• I.S. CWA 14167-3:2004

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    CRYPTOGRAPHIC MODULE FOR CSP KEY GENERATION SERVICES PROTECTION PROFILE CMCKG-PP

    Available format(s):  Hardcopy, PDF

    Superseded date:  07-08-2016

    Language(s):  English

    Published date:  01-01-2004

    Publisher:  National Standards Authority of Ireland

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Revision History
    Table of Contents
    List of Tables
    Conventions and Terminology
    Conventions
    Terminology
    Document Organisation
    1 Introduction
      1.1 Identification
      1.2 Protection Profile Overview
    2 TOE Description
      2.1 TOE Roles
      2.2 TOE Usage
    3 TOE Security Environment
      3.1 Assets to protect
      3.2 Assumptions
      3.3 Threats to Security
      3.4 Organisational Security Policies
    4 Security Objectives
      4.1 Security Objectives for the TOE
      4.2 Security Objectives for the Environment
    5 IT Security Requirements
      5.1 TOE Security Functional Requirements
          5.1.1 Security audit (FAU)
          5.1.2 Cryptographic support (FCS)
          5.1.3 User data protection (FDP)
          5.1.4 Identification and authentication (FIA)
          5.1.5 Security management (FMT)
          5.1.6 Protection of the TOE Security Functions (FPT)
          5.1.7 Trusted path (FTP)
      5.2 TOE Security Assurance Requirements
          5.2.1 Configuration management (ACM)
          5.2.2 Delivery and operation (ADO)
          5.2.3 Development (ADV)
          5.2.4 Guidance documents (AGD)
          5.2.5 Life cycle support (ALC)
          5.2.6 Tests (ATE)
          5.2.7 Vulnerability assessment (AVA)
      5.3 Security Requirements for the IT Environment
          5.3.1 Security audit (FAU)
          5.3.2 Trusted path/channels (FTP)
          5.3.3 Non-IT requirements
    6 Rationale
      6.1 Security Objectives Rationale
          6.1.1 Security Objectives Coverage
          6.1.2 Security Objectives Sufficiency
      6.2 Security Requirements Rationale
          6.2.1 Security Requirement Coverage
          6.2.2 Security Requirements Sufficiency
      6.3 Dependency Rationale
          6.3.1 Functional and Assurance Requirements Dependencies
      6.4 Security Functional Requirements Grounding in Objectives
      6.5 Rationale for Extensions
          6.5.1 Rationale for Extension of Class FCS with Family
                FCS_RND
      6.6 Rationale for Assurance Level 4 Augmented
    Appendix A - References
    Appendix B - Acronyms

    Abstract - (Show below) - (Hide below)

    Covers document management and overview information that is required to carry out protection profile registry.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher National Standards Authority of Ireland
    Status Superseded
    Superseded By
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective