欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    UL SUBJECT 2900-2-1-2016 Outline of Investigation for Software Cybersecurity for Network-Connectable Products Part 2-1 Particular Requirements for Network Connectable Components of.pdf

    • 资源ID:1069374       资源大小:49.98KB        全文页数:18页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    UL SUBJECT 2900-2-1-2016 Outline of Investigation for Software Cybersecurity for Network-Connectable Products Part 2-1 Particular Requirements for Network Connectable Components of.pdf

    1、UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULMARCH 30, 20161UL 2900-2-1Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part 2-1: Particular Requirements for NetworkConnectable Components of Healthcare S

    2、ystemsIssue Number: 1March 30, 2016Summary of TopicsWith the increasing threat of cyber-attacks affecting safety-criticalproducts and service infrastructure, the UL 2900 outlines aim to provide aminimum set of requirements that developers of network connectedproducts can pursue to establish a baseli

    3、ne of protection against knownvulnerabilities and a minimum set of security risk controls to considerrelative to their existing overall product risk assessments.This outline describes the method by which the security risk controls ofhealthcare system components shall be evaluated and tested for know

    4、nvulnerabilities, software weaknesses and malware while also establishinga minimum set of verification activities intended to reduce the likelihoodof exploitable weaknesses that could be vectors of zero day vulnerabilitiesthat may affect the component.The product shall be subjected to: Vulnerability

    5、 and exploitation assessment; Software Weakness Testing (e.g. via Malformed Input Testing,weakness evaluation, etc.); Targeted exploits to compromise risk control functionality (e.g.via Structured Penetration Testing); and Targeted exploits for privilege escalation (e.g. via StructuredPenetration Te

    6、sting).Thus the requirements of this outline focus on promoting a “defense-in-depth” strategy aimed at reducing the likelihood of a malicious userfinding vulnerabilities at communication interfaces, reducing thelikelihood of a malicious user accessing critical aspects of the productwhen a vulnerabil

    7、ity is found, and reducing the likelihood of a malicioususer increasing their level of access to other products or system assets incase of a successful breach.UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULULs Outlines of Investigation are co

    8、pyrighted by UL. Neither a printed norelectronic copy of an Outline of Investigation should be altered in any way. All ofULs Outlines of Investigation and all copyrights, ownerships, and rights regardingthose Outlines of Investigation shall remain the sole and exclusive property of UL.COPYRIGHT 2016

    9、 UNDERWRITERS LABORATORIES INC.UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULCONTENTSINTRODUCTION1 Scope .42 Normative References .43 Glossary .5DOCUMENTATION FOR PRODUCT, PROCESSES, AND USE4 Product Documentation 75 Process Documentation 76

    10、 Documentation for Product Use .76.1 Safety-related security considerations for product use .76.2 Instructions 7SECURITY CONTROLS7 General 88 Access Control, User Authentication, and User Authorization .89 Remote Communication .810 Cryptography 811 Product Management .8PRODUCT ASSESSMENT12 Safety-Re

    11、lated Security Risk Management 812.1 Risk analysis 812.2 Risk evaluation .1012.3 Risk control 1012.4 Coverage of Security Analysis and Testing 1113 Vulnerability and Exploitation Assessment .1414 Software Weakness Analysis .1415 Targeted Exploits and Structured Penetration Testing .15ORGANIZATIONAL

    12、ASSESSMENT16 Lifecycle Security Processes .1616.1 Quality management processes 1616.2 Procurement Process .1616.3 Procurement Risk Management Process 1716.4 Product Update Release and Patch Management Process 1716.5 Decommissioning Process .1716.6 Packing and Shipment 17MARCH 30, 2016 UL 2900-2-1 3U

    13、L COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULINTRODUCTIONNote: This Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part2-1: Particular Requirements for Network Connectable Components of Healthcare Syste

    14、ms, is to be usedin conjunction with the Outline of Investigation for Software Cybersecurity for Network-ConnectableProducts, Part 1: General Requirements, UL 2900-1. The requirements for network connectablecomponents of healthcare systems are contained in this part 2 outline and UL 2900-1. Requirem

    15、ents ofthis Part 2 outline, where stated, amend the requirements of UL 2900-1. Where a particular subclause ofUL 2900-1 is not mentioned in UL 2900-2-1, the UL 2900-1 subclause applies.1 Scope1.1 This security evaluation outline applies to the testing of network connected components of healthcaresys

    16、tems. It applies to, but is not limited to, the following key components:a) Medical devices;b) Accessories to medical devices;c) Medical device data systems;d) In vitro diagnostic devices;e) Health information technology; andf) Wellness devices.2 Normative References2.1 The Outline of Investigation

    17、for Software Cybersecurity for Network-Connectable Products, Part 1:General Requirements, UL 2900-1, shall be applied as specified in this outline.2.2 The Standard for Medical Devices Application of Risk Management to Medical Devices, ISO14971:2007, shall be applied as specified in this outline.2.3

    18、The Standard for Medical Devices Quality Management Systems Requirements for RegulatoryPurposes, ISO 13485:2003, shall be applied as specified in this outline.2.4 The Standard for Medical Device Software Software Life Cycle Processes, IEC 62304:2006, shallbe applied as specified in this outline.MARC

    19、H 30, 2016UL 2900-2-14UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL3 Glossary3.1 AUTHENTICATION The process of verifying the identity of an entity.3.2 AUTHORIZATION The process of giving an entity permission to access or manipulate the prod

    20、uct,or the property that an entity has such permission.3.3 BYTECODE Instructions and/or data that are created from source code as an intermediate stepbefore generating binary code. Bytecode is independent of a specific processor architecture and istypically handled by a virtual machine or interprete

    21、r.3.4 COMMON VULNERABILITY SCORING SYSTEM (CVSS) Specified in ITU-T X.1521, the CVSS isa publicly available resource providing a means for prioritizing vulnerabilities in terms of exploit potential.3.5 COMMON WEAKNESS SCORING SYSTEM (CWSS) Specified in ITU-T X.1525, the CWSS is apublicly available r

    22、esource providing a means for prioritizing CWEs based on their technical impact, easeof attack, and other factors.3.6 CONFIDENTIALITY The property that data, information or software is not made available ordisclosed to unauthorized individuals, entities, or processes.3.7 EXPLOIT An input or action d

    23、esigned to take advantage of a weakness (or multiple weaknesses)and achieve a negative technical impact.NOTE: The existence of an exploit targeting a weakness is what makes that weakness a vulnerability.3.8 EXTERNAL INTERFACE An interface of the product that is designed to potentially allow access t

    24、oan entity outside the product; for example user interfaces, remote interfaces, local interfaces, wirelessinterfaces and file inputs.3.9 FILE A collection of data or program instructions stored as a unit with a single name.3.10 INTEGRITY The property of data, information or software not having been

    25、improperly modified.3.11 KNOWN VULNERABILITY A vulnerability described in the National Vulnerability Database (NVD).NOTE: The NVD is accessible at https:/nvd.nist.gov.3.12 MALFORMED INPUT TESTING A black-box testing technique used to reveal softwareweaknesses and vulnerabilities in a product by trig

    26、gering them with invalid or unexpected inputs on theexternal interfaces of the product.3.13 MALWARE Software designed with malicious intent to disrupt normal function, gather sensitiveinformation, and/or access other connected systems.3.14 NETWORK A collection of nodes and telecommunication links, a

    27、llowing connected devices,software etc. to exchange data and communicate.MARCH 30, 2016 UL 2900-2-1 5UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL3.15 PENETRATION TESTING A mechanism of evaluation of a product to exploit vulnerabilities and

    28、weaknesses discovered in the vulnerability assessment phase.3.16 PRODUCT The network-connectable device, software or system under test.3.17 RISK The potential for harm or damage, measured as the combination of the likelihood ofoccurrence of that harm or damage and the impact of that harm or damage.3

    29、.18 RISK ANALYSIS The systematic use of available information to identify threats and to estimaterisk.3.19 RISK CONTROL Any action taken or feature implemented to reduce risk.3.20 RISK MANAGEMENT Systematic application of management policies, procedures and practicesto the tasks of analyzing, evalua

    30、ting, controlling and monitoring risk.3.21 SECURITY The state of having acceptable levels of confidentiality, integrity, authenticity and/oravailability of product data and/or functionality.3.22 SENSITIVE DATA Sensitive data is any critical security parameter that can compromise the useand security

    31、of the product such as passwords, keys, seeds for random number generators, authenticationdata.3.23 SOFTWARE All pre-loaded data which creates, affects, and/or modifies the functionality of theproduct. This includes, but is not limited to, firmware, scripts, initialization files, pre-compiled code a

    32、ndinterpreted code. This does not include software preloaded and programmed in an IC chip for smallfunctions that require physical access and removal of the IC chip for reprogramming.3.24 SOFTWARE WEAKNESS A mistake in the architecture, design, coding, build process orconfiguration of software in th

    33、e product, that may render the product vulnerable to a security exploit.3.25 STATIC ANALYSIS A process in which source code, bytecode or binary code is analyzed withoutexecuting the code.3.26 THREAT A potentially successful attack, involving an adversary utilizing specific techniques andresources to

    34、 take advantage of specific vulnerabilities or lack of risk controls within a product.3.27 TRUSTED PLATFORM MODULE An international standard that defines the requirements for adedicated microprocessor with requirements for storage of cryptographic keys used to secure physicalproducts and the softwar

    35、e contained.3.28 USER A person or process using a product or accessing it over one of its external interfaces.3.29 VENDOR The manufacturer, reseller or supplier of a product, which takes final responsibility forthe cybersecurity of that product towards the purchaser and/or user and which submits tha

    36、t product fortesting according to this outline.MARCH 30, 2016UL 2900-2-16UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL3.30 VULNERABILITY A software weakness found in the product for which an exploit may exist, suchthat it can be directly us

    37、ed by an attacker.DOCUMENTATION FOR PRODUCT, PROCESSES, AND USE4 Product Documentation4.1 Product documentation shall meet the requirements of the Outline of Investigation for SoftwareCybersecurity for Network-Connectable Products, Part 1: General Requirements, UL 2900-1, except asnoted in the claus

    38、es below.5 Process Documentation5.1 Process documentation shall meet the requirements of the Outline of Investigation for SoftwareCybersecurity for Network-Connectable Products, Part 1: General Requirements, UL 2900-1, except asnoted in the clauses below.6 Documentation for Product Use6.1 Safety-rel

    39、ated security considerations for product use6.1.1 Intended use of the product as indicated in the Risk Management File (RMF)6.1.1.1 The products intended use statement shall indicate essential performance that may be impactedby security breach.6.1.2 Environment in which the product is intended to be

    40、 used6.2.1.1 The products indications for use statement shall identify security capabilities and constraintsrelative to assumptions regarding the environment within which it is intended to be operated.6.2 Instructions6.2.1 Instructions on means to over-ride security measures when necessary for patie

    41、nt safety per12.4.1.7 and 12.4.2.6 shall be communicated to intended stakeholders securely and as described in theRisk Management File.MARCH 30, 2016 UL 2900-2-1 7UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULSECURITY CONTROLS7 General7.1 Th

    42、e product shall comply with the requirements of the Outline of Investigation for SoftwareCybersecurity for Network-Connectable Devices, Part 1: General Requirements, UL 2900-1, Section 7,except as noted in the clauses below.8 Access Control, User Authentication, and User Authorization8.1 The product

    43、 shall comply with the requirements of the Outline of Investigation for SoftwareCybersecurity for Network-Connectable Devices, Part 1: General Requirements, UL 2900-1, Section 8,except as noted in the clauses below.9 Remote Communication9.1 The product shall comply with the remote communication requ

    44、irements of the Outline of Investigationfor Software Cybersecurity for Network-Connectable Devices, Part 1: General Requirements, UL 2900-1,Section 9, except as noted in the clauses below.10 Cryptography10.1 The product shall comply with the cryptography requirements of the Outline of Investigation

    45、forSoftware Cybersecurity for Network-Connectable Devices, Part 1: General Requirements, UL 2900-1,Section 10, except as noted in the clauses below.11 Product Management11.1 The product shall comply with the product management requirements of the Outline of Investigationfor Software Cybersecurity fo

    46、r Network-Connectable Devices, Part 1: General Requirements, UL 2900-1,Section 11, except as noted in the clauses below.PRODUCT ASSESSMENT12 Safety-Related Security Risk Management12.1 Risk analysis12.1.1 The product shall comply with the applicable requirements of the Standard for Medical Devices A

    47、pplication of Risk Management to Medical Devices, ISO 14971, or the Outline of Investigation forSoftware Cybersecurity for Network-Connectable Products, Part 1: General Requirements, UL 2900-1,Section 12, Vendor Product Risk Management Process.NOTE: Information Technology network risks per the Stand

    48、ard for Application of Risk Management forIT-Networks Incorporating Medical Devices Part 1: Roles, Responsibilities and Activities, IEC 80001-1,should be considered as part of product risk management.MARCH 30, 2016UL 2900-2-18UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBU

    49、TION WITHOUT PERMISSION FROM UL12.1.2 A risk management file shall be constructed in accordance with the Standard for Medical Devices Application of Risk Management to Medical Devices, ISO 14971, risk management process, and it shallspecifically include the following elements with regard to security:a) Security risk analysis;NOTE: The security risk analysis should consider defense-in-depth also known as layer ofprotection analysis (LOPA)1.b) Security risk evaluation;c) Security risk control;NOTE: Securi


    注意事项

    本文(UL SUBJECT 2900-2-1-2016 Outline of Investigation for Software Cybersecurity for Network-Connectable Products Part 2-1 Particular Requirements for Network Connectable Components of.pdf)为本站会员(unhappyhay135)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开