EN 419251-1:2013
Current
The latest, up-to-date edition.
Security requirements for device for authentication - Part 1: Protection profile for core functionality
06-03-2013
Foreword
1 Scope
2 Normative references
3 Conformance
4 Terms and definitions
5 Symbols and abbreviations
6 Overview of the target of evaluation
7 TOE Environment
8 Life Cycle
9 Security problem definition
10 Security objectives
11 Extended component definition
12 Security requirements
Bibliography
Index
This European Standard is a Protection Profile that defines the security requirements for an authentication device.
Committee |
CEN/TC 224
|
DocumentType |
Standard
|
PublisherName |
Comite Europeen de Normalisation
|
Status |
Current
|
Standards | Relationship |
PN EN 419251-1 : 2013 | Identical |
NS EN 419251-1 : 2013 | Identical |
NF EN 419251-1 : 2013 | Identical |
UNI EN 419251-1 : 2013 | Identical |
BS EN 419251-1:2013 | Identical |
NEN EN 419251-1 : 2013 | Identical |
SN EN 419251-1:2013 | Identical |
UNE-EN 419251-1:2013 | Identical |
DIN EN 419251-1:2013-05 | Identical |
NBN EN 419251-1 : 2013 | Identical |
I.S. EN 419251-1:2013 | Identical |
PNE-FprEN 419251-1 | Identical |
DIN EN 419251-3:2013-06 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
BS EN 419251-2:2013 | Security requirements for device for authentication Protection profile for extension for trusted channel to certificate generation application |
PREN 419241-1 : DRAFT 2017 | TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS |
DIN EN 419251-2:2013-06 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
BS EN 419251-3:2013 | Security requirements for device for authentication Additional functionality for security targets |
I.S. EN 419251-2:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
S.R. CEN/TS 419241:2014 | SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING |
CEN/TS 419241:2014 | Security Requirements for Trustworthy Systems Supporting Server Signing |
UNI CEN/TS 419241 : 2014 | SECURITY REQUIREMENTS FOR TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING |
UNI EN 419251-3 : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
PD CEN/TS 419241:2014 | Security Requirements for Trustworthy Systems Supporting Server Signing |
I.S. EN 419251-3:2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
17/30348282 DC : 0 | BS EN 419241-1 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS |
EN 419251-2:2013 | Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application |
EN 419251-3:2013 | Security requirements for device for authentication - Part 3: Additional functionality for security targets |
UNI EN 419251-2 : 2013 | SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
EN 419251-2:2013 | Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application |
EN 419251-3:2013 | Security requirements for device for authentication - Part 3: Additional functionality for security targets |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
PREN 14169-3 : DRAFT 2010 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 3: DEVICE WITH KEY IMPORT |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
PREN 14169-5 : DRAFT 2010 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 5: DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION |
PREN 14169-2 : DRAFT 2010 | PROTECTION PROFILE FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
PREN 14169-6 : DRAFT 2010 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: DEVICE WITH KEY IMPORT AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION |
ISO/IEC 10181-2:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
PREN 14169-4 : DRAFT 2010 | PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 4: EXTENSION FOR DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH CERTIFICATE GENERATION APPLICATION |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
ISO/IEC 18045:2008 | Information technology — Security techniques — Methodology for IT security evaluation |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.