ImageVerifierCode 换一换
格式:PDF , 页数:26 ,大小:64.40KB ,
资源ID:1069373      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1069373.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(UL SUBJECT 2900-1-2016 UL Outline for Investigation Software Cybersecurity for Network- Connectable Products Part 1 General Requirements (Issue 2).pdf)为本站会员(unhappyhay135)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

UL SUBJECT 2900-1-2016 UL Outline for Investigation Software Cybersecurity for Network- Connectable Products Part 1 General Requirements (Issue 2).pdf

1、UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULMARCH 30, 20161UL 2900-1Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part 1: General RequirementsIssue Number: 1March 30, 2016Summary of TopicsThe UL 2900

2、-1 outline aims to provide a minimum set of requirements thatdevelopers of network-connectable products can pursue to establish abaseline of protection against vulnerabilities and software weaknesses,along with a minimum set of security risk controls and documentation toconsider relative to their ex

3、isting overall product risk assessments.ULs Outlines of Investigation are copyrighted by UL. Neither a printed norelectronic copy of an Outline of Investigation should be altered in any way. All ofULs Outlines of Investigation and all copyrights, ownerships, and rights regardingthose Outlines of Inv

4、estigation shall remain the sole and exclusive property of UL.COPYRIGHT 2016 UNDERWRITERS LABORATORIES INC.UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULMARCH 30, 2016UL 2900-12No Text on This PageUL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR F

5、URTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULCONTENTSINTRODUCTION1 Scope .52 Normative References .53 Glossary .7DOCUMENTATION OF PRODUCT, PRODUCT DESIGN AND PRODUCT USE4 Product Documentation .105 Product Design Documentation 116 Documentation for Product Use 11RISK CONTROLS7 Genera

6、l .128 Access Control, User Authentication and User Authorization 129 Remote Communication 1310 Cryptography .1411 Product Management .14RISK MANAGEMENT12 Vendor Product Risk Management Process 15VULNERABILITIES AND EXPLOITS13 Known Vulnerability Testing 1714 Malware Testing 1715 Malformed Input Tes

7、ting .1716 Structured Penetration Testing .19SOFTWARE WEAKNESSES17 Software Weakness Analysis .1918 Static Source Code Analysis 2019 Static Binary and Bytecode Analysis 20APPENDIX AA1 Sources for Software Weaknesses .A1APPENDIX BB1 Requirements for Secure Mechanisms for Storing Sensitive Data and Pe

8、rsonally IdentifiableData B1APPENDIX CMARCH 30, 2016 UL 2900-1 3UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULC1 Requirements for Security Functions .C1MARCH 30, 2016UL 2900-14UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION O

9、RDISTRIBUTION WITHOUT PERMISSION FROM ULINTRODUCTION1 Scope1.1 This outline applies to network-connectable products that shall be evaluated and tested forvulnerabilities, software weaknesses and malware.1.2 This outline describes:a) Requirements regarding the vendors risk management process for thei

10、r product.b) Methods by which a product shall be evaluated and tested for the presence of vulnerabilities,software weaknesses and malware.c) Requirements regarding the presence of security risk controls in the architecture and designof a product.1.3 This outline does not contain requirements regardi

11、ng functional testing of a product. This means thisoutline contains no requirements to verify that the product functions as designed.1.4 This outline does not contain requirements regarding the hardware contained in a product.2 Normative References2.1 All references are for the latest published vers

12、ion of the document, unless stated otherwise.1 UL 2900-2-1Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part 2-1: ParticularRequirements for Network Connectable Components of Healthcare Systems2 UL 2900-2-2Outline of Investigation for Software Cybersecurity fo

13、r Network-Connectable Products, Part 2-2: ParticularRequirements for Industrial Control Systems3 ITU-T X.1520,Cybersecurity information exchange Vulnerability/state exchange Common vulnerabilities andexposures (CVE)4 ITU-T X.1521,Cybersecurity information exchange Vulnerability/state exchange Common

14、 vulnerability scoringsystem (CVSS)5 ITU-T X.1524,Cybersecurity information exchange Vulnerability/state exchange Common weakness enumeration(CWE)6 ITU-T X.1525,Cybersecurity information exchange Vulnerability/state exchange Common weakness scoring system(CWSS)7 ITU-T X.1544,Cybersecurity informatio

15、n exchange Event/incident/heuristics exchange Common attack patternenumeration and classification (CAPEC)MARCH 30, 2016 UL 2900-1 5UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL8 Common Weakness Risk Analysis Framework (CWRAF); retrievable f

16、rom https:/cwe.mitre.org/cwraf/9 CWE/SANS Top 25 Most Dangerous Software Errors; retrievable from cwe.mitre.org/top2510 CWE On the Cusp: other weaknesses to consider; retrievable fromhttps:/cwe.mitre.org/top25/cusp.html11 OWASP Top 10; latest version retrievable fromhttps:/www.owasp.org/index.php/To

17、p_10_2013-Top_1012 ISO/IEC 11889,Information technology Trusted platform module library13 ISO/IEC 9796 (all parts),Information technology Security techniques Digital signature scheme giving message recovery14 ISO/IEC 9797 (all parts),Information technology Security techniques Message Authentication

18、Codes (MACs)15 ISO/IEC 9798 (all parts),Information technology Security techniques Entity authentication16 ISO/IEC 10118 (all parts),Information technology Security techniques Hash-functions17 ISO/IEC 11770 (all parts),Information technology Security techniques Key management18 ISO/IEC 14888 (all pa

19、rts),Information technology Security techniques Digital signatures with appendix19 ISO/IEC 15946 (all parts),Information technology Security techniques Cryptographic techniques based on elliptic curves20 ISO/IEC 18033 (all parts),Information technology Security techniques Encryption algorithms21 ISO

20、/IEC 19772 (all parts),Information technology Security techniques Authenticated encryption22 NIST FIPS 140-2, Annex A: Approved Security Functions23 NIST FIPS 140-2, Annex D: Approved Key Establishment TechniquesMARCH 30, 2016UL 2900-16UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION

21、ORDISTRIBUTION WITHOUT PERMISSION FROM UL3 Glossary3.1 ATTACK The use of one or more exploit(s) by an adversary to achieve one or more negativetechnical impact(s).3.2 ATTACK PATTERN A description of a generic method for carrying out attacks.3.3 AUTHENTICATION The process of verifying the identity of

22、 an entity.3.4 AUTHENTICITY The property that data, information or software originate from a specific entity,which may or may not have been authenticated.3.5 AUTHORIZATION The process of giving an entity permission to access or manipulate the product,or the property that an entity has such permissio

23、n.3.6 BINARY CODE Machine instructions and/or data in a format intended for a specific processorarchitecture.3.7 BYTECODE Instructions and/or data that are created from source code as an intermediate stepbefore generating binary code. Bytecode is independent of a specific processor architecture and

24、istypically handled by a virtual machine or interpreter.3.8 COMMON ATTACK PATTERN ENUMERATION AND CLASSIFICATION (CAPEC) Specified inITU-T X.1544 (ref. 7), the CAPEC is a publicly available resource providing a list and classification of alarge number of attack mechanisms based on the topology of th

25、e environment.3.9 COMMON VULNERABILITIES AND EXPOSURES (CVE) Specified in ITU-T X.1520 (ref. 3), theCVE is a publicly available resource providing common identifiers for known vulnerabilities and exposures.3.10 COMMON VULNERABILITY SCORING SYSTEM (CVSS) Specified in ITU-T X.1521 (ref. 4), theCVSS is

26、 a publicly available resource providing a means for prioritizing vulnerabilities in terms of exploitpotential.3.11 COMMON WEAKNESS ENUMERATION (CWE) Specified in ITU-T X.1524 (ref. 5), the CWE isa publicly available resource providing a structured means to exchange unified, measurable sets ofinform

27、ation providing common identifiers for software weaknesses, as well as consequences, detectionmethods and examples of each weakness.3.12 COMMON WEAKNESS SCORING SYSTEM (CWSS) Specified in ITU-T X.1525 (ref 6), theCWSS is a publicly available resource providing a means for prioritizing CWEs based on

28、their technicalimpact, ease of attack, and other factors.3.13 COMMUNICATION PROTOCOL A system of rules regarding syntax, semantics, synchronizationand error recovery of communication, allowing two or more entities to exchange information.3.14 CONFIDENTIALITY The property that data, information or so

29、ftware is not made available ordisclosed to unauthorized individuals, entities, or processes.MARCH 30, 2016 UL 2900-1 7UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL3.15 EXECUTABLE A file containing instructions in binary code, which can be

30、used by a computer toperform computational tasks.3.16 EXPLOIT An input or action designed to take advantage of a weakness (or multiple weaknesses)and achieve a negative technical impact.NOTE: The existence of an exploit targeting a weakness is what makes that weakness a vulnerability.3.17 EXTERNAL I

31、NTERFACE An interface of the product that is designed to potentially allow accessto an entity outside the product; for example user interfaces, remote interfaces, local interfaces, wirelessinterfaces and file inputs.3.18 FILE A collection of data or program instructions stored as a unit with a singl

32、e name.3.19 GENERATIONAL MALFORMED INPUT TESTING A method of deriving malformed input testcases by using detailed knowledge of the syntax and semantics of the specifications of the protocol or fileformat being tested.3.20 HARM Physical injury or damage to the health of people, or damage to property

33、or theenvironment.3.21 INTEGRITY The property of data, information or software not having been improperly modified.3.22 KNOWN VULNERABILITY A vulnerability described in the National Vulnerability Database (NVD).NOTE: The NVD is accessible at https:/nvd.nist.gov.3.23 LOCAL INTERFACE An external inter

34、face potentially allowing access only to individuals, entitiesor systems within a very acute proximity requiring physical access to the product.NOTE: An example is a physically wired direct connection like a USB connection or RS 485 connectionwithin physical proximity.3.24 MALFORMED INPUT TESTING A

35、black-box testing technique used to reveal softwareweaknesses and vulnerabilities in a product by triggering them with invalid or unexpected inputs on theexternal interfaces of the product.3.25 MALFORMED INPUT TEST CASE The basic unit of malformed input testing, which consists of asingle interaction

36、 with the product under test.3.26 MALWARE Software designed with malicious intent to disrupt normal function, gather sensitiveinformation, and/or access other connected systems.3.27 NETWORK A collection of nodes and telecommunication links, allowing connected devices,software etc. to exchange data a

37、nd communicate.MARCH 30, 2016UL 2900-18UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL3.28 PENETRATION TESTING A mechanism of evaluation of a product to exploit vulnerabilities andweaknesses discovered in the vulnerability assessment phase.3.

38、29 PERSONALLY IDENTIFIABLE INFORMATION Any information belonging to an individual that canuniquely distinguish an individual or information that can be used to derive their identity.NOTE: This can be, but is not limited to an individuals location, health records and/or financial recordsthat when use

39、d can determine the actual individuals identity.3.30 PRODUCT The network-connectable device, software or system under test.3.31 PROTOCOL See COMMUNICATION PROTOCOL3.32 REMOTE INTERFACE An external interface potentially allowing access to individuals, entities orprocesses regardless of geographic dis

40、tance to the product.3.33 RISK The potential for harm or damage, measured as the combination of the likelihood ofoccurrence of that harm or damage and the impact of that harm or damage.3.34 RISK ANALYSIS The systematic use of available information to identify threats and to estimaterisk.3.35 RISK CO

41、NTROL Any action taken or feature implemented to reduce risk.3.36 RISK MANAGEMENT Systematic application of management policies, procedures and practicesto the tasks of analyzing, evaluating, controlling and monitoring risk.3.37 SECURE ELEMENT A tamper-resistant platform like a chip capable of secur

42、ely hostingapplications and their confidential and cryptographic data and will prevent unauthorized access.3.38 SECURITY The state of having acceptable levels of confidentiality, integrity, authenticity and/oravailability of product data and/or functionality.3.39 SENSITIVE DATA Sensitive data is any

43、 critical security parameter that can compromise the useand security of the product such as passwords, keys, seeds for random number generators, authenticationdata.3.40 SOFTWARE All pre-loaded data which creates, affects, and/or modifies the functionality of theproduct. This includes, but is not lim

44、ited to, firmware, scripts, initialization files, pre-compiled code andinterpreted code. This does not include software preloaded and programmed in an IC chip for smallfunctions that require physical access and removal of the IC chip for reprogramming.3.41 SOFTWARE WEAKNESS A mistake in the architec

45、ture, design, coding, build process orconfiguration of software in the product, that may render the product vulnerable to a security exploit.3.42 SOURCE CODE Computer instructions written in a human-readable high-level computerlanguage, usually as text, including possible comments.MARCH 30, 2016 UL

46、2900-1 9UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL3.43 STATIC ANALYSIS A process in which source code, bytecode or binary code is analyzed withoutexecuting the code.3.44 TEMPLATE MALFORMED INPUT TESTING Also known as mutational fuzzing,

47、templatemalformed input testing generates test cases by introducing anomalies into a valid message or file.Template malformed input test cases are not protocol aware and therefore will not contain items such ascorrect checksums and valid session IDs.3.45 THREAT A potentially successful attack, invol

48、ving an adversary utilizing specific techniques andresources to take advantage of specific vulnerabilities or lack of risk controls within a product.3.46 TRUSTED PLATFORM MODULE An international standard that defines the requirements for adedicated microprocessor with requirements for storage of cry

49、ptographic keys used to secure physicalproducts and the software contained.3.47 USER A person or process using a product or accessing it over one of its external interfaces.3.48 VENDOR The manufacturer, reseller or supplier of a product, which takes final responsibility forthe cybersecurity of that product towards the purchaser and/or user and which submits that prod

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1