{"id":419953,"date":"2024-10-20T06:28:29","date_gmt":"2024-10-20T06:28:29","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-419211-22013-2\/"},"modified":"2024-10-26T12:06:18","modified_gmt":"2024-10-26T12:06:18","slug":"bs-en-419211-22013-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-419211-22013-2\/","title":{"rendered":"BS EN 419211-2:2013"},"content":{"rendered":"

This European Standard specifies a protection profile for a secure signature creation device that may generate signing keys internally: secure signature creation device with key generation (SSCD KG).<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
6<\/td>\n1 Scope
2 Normative references
3 Conventions and terminology
3.1 Conventions
3.2 Terms and definitions
4 PP introduction
4.1 PP reference <\/td>\n<\/tr>\n
7<\/td>\n4.2 PP overview <\/td>\n<\/tr>\n
8<\/td>\n4.3 TOE overview
4.3.1 Operation of the TOE <\/td>\n<\/tr>\n
9<\/td>\n4.3.2 Target of evaluation <\/td>\n<\/tr>\n
10<\/td>\n4.3.3 TOE lifecycle
4.3.3.1 General <\/td>\n<\/tr>\n
11<\/td>\n4.3.3.2 Preparation stage <\/td>\n<\/tr>\n
12<\/td>\n4.3.3.3 Operational use stage <\/td>\n<\/tr>\n
13<\/td>\n5 Conformance claims
5.1 CC conformance claim
5.2 PP claim, Package claim
5.3 Conformance rationale
5.4 Conformance statement
6 Security problem definition
6.1 Assets, users and threat agents <\/td>\n<\/tr>\n
14<\/td>\n6.2 Threats
6.2.1 T.SCD_Divulg Storing, copying and releasing of the signature creation data
6.2.2 T.SCD_Derive Derive the signature creation data
6.2.3 T.Hack_Phys Physical attacks through the TOE interfaces
6.2.4 T.SVD_Forgery Forgery of the signature verification data
6.2.5 T.SigF_Misuse Misuse of the signature creation function of the TOE
6.2.6 T.DTBS_Forgery Forgery of the DTBS\/R
6.2.7 T.Sig_Forgery Forgery of the electronic signature
6.3 Organisational security policies
6.3.1 P.CSP_QCert Qualified certificate <\/td>\n<\/tr>\n
15<\/td>\n6.3.2 P.QSign Qualified electronic signatures
6.3.3 P.Sigy_SSCD TOE as secure signature creation device
6.3.4 P.Sig_Non-Repud Non-repudiation of signatures
6.4 Assumptions
6.4.1 A.CGA Trustworthy certificate generation application
6.4.2 A.SCA Trustworthy signature creation application
7 Security objectives
7.1 Security objectives for the TOE
7.1.1 Relation to PP SSCD KI <\/td>\n<\/tr>\n
16<\/td>\n7.1.2 OT.Lifecycle_Security Lifecycle security
7.1.3 OT.SCD\/SVD_Auth_Gen Authorised SCD\/SVD generation
7.1.4 OT.SCD_Unique Uniqueness of the signature creation data
7.1.5 OT.SCD_SVD_Corresp Correspondence between SVD and SCD
7.1.6 OT.SCD_Secrecy Secrecy of the signature creation data
7.1.7 OT.Sig_Secure Cryptographic security of the electronic signature
7.1.8 OT.Sigy_SigF Signature creation function for the legitimate signatory only
7.1.9 OT.DTBS_Integrity_TOE DTBS\/R integrity inside the TOE <\/td>\n<\/tr>\n
17<\/td>\n7.1.10 OT.EMSEC_Design Provide physical emanations security
7.1.11 OT.Tamper_ID Tamper detection
7.1.12 OT.Tamper_Resistance Tamper resistance
7.2 Security objectives for the operational environment
7.2.1 Relation to PP SSCD KI
7.2.2 OE.SVD_Auth Authenticity of the SVD
7.2.3 OE.CGA_QCert Generation of qualified certificates
7.2.4 OE.SSCD_Prov_Service Authentic SSCD provided by SSCD-provisioning service
7.2.5 OE.HID_VAD Protection of the VAD <\/td>\n<\/tr>\n
18<\/td>\n7.2.6 OE.DTBS_Intend SCA sends data intended to be signed
7.2.7 OE.DTBS_Protect SCA protects the data intended to be signed
7.2.8 OE.Signatory Security obligation of the signatory <\/td>\n<\/tr>\n
19<\/td>\n7.3 Security objectives rationale
7.3.1 Security objectives backtracking
7.3.2 Security objectives sufficiency <\/td>\n<\/tr>\n
22<\/td>\n8 Extended components definition <\/td>\n<\/tr>\n
23<\/td>\n9 Security requirements
9.1 Security functional requirements
9.1.1 Use of requirement specifications
9.1.2 Cryptographic support (FCS) <\/td>\n<\/tr>\n
24<\/td>\n9.1.2.1 FCS_CKM.1 Cryptographic key generation
9.1.2.2 FCS_CKM.4 Cryptographic key destruction
9.1.2.3 FCS_COP.1 Cryptographic operation <\/td>\n<\/tr>\n
25<\/td>\n9.1.3 User data protection (FDP)
9.1.3.1 FDP_ACC.1\/SCD\/SVD_Generation Subset access control
9.1.3.2 FDP_ACF.1\/SCD\/SVD_Generation Security attribute based access control <\/td>\n<\/tr>\n
26<\/td>\n9.1.3.3 FDP_ACC.1\/SVD_Transfer Subset access control
9.1.3.4 FDP_ACF.1\/SVD_Transfer Security attribute based access control <\/td>\n<\/tr>\n
28<\/td>\n9.1.3.5 FDP_ACC.1\/Signature_Creation Subset access control
9.1.3.6 FDP_ACF.1\/Signature creation Security attribute based access control <\/td>\n<\/tr>\n
29<\/td>\n9.1.3.7 FDP_RIP.1 Subset residual information protection
9.1.3.8 FDP_SDI.2\/Persistent Stored data integrity monitoring and action <\/td>\n<\/tr>\n
30<\/td>\n9.1.3.9 FDP_SDI.2\/DTBS Stored data integrity monitoring and action
9.1.4 Identification and authentication (FIA)
9.1.4.1 FIA_UID.1 Timing of identification <\/td>\n<\/tr>\n
31<\/td>\n9.1.4.2 FIA_UAU.1 Timing of authentication
9.1.4.3 FIA_AFL.1 Authentication failure handling <\/td>\n<\/tr>\n
32<\/td>\n9.1.5 Security management (FMT)
9.1.5.1 FMT_SMR.1 Security roles
9.1.5.2 FMT_SMF.1 Security management functions
9.1.5.3 FMT_MOF.1 Management of security functions behaviour <\/td>\n<\/tr>\n
33<\/td>\n9.1.5.4 FMT_MSA.1\/Admin Management of security attributes
9.1.5.5 FMT_MSA.1\/Signatory Management of security attributes
9.1.5.6 FMT_MSA.2 Secure security attributes <\/td>\n<\/tr>\n
34<\/td>\n9.1.5.7 FMT_MSA.3 Static attribute initialisation
9.1.5.8 FMT_MSA.4 Security attribute value inheritance
9.1.5.9 FMT_MTD.1\/Admin Management of TSF data <\/td>\n<\/tr>\n
35<\/td>\n9.1.5.10 FMT_MTD.1\/Signatory Management of TSF data
9.1.6 Protection of the TSF (FPT)
9.1.6.1 FPT_EMS.1 TOE Emanation
9.1.6.2 FPT_FLS.1 Failure with preservation of secure state <\/td>\n<\/tr>\n
36<\/td>\n9.1.6.3 FPT_PHP.1 Passive detection of physical attack
9.1.6.4 FPT_PHP.3 Resistance to physical attack
9.1.6.5 FPT_TST.1 TSF testing <\/td>\n<\/tr>\n
37<\/td>\n9.2 Security assurance requirements <\/td>\n<\/tr>\n
38<\/td>\n9.3 Security requirements rationale
9.3.1 Security requirement coverage <\/td>\n<\/tr>\n
39<\/td>\n9.3.2 TOE Security Requirements Sufficiency <\/td>\n<\/tr>\n
41<\/td>\n9.3.3 Satisfaction of dependencies of security requirements <\/td>\n<\/tr>\n
42<\/td>\n9.3.4 Rationale for chosen security assurance requirements <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Protection profiles for secure signature creation device – Device with key generation<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2013<\/td>\n46<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":419963,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-419953","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/419953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/419963"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=419953"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=419953"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=419953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}