{"id":347283,"date":"2024-10-20T00:25:25","date_gmt":"2024-10-20T00:25:25","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-17-30350809-dc\/"},"modified":"2024-10-25T23:55:24","modified_gmt":"2024-10-25T23:55:24","slug":"bsi-17-30350809-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-17-30350809-dc\/","title":{"rendered":"BSI 17\/30350809 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
5<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | 1. Introduction 1.1 Scope 1.2 Normative References 1.3 Terms and Definitions 1.3.1 Distributor 1.3.2 Evidence of Conformance 1.3.3 Implementation Evidence 1.3.4 O-TTPS Requirements <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | 1.3.5 Organization 1.3.6 Pass-Through Reseller 1.3.7 Process Evidence 1.3.8 Scope of Assessment 1.3.9 Selected Representative Product <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 2. General Concepts 2.1 The O-TTPS 2.2 Assessment Concepts: Relevance of Scope of Assessment and Selected Representative Products <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 2.3 Relevance of IT Technology Provider Categories in the Supply Chain <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 3. Assessment Requirements 3.1 General Requirements for Assessor Activities 3.1.1 General Requirements for Evidence of Conformance <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4. Assessor Activities for O-TTPS Requirements 4.1 PD_DES: Software\/Firmware\/Hardware Design Process <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.2 PD_CFM: Configuration Management <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4.3 PD_MPP: Well-defined Development\/Engineering Method Process and Practices <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4.4 PD_QAT: Quality and Test Management <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4.5 PD_PSM: Product Sustainment Management <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4.6 SE_TAM: Threat Analysis and Mitigation <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4.7 SE_VAR: Vulnerability Analysis and Response <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4.8 SE_PPR: Product Patching and Remediation <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 4.9 SE_SEP: Secure Engineering Practices <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 4.10 SE_MTL: Monitor and Assess the Impact of Changes in the Threat Landscape <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 4.11 SC_RSM: Risk Management <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 4.12 SC_PHS: Physical Security <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 4.13 SC_ACC: Access Controls <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 4.14 SC_ESS: Employee and Supplier Security and Integrity <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 4.15 SC_BPS: Business Partner Security 4.16 SC_STR: Supply Chain Security Training <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 4.17 SC_ISS: Information Systems Security 4.18 SC_TTC: Trusted Technology Components <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 4.19 SC_STH: Secure Transmission and Handling <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 4.20 SC_OSH: Open Source Handling <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 4.21 SC_CTM: Counterfeit Mitigation <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 4.22 SC_MAL: Malware Detection <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | A Annex: Assessment Guidance A.1 Guidance <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | B Annex: Assessment Report Template <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 22076. The open trusted technology provider standard (O-TTPS). Mitigating maliciously tainted and counterfeit products assessment procedures v1.1.1<\/b><\/p>\n |