BS ISO/IEC 30147:2021
$167.15
Internet of things (IoT). Integration of IoT trustworthiness activities in ISO/IEC/IEEE 15288 system engineering processes
Published By | Publication Date | Number of Pages |
BSI | 2021 | 34 |
This document provides system life cycle processes to implement and maintain trustworthiness in an IoT system or service by applying and supplementing ISO/IEC/IEEE 15288:2015. The system life cycle processes are applicable to IoT systems and services common to a wide range of application areas.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
4 | CONTENTS |
6 | FOREWORD |
7 | INTRODUCTION |
8 | 1 Scope 2 Normative references 3 Terms and definitions |
11 | 4 Abbreviated terms 5 IoT systems/services and IoT trustworthiness 5.1 Characteristics specific to IoT systems and services |
12 | Figure 1 – An IoT system, a system of systems |
13 | 5.2 IoT trustworthiness |
14 | 6 Processes for realizing IoT trustworthiness 6.1 General 6.2 Agreement processes 6.2.1 Acquisition process |
15 | 6.2.2 Supply process 6.3 Organizational project-enabling processes 6.3.1 Life cycle model management process 6.3.2 Infrastructure management process 6.3.3 Portfolio management process 6.3.4 Human resource management process 6.3.5 Quality management process |
16 | 6.3.6 Knowledge management process 6.4 Technical management processes 6.4.1 Project planning process 6.4.2 Project assessment and control process |
17 | 6.4.3 Decision management process 6.4.4 Risk management process |
18 | 6.4.5 Configuration management process 6.4.6 Information management process 6.4.7 Measurement process |
19 | 6.4.8 Quality assurance process 6.5 Technical processes 6.5.1 Business or mission analysis process 6.5.2 Stakeholder needs and requirements definition process |
20 | 6.5.3 System requirements definition process |
21 | 6.5.4 Architecture definition process 6.5.5 Design definition process |
22 | 6.5.6 System analysis process 6.5.7 Implementation process 6.5.8 Integration process |
23 | 6.5.9 Verification process |
24 | 6.5.10 Transition process 6.5.11 Validation process |
25 | 6.5.12 Operation process |
26 | 6.5.13 Maintenance process 6.5.14 Disposal process |
27 | Annex A (informative)Examples of risks specific to IoT systems A.1 General A.2 Example 1: Security risk A.3 Example 2: Reliability risk A.4 Example 3: Safety risk |
28 | A.5 Example 4: Privacy risk A.6 Example 5: Resilience risk A.7 Example 6: Risk arising from interconnected IoT trustworthiness factors |
29 | Annex B (informative)Overview of process and its application B.1 Overview of approach toward process for IoT trustworthiness |
31 | B.2 Application of process to enhance IoT trustworthiness Table B.1 – Relations between typical characteristics of IoT systems and process bases |
32 | Bibliography |