BS EN 419251-3:2013
$215.11
Security requirements for device for authentication – Additional functionality for security targets
Published By | Publication Date | Number of Pages |
BSI | 2013 | 84 |
This European Standard contains packages that define security requirements for an authentication device. This document is Part 3. Part 1 and Part 2 are Protections Profiles ā PPā based on the packages defined in this document. Packages contained in this document can be added in a Security Target āST- claiming PP of Part 1 or Part 2.
PDF Catalog
PDF Pages | PDF Title |
---|---|
8 | 1 Scope 2 Normative references 3 Conformance 3.1 CC Conformance Claim 3.2 PP Claim 3.3 Package Claim 3.4 Conformance Rationale |
9 | 3.5 Conformance Statement 4 Terms and definitions |
11 | 5 Symbols and abbreviations 6 Overview of the target of evaluation 6.1 TOE Type 6.2 TOE Usage |
12 | 6.3 Security Features of the TOE 6.4 Required non-TOE Hardware and Software 6.5 Protection Profile Usage 6.6 Groups 6.6.1 General 6.6.2 Main groups 6.6.2.1 General 6.6.2.2 Core group |
13 | 6.6.2.3 KeyImp group 6.6.2.4 KeyGen group 6.6.2.5 Admin group 6.6.3 Environment groups 6.6.3.1 General 6.6.3.2 Trusted PersoAppli 6.6.3.3 Trusted AuthAppli |
14 | 6.6.3.4 Trusted Verifier 6.6.3.5 Trusted CA 6.6.3.6 Trusted AdminAppli 6.6.3.7 Untrusted PersoAppli 6.6.3.8 Untrusted AuthAppli 6.6.3.9 Untrusted Verifier 6.6.3.10 Untrusted CA |
15 | 6.6.3.11 Untrusted AdminAppli 6.7 Configurations 6.7.1 General 6.7.2 Rules |
16 | 6.7.3 Possible Configurations 6.7.3.1 General 6.7.3.2 Basic configurations 6.7.3.3 Transfer configurations |
17 | 6.8 TOE Environment 6.8.1 Overall view |
18 | 6.8.2 Personalisation application 6.8.2.1 General 6.8.2.2 Functionalities |
19 | 6.8.2.3 Communication 6.8.3 Administration application 6.8.3.1 General 6.8.3.2 Functionalities |
20 | 6.8.3.3 Communication 6.8.4 Authentication application 6.8.4.1 General 6.8.4.2 Functionalities 6.8.4.3 Communication |
21 | 6.8.5 Verifier 6.8.5.1 Functionalities 6.8.5.2 Communication 6.8.6 Key Generator 6.8.6.1 Functionalities 6.8.6.2 Communication |
22 | 6.8.7 Certification Authority 6.8.7.1 Functionalities 6.8.7.2 Communication 6.8.8 Examples of applications 6.8.8.1 General 6.8.8.2 Simple Access Control |
23 | 6.8.8.3 E-government 6.8.8.4 Multiple application TOE |
24 | 6.9 Life Cycle 6.9.1 Overview |
25 | 6.9.2 Pre-Personalisation phase 6.9.3 Personalisation phase 6.9.3.1 General |
26 | 6.9.3.2 Personalisation application 6.9.4 Usage phase 6.9.4.1 Authentication application |
27 | 6.9.4.2 Administration application 6.9.4.3 Verifier |
28 | 7 Security problem definition 7.1 Assets 7.1.1 General 7.1.2 Core group 7.1.2.1 Assets protected by the TOE 7.1.2.2 Sensitive assets of the TOE 7.1.3 KeyGen group |
29 | 7.1.4 Admin group 7.2 Users 7.2.1 Core group |
30 | 7.2.2 KeyImp group 7.2.3 KeyGen group 7.2.4 Admin group 7.3 Threats 7.3.1 General |
31 | 7.3.2 Core group |
32 | 7.3.3 KeyGen group 7.3.4 Admin group 7.4 Organisational security policies 7.4.1 Core group 7.4.1.1 Provided services 7.4.1.2 Other services |
33 | 7.4.2 KeyGen group 7.4.3 Admin group 7.5 Assumptions 7.5.1 Core group |
34 | 7.5.2 KeyGen group 7.5.3 Admin group 8 Security objectives 8.1 General ā Transfer of sensitive data |
35 | 8.2 Security objectives for the TOE 8.2.1 Core group 8.2.1.1 Provided service 8.2.1.2 Authentication to the TOE |
36 | 8.2.1.3 TOE management 8.2.2 KeyImp group 8.2.3 KeyGen group 8.2.4 Admin group |
37 | 8.2.5 Untrusted PersoAppli 8.2.6 Untrusted AuthAppli 8.2.7 Untrusted Verifier 8.2.8 Untrusted CA 8.2.9 Untrusted AdminAppli |
38 | 8.3 Security objectives for the operational environment 8.3.1 Core group 8.3.2 KeyImp group |
39 | 8.3.3 Admin group 8.3.4 Trusted PersoAppli 8.3.5 Trusted AuthAppli 8.3.6 Trusted Verifier 8.3.7 Trusted CA 8.3.8 Trusted AdminAppli |
40 | 8.4 Rationale for Security objectives |
45 | 9 Extended component definition ā Definition of the Family FCS_RNG 10 Security requirements 10.1 General |
46 | 10.2 Introduction 10.2.1 Subjects Objects and security attributes |
47 | 10.2.2 Operations 10.2.2.1 Core group 10.2.2.2 KeyImp group 10.2.2.3 KeyGen group 10.2.2.4 Admin group |
48 | 10.2.2.5 Untrusted PersoAppli 10.2.2.6 Untrusted AuthAppli 10.2.2.7 Untrusted Verifier 10.2.2.8 Untrusted CA 10.2.2.9 Untrusted AdminAppli 10.3 Security functional requirements 10.3.1 General |
49 | 10.3.2 Core group 10.3.2.1 Device authentication by the verifier |
50 | 10.3.2.2 User authentication |
51 | 10.3.2.3 Access control |
56 | 10.3.2.4 Protection of the TSF |
57 | 10.3.3 KeyImp group |
60 | 10.3.4 KeyGen group |
63 | 10.3.5 Admin group |
67 | 10.3.6 Untrusted PersoAppli |
68 | 10.3.7 Untrusted AuthAppli 10.3.8 Untrusted Verifier |
69 | 10.3.9 Untrusted CA |
70 | 10.3.10 Untrusted AdminAppli 10.4 Security assurance requirements |
71 | 10.5 SFR / Security objectives |
76 | 10.6 SFR Dependencies |
78 | 10.7 Rationale for the Assurance Requirements |