NSSCryptoModuleSpec/Section 6: Operation Enviroment: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
{| border="1" cellpadding="2"
{| border="1" cellpadding="2"
|+
|+
Line 6: Line 5:
Document Description
Document Description
!
!
  DTR  
DTR  
Section
Section
!
!
Line 13: Line 12:
Status
Status
|-
|-
| || [http://wiki.mozilla.org/VE_06#VE.06.04.01 VE.06.04.01 ] || ||
| Describe the mechanism used to ensure that only one user at a time can use the cryptographic module. || [http://wiki.mozilla.org/VE_06#VE.06.04.01 VE.06.04.01 ] || ||
|-
|-
| || [http://wiki.mozilla.org/VE_06#VE.06.05.01 VE.06.05.01 ] || ||
| Describe the mechanism used to ensure that no other process can access private and secret keys, intermediate key generation values, and other CSPs, while the cryptographic process is in use. || [http://wiki.mozilla.org/VE_06#VE.06.05.01 VE.06.05.01 ] || ||
|-
|-
| || [http://wiki.mozilla.org/VE_06#VE.06.06.01 VE.06.06.01 ] || ||
| Describe the mechanism used to ensure that no other process can interrupt the cryptographic module during execution. || [http://wiki.mozilla.org/VE_06#VE.06.06.01 VE.06.06.01 ] || ||
|-
|-
| || [http://wiki.mozilla.org/VE_06#VE.06.07.01 VE.06.07.01 ] || ||
| List the cryptographic software stored on the cryptographic module and describe the protection mechanisms used to prevent unauthorized disclosure and modification. || [http://wiki.mozilla.org/VE_06#VE.06.07.01 VE.06.07.01 ] || ||
|-
|-
| || [http://wiki.mozilla.org/VE_06#VE.06.08.01 VE.06.08.01 ] || ||
| Identify the technique used to maintain the integrity of the cryptographic software components. || [http://wiki.mozilla.org/VE_06#VE.06.08.01 VE.06.08.01 ] || ||
|-
|-
| || [http://wiki.mozilla.org/VE_06#VE.06.10.01 VE.06.10.01 ] || ||
| The operating system controlling the cryptographic module has passed evaluation at EAL2 for the Controlled Access Protection Profile (CAPP). || [http://wiki.mozilla.org/VE_06#VE.06.10.01 VE.06.10.01 ] || ||
|-
|-
| || [http://wiki.mozilla.org/VE_06#VE.06.14.01 VE.06.14.01 ] || ||
| Specify how the discretionary access control (DAC) mechanism is configured to meet the requirements of AS06.11, AS06.12, AS06.13, and AS06.14. || [http://wiki.mozilla.org/VE_06#VE.06.14.01 VE.06.14.01 ] || ||
|-
|-
| || [http://wiki.mozilla.org/VE_06#VE.06.15.01 VE.06.15.01 ] || ||
| Specify how the operating system prevents all operators and executing processes from modifying executing cryptographic processes. || [http://wiki.mozilla.org/VE_06#VE.06.15.01 VE.06.15.01 ] || ||
|-
|-
| || [http://wiki.mozilla.org/VE_06#VE.06.16.01 VE.06.16.01 ] || ||
| Specify how the operating system prevents operators and executing processes from reading cryptographic software stored within the cryptographic boundary. || [http://wiki.mozilla.org/VE_06#VE.06.16.01 VE.06.16.01 ] || ||
|-
|-
| || [http://wiki.mozilla.org/VE_06#VE.06.17.01 VE.06.17.01 ] || ||
| Identify all the events that are auditable by the cryptographic module software. || [http://wiki.mozilla.org/VE_06#VE.06.17.01 VE.06.17.01 ] || ||
|}
|}


Return to: [[NSSCryptoModuleSpec]]
Return to: [[NSSCryptoModuleSpec]]

Revision as of 23:00, 17 April 2006

Document Description

DTR Section

Assesment

Status

Describe the mechanism used to ensure that only one user at a time can use the cryptographic module. VE.06.04.01
Describe the mechanism used to ensure that no other process can access private and secret keys, intermediate key generation values, and other CSPs, while the cryptographic process is in use. VE.06.05.01
Describe the mechanism used to ensure that no other process can interrupt the cryptographic module during execution. VE.06.06.01
List the cryptographic software stored on the cryptographic module and describe the protection mechanisms used to prevent unauthorized disclosure and modification. VE.06.07.01
Identify the technique used to maintain the integrity of the cryptographic software components. VE.06.08.01
The operating system controlling the cryptographic module has passed evaluation at EAL2 for the Controlled Access Protection Profile (CAPP). VE.06.10.01
Specify how the discretionary access control (DAC) mechanism is configured to meet the requirements of AS06.11, AS06.12, AS06.13, and AS06.14. VE.06.14.01
Specify how the operating system prevents all operators and executing processes from modifying executing cryptographic processes. VE.06.15.01
Specify how the operating system prevents operators and executing processes from reading cryptographic software stored within the cryptographic boundary. VE.06.16.01
Identify all the events that are auditable by the cryptographic module software. VE.06.17.01

Return to: NSSCryptoModuleSpec