ImageVerifierCode 换一换
格式:PDF , 页数:59 ,大小:8.34MB ,
资源ID:236928      下载积分:12 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.wnwk.com/docdown/236928.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(IEC_62443-4-1-018.pdf)为本站会员(益****师)主动上传,蜗牛文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知蜗牛文库(发送邮件至admin@wnwk.com或直接QQ联系客服),我们立即给予删除!

IEC_62443-4-1-018.pdf

1、IEC1EC62443-4-1三Edition 1.0 2018-01INTERNATIONALSTANDARD6Security for industrial automation and control systems-Part 4-1:Secure product development lifecycle requirementsg1EC62443-4-1Edition 1.0 2018-01INTERNATIONALSTANDARD6Security for industrial automation and control systems-Part 4-1:Secure produ

2、ct development lifecycle requirementsINTERNATIONALELECTROTECHNICALCOMMISSION1CS25.040.40:35.0301SBN978-2-8322-5239-0Warning!Make sure that you obtained this publication from an authorized distributor.Registered trademark of the International Electrotechnical Commission-2IEC62443-4-1:2018IEC2018CONTE

3、NTSFOREWORD.6INTRODUCTION.812Normative references.113 Terms,definitions,abbreviated terms,acronyms and conventions.113.1Terms and definitions.113.2Abbreviated terms and acronyms.163.3Convention.4 General principles.174.1C0 ncepts.174.2Maturity model.195 Practice 1-Security management.205.1PUrp0Se205

4、.2SM-1:Development process.215.2.1 Requirement.215.3 Rationale and supplemental guidance.215.4 SM-2:Identification of responsibilities.215.4.1Requirement.25.4.2Rationale and supplemental guidance.25.5 SM-3:Identification of applicability.215.5.1Requirement.215.5.2Rationale and supplemental guidance.

5、225.6 SM-4:Security expertise.225.6.1Requirement.225.6.2Rationale and supplemental guidance.225.7 SM-5:Process scoping.225.7.1Reguirement.225.7.2Rationale and supplemental guidance.235.8SM-6 File integrity.235.8.1Requirement.235.8.2Rationale and supplemental guidance.235.9 SM-7:Development environme

6、nt security.235.9.1Requirement.235.9.2Rationale and supplemental guidance.235.10 SM-8:Controls for private keys.235.10.1 Requirement.235.10.2 Rationale and supplemental guidance.245.11 SM-9:Security requirements for externally provided components.245.11.1 Requirement.245.11.2 Rationale and supplemen

7、tal guidance.245.12 SM-10:Custom developed components from third-party suppliers.245.12.1 Requirement.245.12.2 Rationale and supplemental guidance.255.13 SM-11:Assessing and addressing security-related issues.255.13.1 Requirement.255.13.2 Rationale and supplemental guidance.251EC62443-4-1:2018IEC201

8、8-3-5.14 SM-12:Process verification.255.14.1 Requirement.255.14.2 Rationale and supplemental guidance.255.15SM-13:Continuous improvement.255.15.1 Requirement.255.15.2 Rationale and supplemental guidance.266Practice 2-Specification of security requirements.268.1 PurpOSe.286.2 SR-1:Product security co

9、ntext.276.2.1Requirement.276.2.2Rationale and supplemental guidance.276.3SR-2:Threat model.276.3.1Requirement.276.3.2Rationale and supplemental guidance.286.4SR-3:Product security requirements.286.4.1Requirement.286.4.2Rationale and supplemental guidance.286.5 SR-4:Product security requirements cont

10、ent.296.5.1Requirement.296.5.2Rationale and supplemental guidance.296.6 SR-5:Security requirements review.296.6.1Reguirement.296.6.2Rationale and supplemental guidance.297 Practice 3-Secure by design.307.1PuppoSe.307.2SD-1:Secure design principles.307.2.1Requirement.307.2.2Rationale and supplemental

11、 guidance.307.3SD-2:Defense in depth design.317.3.1Requirement.317.3.2Rationale and supplemental guidance.327.4 SD-3:Security design review.327.4.1Requirement.327.4.2Rationale and supplemental guidance.327.5 SD-4:Secure design best practices.327.5.1Requirement.327.5.2Rationale and supplemental guida

12、nce.338Practice 4-Secure implementation.338.1Purpose.338.2Applicability.338.3SI-1:Security implementation review.338.3.1Requirement.338.3.2Rationale and supplemental guidance.348.4SI-2:Secure coding standards.348.4.1Requirement.348.4.2Rationale and supplemental guidance.349Practice 5-Security verification and validation testing.349.34

copyright@ 2008-2023 wnwk.com网站版权所有

经营许可证编号:浙ICP备2024059924号-2