BS ISO/IEC 20243-1:2023
$167.15
Information technology. Open Trusted Technology ProviderTM Standard (O-TTPS) – Requirements and recommendations for mitigating maliciously tainted and counterfeit products
Published By | Publication Date | Number of Pages |
BSI | 2023 | 44 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
6 | Foreword |
8 | Preface |
10 | Trademarks |
11 | Introduction |
13 | 1 Scope |
14 | 1.1 Conformance 1.2 Future Directions 2 Normative references 3 Terms and definitions |
21 | 4 Business Context and Overview 4.1 Business Environment Summary 4.1.1 Operational Scenario |
23 | 4.2 Business Rationale 4.2.1 Business Drivers |
24 | 4.2.2 Objectives and Benefits |
25 | 4.3 Recognizing the COTS ICT Context |
26 | 4.4 Overview 4.4.1 O-TTPF Overview |
27 | 4.4.2 O-TTPS Overview 4.4.3 Relationship with Other Standards |
28 | 5 O-TTPS – Tainted and Counterfeit Risks |
29 | 6 O-TTPS – Requirements for Addressing the Risks of Tainted and Counterfeit Products |
30 | 6.1 Technology Development |
31 | 6.1.1 PD: Product Development/Engineering Method 6.1.1.1 PD_DES: Software/Firmware/Hardware Design Process 6.1.1.2 PD_CFM: Configuration Management |
32 | 6.1.1.3 PD_MPP: Well-Defined Development/Engineering Method Process and Practices 6.1.1.4 PD_QAT: Quality and Test Management 6.1.1.5 PD_PSM: Product Sustainment Management |
33 | 6.1.2 SE: Secure Development/Engineering Method 6.1.2.1 SE_TAM: Threat Analysis and Mitigation 6.1.2.2 SE_RTP: Run-Time Protection Techniques |
34 | 6.1.2.3 SE_VAR: Vulnerability Analysis and Response 6.1.2.4 SE_PPR: Product Patching and Remediation |
35 | 6.1.2.5 SE_SEP: Secure Engineering Practices 6.1.2.6 SE_MTL: Monitor and Assess the Impact of Changes in the Threat Landscape |
36 | 6.2 Supply Chain Security 6.2.1 SC: Supply Chain Security Method 6.2.1.1 SC_RSM: Risk Management |
37 | 6.2.1.2 SC_PHS: Physical Security 6.2.1.3 SC_ACC: Access Controls |
38 | 6.2.1.4 SC_ESS: Employee and Supplier Security and Integrity 6.2.1.5 SC_BPS: Business Partner Security |
39 | 6.2.1.6 SC_STR: Supply Chain Security Training 6.2.1.7 SC_ISS: Information Systems Security 6.2.1.8 SC_TTC: Trusted Technology Components |
40 | 6.2.1.9 SC_STH: Secure Transmission and Handling |
41 | 6.2.1.10 SC_OSH: Open Source Handling 6.2.1.11 SC_CTM: Counterfeit Mitigation |
42 | 6.2.1.12 SC_MAL: Malware Detection |
43 | Bibliography |