https://artifacts.trustmarkinitiative.org/lib/tips/fbca-cp-section-5.1.2.1_-physical-access-for-ca-equipment_-medium-hardware/2.27/FBCA CP Section 5.1.2.1, Physical Access For CA Equipment, Medium Hardware2.27Profile of Medium Hardware level of assurance requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, Section 5.1.2.1, Physical Access For CA Equipment.2021-02-04T00:00:00.000ZfalseThis artifact is published by the Georgia Tech Research Institute (GTRI) as part of the Trustmark Initiative. This artifact and the information contained herein is provided on an "AS IS" basis, and GTRI disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, GTRI disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.https://trustmarkinitiative.org/Trustmark InitiativePRIMARYTrustmark Supporthelp@trustmarkinitiative.org555-555-5555https://trustmarkinitiative.org/PIV-ISecurityIdentityFederal Bridgehttps://artifacts.trustmarkinitiative.org/lib/tds/pki-certificate-authority-_ca_-equipment-is-always-protected-from-unauthorized-access/1.0/1PKI Certificate Authority (CA) Equipment Is Always Protected From Unauthorized Access1.0This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for control of physical ingress and egress as related to overall physical and environmental protection requirements.https://artifacts.trustmarkinitiative.org/lib/tds/pki-certificate-authority-_ca_-remote-workstations-are-protected-from-unauthorized-access/1.0/2PKI Certificate Authority (CA) Remote Workstations Are Protected From Unauthorized Access1.0This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for control of physical ingress and egress as related to overall physical and environmental protection requirements.https://artifacts.trustmarkinitiative.org/lib/tds/physical-access-security-mechanisms-are-commensurate-with-level-of-threat/1.0/3Physical Access Security Mechanisms Are Commensurate With Level of Threat1.0This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for providing physical access security mechanisms commensurate with the level of threat.https://artifacts.trustmarkinitiative.org/lib/tds/unauthorized-access-to-ca-hardware-is-not-permitted/1.0/4Unauthorized access to CA hardware is not permitted1.0This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for control of physical ingress and egress as related to overall physical and environmental protection requirements.https://artifacts.trustmarkinitiative.org/lib/tds/removable-media-and-paper-containing-sensitive-plain-text-information-is-stored-in-secure-containers/1.0/5Removable media and paper containing sensitive plain-text information is stored in secure containers1.0Addresses the requirements for ensuring all removable media and paper containing sensitive plain-text information is stored in secure containers.https://artifacts.trustmarkinitiative.org/lib/tds/constant-monitoring-for-unauthorized-physical-intrusion-to-system-equipment/1.0/6Constant monitoring for unauthorized physical intrusion to system equipment1.0Addresses the requirement for ensuring physical intrusion monitoring of CA equipment.https://artifacts.trustmarkinitiative.org/lib/tds/two-person-physical-access-control-to-cryptographic-modules/1.0/7Two person physical access control to cryptographic modules1.0Addresses the requirement for two person physical access control for cryptographic modules.https://artifacts.trustmarkinitiative.org/lib/tds/two-person-physical-access-control-to-ca-systems/1.0/8Two person physical access control to CA systems1.0Addresses the requirement for two person physical access control for CA equipment.https://artifacts.trustmarkinitiative.org/lib/tds/removable-cryptographic-modules-are-secured/1.0/9Removable cryptographic modules are secured1.0This Trustmark Definition defines conformance and assessment criteria for compliance with requirements for securing cryptographic modules.https://artifacts.trustmarkinitiative.org/lib/tds/cryptographic-module-activation-information-is-secured/1.0/10Cryptographic Module activation information is secured1.0This Trustmark Definition defines conformance and assessment criteria for compliance with requirements for securing cryptographic module activation data.https://artifacts.trustmarkinitiative.org/lib/tds/sensitive-pki-certificate-authority-_ca_-equipment-is-secured/1.0/11Sensitive PKI Certificate Authority (CA) equipment is secured1.0This Trustmark Definition defines conformance and assessment criteria for compliance with requirements for securing sensitive CA equipment.https://artifacts.trustmarkinitiative.org/lib/tds/cryptographic-module-activation-data-is-memorized/1.0/12Cryptographic Module activation data is memorized1.0This Trustmark Definition defines conformance and assessment criteria for compliance with security requirements for the memorization of cryptographic module activation data.https://artifacts.trustmarkinitiative.org/lib/tds/cryptographic-module-activation-data-is-recorded/1.0/13Cryptographic Module activation data is recorded1.0This Trustmark Definition defines conformance and assessment criteria for compliance with security requirements for the recording of cryptographic module activation data.https://artifacts.trustmarkinitiative.org/lib/tds/cryptographic-module-activation-data-is-secured/1.0/14Cryptographic Module activation data is secured1.0This Trustmark Definition defines conformance and assessment criteria for compliance with security requirements for securing cryptographic module activation data.https://artifacts.trustmarkinitiative.org/lib/tds/cryptographic-module-activation-data-not-stored-with-associated-cryptographic-modules/1.0/15Cryptographic Module activation data not stored with associated cryptographic modules1.0This Trustmark Definition defines conformance and assessment criteria for storing cryptographic module activation data separate from associated cryptographic modules.https://artifacts.trustmarkinitiative.org/lib/tds/cryptographic-module-activation-data-not-stored-with-removable-hardware/1.0/16Cryptographic Module activation data not stored with removable hardware1.0This Trustmark Definition defines conformance and assessment criteria for storing cryptographic module activation data separate from removable hardware associated with remote workstations used to administer the CA.https://artifacts.trustmarkinitiative.org/lib/tds/security-checks-performed-for-unattended-facilities-housing-pki-ca-equipment/1.0/17Security checks performed for unattended facilities housing PKI CA equipment1.0Addresses the requirement for security checks of unattended facilities housing Organization CA equipment.https://artifacts.trustmarkinitiative.org/lib/tds/security-checks-performed-for-unattended-facilities-housing-pki-ca-workstations/1.0/18Security checks performed for unattended facilities housing PKI CA workstations1.0Addresses the requirement for security checks of unattended facilities housing remote workstations used to administer the Organization CA.https://artifacts.trustmarkinitiative.org/lib/tds/security-checks-verify-equipment-state/1.0/19Security checks verify equipment state1.0Addresses the requirement for security checks to verify equipment state related to cryptographic modules.https://artifacts.trustmarkinitiative.org/lib/tds/security-checks-verify-security-containers-are-properly-secured/1.0/20Security Checks Verify Security Containers Are Properly Secured1.0Addresses the requirement for security checks to verify that security containers are properly secured.https://artifacts.trustmarkinitiative.org/lib/tds/security-checks-verify-physical-security-systems-are-functioning-properly/1.0/21Security Checks Verify Physical Security Systems Are Functioning Properly1.0Addresses the requirement for security checks to verify that physical security systems (e.g., door locks, vent covers) are functioning properly.https://artifacts.trustmarkinitiative.org/lib/tds/security-checks-verify-area-is-secured-against-unauthorized-access/1.0/22Security Checks Verify Area Is Secured Against Unauthorized Access1.0Addresses the requirement for security checks to verify the area is secured against unauthorized access.https://artifacts.trustmarkinitiative.org/lib/tds/responsibility-for-equipment-physical-security-checks-is-assigned/1.0/23Responsibility For Equipment Physical Security Checks Is Assigned1.0Addresses the requirement for a person shall be made explicitly responsible for making security checks.https://artifacts.trustmarkinitiative.org/lib/tds/log-maintained-for-physical-security-checks/1.0/24Log Maintained for Physical Security Checks1.0Addresses the requirement for the responsibility of physical security checks of equipment to be logged.https://artifacts.trustmarkinitiative.org/lib/tds/facility-sign-out-sheet/1.0/25Facility sign-out sheet1.0Addresses the requirement for the last person who departs the facility to initial a sign-out sheet indicating the time and date.https://artifacts.trustmarkinitiative.org/lib/tds/protection-in-place-on-departure-from-facility/1.0/26Protection in place on departure from facility1.0Addresses the requirement for the last person who departs the facility to initial a sign-out sheet asserting that all necessary physical protection mechanisms are in place and activated.FBCA-CPX.509 Certificate Policy For the Federal Bridge Certification Authority (FBCA), Version 2.27. December 2, 2013.