Security Target TrustedX © Copyright 1999-2010 Safelayer Secure Communications, S.A. All rights reserved. TrustedX Security Target This document is copyright of Safelayer Secure Communications, S.A. Its contents are confidential and access is restricted to Safelayer Secure Communications, S.A. personnel. No part of this document may be copied, reproduced or stored in any form or by any means, electronic, mechanical, recording, or in any other way, without the permission of Safelayer Secure Communications, S.A. Safelayer Secure Communications, S.A. Phone: +34 93 508 80 90 Fax: +34 93 508 80 91 Web: www.safelayer.com Email:
[email protected] 0775BA94 1.7 CONTENTS Introduction.........................................................................................................................................3 1.1. Security Target and TOE Reference ...............................................................................................3 1.2. TOE Overview..................................................................................................................................... 3 1.3. TOE Description.................................................................................................................................. 5 1.3.1. TrustedX Architecture 5 1.3.2. TrustedX Service Components 8 1.3.3. Administration and User Interface 16 1.3.4. TrustedX Security Policy 18 1.3.5. Environment Components 20 1.3.6. Annex III and Annex IV of the [EUROPEAN_DIRECTIVE] 20 2 – Conformance Claims .................................................................................................................25