NF EN ISO/IEC 19790

NF EN ISO/IEC 19790

March 2020
Standard Cancelled

Information technology - Security techniques - Security requirements for cryptographic modules

?ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life protecting data, personal identity information, and sensitive information used by government) and a diversity of application environments (e.g. a guarded facility, an office, removable media, and a completely unprotected location). This International Standard specifies four security levels for each of 11 requirement areas with each security level increasing security over the preceding level.ISO/IEC 19790:2012 specifies security requirements specifically intended to maintain the security provided by a cryptographic module and compliance with this International Standard is not sufficient to ensure that a particular module is secure or that the security provided by the module is sufficient and acceptable to the owner of the information that is being protected.

View the extract
Main informations

Collections

National standards and national normative documents

Publication date

March 2020

Number of pages

84 p.

Reference

NF EN ISO/IEC 19790

ICS Codes

35.030   IT Security

Classification index

Z74-209

Print number

1

International kinship

European kinship

EN ISO/IEC 19790:2020
Sumary
Information technology - Security techniques - Security requirements for cryptographic modules

?

ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life protecting data, personal identity information, and sensitive information used by government) and a diversity of application environments (e.g. a guarded facility, an office, removable media, and a completely unprotected location). This International Standard specifies four security levels for each of 11 requirement areas with each security level increasing security over the preceding level.

ISO/IEC 19790:2012 specifies security requirements specifically intended to maintain the security provided by a cryptographic module and compliance with this International Standard is not sufficient to ensure that a particular module is secure or that the security provided by the module is sufficient and acceptable to the owner of the information that is being protected.

Table of contents
  • Avant-propos
  • 1 Domaine d'application
  • 2 Références normatives
  • 3 Termes et définitions
  • 5 Niveaux de sécurité des modules cryptographiques
  • 6 Objectifs de sécurité fonctionnelle
  • 7 Exigences de sécurité
  • Annexe C (normative) Fonctions de sécurité approuvées
  • Annexe D (normative) Méthodes approuvées de génération et d'établissement de paramètres de sécurité sensibles
  • Annexe E (normative) Mécanismes d'authentification approuvés
  • Annexe F (normative) Mesures d'essai d'atténuation des attaques non invasives approuvées
  • Annexe A (normative) Exigences relatives à la documentation
  • Annexe B (normative) Politique de sécurité du module cryptographique
  • Bibliographie
ZOOM ON ... the Requirements department
To comply with a standard, you need to quickly understand its issues in order to determine its impact on your activity.

The Requirements department helps you quickly locate within the normative text:
- mandatory clauses to satisfy,
- non-essential but useful clauses to know, such as permissions and recommendations.

The identification of these types of clauses is based on the document “ISO / IEC Directives, Part 2 - Principles and rules of structure and drafting of ISO documents ”as well as on a constantly enriched list of verbal forms.

With Requirements, quickly access the main part of the normative text!

With Requirements, quickly access the main part of the normative text!
Need to identify, monitor and decipher standards?

COBAZ is the simple and effective solution to meet the normative needs related to your activity, in France and abroad.

Available by subscription, CObaz is THE modular solution to compose according to your needs today and tomorrow. Quickly discover CObaz!

Request your free, no-obligation live demo

I discover COBAZ