Joint task force transformation initiative



Download 5.8 Mb.
Page173/186
Date31.01.2017
Size5.8 Mb.
#13082
1   ...   169   170   171   172   173   174   175   176   ...   186

Physical Access Control

Tamper Protection



PE-6(2)

Monitoring Physical Access

Automated Intrusion Recognition / Responses



SA-18

Tamper Resistance and Detection

FPT_PHP.3

TSF Physical Protection

Resistance to Physical Attack



PE-3(5)

Physical Access Control

Tamper Protection



SA-18

Tamper Resistance and Detection

FPT_RCV.1

Trusted Recovery

Manual Recovery



CP-10

Information System Recovery and Reconstitution

CP-12

Safe Mode

FPT_RCV.2

Trusted Recovery

Automated Recovery



CP-10

Information System Recovery and Reconstitution

CP-12

Safe Mode

FPT_RCV.3

Trusted Recovery

Automated Recovery Without Undue Loss



CP-10

Information System Recovery and Reconstitution

CP-12

Safe Mode

FPT_RCV.4

Trusted Recovery

Function Recovery



SI-6

Security Function Verification

SI-10(3)

Information Input Validation

Predictable Behavior



SC-24

Fail in Known State

FPT_RPL.1

Replay Detection

Replay Detection



IA-2(8)

Identification and Authentication (Organizational Users)

Network Access To Privileged Accounts - Replay Resistant



IA-2(9)

Identification and Authentication (Organizational Users)

Network Access To Non-Privileged Accounts - Replay Resistant



SC-23

Session Authenticity

SI-3(9)

Malicious Code Protection

Authenticate Remote Commands



FPT_SSP.1

State Synchrony Protocol

Simple Trusted Acknowledgement



No Mapping.

FPT_SSP.2

State Synchrony Protocol

Mutual Trusted Acknowledgement



No Mapping.

FPT_STM.1

Time Stamps

Reliable Time Stamps



AU-8

Time Stamps

FPT_TDC.1

Inter-TSF TSF Data Consistency

Inter-TSF Basic Data Consistency



AC-16(7)


Security Attributes | Consistent Attribute Interpretation

AC-16(8)

Security Attributes

Association Techniques/Technologies



FPT_TEE.1

Testing of External Entities

Testing of External Entities



SI-6

Security Functionality Verification

FPT_TRC.1

Internal TOE TSF Data Replication Consistency

Internal TSF Consistency



SI-7

Software, Firmware, and Information Integrity

FPT_TST.1

TSF Self-Test

TSF Testing



SI-6

Security Functionality Verification

SI-7

Software, Firmware, and Information Integrity

FRU_FLT.1

Fault Tolerance

Degraded Fault Tolerance



AU-15

Alternate Audit Capability

CP-11

Alternate Communications Protocols

SC-24

Fail in Known State

SI-13

Predictable Failure Prevention

SI-13(1)

Predictable Failure Prevention

Transferring Component Responsibilities



SI-13(2)

Predictable Failure Prevention

Time Limit on Process Execution Without Supervision



SI-13(3)

Predictable Failure Prevention

Manual Transfer Between Components



SI-13(4)

Predictable Failure Prevention

Standby Component Installation/Notification



SI-13(5)

Predictable Failure Prevention

Failover Capability



FRU_FLT.2

Fault Tolerance

Limited Fault Tolerance



AU-15

Alternate Audit Capability

CP-11

Alternate Communications Protocols

SC-24

Fail in Known State

SI-13

Predictable Failure Prevention

SI-13(1)

Predictable Failure Prevention

Transferring Component Responsibilities



SI-13(2)

Predictable Failure Prevention

Time Limit on Process Execution Without Supervision



SI-13(3)

Predictable Failure Prevention

Manual Transfer Between Components



SI-13(4)

Predictable Failure Prevention

Standby Component Installation/Notification



SI-13(5)

Predictable Failure Prevention

Failover Capability



FRU_PRS.1

Priority of Service

Limited Priority of Service



SC-6

Resource Availability

FRU_PRS.2

Priority of Service

Full Priority of Service



SC-6

Resource Availability

FRU_RSA.1

Resource Allocation

Maximum Quotas



SC-6

Resource Availability

FRU_RSA.2

Resource Allocation

Minimum and Maximum Quotas



SC-6

Resource Availability

FTA_LSA.1

Limitation on Scope of Selectable Attributes

Limitation on Scope of Selectable Attributes



AC-2(6)

Account Management

Dynamic Privilege Management



AC-2(11)

Account Management

Usage Conditions



FTA_MCS.1

Limitation on Multiple Concurrent Sessions

Basic Limitation on Multiple Concurrent Sessions



AC-10

Concurrent Session Control

FTA_MCS.2

Limitation on Multiple Concurrent Sessions

Per-User Limitation on Multiple Concurrent Sessions



AC-10

Concurrent Session Control

FTA_SSL.1

Session Locking and Termination

TSF-Initiated Session Locking



AC-11

Session Lock

AC-11(1)

Session Lock

Pattern-Hiding Displays



FTA_SSL.2

Session Locking and Termination

User-Initiated Locking



AC-11

Session Lock

AC-11(1)

Session Lock

Pattern-Hiding Displays



FTA_SSL.3

Session Locking and Termination

TSF-Initiated Termination



AC-12

Session Termination

SC-10

Network Disconnect

FTA_SSL.4

Session Locking and Termination

User-Initiated Termination



AC-12(1)

Session Termination

User-Initiated Logouts / Message Displays



FTA_TAB.1

TOE Access Banners

Default TOE Access Banners



AC-8

System Use Notification

FTA_TAH.1

TOE Access History

TOE Access History



AC-9

Previous Login (Access) Notification

AC-9(1)

Previous Login (Access) Notification

Unsuccessful Logons



FTA_TSE.1

TOE Session Establishment

TOE Session Establishment



AC-2(11)

Account Management

Usage Conditions



FTP_ITC.1

Inter-TSF Trusted Channel

Inter-TSF Trusted Channel



IA-3(1)

Device Identification and Authentication

Cryptographic Bidirectional Authentication



SC-8

Transmission Confidentiality and Integrity

SC-8(1)

Transmission Confidentiality and Integrity

Cryptographic or Alternate Physical Protection



FTP_TRP.1

Trusted Path

Trusted Path



SC-11

Trusted Path

Assurance Requirements




ASE_INT.1

EAL1
EAL2


EAL3
EAL4
EAL5
EAL6
EAL7

ST Introduction

ST Introduction



SA-4

Acquisition Process

ASE_CCL.1

EAL1
EAL2


EAL3
EAL4
EAL5
EAL6
EAL7

Conformance Claims

Conformance Claims



PL-2

System Security Plan

SA-4(7)

Acquisition Process

NIAP-Approved Protection Profiles



ASE_SPD.1

EAL1
EAL2


EAL3
EAL4
EAL5
EAL6
EAL7

Security Problem Definition

Security Problem Definition



PL-2

System Security Plan

SA-4

Acquisition Process

ASE_OBJ.1

EAL1


Security Objectives

Security Objectives for the Operational Environment



PL-2

System Security Plan

SA-4

Acquisition Process

ASE_OBJ.2

EAL2
EAL3


EAL4
EAL5
EAL6
EAL7

Security Objectives

Security Objectives



PL-2

System Security Plan

SA-4

Acquisition Process

ASE_ECD.1

EAL1
EAL2


EAL3
EAL4
EAL5
EAL6
EAL7

Extended Components Definition

Extended Components Definition



No Mapping.

ASE_REQ.1

EAL1


Security Requirements

Stated Security Requirements



PL-2

System Security Plan

SA-4

Acquisition Process

ASE_REQ.2

EAL2
EAL3


EAL4
EAL5
EAL6
EAL7

Security Requirements

Derived Security Requirements



PL-2

System Security Plan

SA-4

Acquisition Process

ASE_TSS.1

EAL1
EAL2


EAL3
EAL4
EAL5
EAL6
EAL7

TOE Summary Specification

TOE Summary Specification



PL-2

System Security Plan

SA-4(1)


Acquisition Process

Functional Properties of Security Controls



ASE_TSS.2

TOE Summary Specification

TOE Summary Specification with Architectural Design Summary



PL-2

System Security Plan

SA-4(1)

Acquisition Process

Functional Properties of Security Controls



SA-4(2)

Acquisition Process

Design / Implementation Information For Security Controls



SA-17

Directory: publications
publications -> Acm word Template for sig site
publications ->  Preparation of Papers for ieee transactions on medical imaging
publications -> Adjih, C., Georgiadis, L., Jacquet, P., & Szpankowski, W. (2006). Multicast tree structure and the power law
publications -> Swiss Federal Institute of Technology (eth) Zurich Computer Engineering and Networks Laboratory
publications -> Quantitative skills
publications -> Multi-core cpu and gpu implementation of Discrete Periodic Radon Transform and Its Inverse
publications -> List of Publications Department of Mechanical Engineering ucek, jntu kakinada
publications -> 1. 2 Authority 1 3 Planning Area 1
publications -> Sa michelson, 2011: Impact of Sea-Spray on the Atmospheric Surface Layer. Bound. Layer Meteor., 140 ( 3 ), 361-381, doi: 10. 1007/s10546-011-9617-1, issn: Jun-14, ids: 807TW, sep 2011 Bao, jw, cw fairall, sa michelson

Download 5.8 Mb.

Share with your friends:
1   ...   169   170   171   172   173   174   175   176   ...   186




The database is protected by copyright ©ininet.org 2024
send message

    Main page