Раздел: Документация
0 1 2 3 4 ... 117 6.12Inter-TSF user data confidentiality transfer protection (FDPUCT) ..... 72 6.13Inter-TSF user data integrity transfer protection (FDPUIT)........... 73 7Class FIA: Identification and authentication ........................ 77 7.1Authentication failures (FIA All.) .............................. 79 7.2User attribute definition (FIA ATD) ............................. 80 7.3Specification of secrets (FIA SOS) .............................. 81 7.4User authentication (FIAUAU) ................................ 83 7.5User identification (FIA UID) .................................. 88 7.6User-subject binding (FIA USB) ................................ 90 8Class FMT: Security management ................................ 91 8.1Management of functions in TSF (FMTMOF) ..................... 93 8.2Management of security attributes (FMTMSA) .................... 94 8.3Management of TSF data (FMTMTD) ........................... 97 8.4Revocation (FMT REV) ...................................... 99 8.5Security attribute expiration (FMT SAE) .........................100 8.6Security management roles (FMTSMR)..........................101 9Class FPR: Privacy .............................................105 9.1Anonymity (FPR ANO).......................................106 9.2Pseudonymity (FPRPSE) .....................................108 9.3Unlinkability (FPRUNl) .....................................110 9.4Unobserv ability (FPR UNO) ...................................111 10Class FPT: Protection of the TSF .................................115 10.1Underlying abstract machine test (FPTAMT) .....................118 10.2Fail secure (FPTFLS) ........................................119 10.3Availability of exported TSF data (FPTITA) ......................120 10.4Confidentiality of exported TSF data (FPTITC) ...................121 10.5Integrity of exported TSF data (FPTITI) .........................122 10.6Internal TOE TSF data transfer (FPTITT) ........................124 10.7TSF physical protection (FPT PHP) .............................127 10.8Trusted recovery (FPTRCV) ..................................130 10.9Replay detection (FPTRPL) ...................................133 10.10Reference mediation (FPTRVM) ...............................134 10.11Domain separation (FPT SEP) ..................................135 10.12State synchrony protocol (FPT SSP) .............................137 10.13Time stamps (FPTSTM) ......................................139 10.14Inter-TSF TSF data consistency (FPTTDC) .......................140 10.15Internal TOE TSF data replication consistency (FPTTRC) ...........141 10.16TSF self test (FPTTST) .......................................142 11Class FRU: Resource utilisation ..................................145 11.1Fault tolerance (FRUFLT) ....................................146 11.2Priority of service (FRUPRS) ..................................148 11.3Resource allocation (FRURSA) ................................150 12Class FTA: TOE access .........................................153 12.1Limitation on scope of selectable attributes (FTALSA)..............154 12.2Limitation on multiple concurrent sessions (FTA MCS) ............. 155 12.3Session locking (FTA SSL) ....................................157 12.4TOE access banners (FTA TAB) ................................ 160 12.5TOE access history (FTA TAH) ................................ 161 12.6TOE session establishment (FTA TSE) ........................... 162 13Class FTP: Trusted path/channels ................................163 13.1Inter-TSF trusted channel (FTP ITC) ............................ 164 13.2Trusted path (FTP TRP) ...................................... 166 Annex A Security functional requirements application notes ..................169 A.1Structureofthe notes .........................................169 A.1.1Class structure ............................................ 169 A.1.2Family structure .......................................... 170 A.1.3Component structure ....................................... 171 A.2Dependency table ............................................ 172 Annex B Functional classes, families, and components .......................179 Annex C Security audit (FAU) ...........................................181 C. 1Security audit automatic response (FAU ARP) .....................183 C.2Security audit data generation (FAU GEN) ........................184 C.3Security audit analysis (FAU SAA) ..............................187 C.4Security audit review (FAU SAR) ............................... 192 C.5Security audit event selection (FAU SEL) ........................ 194 C.6Security audit event storage (FAU STG) ..........................195 Annex D Communication (FCO) ..........................................199 D.1Non-repudiation of origin (FCO NRO) ...........................200 D.2Non-repudiation of receipt (FCO NRR) ..........................203 Annex E Cryptographic support (FCS) ....................................207 E.1Cryptographic key management (FCS CKM) ...................... 209 E.2Cryptographic operation (FCS COP) ............................. 212 Annex F User data protection (FDP) ......................................215 F.1Access control policy (FDP ACC)...............................220 F.2Access control functions (FDP ACF) ............................222 F.3Data authentication (FDP DAU) ................................225 F.4Export to outside TSF control (FDP ETC) ........................227 F.5Information flow control policy (FDPIFC) .......................229 F.6Information flow control functions (FDPIFF) .....................232 F.7Import from outside TSF control (FDPITC).......................238 F.8Internal TOE transfer (FDP ITT) ................................241 F.9Residual information protection (FDP RIP) ....................... 245 F.10Rollback (FDP ROL) .........................................247 F.11Stored data integrity (FDP SDI) ................................ 249 F.12Inter-TSF user data confidentialitytransfer protection (FDP UCT) ..... 251 F.13Inter-TSF user data integritytransfer protection (FDP UIT) ........... 252 Annex G Identification and authentication (FIA) ............................255 G.1Authentication failures (FIA All.) ..............................257 G.2User attribute definition (FIA ATD) .............................259 G.3Specification of secrets (FIA SOS) ..............................260 G.4User authentication (FIAUAU) ................................262 G.5User identification (FIA UID) ..................................266 G.6User-subject binding (FIA USB) ................................267 Annex H Security management (FMT) .....................................269 H.1Management of functions in TSF (FMTMOF) .....................271 H.2Management of security attributes (FMTMSA) ....................273 H.3Management of TSF data (FMTMTD) ...........................276 H.4Revocation (FMT REV) ......................................278 H.5Security attribute expiration (FMT SAE) .........................279 H.6Security management roles (FMTSMR)..........................280 Annex I Privacy (FPR) .................................................283 1.1Anonymity (FPR ANO) .......................................285 1.2Pseudonymity (FPR PSE) .....................................287 1.3Unlinkability (FPR UNl) .....................................292 1.4Unobsei-vability (FPR UNO) ...................................294 Annex J Protection of the TSF (FPT) .....................................299 J.1Underlying abstract machine test (FPTAMT) .....................303 J.2Fail secure (FPTFLS) ........................................305 J.3Availability of exported TSF data (FPTITA) ......................306 J.4Confidentiality of exported TSF data (FPTITC) ...................307 J.5Integrity of exported TSF data (FPT ITI) .........................308 J.6Internal TOE TSF data transfer (FPTITT) ........................310 J.7TSF physical protection (FPT PHP) .............................312 J.8Trusted recovery (FPTRCV) ..................................314 J.9Replay detection (FPTRPL) ...................................317 J.10Reference mediation (FPTRVM) ...............................318 J.11Domain separation (FPT SEP) ..................................319 J.12State synchrony protocol (FPTSSP) .............................321 J.13Time stamps (FPTSTM) ......................................322 J.14Inter-TSF TSF data consistency (FPTTDC) .......................323 J.15Internal TOE TSF data replication consistency (FPTTRC) ...........324 J.16TSF self test (FPTTST) .......................................325 Annex K Resource utilisation (FRU).......................................327 K.1Fault tolerance (FRUFLT) ....................................328 K.2Priority of service (FRUPRS) ..................................330 K.3Resource allocation (FRURSA) ................................331 Annex L TOE access (FTA) ..............................................333 L.1Limitation on scope of selectable attributes (FTALSA)..............334 L.2Limitation on multiple concurrent sessions (FTAMCS) .............335 L.3Session locking (FTA SSL) ....................................336 L.4TOE access banners (FTA TAB) ................................338 0 1 2 3 4 ... 117
|