Audit Generation

The IT Environment will provide the capability to detect and create records of security-relevant events associated with users.

Audit Protection

The IT Environment will provide the capability to protect audit information.

Audit Review

The IT Environment will provide the capability to selectively view audit information.

Correct TSF Operation

The IT environment will provide functionality to support the correct operation of the TSF and provide the capability to test the TSF to ensure the correct operation of the TSF at a installation location.

Display Banner

The IT Environment shall display an initial banner describing restrictions of use, legal agreements, or any other appropriate information to which users consent by accessing the system.

Manage

The IT Environment will provide all the functions and facilities necessary to support the administrators in their management of the security of the PKIF, and restrict these functions and facilities from unauthorized use.

Mediate

The IT Environment will protect user data in accordance with its security policy.

Residual Information

The IT Environment will ensure that any information contained in a protected resource within its Scope of Control is not released when the resource is reallocated.

Self Protection

The IT Environment will maintain a domain for its own execution that protects it and its resources from external interference, tampering, or unauthorized disclosure

Time for PKIF

The IT Environment will provide reliable time for the TOE use. The IT Environment does not permit unauthorized users to change the time.

PKIF access

The IT Environment will provide mechanisms that control a user’s logical access to the PKIF.

PKIF protection

The IT Environment will protect the PKIF and PKIF resources from external interference, tampering, or unauthorized disclosure and modification.