ISO/IEC 24759:2025
(Main)Information security, cybersecurity and privacy protection - Test requirements for cryptographic modules
Information security, cybersecurity and privacy protection - Test requirements for cryptographic modules
This document specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2025. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories. This document also specifies the information that vendors are required to provide testing laboratories as supporting evidence to demonstrate their cryptographic modules’ conformity to the requirements specified in ISO/IEC 19790:2025. Vendors can also use this document to verify whether their cryptographic modules satisfy the requirements specified in ISO/IEC 19790:2025 before applying to a testing laboratory for testing.
Sécurité de l’information, cybersécurité et protection de la vie privée — Exigences d'essai pour modules cryptographiques
General Information
Relations
Overview
ISO/IEC 24759:2025 - Information security, cybersecurity and privacy protection - Test requirements for cryptographic modules (ISO, 2025) defines the test methods that independent testing laboratories must use to verify that a cryptographic module conforms to the security requirements in ISO/IEC 19790:2025. The standard is designed to increase objectivity and consistency across laboratories, and it also specifies the supporting evidence vendors must supply. Vendors can use the document to self‑check their products before formal testing.
Key Topics and Requirements
ISO/IEC 24759:2025 organizes test requirements across the full lifecycle and internal structure of cryptographic modules. Major technical topics include:
- Cryptographic module specification and boundary - tests to confirm the defined module, its type, and physical/logical boundary.
- Interfaces and data paths - test cases for module interfaces, plaintext trusted paths, and protected internal paths.
- Roles, services, and authentication - verification of role separation, services provided, and authentication mechanisms.
- Software/firmware security and security levels - tests for modifiable/non‑modifiable firmware, and requirements mapped to security levels.
- Operational environment - evaluation of host OS and modifiable environments where applicable.
- Physical security and environmental failure protection - tests covering physical embodiments and resistance to tampering and environmental attacks.
- Non‑invasive and side‑channel resistance - test methods addressing power, timing and other non‑invasive attack vectors.
- Sensitive Security Parameter (SSP) management - verification of key generation, RNGs, storage, zeroization, and secure entry/output.
- Self‑tests and lifecycle assurance - procedures for pre‑operational and conditional self‑tests, configuration management, design/development and vendor testing.
- Documentation and cryptographic module security policy - required evidence, user and administrative documentation, and the module security policy content.
Applications and Who Uses It
ISO/IEC 24759:2025 is practical for organizations involved in the design, testing, certification and procurement of cryptographic modules:
- Testing laboratories and certification bodies - to apply consistent, objective test methods for product evaluation.
- Vendors and product engineers - to prepare evidence packages and perform pre‑testing against ISO/IEC 19790:2025.
- Security architects and compliance teams - to ensure deployed HSMs, TPMs, smart cards, encryption appliances and IoT cryptographic modules meet validated requirements.
- Procurement and risk officers - to specify testable security requirements in acquisition contracts.
Use this standard to streamline certification, reduce testing variability, and demonstrate conformity of cryptographic modules in regulated and high‑security environments.
Related Standards
- ISO/IEC 19790:2025 - cryptographic module security requirements (normative reference).
- Comparable standards and references often considered: NIST FIPS 140‑3 (US cryptographic module validation).
Standards Content (Sample)
International
Standard
ISO/IEC 24759
Fourth edition
Information security,
2025-02
cybersecurity and privacy
protection — Test requirements
for cryptographic modules
Sécurité de l’information, cybersécurité et protection de la vie
privée — Exigences d'essai pour modules cryptographiques
Reference number
© ISO/IEC 2025
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2025 – All rights reserved
ii
Contents Page
Foreword .v
Introduction .vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Symbols and abbreviated terms. 2
5 Document organization . 2
5.1 General .2
5.2 Assertions and security requirements .3
5.3 Assertions with cross references .3
6 Security requirements . 4
6.1 General .4
6.2 Cryptographic module specification .5
6.2.1 Cryptographic module specification general requirements .5
6.2.2 Types of cryptographic modules .5
6.2.3 Cryptographic boundary .6
6.2.4 Module operations .16
6.3 Cryptographic module interfaces . 23
6.3.1 Cryptographic module interfaces general requirements . 23
6.3.2 Categories of interfaces . 26
6.3.3 Plaintext trusted path . 35
6.3.4 Protected internal paths . 38
6.4 Roles, services, and authentication . 39
6.4.1 Roles, services, and authentication general requirements . 39
6.4.2 Roles . 40
6.4.3 Services .41
6.4.4 Authentication . 49
6.5 Software/firmware security .59
6.5.1 Software/firmware security general requirements .59
6.5.2 Security level 1 .62
6.5.3 Security level 2 .67
6.5.4 Security levels 3 and 4. 68
6.6 Operational environment. 69
6.6.1 Operational environment general requirements . 69
6.6.2 Clause applicability .70
6.6.3 Operating system requirements for modifiable operational environments .71
6.7 Physical security . 83
6.7.1 Physical security embodiments . 83
6.7.2 Physical security general requirements . 84
6.7.3 Physical security requirements for each physical security embodiment . 95
6.7.4 Environmental failure protection/testing . 100
6.7.5 Environmental failure protection features . 100
6.7.6 Environmental failure testing procedures . 101
6.8 Non-invasive security . . 104
6.8.1 Non-invasive security general requirements . 104
6.8.2 Security levels 1 and 2. 104
6.8.3 Security level 3 . 105
6.8.4 Security level 4 . 105
6.9 Sensitive security parameter management . 106
6.9.1 Sensitive security parameter management general requirements . 106
6.9.2 Random bit generators . 108
6.9.3 Sensitive security parameter generation .110
6.9.4 Automated sensitive security parameter establishment .110
© ISO/IEC 2025 – All rights reserved
iii
6.9.5 Sensitive security parameter entry and output . 111
6.9.6 Sensitive security parameter storage .117
6.9.7 Sensitive security parameter zeroization . 118
6.10 Self-tests . 122
6.10.1 Self-test general requirements . 122
6.10.2 Security levels 3 and 4. 126
6.10.3 Pre-operational self-tests . 127
6.10.4 Conditional self-tests . 130
6.11 Life-cycle assurance .143
6.11.1 Life-cycle assurance general requirements .143
6.11.2 Configuration management .143
6.11.3 Design .145
6.11.4 Finite state model .145
6.11.5 Development . 149
6.11.6 Vendor testing . 155
6.11.7 Delivery and operation . 157
6.11.8 Guidance documents . 160
6.12 Mitigation of other attacks .161
6.12.1 Mitigation of other attacks general requirements .161
6.12.2 Security levels 1, 2 and 3 .161
6.12.3 Security level 4 .161
7 Documentation requirements .162
7.1 Purpose . 162
7.2 Items . 163
7.2.1 Cryptographic module specification . 163
7.2.2 Cryptographic module interfaces . 164
7.2.3 Roles, services, and authentication . 164
7.2.4 Software/Firmware security . 165
7.2.5 Operational environment . 165
7.2.6 Physical security . 166
7.2.7 Non-invasive security .167
7.2.8 Sensitive security parameter management .167
7.2.9 Self-tests . . . 169
7.2.10 Life-cycle assurance . 169
7.2.11 Mitigation of other attacks .171
8 Cryptographic module security policy .172
8.1 General . 172
8.2 Items . 173
8.2.1 General . 173
8.2.2 Cryptographic module specification .174
8.2.3 Cryptographic module interfaces . 175
8.2.4 Roles, services, and authentication . 175
8.2.5 Software/Firmware security .176
8.2.6 Operational environment . 177
8.2.7 Physical security . 178
8.2.8 Non-invasive security . 179
8.2.9 Sensitive security parameters management. 179
8.2.10 Self-tests . . . 180
8.2.11 Life-cycle assurance . 180
8.2.12 Mitigation of other attacks . 181
Bibliography .182
© ISO/IEC 2025 – All rights reserved
iv
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations,
governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.
The procedures used to develop this document and those intended for its further maintenance are described
in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the different types
of document should be noted. This document was drafted in accordance with the editorial rules of the ISO/
IEC Directives, Part 2 (see www.iso.org/directives or www.iec.ch/members_experts/refdocs).
ISO and IEC draw attention to the possibility that the implementation of this document may involve the
use of (a) patent(s). ISO and IEC take no position concerning the evidence, validity or applicability of any
claimed patent rights in respect thereof. As of the date of publication of this document, ISO and IEC had not
received notice of (a) patent(s) which may be required to implement this document. However, implementers
are cautioned that this may not represent the latest information, which may be obtained from the patent
database available at www.iso.org/patents and https://patents.iec.ch. ISO and IEC shall not be held
responsible for identifying any or all such patent rights.
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and expressions
related to conformity assessment, as well as information about ISO's adherence to the World Trade
Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www.iso.org/iso/foreword.html.
In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
This fourth edition cancels and replaces the third edition (ISO/IEC 24759:2017), which has been technically
revised.
The main changes are as follows:
— new terminology has been added;
— ASs, VEs and TEs have been updated according to ISO/IEC 19790:2025; and
— VEs and TEs have been corrected or updated to improve efficiency.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/national-committees.
© ISO/IEC 2025 – All rights reserved
v
Introduction
In information technology there is an ever-increasing need to use cryptographic mechanisms, such as for the
protection of data against unauthorized disclosure or manipulation, for entity authentication, and for non-
repudiation. The security and reliability of such mechanisms are directly dependent on the cryptographic
modules in which they are implemented.
ISO/IEC 19790 provides four increasing, qualitative levels of security requirements intended to cover a wide
range of potential applications and environments. The cryptographic techniques are identical over the four
security levels defined in this document. The security requirements cover areas relative to the design and
implementation of a cryptographic module. These areas include:
— cryptographic module specification;
— cryptographic module interfaces;
— roles, services and authentication;
— software/firmware security;
— operational environment;
— physical security;
— non-invasive security;
— sensitive security parameter management;
— self-tests;
— life-cycle assurance; and
— mitigation of other attacks.
This document specifies the test requirements for cryptographic modules conforming to ISO/IEC 19790:2025.
© ISO/IEC 2025 – All rights reserved
vi
International Standard ISO/IEC 24759:2025(en)
Information security, cybersecurity and privacy protection —
Test requirements for cryptographic modules
1 Scope
This document specifies the methods to be used by testing laboratories to test whether the cryptographic
module conforms to the requirements specified in ISO/IEC 19790:2025. The methods are developed to
provide a high degree of objectivity during the testing process and to ensure consistency across the testing
laboratories.
This document also specifies the information that vendors are required to provide testing laboratories as
supporting evidence to demonstrate their cryptographic modules’ conformity to the requirements specified
in ISO/IEC 19790:2025.
Vendors can also use this document to verify whether their cryptographic modules satisfy the requirements
specified in ISO/IEC 19790:2025 before applying to a testing laboratory for testing.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content constitutes
requirements of this document. For dated references, only the edition cited applies. For undated references,
the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 19790:2025, Information security, cybersecurity and privacy protection — Security requirements for
cryptographic modules
ISO/IEC 20085-1, IT Security techniques — Test tool requirements and test tool calibration methods for use in
testing non-invasive attack mitigation techniques in cryptographic modules — Part 1: Test tools and techniques
ISO/IEC 20085-2, IT Security techniques — Test tool requirements and test tool calibration methods for use in
testing non-invasive attack mitigation techniques in cryptographic modules — Part 2: Test calibration methods
and apparatus
ISO/IEC 20543, Information technology — Security techniques — Test and analysis methods for random bit
generators within ISO/IEC 19790 and ISO/IEC 15408
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 19790 and the following apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at www .iso .org/ obp;
— IEC Electropedia: available at www .electropedia .org.
3.1
validation certificate
assertion by a certification body that a cryptographic function has been tested and found to be a correct
implementation of the target cryptographic function
© ISO/IEC 2025 – All rights reserved
3.2
vendor affirmation
statement from a vendor that a given implementation of a security function is correct and meets all relevant
requirements from related standards, based on their own internal assurance activities
Note 1 to entry: Rules on acceptable vendor affirmations are set by individual certification bodies who independently
define evidence requirements for a given vendor affirmation and can require review by an independent testing
laboratory.
4 Symbols and abbreviated terms
For the purposes of this document, the symbols and abbreviated terms apply.
ACL access control list
API application programming interface
CBC cipher block chaining
CPLD complex programmable logic device
CSP critical security parameter
ECB electronic codebook
EDC error detection code
EFP environmental failure protection
EFT environmental failure testing
FPGA field programmable gate array
FSM finite state model
HDL hardware description language
IC integrated circuit
PC personal computer
PIN personal identification number
PSP public security parameter
RBG random bit generator
SSP sensitive security parameter
5 Document organization
5.1 General
Clause 6 specifies the methods that shall be used by testing laboratories and the requirements for
documentation that vendors shall provide to testing laboratories.
6.2 to 6.12 includes eleven subclauses corresponding to the eleven areas of security requirements from
ISO/IEC 19790:2025. Clause 7 corresponds to ISO/IEC 19790:2025, Annex A, and Clause 8 corresponds to
ISO/IEC 19790:2025, Annex B.
© ISO/IEC 2025 – All rights reserved
ISO/IEC 19790:2025, Annexes C, D, E, F and G do not currently include any assertions and are not covered by
this document.
5.2 Assertions and security requirements
In Clauses 6, 7 and 8, the corresponding security requirements from ISO/IEC 19790:2025 are presented in
Table 1 to 429, each dedicated to an individual assertion (i.e. statements that shall be true for the module to
satisfy the requirement of a given area at a given level).
All of the assertions are direct quotations from ISO/IEC 19790:2025, however what is quoted in each table
can be part of a longer sentence or list that is not replicated in this document. For this reason, it is important
that the entire text of ISO/IEC 19790:2025 be used to fully understand every assertion’s definition, context
and conditions.
The assertions are denoted by the form:
AS〈requirement_number〉.〈requirement_number〉
where “requirement_number” is the number of the corresponding area specified in ISO/IEC 19790:2025
(i.e. 1 to 11 and A to G), and “sequence_number” is a sequential identifier for assertions within a subclause.
After the statement of each assertion, the security levels to which the assertion applies (i.e. levels 1 to 4) are
listed in parentheses.
Following each assertion in its corresponding table is a set of requirements levied on the vendor. These
requirements describe the types of documentation or explicit information that the vendor shall provide in
order for the tester to verify conformity to the given assertion. These requirements are denoted by the form:
VE〈requirement_number〉.〈assertion_sequence_number〉.〈sequence_number〉
where “requirement_number” and “assertion_sequence_number” are identical to the corresponding
assertion requirement number and sequence number, and “sequence_number” is a sequential identifier for
vendor requirements within the assertion requirement.
Following each assertion and the requirements levied on the vendor in the table, there are a set of
requirements levied on the tester of the cryptographic module. These requirements instruct the tester as to
what he or she shall do in order to test the cryptographic module with respect to the given assertion. These
requirements are denoted by the form:
TE〈requirement_number〉.〈assertion_sequence_number〉.〈sequence_number〉
where “requirement_number” and “assertion_sequence_number” are identical to the corresponding
assertion requirement number and sequence number, and “sequence_number” is a sequential identifier for
tester requirements within the assertion requirement.
Tables give the assertions ASs, the requirements levied on the vendor VEs, the requirements levied on the
tester TEs, notes if applicable and examples if applicable.
A certification body may modify, add, or delete either VEs or TEs, or both, in this document.
5.3 Assertions with cross references
For clarity, some assertions have been provided and cross references to other assertions and related text
have been put between curly brackets “{” and “}”.
© ISO/IEC 2025 – All rights reserved
6 Security requirements
6.1 General
Table 1 — VE and TE of AS01.01
General — levels 1, 2, 3 and 4
AS01.01 This clause specifies the security requirements that cryptographic modules shall follow.
ISO/IEC
19790:2025,
7.1
Required test procedures
This assertion is not separately tested.
Table 2 — VE and TE of AS01.02
General — levels 1, 2, 3 and 4
AS01.02 A cryptographic module shall be tested against the requirements of each area addressed in
this clause.
ISO/IEC 19790:2025,
7.1
Required test procedures
This assertion is not separately tested.
NOTE 1 The tests can be performed in one or more of the following manners.
a) The tester performs tests at the tester’s facility.
b) The tester performs tests at the vendor’s facility.
c) The tester supervises vendor performing tests at the vendor’s facility.
1) Rationale is included that explains why the tester could not perform the tests.
2) The tester develops the required test plan and required tests.
3) The tester directly observes the tests being performed.
d) The tester can reference existing evidence of compliance (e.g. third party certificate or test report) where
permitted by a given certification body or accreditation body for the testing laboratory.
NOTE 2 An assertion fails if any of its subsequent tests fail.
NOTE 3 The accreditation body for testing laboratory refers to ISO/IEC TS 23532-2.
Table 3 — VE and TE of AS01.03
General — levels 1, 2, 3 and 4
AS01.03 The cryptographic module level shall be independently determined in each area.
ISO/IEC
19790:2025, 7.1
Required test procedures
This assertion is not separately tested.
© ISO/IEC 2025 – All rights reserved
Table 4 — VE and TE of AS01.04
General — levels 1, 2, 3 and 4
AS01.04 All documentation, including copies of the user and installation manuals, design specifications and
life cycle documentation shall be provided for a cryptographic module that undergoes independent
ISO/IEC
testing.
19790:2025, 7.1
Required test procedures
This assertion is not separately tested.
6.2 Cryptographic module specification
6.2.1 Cryptographic module specification general requirements
Table 5 — VE and TE of AS02.01
Cryptographic module specification general requirements — levels 1, 2, 3 and 4
AS02.01 A cryptographic module shall be a set of hardware, software, firmware, or some combina-
tion thereof, which at a minimum, implements a defined cryptographic service employing an
ISO/IEC
approved security function as specified in ISO/IEC 19790:2025, Annex C, or process, and is con-
19790:2025, 7.2.1
tained within a defined cryptographic boundary.
Required test procedures
This assertion is not separately tested.
Table 6 — VE and TE of AS02.02
Cryptographic module specification general requirements — levels 1, 2, 3 and 4
AS02.02 The documentation for cryptographic module specification specified in ISO/IEC 19790:2025,
A.2.1 shall be provided.
ISO/IEC
19790:2025, 7.2.1
Required test procedures
This assertion is tested as part of ASA.01.
6.2.2 Types of cryptographic modules
Table 7 — VE and TE of AS02.03
Types of cryptographic modules — levels 1, 2, 3 and 4
AS02.03 A cryptographic module shall be defined as either a hardware module, firmware module, hybrid
firmware module, software module, or hybrid software module.
ISO/IEC
19790:2025, 7.2.2
Required vendor information
VE02.03.01 The vendor shall provide a description of the cryptographic module describing the type of cryp-
tographic module. It will explain the rationale of the module type selection.
VE02.03.02 The vendor shall provide a specification of the cryptographic module identifying all hardware
and either software and firmware components of the cryptographic module as applicable.
Required test procedures
TE02.03.01 The tester shall verify that the documentation provided by the vendor identifies one of the mod-
ule types listed in AS02.03.
TE02.03.02 The tester shall review the specific documentation provided by the vendor, by identifying all
hardware and either software or firmware components (AS02.13 to AS02.16), to verify that the
cryptographic module is consistent with the type of the cryptographic module.
© ISO/IEC 2025 – All rights reserved
Table 8 — VE and TE of AS02.04
Types of cryptographic modules — levels 1, 2, 3 and 4
AS02.04 For hardware, firmware or hybrid firmware modules, the applicable physical security
and non-invasive security requirements specified in ISO/IEC 19790:2025, 7.7 and ISO/IEC
ISO/IEC
19790:2025, 7.8 shall apply.
19790:2025, 7.2.2
Required test procedures
This assertion is not separately tested.
6.2.3 Cryptographic boundary
6.2.3.1 Cryptographic boundary general requirements
Table 9 — VE and TE of AS02.05
Cryptographic boundary — levels 1, 2, 3 and 4
AS02.05 A cryptographic boundary shall consist of an explicitly defined perimeter (i.e. set of hardware,
software or firmware components) that establishes the boundary of all components of the
ISO/IEC
cryptographic module.
19790:2025, 7.2.3.1
Required vendor information
VE02.05.01 The vendor-provided documentation shall specify all components within the cryptographic
boundary.
Required test procedures
TE02.05.01 The tester shall review the vendor-provided documentation and inspect the cryptographic
module to verify that all the components specified in AS02.13 to AS02.16 are within the cryp-
tographic boundary.
TE02.05.02 The tester shall review the vendor-provided documentation and inspect the cryptographic
module to verify that there are no unidentified components which are not specified in AS02.13
to AS02.16 within the cryptographic boundary.
Table 10 — VE and TE of AS02.06
Cryptographic boundary — levels 1, 2, 3 and 4
AS02.06 The requirements of this document shall apply to all security functions, processes and compo-
nents within the module’s cryptographic boundary.
ISO/IEC
19790:2025, 7.2.3.1
Required test procedures
This assertion is not separately tested.
Table 11 — VE and TE of AS02.07
Cryptographic boundary — levels 1, 2, 3 and 4
AS02.07 The cryptographic boundary shall, at a minimum, encompass all security relevant securi-
ty functions, processes and components of a cryptographic module as defined in ISO/IEC
ISO/IEC
19790:2025, Clause 7.
19790:2025, 7.2.3.1
Required vendor information
VE02.07.01 The vendor shall provide a list of all the security relevant security functions, processes, and
components within the cryptographic boundary.
Required test procedures
TE02.07.01 The tester shall verify that the documentation provided by the vendor clearly identifies and
lists all the security relevant security functions, processes, and components of the module
within the cryptographic boundary.
© ISO/IEC 2025 – All rights reserved
Table 12 — VE and TE of AS02.08
Cryptographic boundary — levels 1, 2, 3 and 4
AS02.08 Non-security relevant security functions, processes or components which are used in ap-
proved services shall be implemented in a manner so as to not interfere or compromise the
ISO/IEC
approved operation of the cryptographic module.
19790:2025, 7.2.3.1
Required vendor information
VE02.08.01 The vendor-provided documentation shall list the non-security relevant functions used in an
approved service and justify that they are not interfering with the approved service of the
module.
Required test procedures
TE02.08.01 The tester shall review documentation and inspect the module to verify that the non-security
relevant functions do not interfere or compromise the approved service of the module.
TE02.08.02 The tester shall verify the correctness of any rationale provided by the vendor for not inter-
fering nor compromising the service. The burden of proof is on the vendor; if there is any
uncertainty or ambiguity, the tester shall ask the vendor to produce additional information as
needed.
Table 13 — VE and TE of AS02.09
Cryptographic boundary — levels 1, 2, 3 and 4
AS02.09 The defined name of a cryptographic module shall be representative of the composition of the
components within the cryptographic boundary and not representative of a larger composi-
ISO/IEC
tion or product.
19790:2025, 7.2.3.1
Required vendor information
VE02.09.01 The vendor shall provide the defined name of the module.
Required test procedures
TE02.09.01 The tester shall verify that the module name provided by the vendor is consistent with the
composition of the components within the cryptographic boundary.
TE02.09.02 The tester shall verify that the module name does not represent a composition of components
or functions that are not consistent with the composition of the components within the cryp-
tographic boundary.
Table 14 — VE and TE of AS02.10
Cryptographic boundary — levels 1, 2, 3 and 4
AS02.10 The cryptographic module shall have, at minimum, specific versioning information represent-
ing the distinct individual hardware and software or firmware components as applicable.
ISO/IEC
19790:2025, 7.2.3.1
Required vendor information
VE02.10.01 The vendor shall provide the versioning information of the module’s distinct individual hard-
ware and either software or firmware components.
Required test procedures
TE02.10.01 The tester shall verify that the versioning information represents the modules distinct individ-
ual hardware and either software or firmware components.
© ISO/IEC 2025 – All rights reserved
Table 15 — VE and TE of AS02.11
Cryptographic boundary — levels 1, 2, 3 and 4
AS02.11 The excluded hardware, software or firmware components shall be implemented in such a
manner to not interfere or compromise the approved secure operation of the cryptographic
ISO/IEC 19790:2025,
module.
7.2.3.1
Required vendor information
VE02.11.01 The vendor shall describe the excluded components of the module and justify that these com-
ponents will not interfere with the approved secure operation of the module.
VE02.11.02 The vendor-provided documentation shall provide the rationale for excluding each of the
components. The rationale shall describe how each excluded component, when working prop-
erly or when it malfunctions, shall not interfere with the approved secure operation of the
module. Rationale that can be acceptable, if adequately supported by documentation, includes
the following.
a) The component is not connected with security relevant components of the module
that would allow inappropriate transfer of SSPs, plaintext data, or other information
that could interfere with the approved secure operation of the module.
b) All information processed by the component is strictly for internal use of the module,
and does not in any way impact the correctness of control, status or data outputs.
Required test procedures
TE02.11.01 The tester shall review the documentation provided by the vendor to inspect that the ex-
cluded components within the cryptographic boundary will not interfere with the approved
secure operation of the module.
TE02.11.02 The tester shall verify the correctness of any rationale for exclusion provided by the vendor.
The burden of proof is on the vendor; if there is any uncertainty or ambiguity, the tester shall
ask the vendor to produce additional information as needed.
TE02.11.03 The tester shall manipulate (e.g. to cause the component to operate not as designed) the ex-
cluded components in a manner to cause incorrect operation of the excluded component. The
tester shall verify that the incorrect operation of the excluded component shall not interfere
with the approved secure operation of the module.
NOTE 1 Testing can rely on either code review, documentation, or both, if behavioural or
physical methods which cause the incorrect operation of the excluded component are in-
feasible or impractical for a given module. Behavioural methods include using a debugger,
code manipulator/injector, simulator, or another tool to manipulate data that can impact the
behaviour of an excluded component; physical methods include shorting/removing pins and
voltage manipulations. Testing is considered infeasible or impractical when such manip-
ulations are unders
...
Frequently Asked Questions
ISO/IEC 24759:2025 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information security, cybersecurity and privacy protection - Test requirements for cryptographic modules". This standard covers: This document specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2025. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories. This document also specifies the information that vendors are required to provide testing laboratories as supporting evidence to demonstrate their cryptographic modules’ conformity to the requirements specified in ISO/IEC 19790:2025. Vendors can also use this document to verify whether their cryptographic modules satisfy the requirements specified in ISO/IEC 19790:2025 before applying to a testing laboratory for testing.
This document specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2025. The methods are developed to provide a high degree of objectivity during the testing process and to ensure consistency across the testing laboratories. This document also specifies the information that vendors are required to provide testing laboratories as supporting evidence to demonstrate their cryptographic modules’ conformity to the requirements specified in ISO/IEC 19790:2025. Vendors can also use this document to verify whether their cryptographic modules satisfy the requirements specified in ISO/IEC 19790:2025 before applying to a testing laboratory for testing.
ISO/IEC 24759:2025 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/IEC 24759:2025 has the following relationships with other standards: It is inter standard links to ISO/IEC 24759:2017. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
You can purchase ISO/IEC 24759:2025 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
The ISO/IEC 24759:2025 standard plays a crucial role in the realm of information security, cybersecurity, and privacy protection by outlining the test requirements for cryptographic modules. This document is pivotal for ensuring that cryptographic modules adhere to the specifications set forth in ISO/IEC 19790:2025, thereby fostering trust in digital communications and data protection. One of the significant strengths of this standard is its emphasis on objectivity in the testing process. The methods specified are designed to minimize subjectivity, enhancing the reliability of test outcomes across different laboratories. This consistency is vital for vendors and users who rely on cryptographic modules to safeguard sensitive information. By establishing a well-defined framework for testing, the standard not only facilitates rigorous evaluation but also ensures that results are comparable and reproduceable. The document also provides clear guidance to vendors regarding the information required for testing laboratories. By outlining the necessary supporting evidence that vendors must supply, ISO/IEC 24759:2025 creates a transparent pathway for vendors to demonstrate conformity to the established requirements. This clarity is beneficial as it allows vendors to verify their cryptographic modules' compliance before engaging with testing laboratories, ultimately streamlining the certification process. Furthermore, the relevance of ISO/IEC 24759:2025 extends beyond mere compliance. In an era where cybersecurity threats are increasingly sophisticated, having a standardized set of testing requirements allows organizations to bolster their security posture. Implementing cryptographic modules that meet the rigorous criteria of this standard can significantly reduce vulnerabilities arising from weak encryption practices. Overall, ISO/IEC 24759:2025 stands as a comprehensive and essential guideline for testing cryptographic modules, ensuring that they meet the stringent standards necessary for effective information security, cybersecurity, and privacy protection. Its focus on objectivity, consistency, and vendor guidance makes it a vital resource in the ever-evolving landscape of digital security.
Das Dokument ISO/IEC 24759:2025 bietet eine umfassende Grundlage für die Testanforderungen an kryptografische Module im Kontext der Informationssicherheit, Cybersecurity und Datenschutz. Der Umfang des Standards konzentriert sich darauf, Methoden für Prüflabore festzulegen, um die Konformität von kryptografischen Modulen mit den Anforderungen des ISO/IEC 19790:2025 zu testen. Dies ist von entscheidender Bedeutung, um ein hohes Maß an Objektivität während des Testprozesses zu gewährleisten und Konsistenz über verschiedene Prüfstellen hinweg zu sichern. Eine der größten Stärken des ISO/IEC 24759:2025 liegt in seiner strukturierten Herangehensweise an die Testmethodik. Die klar definierten Verfahren ermöglichen es Prüflaboren, systematisch und effizient zu arbeiten, wodurch die Zuverlässigkeit der Testergebnisse verbessert wird. Darüber hinaus ist die Anforderung an die Anbieter, unterstützende Informationen bereitzustellen, ein wichtiger Aspekt, der zur Transparenz und Nachvollziehbarkeit des Testprozesses beiträgt. Dies ermöglicht nicht nur eine umfassende Dokumentation, sondern bietet auch Anbietern die Möglichkeit, ihre kryptografischen Module vor der offiziellen Prüfung auf Konformität zu überprüfen. Die Relevanz des Standards ISO/IEC 24759:2025 erstreckt sich über den reinen Testprozess hinaus und erstärkt das Vertrauen in die verwendeten kryptografischen Systeme. In einer Zeit, in der Datensicherheit und Schutz der Privatsphäre von zentraler Bedeutung sind, liefert dieser Standard eine entscheidende Ressource für sowohl Anbieter als auch Prüflabore, um die geforderten Sicherheitsniveaus zu erreichen. Die Integration der Anforderungen aus ISO/IEC 19790:2025 in diesen Teststandard stellt sicher, dass alle Beteiligten über gleichwertige Erwartungen verfügen und somit die Konformität mit den aktuellsten Sicherheitsstandards gewährleistet ist.
ISO/IEC 24759:2025 표준은 정보 보안, 사이버 보안 및 개인 정보 보호와 관련하여 암호 모듈의 테스트 요구 사항을 명확히 규정하고 있습니다. 이 문서는 테스트 실험실이 암호 모듈이 ISO/IEC 19790:2025에서 명시한 요구 사항에 적합한지 테스트하는 데 사용할 수 있는 방법을 제시하며, 테스트 과정에서 높은 객관성을 제공하고 테스트 실험실 간의 일관성을 보장하기 위해 개발되었습니다. 이 표준의 강점 중 하나는 테스트 방법의 정밀함과 재현 가능성입니다. 이는 암호 모듈의 신뢰성을 입증하는 데 필수적으로 작용하며, 보안 제품이 제조사에 의해 제공된 정보와 일치하는지 확인할 수 있는 강력한 기초를 제공합니다. 또한, 공급자는 이 문서를 활용하여 자신의 암호 모듈이 ISO/IEC 19790:2025의 요구 사항을 충족하는지 사전에 검증할 수 있어, 테스트 진행 전에 이미 기준에 맞는지 확인할 수 있는 기회를 제공합니다. ISO/IEC 24759:2025는 정보 보안 산업에서 그 중요성이 점점 증가하고 있는 만큼, 사이버 보안과 관련하여 신뢰할 수 있는 테스트 방법을 필요로 하는 모든 이해관계자에게 필수적인 문서로 자리 잡고 있습니다. 따라서 이 표준은 보안 제품을 개발하거나 사용하는 모든 기업과 기관에 필요한 테스트 요구 사항을 제공하며, 글로벌 보안 표준에 부합하는지를 평가할 수 있는 기준을 마련합니다. 이렇게 함으로써, ISO/IEC 24759:2025는 정보 보호와 사이버 보안 강화에 실질적인 기여를 하고 있습니다.
ISO/IEC 24759:2025は、暗号モジュールのテスト要件に関する非常に重要な標準です。この標準は、テストラボが暗号モジュールがISO/IEC 19790:2025で指定された要件に準拠しているかどうかを検証するために使用する方法を規定しています。そのため、標準はテストプロセスにおける客観性を高め、テストラボ間の一貫性を確保するために開発されています。 この標準の強みは、テストの信頼性と客観性にあります。ISO/IEC 24759:2025に従うことで、ベンダーは自社の暗号モジュールがISO/IEC 19790:2025の要件を満たしているかどうかを事前に確認できるため、テストラボへの申請前に不備を事前に解消することが可能です。これにより、時間とコストの無駄を減らし、テストの効率を向上させることができます。 また、ベンダーがテストラボに提供する必要がある情報も詳細に指定されており、これによりテストの透明性と公平性が向上しています。ISO/IEC 24759:2025は、情報セキュリティ、サイバーセキュリティおよびプライバシー保護の分野における信頼性のある基準を提供し、関連する業界や企業にとって非常に重要なものであることがわかります。 このように、ISO/IEC 24759:2025は暗号モジュールの評価において不可欠な指針を提供し、その影響は広範囲にわたります。業界の標準に準拠することで、企業は高度な情報セキュリティを確保し、顧客の信頼を勝ち取ることができるでしょう。
La norme ISO/IEC 24759:2025 représente une avancée significative dans le domaine de la sécurité de l'information, de la cybersécurité et de la protection de la vie privée, en se concentrant spécifiquement sur les exigences de test pour les modules cryptographiques. Son champ d'application est clair : il définit les méthodes que les laboratoires de test doivent utiliser pour déterminer si un module cryptographique se conforme aux exigences établies dans la norme ISO/IEC 19790:2025. Parmi les forces majeures de cette norme, on note son approche visant à garantir un haut degré d'objectivité durant le processus de test, ce qui est essentiel pour assurer la fiabilité des résultats. De plus, l'accent mis sur la cohérence entre les différents laboratoires de test renforce la crédibilité et la standardisation des évaluations, un élément crucial dans le domaine de la sécurité, où la vérifiabilité est indispensable. La norme ISO/IEC 24759:2025 est également pertinente pour les fournisseurs de modules cryptographiques, car elle précise les informations qu'ils doivent soumettre aux laboratoires de test comme preuve de conformité. Cela permet non seulement aux fournisseurs de s'assurer que leurs modules respectent les exigences définies par ISO/IEC 19790:2025 avant de procéder aux tests, mais aussi d'optimiser le processus d'évaluation. En résumé, la norme ISO/IEC 24759:2025 s'affirme comme une ressource essentielle pour les professionnels de la cybersécurité, offrant des méthodes clairement définies et garantissant un niveau de qualité homologue dans l'ensemble des évaluations. Son adoption est primordiale pour quiconque travaille avec des modules cryptographiques et souhaite s'assurer de leur conformité face aux exigences de sécurité les plus actuelles.








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...