
Security Requirements for the IT Environment
682
Red Hat Certificate System Administrator’s Guide • September 2005
FDP_ITT.1.1
The IT environment shall enforce the CIMC IT Environment Access
Control Policy specified in “CIMC TOE Access Control Policy,” on page 687 to prevent the
modification of security-relevant user data when it is transmitted between
physically-separated parts of the IT environment.
FDP_ITT.1 Basic internal transfer protection (iteration 2)
FDP_ITT.1.1
The IT environment shall enforce the CIMC IT Environment Access
Control Policy specified in “CIMC TOE Access Control Policy,” on page 687 to prevent the
disclosure of confidential user data when it is transmitted between physically-separated
parts of the IT environment.
FDP_UCT.1 Basic data exchange confidentiality (iteration 1)
FDP_UCT.1.1
The IT environment shall enforce the CIMC IT Environment Access
Control Policy specified in “CIMC TOE Access Control Policy,” on page 687 to be able to
transmit objects in a manner protected from unauthorized disclosure.
Identification and authentication (FIA)
FIA_AFL.1 Authentication failure handling
FIA_AFL.1.1
If authentication is not performed in a cryptographic module that has been
FIPS 140-1 validated to an overall Level of 2 or higher with Level 3 or higher for Roles and
Services, the IT environment shall detect when an Administrator configurable maximum
authentication attempts unsuccessful authentication attempts have occurred since the last
successful authentication for the indicated user identity.
FIA_AFL.1.2
When the defined number of unsuccessful authentication attempts has
been met or surpassed, the IT environment shall [
disable the corresponding user
account
].
FIA_ATD.1 User attribute definition
FIA_ATD.1.1
The IT environment shall maintain the following list of security attributes
belonging to individual users: the set of roles that the user is authorized to assume, [
and no
other security attributes
].
FIA_UAU.1 Timing of authentication (iteration 1)
FIA_UAU.1.1
The IT environment shall allow [
HTTP and LDAP based services
1
] on
behalf of the user to be performed before the user is authenticated.
1. These are the services that are controlled by CS6.1 and are not subject to media-
tion by the IT environment.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...