To use SDS Enterprise under the conditions of the Common Criteria evaluation and of the french qualification at standard level, it is essential to observe the following guidelines.
- RSA keys of users and certification authorities must be a minimum size of 4096 bits, with a public exponent strictly greater than 65536.
- The certificates and CRLs must be signed with the SHA-512 algorithm.
SDS Enterprise Supports AES 256 encryption algorithm and SHA 512 signature algorithm.
For a use beyond the year 2030, the minimum size of an RSA key is 3072 bits.
- The user accounts must be protected by the AES 256 encryption algorithm and SHA-256 cryptographic hash standard.
- Passwords should be subject to a security policy preventing weak passwords.
- Appropriate organizational measures must ensure the authenticity of policies from which the user accounts are created.
- In case of using a hardware key ring (smart card or hardware token), this device protects the confidentiality and integrity of keys and certificates that it contains.
- The workstation on which SDS Enterprise is installed must be healthy. There must be an information system security policy whose requirements are met on the workstations. This policy shall verify the installed software is regularly updated and the system is protected against viruses and spyware or malware (firewall properly configured, antivirus updates, etc.).
- The security policy should also consider that the workstations not equipped with SDS Enterprise do not have access to shared confidential files on a server, so that a user can not cause a denial of service by altering or removing inadvertently or maliciously, files protected by the product.
- Access to administrative functions of the workstation system is restricted only to system administrators.
- The operating system must manage the event logs generated by the product in accordance with the security policy of the company. It must for example restrict read access to these logs to only those explicitly permitted.
- The user must ensure that a potential attacker can not see or access the workstation when the SDS Enterprise session is open.
- SDS Enterprise administrators are considered as trusted. They are responsible for defining the SDS Enterprise security policy by respecting the state of the art, and they may create user accounts in the Stormshield Data Management Center application.
- The system administrator responsible is also considered as trusted. He/She is responsible for the installation and maintenance of the application and workstation (operating system, protection software, PKCS#11 interface library with a smart card, desktop and engineering software. He/She applies the security policy defined by the SDS Enterprise administrators.
- The product user must respect the company's security policy.