
1.2 Security Objectives for the Environment
708
Red Hat Certificate System Administrator’s Guide • September 2005
1.1.2 System
O. Preservation/trusted recovery of secure state
Preserve the secure state of the system in the event of a secure component failure and/or
recover to a secure state.
Sufficient backup storage and effective restoration
Provide sufficient backup storage and effective restoration to ensure that the system can be
recreated.
1.1.3 Cryptography
O. Non-repudiation
Prevent user from avoiding accountability for sending a message by providing evidence that
the user sent the message.
1.1.4 External Attacks
O. Control unknown source communication traffic
Control (e.g., reroute or discard) communication traffic from an unknown source to prevent
potential damage.
1.2 Security Objectives for the Environment
This section specifies the security objectives for the environment.
1.2.1 Non-IT security objectives for the environment
O. Administrators, Operators, Officers and Auditors guidance
documentation
Deter Administrator, Operator, Officer or Auditor errors by providing adequate
documentation on securely configuring and operating the CIMC.
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...