{"id":422087,"date":"2024-10-20T06:39:32","date_gmt":"2024-10-20T06:39:32","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-guide-1202018-2\/"},"modified":"2024-10-26T12:27:36","modified_gmt":"2024-10-26T12:27:36","slug":"bsi-pd-iec-guide-1202018-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-guide-1202018-2\/","title":{"rendered":"BSI PD IEC GUIDE 120:2018"},"content":{"rendered":"

This document provides guidelines on the security topics to be covered in IEC publications, and aspects of how to implement them. These guidelines can be used as a checklist for the combination of publications used in implementation of systems.<\/p>\n

This document includes what is often referred to as \u201ccyber security\u201d.<\/p>\n

This document excludes non electrotechnical aspects of security such as societal security, except where they directly interact with electrotechnical security.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
4<\/td>\nCONTENTS <\/td>\n<\/tr>\n
6<\/td>\nFOREWORD <\/td>\n<\/tr>\n
8<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
11<\/td>\n4 Guide to terminology
4.1 General <\/td>\n<\/tr>\n
12<\/td>\n4.2 Primary recommended sources
4.3 Other relevant sources
4.3.1 General
4.3.2 Other application-domain independent sources
4.3.3 Other application-domain specific sources <\/td>\n<\/tr>\n
13<\/td>\n5 Categorisation of publications
5.1 Overview
5.2 Publication type
5.2.1 General
Figures
Figure 1 \u2013 Possible categorization of publications <\/td>\n<\/tr>\n
14<\/td>\n5.2.2 Base security publications
5.2.3 Group security publications
Figure 2 \u2013 Types of publications <\/td>\n<\/tr>\n
15<\/td>\n5.2.4 Product security publications
5.2.5 Guidance security publications
5.2.6 Test security publications
5.2.7 Relationship between types of security publications
5.3 Application domain <\/td>\n<\/tr>\n
16<\/td>\n5.4 Content
5.5 User\/target group
5.6 Developing security publications
5.6.1 Base security publications <\/td>\n<\/tr>\n
17<\/td>\n5.6.2 Group security publications
5.6.3 Product security publications
5.6.4 Guidance security publications and test security publications <\/td>\n<\/tr>\n
18<\/td>\n6 Mapping\/overview of publications
6.1 General
6.2 List of relevant publications
6.3 Domain table chart
Figure 3 \u2013 Publications and application domains <\/td>\n<\/tr>\n
19<\/td>\n7 Considerations for publications development
7.1 Practical considerations for publication writers
7.2 Development process of security in publications
Figure 4 \u2013 Example of security requirements, threats, and possible attacks <\/td>\n<\/tr>\n
21<\/td>\nFigure 5 \u2013 Decision flow chart <\/td>\n<\/tr>\n
22<\/td>\n7.3 Interrelation between functional safety and security
Figure 6 \u2013 Interrelation between functional safety and security <\/td>\n<\/tr>\n
23<\/td>\n7.4 Specific requirements
7.4.1 Relationship with base security publications
7.4.2 Consider conformity assessment when writing standards <\/td>\n<\/tr>\n
24<\/td>\n7.4.3 Lifecycle approach
7.4.4 Holistic system view
Figure 7 \u2013 Example of security management cycle for an organization <\/td>\n<\/tr>\n
25<\/td>\n7.4.5 Vulnerability handling
7.4.6 Defence-in-depth
7.4.7 Security management
7.4.8 Supply chain
Figure 8 \u2013 Selected measures for defence-in-depth strategy <\/td>\n<\/tr>\n
26<\/td>\n7.4.9 Consider greenfield and brownfield
7.4.10 Use of term integrity
7.5 Security risk assessment
7.5.1 General <\/td>\n<\/tr>\n
27<\/td>\n7.5.2 Iterative process of security risk assessment and risk mitigation
7.5.3 Maintaining safe operation
Figure 9 \u2013 Possible impact of security risk(s) on the safety-related control system <\/td>\n<\/tr>\n
28<\/td>\n7.5.4 Scenario analysis
7.5.5 Security risk mitigation strategy
7.5.6 Validation <\/td>\n<\/tr>\n
29<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Security aspects. Guidelines for their inclusion in publications<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2018<\/td>\n32<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":422097,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-422087","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/422087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/422097"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=422087"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=422087"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=422087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}