
Security Requirements for the IT Environment
Appendix A
Common Criteria Environment: Security Requirements
687
CIMC TOE Access Control Policy
The TOE shall support the administration and enforcement of a CIMC TOE access control
policy that provides the capabilities described below.
Subjects (human users) will be granted access to objects (data/files) based upon the:
1.
Identity of the subject requesting access,
2.
Role (or roles) the subject is authorized to assume,
3.
Type of access requested,
4.
Content of the access request, and,
5.
Possession of a secret or private key, if required.
Subject identification includes:
•
Individuals with different access authorizations
•
Roles with different access authorizations
•
Individuals assigned to one or more roles with different access authorizations
Access type, with explicit allow or deny:
•
Read
•
Write
•
Execute
For each object, an explicit owning subject and role will be identified. Also, the assignment
and management of authorizations will be the responsibility of the owner of an object or a
role(s), as specified in this PP.
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...