Cisco IPS4345 Bedienungsanleitung Seite 24

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 61
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 23
Cisco Intrusion Prevention System Security Target
4.2 Security Objectives for the Environment
All of the assumptions stated in section 3.1 are considered to be security objectives for the
environment. The following are the Protection Profile non-IT security objectives, which, in
addition to those assumptions, are to be satisfied without imposing technical requirements on the
TOE. That is, they will not require the implementation of functions in the TOE hardware and/or
software. Thus, they will be satisfied largely through application of procedural or administrative
measures.
Table 12: Security Objectives for the Environment
Environment Security
Objective
Operational Environment Security Objective Definition
Reproduced from the U.S. Government Protection Profile for Security Requirements for Network Devices
OE.NO_GENERAL_PURPOSE
There are no general-purpose computing capabilities (e.g., compilers or user
applications) available on the TOE, other than those services necessary for the
operation, administration and support of the TOE.
OE.PHYSICAL
Physical security, commensurate with the value of the TOE and the data it
contains, is provided by the environment.
OE.TRUSTED_ADMIN
TOE Administrators are trusted to follow and apply all administrator guidance
in a trusted manner.
4.3 Security objectives rationale
The security objectives rationale shows how the security objectives correspond to assumptions,
threats, and organizational security policies and provide a justification of that tracing.
4.3.1 Tracing of security objectives to SPD
The tracing shows how the security objectives O.* and OE.* trace back to assumptions A.*,
threats T.*, and organizational security policies OSP.* defined by the SPD.
Table 13: Tracing of security objectives to SPD
A.NO_GENERAL_PURPOSE
A.PHYSICAL
A.TRUSTED_ADMIN
T.UNAUTHORIZED_ACCESS
T.UNAUTHORIZED_UPDATE
T.ADMIN_ERROR
T.UNDETECTED_ACTIONS
T.RESOURCE_EXHAUSTION
T.USER_DATA_REUSE
T.TSF_FAILURE
T.TRANSMIT
P.ACCESS BANNER
O.PROTECTED_COMMUNICATIONS
X
O.VERIFIABLE_UPDATES
X
O.SYSTEM_MONITORING
X
O.DISPLAY_BANNER
X
O.TOE_ADMINISTRATION
X
O.RESIDUAL_INFORMATION_CLEARING
X
Seitenansicht 23
1 2 ... 19 20 21 22 23 24 25 26 27 28 29 ... 60 61

Kommentare zu diesen Handbüchern

Keine Kommentare