{"id":446881,"date":"2024-10-20T08:49:01","date_gmt":"2024-10-20T08:49:01","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-23-30479527-dc-2023\/"},"modified":"2024-10-26T16:25:46","modified_gmt":"2024-10-26T16:25:46","slug":"bsi-23-30479527-dc-2023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-23-30479527-dc-2023\/","title":{"rendered":"BSI 23\/30479527 DC 2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions
3.1 General terms <\/td>\n<\/tr>\n
10<\/td>\n3.2 Terms related to organization <\/td>\n<\/tr>\n
11<\/td>\n3.3 Terms related to sectoral approach to cybersecurity <\/td>\n<\/tr>\n
12<\/td>\n3.4 Terms related to risk <\/td>\n<\/tr>\n
14<\/td>\n4 Abbreviations
5 Sectoral Cybersecurity Assessment
5.1 Application of the sectoral cybersecurity assessment methodology <\/td>\n<\/tr>\n
16<\/td>\n5.2 Principles and new capacities <\/td>\n<\/tr>\n
19<\/td>\n6 Sectoral representation of risk
6.1 Sectoral ICT systems
6.1.1 Sectoral ICT system components and their relationships
6.1.2 Multi-layered architecture of sectoral ICT system <\/td>\n<\/tr>\n
21<\/td>\n6.1.3 Risk \u2013based definitions of cybersecurity and assurance requirements in sectoral systems <\/td>\n<\/tr>\n
22<\/td>\n6.1.4 Sectoral ICT system architecture relevance for risk assessment <\/td>\n<\/tr>\n
23<\/td>\n6.1.5 Cybersecurity certification of sectoral ICT systems <\/td>\n<\/tr>\n
24<\/td>\n6.2 Consistent sectoral risk assessment <\/td>\n<\/tr>\n
25<\/td>\n6.3 Performing sectoral risk assessment
6.3.1 General <\/td>\n<\/tr>\n
26<\/td>\n6.3.2 Choosing an approach
6.3.3 Identifying business processes, objectives and requirements
6.3.4 Identifying primary and supporting assets <\/td>\n<\/tr>\n
27<\/td>\n6.3.5 Defining risk scenarios
6.3.6 Assessment of consequences in risk scenarios <\/td>\n<\/tr>\n
28<\/td>\n6.3.7 Assessment of likelihood in risk scenarios <\/td>\n<\/tr>\n
29<\/td>\n6.3.8 Adding the attacker perspective: assessment of attack potential <\/td>\n<\/tr>\n
30<\/td>\n6.3.9 Risk re-assessment for supporting assets
7 Normalized representation of risk, cybersecurity and assurance
7.1 Risk assessment results: meta-risk classes <\/td>\n<\/tr>\n
31<\/td>\n7.2 Risk-based definition of common security levels and selection of controls
7.2.1 General
7.2.2 Introducing Common Security Levels\u00a0(CSL) <\/td>\n<\/tr>\n
32<\/td>\n7.2.3 Applying Meta-risk Classes and Common Security Levels\u00a0for sectoral risk treatment
7.2.4 Attack Potential as criterion for selecting the CSL of controls
7.3 Consistent implementation of assurance
7.3.1 Introduction <\/td>\n<\/tr>\n
33<\/td>\n7.3.2 Definition of a common assurance reference concept based on ISO\/IEC\u00a015408 <\/td>\n<\/tr>\n
34<\/td>\n7.3.3 Applying CTI concept of attack potential to CAR
8 Mapping cybersecurity and assurance requirements to scheme\u2019s representation <\/td>\n<\/tr>\n
35<\/td>\nAnnex\u00a0A (informative)Examples of normalized scales in sectoral risk assessment
A.1 Qualitative approach for assessment of consequences <\/td>\n<\/tr>\n
36<\/td>\nA.2 Qualitative approach to likelihood assessment
A.3 Qualitative approach to risk estimation <\/td>\n<\/tr>\n
37<\/td>\nA.4 Qualitative approach to risk mitigation <\/td>\n<\/tr>\n
38<\/td>\nA.5 Addressing meta-risk classes by Common Assurance Reference classification <\/td>\n<\/tr>\n
39<\/td>\nAnnex\u00a0B (informative)CTI fundamentals
B.1 General <\/td>\n<\/tr>\n
40<\/td>\nB.2 Attacker types <\/td>\n<\/tr>\n
41<\/td>\nB.3 Characteristics of attackers <\/td>\n<\/tr>\n
45<\/td>\nB.4 Criteria for attack potential qualitative estimation
B.4.1 Characteristics: Opportunity
B.4.1.1 Area: System Access\/Knowledge <\/td>\n<\/tr>\n
47<\/td>\nB.4.1.2 Area: Vulnerabilities <\/td>\n<\/tr>\n
49<\/td>\nB.4.2 Characteristics: Means
B.4.2.1 Area: Capabilities and Resources <\/td>\n<\/tr>\n
51<\/td>\nB.4.2.2 Area: Skills <\/td>\n<\/tr>\n
53<\/td>\nB.4.3 Characteristic: Motives
B.4.3.1 Area: Valuation <\/td>\n<\/tr>\n
54<\/td>\nB.4.3.2 Area: Goals <\/td>\n<\/tr>\n
56<\/td>\nB.5 Estimating Attack potential using CTI approach
B.5.1 General
B.5.2 Characteristics: Opportunity <\/td>\n<\/tr>\n
57<\/td>\nB.5.3 Characteristics: Means
B.5.4 Characteristics: Motives <\/td>\n<\/tr>\n
58<\/td>\nB.5.5 Calculation of attack potential level (APL)
B.5.6 Finding equivalence between CTI and ISO\/IEC\u00a018045 for the attack potential estimation <\/td>\n<\/tr>\n
61<\/td>\nAnnex\u00a0C (informative)Application of Common Security Level approach – examples
C.1 General
C.2 Example use case: Mobile device-based authentication system <\/td>\n<\/tr>\n
63<\/td>\nC.3 Example use case: Protection against cloned devices and cheating vendors <\/td>\n<\/tr>\n
65<\/td>\nAnnex\u00a0D (informative)Example of assurance level mapping <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS EN 18037 Guidelines on a sectoral cybersecurity assessment<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n66<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":446892,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-446881","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/446881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/446892"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=446881"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=446881"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=446881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}