Shopping Cart

No products in the cart.

IEEE 11073-40102-2022

$33.58

IEEE/ISO International Standard – Health informatics–Device interoperability Part 40102: Foundational–Cybersecurity–Capabilities for mitigation

Published By Publication Date Number of Pages
IEEE 2022 34
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

Adoption Standard – Active. For Personal Health Devices (PHDs) and Point-of-Care Devices (PoCDs), a security baseline of application layer cybersecurity mitigation techniques is defined by this standard for certain use cases or for times when certain criteria are met. The mitigation techniques are based on an extended confidentiality, integrity, and availability (CIA) triad and are described generally to allow manufacturers to determine the most appropriate algorithms and implementations. A scalable information security toolbox appropriate for PHD/PoCD interfaces is specified that fulfills the intersection of requirements and recommendations from the National Institute of Standards and Technology (NIST) and the European Network and Information Security Agency (ENISA). A mapping of this standard to the NIST cybersecurity framework; IEC TR 80001-2-2; and the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) classification scheme is defined.

PDF Catalog

PDF Pages PDF Title
4 Blank Page
5 Title page
7 Important Notices and Disclaimers Concerning IEEE Standards Documents
10 Participants
13 Introduction
14 Contents
15 1. Overview
1.1 General
16 1.2 Scope
1.3 Purpose
1.4 Word usage
17 2. Normative references
3. Definitions, acronyms, and abbreviations
3.1 Definitions
3.2 Acronyms and abbreviations
18 4. Information security
4.1 General
4.2 Confidentiality
4.3 Integrity
4.4 Availability
19 4.5 Non-repudiation
5. Security with safety and usability
5.1 High-level view
5.2 Safety relationships
20 5.3 Usability relationships
6. Mitigation
6.1 General
21 6.2 Software security updates
6.3 Secure design principles
22 6.4 Secure by design and secure by default principles
6.5 Privacy by design and privacy by default principles
23 6.6 Ensure robust interface design
6.7 Limit access to trusted users only
6.8 Ensure trusted content
6.9 Mapping of mitigation categories, security capabilities, mitigation techniques, and design principles
26 7. Information security controls
27 8. Information security toolbox
8.1 General
28 8.2 Nonce
8.3 Encryption
8.4 Message authentication code
29 8.5 Key exchange
30 8.6 Key derivation function
8.7 Audit trail
31 Annex A (informative) Bibliography
33 Annex B (informative) Test vectors
IEEE 11073-40102-2022
$33.58