BS PD ISO IEC TS 30104-2015 Information Technology Security Techniques Physical Security Attacks Mitigation Techniques and Security Requirements《信息技术 安全技术 物理安全攻击 缓解技术和安全要求》.pdf
《BS PD ISO IEC TS 30104-2015 Information Technology Security Techniques Physical Security Attacks Mitigation Techniques and Security Requirements《信息技术 安全技术 物理安全攻击 缓解技术和安全要求》.pdf》由会员分享,可在线阅读,更多相关《BS PD ISO IEC TS 30104-2015 Information Technology Security Techniques Physical Security Attacks Mitigation Techniques and Security Requirements《信息技术 安全技术 物理安全攻击 缓解技术和安全要求》.pdf(42页珍藏版)》请在麦多课文档分享上搜索。
1、BSI Standards Publication PD ISO/IEC TS 30104:2015 Information Technology Security Techniques Physical Security Attacks, Mitigation Techniques and Security RequirementsPD ISO/IEC TS 30104:2015 PUBLISHED DOCUMENT National foreword This Published Document is the UK implementation of ISO/IEC TS 30104:2
2、015. The UK participation in its preparation was entrusted to Technical Committee IST/33, Security techniques. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. U
3、sers are responsible for its correct application. The British Standards Institution 2015. Published by BSI Standards Limited 2015 ISBN 978 0 580 88642 3 ICS 35.040 Compliance with a British Standard cannot confer immunity from legal obligations. This Published Document was published under the author
4、ity of the Standards Policy and Strategy Committee on 31 May 2015. Amendments issued since publication Date Text affectedPD ISO/IEC TS 30104:2015 Information Technology Security Techniques Physical Security Attacks, Mitigation Techniques and Security Requirements Technologies de linformation Techniq
5、ues de scurit Attaques de scurit physique, techniques dattnuation et exigences de scurit ISO/IEC TS 30104 First edition 2015-05-15 Reference number ISO/IEC TS 30104:2015(E) TECHNICAL SPECIFICATION ISO/IEC 2015 PD ISO/IEC TS 30104:2015ii ISO/IEC 2015 All rights reserved COPYRIGHT PROTECTED DOCUMENT I
6、SO/IEC 2015, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written p
7、ermission. Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Ch. de Blandonnet 8 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/IEC TS 301
8、04:2015(E)PD ISO/IEC TS 30104:2015ISO/IEC TS 30104:2015(E)Foreword v Introduction vi 1 Scope . 1 2 Normative references 1 3 T erms and definitions . 1 4 Symbols and abbreviated terms . 5 5 Physical security . 5 6 Physical security invasive mechanisms 6 6.1 Overview 6 6.2 Tamper proof 7 6.3 Tamper re
9、sistant . 7 6.4 Tamper detection 7 6.5 Tamper evident . 7 6.6 Additional physical security considerations . 8 6.6.1 Summary . 8 6.6.2 Size and weight . 8 6.6.3 Mixed and Layered Systems . 8 7 Physical security invasive attacks and defences . 8 7.1 Overview 8 7.2 Attacks 9 7.2.1 Attack mechanisms 9 7
10、.2.2 Machining methods . 9 7.2.3 Shaped charge technology 11 7.2.4 Energy attacks .11 7.2.5 Environmental conditions 12 7.3 Defences .12 7.3.1 Overview 12 7.3.2 Tamper resistant .13 7.3.3 Tamper evident 14 7.3.4 Tamper detection sensor technology 15 7.3.5 Tamper responding 18 8 Physical security non
11、-invasive mechanisms 20 8.1 Overview .20 8.2 Mixed and Layered Systems 20 9 Physical security non-invasive attacks and defences 20 9.1 Overview .20 9.2 Attacks .20 9.2.1 Overview 20 9.2.2 External Probe attacks .20 9.2.3 External EME attacks 21 9.2.4 Timing analysis 21 9.3 Defences .21 10 Operating
12、Envelope Concept .22 11 Development, delivery and operation considerations .22 11.1 Introduction .22 11.2 Development 22 11.2.1 Functional test and debug.22 11.2.2 Security testing .22 11.2.3 Environmental testing . .23 11.2.4 Factory installed keys or security parameters 23 ISO/IEC 2015 All rights
13、reserved iii Contents PagePD ISO/IEC TS 30104:2015ISO/IEC TS 30104:2015(E)11.3 Delivery 23 11.3.1 Documentation .23 11.3.2 Packaging.24 11.3.3 Delivery verification.24 11.4 Operation 24 11.4.1 Overview 24 11.4.2 Implementation feedback .24 11.4.3 Feedback during attack .24 12 Physical security evalu
14、ation and testing 24 12.1 Overview .24 12.2 Standards 25 12.2.1 FIPS PUB 140-2, Security Requirements for Cryptographic Modules 25 12.2.2 Derived Test Requirements for FIPS PUB 140-2, Security Requirements for Cryptographic Modules .25 12.2.3 ISO/IEC 19790:2012, Information technology Security techn
15、iques Security requirements for cryptographic modules 25 12.2.4 ISO/IEC 24759:2014 Information technology Security techniques Test requirements for cryptographic modules .26 12.2.5 ISO/IEC 15408-1:2009, Information technology Security techniques Evaluation criteria for IT security Part 1: Introducti
16、on and general model 26 12.2.6 ISO/IEC 15408-2:2008, Information technology Security techniques Evaluation criteria for IT security Part 2: Security functional components .26 12.2.7 ISO/IEC 15408-3:2008, Information technology Security techniques Evaluation criteria for IT security Part 3: Security
17、assurance components .27 12.2.8 ISO/IEC 18045:2008, Information technology Security techniques Methodology for IT security evaluation .27 12.3 Programs and schemes .27 12.3.1 NIST and CSE Cryptographic Module Validation Program .27 12.3.2 Japan Cryptographic Module Validation Program .27 12.3.3 Kore
18、a Cryptographic Module Validation Program.27 12.3.4 Common Criteria .28 Annex A (informative) Example of a physical security design 29 Bibliography .30 iv ISO/IEC 2015 All rights reservedPD ISO/IEC TS 30104:2015ISO/IEC TS 30104:2015(E) Foreword ISO (the International Organization for Standardization
19、) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to dea
20、l with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IE
21、C have established a joint technical committee, ISO/IEC JTC 1. The procedures used to develop this document and those intended for its further maintenance are described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of document should
22、be noted. This document was drafted in accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives). Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible f
23、or identifying any or all such patent rights. Details of any patent rights identified during the development of the document will be in the Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents). Any trade name used in this document is information given for the
24、 convenience of users and does not constitute an endorsement. For an explanation on the meaning of ISO specific terms and expressions related to conformity assessment, as well as information about ISOs adherence to the WTO principles in the Technical Barriers to Trade (TBT), see the following URL: F
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSPDISOIECTS301042015INFORMATIONTECHNOLOGYSECURITYTECHNIQUESPHYSICALSECURITYATTACKSMITIGATIONTECHNIQUESANDSECURITYREQUIREMENTS

链接地址:http://www.mydoc123.com/p-398722.html