ISO/IEC 11889-1:2015
Current
The latest, up-to-date edition.
Information technology — Trusted platform module library — Part 1: Architecture
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
15-12-2015
ISO/IEC 11889-1:2015 defines the architectural elements of the Trusted Platform Module (TPM), a device which enables trust in computing platforms in general. Some TPM concepts are explained adequately in the context of the TPM itself. Other TPM concepts are explained in the context of how a TPM helps establish trust in a computing platform. When describing how a TPM helps establish trust in a computing platform, ISO/IEC 11889-1:2015 provides some guidance for platform requirements. However, the scope of ISO/IEC 11889 is limited to TPM requirements.
ISO/IEC 11889-1:2015 illustrates TPM security and privacy techniques in the context of a platform through the use of cryptography. It includes definitions of how different cryptographic techniques are implemented by a TPM. The scope of ISO/IEC 11889 does not include cryptographic analysis or guidance about the applicability of different algorithms for specific uses cases.
TPM requirements in ISO/IEC 11889-1:2015 are general, covering concepts like integrity protection, isolation and confidentially. Defining a specific strength of function or assurance level is out of scope for ISO/IEC 11889. This approach limits the guarantees provided by ISO/IEC 11889 itself, but it does allow the TPM architectural elements defined to be adapted to meet diverse implementation and platform specific needs.
Committee |
ISO/IEC JTC 1
|
DocumentType |
Standard
|
Pages |
257
|
ProductNote |
THIS STANDARD ALSO HAVE CORRECT VERSION FOR EN : 2016 THIS STANDARD ALSO REFERS-IETF RFC 4034, IETF RFC 3447,NIST SP800-56A,NIST SP800-57 Part 1,NIST SP800-90 A,NIST SP800-108,GM/T 0002-2012,GM/T 0003.1-2012,GM/T 0003.2-2012,GM/T 0003.3,GM/T 0003.4-2012,GM/T 0003.5-2012,GM/T 0004-2012.
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Supersedes |
Standards | Relationship |
NEN-ISO/IEC 11889-1:2015 | Identical |
BS ISO/IEC 11889-1:2009 | Identical |
CAN/CSA-ISO/IEC 11889-1:16 | Identical |
INCITS/ISO/IEC 11889-1:2015(2019) | Identical |
NEN ISO/IEC 11889-1 : 2015 + COR 2016 | Identical |
BS ISO/IEC 11889-1:2015 | Identical |
INCITS/ISO/IEC 11889-1 : 2009(R2014) | Identical |
GS NFV-SEC 001 : 1.1.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; PROBLEM STATEMENT |
CAN/CSA-ISO/IEC 11889-3:16 | Information technology Trusted Platform Module Library Part 3: Commands (Adopted ISO/IEC 11889-3:2015, second edition, 2015-12-15) |
TR 103 304 : 1.1.1 | CYBER; PERSONALLY IDENTIFIABLE INFORMATION (PII) PROTECTION IN MOBILE AND CLOUD SERVICES |
ISO/IEC 11889-2:2015 | Information technology — Trusted Platform Module Library — Part 2: Structures |
14/30302807 DC : 0 | BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES |
CAN/CSA-ISO/IEC 11889-4:16 | Information technology Trusted Platform Module Library Part 4: Supporting Routines (Adopted ISO/IEC 11889-4:2015, second edition, 2015-12-15) |
BS ISO/IEC 11889-4:2009 | Information technology. Trusted platform module Commands |
ISO/IEC TS 17961:2013 | Information technology — Programming languages, their environments and system software interfaces — C secure coding rules |
PD ISO/IEC TS 17961:2013 | Information technology. Programming languages, their environments and system software interfaces. C secure coding rules |
BS ISO/IEC 11889-2:2009 | Information technology. Trusted platform module Design principles |
14/30302804 DC : 0 | BS ISO/IEC 11889-3 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 3: COMMANDS |
14/30302801 DC : 0 | BS ISO/IEC 11889-2 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 2: STRUCTURES |
ISO/IEC 11889-4:2015 | Information technology Trusted Platform Module Library Part 4: Supporting Routines |
BS ISO/IEC 11889-3:2015 | Information technology. Trusted Platform Module Library Commands |
CAN/CSA-ISO/IEC 11889-2:16 | Information technology Trusted Platform Module Library Part 2: Structures (Adopted ISO/IEC 11889-2:2015, second edition, 2015-12-15) |
ISO/IEC 11889-3:2015 | Information technology — Trusted Platform Module Library — Part 3: Commands |
CAN/CSA-ISO/IEC TS 17961:18 | Information technology — Programming languages, their environments and system software interfaces — C secure coding rules (Adopted ISO/IEC TS 17961:2013, first edition, 2013-11-15, including adopted technical corrigendum 1:2016) |
FIPS PUB 140 : 0001 | SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 11889-2:2015 | Information technology — Trusted Platform Module Library — Part 2: Structures |
ISO/IEC 11889-3:2015 | Information technology — Trusted Platform Module Library — Part 3: Commands |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 15946-5:2017 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
IEEE 1363.3-2013 | IEEE Standard for Identity-Based Cryptographic Techniques using Pairings |
ISO/IEC 11889-4:2015 | Information technology Trusted Platform Module Library Part 4: Supporting Routines |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.