1.2 Security Objectives for the Environment
Appendix D
Common Criteria Environment: Security Objectives
709
O. Auditors Review Audit Logs
Identify and monitor security-relevant events by requiring auditors to review audit logs on a
frequency sufficient to address level of risk.
O. Authentication Data Management
Ensure that users change their authentication data at appropriate intervals and to appropriate
values (e.g., proper lengths, histories, variations, etc.) through enforced authentication data
management (Note: this objective is not applicable to biometric authentication data.)
O. Communications Protection
Protect the system against a physical attack on the communications capability by providing
adequate physical security.
O. Competent Administrators, Operators, Officers and Auditors
Provide capable management of the TOE by assigning competent Administrators,
Operators, Officers and Auditors to manage the TOE and the security of the information it
contains.
O. CPS
All Administrators, Operators, Officers and Auditors shall be familiar with the certificate
policy (CP) and the certification practices statement (CPS) under which the TOE is
operated.
O. Disposal of Authentication Data
Provide proper disposal of authentication data and associated privileges after access has
been removed (e.g., job termination, change in responsibility).
O. Installation
Those responsible for the TOE must ensure that the TOE is delivered, installed, managed,
and operated in a manner which maintains IT security.
O. Malicious Code Not Signed
Protect the TOE from malicious code by ensuring all code is signed by a trusted entity prior
to loading it into the system.
Summary of Contents for CERTIFICATE 7.1 ADMINISTRATOR
Page 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Page 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Page 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...