{"id":349261,"date":"2024-10-20T00:35:44","date_gmt":"2024-10-20T00:35:44","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-419251-12013\/"},"modified":"2024-10-26T00:15:43","modified_gmt":"2024-10-26T00:15:43","slug":"bs-en-419251-12013","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-419251-12013\/","title":{"rendered":"BS EN 419251-1:2013"},"content":{"rendered":"
This European Standard is a Protection Profile that defines the security requirements for an authentication device.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
8<\/td>\n | 1 Scope 2 Normative references 3 Conformance 3.1 CC Conformance Claim 3.2 PP Claim 3.3 Package Claim 3.4 Conformance Rationale 3.5 Conformance Statement <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 4 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 Symbols and abbreviations 6 Overview of the target of evaluation 6.1 TOE Type 6.2 TOE Usage 6.3 Security Features of the TOE <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6.4 Examples of applications 6.4.1 E-government <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.4.2 Multiple applications 6.5 Required non-TOE Hardware and Software 6.6 Protection Profile Usage <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 7 TOE Environment 7.1 Overall view <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7.2 Personalisation application 7.2.1 General 7.2.2 Functionalities 7.2.3 Communication <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.3 Authentication application 7.3.1 General 7.3.2 Functionalities 7.3.3 Communication <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.4 Verifier 7.4.1 Functionalities 7.4.2 Communication 7.5 Key Generator 7.5.1 Functionalities 7.5.2 Communication 7.6 Certification Authority \u2015 Functionalities <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 8 Life Cycle 8.1 Overview <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8.2 Pre-Personalisation phase <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8.3 Personalisation phase 8.3.1 General 8.3.2 Personalisation application 8.4 Usage phase ( Authentication application 8.4.1 General <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8.4.2 Verifier 9 Security problem definition 9.1 Assets 9.1.1 General 9.1.2 Assets protected by the TOE 9.1.3 Sensitive assets of the TOE <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 9.2 Users <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 9.3 Threats <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 9.4 Organisational security policies 9.4.1 Provided services 9.4.2 Other services <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 9.5 Assumptions <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 10 Security objectives 10.1 General 10.2 Security objectives for the TOE 10.2.1 Provided service 10.2.2 Authentication to the TOE 10.2.3 TOE management <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 10.3 Security objectives for the operational environment <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 10.4 Rationale for Security objectives <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 11 Extended component definition 12 Security requirements 12.1 General <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 12.2 Introduction 12.2.1 Subjects Objects and security attributes 12.2.2 Operations <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 12.3 Security functional requirements 12.3.1 General 12.3.2 Core 12.3.2.1 General 12.3.2.2 Device authentication by the verifier <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 12.3.2.3 User authentication <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 12.3.2.4 Access control <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 12.3.2.5 Protection of the TSF <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 12.3.3 KeyImp <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 12.4 Security assurance requirements 12.5 SFR \/ Security objectives <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 12.6 SFR Dependencies <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 12.7 Rationale for the Assurance Requirements 12.7.1 EAL.4 methodically designed, tested, and reviewed 12.7.2 AVA_VAN.5 Advanced methodical vulnerability analysis 12.7.3 ALC_DVS.2 Sufficiency of security measures <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Security requirements for device for authentication – Protection profile for core functionality<\/b><\/p>\n |