UL SUBJECT 2900-1-2016 UL Outline for Investigation Software Cybersecurity for Network- Connectable Products Part 1 General Requirements (Issue 2).pdf
《UL SUBJECT 2900-1-2016 UL Outline for Investigation Software Cybersecurity for Network- Connectable Products Part 1 General Requirements (Issue 2).pdf》由会员分享,可在线阅读,更多相关《UL SUBJECT 2900-1-2016 UL Outline for Investigation Software Cybersecurity for Network- Connectable Products Part 1 General Requirements (Issue 2).pdf(26页珍藏版)》请在麦多课文档分享上搜索。
1、UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULMARCH 30, 20161UL 2900-1Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part 1: General RequirementsIssue Number: 1March 30, 2016Summary of TopicsThe UL 2900
2、-1 outline aims to provide a minimum set of requirements thatdevelopers of network-connectable products can pursue to establish abaseline of protection against vulnerabilities and software weaknesses,along with a minimum set of security risk controls and documentation toconsider relative to their ex
3、isting overall product risk assessments.ULs Outlines of Investigation are copyrighted by UL. Neither a printed norelectronic copy of an Outline of Investigation should be altered in any way. All ofULs Outlines of Investigation and all copyrights, ownerships, and rights regardingthose Outlines of Inv
4、estigation shall remain the sole and exclusive property of UL.COPYRIGHT 2016 UNDERWRITERS LABORATORIES INC.UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULMARCH 30, 2016UL 2900-12No Text on This PageUL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR F
5、URTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULCONTENTSINTRODUCTION1 Scope .52 Normative References .53 Glossary .7DOCUMENTATION OF PRODUCT, PRODUCT DESIGN AND PRODUCT USE4 Product Documentation .105 Product Design Documentation 116 Documentation for Product Use 11RISK CONTROLS7 Genera
6、l .128 Access Control, User Authentication and User Authorization 129 Remote Communication 1310 Cryptography .1411 Product Management .14RISK MANAGEMENT12 Vendor Product Risk Management Process 15VULNERABILITIES AND EXPLOITS13 Known Vulnerability Testing 1714 Malware Testing 1715 Malformed Input Tes
7、ting .1716 Structured Penetration Testing .19SOFTWARE WEAKNESSES17 Software Weakness Analysis .1918 Static Source Code Analysis 2019 Static Binary and Bytecode Analysis 20APPENDIX AA1 Sources for Software Weaknesses .A1APPENDIX BB1 Requirements for Secure Mechanisms for Storing Sensitive Data and Pe
8、rsonally IdentifiableData B1APPENDIX CMARCH 30, 2016 UL 2900-1 3UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULC1 Requirements for Security Functions .C1MARCH 30, 2016UL 2900-14UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION O
9、RDISTRIBUTION WITHOUT PERMISSION FROM ULINTRODUCTION1 Scope1.1 This outline applies to network-connectable products that shall be evaluated and tested forvulnerabilities, software weaknesses and malware.1.2 This outline describes:a) Requirements regarding the vendors risk management process for thei
10、r product.b) Methods by which a product shall be evaluated and tested for the presence of vulnerabilities,software weaknesses and malware.c) Requirements regarding the presence of security risk controls in the architecture and designof a product.1.3 This outline does not contain requirements regardi
11、ng functional testing of a product. This means thisoutline contains no requirements to verify that the product functions as designed.1.4 This outline does not contain requirements regarding the hardware contained in a product.2 Normative References2.1 All references are for the latest published vers
12、ion of the document, unless stated otherwise.1 UL 2900-2-1Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part 2-1: ParticularRequirements for Network Connectable Components of Healthcare Systems2 UL 2900-2-2Outline of Investigation for Software Cybersecurity fo
13、r Network-Connectable Products, Part 2-2: ParticularRequirements for Industrial Control Systems3 ITU-T X.1520,Cybersecurity information exchange Vulnerability/state exchange Common vulnerabilities andexposures (CVE)4 ITU-T X.1521,Cybersecurity information exchange Vulnerability/state exchange Common
14、 vulnerability scoringsystem (CVSS)5 ITU-T X.1524,Cybersecurity information exchange Vulnerability/state exchange Common weakness enumeration(CWE)6 ITU-T X.1525,Cybersecurity information exchange Vulnerability/state exchange Common weakness scoring system(CWSS)7 ITU-T X.1544,Cybersecurity informatio
15、n exchange Event/incident/heuristics exchange Common attack patternenumeration and classification (CAPEC)MARCH 30, 2016 UL 2900-1 5UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL8 Common Weakness Risk Analysis Framework (CWRAF); retrievable f
16、rom https:/cwe.mitre.org/cwraf/9 CWE/SANS Top 25 Most Dangerous Software Errors; retrievable from cwe.mitre.org/top2510 CWE On the Cusp: other weaknesses to consider; retrievable fromhttps:/cwe.mitre.org/top25/cusp.html11 OWASP Top 10; latest version retrievable fromhttps:/www.owasp.org/index.php/To
17、p_10_2013-Top_1012 ISO/IEC 11889,Information technology Trusted platform module library13 ISO/IEC 9796 (all parts),Information technology Security techniques Digital signature scheme giving message recovery14 ISO/IEC 9797 (all parts),Information technology Security techniques Message Authentication
18、Codes (MACs)15 ISO/IEC 9798 (all parts),Information technology Security techniques Entity authentication16 ISO/IEC 10118 (all parts),Information technology Security techniques Hash-functions17 ISO/IEC 11770 (all parts),Information technology Security techniques Key management18 ISO/IEC 14888 (all pa
19、rts),Information technology Security techniques Digital signatures with appendix19 ISO/IEC 15946 (all parts),Information technology Security techniques Cryptographic techniques based on elliptic curves20 ISO/IEC 18033 (all parts),Information technology Security techniques Encryption algorithms21 ISO
20、/IEC 19772 (all parts),Information technology Security techniques Authenticated encryption22 NIST FIPS 140-2, Annex A: Approved Security Functions23 NIST FIPS 140-2, Annex D: Approved Key Establishment TechniquesMARCH 30, 2016UL 2900-16UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION
21、ORDISTRIBUTION WITHOUT PERMISSION FROM UL3 Glossary3.1 ATTACK The use of one or more exploit(s) by an adversary to achieve one or more negativetechnical impact(s).3.2 ATTACK PATTERN A description of a generic method for carrying out attacks.3.3 AUTHENTICATION The process of verifying the identity of
22、 an entity.3.4 AUTHENTICITY The property that data, information or software originate from a specific entity,which may or may not have been authenticated.3.5 AUTHORIZATION The process of giving an entity permission to access or manipulate the product,or the property that an entity has such permissio
23、n.3.6 BINARY CODE Machine instructions and/or data in a format intended for a specific processorarchitecture.3.7 BYTECODE Instructions and/or data that are created from source code as an intermediate stepbefore generating binary code. Bytecode is independent of a specific processor architecture and
24、istypically handled by a virtual machine or interpreter.3.8 COMMON ATTACK PATTERN ENUMERATION AND CLASSIFICATION (CAPEC) Specified inITU-T X.1544 (ref. 7), the CAPEC is a publicly available resource providing a list and classification of alarge number of attack mechanisms based on the topology of th
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ULSUBJECT290012016ULOUTLINEFORINVESTIGATIONSOFTWARECYBERSECURITYFORNETWORKCONNECTABLEPRODUCTSPART1GENERALREQUIREMENTSISSUE2PDF

链接地址:http://www.mydoc123.com/p-1069373.html