Structure

The structure of the STIC Products and Services Catalogue (CPSTIC) is defined in the CCN-STIC 140 guide "Reference taxonomy for ICT security products". It is basically organised in three (3) lists:

Each of them is made up of several categories which, in turn, are made up of several families.

Qualified Products and Services

This list includes products and services that form part of the security architecture of ICT systems that are under the scope of the ENS in one of its BASIC, MEDIUM or HIGH categories, i.e. those that develop their activity in the operational context of the ENS and implement functionalities that increase the security level of the system in one of its dimensions (availability [D], integrity [I], confidentiality [C], authenticity [A] and traceability [T]).

For a product or service to be qualified, it must comply with the Fundamental Security Requirements (FSR) defined for each family, included in the corresponding annexes of the CCN-STIC 140 guide:

Access control Access control
Family Annexes (RFS)
  ENS Alta ENS Media
Control de Acceso a Red (NAC) A.1 A.1M
Dispositivos Biométricos A.2  
Dispositivos Single Sign-On A.3  
Servidores de Autenticación A.4 A.4M
Gestión de Acceso Privilegiado (PAM) A.6 A.6M
Gestión de Identidades (IM) A.7 A.7M
This image for Image Layouts addon

Security product development tools

This image for Image Layouts addon

Other tools

Approved Products and Services

The taxonomy of products approved for the handling of classified information shall be the same as for qualified products together with the following categories:

Protección en entornos tácticos

Protection in tactical environments

This image for Image Layouts addon

Tempest

The Fundamental Security Requirements (FSR) shall be the same as those set out in this guide for qualified products, updated with those specific to encryption products set out in CCN-STIC-130 Approval Requirements for Encryption Products for Handling Classified National Information.

Compliance and Governance Products and Services

The list of Compliance and Governance Products and Services includes products and services that are not part of the security architecture of an ICT system, but which implement functionalities that facilitate compliance with security regulations. This group includes, for example, auditing tools, risk analysis or system/equipment basing.

From the point of view of inclusion in the CPSTIC, no specific requirements have been defined for these products and no certifications are required, although they are assessed in an accredited laboratory.

This list has a single category, Compliance and Governance, which is composed of the following families:

This image for Image Layouts addon

CG.1

Security Governance and Planning

This image for Image Layouts addon

CG.2

Safety and Compliance Regulations

Normativa de Seguridad y Conformidad

CG.3

Risk Analysis and Management

This image for Image Layouts addon

CG.4

Notification and Management of Cyber Incidents

This image for Image Layouts addon

CG.5

Cyber Intelligence Exchange

This image for Image Layouts addon

CG.6

Cybersecurity Awareness and Training