BS EN 419211-6:2014
$142.49
Protection profiles for secure signature creation device – Extension for device with key import and trusted channel to signature creation application
Published By | Publication Date | Number of Pages |
BSI | 2014 | 28 |
This European Standard specifies a protection profile for a secure signature creation device that may import signing keys and communicate with the signature creation application in protected manner: secure signature creation device with key import and trusted communication with signature creation application (SSCD KI TCSCA).
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | Contents Page |
5 | Foreword |
6 | Introduction |
7 | 1 Scope 2 Normative references 3 Conventions and terminology 3.1 Conventions 3.2 Terms and definitions |
8 | 4 PP introduction 4.1 PP reference 4.2 PP overview |
9 | 4.3 TOE overview 4.3.1 Operation of the TOE |
10 | 4.3.2 Target of evaluation |
11 | 4.3.3 TOE lifecycle 5 Conformance claims 5.1 CC conformance claim 5.2 PP claim, Package claim 5.3 Conformance rationale |
12 | 5.4 Conformance statement 6 Security problem definition 6.1 Assets, users and threat agents |
13 | 6.2 Threats 6.3 Organizational security policies 6.4 Assumptions 7 Security objectives 7.1 Security objectives for the TOE 7.1.1 Relation to core PP |
14 | 7.2 Security objectives for the operational environment 7.2.1 Relation to core PP 7.3 Security objectives rationale 7.3.1 Security objectives backtracking |
15 | Table 1 ā Mapping of security problem definition to security objectives |
16 | 7.3.2 Security objectives sufficiency |
17 | 8 Extended components definition 9 Security requirements 9.1 Security functional requirements 9.1.1 Use of requirement specifications |
18 | 9.1.2 FIA_UAU.1 Timing of authentication 9.1.3 FDP_UIT.1/DTBS Data exchange integrity |
19 | 9.1.4 FTP_ITC.1/VAD Inter-TSF trusted channel ā TC Human Interface Device 9.1.5 FTP_ITC.1/DTBS Inter-TSF trusted channel ā Signature creation Application |
20 | 9.2 Security assurance requirements Table 2 ā Assurance requirements: EAL4 augmented with AVA_VAN.5 |
21 | 9.3 Security requirements rationale 9.3.1 Security requirements coverage Table 3 ā Mapping of functional requirements to security objectives for the TOE |
22 | 9.3.2 TOE security requirements sufficiency |
23 | 9.3.3 Satisfaction of dependencies of chosen security requirements Table 4 ā Satisfaction of dependencies of security functional requirements |
25 | Table 5 ā Satisfaction of dependencies of security assurance requirements 9.3.4 Rationale for chosen security assurance requirements |
26 | Bibliography |