HP StorageWorks P9000 Command View Advanced Edition Software Common Component Security Guide
Overview of security setup and operation
8
1-2-1-2 Common Component (CVAECC)
This software provides the base module that implements the common functionality for HP
StorageWorks P9000 Command View Advanced Edition Suite software.
1-2-2 Overview of security functions of Common Component
This section provides an overview of the three security functions that have been evaluated based on
Common Criteria for Common Component.
1-2-2-1 Identification and authentication
This function performs authentication by using authentication information (user ID and
corresponding password), and maintains the session governed by the result of the authentication
process. This function also controls access to permission information through identification and
authentication.
1-2-2-2 Management
This function sets account information, permission information, and banner information. It also sets
security parameters. When the management function sets information or parameters, it controls
access through identification and authentication.
1-2-2-3 Warning banner
This function provides warning message data to HP StorageWorks P9000 Command View
Advanced Edition Suite software.
1-3 Security policy for creating and operating the
system
To protect the system from threats, the system must be built and operated according to the security
policy described below, and the security functions must be used correctly. Note that, if the security
functions are not used correctly, the system is no longer subject to evaluations based on Common
Criteria.
Table 1-1 lists the items required for the security policy.
Table 1-1 Items required for the security policy
No. Item See: Operation that must be performed
according to the security policy
1 System creation and operation
performed by a reliable system
integrator who has the required
knowledge
System operation performed by
reliable administrators who have the
required knowledge
1-3-1
--
2 Hardware management in the center
1-3-2 Installing Hardware (see section 3-2 )
3 Selection and management of
software
1-3-3
Selecting the Storage Management Software (see
section
3-1 )
Setting Up the Operating System (see section
3-3
)
Installation (see section
4-2 )
Settings Required after Installation of Common
Component (see section
4-4 )
4 Protection of the communication path
1-3-4 Installing Hardware (see section 3-2 )