• There are no items in your cart

NEMA CPSP 1 : 2015

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

SUPPLY CHAIN BEST PRACTICES

Superseded date

18-05-2021

Superseded by

NEMA CPSP 1:2021

Published date

12-08-2015

Sorry this product is not available in your region.

EXECUTIVE SUMMARY
ACKNOWLEDGEMENTS
INTRODUCTION
DOCUMENT SCOPE
DEFINITIONS
RISK TOLERANCE
SUPPLY CHAIN COMMUNICATION
BEST PRACTICES
MANUFACTURING AND ASSEMBLY
Identification of Threats
Analysis and Recommendations
TAMPER-PROOFING
Identification of Threats
Analysis and Recommendations
SECURITY DEVELOPMENT LIFE CYCLE
Identification of Threats
Analysis and Recommendations
DECOMMISSIONING/REVOCATION
Identification of Threats
Analysis and Recommendations
Appendix A - REFERENCE DOCUMENTS
Appendix B - REFERENCE ARCHITECTURES

Describes United States supply chain integrity through four phases of the product life cycle: manufacturing and assembly, tamper-proofing, security development life cycle, and decommissioning/revocation.

DocumentType
Standard
PublisherName
National Electrical Manufacturers Association
Status
Superseded
SupersededBy

IEC TR 80002-1:2009 Medical device software - Part 1: Guidance on the application of ISO 14971 to medical device software
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC 29147:2014 Information technology Security techniques Vulnerability disclosure
IEC TS 62443-1-1:2009 Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models
IEC TS 62351-3:2007 Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP
IEC TS 62351-6:2007 Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850
IEC TS 62351-4:2007 Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS
ISO 31000:2009 Risk management Principles and guidelines
ISO/IEC 27033-1:2015 Information technology Security techniques Network security Part 1: Overview and concepts
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO/IEC 27033-5:2013 Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
IEC TS 62351-5:2013 Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives
IEEE 1619-2007 IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices
ISO/IEC 27036-3:2013 Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security
IEC TS 62351-7:2010 Power systems management and associated information exchange - Data and communications security - Part 7: Network and system management (NSM) data object models
ISO/IEC 27033-4:2014 Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways
ISO/IEC 27036-1:2014 Information technology Security techniques Information security for supplier relationships Part 1: Overview and concepts
IEC TS 62351-1:2007 Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues
ISO/IEC 27036-2:2014 Information technology Security techniques Information security for supplier relationships Part 2: Requirements
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
ISO/IEC 27033-3:2010 Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues
ISO/IEC 27033-2:2012 Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
ISO/IEC 30111:2013 Information technology Security techniques Vulnerability handling processes
ISO 27799:2016 Health informatics Information security management in health using ISO/IEC 27002

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.