HP A-Series Spezifikationen Seite 2

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 66
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 1
Security Target Version 1.02, 08/16/2013
2
1. SECURITY TARGET INTRODUCTION ........................................................................................................... 4
1.1 SECURITY TARGET, TOE AND CC IDENTIFICATION ........................................................................................ 4
1.2 CONFORMANCE CLAIMS ................................................................................................................................. 5
1.3 CONVENTIONS ................................................................................................................................................ 6
2. TOE DESCRIPTION .......................................................................................................................................... 6
2.1 TOE OVERVIEW ........................................................................................................................................... 7
2.2 TOE ARCHITECTURE .................................................................................................................................... 11
2.2.1 Intelligent Resilient Framework .......................................................................................................... 12
2.2.2 Physical Boundaries ............................................................................................................................ 12
2.2.3 Logical Boundaries .............................................................................................................................. 12
2.3 TOE DOCUMENTATION ................................................................................................................................ 14
3. SECURITY PROBLEM DEFINITION .......................................................................................................... 15
3.1 ORGANIZATIONAL POLICIES ......................................................................................................................... 15
3.2 THREATS ...................................................................................................................................................... 15
3.3 ASSUMPTIONS .............................................................................................................................................. 15
4. SECURITY OBJECTIVES .............................................................................................................................. 17
4.1 SECURITY OBJECTIVES FOR THE TOE ........................................................................................................... 17
4.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT ........................................................................................... 17
5. IT SECURITY REQUIREMENTS .................................................................................................................. 19
5.1 EXTENDED REQUIREMENTS .......................................................................................................................... 19
5.2 TOE SECURITY FUNCTIONAL REQUIREMENTS ............................................................................................. 20
5.2.1 Security audit (FAU) ............................................................................................................................ 20
5.2.2 Cryptographic support (FCS) .............................................................................................................. 22
5.2.3 User data protection (FDP) ................................................................................................................. 24
5.2.4 Identification and authentication (FIA) ............................................................................................... 24
5.2.5 Security management (FMT) ............................................................................................................... 24
5.2.6 Protection of the TSF (FPT) ................................................................................................................ 25
5.2.7 TOE access (FTA) ................................................................................................................................ 25
5.2.8 Trusted path/channels (FTP) ............................................................................................................... 26
5.3 TOE SECURITY ASSURANCE REQUIREMENTS ............................................................................................... 27
5.3.1 Development (ADV) ............................................................................................................................. 27
5.3.2 Guidance documents (AGD) ................................................................................................................ 27
5.3.3 Life-cycle support (ALC) ..................................................................................................................... 28
5.3.4 Tests (ATE) .......................................................................................................................................... 28
5.3.5 Vulnerability assessment (AVA) ........................................................................................................... 28
5.4 EXPLICIT ASSURANCE ACTIVITIES ............................................................................................................... 30
6. TOE SUMMARY SPECIFICATION .............................................................................................................. 42
6.1 SECURITY AUDIT .......................................................................................................................................... 42
6.2 CRYPTOGRAPHIC SUPPORT ........................................................................................................................... 42
6.3 USER DATA PROTECTION .............................................................................................................................. 48
6.4 IDENTIFICATION AND AUTHENTICATION ....................................................................................................... 48
6.5 SECURITY MANAGEMENT ............................................................................................................................. 49
6.6 PROTECTION OF THE TSF ............................................................................................................................. 50
6.7 TOE ACCESS ................................................................................................................................................. 51
6.8 TRUSTED PATH/CHANNELS ........................................................................................................................... 51
7. PROTECTION PROFILE CLAIMS ............................................................................................................... 53
8. RATIONALE ..................................................................................................................................................... 54
8.1 SECURITY OBJECTIVES RATIONALE .............................................................................................................. 54
Seitenansicht 1
1 2 3 4 5 6 7 ... 65 66

Kommentare zu diesen Handbüchern

Keine Kommentare