Common Criteria Requirement of Data Leakage Protection System

Size: px
Start display at page:

Download "Common Criteria Requirement of Data Leakage Protection System"

Transcription

1 Common Criteria Requirement of Data Leakage Protection System 보안공학연구논문지 Journal of Security Engineering Vol.11, No.1 (2014), pp Hyun-Jung Lee 1), Seung-Eun Jeong 2), Jae-In Shin 3), Kab-Seung Kou 4) Abstract Recently, one of the big issues is secret information leakage from medium and large sized companies as personal information leakage and proprietary information leakage by internal employees are happened repeatedly. The companies which happened the security accident damage as falling stocks and sales, collective damages and these damages effect on management in the companies. Proprietary information leakage is occurred by using the connection such as Internet, or message service and direct information leakage is occurred by USB or CD. Various methods have been created to protect the proprietary information leakage and finally DLP which is one of the various methods are created. In this paper, we deduce Security functionality which DLP should have for protecting proprietary information leakage as using ISO Keywords : DLP, Data Leakage Protection, Data Loss Prevention, Protection Profile, Common Criteria 1. Introduction Recent reports show that the number of the cases of personal information stolen or lost is increasing and the scale of damage is growing. The IT Policy Compliance Group says 20% of companies suffer from more than 22 cases of information theft a year. According to the Forrester Research, one of the most famous market analysis companies, direct loss resulting from data leakage costs a non-financial company $15 per each client, which includes expenses for notifying clients, credit monitoring services, IT restoration, decline in sales because of past customers, and legal procedures and audit. In the case of financial companies, such as a credit card company, the expense loss amounts to $50 per each client [3 and 6]. Data of a company(e.g. financial Received(January 09, 2014), Review request(january 10, 2014), Review Result(1st: January 24, 2014, 2nd: February 08, 2014) Accepted(February 28, 2014) TA Team, Korea System Assurance, Munjeong-dong, Songpa-gu, Seoul, Korea hjlee@kosyas.com TA Team, Korea System Assurance, Munjeong-dong, Songpa-gu, Seoul, Korea seung1009@kosyas.com R&D Team, Korea System Assurance, Munjeong-dong, Songpa-gu, Seoul, Korea jaein@kosyas.com 4 (Corresponding Author) R&D Team, Korea System Assurance, Munjeong-dong, Songpa-gu, Seoul, Korea kabseung@kosyas.com * This research was funded by the MSIP(Ministry of Science, ICT & Future Planning), Korea in the ICT R&D Program 2013 ISSN: JSE 65 Copyright c 2013 SERSC

2 Common Criteria Requirement of Data Leakage Protection System document, client data, source code, IPR, etc.) is the company itself. Nevertheless, a few clicks on the mouse can result in the company data leakage, which will damage the company reputation for not observing the industry regulations and even impose a heavy fine on the company. The distinguished Datamonitor report says that more than 60% of respondents have leaked data in the previous year and 33% have answered this could lead to bankruptcy. In Korea, industrial spy crimes related to in-house information leakage increased from 5 cases in 2002 to 41 in 2010 and the scale of damage over the past 6 years approximately hits 133 trillion won. Now people care about the information leakage in the large enterprises more than ever. The prime reason for in-house information leakage is the lack of security awareness of users. It is not easy to control the users, which are fluent as anyone can assume. The best a company can do is to make sure it has a security system infrastructure for internal security. That is why more and more companies are using a DLP solution, which is a kind of document leakage protection solution, to encode documents and minimize damage in case of leakage. This solution monitors and controls possible channels of information leakage like an or messenger and traces information leakage due to an individual s intended illegal action. It can combine existing solutions and provide more extensive security processes in one step. Information Protection and Control report of the IDC in 2007 estimated that the size of DLP market all over the world would be at 3.2 billion dollars by A DLP solution has been first introduced in financial and insurance industries with a firm standard in handling clients information, which is understandable considering how it deals with a large amount of major client information. It is now being used in most banks and insurance companies in the U.S. As information is considered a key to a successful business, there are increasing interest and needs for a DLP in many other industries. For example, a manufacturing or high-tech company should protect its information to win the competition; a medical institution should protect the information of patients; and a government institution should protect the information of people and also the confidential information of national defense. Even though the need for a DLP system keeps increasing, there is no standard regarding the security functions required of a DLP system yet, which may lead to a company using a DLP system and still risking information leakage. This paper intends to derive necessary security functions of a DLP system based on the Common Criteria and suggest a baseline of a system that can prevent information leakage. The rest of this paper is organized as follows. In Section 2, we briefly describe the DLP system and protection profile according to common criteria. We review the existing DLP system protection profiles in Section 3. In Section 4, we propose a protection profile for DLP system. To do this, we present the target of evaluation (TOE) and describe security environment, security objectives and derive security requirements of the DLP systems. In Section 5, we analyze our protection profile. Finally, we summarize and conclude in Section Copyright c 2014 SERSC

3 보안공학연구논문지 Journal of Security Engineering Vol.11, No.1 (2014) 2. Related Works 2.1 CC(common Criteria) and Protection Profile CC(Common Criteria). The CC does so by providing a common set of requirements for the security functionality of IT products and for assurance measures applied to these IT products during a security evaluation[2]. This security evaluation includes the testing and an analysis of the IT products. The evaluation process establishes a level of confidence that the security functionality of these IT products and the assurance measures applied to these IT products meet these requirements[2]. The evaluation results may help consumers to determine whether these IT products fulfill their security needs[2]. Protection Profile. To allow consumer groups and communities of interest to express their security needs, and to facilitate writing STs, the CC provides a special construct called Protection Profile (PP). Whereas an ST always describes a specific TOE, a PP is intended to describe a TOE type (e.g. firewalls). The same PP may therefore be used as a template for many different STs to be used in different evaluations. A PP must contain a PP introduction, conformance claim, security problem definition, security objectives, extended components definition, and security requirements[1 and 2]. 2.2 Extended Components CC is international standard for information security system evaluation. And, that was approved on June, Recently, that was revised by 3.1 in v2.3. The fundamental of CC is categorizing universal set of security function requirement doing requisitely in all information security systems hierarchically. Also, is categorizing universal set of assurance requirement hierarchically for accuracy of embodiment about security function. Addition to contents of composed component evaluation by CC v3.1 revision. So, what is composed component? That is combined to this use complete to evaluate product IT substance more than two. Figure 2 is example of composed TOE, that consists of basis component provide service and dependant component that offer service[2]. 3. Definition of evaluation scope 3.1 DefinitionA Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use (e.g. endpoint actions), data in motion (e.g. network actions), and data at rest (e.g. data Copyright c 2014 SERSC 67

4 Common Criteria Requirement of Data Leakage Protection System storage) through deep content inspection, contextual security analysis of transaction (attributes of originator, data object, medium, timing, recipient/destination and so on) and with a centralized management framework. Systems are designed to detect and prevent unauthorized use and transmission of confidential. Thus the Key Defining Characteristics are Deep Content Analysis, Central Policy management and Broad Content Coverage across multiple platforms and locations [3 and 4]. 3.2 DLP Type Network DLP. Typically a software or hardware solution that is installed at network egress points near the perimeter. It analyzes network traffic to detect sensitive data that is being sent in violation of information security policies. The DLP Network product detects sensitive data while it is being transmitted across the network, and generates events and incidents reflecting policy violations. The targeted data is referred to as Data In Motion. DLP Network can automatically monitor or block identified transmissions, or quarantine messages that may need prior approval before leaving the network. In addition, encryption of s containing sensitive content can be performed by the operational environment when the TOE is configured to do so. Fig. 1 below shows a typical DLP Network deployment. [Fig. 1] Network DLP End-Point DLP. Such systems run on end-user workstations or servers in the organization. Like network-based systems, endpoint-based can address internal as well as external communications, and can therefore be used to control information flow between groups or types of users (e.g. 'Chinese walls'). They can also control and Instant Messaging communications before they are stored in the corporate archive, such that a blocked communication (i.e., one that was never sent, and therefore not subject to retention rules) will not be identified in a subsequent legal discovery situation. 68 Copyright c 2014 SERSC

5 보안공학연구논문지 Journal of Security Engineering Vol.11, No.1 (2014) [Fig. 2] End-Point DL Endpoint systems have the advantage that they can monitor and control access to physical devices (such as mobile devices with data storage capabilities) and in some cases can access information before it has been encrypted. Some endpoint-based systems can also provide application controls to block attempted transmissions of confidential information, and provide immediate feedback to the user. They have the disadvantage that they need to be installed on every workstation in the network, cannot be used on mobile devices (e.g., cell phones and PDAs) or where they cannot be practically installed (for example on a workstation in an internet café). Storage DLP. Typically a software solution that is installed in data centers to discover confidential data is stored in inappropriate and/or unsecured locations (e.g. open file share). 4. Proposed Data Leakage Protection System Protection Profile In this section, we describe the proposed DLP system and protection profile. 4.1 Overview of TOE The most ideal way of data leakage protection is to prevent a leakage from happening in the first place by understanding what needs to be protected, identifying every path or channel that could be used for stealing data, and monitoring them. Since one measure alone cannot block all paths, it seems to be the best way to combine different types of DLPs. This paper suggests an environment where End-Point DLP, Storage DLP, and Network DLP can be operated together and provide a protection profile(pp) to which all these types can conform. The structure of the TOE presented in this PP is as follows: Security Audit: The TOE generates, updates, and reviews the audit records related to the security-relevant events to ensure accountability. It detects potential security violation from audited events and takes actions as necessary. Copyright c 2014 SERSC 69

6 Common Criteria Requirement of Data Leakage Protection System User Data Protection: The TOE detects possible data leakage and, based on the policy set by an administrator, prevents it and records what happened Identification and Authentication: The TOE identifies and authenticates a user. It takes actions when authentication fails. TOE Access: The TOE provides the functionality to terminate an administrator session after a specified period of administrator inactivity in order to block an unauthorized access to the security management functions. Protection of the TSF: The TOE runs a suite of self-test to verify the integrity of the executable files, configuration data, and TSF executable codes stored in the TOE. It checks the status of connection between its components so that it can preserve a secure state of the TSF. The TOE may perform independently or rely on additional hardware, software, or firmware for operation. This PP can be applied to various types of products. In case an ST author conforms to this PP, he should identify all non-toe hardware, software, or firmware required by the TOE. 4.2 Security Problem Definition This section describes the security aspects of the environment in which the TOE will be used and the manner in which the TOE is expected to be employed. It provides the statement of the TOE security environment, which identifies and explains all: Known and presumed threats countered by either the TOE or by the security environment Organizational security policies with which the TOE must comply Assumptions about the secure usage of the TOE, including physical, personnel and connectivity aspects Threats. This subsection of the security problem definition shows the threats that are to be countered by the TOE. A threat consist of a threat agent, an asset and an adverse action of that threat agent on that asset[2]. The specification of threats should include all threats detected up to now, if it is not done the TOE may provide inadequate protection. In other words, if the specification of threats is insufficiency, the assets maybe exposed to an unacceptable level of risk. In the result, we derive the threats in table 1[4, 5, 6 and 7]. The threat agents are divided into two categories: Attackers who are not TOE users: They have public knowledge of how the TOE operates and are assumed to possess a low skill level, limited resources to alter TOE configuration settings or parameters and no physical access to the TOE. TOE users: They have extensive knowledge of how the TOE operates and are assumed to possess a high 70 Copyright c 2014 SERSC

7 보안공학연구논문지 Journal of Security Engineering Vol.11, No.1 (2014) skill level, moderate resources to alter TOE configuration settings or parameters and physical access to the TOE. (TOE users are, however, assumed not to be willfully hostile to the TOE.) Both are assumed to have a low level of motivation. The IT assets requiring protection are the user data saved on or transitioning through the TOE and the hosts on the protected network. [Table 1] Threats Name T.Spoofing T.Consecutive Authtication Attempt T.Storaed TSF Data T.TSF Data Transfer T.Recored Failure T.Reuse Attack T.Unauthorized Process T.User Data Leakage T.Failure (End-Poing DLP Only) T.Mnagement Failure T.Analysis Failure T.Unaythorized Action T.Unauth T.Compromise T.Application Execute Description A threat agent can access the TOE by disguising himself as an authorized user. A threat agent can attempt authentication consecutively and obtain the administrator s privilege. An unauthorized user may try accessing the TOE or attack the system in order to change or delete the TOE configuration or get access to the functionality or data of the TOE. The TSF data can be exposed or modified while it is being transferred between different components of the TOE or between the TOE and a remote administrator. A threat agent can cause an action that will exhaust the storage so that the TOE fails to record security-relevant events. A threat agent can reuse the authentication data of an authorized user to access the TOE. A threat agent can start an unauthorized process on a user s PC to steal the user data or stop the TOE. A threat agent can leak the user data without authorization. A threat agent can take advantage of the TOE_Agent when it is not capable of providing services because an attack caused failure. The TOE may fail to take care of a threat agent s inappropriate access to or action taken on the data that needs protection, which may result in the data modified or tampered with. The TOE may fail to detect a threat agent s inappropriate access to or action taken on the data that needs protection, which may result in the data modified or tampered with. A threat agent can access the data that needs to be protected and take unauthorized actions on it. A user can access the TOE and its data even when he is not authorized according to the security policy of the TOE. An unauthorized user can bypass the security mechanism to expose, eliminate, or destroy the integrity of the data collected or generated by the TOE. An attacker can start inappropriate software on the system or make inappropriate changes to the system without being caught. Organizational Security Policy. An Organizational Security Policy (OSP) is a set of security rules, procedures, or guidelines imposed by an organization on the operational environment of the TOE. The organizational security policies for this paper are described in [Table 2]. Copyright c 2014 SERSC 71

8 Common Criteria Requirement of Data Leakage Protection System [Table 2] Organizational Security Policy Name P.Audit P.Secure Management P.Statistics Description The TOE shall generate and maintain a record of security-related events to ensure accountability. Records shall be reviewed. The TOE shall provide its authorized administrator with a means to manage the TOE securely and keep the TSF data up to date. An authorized administrator shall be able to take statistics on the data of audit and intrusion detection. Assumptions. The assumptions are made on the operational environment in order to be able to provide security functionality. If the TOE is placed in an operational environment that does not meet these assumptions, the TOE may not be able to provide all of its security functionality anymore. Assumptions can be on physical, personnel and connectivity of the operational environment. [Table 3] Assumptions Name A.Dynamic Managment A.Physical Security A.Trusted Admin A.OS Reinforcement A.Access Description The TOE is managed in a way that it can deal with dynamic changes of the assets that need to be protected. The TOE locates in a secure environment that only an authorized administrator can access. (Except for End-point DLP Agent) An authorized administrator of the TOE has no malicious intention, is properly educated in terms of the management functions of the TOE, and follows the administrator s guidance. The TOE has a routine to remove unnecessary services or measures and to fix vulnerability of the OS(e.g. using patches) to ensure credibility and stability of the OS. The TOE can access all IT system data required to enforce its functionality. 4.3 Security Objectives Security objectives are concise, abstract statements of the intended solution to the problem defined by the security problem definition. The set of security objectives for a TOE form a high-level solution to the security problem. This high-level solution is divided into two part-wise solutions: the security objectives for the TOE, and the security objectives for the TOE s operational environment. This section identifies the security objectives for the TOE and its supporting environment. Security Objectives for the TOE. The TOE provides security functionality to solve a certain part of the problem defined by the security problem definition. This part wise solution is called the security objectives for the TOE and consists of a set of objectives that the TOE should achieve in order to solve its part of the problem[2]. 72 Copyright c 2014 SERSC

9 보안공학연구논문지 Journal of Security Engineering Vol.11, No.1 (2014) [Table 4] Security Objectives for the TOE Name O.Audit O.MNG O.Data Protection O.IA O.Security Access O.Data Collection O.Data Analysis O.Tagging O.Leakage Protection O.Audit Review O.Statistics O.Notice O.Leakage Management O.self Protection Description The TOE shall generate and maintain a record of security-related events to ensure accountability. It shall also provide a means to review the records. The TOE shall provide its authorized administrator with an efficient means to manage the TOE and keep the TSF data up to date. The TOE shall protect the TSF data stored in it from unauthorized exposure, modification, or deletion. The TOE shall uniquely identify a user and authenticate the user before allowing his access to the TOE. Only authorized administrator shall be allowed to access the security functionality, configuration, and data. The TOE shall collect from the managed system the program codes that can be allowed and objects that need to be protected. The TOE shall have an analysis process to decide whether to allow or deny access of an object. The TOE shall be able to identify the data categorized by data analysis. The TOE shall monitor itself to prevent leakage of assets. The TOE shall provide the authorized administrator with functionality to filter, review, and order the audit records. The TOE shall analyze and take statistics on all events according to the policy. The TOE shall raise an alarm according to the policy set for each event. The TOE shall enforce the policy and take actions on the files that hold confidential or secret information; and on the transfer of, user s action on, or access to the information. The TOE shall protect itself from unauthorized access or tampering to its functionality and data in order to maintain the integrity of the system data and audit records. Operational environment of the TOE. The operational environment of the TOE implements technical and procedural measures to assist the TOE in correctly providing its security functionality (which is defined by the security objectives for the TOE). This part wise solution is called the security objectives for the operational environment and consists of a set of statements describing the goals that the operational environment should achieve[2]. [Table 5] Operational environment of the TOE Name OE.Dynamic MNG OE.Physical Security OE.Trusted Admin OE.OS Reinforcement Description The TOE shall be managed in a way that it can deal with dynamic changes of the system that needs to be protected. The TOE shall be located in a secure environment that only an authorized administrator can access. An authorized administrator of the TOE shall have no malicious intention, be properly educated in terms of the management functions of the TOE, and follow the administrator s guidance. The TOE shall have a routine to remove unnecessary services or measures and to fix Copyright c 2014 SERSC 73

10 Common Criteria Requirement of Data Leakage Protection System OE.Timestamp OE.Access OE.Timestamp vulnerability of the OS(e.g. using patches) to ensure credibility and stability of the OS. The TOE shall record security-relevant events accurately using the reliable timestamp provided in the operational environment. The TOE shall be able to access all IT system data required to enforce its functionality. The IT environment shall provide the TOE with a reliable timestamp. 4.4 Extended Components Definition (ASE_ECD) This section specifies the extended SFRs for the TOE. The extended SFRs are organized by class. [Table 6] identifies all extended SFRs implemented by the TOE and a detailed description of each component is in [Table 7]. [Table 6] Extended TOE Security Functional Requirements Class Name Component Name Description Security Management EXT_FMT_STA.1 Data statistics of audit and leakage detection EXT_FDP_COL.1 Monitored data collection User Data Protection EXT_FDP_ANL.1 Monitored data analysis EXT_FDP_MON.1 Real-time monitoring of data leakage EXT_ FDP_PRV.1 Prevention of data leakage [Table 7] Datailed Description of Extended TOE SFR 74 Family Behavior Component description & structure Family Behavior Component description & structure EXT_FMT_STA.1 Data statistics of audit and leakage detection (FMT_STA, Statistics) This family provides the functionality to take statistics on the data generated as a result of audit and detection of leakage. EXT_FMT_STA.1 Data statistics of audit and leakage detection provides an authorized administrator with the capability to take statistics on the data. EXT_FMT_STA.1 Data statistics of audit and leakage detection Hierarchical to: No other components Dependencies: FAU_GEN.1 Audit data generation EXT_FDP_ANL.1 Monitored data analysis EXT_FDP_REV.1 Prevention of data leakage EXT_FMT_STA.1.1 The TSF shall provide [assignment: an authorized user] with the capability to take statistics on the data generated as a result of audit and detection of leakage. EXT_FDP_COL.1 Monitored data collection (EXT_FDP_COL, Collection) This family intends to collect the data for monitoring from the user data in the protected system. EXT_FDP_COL.1 Monitored data collection collects the data for monitoring from the protected system to prevent data leakage. EXT_FDP_COL.1 Monitored data collection Hierarchical to: No other components Dependencies: No dependencies Copyright c 2014 SERSC

11 보안공학연구논문지 Journal of Security Engineering Vol.11, No.1 (2014) Family Behavior Component description & structure Family Behavior Component description & structure Family Behavior Component description & structure EXT_FDP_COL.1.1 The TSF shall collect [assignment: list of data that needs to be collected] from the protected system according to [assignment: criteria of data collection] to prevent data leakage. EXT_FDP_COL.1.2 The data collected by the TSF shall include the following information: Date and time of the event [Assignment: additional attributes of the data for monitoring] EXT_FDP_ANL.1 Monitored data analysis (EXT_FDP_ANL, Analysis) This family intends to analyze and identify the data collected for monitoring. EXT_FDP_ANL.1 Monitored data analysis analyzes and identifies the collected data to prevent data leakage. EXT_FDP_ANL.1 Monitored data analysis Hierarchical to: No other components Dependencies: EXT_FDP_COL.1 Monitored data collection EXT_FDP_ANL.1.1 The TSF enforces the following analysis functionality based on the collected data. a) [Assignment: function to analyze the data] EXT_FDP_ANL.1.2 The TSF shall identify the data categorized by the analysis functionality. EXT_FDP_MON.1 Real-time monitoring of data leakage (EXT_FDP_MON, monitoring) This family intends to monitor if the identified data is being leaked in real time. EXT_FDP_MON.1 Real-time monitoring of data leakage monitors the data and possible way of leakage in real time to prevent data leakage. EXT_FDP_MON.1 Real-time monitoring of data leakage Hierarchical to: No other components Dependencies: No dependencies EXT_FDP_ANL.1.1 The TSF shall ensure that the function to enforce the policy is invoked and performed successfully before the data is leaked. EXT_FDP.PRV.1 Prevention of data leakage (EXT_FDP_PRV, Prevention) This family intends to detect and prevent data leakage. EXT_FDP_PRV.1 Prevention of data leakage prevents data leakage from the protected system according to the policy set by an authorized administrator. EXT_FDP_PRV.1 Prevention of data leakage Hierarchical to: No other components Dependencies: EXT_FDP_MON.1 Real-time monitoring of data leakage EXT_FDP_PRV.1.1 The TSF shall perform the following in case potential security violation or data leakage is detected. a) Notify the authorized administrator b) Take actions as directed by the management of security functions c) Collect detailed information regarding the events of security violation d) [Assignment: Take actions in case of security violation in the protected system] EXT_FDP_PRV.1.2 The TSF shall store the following information about the actions taken. a) Actions taken and the result [Assignment: Information regarding the security violation in the protected system] 4.5 Security Functional Requirements The Security functional requirements substantiate the security objectives. Each security functional requirement must be related to one or more security objectives. These requirements are defined in CC part 2, and protection profile author just chooses and uses appropriate requirements. In addition, if the requirements defined Copyright c 2014 SERSC 75

12 Common Criteria Requirement of Data Leakage Protection System in CC part 2 are not sufficient to demonstrate the security objectives, then, the protection profile author can refine and reinforce conditions in detail to established requirements. The security functional requirements for this paper are described in [Table 8]. [Table 8] The Security Functional Requireiments Security Functional Class Components FAU_ARP.1 Security alarms FAU_GEN.1 Audit data generation FAU_GEN.2 User identity association FAU_SAA.1 Potential violation analysis Security audit FAU_SAR.1 Audit review FAU_SAR.3 Selectable audit review FAU_SEL.1 Selective audit FAU_STG.1 Protected audit trail storage FAU_STG.3 Action in case of possible audit data loss FAU_STG.4 Prevention of audit data loss FDP_ACC.1 Subset access control FDP_ACF.1 Security attribute based access control FDP_IFC.1 Subset information flow control User Data Protection FDP_IFF.1 Simple security attributes EXT_FDP_COL.1 Monitored data collection EXT_FDP_ANL.1 Monitored data analysis EXT_FDP_MON.1 Real-time monitoring of data leakage EXT_FDP_PRV.1 Prevention of data leakage FIA_AFL.1 Authentication failure handling FIA_ATD.1 User attribute definition Identification and FIA_SOS.1 Verification of secrets authentication FIA_UAU.2 User authentication before any action FIA_UAU.7 Protected authentication feedback FIA_UID.2 User identification before any action FMT_MOF.1 Management of security functions behavior FMT_MSA.1 Management of security attributes Security Management FMT_SMF.1 Specification of management functions FMT_SMR.1 Security roles EXT_FMT_STA.1 Data statistics of audit and leakage detection Protection of the TSF FPT_STM.1 Reliable time stamps FPT_TST.1 TSF testing TOE Access FTA_SSL.3 TSF-initiated termination Our protection profile adopts EAL 4+ level in common criteria. Because DLP System is a critical information system and the result of attack can cause terrible confusion in society, we extend security assurance requirements to reinforce verification of implementation DLP system. Extended requirements are ADV_IMP.2, ATE_DPT.3, AVA_VAN Copyright c 2014 SERSC

13 보안공학연구논문지 Journal of Security Engineering Vol.11, No.1 (2014) 5. Conclusion Many companies are adopting a DLP system hoping that it can solve the desperate problem they are facing, risk of data leakage. This paper intends to suggest a baseline for introducing/evaluating a DLP system and eventually help protect data and prevent its theft or leakage. However, unlike the perimeter security, which is the essential aspect of IT security, data leakage protection is more about business than IT technologies because it deals with information assets, which is the most important thing to a company. That is, mere introduction of a DLP system does not prevent data leakage. For a complete prevention of data leakage, not only the IT team members but all company workers should aware their roles and responsibilities References [1] Seung-youn Lee and Myong-chul Shin, Protection Profile for Software Development Site, LNCS(2005) Vol. 3481, pp [2] ISO/IEC 15408, Common Criteria for Information Technology Security Evaluation Part 1, 2, 3, Version 3.1 R4, Cocmmon Criteria, September(2012). [3] Prathaben Kanagasinghan, Data Loss Prevention, SANS Institute InfoSec Reading Room, August(2008). [4] SANS Institute, Understanding and Selecting a Data Loss Prevention Solution, December(2007). [5] McAfee, Application Control v5.0, Change Control v5.0, and Integrity Monitor v5.0 with McAfee Agent v4.5 and epolicy Orchestrator v4.5, December 14(2010). [6] RSA, Data Loss Prevention Suite v6.5 Security Target Document Version 0.7, April(2009). [7] Aberdeen Group, The Cost-Based Business Case for DLP, June(2009). Copyright c 2014 SERSC 77

14 Common Criteria Requirement of Data Leakage Protection System Authors Hyun-Jung Lee Sungshin. Univ Sungkyunkwan. Uinv MA/PhD ABD Korea Internet & Security Agency, Researcher Financial Security Agency, Researcher Current Korea System Assurance, lnc. TA Team, Manager Research Interests : Cloud Security, Information Security, Security Evaluation Seung-Eun Jeong Sungshin Women s Univ.(B.Eng) ~ Current Korea System Assurance, lnc. TA Team, Evaluator Research Interests: Software Engineering, Security Evaluation. Jae-In Shin Hannam. Univ Hannam. Univ.(MS) ~ ICurrent Korea System Assurance, lnc. R&D Team, Researcher Research Interests: Software Engineering, Security Engineering, Security Evaluation, Risk Analysis, Wireless Security, Smart Phone Security Kab-Seung Kou Youngdong. Univ.(BS) Hannam. Univ.(MS) Hannam. Univ.(Ph.D) Infosec Technology Co. NRnD Team, Research Engineer ~ Current Korea System Assurance, lnc. R&D Team, Manager Research Interests: Software Engineering, Security Engineering, Security Evaluation, Risk Analysis, Wireless Security, Smart Phone Security 78 Copyright c 2014 SERSC

Criteria Requirements of Mobile Payment Application

Criteria Requirements of Mobile Payment Application 보안공학연구논문지 Journal of Security Engineering Vol.11, No.1 (2014), pp.79-88 http://dx.doi.org/10.14257/jse.2014.02.11 Criteria Requirements of Mobile Payment Application Hyun-Jung Lee 1), Jae-In Shin 2), Kab-Seung

More information

Firewall Protection Profile V2.0 2008. 4. 24

Firewall Protection Profile V2.0 2008. 4. 24 Firewall Protection Profile V2.0 2008. 4. 24 (This page left blank on purpose for double-side printing) Protection Profile Title Firewall Protection Profile for Government Evaluation Criteria Version This

More information

Security Requirement of Mobile Application Based Mobile Payment System

Security Requirement of Mobile Application Based Mobile Payment System Security Requirement of Mobile Application Based Mobile Payment System Hyun-Jung Lee and Dongho Won Information Security Group, School of Information and Communication Engineering, Sungkyunkwan University,

More information

Network Intrusion Prevention System Protection Profile V1.1

Network Intrusion Prevention System Protection Profile V1.1 Network Intrusion Prevention System Protection Profile V1.1 December 21, 2005 (This page left blank on purpose for double-side printing) Protection Profile Title Network Intrusion Prevention System Protection

More information

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN REF: 2010-12-INF-626 V1 Distribution: Public Date: 29.04.2011 Created: CERT3 Reviewed: TECNICO Approved: JEFEAREA CERTIFICATION REPORT FOR EADS GROUND SEGMENT SYSTEMS PROTECTION PROFILE (GSS-PP) ISSUE

More information

Firewall Protection Profile

Firewall Protection Profile samhällsskydd och beredskap 1 (38) ROS-ISÄK Ronny Janse 010-2404426 ronny.janse@msb.se Firewall Protection Profile samhällsskydd och beredskap 2 (38) Innehållsförteckning 1. Introduction... 4 1.1 PP reference...

More information

Security Target. Symantec TM Network Access Control Version 12.1.2. Document Version 0.12. February 14, 2013

Security Target. Symantec TM Network Access Control Version 12.1.2. Document Version 0.12. February 14, 2013 Security Target Symantec TM Network Access Control Version 12.1.2 Document Version 0.12 February 14, 2013 Document Version 0.12 Symantec Page 1 of 39 Prepared For: Prepared By: Symantec Corporation 350

More information

IMPP. Identity Management Protection Profile BSI-PP-0024

IMPP. Identity Management Protection Profile BSI-PP-0024 Identity Management Protection Profile IMPP BSI-PP-0024 Version Number 1.17 Date: January 12, 2006 Status: Final Author: David Ochel Owner: Brian Matthiesen Note: This document will become a public document

More information

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government

More information

RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5. Security Target

RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5. Security Target RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5 Security Target Evaluation Assurance Level: EAL2 Augmented with ALC_FLR.1 Document Version: 0.7 Prepared for: Prepared by: RSA, The

More information

SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING

SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING Document No. 1735-005-D0001 Version: 1.0, 3 June 2014 Prepared for: Fortinet, Incorporated 326 Moodie Drive Ottawa, Ontario Canada, K2H

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report

More information

Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012

Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012 Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa

More information

IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0

IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0 IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0 CipherTrust 4800 North Point Parkway Suite 400 Alpharetta, GA 30022 Phone: 678-969-9399

More information

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0 EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305

More information

Security Target. McAfee Enterprise Mobility Management 12.0. Document Version 1.16

Security Target. McAfee Enterprise Mobility Management 12.0. Document Version 1.16 Security Target McAfee Enterprise Mobility Management 12.0 Document Version 1.16 September 17, 2014 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 Primasec Ltd

More information

EAL4+ Security Target

EAL4+ Security Target EAL4+ Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 21-DEC-10 Document management Document identification Document ID Document title Release authority E14_EAL4_ASE Microsoft

More information

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...

More information

Natek Network Access Control (NAC)

Natek Network Access Control (NAC) Natek Network Access Control (NAC) V 5.4.2 Security Target Release Date: 28.08.2014 Version 1.13 AUTHOR: NATEK BİLİŞİM BİLGİSAYAR EĞİTİM DANIŞMANLIK YAZILIM TİCARET SANAYİ ANONİM ŞİRKETİ 1 Revision History

More information

Security Target. Astaro Security Gateway V8 Packet Filter Version 1.000. Assurance Level EAL4+ Common Criteria v3.1

Security Target. Astaro Security Gateway V8 Packet Filter Version 1.000. Assurance Level EAL4+ Common Criteria v3.1 Astaro Security Gateway V8 Packet Filter Version 1.000 Assurance Level EAL4+ Common Criteria v3.1 This Security Target also covers the secunet wall 2 packet filter Version : 1.03 Date: 2011-05-20 Author:

More information

RSA, The Security Division of EMC envision platform v4.0 SP 1. Security Target

RSA, The Security Division of EMC envision platform v4.0 SP 1. Security Target RSA, The Security Division of EMC envision platform v4.0 SP 1 Security Target Evaluation Assurance Level: 3+ Document Version: 0.8 Prepared for: Prepared by: RSA, The Security Division of EMC 174 Middlesex

More information

Mobile Billing System Security Target

Mobile Billing System Security Target Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing

More information

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN REF: 2010-22-INF-764 V1 Distribution: Expediente Date: 21.11.2011 Created: CERT3 Reviewed: CALIDAD Approbed: TECNICO CERTIFICATION REPORT FOR FOR HUAWEI INTEGRATED MANAGEMENT APPLICATION PLATFORM VERSION

More information

Marimba Client and Server Management from BMC Software Release 6.0.3

Marimba Client and Server Management from BMC Software Release 6.0.3 Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...

More information

DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75

DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75 DataPower S40 ML Security Gateway and DataPower I50 Integration Appliance Version 3.6 Security Target Version 0.75 10/09/2008 Prepared for: IBM SOA Appliance Group One Rogers St Cambridge, MA 02142 Prepared

More information

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle

More information

EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.

EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0. EMC Corporation Data Domain Operating System Version 5.2.1.0 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.11 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton,

More information

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 German Federal Office for Information Security PO Box 20 03 63 D-53133 Bonn Tel.:

More information

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction

More information

Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target

Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 0.7 Prepared for: Prepared by: Enterasys Networks, Inc. Corsec Security,

More information

Security Target. Symantec Data Loss Prevention 11.1.1. Document Version 1.0. January 23, 2012

Security Target. Symantec Data Loss Prevention 11.1.1. Document Version 1.0. January 23, 2012 Security Target Symantec Data Loss Prevention 11.1.1 Document Version 1.0 January 23, 2012 Document Version 1.0 Symantec Corporation Page 1 of 40 Prepared For: Prepared By: Symantec Corporation 350 Ellis

More information

Trustwave Secure Web Gateway Security Target

Trustwave Secure Web Gateway Security Target Trustwave Secure Web Gateway Security Target Version 1.5 September 18, 2013 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane

More information

TRUSTED SECURITY FILTER SECURITY TARGET

TRUSTED SECURITY FILTER SECURITY TARGET TRUSTED SECURITY FILTER SECURITY TARGET Edition: 4 29 Oct 07 Previous editions: Ed. 1 11 May 2006 Ed. 2 16 Aug 2006 Ed. 3 28 June 2007 Author: KKK Appr.: PÅT All pages in this document shall have the same

More information

Security Target. McAfee Data Loss Prevention Endpoint 9.4 and epolicy Orchestrator 5.1.3. Document Version 1.0

Security Target. McAfee Data Loss Prevention Endpoint 9.4 and epolicy Orchestrator 5.1.3. Document Version 1.0 Security Target McAfee Data Loss Prevention Endpoint 9.4 and epolicy Orchestrator 5.1.3 Document Version 1.0 November 24, 2015 Prepared For: Prepared By: Intel Corporation. 2821 Mission College Blvd. Santa

More information

Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target

Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows,

More information

Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team

Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Author: Microsoft Corp. Version: 1.0 Last Saved: 2011-03-10 File Name: MS_UAG_ST_1.0.docx

More information

How To Protect Your Computer From Being Hacked

How To Protect Your Computer From Being Hacked Senforce Endpoint Security Suite Version 3.1.175 Security Target Version 1.0 06/19/07 Prepared for: Senforce Technologies, Inc. 147 W Election Rd Ste 110 Draper UT 84020 Prepared By: Science Applications

More information

Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT

Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT Template: CSEC_mall_doc.dot, 7.0 Ärendetyp: 6 Diarienummer: 14FMV10188-21:1 Dokument ID CB-015 HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2015-06-12 Country of origin: Sweden Försvarets

More information

Check Point Endpoint Security Full Disk Encryption Security Target

Check Point Endpoint Security Full Disk Encryption Security Target Check Point Endpoint Security Full Disk Encryption Security Target ST Version 2.4 June 22, 2009 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared by: Metatron Ltd. 66 Yosef St., Modiin, Israel

More information

AppGate Security Server, Version 8.0.4. Security Target. Document Version: 2.9 Date: 2008-04-10

AppGate Security Server, Version 8.0.4. Security Target. Document Version: 2.9 Date: 2008-04-10 AppGate Security Server, Version 8.0.4 Security Target Document Version: 2.9 Date: 2008-04-10 Contents 1 INTRODUCTION...6 1.1 ST Identification...6 1.2 ST Overview...6 1.3 CC Conformance Claim...6 1.4

More information

McAfee Firewall Enterprise v7.0.1.02 Security Target

McAfee Firewall Enterprise v7.0.1.02 Security Target McAfee Firewall Enterprise v7.0.1.02 Security Target 8 Nov 2010 Version 1.3 Prepared By: Primasec Ltd For McAfee Inc 2340 Energy Park Drive St. Paul, MN 55108 USA McAfee Inc. Page 1 of 60 Contents 1 Introduction...

More information

Intrusion Detection System System Protection Profile

Intrusion Detection System System Protection Profile Intrusion Detection System System Protection Profile Prepared for National Security Agency 9800 Savage Road Fort Meade MD, 20755 Prepared by Science Applications International Corporation 7125 Gateway

More information

Security Target SQL Server 2012 Team

Security Target SQL Server 2012 Team Microsoft SQL Server 2012 Database Engine Common Criteria Evaluation (EAL2) Security Target SQL Server 2012 Team Author: Version: 1.2 Roger French (Microsoft Corporation) Date: 2012-08-07 Abstract This

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 Security Target

McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 Security Target v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 10 January 2012 Version 1.1 Prepared By: Primasec Ltd For McAfee Inc 2340 Energy Park Drive St. Paul, MN 55108 USA Contents 1 Introduction...

More information

Security Target: Symantec Endpoint Protection Version 11.0

Security Target: Symantec Endpoint Protection Version 11.0 Security Target: Symantec Endpoint Protection Version 11.0 ST Version 1.6 June 2, 2008 Document Version 1.6 Symantec Corporation Page 1 of 68 Prepared For: Prepared By: Symantec Corporation 20330 Stevens

More information

How To Understand The Toe

How To Understand The Toe Rapid7 Nexpose Vulnerability Management and Penetration Testing System V.5.1 Security Target Version 1.7 May 11, 2012 Prepared for: Rapid7 LLC 545 Boylston Street, Suite 400 Boston, MA 02116 Prepared By:

More information

Security Target for BorderWare Firewall Server 6.5

Security Target for BorderWare Firewall Server 6.5 Security Target for BorderWare Firewall Server 6.5 Reference: ST January 2002 Version : 2.4 North America: Europe: 50 Burnhamthorpe Rd. W. 1 The Harlequin Centre Suite 502 Southall Lane Mississauga Southall

More information

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1 Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller July 24, 2015 Version 1 1 Table of Contents 1 Introduction... 4 1.1 Conformance Claims...4 1.2 How to

More information

Low Assurance Protection Profile for a Software Based Personal Firewall for home Internet use

Low Assurance Protection Profile for a Software Based Personal Firewall for home Internet use TNO report PP-Software Based Personal Firewall-1.2 Low Assurance Protection Profile for a Software Based Personal Firewall for home Internet use Version 1.2 Date 6 th April 2005 Author(s) Rob Hunter Dirk-Jan

More information

How To Evaluate A Security Target Of Evaluation (Toe)

How To Evaluate A Security Target Of Evaluation (Toe) Security Target McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 Document Version 1.1

More information

Author: Roger French Version: 1.2 Date: 2009-01-23

Author: Roger French Version: 1.2 Date: 2009-01-23 Security Target SQL Server 2008 Team Author: Roger French Version: 1.2 Date: 2009-01-23 Abstract This document is the Security Target (ST) for the Common Criteria certification of the database engine of

More information

Secuware Virtual System (SVS)

Secuware Virtual System (SVS) Secuware Virtual System (SVS) SECURITY TARGET EAL2 Copyright 2008 by SECUWARE All rights reserved. The information in this document is exclusive property of SECUWARE and may not be changed without express

More information

SolarWinds Log and Event Manager Software Security Target

SolarWinds Log and Event Manager Software Security Target SolarWinds Log and Event Manager Software Security Target Version 1.5 August 25, 2014 SolarWinds Worldwide, LLC 3711 South MoPac Expressway Building Two Austin, Texas 78746 Copyright 2013 SolarWinds Worldwide,

More information

SenSage, Inc. SenSage 4.6.2. Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1.2

SenSage, Inc. SenSage 4.6.2. Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1.2 SenSage, Inc. SenSage 4.6.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 1.2 Prepared for: Prepared by: SenSage, Inc. 55 Hawthorne Street San Francisco, CA 94105 United States of

More information

Security Target. Securonix Security Intelligence Platform 4.0. Document Version 1.12. January 9, 2015

Security Target. Securonix Security Intelligence Platform 4.0. Document Version 1.12. January 9, 2015 Security Target Securonix Security Intelligence Platform 4.0 Document Version 1.12 January 9, 2015 Document Version 1.12 Copyright Securonix Page 1 of 41 Prepared For: Prepared By: Securonix 5777 W. Century

More information

Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target

Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Revision 1.0 August 2011 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms

More information

Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3)

Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3) Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3) Reference: ST January 2001 Version: 1.6 Europe: USA: CISCO Systems Ltd CISCO Systems Inc. 3 The Square 170 West Tasman Drive Stockley

More information

Symantec Security Information Manager Version 4.8.1

Symantec Security Information Manager Version 4.8.1 Security Target Symantec Security Information Manager Version 4.8.1 Document Version 1.7 January 30, 2014 Document Version 1.7 Copyright Symantec Corporation Page 1 of 42 Prepared For: Prepared By: Symantec

More information

BMC Real End User Experience Monitoring and Analytics 2.5. Security Target

BMC Real End User Experience Monitoring and Analytics 2.5. Security Target BMC Real End User Experience Monitoring and Analytics 2.5 Security Target Version 0.07 5 March 2015 Copyright 2015 BMC Software, Inc. All rights reserved. BMC, BMC Software, and the BMC Software logo

More information

Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0

Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 ST Version 1.6 August 20, 2007 Document Version 1.6 Symantec Corporation Page 1 of 55 Prepared For: Prepared By: Symantec Corporation

More information

Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target

Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target Evaluation Assurance Level: EAL2 augmented with ALC_FLR.2 Document Version: 1 Prepared for: Prepared by: Citrix

More information

Certification Report

Certification Report Certification Report EAL 3+ Evaluation of AccessData Cyber Intelligence and Response Technology v2.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria

More information

Top Layer Networks IPS 5500 E Security Target

Top Layer Networks IPS 5500 E Security Target Top Layer Networks IPS 5500 E Security Target Version 1.1 April 10, 2009 Prepared For: Top Layer Networks 2400 Computer Drive Westborough, MA 01581 Prepared By: CygnaCom Solutions Security Evaluations

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target

CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target Version 2.0 June Version 21, 2010 0.6 December 29, 2008 Prepared for: Prepared CA for: 100 Staples CA, Inc. Drive Framingham, 100

More information

Top Layer Networks. Security Target V2.3

Top Layer Networks. Security Target V2.3 Top Layer Networks IDS Balancer TM Version 2.2 Appliance (IDSB3531-CCV1.0, IDSB3532-CCV1.0, IDSB4508-CCV1.0) Security Target V2.3 August 31, 2004 AppBalancing, AppSafe, DCFD, Flow Mirror, SecureWatch,

More information

Security Target. McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5. Document Version 1.1. September 9, 2011

Security Target. McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5. Document Version 1.1. September 9, 2011 Security Target McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5 Document Version 1.1 September 9, 2011 Document Version 1.1 McAfee Page 1 of 61 Prepared For: Prepared By: McAfee, Inc. 2821

More information

COMMON CRITERIA PROTECTION PROFILE. for SECURE COMMUNICATION MODULE FOR WATER TRACKING SYSTEM (SCM-WTS PP)

COMMON CRITERIA PROTECTION PROFILE. for SECURE COMMUNICATION MODULE FOR WATER TRACKING SYSTEM (SCM-WTS PP) COMMON CRITERIA PROTECTION PROFILE for SECURE COMMUNICATION MODULE FOR WATER TRACKING SYSTEM (SCM-WTS PP) Revision No 1.1 Revision Date 11.07.2014 Document Code File Name SCM-WTS PROTECTION PROFILE Prepared

More information

Protection Profile for UK Dual-Interface Authentication Card

Protection Profile for UK Dual-Interface Authentication Card Protection Profile for UK Dual-Interface Authentication Card Version 1-0 10 th July 2009 Reference: UNKT-DO-0002 Introduction This document defines a Protection Profile to express security, evaluation

More information

GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.

GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0. GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

CERTIFICATION REPORT

CERTIFICATION REPORT REF: 2010-24-INF-831 v1 Target: Público Date: 07.03.2012 Created by: CERT3 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2010-24 Huawei BSC6900 Multimode Base Station Controller (MBSC)

More information

Multi-Functional Printer (Digital Copier) 7222/7322/7228/7235 Series Security Target Version 10

Multi-Functional Printer (Digital Copier) 7222/7322/7228/7235 Series Security Target Version 10 Multi-Functional Printer (Digital Copier) 7222/7322/7228/7235 Series Security Target Version 10 This document is a translation of the security target written in Japanese which has been evaluated and certified.

More information

Trustwave DbProtect Version 6.4.3 Security Target

Trustwave DbProtect Version 6.4.3 Security Target Trustwave DbProtect Version 6.4.3 Security Target Version 1.8 July 21, 2015 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane

More information

Protection Profile for Server Virtualization

Protection Profile for Server Virtualization Protection Profile for Server Virtualization 29 October 2014 Version 1.0 i 0 Preface 0.1 Objectives of Document This document presents the Common Criteria (CC) Protection Profile (PP) to express the fundamental

More information

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target Version: Status: Last Update: 1.19 Released 2014-03-05 Trademarks

More information

C015 Certification Report

C015 Certification Report C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please

More information

Extended Package for Mobile Device Management Agents

Extended Package for Mobile Device Management Agents Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes

More information

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued

More information

SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2

SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2 SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2 Document No. 1769-000-D0007 Version: v0.89, 12 September 2013 Prepared for: Centrify Corporation 785 N. Mary Avenue, Suite 200 Sunnyvale, California USA,

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

Common Criteria for Information Technology Security Evaluation. Part 2: Security functional components. September 2007. Version 3.

Common Criteria for Information Technology Security Evaluation. Part 2: Security functional components. September 2007. Version 3. Common Criteria for Information Technology Security Evaluation Part 2: Security functional components September 2007 Version 3.1 Revision 2 CCMB-2007-09-002 Foreword This version of the Common Criteria

More information

U.S. DoD. Remote Access. Protection Profile. for. High Assurance Environments

U.S. DoD. Remote Access. Protection Profile. for. High Assurance Environments U.S. DoD Remote Access Protection Profile for High Assurance Environments Version 1.0 June 2000 Document Authors: G. Roger Black, National Security Agency (Team Leader) John M. Boone, Mitretek Systems

More information

JMCS Northern Light Video Conferencing System Security Target

JMCS Northern Light Video Conferencing System Security Target JMCS Northern Light Video Conferencing System Security Target Common Criteria: EAL2 Version 1.2 22 FEB 12 Document management Document identification Document ID Document title Product version NLVC_ST_EAL2

More information

Commercial Database Management System Protection Profile (C.DBMS PP)

Commercial Database Management System Protection Profile (C.DBMS PP) Common Commercial Database Management System (C.DBMS PP) March 1998 Common Commercial Database Management System March 1998 Page ii Contents March 1998 1 Introduction... 1 1.1 Identification of... 1 1.2

More information

Common Criteria Evaluation for a Trusted Entrust/PKI

Common Criteria Evaluation for a Trusted Entrust/PKI Common Criteria Evaluation for a Trusted Entrust/PKI Author: Marc Laroche Date: March 2000 Version: 2.0 2000, Entrust, Inc. Entrust is a registered trademark of Entrust Technologies Inc. in the United

More information

BMC ProactiveNet Performance Management 9.5. Security Target

BMC ProactiveNet Performance Management 9.5. Security Target BMC ProactiveNet Performance Management 9.5 Security Target Version 0.4 18 July 2014 Copyright 2014 BMC Software, Inc. All rights reserved. BMC, BMC Software, and the BMC Software logo are the exclusive

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy: Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Protecting Regulated Information in Cloud Storage with DLP

Protecting Regulated Information in Cloud Storage with DLP Protecting Regulated Information in Cloud Storage with DLP Protection of Regulated Information in cloud storage can be provided by an appropriate Data Loss Prevention, DLP, solution. The steps involved

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Low Assurance Protection Profile for a VoIP Infrastructure

Low Assurance Protection Profile for a VoIP Infrastructure Low Assurance Protection Profile for a VoIP Infrastructure Version 1.1 Date Author(s) Dirk-Jan Out Certification ID Sponsor File name No of pages 12 TNO-ITSEF BV VoIP Low Assurance Protection Profile 1.1

More information

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT REF: 2010-15-INF-681 v1 Difusión: Expediente Fecha: 05.07.2011 Creado: CERT2 Revisado: TECNICO Aprobado: JEFEAREA CERTIFICATION REPORT Expediente: 2010-15 Datos del solicitante: 440301192W HUAWEI References:

More information

Security Target for Cisco Remote Access VPN

Security Target for Cisco Remote Access VPN Security Target for Cisco Remote Access VPN Reference: ST 16 May 2007 Version 1.17 CISCO Systems Inc. 170 West Tasman Drive San Jose CA 95124-1706 USA Copyright: 2007 Cisco Systems, Inc. Table of Contents

More information

U.S. Government Protection Profile for Database Management Systems

U.S. Government Protection Profile for Database Management Systems U.S. Government Protection Profile for Database Management Systems Information Assurance Directorate Version 1.3 December 24, 2010 Protection Profile Title: 1 U.S. Government Protection Profile for Database

More information