IEEE 11073-40102-2022
$33.58
IEEE/ISO International Standard – Health informatics–Device interoperability Part 40102: Foundational–Cybersecurity–Capabilities for mitigation
Published By | Publication Date | Number of Pages |
IEEE | 2022 | 34 |
Adoption Standard – Active. For Personal Health Devices (PHDs) and Point-of-Care Devices (PoCDs), a security baseline of application layer cybersecurity mitigation techniques is defined by this standard for certain use cases or for times when certain criteria are met. The mitigation techniques are based on an extended confidentiality, integrity, and availability (CIA) triad and are described generally to allow manufacturers to determine the most appropriate algorithms and implementations. A scalable information security toolbox appropriate for PHD/PoCD interfaces is specified that fulfills the intersection of requirements and recommendations from the National Institute of Standards and Technology (NIST) and the European Network and Information Security Agency (ENISA). A mapping of this standard to the NIST cybersecurity framework; IEC TR 80001-2-2; and the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) classification scheme is defined.
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | Blank Page |
5 | Title page |
7 | Important Notices and Disclaimers Concerning IEEE Standards Documents |
10 | Participants |
13 | Introduction |
14 | Contents |
15 | 1. Overview 1.1 General |
16 | 1.2 Scope 1.3 Purpose 1.4 Word usage |
17 | 2. Normative references 3. Definitions, acronyms, and abbreviations 3.1 Definitions 3.2 Acronyms and abbreviations |
18 | 4. Information security 4.1 General 4.2 Confidentiality 4.3 Integrity 4.4 Availability |
19 | 4.5 Non-repudiation 5. Security with safety and usability 5.1 High-level view 5.2 Safety relationships |
20 | 5.3 Usability relationships 6. Mitigation 6.1 General |
21 | 6.2 Software security updates 6.3 Secure design principles |
22 | 6.4 Secure by design and secure by default principles 6.5 Privacy by design and privacy by default principles |
23 | 6.6 Ensure robust interface design 6.7 Limit access to trusted users only 6.8 Ensure trusted content 6.9 Mapping of mitigation categories, security capabilities, mitigation techniques, and design principles |
26 | 7. Information security controls |
27 | 8. Information security toolbox 8.1 General |
28 | 8.2 Nonce 8.3 Encryption 8.4 Message authentication code |
29 | 8.5 Key exchange |
30 | 8.6 Key derivation function 8.7 Audit trail |
31 | Annex A (informative) Bibliography |
33 | Annex B (informative) Test vectors |