{"id":451868,"date":"2024-10-20T09:20:52","date_gmt":"2024-10-20T09:20:52","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-20243-12023-tc\/"},"modified":"2024-10-26T17:24:52","modified_gmt":"2024-10-26T17:24:52","slug":"bs-iso-iec-20243-12023-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-20243-12023-tc\/","title":{"rendered":"BS ISO\/IEC 20243-1:2023 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
52<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | Preface <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | Trademarks <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 1 Scope <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 1.1 Conformance 1.2 Future Directions 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 4 Business Context and Overview 4.1 Business Environment Summary 4.1.1 Operational Scenario <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 4.2 Business Rationale 4.2.1 Business Drivers <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 4.2.2 Objectives and Benefits <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 4.3 Recognizing the COTS ICT Context <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 4.4 Overview 4.4.1 O-TTPF Overview <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 4.4.2 O-TTPS Overview 4.4.3 Relationship with Other Standards <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 5 O-TTPS \u2013 Tainted and Counterfeit Risks <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 6 O-TTPS \u2013 Requirements for Addressing the Risks of Tainted and Counterfeit Products <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 6.1 Technology Development <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 6.1.1 PD: Product Development\/Engineering Method 6.1.1.1 PD_DES: Software\/Firmware\/Hardware Design Process 6.1.1.2 PD_CFM: Configuration Management <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 6.1.1.3 PD_MPP: Well-Defined Development\/Engineering Method Process and Practices 6.1.1.4 PD_QAT: Quality and Test Management 6.1.1.5 PD_PSM: Product Sustainment Management <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 6.1.2 SE: Secure Development\/Engineering Method 6.1.2.1 SE_TAM: Threat Analysis and Mitigation 6.1.2.2 SE_RTP: Run-Time Protection Techniques <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 6.1.2.3 SE_VAR: Vulnerability Analysis and Response 6.1.2.4 SE_PPR: Product Patching and Remediation <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 6.1.2.5 SE_SEP: Secure Engineering Practices 6.1.2.6 SE_MTL: Monitor and Assess the Impact of Changes in the Threat Landscape <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 6.2 Supply Chain Security 6.2.1 SC: Supply Chain Security Method 6.2.1.1 SC_RSM: Risk Management <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 6.2.1.2 SC_PHS: Physical Security 6.2.1.3 SC_ACC: Access Controls <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 6.2.1.4 SC_ESS: Employee and Supplier Security and Integrity 6.2.1.5 SC_BPS: Business Partner Security <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 6.2.1.6 SC_STR: Supply Chain Security Training 6.2.1.7 SC_ISS: Information Systems Security 6.2.1.8 SC_TTC: Trusted Technology Components <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 6.2.1.9 SC_STH: Secure Transmission and Handling <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 6.2.1.10 SC_OSH: Open Source Handling 6.2.1.11 SC_CTM: Counterfeit Mitigation <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 6.2.1.12 SC_MAL: Malware Detection <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Information technology. Open Trusted Technology ProviderTM<\/sup> Standard (O-TTPS) – Requirements and recommendations for mitigating maliciously tainted and counterfeit products<\/b><\/p>\n |