Projekta Nr.-
NosaukumsThis document covers the line 39 of the CRA standardisation request and provides: • General description of products and its components belonging to HWSB category, including – amongst other: o A structured description of that product category:  Common characteristics of HWSB products with a hardware envelope, internal HW and SW  Description of representative products using these common characteristics o Identification of the various types of HWSB; o Intended purpose and reasonably foreseeable use; o Identification of the HWSB which are excluded from that category o delineation and interplay with the other categories in which HWSB could fall in. • Description of the typical life cycle; • Scope of application and relevance of cybersecurity essential requirements; • Definition of applicable risk profiles to be considered for these HWSB, which will define the security requirements and assessment methodologies to be applied; • Applicable security requirements ensuring fulfillment of the essential requirements for each risk profile; • Provide criteria to determine applicable risk profile; A base document is provided: • defining the risk profiles; • identifying initial cybersecurity security requirements.
Reģistrācijas numurs (WIID)82626
Darbības sfēraThis document covers the line 39 of the CRA standardisation request and provides: • General description of products and its components belonging to HWSB category, including – amongst other: o A structured description of that product category:  Common characteristics of HWSB products with a hardware envelope, internal HW and SW  Description of representative products using these common characteristics o Identification of the various types of HWSB; o Intended purpose and reasonably foreseeable use; o Identification of the HWSB which are excluded from that category o delineation and interplay with the other categories in which HWSB could fall in. • Description of the typical life cycle; • Scope of application and relevance of cybersecurity essential requirements; • Definition of applicable risk profiles to be considered for these HWSB, which will define the security requirements and assessment methodologies to be applied; • Applicable security requirements ensuring fulfillment of the essential requirements for each risk profile; • Provide criteria to determine applicable risk profile; A base document is provided: • defining the risk profiles; • identifying initial cybersecurity security requirements.
StatussIzstrādē
ICS grupaNav uzstādīts