Identification and authentication is accomplished using the DoD PKI Class 3 certificate and hardware security token (when available).
MAC / CONF | Impact | Subject Area |
---|---|---|
MACIII | Medium | Identification and Authentication |
Threat |
---|
DoD PKI and KMI software Tokens are required to counter the following threats: · Logical attack · Control of access · Unanticipated interactions · Cryptographic functions · Miscellaneous threats |
Guidance |
---|
1. The DoD will provide for a certificate management infrastructure yielding a capability to verify the identity, authority and integrity involved in each transaction. 2. The system administrators shall protect the workstations and the cryptographic module from unauthorized access or modification via the following at a minimum: · Access control list · Configuration management · Physical protection 3. The system administrators shall ensure that all applications should be Common Criteria evaluated and Joint Interoperability Testing Command certified. 4. The system administrators shall configure workstations with the appropriate security technical implementation guidance and implement the IAVA process into configuration management practices in accordance with the security policy. |