Résumé
PrévisualiserThis document provides a framework and recommendations for establishing trusted connections between devices and services based on hardware security modules. It includes recommendations for components such as: hardware security module, roots of trust, identity, authentication and key establishment, remote attestation, data integrity and authenticity.
This document is applicable to scenarios that establish trusted connections between devices and services based on hardware security modules.
This document does not address privacy concerns.
-
État actuel: PubliéeDate de publication: 2023-07
-
Edition: 1
-
Comité technique: ISO/IEC JTC 1/SC 27 Sécurité de l’information, cybersécurité et protection de la vie privée
-
- ICS :
- 35.030 Sécurité des technologies de l’information
Acheter cette norme
fr
Format | Langue | |
---|---|---|
std 1 124 | PDF + ePub | |
std 2 124 | Papier |
- CHF124
Cycle de vie
Vous avez une question?
Consulter notre FAQ
Service à la clientèle
+41 22 749 08 88
Horaires d’ouverture:
De lundi à vendredi - 09:00-12:00, 14:00-17:00 (UTC+1)