Security Policy: Difference between revisions

Jump to navigation Jump to search
Line 27: Line 27:
| 3 || The cryptographic module shall support the NSS User Role and the Crypto Officer Role.
| 3 || The cryptographic module shall support the NSS User Role and the Crypto Officer Role.
|-
|-
| 4 || A cryptographic module user shall have access to ALL the services supplied by the cryptographic module.
| 4 || A cryptographic module user shall have access to '''all''' the services supplied by the cryptographic module.
|-
|-
| 5 || Cryptographic module services shall consist of public services, which require no authentication, and private services, which require authentication. Public services (e.g., random number generation) do not require access to the secret and private keys and other CSPs associated with the user.
| 5 || Cryptographic module services shall consist of public services, which require no authentication, and private services, which require authentication. Public services (e.g., random number generation) do not require access to the secret and private keys and other CSPs associated with the user.
canmove, Confirmed users
937

edits

Navigation menu