{"id":347748,"date":"2024-10-20T00:27:47","date_gmt":"2024-10-20T00:27:47","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-13491-12016-tc\/"},"modified":"2024-10-25T23:59:17","modified_gmt":"2024-10-25T23:59:17","slug":"bs-iso-13491-12016-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-13491-12016-tc\/","title":{"rendered":"BS ISO 13491-1:2016 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | compares BS ISO 13491-1:2016 <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | TRACKED CHANGES Text example 1 \u2014 indicates added text (in green) <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 4 Abbreviated terms 5 Secure cryptographic device concepts 5.1 General <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 5.2 Attack scenarios 5.2.1 General 5.2.2 Penetration 5.2.3 Monitoring 5.2.4 Manipulation 5.2.5 Modification 5.2.6 Substitution <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 5.3 Defence measures 5.3.1 General 5.3.2 Device characteristics <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 5.3.3 Device management 5.3.4 Environment 6 Requirements for device security characteristics 6.1 General <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 6.2 Physical security requirements for SCDs 6.2.1 General 6.3 Tamper evident requirements 6.3.1 General <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 6.4 Tamper resistant requirements 6.4.1 General 6.5 Tamper responsive requirements 6.5.1 General <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 6.6 Logical security requirements for SCDs 6.6.1 Dual control 6.6.2 Unique key per device 6.6.3 Assurance of genuine device 6.6.4 Design of functions <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 6.6.5 Use of cryptographic keys 6.6.6 Sensitive device states 6.6.7 Multiple cryptographic relationships 6.6.8 SCD software authentication 7 Requirements for device management 7.1 General <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 7.2 Life cycle phases <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 7.3 Life cycle protection requirements 7.3.1 General 7.3.2 Manufacturing phase <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 7.3.3 Post-manufacturing phase 7.3.4 Commissioning (initial financial key loading) phase 7.3.5 Inactive operational phase <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 7.3.6 Active operational phase (use) 7.3.7 Decommissioning (post-use) phase 7.3.8 Repair phase <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 7.3.9 Destruction phase 7.4 Life cycle protection methods 7.4.1 Manufacturing 7.4.2 Post manufacturing phase 7.4.3 Commissioning (initial financial key loading) phase <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 7.4.4 Inactive Operational Phase 7.4.5 Active operational (use) phase 7.4.6 Decommissioning phase <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 7.4.7 Repair 7.4.8 Destruction 7.5 Accountability <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 7.6 Device management principles of audit and control <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | Annex\u00a0A (informative) Evaluation methods <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Financial services. Secure cryptographic devices (retail) – Concepts, requirements and evaluation methods<\/b><\/p>\n |