Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

I.S. CWA 14167-3:2004

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

CRYPTOGRAPHIC MODULE FOR CSP KEY GENERATION SERVICES PROTECTION PROFILE CMCKG-PP

Available format(s)

Hardcopy , PDF

Superseded date

07-08-2016

Language(s)

English

Published date

01-01-2004

Preview

Foreword
Revision History
Table of Contents
List of Tables
Conventions and Terminology
Conventions
Terminology
Document Organisation
1 Introduction
  1.1 Identification
  1.2 Protection Profile Overview
2 TOE Description
  2.1 TOE Roles
  2.2 TOE Usage
3 TOE Security Environment
  3.1 Assets to protect
  3.2 Assumptions
  3.3 Threats to Security
  3.4 Organisational Security Policies
4 Security Objectives
  4.1 Security Objectives for the TOE
  4.2 Security Objectives for the Environment
5 IT Security Requirements
  5.1 TOE Security Functional Requirements
      5.1.1 Security audit (FAU)
      5.1.2 Cryptographic support (FCS)
      5.1.3 User data protection (FDP)
      5.1.4 Identification and authentication (FIA)
      5.1.5 Security management (FMT)
      5.1.6 Protection of the TOE Security Functions (FPT)
      5.1.7 Trusted path (FTP)
  5.2 TOE Security Assurance Requirements
      5.2.1 Configuration management (ACM)
      5.2.2 Delivery and operation (ADO)
      5.2.3 Development (ADV)
      5.2.4 Guidance documents (AGD)
      5.2.5 Life cycle support (ALC)
      5.2.6 Tests (ATE)
      5.2.7 Vulnerability assessment (AVA)
  5.3 Security Requirements for the IT Environment
      5.3.1 Security audit (FAU)
      5.3.2 Trusted path/channels (FTP)
      5.3.3 Non-IT requirements
6 Rationale
  6.1 Security Objectives Rationale
      6.1.1 Security Objectives Coverage
      6.1.2 Security Objectives Sufficiency
  6.2 Security Requirements Rationale
      6.2.1 Security Requirement Coverage
      6.2.2 Security Requirements Sufficiency
  6.3 Dependency Rationale
      6.3.1 Functional and Assurance Requirements Dependencies
  6.4 Security Functional Requirements Grounding in Objectives
  6.5 Rationale for Extensions
      6.5.1 Rationale for Extension of Class FCS with Family
            FCS_RND
  6.6 Rationale for Assurance Level 4 Augmented
Appendix A - References
Appendix B - Acronyms

Covers document management and overview information that is required to carry out protection profile registry.

DocumentType
Standard
Pages
71
PublisherName
National Standards Authority of Ireland
Status
Superseded
SupersededBy

View more information
$192.01
Including GST where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more