![Netscape Certificate Management System 6.2 Administrator'S Manual Download Page 709](http://html1.mh-extra.com/html/netscape/certificate-management-system-6-2/certificate-management-system-6-2_administrators-manual_1674697709.webp)
Security Requirements for the IT Environment
Appendix
A
Common Criteria Environment: Security Requirements
709
FPT_TST_CIMC.3 Software/firmware load test
FPT_TST_CIMC.3.1
A cryptographic mechanism using a FIPS-approved or
recommended authentication technique (e.g., an authentication code, keyed hash,
or digital signature algorithm) shall be applied to all security-relevant software and
firmware that can be externally loaded into the CIMC.
FPT_TST_CIMC.3.2
The IT environment shall verify the authentication code,
keyed hash, or digital signature whenever the software or firmware is externally
loaded into the CIMC. If verification fails, the IT environment shall [not enable the
TOE
].
Rationale
: This component is necessary to specify a unique requirement for
certificate issuing and management components that is not addressed by the CC. It
satisfies the security objective O.Integrity protection of user data and software and
O.Periodically check integrity.
Trusted path/channels (FTP)
FTP_TRP.1 Trusted path
FTP_TRP.1.1
The IT environment shall provide a communication path between
itself and [local] users that is logically distinct from other communication paths
and provides assured identification of its end points and protection of the
communicated data from modification or disclosure.
FTP_TRP.1.2
The IT environment shall permit [local users] to initiate
communication via the trusted path.
FTP_TRP.1.3
The IT environment shall require the use of the trusted path for
initial user authentication, [and no other services].
CIMC TOE Access Control Policy
The TOE shall support the administration and enforcement of a CIMC TOE access
control policy that provides the capabilities described below.
Subjects (human users) will be granted access to objects (data/files) based upon
the:
1.
Identity of the subject requesting access,
2.
Role (or roles) the subject is authorized to assume,
3.
Type of access requested,
Summary of Contents for Certificate Management System 6.2
Page 1: ...Administrator s Guide Netscape Certificate Management System Version6 2 June 2003...
Page 22: ...22 Netscape Certificate Management System Administrator s Guide June 2003...
Page 30: ...Documentation 30 Netscape Certificate Management System Administrator s Guide June 2003...
Page 84: ...Uninstalling CMS 84 Netscape Certificate Management System Administrator s Guide June 2003...
Page 380: ...ACL Reference 380 Netscape Certificate Management System Administrator s Guide June 2003...
Page 750: ...Object Identifiers 750 Netscape Certificate Management System Administrator s Guide June 2003...
Page 828: ...Managing Certificates 828 Netscape Certificate Manager System Administrator s Guide June 2003...
Page 844: ...The SSL Handshake 844 Netscape Certificate Manager System Administrator s Guide June 2003...
Page 862: ...862 Netscape Certificate Management System Administrator s Guide June 2003...