BS ISO/IEC 27070:2021:2022 Edition
$142.49
Information technology. Security techniques. Requirements for establishing virtualized roots of trust
Published By | Publication Date | Number of Pages |
BSI | 2022 | 28 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
10 | 4 Symbols and abbreviated terms |
11 | 5 Functional view 5.1 Overview |
12 | 5.2 Hardware layer components 5.2.1 General 5.2.2 Functional requirements of key components 5.2.3 Security requirements of key components |
13 | 5.3 VMM layer components 5.3.1 Functional requirements of key components |
14 | 5.3.2 Security requirements of key components |
15 | 5.4 VM layer components |
16 | 5.5 Cloud OS layer components 5.5.1 General 5.5.2 Functional requirements of key components 5.5.3 Security requirements of key components |
17 | 6 Activity view 6.1 General 6.2 Transitive trust 6.2.1 General |
18 | 6.2.2 Transitive trust in host 6.2.3 Transitive trust in VMM 6.2.4 Transitive trust in VM 6.3 Integrity measurement |
19 | 6.4 Remote attestation |
20 | 6.5 Data protection 6.5.1 General 6.5.2 Data binding |
21 | 6.5.3 Data sealing |
22 | 6.6 vTM migration |
24 | Annex A (informative) Relationship between activity and functional views |
26 | Bibliography |