
Aruba Networks Security Target
Page 19 of 67
TSF-initiated Session Locking
5.3 Functional Requirements
Table 10: Summary of SFRs
User Identity Association
External Audit Trail Storage
Cryptographic Key Generation (for asymmetric keys – HTTPS/TLS)
Cryptographic Key Generation (for asymmetric keys – IPSec)
Cryptographic Key Generation (for asymmetric keys – SSH)
Cryptographic Key Zeroization
Cryptographic Operation (for data encryption/decryption)
Cryptographic Operation (for cryptographic signature – RSA)
Cryptographic Operation (for cryptographic hashing)
Cryptographic Operation (for cryptographic signature - ECDSA)
Extended: Cryptographic Operation (Random Bit Generation –
SSH/TLS)
Extended: Cryptographic Operation (Random Bit Generation - IPSec)
Full Residual Information Protection
Komentáře k této Příručce