BSI PD IEC GUIDE 120:2018
$142.49
Security aspects. Guidelines for their inclusion in publications
Published By | Publication Date | Number of Pages |
BSI | 2018 | 32 |
This document provides guidelines on the security topics to be covered in IEC publications, and aspects of how to implement them. These guidelines can be used as a checklist for the combination of publications used in implementation of systems.
This document includes what is often referred to as “cyber security”.
This document excludes non electrotechnical aspects of security such as societal security, except where they directly interact with electrotechnical security.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
4 | CONTENTS |
6 | FOREWORD |
8 | INTRODUCTION |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
11 | 4 Guide to terminology 4.1 General |
12 | 4.2 Primary recommended sources 4.3 Other relevant sources 4.3.1 General 4.3.2 Other application-domain independent sources 4.3.3 Other application-domain specific sources |
13 | 5 Categorisation of publications 5.1 Overview 5.2 Publication type 5.2.1 General Figures Figure 1 – Possible categorization of publications |
14 | 5.2.2 Base security publications 5.2.3 Group security publications Figure 2 – Types of publications |
15 | 5.2.4 Product security publications 5.2.5 Guidance security publications 5.2.6 Test security publications 5.2.7 Relationship between types of security publications 5.3 Application domain |
16 | 5.4 Content 5.5 User/target group 5.6 Developing security publications 5.6.1 Base security publications |
17 | 5.6.2 Group security publications 5.6.3 Product security publications 5.6.4 Guidance security publications and test security publications |
18 | 6 Mapping/overview of publications 6.1 General 6.2 List of relevant publications 6.3 Domain table chart Figure 3 – Publications and application domains |
19 | 7 Considerations for publications development 7.1 Practical considerations for publication writers 7.2 Development process of security in publications Figure 4 – Example of security requirements, threats, and possible attacks |
21 | Figure 5 – Decision flow chart |
22 | 7.3 Interrelation between functional safety and security Figure 6 – Interrelation between functional safety and security |
23 | 7.4 Specific requirements 7.4.1 Relationship with base security publications 7.4.2 Consider conformity assessment when writing standards |
24 | 7.4.3 Lifecycle approach 7.4.4 Holistic system view Figure 7 – Example of security management cycle for an organization |
25 | 7.4.5 Vulnerability handling 7.4.6 Defence-in-depth 7.4.7 Security management 7.4.8 Supply chain Figure 8 – Selected measures for defence-in-depth strategy |
26 | 7.4.9 Consider greenfield and brownfield 7.4.10 Use of term integrity 7.5 Security risk assessment 7.5.1 General |
27 | 7.5.2 Iterative process of security risk assessment and risk mitigation 7.5.3 Maintaining safe operation Figure 9 – Possible impact of security risk(s) on the safety-related control system |
28 | 7.5.4 Scenario analysis 7.5.5 Security risk mitigation strategy 7.5.6 Validation |
29 | Bibliography |