Résumé
This document provides a framework and recommendations for establishing trusted connections between devices and services based on hardware security modules. It includes recommendations for components such as: hardware security module, roots of trust, identity, authentication and key establishment, remote attestation, data integrity and authenticity.
This document is applicable to scenarios that establish trusted connections between devices and services based on hardware security modules.
This document does not address privacy concerns.
Informations générales
-
État actuel: PubliéeDate de publication: 2023-07Stade: Norme internationale publiée [60.60]
-
Edition: 1
-
Comité technique :ISO/IEC JTC 1/SC 27ICS :35.030
- RSS mises à jour
Prévisualiser
Prévisualiser cette norme sur notre Plateforme de consultation en ligne (OBP)
Cycle de vie
Vous avez une question?
Consulter notre FAQ
Service à la clientèle
+41 22 749 08 88
Horaires d’ouverture:
De lundi à vendredi - 09:00-12:00, 14:00-17:00 (UTC+1)