{"id":465058,"date":"2024-10-20T10:38:28","date_gmt":"2024-10-20T10:38:28","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-13491-12024\/"},"modified":"2024-10-26T19:38:13","modified_gmt":"2024-10-26T19:38:13","slug":"bs-iso-13491-12024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-13491-12024\/","title":{"rendered":"BS ISO 13491-1:2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5 Secure cryptographic device concepts 5.1 General 5.2 Hardware management devices <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.3 Secure cryptographic device types 5.3.1 General types 5.3.2 Secure cryptographic device components <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.3.3 Hardware security module <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.3.4 Key loading devices 5.4 Attack scenarios 5.4.1 General 5.4.2 Penetration 5.4.3 Monitoring <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.4.4 Manipulation 5.4.5 Modification 5.4.6 Substitution 5.5 Defence measures 5.5.1 General <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.5.2 Device characteristics 5.5.3 Device management <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.5.4 Environment 6 Requirements for device security characteristics 6.1 General 6.2 Physical security requirements for secure cryptographic devices <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.3 Tamper-evident requirements 6.3.1 General 6.3.2 Substitution 6.3.3 Penetration 6.3.4 Modification 6.3.5 Monitoring 6.4 Tamper-resistant requirements 6.4.1 General 6.4.2 Penetration <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.4.3 Modification 6.4.4 Monitoring 6.4.5 Substitution or removal 6.5 Tamper-responsive requirements 6.5.1 General 6.5.2 Penetration 6.5.3 Modification <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.6 Logical security requirements for SCDs and HMDs 6.6.1 General 6.6.2 Dual control 6.6.3 Unique key per device 6.6.4 Assurance of genuine device 6.6.5 Design of functions <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.6.6 Use of cryptographic keys 6.6.7 Sensitive device states 6.6.8 Multiple cryptographic relationships 6.6.9 Secure device software authentication 7 Requirements for device management 7.1 General <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.2 Life cycle phases <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.3 Life cycle protection requirements 7.3.1 General <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.3.2 Manufacturing phase 7.3.3 Post-manufacturing phase 7.3.4 Commissioning (initial financial key loading) phase 7.3.5 Inactive operational phase <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.3.6 Active operational phase (use) 7.3.7 Decommissioning (post-use) phase 7.3.8 Repair phase <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7.3.9 Destruction phase 7.4 Life cycle protection methods 7.4.1 Manufacturing 7.4.2 Post-manufacturing phase <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7.4.3 Commissioning (initial financial key loading) phase 7.4.4 Inactive operational phase 7.4.5 Active operational (use) phase <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.4.6 Decommissioning phase 7.4.7 Repair 7.4.8 Destruction 7.5 Accountability <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.6 Device management principles of audit and control <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Financial services. Secure cryptographic devices (retail) – Concepts and requirements<\/b><\/p>\n |