Archived U.S. Government Approved Protection Profile - Certificate Issuing and Management Components Security Level 4 Protection Profile Version 1.0
Short Name: pp_cimc_sl4_v1.0 Technology Type: Certificate Authority CC Version: 2.x Date: 2001.10.31 Sunset Date: 2008.03.21 Conformance Claim: EAL4 Augmented Protection Profile
PP OVERVIEWHerewith a brief summary, sufficiently detailed to enable a potential user to determine whether the PP is of interest. Certificate Issuing and Management Components (CIMCs) may consist of one of more devices that are responsible for the issuance, revocation, and overall management of certificates and certificate status information. The CIMC PPs in this document define the minimum-security requirements for CIMCs for use in a variety of environments. These environments are summarized below and are described in detail in Section 2. The requirements for FIPS 140-1 validated cryptographic modules and specific FIPS 140-1 levels are based on the level of risk and specific threats identified for each CIMC PP. The FIPS 140-1 requirements are intended to provide additional assurance. SECURITY EVALUATION SUMMARYThe security and assurance requirements specified at Security Level 4 are intended for environments where the threats to and consequences of data disclosure and loss of data integrity are significant. At this level, both users and the environment are assumed to be hostile. Security Level 4 is intended to protect against malicious authorized and unauthorized users. Security Level 4 requires significant assurance that the security features are functioning properly. Security Level 4 specifies functional and assurance requirements that were not widely available in products when this specification was developed. While it pushes the current state of the art, these requirements should be achievable in the near future. The EAL for Security Level 4 is EAL 4 augmented. ENVIRONMENTAL STRENGTHSBecause a PP is written to be implementation-independent, there may be some ambiguities that do not arise until a specific implementation is being evaluated against it. When this happens, a resolution is established through the Observation Decision (OD) process in the form of a Precedent Decision (PD), which is to be used consistently in subsequent evaluations involving the PP in question. The Precedent Decisions specifically associated with this PP are listed below:
This U.S. Government Approved Protection Profile is not assigned to any Validated ProductsThis U.S. Government Approved Protection Profile does not have any related Technical DecisionsPlease forward any Protection Profile specific comments to the applicable Technical Rapid Response Team (TRRT). Please forward any general questions to our Q&A tool. |