Security Objectives - Red Hat CERTIFICATE SYSTEM 8 - DEPLOYMENT Deployment Manual

Hide thumbs Also See for CERTIFICATE SYSTEM 8 - DEPLOYMENT:
Table of Contents

Advertisement

Objective Area
Modification of private/secret
keys
Sender denies sending
information
Hacker gains access
Hacker physical access
Social engineering
Table 6.3. Potential Threats

6.5.4. Security Objectives

In developing the Common Criteria environment, certain assumptions were made about the nature of
threats against the PKI environment, risk points, users, network environment, and, ultimately, the goals
of the secure environment.
Objective Area
Certificates
Preserve and trust the
recovery of a secure state
Non-repudiation
Control unknown source
communication traffic
Administrators, operators,
officers and auditors guidance
documentation
Auditors review audit logs
Authentication data
management
Communications protection
Competent administrators,
operators, officers and
auditors
CPS
Disposal of authentication
data
Installation
Description
A secret/private key is modified.
The sender of a message denies sending the message to avoid accountability for
inaction.
A hacker masquerades as an authorized user to perform operations that will be at
or gains undetected access to a system due to missing, weak and/or incorrectly im
violations of integrity, confidentiality, or availability.
A hacker physically interacts with the system to exploit vulnerabilities in the physic
compromises.
A hacker uses social engineering techniques to gain information about system ent
operation.
Description
Certificate System must be able to ensure that certificates, certificate revocation li
Certificate System must preserve the secure state of the system in the event of a
recover to a secure state.
Prevent user from avoiding accountability for sending a message by providing evid
Control (e.g., reroute or discard) communication traffic from an unknown source to
Deter Administrator, Operator, Officer or Auditor errors by providing adequate doc
the CIMC.
Identify and monitor security-relevant events by requiring auditors to review audit
risk.
Ensure that users change their authentication data at appropriate intervals and to
variations, etc.) through enforced authentication data management (Note: this obje
data.)
Protect the system against a physical attack on the communications capability by
Provide capable management of Certificate System by assigning competent Admi
manage Certificate System and the security of the information it contains.
All Administrators, Operators, Officers and Auditors shall be familiar with the certif
statement (CPS) under which Certificate System is operated.
Provide proper disposal of authentication data and associated privileges after acc
change in responsibility).
Those responsible for Certificate System must ensure that Certificate System is d
manner which maintains IT security.
Security Objectives
85

Advertisement

Table of Contents
loading

Table of Contents