1.1.2 Physical Assumptions; 1.1.3 Connectivity Assumptions; 1.2 Threats; 1.2.1 Authorized Users - Red Hat CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR Administrator's Manual

Hide thumbs Also See for CERTIFICATE SYSTEM 7.1 - ADMINISTRATOR:
Table of Contents

Advertisement

1.2 Threats

1.1.2 Physical Assumptions

A. Communications Protection
The system is adequately physically protected against loss of communications i.e.,
availability of communications.
A. Physical Protection
The TOE hardware, software, and firmware critical to security policy enforcement will be
protected from unauthorized physical modification.

1.1.3 Connectivity Assumptions

A. Operating System
The operating system has been selected to provide the functions required by this CIMC to
counter the perceived threats for the appropriate Security Level identified in this family of
PPs ( This assumption has been copied directly from the CIMC PP. In the context of this
ST, "appropriate Security Level identified in this family of PPs" reflects Security Level 3
as represented by this ST).
1.2 Threats
The threats are organized in four categories: authorized users, system, cryptography, and
external attacks.

1.2.1 Authorized Users

T. Administrative errors of omission
Administrators, Operators, Officers or Auditors fail to perform some function essential to
security.
T. User abuses authorization to collect and/or send data
User abuses granted authorizations to improperly collect and/or send sensitive or
security-critical data.
Appendix E
Common Criteria Environment: TOE Security Environment Assumptions
717

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate system 7.1 - adminsistrator

Table of Contents