|3.5 Service Complex: Security|
|SSEC01 - General Security Principles|
LSIC01 - Allgemeine Sicherheitsprinzipien
|SSEC01.F.1||Derived security requirements|
|SSEC01.F.1.1||Not to be bypassed||The security mechanisms are integrated in the entire system in a way that it is not possible to bypass them.|
|SSEC01.F.1.2||Not to be deactivated||There is no possibility for unprivileged users to deactivate the security mechanisms.|
|SSEC01.F.1.3||Not to be deceived||It is not possible to deceive the security mechanisms.|
|SSEC01.F.1.4||Secure against manipulation||It is not possible to manipulate the security mechanisms.|
|SSEC01.F.1.5||Correctness||The security mechanisms are structured and comprehensible in a way that complete analyses and extensive tests are possible.|
|SSEC01.F.1.6||Separation||The non-trustworthy components of the SDE are separated from the trustworthy ones in a way that it is not possible to perform or to influence security-relevant actions by them.|
|SSEC01F.2||System-wide unique identification number of each object||
Every object possesses a unique identification number. The identification numbers are consecutive.
By means of the identification number it is possible to discover the loss or the unauthorized re-feeding of an object.
|SSEC01.F.3||Logging||The components of the SDE are able to transmit the data required for the recording of security-relevant events to the service unit SSEC04 "Auditing" or the code necessary for the recording has to be integrated in the corresponding trustworthy component.|
|GDPA Online Last Updated 01.Jan.2002 Updated by Webmaster Last Revised 01.Jan.2002 Revised by Webmaster|