Click to edit Master title style Mastertitelformat bearbeiten. Modeling Security Functional Requirements

Size: px
Start display at page:

Download "Click to edit Master title style Mastertitelformat bearbeiten. Modeling Security Functional Requirements"

Transcription

1 Click to edit Master title style Click to edit Master text styles Second Mastertextformat level bearbeiten Third Zweite level Fifth Vierte level Fünfte Helmut Kurth Modeling Security Functional Requirements atsec information security 1 1 1

2 Click to edit Outline Master title style Click The CC to edit paradigm Master text an attempt styles of an explanation Putting Second Mastertextformat it level into context bearbeiten a basis for modeling SFRs Third Mapping Zweite level the model to part 2 Fourth Deficiencies Drittelevel of CC part 2 components and how to Fifth overcome Vierte level them Suggestions Fünfte for improvement There is still a long way to perfection! 2 2 2

3 Click to CC edit Paradigms Master title style User: Click to edit Master text styles Second Mastertextformat level bearbeiten Third Zweite level Subject: Fourth Drittelevel Fifth Vierte level User-subject Fünfte binding: active entity outside of the TOE that requests services from the TOE (human user or external IT system). Active entity within the TOE but outside of the TSF (such that services requested by a subject are mediated by the TSF. Service of the TSF that binds a user to a subject such that the subject may request services on behalf of the user. Open issues: Trusted subjects ; subjects not operating on behalf of a user

4 Click to CC edit Paradigms Master title style Object: Click to edit Master text styles Second Mastertextformat level bearbeiten Third Resource: Zweite level Information: Fifth Vierte level Fünfte Open issues Passive entity controlled by the TSF. Entity managed and controlled by the TSF. Anything a user may extract from the TOE by using services. Difference between objects and resources ; entities that are sometimes passive (are operated upon), sometimes active; relation between information and the objects/resources they are stored in or processed by

5 Click to CC edit Paradigms Master title style Security Click to edit attributes Master text styles Second Mastertextformat level bearbeiten and resources. Third Zweite level User Fifth Vierte level data Fünfte May exists for users, subjects, information, objects, sessions, Are managed by the TSF and used as part of the rules defining the security policy enforced by the TSF Data stored in resources or objects controlled by the TSF but were the TSF do not interpret the data TSF data Data stored in resources or objects controlled by the TSF which is used by the TSF as part of its operation Example: security attributes, TSF internal state 5 5 5

6 Click Problems to edit with Master the Paradigm title style No Click guidance to edit Master is provided text styles how to define/identify subjects, Second objects, Mastertextformat level resources, bearbeiten information, security attributes. Third No Zweite mapping level from the paradigms to the security Fourth functional Drittelevel components is provided No Fifth Vierte consistency level check between the paradigm and the functional components has been performed Fünfte This is one reason why part 2 of the CC is so hard to apply! 6 6 6

7 Click to New edit Approach Master title style Let s Click stay to edit with Master the terms text styles used in the paradigm Let s Second Mastertextformat develop level a model bearbeiten of what we want to have as Third security Zweite level functions Fourth Only Dritte when level this is done attempt to map the model to part Fifth 2 Vierte of the level CC! Starting with part 2 of the CC when developing your model will Fünfte bring you into trouble! What we suggest is a step-by-step approach to develop security functional requirements based on the CC paradigm 7 7 7

8 Click Policy to elements edit Master in title context style Click to edit Master text styles Second Mastertextformat level bearbeiten User Third Zweite 1 level Subject Fifth Vierte level Fünfte User 2 TSF TOE Resource Object Object 8 8 8

9 Click User-subject to edit Master binding title style Click to edit Master text styles Second Mastertextformat level bearbeiten User Third Zweite 1 level Subject Fifth Vierte level Fünfte User requests binding and presents required credentials TSF TOE Resource Object TSF binds subject to user User requests TSF services via subject Object 9 9 9

10 TSF Click data to edit and Master policy title elements style Click to edit Master text styles Second Mastertextformat level bearbeiten User U Subject S Object O Type Third Zweite.. Type level Type Attribute 1 Attribute 1 Attribute 1 Attribute Fourth Dritte 2 level Attribute 2 Attribute 2... Attribute Fifth Vierte n Attribute level m Attribute p Fünfte TSF state Resource R Type. Attribute 1 Attribute 2. Attribute q Channel Type. Attribute 1 Attribute 2. Attribute r TSF architecture TSF rules TSF event monitors

11 Additional policy elements Click to edit Master title style Mastertitelformat - Communication Channels bearbeiten - Communication Click to edit Master channels text styles Second Mastertextformat level bearbeiten Third Zweite level Requires integrity protection Fifth Vierte level Requires replay protection Fünfte Requires data authentication Designates logical communication channels May be characterized by security attributes like Requires confidentiality protection. May have rules that determine initialization, management, use and termination of the channel

12 Additional policy elements Click to edit Master title style Mastertitelformat - Event Monitoring bearbeiten - Defines Click to edit events Master the TSF text styles needs to react upon Second Mastertextformat Attempted level violation bearbeiten of the policy Third Zweite Detected level failure of abstract machine or device Reaching a specific state. Fifth Vierte level Defines the rules how to react to events Fünfte Generate audit entry Send message to external user Modify state and/or security attributes of policy elements Go to a specific state

13 Additional policy elements Click to edit Master title style Mastertitelformat - TSF architecture bearbeiten - Additional Click to edit rules Master to achieve text styles security objectives Second Mastertextformat level bearbeiten Third Zweite Separation level of different subject Non bypassability TSF internal information flow control Fifth Vierte level Consistency of TSF data Fünfte Separation between TSF and non-tsf portion of the TOE Availability of services One may well argue that they are outside of the policy, but they are still required to satisfy valid security objectives

14 Removed policy element Click to edit Master title style Mastertitelformat - Session bearbeiten - Term Click to used edit for Master traditional text styles types of terminal session Can Second Mastertextformat (with level some interpretation) bearbeiten also be used for session Third level Zweite protocols level Fourth Paradigm Drittelevel can be addressed by the new (broader) Fifth channel Vierte level paradigm Session establishment Fünfte Selection of session attributes Limitation on concurrent sessions Session locking Session termination Access banner, Access history

15 Removed policy element Click to edit Master title style Mastertitelformat - Information bearbeiten - Does Click to not edit really Master fit with text the styles other elements Paradigm Second Mastertextformat level section states bearbeiten is required for modeling Third information Zweite level flow control Fourth Dritte This is level usually modeled via object and resource security Fifth Vierte level Fünfte attributes attributes and access / use of the objects and resources with rules on the automatic initialization and management of those Requires support by architectural aspects Is therefore removed as an element of the paradigms

16 Click Developing to edit a Master security title policy style Step Click 1 to edit Element Master definition text styles Second Mastertextformat level bearbeiten channels Third Zweite level Fifth Vierte level Fünfte Start with an initial set of users, subjects, objects, resources, Start with an initial set of security attributes for each Quite often one will identify that different types or classes of users, subjects, objects, resources and channels have different security attributes. Identify the types required Define rules for creation, management and deletion of each element (if applicable) Usually additional security attributes are identified by this process Define rules for the initial values and the management of security attributes

17 Click Developing to edit a Master security title policy style Click Step 2 to edit User Master interaction text styles Second Mastertextformat level bearbeiten Third Zweite Credentials level to present Fifth Vierte level Channels to be used Fünfte Rules for channel establishment Define the rules for users to interact with the TSF Rules when credentials are required User-subject binding rules (if required) Setting the channel attributes Other security relevant actions performed during channel establishment (like key establishment, access banner display)

18 Click Developing to edit a Master security title policy style Step Click 3 to edit Object Master and text resource stylesusage rules Second Mastertextformat level bearbeiten users Third Zweite level Fifth Vierte objects, level resources, and channels used Fünfte Define the rules for use of objects, resources by subjects and Usually different per object type and per resource type Rules are usually based on security attributes of users, subjects, Rules may also use TSF state information (like time, specific state like maintenance state, etc.) Record the TSF state variables used Definition of rules quite often identifies additional security attributes of the elements involved Go back and define how those attributes are initialized and managed

19 Click Developing to edit a Master security title policy style Click Step 4 to edit Import Master and text export styles of objects Second Mastertextformat level bearbeiten Third Zweite level channel Fifth Vierte level Fünfte When import and export is allowed Export means: it is transferred out of the control of the TSF without sending it to a user connected to the TSF via a defined Import means: it is accepted from some unknown source Define requirements for import and export of objects What is required to be with the object when imported or exported For example a defined set of security attributes How the object is transformed and checked when imported For example decrypted, integrity check, authenticity check, etc. How the object is transformed when exported For example encrypted, digitally signed, etc

20 Click Developing to edit a Master security title policy style Step Click 5 to edit Event Master definition, text styles monitoring and management Second Mastertextformat Identify level the events that bearbeiten need to be monitored Third Zweite For each level event, define the actions to be performed when an event happens, like Write an audit record Fifth Vierte level Send a message to a user Fünfte Change the TSF state Change security attributes of policy elements

21 Click Developing to edit a Master security title policy style Click Step 6 to TSF edit internals Master text styles Second Mastertextformat level bearbeiten architecture) Third Zweite level Separation Fourth Dritte Reference level mediation Availability requirements Fifth Vierte level Fünfte Privacy Identify objectives that require to addressed by TSF internals (TSF Information flow control requirements TSF internal integrity and consistency checks Automated rules for modifying security attributes and TSF state variables Some of those need to be supported by the rules defining the use of resources For example information flow control requirements and privacy requirements may need support from rules defining usage of objects and resources

22 Click Mapping to edit Master to CC part title 2style Basic Click to question: edit Master text styles Second Mastertextformat level bearbeiten of part 2? Third Zweite level Fourth Dritte paradigms level Fifth Vierte level Answer: Fünfte Once all this defined, can it mapped to the components Should be possible for the elements taken from the part 2 It is only partly possible Part 2 was not developed by putting the elements of the paradigm into context and consistently derive components from such a model

23 Click Attempted to edit Master mapping title style Step Click 1 to edit Element Master definition text styles Second Mastertextformat Element level definition bearbeiten Third Zweite level Fifth Vierte level Partly covered by FMT_MSA Fünfte Assumed to exist by part 2, no formal requirement to list element types and their security attributes Element creation and initialization Management of security attributes Partly covered by several components in the FMT family Not consistently addressed (too limited in the rules one can define)

24 Click Attempted to edit Master mapping title style Click Step 2 to edit User Master interaction text styles Second Mastertextformat Partly addressed level by bearbeiten FIA Third Zweite level Partly addressed by FTA Fifth Vierte Partly level addressed by FTP Fünfte View of authentication is too narrow Too much related to the classical terminal session Not sufficient to model all security attributes of channels and their management

25 Click Attempted to edit Master mapping title style Step Click 3 to edit Object Master and text resource stylesusage rules Second Mastertextformat Partly addressed level by bearbeiten FDP and FRU Third Zweite level Management aspects partly covered by FMT Fifth Vierte security level policies Fünfte FRU also contains requirements on TSF internals Many components are too restrictive to be applicable to many For example access control is restricted to access of subjects to objects, ignoring that there may be direct access of users usage of resources is similar to access to object and requires similar flexibility in the definition of the rules

26 Click Attempted to edit Master mapping title style Click Step 4 to edit Import Master and text export styles of objects Second Mastertextformat Can be level partly mapped bearbeiten to Third Zweite FDP_ETC level and FDP_ITC FDP_UCT and FDP_UIT FCO Fifth Vierte level Fünfte Also here more flexibility in the definition of the rules is required

27 Click Attempted to edit Master mapping title style Step Click 5 to edit Event Master definition, text styles monitoring and management Second Mastertextformat Partly covered level by FAU bearbeiten Third Zweite Some level requirements in FAU are related to the TSF internals Parts of FDP_SDI FDP_IFF.6 Fifth Vierte FIA_AFL level Fünfte Several components in the FPT family FRU_FLT Also here flexibility is missing and the aspect is not addressed consistently

28 Click Attempted to edit Master mapping title style Click Step 6 to edit TSF Master internals text styles Second Mastertextformat Mainly level addressed by bearbeiten FPT Third Zweite Parts of level FAU_STG FDP_ITT FDP_RIP Fifth Vierte level FDP_SDI Fünfte Parts of FPR Parts of FRU Many TSF internals need to be supported by usage rules and management functions!

29 Click to edit Conclusion Master title style We Click have to edit defined Master a framework text styles for the definition of Second security Mastertextformat level functional requirements bearbeiten based on the paradigms Third defined Zweite level in CC part 2 Fourth We Dritte have level identified that the structure of the components in part 2 do not follow a clear model Fifth Vierte level We have identified that many components from part 2 do Fünfte not present sufficient flexibility to model everything one can define with out framework Still most components of part 2 fit in our framework some re-arrangement would enhance the understanding of part

30 Click Suggested to edit Master future title work style Test Click the to edit framework Master text with styles different types of IT products Second and Mastertextformat enhance level it where bearbeiten necessary Third Arrange Zweite level the components of part 2 around the framework Fourth Change Drittelevel components where more flexibility is required Remove Fifth Vierte level redundant components Add Fünfte missing components

Common Criteria for Information Technology Security Evaluation. Part 2: Security functional components. September 2007. Version 3.

Common Criteria for Information Technology Security Evaluation. Part 2: Security functional components. September 2007. Version 3. Common Criteria for Information Technology Security Evaluation Part 2: Security functional components September 2007 Version 3.1 Revision 2 CCMB-2007-09-002 Foreword This version of the Common Criteria

More information

Common Criteria for Information Technology Security Evaluation. Part 2: Security functional requirements. August 2005. Version 2.

Common Criteria for Information Technology Security Evaluation. Part 2: Security functional requirements. August 2005. Version 2. Common Criteria for Information Technology Security Evaluation Part 2: Security functional requirements August 2005 Version 2.3 CCMB-2005-08-002 Foreword This version of the Common Criteria for Information

More information

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...

More information

COMMON CRITERIA PROTECTION PROFILE. for SECURE COMMUNICATION MODULE FOR WATER TRACKING SYSTEM (SCM-WTS PP)

COMMON CRITERIA PROTECTION PROFILE. for SECURE COMMUNICATION MODULE FOR WATER TRACKING SYSTEM (SCM-WTS PP) COMMON CRITERIA PROTECTION PROFILE for SECURE COMMUNICATION MODULE FOR WATER TRACKING SYSTEM (SCM-WTS PP) Revision No 1.1 Revision Date 11.07.2014 Document Code File Name SCM-WTS PROTECTION PROFILE Prepared

More information

Voice-over-IP Risk Analysis. erey@ernw.de

Voice-over-IP Risk Analysis. erey@ernw.de Voice-over-IP Risk Analysis Enno Rey CISSP/ISSAP CISA Enno Rey, CISSP/ISSAP, CISA erey@ernw.de Risk ISO/IEC GUIDE 73:2002 Combination of the probability of an event and its consequence where Probability

More information

COMMON CRITERIA PROTECTION PROFILE. for NEW GENERATION CASH REGISTER FISCAL APPLICATON SOFTWARE (NGCRFAS PP) TSE-CCCS/PP-002

COMMON CRITERIA PROTECTION PROFILE. for NEW GENERATION CASH REGISTER FISCAL APPLICATON SOFTWARE (NGCRFAS PP) TSE-CCCS/PP-002 COMMON CRITERIA PROTECTION PROFILE for NEW GENERATION CASH REGISTER FISCAL APPLICATON SOFTWARE (NGCRFAS PP) TSE-CCCS/PP-002 Revision No 1.7 Revision Date 28.08.2013 Document Code File Name NGCRFAS PROTECTION

More information

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 German Federal Office for Information Security PO Box 20 03 63 D-53133 Bonn Tel.:

More information

Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin

Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden magnus.ahlbin@combitech.se www.combitech.se

More information

Protection Profile for Wireless Local Area Network (WLAN) Access Systems

Protection Profile for Wireless Local Area Network (WLAN) Access Systems Protection Profile for Wireless Local Area Network (WLAN) Access Systems Information Assurance Directorate 01 December 2011 Version 1.0 Table of Contents 1 Introduction to the PP... 1 1.1 PP Overview of

More information

LUNA PCI CONFIGURED FOR USE IN LUNA SA 4.1 WITH BACKUP SECURITY TARGET

LUNA PCI CONFIGURED FOR USE IN LUNA SA 4.1 WITH BACKUP SECURITY TARGET LUNA PCI CONFIGURED FOR USE IN LUNA SA 4.1 WITH BACKUP SECURITY TARGET DOCUMENT NUMBER: AUTHOR: DEPARTMENT: LOCATION OF ISSUE: CR-2386 Terry Fletcher Engineering Ottawa DATE ORIGINATED: November 20, 2006

More information

Certification Report

Certification Report Certification Report EAL 2 Evaluation of Revenue Administration Department of Turkey/Gelir İdaresi Başkanlığı Common Criteria Protection Profile for New Generation Cash Register Fiscal Application Software-2

More information

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government

More information

General-Purpose Operating System Protection Profile

General-Purpose Operating System Protection Profile General-Purpose Operating System Protection Profile A joint effort by NIAP and BSI for the development of a Common Criteria Protection Profile Version 3.9 Part1: General Model, Security Problem Definition,

More information

Enterprise Security Architecture Concepts and Practice

Enterprise Security Architecture Concepts and Practice Enterprise Architecture Concepts and Practice Jim Whitmore whitmore@us.ibm.com Presentation to Open Group Oct 22, 2003 Enterprise Architecture Abstract In the early 90 s IBM Global Services created a Consultancy

More information

EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.

EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0. EMC Corporation Data Domain Operating System Version 5.2.1.0 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.11 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton,

More information

Operating System Protection Profile. Common Criteria Protection Profile BSI-CC-PP-0067 Version 2.0

Operating System Protection Profile. Common Criteria Protection Profile BSI-CC-PP-0067 Version 2.0 Common Criteria Protection Profile BSI-CC-PP-0067 Version 2.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 22899 9582-111 E-Mail: zertifizierung@bsi.bund.de

More information

Security Standards. 17.1 BS7799 and ISO17799

Security Standards. 17.1 BS7799 and ISO17799 17 Security Standards Over the past 10 years security standards have come a long way from the original Rainbow Book series that was created by the US Department of Defense and used to define an information

More information

Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP)

Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP) 1 2 3 4 Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP) Schutzprofil für die Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen 5

More information

Joint Interpretation Library

Joint Interpretation Library for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0

More information

SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING

SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING Document No. 1735-005-D0001 Version: 1.0, 3 June 2014 Prepared for: Fortinet, Incorporated 326 Moodie Drive Ottawa, Ontario Canada, K2H

More information

SECURITY TARGET: SQ-PHOENIX DIGITAL ENCRYPTOR

SECURITY TARGET: SQ-PHOENIX DIGITAL ENCRYPTOR SECURITY TARGET: SQ-PHOENI DIGITAL ENCRYPTOR VERSION 2.7 Prepared by and for: CES Communications Ltd Version 1.3 TABLE OF CONTENTS 1 Security Target Introduction... 1 1.1 ST and TOE Identification... 1

More information

EXTOL epassport Suite v2.5 Security Target v2.0. ECSB/MyCC/JL/002 Common Criteria EAL1 Certification

EXTOL epassport Suite v2.5 Security Target v2.0. ECSB/MyCC/JL/002 Common Criteria EAL1 Certification Doc Ref RD/JL/069 Replaces: N/A EXTOL epassport Suite v2.5 ECSB/MyCC/JL/002 Common Criteria EAL1 Certification Extol Corporation (M) Sdn Bhd (121135-U) (643683-U) Extol Group www.extolcorp.com Unit G1,

More information

Catalog of Security Tactics linked to Common Criteria Requirements

Catalog of Security Tactics linked to Common Criteria Requirements Catalog of Security Tactics linked to Common Criteria Requirements CHRISTOPHER PRESCHERN, Institute for Technical Informatics, Graz University of Technology Security tactics describe security design decisions

More information

Protection Profile Secure Signature-Creation Device Type 3

Protection Profile Secure Signature-Creation Device Type 3 Protection Profile Secure Signature-Creation Device Type 3 Version: 1.05, EAL 4+ Wednesday, 25 July 2001 Prepared By: ESIGN Workshop - Expert Group F Prepared For: CEN/ISSS Note: This Protection Profile

More information

IT SECURITY STANDARDS IN THE FIELD OF MILITARY KATONAI INFORMATIKAI RENDSZEREK BIZTONSÁGI SZABVÁNYAI. 1. Foreword. TAMÁS SZÁDECZKY MSc 1

IT SECURITY STANDARDS IN THE FIELD OF MILITARY KATONAI INFORMATIKAI RENDSZEREK BIZTONSÁGI SZABVÁNYAI. 1. Foreword. TAMÁS SZÁDECZKY MSc 1 TAMÁS SZÁDECZKY MSc 1 IT SECURITY STANDARDS IN THE FIELD OF MILITARY KATONAI INFORMATIKAI RENDSZEREK BIZTONSÁGI SZABVÁNYAI The work gives a global overview of the information technology s industrial civil

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report

More information

PROTECTION PROFILE DEVELOPMENT

PROTECTION PROFILE DEVELOPMENT PROTECTION PROFILE DEVELOPMENT FOR CARD ACCEPTANCE DEVICE (CAD) WITH BIOMETRIC Norahana Salimin norahana@cybersecurity.my ICCC 2013 Sept 10-12 Orlando Content PPWG Background Challenge Lesson Learn Sneak

More information

Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target

Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows,

More information

ARKOON FAST Firewall v3.0 SECURITY TARGET

ARKOON FAST Firewall v3.0 SECURITY TARGET Version Date October 28, 2004 Version 2.7p Ref. AKV3-CRT-EAL2-ST ARKOON FAST Firewall v3.0 SECURITY TARGET 20 Prepared for 40 ARKOON Network Security 13A avenue Victor HUGO F-69160 Tassin La Demi-Lune

More information

Green Hills Software INTEGRITY-178B Separation Kernel Security Target

Green Hills Software INTEGRITY-178B Separation Kernel Security Target Green Hills Software INTEGRITY-178B Separation Kernel Security Target Version 1.0 Prepared for: Green Hills Software, Inc. 34125 US Hwy 19 North Suite 100 Palm Harbor, FL 34684 USA Prepared By: Science

More information

Forefront Identity Manager (FIM) 2010

Forefront Identity Manager (FIM) 2010 Forefront Identity Manager (FIM) 2010 Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 24-MAR-2012 Document history Version Date Description 0.1 28-APR-11 Initial draft for review.

More information

IMPP. Identity Management Protection Profile BSI-PP-0024

IMPP. Identity Management Protection Profile BSI-PP-0024 Identity Management Protection Profile IMPP BSI-PP-0024 Version Number 1.17 Date: January 12, 2006 Status: Final Author: David Ochel Owner: Brian Matthiesen Note: This document will become a public document

More information

Active Directory Federation Services 2.0

Active Directory Federation Services 2.0 Active Directory Federation Services 2.0 Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 23-MAR-12 Document history Version Date Description 0.1 10-MAY-11 Initial draft for review.

More information

DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75

DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75 DataPower S40 ML Security Gateway and DataPower I50 Integration Appliance Version 3.6 Security Target Version 0.75 10/09/2008 Prepared for: IBM SOA Appliance Group One Rogers St Cambridge, MA 02142 Prepared

More information

Marimba Client and Server Management from BMC Software Release 6.0.3

Marimba Client and Server Management from BMC Software Release 6.0.3 Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...

More information

Certification Report

Certification Report Certification Report EAL 4+ (ALC_DVS.2) Evaluation of TÜBİTAK BİLGEM Protection Profile for Application Firmware of Secure Smartcard Reader for National Electronic Identity Verification System issued by

More information

IBM WebSphere Message Broker Security Target

IBM WebSphere Message Broker Security Target IBM WebSphere Message Broker Security Target Version 2.1.2 2007-08-22 Document History Version Date Summary Author 1.0 2006-10-23 Final EAL3 ST plus changes by IBM. SAIC / IBM 1.1 2006-12-11 Fixed inconsistencies.

More information

Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team

Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Author: Microsoft Corp. Version: 1.0 Last Saved: 2011-03-10 File Name: MS_UAG_ST_1.0.docx

More information

Security Target. Security Target SQL Server 2008 Team. Author: Roger French Version: 1.04 Date: 2011-09-26

Security Target. Security Target SQL Server 2008 Team. Author: Roger French Version: 1.04 Date: 2011-09-26 SQL Server 2008 Team Author: Roger French Version: 1.04 Date: 2011-09-26 Abstract This document is the (ST) for the Common Criteria certification of the database engine of Microsoft SQL Server 2008 R2.

More information

How To Manage Security In A Network Security System (Tsi)

How To Manage Security In A Network Security System (Tsi) SecureDoc Disk Encryption v4.3c Security Target for Common Criteria EAL-4 Abstract: This document represents Security Target Document for Secure Doc Disk Encryption product v4.3c. It specifies treats,

More information

isas Security Target Lite EWSE23EN90002.10

isas Security Target Lite EWSE23EN90002.10 isas Security Target Lite EWSE23EN90002.10 FREQUENTIS 2012 History Chart Rev. Date Changed Page(s) Cause of Change Implemented 1.0 2012-05-15 All sections Initial Version Döderlein No. Action Name Signature

More information

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0 EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305

More information

How To Protect Your Computer From Being Hacked

How To Protect Your Computer From Being Hacked Senforce Endpoint Security Suite Version 3.1.175 Security Target Version 1.0 06/19/07 Prepared for: Senforce Technologies, Inc. 147 W Election Rd Ste 110 Draper UT 84020 Prepared By: Science Applications

More information

GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.

GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0. GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented

More information

RSA, The Security Division of EMC envision platform v4.0 SP 1. Security Target

RSA, The Security Division of EMC envision platform v4.0 SP 1. Security Target RSA, The Security Division of EMC envision platform v4.0 SP 1 Security Target Evaluation Assurance Level: 3+ Document Version: 0.8 Prepared for: Prepared by: RSA, The Security Division of EMC 174 Middlesex

More information

U.S. DoD. Remote Access. Protection Profile. for. High Assurance Environments

U.S. DoD. Remote Access. Protection Profile. for. High Assurance Environments U.S. DoD Remote Access Protection Profile for High Assurance Environments Version 1.0 June 2000 Document Authors: G. Roger Black, National Security Agency (Team Leader) John M. Boone, Mitretek Systems

More information

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle

More information

Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target

Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Revision 1.0 August 2011 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms

More information

Mobile Billing System Security Target

Mobile Billing System Security Target Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing

More information

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction

More information

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target Version: Status: Last Update: 1.19 Released 2014-03-05 Trademarks

More information

Microsoft Windows Common Criteria Evaluation

Microsoft Windows Common Criteria Evaluation Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows Server 2012 Document Information Version Number 1.0 Updated On December 19, 2014 Microsoft 2014 Page 1 of 446 This is

More information

Common Criteria for Information Technology Security Evaluation Protection Profile. General-Purpose Operating System Protection Profile

Common Criteria for Information Technology Security Evaluation Protection Profile. General-Purpose Operating System Protection Profile Common Criteria for Information Technology Security Evaluation Protection Profile General-Purpose Operating System Protection Profile 09 09 2013 Table of contents Table of Contents 1 INTRODUCTION... 7

More information

Protection Profile for Single-level Operating Systems in Environments Requiring Medium Robustness

Protection Profile for Single-level Operating Systems in Environments Requiring Medium Robustness Protection Profile for Single-level Operating Systems in Environments Requiring Medium Robustness Version 1.22 Information Assurance Directorate National Security Agency 9800 Savage Road Fort George G.

More information

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2. Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to

More information

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN REF: 2010-22-INF-764 V1 Distribution: Expediente Date: 21.11.2011 Created: CERT3 Reviewed: CALIDAD Approbed: TECNICO CERTIFICATION REPORT FOR FOR HUAWEI INTEGRATED MANAGEMENT APPLICATION PLATFORM VERSION

More information

Cisco Unified Wireless Network and Wireless Intrusion Detection System: Security Target

Cisco Unified Wireless Network and Wireless Intrusion Detection System: Security Target Cisco Unified Wireless Network and Wireless Intrusion Detection System: Security Target This document provides the basis for an evaluation of a specific Target of Evaluation (TOE), the Cisco Aironet 1130,

More information

Writing a Protection Profile for a Security Service Package

Writing a Protection Profile for a Security Service Package Writing a Protection Profile for a Security Service Package Donald Marks, John Hale Center for Information Security University of Tulsa Donald-marks@utulsa.edu John-hale@utulsa.edu hale@utulsa.edu Disclaimer

More information

Red Hat Enterprise Linux Version 5.6 Security Target for CAPP Compliance on DELL 11 th Generation PowerEdge Servers

Red Hat Enterprise Linux Version 5.6 Security Target for CAPP Compliance on DELL 11 th Generation PowerEdge Servers Red Hat Enterprise Linux Version 5.6 Security Target for CAPP Compliance on DELL 11 th Generation PowerEdge Servers Version: 2.02.02.0 Last Update: 2012-08-21 atsec is a trademark of atsec GmbH Dell and

More information

IBM z/vm Version 6 Release 1 Security Target

IBM z/vm Version 6 Release 1 Security Target Version: Status: Last Update: Classification: 1.1 Released 2013-01-18 Public Trademarks The following terms are trademarks or registered trademarks of International Business Machines Corporation in the

More information

Exchange Server 2007 Common Criteria Evaluation

Exchange Server 2007 Common Criteria Evaluation Exchange Server 2007 Common Criteria Evaluation Security Target Exchange Server 2007 Team Author: Amy Blumenfield Version: 1.38 Date: 2009-09-28 File Name: MS_E12_ST_1.38.doc Abstract This document is

More information

JMCS Northern Light Video Conferencing System Security Target

JMCS Northern Light Video Conferencing System Security Target JMCS Northern Light Video Conferencing System Security Target Common Criteria: EAL2 Version 1.2 22 FEB 12 Document management Document identification Document ID Document title Product version NLVC_ST_EAL2

More information

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption! Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption Thisdocumentcontainsthenecessarystepstoencryptthecontentsofaharddrive usingbitlockerandwindows7. Thefollowinginstructionsarederivedfromdocumentationat:

More information

Cisco Catalyst Switches (3560-X and 3750-X) Security Target

Cisco Catalyst Switches (3560-X and 3750-X) Security Target Cisco Catalyst Switches (3560- and 3750-) Security Target Revision 1.0 6 June 2012 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms and Abbreviations...

More information

Security Requirement of Mobile Application Based Mobile Payment System

Security Requirement of Mobile Application Based Mobile Payment System Security Requirement of Mobile Application Based Mobile Payment System Hyun-Jung Lee and Dongho Won Information Security Group, School of Information and Communication Engineering, Sungkyunkwan University,

More information

Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012

Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012 Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa

More information

RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5. Security Target

RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5. Security Target RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5 Security Target Evaluation Assurance Level: EAL2 Augmented with ALC_FLR.1 Document Version: 0.7 Prepared for: Prepared by: RSA, The

More information

Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0

Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 ST Version 1.6 August 20, 2007 Document Version 1.6 Symantec Corporation Page 1 of 55 Prepared For: Prepared By: Symantec Corporation

More information

Protection Profile for Server Virtualization

Protection Profile for Server Virtualization Protection Profile for Server Virtualization 29 October 2014 Version 1.0 i 0 Preface 0.1 Objectives of Document This document presents the Common Criteria (CC) Protection Profile (PP) to express the fundamental

More information

Wikidata. Semantic Web in Libraries December 2014. A Free Collaborative Knowledge Base. Markus Krötzsch TU Dresden

Wikidata. Semantic Web in Libraries December 2014. A Free Collaborative Knowledge Base. Markus Krötzsch TU Dresden Technische Universität Dresden Fakultät Informatik Wikidata A Free Collaborative Knowledge Base Markus Krötzsch TU Dresden Semantic Web in Libraries December 2014 Where is Wikipedia Going? Wikipedia in

More information

Check Point Endpoint Security Media Encryption Security Target

Check Point Endpoint Security Media Encryption Security Target Check Point Endpoint Security Media Encryption Security Target Version 1.0 June 23, 2010 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared By: Science Applications International Corporation

More information

Extended Package for Mobile Device Management Agents

Extended Package for Mobile Device Management Agents Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes

More information

SafeBoot N.V. Security Target

SafeBoot N.V. Security Target SafeBoot N.V. SafeBoot Device Encryption TM for PC Version 5.0 Common Criteria Security Target Copyright 2006 Control Break Beheer N.V. All rights reserved. The information furnished herein is believed

More information

U.S. Government Protection Profile for Database Management Systems

U.S. Government Protection Profile for Database Management Systems U.S. Government Protection Profile for Database Management Systems Information Assurance Directorate Version 1.3 December 24, 2010 Protection Profile Title: 1 U.S. Government Protection Profile for Database

More information

Check Point Endpoint Security Full Disk Encryption Security Target

Check Point Endpoint Security Full Disk Encryption Security Target Check Point Endpoint Security Full Disk Encryption Security Target ST Version 2.4 June 22, 2009 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared by: Metatron Ltd. 66 Yosef St., Modiin, Israel

More information

Security in Windows 2000

Security in Windows 2000 Windows 2000 Security Target ST Version 2.0 18 October 2002 Prepared For: Microsoft Corporation Corporate Headquarters One Microsoft Way Redmond, WA 98052-6399 Prepared By: Science Applications International

More information

CERTIFICATION REPORT

CERTIFICATION REPORT REF: 2010-24-INF-831 v1 Target: Público Date: 07.03.2012 Created by: CERT3 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2010-24 Huawei BSC6900 Multimode Base Station Controller (MBSC)

More information

Security Target for Cisco Firewall Services Module (FWSM)

Security Target for Cisco Firewall Services Module (FWSM) Security Target for Cisco Firewall Services Module (FWSM) April 2007 This document includes the following sections: Security Target Introduction, page 1 TOE Description, page 3 TOE Security Environment,

More information

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center dshankar@us.ibm.com

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center dshankar@us.ibm.com Common Criteria Evaluation Challenges for SELinux Doc Shankar IBM Linux Technology Center dshankar@us.ibm.com Agenda Common Criteria Roadmap/Achievements CAPP/LSPP Overview EAL4 Overview Open Sourcing

More information

StoneGate Firewall/VPN

StoneGate Firewall/VPN Stonesoft Corporation StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 COMMON CRITERIA SECURITY TARGET VERSION 1.3 19 February 2010 Stonesoft Corporation Itälahdenkatu 22 A, FIN-0210 Helsinki, Finland

More information

Security Target. ST Version 1.1. August 26, 2014

Security Target. ST Version 1.1. August 26, 2014 Security Target Juniper Networks M, T, MX and PTX Routers and EX9200 Switches running Junos OS 13.3R1.8 and Juniper QFX and EX Switches Running Junos OS 13.2X50-D19 and Junos OS 13.2X51-D20 ST Version

More information

LINQUS USIM 128K Smartcard

LINQUS USIM 128K Smartcard LINQUS USIM 128K Smartcard ESIGN PKI Signature Application On GemXplore Generations G152B-EP3B OS platform, Running on Infineon SLE88CFX4002P/m8834b17 chip Ref T1004530 A3 / Version 1.0 Common Criteria

More information

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT REF: 2010-15-INF-681 v1 Difusión: Expediente Fecha: 05.07.2011 Creado: CERT2 Revisado: TECNICO Aprobado: JEFEAREA CERTIFICATION REPORT Expediente: 2010-15 Datos del solicitante: 440301192W HUAWEI References:

More information

Common Criteria Protection Profile for Inspection Systems (IS) BSI-CC-PP-0064. Version 1.01 (15 th April 2010)

Common Criteria Protection Profile for Inspection Systems (IS) BSI-CC-PP-0064. Version 1.01 (15 th April 2010) Common Criteria Protection Profile for BSI-CC-PP-0064 Version 1.01 (15 th April 2010) Federal Office for Information Security Postfach 20 03 63 53133 Bonn Phone: +49 228 99 9582-0 e-mail: zertifizierung@bsi.bund.de

More information

Blue Coat Systems, Inc. ProxySG v5.3.1.9 running on SG510, SG810, and SG8100. Security Target

Blue Coat Systems, Inc. ProxySG v5.3.1.9 running on SG510, SG810, and SG8100. Security Target Blue Coat Systems, Inc. ProxySG v5.3.1.9 running on SG510, SG810, and SG8100 Security Target Evaluation Assurance Level: EAL 2+ Document Version: 0.7 Prepared for: Prepared by: Blue Coat Systems, Inc.

More information

LogLogic v4.6.1 Open Log Management Platform Security Target. Release Date: 30 June 2009 Version: 2.0

LogLogic v4.6.1 Open Log Management Platform Security Target. Release Date: 30 June 2009 Version: 2.0 LogLogic v4.6.1 Open Log Management Platform Security Target Release Date: 30 June 2009 Version: 2.0 Prepared for: LogLogic Inc. 110 Rose Orchard Way, Suite 200 San Jose, CA 95134 Prepared by: Savvis Federal

More information

Security Target: Symantec Endpoint Protection Version 11.0

Security Target: Symantec Endpoint Protection Version 11.0 Security Target: Symantec Endpoint Protection Version 11.0 ST Version 1.6 June 2, 2008 Document Version 1.6 Symantec Corporation Page 1 of 68 Prepared For: Prepared By: Symantec Corporation 20330 Stevens

More information

Security Target Microsoft SQL Server Team

Security Target Microsoft SQL Server Team Security Target Microsoft SQL Server Team Author: Roger French Version: 1.27 Date 2008-07-23 File Name: MS_SQL_ST_1.27 Abstract This document is the Security Target (ST) for the Common Criteria evaluation

More information

Security Target for Cisco Remote Access VPN

Security Target for Cisco Remote Access VPN Security Target for Cisco Remote Access VPN Reference: ST 16 May 2007 Version 1.17 CISCO Systems Inc. 170 West Tasman Drive San Jose CA 95124-1706 USA Copyright: 2007 Cisco Systems, Inc. Table of Contents

More information

BSI-PP-0004-2002. for. Protection Profile Secure Signature-Creation Device Type 1, Version 1.05. developed by

BSI-PP-0004-2002. for. Protection Profile Secure Signature-Creation Device Type 1, Version 1.05. developed by BSI-PP-0004-2002 for Protection Profile Secure Signature-Creation Device Type 1, Version 1.05 developed by CEN/ISSS Information Society Standardization System, Workshop on Electronic Signatures - Bundesamt

More information

collaborative Protection Profile for Network Devices

collaborative Protection Profile for Network Devices collaborative Protection Profile for Network Devices Version 0.1 05-Sep-2014 Acknowledgements This collaborative Protection Profile (cpp) was developed by the Network international Technical Community

More information

HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target

HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target Version 1.0 February 12, 2014 Prepared for: Hewlett-Packard Long Down Avenue Stoke Gifford Bristol BS34 8QZ UK Prepared By: Leidos

More information

Security Target SQL Server 2012 Team

Security Target SQL Server 2012 Team Microsoft SQL Server 2012 Database Engine Common Criteria Evaluation (EAL2) Security Target SQL Server 2012 Team Author: Version: 1.2 Roger French (Microsoft Corporation) Date: 2012-08-07 Abstract This

More information

How To Evaluate A Security Target Of Evaluation (Toe)

How To Evaluate A Security Target Of Evaluation (Toe) Security Target McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 Document Version 1.1

More information

Top Layer Networks IPS 5500 E Security Target

Top Layer Networks IPS 5500 E Security Target Top Layer Networks IPS 5500 E Security Target Version 1.1 April 10, 2009 Prepared For: Top Layer Networks 2400 Computer Drive Westborough, MA 01581 Prepared By: CygnaCom Solutions Security Evaluations

More information

Security White Paper The Goverlan Solution

Security White Paper The Goverlan Solution Security White Paper The Goverlan Solution The Goverlan Administration Suite (which includes the following modules: Administration & Diagnostics, Remote Control, Scope Actions, and WMIX) is a powerful

More information

Criteria Requirements of Mobile Payment Application

Criteria Requirements of Mobile Payment Application 보안공학연구논문지 Journal of Security Engineering Vol.11, No.1 (2014), pp.79-88 http://dx.doi.org/10.14257/jse.2014.02.11 Criteria Requirements of Mobile Payment Application Hyun-Jung Lee 1), Jae-In Shin 2), Kab-Seung

More information

Huawei BSC6900 Multimode Base Station Controller Software Security Target

Huawei BSC6900 Multimode Base Station Controller Software Security Target Huawei BSC6900 Multimode Base Station Controller Software Security Version: 1.07 Last Update: 2011-12-20 Author: Huawei Technologies Co., Ltd. Page 1/ 58 Index 1 Introduction... 5 1.1 Security Reference...

More information

SenSage, Inc. SenSage 4.6.2. Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1.2

SenSage, Inc. SenSage 4.6.2. Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1.2 SenSage, Inc. SenSage 4.6.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 1.2 Prepared for: Prepared by: SenSage, Inc. 55 Hawthorne Street San Francisco, CA 94105 United States of

More information

Protection Profile for UK Dual-Interface Authentication Card

Protection Profile for UK Dual-Interface Authentication Card Protection Profile for UK Dual-Interface Authentication Card Version 1-0 10 th July 2009 Reference: UNKT-DO-0002 Introduction This document defines a Protection Profile to express security, evaluation

More information