The IT Law Wiki
No edit summary
(Adding categories)
Tag: categoryselect
 
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Definition ==
+
== Definitions ==
   
 
A '''cryptographic boundary''' is
 
A '''cryptographic boundary''' is
   
{{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds of a [[cryptographic module]].<ref>[[NIST]], [[FIPS 140-1]], at 13.</ref>}}
+
{{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds of a [[cryptographic module]] and contains all the [[hardware]], [[software]], and/or [[firmware]] components of a [[cryptographic module]].<ref>Unified Capabilities, Framework 2013, App. C, at C-10 ([http://www.disa.mil/Services/Network-Services/UCCO/~/media/Files/DISA/Services/UCCO/UCR2013/18_Framework_2013_App_C.pdf full-text]). ''See also'' [[NIST]], [[FIPS 140-1]], at 13.</ref>}}
  +
  +
{{Quote|a [[logical]] container where all the relevant [[security component]]s of a [[control system]] that employ [[cryptography]] reside. It includes the [[data processing|processing]] [[hardware]], [[data]], and [[memory]] as well as other critical [[component]]s.<ref>[[Catalog of Control Systems Security: Recommendations for Standards Developers]] (Apr. 2011 version), at 162.</ref>}}
   
 
== References ==
 
== References ==
Line 9: Line 11:
 
[[Category:Security]]
 
[[Category:Security]]
 
[[Category:Definition]]
 
[[Category:Definition]]
  +
[[Category:Encryption]]

Latest revision as of 23:17, 29 August 2017

Definitions[]

A cryptographic boundary is

an explicitly defined contiguous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.[1]
a logical container where all the relevant security components of a control system that employ cryptography reside. It includes the processing hardware, data, and memory as well as other critical components.[2]

References[]

  1. Unified Capabilities, Framework 2013, App. C, at C-10 (full-text). See also NIST, FIPS 140-1, at 13.
  2. Catalog of Control Systems Security: Recommendations for Standards Developers (Apr. 2011 version), at 162.