BS ISO 8102-20:2022
$167.15
Electrical requirements for lifts, escalators and moving walks – Cybersecurity
Published By | Publication Date | Number of Pages |
BSI | 2022 | 44 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
7 | Foreword |
8 | Introduction |
9 | 1 Scope |
10 | 2 Normative references 3 Terms, definitions and abbreviated terms 3.1 Terms and definitions |
11 | 3.2 Abbreviated terms 4 Secure development lifecycle for lifts, escalators and moving walks 4.1 General |
12 | 4.2 Security management 4.2.1 Development process 4.2.2 Identification of responsibilities 4.2.3 Identification of applicability 4.2.4 Security expertise 4.2.5 Process scoping 4.2.6 File integrity 4.2.7 Development environment security 4.2.8 Controls for private keys 4.2.9 Security requirements for externally provided components 4.2.10 Custom developed components from third-party suppliers |
13 | 4.2.11 Assessing and addressing security-related issues 4.2.12 Process verification 4.2.13 Continuous improvement 4.3 Specification of security requirements 4.3.1 Product security context 4.3.2 Threat model 4.3.3 Product security requirements 4.3.4 Product security requirements content 4.3.5 Security requirements review 4.4 Secure by design 4.4.1 Secure design principles 4.4.2 Defense in depth design 4.4.3 Security design review 4.4.4 Secure design best practices |
14 | 4.5 Secure implementation 4.5.1 Security implementation review 4.5.2 Secure coding standards 4.6 Security verification and validation testing 4.6.1 Security requirements testing 4.6.2 Threat mitigation testing 4.6.3 Vulnerability testing 4.6.4 Penetration testing 4.6.5 Independence of testers 4.7 Management of security-related issues 4.7.1 Receiving notifications of security-related issues 4.7.2 Reviewing security-related issues 4.7.3 Assessing security-related issues 4.7.4 Addressing security-related issues |
15 | 4.7.5 Disclosing security-related issues 4.7.6 Periodic review of security defect management practice 4.8 Security update management 4.8.1 Security update qualification 4.8.2 Security update documentation 4.8.3 Dependent component or operating system security update documentation 4.8.4 Security update delivery 4.8.5 Timely delivery of security patches 4.9 Security guidelines 4.9.1 Product defense in depth 4.9.2 Defense in depth measures expected in the environment 4.9.3 Security hardening guidelines |
16 | 4.9.4 Secure disposal guidelines 4.9.5 Secure operation guidelines 4.9.6 Account management guidelines 4.9.7 Documentation review 5 Security requirements 5.1 General 5.2 Foundational requirements 5.3 Domains of the EUC functions |
18 | 5.4 EUC security level requirements |
19 | 5.5 Selection of security controls and countermeasures 5.6 Common security constraints 5.6.1 General 5.6.2 Support of essential functions 5.6.3 Compensating countermeasures 5.6.4 Least privilege |
20 | 5.6.5 Software development process 6 Information for use |
22 | Annex A (informative) Additional information on secure development lifecycle for lifts, escalators and moving walks |
34 | Annex B (informative) Additional information on how to apply the general method of risk assessments |
38 | Annex C (informative) List of security practices |
40 | Annex D (informative) Guidance for application of zones and conduits |
43 | Bibliography |