BSI 17/30350809 DC:2017 Edition
$13.70
BS ISO/IEC 22076. The open trusted technology provider standard (O-TTPS). Mitigating maliciously tainted and counterfeit products assessment procedures v1.1.1
Published By | Publication Date | Number of Pages |
BSI | 2017 | 39 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
5 | Contents |
6 | 1. Introduction 1.1 Scope 1.2 Normative References 1.3 Terms and Definitions 1.3.1 Distributor 1.3.2 Evidence of Conformance 1.3.3 Implementation Evidence 1.3.4 O-TTPS Requirements |
7 | 1.3.5 Organization 1.3.6 Pass-Through Reseller 1.3.7 Process Evidence 1.3.8 Scope of Assessment 1.3.9 Selected Representative Product |
8 | 2. General Concepts 2.1 The O-TTPS 2.2 Assessment Concepts: Relevance of Scope of Assessment and Selected Representative Products |
9 | 2.3 Relevance of IT Technology Provider Categories in the Supply Chain |
11 | 3. Assessment Requirements 3.1 General Requirements for Assessor Activities 3.1.1 General Requirements for Evidence of Conformance |
13 | 4. Assessor Activities for O-TTPS Requirements 4.1 PD_DES: Software/Firmware/Hardware Design Process |
14 | 4.2 PD_CFM: Configuration Management |
16 | 4.3 PD_MPP: Well-defined Development/Engineering Method Process and Practices |
17 | 4.4 PD_QAT: Quality and Test Management |
18 | 4.5 PD_PSM: Product Sustainment Management |
20 | 4.6 SE_TAM: Threat Analysis and Mitigation |
21 | 4.7 SE_VAR: Vulnerability Analysis and Response |
22 | 4.8 SE_PPR: Product Patching and Remediation |
23 | 4.9 SE_SEP: Secure Engineering Practices |
24 | 4.10 SE_MTL: Monitor and Assess the Impact of Changes in the Threat Landscape |
25 | 4.11 SC_RSM: Risk Management |
27 | 4.12 SC_PHS: Physical Security |
28 | 4.13 SC_ACC: Access Controls |
29 | 4.14 SC_ESS: Employee and Supplier Security and Integrity |
30 | 4.15 SC_BPS: Business Partner Security 4.16 SC_STR: Supply Chain Security Training |
31 | 4.17 SC_ISS: Information Systems Security 4.18 SC_TTC: Trusted Technology Components |
32 | 4.19 SC_STH: Secure Transmission and Handling |
34 | 4.20 SC_OSH: Open Source Handling |
35 | 4.21 SC_CTM: Counterfeit Mitigation |
36 | 4.22 SC_MAL: Malware Detection |
38 | A Annex: Assessment Guidance A.1 Guidance |
39 | B Annex: Assessment Report Template |