Search Criteria : 7 assertions found for this search Review filtered assertions

Assertion

Applies to

Applied to
Not applied to

Coverage

Covered by
Not covered by
Id scheme
Assertion id
Status
Testable?
#Coverage
#Applies to
Comment
Predicate
Page
Tags
Last changed
Actions
ITI19ITI19-1reviewedTestable 2 0 When Authenticating the Remote Secure Node, the Local Secure Node shall be able to perform certificate validation based on signature by a trusted CA.140Section 3.19.6.12/5/16 12:27:23 PM by aboufahj
ITI19ITI19-14reviewedTestable 1 0 For all connections carrying Protected Information (PI) and when configured for use not on a physically secured network, implementations shall use the TLS protocol.141Section 3.19.6.22/5/16 12:27:23 PM by aboufahj
ITI19ITI19-15reviewedTestable 1 0 For all connections carrying Protected Information (PI) and when configured for use not on a physically secured network, implementations shall support TLS_RSA_WITH_AES_128_CBC_SHA ciphersuite.141Section 3.19.6.22/5/16 12:27:23 PM by aboufahj
ITI19ITI19-2reviewedTestable 1 0 When Authenticating the Remote Secure Node, the Local Secure Node shall be able to perform direct certificate validation to a set of trusted certificates.140Section 3.19.6.12/5/16 12:27:23 PM by aboufahj
ITI19ITI19-3reviewedTestable 1 0 The Secure Node or Secure Application shall provide the means for configuring which CAs are trusted to authenticate node certificates for use in a chain of trust. These CAs shall be identified by means of the public signing certificate for the signing CA.140Section 3.19.6.1.12/5/16 12:27:23 PM by aboufahj
ITI19ITI19-4reviewedTestable 1 0 The Secure Node or Secure Application shall accept communications for which there is a certificate that is signed by a CA that is listed as a trusted signing authority.140Section 3.19.6.1.12/5/16 12:27:23 PM by aboufahj
ITI19ITI19-9reviewedTestable 1 0 The Secure Node or Secure Application shall not require any specific certificate attribute contents.141Section 3.19.6.1.32/5/16 12:27:23 PM by aboufahj