ГОСТ Р МЭК 62443-3-3—2016
[14] NERC CIP-002, Cyber Security — Critical Cyber Asset Identification
[15] NERC CIP-003. Cyber Security — Security Management Controls
[16] NERC CIP-004, Cyber Security — Personnel & Training
[17] NERC CIP-005. Cyber Security — Electronic Security Perimeter(s)
[18] NERC CIP-006. Cyber Security — Physical Security of Cntical CyberAssets
[19] NERC CIP-007. Cyber Security — Systems Security Management
[20] NERC CIP-008. Cyber Security — Incident Reporting and Response Planning
[21] NERC CIP-009. Cyber Security — Recovery Plans for Critical Cyber Assets
[22] NIST FIPS 199, Standards for Security Categonzation of Federal Information and Information Systems
[23] NIST SP800-52. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations
[24] NIST SP80O-53 Rev. 3, Recommended Security Controls for Federal Information Systems and Organizations
[25] NIST SP800-57. Recommendation for Key Management
[26] NIST SP80O-82. Guide to Industrial Control Systems (ICS) Secunty
[27] NIST SP800-92. Guide to Computer Security Log Management
Другие документы и опубпикованные ресурсы:
[28] Gilsirw. J.D.. Schierholz, R.. Security Assurance Levels: A Vector Approach to Describing Security Requirements.
NIST Publication 906330. October 20. 2010.
[29] IETF RFC 3647, Internet X.509 Public Key Infrastructure. Certificate Policy and Certification Practices Framework
[30] Digital Bond Bandolier project, available at
http://www.digitalbond.com/tools/bandolieri’
[31] Open Web Application Security Project (OWASP), available at
http://www.owasp.ofg/
60