McAfee HARDWARE 1.4 Guide d'installation Page 43

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 61
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 42
McAfee Email Gateway
Security Target
McAfee Incorporated
Page 43 of 61
FAU_STG_EXT.1 External Audit Trail Storage
FAU_STG_EXT.1.1The TSF shall be able to [transmit the generated audit data to an external IT entity]
using a trusted channel implementing the [SSH
] protocol.
5.2.3 Cryptographic Support (FCS)
Application Note: [NDPP] does not specify that correct cryptographic operation must be validated through
compliance with FIPS 140. However, the Canadian Common Criteria Scheme requires that this is done,
and so compliance with FIPS 140 is considered implicit in the following cryptographic
requirements. Certificate numbers are provided in section 6.1.9.
FCS_CKM.1 Cryptographic Key Generation (for asymmetric keys)
FCS_CKM.1.1 The TSF shall generate asymmetric cryptographic keys used for key
establishment in accordance with
a specified cryptographic key generation
algorithm [assignment: cryptographic key generation algorithm] [
NIST Special Publication 800-56B, “Recommendation for Pair-Wise Key
Establishment Schemes Using Integer Factorization Cryptography” for RSA-
based key establishment schemes]
and specified cryptographic key sizes [equivalent to, or greater than, a symmetric key
strength of 112 bits]
that meet the following:.
FCS_CKM_EXT.4 Cryptographic Key Zeroization
FCS_CKM_EXT.4.1 The TSF shall zeroize all plaintext secret and private cryptographic keys and
CSPs when no longer required.
FCS_COP.1(1) Cryptographic Operation (for data encryption/decryption)
FCS_COP.1.1(1) The TSF shall perform [encryption and decryption] in accordance with a specified
cryptographic algorithm [AES operating in [CBC mode]] and cryptographic key sizes
128-bits, 256-bits, and [no other key sizes
] that meet the following: [
FIPS PUB 197, “Advanced Encryption Standard (AES)”
[NIST SP 800-38A
].
FCS_COP.1(2) Cryptographic Operation (for cryptographic signature)
FCS_COP.1.1(2) The TSF shall perform [cryptographic signature services] in accordance with a
specified cryptographic
algorithm [
a) RSA Digital Signature Algorithm (rDSA) with a key size (modulus) of 2048
bits or greater]
and cryptographic key sizes [assignment:
cryptographic key sizes] that meet
the following: [
Case: RSA Digital Signature Algorithm
FIPS PUB 186-2 or 186-3, “Digital Signature Standard"].
Vue de la page 42
1 2 ... 38 39 40 41 42 43 44 45 46 47 48 ... 60 61

Commentaires sur ces manuels

Pas de commentaire