Specifications
78
specified in the WLAN PP, and results in a statement of security objectives that is more
restrictive than the statement of security objectives in the WLAN PP.
Table 19 Threats, Assumptions & Policies to Security Objectives Mapping
O.ADMIN_GUIDANCE
O.AUDIT_GENERATION
O.CONFIGURATION_IDENTIFICATION
O.CORRECT_TSF_OPERATION
O.CRYPTOGRAPHY
O.CRYPTOGRAPHY_VALIDATED
O.DISPLAY_BANNER
O.DOCUMENTED_DE SIGN
O.WIPS_FUNCTIONS
O.MANAGE
O.MEDIATE
O.PARTIAL_FUNCTIONAL_TESTING
O.RESIDUAL_INFORMATION
O.SELF_PROTECTION
O.TIME_STAMPS
O.TOE_ACCESS
O.VULNERABILITY_ANALYSIS
OE.AUDIT_PROTECTION
OE.AUDIT_REVIEW
OE.MANAGE
OE.NO_EVIL
OE.NO_GENERAL_PURPOSE
OE.PHYSICAL
OE.PROTECT_MGMT_COMMS
OE.RESIDUAL_INFORMATION
OE.SELF_PROTECTION
OE.TIME_STAMPS
OE.TOE_ACCESS
OE.TOE_NO_BYPASS
OE.CLIENT_PROTECT
T.ACCIDENTAL_
ADMIN_ ERROR
X
X
X
X
T.ACCIDENTAL_
CRYPTO_
COMPROMISE
X
X
X
X
T. MASQUERADE
X
X
X
T. POOR_DESIGN
X
X
X
T.POOR_
IMPLEMENTATION
X
X
X
T.POOR_TEST
X
X
X
X
T.RESIDUAL_DATA
X
X
T.TSF_COMPROMISE
X
X
X
X
X
X
T.UNATTENDED_
SESSION
X
T.UNAUTHORIZED_
ACCESS
X
X
X
X
X
X
X
X
T.UNAUTH_ADMIN_
ACCESS
X
X
X
X
X
X
T.WIRELESS_
INTRUSION
X
T.CLIENT_INSECURE
X
P.ACCESS_BANNER
X
P.ACCOUNTABILITY
X
X
X
X
X
X
X
X
X
P.CRYPTOGRAPHIC
X
X
P.CRYPTOGRAPHY_
VALIDATED
X
X
P.ENCRYPTED_
CHANNEL
X
X
X
X
P.NO_AD_HOC_NET
WORKS
X
X
P.WIRELESS_
LOCATION_POLICY
X