{"id":244938,"date":"2024-10-19T16:06:09","date_gmt":"2024-10-19T16:06:09","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-tr-630692019\/"},"modified":"2024-10-25T11:05:45","modified_gmt":"2024-10-25T11:05:45","slug":"bsi-pd-iec-tr-630692019","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-tr-630692019\/","title":{"rendered":"BSI PD IEC TR 63069:2019"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | INTRODUCTION 0.1 Purpose of this document 0.2 Background 0.3 Issues on the terminology 0.4 Target audience <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions, symbols, abbreviated terms and conventions 3.1 Terms and definitions defined for this document <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 3.2 Abbreviated terms 3.3 Explanation for common terms with different definitions Tables Table 1 \u2013 Terms with multiple definitions <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4 Context of security related to functional safety 4.1 Description of functions 4.2 Security environment Figures Figure 1 \u2013 Overview of functions of an IACS <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Figure 2 \u2013 Safety domain and security domain Figure 3 \u2013 Security environment <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5 Guiding principles 6 Life cycle recommendations for co-engineering 6.1 General <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Figure 4 \u2013 Safety and security interaction <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Table 2 \u2013 Recommended activities in life cycle stages <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.2 Managing security related safety aspects 7 Risk assessment considerations 7.1 Risk assessment at higher level <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.2 Trade-off analysis 7.3 Considerations for threat-risk assessment 7.3.1 General Figure 5 \u2013 Safety and security risk assessments as part ofa risk assessment at higher level <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.3.2 Recommendations to the threat-risk assessment 7.3.3 Considerations related to security countermeasures 7.3.4 Vulnerabilities and examples of root causes 7.4 Malevolent and unauthorized actions 7.4.1 General <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7.4.2 Reasonably foreseeable misuse (safety) 7.4.3 Prevention of malevolent and unauthorized actions (security) 7.4.4 Combination of password protection measures 8 Incident response readiness and incident handling 8.1 General 8.2 Incident response readiness 8.3 Incident handling <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Industrial-process measurement, control and automation. Framework for functional safety and security<\/b><\/p>\n |