Text
Computer security
Contents
1.INTRODUCTION
1.1 ORGANIZATION
1.2 GLOSSARY OF TERMS AND ACRONYMS
2. KEY MANAGEMENT INFRASTRUCTURE
2.1 CENTRAL OVERSIGHT AUTHORITY
2.2 KEY PROCESSING FACILITY (IES)
2.3 SERVICE AGENTS
2.4 CLIENT NODES
3. KEY MANAGEMENT POLICY AND PRACTICES
3.1 KEY MANAGEMENT POLICY (KMP)
3.2 KEY MANAGEMENT PRACTICES STATEMENT (KMPS)
4. INFORMATION TECHNOLOGY SYSTEMS SECURITY PLANS
4.1 GENERAL SUPPORT SYSTEMS
4.2 MAJOR APPLICATION SECURITY PLANS
4.3 KEY MANAGEMENT ADDITIONS TO SYSTEM SECURITY PLANS
4.4 DOCUMENTATION REQUIRED FOR SECURITY EVALUATION
5. KEY MANAGEMENT PLANNING FOR CRYTOGRAOHIC COMPONENTS
5.1 KEY MANAGEMENT PLANNING DOCUMENTS
5.2 KEY MANAGEMENT PLANNING PROCESS
5.3 KEY MANAGEMENT PLANNING INFORMATION REQUIREMENTS
APPENDIX A : NOTIONAL KEY MANAGEMENT INFRASTRUCTURE (KMI)
A.1 NOTIONAL KEY MANAGEMENT INFRASTRUCTURE
A.2 REPRESENTATIVE ENCRYPTION KEY LIFECYCLES
A.3 INTEGRATION OF THE KMI INTO ORGANIZATIONS
APPENDIX B : INTERNET X.509 PUBLIC KEY INFRASTUCTURE CERTIFICATE POLICY AND CERTIFICATION PRACTICES FRAMEWORK
B.1 INTRODUCTION
B.2 GENERAL PROVISIONS
B.3 IDENTIFICATION AND AUTHENTICATION
B.4 OPERATIONAL REQUIREMENTS
B.5 MINIMUM BASELINE SECURITY CONTROLS
B.6 CERTIFICATE AND CRL PROFILES
B.7 SPECIFICATION ADMINISTRATION
APPENDIX C : EVALUATOR CHECKLIST
C.1 POLICY
C.2 PRACTICES
APPENDIX D : KEY MANAGEMENT INSERTS FOR SECURITY PLAN TEMPLATES
APPENDIX E : KEY MANAGEMENT SPECIFICATION CHECKLIST FOR CRYPTOGRAPHIC PRODUCT DEVELOPMENT
APPENDIX F : REFERENCES
No other version available