Industrial Internet Security Framework v 1.0 | Page 6

Security Framework Contents
Annexes
Annex A Industrial Security Standards............................................................................... 125
A. 1
Role of Standards and Compliance in Security....................................................... 125
A. 2
Common Standards and Regulation....................................................................... 126
A. 3
Methodologies to Assess Security Programs.......................................................... 128
A. 4
Standards for Evaluating Security Products............................................................ 128
A. 4.1
Common Criteria............................................................................................................. 128
A. 4.2
Federal Information Processing Standard( FIPS)............................................................ 129
A. 5
Safety Standards and Their Relationship with Security........................................... 129
A. 6
Privacy Standards, Frameworks and Regulation..................................................... 129
A. 6.1
ISO / IEC AND NIST Privacy Standards.............................................................................. 129
A. 6.2
Privacy Frameworks........................................................................................................ 130
A. 6.3
Privacy Regulations......................................................................................................... 130
A. 7
Protocol Resources................................................................................................ 131
A. 8
Cloud Security Standards....................................................................................... 132
A. 9
Standard Repositories........................................................................................... 133
A. 10 Supply Chain Integrity Resources........................................................................... 133
Annex B Cyber security Capability Maturity Model( C2M2)............................................... 135
B. 1
Logical Groupings.................................................................................................. 135
B. 2
Assessment Process.............................................................................................. 137
B. 2.1
Assessment Process Requirements................................................................................ 138
B. 2.2
Assessment Artifact Requirements................................................................................. 138
Annex C Security Capabilities and Techniques Tables........................................................ 139 Annex D Revision History.................................................................................................. 144 Annex E Acronyms........................................................................................................... 145 Annex F Glossary.............................................................................................................. 149 Annex G References.......................................................................................................... 150 Index.................................................................................................................................. 169 Use of Information— Terms, Conditions and Notices........................................................... 171
IIC: PUB: G4: V1.0: PB: 20160926- vi-