FBCA CP Section 6.7, Network Security Controls, v2.27
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), FBCA CP Section 6.7, Network Security Controls
Identifier | https://artifacts.trustmarkinitiative.org/lib/tips/fbca-cp-section-6.7_-network-security-controls/2.27/ | ||||
Publication Date | 2018-10-30 | ||||
Issuing Organization |
Trustmark Initiative (https://trustmarkinitiative.org/)
View Contact
|
||||
Keywords | PIV-I, Security, Identity, Federal Bridge | ||||
Legal Notice | This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein. |

Trust Expression:
TD_PKIRelatedSystemsEmployAppropriateNetworkSecurityControls and TD_LeastFunctionalityUnnecessaryInsecurePortsDisabled and TD_LeastFunctionalityUnnecessaryInsecureProtocolsDisabled and TD_LeastFunctionalityUnnecessaryInsecureServicesDisabled and TD_NetworkSoftwareIsNecessary and TD_AuthenticationofRemoteManagementWorkstationsCommensuratewithSystemAssuranceRequirements
References (6)
TD PKI Related Systems Employ Appropriate Network Security Controls, v1.0 | |
---|---|
Description | Addresses the requirement for PKI related systems to employ appropriate network security controls. |
ID | TD_PKIRelatedSystemsEmployAppropriateNetworkSecurityControls |
Provider Reference |
TD Least Functionality | Unnecessary / Insecure Ports Disabled, v1.0 | |
---|---|
Description | Defines conformance and assessment criteria for verifying that an organization disables ports within the information system deemed to be unnecessary and/or nonsecure. |
ID | TD_LeastFunctionalityUnnecessaryInsecurePortsDisabled |
Provider Reference |
TD Least Functionality | Unnecessary / Insecure Protocols Disabled, v1.0 | |
---|---|
Description | Defines conformance and assessment criteria for verifying that an organization disables protocols within the information system deemed to be unnecessary and/or nonsecure. |
ID | TD_LeastFunctionalityUnnecessaryInsecureProtocolsDisabled |
Provider Reference |
TD Least Functionality | Unnecessary / Insecure Services Disabled, v1.0 | |
---|---|
Description | Defines conformance and assessment criteria for verifying that an organization disables services within the information system deemed to be unnecessary and/or nonsecure. |
ID | TD_LeastFunctionalityUnnecessaryInsecureServicesDisabled |
Provider Reference |
TD Network Software Is Necessary, v1.0 | |
---|---|
Description | Addresses the requirement for any network software present to be necessary to perform intended functions. |
ID | TD_NetworkSoftwareIsNecessary |
Provider Reference |
TD Authentication of Remote Management Workstations Commensurate with System Assurance Requirements, v1.0 | |
---|---|
Description | Addresses the requirement for remote management workstations to authenticate at the same level of assurance required by the system. |
ID | TD_AuthenticationofRemoteManagementWorkstationsCommensuratewithSystemAssuranceRequirements |
Provider Reference |