Operational assumptions

  • One or more authorized administrators are assigned who are competent to manage the device and the security of the information it contains, trained for the secure operation of the device, and who can be trusted not to deliberately abuse their privileges to undermine security.

  • Authorized users are trusted to correctly install, configure, and operate the device according to the instructions provided by the device documentation.

  • There will be no untrusted users and no untrusted software on component servers.

  • The switch must be installed in a physically secure area where only authorized administrators have access to the physical appliance.

  • Users will protect their authentication data.