July 2019
Intermediate to advanced
420 pages
8h 47m
English
Table A5.1. Definitions of FRs
| Fundamental requirement | SL1 | SL2 | SL3 | SL4 |
| FR 1 – Identification and authentication control (IAC) | ||||
| SR 1.1 – Human user identification and authentication | x | x | x | x |
| SR 1.1 RE 1 – Unique identification and authentication | x | x | ||
| SR 1.1 RE 2 – Multifactor authentication for untrusted networks | x | x | ||
| SR 1.1 RE 3 – Multifactor authentication for all networks | x | |||
| SR 1.2 – Software process and device identification and authentication | x | x | x | |
| SR 1.2 RE 1 – Unique identification and authentication | x | x | ||
| SR 1.3 – Account management | x | x | x | x |
| SR 1.3 RE 1 – Unified account management | x | x | ||
| SR 1.4 – Identifier management | x | x | x | x |
| SR 1.5 – Authenticator management | x | x | x | x |
| SR 1.5 RE 1 – Hardware security for software process identity credentials | x | x | ||
| SR 1.6 – Wireless access management | x | x | x | x |
| SR 1.6 RE 1 – Unique identification and authentication | x | x | ||
| SR 1.7 – Strength of password-based authentication | x | x | x | x |
| SR 1.7 RE 1 – Password generation and lifetime restrictions for human users | x | x | ||
| SR 1.7 RE 2 – Password lifetime restrictions for all users | x | |||
| SR 1.8 – Public key infrastructure certificates | x | x | x | |
| SR 1.9 – Strength of public key authentication | x | x | x | |
| SR 1.9 RE 1 – Hardware security for public key authentication | x | x | ||
| SR 1.10 – Authenticator feedback | x | x | x | x |
| SR 1.11 – Unsuccessful login attempts | x | x | x | x |
| SR 1.12 – System use notification | x | x | x | x |
| SR 1.13 – Access ... |