“Source Code, High Level Architecture Documentation and Common Criteria Documentation Copyright (C) 2010-2011 and ownership belongs to The Norwegian Ministry of Local Government and Regional Development and Scytl Secure Electronic Voting SA (“Licensor”)
Introduction 6
Overall conceptual design 7
Main security domains and the interfaces between them 7
Main user groups 10
Authentication 10
Authorisation and access control 12
Overall logical design 14
Application architecture 14
Conceptual security design – eVoting 15
Logging, auditing, and monitoring 18
Overall physical design 18
Desktop environment 18
Local area network environment 18
Wide area networking environment 18
Solution topology 20
Secure initialisation process 21
Domain isolation 23
Physical Isolation. 23
Logical Isolation. 23
Self-protection 24
Configuration protection. 24
Software protection. 24
Segregation of duties protection. 25
Non-bypassibility 26