
Cisco Intrusion Prevention System Security Target
4.3.2 Justification of tracing............................................................................................... 25
4.3.3 Security objectives conclusion .................................................................................. 26
5 SECURITY REQUIREMENTS ........................................................................................... 27
5.1 Conventions .................................................................................................................. 27
5.2 TOE Security Functional Requirements ....................................................................... 27
5.2.1 Security audit (FAU)................................................................................................. 28
5.2.2 Cryptographic Support (FCS) ................................................................................... 30
5.2.3 User data protection (FDP) ....................................................................................... 33
5.2.4 Identification and authentication (FIA) .................................................................... 33
5.2.5 Security management (FMT) .................................................................................... 34
5.2.6 Protection of the TSF (FPT) ..................................................................................... 34
5.2.7 Trusted Path/Channels (FTP) .................................................................................... 35
5.3 Rationale for Explicitly Stated Requirements ............................................................... 36
5.4 SFR Dependencies Rationale ........................................................................................ 37
5.5 Security Assurance Requirements ................................................................................ 39
5.5.1 SAR Requirements.................................................................................................... 39
5.5.2 Security Assurance Requirements Rationale ............................................................ 39
5.5.3 Assurance Measures.................................................................................................. 39
6 TOE Summary Specification ................................................................................................ 41
6.1 Security Requirements Rationale .................................................................................. 41
6.2 TOE Security Functional Requirement Measures ........................................................ 42
6.3 TOE Bypass and interference/logical tampering Protection Measures ........................ 47
7 Supplemental Cryptographic Information ............................................................................. 49
7.1 Key Zeroization ............................................................................................................ 49
7.2 NIST Special Publication 800-56A .............................................................................. 49
7.3 NIST Special Publication 800-56B ............................................................................... 55
8 Annex A: References ............................................................................................................ 61
Komentarze do niniejszej Instrukcji