UL SUBJECT 2900-2-3-2017 UL Outline for Investigation Software Cybersecurity for Network- Connectable Products Part 2-3 Particular Requirements for Security and Life Safety Signali.pdf
《UL SUBJECT 2900-2-3-2017 UL Outline for Investigation Software Cybersecurity for Network- Connectable Products Part 2-3 Particular Requirements for Security and Life Safety Signali.pdf》由会员分享,可在线阅读,更多相关《UL SUBJECT 2900-2-3-2017 UL Outline for Investigation Software Cybersecurity for Network- Connectable Products Part 2-3 Particular Requirements for Security and Life Safety Signali.pdf(24页珍藏版)》请在麦多课文档分享上搜索。
1、UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULAugust 11, 20171UL 2900-2-3Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part 2-3: Particular Requirements for Security andLife Safety Signaling SystemsIss
2、ue Number: 1August 11, 2017Summary of TopicsWith the increasing threat of cyber-attacks affecting security andlife-safety-critical products and service infrastructure, the proposed UL2900 series of Outline of Investigations aim to provide a foundational setof requirements that manufacturers of netwo
3、rk connectable products usedin security and life safety signaling systems can pursue to establish abaseline of protection against known vulnerabilities and a foundational setof cyber security risk controls to consider relative to their existing overallproduct risk assessments. The objective is to pr
4、ovide a Outline ofInvestigation for testing products that implements established securitydesign principles into the testing regimen.The proposed first edition of the Outline of Investigation for SoftwareCybersecurity for Network-Connectable Products, Part 2-3: ParticularRequirements for Security and
5、 Life Safety Signaling Systems, UL 2900-2-3,describes requirements regarding the vendors risk management processfor products used in security and life safety signaling systems ; methodsby which a products software shall be evaluated and tested for thepresence of vulnerabilities, software weaknesses
6、malware; andrequirements regarding the establishment and testing of security riskcontrols in the architecture and design of a product. The requirementsleverage the requirements of the Standard for Software Cybersecurity forNetwork-Connectable Products, Part 1: General Requirements, UL 2900-1,with ad
7、ditional requirements that take into consideration security andlife safety signaling systems context, environment, reliability, and safetyconcerns.ULs Outlines of Investigation are copyrighted by UL LLC. Neither a printed norelectronic copy of an Outline of Investigation should be altered in any way
8、. All ofULs Outlines of Investigation and all copyrights, ownerships, and rights regardingthose Outlines of Investigation shall remain the sole and exclusive property of ULLLC.COPYRIGHT 2017 UL LLCUL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM
9、ULAUGUST 11, 2017UL 2900-2-32No Text on This PageUL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULCONTENTSINTRODUCTION1 Scope .52 Normative References .63 Glossary .64 General 6DOCUMENTATION OF PRODUCT, PRODUCT DESIGN AND PRODUCT USE5 Product D
10、ocumentation 76 Product Design Documentation .77 Documentation for Product Use .7RISK CONTROLS8 General 89 Access Control, User Authentication and User Authorization .910 Remote Communication .1011 Sensitive Data .1012 Product Management .10RISK MANAGEMENT13 Vendor Product Risk Management Process 11
11、VULNERABILITIES AND EXPLOITS14 Known Vulnerability Testing 1215 Malware Testing 1216 Malformed Input Protocol Testing (also reference Appendix D) .1217 Structured Penetration Testing .13SOFTWARE WEAKNESS ANALYSIS18 Software Weakness Analysis .1419 Static Code Analysis 1420 Static Binary and Bytecode
12、 Analysis 1421 Organizational Assessment 15APPENDIX AA1 Sources for Software Weaknesses .A1APPENDIX BB1 Requirements for Secure Mechanisms for Storing Sensitive Data and Personally IdentifiableInformation B1AUGUST 11, 2017 UL 2900-2-3 3UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION
13、ORDISTRIBUTION WITHOUT PERMISSION FROM ULAPPENDIX CC1 Requirements for Security Functions .C1APPENDIX DD1 Level 1 Malformed Input Protocol List D1AUGUST 11, 2017UL 2900-2-34UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULINTRODUCTIONNote: This
14、 Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part2-3: Particular Requirements for Security and Life Safety Signaling Systems refers to the Standard forSoftware Cybersecurity for Network-Connectable Products, Part 1: General Requirements, UL 2900-1.1 Scope1.1
15、 This security evaluation Outline of Investigation applies to the evaluation of security and life safetysignaling system components. It applies to, but is not limited to, the following products:a) Alarm Control Unitsb) Intrusion Detection Equipmentc) General Purpose Signaling Unitsd) Digital Video E
16、quipment and Systemse) Mass Notification and Emergency Communication / Evacuation Equipment and Systemsf) Control servers;g) Alarm Automation System Softwareh) Alarm Receiving Equipmenti) Anti- theft Equipmentj) Automated Teller Machinesk) Fire Alarm Control Systemsl) Network Connected Locking Devic
17、esm) PSIM Systemsn) Smoke Control Systemso) Smoke / Gas / CO Detection Devicesp) Audible and Visual Signaling Devices (fire and general signaling)q) Access Control Equipment and Systems1.2 This Outline of Investigation does not contain general requirements that are intended to addressfunctional test
18、ing of the product unless expressly specified.AUGUST 11, 2017 UL 2900-2-3 5UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL1.3 This Outline of Investigation also describes requirements for the product risk management processcarried out by the
19、vendor of the product, including a list of security controls that the product (or the vendor,as applicable) shall comply with unless a risk assessment done by the vendor shows that the risk of notimplementing one of these security controls is acceptable.2 Normative References2.1 All references are f
20、or the current published version of the document unless stated otherwise.Normative References are included in Section 2 of the Standard for Cybersecurity for Network-Connectable Products, Part1: General Requirements, UL 2900-1.3 GlossaryGlossary Terms are included in Section 3 of the Standard for Cy
21、bersecurity for Network- ConnectableProducts, Part1: General Requirements, UL 2900-1.4 General4.1 This Outline of Investigation comprises of levels of security requirements that are applicable to theproduct with an increasing level of security for higher levels. The levels and their description are
22、definedin Table 4.1.Table 4.1Level DescriptionL1 Includes foundational cybersecurity testing requirements for security risk assessment of software in products covered in thisOutline of Investigation.Provides assessment of general security capabilities of a product with limited knowledge of the inter
23、nal security controls of theproduct. L1 is recommended as a minimum level of assessment.L2 Includes L1 assessment and testing requirements and additional supplemental requirements for security risks assessment ofsoftware in products.Provides assessment of security capabilities of a product with know
24、ledge of internal security controls of the product.L3 Includes L1 and L2 assessment and testing requirements and additional supplemental requirements of the vendor processand management.Provides assessment of security capabilities of a product with knowledge of internal security controls of the prod
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ULSUBJECT2900232017ULOUTLINEFORINVESTIGATIONSOFTWARECYBERSECURITYFORNETWORKCONNECTABLEPRODUCTSPART23PARTICULARREQUIREMENTSFORSECURITYANDLIFESAFETYSIGNALIPDF

链接地址:http://www.mydoc123.com/p-1069376.html