Motorola S2500 User Manual
Page 2
MNR S2500 Security Policy
Version 1.2, Revision Date: 8/8/2008
Page
2
TABLE OF CONTENTS
1. MODULE OVERVIEW ......................................................................................................................................... 3
2. SECURITY LEVEL ................................................................................................................................................ 4
3. MODES OF OPERATION ..................................................................................................................................... 4
4. PORTS AND INTERFACES ................................................................................................................................. 8
5. IDENTIFICATION AND AUTHENTICATION POLICY ................................................................................. 8
6. ACCESS CONTROL POLICY ............................................................................................................................ 10
A
UTHENTICATED
S
ERVICES
..................................................................................................................................... 10
U
NAUTHENTICATED
S
ERVICES
: ............................................................................................................................... 10
R
OLES AND
S
ERVICES
.............................................................................................................................................. 11
D
EFINITION OF
C
RITICAL
S
ECURITY
P
ARAMETERS
(CSP
S
) ...................................................................................... 12
D
EFINITION OF
CSP
S
M
ODES OF
A
CCESS
................................................................................................................ 13
7. OPERATIONAL ENVIRONMENT .................................................................................................................... 15
8. SECURITY RULES .............................................................................................................................................. 15
9. CRYPTO OFFICER GUIDANCE ....................................................................................................................... 16
10. PHYSICAL SECURITY POLICY .................................................................................................................... 17
P
HYSICAL
S
ECURITY
M
ECHANISMS
......................................................................................................................... 17
11. MITIGATION OF OTHER ATTACKS POLICY ........................................................................................... 17
12. DEFINITIONS AND ACRONYMS................................................................................................................... 17