Explicitly defined continuous perimeter that establishes the physical and/or logical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.
Source(s):
CNSSI 4009-2015
from
ISO/IEC 19790
An explicitly defined contiguous perimeter that establishes the physical bounds around the set of hardware, software and firmware which is used to implement the TDEA and the associated cryptographic processes.
Source(s):
NIST SP 800-20
under Cryptographic boundary
An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all hardware, software, and/or firmware components of a cryptographic module.
Source(s):
NIST SP 800-57 Part 1 Rev. 5
under Cryptographic boundary
NIST SP 800-57 Part 1 Rev. 3
[Superseded]
under Cryptographic boundary
NIST SP 800-57 Part 1 Rev. 4
[Superseded]
under Cryptographic boundary
An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module.
Source(s):
NIST SP 800-175B Rev. 1
under Cryptographic boundary
NIST SP 800-57 Part 2 Rev.1
under Cryptographic boundary
An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software, and/or firmware components of a cryptographic module. See FIPS 140.
Source(s):
NIST SP 800-133 Rev. 2
under Cryptographic boundary
An explicitly defined continuous perimeter that establishes the physical bounds of a cryptographic module and contains all the hardware, software and/or firmware components of a cryptographic module. See FIPS 140.
Source(s):
NIST SP 800-133 Rev.1
[Superseded]
under Cryptographic boundary