BS ISO/IEC 20243-1:2023 – TC
$217.84
Tracked Changes. Information technology. Open Trusted Technology ProviderTM Standard (O-TTPS) – Requirements and recommendations for mitigating maliciously tainted and counterfeit products
Published By | Publication Date | Number of Pages |
BSI | 2024 | 95 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
52 | undefined |
56 | Foreword |
58 | Preface |
60 | Trademarks |
61 | Introduction |
63 | 1 Scope |
64 | 1.1 Conformance 1.2 Future Directions 2 Normative references 3 Terms and definitions |
71 | 4 Business Context and Overview 4.1 Business Environment Summary 4.1.1 Operational Scenario |
73 | 4.2 Business Rationale 4.2.1 Business Drivers |
74 | 4.2.2 Objectives and Benefits |
75 | 4.3 Recognizing the COTS ICT Context |
76 | 4.4 Overview 4.4.1 O-TTPF Overview |
77 | 4.4.2 O-TTPS Overview 4.4.3 Relationship with Other Standards |
78 | 5 O-TTPS – Tainted and Counterfeit Risks |
79 | 6 O-TTPS – Requirements for Addressing the Risks of Tainted and Counterfeit Products |
80 | 6.1 Technology Development |
81 | 6.1.1 PD: Product Development/Engineering Method 6.1.1.1 PD_DES: Software/Firmware/Hardware Design Process 6.1.1.2 PD_CFM: Configuration Management |
82 | 6.1.1.3 PD_MPP: Well-Defined Development/Engineering Method Process and Practices 6.1.1.4 PD_QAT: Quality and Test Management 6.1.1.5 PD_PSM: Product Sustainment Management |
83 | 6.1.2 SE: Secure Development/Engineering Method 6.1.2.1 SE_TAM: Threat Analysis and Mitigation 6.1.2.2 SE_RTP: Run-Time Protection Techniques |
84 | 6.1.2.3 SE_VAR: Vulnerability Analysis and Response 6.1.2.4 SE_PPR: Product Patching and Remediation |
85 | 6.1.2.5 SE_SEP: Secure Engineering Practices 6.1.2.6 SE_MTL: Monitor and Assess the Impact of Changes in the Threat Landscape |
86 | 6.2 Supply Chain Security 6.2.1 SC: Supply Chain Security Method 6.2.1.1 SC_RSM: Risk Management |
87 | 6.2.1.2 SC_PHS: Physical Security 6.2.1.3 SC_ACC: Access Controls |
88 | 6.2.1.4 SC_ESS: Employee and Supplier Security and Integrity 6.2.1.5 SC_BPS: Business Partner Security |
89 | 6.2.1.6 SC_STR: Supply Chain Security Training 6.2.1.7 SC_ISS: Information Systems Security 6.2.1.8 SC_TTC: Trusted Technology Components |
90 | 6.2.1.9 SC_STH: Secure Transmission and Handling |
91 | 6.2.1.10 SC_OSH: Open Source Handling 6.2.1.11 SC_CTM: Counterfeit Mitigation |
92 | 6.2.1.12 SC_MAL: Malware Detection |
93 | Bibliography |