BS ISO 22383:2020
$167.15
Security and resilience. Authenticity, integrity and trust for products and documents. Guidelines for the selection and performance evaluation of authentication solutions for material goods
Published By | Publication Date | Number of Pages |
BSI | 2020 | 36 |
This document gives guidelines for performance criteria and an evaluation methodology for authentication solutions that aim to unambiguously establish material good authenticity and integrity throughout an entire material goodās life cycle. It focuses on the authentication of a material good and, if appropriate, its components, parts and related data:
-
covered by intellectual property rights;
-
covered by relevant international, regional or national regulations;
-
with counterfeiting-related implications;
-
otherwise with a distinctive identity.
This document is applicable to all types and sizes of organizations that require the ability to validate the authenticity and integrity of material goods. It will help organizations to determine the categories of authentication elements they need in order to combat counterfeiting-related risks, and the criteria for selecting authentication elements, after having undertaken a counterfeiting risk assessment.
Authentication solutions can be used in areas such as anti-counterfeiting, prevention of product fraud and prevention of diversion.
This document does not specify economic criteria aiming to correlate performance and costs of the authentication solutions.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
6 | Foreword |
7 | Introduction |
11 | 1 Scope 2 Normative references 3 Terms and definitions |
13 | 4 Principles 4.1 General |
14 | 4.2 Security-by-design process for authentication solutions |
15 | 4.3 Categorization of authentication solutions 4.3.1 General |
16 | 4.3.2 Provision of knowledge 4.3.3 Sourcing and production of authentication elements and tools 4.3.4 Inspection |
17 | 4.3.5 Categories of authentication elements |
18 | 5 Performance criteria specification based on risk analysis 5.1 General |
19 | 5.2 Risk analysis elements 5.3 Performance criteria categories 5.4 Criteria for selection of authentication elements 5.4.1 Physical characteristics |
20 | 5.4.2 Attack resistance |
21 | 5.4.3 Integration process |
22 | 5.5 Attack-resistance criteria for selection of authentication tools 5.5.1 General 5.5.2 Obsolescence 5.5.3 Assessment of vulnerability and resistance of authentication tools 5.6 Criteria for selection of authentication elements and tools |
23 | 5.7 Criteria for selection of authentication solutions 5.7.1 Location/environment for authentication process 5.7.2 Authentication parameters 5.7.3 Life cycle criteria 5.7.4 Security policy |
24 | 5.7.5 Compliance with regulations, security practices and quality procedures 5.7.6 Operation 5.7.7 Ability to evaluate the performance of the authentication solution |
25 | 6 Effectiveness assessment of authentication solutions 6.1 General 6.2 Definition of effectiveness assessment protocols |
27 | 6.3 Effectiveness assessment in manufacturing of authentication elements 6.4 Effectiveness of delivery of authentication elements 6.5 Effectiveness of application of authentication elements 6.6 Data management |
28 | 6.7 Effectiveness measurement in normal verification/authentication situations 6.8 Effectiveness assessment in emergency verification/authentication situations 6.9 Impact of verification results and corrective actions |
29 | Annex A (informative) Assessment grid |
34 | Annex B (informative) Control means access table |
35 | Bibliography |