ГОСТ Р М ЭК 62443-2-1— 2015
Ссылки на другие стандарты:
[14]IEC 61131-3. Programmable controllers — Part 3: Programming languages
[15]IEC 61512-1, Batch Control. Part 1: Models and terminology
[16]IEC 62264-1. Enterprise-Control System Integration. Part 1: Models and terminology
[17]ISO/IEC Directives. Part 2. Rules for the structure and drafting of International Standards
[18]ISO/IEC 10746-1. Information technology — Open distributed processing — Reference model: Overview
[19]ISO/IEC 10746-2. Information technology — Open distributed processing — Reference model: Foundations
[20] ISO/IEC 15408-1:2008. Information technology — Security techniques — Evaluation criteria for IT security —
Part 1: Introduction and general model
[21] ISO/IEC 15408-2:2008. Information technology — Security techniques — Evaluation criteria for IT security —
Part2: Security functional components
[22]ISO/IEC 15408-3:2008. Information technology — Security techniques — Evaluation criteria for IT security —
Part 3: Security assurance components
[23] ISO/IEC 17799. Information technology — Security techniques — Code of practice for information security
management
[24] ISO/IEC 27001:2005. Information technology — Security techniques — Information security management sys
tems — Requirements
[25]29 CFR 1910.119 — U.S. Occupational Safety and Health Standards — Hazardous Materials — Process safety
management of highly hazardous chemicals
Ссыпки на отраслевые материалы:
[26]Guidance for Addressing Cyber Security in the Chemical Sector. Version 3.0. May 2006. American Chemistry
Council’s Chemical Information Technology Center (ChemITC). available at
<http://www.chemicalcybersecurity.
com/>
[27] Report on Cyber Security Vulnerability Assessments Methodologies. Version 2.0. November 2004. ChemITC.
available at <http:i’
/www.chemicalcybersecurity.conV
>
[28]Cyber Security Architecture Reference Model. Version 1.0. August 2004. ChemITC. available at <
http://www.
chemicaJcybersecurity.com/
>
[29] Report on the Evaluation of Cybersecurity Self-assessment Tools and Methods. November 2004. ChemITC.
available at <http:i’Avww.chemicalcybersecurity.conV>
[30]U.S. Chemicals Sector Cyber Security Strategy. September 2006. available at <
http://www.chemicalcybersecurity.
com/>
Другие документы и опубликованные ресурсы:
[31]Carlson. Tom. Information Security Management: Understanding ISO 17799. 2001. available at <
http://wv<w.
responsiblecaretoolkit.conVpdf&fCybersecurity_att3.pdf
>
[32]Purdue Research Foundation. A Reference Model for Computer Integrated Manufacturing. 1989. ISBN 1-55617-
225-7
[33]Purdue Research Foundation. A Reference Model for Computer Integrated Manufacturing. 1989. ISBN 1-55617-
225-7
[34]NIST Special Publication 800-37. Guide for the Security Certification and Accreditation of Federal Information
Systems. May 2004
[35]NIST Special Publication 800-55. Security Metrics Guide for Information Technology Systems. July 2003
[36]NIST Special Publication 800-61. Computer Security Incident Handling Guide. January 2004
[37]NIST Special Publication 800-82. Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial
Control System Secunty. March 2006. Draft
133