Reference Guide

Crypto-C ME Cryptographic Toolkit 17
RSA BSAFE Crypto-C Micro Edition 4.1 Security Policy
Level 1
2.4.4 Key Protection/Zeroization
All key data resides in internally allocated data structures and can be output only using
the Crypto-C ME API. The operating system protects memory and process space from
unauthorized access. The operator should follow the steps outlined in the RSA BSAFE
Crypto-C Micro Edition Developers Guide to ensure sensitive data is protected by
zeroizing the data from memory when it is no longer needed. All volatile keys and
CSPs listed in Table 2 are zeroized by unloading the module from memory.
Self-test (Crypto Officer
service)
Hardcoded keys (DSA and AES) Read/Execute
Show status None N/A
Zeroization All Read/Write
Table 3 Key and CSP Access (continued)
Service Type Key or CSP Type of Access