No edit summary |
(Adding categories) Tag: categoryselect |
||
(3 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | == |
+ | == Definitions == |
A '''cryptographic boundary''' is |
A '''cryptographic boundary''' is |
||
− | {{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds of a [[cryptographic module]].<ref>[[NIST]], [[FIPS 140-1]], at 13.</ref>}} |
+ | {{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds of a [[cryptographic module]] and contains all the [[hardware]], [[software]], and/or [[firmware]] components of a [[cryptographic module]].<ref>Unified Capabilities, Framework 2013, App. C, at C-10 ([http://www.disa.mil/Services/Network-Services/UCCO/~/media/Files/DISA/Services/UCCO/UCR2013/18_Framework_2013_App_C.pdf full-text]). ''See also'' [[NIST]], [[FIPS 140-1]], at 13.</ref>}} |
+ | |||
+ | {{Quote|a [[logical]] container where all the relevant [[security component]]s of a [[control system]] that employ [[cryptography]] reside. It includes the [[data processing|processing]] [[hardware]], [[data]], and [[memory]] as well as other critical [[component]]s.<ref>[[Catalog of Control Systems Security: Recommendations for Standards Developers]] (Apr. 2011 version), at 162.</ref>}} |
||
== References == |
== References == |
||
Line 9: | Line 11: | ||
[[Category:Security]] |
[[Category:Security]] |
||
[[Category:Definition]] |
[[Category:Definition]] |
||
+ | [[Category:Encryption]] |
Latest revision as of 23:17, 29 August 2017
Definitions[]
A cryptographic boundary is
“ | an explicitly defined contiguous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.[1] | ” |
“ | a logical container where all the relevant security components of a control system that employ cryptography reside. It includes the processing hardware, data, and memory as well as other critical components.[2] | ” |
References[]
- ↑ Unified Capabilities, Framework 2013, App. C, at C-10 (full-text). See also NIST, FIPS 140-1, at 13.
- ↑ Catalog of Control Systems Security: Recommendations for Standards Developers (Apr. 2011 version), at 162.