Specifications
35
T.UNAUTHORIZED_ACCESS
A user may gain access to services (either on the TOE or by
sending data through the TOE) for which they are not
authorized according to the TOE security policy.
T.UNAUTH_ADMIN_ACCESS
An unauthorized user or process may gain access to an
administrative account.
T.WIRELESS_INTRUSION
Rogue APs and malicious wireless clients may attempt to
subvert the wireless network.
T.CLIENT_INSECURE
An unauthorised user may attempt to gain access to an
authorised client with saved credentials and attempt to subvert
the wireless network.
4.3 Organizational Security Policies
An organizational security policy is a set of rules, practices, and procedures imposed by an organization to
address its security needs. Table 11 identifies the organizational security policies applicable to the WLAN.
Table 10 Organizational Security Policies
Policy Name
Policy Definition
P.ACCESS_BANNER
The TOE shall display an initial banner for administrator
logins describing restrictions of use, legal agreements, or any
other appropriate information to which users consent by
accessing the system.
P.ACCOUNTABILITY
The authorized users of the TOE shall be held accountable for
their actions within the TOE.
P.CRYPTOGRAPHY
The TOE shall provide cryptographic functions for its own use,
including encryption/decryption operations.
P.CRYPTOGRAPHY_VALIDATED
Only NIST FIPS validated cryptography (methods and
implementations) are acceptable for key management (i.e.;
generation, access, distribution, destruction, handling, and
storage of keys) and cryptographic services (i.e., encryption,
decryption, signature, hashing, key exchange, and random
number generation services).
P.ENCRYPTED_CHANNEL
The TOE shall provide the capability to encrypt/decrypt
wireless network traffic between the TOE and those wireless
clients that are authorized to join the network.
P.NO_AD_HOC_NET WORKS
In concordance with the DOD Wireless Policy, there will be no
ad hoc 802.11 or 802.15 networks allowed.