VE 11: Difference between revisions
Jump to navigation
Jump to search
Line 20: | Line 20: | ||
==VE.11.01.02== | ==VE.11.01.02== | ||
<P ALIGN=LEFT STYLE="margin-top: 0.11in; margin-bottom: 0in"><FONT COLOR="#000000"><FONT FACE="Times New Roman, Times New Roman, serif"><FONT SIZE=3><B><FONT SIZE=4>VE.11.01.02</FONT></B> The | <P ALIGN=LEFT STYLE="margin-top: 0.11in; margin-bottom: 0in"><FONT COLOR="#000000"><FONT FACE="Times New Roman, Times New Roman, serif"><FONT SIZE=3><B><FONT SIZE=4>VE.11.01.02</FONT></B> The | ||
vendor provided nonproprietary security policy shall indicate how | vendor provided nonproprietary security policy shall indicate how the | ||
implemented mechanism(s) were shown to mitigate the attack(s).</FONT></FONT></FONT></P> | implemented mechanism(s) were shown to mitigate the attack(s).</FONT></FONT></FONT></P> | ||
<P ALIGN=LEFT STYLE="margin-top: 0.17in; margin-bottom: 0in"><FONT COLOR="#000080"><FONT FACE="Times New Roman, Times New Roman, serif"><FONT SIZE=3><I><B>Assessment:</B></I></FONT></FONT></FONT></P> | <P ALIGN=LEFT STYLE="margin-top: 0.17in; margin-bottom: 0in"><FONT COLOR="#000080"><FONT FACE="Times New Roman, Times New Roman, serif"><FONT SIZE=3><I><B>Assessment:</B></I></FONT></FONT></FONT></P> | ||
<P ALIGN=LEFT STYLE="margin-top: 0.09in; margin-bottom: 0in"><FONT COLOR="#000000"><FONT FACE="Times New Roman, Times New Roman, serif"><FONT SIZE=3><B>Not Applicable</B></FONT></FONT></FONT></P> | <P ALIGN=LEFT STYLE="margin-top: 0.09in; margin-bottom: 0in"><FONT COLOR="#000000"><FONT FACE="Times New Roman, Times New Roman, serif"><FONT SIZE=3><B>Not Applicable</B></FONT></FONT></FONT></P> |
Revision as of 18:50, 12 April 2006
SECTION 11: MITIGATION OF OTHER ATTACKS
AS.11.01 If the cryptographic module is designed to mitigate one or more specific attacks, then the module's security policy shall specify the security mechanisms employed by the module to mitigate the attack(s).
Assessment:
Not Applicable
VE.11.01.01
VE.11.01.01 The vendor provided nonproprietary security policy shall specify whether the cryptographic module is designed to mitigate specific attacks. The vendor shall specify in the nonproprietary security policy the security mechanism(s) implemented by the cryptographic module to mitigate the attack(s).
Assessment:
Not Applicable
VE.11.01.02
VE.11.01.02 The vendor provided nonproprietary security policy shall indicate how the implemented mechanism(s) were shown to mitigate the attack(s).
Assessment:
Not Applicable