VE 06
SECTION 6: OPERATIONAL ENVIRONMENT
AS.06.01 If the operational environment is a modifiable operational environment, the operating system requirements in Section 4.6.1 shall apply.
Note: This assertion is not separately tested.
Passed
Assessment:
AS.06.03 The following requirements shall apply to operating systems for Security Level 1.
Note: This assertion is tested as part of AS06.04 through AS06.08.
Assessment:
AS.06.04 The operating system shall be restricted to a single operator mode of operation (i.e., concurrent operators are explicitly excluded).
Note: This requirement cannot be enforced by administrative documentation and procedures, but must be enforced by the cryptographic module itself.
Assessment:
VE.06.04.01
VE.06.04.01The vendor shall provide a description of the mechanism used to ensure
that only one user at a time can use the cryptographic module.
Assessment:
AS.06.05The cryptographic module shall prevent access by other processes to
plaintext private and secret keys, CSPs, and intermediate key
generation values during the time the cryptographic module is
executing/operational.Note: This requirement cannot be enforced by administrative documentation and procedures, but must be enforced by
the cryptographic module itself. Processes that are spawned by the
cryptographic module are owned by the module and are not owned by
external processes/operators.
Assessment:
VE.06.05.01
VE.06.05.01The vendor shall provide a description of the mechanism used to ensure
that no other process can access private and secret keys, intermediate
key generation values, and other CSPs, while the cryptographic process
is in use.
Assessment:
AS.06.06Non-cryptographic processes shall not interrupt the cryptographic
module during execution.
Assessment:
VE.06.06.01
VE.06.06.01The vendor shall provide a description of the mechanism used to ensure
that no other process can interrupt the cryptographic module during
execution.
Assessment:
AS.06.07All cryptographic software and firmware shall be installed in a form that
protects the software and firmware source and executable code from
unauthorized disclosure and modification.
Assessment:
VE.06.07.01
VE.06.07.01The vendor shall provide a list of the cryptographic software and
firmware that are stored on the cryptographic module and shall provide
a description of the protection mechanisms used to prevent
unauthorized disclosure and modification.
Assessment:
AS.06.08A cryptographic mechanism using an Approved integrity technique
(e.g., an Approved message authentication code or digital signature
algorithm) shall be applied to all cryptographic software and firmware
components within the cryptographic module.
Assessment:
VE.06.08.01
VE.06.08.01The vendor shall provide documentation that identifies the technique
used to maintain the integrity of the cryptographic software and
firmware components.