{"id":465058,"date":"2024-10-20T10:38:28","date_gmt":"2024-10-20T10:38:28","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-13491-12024\/"},"modified":"2024-10-26T19:38:13","modified_gmt":"2024-10-26T19:38:13","slug":"bs-iso-13491-12024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-13491-12024\/","title":{"rendered":"BS ISO 13491-1:2024"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
12<\/td>\n4 Abbreviated terms <\/td>\n<\/tr>\n
13<\/td>\n5 Secure cryptographic device concepts
5.1 General
5.2 Hardware management devices <\/td>\n<\/tr>\n
14<\/td>\n5.3 Secure cryptographic device types
5.3.1 General types
5.3.2 Secure cryptographic device components <\/td>\n<\/tr>\n
15<\/td>\n5.3.3 Hardware security module <\/td>\n<\/tr>\n
18<\/td>\n5.3.4 Key loading devices
5.4 Attack scenarios
5.4.1 General
5.4.2 Penetration
5.4.3 Monitoring <\/td>\n<\/tr>\n
19<\/td>\n5.4.4 Manipulation
5.4.5 Modification
5.4.6 Substitution
5.5 Defence measures
5.5.1 General <\/td>\n<\/tr>\n
20<\/td>\n5.5.2 Device characteristics
5.5.3 Device management <\/td>\n<\/tr>\n
21<\/td>\n5.5.4 Environment
6 Requirements for device security characteristics
6.1 General
6.2 Physical security requirements for secure cryptographic devices <\/td>\n<\/tr>\n
22<\/td>\n6.3 Tamper-evident requirements
6.3.1 General
6.3.2 Substitution
6.3.3 Penetration
6.3.4 Modification
6.3.5 Monitoring
6.4 Tamper-resistant requirements
6.4.1 General
6.4.2 Penetration <\/td>\n<\/tr>\n
23<\/td>\n6.4.3 Modification
6.4.4 Monitoring
6.4.5 Substitution or removal
6.5 Tamper-responsive requirements
6.5.1 General
6.5.2 Penetration
6.5.3 Modification <\/td>\n<\/tr>\n
24<\/td>\n6.6 Logical security requirements for SCDs and HMDs
6.6.1 General
6.6.2 Dual control
6.6.3 Unique key per device
6.6.4 Assurance of genuine device
6.6.5 Design of functions <\/td>\n<\/tr>\n
25<\/td>\n6.6.6 Use of cryptographic keys
6.6.7 Sensitive device states
6.6.8 Multiple cryptographic relationships
6.6.9 Secure device software authentication
7 Requirements for device management
7.1 General <\/td>\n<\/tr>\n
26<\/td>\n7.2 Life cycle phases <\/td>\n<\/tr>\n
27<\/td>\n7.3 Life cycle protection requirements
7.3.1 General <\/td>\n<\/tr>\n
28<\/td>\n7.3.2 Manufacturing phase
7.3.3 Post-manufacturing phase
7.3.4 Commissioning (initial financial key loading) phase
7.3.5 Inactive operational phase <\/td>\n<\/tr>\n
29<\/td>\n7.3.6 Active operational phase (use)
7.3.7 Decommissioning (post-use) phase
7.3.8 Repair phase <\/td>\n<\/tr>\n
30<\/td>\n7.3.9 Destruction phase
7.4 Life cycle protection methods
7.4.1 Manufacturing
7.4.2 Post-manufacturing phase <\/td>\n<\/tr>\n
31<\/td>\n7.4.3 Commissioning (initial financial key loading) phase
7.4.4 Inactive operational phase
7.4.5 Active operational (use) phase <\/td>\n<\/tr>\n
32<\/td>\n7.4.6 Decommissioning phase
7.4.7 Repair
7.4.8 Destruction
7.5 Accountability <\/td>\n<\/tr>\n
33<\/td>\n7.6 Device management principles of audit and control <\/td>\n<\/tr>\n
35<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Financial services. Secure cryptographic devices (retail) – Concepts and requirements<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2024<\/td>\n36<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":465068,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[696,2641],"product_tag":[],"class_list":{"0":"post-465058","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-40","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/465058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/465068"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=465058"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=465058"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=465058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}