Раздел: Документация
0 ... 102 103 104 105 106 107 108 ... 117 J.3 Availability of exported TSF data (FPT ITA) This family defines the rules for the prevention of loss of availability of TSF data moving between the TSF and a remote trusted IT product. This data could be TSF critical data such as passwords, keys, audit data, or TSF executable code. User application notes This family is used in a distributed system context where the TSF is providing TSF data to a remote trusted IT product. The TSF can only take the measures at its site and cannot be held responsible for the TSF at the other trusted IT product. If there are different availability metrics for different types of TSF data, then this component should be iterated for each unique pairing of metrics and types of TSF data. FPTITA.1 Inter-TSF availability within a defined availability metric Operations Assignment: For FPTITA.1.1, the PP/ST author should specify the types of TSF data that are subject to the availability metric. For FPTITA.1.1, the PP/ST should specify the availability metric for the applicable TSF data. For FPTITA.1.1, the PP/ST author should specify the conditions under which availability must be ensured. For example: there must be a connection between the TOE and the remote trusted IT product J.4 Confidentiality of exported TSF data (FPT ITC) This family defines the rules for the protection from unauthorised disclosure of TSF data moving between the TSF and a remote trusted IT product. Examples of this data are TSF critical data such as passwords, keys, audit data, or TSF executable code. User application notes This family is used in a distributed system context where the TSF is providing TSF data to a remote trusted IT product. The TSF can only take the measures at its site and cannot be held responsible for the behaviour of the other trusted IT product. FPTITC.1 Inter-TSF confidentiality during transmission Evaluator application notes Confidentiality of TSF Data during transmission is necessary to protect such information from disclosure. Some possible implementations that could provide confidentiality include the use of cryptographic algorithms as well as spread spectrum techniques. J.5 Integrity of exported TSF data (FPT ITI) This family defines the rules for the protection, from unauthorised modification, of TSF data during transmission between the TSF and a remote trusted IT product. Examples ofthis data are TSF critical data such as passwords, keys, audit data, or TSF executable code. User notes This family is used in a distributed system context where the TSF is exchanging TSF data with a remote trusted IT product. Note that a requirement that addresses modification, detection, or recovery at the remote trusted IT product cannot be specified, as the mechanisms that a remote trusted IT product will use to protect its data cannot be determined in advance. For this reason, these requirements are expressed in terms of the "TSF providing a capability" which the remote trusted IT product can use. FPTITI.1 Inter-TSF detection of modification User application notes This component should be used in situations where it is sufficient to detect when data have been modified. An example of such a situation is one in which the remote trusted IT product can request the TOEs TSF to retransmit data when modification has been detected, or respond to such types of request. The desired strength of modification detection is based upon a specified modification metric that is a function of the algorithm used, which may range from a weak checksum and parity mechanisms that may fail to detect multiple bit changes, to more complicated cryptographic checksum approaches. Operations Assignment: For FPTITI.1.1, the PP/ST should specify the modification metric that the detection mechanism must satisfy. This modification metric shall specify the desired strength of the modification detection. For FPTITI.1.2, the PP/ST should specify the actions to be taken if a modification of TSF data has been detected. An example of an action is: "ignore the TSF data, and request the originating trusted product to send the TSF data again". FPTITI.2 Inter-TSF detection and correction of modification User application notes This component should be used in situations where it is necessary to detect or correct modifications of TSF critical data. 0 ... 102 103 104 105 106 107 108 ... 117
|