Netscape MANAGEMENT SYSTEM 6.1 - ADMINISTRATOR Administrator's Manual page 674

Table of Contents

Advertisement

Security Requirements for the IT Environment
FPT_ITT.1 Basic internal TSF data transfer protection (iteration 1)
FPT_ITT.1.1
data from modification when it is transmitted between separate parts of the IT
environment.
FPT_ITT.1 Basic internal TSF data transfer protection (iteration 2)
FPT_ITT.1.1
from disclosure when it is transmitted between separate parts of the IT
environment.
FPT_RVM.1 Non-bypassability of the TSP (iteration 1)
FPT_RVM.1.1 Each operating system in the IT environment shall ensure that its
policy enforcement functions are invoked and succeed before each function within
its scope of control is allowed to proceed.
FPT_SEP.1 TSF domain separation
FPT_SEP.1.1
security domain for its own execution that protects it from interference and
tampering by untrusted subjects.
FPT_SEP.1.2
separation between the security domains of subjects in its scope of control.
FPT_STM.1 Reliable time stamps (iteration 1)
FPT_STM.1.1
for its own use.
FPT_TST_CIMC.2 Software/firmware integrity test
FPT_TST_CIMC.2.1
recommended authentication technique (e.g., the computation and verification of
an authentication code, keyed hash, or digital signature algorithm) shall be applied
to all security-relevant software and firmware residing within the CIMC (e.g.,
within EEPROM and RAM). The EDC shall be at least 16 bits in length.
FPT_TST_CIMC.2.2
or digital signature shall be verified at power-up and on-demand. If verification
fails, the IT environment shall [not enable the TOE].
Rationale : This component is necessary to specify a unique requirement for
certificate issuing and management components that is not addressed by the CC. It
satisfies the security objective O.Integrity protection of user data and software and
O.Periodically check integrity.
674
Netscape Certificate Management System Administrator's Guide • February 2003
The IT environment shall protect security-relevant IT environment
The IT environment shall protect confidential IT environment data
Each operating system in the IT environment shall maintain a
Each operating system in the IT environment shall enforce
The IT environment shall be able to provide reliable time stamps
An error detection code (EDC) or FIPS-approved or
The error detection code, authentication code, keyed hash,

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate management system 6.1

Table of Contents