FIPS2009 Section 6: Operation Enviroment

From MozillaWiki
Jump to: navigation, search

Document Description

DTR Section

Assessment

Status

Describe the operational environment in which the module operates. VE.06.02.01 Operational Environment Draft
Describe the mechanism used to ensure that only one user at a time can use the cryptographic module. VE.06.04.01 Single Operator Mode of Operation Draft
Describe the mechanism used to ensure that no other process can access private and secret keys, intermediate key generation values, and other CSPs, while the cryptographic process is in use. VE.06.05.01 The operating system protects the address space of the cryptographic process from the other processes. Draft
Describe the mechanism used to ensure that no other process can interrupt the cryptographic module during execution. VE.06.06.01 The operating system protects the address space of the cryptographic process from the other processes. Draft
List the cryptographic software stored on the cryptographic module and describe the protection mechanisms used to prevent unauthorized disclosure and modification. VE.06.07.01 While the cryptographic software is in the RAM, the operating system protects the address space of the cryptographic process from the other processes. Draft
Identify the technique used to maintain the integrity of the cryptographic software components. VE.06.08.01 Software Integrity Test Draft
The operating system controlling the cryptographic module has passed evaluation at EAL2 for the Controlled Access Protection Profile (CAPP). VE.06.10.01 Please refer to the following documents on the Common Criteria portal: Draft
Specify how the discretionary access control (DAC) mechanism is configured to meet the requirements of AS06.11, AS06.12, AS06.13, and AS06.14. VE.06.14.01 Configuring Discretionary Access Control Draft
Specify how the operating system prevents all operators and executing processes from modifying executing cryptographic processes. VE.06.15.01 The operating system protects the address space of an executing process from modifications by another process. Draft
Specify how the operating system prevents operators and executing processes from reading cryptographic software stored within the cryptographic boundary. VE.06.16.01 The operating system protects the address space of an executing process from reading by another process. Draft
Identify all the events that are auditable by the cryptographic module software. VE.06.17.01 Auditable Events Draft

Return to: NSSCryptoModuleSpec2009