proofcard


ICAM ProofCards have been carefully crafted to maximize the testing integrity of your solution using the smallest possible set of credentials. Easy to use, ICAM ProofCards provide a convenient and systematic way to approach unit testing, acceptance testing and even C&A activities.  ICAM ProofCards help you prove the reliability of your system.

The following table provides a description of the cards that are included in your set:

ProofCard #

Description

Threat Type

1 Golden PIV

2 Golden PIV-I

3 SKID Mismatch Manipulated credential

4 Tampered CHUID Manipulated data

5 Tampered PIV and Card Authentication Certificates Manipulated data

6 Tampered PHOTO Manipulated data

7 Tampered FINGERPRINT Manipulated data

8 Tampered SECURITY OBJECT Manipulated data

9 Expired CHUID signer Invalid date

10 Expired certificate signer Invalid date

11 PIV and Card Authentication certificates expiring after CHUID Invalid date

12 PIV and Card Authentication certificates not yet valid Invalid date

13 Expired PIV and Card Authentication certificates Invalid date

14 Expired CHUID Invalid date

15 Valid CHUID copied from one card to another (PIV) Copied credential

16 Valid Card Authentication certificate copied from one card to another (PIV) Copied credential

17 Valid PHOTO copied from one card to another (PIV) Copied credential

18 Valid FINGERPRINT copied from one card to another (PIV) Copied credential

19 Valid CHUID copied from one card to another (PIV-I) Copied credential

20 Valid Card Authentication certificate copied from one card to another (PIV-I) Copied credential

21 Valid PHOTO copied from one card to another (PIV-I) Copied credential

22 Valid FINGERPRINT copied from one card to another (PIV-I) Copied credential

23 Public and Private Key mismatch Skimmed credential

24 Revoked PIV and Card Authentication certificates Revoked credential
 

Joomla Appliance - Powered by TurnKey Linux