BS ISO/IEC 24745:2022
$215.11
Information security, cybersecurity and privacy protection. Biometric information protection
Published By | Publication Date | Number of Pages |
BSI | 2022 | 74 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
7 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
14 | 4 Abbreviated terms |
15 | 5 Biometric systems 5.1 General |
17 | 5.2 Biometric system operations |
19 | 5.3 Biometric references and identity references (IRs) 5.4 Biometric systems and identity management systems |
20 | 5.5 Personally identifiable information (PII) and privacy 5.6 Societal considerations |
21 | 6 Security aspects of a biometric system 6.1 Security requirements for biometric systems to protect biometric information 6.1.1 Confidentiality 6.1.2 Integrity 6.1.3 Renewability and revocability |
22 | 6.1.4 Availability 6.2 Security threats and countermeasures in biometric systems 6.2.1 Threats and countermeasures against biometric system components |
24 | 6.2.2 Threats and countermeasures during the transmission of biometric information |
25 | 6.2.3 Renewable biometric references as countermeasure technology |
27 | 6.3 Security of data records containing biometric information 6.3.1 Security for biometric information processing in a single database |
29 | 6.3.2 Security for biometric information processing in separated databases |
30 | 7 Biometric information privacy management 7.1 Biometric information privacy threats |
31 | 7.2 Biometric information privacy requirements and guidelines 7.2.1 Irreversibility 7.2.2 Unlinkability |
32 | 7.2.3 Confidentiality 7.3 Biometric information lifecycle privacy management 7.3.1 Collection 7.3.2 Transfer (disclosure of information to a third party) |
33 | 7.3.3 Use 7.3.4 Storage 7.3.5 Retention 7.3.6 Archiving and data backup |
34 | 7.3.7 Disposal 7.4 Responsibilities of a biometric system owner |
35 | 8 Biometric system application models and security 8.1 Biometric system application models |
36 | 8.2 Security in each biometric application model 8.2.1 General 8.2.2 Model A ā Store on server and compare on server |
38 | 8.2.3 Model B ā Store on token and compare on server |
40 | 8.2.4 Model C ā Store on server and compare on client |
41 | 8.2.5 Model D ā Store on client and compare on client |
43 | 8.2.6 Model E ā Store on token and compare on client |
45 | 8.2.7 Model F ā Store on token and compare on token |
46 | 8.2.8 Model G ā Store distributed on token and server, compare on server |
47 | 8.2.9 Model H ā Store distributed on token and client, compare on client |
49 | 8.2.10 Model I ā Store on server, compare distributed |
50 | 8.2.11 Model J ā Store on token, compare distributed |
52 | 8.2.12 Model K ā Store distributed, compare distributed |
54 | Annex A (informative) Secure binding and use of separated DBIR and DBBR |
57 | Annex B (informative) Framework for renewable biometric references (RBRs) |
61 | Annex C (informative) Technology examples for biometric information protection |
63 | Annex D (informative) Biometric watermarking |
65 | Annex E (informative) Biometric information protection using information splitting |
67 | Annex F (informative) Selection of biometric application models |
70 | Bibliography |