• Shopping Cart
    There are no items in your cart

I.S. CWA 14167-2:2004

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS WITH BACKUP - PROTECTION PROFILE - CMCSOB PP

Available format(s)

Hardcopy , PDF

Superseded date

07-08-2016

Language(s)

English

Published date

01-01-2004

€129.00
Excluding VAT

Foreword
Revision History
Table of Contents
List of Tables
Conventions and Terminology
  Conventions
  Terminology
Document Organisation
1 Introduction
  1.1 Identification
  1.2 Protection Profile Overview
2 TOE Description
  2.1 TOE Roles
  2.2 TOE Usage
3 TOE Security Environment
  3.1 Assets to protect
  3.2 Assumptions
  3.3 Threats to Security
  3.4 Organisational Security Policies
4 Security Objectives
  4.1 Security Objectives for the TOE
  4.2 Security Objectives for the Environment
5 IT Security Requirements
  5.1 TOE Security Functional Requirements
      Basic Package
      5.1.1 Security audit (FAU)
      5.1.2 Cryptographic support (FCS)
      5.1.3 User data protection (FDP)
      5.1.4 Identification and authentication (FIA)
      5.1.5 Security management (FMT)
      5.1.6 Protection of the TOE Security Functions
             Backup Package
      5.1.7 Security audit (FAU)
  5.2 TOE Security Assurance Requirements
      5.2.1 Configuration management (ACM)
      5.2.2 Delivery and operation (ADO)
      5.2.3 Development (ADV)
      5.2.4 Guidance documents (AGD)
      5.2.5 Life cycle support (ALC)
      5.2.6 Tests (ATE)
      5.2.7 Vulnerability assessment (AVA)
  5.3 Security Requirements for the IT Environment
      5.3.1 Security audit (FAU)
      5.3.2 User data protection (FDP)
      5.3.3 Identification and authentication (FIA)
      5.3.4 Protection of the TOE Security Functions (FPT)
      5.3.5 Trusted path (FPT)
6 Rationale
  6.1 Introduction
  6.2 Security Objectives Rationale
      6.2.1 Security Objectives Coverage
      6.2.2 Security Objectives Sufficiency
  6.3 Security Requirements Rationale
      6.3.1 Security Requirements Coverage
      6.3.2 Security Requirements Sufficiency
  6.4 Dependency Rationale
      6.4.1 Functional and Assurance Requirements
             Dependencies
      6.4.2 Justification of Unsupported Dependencies
  6.5 Security Requirements Grounding in Objectives
  6.6 Rationale for Extensions
      6.6.1 Rationale for Extension of Class FCS with Family
             FCS_RND
      6.6.2 Rationale for Extension of Class FDP with Family
             FDP_BKP
  6.7 Rationale for Assurance Level 4 Augmented
References
Appendix A - Acronyms

Gives document management and overview information that is required to carry out protection profile registry.

DocumentType
Standard
Pages
91
PublisherName
National Standards Authority of Ireland
Status
Superseded
SupersededBy
Supersedes

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.