Back

Define the cryptographic boundaries.


CONTROL ID
06543
CONTROL TYPE
Establish/Maintain Documentation
CLASSIFICATION
Preventive

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Define the cryptographic module security functions and the cryptographic module operational modes., CC ID: 06542

There are no implementation support Controls.


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • The agency owns, operates, manages, or protects the medium. (§ 5.10.1.2.1 ¶ 1 ¶ 1(2)(a), Criminal Justice Information Services (CJIS) Security Policy, CJISD-ITS-DOC-08140-5.8, Version 5.8)
  • Cryptographic boundaries shall consist of explicitly defined perimeters. If the module consists of firmware or software, the boundaries shall contain the processor(s) and hardware that store and protect the firmware and software. If the firmware, software, and hardware do not affect the security of … (§ 4.1 ¶ 2, FIPS Pub 140-2, Security Requirements for Cryptographic Modules, 2)