BS EN 419251-1:2013
$198.66
Security requirements for device for authentication – Protection profile for core functionality
Published By | Publication Date | Number of Pages |
BSI | 2013 | 54 |
This European Standard is a Protection Profile that defines the security requirements for an authentication device.
PDF Catalog
PDF Pages | PDF Title |
---|---|
8 | 1 Scope 2 Normative references 3 Conformance 3.1 CC Conformance Claim 3.2 PP Claim 3.3 Package Claim 3.4 Conformance Rationale 3.5 Conformance Statement |
9 | 4 Terms and definitions |
11 | 5 Symbols and abbreviations 6 Overview of the target of evaluation 6.1 TOE Type 6.2 TOE Usage 6.3 Security Features of the TOE |
12 | 6.4 Examples of applications 6.4.1 E-government |
13 | 6.4.2 Multiple applications 6.5 Required non-TOE Hardware and Software 6.6 Protection Profile Usage |
14 | 7 TOE Environment 7.1 Overall view |
15 | 7.2 Personalisation application 7.2.1 General 7.2.2 Functionalities 7.2.3 Communication |
16 | 7.3 Authentication application 7.3.1 General 7.3.2 Functionalities 7.3.3 Communication |
17 | 7.4 Verifier 7.4.1 Functionalities 7.4.2 Communication 7.5 Key Generator 7.5.1 Functionalities 7.5.2 Communication 7.6 Certification Authority ā Functionalities |
18 | 8 Life Cycle 8.1 Overview |
19 | 8.2 Pre-Personalisation phase |
20 | 8.3 Personalisation phase 8.3.1 General 8.3.2 Personalisation application 8.4 Usage phase ( Authentication application 8.4.1 General |
21 | 8.4.2 Verifier 9 Security problem definition 9.1 Assets 9.1.1 General 9.1.2 Assets protected by the TOE 9.1.3 Sensitive assets of the TOE |
22 | 9.2 Users |
23 | 9.3 Threats |
24 | 9.4 Organisational security policies 9.4.1 Provided services 9.4.2 Other services |
25 | 9.5 Assumptions |
26 | 10 Security objectives 10.1 General 10.2 Security objectives for the TOE 10.2.1 Provided service 10.2.2 Authentication to the TOE 10.2.3 TOE management |
27 | 10.3 Security objectives for the operational environment |
28 | 10.4 Rationale for Security objectives |
32 | 11 Extended component definition 12 Security requirements 12.1 General |
33 | 12.2 Introduction 12.2.1 Subjects Objects and security attributes 12.2.2 Operations |
34 | 12.3 Security functional requirements 12.3.1 General 12.3.2 Core 12.3.2.1 General 12.3.2.2 Device authentication by the verifier |
35 | 12.3.2.3 User authentication |
36 | 12.3.2.4 Access control |
41 | 12.3.2.5 Protection of the TSF |
42 | 12.3.3 KeyImp |
45 | 12.4 Security assurance requirements 12.5 SFR / Security objectives |
48 | 12.6 SFR Dependencies |
50 | 12.7 Rationale for the Assurance Requirements 12.7.1 EAL.4 methodically designed, tested, and reviewed 12.7.2 AVA_VAN.5 Advanced methodical vulnerability analysis 12.7.3 ALC_DVS.2 Sufficiency of security measures |