Joint task force transformation initiative


Identification and Authentication (Organizational Users)



Download 5.8 Mb.
Page172/186
Date31.01.2017
Size5.8 Mb.
#13082
1   ...   168   169   170   171   172   173   174   175   ...   186

Identification and Authentication (Organizational Users)

Remote Access - Separate Device



FIA_UAU.6

User Authentication

Re-Authenticating



IA-11

Re-authentication

FIA_UAU.7

User Authentication

Protected Authentication Feedback



IA-6

Authenticator Feedback

FIA_UID.1

User Identification

Timing of Identification



AC-14

Permitted Actions without Identification or Authentication

IA-2

Identification and Authentication (Organizational Users)

IA-8

Identification and Authentication (Non-Organizational Users)

FIA_UID.2

User Identification

User Identification Before Any Action



AC-14

Permitted Actions without Identification or Authentication

IA-2

Identification and Authentication (Organizational Users)

IA-8

Identification and Authentication (Non-Organizational Users)

FIA_USB.1

User-Subject Binding

User-Subject Binding



AC-16(3)

Security Attributes

Maintenance Of Attribute Associations By Information System



FMT_MOF.1

Management of Functions in TSF

Management of Security Functions Behavior



AC-3(7)

Access Enforcement

Role-Based Access Control



AC-6

Least Privilege

AC-6(1)

Least Privilege

Authorize Access To Security Functions



FMT_MSA.1

Management of Security Attributes

Management of Security Attributes



AC-6

Least Privilege

AC-6(1)

Least Privilege

Authorize Access To Security Functions



AC-16(2)

Security Attributes

Attribute Value Changes By Authorized Individuals



AC-16(4)

Security Attributes

Association of Attributes By Authorized Individuals



AC-16(10)

Security Attributes

Attribute Configuration By Authorized Individuals



FMT_MSA.2

Management of Security Attributes

Secure Security Attributes



AC-16

Security Attributes

CM-6

Configuration Settings

SI-10

Information Input Validation

FMT_MSA.3

Management of Security Attributes

Static Attribute Initialization



No Mapping.

FMT_MSA.4

Management of Security Attributes

Security Attribute Value Inheritance



No Mapping.

FMT_MTD.1

Management of TSF Data

Management of TSF Data



AC-3(7)

Access Enforcement

Role-Based Access Control



AC-6

Least Privilege

AC-6(1)

Least Privilege

Authorize Access To Security Functions



AU-6(7)

Audit Review, Analysis, and Reporting

Permitted Actions



AU-9(4)

Protection of Audit Information

Access By Subset of Privileged Users



FMT_MTD.2

Management of TSF Data

Management of Limits on TSF Data



AC-3(7)

Access Enforcement

Role-based Access Control



AC-6

Least Privilege

AC-6(1)

Least Privilege

Authorize Access To Security Functions



FMT_MTD.3

Management of TSF Data

Secure TSF Data



SI-10

Information Input Validation

FMT_REV.1

Revocation

Revocation



AC-3(7)

Access Enforcement

Rose-based Access Control



AC-3(8)

Access Enforcement

Revocation Of Access Authorizations



AC-6

Least Privilege

AC-6(1)

Least Privilege

Authorize Access To Security Functions



FMT_SAE.1

Security Attribute Expiration

Time-Limited Authorization



AC-3(7)

Access Enforcement

Role-based Access Control



AC-6

Least Privilege

AC-6(1)

Least Privilege

Authorize Access To Security Functions



FMT_SMF.1

Specification of Management Functions

Specification of Management Functions



No Mapping.

FMT_SMR.1

Security Management Roles

Security Roles



AC-2(7)


Account Management

Role-based schemes



AC-3(7)

Access Enforcement

Role-Based Access Control



AC-5

Separation of Duties

AC-6

Least Privilege

FMT_SMR.2

Security Management Roles

Restrictions on Security Roles




AC-2(7)

Account Management

Role-based schemes



AC-3(7)

Access Enforcement

Role-Based Access Control



AC-5

Separation of Duties

AC-6

Least Privilege

FMT_SMR.3

Security Management Roles

Assuming Roles



AC-6(1)


Least Privilege

Authorized Access to Security Functions



AC-6(2)

Least Privilege

Non-Privileged Access For Nonsecurity

Functions


FPR_ANO.1

Anonymity

Anonymity



No Mapping.

FPR_ANO.2

Anonymity

Anonymity Without Soliciting Information



No Mapping.

FPR_PSE.1

Pseudonymity

Pseudonymity



No Mapping.

FPR_PSE.2

Pseudonymity

Reversible Pseudonymity



No Mapping.

FPR_PSE.3

Pseudonymity

Alias Pseudonymity



No Mapping.

FPR_UNL.1

Unlinkability

Unlinkability



No Mapping.

FPR_UNO.1

Unobservability

Unobservability



No Mapping.

FPR_UNO.2

Unobservability

Allocation of Information Impacting Unobservability



No Mapping.

FPR_UNO.3

Unobservability

Unobservability Without Soliciting Information



No Mapping.

FPR_UNO.4

Unobservability

Authorized User Observability



No Mapping.

FPT_FLS.1

Fail Secure

Failure with Preservation of Secure State



SC-7(18)

Boundary Protection

Fail Secure



SC-24

Fail in Known State

FPT_ITA.1

Availability of Exported TSF Data

Inter-TSF Availability within a Defined Availability Metric



CP-10

Information System Recovery And Reconstitution

Restore Within Time Period



SC-5

Denial of Service Protection

SC-5(2)

Denial of Service Protection

Excess Capacity/Bandwidth/Redundancy



SC-5(3)


Denial of Service Protection

Detection/Monitoring



FPT_ITC.1

Confidentiality of Exported TSF Data

Inter-TSF Confidentiality During Transmission



SC-8

Transmission Confidentiality and Integrity

SC-8(1)

Transmission Confidentiality and Integrity

Cryptographic Or Alternate Physical Protection



FPT_ITI.1

Integrity of Exported TSF Data

Inter-TSF Detection of Modification



SC-8

Transmission Confidentiality and Integrity

SC-8(1)

Transmission Confidentiality and Integrity

Cryptographic Or Alternate Physical Protection



SI-7

Software, Firmware, and Information Integrity

SI-7(1)

Software, Firmware, and Information Integrity

Integrity Scans



SI-7(5)

Software, Firmware, and Information Integrity

Automated Response to Integrity Violations



SI-7(6)

Software, Firmware, and Information Integrity

Cryptographic Protection



FPT_ITI.2

Integrity of Exported TSF Data

Inter-TSF Detection and Correction of Modification



SC-8

Transmission Confidentiality and Integrity

SC-8(1)

Transmission Confidentiality and Integrity

Cryptographic Or Alternate Physical Protection



SI-7

Software, Firmware, and Information Integrity

SI-7(1)

Software, Firmware, and Information Integrity

Integrity Scans



SI-7(5)

Software, Firmware, and Information Integrity

Automated Response to Integrity Violations



SI-7(6)

Software, Firmware, and Information Integrity

Cryptographic Protection



FPT_ITT.1

Internal TOE TSF Data Transfer

Basic Internal TSF Data Transfer Protection



SC-8

Transmission Confidentiality and Integrity

SC-8(1)

Transmission Confidentiality and Integrity

Cryptographic Or Alternate Physical Protection



FPT_ITT.2


Internal TOE TSF Data Transfer

TSF Data Transfer Separation



AC-4(21)

Information Flow Enforcement

Physical / Logical Separation Of Information Flows



SC-8

Transmission Confidentiality and Integrity

SC-8(1)

Transmission Confidentiality and Integrity

Cryptographic Or Alternate Physical Protection



FPT_ITT.3

Internal TOE TSF Data Transfer

TSF Data Integrity Monitoring



SI-7

Software, Firmware, and Information Integrity

SI-7(1)

Software, Firmware, and Information Integrity

Integrity Scans



SI-7(5)

Software, Firmware, and Information Integrity

Automated Response to Integrity Violations



SI-7(6)

Software, Firmware, and Information Integrity

Cryptographic Protection



FPT_PHP.1

TSF Physical Protection

Passive Detection of Physical Attack



PE-3(5)

Physical Access Control

Tamper Protection



PE-6(2)

Monitoring Physical Access

Automated Intrusion Recognition / Responses



SA-18

Tamper Resistance and Detection

FPT_PHP.2

TSF Physical Protection

Notification of Physical Attack



PE-3(5)

Directory: publications
publications -> Acm word Template for sig site
publications ->  Preparation of Papers for ieee transactions on medical imaging
publications -> Adjih, C., Georgiadis, L., Jacquet, P., & Szpankowski, W. (2006). Multicast tree structure and the power law
publications -> Swiss Federal Institute of Technology (eth) Zurich Computer Engineering and Networks Laboratory
publications -> Quantitative skills
publications -> Multi-core cpu and gpu implementation of Discrete Periodic Radon Transform and Its Inverse
publications -> List of Publications Department of Mechanical Engineering ucek, jntu kakinada
publications -> 1. 2 Authority 1 3 Planning Area 1
publications -> Sa michelson, 2011: Impact of Sea-Spray on the Atmospheric Surface Layer. Bound. Layer Meteor., 140 ( 3 ), 361-381, doi: 10. 1007/s10546-011-9617-1, issn: Jun-14, ids: 807TW, sep 2011 Bao, jw, cw fairall, sa michelson

Download 5.8 Mb.

Share with your friends:
1   ...   168   169   170   171   172   173   174   175   ...   186




The database is protected by copyright ©ininet.org 2024
send message

    Main page