EasyManuals Logo
Home>Entrust>Security System>nShield

Entrust nShield User Manual

Entrust nShield
90 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #70 background imageLoading...
Page #70 background image
11. Security Incident and Response
11.1. Security incident monitoring
The following suspected or actual events or activities should be monitored for:
Triggering of tamper evident or response functions in the HSM
Physical non availability of HSM, card reader, card sets, client application,
%NFAST_KMDATA% folder contents, nShield Connect config file, SIEM collector data,
backup data
Logical non availability of HSM, card reader, card sets, client application,
%NFAST_KMDATA% folder contents, nShield Connect config file, SIEM collector data,
backup data
Gaps or unexplained entries in the logs, or suspected log tamper
Evidence of access control violation contrary to any security policy e.g. lost token
and subsequent logon.
Evidence of unauthorized use
Evidence of network attacks on the HSM
Evidence of excessive performance demands
Evidence of violation of environmental controls
Unauthorized changes to configuration settings for HSM and client application e.g.
updating the module’s clock.
Non-compliance with security process e.g. commissioning on an open network
Non-compliance with security policy e.g. using incorrect algorithm strength or
continuing to use a key outside of its cryptoperiod.
11.2. Security incident management
If a security incident is suspected the Company Security Officer should be alerted
immediately and determine which actions must be implemented as advised by your
Security Incident and Response Policy. This should cover the following areas:
Quarantine area, isolate unit and evidence preservation – witnessed snapshot of unit
(this should cover determining whether to power off the unit which may result in the
loss of evidence against the need to isolate any potential malware resident on the
unit)
Investigation
Reporting structure and timescales.
nShield® Security Manual 70 of 90

Table of Contents

Other manuals for Entrust nShield

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Entrust nShield and is the answer not in the manual?

Entrust nShield Specifications

General IconGeneral
BrandEntrust
ModelnShield
CategorySecurity System
LanguageEnglish

Related product manuals