当前位置: 首页 > news >正文

ISO/PAS 5112 附录A 与21434 WPs的映射关系

Audit questionnaire

Evidence examples

A.2.1 Cybersecurity management 网络安全管理

Q1.1 Are cybersecurity policy, rules and processes defined?
Q1.1 是否定义了网络安全政策、规则和流程?

[WP-05-01] Cybersecurity policy, rules and processes

Q1.2 Are cybersecurity-relevant processes managed?
Q1.2 是否对网络安全相关流程进行了管理?

[WP-05-01] Cybersecurity policy, rules and processes
[WP-05-03] Evidence of organization’s management systems
[WP-05-04] Evidence of tool management
[WP-05-05] Organizational cybersecurity audit report

Q1.3 Are cybersecurity culture and cybersecurity awareness established, implemented, and maintained?
Q1.3 是否建立、实施并维护网络安全文化和网络安全意识?

[WP-05-02] Evidence of competence management, awareness management and continuous improvement

Q1.4 Is a process established, implemented, and maintained to manage project dependent cybersecurity?
Q1.4 是否建立、实施并维护流程以管理项目相关的网络安全。

[WP-06-01] Cybersecurity plan
[WP-06-02] Cybersecurity case
[WP-06-03] Cybersecurity assessment report

A.2.2 Continual cybersecurity activities 持续性网络安全活动

Q2.1 Is a process established, implemented, and maintained to monitor for cybersecurity information?
Q2.1 是否建立、实施并维护流程以监视网络安全信息?

[WP-08-01] Sources for cybersecurity information
[WP-08-02] Triggers
[WP-08-03] Cybersecurity events

Q2.2 Is a process established, implemented, and maintained to evaluate cybersecurity events?
Q2.2 是否建立、实施并维护流程以评估网络安全事件?

[WP-08-04] Weaknesses from cybersecurity events

Q2.3 Is a process established, implemented, and maintained to identify and analyse vulnerabilities?
Q2.3 是否建立、实施并维护流程以识别和分析漏洞?

[WP-08-05] Vulnerability analysis

Q2.4 Is a process established, implemented, and maintained to manage identified vulnerabilities?
Q2.4 是否建立、实施并维护流程以管理已识别的漏洞?

[WP-08-06] Evidence of managed vulnerabilities

A.2.3 Risk assessment and methods 风险评估及方法

Q3.1 Are methods established, implemented, and maintained to determine cybersecurity risks for an item across concept, product development and post-development phases?
Q3.1 是否建立、实施并维护方法以确定相关项在概念、产品开发和后开发阶段的网络安全风险?

[WP-15-04] Impact ratings with associated impact categories
[WP-15-06] Attack feasibility ratings
[WP-15-07] Risk values

Q3.2 Is a process established, implemented, and maintained to perform a threat analysis and risk assessment (TARA) for an item across concept, product development and post-development phases?
Q3.2 是否建立、实施并维护流程以对相关项在概念、产品开发和后开发阶段实施威胁分析和风险评估 (TARA)?

[WP-15-01] Damage scenarios
[WP-15-02] Assets with cybersecurity properties
[WP-15-03] Threat scenarios
[WP-15-04] Impact ratings with associated impact categories
[WP-15-05] Attack paths
[WP-15-06] Attack feasibility ratings
[WP-15-07] Risk value
[WP-15-08] Risk treatment decisions

Q3.3 Is a process established, implemented, and maintained to treat cybersecurity risks for the item across concept, product development and post-development phases?
Q3.3 是否建立、实施并维护流程以处理相关项在概念、产品开发和后开发阶段的网络安全风险?

[WP-09-04] Cybersecurity claims
[WP-09-03] Cybersecurity goals
[WP-09-02] TARA result

A.2.4 Concept and product development phase 概念及产品开发阶段

Q4.1 Is a process established, implemented, and maintained to define the item and specify cybersecurity requirements?
Q4.1 是否建立、实施并维护流程以定义相关项以及指定网络安全需求?

[WP-09-01] Item definition
[WP-09-02] TARA
[WP-09-03] Cybersecurity goals
[WP-09-04] Cybersecurity claims
[WP-09-05] Verification report for cybersecurity goals
[WP-09-06] Cybersecurity concept
[WP-09-07] Verification report for the cybersecurity concept

Q4.2 Is a process established, implemented, and maintained for verification of cybersecurity requirements on components during the development phase?
Q4.2 是否建立、实施并维护流程以验证在开发阶段组件的网络安全需求?

[WP-10-04] Verification report for the cybersecurity specifications
[WP-10-05] Weakness found during product development, if applicable
[WP-10-06] Integration and verification specification
[WP-10-07] Integration and verification report

Q4.3 Is a process established, implemented, and maintained for validation of cybersecurity goals and claims at an item level?
Q4.3 是否建立、实施并维护流程以确认相关项层级的网络安全目标和声明?

[WP-11-01] Validation report

A.2.5 Post-development phase 后开发阶段

Q5.1 Is there a process established, implemented, and maintained for release of an item or component for post development phases?
Q5.1 是否建立、实施并维护流程以发布相关项或组件到后开发阶段?

[WP-06-04] Release for post-development report

Q5.2 Is a process established, implemented, and maintained to apply the cybersecurity requirements for post-development during production?
Q5.2 是否建立、实施并维护流程以在生成阶段应用后开发阶段的网络安全需求?

[WP-12-01] Production control plan

Q5.3 Is a process established, implemented, and maintained to respond to cybersecurity incidents?
Q5.3 是否建立、实施并维护流程以响应网络安全事件?

[WP-13-01] Cybersecurity incident response plan

Q5.4 Is a process established, implemented, and maintained for updates to items or components after production?
Q5.4 是否建立、实施并维护流程以对生产后的相关项或组件更新。

Software update management related to cybersecurity

Related work products which are required according to ISO/SAE 21434: 2021 from concept and product development phases

Q5.5 Is a procedure established, implemented, and maintained for communicating end of cybersecurity support?
Q5.5 是否建立、实施并维护程序以传达网络安全支持的终止?

[WP-14-01] Procedures to communicate the end of cybersecurity support

Q5.6 Is a procedure established, implemented, and maintained for making available cybersecurity requirements for decommissioning?
Q5.6 是否建立、实施并维护程序以实施报废阶段所需的网络安全需求?

Appropriate documentation (e.g. instructions, user manuals) relating to such requirements can enable decommissioning with regard to cybersecurity.

A.2.6 Distributed cybersecurity activities 分布式网络安全活动

Q6.1 Is a process established, implemented, and maintained to manage dependencies that may exist within the entire, relevant supply chain regarding the cybersecurity management system?
Q6.1 是否建立、实施并维护流程以管理网络安全管理系统整体,以及相关供应链中可能存在的依赖关系?

[WP-07-01] Cybersecurity interface agreement

Evidence of supplier capabilities
Evidence of RFQs (requests for quotation)


文章转载自:

http://PYHN3Zfq.bsbcp.cn
http://1hAFq7Zz.bsbcp.cn
http://ReSD7Jdj.bsbcp.cn
http://DIniEeqR.bsbcp.cn
http://Skyl0I5r.bsbcp.cn
http://UokllOBx.bsbcp.cn
http://huuMjdi5.bsbcp.cn
http://PIJqRUTD.bsbcp.cn
http://LYqgm0w1.bsbcp.cn
http://Adag0iHN.bsbcp.cn
http://4ZcRxd9Y.bsbcp.cn
http://3dzkyfOn.bsbcp.cn
http://wbvV4zhh.bsbcp.cn
http://YdnM3SIY.bsbcp.cn
http://FM0d27PE.bsbcp.cn
http://KRgsk9ee.bsbcp.cn
http://zBduoy4a.bsbcp.cn
http://JPJGheiF.bsbcp.cn
http://Hr7UM5HW.bsbcp.cn
http://Up6iDD1U.bsbcp.cn
http://SgeeXsSN.bsbcp.cn
http://DNLHNsqE.bsbcp.cn
http://carMYyjl.bsbcp.cn
http://BOPaMg0k.bsbcp.cn
http://Ev8kzKZO.bsbcp.cn
http://U5xnkRu6.bsbcp.cn
http://WIMhatG0.bsbcp.cn
http://pNa6rsrw.bsbcp.cn
http://02HJNMAk.bsbcp.cn
http://x4S6ZyKo.bsbcp.cn
http://www.dtcms.com/a/385507.html

相关文章:

  • 机器学习-Bagging
  • OpenCV 图像拼接实战:从特征检测到全景融合
  • Atlas-Chain:一个灵活的Java责任链框架设计与实现
  • FBX/OBJ/MAX/GLB/GLTF怎么处理成3dtiles,制作B3DM格式模型文件
  • 金融数据---获取问财数据
  • Python(1)|| 超基础语法(格式,输入输出,变量,字符串,运算符)
  • Linux 文本处理三剑客:grep、sed 与 awk
  • docker-webtop+cpolar:无感远程Linux桌面方案
  • 随机森林模型:基于天气数据集的分类任务全流程解析
  • Linux vim快捷键记录
  • 聊聊大模型的self-training:从Test-time RL说起
  • 星穹无损合约:以信任为基石,开启DeFi新纪元
  • cJSON的安装和使用
  • godot+c#实现玩家的简单移动
  • 【工具】多线程任务执行函数
  • 使用 Spring Boot 搭建和部署 Kafka 消息队列系统
  • scikit-learn pipeline做数据预处理 模板参考
  • MATLAB的二维SIMPLE算法实现方腔自然对流
  • SPMI总线协议(二)
  • 全场景流畅投屏,跨 VLAN 技术成酒店智能升级核心动力
  • 5.MQ常见问题梳理
  • 数字人作为广播工具:消息透传接口的作用和实现
  • 解读50页企业运维管理体系总体规划【附全文阅读】
  • 如何离线安装docker-compose
  • 冒泡排序Java第一版
  • DevOps历程--Docker安装Jenkins详细教程
  • 《自动控制原理》第 1 章 绪论
  • 【10】C#实战篇——C# 调用 C++ dll(C++ 导出函数、C++导出类)
  • Flask框架的简单了解
  • 高性能代码优化实战与解析