{"id":436489,"date":"2024-10-20T07:54:47","date_gmt":"2024-10-20T07:54:47","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-2621-2-2022-7\/"},"modified":"2024-10-26T14:55:50","modified_gmt":"2024-10-26T14:55:50","slug":"ieee-2621-2-2022-7","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-2621-2-2022-7\/","title":{"rendered":"IEEE 2621.2-2022"},"content":{"rendered":"
New IEEE Standard – Active. A framework for a connected electronic product security evaluation program, with specific requirements and guidance relating to digital diabetes devices and solutions, such as insulin pumps is defined in this standard.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 2621.2\u2122-2022\/UL 2621-2:2022 Front Cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Security functional requirements summary <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 1. Overview 1.1 Scope 1.2 Purpose 1.3 Word usage <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 2. Normative references 3. Definitions, acronyms, and abbreviations 3.1 Definitions <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 3.2 Acronyms and abbreviations <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4. Conformance 4.1 Use of ISO\/IEC 15408 4.2 Conventions 4.3 Mandatory security functional requirements (SFRs) <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4.4 Optional security functional requirements (SFRs) <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4.5 Security assurance requirements (SARs) <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Annex A (informative) Security problem definition A.1.1 T.NETWORK (Network attack) A.1.2 T.PHYSICAL (Physical access) A.1.3 T.BAD_SOFTWARE (Malicious firmware or application) A.1.4 T.BAD_PEER (Malicious peer device) <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | A.1.5 T.WEAK_CRYPTO (Weak cryptography) A.2.1 A.PHYSICAL (Physical security precaution assumption) <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex B (informative) Security objectives B.1.1 O.COMMS (Protected communications) B.1.2 O.INTEGRITY (TOE integrity) B.1.3 O.STRONG_CRYPTO (Strong cryptography) B.2.1 OP.USER_AUTH (User authentication) B.2.2 OP.HW_PHYSICAL (Hardware physical protection) B.3.1 OE.USER_PHYSICAL (User physical protection) <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | B.3.2 OE.USER_AUTH (User authentication) <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex C (informative) Rationale <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Annex D (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Wireless Diabetes Device Security: Information Security Requirements for Connected Diabetes Solutions<\/b><\/p>\n |