{"id":451326,"date":"2024-10-20T09:17:14","date_gmt":"2024-10-20T09:17:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-20243-22023\/"},"modified":"2024-10-26T17:18:36","modified_gmt":"2024-10-26T17:18:36","slug":"bs-iso-iec-20243-22023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-20243-22023\/","title":{"rendered":"BS ISO\/IEC 20243-2:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Preface <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Trademarks <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 1 Scope 1.1 Conformance 1.2 Future Directions 2 Normative references <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4 General Concepts 4.1 The O-TTPS <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4.2 Assessment Concepts: Relevance of Scope of Assessment and Selected Representative Products 4.3 Relevance of IT Technology Provider Categories in the Supply Chain <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5 Assessment Requirements 5.1 General Requirements for Assessor Activities 5.1.1 General Requirements for Evidence of Conformance <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6 Assessor Activities for O-TTPS Requirements <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.1 PD_DES: Software\/Firmware\/Hardware Design Process <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.2 PD_CFM: Configuration Management <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.3 PD_MPP: Well-Defined Development\/Engineering Method Process and Practices 6.4 PD_QAT: Quality and Test Management <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 6.5 PD_PSM: Product Sustainment Management <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 6.6 SE_TAM: Threat Analysis and Mitigation <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.7 SE_VAR: Vulnerability Analysis and Response <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 6.8 SE_PPR: Product Patching and Remediation <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 6.9 SE_SEP: Secure Engineering Practices <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 6.10 SE_MTL: Monitor and Assess the Impact of Changes in the Threat Landscape <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 6.11 SC_RSM: Risk Management <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 6.12 SC_PHS: Physical Security <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 6.13 SC_ACC: Access Controls <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 6.14 SC_ESS: Employee and Supplier Security and Integrity <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 6.15 SC_BPS: Business Partner Security <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 6.16 SC_STR: Supply Chain Security Training <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 6.17 SC_ISS: Information Systems Security 6.18 SC_TTC: Trusted Technology Components <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 6.19 SC_STH: Secure Transmission and Handling <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 6.20 SC_OSH: Open Source Handling <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 6.21 SC_CTM: Counterfeit Mitigation <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 6.22 SC_MAL: Malware Detection <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | Annex A ASSESSMENT GUIDANCE <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Annex B ASSESSMENT REPORT TEMPLATE <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Open Trusted Technology ProviderTM<\/sup> Standard (O-TTPS) – Assessment procedures for the O-TTPS<\/b><\/p>\n |