@@ -1108,7 +1108,7 @@ It covers misuse of users and administrators function : T_SYS02,T_SYS05, T_SYS07
- APPLICABILITY: All use cases
- REFERENCE: REQ-5.2-02
- REQUIREMENT: Private keys shall be stored within secure cryptographic device or encrypted using approved algorithms as defined in Annex K using independently managed keys.
- REQUIREMENT: Secret keys shall not be stored persistently in plaintext form. They shall be stored within a secure cryptographic device or encrypted using approved algorithms as defined in Annex K using independently managed keys. They may only be accessed in plaintext form temporarily for a single operation or batch of operations.
- RATIONALE: To ensure trust the PKI software must rely on secure and valid key creation and management systems accessible only to authorised users provided by hardware security devices. It covers key tampering and disclosure threats: T_GEN01 to T_GEN08, T.Stored_Certificates_Tampering.