Uploaded image for project: 'OASIS Message Queuing Telemetry Transport (MQTT) TC'
  1. OASIS Message Queuing Telemetry Transport (MQTT) TC
  2. MQTT-121

Revise structure of NIST Cybersecurity Framework supplemental document

    XMLWordPrintable

    Details

    • Type: Improvement
    • Status: Closed
    • Priority: Major
    • Resolution: Fixed
    • Affects Version/s: None
    • Fix Version/s: None
    • Component/s: SecuritySC
    • Labels:
      None
    • Proposal:
      Hide

      I propose the following structure:

      1. Intro
      1.1 Terminology
      1.2 References
      1.3 Précis of NIST Cybersecurity Framework section 3.2
      1.4 Some material from the existing section "MQTT Cybersecurity Framework Profile"
      1.5 Overview of the rest of the doc
      2. MQTT Cybersecurity Management Functions
      Appendix A is an Example
      Appendix B Acknowledgements
      Appendix C Revision History

      The new section 1.4 should outline how to create a framework profile and what format it should take. The material from the existing section 3 "MQTT Cybersecurity Framework Implementation Tiers" can be incorporated into section 1. The existing section 4 "MQTT Cybersecurity Framework Profile" should be expanded as it is moved into section 1.4.

      Show
      I propose the following structure: 1. Intro 1.1 Terminology 1.2 References 1.3 Précis of NIST Cybersecurity Framework section 3.2 1.4 Some material from the existing section "MQTT Cybersecurity Framework Profile" 1.5 Overview of the rest of the doc 2. MQTT Cybersecurity Management Functions Appendix A is an Example Appendix B Acknowledgements Appendix C Revision History The new section 1.4 should outline how to create a framework profile and what format it should take. The material from the existing section 3 "MQTT Cybersecurity Framework Implementation Tiers" can be incorporated into section 1. The existing section 4 "MQTT Cybersecurity Framework Profile" should be expanded as it is moved into section 1.4.

      Description

      Revising the structure of the document would make it easier for new readers to understand.

      Then, the first section will explain what you do to use this document to evaluate your MQTT cybersecurity risk.

        Attachments

          Activity

            People

            • Assignee:
              Unassigned
              Reporter:
              andrew_schofield Andrew Schofield (Inactive)
            • Watchers:
              1 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved: