UL SUBJECT 2900-2-1-2016 Outline of Investigation for Software Cybersecurity for Network-Connectable Products Part 2-1 Particular Requirements for Network Connectable Components of.pdf
《UL SUBJECT 2900-2-1-2016 Outline of Investigation for Software Cybersecurity for Network-Connectable Products Part 2-1 Particular Requirements for Network Connectable Components of.pdf》由会员分享,可在线阅读,更多相关《UL SUBJECT 2900-2-1-2016 Outline of Investigation for Software Cybersecurity for Network-Connectable Products Part 2-1 Particular Requirements for Network Connectable Components of.pdf(18页珍藏版)》请在麦多课文档分享上搜索。
1、UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULMARCH 30, 20161UL 2900-2-1Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part 2-1: Particular Requirements for NetworkConnectable Components of Healthcare S
2、ystemsIssue Number: 1March 30, 2016Summary of TopicsWith the increasing threat of cyber-attacks affecting safety-criticalproducts and service infrastructure, the UL 2900 outlines aim to provide aminimum set of requirements that developers of network connectedproducts can pursue to establish a baseli
3、ne of protection against knownvulnerabilities and a minimum set of security risk controls to considerrelative to their existing overall product risk assessments.This outline describes the method by which the security risk controls ofhealthcare system components shall be evaluated and tested for know
4、nvulnerabilities, software weaknesses and malware while also establishinga minimum set of verification activities intended to reduce the likelihoodof exploitable weaknesses that could be vectors of zero day vulnerabilitiesthat may affect the component.The product shall be subjected to: Vulnerability
5、 and exploitation assessment; Software Weakness Testing (e.g. via Malformed Input Testing,weakness evaluation, etc.); Targeted exploits to compromise risk control functionality (e.g.via Structured Penetration Testing); and Targeted exploits for privilege escalation (e.g. via StructuredPenetration Te
6、sting).Thus the requirements of this outline focus on promoting a “defense-in-depth” strategy aimed at reducing the likelihood of a malicious userfinding vulnerabilities at communication interfaces, reducing thelikelihood of a malicious user accessing critical aspects of the productwhen a vulnerabil
7、ity is found, and reducing the likelihood of a malicioususer increasing their level of access to other products or system assets incase of a successful breach.UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULULs Outlines of Investigation are co
8、pyrighted by UL. Neither a printed norelectronic copy of an Outline of Investigation should be altered in any way. All ofULs Outlines of Investigation and all copyrights, ownerships, and rights regardingthose Outlines of Investigation shall remain the sole and exclusive property of UL.COPYRIGHT 2016
9、 UNDERWRITERS LABORATORIES INC.UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULCONTENTSINTRODUCTION1 Scope .42 Normative References .43 Glossary .5DOCUMENTATION FOR PRODUCT, PROCESSES, AND USE4 Product Documentation 75 Process Documentation 76
10、 Documentation for Product Use .76.1 Safety-related security considerations for product use .76.2 Instructions 7SECURITY CONTROLS7 General 88 Access Control, User Authentication, and User Authorization .89 Remote Communication .810 Cryptography 811 Product Management .8PRODUCT ASSESSMENT12 Safety-Re
11、lated Security Risk Management 812.1 Risk analysis 812.2 Risk evaluation .1012.3 Risk control 1012.4 Coverage of Security Analysis and Testing 1113 Vulnerability and Exploitation Assessment .1414 Software Weakness Analysis .1415 Targeted Exploits and Structured Penetration Testing .15ORGANIZATIONAL
12、ASSESSMENT16 Lifecycle Security Processes .1616.1 Quality management processes 1616.2 Procurement Process .1616.3 Procurement Risk Management Process 1716.4 Product Update Release and Patch Management Process 1716.5 Decommissioning Process .1716.6 Packing and Shipment 17MARCH 30, 2016 UL 2900-2-1 3U
13、L COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULINTRODUCTIONNote: This Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part2-1: Particular Requirements for Network Connectable Components of Healthcare Syste
14、ms, is to be usedin conjunction with the Outline of Investigation for Software Cybersecurity for Network-ConnectableProducts, Part 1: General Requirements, UL 2900-1. The requirements for network connectablecomponents of healthcare systems are contained in this part 2 outline and UL 2900-1. Requirem
15、ents ofthis Part 2 outline, where stated, amend the requirements of UL 2900-1. Where a particular subclause ofUL 2900-1 is not mentioned in UL 2900-2-1, the UL 2900-1 subclause applies.1 Scope1.1 This security evaluation outline applies to the testing of network connected components of healthcaresys
16、tems. It applies to, but is not limited to, the following key components:a) Medical devices;b) Accessories to medical devices;c) Medical device data systems;d) In vitro diagnostic devices;e) Health information technology; andf) Wellness devices.2 Normative References2.1 The Outline of Investigation
17、for Software Cybersecurity for Network-Connectable Products, Part 1:General Requirements, UL 2900-1, shall be applied as specified in this outline.2.2 The Standard for Medical Devices Application of Risk Management to Medical Devices, ISO14971:2007, shall be applied as specified in this outline.2.3
18、The Standard for Medical Devices Quality Management Systems Requirements for RegulatoryPurposes, ISO 13485:2003, shall be applied as specified in this outline.2.4 The Standard for Medical Device Software Software Life Cycle Processes, IEC 62304:2006, shallbe applied as specified in this outline.MARC
19、H 30, 2016UL 2900-2-14UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL3 Glossary3.1 AUTHENTICATION The process of verifying the identity of an entity.3.2 AUTHORIZATION The process of giving an entity permission to access or manipulate the prod
20、uct,or the property that an entity has such permission.3.3 BYTECODE Instructions and/or data that are created from source code as an intermediate stepbefore generating binary code. Bytecode is independent of a specific processor architecture and istypically handled by a virtual machine or interprete
21、r.3.4 COMMON VULNERABILITY SCORING SYSTEM (CVSS) Specified in ITU-T X.1521, the CVSS isa publicly available resource providing a means for prioritizing vulnerabilities in terms of exploit potential.3.5 COMMON WEAKNESS SCORING SYSTEM (CWSS) Specified in ITU-T X.1525, the CWSS is apublicly available r
22、esource providing a means for prioritizing CWEs based on their technical impact, easeof attack, and other factors.3.6 CONFIDENTIALITY The property that data, information or software is not made available ordisclosed to unauthorized individuals, entities, or processes.3.7 EXPLOIT An input or action d
23、esigned to take advantage of a weakness (or multiple weaknesses)and achieve a negative technical impact.NOTE: The existence of an exploit targeting a weakness is what makes that weakness a vulnerability.3.8 EXTERNAL INTERFACE An interface of the product that is designed to potentially allow access t
24、oan entity outside the product; for example user interfaces, remote interfaces, local interfaces, wirelessinterfaces and file inputs.3.9 FILE A collection of data or program instructions stored as a unit with a single name.3.10 INTEGRITY The property of data, information or software not having been
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ULSUBJECT2900212016OUTLINEOFINVESTIGATIONFORSOFTWARECYBERSECURITYFORNETWORKCONNECTABLEPRODUCTSPART21PARTICULARREQUIREMENTSFORNETWORKCONNECTABLECOMPONENTSOFPDF

链接地址:http://www.mydoc123.com/p-1069374.html