ISO/IEC TS 20540:2018
(Main)Information technology — Security techniques — Testing cryptographic modules in their operational environment
Information technology — Security techniques — Testing cryptographic modules in their operational environment
This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization's security system. The cryptographic modules have four security levels which ISO/IEC 19790 defines to provide for a wide spectrum of data sensitivity (e.g. low-value administrative data, million-dollar funds transfers, life-protecting data, personal identity information, and sensitive information used by government) and a diversity of application environments (e.g. a guarded facility, an office, removable media, and a completely unprotected location). This document includes: a) recommendations to perform secure assessing for cryptographic module installation, configuration and operation; b) recommendations to inspecting the key management system, protection of authentication credentials, and public and critical security parameters in the operational environment; c) recommendations for identifying cryptographic module vulnerabilities; d) checklists for the cryptographic algorithm policy, security guidance and regulation, security manage requirements, security level for each of the 11 requirement areas, the strength of the security function, etc.; and e) recommendations to determine that the cryptographic module's deployment satisfies the security requirements of the organization. This document assumes that the cryptographic module has been validated as conformant with ISO/IEC 19790. It can be used by an operational tester along with other recommendations if needed. This document is limited to the security related to the cryptographic module. It does not include assessing the security of the operational or application environment. It does not define techniques for the identification, assessment and acceptance of the organization's operational risk. The organization's accreditation, deployment and operation processes, shown in Figure 1, is not included to the scope of this document. This document addresses operational testers who perform the operational testing for the cryptographic modules in their operational environment authorizing officials of cryptographic modules.
Technologies de l'information — Techniques de sécurité — Test de modules cryptographiques dans leur environnement d'exploitation
General Information
Relations
Standards Content (Sample)
TECHNICAL ISO/IEC TS
SPECIFICATION 20540
First edition
2018-05
Information technology — Security
techniques — Testing cryptographic
modules in their operational
environment
Technologies de l'information — Techniques de sécurité — Test de
modules cryptographiques dans leur environnement d'exploitation
Reference number
©
ISO/IEC 2018
© ISO/IEC 2018
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2018 – All rights reserved
Contents Page
Foreword .v
Introduction .vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 2
4 Abbreviated terms . 5
5 Document organization . 5
6 Context of operational testing . 6
7 Cryptographic modules . 7
7.1 General . 7
7.2 Types of cryptographic modules . 7
7.2.1 General. 7
7.2.2 Software module . 8
7.2.3 Firmware module . 8
7.2.4 Hardware module . 8
7.2.5 Hybrid software module . 8
7.2.6 Hybrid firmware module . 8
7.3 Cryptographic module application environments . 8
7.4 Security products with cryptographic modules . 9
7.5 Security requirements for cryptographic modules .10
7.5.1 General.10
7.5.2 Security Level 1 .10
7.5.3 Security Level 2 .11
7.5.4 Security Level 3 .11
7.5.5 Security Level 4 .12
7.6 Life-cycle assurance of cryptographic modules .12
7.7 Cryptographic module security policy .12
7.7.1 General.12
7.7.2 Cryptographic module specification .13
7.7.3 Cryptographic module interfaces .13
7.7.4 Roles, services, and authentication .13
7.7.5 Software/firmware security .13
7.7.6 Operational environment .14
7.7.7 Physical security .14
7.7.8 Non-invasive security .14
7.7.9 Sensitive security parameters management.14
7.7.10 Self-tests .14
7.7.11 Life-cycle assurance .15
7.7.12 Mitigation of other attacks .15
7.8 Intended purpose of validated cryptographic modules .15
8 The application environment .16
8.1 Organizational security .16
8.2 Architecture of the application environment .16
9 The operational environment .17
9.1 Security requirements related to cryptographic modules for their operational
environment .17
9.1.1 General.17
9.1.2 Entropy sources .17
9.1.3 Audit mechanism .17
9.1.4 Physically unclonable function .17
9.2 Security assumptions for the operational environment .17
© ISO/IEC 2018 – All rights reserved iii
9.2.1 General.17
9.2.2 Security Level 1 .18
9.2.3 Security Level 2 .18
9.2.4 Security Level 3 .19
9.2.5 Security Level 4 .20
10 How to select cryptographic modules .21
10.1 General .21
10.2 Use policy .21
10.3 Cryptographic module assurance .23
10.4 Interoperability .23
10.5 Selection of security rating for SSP protection .23
11 Principles for operational testing .23
11.1 General .23
11.2 Assumptions .24
11.3 Operational testing activities .24
11.4 Competence for operational testers .25
11.5 Use of validated evidence .25
11.6 Documentation .25
11.7 Operational testing procedure .26
12 Recommendations for operational testing .26
12.1 General .26
12.2 Recommendations for assessing the installation, configuration, and operation of
the cryptographic module .26
12.2.1 General.
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.