Trusted Path/Channels (Ftp) - Red Hat CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR Administrator's Manual

Hide thumbs Also See for CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR:
Table of Contents

Advertisement

Security Requirements for the IT Environment
FPT_TST_CIMC.2.1
recommended authentication technique (e.g., the computation and verification of an
authentication code, keyed hash, or digital signature algorithm) shall be applied to all
security-relevant software and firmware residing within the CIMC (e.g., within EEPROM
and RAM). The EDC shall be at least 16 bits in length.
FPT_TST_CIMC.2.2
digital signature shall be verified at power-up and on-demand. If verification fails, the IT
environment shall [not enable the TOE].
Rationale: This component is necessary to specify a unique requirement for certificate
issuing and management components that is not addressed by the CC. It satisfies the
security objective O.Integrity protection of user data and software and O.Periodically check
integrity.
FPT_TST_CIMC.3 Software/firmware load test
FPT_TST_CIMC.3.1
recommended authentication technique (e.g., an authentication code, keyed hash, or digital
signature algorithm) shall be applied to all security-relevant software and firmware that can
be externally loaded into the CIMC.
FPT_TST_CIMC.3.2
hash, or digital signature whenever the software or firmware is externally loaded into the
CIMC. If verification fails, the IT environment shall [not enable the TOE].
Rationale: This component is necessary to specify a unique requirement for certificate
issuing and management components that is not addressed by the CC. It satisfies the
security objective O.Integrity protection of user data and software and O.Periodically check
integrity.

Trusted path/channels (FTP)

FTP_TRP.1 Trusted path
FTP_TRP.1.1
and [local] users that is logically distinct from other communication paths and provides
assured identification of its end points and protection of the communicated data from
modification or disclosure.
FTP_TRP.1.2
via the trusted path.
FTP_TRP.1.3
user authentication, [and no other services].
686
Red Hat Certificate System Administrator's Guide • September 2005
An error detection code (EDC) or FIPS-approved or
The error detection code, authentication code, keyed hash, or
A cryptographic mechanism using a FIPS-approved or
The IT environment shall verify the authentication code, keyed
The IT environment shall provide a communication path between itself
The IT environment shall permit [local users] to initiate communication
The IT environment shall require the use of the trusted path for initial

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Certificate system 7.1 - adminsistrator

Table of Contents