PRICES include / exclude VAT
Sponsored link
immediate downloadReleased: 2017-01-30
PD IEC/TR 80001-2-9:2017
Application of risk management for it-networks incorporating medical devices Application guidance. Guidance for use of security assurance cases to demonstrate confidence in IEC TR 80001-2-2 security capabilities
Format
Availability
Price and currency
English Secure PDF
Immediate download
312.18 EUR
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standardfor 1 hour
31.22 EUR
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standardfor 24 hours
93.65 EUR
English Hardcopy
In stock
312.18 EUR
Standard number: | PD IEC/TR 80001-2-9:2017 |
Pages: | 40 |
Released: | 2017-01-30 |
ISBN: | 978 0 580 91661 8 |
Status: | Standard |
DESCRIPTION
PD IEC/TR 80001-2-9:2017
This standard PD IEC/TR 80001-2-9:2017 Application of risk management for it-networks incorporating medical devices is classified in these ICS categories:
- 11.040.01 Medical equipment in general
- 35.240.80 IT applications in health care technology
- mapping specific risk management steps to each of the IEC TR 80001-2-2 security capabilities, identifying associated threats and vulnerabilities and presenting them in the format of a security case with the inclusion of a re-useable security pattern;
- providing guidance for the selection of appropriate security controls to establish security capabilities and presenting them as part of the security case pattern (IEC TR 80001-2-8 provides examples of such security controls);
- providing evidence to support the implementation of a security control, hence providing confidence in the establishment of each of the security capabilities.
The purpose of developing the security case is to demonstrate confidence in the establishment of IEC TR 80001-2-2 security capabilities. The quality of artifacts gathered and documented during the development of the security case is agreed and documented as part of a responsibility agreement between the relevant stakeholders. This document provides guidance for one such methodology, through the use of a specific security pattern, to develop and interpret security cases in a systematic manner.