Appendix E Common Criteria Environment: Toe Security Environment Assumptions; Secure Usage Assumptions; Personnel Assumptions - Netscape MANAGEMENT SYSTEM 6.2 - ADMINISTRATOR Administrator's Manual

Table of Contents

Advertisement

Common Criteria Environment: TOE
The text in this document is copied directly from the ST (Security Target).
This section includes the following:

1.1 Secure Usage Assumptions

1.2 Threats
1.3 Organization Security Policies
1.1 Secure Usage Assumptions
The usage assumptions are organized in three categories: personnel (assumptions
about administrators and users of the system as well as any threat agents), physical
(assumptions about the physical location of the TOE or any attached peripheral
devices), and connectivity (assumptions about other IT systems that are necessary
for the secure operation of the TOE).

1.1.1 Personnel Assumptions

A. Auditors Review Audit Logs
Audit logs are required for security-relevant events and must be reviewed by the
Auditors.
Security Environment Assumptions
Appendix E
Common Criteria Environment: TOE Security Environment Assumptions
1.1 Secure Usage Assumptions
Appendix E
739

Advertisement

Table of Contents
loading

This manual is also suitable for:

Certificate management system 6.2

Table of Contents