{"id":419953,"date":"2024-10-20T06:28:29","date_gmt":"2024-10-20T06:28:29","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-419211-22013-2\/"},"modified":"2024-10-26T12:06:18","modified_gmt":"2024-10-26T12:06:18","slug":"bs-en-419211-22013-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-419211-22013-2\/","title":{"rendered":"BS EN 419211-2:2013"},"content":{"rendered":"
This European Standard specifies a protection profile for a secure signature creation device that may generate signing keys internally: secure signature creation device with key generation (SSCD KG).<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | 1 Scope 2 Normative references 3 Conventions and terminology 3.1 Conventions 3.2 Terms and definitions 4 PP introduction 4.1 PP reference <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | 4.2 PP overview <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 4.3 TOE overview 4.3.1 Operation of the TOE <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 4.3.2 Target of evaluation <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4.3.3 TOE lifecycle 4.3.3.1 General <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.3.3.2 Preparation stage <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4.3.3.3 Operational use stage <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5 Conformance claims 5.1 CC conformance claim 5.2 PP claim, Package claim 5.3 Conformance rationale 5.4 Conformance statement 6 Security problem definition 6.1 Assets, users and threat agents <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.2 Threats 6.2.1 T.SCD_Divulg Storing, copying and releasing of the signature creation data 6.2.2 T.SCD_Derive Derive the signature creation data 6.2.3 T.Hack_Phys Physical attacks through the TOE interfaces 6.2.4 T.SVD_Forgery Forgery of the signature verification data 6.2.5 T.SigF_Misuse Misuse of the signature creation function of the TOE 6.2.6 T.DTBS_Forgery Forgery of the DTBS\/R 6.2.7 T.Sig_Forgery Forgery of the electronic signature 6.3 Organisational security policies 6.3.1 P.CSP_QCert Qualified certificate <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.3.2 P.QSign Qualified electronic signatures 6.3.3 P.Sigy_SSCD TOE as secure signature creation device 6.3.4 P.Sig_Non-Repud Non-repudiation of signatures 6.4 Assumptions 6.4.1 A.CGA Trustworthy certificate generation application 6.4.2 A.SCA Trustworthy signature creation application 7 Security objectives 7.1 Security objectives for the TOE 7.1.1 Relation to PP SSCD KI <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.1.2 OT.Lifecycle_Security Lifecycle security 7.1.3 OT.SCD\/SVD_Auth_Gen Authorised SCD\/SVD generation 7.1.4 OT.SCD_Unique Uniqueness of the signature creation data 7.1.5 OT.SCD_SVD_Corresp Correspondence between SVD and SCD 7.1.6 OT.SCD_Secrecy Secrecy of the signature creation data 7.1.7 OT.Sig_Secure Cryptographic security of the electronic signature 7.1.8 OT.Sigy_SigF Signature creation function for the legitimate signatory only 7.1.9 OT.DTBS_Integrity_TOE DTBS\/R integrity inside the TOE <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.1.10 OT.EMSEC_Design Provide physical emanations security 7.1.11 OT.Tamper_ID Tamper detection 7.1.12 OT.Tamper_Resistance Tamper resistance 7.2 Security objectives for the operational environment 7.2.1 Relation to PP SSCD KI 7.2.2 OE.SVD_Auth Authenticity of the SVD 7.2.3 OE.CGA_QCert Generation of qualified certificates 7.2.4 OE.SSCD_Prov_Service Authentic SSCD provided by SSCD-provisioning service 7.2.5 OE.HID_VAD Protection of the VAD <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.2.6 OE.DTBS_Intend SCA sends data intended to be signed 7.2.7 OE.DTBS_Protect SCA protects the data intended to be signed 7.2.8 OE.Signatory Security obligation of the signatory <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.3 Security objectives rationale 7.3.1 Security objectives backtracking 7.3.2 Security objectives sufficiency <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 8 Extended components definition <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 9 Security requirements 9.1 Security functional requirements 9.1.1 Use of requirement specifications 9.1.2 Cryptographic support (FCS) <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 9.1.2.1 FCS_CKM.1 Cryptographic key generation 9.1.2.2 FCS_CKM.4 Cryptographic key destruction 9.1.2.3 FCS_COP.1 Cryptographic operation <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 9.1.3 User data protection (FDP) 9.1.3.1 FDP_ACC.1\/SCD\/SVD_Generation Subset access control 9.1.3.2 FDP_ACF.1\/SCD\/SVD_Generation Security attribute based access control <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 9.1.3.3 FDP_ACC.1\/SVD_Transfer Subset access control 9.1.3.4 FDP_ACF.1\/SVD_Transfer Security attribute based access control <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 9.1.3.5 FDP_ACC.1\/Signature_Creation Subset access control 9.1.3.6 FDP_ACF.1\/Signature creation Security attribute based access control <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 9.1.3.7 FDP_RIP.1 Subset residual information protection 9.1.3.8 FDP_SDI.2\/Persistent Stored data integrity monitoring and action <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 9.1.3.9 FDP_SDI.2\/DTBS Stored data integrity monitoring and action 9.1.4 Identification and authentication (FIA) 9.1.4.1 FIA_UID.1 Timing of identification <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 9.1.4.2 FIA_UAU.1 Timing of authentication 9.1.4.3 FIA_AFL.1 Authentication failure handling <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 9.1.5 Security management (FMT) 9.1.5.1 FMT_SMR.1 Security roles 9.1.5.2 FMT_SMF.1 Security management functions 9.1.5.3 FMT_MOF.1 Management of security functions behaviour <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 9.1.5.4 FMT_MSA.1\/Admin Management of security attributes 9.1.5.5 FMT_MSA.1\/Signatory Management of security attributes 9.1.5.6 FMT_MSA.2 Secure security attributes <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 9.1.5.7 FMT_MSA.3 Static attribute initialisation 9.1.5.8 FMT_MSA.4 Security attribute value inheritance 9.1.5.9 FMT_MTD.1\/Admin Management of TSF data <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 9.1.5.10 FMT_MTD.1\/Signatory Management of TSF data 9.1.6 Protection of the TSF (FPT) 9.1.6.1 FPT_EMS.1 TOE Emanation 9.1.6.2 FPT_FLS.1 Failure with preservation of secure state <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 9.1.6.3 FPT_PHP.1 Passive detection of physical attack 9.1.6.4 FPT_PHP.3 Resistance to physical attack 9.1.6.5 FPT_TST.1 TSF testing <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 9.2 Security assurance requirements <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 9.3 Security requirements rationale 9.3.1 Security requirement coverage <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 9.3.2 TOE Security Requirements Sufficiency <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 9.3.3 Satisfaction of dependencies of security requirements <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 9.3.4 Rationale for chosen security assurance requirements <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Protection profiles for secure signature creation device – Device with key generation<\/b><\/p>\n |