Ecurity, Unctional, Equirements – Nortel Networks Nortel Network VPN Router and Client Workstation 7.05 User Manual

Page 55: Ationale, 2 security functional requirements rationale

Advertising
background image

Security Target, Version 3.9

March 18, 2008

Nortel VPN Router v7.05 and Client Workstation v7.11

Page 55 of 67

© 2008 Nortel Networks

This may mean the environment provides a connection to a trusted Certificate Authority, or
that the required certificates are otherwise available to the TOE. It is assumed that the
appropriate infrastructure is properly maintained in order to ensure the accuracy and
security of the certificates (e.g.
, certificates are revoked in a timely manner).

The environment ensures that the required certificate infrastructure is provided so that the validity
of certificates can be verified. The Environment also ensures that the chosen infrastructure is
maintained so that certificates have their state accurately provided to the TOE
(OE.CERTIFICATE).

OE.CERTIFICATE satisfies this assumption.

A.INSTALL

It is assumed that the TOE is delivered, installed, and setup in accordance with documented
delivery and installation/setup procedures.

Those responsible for the TOE ensure that it is delivered, installed, managed, and operated in
accordance with documented delivery and installation/setup procedures (OE.DELIVERY).

OE.DELIVERY satisfies this assumption.

A.ACCESS

It is assumed that the TOE has access to all the IT System data it needs to perform its
functions.

Those responsible for the TOE ensure that it is delivered, installed, managed, and operated in
accordance with documented delivery and installation/setup procedures (OE.DELIVERY).

OE.DELIVERY satisfies this assumption.

A.DOMSEP

It is assumed that the IT environment will maintain a security domain for the Nortel VPN
software that protects it from interference and tampering by untrusted subjects.

The environment ensures that a security domain for the Nortel VPN Client software that protects it
from interference and tampering by untrusted subjects is maintained (OE.DOMSEP).

OE.DOMSEP satisfies this assumption.

8.2 Security Functional Requirements Rationale

The following discussion provides detailed evidence of coverage for each security objective.

Advertising
This manual is related to the following products: