10.5 Integrity of exported TSF data (FPT_ITI)

Family behaviour

This family defines the rules for the protection, from unauthorised modification, of TSF data during transmission between the TSF and a remote trusted IT product. This data could, for example, be TSF critical data such as passwords, keys, audit data, or TSF executable code.

Component levelling

FPT_ITI.1 Inter-TSF detection of modification, provides the ability to detect modification of TSF data during transmission between the TSF and a remote trusted IT product, under the assumption that the remote trusted IT product is cognisant of the mechanism used.

FPT_ITI.2 Inter-TSF detection and correction of modification, provides the ability for the remote trusted IT product not only to detect modification, but to correct modified TSF data under the assumption that the remote trusted IT product is cognisant of the mechanism used.

Management: FPT_ITI.1

There are no management activities foreseen.

Management: FPT_ITI.2

The following actions could be considered for the management functions in FMT:

a)    management of the types of TSF data that the TSF should try to correct if modified in transit;

b)    management of the types of action that the TSF could take if TSF data is modified in transit.

Audit: FPT_ITI.1

The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP / ST:

a)    Minimal: the detection of modification of transmitted TSF data.

b)    Basic: the action taken upon detection of modification of transmitted TSF data.

Audit: FPT_ITI.2

The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP / ST:

a)    Minimal: the detection of modification of transmitted TSF data;

b)    Basic: the action taken upon detection of modification of transmitted TSF data.

c)    Basic: the use of the correction mechanism.