[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
User Assumptions and Responsibilities
This configuration guide assumes that users, including
Crypto Officers, respect security guidelines at all times. Users are expected
to:
- Keep all passwords confidential.
- Store devices and documentation in a secure area.
- Deploy devices in secure areas.
- Check audit files periodically.
- Conform to all other FIPS 140-2 security rules.
This configuration guide makes the following assumptions
about user behavior:
- Users are trusted.
- Users abide by all security guidelines.
- Users will not deliberately compromise security.
- Users behave responsibly at all times.
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]