• I.S. CWA 14167-2:2004

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS WITH BACKUP - PROTECTION PROFILE - CMCSOB PP

    Available format(s):  Hardcopy, PDF

    Superseded date:  07-08-2016

    Language(s):  English

    Published date:  01-01-2004

    Publisher:  National Standards Authority of Ireland

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Revision History
    Table of Contents
    List of Tables
    Conventions and Terminology
      Conventions
      Terminology
    Document Organisation
    1 Introduction
      1.1 Identification
      1.2 Protection Profile Overview
    2 TOE Description
      2.1 TOE Roles
      2.2 TOE Usage
    3 TOE Security Environment
      3.1 Assets to protect
      3.2 Assumptions
      3.3 Threats to Security
      3.4 Organisational Security Policies
    4 Security Objectives
      4.1 Security Objectives for the TOE
      4.2 Security Objectives for the Environment
    5 IT Security Requirements
      5.1 TOE Security Functional Requirements
          Basic Package
          5.1.1 Security audit (FAU)
          5.1.2 Cryptographic support (FCS)
          5.1.3 User data protection (FDP)
          5.1.4 Identification and authentication (FIA)
          5.1.5 Security management (FMT)
          5.1.6 Protection of the TOE Security Functions
                 Backup Package
          5.1.7 Security audit (FAU)
      5.2 TOE Security Assurance Requirements
          5.2.1 Configuration management (ACM)
          5.2.2 Delivery and operation (ADO)
          5.2.3 Development (ADV)
          5.2.4 Guidance documents (AGD)
          5.2.5 Life cycle support (ALC)
          5.2.6 Tests (ATE)
          5.2.7 Vulnerability assessment (AVA)
      5.3 Security Requirements for the IT Environment
          5.3.1 Security audit (FAU)
          5.3.2 User data protection (FDP)
          5.3.3 Identification and authentication (FIA)
          5.3.4 Protection of the TOE Security Functions (FPT)
          5.3.5 Trusted path (FPT)
    6 Rationale
      6.1 Introduction
      6.2 Security Objectives Rationale
          6.2.1 Security Objectives Coverage
          6.2.2 Security Objectives Sufficiency
      6.3 Security Requirements Rationale
          6.3.1 Security Requirements Coverage
          6.3.2 Security Requirements Sufficiency
      6.4 Dependency Rationale
          6.4.1 Functional and Assurance Requirements
                 Dependencies
          6.4.2 Justification of Unsupported Dependencies
      6.5 Security Requirements Grounding in Objectives
      6.6 Rationale for Extensions
          6.6.1 Rationale for Extension of Class FCS with Family
                 FCS_RND
          6.6.2 Rationale for Extension of Class FDP with Family
                 FDP_BKP
      6.7 Rationale for Assurance Level 4 Augmented
    References
    Appendix A - Acronyms

    Abstract - (Show below) - (Hide below)

    Gives document management and overview information that is required to carry out protection profile registry.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher National Standards Authority of Ireland
    Status Superseded
    Superseded By
    Supersedes
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective