Date Published: February 2015
Author(s)
Kelley Dempsey (NIST), Celia Paulsen (NIST)
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices (RDs). It suggests appropriate countermeasures in the context of the System Development Life Cycle. A security risk assessment template in table and flowchart format is also provided to help organizations determine the risk associated with replication devices.
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices (RDs). It suggests appropriate countermeasures in the context of the System Development Life Cycle. A security risk assessment...
See full abstract
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices (RDs). It suggests appropriate countermeasures in the context of the System Development Life Cycle. A security risk assessment template in table and flowchart format is also provided to help organizations determine the risk associated with replication devices.
Hide full abstract
Keywords
3D printers; 3D scanners; copiers; countermeasures; exploits; mitigation; multifunction devices; printers; replication devices; risk; risk assessment; risk management; scanners; security controls; System Development Life Cycle; threats; vulnerabilities
Control Families
Access Control; Audit and Accountability; Configuration Management; Identification and Authentication; Maintenance; Physical and Environmental Protection; Planning; Risk Assessment; System and Services Acquisition