Audit Generation
The
IT Environment will provide the capability to detect and create records of
security-relevant events associated with users.
Audit Protection
The
IT Environment will provide the capability to protect audit information.
Audit Review
The
IT Environment will provide the capability to selectively view audit
information.
Correct TSF Operation
The
IT environment will provide functionality to support the correct operation of
the TSF and provide the capability to test the TSF to ensure the correct
operation of the TSF at a installation location.
Display Banner
The IT Environment shall
display an initial banner describing restrictions of use, legal agreements, or
any other appropriate information to which users consent by accessing the
system.
Manage
The
IT Environment will provide all the functions and facilities necessary to
support the administrators in their management of the security of the PKIF, and
restrict these functions and facilities from unauthorized use.
Mediate
The
IT Environment will protect user data in accordance with its security policy.
Residual Information
The
IT Environment will ensure that any information contained in a protected
resource within its Scope of Control is not released when the resource is
reallocated.
Self Protection
The
IT Environment will maintain a domain for its own execution that protects it
and its resources from external interference, tampering, or unauthorized
disclosure
Time for PKIF
The IT Environment will provide reliable time for the TOE use. The IT Environment does not
permit unauthorized users to change the time.
PKIF access
The
IT Environment will provide mechanisms that control a user’s logical access to
the PKIF.
PKIF protection
The
IT Environment will protect the PKIF and PKIF resources from external
interference, tampering, or unauthorized disclosure and modification.