EasyManuals Logo
Home>Entrust>Security System>nShield

Entrust nShield User Manual

Entrust nShield
90 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #65 background imageLoading...
Page #65 background image
platforms. Each log fulfills a different purpose and some can be filtered to control the
amount of information logged. See the User Guide for details. In some instances tamper
or cryptographic mechanisms are used to protect the integrity of the logs. Logs that
don’t use these mechanisms should be protected through procedural controls.
A threat analysis will determine which logs are required and which filters to apply (if
available) in monitoring the customer’s specific deployment of the HSM.
The Auditor should be independent of the Administrator of the HSM:
When modifications are made to the configuration of an HSM, the changes should be
audited to ensure that the configuration has been modified in the intended way.
The Auditor should regularly inspect the logs to verify that the unit’s configuration
reflects the Security Policy.
The logs should be inspected by the Auditor periodically at a frequency determined
by the customer Security Procedures.
The customer Security Procedures should state what log entries are cause for
concern.
The following example scenarios may also be a cause for concern:
Access outside of work hours
Unusual changes to the configuration
Unit power cycled.
The actions required to resolve the issue should also be stated using the customer’s own
incident response process.
The customer Security Procedures should identify a backup policy for the logs and the
authorization required to delete logs once they’ve been backed-up.
9.4. Audit logging
Audit logging as described in Logging and debugging delivers logs to an external log
collector outside of the HSM. It uses an integrity mechanism to protect the logs.
Additional controls required to support the Audit Log are described in Audit Log. As well
as applying the guidance described above, further guidance specific to Audit Logging is
supplied here:
The Auditor should inspect the logs to:
Identify missing logs
Verify the integrity of logs up to the trusted root
Identify log entries that are a cause for concern.
nShield® Security Manual 65 of 90

Table of Contents

Other manuals for Entrust nShield

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Entrust nShield and is the answer not in the manual?

Entrust nShield Specifications

General IconGeneral
BrandEntrust
ModelnShield
CategorySecurity System
LanguageEnglish

Related product manuals