VE 06
SECTION 6: OPERATIONAL ENVIRONMENT
AS.06.01 If the operational environment is a modifiable operational environment, the operating system requirements in Section 4.6.1 shall apply.
Note: This assertion is not separately tested.
Passed
Assessment:
AS.06.03 The following requirements shall apply to operating systems for Security Level 1.
Note: This assertion is tested as part of AS06.04 through AS06.08.
Assessment:
AS.06.04 The operating system shall be restricted to a single operator mode of operation (i.e., concurrent operators are explicitly excluded).
Note: This requirement cannot be enforced by administrative documentation and procedures, but must be enforced by the cryptographic module itself.
Assessment:
VE.06.04.01
VE.06.04.01 The vendor shall provide a description of the mechanism used to ensure that only one user at a time can use the cryptographic module.
Assessment:
AS.06.05 The cryptographic module shall prevent access by other processes to plaintext private and secret keys, CSPs, and intermediate key generation values during the time the cryptographic module is executing/operational. Note: This requirement cannot be enforced by administrative documentation and procedures, but must be enforced by the cryptographic module itself. Processes that are spawned by the cryptographic module are owned by the module and are not owned by external processes/operators.
Assessment:
VE.06.05.01
VE.06.05.01 The vendor shall provide a description of the mechanism used to ensure that no other process can access private and secret keys, intermediate key generation values, and other CSPs, while the cryptographic process is in use.
Assessment:
AS.06.06 Non-cryptographic processes shall not interrupt the cryptographic module during execution.
Assessment:
VE.06.06.01
VE.06.06.01 The vendor shall provide a description of the mechanism used to ensure that no other process can interrupt the cryptographic module during execution.
Assessment:
AS.06.07 All cryptographic software and firmware shall be installed in a form that protects the software and firmware source and executable code from unauthorized disclosure and modification.
Assessment:
VE.06.07.01
VE.06.07.01 The vendor shall provide a list of the cryptographic software and firmware that are stored on the cryptographic module and shall provide a description of the protection mechanisms used to prevent unauthorized disclosure and modification.
Assessment:
AS.06.08 A cryptographic mechanism using an Approved integrity technique (e.g., an Approved message authentication code or digital signature algorithm) shall be applied to all cryptographic software and firmware components within the cryptographic module.
Assessment:
VE.06.08.01
VE.06.08.01 The vendor shall provide documentation that identifies the technique used to maintain the integrity of the cryptographic software and firmware components.
Assessment:
AS06.10 (Level 2) All cryptographic software and firmware, cryptographic keys and CSPs, and control and status information shall be under the control of
- an operating system that meets the functional requirements specified in the Protection Profiles listed in Annex B and is evaluated at the CC evaluation assurance level EAL2, or
- an equivalent evaluated trusted operating system.
VE06.10.01
VE06.10.01 (Level 2) The vendor shall provide documentation that the operating system controlling the cryptographic module has successfully passed evaluation at EAL2 for the functional requirements specified in the protection profiles listed in Annex B.
AS06.11 (Level 2) To protect plaintext data, cryptographic software and firmware, cryptographic keys and CSPs, and authentication data, the discretionary access control mechanisms of the operating system shall be configured to specify the set of roles that can execute stored cryptographic software and firmware.
AS06.12: (Level 2) To protect plaintext data, cryptographic software and firmware, cryptographic keys and CSPs, and authentication data, the discretionary access control mechanisms of the operating system shall be configured to specify the set of roles that can modify (i.e., write, replace, and delete) the following cryptographic module software or firmware components stored within the cryptographic boundary: cryptographic programs, cryptographic data (e.g., cryptographic keys and audit data), CSPs, and plaintext data.
AS06.13 (Level 2) To protect plaintext data, cryptographic software and firmware, cryptographic keys and CSPs, and authentication data, the discretionary access control mechanisms of the operating system shall be configured to specify the set of roles that can read the following cryptographic software components stored within the cryptographic boundary: cryptographic data (e.g., cryptographic keys and audit data), CSPs, and plaintext data.
AS06.14 (Level 2) To protect plaintext data, cryptographic software and firmware, cryptographic keys and CSPs, and authentication data, the discretionary access control mechanisms of the operating system shall be configured to specify the set of roles that can enter cryptographic keys and CSPs.