
Security Requirements for the IT Environment
680
Red Hat Certificate System Administrator’s Guide • September 2005
FAU_GEN.2 User identity association (iteration 1)
FAU_GEN.2.1
The IT environment shall be able to associate each auditable event with
the identity of the user that caused the event.
FAU_SAR.1 Audit review
FAU_SAR.1.1
The IT environment shall provide Auditors with the capability to read all
information from the audit records.
FAU_SAR.1.2
The IT environment shall provide the audit records in a manner suitable
for the user to interpret the information.
FAU_SAR.3 Selectable audit review
FAU_SAR.3.1
The IT environment shall provide the ability to perform searches of audit
data based on the type of event, the user responsible for causing the event, and as specified
in Table A-3 below.
FAU_SEL.1 Selective audit (iteration 1)
FAU_SEL.1.1
The IT environment shall be able to include or exclude auditable events
from the set of audited events based on the following attributes:
a) [
event type
].
FAU_STG.1 Protected audit trail storage (iteration 1)
FAU_STG.1.1
The IT environment shall protect the stored audit records from
unauthorized deletion.
FAU_STG.1.2
The IT environment shall be able to detect modifications to the audit
records.
FAU_STG.4 Prevention of audit data loss (iteration 1)
FAU_STG.4.1
The IT environment shall prevent auditable events, except those taken by
the Auditor, if the audit trail is full.
Table A-3
Audit Search Criteria
Section/Function
Search Criteria
Certificate Request Remote and Local Data Entry
Identity of the subject of the certificate being
requested
Certificate Revocation Request Remote and Local
Data Entry
Identity of the subject of the certificate to be revoked
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...