NSSCryptoModuleSpec/Section 6: Operation Enviroment: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
{| border="1" cellpadding="2"
|+
|-
!
Document Description
!
DTR
Section
!
Assessment
!
Status
|-
| Describe the operational environment in which the module operates. || [http://wiki.mozilla.org/VE_06#VE.06.02.01 VE.06.02.01 ] || [http://wiki.mozilla.org/FIPS_Operational_Environment#Operational_Environment Operational Environment] || Draft
|-
| Describe the mechanism used to ensure that only one user at a time can use the cryptographic module. || [http://wiki.mozilla.org/VE_06#VE.06.04.01 VE.06.04.01 ] || [http://wiki.mozilla.org/FIPS_Operational_Environment#Single_Operator_Mode_of_Operation Single Operator Mode of Operation] || Draft
|-
| Describe the mechanism used to ensure that no other process can access private and secret keys, intermediate key generation values, and other CSPs, while the cryptographic process is in use. || [http://wiki.mozilla.org/VE_06#VE.06.05.01 VE.06.05.01 ] || The operating system protects the address space of the cryptographic process from the other processes. || Draft
|-
| Describe the mechanism used to ensure that no other process can interrupt the cryptographic module during execution. || [http://wiki.mozilla.org/VE_06#VE.06.06.01 VE.06.06.01 ] || The operating system protects the address space of the cryptographic process from the other processes. || Draft
|-
| List the cryptographic software stored on the cryptographic module and describe the protection mechanisms used to prevent unauthorized disclosure and modification. || [http://wiki.mozilla.org/VE_06#VE.06.07.01 VE.06.07.01 ] || While the cryptographic software is in the RAM, the operating system protects the address space of the cryptographic process from the other processes. || Draft
|-
| Identify the technique used to maintain the integrity of the cryptographic software components. || [http://wiki.mozilla.org/VE_06#VE.06.08.01 VE.06.08.01 ] || [http://wiki.mozilla.org/FIPS_Operational_Environment#Software_Integrity_Test Software Integrity Test] || Draft
|-
| The operating system controlling the cryptographic module has passed evaluation at EAL2 for the Controlled Access Protection Profile (CAPP). || [http://wiki.mozilla.org/VE_06#VE.06.10.01 VE.06.10.01 ] || Please refer to the following documents on the [http://www.commoncriteriaportal.org/ Common Criteria portal]:
* Sun Trusted Solaris Version 8 4/01: assurance level EAL4, certification date March 2004, [http://www.commoncriteriaportal.org/public/files/epfiles/CRP170v3.pdf certification report] and [http://www.commoncriteriaportal.org/public/files/epfiles/TSolaris8_Issue3.1.pdf security target];
* Red Hat Enterprise Linux (RHEL) Version 4 Update 1 AS and Red Hat Enterprise Linux (RHEL) Version 4 Update 1 WS: assurance level EAL4+, certification date 26 January 2006, [http://www.commoncriteriaportal.org/public/files/epfiles/ST_VID10072-VR.pdf certification report], [http://www.commoncriteriaportal.org/public/files/epfiles/ST_VID10072-ST.pdf security target], atsec's [http://www.atsec.com/01/index.php?id=03-0002-01&news=80 press release], and [http://www.atsec.com/downloads/pdf/certificates/ibm_linux_eal4_cert.pdf the certificate].
  || Draft
|-
| Specify how the discretionary access control (DAC) mechanism is configured to meet the requirements of AS06.11, AS06.12, AS06.13, and AS06.14. || [http://wiki.mozilla.org/VE_06#VE.06.14.01 VE.06.14.01 ] || [http://wiki.mozilla.org/FIPS_Operational_Environment#Configuring_Discretionary_Access_Control Configuring Discretionary Access Control] || Draft
|-
| Specify how the operating system prevents all operators and executing processes from modifying executing cryptographic processes. || [http://wiki.mozilla.org/VE_06#VE.06.15.01 VE.06.15.01 ] || The operating system protects the address space of an executing process from modifications by another process. || Draft
|-
| Specify how the operating system prevents operators and executing processes from reading cryptographic software stored within the cryptographic boundary. || [http://wiki.mozilla.org/VE_06#VE.06.16.01 VE.06.16.01 ] || The operating system protects the address space of an executing process from reading by another process. || Draft
|-
| Identify all the events that are auditable by the cryptographic module software. || [http://wiki.mozilla.org/VE_06#VE.06.17.01 VE.06.17.01 ] || [http://wiki.mozilla.org/FIPS_Operational_Environment#Auditable_Events Auditable Events] || Draft
|}


Return to: [[NSSCryptoModuleSpec]]

Revision as of 19:18, 9 March 2007

Document Description

DTR Section

Assessment

Status

Describe the operational environment in which the module operates. VE.06.02.01 Operational Environment Draft
Describe the mechanism used to ensure that only one user at a time can use the cryptographic module. VE.06.04.01 Single Operator Mode of Operation Draft
Describe the mechanism used to ensure that no other process can access private and secret keys, intermediate key generation values, and other CSPs, while the cryptographic process is in use. VE.06.05.01 The operating system protects the address space of the cryptographic process from the other processes. Draft
Describe the mechanism used to ensure that no other process can interrupt the cryptographic module during execution. VE.06.06.01 The operating system protects the address space of the cryptographic process from the other processes. Draft
List the cryptographic software stored on the cryptographic module and describe the protection mechanisms used to prevent unauthorized disclosure and modification. VE.06.07.01 While the cryptographic software is in the RAM, the operating system protects the address space of the cryptographic process from the other processes. Draft
Identify the technique used to maintain the integrity of the cryptographic software components. VE.06.08.01 Software Integrity Test Draft
The operating system controlling the cryptographic module has passed evaluation at EAL2 for the Controlled Access Protection Profile (CAPP). VE.06.10.01 Please refer to the following documents on the Common Criteria portal: Draft
Specify how the discretionary access control (DAC) mechanism is configured to meet the requirements of AS06.11, AS06.12, AS06.13, and AS06.14. VE.06.14.01 Configuring Discretionary Access Control Draft
Specify how the operating system prevents all operators and executing processes from modifying executing cryptographic processes. VE.06.15.01 The operating system protects the address space of an executing process from modifications by another process. Draft
Specify how the operating system prevents operators and executing processes from reading cryptographic software stored within the cryptographic boundary. VE.06.16.01 The operating system protects the address space of an executing process from reading by another process. Draft
Identify all the events that are auditable by the cryptographic module software. VE.06.17.01 Auditable Events Draft

Return to: NSSCryptoModuleSpec