19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.87 Physical security of crypto modules<br />

Initiation responsibility: <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management<br />

As described in S 2.165 Selection of a suitable cryptographic product, crypto<br />

modules can be implemented in software, firmware or hardware. Firmware or<br />

hardware products tend to be chosen especially in cases where the crypto<br />

module is supposed to be especially resistant to manipulation.<br />

With this in mind, the design of the crypto module should incorporate physical<br />

safeguards or corresponding material properties that provide effective<br />

prevention of unauthorised physical access to the contents of the module. This<br />

is intended to guard against the possibility of technical manipulation or other<br />

encroachments during ongoing operation. Depending on the security level of<br />

the crypto module, the techniques to be considered could include the use of<br />

passivation materials, appropriate anti-tamper measures or mechanical locks,<br />

for example. An automatic emergency deletion function, which can bring<br />

about the active deletion or destruction of all sensitive key data and key<br />

parameters stored in plain text within the crypto module after an attempted<br />

attack is identified, can also be included in this category of safeguards.<br />

Various sensors and monitoring devices can be employed to ensure that the<br />

crypto module is always operated in its intended field of use – with regard to<br />

the power supply, timing, temperature, mechanical stress, electromagnetic<br />

interference etc.<br />

In order to maintain its envisaged level of functionality, the crypto module<br />

should be able to initiate and perform self-tests. <strong>The</strong>se tests may cover the<br />

following areas: algorithm tests, software and firmware tests, functional tests,<br />

random statistical tests, consistency tests, condition tests, and key generation<br />

and loading tests. If the result of any test is negative, an error message<br />

pointing this out must be issued to the user of the crypto module and the<br />

module should enter a corresponding error state. It should not be possible to<br />

release the module from the error state until after the cause of the error has<br />

been remedied.<br />

When software products are used, the physical security of the crypto module<br />

must be provided by the respective <strong>IT</strong> system or its application environment.<br />

<strong>The</strong> security requirements to be met by such <strong>IT</strong> systems are described in the<br />

system-specific sections.<br />

A software solution should be able to perform self-tests so as to be able to<br />

detect modifications made by Trojan horses or computer viruses.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!