8(495)909-90-01
8(964)644-46-00
pro@sio.su
Главная
Системы видеонаблюдения
Охранная сигнализация
Пожарная сигнализация
Система пожаротушения
Система контроля удаленного доступа
Оповещение и эвакуация
Контроль периметра
Система домофонии
Парковочные системы
Проектирование слаботочных сетей
Аварийный
контроль
Раздел: Документация

0 1 2 3 4 ... 117

6.12Inter-TSF user data confidentiality transfer protection (FDPUCT) ..... 72

6.13Inter-TSF user data integrity transfer protection (FDPUIT)........... 73

7Class FIA: Identification and authentication ........................ 77

7.1Authentication failures (FIA All.) .............................. 79

7.2User attribute definition (FIA ATD) ............................. 80

7.3Specification of secrets (FIA SOS) .............................. 81

7.4User authentication (FIAUAU) ................................ 83

7.5User identification (FIA UID) .................................. 88

7.6User-subject binding (FIA USB) ................................ 90

8Class FMT: Security management ................................ 91

8.1Management of functions in TSF (FMTMOF) ..................... 93

8.2Management of security attributes (FMTMSA) .................... 94

8.3Management of TSF data (FMTMTD) ........................... 97

8.4Revocation (FMT REV) ...................................... 99

8.5Security attribute expiration (FMT SAE) .........................100

8.6Security management roles (FMTSMR)..........................101

9Class FPR: Privacy .............................................105

9.1Anonymity (FPR ANO).......................................106

9.2Pseudonymity (FPRPSE) .....................................108

9.3Unlinkability (FPRUNl) .....................................110

9.4Unobserv ability (FPR UNO) ...................................111

10Class FPT: Protection of the TSF .................................115

10.1Underlying abstract machine test (FPTAMT) .....................118

10.2Fail secure (FPTFLS) ........................................119

10.3Availability of exported TSF data (FPTITA) ......................120

10.4Confidentiality of exported TSF data (FPTITC) ...................121

10.5Integrity of exported TSF data (FPTITI) .........................122

10.6Internal TOE TSF data transfer (FPTITT) ........................124

10.7TSF physical protection (FPT PHP) .............................127

10.8Trusted recovery (FPTRCV) ..................................130

10.9Replay detection (FPTRPL) ...................................133

10.10Reference mediation (FPTRVM) ...............................134

10.11Domain separation (FPT SEP) ..................................135

10.12State synchrony protocol (FPT SSP) .............................137

10.13Time stamps (FPTSTM) ......................................139

10.14Inter-TSF TSF data consistency (FPTTDC) .......................140

10.15Internal TOE TSF data replication consistency (FPTTRC) ...........141

10.16TSF self test (FPTTST) .......................................142

11Class FRU: Resource utilisation ..................................145

11.1Fault tolerance (FRUFLT) ....................................146

11.2Priority of service (FRUPRS) ..................................148

11.3Resource allocation (FRURSA) ................................150

12Class FTA: TOE access .........................................153

12.1Limitation on scope of selectable attributes (FTALSA)..............154


12.2Limitation on multiple concurrent sessions (FTA MCS) ............. 155

12.3Session locking (FTA SSL) ....................................157

12.4TOE access banners (FTA TAB) ................................ 160

12.5TOE access history (FTA TAH) ................................ 161

12.6TOE session establishment (FTA TSE) ........................... 162

13Class FTP: Trusted path/channels ................................163

13.1Inter-TSF trusted channel (FTP ITC) ............................ 164

13.2Trusted path (FTP TRP) ...................................... 166

Annex A Security functional requirements application notes ..................169

A.1Structureofthe notes .........................................169

A.1.1Class structure ............................................ 169

A.1.2Family structure .......................................... 170

A.1.3Component structure ....................................... 171

A.2Dependency table ............................................ 172

Annex B Functional classes, families, and components .......................179

Annex C Security audit (FAU) ...........................................181

C. 1Security audit automatic response (FAU ARP) .....................183

C.2Security audit data generation (FAU GEN) ........................184

C.3Security audit analysis (FAU SAA) ..............................187

C.4Security audit review (FAU SAR) ............................... 192

C.5Security audit event selection (FAU SEL) ........................ 194

C.6Security audit event storage (FAU STG) ..........................195

Annex D Communication (FCO) ..........................................199

D.1Non-repudiation of origin (FCO NRO) ...........................200

D.2Non-repudiation of receipt (FCO NRR) ..........................203

Annex E Cryptographic support (FCS) ....................................207

E.1Cryptographic key management (FCS CKM) ...................... 209

E.2Cryptographic operation (FCS COP) ............................. 212

Annex F User data protection (FDP) ......................................215

F.1Access control policy (FDP ACC)...............................220

F.2Access control functions (FDP ACF) ............................222

F.3Data authentication (FDP DAU) ................................225

F.4Export to outside TSF control (FDP ETC) ........................227

F.5Information flow control policy (FDPIFC) .......................229

F.6Information flow control functions (FDPIFF) .....................232

F.7Import from outside TSF control (FDPITC).......................238

F.8Internal TOE transfer (FDP ITT) ................................241

F.9Residual information protection (FDP RIP) ....................... 245

F.10Rollback (FDP ROL) .........................................247

F.11Stored data integrity (FDP SDI) ................................ 249

F.12Inter-TSF user data confidentialitytransfer protection (FDP UCT) ..... 251

F.13Inter-TSF user data integritytransfer protection (FDP UIT) ........... 252


Annex G Identification and authentication (FIA) ............................255

G.1Authentication failures (FIA All.) ..............................257

G.2User attribute definition (FIA ATD) .............................259

G.3Specification of secrets (FIA SOS) ..............................260

G.4User authentication (FIAUAU) ................................262

G.5User identification (FIA UID) ..................................266

G.6User-subject binding (FIA USB) ................................267

Annex H Security management (FMT) .....................................269

H.1Management of functions in TSF (FMTMOF) .....................271

H.2Management of security attributes (FMTMSA) ....................273

H.3Management of TSF data (FMTMTD) ...........................276

H.4Revocation (FMT REV) ......................................278

H.5Security attribute expiration (FMT SAE) .........................279

H.6Security management roles (FMTSMR)..........................280

Annex I Privacy (FPR) .................................................283

1.1Anonymity (FPR ANO) .......................................285

1.2Pseudonymity (FPR PSE) .....................................287

1.3Unlinkability (FPR UNl) .....................................292

1.4Unobsei-vability (FPR UNO) ...................................294

Annex J Protection of the TSF (FPT) .....................................299

J.1Underlying abstract machine test (FPTAMT) .....................303

J.2Fail secure (FPTFLS) ........................................305

J.3Availability of exported TSF data (FPTITA) ......................306

J.4Confidentiality of exported TSF data (FPTITC) ...................307

J.5Integrity of exported TSF data (FPT ITI) .........................308

J.6Internal TOE TSF data transfer (FPTITT) ........................310

J.7TSF physical protection (FPT PHP) .............................312

J.8Trusted recovery (FPTRCV) ..................................314

J.9Replay detection (FPTRPL) ...................................317

J.10Reference mediation (FPTRVM) ...............................318

J.11Domain separation (FPT SEP) ..................................319

J.12State synchrony protocol (FPTSSP) .............................321

J.13Time stamps (FPTSTM) ......................................322

J.14Inter-TSF TSF data consistency (FPTTDC) .......................323

J.15Internal TOE TSF data replication consistency (FPTTRC) ...........324

J.16TSF self test (FPTTST) .......................................325

Annex K Resource utilisation (FRU).......................................327

K.1Fault tolerance (FRUFLT) ....................................328

K.2Priority of service (FRUPRS) ..................................330

K.3Resource allocation (FRURSA) ................................331

Annex L TOE access (FTA) ..............................................333

L.1Limitation on scope of selectable attributes (FTALSA)..............334

L.2Limitation on multiple concurrent sessions (FTAMCS) .............335

L.3Session locking (FTA SSL) ....................................336

L.4TOE access banners (FTA TAB) ................................338



0 1 2 3 4 ... 117