Appendix E Common Criteria Environment: Toe Security Environment Assumptions; 1.1 Secure Usage Assumptions; 1.1.1 Personnel Assumptions - Red Hat CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR Administrator's Manual

Hide thumbs Also See for CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR:
Table of Contents

Advertisement

The text in this document is copied directly from the ST (Security Target).
This section includes the following:

1.1 Secure Usage Assumptions

1.2 Threats
1.3 Organization Security Policies
1.1 Secure Usage Assumptions
The usage assumptions are organized in three categories: personnel (assumptions about
administrators and users of the system as well as any threat agents), physical (assumptions
about the physical location of the TOE or any attached peripheral devices), and connectivity
(assumptions about other IT systems that are necessary for the secure operation of the
TOE).

1.1.1 Personnel Assumptions

A. Auditors Review Audit Logs
Audit logs are required for security-relevant events and must be reviewed by the Auditors.
Common Criteria Environment: TOE
Security Environment Assumptions
Appendix E
Common Criteria Environment: TOE Security Environment Assumptions
1.1 Secure Usage Assumptions
Appendix E
715

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate system 7.1 - adminsistrator

Table of Contents