BS ISO 13491-1:2016 – TC:2020 Edition
$217.84
Tracked Changes. Financial services. Secure cryptographic devices (retail) – Concepts, requirements and evaluation methods
Published By | Publication Date | Number of Pages |
BSI | 2020 | 102 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | compares BS ISO 13491-1:2016 |
2 | TRACKED CHANGES Text example 1 — indicates added text (in green) |
65 | Foreword |
66 | Introduction |
67 | 1 Scope 2 Normative references 3 Terms and definitions |
71 | 4 Abbreviated terms 5 Secure cryptographic device concepts 5.1 General |
72 | 5.2 Attack scenarios 5.2.1 General 5.2.2 Penetration 5.2.3 Monitoring 5.2.4 Manipulation 5.2.5 Modification 5.2.6 Substitution |
73 | 5.3 Defence measures 5.3.1 General 5.3.2 Device characteristics |
74 | 5.3.3 Device management 5.3.4 Environment 6 Requirements for device security characteristics 6.1 General |
75 | 6.2 Physical security requirements for SCDs 6.2.1 General 6.3 Tamper evident requirements 6.3.1 General |
76 | 6.4 Tamper resistant requirements 6.4.1 General 6.5 Tamper responsive requirements 6.5.1 General |
77 | 6.6 Logical security requirements for SCDs 6.6.1 Dual control 6.6.2 Unique key per device 6.6.3 Assurance of genuine device 6.6.4 Design of functions |
78 | 6.6.5 Use of cryptographic keys 6.6.6 Sensitive device states 6.6.7 Multiple cryptographic relationships 6.6.8 SCD software authentication 7 Requirements for device management 7.1 General |
79 | 7.2 Life cycle phases |
80 | 7.3 Life cycle protection requirements 7.3.1 General 7.3.2 Manufacturing phase |
81 | 7.3.3 Post-manufacturing phase 7.3.4 Commissioning (initial financial key loading) phase 7.3.5 Inactive operational phase |
82 | 7.3.6 Active operational phase (use) 7.3.7 Decommissioning (post-use) phase 7.3.8 Repair phase |
83 | 7.3.9 Destruction phase 7.4 Life cycle protection methods 7.4.1 Manufacturing 7.4.2 Post manufacturing phase 7.4.3 Commissioning (initial financial key loading) phase |
84 | 7.4.4 Inactive Operational Phase 7.4.5 Active operational (use) phase 7.4.6 Decommissioning phase |
85 | 7.4.7 Repair 7.4.8 Destruction 7.5 Accountability |
86 | 7.6 Device management principles of audit and control |
89 | Annex A (informative) Evaluation methods |
99 | Bibliography |