosen certification scenario).
- Scope and scenario definition errors (NCR 4 dominant): Plan of Evaluation contained incorrect/ambiguous certification scenarios, indicating insufficient control of the “Plan” stage and its downstream impact on reporting and conformity interpretation.
- TRF/report integrity issues (NCR 4 and NCR 5 dominant): Report numbering conflicts, combining multiple certification scenarios into one report, and modifying template sections not intended for modification—directly affecting comparability and credibility of conformity statements.
- Evidence traceability requirements: Repeated emphasis that evidence must be described with sufficient metadata (type/version/chapter/date), consistent with ISO/IEC 17025 expectations for technical records and reproducibility.
3.4. ISO/IEC 17025 Internal Audit Findings as Governance “Maintenance” Signals
4. Discussion
4.1. Why the Results Support ISO/IEC 17025 Operationalisation for Cybersecurity Testing
- tool-driven measurements (scanner outputs, captures, logs),
- expert judgement (triage, exploitability interpretation, applicability decisions),
- rapidly changing methods (tool versions, threat patterns),
- conditional applicability (requirements depend on architecture, configuration, and interfaces).
4.2. Decision Rules as the Primary Lever for Ambiguity Reduction
- “Inconclusive” is not a failure of testing; it is a controlled quality state: Where evidence expectations are recognised but not met, preserving an inconclusive outcome prevents false passes and enables later reassessment without reconstructing context.
- “Not applicable” and “not claimed” require strict constraints. Mandatory expectations cannot be de-risked by re-labelling them as “unclaimed.” This boundary condition is precisely where formal decision rules add value: they make the line between “out of scope” and “nonconforming” explicit and auditable. In practice, this argues for a decision-rule structure that is standard-aware (ETSI/EN 303 645, EN 18031, IEC 62443) and interface-aware (ICS/IXIT conditions), and that explicitly encodes when NA is permissible.
4.3. Traceability and Comparability: Why Controlled Toolchains and Evidence Packages Matter
- Report template misfit for qualitative cybersecurity tests (e.g., references to uncertainty estimation where qualitative PASS/FAIL is used; confusion between outsourced vs externalised work terminology), which can introduce interpretive noise and inconsistent reporting expectations (Clause 7.8.3).
- Weak amendment and re-issuance traceability, where a re-issued report retains the original identifier instead of using a unique identifier and explicit linkage, reducing auditability over time (Clause 7.8.8).
- Incomplete governance records for external service providers, notably cloud hosting, which creates both confidentiality risk and reproducibility ambiguity when the execution environment is externalised (Clause 6.6.2).
- Document control sensitivity points, including periodic review and consistent revision-state identification, which directly affects whether a given test was executed under the correct controlled method and template revision (Clauses 8.2/8.3 – points sensibles).
4.4. The Assurance Maintenance Loop as a Cyber-Maintenance Control System
- Plan (scope, decision rules, risk model): Assessment findings show that when decision rules are underspecified and conformity statements are blurred with client self-declarations, the entire assurance chain becomes fragile (Clauses 7.1.3 and 7.8.6). The same applies to risk and opportunity management: missing cyber-specific risks (e.g., IT system operational blockage, data quality/non-quality, external equipment integrity/security) and the absence of residual-risk treatment or periodic re-evaluation limit the management system’s ability to anticipate and prevent governance failures (Clause 8.5).
- Do (controlled execution and technical records): Execution quality depends on controlled templates, fit-for-purpose reporting for qualitative outcomes, controlled external-provider interfaces (including cloud services), and disciplined technical records. The findings around reporting content and external provider records indicate that “doing” in cyber labs includes maintaining the trust boundary around tooling, environments, and outsourced/externalised components.
- Check (review, internal audit, inter-lab validity mechanisms): The ETSI dataset demonstrates that completeness checks and peer review materially change outcomes (INCONCLUSIVE → PASS) by resolving ambiguity rather than by adding tests. The assessment dataset reinforces that “Check” must also include fit-for-purpose validity mechanisms: qualitative PASS/FAIL domains require different inter-lab comparison criteria than quantitative measurement domains, and a participation plan is expected (Clause 7.7.2). Additionally, competence assurance in this stage includes demonstrable auditor competence and relevant cybersecurity-testing expertise for the internal audit function (Clause 8.8.2 – point sensible).
- Act (corrective actions as governance maintenance actions): Nonconformity action plans (programme-level) and internal audit corrective actions are the “maintenance actions” that update procedures, templates, decision rules, competence records, and risk registers. The key maintenance property is closure with verification—the governance analogue of restoring availability after downtime. The assessment process also makes closure timeliness explicit (action plan submission and evidence windows), which can be treated as a measurable maintenance parameter
4.5. Proposed Measurable Cyber-Maintenance Indicators
- Conformity Statement Ambiguity Index (CSAI): rate of INCONCLUSIVE outcomes among claimed items. Interpretation: evidence/decision-rule maturity; reflects “assurance uptime.”
- Scope Misclassification Count: number of mandatory requirements incorrectly marked NA/unclaimed (or moved outside scope without an auditable rule). Interpretation: decision-rule boundary failures with direct compliance impact.
- Decision Rule Coverage Ratio: share of projects/reports in which the decision rule is explicitly documented, traceable to the applicable specification, and applied consistently across provisions (contract review → report). Motivation: assessment findings explicitly flag decision-rule ambiguity and the need to align conformity reporting with ILAC-style expectations (Clauses 7.1.3 and 7.8.6).
- Evidence Traceability Ratio: share of provisions whose verdict includes explicit references to versioned artefacts (captures/logs/config snapshots/tool versions). Interpretation: reproducibility and audit readiness; predictor of comparability across labs/time.
- Report Amendment Integrity Rate: proportion of amended/re-issued reports that use a unique identifier and explicit linkage to the original report they replace. Motivation: assessment findings show that weak amendment traceability degrades longitudinal comparability and audit defensibility (Clause 7.8.8).
- External Service Governance Coverage: share of externally provided services (including cloud hosting) with documented evaluation, risk treatment, and retained records. Motivation: assessment findings show governance records may omit cloud providers despite their security and confidentiality implications (Clause 6.6.2).
- Corrective Action Lead Time: time from NCR creation to verified closure (internal audit + programme action plans). Interpretation: governance MTTR; measures how quickly the lab restores “assurance availability.”
5. Conclusions
- Multi-lab inter-comparison designs for qualitative cybersecurity outcomes, including performance criteria that are meaningful for PASS/FAIL and mixed judgement/evidence methods (explicitly motivated by Clause 7.7.2 findings on unsuitable quantitative criteria and missing participation planning).
- Longitudinal tracking of toolchain drift (tool versions, rulesets, cloud environments) and its effect on verdict reproducibility and evidence interpretability.
- Expanded decision-rule engineering for mixed judgement/evidence-driven methods, with explicit acceptance criteria, treatment of partial evidence, and strict NA constraints, aligned with ILAC-style conformity logic (motivated by Clauses 7.1.3 and 7.8.6).
- Strengthened governance instrumentation, including: formal amendment traceability for re-issued reports (Clause 7.8.8), systematic document revision control (Clauses 8.2/8.3 – points sensibles), and explicit cyber-risk scoring scales/residual-risk treatment and periodic review triggers (Clause 8.5).
- Competence frameworks tailored to cybersecurity testing, leveraging competence guidance (e.g., ISO/IEC 19896-3 is flagged as a training recommendation in the assessment points sensibles) and ensuring internal auditors can audit both management-system and cyber-testing specifics.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
| Abbreviation | Definition |
| CRA | Cyber Resilience Act |
| RED | Radio Equipment Directive |
| IEC | International Electrotechnical Commission |
| ISO/IEC | International Organization for Standardization / International Electrotechnical Commission |
| ILAC | International Laboratory Accreditation Cooperation |
| ETSI | European Telecommunications Standards Institute |
| IACS | Industrial Automation and Control Systems |
| IoT | Internet of Things |
| IIoT | Industrial Internet of Things |
| PDCA | Plan–Do–Check–Act |
| RCM | Reliability-Centered Maintenance |
| ICS | Implementation Conformance Statement |
| IXIT | Implementation eXtra Information for Testing |
| NCR | Nonconformity Report |
| TRF | Test Report Form |
| ITSEF | IT Security Evaluation Facility |
| EUCC | European Cybersecurity Certification Scheme |
References
- International Electrotechnical Commission (IEC). Industrial communication networks – Network and system security – Part 3-3: System security requirements and security levels (IEC 62443-3-3:2013), Edition 1.0; IEC: Geneva, Switzerland, 2013.
- ISO. ISO/IEC 17025:2017 General requirements for the competence of testing and calibration laboratories; International Organization for Standardization: Geneva, Switzerland, 2017. Available online: https://www.iso.org/standard/66912.html (accessed on 15 February 2026).
- Smith, A.; Hinchcliffe, G. R. RCM3: Risk-Based Reliability Centered Maintenance; Momentum Press, 2014. [Google Scholar]
- Molęda, M.; Małysiak-Mrozek, B.; Ding, W.; Sunderam, V.; Mrozek, D. From Corrective to Predictive Maintenance—A Review of Maintenance Approaches for the Power Industry. Sensors 2023, 23(13), 5970. [Google Scholar] [CrossRef] [PubMed]
- National Institute of Standards and Technology (NIST). Guide to Operational Technology (OT) Security (SP 800-82 Rev. 3); NIST: Gaithersburg, MD, USA, 2023. [Google Scholar] [CrossRef]
- International Electrotechnical Commission (IEC). IEC 62443-2-1:2010 Industrial communication networks – Network and system security – Part 2-1: Establishing an industrial automation and control system security program; IEC: Geneva, Switzerland, 2010.
- International Society of Automation (ISA). ISA/IEC 62443 Series of Standards. Available online: https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards (accessed on 15 February 2026).
- European Union. Directive 2014/53/EU of the European Parliament and of the Council of 16 April 2014 on the harmonisation of the laws of the Member States relating to the making available on the market of radio equipment (Radio Equipment Directive). Official Journal of the European Union. 2014. Available online: https://eur-lex.europa.eu/eli/dir/2014/53/oj/eng (accessed on 15 February 2026).
- European Commission. Commission Delegated Regulation (EU) 2022/30 of 29 October 2021 supplementing Directive 2014/53/EU with regard to the application of the essential requirements referred to in Article 3(3)(d), (e) and (f). Official Journal of the European Union. 2022. Available online: https://eur-lex.europa.eu/eli/reg_del/2022/30/oj/eng (accessed on 15 February 2026).
- European Commission. Commission Implementing Decision (EU) 2025/138 of 28 January 2025 amending Implementing Decision (EU) 2022/2191 as regards harmonised standards in support of the essential requirements of Directive 2014/53/EU that relate to cybersecurity. Official Journal of the European Union. 2025. Available online: https://eur-lex.europa.eu/eli/dec_impl/2025/138/oj/eng (accessed on 15 February 2026).
- European Union. Regulation (EU) 2024/2847 of the European Parliament and of the Council of 23 October 2024 on horizontal cybersecurity requirements for products with digital elements (Cyber Resilience Act). Official Journal of the European Union. 2024. Available online: https://eur-lex.europa.eu/eli/reg/2024/2847/oj/eng (accessed on 15 February 2026).
- Hall, T.; Nicholson, K.J.; Rogers, D.J. Cybersecurity Testing—Good Practice Guide; National Physical Laboratory (NPL): Teddington, UK, 2018. [Google Scholar]
- IntuitionLabs. ISO/IEC 17025: A Complete Guide to Lab Accreditation; IntuitionLabs, 2025. Available online: https://intuitionlabs.ai/pdfs/iso-iec-17025-a-complete-guide-to-lab-accreditation.pdf (accessed on 15 February 2026).
- SentinelOne. Cybersecurity Metrics & KPIs: What to Track in 2026; SentinelOne, 2026. Available online: https://www.sentinelone.com/cybersecurity-101/cybersecurity/cybersecurity-metrics/ (accessed on 15 February 2026).
- LLumin. Cybersecurity Best Practices for Maintenance Systems; LLumin, 2025. Available online: https://llumin.com/blog/cybersecurity-best-practices-for-maintenance-systems/ (accessed on 15 February 2026).
- Information Risk Analysis in Laboratories Complying with ISO/IEC 17025 Standard. ResearchGate. 2025. Available online: https://www.researchgate.net/publication/396118377_Information_Risk_Analysis_in_Laboratories_Complying_with_ISOIEC_17025_Standard (accessed on 15 February 2026).
- Cyber, Industrial. Cybersecurity Best Practices in the Manufacturing Sector. Industrial Cyber. 2024. Available online: https://industrialcyber.co/manufacturing/cybersecurity-best-practices-in-the-manufacturing-sector/ (accessed on 15 February 2026).
- IEC. IEC 60300-3-11:2009. Dependability management - Part 3-11: Application guide - Reliability centred maintenance; International Electrotechnical Commission: Geneva, Switzerland, 2009.
- Towards Maintenance 5.0: Resilience-Based Maintenance in AI; Preprints.org. 2025. Available online: https://www.preprints.org/manuscript/202507.0345 (accessed on 15 February 2026).
- Werbińska-Wojciechowska, S.; Winiarska, K. Maintenance Performance in the Age of Industry 4.0: A Bibliometric Performance Analysis and a Systematic Literature Review. Sensors 2023, 23, 1409. [Google Scholar] [CrossRef] [PubMed]
- Cortés-Leal, A.; Cárdenas, C.; Del-Valle-Soto, C. Maintenance 5.0: Towards a Worker-in-the-Loop Framework for Resilient Smart Manufacturing. Appl. Sci. 2022, 12, 11330. [Google Scholar] [CrossRef]
- ABS Group. How Cybersecurity Drives Reliability and Maintenance Performance; ABS Group: Spring, TX, USA, 2026; Available online: https://www.abs-group.com/Knowledge-Center/Insights/How-Cybersecurity-Drives-Reliability-and-Maintenance-Performance/ (accessed on 15 February 2026).
- International Electrotechnical Commission (IEC). IEC 62443-4-1:2018 Security for industrial automation and control systems – Part 4-1: Secure product development lifecycle requirements; IEC: Geneva, Switzerland, 2018.
- International Electrotechnical Commission (IEC). IEC TR 62443-2-3:2015 Security for industrial automation and control systems – Part 2-3: Patch management in the IACS environment; IEC: Geneva, Switzerland, 2015.
- European Parliament and Council. Regulation (EU) 2024/2847 of the European Parliament and of the Council of 23 October 2024 on horizontal cybersecurity requirements for products with digital elements and amending Regulations (EU) No 168/2013 and (EU) 2019/1020 and Directive (EU) 2020/1828 (Cyber Resilience Act); Official Journal of the European Union: Brussels, Belgium, 2024; L_202402847.
- European Commission. Cyber Resilience Act; European Commission: Brussels, Belgium, 2024; Available online: https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act (accessed on 15 February 2026).
- Lovells, Hogan. EU Cyber Resilience Act: Key 2026 milestones toward CRA compliance; Hogan Lovells: London, UK, 2026; Available online: https://www.hoganlovells.com/en/publications/eu-cyber-resilience-act-getting-ready-for-cra-compliance-in-2026 (accessed on 15 February 2026).
- International Laboratory Accreditation Cooperation (ILAC). ILAC-G8:09/2019 Guidelines on Decision Rules and Statements of Conformity; ILAC, 2019. Available online: https://www.iasonline.org/wp-content/uploads/2021/03/ILAC_G8_09_2019.pdf (accessed on 15 February 2026).
- ISO/IEC. ISO/IEC 13528:2022 Statistical methods for use in proficiency testing by interlaboratory comparison; International Organization for Standardization: Geneva, Switzerland, 2022.
- European Commission. Commission Implementing Regulation (EU) 2024/482 of 31 January 2024 laying down rules for the application of Regulation (EU) 2019/881 as regards the adoption of the European Common Criteria-based cybersecurity certification scheme (EUCC); Official Journal of the European Union: Brussels, Belgium, 2024; p. L_202400482. [Google Scholar]
- ISO/IEC. ISO/IEC 19896-3:2018 IT security techniques — Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators; International Organization for Standardization: Geneva, Switzerland, 2018.
- ETSI. ETSI EN 303 645 V2.1.1 (2020-06) Cyber Security for Consumer Internet of Things: Baseline Requirements. ETSI, 2020. Available online: https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf (accessed on 15 February 2026).
- ETSI. ETSI TS 103 701 V1.1.1: Cyber Security for Consumer Internet of Things: Conformance Assessment of Baseline Requirements; European Telecommunications Standards Institute: Sophia Antipolis, France, 2021.
- JCGM. JCGM 106:2012 Evaluation of measurement data – The role of measurement uncertainty in conformity assessment; Joint Committee for Guides in Metrology: Sèvres, France, 2012. [Google Scholar]
- ISO. ISO 9000:2015 Quality management systems — Fundamentals and vocabulary; International Organization for Standardization: Geneva, Switzerland, 2015. [Google Scholar]
- Kuckartz, U.; Rädiker, S. Qualitative Content Analysis: Methods, Practice and Software; SAGE Publications: London, UK, 2023. [Google Scholar]
- ISO/IEC. ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection — Information security management systems — Requirements; International Organization for Standardization: Geneva, Switzerland, 2022.
- IECEE. IECEE 02:2023 System of Conformity Assessment Schemes for Electrotechnical Equipment and Components (IECEE System) - Rules of Procedure; International Electrotechnical Commission: Geneva, Switzerland, 2023.
- ISO/IEC. ISO/IEC 27004:2016 Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation; International Organization for Standardization: Geneva, Switzerland, 2016. (Note: ISO/IEC 27004 provides the formal framework for assessing the performance of information security management systems through measurable indicators, perfectly supporting your KPI argument).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).