• ETR 332 : 20001

    Current The latest, up-to-date edition.

    SECURITY TECHNIQUES ADVISORY GROUP (STAG)

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date: 

    Publisher:  European Telecommunications Standards Institute

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 References
    3 Abbreviations
    4 General Methodology
      4.1 Working procedure within ETSI
      4.2 Simplifications and models
      4.3 Explanation of terminology
      4.4 Methodology flow chart
    5 Security objectives definition
      5.1 Identification of the system's nature
      5.2 Identification of individual security objectives
    6 System review
    7 Threat analysis
      7.1 Identification of system-specific threats
      7.2 Identification of threats based on external requirements
      7.3 Guidelines to the identification of data protection threats
      7.4 Guidelines to the identification of threats related to
          inter-network communication
      7.5 Guidelines to the identification of threats to system
          integrity
      7.6 Guidelines to the identification of threats due to
          security policies
    8 Risk assessment
      8.1 Evaluation of threats and definition of risks
      8.2 Determine threshold for major threats respectively risks
      8.3 Evaluation of the global risk, risk assessment report
      8.4 TC/STC management decision
      8.5 Setting up the final risk assessment report
    9 Security requirements
    Annex A: List of work items referred to in this ETR
    History

    Abstract - (Show below) - (Hide below)

    Gives guidance and support for a comprehensive analysis of threats, vulnerabilities, risks and for the compilation of a specific set of security requirements.

    General Product Information - (Show below) - (Hide below)

    Committee NA
    Document Type Standard
    Publisher European Telecommunications Standards Institute
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    ISO/IEC 16500-7:1999 Information technology Generic digital audio-visual systems Part 7: Basic security tools
    CSA ISO/IEC 16500-1 : 2002 : R2015 INFORMATION TECHNOLOGY - GENERIC DIGITAL AUDIO-VISUAL SYSTEMS - PART 1: SYSTEM REFERENCE MODELS AND SCENARIOS
    CSA ISO/IEC 16500-1 : 2002 : R2010 INFORMATION TECHNOLOGY - GENERIC DIGITAL AUDIO-VISUAL SYSTEMS - PART 1: SYSTEM REFERENCE MODELS AND SCENARIOS
    CSA ISO/IEC 16500-7 : 2002 : R2015 INFORMATION TECHNOLOGY - GENERIC DIGITAL AUDIO-VISUAL SYSTEMS - PART 7: BASIC SECURITY TOOLS
    CSA ISO/IEC 16500-7 : 2002 INFORMATION TECHNOLOGY - GENERIC DIGITAL AUDIO-VISUAL SYSTEMS - PART 7: BASIC SECURITY TOOLS
    CSA ISO/IEC 16500-7 : 2002 : R2010 INFORMATION TECHNOLOGY - GENERIC DIGITAL AUDIO-VISUAL SYSTEMS - PART 7: BASIC SECURITY TOOLS
    ISO/IEC 16500-1:1999 Information technology Generic digital audio-visual systems Part 1: System reference models and scenarios
    TR 102 780 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS
    TR 101 771 : 1.1.1 TIPHON RELEASE 4; SERVICE INDEPENDENT REQUIREMENTS DEFINITION; THREAT ANALYSIS
    ETR 236 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
    EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
    TS 121 133 : 4.1.0 UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); 3G SECURITY; SECURITY THREATS AND REQUIREMENTS
    TR 101 365 : 1.1.1 INTELLIGENT NETWORK (IN); IN INTERCONNECT THREAT ANALYSIS
    GS NFV-SEC 006 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS
    ES 202 382 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES
    SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
    TR 102 528 : 1.1.1 LAWFUL INTERCEPTION (LI); INTERCEPTION DOMAIN ARCHITECTURE FOR IP NETWORKS
    TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
    CSA ISO/IEC 16500-1:2002 INFORMATION TECHNOLOGY - GENERIC DIGITAL AUDIO-VISUAL SYSTEMS - PART 1: SYSTEM REFERENCE MODELS AND SCENARIOS
    ES 202 383 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS
    TR 102 512 : 1.1.1 TERRESTRIAL TRUNKED RADIO (TETRA); SECURITY; SECURITY REQUIREMENTS ANALYSIS FOR MODULATION ENHANCEMENTS TO TETRA
    TR 101 943 : 2.2.1 LAWFUL INTERCEPTION (LI); CONCEPTS OF INTERCEPTION IN A GENERIC NETWORK ARCHITECTURE

    Standards Referencing This Book - (Show below) - (Hide below)

    ETR 232 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY
    ETR 083 : 20001 UNIVERSAL PERSONAL TELECOMMUNICATION (UPT) - GENERAL UPT SECURITY ARCHITECTURE
    ETR 330 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)
    ETR 236 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
    ETR 234 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG); A GUIDE TO SPECIFYING REQUIREMENTS FOR CRYPTOGRAPHIC ALGORITHMS
    ETR 237 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
    ETR 233 : 20001 TELECOMMUNICATIONS SECURITY; A DIRECTORY OF SECURITY FEATURES IN ETSI STANDARDS
    ETR 340 : 20001 TELECOMMUNICATIONS SECURITY
    ETR 086-3 : 20001 TRANS EUROPEAN TRUNKED RADIO (TETRA) SYSTEMS - TECHNICAL REQUIREMENTS SPECIFICATION - SECURITY ASPECTS
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective