{"id":438908,"date":"2024-10-20T08:06:08","date_gmt":"2024-10-20T08:06:08","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-243922023\/"},"modified":"2024-10-26T15:10:47","modified_gmt":"2024-10-26T15:10:47","slug":"bs-iso-iec-243922023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-243922023\/","title":{"rendered":"BS ISO\/IEC 24392:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5 Overview <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6 IIP-specific security threats to industrial internet platforms 6.1 Characteristics of IIPs <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.2 Security threats to IIPs <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7 Security reference model of industrial internet platform 7.1 General 7.2 Security domains of IIPs 7.2.1 General <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 7.2.2 Edge security domain 7.2.3 Cloud infrastructure security domain <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.2.4 Platform security domain 7.2.5 Application security domain 7.3 System life cycle 7.3.1 General <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7.3.2 Development and production stage <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7.3.3 Utilization and support stage <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7.3.4 Retirement stage <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.4 Business scenarios and roles 7.4.1 General 7.4.2 Production optimization <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.4.3 Product customization 7.4.4 Multilevel security production <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.4.5 Transnational cooperation <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 8 Security objectives and controls for IIPs 8.1 Security objectives <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 8.2 Security controls 8.2.1 General 8.2.2 Physical security <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 8.2.3 Network security 8.2.4 Access security <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 8.2.5 Communication security 8.2.6 System security <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 8.2.7 Application security 8.2.8 Operation and maintenance security <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 8.2.9 Security management <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Annex A (informative) Typical IIP use cases <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Cybersecurity. Security reference model for industrial internet platform (SRM- IIP)<\/b><\/p>\n |