Shopping Cart

No products in the cart.

BS EN 419251-3:2013

$215.11

Security requirements for device for authentication – Additional functionality for security targets

Published By Publication Date Number of Pages
BSI 2013 84
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

This European Standard contains packages that define security requirements for an authentication device. This document is Part 3. Part 1 and Part 2 are Protections Profiles ā€“ PPā€“ based on the packages defined in this document. Packages contained in this document can be added in a Security Target ā€“ST- claiming PP of Part 1 or Part 2.

PDF Catalog

PDF Pages PDF Title
8 1 Scope
2 Normative references
3 Conformance
3.1 CC Conformance Claim
3.2 PP Claim
3.3 Package Claim
3.4 Conformance Rationale
9 3.5 Conformance Statement
4 Terms and definitions
11 5 Symbols and abbreviations
6 Overview of the target of evaluation
6.1 TOE Type
6.2 TOE Usage
12 6.3 Security Features of the TOE
6.4 Required non-TOE Hardware and Software
6.5 Protection Profile Usage
6.6 Groups
6.6.1 General
6.6.2 Main groups
6.6.2.1 General
6.6.2.2 Core group
13 6.6.2.3 KeyImp group
6.6.2.4 KeyGen group
6.6.2.5 Admin group
6.6.3 Environment groups
6.6.3.1 General
6.6.3.2 Trusted PersoAppli
6.6.3.3 Trusted AuthAppli
14 6.6.3.4 Trusted Verifier
6.6.3.5 Trusted CA
6.6.3.6 Trusted AdminAppli
6.6.3.7 Untrusted PersoAppli
6.6.3.8 Untrusted AuthAppli
6.6.3.9 Untrusted Verifier
6.6.3.10 Untrusted CA
15 6.6.3.11 Untrusted AdminAppli
6.7 Configurations
6.7.1 General
6.7.2 Rules
16 6.7.3 Possible Configurations
6.7.3.1 General
6.7.3.2 Basic configurations
6.7.3.3 Transfer configurations
17 6.8 TOE Environment
6.8.1 Overall view
18 6.8.2 Personalisation application
6.8.2.1 General
6.8.2.2 Functionalities
19 6.8.2.3 Communication
6.8.3 Administration application
6.8.3.1 General
6.8.3.2 Functionalities
20 6.8.3.3 Communication
6.8.4 Authentication application
6.8.4.1 General
6.8.4.2 Functionalities
6.8.4.3 Communication
21 6.8.5 Verifier
6.8.5.1 Functionalities
6.8.5.2 Communication
6.8.6 Key Generator
6.8.6.1 Functionalities
6.8.6.2 Communication
22 6.8.7 Certification Authority
6.8.7.1 Functionalities
6.8.7.2 Communication
6.8.8 Examples of applications
6.8.8.1 General
6.8.8.2 Simple Access Control
23 6.8.8.3 E-government
6.8.8.4 Multiple application TOE
24 6.9 Life Cycle
6.9.1 Overview
25 6.9.2 Pre-Personalisation phase
6.9.3 Personalisation phase
6.9.3.1 General
26 6.9.3.2 Personalisation application
6.9.4 Usage phase
6.9.4.1 Authentication application
27 6.9.4.2 Administration application
6.9.4.3 Verifier
28 7 Security problem definition
7.1 Assets
7.1.1 General
7.1.2 Core group
7.1.2.1 Assets protected by the TOE
7.1.2.2 Sensitive assets of the TOE
7.1.3 KeyGen group
29 7.1.4 Admin group
7.2 Users
7.2.1 Core group
30 7.2.2 KeyImp group
7.2.3 KeyGen group
7.2.4 Admin group
7.3 Threats
7.3.1 General
31 7.3.2 Core group
32 7.3.3 KeyGen group
7.3.4 Admin group
7.4 Organisational security policies
7.4.1 Core group
7.4.1.1 Provided services
7.4.1.2 Other services
33 7.4.2 KeyGen group
7.4.3 Admin group
7.5 Assumptions
7.5.1 Core group
34 7.5.2 KeyGen group
7.5.3 Admin group
8 Security objectives
8.1 General āˆ’ Transfer of sensitive data
35 8.2 Security objectives for the TOE
8.2.1 Core group
8.2.1.1 Provided service
8.2.1.2 Authentication to the TOE
36 8.2.1.3 TOE management
8.2.2 KeyImp group
8.2.3 KeyGen group
8.2.4 Admin group
37 8.2.5 Untrusted PersoAppli
8.2.6 Untrusted AuthAppli
8.2.7 Untrusted Verifier
8.2.8 Untrusted CA
8.2.9 Untrusted AdminAppli
38 8.3 Security objectives for the operational environment
8.3.1 Core group
8.3.2 KeyImp group
39 8.3.3 Admin group
8.3.4 Trusted PersoAppli
8.3.5 Trusted AuthAppli
8.3.6 Trusted Verifier
8.3.7 Trusted CA
8.3.8 Trusted AdminAppli
40 8.4 Rationale for Security objectives
45 9 Extended component definition ā€“ Definition of the Family FCS_RNG
10 Security requirements
10.1 General
46 10.2 Introduction
10.2.1 Subjects Objects and security attributes
47 10.2.2 Operations
10.2.2.1 Core group
10.2.2.2 KeyImp group
10.2.2.3 KeyGen group
10.2.2.4 Admin group
48 10.2.2.5 Untrusted PersoAppli
10.2.2.6 Untrusted AuthAppli
10.2.2.7 Untrusted Verifier
10.2.2.8 Untrusted CA
10.2.2.9 Untrusted AdminAppli
10.3 Security functional requirements
10.3.1 General
49 10.3.2 Core group
10.3.2.1 Device authentication by the verifier
50 10.3.2.2 User authentication
51 10.3.2.3 Access control
56 10.3.2.4 Protection of the TSF
57 10.3.3 KeyImp group
60 10.3.4 KeyGen group
63 10.3.5 Admin group
67 10.3.6 Untrusted PersoAppli
68 10.3.7 Untrusted AuthAppli
10.3.8 Untrusted Verifier
69 10.3.9 Untrusted CA
70 10.3.10 Untrusted AdminAppli
10.4 Security assurance requirements
71 10.5 SFR / Security objectives
76 10.6 SFR Dependencies
78 10.7 Rationale for the Assurance Requirements
BS EN 419251-3:2013
$215.11