{"id":421036,"date":"2024-10-20T06:34:06","date_gmt":"2024-10-20T06:34:06","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-ts-419221-42016-2\/"},"modified":"2024-10-26T12:17:51","modified_gmt":"2024-10-26T12:17:51","slug":"bsi-pd-cen-ts-419221-42016-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-ts-419221-42016-2\/","title":{"rendered":"BSI PD CEN\/TS 419221-4:2016"},"content":{"rendered":"

This Technical Specification specifies a protection profile for cryptographic modules used by certification service providers (as specified in Directive 1999\/93) for signing operations, without key backup. Target applications include root certification authorities (certification authorities which issue certificates to other CAs and is at the top of a CA hierarchy) and other certification service providers where there is a high risk of direct physical attacks against the module.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
4<\/td>\nContents Page <\/td>\n<\/tr>\n
8<\/td>\n1 Scope
2 Normative references
3 Terms and definitions
4 PP Introduction
4.1 General
4.2 PP Reference <\/td>\n<\/tr>\n
9<\/td>\n4.3 Protection Profile Overview <\/td>\n<\/tr>\n
10<\/td>\n4.4 TOE Overview
4.4.1 TOE type <\/td>\n<\/tr>\n
11<\/td>\n4.4.2 TOE Roles
4.4.3 Usage and major security features of the TOE <\/td>\n<\/tr>\n
13<\/td>\n4.4.4 Available non-TOE hardware\/software\/firmware
5 Conformance Claim
5.1 CC Conformance Claim
5.2 PP Claim
5.3 Conformance Rationale
5.4 Conformance Statement <\/td>\n<\/tr>\n
14<\/td>\n6 Security Problem Definition
6.1 Assets
6.1.1 General
6.1.2 TOE services
6.1.3 TOE Data
6.1.3.1 Keys
6.1.3.2 Internal TOE Data <\/td>\n<\/tr>\n
15<\/td>\n6.1.3.3 External TOE Data
6.2 Threats
6.2.1 General
6.2.2 Threat agents <\/td>\n<\/tr>\n
16<\/td>\n6.2.3 Threats description
6.2.3.1 Threats on Keys <\/td>\n<\/tr>\n
17<\/td>\n6.2.3.2 Threats on internal TOE Data
6.2.3.3 Threats on external TOE Data
6.2.3.4 Threats on TOE Services <\/td>\n<\/tr>\n
19<\/td>\n6.3 Organizational Security Policies
6.4 Assumptions <\/td>\n<\/tr>\n
20<\/td>\n7 Security Objectives
7.1 General
7.2 Security Objectives for the TOE <\/td>\n<\/tr>\n
22<\/td>\n7.3 Security Objectives for the Operational Environment <\/td>\n<\/tr>\n
23<\/td>\n8 Extended Components Definitions
8.1 Extended Component Definitions \u2014 Family FCS_RND <\/td>\n<\/tr>\n
24<\/td>\n9 Security Requirements
9.1 General
9.2 Subjects, objects, security attributes and operations
9.2.1 General
9.2.2 Subjects <\/td>\n<\/tr>\n
25<\/td>\n9.2.3 TOE Objects and security attributes
9.2.4 TOE Operations <\/td>\n<\/tr>\n
26<\/td>\n9.3 Security Functional Requirements
9.3.1 General
9.3.2 Security audit (FAU)
9.3.2.1 Audit data generation (FAU_GEN.1) <\/td>\n<\/tr>\n
27<\/td>\n9.3.2.2 User identity association (FAU_GEN.2)
9.3.2.3 Guarantees of audit data availability (FAU_STG.2)
9.3.3 Cryptographic support (FCS)
9.3.3.1 Cryptographic key generation (FCS_CKM.1) <\/td>\n<\/tr>\n
28<\/td>\n9.3.3.2 Cryptographic key distribution (FCS_CKM.2)
9.3.3.3 Cryptographic key destruction (FCS_CKM.4)
9.3.3.4 Cryptographic operation (FCS_COP.1) <\/td>\n<\/tr>\n
29<\/td>\n9.3.3.5 Quality metrics for random numbers (FCS_RND.1)
9.3.4 User data protection (FDP)
9.3.4.1 Subset access control (FDP_ACC.1\/CRYPTO)
9.3.4.2 Subset access control (FDP_ACC.1\/AUDIT)
9.3.4.3 Security attribute based access control (FDP_ACF.1\/CRYPTO) <\/td>\n<\/tr>\n
30<\/td>\n9.3.4.4 Security attribute based access control (FDP_ACF.1\/AUDIT) <\/td>\n<\/tr>\n
31<\/td>\n9.3.4.5 Export of user data without security attributes (FDP_ETC.1)
9.3.4.6 Subset residual information protection (FDP_RIP.1)
9.3.4.7 Stored data integrity monitoring and action (FDP_SDI.2)
9.3.5 Identification and authentication (FIA)
9.3.5.1 General
9.3.5.2 Authentication failure handling (FIA_AFL.1) <\/td>\n<\/tr>\n
32<\/td>\n9.3.5.3 User attribute definition (FIA_ATD.1)
9.3.5.4 Verification of secrets (FIA_SOS.1)
9.3.5.5 Timing of authentication (FIA_UAU.1)
9.3.5.6 Timing of identification (FIA_UID.1)
9.3.6 Security management (FMT)
9.3.6.1 Management of security attributes (FMT_MSA.1\/ROLE_CRYPTO)
9.3.6.2 Management of security attributes (FMT_MSA.1\/ROLE_AUDIT) <\/td>\n<\/tr>\n
33<\/td>\n9.3.6.3 Secure security attributes (FMT_MSA.2)
9.3.6.4 Static attribute initialization (FMT_MSA.3)
9.3.6.5 Management of TSF data (FMT_MTD.1\/ACCESS_CONTROL)
9.3.6.6 Management of TSF data (FMT_MTD.1\/USER_CRYPTO)
9.3.6.7 Management of TSF data (FMT_MTD.1\/USER_AUDIT)
9.3.6.8 Management of TSF data (FMT_MTD.1\/RAD)
9.3.6.9 Management of TSF data (FMT_MTD.1\/AUDIT)
9.3.6.10 Specification of Management Functions (FMT_SMF.1) <\/td>\n<\/tr>\n
34<\/td>\n9.3.6.11 Security roles (FMT_SMR.1)
9.3.7 Privacy (FPR) \u2014 Unobservability (FPR_UNO.1)
9.3.8 Protection of the TOE Security Functions (FPT)
9.3.8.1 Failure with preservation of secure state (FPT_FLS.1) <\/td>\n<\/tr>\n
35<\/td>\n9.3.8.2 Inter-TSF detection of modification (FPT_ITI.1)
9.3.8.3 Notification of physical attack (FPT_PHP.2)
9.3.8.4 Resistance to physical attack (FPT_PHP.3) <\/td>\n<\/tr>\n
36<\/td>\n9.3.8.5 Manual recovery (FPT_RCV.1)
9.3.8.6 TSF testing (FPT_TST.1) <\/td>\n<\/tr>\n
37<\/td>\n9.3.9 Trusted path (FTP) \u2014 Trusted path (FTP_TRP.1)
9.4 Security Assurance Requirements <\/td>\n<\/tr>\n
38<\/td>\n9.5 Security Requirements Rationale
9.5.1 Security Problem Definition coverage by Security Objectives
9.5.1.1 General <\/td>\n<\/tr>\n
39<\/td>\n9.5.1.2 Coverage rationale for Threats <\/td>\n<\/tr>\n
42<\/td>\n9.5.1.3 Coverage rationale for Organizational Security Policy
9.5.1.4 Coverage rationale for Assumptions <\/td>\n<\/tr>\n
43<\/td>\n9.5.2 Security Objectives coverage by SFRs <\/td>\n<\/tr>\n
47<\/td>\n9.5.3 SFR Dependencies
9.5.3.1 Justification of unsupported dependencies <\/td>\n<\/tr>\n
48<\/td>\n9.5.4 Rationale for SARs
9.5.5 AVA_VAN.5 Advanced methodical vulnerability analysis <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Protection Profiles for TSP cryptographic modules – Cryptographic module for CSP signing operations without backup<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2016<\/td>\n52<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":421046,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[695,2641],"product_tag":[],"class_list":{"0":"post-421036","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-30","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/421036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/421046"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=421036"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=421036"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=421036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}