{"id":445664,"date":"2024-10-20T08:42:57","date_gmt":"2024-10-20T08:42:57","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-tr-61142023\/"},"modified":"2024-10-26T16:13:42","modified_gmt":"2024-10-26T16:13:42","slug":"bsi-pd-iso-iec-tr-61142023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-tr-61142023\/","title":{"rendered":"BSI PD ISO\/IEC TR 6114:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
10<\/td>\n4 Abbreviated terms <\/td>\n<\/tr>\n
11<\/td>\n5 Security considerations throughout the product life cycle
5.1 Security considerations throughout the product life cycle overview <\/td>\n<\/tr>\n
13<\/td>\n5.2 Information and communication technology threat model
5.3 Classes of threats
5.4 Structure of the report <\/td>\n<\/tr>\n
14<\/td>\n6 Phase 1: Concept
6.1 General
6.2 Summary of concept threats and controls
6.2.1 Workflow toolchain tampering <\/td>\n<\/tr>\n
15<\/td>\n6.2.2 Unauthorized operations
6.2.3 Integrity faults
6.2.4 Theft or loss
7 Phase 2: Development
7.1 General
7.2 Summary of development threats and controls
7.2.1 Attacks on development tools and\/or network
7.2.2 Malicious embedded firmware <\/td>\n<\/tr>\n
16<\/td>\n7.2.3 Malicious hardware
7.2.4 Malicious software (driver)
7.2.5 Counterfeit <\/td>\n<\/tr>\n
17<\/td>\n8 Phase 3: Source and manufacture
8.1 General
8.2 Source
8.3 Manufacture
8.4 Summary of production threats and controls
8.4.1 Attack on production tools, data exchange tools and\/or network
8.4.2 Unauthorized disclosure <\/td>\n<\/tr>\n
18<\/td>\n8.4.3 Reverse engineering \/ theft of design
8.4.4 Improper system settings
8.4.5 Design alteration
8.4.6 Insertion of malicious and\/or counterfeit components <\/td>\n<\/tr>\n
19<\/td>\n8.4.7 Falsification of test results
8.4.8 Product theft
8.4.9 Code insertion or replacement (firmware, operating system, software)
8.4.10 System replacement (spoof device) <\/td>\n<\/tr>\n
20<\/td>\n9 Phase 4: Transport
9.1 General
9.2 Summary of production threats and controls
9.2.1 Product theft
9.2.2 Code insertion or replacement (firmware, operating system, software)
9.2.3 Insertion of malicious components
9.2.4 System replacement (spoof device)
9.2.5 Physical attack in storage and transit
10 Phase 5: Utilization and support
10.1 General <\/td>\n<\/tr>\n
21<\/td>\n10.2 Provision
10.3 Utilization
10.4 Support
10.5 Summary of utilization threats and controls
10.5.1 Unknown provenance
10.5.2 Spoofed system (replaced system) <\/td>\n<\/tr>\n
22<\/td>\n10.5.3 Undetected tampering
10.5.4 \u200bBuild data store tampering
10.5.5 Non-current device\/product (firmware, operation system, application, drivers)
10.5.6 Unauthorized changes (firmware, operating system, software)
10.5.7 Unauthorized component swap <\/td>\n<\/tr>\n
23<\/td>\n10.5.8 Insertion or replacement with malicious component
10.5.9 Product data store tampering
11 Phase 6: Retirement
11.1 General
11.2 Summary of retirement threats and controls
11.2.1 Inaccurate hardware return <\/td>\n<\/tr>\n
24<\/td>\n11.2.2 Incomplete data removal <\/td>\n<\/tr>\n
25<\/td>\nAnnex A (informative) Product security threat mapping to SCLC phases <\/td>\n<\/tr>\n
29<\/td>\nAnnex B (informative) Typical threats for hardware <\/td>\n<\/tr>\n
38<\/td>\nAnnex C (informative) Typical threats for software <\/td>\n<\/tr>\n
44<\/td>\nAnnex D (informative) Typical threats for data <\/td>\n<\/tr>\n
48<\/td>\nAnnex E (informative) Use of tagalongs <\/td>\n<\/tr>\n
49<\/td>\nAnnex F (informative) Software tampering <\/td>\n<\/tr>\n
52<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Cybersecurity. Security considerations throughout the product life cycle<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n54<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":445674,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-445664","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/445664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/445674"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=445664"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=445664"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=445664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}