BSI 22/30395959 DC 2022
$13.70
BS ISO/IEC 27071. Information technology. Security techniques. Security recommendations for establishing trusted connections between devices and services
Published By | Publication Date | Number of Pages |
BSI | 2022 | 32 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions 3.1 General 3.2 Terms relating to cloud computing |
10 | 3.3 Terms relating to cloud computing roles and activities 3.4 Terms relating to security and privacy |
13 | 3.5 Miscellaneous terms 4 Symbols and abbreviated terms |
14 | 5 Framework and components for establishing a trusted connection 5.1 Overview |
18 | 5.2 Hardware security module 5.3 Root of trust 5.4 Identity 5.5 Authentication and key establishment 5.6 Remote attestation |
19 | 5.7 Data integrity and authenticity 5.8 Trusted user interface 6 Security recommendations for establishing a trusted connection 6.1 Hardware security module 6.2 Root of trust 6.3 Identity |
20 | 6.4 Authentication and key establishment 6.5 Remote attestation 6.6 Data Integrity and authenticity 6.7 Trusted user interface |
21 | Annex€A (informative) Threats |
26 | Annex€B (informative) Solutions for components of a trusted connection |
31 | Annex€C (informative) Example for establishing a trusted connection |
32 | Bibliography |