Annex A Industrial Security Standards ............................................................................... 125 | ||
A . 1 |
Role of Standards and Compliance in Security ....................................................... 125 |
|
A . 2 |
Common Standards and Regulation ....................................................................... 126 |
|
A . 3 |
Methodologies to Assess Security Programs .......................................................... 128 |
|
A . 4 |
Standards for Evaluating Security Products ............................................................ 128 |
|
A . 4.1 |
Common Criteria ............................................................................................................. 128 |
|
A . 4.2 |
Federal Information Processing Standard ( FIPS ) ............................................................ 129 |
|
A . 5 |
Safety Standards and Their Relationship with Security ........................................... 129 |
|
A . 6 |
Privacy Standards , Frameworks and Regulation ..................................................... 129 |
|
A . 6.1 |
ISO / IEC AND NIST Privacy Standards .............................................................................. 129 |
|
A . 6.2 |
Privacy Frameworks ........................................................................................................ 130 |
|
A . 6.3 |
Privacy Regulations ......................................................................................................... 130 |
|
A . 7 |
Protocol Resources ................................................................................................ 131 |
|
A . 8 |
Cloud Security Standards ....................................................................................... 132 |
|
A . 9 |
Standard Repositories ........................................................................................... 133 |
|
A . 10 Supply Chain Integrity Resources ........................................................................... 133 |
Annex B Cyber security Capability Maturity Model ( C2M2 ) ............................................... 135 | ||
B . 1 |
Logical Groupings .................................................................................................. 135 |
|
B . 2 |
Assessment Process .............................................................................................. 137 |
|
B . 2.1 |
Assessment Process Requirements ................................................................................ 138 |
|
B . 2.2 |
Assessment Artifact Requirements ................................................................................. 138 |