FBCA CP Section 6.2.9, Methods Of Deactivating Private Keys, v2.27
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), FBCA CP Section 6.2.9, Methods Of Deactivating Private Keys
Identifier | https://artifacts.trustmarkinitiative.org/lib/tips/fbca-cp-section-6.2.9_-methods-of-deactivating-private-keys/2.27/ | ||||
Publication Date | 2018-10-30 | ||||
Issuing Organization |
Trustmark Initiative (https://trustmarkinitiative.org/)
View Contact
|
||||
Keywords | PIV-I, Security, Identity, Federal Bridge | ||||
Legal Notice | This artifact is published by the Georgia Tech Research Institute (GTRI) as part of the Trustmark Initiative. This artifact and the information contained herein is provided on an "AS IS" basis, and GTRI disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, GTRI disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein. |
Loading...
Trust Expression:
TD_CryptographicModulesDeactivatedAfterUse and TD_RemovalofPKICertificateAuthorityCAHardwareCryptographicModulesAfterUse
References (2)
TD Cryptographic Modules Deactivated After Use, v1.0 | |
---|---|
Description | Addresses the requirement to deactivate PKI cryptographic modules after use. |
ID | TD_CryptographicModulesDeactivatedAfterUse |
Provider Reference |
TD Removal of PKI Certificate Authority (CA) Hardware Cryptographic Modules After Use, v1.0 | |
---|---|
Description | Addresses the requirement for CA Hardware cryptographic modules to be removed when not in use. |
ID | TD_RemovalofPKICertificateAuthorityCAHardwareCryptographicModulesAfterUse |
Provider Reference |