Health informatics - Device interoperability - Part 40101: Foundational - Cybersecurity - Processes for vulnerability assessment (ISO/IEEE 11073-40101:2022)

Within the context of secure plug-and-play interoperability, cybersecurity is the process and capability of preventing unauthorized access or modification, misuse, denial of use, or the unauthorized use of information that is stored on, accessed from, or transferred to and from a PHD/PoCD. The process part of cybersecurity is risk analysis of use cases specific to a PHD/PoCD.
For PHDs/PoCDs, this standard defines an iterative, systematic, scalable, and auditable approach to identification of cybersecurity vulnerabilities and estimation of risk. This iterative vulnerability assessment uses the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) classification scheme and the embedded Common Vulnerability Scoring System (eCVSS). The assessment includes system context, system decomposition, pre-mitigation scoring, mitigation, and post-mitigation scoring and iterates until the remaining vulnerabilities are reduced to an acceptable level of risk.

Medizinische Informatik - Geräteinteroperabilität - Teil 40101: Grundlagen - Cybersicherheit - Prozess zur Schwachstellenanalyse (ISO/IEEE 11073-40101:2022)

Informatique de santé - Interopérabilité des dispositifs - Partie 40101: Fondamentaux - Cybersécurité - Processus pour l'évaluation de la vulnérabilité (ISO/IEEE 11073-40101:2022)

Dans le contexte de l'interopérabilité sécurisée de type prêt à l'emploi, la cybersécurité est le processus et la capacité d'empêcher l'accès ou la modification non autorisés, l'utilisation abusive, le déni d'utilisation ou l'utilisation non autorisée des informations qui sont stockées sur un PHD/PoCD, accessibles depuis celui-ci ou transférées vers et depuis celui-ci. La partie processus de la cybersécurité est l'analyse des risques des cas d'utilisation spécifiques à un PHD/PoCD.
Pour les PHD/PoCD, la présente norme définit une approche itérative, systématique, évolutive et auditable de l'identification des vulnérabilités en matière de cybersécurité et l'estimation des risques. Cette évaluation itérative des vulnérabilités utilise le schéma de classification STRIDE (usurpation d'identité, falsification, répudiation, divulgation d'informations, déni de service, élévation du privilège) et le Système d'évaluation des vulnérabilités courantes intégré (eCVSS). L'évaluation comprend le contexte du système, la décomposition du système, la notation avant atténuation, l'atténuation et la notation après atténuation et se répète jusqu'à ce que les vulnérabilités restantes soient réduites à un niveau de risque acceptable.

Zdravstvena informatika - Interoperabilnost naprav - 40101. del: Temeljno - Kibernetska varnost - Procesi ocenjevanja ranljivosti (ISO/IEEE 11073-40101:2022)

V okviru varne interoperabilnosti s takojšnjim učinkom (»vstavi in poženi«) je kibernetska varnost postopek in zmožnost preprečevanja nepooblaščenega dostopa ali spreminjanja, zlorabe, zavrnitve uporabe ali nepooblaščene uporabe informacij, ki so shranjene ali dostopne v osebnih zdravstvenih napravah/napravah na mestu oskrbe (PHD/PoCD) ali prenesene vanje ter iz njih. Procesni del kibernetske varnosti je analiza tveganja primerov uporabe, ki so značilni za osebne zdravstvene naprave/naprave na mestu oskrbe.
Ta standard opredeljuje iterativen, sistematičen, nadgradljiv in preverljiv pristop k določanju ranljivosti na področju kibernetske varnosti in ocenjevanju tveganja za osebne zdravstvene naprave/naprave na mestu oskrbe. Pri navedenem iterativnem ocenjevanju ranljivosti se uporabljata razvrstitvena shema STRIDE (Spoofing (slepljenje), Tampering (nedovoljeno spreminjanje), Repudiation (zavrnitev), Information Disclosure (razkritje podatkov), Denial of Service (zavrnitev storitve) in Elevation of Privilege (prisvojitev pravic)) in vdelani skupni sistem točkovanja ranljivosti (eCVSS). Ocena vključuje kontekst sistema, razčlenitev sistema, rezultat točkovanja pred ublažitvijo, ublažitev in rezultat točkovanja po ublažitvi ter se ponavlja, dokler stopnja tveganja za preostale ranljivosti ne postane sprejemljiva.

General Information

Status
Published
Publication Date
29-Mar-2022
Withdrawal Date
29-Sep-2022
Current Stage
6060 - Definitive text made available (DAV) - Publishing
Start Date
30-Mar-2022
Due Date
17-Jun-2024
Completion Date
30-Mar-2022

Buy Standard

Standard
EN ISO/IEEE 11073-40101:2022 - BARVE
English language
55 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

SLOVENSKI STANDARD
SIST EN ISO/IEEE 11073-40101:2022
01-julij-2022
Zdravstvena informatika - Interoperabilnost naprav - 40101. del: Temeljno -
Kibernetska varnost - Procesi ocenjevanja ranljivosti (ISO/IEEE 11073-40101:2022)
Health informatics - Device interoperability - Part 40101: Foundational - Cybersecurity -
Processes for vulnerability assessment (ISO/IEEE 11073-40101:2022)
Informatique de santé - Interopérabilité des dispositifs - Partie 40101: Fondamentaux -
Cybersécurité - Processus pour l'évaluation de la vulnérabilité (ISO/IEEE 11073-
40101:2022)
Ta slovenski standard je istoveten z: EN ISO/IEEE 11073-40101:2022
ICS:
35.240.80 Uporabniške rešitve IT v IT applications in health care
zdravstveni tehniki technology
SIST EN ISO/IEEE 11073-40101:2022 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN ISO/IEEE 11073-40101:2022

---------------------- Page: 2 ----------------------
SIST EN ISO/IEEE 11073-40101:2022


EN ISO/IEEE 11073-
EUROPEAN STANDARD
40101
NORME EUROPÉENNE

EUROPÄISCHE NORM

March 2022
ICS 35.240.80
English Version

Health informatics - Device interoperability - Part 40101:
Foundational - Cybersecurity - Processes for vulnerability
assessment (ISO/IEEE 11073-40101:2022)
Informatique de santé - Interopérabilité des dispositifs Medizinische Informatik - Geräteinteroperabilität - Teil
- Partie 40101: Fondamentaux - Cybersécurité - 40101: Grundlagen - Cybersicherheit - Prozess zur
Processus pour l'évaluation de la vulnérabilité Schwachstellenanalyse (ISO/IEEE 11073-40101:2022)
(ISO/IEEE 11073-40101:2022)
This European Standard was approved by CEN on 13 March 2022.

CEN members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this
European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical references
concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to any CEN
member.

This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN member into its own language and notified to the CEN-CENELEC Management
Centre has the same status as the official versions.

CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway,
Poland, Portugal, Republic of North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and
United Kingdom.





EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION

EUROPÄISCHES KOMITEE FÜR NORMUNG

CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2022 CEN All rights of exploitation in any form and by any means reserved Ref. No. EN ISO/IEEE 11073-40101:2022 E
worldwide for CEN national Members.

---------------------- Page: 3 ----------------------
SIST EN ISO/IEEE 11073-40101:2022
EN ISO/IEEE 11073-40101:2022 (E)
Contents Page
European foreword . 3

2

---------------------- Page: 4 ----------------------
SIST EN ISO/IEEE 11073-40101:2022
EN ISO/IEEE 11073-40101:2022 (E)
European foreword
This document (EN ISO/IEEE 11073-40101:2022) has been prepared by Technical Committee ISO/TC
215 "Health informatics" in collaboration with Technical Committee CEN/TC 251 “Health informatics”
the secretariat of which is held by NEN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by September 2022, and conflicting national standards
shall be withdrawn at the latest by September 2022.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN shall not be held responsible for identifying any or all such patent rights.
Any feedback and questions on this document should be directed to the users’ national standards
body/national committee. A complete listing of these bodies can be found on the CEN website.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,
Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of
North Macedonia, Romania, Serbia, Slovakia, S
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.