mNo edit summary Tag: sourceedit |
mNo edit summary Tag: sourceedit |
||
Line 5: | Line 5: | ||
{{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds of a [[cryptographic module]] and contains all the [[hardware]], [[software]], and/or [[firmware]] components of a [[cryptographic module]].<ref>Unified Capabilities, Framework 2013, App. C, at C-10 ([http://www.disa.mil/Services/Network-Services/UCCO/~/media/Files/DISA/Services/UCCO/UCR2013/18_Framework_2013_App_C.pdf full-text]). ''See also'' [[NIST]], [[FIPS 140-1]], at 13.</ref>}} |
{{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds of a [[cryptographic module]] and contains all the [[hardware]], [[software]], and/or [[firmware]] components of a [[cryptographic module]].<ref>Unified Capabilities, Framework 2013, App. C, at C-10 ([http://www.disa.mil/Services/Network-Services/UCCO/~/media/Files/DISA/Services/UCCO/UCR2013/18_Framework_2013_App_C.pdf full-text]). ''See also'' [[NIST]], [[FIPS 140-1]], at 13.</ref>}} |
||
− | {{Quote|a [[logical]] container where all the relevant [[security component]]s of a [[control system]] that employ [[cryptography]] reside. It includes the [[data processing|processing]] [[hardware]], [[data]], and [[memory]] as well as other critical [[ |
+ | {{Quote|a [[logical]] container where all the relevant [[security component]]s of a [[control system]] that employ [[cryptography]] reside. It includes the [[data processing|processing]] [[hardware]], [[data]], and [[memory]] as well as other critical [[component]]s.<ref>[[Catalog of Control Systems Security: Recommendations for Standards Developers]] (Apr. 2011 version), at 162.</ref>}} |
== References == |
== References == |
Revision as of 05:00, 22 August 2016
Definitions
A cryptographic boundary is
“ | an explicitly defined contiguous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.[1] | ” |
“ | a logical container where all the relevant security components of a control system that employ cryptography reside. It includes the processing hardware, data, and memory as well as other critical components.[2] | ” |
References
- ↑ Unified Capabilities, Framework 2013, App. C, at C-10 (full-text). See also NIST, FIPS 140-1, at 13.
- ↑ Catalog of Control Systems Security: Recommendations for Standards Developers (Apr. 2011 version), at 162.