Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012, including corrected version 2015-12)

ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems.  This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life protecting data, personal identity information, and sensitive information used by government) and a diversity of application environments (e.g. a guarded facility, an office, removable media, and a completely unprotected location).  This International Standard specifies four security levels for each of 11 requirement areas with each security level increasing security over the preceding level.
ISO/IEC 19790:2012 specifies security requirements specifically intended to maintain the security provided by a cryptographic module and compliance with this International Standard is not sufficient to ensure that a particular module is secure or that the security provided by the module is sufficient and acceptable to the owner of the information that is being protected.

Informationstechnik - Sicherheitstechniken - Sicherheitsanforderungen für kryptografische Module (ISO/IEC 19790:2012, einschließlich korrigierte Fassung 2015-12)

Diese Internationale Norm legt die Sicherheitsanforderungen für ein Krypto-Modul fest, das in einem Sicherheitssystem zum Schutz sensibler Informationen in Computer- und Telekommunikationssystemen genutzt wird. Diese Internationale Norm definiert vier Sicherheitsstufen für Krypto-Module, um ein breites Spektrum an Datensensibilität (z. B. Verwaltungsdaten von geringem Wert, Geldtransfers in Millionenhöhe, Lebensschutzdaten, Identitätsdaten von Personen und sensible Informationen, die von Regierungen verwendet werden) und eine Vielzahl von Anwendungsumgebungen (z. B. eine bewachte Einrichtung, ein Büro, Wechselmedien und ein völlig ungeschützter Standort) abzudecken. Diese Internationale Norm legt vier Sicherheitsstufen für jeden der elf Anforderungsbereiche fest, wobei jede Sicherheitsstufe eine höhere Sicherheit als die vorhergehende bietet.
Diese Internationale Norm legt Sicherheitsanforderungen fest, um die Sicherheit eines Krypto-Moduls aufrechtzuerhalten. Die Einhaltung dieser Internationalen Norm reicht nicht aus, um sicherzustellen, dass ein bestimmtes Modul sicher ist oder dass die vom Modul gebotene Sicherheit für den Eigentümer der zu schützenden Informationen ausreichend und annehmbar ist.

Technologies de l'information - Techniques de sécurité - Exigences de sécurité pour les modules cryptographiques (ISO/IEC 19790:2012, y compris version corrigée 2015-11)

La présente Norme internationale spécifie les exigences de sécurité pour un module cryptographique utilisé dans un système de sécurité qui protège les informations sensibles contenues dans les systèmes informatiques et de télécommunications. La présente Norme internationale définit quatre niveaux de sécurité pour les modules cryptographiques afin de couvrir un large éventail de sensibilités des données (par exemple: données administratives de faible valeur, virements bancaires de plusieurs millions de dollars, données qui protègent la vie, informations d'identité personnelles et informations sensibles utilisées par le gouvernement) et une variété d'environnements d'application (par exemple: des installations gardées, un bureau, des supports amovibles, et un emplacement totalement non protégé). La présente Norme internationale spécifie quatre niveaux de sécurité pour chacun des 11 domaines d'exigences, chaque niveau de sécurité offrant une augmentation de la sécurité par rapport au niveau précédent.
La présente Norme internationale spécifie les exigences de sécurité destinées à maintenir à jour la sécurité assurée par un module cryptographique. La conformité à la présente Norme internationale n'est pas suffisante pour garantir qu'un module donné est sûr ou que la sécurité offerte par le module est suffisante et acceptable pour le propriétaire des informations qui sont protégées.

Informacijska tehnologija - Varnostne tehnike - Varnostne zahteve za kriptografske module (ISO/IEC 19790:2012, vključno s popravljeno različico 2015-12)

General Information

Status
Published
Publication Date
17-Mar-2020
Withdrawal Date
29-Sep-2020
Current Stage
6060 - Definitive text made available (DAV) - Publishing
Start Date
18-Mar-2020
Due Date
31-Oct-2021
Completion Date
18-Mar-2020

Buy Standard

Standard
EN ISO/IEC 19790:2020 - BARVE
English language
83 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day
Standard
EN ISO/IEC 19790:2020 - Tekst v barvah
English language
83 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)


SLOVENSKI STANDARD
01-maj-2020
Informacijska tehnologija - Varnostne tehnike - Varnostne zahteve za kriptografske
module (ISO/IEC 19790:2012, vključno s popravljeno različico 2015-12)
Information technology - Security techniques - Security requirements for cryptographic
modules (ISO/IEC 19790:2012, including corrected version 2015-12)
Informationstechnik - Sicherheitstechniken - Sicherheitsanforderungen für
kryptografische Module (ISO/IEC 19790:2012, einschließlich korrigierte Fassung 2015-
12)
Technologies de l'information - Techniques de sécurité - Exigences de sécurité pour les
modules cryptographiques (ISO/IEC 19790:2012, y compris version corrigée 2015-12)
Ta slovenski standard je istoveten z: EN ISO/IEC 19790:2020
ICS:
35.030 Informacijska varnost IT Security
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN STANDARD EN ISO/IEC 19790

NORME EUROPÉENNE
EUROPÄISCHE NORM
March 2020
ICS 35.030
English version
Information technology - Security techniques - Security
requirements for cryptographic modules (ISO/IEC
19790:2012, including corrected version 2015-12)
Technologies de l'information - Techniques de sécurité Informationstechnik - Sicherheitstechniken -
- Exigences de sécurité pour les modules Sicherheitsanforderungen für kryptografische Module
cryptographiques (ISO/IEC 19790:2012, y compris (ISO/IEC 19790:2012, einschließlich korrigierte
version corrigée 2015-11) Fassung 2015-12)
This European Standard was approved by CEN on 2 March 2020.

This European Standard was corrected and reissued by the CEN-CENELEC Management Centre on 09 December 2020.

CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for
giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical
references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to
any CEN and CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC
Management Centre has the same status as the official versions.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,
Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,
Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.

CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels
© 2020 CEN/CENELEC All rights of exploitation in any form and by any means Ref. No. EN ISO/IEC 19790:2020 E
reserved worldwide for CEN national Members and for
CENELEC Members.
Contents Page
European foreword . 3

European foreword
The text of ISO/IEC 19790:2012, including corrected version 2015-12 has been prepared by Technical
Committee ISO/IEC JTC 1 "Information technology” of the International Organization for
Standardization (ISO) and has been taken over as EN ISO/IEC 19790:2020 by Technical Committee
CEN/CLC/JTC 13 “Cybersecurity and Data Protection” the secretariat of which is held by DIN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by September 2020, and conflicting national standards
shall be withdrawn at the latest by September 2020.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN shall not be held responsible for identifying any or all such patent rights.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,
Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of
North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the
United Kingdom.
Endorsement notice
The text of ISO/IEC 19790:2012, including corrected version 2015-12 has been approved by CEN as
INTERNATIONAL ISO/IEC
STANDARD 19790
Second edition
2012-08-15
Corrected version
2015-12-15
Information technology — Security
techniques — Security requirements
for cryptographic modules
Technologies de l’information — Techniques de sécurité — Exigences
de sécurité pour les modules cryptographiques
Reference number
ISO/IEC 19790:2012(E)
©
ISO/IEC 2012
ISO/IEC 19790:2012(E)
© ISO/IEC 2012, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO/IEC 2012 – All rights reserved

ISO/IEC 19790:2012(E)
Contents Page
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms .15
5 Cryptographic module security levels .15
5.1 Security Level 1 .15
5.2 Security Level 2 .16
5.3 Security Level 3 .16
5.4 Security Level 4 .17
6 Functional security objectives .17
7 Security requirements .18
7.1 General .18
7.2 Cryptographic module specification .20
7.2.1 Cryptographic module specification general requirements .20
7.2.2 Types of cryptographic modules .20
7.2.3 Cryptographic boundary .21
7.2.4 Modes of operations .22
7.3 Cryptographic module interfaces .23
7.3.1 Cryptographic module interfaces general requirements .23
7.3.2 Types of interfaces .24
7.3.3 Definition of interfaces .24
7.3.4 Trusted channel .25
7.4 Roles, services, and authentication .25
7.4.1 Roles, services, and authentication general requirements .25
7.4.2 Roles .26
7.4.3 Services .26
7.4.4 Authentication .28
7.5 Software/Firmware security .29
7.6 Operational environment .31
7.6.1 Operational environment general requirements .31
7.6.2 Operating system requirements for limited or non-modifiable operational environments .33
7.6.3 Operating system requirements for modifiable operational environments .33
7.7 Physical security .35
7.7.1 Physical security embodiments .35
7.7.2 Physical security general requirements .37
7.7.3 Physical security requirements for each physical security embodiment .39
7.7.4 Environmental failure protection/testing .42
7.8 Non-invasive security .43
7.9 Sensitive security parameter management .44
7.9.1 Sensitive security parameter management general requirements.44
7.9.2 Random bit generators .44
7.9.3 Sensitive security parameter generation .44
7.9.4 Sensitive security parameter establishment .45
7.9.5 Sensitive security parameter entry and output .45
7.9.6 Sensitive security parameter storage .46
© ISO/IEC 2012 – All rights reserved iii

ISO/IEC 19790:2012(E)
7.9.7 Sensitive security parameter zeroisation .46
7.10 Self-tests .47
7.10.1 Self-test general requirements .47
7.10.2 Pre-operational self-tests .47
7.10.3 Conditional self-tests .48
7.11 Life-cycle assurance .50
7.11.1 Life-cycle assurance general requirements .50
7.11.2 Configuration management .51
7.11.3 Design .51
7.11.4 Finite state model .51
7.11.5 Development .
...


SLOVENSKI STANDARD
01-maj-2020
Informacijska tehnologija - Varnostne tehnike - Varnostne zahteve za kriptografske
module (ISO/IEC 19790:2012)
Information technology - Security techniques - Security requirements for cryptographic
modules (ISO/IEC 19790:2012)
Informationstechnik - Sicherheitstechniken - Sicherheitsanforderungen für
kryptografische Module (ISO/IEC 19790:2012)
Technologies de l'information - Techniques de sécurité - Exigences de sécurité pour les
modules cryptographiques (ISO/IEC 19790:2012)
Ta slovenski standard je istoveten z: EN ISO/IEC 19790:2020
ICS:
35.030 Informacijska varnost IT Security
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN STANDARD
EN ISO/IEC 19790
NORME EUROPÉENNE
EUROPÄISCHE NORM
March 2020
ICS 35.030
English version
Information technology - Security techniques - Security
requirements for cryptographic modules (ISO/IEC
19790:2012)
Technologies de l'information - Techniques de sécurité Informationstechnik - Sicherheitstechniken -
- Exigences de sécurité pour les modules Sicherheitsanforderungen für kryptografische Module
cryptographiques (ISO/IEC 19790:2012) (ISO/IEC 19790:2012)
This European Standard was approved by CEN on 2 March 2020.

CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for
giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical
references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to
any CEN and CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC
Management Centre has the same status as the official versions.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,
Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,
Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.

CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels
© 2020 CEN/CENELEC All rights of exploitation in any form and by any means Ref. No. EN ISO/IEC 19790:2020 E
reserved worldwide for CEN national Members and for
CENELEC Members.
Contents Page
European foreword . 3

European foreword
The text of ISO/IEC 19790:2012 has been prepared by Technical Committee ISO/IEC JTC 1 "Information
technology” of the International Organization for Standardization (ISO) and has been taken over as
the secretariat of which is held by DIN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by September 2020, and conflicting national standards
shall be withdrawn at the latest by September 2020.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN shall not be held responsible for identifying any or all such patent rights.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,
Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of
North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the
United Kingdom.
Endorsement notice
The text of ISO/IEC 19790:2012 has been approved by CEN as EN ISO/IEC 19790:2020 without any
modification.
INTERNATIONAL ISO/IEC
STANDARD 19790
Second edition
2012-08-15
Corrected version
2015-12-15
Information technology — Security
techniques — Security requirements
for cryptographic modules
Technologies de l’information — Techniques de sécurité — Exigences
de sécurité pour les modules cryptographiques
Reference number
ISO/IEC 19790:2012(E)
©
ISO/IEC 2012
ISO/IEC 19790:2012(E)
© ISO/IEC 2012, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO/IEC 2012 – All rights reserved

ISO/IEC 19790:2012(E)
Contents Page
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms .15
5 Cryptographic module security levels .15
5.1 Security Level 1 .15
5.2 Security Level 2 .16
5.3 Security Level 3 .16
5.4 Security Level 4 .17
6 Functional security objectives .17
7 Security requirements .18
7.1 General .18
7.2 Cryptographic module specification .20
7.2.1 Cryptographic module specification general requirements .20
7.2.2 Types of cryptographic modules .20
7.2.3 Cryptographic boundary .21
7.2.4 Modes of operations .22
7.3 Cryptographic module interfaces .23
7.3.1 Cryptographic module interfaces general requirements .23
7.3.2 Types of interfaces .24
7.3.3 Definition of interfaces .24
7.3.4 Trusted channel .25
7.4 Roles, services, and authentication .25
7.4.1 Roles, services, and authentication general requirements .25
7.4.2 Roles .26
7.4.3 Services .26
7.4.4 Authentication .28
7.5 Software/Firmware security .29
7.6 Operational environment .31
7.6.1 Operational environment general requirements .31
7.6.2 Operating system requirements for limited or non-modifiable operational environments .33
7.6.3 Operating system requirements for modifiable operational environments .33
7.7 Physical security .35
7.7.1 Physical security embodiments .35
7.7.2 Physical security general requirements .37
7.7.3 Physical security requirements for each physical security embodiment .39
7.7.4 Environmental failure protection/testing .42
7.8 Non-invasive security .43
7.9 Sensitive security parameter management .44
7.9.1 Sensitive security parameter management general requirements.44
7.9.2 Random bit generators .44
7.9.3 Sensitive security parameter generation .44
7.9.4 Sensitive security parameter establishment .45
7.9.5 Sensitive security parameter entry and output .45
7.9.6 Sensitive security parameter storage .46
© ISO/IEC 2012 – All rights reserved iii

ISO/IEC 19790:2012(E)
7.9.7 Sensitive security parameter zeroisation .46
7.10 Self-tests .47
7.10.1 Self-test general requirements .47
7.10.2 Pre-operational self-tests .47
7.10.3 Conditional self-tests .48
7.11 Life-cycle assurance .50
7.11.1 Life-cycle assurance general requirements .50
7.11.2 Configuration management .51
7.11.3 Design .51
7.11.4 Finite state model .51
7.11.5 Development .52
7.11.6 Vendor testing .53
7.11.7 Delivery and operation .54
7.11.8 End of life .
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.