8(495)909-90-01
8(964)644-46-00
pro@sio.su
Главная
Системы видеонаблюдения
Охранная сигнализация
Пожарная сигнализация
Система пожаротушения
Система контроля удаленного доступа
Оповещение и эвакуация
Контроль периметра
Система домофонии
Парковочные системы
Проектирование слаботочных сетей
Аварийный
контроль
Раздел: Документация

0 ... 84 85 86 87 88 89 90 ... 117

F.13 Inter-TSF user data integrity transfer protection (FDP UIT)

This family defines the requirements for providing integrity for user data in transit between the TSF and another trusted IT product and recovering from detectable errors. At a minimum, this family monitors the integrity of user data for modifications. Furthermore, this family supports different ways of correcting detected integrity errors.

User notes

This family defines the requirements for providing integrity for user data in transit; while FPT ITI handles TSF data.

FDPUIT and FDPUCT are duals of each other, as FDPUCT addresses user data confidentiality. Therefore, the same mechanism that implements FDPUIT could possibly be used to implement

other families such as FDP UCT and FDP ITC.

FDPUIT.1 Data exchange integrity

User application notes

The TSF has a basic ability to send or receive user data in a manner such that modification of the user data can be detected. There is no requirement for a TSF mechanism to attempt to recover from the modification.

Operations

Assignment:

In FDPUIT.1.1, the PP/ST author should specify the access control SFP(s) and/ or information flow control SFP(s) that will be enforced on the transmitted data or on the received data. The specified policies will be enforced to make decisions about who can transmit or who can receive data, and which data can be transmitted or received.

Selection:

In FDPUIT.1.1, the PP/ST author should specify whether this element applies to a TSF that is transmitting or receiving objects.

In FDPUIT.1.1 the PP/ST author should specify whether the data should be protected from modification, deletion, insertion or replay.

In FDPUIT.1.2 the PP/ST author should specify whether the errors of the type: modification, deletion, insertion or replay are detected.


FDPUIT.2 Source data exchange recovery

User application notes

This component provides the ability to recover from a set of identified transmission errors, if required, with the help of the other trusted IT product. As the other trusted IT product is outside the TSC, the TSF cannot control its behaviour. However, it can provide functions that have the ability to cooperate with the other trusted IT product for the purposes of recovery. For example, the TSF could include functions that depend upon the source trusted IT product to re-send the data in the event that an error is detected. This component deals with the ability of the TSF to handle such an error recovery.

Operations

Assignment:

In FDPUIT.2.1, the PP/ST author should specify the access control SFP(s) and/ or information flow control SFP(s) that will be enforced when recovering user data. The specified policies will be enforced to make decisions about which data can be recovered and how it can be recovered.

In FDPUIT.2.1, the PP/ST author should specify the list of integrity errors from which the TSF, with the help of the source trusted IT product, is be able to recover the original user data.

FDPUIT.3 Destination data exchange recovery

User application notes

This component provides the ability to recover from a set of identified transmission errors. It accomplishes this task without help from the source trusted IT product. For example, if certain errors are detected, the transmission protocol must be robust enough to allow the TSF to recover from the error based on checksums and other information available within that protocol.

Operations

Assignment:

In FDPUIT.3.1, the PP/ST author should specify the access control SFP(s) and/or information flow control SFP(s) that will be enforced when recovering user data. The specified policies will be enforced to make decisions about which data can be recovered and how it can be recovered.

In FDPUIT.3.1, the PP/ST author should specify the list of integrity errors from which the receiving TSF, alone, is able to recover the original user data.




0 ... 84 85 86 87 88 89 90 ... 117