{"id":454537,"date":"2024-10-20T09:36:03","date_gmt":"2024-10-20T09:36:03","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-clc-iec-ts-630742024\/"},"modified":"2024-10-26T17:49:04","modified_gmt":"2024-10-26T17:49:04","slug":"bsi-pd-clc-iec-ts-630742024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-clc-iec-ts-630742024\/","title":{"rendered":"BSI PD CLC IEC\/TS 63074:2024"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
5<\/td>\nAnnex ZA (normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n
6<\/td>\nCONTENTS <\/td>\n<\/tr>\n
8<\/td>\nFOREWORD <\/td>\n<\/tr>\n
10<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
11<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
12<\/td>\n3 Terms, definitions, and abbreviated terms
3.1 Terms and definitions <\/td>\n<\/tr>\n
16<\/td>\n3.2 Abbreviated terms
4 Safety and security overview
4.1 General
4.2 Safety objectives <\/td>\n<\/tr>\n
17<\/td>\n4.3 Security objectives <\/td>\n<\/tr>\n
18<\/td>\nFigures
Figure 1 \u2013 Relationship between threat(s), vulnerabilities, consequence(s)and security risk(s) for SCS performing safety function(s)
Figure 2 \u2013 Possible effects of security risk(s) to an SCS <\/td>\n<\/tr>\n
19<\/td>\n5 Security aspects related to functional safety
5.1 General
5.1.1 Security risk assessment <\/td>\n<\/tr>\n
20<\/td>\n5.1.2 Security risk response strategy
5.2 Security countermeasures
5.2.1 General <\/td>\n<\/tr>\n
21<\/td>\nTable 1 \u2013 Overview of foundational requirements and possible influence(s) on an SCS <\/td>\n<\/tr>\n
22<\/td>\n5.2.2 Identification and authentication
5.2.3 Use control
5.2.4 System integrity
5.2.5 Data confidentiality <\/td>\n<\/tr>\n
23<\/td>\n5.2.6 Restricted data flow
5.2.7 Timely response to events
5.2.8 Resource availability
6 Cybersecurity and functional safety of machinery
6.1 General
6.2 Aspects related to the protection against corruption <\/td>\n<\/tr>\n
24<\/td>\n6.3 Security countermeasures against corruption
6.3.1 General
6.3.2 Potential sources of cyber threats
6.3.3 Multi-factor authentication
6.3.4 Network architecture <\/td>\n<\/tr>\n
25<\/td>\n6.3.5 Portable devices
6.3.6 Wireless communication
6.3.7 Remote access <\/td>\n<\/tr>\n
26<\/td>\n6.3.8 Attack through direct physical connection
7 Verification and maintenance of security countermeasures
8 Information for the user of the machine(s) <\/td>\n<\/tr>\n
27<\/td>\nAnnex A (informative)Basic information related to threats and threat modelling approach
A.1 Evaluation of threats <\/td>\n<\/tr>\n
28<\/td>\nA.2 Examples of threat related to a safety-related device <\/td>\n<\/tr>\n
29<\/td>\nFigure A.1 \u2013 Safety-related device and possible accesses <\/td>\n<\/tr>\n
30<\/td>\nAnnex B (informative)Security risk assessment triggers
B.1 General
B.2 Event driven triggers <\/td>\n<\/tr>\n
31<\/td>\nAnnex C (informative)Example of information flow between device supplier, manufacturerof machine, integrator and user of machine
C.1 General
C.2 Example 1 \u2013 Design phase of the machine
C.3 Example 2 \u2013 Use phase of the machine
Figure C.1 \u2013 Example of generic information flow during design phase <\/td>\n<\/tr>\n
32<\/td>\nFigure C.2 \u2013 Example of generic information flow during use phase
Figure C.3 \u2013 Example of information flow during use phase in context of IEC 62443-2-4 <\/td>\n<\/tr>\n
33<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Safety of machinery. Security aspects related to functional safety of safety-related control systems<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2024<\/td>\n36<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":454550,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-454537","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/454537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/454550"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=454537"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=454537"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=454537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}