Shopping Cart

No products in the cart.

IEEE 2600 2008

$58.50

IEEE Standard for Information Technology: Hardcopy Device and System Security

Published By Publication Date Number of Pages
IEEE 2008 187
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

New IEEE Standard – Active. This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security, and information security) for manufacturers, users, and others on the selection, installation, configuration, and usage of hardcopy devices (HCDs) and systems, including printers, copiers, and multifunction devices (MFDs), and the computer systems that support these devices. This standard identifies security exposures for these HCDs and systems, and instructs manufacturers and software developers on appropriate security capabilities to include in their devices and systems, and instructs users on appropriate ways to use these security capabilities.

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 2600™-2008 Front cover
3 Title page
6 Introduction
Notice to users
Laws and regulations
Copyrights
Updating of IEEE documents
7 Errata
Interpretations
Patents
8 Participants
10 Contents
11 IMPORTANT NOTICE
1. Overview
1.1 Scope
1.2 Purpose
12 1.3 Document structure
13 2. Definitions, special terms, acronyms, and abbreviations
2.1 Definitions
2.2 Special terms
17 2.3 Acronyms and abbreviations
23 3. Introduction to hardcopy devices
3.1 Hardcopy device overview
3.2 Generic architecture
26 3.3 Similarities and differences between HCDs and other IT devices
28 3.4 Determining the appropriate security strategy for an HCD
31 4. Operational environments
4.1 Background
4.2 Operational Environment A
36 4.3 Operational Environment B
41 4.4 Operational Environment C
43 4.5 Operational Environment D
46 4.6 Choosing the most applicable operational environment
48 5. Hardcopy device assets
5.1 Overview
5.2 HCD asset definitions
49 5.3 Asset values in the operational environments
51 6. Hardcopy device threats
6.1 Overview
6.2 Threat summaries
54 6.3 Threat vectors and descriptions
79 6.4 Threat risk levels
81 7. Threat mitigation techniques
7.1 Mitigating threats to HCD Availability
93 7.2 Mitigating threats to HCD Physical Resources
96 7.3 Mitigating threats to HCD User Document and User Function Data
113 7.4 Mitigating threats to HCD Confidential and Protected Data
122 7.5 Mitigating threats to HCD software
124 7.6 Mitigating threats to the HCD External Environment
127 8. Compliance
8.1 Compliance security objectives for HCD manufacturers
138 8.2 Compliance security objectives for IT professionals
146 Annex A (informative) Best practices
A.1 Overview
A.2 Best practices for HCD architecture, design, deployment, and usage
156 A.3 Best practices for physical security
160 A.4 Best practices for network data confidentiality, integrity, and non-repudiation
162 A.5 Best practices for configuration management
165 A.6 Best practices for identification, authentication, and authorization
175 A.7 Best practices for data security
178 A.8 Best practices for logging and auditability
179 A.9 Best practices for availability of service
181 Annex B (informative) Bibliography
IEEE 2600 2008
$58.50