Security Requirements for the IT Environment
Appendix
A
Common Criteria Environment: Security Requirements
675
FPT_TST_CIMC.3 Software/firmware load test
FPT_TST_CIMC.3.1
A cryptographic mechanism using a FIPS-approved or
recommended authentication technique (e.g., an authentication code, keyed hash,
or digital signature algorithm) shall be applied to all security-relevant software and
firmware that can be externally loaded into the CIMC.
FPT_TST_CIMC.3.2
The IT environment shall verify the authentication code,
keyed hash, or digital signature whenever the software or firmware is externally
loaded into the CIMC. If verification fails, the IT environment shall [not enable the
TOE
].
Rationale
: This component is necessary to specify a unique requirement for
certificate issuing and management components that is not addressed by the CC. It
satisfies the security objective O.Integrity protection of user data and software and
O.Periodically check integrity.
Trusted path/channels (FTP)
FTP_TRP.1 Trusted path
FTP_TRP.1.1
The IT environment shall provide a communication path between
itself and [local] users that is logically distinct from other communication paths
and provides assured identification of its end points and protection of the
communicated data from modification or disclosure.
FTP_TRP.1.2
The IT environment shall permit [local users] to initiate
communication via the trusted path.
FTP_TRP.1.3
The IT environment shall require the use of the trusted path for
initial user authentication, [and no other services].
CIMC TOE Access Control Policy
The TOE shall support the administration and enforcement of a CIMC TOE access
control policy that provides the capabilities described below.
Subjects (human users) will be granted access to objects (data/files) based upon
the:
1.
Identity of the subject requesting access,
2.
Role (or roles) the subject is authorized to assume,
3.
Type of access requested,
Содержание Certificate Management System 6.1
Страница 1: ...Administrator s Guide Netscape Certificate Management System Version6 1 February 2003...
Страница 28: ...Documentation 28 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 68: ...Support for Open Standards 68 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 82: ...Uninstalling CMS 82 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 166: ...How a Registration Manager Works 166 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 382: ...ACL Reference 382 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 566: ...Managing Policy Plug in Modules 566 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 710: ...1 3 Organization Security Policies 710 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 716: ...Object Identifiers 716 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 762: ...DNs in Certificate Management System 762 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 794: ...Managing Certificates 794 Managing Servers with Netscape Console December 2001...
Страница 810: ...The SSL Handshake 810 Managing Servers with Netscape Console December 2001...
Страница 828: ...828 Netscape Certificate Management System Administrator s Guide February 2003...