Commit 9ab90449 authored by Pierre Andouche's avatar Pierre Andouche
Browse files

Comment 386

parent 74217e10
Loading
Loading
Loading
Loading
+1 −1
Original line number Diff line number Diff line
@@ -1108,7 +1108,7 @@ It covers misuse of users and administrators function : T_SYS02,T_SYS05, T_SYS07
  - APPLICABILITY: All use cases

- REFERENCE: REQ-5.2-02
  - REQUIREMENT: Private keys shall be stored within secure cryptographic device or encrypted using approved algorithms as defined in Annex K using independently managed keys.
  - REQUIREMENT: Secret keys shall not be stored persistently in plaintext form. They shall be stored within a secure cryptographic device or encrypted using approved algorithms as defined in Annex K using independently managed keys. They may only be accessed in plaintext form temporarily for a single operation or batch of operations.
 - RATIONALE: To ensure trust the PKI software must rely on secure and valid key creation and management systems accessible only to authorised users provided by hardware security devices. It covers key tampering and disclosure threats: T_GEN01 to T_GEN08, T.Stored_Certificates_Tampering.
  - APPLICABILITY: All use cases.