Further reading
- Demonstrating safety of software-dependent systems: https://www.dnv.com/Publications/safety-4-0-project-demonstrating-safety-of-software-dependant-systems-225267
- Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default: https://www.cisa.gov/sites/default/files/2023-04/principles_approaches_for_security-by-design-default_508_0.pdf
- Secure by Design Principles: https://www.security.gov.uk/guidance/secure-by-design/principles/
- Cyber Security Procurement Language for Control Systems: https://www.cisa.gov/sites/default/files/2023-01/Procurement_Language_Rev4_100809_S508C.pdf
- Industry IoT Consortium (IIC): https://www.iiconsortium.org/
- GDPR: https://gdpr-info.eu/art-25-gdpr/
- CISA SBOM: https://www.cisa.gov/sbom
- National Security Agency (NSA)—Recommendations for Software Bill of Materials (SBOM) Management: https://media.defense.gov/2023/Dec/14/2003359097/-1/-1/0/CSI-SCRM-SBOM-MANAGEMENT...