Endpoint Security. E80.30 Security Target. Version 1.0 January 22, Prepared by: Metatron Security Services Ltd.

Size: px
Start display at page:

Download "Endpoint Security. E80.30 Security Target. Version 1.0 January 22, 2014. Prepared by: Metatron Security Services Ltd."

Transcription

1 Endpoint Security E80.30 Security Target Version 1.0 January 22, 2014 Prepared by: Metatron Security Services Ltd.

2 Check Point Endpoint Security Security Target Version Prologue 1/22/ Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS and FAR TRADEMARKS: Refer to the Copyright page ( for a list of our trademarks. Refer to the Third Party copyright notices ( for a list of relevant copyrights and third-party licenses.

3 Check Point Endpoint Security Security Target Version Prologue 1/22/2014 Table of Contents 1. ST Introduction ST Reference TOE Reference TOE Overview Document Organization TOE Description Physical Scope and Boundaries of the TOE Logical Scope and Boundaries of the TOE Conformance Claims CC Conformance Claim Assurance Package Conformance PP Conformance Security Problem Definition Introduction Definitions Assets Threat Agents Threats Assumptions Security Objectives Security Objectives for the TOE Security Objectives for the Operational Environment Security Objectives Rationale Security Objectives Countering Threats Security Objectives Upholding Assumptions Extended Components Definition Security Requirements Definitions Objects Users Subjects Operations Security Functional Requirements Security Audit (FAU)... 35

4 Check Point Endpoint Security Security Target Version Prologue 1/22/ Cryptographic support (FCS) User data protection (FDP) Identification and authentication (FIA) Security Management (FMT) Protection of the TSF (FPT) Trusted path/channels (FTP) Security Assurance Requirements Security Requirements Rationale Security Functional Requirements Rationale Security Assurance Requirements Rationale Dependency Rationale Identification of Standards TOE Summary Specification SFR Mapping Security Audit (FAU) Cryptographic support (FCS) User data protection (FDP) User identification and authentication (FIA) Security Management (FMT) Protection of the TSF (FPT) Trusted path/channels (FTP) Protection against Interference and Logical Tampering Protection against Bypass Supplemental Information Conventions Security Environment Considerations and Objectives Security Functional Requirements Other Notations Highlighting Conventions Terminology Glossary Abbreviations References Appendix A - Supported Antivirus Solutions List of Tables

5 Check Point Endpoint Security Security Target Version Prologue 1/22/2014 Table 4-1- Tracing of security objectives to threats Table 4-2- Tracing of security objectives to assumptions Table Operations Mediated by the TOE Table 6-2 Security functional requirement components Table Auditable Events Table Cryptographic Operations Table 6-5- Specification of Management Functions Table 6-6- TOE Security Assurance Requirements Table 6-7- Tracing of SFRs to security objectives for the TOE Table 6-8- Security Requirements Dependency Mapping Table 6-9- Cryptographic Standards and Method of Determining Compliance Table TOE Summary Specification SFR Mapping Table 8-1- SFR Highlighting Conventions List of Figures Figure TOE Operational Environment... 8 Figure TOE Scope and Physical Boundaries... 9

6 Check Point Endpoint Security Security Target Version Chapter 1. ST Introduction 1/22/ ST Introduction 1.1. ST Reference Title: Endpoint Security Security Target ST Version: 1.0 ST Date: January 22, 2014 Author: Nir Naaman CC Version: Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 3, July 2009 Evaluation Assurance Level (EAL): EAL 2, augmented with ALC_FLR.3 (systematic flaw remediation). Keywords: Personal firewall, VPN client, sensitive data protection, media encryption, port protection, network access control, NAC, DLP 1.2. TOE Reference TOE Identification: Check Point Endpoint Security version E80.30 (build ) The TOE is comprised of the following Check Point software blades 1 : Full Disk Encryption Blade Media Encryption & Port Protection Blade Firewall & Application Control Blades Compliance Blade VPN Blade These components are installed on a workstation running a Microsoft Windows operating system. The underlying hardware platform and operating system on which the TOE software is installed are considered to be outside the TOE. The TOE can be configured to invoke third-party anti-virus engines. The antivirus engines themselves are outside the TOE boundary. While some basic management capabilities are provided in the client software, Check Point Endpoint Security clients are designed to be centrally managed. However, management server products are separate products that are not required to effectively use the client. In the context of this ST, the management server is treated as a remote user that can be authorized to perform identified TOE management operations TOE Overview Check Point Endpoint Security is a workstation security software product that is installed on user desktop and laptop hosts in an enterprise setting. Supported operating systems include: Windows 7 Enterprise, Professional, Ultimate editions (32 bit and 64 bit). 1 Software Blades are security modules purchased by customers independently or in pre-defined bundles.

7 Check Point Endpoint Security Security Target Version Chapter 1. ST Introduction 1/22/2014 The product provides pre-boot user authentication, cryptographic protection for data stored on hard disks and removable media, enforces defined security policies on all host I/O interfaces (USB, serial, etc.), and provides information flow control for network traffic entering and departing the host. In addition, the product can be configured to invoke third-party components installed on the host that perform malware scanning and analysis (see Appendix A - Supported Antivirus Solutions). Check Point Endpoint Security can be used to enforce corporate security compliance policies. The client analyzes the host s compliance status (e.g. patch levels, anti-virus updates, etc.) and can be configured to prevent a non-compliant workstation from gaining access to network resources. A remote access client virtual private networking (VPN) capability supports establishment of a secure channel between the Check Point Endpoint Security client and a Check Point Security gateway, using the IKE/IPSec security protocols. Check Point Endpoint Security installations can be either managed locally on the workstation, or can be centrally managed from other Check Point security management products.. Audit logs can be sent to the management server (outside the TOE). Check Point security gateways and management server products are outside the TOE boundary. Check Point Endpoint Security E80.30 supports the following Check Point products: Check Point Security Gateway R70 and higher Check Point Endpoint Security Management E80.30 and higher 1.4. Document Organization Section 1 provides the introductory material for the security target. Section 2 identifies the Common Criteria conformance claims in this security target. Section 3 describes the security problem solved by the TOE, in terms of the expected operational environment and the set of threats that are to be addressed by either the technical countermeasures implemented in the TOE or through additional environmental controls identified in the TOE documentation. Section 4 defines the security objectives for both the TOE and the TOE environment. Section 5 is intended to be used to define any extended requirements claimed in this security target that are not defined in the Common Criteria. Section 6 gives the functional and assurance requirements derived from the Common Criteria, Parts 2 and 3, respectively that must be satisfied by the TOE. Section 7 explains how the TOE meets the security requirements defined in section 6, and how it protects itself against bypass, interference and logical tampering. Section 8 provides supplemental information that is intended to aid the reader, including highlighting conventions, terminology, and external references used in this security target document.

8 Check Point Endpoint Security Security Target Version Chapter 1. ST Introduction 1/22/ TOE Description Physical Scope and Boundaries of the TOE The TOE and its Operational Environment The Target of Evaluation (TOE) is a software product that is installed on a single workstation in an enterprise setting. Figure 1-1 below describes the scope of the TOE and its interactions with other entities in the workstation s operational environment. Check Point Endpoint Security protects the workstation from unauthorized access by physical, network-based, and external device-based threats. The workstation, its operating system, applications running on the workstation, external devices and media (including authentication tokens if used), and any network-based services (such as a Windows Domain Controller) are all outside of the TOE boundary. The product is a part of the comprehensive Check Point unified security architecture, and as such is typically centrally-managed using other Check Point security management products. Management servers support remote management, log review, and can serve as a centralized key storage repository for removable media encryption. Local user management is also available. The product also interacts with Check Point security gateways for remote access VPN. In the context of this security target, the TOE includes only the Check Point Endpoint Security software installed on the workstation - other Check Point components are evaluated separately. Figure TOE Operational Environment

9 Check Point Endpoint Security Security Target Version Chapter 1. ST Introduction 1/22/ The Boundaries of the TOE in the Context of the User Workstation Check Point Endpoint Security is a software product produced by Check Point. The product is installed on a workstation hardware platform that is running a Microsoft Windows operating system (see section 1.3 for supported versions). Figure 1-2 below depicts the TOE in the context of the user workstation. During its installation process, the product modifies the hard disk boot record so that the Check Point Endpoint Security Pre-Boot Environment (PBE) is started up before the hosting operating system. It applies Full Disk Encryption over the entire hard disk, on a sector by sector basis, so that both operating system and user area are protected from unauthorized access. The PBE is a limited operating system in its own right, providing access to the disk, authentication devices, and the user interface. It authenticates the user, and retrieves the user s access credentials needed for decrypting the hard disk. Once the user is authenticated, PBE boots up the operating system (which is defined as outside the TOE boundary), installing Check Point Endpoint Security kernel-level drivers that control the operating system s access to the hard disk, external I/O interfaces, and network interfaces. These drivers also provide control over user application behavior, allowing the product to provide containment and quarantine functionality for noncompliant, misbehaving, or malicious software that may be running on the workstation. Figure TOE Scope and Physical Boundaries Physical Computer Casing User Applications Anti-Malware Services Application User Space Drivers Operating System Pre-Boot Environment Device Manager Hard Disk IrDA Firewire Parallel Serial USB Media Manager / Media Encryption Removable Media Device EPM Explorer Full (utility) Disk Encryption Hardware Key LAN Firewall NIC VPN Client TOE components Storage encrypted by TOE In addition to kernel-level drivers, the product installs services that are responsible for communication with peer IT entities, management, logging, and compliance testing. A task bar application provides a Graphical User Interface (GUI) that allows the local user

10 Check Point Endpoint Security Security Target Version Chapter 1. ST Introduction 1/22/2014 to perform security management operations. A Media Import Wizard for encrypting removable optical media is integrated into the operating system s optical media burn interaction, and can also be launched directly from the task bar application. The different parts of the TOE are depicted in red in Figure 1-2. The TOE encrypts data stored on the workstation hard disk, and can be configured to encrypt storage on removable media devices and removable media 2 (outside the TOE). As depicted, the TOE includes an EPM Explorer utility that can be written on encrypted removable media devices. When the encrypted removable media device is inserted into a trusted host outside of the TOE (that does not include an installation of Check Point Endpoint Security), the EPM Explorer utility can be used to provide access to the encrypted storage. The security of the data on the removable media device is derived from the fact that it was encrypted by the TOE, using an offline password bound to the TOE s password selection constraints. The TOE assumes that the IT environment is benign with respect to the execution environment of the EPM Explorer utility, and any possible modification of the utility while stored on the device, to prevent compromise of the offline password used to protect the data. Check Point Endpoint Security can be configured to invoke third-party anti-virus software installed on the user workstation. The evaluated configuration supports a wide array of such software products. The Check Point Endpoint Security product is bundled with one such third-party anti-virus component; however, installation of this component is optional, and the anti-virus software itself is not included in the boundaries of the TOE TOE Guidance The following Check Point guidance is considered part of the TOE: Title Endpoint Security CC Evaluated Configuration Administrator Guide Version E80.30 Date January 2014 Endpoint Security CC Evaluated Configuration User Guide Version E80.30 September 2013 Endpoint Security Client E80.30 User Guide 2 November Note that removable media device is a subset of removable I/O device, both of which are distinct from removable media. Removable I/O devices are any devices that can be attached and detached, in its entirety, from a host workstation. Removable media devices are those removable I/O devices capable of storing data (e.g., the contents can potentially be written). Removable media includes floppy disks, CDs, and DVDs where the media itself is removable from a device attached to a host workstation.

11 Check Point Endpoint Security Security Target Version Chapter 1. ST Introduction 1/22/ Logical Scope and Boundaries of the TOE Overview The Endpoint Security suite includes the following components 3 : Full Disk Encryption Full Disk Encryption Controls access to the workstation though pre-boot authentication and user-transparent full disk encryption. This feature prevents unauthorized users with physical access from gaining access to any data on the disk. Media Encryption & Port Protection Port Protection Removable Media Manager Removable Media Encryption (EPM) Controls access to devices through all workstation ports. This feature prevents users from connecting unauthorized devices to client machine ports, providing On/Off/Read Only access control levels. Restricts the workstation to using only authorized removable media. Encrypts and protects information stored on removable media devices such as USB disks and external disk drives, and on CDs, and DVDs. Access to data stored on the media is thus restricted to authorized users. Includes the EPM Explorer utility for offline access to the encrypted media. Firewall & Application Control Firewall Application Control Personal Firewall for network traffic flowing in and out of the workstation. Controls network information flow permissions on a per-application basis. Compliance Enforcement Rules Constrains network communication for workstations that do not comply with defined configuration rules, e.g. correct anti-virus version installed. VPN VPN Client Provides an encrypted and authenticated trusted channel for remote access users connecting through a VPN gateway to internal resources. 3 The following subsections provide additional details on each of the capabilities identified in this section. Note that Management and Audit Logs are not implemented as separate components but are global suite-level capabilities.

12 Check Point Endpoint Security Security Target Version Chapter 1. ST Introduction 1/22/ Full Disk Encryption Check Point Endpoint Security encrypts the entire hard disk, including all operating system and user areas. Because encryption is performed on a sector by sector basis instead of on the basis of file and directory encryption, all disk contents are protected, including, in addition to normal data files, system files, swap files, temporary files, deleted files, and unused space. This ensures that an unauthorized user that gains physical access to the disk (e.g. in the case of a stolen laptop) cannot access or modify any information. 4 Users are authenticated by the Pre-Boot Environment, using fixed passwords or smart cards. In addition, a remote help feature allows the user to receive a one-time password that allows the user to login in the case of mislaid authentication credentials, as well as changing a fixed password that has been forgotten. Once authenticated, Check Point Endpoint Security boots up the operating system normally, installing a kernel driver that decrypts disk contents on the fly, transparently to the user, as well as transparently encrypting any updated disk sectors. Encryption is performed using encryption keys that are derived from user credentials. This ensures that Full Disk Encryption is maintained at all times, even when the workstation powers down unexpectedly. It also obviates the need to do a full disk overwrite on discarded disks the data on the disk is unreadable without the user credentials. FIPS validated cryptography (FIPS certificate #770) is used for Full Disk Encryption, using either 256 bit AES or Triple DES as encryption algorithms Removable Media Encryption (EPM) The Encryption Policy Manager (EPM) provides a configurable Removable Media Encryption capability that extends cryptographic protection to removable media devices. When a removable media device is inserted into a protected workstation, Check Point Endpoint Security can be configured to restrict access only to an encrypted storage area on the device, or conversely to allow only read-only access to prevent information from leaking onto an insecure device. The Device Encryption Key (DEK) is generated randomly and stored in encrypted form, wrapped by a Key Encryption Key (KEK) that is generated and stored on the management server (outside the TOE), or stored on the media encrypted in a password-based encryption format with a user-entered password, for supporting offline access to the data when the management server is not available. Encryption and decryption are performed transparently when data is written to or read from the removable device. FIPS validated 256 bit AES (FIPS certificate #784) is used for data encryption. Check Point Endpoint Security can also be configured to encrypt information written to CD and DVD removable media, when using the operating system s built-in CD/DVD writing software. 4 Note that when Encryption Policy Manager is enabled, audio CDs cannot be written.

13 Check Point Endpoint Security Security Target Version Chapter 1. ST Introduction 1/22/ Device Manager Device Manager controls user access to devices connected to various ports on the workstation, including USB, COM, LPT, PCMCIA, IrDA, Firewire and Bluetooth ports, as well as other devices such as modems, network adaptors, storage devices, etc. The administrator can determine for each device whether access is enabled for full access (Read/Write), disabled or set to Read Only, and for removable media and removable media devices, whether the workstation may execute programs from the removable media Removable Media Manager Unauthorized media inserted into a protected workstation may contain malware that might infect the workstation. Check Point Endpoint Security can be configured to reject access to unauthorized removable media devices and floppy disks, or to invoke a content scanner installed on the workstation (outside of the TOE, e.g. anti-virus software) to authorize the device. Check Point Endpoint Security stores a computed permutational hash on the device that represents the data written to the device from authorized Check Point Endpoint Security workstations. When a removable media device or floppy disk is inserted into a protected workstation that does not contain a hash, the Removable Media Manager concludes that this is the first time that the media is imported into Check Point Endpoint Security. When the hash on the device does not match the media contents, it has been modified on an external workstation. In either case, the media requires re-authorization for access to be allowed Firewall Check Point Endpoint Security implements information flow control rules representing a Personal Firewall Policy that mediates all inbound and outbound network traffic from the protected workstation. Traffic can be allowed or blocked based on source and destination addresses, protocols and ports Application Control In addition to the information flow control defined by Firewall Rules, Check Point Endpoint Security implements network access control for programs on the workstation. Each program can be allowed or blocked from establishing network connections, on the basis of the presumed identity of the peer host (trusted or otherwise), on the basis of whether the program is initiating the connection or listening for one (acting as a server), and the requested protocols and ports. Programs that violate the Application Control rules may also be automatically terminated. This feature can provide mitigation for Trojans and Spyware that attempt to connect to malicious servers. This feature provides fine-grained control of what user and applications are allowed to connect to network resources. Additionally, the application control feature can prevent certain applications from being installed on the TOE. The TOE can invoke third-party AntiVirus scanners when unauthorized programs attempt to

14 Check Point Endpoint Security Security Target Version Chapter 1. ST Introduction 1/22/2014 modify programs on the workstation. Application Control will detect a new or modified program and will prevent it from accessing the network Program Advisor Smart Defense Program Advisor is a Check Point service that provides recommendations for Application Control. It can be used to reduce administrative workload by incorporating recommendations from Check Point security professionals about which permissions to assign to common programs. Customers download Program Advisor recommendations from Check Point into the management server, and may choose to either accept these permission settings or override them with custom settings. This interaction is entirely outside the TOE boundary Enforcement Rules Check Point Endpoint Security can be configured to monitor the protected workstation for compliance with policy restrictions defined as Enforcement Rules. Enforcement Rules may require a certain anti-virus application to be active, a minimum version of the Check Point Endpoint Security client itself, or the presence or absence of defined registry keys, files, or programs indicating the presence or absence, respectively of a security-relevant component on the workstation. When an Enforcement Rule is found to be in non-compliance, the user or administrator may receive a notification, or the workstation may be restricted from accessing the network and/or other defined I/O devices, except for a defined sandbox area from which the user may download remediation resources VPN Client Check Point Endpoint Security can be configured to establish VPN trusted channels to Check Point gateway products, using the IKE/IPSec protocols. The gateways Encryption Domain (the set of addresses located behind the gateways) is downloaded from the gateway after it is authenticated by its public key certificate. Once the trusted channel is connected, all traffic to and from the gateway s Encryption Domain is protected from disclosure and modification while traversing the network. The client can also be configured to route all traffic through the VPN tunnel to the gateway (Hub Mode), so that all traffic is filtered by the gateway Management Check Point Endpoint Security provides a management application that allows the local user to access and modify product security settings for all Check Point Endpoint Security suite components. In addition, Check Point Endpoint Security provides interfaces for remote users to perform management operations from remote management servers (outside of the TOE) after being identified and authenticated by Check Point Endpoint Security. Audit log records are sent to the remote host, and security policy settings downloaded from the management server update the locally-defined policy. When Check Point Endpoint

15 Check Point Endpoint Security Security Target Version Chapter 1. ST Introduction 1/22/2014 Security is configured to access a management server and the management server is not available, then Check Point Endpoint Security applies a predefined policy known as a disconnected policy when determining how to continue operating Audit Logs Security-relevant events from all Check Point Endpoint Security suite components (except for VPN) are logged in the local audit trail. The TOE stores audit records locally (encrypted) until a connection is established with the Management Server. Once the connection to a management server is established, the TOE transfers all locally stored audit records to the remote management server. The connection to a management server occurs only after an authorized administrator logs into the TOE. When the TOE stores audit records locally, every audit record contains a date, a timestamp, an indication of the type of event, a user identity, the outcome of the event and possibly additional event specific information. When audit records are displayed locally, the user identity is obscured. Thus, while the capability exists for local users to review the audit trail as a set of auditable event messages, and sort it according to any of the viewed attributes, the local review of audit data was not evaluated and was not tested Functionality Excluded from the TOE Evaluated Configuration All Check Point Endpoint Security product functionality not explicitly excluded in this section is included in the Target of Evaluation. However, only the functionality directly associated with a security functional requirement as defined by section 7 have been tested during the evaluation. Thus, features such as password complexity requirements, password history and login banners have not been evaluated as to their correctness. The third-party anti-virus product bundled with the TOE is considered to be outside the boundaries of the TOE. However, the TOE supports a variety of anti-virus products that may be installed on the workstation by the user, independently of the TOE. Only two AntiVirus products were utilized during evaluation testing: McAfee VirusScan and Kaspersky Antivirus. The TOE is comprised of several Check Point software blades (identified in section 1.2). However, the Check Point WebCheck Blade and Anti-malware blades have not been evaluated. Therefore, these blades are not permitted and must not be installed in an evaluated configuration. Although authentication using smartcards was included in the evaluation, the capability of the smartcards and the smartcard readers themselves were not. The TOE relies on the hardware and the operating system in the environment for reliable timestamps used in audit and cryptography. The TOE protects audit logs when stored locally. Audit logs are stored on the encrypted part of the disk and thus the TOE requires user authentication prior to granting access to local audit logs. Also, the TOE does not provide interfaces to delete audit data. Since there are no SFRs related to local audit storage, the TOE behavior regarding the storage, integrity and overwriting of local audit storage has not be evaluated. Only the remote

16 Check Point Endpoint Security Security Target Version Chapter 1. ST Introduction 1/22/2014 transmission audit mechanism has been evaluated. Therefore, the local review of audit data was not evaluated and was not tested.. Some Check Point Endpoint Security functionality is specifically excluded and thus its use is NOT permitted in an evaluated configuration. The TOE includes the Endpoint Connect VPN, however, the command line option for endpoint connect is not permitted to be used in the evaluated configuration. Also, the use of the CheckPoint Legacy VPN is not permitted in the evaluated configuration. The Virtual keyboard and character map function of the TOE are NOT permitted in the evaluated configuration.

17 Check Point Endpoint Security Security Target Version Chapter 2. Conformance Claims 1/22/ Conformance Claims 2.1. CC Conformance Claim The TOE is conformant with the following CC specifications: Common Criteria for Information Technology Security Evaluation Part 2: Security functional requirements, Version 3.1, Revision 3, July 2009, CCMB , conformant (CC Part 2 Conformant) Common Criteria for Information Technology Security Evaluation Part 3: Security assurance requirements, Version 3.1 Revision 3, July 2009, CCMB , conformant (CC Part 3 Conformant) 2.2. Assurance Package Conformance The TOE is conformant with the following assurance package: Evaluation Assurance Level (EAL) 2 - augmented with ALC_FLR PP Conformance The TOE does not claim conformance with any Protection Profile.

18 Check Point Endpoint Security Security Target Version Chapter 3. Security Problem Definition 1/22/ Security Problem Definition 3.1. Introduction In an enterprise setting, users are typically assigned network-connected enterprise desktop workstations that are installed and maintained by an IT department. A corporate security policy defines what the workstations may be used for and in what manner. Such policies typically exclude personal use of workstation resources, and forbid unauthorized extraction of information out of the organization. In addition, users may be issued laptops that are used both within the organization and outside it, by teleworkers, salespeople, users on the road, etc. Although located within the organization, desktop hosts are exposed to physical access by unauthorized personnel, such as cleaning staff in off-hours, users other than the assigned workstation owner, etc. Laptops, although typically more closely kept by the assigned owner, are subject to theft as they are typically taken outside the organization. Authorized users themselves are often tempted to circumvent corporate security policy, in order to install inappropriate software (such as games), installing unauthorized components (e.g. modems or wireless network adapters), taking sensitive files outside the organization (e.g. to work on them at home), or even to disrupt security mechanisms that get in the way of getting the job done. Workstations are also exposed to network-based threats. The internal network is usually protected by perimeter security devices that mitigate most external threats on the workstation. However, perimeter defenses are sometimes insufficient, especially when dealing with services such as and Web browsing, that by their nature must be allowed to traverse the perimeter and allow access to external entities. Internal networkbased threats are also significant, both from other users on the network and from automated malware (e.g. worms) that may somehow penetrate the perimeter. Laptops taken outside the organization must typically connect to public networks unprotected by the organizational perimeter defenses. They are thus more vulnerable to attack over the network. In addition, data exchanged between these laptops and internal servers may be intercepted while in transit over the public network. The following subsections define assets that need to be protected, threat agents in the TOE s operational environment, and a set of threats that are to be countered by the TOE, as well as assumptions that must be upheld by the environment for the TOE s security functions to be effective.

19 Check Point Endpoint Security Security Target Version Chapter 3. Security Problem Definition 1/22/ Definitions Assets The TOE is a workstation security software product. As such, it is intended to protect software assets stored on or processed by the workstation. This relates primarily to the protection of any such information from disclosure to unauthorized entities, and to protection of the workstation from threats that seek to undermine its integrity in order to use it for unauthorized purposes. D.FILES Information stored in workstation memory or in files written to media devices connected to the workstation. D.NETWORK Information in transit between the workstation and remote host. D.SYSTEM Workstation operating system and user application resources Threat Agents The TOE is designed to counter threats from the following threat agents: TA.PHYSICAL An unauthorized user with physical access to the workstation. TA.USER A user with authorized access to the workstation. TA.PROGRAM A user program installed on the workstation. TA.MALWARE A malicious program installed on the workstation, unbeknownst to the authorized user. TA.NETWORK An unauthorized entity with networked access to the workstation or to network traffic exchanged between the workstation and network peers Threats T.PHYSICAL_ACCESS An unauthorized user with physical access to the workstation may access information stored on the workstation s disk drive. Notes: The unauthorized user (TA.PHYSICAL) might attempt to impersonate an authorized user by entering spoofed authentication credentials, or remove the hard drive from the workstation to attempt to extract information stored on the drive (D.FILES). T.MODIFY_DISK An unauthorized user with physical access to the workstation may subvert the workstation s system software or normal boot process. Notes: The unauthorized user (TA.PHYSICAL) might attempt to modify the boot record or boot up the workstation from a different device (e.g. floppy disk) in an attempt to subvert authentication mechanisms, or attempt to install Spyware by writing it directly to the drive, in order to compromise workstation system integrity (D.SYSTEM).

20 Check Point Endpoint Security Security Target Version Chapter 3. Security Problem Definition 1/22/2014 T.NON_COMPLIANCE An authorized user may circumvent security policy by installing inappropriate software, connecting unauthorized devices to the workstation, or disabling security mechanisms. Notes: The user (TA.USER) might attempt to install inappropriate software (e.g. unlicensed software or recreational software), connect unauthorized devices (e.g. unencrypted media devices, modems, wireless LAN adapters), or attempt to disable security mechanisms such as anti-virus software or cancel system security updates, thus modifying the system (D.SYSTEM) in an unauthorized manner. T.LEAKY_APPS User and system applications may leak inappropriate information. Notes: Non-malicious applications and services (TA.PROGRAM) might utilize network services that are not in-line with security policy, leaking inappropriate information (D.FILES) to unauthorized entities. For example, some applications connect to software vendor update servers, providing information on workstation configuration. T.SPYWARE Spyware applications installed on the workstation may leak information to external entities. Notes: Spyware (TA.MALWARE) is software that has a hidden, malicious intent to leak information (D.FILES) from the workstation to external entities, usually by connecting over the network to subverted servers. Spyware can infect the workstation via various vectors, e.g. in the guise of freeware, or even as part of purchased software packages. Spyware may sometimes remain undetected for long periods of time, because it tends not to have visible impact on system behavior. T.VIRUS Malicious code may be injected into the workstation via workstation device ports, compromising system integrity. Notes: This statement is intended to describe the threat of malicious software (TA.MALWARE) that attempts to inject itself into the workstation, modifying system or application files (D.SYSTEM) as a means of replicating itself and spreading to other hosts. Viral spread vectors may include removable media devices, removable media, or executable content downloaded over the network. Virii are often distinguished from Trojans which spread with the inadvertent help of the authorized user (see T.NON_COMPLIANCE), and from Worms that spread by exploiting network-exposed vulnerabilities or characteristics (see T.NETWORK and T.WORM).

21 Check Point Endpoint Security Security Target Version Chapter 3. Security Problem Definition 1/22/2014 T.WORM Malicious code may run on the workstation, attempting to spread to other hosts over the network. Notes: The most common worm spread vector is , a ubiquitous service that is available on most workstations and is allowed to traverse corporate networks and perimeter security devices, both because of the complexity of the common mail application (complexity breeding vulnerabilities), and because of the naivety of users that often inadvertently aid the worm in spreading to others. The worm (TA.MALWARE) typically impacts the system (D.SYSTEM) adversely in terms of increased network load and decreased availability. T.NETWORK An unauthorized entity on a connected network may exploit network-exposed vulnerabilities to subvert the workstation. Notes: Applications and services might expose vulnerabilities to the network by connecting to external servers over insecure connections, or by listening to network ports and processing network input in an insecure manner, thus allowing the attacker (TA.NETWORK) to exploit these vulnerabilities in order to compromise the integrity of the system (D.SYSTEM). T.INTERCEPTION An unauthorized entity may intercept or modify information in transit between the workstation and remote IT entity. Notes: The attacker (TA.NETWORK) gains access to the network path between the workstation and another host, and intercepts the information in transit between the two network peers (D.NETWORK), gaining unauthorized access to the information or maliciously modifying it. T.MEDIA_LEAK A program may write information to a removable media device or removable media, and the media might later fall into the hands of an unauthorized user that gains access to the information. Notes: The threat agent here is defined as the program (TA.PROGRAM) that leaks the information (D.FILES), not the unauthorized user, because the latter does not take an active role in the information leakage Assumptions The following conditions are assumed to exist in the operational environment: A.SYSTEM The workstation hardware and operating system will be installed and maintained in a manner that cooperates with the TOE and does not actively seek to disable or otherwise impair or bypass any of the security functions of the TOE. Notes: The TOE depends on the underlying platform to ensure that its security functions are protected from tampering, deactivation, interference and bypass.

22 Check Point Endpoint Security Security Target Version Chapter 3. Security Problem Definition 1/22/2014 TOE components hook into published operating system interfaces in order to intercept application requests, and TOE security functions depend on the correctness of implementation of these operating system interfaces. While the TOE provides self-protection mechanisms intended to prevent users from tampering with its security functions or with overall system integrity, it is also expected that the operating system shall be installed and maintained such that users receive restricted permissions, in support of these security objectives. For example, it is expected that users cannot run kernel-level software that might bypass operating system drivers and interacts directly with hardware devices. The TOE also relies on the operating system to provide reliable timestamps in support of audit and information flow control functionality. System administrators are advised to follow operating system Common Criteria evaluated configuration guidance for operating system installation. A.AUTH_CRED Authorized users will keep authentication credentials private. Notes: Users must keep their passwords and PINs secret, and will not let others use their authentication tokens. When entering offline removable media device passwords into EPM Explorer in order to access encrypted data on a host outside of the TOE, the user should ensure that the host environment can be trusted not to compromise the password s secrecy. When a one-time Remote Help password is generated, the authorized help desk representative will first authenticate the presumed authorized user by means outside of the TOE, and will communicate the password using secure delivery procedures. The owners of the TOE must ensure that the private keys used by management servers or security gateways to communicate with the TOE are maintained in a manner that maintains adequate security. It is advised to follow Common Criteria evaluated configuration guidance for other Check Point product installations that interoperate with the TOE to ensure their secure operation.

23 Check Point Endpoint Security Security Target Version Chapter 4. Security Objectives 1/22/ Security Objectives 4.1. Security Objectives for the TOE This section describes the TOE security objectives: O.AUTHENTICATION The TOE shall require user identification and authentication before allowing access to protected assets. O.ENCRYPTION O.DEV_AUTH O.FIREWALL O.PROG_CONTROL O.CODE_BLOCKING O.VPN O.ENFORCEMENT O.MANAGEMENT O.AUDIT The TOE shall apply cryptographic protection on protected assets such that they are protected from disclosure or undetected modification by an unauthorized user. The TOE shall identify devices connected to the workstation and shall allow access only to authorized devices. The TOE shall mediate network traffic into and out of the workstation, blocking unauthorized protocols and services. The TOE shall identify running programs, verify program integrity, and restrict program privileges for network access. The TOE shall be able to block execution of code injected into the workstation via removable media and removable media devices. The TOE shall be able to establish a secure channel with remote gateways that provides peer authentication and protection of channel data from modification or disclosure. The TOE shall verify that the workstation host configuration meets security policy requirements and shall be able to restrict network communications and access to I/O devices for a noncompliant host. The TOE shall support local and remote administrator roles and provide adequate management interfaces and guidance, restricting management functions to authorized users. The TOE shall create audit records for security-relevant events and allow administrators to view audit information.

24 Check Point Endpoint Security Security Target Version Chapter 4. Security Objectives 1/22/ Security Objectives for the Operational Environment The assumptions made in chapter 3 must be upheld by corresponding security objectives for the environment: OE.SYSTEM OE.AUTH_CRED The workstation hardware and operating system shall be installed and maintained in a manner that cooperates with the TOE by providing an operating environment protected from unauthorized users, allowing it to control access to workstation devices, access to the network, and access to files and registry settings, by providing reliable timestamps, and does not actively seek to disable or otherwise impair or bypass any of the security functions of the TOE. Authorized users shall keep authentication credentials private. In addition, the TOE relies on the cooperation of the operational environment to counter some threats, allocating the following security objectives to the operational environment: OE.ANTI_VIRUS OE.VPN OE.SMART_CARD OE.KEY_STORAGE The operational environment of the TOE shall include up-todate anti-virus software installed on the workstation, out of the list of supported anti-virus software identified in the TOE guidance documentation. The operational environment of the TOE shall include VPN gateways that cooperate with the TOE in establishing secure channels that provide peer authentication and protection of channel data from modification or disclosure. The operational environment of the TOE shall ensure that any smart cards used for user authentication shall authenticate the user to the TOE by successfully decrypting the user key. The operational environment of the TOE shall support secure key storage for removable media encryption keys on a management server.

25 Check Point Endpoint Security Security Target Version Chapter 4. Security Objectives 1/22/ Security Objectives Rationale Security Objectives Countering Threats Table 4-1 maps security objectives to threats described in chapter 3. The table clearly demonstrates that each threat is countered by at least one security objective and that each objective counters at least one threat; this is then followed by explanatory text providing justification for each defined threat that if all security objectives that trace back to the threat are achieved, the threat is removed, sufficiently diminished, or that the effects of the threat are sufficiently mitigated. Table 4-1- Tracing of security objectives to threats T.PHYSICAL_ACCESS T.MODIFY_DISK T.NON_COMPLIANCE T.LEAKY_APPS T.SPYWARE T.VIRUS T.WORM T.NETWORK T.INTERCEPTION T.MEDIA_LEAK O.AUTHENTICATION O.ENCRYPTION O.DEV_AUTH O.FIREWALL O.PROG_CONTROL O.CODE_BLOCKING O.VPN O.ENFORCEMENT O.MANAGEMENT O.AUDIT OE.ANTI_VIRUS OE.VPN OE.SMART_CARD OE.KEY_STORAGE

26 Check Point Endpoint Security Security Target Version Chapter 4. Security Objectives 1/22/2014 T.PHYSICAL_ACCESS An unauthorized user with physical access to the workstation may access information stored on the workstation s disk drive. All protected assets are encrypted in accordance with O.ENCRYPTION, including the workstation s entire disk drive. This prevents an unauthorized user from accessing information stored on the drive. O.AUTHENTICATION ensures that the TOE allows the user access to protected resources only after the user successfully authenticates. When smart cards are used for user authentication, security objective for the operational environment OE.SMART_CARD supports the O.AUTHENTICATION security objective for the TOE by ensuring that the smart card uniquely authenticates the user to the TOE. T.MODIFY_DISK An unauthorized user with physical access to the workstation may subvert the workstation s system software or normal boot process. O.ENCRYPTION removes the ability of an unauthorized user to modify system software in a deliberate manner. O.DEV_AUTH and O.CODE_BLOCKING prevent unauthorized users from attaching virus-infected devices to the workstation as a means of bypassing postboot authentication mechanisms and thereby subverting system software. T.NON_COMPLIANCE An authorized user may circumvent security policy by installing inappropriate software, connecting unauthorized devices to the workstation, or disabling security mechanisms. O.PROG_CONTROL mitigates the non-compliance threat by restricting default program privileges, so that inappropriate software (e.g. multi-user games) will be restricted from accessing network resources. O.DEV_AUTH restricts users to accessing only authorized devices. Authorization can be configured to include scanning of removable media devices and floppy disks inserted into the workstation for the presence of executable code, and blocking installation of software off of such media. O.ENFORCEMENT requires the TOE to verify that the workstation host configuration meets security policy requirements. This includes a capability for verifying the existence of required security mechanisms, and the absence of forbidden software application. Violating users are warned and/or restricted from accessing the network and/or I/O devices. This threat is further mitigated by the following security objectives: Users are associated with management roles in accordance with security objective O.MANAGEMENT; non-administrative users are restricted from performing TOE management functions that may disable defined TOE security enforcement functionality. O.AUDIT allows local and remote administrators to view audit information for security-relevant events, including non-compliance event records.

Endpoint Security VPN for Windows 32-bit/64-bit

Endpoint Security VPN for Windows 32-bit/64-bit Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and

More information

Security Target. McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5. Document Version 1.1. September 9, 2011

Security Target. McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5. Document Version 1.1. September 9, 2011 Security Target McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5 Document Version 1.1 September 9, 2011 Document Version 1.1 McAfee Page 1 of 61 Prepared For: Prepared By: McAfee, Inc. 2821

More information

Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition

Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition Version 1-0 7 February 2011 2011 Citrix Systems, Inc. All rights reserved. Summary of Amendments Version 1-0 7

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

Check Point Endpoint Security Media Encryption Security Target

Check Point Endpoint Security Media Encryption Security Target Check Point Endpoint Security Media Encryption Security Target Version 1.0 June 23, 2010 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared By: Science Applications International Corporation

More information

Endpoint Security Client for Mac

Endpoint Security Client for Mac Endpoint Security Client for Mac E80.60 User Guide 23 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

SecureAge SecureDs Data Breach Prevention Solution

SecureAge SecureDs Data Breach Prevention Solution SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 11.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2010/70 23 November 2010 Version 1.0 Commonwealth of Australia 2010. Reproduction is authorised provided that

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Security Target. McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5. Document Version 1.3. October 12, 2011

Security Target. McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5. Document Version 1.3. October 12, 2011 Security Target McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5 Document Version 1.3 October 12, 2011 Document Version 1.3 McAfee Page 1 of 69 Prepared For: Prepared By: McAfee, Inc. 2821

More information

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government

More information

Certification Report

Certification Report Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government

More information

Endpoint Security VPN for Mac

Endpoint Security VPN for Mac Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

Extended Package for Mobile Device Management Agents

Extended Package for Mobile Device Management Agents Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Protection Profile for Server Virtualization

Protection Profile for Server Virtualization Protection Profile for Server Virtualization 29 October 2014 Version 1.0 i 0 Preface 0.1 Objectives of Document This document presents the Common Criteria (CC) Protection Profile (PP) to express the fundamental

More information

Protection Profile for Full Disk Encryption

Protection Profile for Full Disk Encryption Protection Profile for Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 01 December 2011 Version 1.0 Table of Contents 1 Introduction to the PP...

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Full Drive Encryption Security Problem Definition - Encryption Engine

Full Drive Encryption Security Problem Definition - Encryption Engine 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Marimba Client and Server Management from BMC Software Release 6.0.3

Marimba Client and Server Management from BMC Software Release 6.0.3 Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...

More information

Best Practices for DanPac Express Cyber Security

Best Practices for DanPac Express Cyber Security March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,

More information

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY FACT: WORKSTATIONS AND SERVERS ARE STILL AT RISK CONVENTIONAL TOOLS NO LONGER MEASURE

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of McAfee Email and Web Security Appliance Version 5.5 Patch 2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria

More information

Using Remote Desktop Clients

Using Remote Desktop Clients CYBER SECURITY OPERATIONS CENTRE December 2011 Using Remote Desktop Clients INTRODUCTION 1. Remote access solutions are increasingly being used to access sensitive or classified systems from homes and

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of Desktop: Enterprise Whole Disk Encryption Only Edition, Version 9.10.0 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria

More information

Introduction to Endpoint Security

Introduction to Endpoint Security Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

Virtual Private Networks (VPN) Connectivity and Management Policy

Virtual Private Networks (VPN) Connectivity and Management Policy Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

Endpoint Security Client

Endpoint Security Client Endpoint Security Client R80.10 User Guide 7 February 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed

More information

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING 6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

Kaspersky Endpoint Security 10 for Windows Administrator's Guide Kaspersky Endpoint Security 10 for Windows Administrator's Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product! We hope that you will find this documentation

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Security Management. Keeping the IT Security Administrator Busy

Security Management. Keeping the IT Security Administrator Busy Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...

More information

Certification Report

Certification Report Certification Report Symantec Network Access Control Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme

More information

McAfee Endpoint Encryption 7.0 for PC with McAfee epolicy Orchestrator 4.6 Common Criteria EAL2+ Security Target

McAfee Endpoint Encryption 7.0 for PC with McAfee epolicy Orchestrator 4.6 Common Criteria EAL2+ Security Target McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 888.847.8766 www.mcafee.com McAfee Endpoint Encryption 7.0 for PC with McAfee epolicy Orchestrator 4.6 Common Criteria EAL2+ Security Target

More information

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"

More information

How To Evaluate Watchguard And Fireware V11.5.1

How To Evaluate Watchguard And Fireware V11.5.1 Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

Protection Profile for Software Full Disk Encryption

Protection Profile for Software Full Disk Encryption Protection Profile for Software Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 14 February 2013 Version 1.0 Table of Contents 1 Introduction to

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

System Security Policy Management: Advanced Audit Tasks

System Security Policy Management: Advanced Audit Tasks System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that

More information

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle

More information

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Security Target: Symantec Endpoint Protection Version 11.0

Security Target: Symantec Endpoint Protection Version 11.0 Security Target: Symantec Endpoint Protection Version 11.0 ST Version 1.6 June 2, 2008 Document Version 1.6 Symantec Corporation Page 1 of 68 Prepared For: Prepared By: Symantec Corporation 20330 Stevens

More information

Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target

Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Revision 1.0 August 2011 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Internet Security Good Practice Guide. August 2009

Internet Security Good Practice Guide. August 2009 Internet Security Good Practice Guide August 2009 contents 1 Introduction to Good Practice Guides 3 2 Internet Security Overview 3 3 Internet Security Good Practice Guidelines 4 4 Appendix A: Definitions

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

Joint Interpretation Library

Joint Interpretation Library for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0

More information

Remote Access Clients for Windows

Remote Access Clients for Windows Remote Access Clients for Windows E80.60 Release Notes 3 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

Check Point Endpoint Security Full Disk Encryption Security Target

Check Point Endpoint Security Full Disk Encryption Security Target Check Point Endpoint Security Full Disk Encryption Security Target ST Version 2.4 June 22, 2009 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared by: Metatron Ltd. 66 Yosef St., Modiin, Israel

More information

Chapter 4 Application, Data and Host Security

Chapter 4 Application, Data and Host Security Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request

More information

Oracle Identity and Access Management 10g Release 10.1.4.0.1 running on Red Hat Enterprise Linux AS Release 4 Update 5

Oracle Identity and Access Management 10g Release 10.1.4.0.1 running on Red Hat Enterprise Linux AS Release 4 Update 5 122-B CERTIFICATION REPORT No. CRP245 Oracle Identity and Access Management 10g Release 10.1.4.0.1 running on Red Hat Enterprise Linux AS Release 4 Update 5 Issue 1.0 June 2008 Crown Copyright 2008 Reproduction

More information

Common Criteria Security Target

Common Criteria Security Target Common Criteria Security Target for Citrix XenDesktop 5.6 Platinum edition Version 1-1 16 November 2012 2012 Citrix Systems, Inc. All rights reserved Summary of Amendments Version Date Notes 1-1 16 November

More information

HANDBOOK 8 NETWORK SECURITY Version 1.0

HANDBOOK 8 NETWORK SECURITY Version 1.0 Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives

More information

BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note

BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Certification Report

Certification Report Certification Report EAL 3+ Evaluation of AccessData Cyber Intelligence and Response Technology v2.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria

More information

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 German Federal Office for Information Security PO Box 20 03 63 D-53133 Bonn Tel.:

More information

How To Secure An Rsa Authentication Agent

How To Secure An Rsa Authentication Agent RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page

More information

ADM:49 DPS POLICY MANUAL Page 1 of 5

ADM:49 DPS POLICY MANUAL Page 1 of 5 DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Citrix Password Manager, Enterprise Edition Version 4.5

Citrix Password Manager, Enterprise Edition Version 4.5 122-B COMMON CRITERIA CERTIFICATION REPORT No. CRP235 Citrix Password Manager, Enterprise Edition Version 4.5 running on Microsoft Windows and Citrix Presentation Server Issue 1.0 June 2007 Crown Copyright

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information