欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ISO IEC 20243-2015 Information Technology - Open Trusted Technology ProviderTM Standard (O-TTPS) - Mitigating maliciously tainted and counterfeit products《信息技术 .pdf

    • 资源ID:1257016       资源大小:3.99MB        全文页数:46页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ISO IEC 20243-2015 Information Technology - Open Trusted Technology ProviderTM Standard (O-TTPS) - Mitigating maliciously tainted and counterfeit products《信息技术 .pdf

    1、Information Technology Open Trusted Technology ProviderTM Standard (O-TTPS) Mitigating maliciously tainted and counterfeit products Technologies de linformation Norme de fournisseur de technologie de confiance ouverte (O-TTPS) Attnuation des produits contrefaits et malicieusement contamins INTERNATI

    2、ONAL STANDARD ISO/IEC 20243 Reference number ISO/IEC 20243:2015(E) First edition 2015-09- 15 ISO/IEC 2015 ii ISO/IEC 2015 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2015, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reprod

    3、uced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester.

    4、 ISO copyright office Ch. de Blandonnet 8 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/IEC 20243:2015(E)Open Trusted Technology Provider Standard (O-TTPS), Version 1.1 iii Contents 1 Introduction.1 1.1 Objectives . 1 1.2 Ov e

    5、rv iew . 1 1.3 Conform ance . 3 1.4 Terminology . 3 1.5 Future Directions 4 2 Business Context and Overview .5 2.1 Business Environment Summary 5 2.1.1 Operational Scenario . 5 2.2 Business Rationale 7 2.2.1 Business Drivers 7 2.2.2 Objectives and Benefits . 8 2.3 Recognizing the COTS ICT Context 9

    6、2.4 Ov erv iew . 11 2.4.1 O-TTPF Framework Overview . 11 2.4.2 Standard Overview 11 2.4.3 Relationship with Other Standards 12 3 O-TTPS Tainted and Counterfeit Risks .13 4 O-TTPS Requirements for Addressing the Risks of Tainted and Counterfeit Products.15 4.1 Technology Development . 16 4.1.1 PD: Pr

    7、oduct Development/Engineering Method . 16 4.1.1.1 PD_DES: Software/Firmware/Hardware Design Process . 16 4.1.1.2 PD_CFM: Configuration Management 17 4.1.1.3 PD_MPP: Well-defined Development/Engineering Method Process and Practices 17 4.1.1.4 PD_QAT: Quality and Test Management 17 4.1.1.5 PD_PSM: Pro

    8、duct Sustainment Management . 18 4.1.2 SE: Secure Development/Engineering Method . 18 4.1.2.1 SE_TAM: Threat Analysis and Mitigation 18 4.1.2.2 SE_RTP: Run-time Protection Techniques 19 4.1.2.3 SE_VAR: Vulnerability Analysis and Response 19 4.1.2.4 SE_PPR: Product Patching and Remediation 20 4.1.2.5

    9、 SE_SEP: Secure Engineering Practices . 20 ISO/IEC 20243:2015(E) ISO/IEC 2015 All rights reservediv Open Group Standard (2014) 4.1.2.6 SE_MTL: Monitor and Assess the Impact of Changes in the Threat Landscape 20 4.2 Supply Chain Security 21 4.2.1 SC: Supply Chain Security 21 4.2.1.1 SC_RSM: Risk Mana

    10、gement . 21 4.2.1.2 SC_PHS: Physical Security . 22 4.2.1.3 SC_ACC: Access Controls 22 4.2.1.4 SC_ESS: Employee and Supplier Security and Integrity . 23 4.2.1.5 SC_BPS: Business Partner Security 23 4.2.1.6 SC_STR: Supply Chain Security Training 24 4.2.1.7 SC_ISS: Information Systems Security . 24 4.2

    11、.1.8 SC_TTC: Trusted Technology Components 24 4.2.1.9 SC_STH: Secure Transmission and Handling . 25 4.2.1.10 SC_OSH: Open Source Handling 25 4.2.1.11 SC_CTM: Counterfeit Mitigation 26 4.2.1.12 SC_MAL: Malware Detection . 26 List of Tables Table 1: O-TTPS Constituents and their Roles . 6 Table 2: Thr

    12、eat Mapping . 14 List of Figures Figure 1: Constituents . 6 Figure 2: Product Life Cycle Categories and Activities . 15 ISO/IEC 20243:2015(E) ISO/IEC 2015 All rights reservedOpen Trusted Technology Provider Standard (O-TTPS), Version 1.1 v Preface The Open Group The Open Group is a global consortium

    13、 that enables the achievement of business objectives through IT standards. With more than 400 member organizations, The Open Group has a diverse membership that spans all sectors of the IT community customers, systems and solutions suppliers, tool vendors, integrators, and consultants, as well as ac

    14、ademics and researchers to: Capture, understand, and address current and emerging requirements, and establish policies and share best practices Facilitate interoperability, develop consensus, and evolve and integrate specifications and open source technologies Offer a comprehensive set of services t

    15、o enhance the operational efficiency of consortia Operate the industrys premier certification service Further information on The Open Group is available at www.opengroup.org. The Open Group publishes a wide range of technical documentation, most of which is focused on development of Open Group Stand

    16、ards and Guides, but which also includes white papers, technical studies, certification and testing documentation, and business titles. Full details and a catalog are available at www.opengroup.org/bookstore. Readers should note that updates in the form of Corrigenda may apply to any publication. Th

    17、is information is published at www.opengroup.org/corrigenda. This Document The Open Group Trusted Technology Forum (OTTF or Forum) is a global initiative that invites industry, government, and other interested participants to work together to evolve this Standard and other OTTF deliverables. This St

    18、andard is the Open Trusted Technology Provider Standard (O-TTPS). The Standard has been developed by the OTTF and approved by The Open Group, through The Open Group Company Review process. There are two distinct elements that should be understood with respect to this Standard: the O-TTPF (Framework)

    19、 and the O-TTPS (Standard). The O-TTPF (Framework): The Framework is an evolving compendium of organizational guidelines and best practices relating to the integrity of Commercial Off-the-Shelf (COTS) Information and Communication Technology (ICT) products and the security of the supply chain throug

    20、hout the entire product life cycle. An early version of the Framework was published as a White Paper in February 2011 (see Referenced Documents). The Framework serves as the basis for this Standard, future updates, and additional standards. The content of the Framework is the result of industry coll

    21、aboration and research as to those commonly used commercially ISO/IEC 20243:2015(E) ISO/IEC 2015 All rights reservedvi Open Group Standard (2014) reasonable practices that increase product integrity and supply chain security. The members of the OTTF will continue to collaborate with industry and gov

    22、ernments and update the Framework as the threat landscape changes and industry practices evolve. The O-TTPS (Standard): The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global supply chain and the integrity of

    23、COTS ICT products. It provides a set of guidelines, requirements, and recommendations that help assure against maliciously tainted and counterfeit products throughout the COTS ICT product life cycle encompassing the following phases: design, sourcing, build, fulfillment, distribution, sustainment, a

    24、nd disposal. Using the guidelines documented in the Framework as a basis, the OTTF is taking a phased approach and staging O-TTPS releases over time. This staging will consist of standards that focus on mitigating specific COTS ICT risks from emerging threats. As threats change or market needs evolv

    25、e, the OTTF intends to update the O-TTPS (Standard) by releasing addenda to address specific threats or market needs. The Standard is aimed at enhancing the integrity of COTS ICT products and helping customers to manage sourcing risk. The authors of this Standard recognize the value that it can brin

    26、g to governments and commercial customers worldwide, particularly those who adopt procurement and sourcing strategies that reward those vendors who follow the O-TTPS best practice requirements and recommendations. Note: Any reference to “providers” is intended to refer to COTS ICT providers. The use

    27、 of the word “component” is intended to refer to either hardware or software components. Intended Audience This Standard is intended for organizations interested in helping the industry evolve to meet the threats in the delivery of trustworthy COTS ICT products. It is intended to provide enough cont

    28、ext and information on business drivers to enable its audience to understand the value in adopting the guidelines, requirements, and recommendations specified within. It also allows providers, suppliers, and integrators to begin planning how to implement the Standard in their organizations. Addition

    29、ally, acquirers and customers can begin recommending the adoption of the Standard to their providers and integrators. ISO/IEC 20243:2015(E) ISO/IEC 2015 All rights reservedOpen Trusted Technology Provider Standard (O-TTPS), Version 1.1 vii Trademarks ArchiMate , DirecNet , Jericho Forum , Making Sta

    30、ndards Work , OpenPegasus , The Open Group , TOGAF , and UNIX are registered trademarks and Boundaryless Information Flow, Build with Integrity Buy with Confidence, Dependability Through Assuredness, FACE, Open Platform 3.0, Open Trusted Technology Provider, and The Open Group Certification Mark are

    31、 trademarks of The Open Group. All other brands, company, and product names are used for identification purposes only and may be trademarks that are the sole property of their respective owners. ISO/IEC 20243:2015(E) ISO/IEC 2015 All rights reservedviii Open Group Standard (2014) Acknowledgements Th

    32、e Open Group acknowledges the contribution of the following people and organizations in the development of this Standard (presented in alphabetical order). In particular we would like to provide a special thank you and acknowledgement to the Chair and Vice Chair of the OTTF: Andras Szakal, IBM (Chai

    33、r) and Edna Conway, Cisco Systems (Vice Chair). The contributing members of The Open Group Trusted Technology Forum (OTTF): Contributors Organization Jon Amis Dell, Inc. Paul Aschwald Hewlett-Packard Company Nadya Bartol (formerly of) Booz Allen Hamilton James Bean Juniper Networks Kristen Baldwin U

    34、S DoD AT findings and recommendations located at: www.acq.osd.mil/dsb/reports/ADA486949.pdf. Electronic Industry Citizenship Coalition (EICC) Code of Conduct; refer to: www.eicc.info. ISO/IEC 15408: Information Technology Security Techniques Evaluation Criteria for IT Security (Common Criteria). ISO

    35、/IEC 27000:2009: Information Technology Security Techniques Information Security Management Systems Overview and Vocabulary. ISO/IEC Directives, Part 2: Rules for the Structure and Drafting of International Standards. NIST 800-12: An Introduction to Computer Security: The NIST Handbook. White Paper:

    36、 Open Trusted Technology Provider Framework (O-TTPF), W113, published by The Open Group, February 2011; refer to: www.opengroup.org/bookstore/catalog/w113.htm. ISO/IEC 20243:2015(E) ISO/IEC 2015 All rights reserved ISO/IEC 2015 All rights reservedOpen Trusted Technology Provider Standard (O-TTPS), V

    37、ersion 1.1 1 1 Introduction This chapter introduces this Standard the Open Trusted Technology Provider Standard (O- TTPS) and the normative terminology that should be understood in relation to specific requirements and recommendations found in Chapter 4 of this document. 1.1 Objectives The Open Trus

    38、ted Technology Provider Standard (O-TTPS) is a set of guidelines, requirements, and recommendations that, when practically applied, create a business benefit in terms of reduced risk of acquiring maliciously tainted or counterfeit products for the technology acquirer. Documenting best practices that

    39、 have been taken from the experience of mature industry providers, rigorously reviewed through a consensus process, and established as requirements and recommendations in this Standard, can provide significant advantage in establishing a basis to reduce risk. A commitment by technology providers, la

    40、rge and small, suppliers of hardware and software components, and integrators to adopt this Standard is a commitment to using specific methodologies to assure the integrity of their hardware or software Commercial Off-the-Shelf (COTS) Information and Communication Technology (ICT) products. This Sta

    41、ndard is detailed and prescriptive enough to be useful in raising the bar for all providers and lends itself to an accreditation process to provide assurance that it is being followed in a meaningful and repeatable manner. 1.2 Overview This Standard (O-TTPS) is a set of guidelines, requirements, and

    42、 recommendations that address specific threats to the integrity of hardware and software COTS ICT products throughout the product life cycle. This initial release of the Standard addresses threats related to maliciously tainted and counterfeit products. The providers product life cycle includes the

    43、work it does designing and developing products, as well as the supply chain aspects of that life cycle, collectively extending through the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal. While this Standard cannot fully address threats that originate

    44、wholly outside any span of control of the provider for example, a counterfeiter producing a fake printed circuit board assembly that has no original linkage to the Original Equipment Manufacturer (OEM) the practices detailed in the Standard will provide some level of mitigation. An example of such a

    45、 practice would be the use of security labeling techniques in legitimate products. The two major threats that acquirers face today in their COTS ICT procurements, as addressed in this Standard, are defined as: 1. Maliciously tainted product the product is produced by the provider and is acquired through a providers authorized channel, but has been tampered with maliciously. ISO/IEC 20243:2015(E) ISO/IEC 2015 All rights reserved


    注意事项

    本文(ISO IEC 20243-2015 Information Technology - Open Trusted Technology ProviderTM Standard (O-TTPS) - Mitigating maliciously tainted and counterfeit products《信息技术 .pdf)为本站会员(jobexamine331)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开