@@ -1103,7 +1103,7 @@ It covers misuse of users and administrators function : T_SYS02,T_SYS05, T_SYS07
## 5.2 Secret management
- REFERENCE: REQ-5.2-01
- REQUIREMENT: The PKI shall only create key pairs keys by means of a secure cryptographic device appropriate for this use.
- REQUIREMENT: The PKI shall only create keys by means of a secure cryptographic device appropriate for this use.
- RATIONALE: To ensure trust the PKI software must rely on secure and valid key creation and management systems accessible only to authorised users provided by hardware security devices. It covers key tampering and disclosure threats: T_GEN01 to T_GEN08, T.Stored_Certificates_Tampering.