《英国标准协会(BSI):2025功能安全与网络安全融合技术指南:假设及其潜在后果(英文版)(33页).pdf》由会员分享,可在线阅读,更多相关《英国标准协会(BSI):2025功能安全与网络安全融合技术指南:假设及其潜在后果(英文版)(33页).pdf(33页珍藏版)》请在三个皮匠报告上搜索。
1、Technical Guide:Integrating Functional Safety and Cybersecurity Assumptions and their Consequences A BSI whitepaperTechnical Guide:Integrating Functional Safety and Cybersecurity-Assumptions and their Consequences BSI 2025.All rights reserved.ContentsIntroduction 3Scope of this guide 3Need for this
2、guide 4Benefit to the reader 4Use of this guide 5References7A Card Group-Properties 8A.1-System has no emergent properties8A.2-Defending the network alone willnaturally lead to resilience of the safety-critical functions.9A.3-System is deterministic10A.4-Focus on hardware11A.5-Security must ensure f
3、unctionality12A.6-SIL 3 is better than SIL 2 in allcircumstances 13A.7-All the identified risks are equal14A.8-Safety sign-off of a system alwaysimplicitly includes a full and adequate security sign-off 15A.9-Failure is only due to malicious intent16B Card Group Maintenance and Monitoring17B.1-Expec
4、ted measures for modifications17B.2-Insiders arent real18B.3-All hazards and threats have beenidentified before starting 19B.4-It is obvious when I have been attacked 20B.5-Compliance makes me secure,andis possible in all circumstances 21B.6-Secure enough today and tomorrow22C Card Groups Interfaces
5、 2323242526C.1-I can assume a perfect securityboundaryC.2-Perfect safety is assumed by security sideand vice versa C.3-Environment is constantC.4-The automation architecture is completelydocumentedC.5-Cybersecurity and functional safetymeasures do not interact 27D Card Group Supply Chain 28D.1-Produ
6、ct is delivered with integrity intact 28E Card Group Configuration 29E.1-Security integrity relies on securecomponents not configuration 29E.2-Multiple detection alarms will triggercorrective actions 30E.3-All functionality finds their source in adocumented requirement 31Authors32Technical Guide:Int