Don't have a credit card? Never mind we support BANK TRANSFER .

PRICES include / exclude VAT
Homepage>IEEE C37.249-2024 - IEEE Guide for Categorizing Security Needs for Protection-, Automation-, and Control-Related Data Files
Released: 20.05.2025

IEEE C37.249-2024

IEEE Guide for Categorizing Security Needs for Protection-, Automation-, and Control-Related Data Files

Format
Availability
Price and currency
English PDF
Immediate download
87.48 EUR
English Hardcopy
In stock
108.86 EUR
Standard number:IEEE C37.249-2024
Released:20.05.2025
ISBN:979-8-8557-1671-9
Pages:66
Status:Active
Language:English
DESCRIPTION

IEEE C37.249-2024

This guide identifies and categorizes commonly used protection-, automation-, and control-related data files based on content, use, and risk of disclosure or compromise. Protection-, automation-, and control-related data files include, but are not limited to, files used for configuration, management, and analysis of protection, automation, and control systems.

This guide adds granularity to security practices to precisely categorize security needs without impeding the use or access to protection-, automation-, and control-related data files.

New IEEE Standard - Active. Security categorization is the first step in a security risk management framework because of its impact on all other steps, from the selection of security controls to apply based on the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Information (data) at rest and information systems are covered by security categorization. The approach used in this guide applies only to data at rest. Types of information and information systems are considered by the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Vol. 1, Rev. 1 [B16]. Security categories--based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise--are established by Federal Information Processing Standards (FIPS) 199 [B1]. These standards are aligned by the approach in this guide.