BS EN 419231:2019
$198.66
Protection profile for trustworthy systems supporting time stamping
Published By | Publication Date | Number of Pages |
BSI | 2019 | 66 |
This document specifies a protection profile for trustworthy systems supporting time stamping.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
7 | 1 Scope 2 Normative references 3 Terms, definitions and abbreviations 3.1 Terms and definitions |
13 | 3.2 Abbreviations |
14 | 4 Introduction 4.1 PP reference 4.2 TOE overview 4.2.1 TOE type 4.2.2 TOE usage and major security features |
18 | 4.2.3 TOE Environment general overview |
19 | 4.2.4 Required non-TOE hardware/software/firmware |
20 | 5 Conformance claims 5.1 CC conformance claim 5.2 PP claim 5.3 Conformance rationale 5.4 Conformance statement |
21 | 6 Security problem definition 6.1 TOE assets |
23 | 6.2 Threats 6.2.1 General |
25 | 6.2.2 Relation between threats and assets |
26 | 6.3 Organizational security policies |
27 | 6.4 Assumptions |
29 | 7 Security objectives 7.1 General 7.2 Security objectives for the TOE |
31 | 7.3 Security objectives for the operational environment |
33 | 7.4 Security objectives rationale |
39 | 8 Security functional requirements 8.1 General 8.2 Subjects, objects, operations and security attributes 8.2.1 Subjects |
40 | 8.2.2 Objects 8.2.3 Operations 8.2.4 Security attributes 8.2.4.1 General 8.2.4.2 OB.CONTEXT |
41 | 8.2.4.3 OB.TIMESTAMP_TOKEN 8.2.4.4 OB.TIMESTAMP_REQUEST 8.2.4.5 OB.PUB_KEY |
42 | 8.2.4.6 OB.PRIV_KEY 8.2.4.7 OB. DATE_AND_TIME 8.3 Security requirements operations 8.4 User Data Protection (FDP) |
49 | 8.5 Security Management (FMT) |
52 | 8.6 Protection of the TSF (FPT) 8.7 Trusted Path/Channels (FTP) |
53 | 8.8 Cryptographic Support (FCS) |
54 | 8.9 Identification and Authentication (FIA) 8.10 Security Audit (FAU) |
56 | 9 Security assurance requirements |
57 | 10 Security requirements rationale 10.1 Security functional requirements rationale 10.1.1 SFR dependencies rationale |
59 | 10.1.2 SFR vs TOE security objectives rationale |
63 | 10.2 Security assurance requirements rationale 10.2.1 General 10.2.2 Assurance level table |
64 | 10.2.3 EAL rationale |