BS EN 419251-2:2013
$215.11
Security requirements for device for authentication – Protection profile for extension for trusted channel to certificate generation application
Published By | Publication Date | Number of Pages |
BSI | 2013 | 76 |
This European Standard is a Protection Profile that defines the security requirements for an authentication device.
PDF Catalog
PDF Pages | PDF Title |
---|---|
8 | 1 Scope 2 Normative references 3 Conformance 3.1 CC Conformance Claim 3.2 PP Claim 3.3 Package Claim 3.4 Conformance Rationale 3.5 Conformance Statement |
9 | 4 Terms and definitions |
11 | 5 Symbols and abbreviations 6 Overview of the target of evaluation 6.1 TOE Type 6.2 TOE Usage 6.3 Security Features of the TOE |
13 | 6.4 Examples of applications 6.4.1 E-government 6.4.2 Multiple applications |
14 | 6.5 Required non-TOE Hardware and Software 6.6 Protection Profile Usage |
15 | 7 TOE Environment 7.1 Overall view |
16 | 7.2 Personalisation application 7.2.1 General 7.2.2 Functionalities 7.2.3 Communication |
17 | 7.3 Administration application 7.3.1 General 7.3.2 Functionalities 7.3.3 Communication |
18 | 7.4 Authentication application 7.4.1 General 7.4.2 Functionalities 7.4.3 Communication |
19 | 7.5 Verifier 7.5.1 Functionalities 7.5.2 Communication 7.6 Key Generator 7.6.1 Functionalities 7.6.2 Communication |
20 | 7.7 Certification Authority 7.7.1 Functionalities 7.7.2 Communication |
21 | 8 Life Cycle 8.1 Overview |
22 | 8.2 Pre-Personalisation phase 8.3 Personalisation phase 8.3.1 General |
23 | 8.3.2 Personalisation application 8.4 Usage phase 8.4.1 Authentication application |
24 | 8.4.2 Administration application |
25 | 8.4.3 Verifier 9 Security problem definition 9.1 Assets 9.1.1 General 9.1.2 Assets protected by the TOE 9.1.3 Sensitive assets of the TOE |
26 | 9.2 Users |
27 | 9.3 Threats |
29 | 9.4 Organisational security policies 9.4.1 Provided services 9.4.2 Other services |
30 | 9.5 Assumptions |
31 | 10 Security objectives 10.1 General 10.2 Security objectives for the TOE 10.2.1 Provided service 10.2.2 Authentication to the TOE |
32 | 10.2.3 TOE management |
33 | 10.3 Security objectives for the operational environment |
35 | 10.4 Rationale for Security objectives |
40 | 11 Extended component definition ā Definition of the Family FCS_RNG |
41 | 12 Security requirements 12.1 General |
42 | 12.2 Introduction 12.2.1 Subjects Objects and security attributes 12.2.2 Operations |
43 | 12.3 Security functional requirements 12.3.1 General 12.3.2 Core 12.3.2.1 General |
44 | 12.3.2.2 Device authentication by the verifier |
45 | 12.3.2.3 User authentication |
46 | 12.3.2.4 Access control |
50 | 12.3.2.5 Protection of the TSF |
51 | 12.3.3 KeyImp |
54 | 12.3.4 KeyGen |
57 | 12.3.5 Admin |
61 | 12.3.6 Untrusted CA |
62 | 12.3.7 Untrusted AdminAppli |
63 | 12.4 Security assurance requirements 12.5 SFR / Security objectives |
69 | 12.6 SFR Dependencies |
71 | 12.7 Rationale for the Assurance Requirements |