Solution Security
Solution Security Compliance Requirements
Encryption Applicability
| Item | Security Requirements | Functional Requirements | Description |
|---|---|---|---|
| Encryption Support | Use of validated cryptographic modules and algorithms for security. |
-ARIA 128/192/256, SEED -SHA 256 higher, HAS-160 |
Cryptographic Module Verification Requirement |
| Encryption Key Management | Ensuring the stability of cryptographic key generation, access, renewal, and disposal |
- Key derivation from validated international standard algorithms - The cryptographic keys loaded into shared memory are not in plaintext |
Security Requirements for DB Encryption Products |
| DB Data Encryption and Decryption | Ensuring the stability of critical data, encrypted data, ciphertext, and index |
- Encryption and decryption through a secure cryptographic module - The original data is deleted after encryption |
Certified Encryption Module |
| Access Control | Preventing unauthorized access to cryptographic keys, ciphertext | - Limitations based on conditions such as DB accounts, IP addresses, applications, and access periods | Security Requirements for DB Encryption Products |
| Secure Communication | Maintaining confidentiality and integrity of transmitted data | - Secure transmission between product components. | |
| Identification and Authentication | Verifying the identity of authentication product users |
- Reset after consecutive user authentication failures - Prevention of authentication data reuse attacks |
|
| Security Auditing | Recording important events related to the product |
- Audit data is accessible only to authenticated users - Review based on DB table names, DB column names, and query types |
|
| Security Management | Efficiently managing security policies and audit logs | - Review based on DB table names, DB column names, and query types |
