Protection Of The Tsf (Fpt) - Red Hat CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR Administrator's Manual

Hide thumbs Also See for CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR:
Table of Contents

Advertisement

Protection of the TSF (FPT)

FPT_AMT.1 Abstract machine testing
FPT_AMT.1.1 The IT environment shall run a suite of tests [other conditions: during
initial start-up, periodically during normal operation, or at the request of an
authorized user] to demonstrate the correct operation of the security assumptions provided
by the abstract machine that underlies the IT environment.
FPT_ITC.1 Inter-TSF confidentiality during transmission (iteration 1)
FPT_ITC.1.1
The IT environment shall protect confidential IT environment data
transmitted from the
IT environment to a remote trusted IT product from unauthorized disclosure during
transmission.
FPT_ITT.1 Basic internal TSF data transfer protection (iteration 1)
FPT_ITT.1.1
The IT environment shall protect security-relevant IT environment data
from modification when it is transmitted between separate parts of the IT environment.
FPT_ITT.1 Basic internal TSF data transfer protection (iteration 2)
FPT_ITT.1.1
The IT environment shall protect confidential IT environment data from
disclosure when it is transmitted between separate parts of the IT environment.
FPT_RVM.1 Non-bypassability of the TSP (iteration 1)
FPT_RVM.1.1 Each operating system in the IT environment shall ensure that its policy
enforcement functions are invoked and succeed before each function within its scope of
control is allowed to proceed.
FPT_SEP.1 TSF domain separation
FPT_SEP.1.1
Each operating system in the IT environment shall maintain a security
domain for its own execution that protects it from interference and tampering by untrusted
subjects.
FPT_SEP.1.2
Each operating system in the IT environment shall enforce separation
between the security domains of subjects in its scope of control.
FPT_STM.1 Reliable time stamps (iteration 1)
FPT_STM.1.1
The IT environment shall be able to provide reliable time stamps for its
own use.
FPT_TST_CIMC.2 Software/firmware integrity test
Appendix A
Common Criteria Environment: Security Requirements
Security Requirements for the IT Environment
685

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate system 7.1 - adminsistrator

Table of Contents