MNR S2500 Security Policy
Version 1.3, Revision Date: 1/13/2009
Page
2
TABLE OF CONTENTS
1. MODULE OVERVIEW .........................................................................................................................................3
2. SECURITY LEVEL ................................................................................................................................................4
3. MODES OF OPERATION.....................................................................................................................................4
4. PORTS AND INTERFACES .................................................................................................................................8
5. IDENTIFICATION AND AUTHENTICATION POLICY.................................................................................8
6. ACCESS CONTROL POLICY............................................................................................................................10
A
UTHENTICATED
S
ERVICES
.....................................................................................................................................10
U
NAUTHENTICATED
S
ERVICES
: ...............................................................................................................................10
R
OLES AND
S
ERVICES
..............................................................................................................................................11
D
EFINITION OF
C
RITICAL
S
ECURITY
P
ARAMETERS
(CSP
S
)......................................................................................12
D
EFINITION OF
CSP
S
M
ODES OF
A
CCESS
................................................................................................................13
7. OPERATIONAL ENVIRONMENT....................................................................................................................15
8. SECURITY RULES ..............................................................................................................................................15
9. CRYPTO OFFICER GUIDANCE.......................................................................................................................16
10. PHYSICAL SECURITY POLICY ....................................................................................................................17
P
HYSICAL
S
ECURITY
M
ECHANISMS
.........................................................................................................................17
11. MITIGATION OF OTHER ATTACKS POLICY...........................................................................................17
12. DEFINITIONS AND ACRONYMS...................................................................................................................17