

(CS)² Standards & Regulations Guide
Use the format below to find the relevant standards or regulations based on your query, or you can clear filters to browse all items.
I'm looking for a:
Title Sponsor
Supporting Sponsors
[ AVAILABLE ]
Community Resource Committee Members
Resource Supporting Sponsors
Founding Committee Resource Sponsors
used in:
that applies to:
UL2900-2-1 – Part 2-1: Particular Requirements for Network Connectable Components of Healthcare and Wellness Systems
Standard
Type:
Published
Status:
Relevant Use:
USA/CAN
UL 2900-2-1, the UL Standard for Safety, Software The UL 2900-2-1 standard says it “applies to the testing of network connected components of healthcare systems,” including these: for Network-Connectable Products, Part 2-1: Particular Requirements for Network Connectable Components of Healthcare and Wellness Systems, was published and adopted as an ANSI standard in September 2017. The UL 2900-2-1 standard says it “applies to the testing of network connected components of healthcare systems,” including these: * Medical devices *Accessories to Medical devices *Medical device data systems *In vitro diagnostic devices *Health information technology *
*Wellness devices
UL 2900 Series
Standard
Type:
Published
Status:
Relevant Use:
USA/CAN
UL 2900 is a series of standards published by UL (formerly Underwriters Laboratories), a global safety consulting and certification company. The standards present general software cyber security requirements for network-connectable products (UL 2900-1), as well as requirements specifically for medical and healthcare systems (UL 2900-2-1), industrial control systems (UL 2900-2-2), and security and life safety signaling systems (UL 2900-2-3).(BlackDuck)
Cybersecurity Capability Maturity Model (C2M2)
Maturity Model
Type:
Published
Status:
Relevant Use:
USA
The Cybersecurity Capability Maturity Model (C2M2) is designed to help organizations improve their cybersecurity capabilities and practices. (C2M2) covers various sectors that require robust cybersecurity measures. Providing structured approach to evaluating and improving how organizations improve cybersecurity practices, maturity levels, and implementation.
IACS-UR-E27
Regulation (updated)
Type:
active as of Jan 2024
Status:
Relevant Use:
Global
In an increasingly digitalized and interconnected world, where the maritime industry continues to adopt, at pace, new digital technologies, it remains imperative to focus on cyber threats and attacks that could compromise operations, safety and data integrity.
2014/53/EU (RED)
Directive
Type:
Adopted April 2014
Status:
Relevant Use:
EU
The Radio Equipment Directive (2014/53/EU) includes key cybersecurity provisions to ensure the security of radio equipment. Articles 3(3)(d), (e), and (f) focus on preventing the misuse of network resources, protecting personal data and privacy, and implementing measures against fraud. These requirements are particularly important for internet-connected and wearable devices, ensuring they are secure and effectively protect user data.
Critical Infrastructure Maturity Model (CIMM)
Maturity Model
Type:
Published
Status:
Relevant Use:
USA
The Critical Infrastructure Maturity Model (CIMM) aims to provide a structured approach for organizations to evaluate their current maturity level in managing critical infrastructure and to identify areas for improvement. It focuses on enhancing the overall resilience and security of infrastructure that is vital to national security, economic stability, and public safety. CIMM typically defines multiple maturity levels, ranging from basic to advanced. These levels help organizations understand their current capabilities and set goals for improvement
TSA Pipeline Security Guidelines 2018
Guideline
Type:
Published
Status:
Relevant Use:
USA
The Transportation Security Administration (TSA) Pipeline Security Guidelines are a set of recommendations for pipeline owners and operators to develop security plans and programs. The guidelines include security measures for both physical and cyber security and are considered the industry standard.
IACS-UR-E26
Regulation (updated)
Type:
active as of Jan 2024
Status:
Relevant Use:
Global
In an increasingly digitalized and interconnected world, where the maritime industry continues to adopt, at pace, new digital technologies, it remains imperative to focus on cyber threats and attacks that could compromise operations, safety and data integrity.
Have expertise in an existing or developing standard or regulation? Volunteer to develop this further!