{"id":421035,"date":"2024-10-20T06:34:06","date_gmt":"2024-10-20T06:34:06","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-ts-419221-32016-2\/"},"modified":"2024-10-26T12:17:47","modified_gmt":"2024-10-26T12:17:47","slug":"bsi-pd-cen-ts-419221-32016-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-ts-419221-32016-2\/","title":{"rendered":"BSI PD CEN\/TS 419221-3:2016"},"content":{"rendered":"
This Technical Standard specifies a protection profile for cryptographic module for CSP key generation services.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
4<\/td>\n | Contents Page <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | European foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 General 4.1 PP reference 4.2 TOE overview 4.2.1 TOE usage and major security features <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Figure 1 \u2014 TOE Overview 4.2.2 TOE type 4.2.3 Available non-TOE hardware\/firmware\/software 5 Conformance Claims 5.1 CC conformance claim <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5.2 PP claim 5.3 Conformance rationale 5.4 Conformance statement 6 Security Problem Definition 6.1 TOE assets <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6.2 Threats <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.3 Organizational security policies <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.4 Assumptions 7 Security Objectives 7.1 General 7.2 Security objectives for the TOE <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.3 Security objectives for the operational environment <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.4 Security objectives rationale <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Table 1 \u2014 Mapping between Security Problem Definition and Security Objectives <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 8 Security Requirements 8.1 Security functional requirements 8.1.1 Subjects, objects, security attributes and operations <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 8.1.2 Security requirements operations <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 8.1.3 Security Audit (FAU) <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 8.1.4 Cryptographic Support (FCS) <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 8.1.5 User Data Protection (FDP) <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 8.1.6 Identification and Authentication (FIA) <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 8.1.7 Security Management (FMT) <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 8.1.8 Privacy (FPR) <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 8.1.9 Protection of the TSF (FPT) <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 8.1.10 Trusted path\/channels (FTP) 8.2 Security assurance requirements <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Table 2 \u2014 Security Assurance Requirements: EAL4+ AVA_VAN.5 8.3 Security requirements rationale 8.3.1 Security functional requirements rationale <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Table 3 \u2014 Mapping between Security Objectives and Security Functional Requirements <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 8.3.2 Security assurance requirements rationale <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Protection Profiles for TSP Cryptographic modules – Cryptographic module for CSP key generation services<\/b><\/p>\n |