Autonomous Control Device

Get Started. It's Free
or sign up with your email address
Autonomous Control Device by Mind Map: Autonomous Control Device

1. Device Identity

1.1. Hardware-based Root of Trust

1.2. Identification and Authentication Control

2. Device Configuration

2.1. Defense in Depth

2.2. Resource Availability

3. Data Protection

3.1. System Integrity

3.2. Data Confidentiality

4. Logical Access to Interfaces

4.1. Use Control

4.2. Restricted Data Flow

4.3. Certificate-based Authentication

5. Software and Firmware Update

5.1. Renewable Security

6. Cybersecurity Event Logging

6.1. Timely Response to Events

6.2. Failure Reporting

7. Small Trusted Computing Base

8. Compartmentalization

9. Exploring core cybersecurity property relationships for autonomous devices [Dec 2019 B. Owen]

9.1. ISA/IEC 62243

9.2. NIST IR 8259

9.3. MSR-TR-2017-16