
Understanding the Common Criteria Environment
698
Red Hat Certificate System Administrator’s Guide • September 2005
Operating System Environment
Because CS relies on the IT environment to provide the basic operating system file system
security, inter-process communication, and process space protection, it is highly
recommended that you install and run CS on an operation system certified at a Common
Criteria assurance level no less than the level of CS itself.
CS Roles Assignment
In order to maintain accountability, it is prudent to require individual users to log into their
individual accounts for regular CS operations and maintenance. To achieve this, you first
have to assign CS privilege roles to users. It is also recommended that the user ID at the
operating system level is the same user ID that is used in CS. CS allows more than one user
to have the same role (for example, you can have two CA agents); however, CS does not
allow one person to have more than one role within the same subsystem (for example, the
user Joe cannot be both the CA Administrator and Agent for the same CA subsystem). See
“CS Privileged Users and Groups (Roles)” on page 692, for a description of the various CS
privileged roles.
Who Needs to be Present
During the installation and configuration, the CS audit function is not operational, so it is
crucial that all CS roles be present to witness the installation and make necessary operations
and decisions.
Understanding Operating System Setup (Users,
Groups, and File Permissions)
There is a requirement to allow only the CS auditor to view the signed audit logs from the
IT environment, and a requirement to prohibit any one person from editing any CS
configuration undetected or unaccounted for. The procedure for setting up such an
environment on a Solaris 8.x system involves utilization of operating system users, groups,
and file system manipulation. The detailed procedure can be found in the CS Common
Criteria Environment Setup and Installation Process (see CS Common Criteria Setup
Procedure). If you are installing on a trusted operating system on which you can assign
privileges, you need to follow the operating system instructions on setting them to achieve
the proper levels of access.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...