![Netscape Certificate Management System 6.2 Administrator'S Manual Download Page 708](http://html1.mh-extra.com/html/netscape/certificate-management-system-6-2/certificate-management-system-6-2_administrators-manual_1674697708.webp)
Security Requirements for the IT Environment
708
Netscape Certificate Management System Administrator’s Guide • June 2003
FPT_ITT.1 Basic internal TSF data transfer protection (iteration 1)
FPT_ITT.1.1
The IT environment shall protect security-relevant IT environment
data from modification when it is transmitted between separate parts of the IT
environment.
FPT_ITT.1 Basic internal TSF data transfer protection (iteration 2)
FPT_ITT.1.1
The IT environment shall protect confidential IT environment data
from disclosure when it is transmitted between separate parts of the IT
environment.
FPT_RVM.1 Non-bypassability of the TSP (iteration 1)
FPT_RVM.1.1
Each operating system in the IT environment shall ensure that its
policy enforcement functions are invoked and succeed before each function within
its scope of control is allowed to proceed.
FPT_SEP.1 TSF domain separation
FPT_SEP.1.1
Each operating system in the IT environment shall maintain a
security domain for its own execution that protects it from interference and
tampering by untrusted subjects.
FPT_SEP.1.2
Each operating system in the IT environment shall enforce
separation between the security domains of subjects in its scope of control.
FPT_STM.1 Reliable time stamps (iteration 1)
FPT_STM.1.1
The IT environment shall be able to provide reliable time stamps
for its own use.
FPT_TST_CIMC.2 Software/firmware integrity test
FPT_TST_CIMC.2.1
An error detection code (EDC) or FIPS-approved or
recommended authentication technique (e.g., the computation and verification of
an authentication code, keyed hash, or digital signature algorithm) shall be applied
to all security-relevant software and firmware residing within the CIMC (e.g.,
within EEPROM and RAM). The EDC shall be at least 16 bits in length.
FPT_TST_CIMC.2.2
The error detection code, authentication code, keyed hash,
or digital signature shall be verified at power-up and on-demand. If verification
fails, the IT environment shall [not enable the TOE].
Rationale
: This component is necessary to specify a unique requirement for
certificate issuing and management components that is not addressed by the CC. It
satisfies the security objective O.Integrity protection of user data and software and
O.Periodically check integrity.
Summary of Contents for Certificate Management System 6.2
Page 1: ...Administrator s Guide Netscape Certificate Management System Version6 2 June 2003...
Page 22: ...22 Netscape Certificate Management System Administrator s Guide June 2003...
Page 30: ...Documentation 30 Netscape Certificate Management System Administrator s Guide June 2003...
Page 84: ...Uninstalling CMS 84 Netscape Certificate Management System Administrator s Guide June 2003...
Page 380: ...ACL Reference 380 Netscape Certificate Management System Administrator s Guide June 2003...
Page 750: ...Object Identifiers 750 Netscape Certificate Management System Administrator s Guide June 2003...
Page 828: ...Managing Certificates 828 Netscape Certificate Manager System Administrator s Guide June 2003...
Page 844: ...The SSL Handshake 844 Netscape Certificate Manager System Administrator s Guide June 2003...
Page 862: ...862 Netscape Certificate Management System Administrator s Guide June 2003...