Cryptographic Support (Fcs); User Data Protection (Fdp) - Netscape MANAGEMENT SYSTEM 6.1 - ADMINISTRATOR Administrator's Manual

Table of Contents

Advertisement

FAU_SEL.1.1
The IT environment shall be able to include or exclude auditable
events from the set of audited events based on the following attributes:
a)
[event type].
FAU_STG.1 Protected audit trail storage (iteration 1)
FAU_STG.1.1 The IT environment shall protect the stored audit records from
unauthorized deletion.
FAU_STG.1.2 The IT environment shall be able to detect modifications to the
audit records.
FAU_STG.4 Prevention of audit data loss (iteration 1)
FAU_STG.4.1 The IT environment shall prevent auditable events, except those
taken by the Auditor, if the audit trail is full.

Cryptographic support (FCS)

FCS_CKM.1 Cryptographic key generation
FCS_CKM.1.1 The FIPS 140-1 validated cryptographic module shall generate
cryptographic keys in accordance with [any FIPS-approved or recommended
cryptographic key generation algorithm] that meet the following: [FIPS 140-1].
FCS_CKM.4 Cryptographic key destruction
FCS_CKM.4.1 The IT environment shall destroy cryptographic keys in
accordance with a specified cryptographic key destruction method [any
FIPS-approved or recommended key destruction method] that meets the
following: [FIPS 140-1].
FCS_COP.1 Cryptographic operation
FCS_COP.1.1
The FIPS 140-1 validated cryptographic module shall perform [all
cryptographic operations] in accordance with [FIPS-approved or recommended
algorithms].

User Data Protection (FDP)

FDP_ACC.1 Subset access control (iteration 1)
FDP_ACC.1.1 The IT environment shall enforce the CIMC IT Environment
Access Control Policy specified in "CIMC TOE Access Control Policy," on page 675
on [users, files, and access to files].
Appendix A
Common Criteria Environment: Security Requirements
Security Requirements for the IT Environment
669

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate management system 6.1

Table of Contents