8(495)909-90-01
8(964)644-46-00
pro@sio.su
Главная
Системы видеонаблюдения
Охранная сигнализация
Пожарная сигнализация
Система пожаротушения
Система контроля удаленного доступа
Оповещение и эвакуация
Контроль периметра
Система домофонии
Парковочные системы
Проектирование слаботочных сетей
Аварийный
контроль
Раздел: Документация

0 ... 114 115 116 117

M.1 Inter-TSF trusted channel (FTP ITC)

This family defines the rules for the creation of a trusted channel connection that goes between the TSF and another trusted IT product for the performance of security critical operations between the products. An example of such a security critical operation is the updating of the TSF authentication database by the transfer of data from a trusted product whose function is the collection of audit data.

FTP ITC.1 Inter-TSF trusted channel

User application notes

This component should be used when a trusted communication channel between the TSF and another trusted IT product is required.

Operations

Selection:

In FTP ITC.1.2, the PP/ST author must specify whether the local TSF, the

remote trusted IT product, or both shall have the capability to initiate the trusted channel.

Assignment:

In FTPITC.1.3, the PP/ST author should specify the functions for which a trusted channel is required. Examples of these functions may include transfer of user, subject, and/or object security attributes and ensuring consistency of TSF data.


M.2 Trusted path (FTP TRP)

This family defines the requirements to establish and maintain trusted communication to or from users and the TSF. A trusted path may be required for any security-relevant interaction. Trusted path exchanges may be initiated by a user during an interaction with the TSF, or the TSF may establish communication with the user via a trusted path.

FTPTRP.1 Trusted path

User application notes

This component should be used when trusted communication between a user and the TSF is required, either for initial authentication purposes only or for additional specified user operations.

Operations

Selection:

In FTPTRP.1.1, the PP/ST author should specify whether the trusted path must be extended to remote and/or local users.

In FTPTRP.1.2, the PP/ST author should specify whether the TSF, local users, and/or remote users should be able to initiate the trusted path.

In FTPTRP.1.3, the PP/ST author should specify whether the trusted path is to be used for initial user authentication and/or for other specified services.

Assignment:

In FTPTRP.1.3, if selected, the PP/ST author should identify other services for which trusted path is required, if any.


ICS 35.040

Price based on 326 pages



0 ... 114 115 116 117