TNC IF-MAP Metadata for ICS Security

Date Published: September, 01, 2014

The purpose of this specification is to facilitate the deployment, management, and protection of large-scale industrial control systems by creating virtual layer 2 and/or layer-3 overlay networks on top of standard shared IP network infrastructure—particularly (though not necessarily) TNC compliant IP network infrastructure.

Current Revision:

TNC IF-MAP Metadata for ICS Security, Version 1.0, Revision 46

 

Related Resources:

TNC IF-MAP Metadata for ICS Security FAQ

TNC IF-MAP Metadata for ICS Security Briefing Slides

TNC IF-MAP Binding for SOAP Specification

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.