b2a387683dbe3915cda961655536afe7ea77bd53
[ssproject1617.git] / report / v7_cryptography.tex
1 \begin{enumerate}[label={7.\arabic*}]
2
3 \addtocounter{enumi}{1}
4 \item
5 \TODO{}
6 Verify that all cryptographic modules fail securely, and errors are handled
7 in a way that does not enable oracle padding.
8
9 \addtocounter{enumi}{3}
10 \notapplicable{
11 \item
12 Verify that all random numbers, random file names, random GUIDs, and random
13 strings are generated using the cryptographic module’s approved random
14 number generator when these random values are intended to be not guessable
15 by an attacker.
16 }
17
18 \item
19 \TODO{}
20 Verify that cryptographic algorithms used by the application have been
21 validated against FIPS 140-2 or an equivalent standard.
22
23 \notapplicable{
24 \item
25 Verify that cryptographic modules operate in their approved mode according
26 to their published security policies.
27 }
28
29 \notapplicable{
30 \item
31 Verify that there is an explicit policy for how cryptographic keys are
32 managed (e.g., generated, distributed, revoked, and expired). Verify that
33 this key lifecycle is properly enforced.
34 }
35
36 \addtocounter{enumi}{1}
37 \notapplicable{
38 \item
39 Verify that all consumers of cryptographic services do not have direct
40 access to key material. Isolate cryptographic processes, including master
41 secrets and consider the use of a virtualized or physical hardware key vault
42 (HSM).
43 }
44
45 \notapplicable{
46 \item
47 \textit{Personally Identifiable Information} should be stored encrypted at
48 rest and ensure that communication goes via protected channels.
49 }
50
51 \notapplicable{
52 \item
53 Verify that sensitive passwords or key material maintained in memory is
54 overwritten with zeros as soon as it no longer required, to mitigate memory
55 dumping attacks.
56 }
57
58 \notapplicable{
59 \item
60 Verify that all keys and passwords are replaceable, and are generated or
61 replaced at installation time.
62 }
63
64 \notapplicable{
65 \item
66 Verify that random numbers are created with proper entropy even when the
67 application is under heavy load, or that the application degrades gracefully
68 in such circumstance.
69 }
70
71 \end{enumerate}