18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6 TECHNICAL SECURITY CONTROLS<br />

6.1 <strong>Key</strong> Pair Generation and Installation<br />

6.1.1 <strong>Key</strong> Pair Generation<br />

The following table provides the requirements for key pair generation for the various entities.<br />

Entity FIPS 140-1/2<br />

Level<br />

Hardware or<br />

Software<br />

Same Module<br />

CA 3 Hardware Same<br />

RA 2 Hardware Same<br />

CSA 2 Hardware Same<br />

Code Signing 2 Hardware Same<br />

End Entity Signature or<br />

Authentication (mediumsoftware<br />

and medium-<br />

CBP-software)<br />

1 Software No Requirement<br />

End Entity Encryption<br />

(medium-software and<br />

medium-CBP-software)<br />

End Entity Signature or<br />

Authentication (mediumhardware,<br />

medium-<br />

CBP-hardware and highhardware)<br />

End Entity Encryption<br />

(medium-hardware,<br />

medium-CBP-hardware<br />

and high-hardware)<br />

Server (medium-software<br />

and medium-CBP-<br />

software)<br />

Server (medium-hardware,<br />

medium-CBP-hardware,<br />

and high-hardware)<br />

1 Software No Requirement<br />

2 Hardware Same<br />

2 Hardware No Requirement<br />

1 Software<br />

2 Hardware<br />

No Requirement<br />

Same<br />

Random numbers for medium-hardware, medium-CBP-hardware, and high-hardware assurance<br />

level keys shall be generated in FIPS 140 Level 2 validated hardware cryptographic modules.<br />

When private keys are not generated on the token to be used, originally generated private keys<br />

shall be destroyed after they have been transferred to the token. This does not prohibit the key<br />

generating modules to act as the key escrow module also.<br />

Multiparty control shall be used CA key pair generation, as specified in Section 5.2.2.<br />

CA key pair generation process shall create a verifiable audit trail that the security requirements<br />

for procedures were followed. The documentation of the procedure shall be detailed enough to<br />

58 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!