Section 1: Cryptographic Module Specifcation
Section 2: Module Ports and Interfaces
Section 3: Roles, Services, and Authentication
Section C: Cryptographic Security Policy