The IT Law Wiki
mNo edit summary
Tag: sourceedit
mNo edit summary
Tag: sourceedit
Line 5: Line 5:
 
{{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds of a [[cryptographic module]] and contains all the [[hardware]], [[software]], and/or [[firmware]] components of a [[cryptographic module]].<ref>Unified Capabilities, Framework 2013, App. C, at C-10 ([http://www.disa.mil/Services/Network-Services/UCCO/~/media/Files/DISA/Services/UCCO/UCR2013/18_Framework_2013_App_C.pdf full-text]). ''See also'' [[NIST]], [[FIPS 140-1]], at 13.</ref>}}
 
{{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds of a [[cryptographic module]] and contains all the [[hardware]], [[software]], and/or [[firmware]] components of a [[cryptographic module]].<ref>Unified Capabilities, Framework 2013, App. C, at C-10 ([http://www.disa.mil/Services/Network-Services/UCCO/~/media/Files/DISA/Services/UCCO/UCR2013/18_Framework_2013_App_C.pdf full-text]). ''See also'' [[NIST]], [[FIPS 140-1]], at 13.</ref>}}
   
{{Quote|a [[logical]] container where all the relevant [[security component]]s of a [[control system]] that employ [[cryptography]] reside. It includes the [[data processing|processing]] [[hardware]], [[data]], and [[memory]] as well as other critical [[components.<ref>[[Catalog of Control Systems Security: Recommendations for Standards Developers]] (Apr. 2011 version), at 162.</ref>}}
+
{{Quote|a [[logical]] container where all the relevant [[security component]]s of a [[control system]] that employ [[cryptography]] reside. It includes the [[data processing|processing]] [[hardware]], [[data]], and [[memory]] as well as other critical [[component]]s.<ref>[[Catalog of Control Systems Security: Recommendations for Standards Developers]] (Apr. 2011 version), at 162.</ref>}}
   
 
== References ==
 
== References ==

Revision as of 05:00, 22 August 2016

Definitions

A cryptographic boundary is

an explicitly defined contiguous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.[1]
a logical container where all the relevant security components of a control system that employ cryptography reside. It includes the processing hardware, data, and memory as well as other critical components.[2]

References

  1. Unified Capabilities, Framework 2013, App. C, at C-10 (full-text). See also NIST, FIPS 140-1, at 13.
  2. Catalog of Control Systems Security: Recommendations for Standards Developers (Apr. 2011 version), at 162.