{"id":451756,"date":"2024-10-20T09:20:09","date_gmt":"2024-10-20T09:20:09","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-24-30484649-dc-2024\/"},"modified":"2024-10-26T17:23:35","modified_gmt":"2024-10-26T17:23:35","slug":"bsi-24-30484649-dc-2024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-24-30484649-dc-2024\/","title":{"rendered":"BSI 24\/30484649 DC 2024"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\n30484649-NC.pdf <\/td>\n<\/tr>\n
3<\/td>\n121_156e_CD.pdf <\/td>\n<\/tr>\n
12<\/td>\nFOREWORD <\/td>\n<\/tr>\n
14<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
16<\/td>\n1 Scope <\/td>\n<\/tr>\n
17<\/td>\n2 Normative references
3 Terms, definitions and abbreviated terms
3.1 Terms and definitions <\/td>\n<\/tr>\n
22<\/td>\n3.2 Abbreviated terms <\/td>\n<\/tr>\n
23<\/td>\n4 General
5 Security objectives
6 Security lifecycle management
6.1 General <\/td>\n<\/tr>\n
25<\/td>\n6.2 Security risk assessment
6.2.1 General <\/td>\n<\/tr>\n
26<\/td>\n6.2.2 Relationship between safety and security <\/td>\n<\/tr>\n
27<\/td>\n6.2.3 Impact assessment
6.2.4 Security risk assessment result
6.3 Response to security risk <\/td>\n<\/tr>\n
28<\/td>\n6.4 Security requirement specification
6.5 Roles and responsibilities
6.6 Important data <\/td>\n<\/tr>\n
29<\/td>\n6.7 Control system architecture
6.7.1 Control system
6.7.2 Levels of communication functionalities <\/td>\n<\/tr>\n
31<\/td>\n6.7.3 Levels of connectivity <\/td>\n<\/tr>\n
33<\/td>\n6.7.4 Exposure levels of equipment
6.7.5 Equipment security levels <\/td>\n<\/tr>\n
34<\/td>\n6.7.6 Security protection profile
7 Security requirements
7.1 General
7.2 Physical access and environment
7.2.1 PA \u2013 Physical access and environment requirement <\/td>\n<\/tr>\n
35<\/td>\n7.2.2 Physical access and environment rational
7.2.3 PA-e \u2013 Physical access and environment enhancement <\/td>\n<\/tr>\n
36<\/td>\n7.2.4 Physical access and environment typical implementation <\/td>\n<\/tr>\n
37<\/td>\n7.3 Equipment requirement
7.3.1 General
7.3.1.1 Safety related functions
7.3.1.2 Compensating countermeasure
7.3.1.3 Security requirements for the equipment <\/td>\n<\/tr>\n
38<\/td>\n7.3.2 FR 1 \u2013 Identification and authentication control
7.3.2.1 Purpose
7.3.2.2 Rationale
7.3.2.3 CR 1.1 \u2013 Human user identification and authentication
7.3.2.3.1 Applicability
7.3.2.3.2 Requirement
7.3.2.3.3 Requirement rational <\/td>\n<\/tr>\n
39<\/td>\n7.3.2.3.4 Requirement enhancement
7.3.2.4 CR 1.2 \u2013 Software and equipment identification and authentication
7.3.2.4.1 Applicability
7.3.2.4.2 Requirement
7.3.2.4.3 Requirement rational
7.3.2.4.4 Requirement enhancement
7.3.2.5 CR 1.5 \u2013 Authenticator management
7.3.2.5.1 Applicability
7.3.2.5.2 Requirement
7.3.2.5.3 Requirement rational
7.3.2.6 CR 1.7 \u2013 Strength of password-based authentication
7.3.2.6.1 Applicability
7.3.2.6.2 Requirement
7.3.2.6.3 Requirement rational <\/td>\n<\/tr>\n
40<\/td>\n7.3.2.7 CR 1.8 \u2013 Public key infrastructure certificates
7.3.2.7.1 Applicability
7.3.2.7.2 Requirement
7.3.2.7.3 Requirement rational
7.3.2.8 CR 1.9 \u2013 Strength of public key-based authentication
7.3.2.8.1 Applicability
7.3.2.8.2 Requirement
7.3.2.8.3 Requirement rational
7.3.2.9 CR 1.10 \u2013 Authenticator feedback
7.3.2.9.1 Applicability
7.3.2.9.2 Requirement
7.3.2.9.3 Requirement rational
7.3.2.10 CR 1.11 \u2013 Unsuccessful login attempts
7.3.2.10.1 Applicability
7.3.2.10.2 Requirement <\/td>\n<\/tr>\n
41<\/td>\n7.3.2.10.3 Requirement rational
7.3.2.11 CR 1.14 \u2013 Strength of symmetric key-based authentication
7.3.2.11.1 Applicability
7.3.2.11.2 Requirement
7.3.2.11.3 Requirement rational
7.3.3 FR 2 \u2013 Use control
7.3.3.1 Purpose
7.3.3.2 Rationale
7.3.3.3 CR 2.1 \u2013 Authorization enforcement
7.3.3.3.1 Applicability
7.3.3.3.2 Requirement
7.3.3.3.3 Requirement rational
7.3.3.3.4 Requirement enhancement
7.3.3.4 CR 2.2 \u2013 Wireless use control
7.3.3.4.1 Applicability <\/td>\n<\/tr>\n
42<\/td>\n7.3.3.4.2 Requirement
7.3.3.4.3 Requirement rational
7.3.3.5 EDR 2.4 \u2013 Mobile code
7.3.3.5.1 Applicability
7.3.3.5.2 Requirement
7.3.3.5.3 Requirement rational
7.3.3.5.4 Requirement enhancement
7.3.3.6 SAR 2.4 \u2013 Mobile code
7.3.3.6.1 Applicability
7.3.3.6.2 Requirement
7.3.3.6.3 Requirement rational
7.3.3.6.4 Requirement enhancement <\/td>\n<\/tr>\n
43<\/td>\n7.3.3.7 CR 2.5 \u2013 Session lock
7.3.3.7.1 Applicability
7.3.3.7.2 Requirement
7.3.3.7.3 Requirement rational
7.3.3.8 CR 2.6 \u2013 Remote session termination
7.3.3.8.1 Applicability
7.3.3.8.2 Requirement
7.3.3.8.3 Requirement rational
7.3.3.9 CR 2.7 \u2013 Concurrent session control
7.3.3.9.1 Applicability
7.3.3.9.2 Requirement
7.3.3.9.3 Requirement rational
7.3.3.10 CR 2.8 \u2013 Auditable events
7.3.3.10.1 Applicability <\/td>\n<\/tr>\n
44<\/td>\n7.3.3.10.2 Requirement
7.3.3.10.3 Requirement rational
7.3.3.11 CR 2.9 \u2013 Audit storage capacity
7.3.3.11.1 Applicability
7.3.3.11.2 Requirement
7.3.3.11.3 Requirement rational
7.3.3.12 CR 2.10 \u2013 Response to audit processing failures
7.3.3.12.1 Applicability
7.3.3.12.2 Requirement
7.3.3.12.3 Requirement rational
7.3.3.13 CR 2.11 Timestamp
7.3.3.13.1 Applicability
7.3.3.13.2 Requirement <\/td>\n<\/tr>\n
45<\/td>\n7.3.3.13.3 Requirement rational
7.3.3.13.4 Requirement enhancement
7.3.3.14 CR 2.12 \u2013 Non-repudiation
7.3.3.14.1 Applicability
7.3.3.14.2 Requirement
7.3.3.14.3 Requirement rational
7.3.3.15 EDR 2.13 \u2013 Use of physical diagnostic and test interfaces
7.3.3.15.1 Applicability
7.3.3.15.2 Requirement
7.3.3.15.3 Requirement rational
7.3.4 FR 3 \u2013 System integrity
7.3.4.1 Purpose
7.3.4.2 Rationale
7.3.4.3 CR 3.1 \u2013 Communication integrity
7.3.4.3.1 Applicability <\/td>\n<\/tr>\n
46<\/td>\n7.3.4.3.2 Requirement
7.3.4.3.3 Requirement rational
7.3.4.3.4 Requirement enhancement
7.3.4.4 EDR 3.2 \u2013 Protection from malicious code
7.3.4.4.1 Applicability
7.3.4.4.2 Requirement
7.3.4.4.3 Requirement rational
7.3.4.4.4 Additional requirement
7.3.4.4.5 Additional requirement rational <\/td>\n<\/tr>\n
47<\/td>\n7.3.4.5 SAR 3.2 \u2013 Protection from malicious code
7.3.4.5.1 Applicability
7.3.4.5.2 Requirement
7.3.4.5.3 Requirement rational
7.3.4.6 CR 3.3 \u2013 Security functionality verification
7.3.4.6.1 Applicability
7.3.4.6.2 Requirement
7.3.4.6.3 Requirement rational
7.3.4.6.4 Requirement enhancement
7.3.4.7 CR 3.4 \u2013 Software and information integrity
7.3.4.7.1 Applicability
7.3.4.7.2 Requirement
7.3.4.7.3 Requirement rational <\/td>\n<\/tr>\n
48<\/td>\n7.3.4.7.4 Requirement enhancement
7.3.4.7.5 Additional requirement
7.3.4.7.6 Additional requirement rational
7.3.4.8 CR 3.5 \u2013 Input validation
7.3.4.8.1 Applicability
7.3.4.8.2 Requirement
7.3.4.8.3 Requirement rational
7.3.4.9 CR 3.6 \u2013 Deterministic output
7.3.4.9.1 Applicability
7.3.4.9.2 Requirement <\/td>\n<\/tr>\n
49<\/td>\n7.3.4.9.3 Requirement rational
7.3.4.10 CR 3.7 \u2013 Error handling
7.3.4.10.1 Applicability
7.3.4.10.2 Requirement
7.3.4.10.3 Requirement rational
7.3.4.11 CR 3.8 \u2013 Session Integrity
7.3.4.11.1 Applicability
7.3.4.11.2 Requirement
7.3.4.11.3 Requirement rational
7.3.4.12 CR 3.9 \u2013 Protection of audit information
7.3.4.12.1 Applicability
7.3.4.12.2 Requirement
7.3.4.12.3 Requirement rational
7.3.4.13 EDR 3.10 \u2013 Support for Updates
7.3.4.13.1 Applicability <\/td>\n<\/tr>\n
50<\/td>\n7.3.4.13.2 Requirement
7.3.4.13.3 Requirement rational
7.3.4.13.4 Requirement enhancement
7.3.4.14 EDR 3.11 \u2013 Physical tamper resistance and detection
7.3.4.14.1 Applicability
7.3.4.14.2 Requirement
7.3.4.14.3 Requirement rational
7.3.4.15 EDR 3.12 \u2013 Provisioning product supplier roots of trust
7.3.4.15.1 Applicability
7.3.4.15.2 Requirement
7.3.4.15.3 Requirement rational
7.3.4.16 EDR 3.13 \u2013 Provisioning asset owner roots of trust
7.3.4.16.1 Applicability
7.3.4.16.2 Requirement
7.3.4.16.3 Requirement rational <\/td>\n<\/tr>\n
51<\/td>\n7.3.4.17 EDR 3.14 \u2013 Integrity of the boot process
7.3.4.17.1 Applicability
7.3.4.17.2 Requirement
7.3.4.17.3 Requirement rational
7.3.4.17.4 Requirement enhancement
7.3.5 FR 4 \u2013 Data confidentiality
7.3.5.1 Purpose
7.3.5.2 Rationale
7.3.5.3 CR 4.3 \u2013 Use of cryptography
7.3.5.3.1 Applicability
7.3.5.3.2 Requirement
7.3.5.3.3 Requirement rational
7.3.6 FR 5 \u2013 Restricted data flow <\/td>\n<\/tr>\n
52<\/td>\n7.3.7 FR 6 \u2013 Timely response to events
7.3.7.1 Purpose
7.3.7.2 Rationale
7.3.7.3 CR 6.1 \u2013 Audit log accessibility
7.3.7.3.1 Applicability
7.3.7.3.2 Requirement
7.3.7.3.3 Requirement rational
7.3.8 FR 7 \u2013 Resource availability
7.3.8.1 Purpose
7.3.8.2 Rationale
7.3.8.3 CR 7.1 \u2013 Denial of service protection <\/td>\n<\/tr>\n
53<\/td>\n7.3.8.3.1 Applicability
7.3.8.3.2 Requirement
7.3.8.3.3 Requirement rational
7.3.8.3.4 Additional requirement
7.3.8.4 CR 7.2 \u2013 Resource management
7.3.8.4.1 Applicability
7.3.8.4.2 Requirement
7.3.8.4.3 Requirement rational
7.3.8.5 CR 7.3 \u2013 Control system backup
7.3.8.5.1 Applicability
7.3.8.5.2 Requirement <\/td>\n<\/tr>\n
54<\/td>\n7.3.8.5.3 Requirement rational
7.3.8.5.4 Requirement enhancement
7.3.8.6 CR 7.4 \u2013 Control system recovery and reconstitution
7.3.8.6.1 Applicability
7.3.8.6.2 Requirement
7.3.8.6.3 Requirement rational
7.3.8.7 CR 7.6 \u2013 Network and security configuration settings
7.3.8.7.1 Applicability
7.3.8.7.2 Requirement
7.3.8.7.3 Requirement rational
7.3.8.8 CR 7.7 \u2013 Least functionality
7.3.8.8.1 Applicability
7.3.8.8.2 Requirement
7.3.8.8.3 Requirement rational <\/td>\n<\/tr>\n
55<\/td>\n7.3.8.9 CR 7.8 \u2013 Control system inventory
7.3.8.9.1 Applicability
7.3.8.9.2 Requirement
7.3.8.9.3 Requirement rational
8 Instructions for installation, operation and maintenance
8.1 User instruction requirement <\/td>\n<\/tr>\n
56<\/td>\n8.2 User instruction rational
8.3 User instruction enhancement
8.4 User instruction implementation
9 Conformance verification and testing
9.1 General
9.2 Life cycle management
9.3 Physical access
9.3.1 Verification of physical access and environment <\/td>\n<\/tr>\n
57<\/td>\n9.3.2 Physical access and environment enhancement
9.4 FR 1 \u2013 Identification and authentication control
9.4.1 CR 1.1 \u2013 Human user identification and authentication
9.4.1.1 Requirement verification
9.4.1.2 Requirement enhancement verification
9.4.2 CR 1.2 \u2013 Software and equipment identification and authentication
9.4.2.1 Requirement verification <\/td>\n<\/tr>\n
58<\/td>\n9.4.2.2 Requirement enhancement verification
9.4.3 CR 1.5 \u2013 Authenticator management
9.4.3.1 Requirement verification
9.4.4 CR 1.7 \u2013 Strength of password-based authentication
9.4.4.1 Requirement verification
9.4.5 CR 1.8 \u2013 Public key infrastructure certificates
9.4.5.1 Requirement verification <\/td>\n<\/tr>\n
59<\/td>\n9.4.6 CR 1.9 \u2013 Strength of public key-based authentication
9.4.6.1 Requirement verification
9.4.7 CR 1.10 \u2013 Authenticator feedback
9.4.7.1 Requirement verification
9.4.8 CR 1.11 \u2013 Unsuccessful login attempts
9.4.8.1 Requirement verification
9.4.9 CR 1.14 \u2013 Strength of symmetric key-based authentication
9.4.9.1 Requirement verification <\/td>\n<\/tr>\n
60<\/td>\n9.5 FR 2 \u2013 Use control
9.5.1 CR 2.1 \u2013 Authorization enforcement
9.5.1.1 Requirement verification
9.5.1.2 Requirement enhancement verification
9.5.2 CR 2.2 \u2013 Wireless use control
9.5.2.1 Requirement verification
9.5.3 EDR 2.4 \u2013 Mobile code
9.5.3.1 Requirement verification <\/td>\n<\/tr>\n
61<\/td>\n9.5.3.2 Requirement enhancement verification
9.5.4 SAR 2.4 \u2013 Mobile code
9.5.4.1 Requirement verification
9.5.4.2 Requirement enhancement verification
9.5.5 CR 2.5 \u2013 Session lock
9.5.5.1 Requirement verification
9.5.6 CR 2.6 \u2013 Remote session termination
9.5.6.1 Requirement verification <\/td>\n<\/tr>\n
62<\/td>\n9.5.7 CR 2.7 \u2013 Concurrent session control
9.5.7.1 Requirement verification
9.5.8 CR 2.8 \u2013 Auditable events
9.5.8.1 Requirement verification
9.5.9 CR 2.9 \u2013 Audit storage capacity
9.5.9.1 Requirement verification
9.5.10 CR 2.10 \u2013 Response to audit processing failures
9.5.10.1 Requirement verification <\/td>\n<\/tr>\n
63<\/td>\n9.5.11 CR 2.11 \u2013 Timestamps
9.5.11.1 Requirement verification
9.5.11.2 Requirement enhancement verification
9.5.12 CR 2.12 \u2013 Non-repudiation
9.5.12.1 Requirement verification
9.5.13 EDR 2.13 \u2013 Use of physical diagnostic and test interfaces
9.5.13.1 Requirement verification
9.6 FR 3 \u2013 System integrity
9.6.1 CR 3.1 \u2013 Communication integrity
9.6.1.1 Requirement verification <\/td>\n<\/tr>\n
64<\/td>\n9.6.1.2 Requirement enhancement verification
9.6.2 EDR 3.2 \u2013 Protection from malicious code
9.6.2.1 Requirement verification
9.6.3 SAR 3.2 \u2013 Protection from malicious code
9.6.3.1 Requirement verification
9.6.4 CR 3.3 \u2013 Security functionality verification
9.6.4.1 Requirement verification <\/td>\n<\/tr>\n
65<\/td>\n9.6.4.2 Requirement enhancement verification
9.6.5 CR 3.4 \u2013 Software and information integrity
9.6.5.1 Requirement verification
9.6.5.2 Requirement enhancement verification
9.6.6 CR 3.5 \u2013 Input validation
9.6.6.1 Requirement verification
9.6.7 CR 3.6 \u2013 Deterministic output
9.6.7.1 Requirement verification <\/td>\n<\/tr>\n
66<\/td>\n9.6.8 CR 3.7 \u2013 Error handling
9.6.8.1 Requirement verification
9.6.9 CR 3.8 \u2013 Session Integrity
9.6.9.1 Requirement verification
9.6.10 CR 3.9 \u2013 Protection of audit information
9.6.10.1 Requirement verification
9.6.11 EDR 3.10 \u2013 Support for updates
9.6.11.1 Requirement verification <\/td>\n<\/tr>\n
67<\/td>\n9.6.11.2 Requirement enhancement verification
9.6.12 EDR 3.11 \u2013 Physical tamper resistance and detection
9.6.12.1 Requirement verification
9.6.13 EDR 3.12 \u2013 Provisioning product supplier roots of trust
9.6.13.1 Requirement verification
9.6.14 EDR 3.13 \u2013 Provisioning asset owner roots of trust
9.6.14.1 Requirement verification <\/td>\n<\/tr>\n
68<\/td>\n9.6.15 EDR 3.14 \u2013 Integrity of the boot process
9.6.15.1 Requirement verification
9.6.15.2 Requirement enhancement verification
9.7 FR 4 \u2013 Data confidentiality
9.7.1 CR 4.3 \u2013 Use of cryptography
9.7.1.1 Requirement verification
9.8 FR 6 \u2013 Timely response to events
9.8.1 CR 6.1 \u2013 Audit log accessibility
9.8.1.1 Requirement verification <\/td>\n<\/tr>\n
69<\/td>\n9.8.1.2 Requirement enhancement verification
9.9 FR 7 \u2013 Resource availability
9.9.1 CR 7.1 \u2013 Denial of service protection
9.9.1.1 Requirement verification
9.9.1.2 Requirement enhancement verification
9.9.2 CR 7.2 \u2013 Resource management
9.9.2.1 Requirement verification
9.9.3 CR 7.3 \u2013 Control system backup
9.9.3.1 Requirement verification <\/td>\n<\/tr>\n
70<\/td>\n9.9.3.2 Requirement enhancement verification
9.9.4 CR 7.4 \u2013 Control system recovery and reconstitution
9.9.4.1 Requirement verification
9.9.5 CR 7.6 \u2013 Network and security configuration settings
9.9.5.1 Requirement verification
9.9.6 CR 7.7 \u2013 Least functionality
9.9.6.1 Requirement verification
9.9.7 CR 7.8 \u2013 Control system inventory
9.9.7.1 Requirement verification <\/td>\n<\/tr>\n
72<\/td>\nAnnex A (informative) Cybersecurity and electrical system architecture
A.1 General
A.2 Typical architecture involving switchgear and controlgear and their assembly
A.2.1 Building <\/td>\n<\/tr>\n
73<\/td>\nA.2.2 Manufacturing <\/td>\n<\/tr>\n
75<\/td>\nAnnex B (informative) Use case studies
B.1 General <\/td>\n<\/tr>\n
76<\/td>\nB.2 Use case 1 \u2013 Protection against Denial of Service (DoS) attack <\/td>\n<\/tr>\n
77<\/td>\nB.3 Use case 2 \u2013 Protection against unauthorized modification of sensing device <\/td>\n<\/tr>\n
78<\/td>\nB.4 Use case 3 \u2013 Protection against unauthorized modification of wireless equipment <\/td>\n<\/tr>\n
79<\/td>\nB.5 Use case 4 \u2013 Protection against threat actor remotely taking control of a \u201cManaging\u201d intelligent assembly <\/td>\n<\/tr>\n
81<\/td>\nAnnex C (Informative) Development methods of cybersecurity aspects <\/td>\n<\/tr>\n
82<\/td>\nAnnex D (informative) Instructions to be provided to the user of the equipment and for integration into an assembly
D.1 General
D.2 Risk assessment and security planning
D.2.1 Risk assessment
D.2.2 Security plan <\/td>\n<\/tr>\n
83<\/td>\nD.3 Recommendations for design and installation of the system integrating switchgear and controlgear and their assemblies
D.3.1 General access control
D.3.2 Recommendations for local access <\/td>\n<\/tr>\n
84<\/td>\nD.3.3 Recommendations for remote access
D.3.4 Recommendations for firmware upgrades <\/td>\n<\/tr>\n
85<\/td>\nD.3.5 Recommendations for the end of life
D.4 Instructions for an assembly <\/td>\n<\/tr>\n
86<\/td>\nAnnex E (normative) Security protection profile of soft-starter, motor starter and semiconductor controller
E.1 Introduction
E.1.1 Protection profile reference
E.1.2 Target of evaluation overview
E.1.3 General mission objectives <\/td>\n<\/tr>\n
87<\/td>\nE.1.4 Features
E.1.5 Product usage
E.1.6 Users <\/td>\n<\/tr>\n
88<\/td>\nE.2 Assumptions
E.3 Conformance claims and conformance statement
E.4 Security problem definition
E.4.1 Critical assets of the environment <\/td>\n<\/tr>\n
89<\/td>\nE.4.2 ToE critical assets
E.4.3 Threat Model
E.4.3.1 Attackers
E.4.3.2 Threats <\/td>\n<\/tr>\n
90<\/td>\nE.5 Security objectives
E.6 Security requirements
E.6.1 Security functional requirements
E.6.2 Security assurance requirements <\/td>\n<\/tr>\n
92<\/td>\nAnnex F (normative) Security protection profiles of circuit-breaker
F.1 Introduction
F.1.1 Protection profile reference
F.1.2 Target of evaluation overview
F.1.3 General mission objectives <\/td>\n<\/tr>\n
93<\/td>\nF.1.4 Features
F.1.5 Product usage
F.1.6 Users
F.2 Assumptions <\/td>\n<\/tr>\n
94<\/td>\nF.3 Conformance claims and conformance statement
F.4 Security problem definition
F.4.1 Critical assets of the environment
F.4.2 ToE critical assets <\/td>\n<\/tr>\n
95<\/td>\nF.4.3 Threat Model
F.4.3.1 Attackers
F.4.3.2 Threats <\/td>\n<\/tr>\n
96<\/td>\nF.5 Security objectives
F.6 Security requirements
F.6.1 Security functional requirements
F.6.2 Security assurance requirements <\/td>\n<\/tr>\n
97<\/td>\nAnnex G (normative) Protection profile of transfer switch equipment
G.1 Introduction
G.1.1 Protection profile reference
G.1.2 Target of evaluation overview
G.1.2.1 Overview <\/td>\n<\/tr>\n
98<\/td>\nG.1.3 General mission objectives
G.1.4 Features
G.1.5 Product usage
G.1.6 Users
G.2 Assumptions
G.3 Conformance claims and conformance statement <\/td>\n<\/tr>\n
99<\/td>\nG.4 Security problem definition
G.4.1 Critical assets of the environment
G.4.2 ToE critical assets <\/td>\n<\/tr>\n
100<\/td>\nG.4.3 Threat Model
G.4.3.1 Attackers
G.4.3.2 Threats
G.5 Security objectives
G.6 Security requirements
G.6.1 Security functional requirements <\/td>\n<\/tr>\n
101<\/td>\nG.6.2 Security assurance requirements <\/td>\n<\/tr>\n
102<\/td>\nAnnex H (normative) Protection profile for wireless controlgear with its communication interface
H.1 Introduction
H.1.1 Protection profile reference
H.1.2 Target of evaluation overview <\/td>\n<\/tr>\n
103<\/td>\nH.1.3 General mission objectives
H.1.4 Features
H.1.5 Product usage
H.1.6 Users
H.2 Assumptions <\/td>\n<\/tr>\n
104<\/td>\nH.3 Conformance claims and conformance statement
H.4 Security problem definition
H.4.1 Critical assets of the environment
H.4.2 ToE critical assets <\/td>\n<\/tr>\n
105<\/td>\nH.4.3 Threat Model
H.4.3.1 Attackers
H.4.3.2 Threats <\/td>\n<\/tr>\n
106<\/td>\nH.5 Security objectives
H.6 Security requirements
H.6.1 Security functional requirements
H.6.2 Security assurance requirements <\/td>\n<\/tr>\n
107<\/td>\nAnnex I (informative) Equipment requirements by level of exposure <\/td>\n<\/tr>\n
108<\/td>\nAnnex J (informative) Bridging references to cybersecurity management systems <\/td>\n<\/tr>\n
114<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS EN IEC 63208 Switchgear and controlgear and their assemblies for low voltage – Security aspects<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2024<\/td>\n116<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":451766,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[517,2641],"product_tag":[],"class_list":{"0":"post-451756","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-29-130-20","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/451756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/451766"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=451756"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=451756"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=451756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}