Shopping Cart

No products in the cart.

BSI PD IEC GUIDE 120:2018

$142.49

Security aspects. Guidelines for their inclusion in publications

Published By Publication Date Number of Pages
BSI 2018 32
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This document provides guidelines on the security topics to be covered in IEC publications, and aspects of how to implement them. These guidelines can be used as a checklist for the combination of publications used in implementation of systems.

This document includes what is often referred to as “cyber security”.

This document excludes non electrotechnical aspects of security such as societal security, except where they directly interact with electrotechnical security.

PDF Catalog

PDF Pages PDF Title
2 undefined
4 CONTENTS
6 FOREWORD
8 INTRODUCTION
9 1 Scope
2 Normative references
3 Terms and definitions
11 4 Guide to terminology
4.1 General
12 4.2 Primary recommended sources
4.3 Other relevant sources
4.3.1 General
4.3.2 Other application-domain independent sources
4.3.3 Other application-domain specific sources
13 5 Categorisation of publications
5.1 Overview
5.2 Publication type
5.2.1 General
Figures
Figure 1 – Possible categorization of publications
14 5.2.2 Base security publications
5.2.3 Group security publications
Figure 2 – Types of publications
15 5.2.4 Product security publications
5.2.5 Guidance security publications
5.2.6 Test security publications
5.2.7 Relationship between types of security publications
5.3 Application domain
16 5.4 Content
5.5 User/target group
5.6 Developing security publications
5.6.1 Base security publications
17 5.6.2 Group security publications
5.6.3 Product security publications
5.6.4 Guidance security publications and test security publications
18 6 Mapping/overview of publications
6.1 General
6.2 List of relevant publications
6.3 Domain table chart
Figure 3 – Publications and application domains
19 7 Considerations for publications development
7.1 Practical considerations for publication writers
7.2 Development process of security in publications
Figure 4 – Example of security requirements, threats, and possible attacks
21 Figure 5 – Decision flow chart
22 7.3 Interrelation between functional safety and security
Figure 6 – Interrelation between functional safety and security
23 7.4 Specific requirements
7.4.1 Relationship with base security publications
7.4.2 Consider conformity assessment when writing standards
24 7.4.3 Lifecycle approach
7.4.4 Holistic system view
Figure 7 – Example of security management cycle for an organization
25 7.4.5 Vulnerability handling
7.4.6 Defence-in-depth
7.4.7 Security management
7.4.8 Supply chain
Figure 8 – Selected measures for defence-in-depth strategy
26 7.4.9 Consider greenfield and brownfield
7.4.10 Use of term integrity
7.5 Security risk assessment
7.5.1 General
27 7.5.2 Iterative process of security risk assessment and risk mitigation
7.5.3 Maintaining safe operation
Figure 9 – Possible impact of security risk(s) on the safety-related control system
28 7.5.4 Scenario analysis
7.5.5 Security risk mitigation strategy
7.5.6 Validation
29 Bibliography
BSI PD IEC GUIDE 120:2018
$142.49