IEEE 2600 2008
$58.50
IEEE Standard for Information Technology: Hardcopy Device and System Security
Published By | Publication Date | Number of Pages |
IEEE | 2008 | 187 |
New IEEE Standard – Active. This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security, and information security) for manufacturers, users, and others on the selection, installation, configuration, and usage of hardcopy devices (HCDs) and systems, including printers, copiers, and multifunction devices (MFDs), and the computer systems that support these devices. This standard identifies security exposures for these HCDs and systems, and instructs manufacturers and software developers on appropriate security capabilities to include in their devices and systems, and instructs users on appropriate ways to use these security capabilities.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 2600™-2008 Front cover |
3 | Title page |
6 | Introduction Notice to users Laws and regulations Copyrights Updating of IEEE documents |
7 | Errata Interpretations Patents |
8 | Participants |
10 | Contents |
11 | IMPORTANT NOTICE 1. Overview 1.1 Scope 1.2 Purpose |
12 | 1.3 Document structure |
13 | 2. Definitions, special terms, acronyms, and abbreviations 2.1 Definitions 2.2 Special terms |
17 | 2.3 Acronyms and abbreviations |
23 | 3. Introduction to hardcopy devices 3.1 Hardcopy device overview 3.2 Generic architecture |
26 | 3.3 Similarities and differences between HCDs and other IT devices |
28 | 3.4 Determining the appropriate security strategy for an HCD |
31 | 4. Operational environments 4.1 Background 4.2 Operational Environment A |
36 | 4.3 Operational Environment B |
41 | 4.4 Operational Environment C |
43 | 4.5 Operational Environment D |
46 | 4.6 Choosing the most applicable operational environment |
48 | 5. Hardcopy device assets 5.1 Overview 5.2 HCD asset definitions |
49 | 5.3 Asset values in the operational environments |
51 | 6. Hardcopy device threats 6.1 Overview 6.2 Threat summaries |
54 | 6.3 Threat vectors and descriptions |
79 | 6.4 Threat risk levels |
81 | 7. Threat mitigation techniques 7.1 Mitigating threats to HCD Availability |
93 | 7.2 Mitigating threats to HCD Physical Resources |
96 | 7.3 Mitigating threats to HCD User Document and User Function Data |
113 | 7.4 Mitigating threats to HCD Confidential and Protected Data |
122 | 7.5 Mitigating threats to HCD software |
124 | 7.6 Mitigating threats to the HCD External Environment |
127 | 8. Compliance 8.1 Compliance security objectives for HCD manufacturers |
138 | 8.2 Compliance security objectives for IT professionals |
146 | Annex A (informative) Best practices A.1 Overview A.2 Best practices for HCD architecture, design, deployment, and usage |
156 | A.3 Best practices for physical security |
160 | A.4 Best practices for network data confidentiality, integrity, and non-repudiation |
162 | A.5 Best practices for configuration management |
165 | A.6 Best practices for identification, authentication, and authorization |
175 | A.7 Best practices for data security |
178 | A.8 Best practices for logging and auditability |
179 | A.9 Best practices for availability of service |
181 | Annex B (informative) Bibliography |