Access Controls For Common Criteria; Security Objectives For The Common Criteria Environment For Certificate System; Usage Assumptions - Red Hat CERTIFICATE SYSTEM 8 - DEPLOYMENT Deployment Manual

Hide thumbs Also See for CERTIFICATE SYSTEM 8 - DEPLOYMENT:
Table of Contents

Advertisement

6.4.2. Access Controls for Common Criteria

All of the subsystems and supporting network environment must support and enforce an access
control policy with the following restrictions:
• Users are only granted access to the subsystem and its data if they meet the following
requirements:
• The identity of the user is verified
• Access is allowed to the role (or roles) to which the user belongs
• The type of access is allowed
• The content of the access request is allowed
• The users possession of a secret or private key, as required
• Access must be explicitly allowed or denied, and the only permissible access types are read, write,
and execute.
• An explicit owner and role is identified for every subsystem object. Assigning and managing
authorization is the responsibility of the owner or role.
6.5. Security Objectives for the Common Criteria
Environment for Certificate System
The process for developing and defining the Certificate System Common Criteria environment had to
include defining the assumptions for how the product is used, what its potential threats are, and what
the goals of the security environment are.

6.5.1. Usage Assumptions

Usage assumptions define real-world deployment considerations, looking at people who interact with
the system, its physical location and security, and its network environment.
Objective Area
Auditors review audit logs
Authentication data
management
Competent administrators,
operators, officers and
auditors
CPS
Disposal of authentication
data
Malicious code not signed
Notify authorities of security
issues
Description
Audit logs are required for security-relevant events and must be reviewed by the A
An authentication data management policy is enforced to ensure that users chang
and to appropriate values (e.g., proper lengths, histories, variations, etc.) (Note: th
authentication data.)
Competent Administrators, Operators, Officers and Auditors will be assigned to m
information it contains.
All Administrators, Operators, Officers, and Auditors are familiar with the certificate
(CPS) under which Certificate System is operated.
Proper disposal of authentication data and associated privileges is performed afte
change in responsibility).
Malicious code destined for Certificate System is not signed by a trusted entity.
Administrators, Operators, Officers, Auditors, and other users notify proper author
systems to minimize the potential for the loss or compromise of data.
Access Controls for Common Criteria
83

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CERTIFICATE SYSTEM 8 - DEPLOYMENT and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Table of Contents