BSI PD CEN/TS 419221-3:2016
$189.07
Protection Profiles for TSP Cryptographic modules – Cryptographic module for CSP key generation services
Published By | Publication Date | Number of Pages |
BSI | 2016 | 46 |
This Technical Standard specifies a protection profile for cryptographic module for CSP key generation services.
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | Contents Page |
5 | European foreword |
6 | Introduction |
8 | 1 Scope 2 Normative references 3 Terms and definitions 4 General 4.1 PP reference 4.2 TOE overview 4.2.1 TOE usage and major security features |
10 | Figure 1 — TOE Overview 4.2.2 TOE type 4.2.3 Available non-TOE hardware/firmware/software 5 Conformance Claims 5.1 CC conformance claim |
11 | 5.2 PP claim 5.3 Conformance rationale 5.4 Conformance statement 6 Security Problem Definition 6.1 TOE assets |
12 | 6.2 Threats |
14 | 6.3 Organizational security policies |
15 | 6.4 Assumptions 7 Security Objectives 7.1 General 7.2 Security objectives for the TOE |
17 | 7.3 Security objectives for the operational environment |
18 | 7.4 Security objectives rationale |
19 | Table 1 — Mapping between Security Problem Definition and Security Objectives |
23 | 8 Security Requirements 8.1 Security functional requirements 8.1.1 Subjects, objects, security attributes and operations |
24 | 8.1.2 Security requirements operations |
25 | 8.1.3 Security Audit (FAU) |
26 | 8.1.4 Cryptographic Support (FCS) |
27 | 8.1.5 User Data Protection (FDP) |
30 | 8.1.6 Identification and Authentication (FIA) |
31 | 8.1.7 Security Management (FMT) |
32 | 8.1.8 Privacy (FPR) |
33 | 8.1.9 Protection of the TSF (FPT) |
35 | 8.1.10 Trusted path/channels (FTP) 8.2 Security assurance requirements |
36 | Table 2 — Security Assurance Requirements: EAL4+ AVA_VAN.5 8.3 Security requirements rationale 8.3.1 Security functional requirements rationale |
37 | Table 3 — Mapping between Security Objectives and Security Functional Requirements |
42 | 8.3.2 Security assurance requirements rationale |
43 | Bibliography |