{"id":438908,"date":"2024-10-20T08:06:08","date_gmt":"2024-10-20T08:06:08","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-243922023\/"},"modified":"2024-10-26T15:10:47","modified_gmt":"2024-10-26T15:10:47","slug":"bs-iso-iec-243922023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-243922023\/","title":{"rendered":"BS ISO\/IEC 24392:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
11<\/td>\n4 Abbreviated terms <\/td>\n<\/tr>\n
12<\/td>\n5 Overview <\/td>\n<\/tr>\n
14<\/td>\n6 IIP-specific security threats to industrial internet platforms
6.1 Characteristics of IIPs <\/td>\n<\/tr>\n
16<\/td>\n6.2 Security threats to IIPs <\/td>\n<\/tr>\n
20<\/td>\n7 Security reference model of industrial internet platform
7.1 General
7.2 Security domains of IIPs
7.2.1 General <\/td>\n<\/tr>\n
21<\/td>\n7.2.2 Edge security domain
7.2.3 Cloud infrastructure security domain <\/td>\n<\/tr>\n
22<\/td>\n7.2.4 Platform security domain
7.2.5 Application security domain
7.3 System life cycle
7.3.1 General <\/td>\n<\/tr>\n
23<\/td>\n7.3.2 Development and production stage <\/td>\n<\/tr>\n
24<\/td>\n7.3.3 Utilization and support stage <\/td>\n<\/tr>\n
25<\/td>\n7.3.4 Retirement stage <\/td>\n<\/tr>\n
27<\/td>\n7.4 Business scenarios and roles
7.4.1 General
7.4.2 Production optimization <\/td>\n<\/tr>\n
28<\/td>\n7.4.3 Product customization
7.4.4 Multilevel security production <\/td>\n<\/tr>\n
29<\/td>\n7.4.5 Transnational cooperation <\/td>\n<\/tr>\n
31<\/td>\n8 Security objectives and controls for IIPs
8.1 Security objectives <\/td>\n<\/tr>\n
32<\/td>\n8.2 Security controls
8.2.1 General
8.2.2 Physical security <\/td>\n<\/tr>\n
33<\/td>\n8.2.3 Network security
8.2.4 Access security <\/td>\n<\/tr>\n
34<\/td>\n8.2.5 Communication security
8.2.6 System security <\/td>\n<\/tr>\n
35<\/td>\n8.2.7 Application security
8.2.8 Operation and maintenance security <\/td>\n<\/tr>\n
36<\/td>\n8.2.9 Security management <\/td>\n<\/tr>\n
37<\/td>\nAnnex A (informative) Typical IIP use cases <\/td>\n<\/tr>\n
40<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Cybersecurity. Security reference model for industrial internet platform (SRM- IIP)<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n44<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":438918,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-438908","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/438908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/438918"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=438908"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=438908"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=438908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}