18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.5 Computer Security Controls<br />

6.5.1 Specific Computer Security Technical Requirements<br />

The following computer security functions may be provided by the operating system, or through<br />

a combination of operating system, software, and physical safeguards. The CA, CSA and RA<br />

shall include the following functionality:<br />

� Require authenticated logins<br />

� Provide Discretionary Access Control, including managing privileges of users to limit<br />

users to their assigned roles<br />

� Provide a security audit capability (See Section 5.4)<br />

� Prohibit object re-use<br />

� Require use of cryptography for session communication and database security<br />

� Require a trusted path for identification and authentication<br />

� Provide domain isolation for processes<br />

� Provide self-protection for the operating system<br />

� Require self-test security related CA services (e.g., check the integrity of the audit<br />

logs)<br />

� Support recovery from key or system failure<br />

When CA equipment is hosted on evaluated platforms in support of computer security<br />

assurance requirements then the system (hardware, software, operating system) shall, when<br />

possible, operate in an evaluated configuration. At a minimum, such platforms shall use the<br />

same version of the computer operating system as that which received the evaluation rating.<br />

The computer system shall be configured with minimum of the required accounts and network<br />

services, and no remote login.<br />

6.5.2 Computer Security Rating<br />

See section 6.5.1.<br />

6.6 Life-Cycle Technical Controls<br />

6.6.1 System Development Controls<br />

The System Development Controls for the CA and CSA are as follows:<br />

� Use software that has been designed and developed under a formal, documented<br />

development methodology.<br />

� Hardware and software procured shall be purchased in a fashion to reduce the<br />

likelihood that any particular device was tampered with (e.g., by ensuring the<br />

equipment was randomly selected at time of purchase).<br />

� Hardware and software developed shall be developed in a controlled environment,<br />

and the development process shall be defined and documented. This requirement<br />

does not apply to commercial off-the-shelf hardware or software.<br />

66 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!