Protection Of The Tsf (Fpt) - Netscape MANAGEMENT SYSTEM 6.1 - ADMINISTRATOR Administrator's Manual

Table of Contents

Advertisement

FMT_MTD.1.1 The IT environment shall restrict the ability to view (read) or
delete the audit logs to Auditors.
FMT_SMR.2 Restrictions on security roles
FMT_SMR.2.1 The IT environment shall maintain the roles: Administrator,
Auditor, and Officer.
FMT_SMR.2.2 The IT environment shall be able to associate users with roles.
FMT_SMR.2.3 The IT environment shall ensure that:
no identity is authorized to assume both an Administrator and an Officer role;
1.
no identity is authorized to assume both an Auditor and an Officer role; and
2.
no identity is authorized to assume both an Administrator and an Auditor role.
3.
NOTE
The role definitions are listed below:
Administrator – role authorized to install, configure, and
1.
maintain the CIMC; establish and maintain user accounts;
configure profiles and audit parameters; and generate
Component keys.
Officer – role authorized to request or approve certificates or
2.
certificate revocations.
Auditor – role authorized to view and maintain audit logs.
3.

Protection of the TSF (FPT)

FPT_AMT.1 Abstract machine testing
FPT_AMT.1.1 The IT environment shall run a suite of tests [other conditions:
during initial start-up, periodically during normal operation, or at the request of
an authorized user] to demonstrate the correct operation of the security
assumptions provided by the abstract machine that underlies the IT environment.
FPT_ITC.1 Inter-TSF confidentiality during transmission (iteration 1)
FPT_ITC.1.1
The IT environment shall protect confidential IT environment data
transmitted from the
IT environment to a remote trusted IT product from unauthorized disclosure
during transmission.
Appendix A
Common Criteria Environment: Security Requirements
Security Requirements for the IT Environment
673

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate management system 6.1

Table of Contents