Security measures to support data partitioning with IP protection to support cooperation between user, supplier, and/or OEM
Security measures to support data partitioning with IP protection to support cooperation between user, supplier, and/or OEM 1st highest priority
Security measures to support data partitioning with IP protection to support cooperation between user, supplier, and/or OEM 2nd highest priority
Security measures to support data partitioning with IP protection to support cooperation between user, supplier, and/or OEM 3rd highest priority
Security measures to support partitioning of IP between design and operation
Security measures to support partitioning of IP between design and operation 1st highest priority
Security measures to support partitioning of IP between design and operation 2nd highest priority
Security measures to support partitioning of IP between design and operation 3rd highest priority
Security measures to protect manufacturing IP from malicious and non-malicious exposure
Security measures to protect manufacturing IP from malicious and non-malicious exposure 1st highest priority
Security measures to protect manufacturing IP from malicious and non-malicious exposure 2nd highest priority
Security measures to protect manufacturing IP from malicious and non-malicious exposure 3rd highest priority
Security risk on firm/software update
Security risk on firm/software update 1st highest priority
Security risk on firm/software update 2nd highest priority
Security risk on firm/software update 3rd highest priority
Impact of deploying security counter measures on system performance (such as reduced performance, functionality or safety)
Impact of deploying security counter measures on system performance (such as reduced performance, functionality or safety) 1st highest priority
Impact of deploying security counter measures on system performance (such as reduced performance, functionality or safety) 2nd highest priority
Impact of deploying security counter measures on system performance (such as reduced performance, functionality or safety) 3rd highest priority
Security risk by authorized person with malicious intent, including active surveillance and attack (threft, corruption etc.)
Security risk by authorized person with malicious intent, including active surveillance and attack (threft, corruption etc.) 1st highest priority
Security risk by authorized person with malicious intent, including active surveillance and attack (threft, corruption etc.) 2nd highest priority
Security risk by authorized person with malicious intent, including active surveillance and attack (threft, corruption etc.) 3rd highest priority
Adoption of IT standards for identity and access management, (such as OAuth, SAML, LDAP), for human and non-human access, to facilitate single sign-on and central management on user accounts throughout Fab (including production equipment)
Adoption of IT standards for identity and access management, (such as OAuth, SAML, LDAP), for human and non-human access, to facilitate single sign-on and central management on user accounts throughout Fab (including production equipment) 1st highest priority
Adoption of IT standards for identity and access management, (such as OAuth, SAML, LDAP), for human and non-human access, to facilitate single sign-on and central management on user accounts throughout Fab (including production equipment) 2nd highest priority
Adoption of IT standards for identity and access management, (such as OAuth, SAML, LDAP), for human and non-human access, to facilitate single sign-on and central management on user accounts throughout Fab (including production equipment) 3rd highest priority
Implementing security measures to legacy production equipment and components
Implementing security measures to legacy production equipment and components 1st highest priority
Implementing security measures to legacy production equipment and components 2nd highest priority
Implementing security measures to legacy production equipment and components 3rd highest priority
Security measure to facilitate supply chain traceability with data integrity and security
Security measure to facilitate supply chain traceability with data integrity and security 1st highest priority
Security measure to facilitate supply chain traceability with data integrity and security 2nd highest priority
Security measure to facilitate supply chain traceability with data integrity and security 3rd highest priority