FBCA CP Section 6.2.8, Method Of Activating Private Keys, v2.27
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), FBCA CP Section 6.2.8, Method Of Activating Private Keys
Identifier |
https://artifacts.trustmarkinitiative.org/lib/tips/fbca-cp-section-6.2.8_-method-of-activating-private-keys/2.27/
|
Publication Date |
2018-10-30 |
Issuing Organization |
|
Keywords |
PIV-I,
Security,
Identity,
Federal Bridge
|
Legal Notice |
This artifact is published by the Georgia Tech Research Institute (GTRI) as part of the Trustmark Initiative. This artifact and the information contained herein is provided on an "AS IS" basis, and GTRI disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, GTRI disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.
|
Loading...
Trust Expression:
TD_PIVIContentSigningKeyActivationRequiresMultiPartyControl and TD_PKISubscriberAuthenticationRequiredForPrivateKeyActivation and TD_EntryOfPKIKeyActivationDataIsProtectedFromDisclosure and TD_SecurityControlsForDeviceActivationofPKIPrivateKeys and TD_ProtectionofDevicesWithPKIKeys
References (5)
TD
Protection of Devices With PKI Keys, v1.0
|
Description |
Addresses the requirement for the strength of the security controls shall protect the device's hardware, software, and the cryptographic token and its activation data from compromise. |
ID |
TD_ProtectionofDevicesWithPKIKeys |
Provider Reference |
|
Loading…