inutes Palo Alto 1994 - ISO/IEC JTC 1/SC 25/WG 1 Home Page

advertisement
ISO/IEC JTC 1/SC 25 N
1420A
Date: 2008-03-31
Replaces ISO/IEC JTC 1/SC 25 N 1420
ISO/IEC JTC 1/SC 25
INTERCONNECTION OF INFORMATION TECHNOLOGY EQUIPMENT
Secretariat: Germany (DIN)
DOC TYPE:
TITLE:
ACTION ID:
Voting report
Voting report on SC 25 N 1285: ISO/IEC FCD 24767-1: IT - Home
network security - Part 1: Security Requirements
SC 25 Secretary
25.01.15.01
The NWIP has been distributed with the SC 25 N 1065 JTC 1 N 7825. It
has been approved as recorded in SC 25 N 1086.
The 1st CD was distributed fro comment with SC 25 N 1066, two CDs for
vote with SC 25 N 1087 and N 1132, N 1132 found substantial support as
recorded in SC 25 N 1088.
The FCD was distributed with SC 25 N 1285 and found substantial
support as recorded in this document.
The document is being edited according to ISO/IEC directives part 2 and
distributed as FDIS for approval as IS.
This document includes the comments received by JTC 1/SC 27.
FYI
DUE DATE:
n/a
SOURCE:
PROJECT:
STATUS:
REQUESTED: For information
ACTION
MEDIUM:
Def
DISTRIBUTION:
ITTF, JTC 1 Secretariat
P-, L-, O-Members of SC 25
No of Pages:
12 (including cover)
Secretary - ISO/IEC JTC 1 / SC 25 - Dr.-Ing. Walter P. von Pattay
ZVEI FV 7 & FV 8, Germany
Tel.: +49/89/923 967 57, Tfx.: +49/89/923 967 59 (only on request)
EM: Walter@Pattay.com
Home page: „http://www.iec.ch/sc25“
ISO/IEC JTC 1/SC 25 N 1420A
2008-03-31
Title
SC 25 N 1420 voting report on SC 25 N: 1285
Approval of text of SC 25 N 1285: ISO/IEC FCD 24767-1: IT - Home network
security - Part 1: Security Requirements
APPROVED
RESULT OF VOTING not counting abstentions as votes
P-Members voting: 15 in favour out 16 of = 93,75 % (requirement >= 66,66%) of those who have voted
P- Members voting: 1 negative votes out of 16 = 6,25 % (requirement <= 25%)
P-Members voting: 16 out of 27 = 59, 26 % (requirement >= 50%)
Additional comments
Country
Member
Australia
Belgium
Canada
China
Czech Republic
Denmark
Finland
France
Germany
India
Ireland
Israel
Italy
Japan
Kazakhstan
Korea, Republic of
Mexico
Netherlands
New Zealand
Norway
Poland
Singapore
Spain
Sweden
Switzerland
United Kingdom
USA
P-Members
SAI
BEC-CEB
SCC
CESI
CSNI
DS
SESKO
AFNOR
DKE
BIS
NSAI
SII
UNI
JISC
ISO/IEC JTC 1/SC 533570423
Participation Voted
Comments received
via JTC 1/SC27
P
Disapproval Yes
9
P
P
Approval
P
Approval
P
Approval
P
Approval
P
P
Approval
S
Approval
P
P
P
P
Approval
P
Approval
KAZMEMST P
KATS
P
Approval
DGN
P
Approval
NEN
P
Approval
SNZ
P
NEK
P
PKN
P
Approval
SPRING
P
AENOR
P
Approval
SNC
P
Approval Yes
29
SNV
P
BSI
P
ANSI
P
Approval
27
Approvals 15
Abstentions: 0
Disapproval 1
Not voting: 11
9
2
7
1
ISO/IEC JTC 1/SC 25 N 1420A
2008-03-31
Collation of comments on SC 25 N 1285: ISO/IEC FCD 24767-1: IT - Home network security - Part 1: Security Requirements
E: editorial, G: general, T: technical
Page
Line
Clause
00
000 all
E/G/
T
ID
Comment
Proposed change
te
[AU] 1
From the scope statement in this document, it appears that the
intended users of this standard are people who develop devices
that can be used in a home network environment. However, much
of the content is of a type more appropriate to home network user
awareness. For example, the content of clause 8 is very high level
and insufficient as a basis of security specifications for networked
devices. Developers of home network devices could be
dangerously mislead if they treated this as a suitable set of
requirements.
Foreword and content of the
The intended audience
should be clarified, and document should be updated
accordingly.
the purposes for which
this standard can be
used should be clarified.
These comments are written on the assumption that the intended
audience is designers and developers of HES equipment.
There is a need for guidance for
1.
designers and implementers/installers of home networks;
and
2.
users/owners of homes that live with, operate, manage and
otherwise use HES.
However, although some of the content appears somewhat
relevant to these groups, it is assumed that these other groups are
not the intended audience of this document.
As it stands, this document is not suitable for either the assumed
target audience or any other possible audience.
ISO/IEC JTC 1/SC 533570423
This is the necessary
starting point for
determining what a
rewritten version of this
standard should contain
and how it should be
structured.
Secretary's observations
Resolution
Rejected.
Intended
audience
-> Developers,
installers, users
and service
providers of
home networks
Purpose
-> To describe
the security
requirements, not
the security
mechanisms and
services that
should be
implemented in
home networks.
These points are
obvious in the
current
documents.
2
ISO/IEC JTC 1/SC 25 N 1420A
2008-03-31
E/G/
T
ID
Comment
Proposed change
00
000 all
te
[AU] 2
The standard provides a valuable concept model for home
networks and provides a good starting point for security
requirements by identifying and listing relevant threats. However,
the description of the defences against these threats make no
reference to the ISO/IEC standards that give details of how such
defences should be implemented.
The comment is valid and Australia
This standard should
is kindly invited to provide more
provide extensive
specific input
references to existing
ISO/IEC standards that
should be used when
implementing security
functionality in home
network devices. For
example, there is at
least one ISO/IEC
standard for each of the
‘defense’ entries in table
1.
00
000 all
te
[AU] 3
This standard will have no practical value unless it specifies which
security functions should be implemented in each of the different
types of devices. As drafted, it provides no information about what
functionality should be implemented in each of the devices shown
in figure 1. It also makes no mention of requirements for managing
the security functions available within a home network.
A major rewrite of the
standard is needed to
provide guidelines for
the development of
security specifications
for each type of network
device.
Page
Line
Clause
The new text needs to
include a statement of
assumptions concerning
how home networks will
be designed,
implemented and
operated because these
are relevant to the
specifications of the
network components.
ISO/IEC JTC 1/SC 533570423
Secretary's observations
Resolution
Rejected.
This document
describes the
security
requirments, not
the specific
protection
mechanisms.
More specific input would be needed Rejected.
especially at an earlier stage of the
The specific
document
defences against
each threat for
each type of
device is outside
the scope of this
document.
3
ISO/IEC JTC 1/SC 25 N 1420A
2008-03-31
Page
Line
00
00
0
Clause
E/G/
T
ID
Comment
Proposed change
T
AU2(S
C27)
It is not clear who is the intended audience of this standard.
Aspects of this standard appear relevant to:
Rewrite the standard for
the home owner/user of
HES as the intended
audience.

designers and developers of HES equipment;

designers and implementers/installers of home networks;
and

users/owners of homes that live with, operate, manage and
otherwise use HES.
Secretary's observations
Rejected.
Intended
audience
-> Developers,
installers, users
and service
providers of
home networks
The requirements for these different user groups are quite
different. If this document is indeed intended for all these groups,
then the requirements should indicate which class of reader they
apply to.
Purpose
-> To describe
the security
requirements, not
the security
mechanisms and
services that
should be
implemented and
who should
implement it in
home networks.
However, it is noted that most of the text seems directed to the
user/owner category (3 above). If this is the intention, the text
should be written so that a typical HES user can act on the
requirements. Thus for example, there is little point in telling a
user to use a message authentication because they usually have
no obvious way to act on this requirement. In this case the
standard should include information about requirements to look for
when selecting different types of equipment for a HES and give
advice on options or preferences to select in software packages for
information appliances.
00
000 all
ge
[AU] 4
The following comments accompany a disapproval vote.
The comments given on specific clauses are illustrative examples
of the general problems identified with this standard.
ISO/IEC JTC 1/SC 533570423
Resolution
These points are
obvious in the
current
documents.
In light of the necessary
changes, this project
should revert to WD
status. Consideration
should be given to
referring this topic to
SC27 for inclusion as a
part of the Network
Security standard for
which they are
responsible.
Noted
Rejected
The specific
defences against
the threat for
each type of
devices is outside
the scope of this
document.
4
ISO/IEC JTC 1/SC 25 N 1420A
2008-03-31
Page
Line
00
00
0
Clause
E/G/
T
ID
Comment
Proposed change
G
NZ1
(SC27
)
This document should be rejected in its current form.
Return to study period.
Nowhere in this document has the requirement for a standard such
as this been demonstrated. (It would not appear that there was any
obvious consultation with the manufacturers of white and brown
goods, user support groups, service providers and or software
developers)
Engage the
manufacturers of
household goods such
as white and brown
appliances, on the need
for this standard. Also
engage service
providers, end users
and support groups and
provide evidence of an
industry requirement for
this standard.
Potentially this standard may increase risks, by creating a
homogenous attack environment.
The document appears to have been drafted to establish a new
business industry with the backing of a standard without
demonstrating the actual requirements for such a standard.
00
00
0
G
NZ2
(SC27
)
ISO/IEC JTC 1/SC 533570423
The intended audience of the proposed standard is unclear and
requires clearer definition. The vagueness regarding the intended
audience distracts the reader and makes it difficult to understand
the intent and purpose of this standard.
Clearly identify the
intended audience and
draft the document with
this audience in mind.
Secretary's observations
Resolution
Rejected.
The acceptance
of this project in
SC 25 has
demonstrated the
interest in this
specification.
The experts of
SC 25 represents
many different
industries so the
concerns are
already
accomodated.
Same as
AU2(SC27)
Intended
audience are
developers,
installers, users
and service
providers of
home networks,
and the
specification
specifies security
requirements, but
is not intended to
say who should
implement it.
5
ISO/IEC JTC 1/SC 25 N 1420A
2008-03-31
E/G/
T
ID
Comment
00
0
G
AU1(S
C27)
The following comments are used in justification of a disapproval
vote.
A copywriter should be
engaged to rewrite this
text so that technically
This standard contains good information about the security of the
aware but not expert
HES environment. However, as it is currently drafted, the
members of the general
information is not easily usable by an important potential audience; public can readily use it.
i.e. the home owner/user.
Rejected. Like all
standardisation
specifications
this document is
produced by the
standardisation
committee and
not by
copywriters.
Furthermoe, the
specification is
not only intended
for the home
owner/user
00
0
G
AU3(S
C27)
The vast majority of this document is a discussion of the security
problems that may be encountered in a HES. There is also some
discussion of technologies and mechanisms that may play a part in
solving these problems. However, there is precious little
information about how to solve them that is relevant to the
presumed target audience.
Rejected.
Page
Line
00
00
Clause
Proposed change
Secretary's observations
Rewrite the text so that
the intended user of this
standard is given usable
information.
Resolution
The purpose of
this document is
to describe the
security
requirements, not
the security
mechanisms and
services that
should be
implemented in
home networks.
Ten and a half pages are devoted to describing the context and
problems to be solved (clauses 4-7).
Clauses 8 and 9 (five pages) hint at how to solve the problems, but
don’t give much practically usable information.
5
137 1.1
E
SE02
The threats are not from the home environments
Change ‘coming from’ to
‘affecting’
Accept
Accepted.
5
144 1.2
E
SE03
Inconsistency with clause 2.2
Change ‘AV’ to ‘A/V’
Accept
Accepted.
5
147
G
SE01
A section on references is missing. This is normally made as section 2.
The following informal specifications have been cited in the document:
Add clause with
appropriate specifications.
Check for the normative references
and add as clause two if such
references are found.
informative references added to
bibliography.
Accept
Accepted.
ISO/IEC 17799, ISO/IEC 18028, RFC 2267
5
152 2.1.1
E
SE04
ISO/IEC JTC 1/SC 533570423
Inconsistency with clause 2.2
Change ‘AV’ to ‘A/V’
Accepted.
6
ISO/IEC JTC 1/SC 25 N 1420A
2008-03-31
Page
Line
Clause
6
174 2.2
192
E/G/
T
ID
Comment
Proposed change
Secretary's observations
Resolution
E
SE05
The following abbreviations are missing:
Add these to clause 2.2
Accept
Accepted.
DRM (used in clause 4.3.1)
HES (used all over)
MPEG (used in clause 7.3)
TCP (used in clause 8.6)
URL (used in clause 8.5)
VCR (used in clause 7.2)
7
217 4.1
E
SE06
Improve English
Change ‘ limit
functionality’ to ‘limited
functionality’
Accepted.
7
25 4.2
2
T
NZ3
(SC27
)
The scope of the standard as defined in 4.2 makes arbitrary
decisions as to what should be in and out of scope of the
document.
The scope should be
more clearly defined
once the intended
audience has been
identified.
Rejected.
Physical access
controls is
important for
home security,
but that was not
part of this
project.That
would reequire a
NWIP..
Physical access and access control must form part of the over all
scope of the Home Network Security (HNS) standard. Without
physical access controls it will not be possible to secure and
achieve what’s set out in the remainder of the document.
(Reference to ISO/IEC 18028 is made, however the implication
thereof to the reader should be highlighted)
Items out of scope also
need clear identification
and justification for
exclusion.
Reconsider the scope
and include physical
access controls as part
of the HES.
8
277 4.2.1
E
SE07
A standard should be time independent
Delete the word ‘recent’
Accepted.
8
304 4.2.1
E
SE09
Improve English
Change to ‘Most of these
have been …’
Accepted.
8
284 4.2.1
285
E
SE08
Improve English
Change to ‘…failures, and
human errors.’
Accepted.
9
328 4.2.1
E
SE10
Improve English
Change ‘provide’ to
‘provide:’
Accepted.
ISO/IEC JTC 1/SC 533570423
7
ISO/IEC JTC 1/SC 25 N 1420A
2008-03-31
Page
Line
Clause
E/G/
T
ID
Comment
Proposed change
1
0
3
4
2
4.
3
T
NZ4
(SC2
7)
The exclusion of DRM, parental control and crime reducing
products from HES scope is short-sighted as these issues are
crucial to the home/end-users. (4.3.1- 4.3.3)
Once again the intended
audience of this
document will dictate the
response but,
manufacturers and
implementers will also
be considering these
issues in relation to the
HES environment.
It’s possible to keep
them out of scope but
cross-reference specific
standards in these
spaces.
Secretary's observations
Resolution
Rejected. DRM,
parental control
and crime
reducing
products are very
important for
some home
network services.
They are,
however, not part
of the
requirements for
the home
owner/user and
thus out of scope
of this
specification.
11
38 5,
ff
8
6,
7
T
NZ5
(SC2
7)
Much discussion relates to the challenges (5) security models (6)
and threat analysis (7) without actually showing how the HNS
standard would be used to address and over come these issues.
Rewrite this section to
show how the
challenges will be
addressed in the HNS
standard. ( an attempt to
do this in section 8 falls
short once again by
describing potential
solutions without
highlighting how this will
be achieved in the HES)
Rejected. The
target of this
document is to
describe the
security
requirements, not
the security
mechanisms and
services that
should be
implemented in
home networks.
12
419 5.5
E
SE11
Improve English
Change to ‘of the
information’
Accepted.
12
419 5.5
E
SE12
Inconsistency with clause 2.2
Change ‘AV’ to ‘A/V’
Accepted.
16
596 7.3
E
SE13
Improve English
Delete the word ‘is’
Accepted.
ISO/IEC JTC 1/SC 533570423
8
ISO/IEC JTC 1/SC 25 N 1420A
2008-03-31
Page
Line
Clause
17
62
9
8
E/G/
T
ID
Comment
Proposed change
Secretary's observations
Resolution
T
AU4(S
C27)
Clause 8 describes two types of security requirements; i.e.
requirements for manufacturers of equipment and requirements for
users of equipment. These requirements should be clearly
distinguished. For example, in clause 8.2, requirements for access
control mechanisms should be specified for different types of home
electronic equipment. Separately, guidelines for selecting home
electronic equipment with suitable access control mechanisms and
configuring and operating such mechanisms should be given.
Rewrite clause 8 so that
it provides information
that can be practically
used by the home
owner/user of HES.
Rejected.
The target of
audience are
developers,
installers, users
and service
providers of
home networks.
17
641 8.1
E
SE14
Improve English
Change ‘dangerous’ to
‘serious’
Accepted.
17
643 8.1
E
SE15
Improve English
Change to ‘defence
mechanisms’
Accepted.
17
644 8.1
T
SE16
Trailing attacks have not been discussed in the previous section
Delete this line
Accepted.
17
644 8.1
E
SE17
The items are in arbitrary order
Order them alphabetically
after THREATS.
Accepted.
18
672 8.2
673
645 8.2
T
SE23
Incorrect statement, since a time stamp would automatically deny an old
message.
Delete the last sentence
Accepted.
te
[AU] 5
The requirements in clause 8.2 contain no hint about where in a
HES they might be implemented. For example, do we expect all
brown goods and living network components to include access
control, or is this a matter best implemented in a gateway?
Is the place where function is
This needs to be
implemented really important?
considered when the
standard is redeveloped.
Rejected.
It is not
important where
function is
implemented.
It’s natural that
the devices that
install these
functions are
different.
18
The text in clause 8.2 gives no hint about the role of a firewall, as
discussed in clause 8.6, in meeting access control needs.
When a device
needs “access
control” and “fire
wall”, a device
has to implement
clasue 8.2 and
8.6.
ISO/IEC JTC 1/SC 533570423
9
ISO/IEC JTC 1/SC 25 N 1420A
2008-03-31
Page
Line
Clause
18
64
5
8.2
E/G/
T
ID
Comment
Proposed change
T
AU5(S
C27)
The requirements in clause 8.2 contain no hint about where in a
HES they might be implemented. For example, do we expect all
brown goods and living network components to include access
control, or is this a matter best implemented in a gateway?
Rewrite text so that it
provides information that
can be practically used
by the home owner/user
of HES.
Rejected. See
AU 5.
The text in clause 8.2 gives no hint about the role of a firewall, as
discussed in clause 8.6 in meeting access control needs.
Secretary's observations
Resolution
18
652 8.2
E
SE18
Improve English
Change ‘limit’ to
‘limitation of’
Accepted.
18
655 8.2
E
SE19
Improve English
Firstly, …
Accepted.
18
655 8.2
E
SE20
Improve English
Change to ‘carefully
manage’
Accepted.
18
656 8.2
E
SE21
Improve English
Change to ‘immediately
revoke’
Accepted.
18
659 8.2
E
SE22
Improve English
Secondly, …
Accepted.
AU6(S
C27)
This text gives a typical home user no guidance concerning how
they might go about ensuring that data and messages are
authenticated. Is this something that applies mainly to email, or is
there some specification that people should look for in, say, brown
goods?
Rewrite text so that it
provides information that
can be practically used
by the home owner/user
of HES.
Rejected.
Authentication is
very important.
But user doesn’t
need to know
how messages
are authenticated.
Ideally, the users
unconsciously
can use the
authentication
services.
[AU] 6
18
67
8
8.3
T
19
698 8.5
te
ISO/IEC JTC 1/SC 533570423
See Australia 7
Clause 8.5 seems to have been written with email in mind
This needs to be
(although this is not stated). Its content would be very confusing to considered when the
someone thinking about security of brown goods.
standard is redeveloped.
Rejected.
This comment is
ambiguous where
in this document
a confusing part
is.
10
ISO/IEC JTC 1/SC 25 N 1420A
2008-03-31
E/G/
T
ID
Comment
8.5
T
AU7(S
C27)
Clause 8.5 seems to have been written with email in mind
Add text applicable to
(although this is not stated). Its content would be very confusing to each of the main types
someone thinking about security of their brown goods.
of equipment that is
likely to be found in a
HES, or state the scope
of applicability of the
existing text.
Rejected. See
AU 6.
19
715 8.5
E
SE24
Last sentence irrelevant
Delete the last sentence
Accepted.
19
727 8.6
E
SE26
Actually between each side of each firewall
Correct by deleting the last
part of the sentence, i.e.
let the sentence end after
‘… network traffic.’
Accepted.
19
731 8.6
E
SE27
Repetition of text
Delete the last sentence:
‘A firewall can also be
used to control outgoing
traffic.’
Accepted
19
735 8.7
te
[AU] 7
Although this clause does provide some practical information in its
last sentence, it begs the question: ‘where does one install the
virus protection package’. The answer is perhaps simple if we
considers yesterday’s network with a modem and a PC, but what
do you do if you have a network like that shown in figure 1?
Should every appliance have virus control software, should virus
control software run just in the gateway and information
appliances?
Since the draft has received
This needs to be
substantial support only specific
considered when the
standard is redeveloped. change requests could be
implemented.
Australia is invited to provide
appropriate input.
Rejected.
In this document,
it need not write
in which devices
to install the
virus detection
software.
Page
Line
Clause
19
69
8
19
73
5
8.7
T
AU8(S
C27)
ISO/IEC JTC 1/SC 533570423
Although this clause does provide some practical information in its
last sentence, it begs the question: ‘where does one install the
virus protection package’. The answer is perhaps simple if we
considers yesterday’s network with a modem and a PC, but what
do you do if you have a network like that shown in figure 1?
Should every appliance have virus control software, should virus
control software run just in the gateway?
Proposed change
Extend and rewrite this
text so that it fits the
scope described in
figure 1.
Secretary's observations
Resolution
All devices, such
as gateway,
information
appliances and so
on, can install the
virus detection
software.
Rejected. Same
as AU 7.
11
ISO/IEC JTC 1/SC 25 N 1420A
2008-03-31
E/G/
T
ID
Comment
Proposed change
Secretary's observations
Resolution
716 8.5
717
E
SE25
Paragraph irrelevant
Delete the paragraph
Accept
Accepted.
74 8.8
9
T
NZ6
(SC2
7)
Protection against denial of service attack (8.8)
Rewrite the section to
provide clarity and better
address the threat and
counter measures within
the HES. ( For example
having secondary links
and or ISP’s)
Rejected.
The specific
defences against
the threat for
each type of
devices is outside
the scope of this
document.
Rejected.
The content is
completed.
Page
Line
19
20
Clause
Much discussion relates to the definition of DoS attacks but very
little is said that would indicate how HES would be able to handle,
such an attack effectively.
Effective countermeasures and controls in a home environment
are unlikely to be effective against a DoS attack. Resource
deprivation between the ISP and the HES will be the key limiting
factor in the HES ability to respond to such an attack.
The HES can actively prevent components of the HES from
participating (unwillingly due to Malware or even actively due to
rogue occupants within the HES) in a DoS attack and this should
form part of the standard. Excluding this functionality as out of
scope in 4.3.3 therefore doesn’t make any sense.
21
791 9
te
[AU] 8
Clause 9 appears to be the start of instructions to people who will
design HES components. However it seems to be incomplete.
See Australia 7
This needs to be
considered when the
standard is redeveloped.
21
791 9
te
[AU] 9
It is essential that developers of networkable home devices provide
assurance that security functionality is correctly implemented. A
range of approaches to providing assurance concerning IT security
are given in ISO/IEC TR 15443.
The redeveloped
standard should include
a discussion of
requirements for
developers of home
network devices to
provide assurance that
the security functionality
is correctly
implemented. This
should include a
discussion of how
vulnerabilities detected
for equipment in
operation should be
handled.
ISO/IEC JTC 1/SC 533570423
See Australia 7
Rejected.
In this document,
requirements for
security that is
necessary for all
devices have
aleady been
described.
12
ISO/IEC JTC 1/SC 25 N 1420A
2008-03-31
E/G/
T
ID
Comment
Proposed change
9
T
AU9(S
C27)
Clause 9 appears to be the start of instructions to people who will
design HES components. However it seems to be incomplete.
Delete this clause, and
perhaps use this as the
start of a new standard
for a different audience.
Rejected.
This
specification
provides
requirements –
not solutions.
9.
0
G
NZ7
(SC2
7)
The intent of this section is unclear. Is this addressing the
requirements of the individual components within the HES?
Remove this section.
829 A.1
E
SE28
Consistency with rest of text
Change ‘intelligent home’
to ‘HES’
Rejected.
The content is
clear.
Accepted.
22
829 Â.1
E
SE29
The bullet should be identical with those of lines 830, 837 and 840.
Amend
Accepted.
23
86
386
6
86
8
E
JP
SC27 has published ISO/IEC 10116 as a standard for mode of operation.
These references should be
replaced by ISO/IEC
10116.
Accepted.
E
JP
SC27 has published ISO/IEC 18033-3 as a standard for block ciphers.
This reference should be
replaced by ISO/IEC
18033-3.
Accepted.
Page
Line
Clause
21
79
1
2
1
7
9
1
22
23
ISO/IEC JTC 1/SC 533570423
Secretary's observations
Resolution
13
Download