NSSCryptoModuleSpec/Section 6: Operation Enviroment: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
No edit summary
m (GPHemsley moved page Section 6: Operation Enviroment to NSSCryptoModuleSpec/Section 6: Operation Enviroment without leaving a redirect: NSSCryptoModuleSpec page)
 
(One intermediate revision by one other user not shown)
Line 25: Line 25:
|-
|-
| The operating system controlling the cryptographic module has passed evaluation at EAL2 for the Controlled Access Protection Profile (CAPP). || [http://wiki.mozilla.org/VE_06#VE.06.10.01 VE.06.10.01 ] || Please refer to the following documents on the [http://www.commoncriteriaportal.org/ Common Criteria portal]:
| The operating system controlling the cryptographic module has passed evaluation at EAL2 for the Controlled Access Protection Profile (CAPP). || [http://wiki.mozilla.org/VE_06#VE.06.10.01 VE.06.10.01 ] || Please refer to the following documents on the [http://www.commoncriteriaportal.org/ Common Criteria portal]:
* Sun Trusted Solaris Version 8 4/01: assurance level EAL4, certification date March 2004, [http://www.commoncriteriaportal.org/public/files/epfiles/CRP170v3.pdf certification report] and [http://www.commoncriteriaportal.org/public/files/epfiles/TSolaris8_Issue3.1.pdf security target];
* Sun Solaris Version 10 5/08: Security Target Url For Solaris 10 5/08: http://www.sun.com/software/security/securitycert/docs/st-base.Sol10u5.v1.3.pdf  
* Red Hat Enterprise Linux (RHEL) Version 4 Update 1 AS and Red Hat Enterprise Linux (RHEL) Version 4 Update 1 WS: assurance level EAL4+, certification date 26 January 2006, [http://www.commoncriteriaportal.org/public/files/epfiles/ST_VID10072-VR.pdf certification report], [http://www.commoncriteriaportal.org/public/files/epfiles/ST_VID10072-ST.pdf security target], atsec's [http://www.atsec.com/01/index.php?id=03-0002-01&news=80 press release], and [http://www.atsec.com/downloads/pdf/certificates/ibm_linux_eal4_cert.pdf the certificate].
* Red Hat Enterprise Linux (RHEL) Version 5 http://www.niap-ccevs.org/cc-scheme/st/index.cfm/vid/10125
   || Draft
   || Draft
|-
|-

Latest revision as of 12:03, 11 May 2015

Document Description

DTR Section

Assessment

Status

Describe the operational environment in which the module operates. VE.06.02.01 Operational Environment Draft
Describe the mechanism used to ensure that only one user at a time can use the cryptographic module. VE.06.04.01 Single Operator Mode of Operation Draft
Describe the mechanism used to ensure that no other process can access private and secret keys, intermediate key generation values, and other CSPs, while the cryptographic process is in use. VE.06.05.01 The operating system protects the address space of the cryptographic process from the other processes. Draft
Describe the mechanism used to ensure that no other process can interrupt the cryptographic module during execution. VE.06.06.01 The operating system protects the address space of the cryptographic process from the other processes. Draft
List the cryptographic software stored on the cryptographic module and describe the protection mechanisms used to prevent unauthorized disclosure and modification. VE.06.07.01 While the cryptographic software is in the RAM, the operating system protects the address space of the cryptographic process from the other processes. Draft
Identify the technique used to maintain the integrity of the cryptographic software components. VE.06.08.01 Software Integrity Test Draft
The operating system controlling the cryptographic module has passed evaluation at EAL2 for the Controlled Access Protection Profile (CAPP). VE.06.10.01 Please refer to the following documents on the Common Criteria portal: Draft
Specify how the discretionary access control (DAC) mechanism is configured to meet the requirements of AS06.11, AS06.12, AS06.13, and AS06.14. VE.06.14.01 Configuring Discretionary Access Control Draft
Specify how the operating system prevents all operators and executing processes from modifying executing cryptographic processes. VE.06.15.01 The operating system protects the address space of an executing process from modifications by another process. Draft
Specify how the operating system prevents operators and executing processes from reading cryptographic software stored within the cryptographic boundary. VE.06.16.01 The operating system protects the address space of an executing process from reading by another process. Draft
Identify all the events that are auditable by the cryptographic module software. VE.06.17.01 Auditable Events Draft

Return to: NSSCryptoModuleSpec