Specific Objectives
Security Design Practices that promote assurance and confidence in the module
Protection from unauthorized use
Protection from unauthorized disclosure
Protection of critical security parameters
Indication of module operational status
Prevention of undetected modification
Use of approved security methods