Projekta Nr.ISO/IEC WD TS 27115.3
Nosaukums<p class="MsoBodyText" style="margin-right: 69.65pt;">This document provides the foundations and concepts for the cybersecurity evaluation of complex systems. Two frameworks are defined:</p> <p class="MsoListParagraph" style="line-height: 12.7pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt; margin: .1pt 91.25pt .0001pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';">       </span></span></span><!--[endif]-->The first is used to specify the cybersecurity of a complex system, including system<span style="letter-spacing: -1.75pt;"> </span>of systems.</p> <p class="MsoListParagraph" style="margin-left: 56.0pt; line-height: 12.5pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';">       </span></span></span><!--[endif]-->The second is used to evaluate the corresponding cybersecurity<span style="letter-spacing: -.85pt;"> </span>solutions.</p> <p class="MsoBodyText" style="line-height: 12.25pt; mso-line-height-rule: exactly;">The frameworks use basic architecture concepts:</p> <p class="MsoListParagraph" style="margin-left: 56.0pt; line-height: 12.65pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';">       </span></span></span><!--[endif]-->to enable description of reference or solution security<span style="letter-spacing: -.35pt;"> </span>architecture;</p> <p class="MsoListParagraph" style="margin-left: 56.0pt; line-height: 12.65pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';">       </span></span></span><!--[endif]-->to support model-based, comprehensive and scalable security solutions and their<span style="letter-spacing: -.85pt;"> </span>evaluation;</p> <p class="MsoBodyText" style="margin-right: 69.65pt;"><span style="font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">to allow for the definition of architecture-based security profiles and hierarchies of<span style="letter-spacing: -.75pt;"> </span>profiles.</span></p>
Reģistrācijas numurs (WIID)81627
Darbības sfēra<p class="MsoBodyText" style="margin-right: 69.65pt;">This document provides the foundations and concepts for the cybersecurity evaluation of complex systems. Two frameworks are defined:</p> <p class="MsoListParagraph" style="line-height: 12.7pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt; margin: .1pt 91.25pt .0001pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';">       </span></span></span><!--[endif]-->The first is used to specify the cybersecurity of a complex system, including system<span style="letter-spacing: -1.75pt;"> </span>of systems.</p> <p class="MsoListParagraph" style="margin-left: 56.0pt; line-height: 12.5pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';">       </span></span></span><!--[endif]-->The second is used to evaluate the corresponding cybersecurity<span style="letter-spacing: -.85pt;"> </span>solutions.</p> <p class="MsoBodyText" style="line-height: 12.25pt; mso-line-height-rule: exactly;">The frameworks use basic architecture concepts:</p> <p class="MsoListParagraph" style="margin-left: 56.0pt; line-height: 12.65pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';">       </span></span></span><!--[endif]-->to enable description of reference or solution security<span style="letter-spacing: -.35pt;"> </span>architecture;</p> <p class="MsoListParagraph" style="margin-left: 56.0pt; line-height: 12.65pt; mso-line-height-rule: exactly; mso-list: l0 level2 lfo1; tab-stops: 55.95pt 56.0pt;"><!-- [if !supportLists]--><span style="font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-font-width: 89%;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt 'Times New Roman';">       </span></span></span><!--[endif]-->to support model-based, comprehensive and scalable security solutions and their<span style="letter-spacing: -.85pt;"> </span>evaluation;</p> <p class="MsoBodyText" style="margin-right: 69.65pt;"><span style="font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">to allow for the definition of architecture-based security profiles and hierarchies of<span style="letter-spacing: -.75pt;"> </span>profiles.</span></p>
StatussIzstrādē
ICS grupaNav uzstādīts