
Security Requirements for the IT Environment
Appendix A
Common Criteria Environment: Security Requirements
685
Protection of the TSF (FPT)
FPT_AMT.1 Abstract machine testing
FPT_AMT.1.1
The IT environment shall run a suite of tests [
other conditions: during
initial start-up, periodically during normal operation, or at the request of an
authorized user
] to demonstrate the correct operation of the security assumptions provided
by the abstract machine that underlies the IT environment.
FPT_ITC.1 Inter-TSF confidentiality during transmission (iteration 1)
FPT_ITC.1.1
The IT environment shall protect confidential IT environment data
transmitted from the
IT environment to a remote trusted IT product from unauthorized disclosure during
transmission.
FPT_ITT.1 Basic internal TSF data transfer protection (iteration 1)
FPT_ITT.1.1
The IT environment shall protect security-relevant IT environment data
from modification when it is transmitted between separate parts of the IT environment.
FPT_ITT.1 Basic internal TSF data transfer protection (iteration 2)
FPT_ITT.1.1
The IT environment shall protect confidential IT environment data from
disclosure when it is transmitted between separate parts of the IT environment.
FPT_RVM.1 Non-bypassability of the TSP (iteration 1)
FPT_RVM.1.1
Each operating system in the IT environment shall ensure that its policy
enforcement functions are invoked and succeed before each function within its scope of
control is allowed to proceed.
FPT_SEP.1 TSF domain separation
FPT_SEP.1.1
Each operating system in the IT environment shall maintain a security
domain for its own execution that protects it from interference and tampering by untrusted
subjects.
FPT_SEP.1.2
Each operating system in the IT environment shall enforce separation
between the security domains of subjects in its scope of control.
FPT_STM.1 Reliable time stamps (iteration 1)
FPT_STM.1.1
The IT environment shall be able to provide reliable time stamps for its
own use.
FPT_TST_CIMC.2 Software/firmware integrity test
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...