|
Work Item Reference |
ETSI Doc. Number |
STF |
Technical Body in Charge |
Standard Not Ready For Download
|
|
RTS/CYBER-0082
|
TS 102 165-1
|
|
CYBER
|
|
Current Status (Click to View Full Schedule) |
Latest Version
|
Cover Date |
Standstill |
Creation Date |
|
Stable draft (2024-11-12)
|
5.2.14 Draft
|
|
View Standstill Information
|
2022-02-23
|
|
Rapporteur |
Technical Officer |
Harmonised Standard |
|
|
Scott Cadzow
|
Kim Nordström
|
No
|
|
|
Title
|
CYBER; Methods and protocols; Part 1: Method and pro forma for Threat, Vulnerability, Risk Analysis (TVRA) Methods and Protocols for Security Part 1: TVRA
|
Scope and Field of Application
|
To extend the text regarding the role of AI enabled Threat Agents to the analysis framework. Add text to reinforce that the 10 steps are not directly sequential and to modify/extend the metrics for analysis to better address application to environments such as RED analysis, CSA analysis, and AI analysis by the addition of material in annexes. Also to remove some of the data models recommended as they are out of date. To ensure collaboration in use cases with CEN-CLC/JTC13 and JTC21 as appropriate.
|
Supporting Organizations
|
Cadzow Communications, NCSC, BT plc, CIS, Eurosmart AISBL, umlaut
|