beautypg.com

Motorola S2500 User Manual

Page 2

background image

MNR S2500 Security Policy

Version 1.2, Revision Date: 8/8/2008

Page

2

TABLE OF CONTENTS

1. MODULE OVERVIEW ......................................................................................................................................... 3

2. SECURITY LEVEL ................................................................................................................................................ 4

3. MODES OF OPERATION ..................................................................................................................................... 4

4. PORTS AND INTERFACES ................................................................................................................................. 8

5. IDENTIFICATION AND AUTHENTICATION POLICY ................................................................................. 8

6. ACCESS CONTROL POLICY ............................................................................................................................ 10

A

UTHENTICATED

S

ERVICES

..................................................................................................................................... 10

U

NAUTHENTICATED

S

ERVICES

: ............................................................................................................................... 10

R

OLES AND

S

ERVICES

.............................................................................................................................................. 11

D

EFINITION OF

C

RITICAL

S

ECURITY

P

ARAMETERS

(CSP

S

) ...................................................................................... 12

D

EFINITION OF

CSP

S

M

ODES OF

A

CCESS

................................................................................................................ 13

7. OPERATIONAL ENVIRONMENT .................................................................................................................... 15

8. SECURITY RULES .............................................................................................................................................. 15

9. CRYPTO OFFICER GUIDANCE ....................................................................................................................... 16

10. PHYSICAL SECURITY POLICY .................................................................................................................... 17

P

HYSICAL

S

ECURITY

M

ECHANISMS

......................................................................................................................... 17

11. MITIGATION OF OTHER ATTACKS POLICY ........................................................................................... 17

12. DEFINITIONS AND ACRONYMS................................................................................................................... 17