{"id":421036,"date":"2024-10-20T06:34:06","date_gmt":"2024-10-20T06:34:06","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-ts-419221-42016-2\/"},"modified":"2024-10-26T12:17:51","modified_gmt":"2024-10-26T12:17:51","slug":"bsi-pd-cen-ts-419221-42016-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-ts-419221-42016-2\/","title":{"rendered":"BSI PD CEN\/TS 419221-4:2016"},"content":{"rendered":"
This Technical Specification specifies a protection profile for cryptographic modules used by certification service providers (as specified in Directive 1999\/93) for signing operations, without key backup. Target applications include root certification authorities (certification authorities which issue certificates to other CAs and is at the top of a CA hierarchy) and other certification service providers where there is a high risk of direct physical attacks against the module.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
4<\/td>\n | Contents Page <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 PP Introduction 4.1 General 4.2 PP Reference <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 4.3 Protection Profile Overview <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4.4 TOE Overview 4.4.1 TOE type <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.4.2 TOE Roles 4.4.3 Usage and major security features of the TOE <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4.4.4 Available non-TOE hardware\/software\/firmware 5 Conformance Claim 5.1 CC Conformance Claim 5.2 PP Claim 5.3 Conformance Rationale 5.4 Conformance Statement <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6 Security Problem Definition 6.1 Assets 6.1.1 General 6.1.2 TOE services 6.1.3 TOE Data 6.1.3.1 Keys 6.1.3.2 Internal TOE Data <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.1.3.3 External TOE Data 6.2 Threats 6.2.1 General 6.2.2 Threat agents <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.2.3 Threats description 6.2.3.1 Threats on Keys <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.2.3.2 Threats on internal TOE Data 6.2.3.3 Threats on external TOE Data 6.2.3.4 Threats on TOE Services <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.3 Organizational Security Policies 6.4 Assumptions <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7 Security Objectives 7.1 General 7.2 Security Objectives for the TOE <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.3 Security Objectives for the Operational Environment <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 8 Extended Components Definitions 8.1 Extended Component Definitions \u2014 Family FCS_RND <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 9 Security Requirements 9.1 General 9.2 Subjects, objects, security attributes and operations 9.2.1 General 9.2.2 Subjects <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 9.2.3 TOE Objects and security attributes 9.2.4 TOE Operations <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 9.3 Security Functional Requirements 9.3.1 General 9.3.2 Security audit (FAU) 9.3.2.1 Audit data generation (FAU_GEN.1) <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 9.3.2.2 User identity association (FAU_GEN.2) 9.3.2.3 Guarantees of audit data availability (FAU_STG.2) 9.3.3 Cryptographic support (FCS) 9.3.3.1 Cryptographic key generation (FCS_CKM.1) <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 9.3.3.2 Cryptographic key distribution (FCS_CKM.2) 9.3.3.3 Cryptographic key destruction (FCS_CKM.4) 9.3.3.4 Cryptographic operation (FCS_COP.1) <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 9.3.3.5 Quality metrics for random numbers (FCS_RND.1) 9.3.4 User data protection (FDP) 9.3.4.1 Subset access control (FDP_ACC.1\/CRYPTO) 9.3.4.2 Subset access control (FDP_ACC.1\/AUDIT) 9.3.4.3 Security attribute based access control (FDP_ACF.1\/CRYPTO) <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 9.3.4.4 Security attribute based access control (FDP_ACF.1\/AUDIT) <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 9.3.4.5 Export of user data without security attributes (FDP_ETC.1) 9.3.4.6 Subset residual information protection (FDP_RIP.1) 9.3.4.7 Stored data integrity monitoring and action (FDP_SDI.2) 9.3.5 Identification and authentication (FIA) 9.3.5.1 General 9.3.5.2 Authentication failure handling (FIA_AFL.1) <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 9.3.5.3 User attribute definition (FIA_ATD.1) 9.3.5.4 Verification of secrets (FIA_SOS.1) 9.3.5.5 Timing of authentication (FIA_UAU.1) 9.3.5.6 Timing of identification (FIA_UID.1) 9.3.6 Security management (FMT) 9.3.6.1 Management of security attributes (FMT_MSA.1\/ROLE_CRYPTO) 9.3.6.2 Management of security attributes (FMT_MSA.1\/ROLE_AUDIT) <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 9.3.6.3 Secure security attributes (FMT_MSA.2) 9.3.6.4 Static attribute initialization (FMT_MSA.3) 9.3.6.5 Management of TSF data (FMT_MTD.1\/ACCESS_CONTROL) 9.3.6.6 Management of TSF data (FMT_MTD.1\/USER_CRYPTO) 9.3.6.7 Management of TSF data (FMT_MTD.1\/USER_AUDIT) 9.3.6.8 Management of TSF data (FMT_MTD.1\/RAD) 9.3.6.9 Management of TSF data (FMT_MTD.1\/AUDIT) 9.3.6.10 Specification of Management Functions (FMT_SMF.1) <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 9.3.6.11 Security roles (FMT_SMR.1) 9.3.7 Privacy (FPR) \u2014 Unobservability (FPR_UNO.1) 9.3.8 Protection of the TOE Security Functions (FPT) 9.3.8.1 Failure with preservation of secure state (FPT_FLS.1) <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 9.3.8.2 Inter-TSF detection of modification (FPT_ITI.1) 9.3.8.3 Notification of physical attack (FPT_PHP.2) 9.3.8.4 Resistance to physical attack (FPT_PHP.3) <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 9.3.8.5 Manual recovery (FPT_RCV.1) 9.3.8.6 TSF testing (FPT_TST.1) <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 9.3.9 Trusted path (FTP) \u2014 Trusted path (FTP_TRP.1) 9.4 Security Assurance Requirements <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 9.5 Security Requirements Rationale 9.5.1 Security Problem Definition coverage by Security Objectives 9.5.1.1 General <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 9.5.1.2 Coverage rationale for Threats <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 9.5.1.3 Coverage rationale for Organizational Security Policy 9.5.1.4 Coverage rationale for Assumptions <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 9.5.2 Security Objectives coverage by SFRs <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 9.5.3 SFR Dependencies 9.5.3.1 Justification of unsupported dependencies <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 9.5.4 Rationale for SARs 9.5.5 AVA_VAN.5 Advanced methodical vulnerability analysis <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Protection Profiles for TSP cryptographic modules – Cryptographic module for CSP signing operations without backup<\/b><\/p>\n |