Computer Security Controls
Specific Computer Security Technical Requirements
The CA systems are physically secured as described in ยง5.1. The CA systems operate enforce identification and authentication of users. All Trusted Roles that are authorized to have access to the CAs are required to use hardware tokens in conjunction with a PIN or biometric to gain access to the physical room that contains the CA key material being used for such CAs.
Computer Security Rating
No stipulation.