Security Target. Symantec Data Loss Prevention Document Version 1.0. January 23, 2012
|
|
|
- Deborah Jackson
- 10 years ago
- Views:
Transcription
1 Security Target Symantec Data Loss Prevention Document Version 1.0 January 23, 2012 Document Version 1.0 Symantec Corporation Page 1 of 40
2 Prepared For: Prepared By: Symantec Corporation 350 Ellis Street Mountain View, CA Apex Assurance Group, LLC 530 Lytton Avenue, Ste. 200 Palo Alto, CA Abstract This document provides the basis for an evaluation of a specific Target of Evaluation (TOE), the Data Loss Prevention Version This Security Target (ST) defines a set of assumptions about the aspects of the environment, a list of threats that the product intends to counter, a set of security objectives, a set of security requirements and the IT security functions provided by the TOE which meet the set of requirements. Document Version 1.0 Symantec Corporation Page 2 of 40
3 Table of Contents 1 Introduction ST Reference TOE Reference Document Organization Document Conventions Document Terminology TOE Overview Enforce Server Network Discover/Network Protect Network Monitor/Network Prevent Endpoint Discover/Endpoint Prevent/DLP Agent TOE Description Physical Boundary Hardware and Software Supplied by the IT Environment Logical Boundary TOE Guidance Documentation Conformance Claims Common Criteria Conformance Claim Protection Profile Conformance Claim Security Problem Definition Threats Organizational Security Policies Assumptions Security Objectives Security Objectives for the TOE Security Objectives for the Operational Environment Security Objectives Rationale Extended Components Definition Security Requirements Security Functional Requirements Security Audit (FAU) Information Flow Control (FDP) Identification and Authentication (FIA) Security Management (FMT) Security Assurance Requirements CC Component Hierarchies and Dependencies Security Requirements Rationale Security Functional Requirements for the TOE Security Assurance Requirements TOE Summary Specification Rationale TOE Summary Specification Document Version 1.0 Symantec Corporation Page 3 of 40
4 7.1 TOE Security Functions Security Audit Identification and Authentication Security Management Policy Enforcement List of Tables Table 1 ST Organization and Section Descriptions... 6 Table 2 Terms and Acronyms Used in Security Target... 8 Table 3 Evaluated Configuration for the TOE Table 4 Hardware and Software Requirements for the TOE and IT Environment Table 5 Logical Boundary Descriptions Table 6 Threats Addressed by the TOE Table 7 Organizational Security Policies Table 8 Assumptions Table 9 TOE Security Objectives Table 10 Operational Environment Security Objectives Table 11 Mapping of Assumptions, Threats, and OSPs to Security Objectives Table 12 Rationale for Mapping of Threats, Policies, and Assumptions to Objectives Table 13 TOE Functional Components Table 14 Audit Events and Details Table 15 Roles and Privileges Table 16 Security Assurance Requirements at EAL Table 17 TOE SFR Dependency Rationale Table 18 Mapping of TOE SFRs to Security Objectives Table 19 Rationale for Mapping of TOE SFRs to Objectives Table 20 Security Assurance Measures Table 21 SFR to TOE Security Functions Mapping Table 22 SFR to TSF Rationale Table 23 Typical TOE Roles and Permissions List of Figures Figure 1 TOE Boundary Document Version 1.0 Symantec Corporation Page 4 of 40
5 Document Version 1.0 Symantec Corporation Page 5 of 40
6 1 Introduction This section identifies the Security Target (ST), Target of Evaluation (TOE), Security Target organization, document conventions, and terminology. It also includes an overview of the evaluated product. 1.1 ST Reference ST Title Security Target: Symantec Data Loss Prevention Version ST Revision 1.0 ST Publication Date November 16, 2011 Author Apex Assurance Group 1.2 TOE Reference TOE Reference Symantec Data Loss Prevention Version Document Organization This Security Target follows the following format: SECTION TITLE DESCRIPTION 1 Introduction Provides an overview of the TOE and defines the hardware and software that make up the TOE as well as the physical and logical boundaries of the TOE 2 Conformance Claims Lists evaluation conformance to Common Criteria versions, Protection Profiles, or Packages where applicable 3 Security Problem Definition Specifies the threats, assumptions and organizational security policies that affect the TOE 4 Security Objectives Defines the security objectives for the TOE/operational environment and provides a rationale to demonstrate that the security objectives satisfy the threats 5 Extended Components Describes extended components of the evaluation (if any) Definition 6 Security Requirements Contains the functional and assurance requirements for this TOE 7 TOE Summary Specification Identifies the IT security functions provided by the TOE. Table 1 ST Organization and Section Descriptions Document Version 1.0 Symantec Corporation Page 6 of 40
7 1.4 Document Conventions The notation, formatting, and conventions used in this Security Target are consistent with those used in Version 3.1 of the Common Criteria. Selected presentation choices are discussed here to aid the Security Target reader. The Common Criteria allows several operations to be performed on functional requirements: The allowable operations defined in Part 2 of the Common Criteria are refinement, selection, assignment and iteration. The assignment operation is used to assign a specific value to an unspecified parameter, such as the length of a password. An assignment operation is indicated by showing the value in italics, i.e. assignment_value(s). The refinement operation is used to add detail to a requirement, and thus further restricts a requirement. Refinement of security requirements is denoted by bold text. Any text removed is indicated with a strikethrough format (Example: TSF). The selection operation is picking one or more items from a list in order to narrow the scope of a component element. Selections are denoted by underlined italicized text. Iterated functional and assurance requirements are given unique identifiers by appending to the base requirement identifier from the Common Criteria an iteration number inside parenthesis, for example, FIA_UAU.1.1 (1) and FIA_UAU.1.1 (2) refer to separate instances of the FIA_UAU.1 security functional requirement component. Italicized text is used for both official document titles and text meant to be emphasized more than plain text. 1.5 Document Terminology The following table describes the terms and acronyms used in this document: AES AIM CC CD CF CIFS CM CSV DCM DGM DLP DMZ DVD EAL TERM DEFINITION Advanced Encryption Standard AOL Instant Messenger Common Criteria Compact Disc Compact Flash Common Internet File System Configuration Management Comma-separated values Described Content Matching Directory Group Matching Data Loss Prevention Demilitarized Zone Digital Versatile Disk Evaluation Assurance Level Document Version 1.0 Symantec Corporation Page 7 of 40
8 TERM DEFINITION EDM Exact Data Matching Exec Executive FTP File Transfer Protocol GUI Graphical User Interface ID Identification IDM Indexed Document Matching ISM InfoSec Manager HRM Human Resources Manager HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secure IM Instant Message IP Internet Protocol ISM InfoSec Manager ISR InfoSec Responder IT Information Technology LAN Local Area Network LDAP Lightweight Directory Access Protocol MSN Microsoft Network MTA Mail Transfer Agent NNTP Network News Transfer Protocol OS Operating System PP Protection Profile SAR Security Assurance Requirement SCSI Small Computer System Interface SD Secure Digital SFR Security Functional Requirement SMTP Simple Mail Transfer Protocol SQL Structured Query Language SSL Secure Sockets Layer ST Security Target TCP Transmission Control Protocol TLS Transport Layer Security TOE Target of Evaluation TSF TOE Security Functionality TSP TOE Security Policy USB Universal Serial Bus URL Uniform Resource Locator VML Vector Machine Learning Table 2 Terms and Acronyms Used in Security Target 1.6 TOE Overview Symantec s Data Loss Prevention Suite enables organizations to safeguard customer data, company information, intellectual property, and other sensitive or classified information. DLP mitigates an Document Version 1.0 Symantec Corporation Page 8 of 40
9 organization s risk of data compromise by providing for the discovery, monitoring, and protection of confidential or sensitive information wherever it might exist within an organization s IT infrastructure. Sensitive data can include credit card numbers, names, addresses, identification numbers or any data a company deems proprietary. Symantec s DLP solution enables an organization to: Discover and locate confidential information on file and Web servers, databases, and endpoints Monitor network traffic for transmission of confidential data Monitor the use of sensitive data on managed computers Prevent transmission of confidential data to outside locations Enforce data security and encryption policies Protect confidential information through quarantine Using the Web-based central management console, sensitive data is identified and then secured regardless of its location or point of egress, be it the network, a removable storage device, endpoints (desktop and laptop systems), or other data repositories. DLP discovers exposed confidential data through a combination of deployed agents and scanning capabilities. DLP collects information via deployed DLP Agents and Servers. Once a violation is discovered, DLP takes action to protect the data as well as report on any violations that have occurred. In order to provide the broad spectrum of services provided by DLP while maintaining scalability, DLP has multiple components which can either run on a single server or can be deployed in a distributed manner to support higher performance. DLP includes the following components as described below Enforce Server The Enforce Server is the central management component of the Symantec DLP Suite. It provides a web-based GUI that serves as the management console for all Symantec DLP products. The Enforce Server administration console can be accessed from any workstation with a web browser that has access to the DLP Enforce Platform Server. Through the administration console, authorized administrators create data loss policies for automatically detecting and protecting sensitive data, perform incident workflow and remediation, generate reports, and configure role-based access and system management options. Additionally the Enforce Server enables administrators to automatically enforce an organization s data security policies by pushing policies out to all other DLP components Network Discover/Network Protect Network Discover scans networked file shares, Web content servers, databases, document repositories, and endpoint systems at high speeds to detect exposed data and documents. Network Discover enables companies to understand exactly where confidential data is exposed. Network Protect is an application that sits on the Network Discover Server and adds protection functionality to the Network Discover Server. Network Protect reduces risk by removing exposed confidential data, intellectual property, and classified information from open file shares on network servers or desktop computers. Document Version 1.0 Symantec Corporation Page 9 of 40
10 1.6.3 Network Monitor/Network Prevent Network Monitor accurately detects confidential information across configured network protocols and content types before it leaves the network. Real-time monitoring and reporting deliver constant visibility on data security. Network Monitor Servers gather network traffic from scanned ports or taps, and reports on private or proprietary data leaking as it moves across the network. This gathered data is then analyzed. The Enforce Server defines the policy groups, protocols, and protocol filters that control the Network Monitor Servers. The incidents that servers find are organized into reports, alerts, and actions on the Enforce Server. A network of Network Monitor Servers can be deployed on the company network to report on network activity and policy compliance. Network Monitor Servers can enforce a uniform set of policies or specialized policies based on the location and purpose of the server. Network Monitor gives organizations the ability to monitor all network communications, including: Instant messaging Web mail and Web postings File transfers Network news Peer-to-peer Telnet All other TCP sessions through any port. Network Prevent proactively stops data loss through and Web communications. Network Prevent integrates with existing message chain and Web infrastructure technologies to capture network communications and block those transmissions that contain confidential data. Network Prevent blocks , Web (HTTP/HTTPS), and FTP communications that contain confidential data Endpoint Discover/Endpoint Prevent/DLP Agent The Endpoint Server is comprised of Endpoint Discover and Endpoint Prevent. The Endpoint Server manages the DLP Agents which are installed on endpoint desktops and laptops. Endpoint Discover detects sensitive data on desktop or laptop endpoint computers. It consists of at least one Endpoint Server and at least one Symantec DLP Agent that runs on a managed device. The Agent collects the specified data and sends incidents back to the Endpoint Server for analysis. In addition, Endpoint Discover allows for the quarantine of confidential files to a secure location. Endpoint Prevent detects and prevents sensitive data from moving from a managed device with the DLP Agent installed on it also known as an endpoint computer. It consists of at least one Endpoint Server and all the Symantec DLP Agents running on the endpoint computers that are connected to it. Endpoint Prevent detects sensitive data on the following data transfers: Removable media devices IM HTTP/HTTPS Document Version 1.0 Symantec Corporation Page 10 of 40
11 /SMTP FTP CD/DVD Print/Fax Clipboard The Network or Endpoint Discover, Protect, Monitor, and Prevent Servers can be installed as standalone products or in combination. Regardless of which stand-alone products an authorized administrator deploys, the Enforce Server is always the central management component of the DLP Suite TOE Description The TOE is comprised of the DLP software only. Table 4 Hardware and Software Requirements for the TOE and IT Environment identifies any major non-toe hardware and software that is required by the TOE including the TOE minimum requirements. The TOE is a data loss prevention system, which provides for the detection and prevention of unauthorized use and transmission of confidential or sensitive information from secured IT resources. Once data has been identified as sensitive it is then secured, whether it is exiting the network, being copied to a removable storage device, or being stored on workstations or data repositories. A typical deployment includes at least one of each TOE components as described in Section 1.6. To support the understanding of Figure 1, the following list provides a brief description of each major component: The Enforce Server provides a centralized administration console that allows an authorized administrator to manage the entire TOE. The Endpoint Server is comprised of Endpoint Discover and Endpoint Prevent. The Endpoint Server manages the DLP Agents which are installed on endpoint desktops and laptops. The Network Discover/Network Protect Server scans and prevents security violations on network servers and endpoints that do not have the DLP Agents installed. The Network Discover/Network Protect Server is connected to the secured corporate LAN or target network. The Network Monitor/Network Prevent Server sits on the DMZ scanning network traffic and preventing sensitive data from leaving the target network Physical Boundary The TOE is a software TOE and is defined as the Data Loss Prevention Version In order to comply with the evaluated configuration, the following hardware and software components should be used: TOE COMPONENT VERSION/MODEL NUMBER TOE Software Data Loss Prevention Version 11.1 IT Environment Workstations meeting the requirements specified in Table 4 Hardware and Software Requirements for the TOE Table 3 Evaluated Configuration for the TOE Document Version 1.0 Symantec Corporation Page 11 of 40
12 The TOE boundary is shown below: Figure 1 TOE Boundary Note: TOE components are described in Section TOE Overview Hardware and Software Supplied by the IT Environment The TOE is a software-only TOE. The following table identifies the minimum hardware and software requirements for components provided by the IT Environment: Component Enforce Server and Enforce Server Admin Console Hardware Minimum Requirement 2x3.0 GHz or faster processor, 6-8 GB or more Random Access Memory, with at least 500 GB hard drive space Document Version 1.0 Symantec Corporation Page 12 of 40
13 Component Enforce Server and Enforce Server Admin Console Software Network Discover Hardware Network Monitor Hardware Network Prevent Hardware Network Protect Hardware Endpoint Discover Hardware Endpoint Prevent Hardware Network Discover Software Network Monitor Software Network Prevent Software Network Protect Software Endpoint Discover Software Endpoint Prevent Software Endpoint / DLP Agent Hardware Minimum Requirement Microsoft Windows Server 2003, Enterprise Edition (32-bit) with Service Pack 2 or later Microsoft Windows Server 2008 R2, Enterprise Edition (64-bit) or later Red Hat Enterprise Linux 5 (32-bit or 64-bit) Update 2 or later 2x3.0 GHz or faster processor, 6-8 GB or more Random Access Memory, with at least 140 GB hard drive space Microsoft Windows Server 2003, Enterprise Edition (32-bit) with Service Pack 2 or later Microsoft Windows Server 2008 R2, Enterprise Edition (64-bit) or later Red Hat Enterprise Linux 5 (32-bit or 64-bit) Update 2 or later General Purpose Computing Platform Endpoint / DLP Agent Software Microsoft Windows Server 2003 (32-bit) with Service Pack 2 or Windows Server 2003 R2 (32-bit) Microsoft Windows XP Professional with Service Pack 3 (32-bit) Microsoft Windows Vista Enterprise or Business with Service Pack 1 or Service Pack 2 (32-bit) Microsoft Windows 7 Enterprise, Professional, or Ultimate (32- bit or 64-bit) Other software WinPcap or higher Java Runtime Environment (JRE) All servers 1.6.0_14 or higher Apache Tomcat version or higher Oracle Database 11g version 11.2 (32-bit or 64-bit) or Oracle 10g database version (32-bit only) with the most recent Critical Patch Update. Microsoft Internet Explorer 7.x or 8.x Mozilla Firefox 3.x Table 4 Hardware and Software Requirements for the TOE and IT Environment Logical Boundary This section outlines the boundaries of the security functionality of the TOE; the logical boundary of the TOE includes the security functionality described in the following sections. TSF Security Audit Identification and Authentication DESCRIPTION The TOE generates audit records for the actions of the DLP Components. The security relevant Administrator actions within the DLP Admin Console are audited. The TOE provides functionality to allow administrators to verify their claimed identity. The Identification and Authentication TSF ensures that only Document Version 1.0 Symantec Corporation Page 13 of 40
14 TSF Security Management Policy Enforcement Table 5 Logical Boundary Descriptions TOE Guidance Documentation DESCRIPTION legitimate administrators can gain access to the configuration settings and management settings of the TOE. Administrators must log in with a valid user name and password before the server will permit the administrators to manage the TOE. The TOE provides a set of commands for administrators to manage the security functions, configuration, and other features of the DLP Server components. The Security Management function specifies user roles with defined access for the management of the TOE components. The TOE scans endpoint computers to find the information that an authorized administrator has defined as sensitive. The TOE prevents sensitive data from moving off of an endpoint computer. The TOE reports an incident when it detects data that matches the detection parameters of a policy rule. The following guidance documentation is provided as part of the TOE: Symantec Data Loss Prevention System Requirements and Compatibility Guide Symantec Data Loss Prevention Install Guide Symantec Data Loss Prevention Administration Guide Document Version 1.0 Symantec Corporation Page 14 of 40
15 2 Conformance Claims 2.1 Common Criteria Conformance Claim The TOE is Common Criteria Version 3.1 Revision 3 (July 2009) Part 2 conformant and Part 3 conformant at Evaluation Assurance Level 2 augmented with ALC_FLR.2 Flaw Reporting. 2.2 Protection Profile Conformance Claim The TOE does not claim conformance to a Protection Profile. Document Version 1.0 Symantec Corporation Page 15 of 40
16 3 Security Problem Definition In order to clarify the nature of the security problem that the TOE is intended to solve, this section describes the following: Any known or assumed threats to the assets against which specific protection within the TOE or its environment is required. Any organizational security policy statements or rules with which the TOE must comply. Any assumptions about the security aspects of the environment and/or of the manner in which the TOE is intended to be used. This chapter identifies assumptions as A.assumption, threats as T.threat and policies as P.policy. 3.1 Threats The following are threats identified for the TOE and the IT System the TOE monitors. The TOE itself has threats and the TOE is also responsible for addressing threats to the environment in which it resides. The assumed level of expertise of the attacker for all the threats is unsophisticated. The TOE addresses the following threats: THREAT T.COMDIS T.COMINT T.IMPCON T.LOSSOF T.NOHALT T.PRIVIL DESCRIPTION An unauthorized user may attempt to disclose the data collected and produced by the TOE by bypassing a security mechanism. An unauthorized user may attempt to compromise the integrity of the data collected and produced by the TOE by bypassing a security mechanism. An unauthorized user may inappropriately change the configuration of the TOE causing potential intrusions to go undetected. An unauthorized user may attempt to remove or destroy data collected and produced by the TOE. An unauthorized user may attempt to compromise the continuity of the System s collection and analysis functions by halting execution of the TOE. An unauthorized user may gain access to the TOE and exploit system privileges to gain access to TOE security functions and data Table 6 Threats Addressed by the TOE 3.2 Organizational Security Policies An organizational security policy is a set of rules, practices, and procedures imposed by an organization to address its security needs. The following Organizational Security Policies apply to the TOE: POLICY DESCRIPTION Document Version 1.0 Symantec Corporation Page 16 of 40
17 POLICY P.ACCACT P.ACCESS P.INTEGRITY P.MANAGE P.PROTCT P.SENSITIVE_DATA Table 7 Organizational Security Policies DESCRIPTION Users of the TOE shall be accountable for their actions within the TOE. All data collected and produced by the TOE shall only be used for authorized purposes. Data collected and produced by the TOE shall be protected from modification. The TOE shall only be managed by authorized users. The TOE shall be protected from unauthorized accesses and disruptions of TOE data and functions. The TOE shall enforce security policies on transmission of sensitive files or data. 3.3 Assumptions This section describes the security aspects of the environment in which the TOE is intended to be used. The TOE is assured to provide effective security measures in a co-operative non-hostile environment only if it is installed, managed, and used correctly. The following specific conditions are assumed to exist in an environment where the TOE is employed. ASSUMPTION A.ACCESS A.ASCOPE A.DATABASE A.DYNMIC A.LOCATE A.MANAGE A.NOEVIL A.PROTCT Table 8 Assumptions DESCRIPTION The TOE has access to all the IT resources it needs to perform its functions. The TOE is appropriately scalable to the IT Systems the TOE monitors. Access to the database used by the TOE via mechanisms outside the TOE boundary is restricted to use by authorized users. The TOE will be managed in a manner that allows it to appropriately address changes in the IT System the TOE monitors. The processing resources of the TOE will be located within controlled access facilities, which will prevent unauthorized physical access. There will be one or more competent individuals assigned to manage the TOE and the security of the information it contains. The authorized administrators are not careless, willfully negligent, or hostile, and will follow and abide by the instructions provided by the TOE documentation. The TOE hardware and software critical to security policy enforcement will be protected from unauthorized physical modification. Document Version 1.0 Symantec Corporation Page 17 of 40
18 4 Security Objectives 4.1 Security Objectives for the TOE The IT security objectives for the TOE are addressed below: OBJECTIVE O.ACCESS O.AUDITS O.EADMIN O.IDENTIFY O.INTEGRITY O.SENSITIVE_DATA Table 9 TOE Security Objectives DESCRIPTION The TOE must allow authorized users to access only authorized TOE functions and data. The TOE must record audit records for data accesses and use of the TOE functions on the management system. The TOE must include a set of functions that allow effective management of its functions and data. The TOE must be able to identify users prior to allowing access to TOE functions and data on the management system. The TOE must ensure the integrity of all TOE data. The TOE shall take specified actions upon transmission of identified sensitive files or data. 4.2 Security Objectives for the Operational Environment The security objectives for the operational environment are addressed below: OBJECTIVE OE.PHYCAL OE.CREDEN OE.INSTALL OE.INTEROP OE.PERSON OE.AUDIT_PROTECT OE.AUDIT_REVIEW OE.CRYPTO OE.DATABASE DESCRIPTION Those responsible for the TOE must ensure that those parts of the TOE critical to security policy are protected from any physical attack. Those responsible for the TOE must ensure that all access credentials are protected by the users in a manner which is consistent with IT security. Those responsible for the TOE must ensure that the TOE is delivered, installed, managed, and operated in a manner which is consistent with IT security. The TOE is interoperable with the managed systems it monitors Personnel working as authorized administrators shall be carefully selected and trained for proper operation of the System. The IT Environment will provide the capability to protect audit information generated by the TOE via mechanisms outside the TSC. The IT Environment will provide the capability for authorized administrators to review audit information generated by the TOE. The IT Environment will provide the cryptographic functionality and protocols required for the TOE to securely transfer information between distributed portions of the TOE. Those responsible for the TOE must ensure that access to the database via mechanisms outside the TOE boundary (e.g., DBMS) is restricted to authorized users only. Document Version 1.0 Symantec Corporation Page 18 of 40
19 O.EADMIN O.ACCESS O.IDENTIFY O.INTEGRITY OE.INSTALL OE.PHYCAL OE.CREDEN OE.PERSON OE.INTEROP O.AUDITS O.SENSITIVE_DATA OE.TIME OE.PROTECT OE.SD_PROTECTION OE.DATABASE OE.AUDIT_PROTECT OE.AUDIT_REVIEW OE.CRYPTO OE.STORAGE Security Target: Symantec Data Loss Prevention Version OBJECTIVE DESCRIPTION OE.PROTECT The IT environment will protect itself and the TOE from external interference or tampering. OE.SD_PROTECTION The IT Environment will provide the capability to protect TOE data via mechanisms outside the TSC. OE.STORAGE The IT Environment will store TOE data in the database and retrieve it when directed by the TOE. OE.TIME The IT Environment will provide reliable timestamps to the TOE Table 10 Operational Environment Security Objectives 4.3 Security Objectives Rationale This section provides the summary that all security objectives are traced back to aspects of the addressed assumptions, threats, and Organizational Security Policies (if applicable). The following table provides a high level mapping of coverage for each threat, assumption, and policy: OBJECTIVE THREAT / ASSUMPTION A.ACCESS A.ASCOPE A.DATABASE A.DYNMIC A.LOCATE A.MANAGE A.NOEVIL A.PROTCT P.ACCACT P.ACCESS P.INTEGRITY P.MANAGE P.PROTCT T.COMDIS T.COMINT T.IMPCON T.LOSSOF T.NOHALT T.PRIVIL P.SENSITIVE_ DATA Table 11 Mapping of Assumptions, Threats, and OSPs to Security Objectives The following table provides detailed evidence of coverage for each threat, policy, and assumption: Document Version 1.0 Symantec Corporation Page 19 of 40
20 THREATS, POLICIES, AND ASSUMPTIONS A.ACCESS A.ASCOPE A.DATABASE A.DYNMIC A.LOCATE A.MANAGE A.NOEVIL A.PROTCT P.ACCACT RATIONALE The TOE has access to all the IT resoiurces it needs to perform its functions. The OE.INTEROP objective ensures the TOE has the needed access. The TOE is appropriately scalable to the IT System the TOE monitors. The OE.INTEROP objective ensures the TOE has the necessary interactions with the IT System it monitors. Access to the database used by the TOE via mechanisms outside the TOE boundary is restricted to use by authorized users. The OE.DATABASE objective ensures that access to any mechanisms outside the TOE boundary that may be used to access the database is configured by the administrators such that only authorized users may utilize the mechanisms. The TOE will be managed in a manner that allows it to appropriately address changes in the IT System the TOE monitors. The OE.INTEROP objective ensures the TOE has the proper access to the IT System. The OE.PERSON objective ensures that the TOE will managed appropriately. The processing resources of the TOE will be located within controlled access facilities, which will prevent unauthorized physical access. The OE.PHYCAL provides for the physical protection of the TOE. There will be one or more competent individuals assigned to manage the TOE and the security of the information it contains. The OE.PERSON objective ensures all authorized administrators are qualified and trained to manage the TOE. The authorized administrators are not careless, willfully negligent, or hostile, and will follow and abide by the instructions provided by the TOE documentation. The OE.INSTALL objective ensures that the TOE is properly installed and operated and the OE.PHYCAL objective provides for physical protection of the TOE by authorized administrators. The OE.CREDEN objective supports this assumption by requiring protection of all authentication data. The TOE hardware and software critical to security policy enforcement will be protected from unauthorized physical modification. The OE.PHYCAL provides for the physical protection of the hardware and software. Users of the TOE shall be accountable for their actions within the TOE. The O.AUDITS objective implements this policy by requiring auditing of all data accesses and use of TOE functions. The O.IDENTIFY objective supports this objective by ensuring each user is uniquely identified. The OE.AUDIT_REVIEW objective provides the ability for administrators to review the audit records generated by the TOE so that accountability for administrator actions can be determined. Document Version 1.0 Symantec Corporation Page 20 of 40
21 THREATS, POLICIES, AND ASSUMPTIONS P.ACCESS P.INTEGRITY P.MANAGE P.PROTCT T.COMDIS RATIONALE All data collected and produced by the TOE shall only be used for authorized purposes. The O.IDENTIFY objective provides for identification of users prior to any TOE function accesses via the web interface. The O.ACCESS objective builds upon the O.IDENTIFY objective by only permitting authorized users to access TOE functions. The OE.SD_PROTECTION and OE.DATABASE objectives support this policy for mechanisms outside the TSC via IT Environment protections of the TOE data. The OE.SD_PROTECTION and O.ACCESS objectives support this policy for mechanisms inside the TSC via TOE protections of the TOE data. Data collected and produced by the TOE shall be protected from modification. The O.INTEGRITY objective ensures the protection of TOE data from modification. The OE.AUDIT_PROTECT objective ensures the integrity of audit records in the database generated by the TOE using access mechanisms outside the TSC respectively. The OE.CRYPTO objective requires the IT Environment to provide cryptographic functionality and protocols that can be used by the TOE to protect the data during transit. The OE.STORAGE objective requires the IT Environment to provide storage and retrieval mechanisms for TOE data for use by the TOE. The OE.TIME objective supports this policy by providing a time stamp for insertion into the TOE data records. The TOE shall only be managed by authorized users. The OE.PERSON objective ensures competent administrators will manage the TOE and the O.EADMIN objective ensures there is a set of functions for administrators to use. The OE.INSTALL objective supports the OE.PERSON objective by ensuring administrator follow all provided documentation and maintain the security policy. The O.IDENTIFY objective provides for identification of users prior to any TOE function accesses. The O.ACCESS objective builds upon the O.IDENTIFY objective by only permitting authorized users to access TOE functions. The OE.CREDEN objective requires administrators to protect all authentication data. The TOE shall be protected from unauthorized accesses and disruptions of TOE data and functions. The OE.PHYCAL objective protects the TOE from unauthorized physical modifications. The OE.PROTECT objective supports the TOE protection from the IT Environment. The OE.CRYPTO objective requires the IT Environment to provide cryptographic functionality and protocols that can be used by the TOE to protect the data during transit. The OE.STORAGE objective requires the IT Environment to provide storage and retrieval mechanisms for TOE data for use by the TOE. An unauthorized user may attempt to disclose the data collected and produced by the TOE by bypassing a security mechanism. The O.IDENTIFY objective provides for identification of users prior to any TOE data access. The O.ACCESS objective builds upon the O.IDENTIFY objective by only permitting authorized users to access TOE data. The OE.PROTECT objective supports the TOE protection from the IT Environment. Document Version 1.0 Symantec Corporation Page 21 of 40
22 THREATS, POLICIES, AND ASSUMPTIONS T.COMINT T.IMPCON T.LOSSOF T.NOHALT T.PRIVIL P.SENSITVE_DATA RATIONALE An unauthorized user may attempt to compromise the integrity of the data collected and produced by the TOE by bypassing a security mechanism. The O.IDENTIFY objective provides for identification of users prior to any TOE data access. The O.ACCESS objective builds upon the O.IDENTIFY objective by only permitting authorized users to access TOE data. The O.INTEGRITY objective ensures no TOE data will be modified. The OE.PROTECT objective supports the TOE protection from the IT Environment. An unauthorized user may inappropriately change the configuration of the TOE causing potential intrusions to go undetected. The OE.INSTALL objective states the authorized administrators will configure the TOE properly. The O.EADMIN objective ensures the TOE has all the necessary administrator functions to manage the product. The O.IDENTIFY objective provides for identification of users prior to any TOE data access. The O.ACCESS objective builds upon the O.IDENTIFY objective by only permitting authorized users to access TOE functions. An unauthorized user may attempt to remove or destroy data collected and produced by the TOE. The O.IDENTIFY objective provides for identification of users prior to any TOE data access. The O.ACCESS objective builds upon the O.IDENTIFY objective by only permitting authorized users to access TOE data. The O.INTEGRITY objective ensures no TOE data will be deleted. An unauthorized user may attempt to compromise the continuity of the System s collection and analysis functions by halting execution of the TOE. The O.IDENTIFY objective provides for identification of users prior to any TOE data access. The O.ACCESS objective builds upon the O.IDENTIFY objective by only permitting authorized users to access TOE functions. An unauthorized user may gain access to the TOE and exploit system privileges to gain access to TOE security functions and data. The O.IDENTIFY objective provides for identification of users prior to any TOE data access. The O.ACCESS objective builds upon the O.IDENTIFY objective by only permitting authorized users to access TOE functions. The TOE shall enforce security policies on transmission of sensitive files or data.the O.SENSITIVE_DATA objective requires the TOE to take specified actions upon the transmission of identified sensitive files or data. Table 12 Rationale for Mapping of Threats, Policies, and Assumptions to Objectives Document Version 1.0 Symantec Corporation Page 22 of 40
23 5 Extended Components Definition This Security Target does not include any extended components. Document Version 1.0 Symantec Corporation Page 23 of 40
24 6 Security Requirements The security requirements that are levied on the TOE and the IT environment are specified in this section of the ST. 6.1 Security Functional Requirements The functional security requirements for this Security Target consist of the following components from Part 2 of the CC, and those that were explicitly stated, all of which are summarized in the following table: CLASS HEADING CLASS_FAMILY DESCRIPTION Security Audit FAU_GEN.1 Audit Data Generation FAU_GEN.2 User Identity Association Information Flow FDP_IFC.1 Subset Information Flow Control Control FDP_IFF.1 Simple Security Attributes Identification and FIA_ATD.1 User Attribute Definition Authentication FIA_UAU.1 Timing of Authentication FIA_UID.1 Timing of Identification FIA_SOS.1 Verification of Secrets Security Management FMT_MTD.1 Management of TSF Data FMT_MSA.1 Management of Security Attributes FMT_MSA.3 Static Attribute Initialization FMT_SMF.1 Specification of Management Functions FMT_SMR.1 Security Roles Table 13 TOE Functional Components Security Audit (FAU) FAU_GEN.1 Audit Data Generation FAU_GEN.1.1 The TSF shall be able to generate an audit record of the following auditable events: a) Start-up and shutdown of the audit functions; b) All auditable events for the not specified level of audit; and c) The events identified in Table 14 Audit Events and Details. FAU_GEN.1.2 The TSF shall record within each audit record at least the following information: a) Date and time of the event, type of event, subject identity (if applicable), and the outcome (success or failure) of the event; and b) For each audit event type, based on the auditable event definitions of the functional components included in the PP/ST, the information detailed in Table 14 Audit Events and Details. Document Version 1.0 Symantec Corporation Page 24 of 40
25 Application Note: The auditable events for the (not specified) level of auditing are included in the following table: COMPONENT EVENT DETAILS FAU_GEN.1 Start-up and shutdown of audit functions FAU_GEN.1 Access to the TOE and TOE data Object IDs, Requested access FDP_IFF.1 All decisions on requests for information flow. The presumed addresses of the source and destination subject. FIA_ATD.1 All changes to TSF data (including passwords) result in an audit record being generated. Note that passwords are not configured, so no audit records for rejection of a tested secret will be generated. FIA_UAU.1 All use of the authentication mechanism User identity, location FIA_UID.1 All use of the user identification mechanism User identity, location FMT_MTD.1 All modifications to the values of TSF data FMT_SMF.1 Use of the management functions. User identity, function used FMT_SMR.1 Modifications to the group of users that are part of a role User identity Table 14 Audit Events and Details FAU_GEN.2 User Identity Association FAU_GEN.2.1 For audit events resulting from actions of identified users, the TSF shall be able to associate each auditable event with the identity of the user that caused the event Information Flow Control (FDP) FDP_IFC.1 Subset Information Flow Control FDP_IFC.1.1 The TSF shall enforce the DLP Information Flow Control SFP on Subjects: External IT entities attempting to transfer or transmit identified sensitive data Information: Files and content stored on the managed system or transferred from the managed system Operations: Document Version 1.0 Symantec Corporation Page 25 of 40
26 Endpoint Discover Component: Sends incidents to the Endpoint Server. Sends the associated incident data to the Endpoint Server for analysis. Quarantine File Endpoint Prevent Component: Block User Cancel Notify Quarantine Network Monitor/Network Prevent Component: Identify sensitive network content Block SMTP Message Modify SMTP Message Remove HTTP/HTTPS Content Block HTTP/HTTPS Content Block FTP Request Network Discover/Network Protect Component: Identify sensitive files Quarantine File Copy File FDP_IFF.1 Simple Security Attributes FDP_IFF.1.1 The TSF shall enforce the DLP Information Flow Control SFP based on the following types of subject and information security attributes: Subject Security Attributes: Monitoring enabled / disabled Document Version 1.0 Symantec Corporation Page 26 of 40
27 Information security attributes Content o For matches based on exact content from profiled structured data (database, CSV); exact document content from profiled documents; similar document content from profiled documents; described content, message context, and identity patterns; exact identities from synchronized or profiled directory server (LDAP); and any unique data defined by extending detection capabilities], Data transfer type Removable media devices, IM, HTTP/HTTPS, , FTP, CD/DVD, Print/Fax, Clipboard data] and protocol signature [ (SMTP), Web (HTTP), File Transfer (FTP), Newsgroups (NNTP), TCP, Telnet and SSL FDP_IFF.1.2 The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules hold: A. Monitoring option is enabled for the service and information structure type and: Or 1. The attribute is not covered by policy 2. The attribute is assigned an action of notify via policy B. DLP monitoring is disabled for the subject and information structure type. Or C. No response rule is configured. FDP_IFF.1.3 FDP_IFF.1.4 The TSF shall enforce the no other additional rules. The TSF shall explicitly authorize an information flow based on the following rules: No explicit authorization rules. Document Version 1.0 Symantec Corporation Page 27 of 40
28 FDP_IFF.1.5 The TSF shall explicitly deny an information flow based on the following rules: No explicit denial rules Identification and Authentication (FIA) FIA_ATD.1 User Attribute Definition FIA_ATD.1.1 The TSF shall maintain the following list of security attributes belonging to individual users: a) User name; b) Authentication data; c) Permission Sets FIA_SOS.1 Verification of secrets FIA_SOS.1.1 The TSF shall provide a mechanism to verify that secrets meet the following: must contain: o o o at least eight characters; at least one number; and at least one uppercase letter; and cannot have more than two repeated characters in succession FIA_UAU.1 Timing of Authentication FIA_UAU.1.1 FIA_UAU.1.2 The TSF shall allow no actions on behalf of the user to be performed before the user is authenticated. The TSF shall require each user to be successfully authenticated before allowing any other TSF-mediated actions on behalf of that user FIA_UID.1 Timing of Identification FIA_UID.1.1 FIA_UID.1.2 The TSF shall allow no actions on behalf of the user to be performed before the user is identified. The TSF shall require each user to be successfully identified before allowing any other TSF-mediated actions on behalf of that user. Document Version 1.0 Symantec Corporation Page 28 of 40
29 6.1.4 Security Management (FMT) FMT_MTD.1 Management of TSF Data FMT_MTD.1.1 The TSF shall restrict the ability to perform the functions in the table below to the respective roles in the table below. ROLE System Administrator, Limited Administrator Incident Responder, Limited Administrator User Administrator, Limited Administrator Policy Administrator, Limited Administrator Policy Author, Limited Administrator Table 15 Roles and Privileges ABILITY Add/remove user/group to a role Create, edit, delete role View, edit user name, password, role, DLP Information Flow Control SFP parameters View reports Configure TOE (Create Server, Discover Targets for Scanning) View, remediate, and delete incidents Add/remove user/group to a role Create, edit, delete role Add/remove user/group to a policy management role View, create policies/policy groups FMT_MSA.1 - Management of security attributes FMT_MSA.1.1 The TSF shall enforce the DLP Information Flow Control SFP to restrict the ability to change_default, query, modify, and delete the security attributes defined in FDP_IFF.1.1 to the System Administrator FMT_MSA.3 Static Attribute Initialization FMT_MSA.3.1 FMT_MSA.3.2 The TSF shall enforce the DLP Information Flow Control SFP to provide restrictive default values for security attributes that are used to enforce the SFP. The TSF shall allow the System Administrator to specify alternative initial values to override the default values when an object or information is created FMT_SMF.1 Specification of Management Functions FMT_SMF.1.1 The TSF shall be capable of performing the following security management functions: a) User Account management Document Version 1.0 Symantec Corporation Page 29 of 40
30 b) Incident management FMT_SMR.1 Security Roles c) DLP Policy and Rule management. FMT_SMR.1.1 FMT_SMR.1.2 The TSF shall maintain the roles: System Administrator, Incident Responder, User Administrator, Policy Administrator, Policy Author, Limited Administrator. The TSF shall be able to associate users with roles. 6.2 Security Assurance Requirements The assurance security requirements for this Security Target are taken from Part 3 of the CC. These assurance requirements compose an Evaluation Assurance Level 2 (EAL2) augmented by ALC_FLR.2. The assurance components are summarized in the following table: CLASS HEADING CLASS_FAMILY DESCRIPTION ADV: Development ADV_ARC.1 Security Architecture Description ADV_FSP.2 Security-enforcing Functional Specification ADV_TDS.1 Basic Design AGD: Guidance Documents AGD_OPE.1 Operational User Guidance AGD_PRE.1 Preparative Procedures ALC: Lifecycle Support ALC_CMC.2 Use of a CM System ALC_CMS.2 Parts of the TOE CM coverage ALC_DEL.1 Delivery Procedures ALC_FLR.2 Flaw Reporting Procedures ASE: Security Target Evaluation ASE_CCL.1 Conformance claims ASE_ECD.1 Extended components definition ASE_INT.1 ST introduction ASE_OBJ.2 Security objectives ASE_REQ.2 Derived security requirements ASE_SPD.1 Security problem definition ASE_TSS.1 TOE summary specification ATE: Tests ATE_COV.1 Evidence of Coverage ATE_FUN.1 Functional Testing ATE_IND.2 Independent Testing - Sample AVA: Vulnerability Assessment AVA_VAN.2 Vulnerability Analysis Table 16 Security Assurance Requirements at EAL2 6.3 CC Component Hierarchies and Dependencies This section of the ST demonstrates that the identified SFRs include the appropriate hierarchy and dependencies. The following table lists the TOE SFRs and the SFRs each are hierarchical to, dependent upon and any necessary rationale. Document Version 1.0 Symantec Corporation Page 30 of 40
31 O.ACCESS O.AUDITS O.EADMIN O.IDENTIFY O.INTEGRITY O.SENSITIVE_DATA Security Target: Symantec Data Loss Prevention Version SFR HIERARCHICAL TO DEPENDENCY RATIONALE FAU_GEN.1 No other components FPT_STM.1 Satisfied by OE.TIME in the environment FAU_GEN.2 No other components FAU_GEN.1, FIA_UID.1 Satisfied Satisfied FDP_IFC.1 No other components FDP_IFF.1 Satisfied FDP_IFF.1 No other components FDP_IFC.1 FMT_MSA.3 Satisfied Satisfied FIA_ATD.1 No other components None n/a FIA_UAU.1 No other components FIA_UID.1 Satisfied FIA_UID.1 No other components None n/a FIA_SOS.1 No other components None n/a FMT_MTD.1 No other components FMT_SMF.1 FMT_SMR.1 Satisfied Satisfied FMT_MSA.1 No other components FDP_IFC.1 FMT_SMF.1 FMT_SMR.1 Satisfied Satisfied Satisfied FMT_MSA.3 No other components FMT_MSA.1 FMT_SMR.1 Satisfied Satisfied FMT_SMF.1 No other components None n/a FMT_SMR.1 No other components FIA_UID.1 Satisfied Table 17 TOE SFR Dependency Rationale 6.4 Security Requirements Rationale This section provides rationale for the Security Functional Requirements demonstrating that the SFRs are suitable to address the security objectives Security Functional Requirements for the TOE The following table provides a high level mapping of coverage for each security objective: OBJECTIVE SFR FAU_GEN.1 FAU_GEN.2 FDP_IFC.1 FDP_IFF.1 FIA_ATD.1 FIA_UID.1 FIA_UAU.1 FIA_SOS.1 Document Version 1.0 Symantec Corporation Page 31 of 40
32 O.ACCESS O.AUDITS O.EADMIN O.IDENTIFY O.INTEGRITY O.SENSITIVE_DATA Security Target: Symantec Data Loss Prevention Version OBJECTIVE SFR FMT_MTD.1 FMT_MSA.1 FMT_MSA.3 FMT_SMF.1 FMT_SMR.1 Table 18 Mapping of TOE SFRs to Security Objectives The following table provides detailed evidence of coverage for each security objective: OBJECTIVE O.ACCESS O.AUDITS O.EADMIN O.IDENTIFY O.INTEGRITY RATIONALE The TOE must allow authorized users to access only appropriate TOE functions and data. Users authorized to access the TOE are determined using an identification and authentication process [FIA_UAU.1, FIA_UID.1]. The permitted access to TOE data by the roles and permissions is defined [FMT_MTD.1, FMT_SMF.1]. The TOE specifies metrics for password complexity in authentication (FIA_SOS.1). The management of security attirubtes is restricted (FMT_MSA.1.) The default values of security attributes are restrictive in nature (FMT_MSA.3). The TOE must record audit records for data accesses and use of the TOE functions on the management system. Security-relevant events must be defined and auditable for the TOE [FAU_GEN.1]. The user associated with the events must be recorded [FAU_GEN.2]. The TOE must include a set of functions that allow effective management of its functions and data. The functions and roles required for effective management are defined [FMT_SMF.1, FMT_SMR.1], and the specific access privileges for the roles and permissions is enforced [FMT_MTD.1]. The TOE must be able to identify users prior to allowing access to TOE functions and data on the management system. Security attributes of subjects used to enforce the security policy of the TOE must be defined [FIA_ATD.1]. Users authorized to access the TOE are determined using a identification process of a username/password combination [FIA_UID.1 and FIA_UAU.1]. The TOE specifies metrics for password complexity in authentication (FIA_SOS.1). The TOE must ensure the integrity of all TOE data. Only authorized administrators of the System may query or add TOE data [FMT_MTD.1]. Document Version 1.0 Symantec Corporation Page 32 of 40
33 OBJECTIVE O.SENSITIVE_DATA Table 19 Rationale for Mapping of TOE SFRs to Objectives Security Assurance Requirements RATIONALE The TOE shall take specified actions upon transmission of sensitive files or data. The TOE implements data classification to identify/track sensitive data and Protection Rules to act when sensitive data is transmitted inappropriately [FDP_IFC.1 and FDP_IFF.1]. This section identifies the Configuration Management, Delivery/Operation, Development, Test, and Guidance measures applied to satisfy CC assurance requirements. SECURITY ASSURANCE REQUIREMENT ADV_ARC.1: Security Architecture Description ADV_FSP.2: Security-Enforcing Functional Specification ADV_TDS.1: Basic Design AGD_OPE.1: Operational User Guidance AGD_PRE.1: Preparative Procedures ALC_CMC.2: Use of a CM System ALC_CMS.2: Parts of the TOE CM Coverage ALC_DEL.1: Delivery Procedures ALC_FLR.2: Flaw Reporting ATE_COV.1: Evidence of Coverage ATE_FUN.1: Functional Testing ATE_IND.2: Independent Testing Sample Table 20 Security Assurance Measures ASSURANCE MEASURES / EVIDENCE TITLE Architecture Description: Symantec Data Loss Prevention Version 11.1 Functional Specification: Symantec Data Loss Prevention Version 11.1 Basic Design: Symantec Data Loss Prevention Version 11.1 Operational User Guidance and Preparative Procedures Supplement: Symantec Data Loss Prevention Version 11.1 Operational User Guidance and Preparative Procedures Supplement: Symantec Data Loss Prevention Version 11.1 Configuration Management Processes and Procedures: Symantec Data Loss Prevention Version 11.1 Configuration Management Processes and Procedures: Symantec Data Loss Prevention Version 11.1 Delivery Procedures: Symantec Data Loss Prevention Version 11.1 Flaw Reporting: Symantec Data Loss Prevention Version 11.1 Security Testing: Symantec Data Loss Prevention Version 11.1 Security Testing: Symantec Data Loss Prevention Version 11.1 Provided by CCTL Rationale for TOE Assurance Requirements Selection The TOE stresses assurance through vendor actions that are within the bounds of current best commercial practice. The TOE provides, via review of vendor-supplied evidence, independent confirmation that these actions have been competently performed. The general level of assurance for the TOE is: Document Version 1.0 Symantec Corporation Page 33 of 40
34 Policy Enforcement Identification and Authentication Security Management Audit Security Target: Symantec Data Loss Prevention Version Consistent with current best commercial practice for IT development and provides a product that is competitive against non-evaluated products with respect to functionality, performance, cost, and time-to-market. 2. The TOE assurance also meets current constraints on widespread acceptance, by expressing its claims against EAL2 from part 3 of the Common Criteria. 3. Consistent with current best practice for tracking and fixing flaws as well as providing fixes to customers. 6.5 TOE Summary Specification Rationale This section demonstrates that the TOE s Security Functions completely and accurately meet the TOE SFRs. The following tables provide a mapping between the TOE s Security Functions and the SFRs and the rationale. TSF SFR FAU_GEN.1 FAU_GEN.2 FDP_IFC.1 FDP_IFF.1 FIA_ATD.1 FIA_UID.1 FIA_UAU.1 FIA_SOS.1 FMT_MTD.1 FMT_MSA.1 FMT_MSA.3 FMT_SMF.1 FMT_SMR.1 Table 21 SFR to TOE Security Functions Mapping SFR FAU_GEN.1 TSF AND RATIONALE Audit User actions area audited according to the events specified in the table with the SFR. Document Version 1.0 Symantec Corporation Page 34 of 40
35 SFR FAU_GEN.2 FDP_IFC.1 FDP_IFF.1 FIA_ATD.1 FIA_UID.1 FIA_UAU.1 FIA_SOS.1 FMT_MTD.1 FMT_MSA.1 FMT_MSA.3 FMT_SMF.1 FMT_SMR.1 Table 22 SFR to TSF Rationale TSF AND RATIONALE Audit The audit log records include the associated user name when applicable. Policy Enforcement The TOE implements data classification to identify/track sensitive data and Protection Rules to act when sensitive data is transmitted or transferred inappropriately. Policy Enforcement The TOE implements data classification to identify/track sensitive data and Protection Rules to act when sensitive data is transmitted or transferred inappropriately. Security Management User security attributes are associated with the user account via User Account management. Identification and Authentication The TSF requires users to identify and authenticate themselves before invoking any other TSF function or before viewing any TSF data via an interface within the TSC. No action can be initiated before proper identification and authentication. Identification and Authentication The TSF requires users to identify and authenticate themselves before invoking any other TSF function or before viewing any TSF data via an interface within the TSC. No action can be initiated before proper identification and authentication. Identification and Authentication The TSF places strict requirements on password complexity. Security Management The Administrator status and user permissions determine the access privileges of the user to TOE data. Security Management The TOE ensures the access to the security attributes are restricted as to enforce the access control policy for the TOE. Security Management The TOE ensures the default values of security attributes are restrictive in nature as to enforce the access control policy for the TOE. Security Management The management functions that must be provided for effective management of the TOE are defined and described. Security Management The TOE provides the roles specified in the SFR. When a User Account is created or modified, the role is specified by setting or clearing the Administrator status for the user. Document Version 1.0 Symantec Corporation Page 35 of 40
36 7 TOE Summary Specification 7.1 TOE Security Functions The security functions described in the following subsections fulfill the security requirements that are defined in Section 6.1 Security Functional Requirements. The security functions performed by the TOE are as follows: Security Audit Identification and Authentication Security Management Policy Enforcement Security Audit Security auditing involves recognizing, recording, storing, and analyzing information related to securityrelevant activities. The resulting audit records can be examined to determine which security-relevant activities took place and who (i.e., which user) is responsible for those activities. Symantec DLP audits the actions taken by all administrators of the product. As administrators authenticate to, configure, or use Symantec DLP, their actions are logged in the operation log files. Each action that is logged includes the date and time of the event, the ID of the administrator that caused the action, and some indication if the event is a failed action, for example a failure to authenticate. Symantec DLP provides a number of different log files that record information about the behavior of the software. All of the logs are stored as log files on the database in the IT Environment. The Symantec DLP log files fall into these categories: operational log files, debug log files, and installation log files Operational log files Operational log files record detailed information about the tasks the software performs and any errors that occur while the software performs those tasks. The contents of the operational log files can be used to verify that the software functions as expected. In addition, all security-related administrator actions are logged within the operational log files. These log files can also be used to troubleshoot any problems in the way the software integrates with other components of the DLP system Debug log files Debug log files record fine-grained technical details about the individual processes or software components that comprise DLP. The contents of debug log files are not intended for use in diagnosing system configuration errors or in verifying expected software functionality. The debug log files do not Document Version 1.0 Symantec Corporation Page 36 of 40
37 need to be examined to administer or maintain DLP. However, Symantec Support may ask an authorized administrator to provide debug log files for further analysis when a problem is reported Installation log files Installation log files record information about the DLP installation tasks that are performed on a particular computer. An administrator can use these log files to verify an installation or troubleshoot installation errors Identification and Authentication The Enforce Server requires that each administrator be successfully identified and authenticated with a username and password before being allowed access to the Enforce Server administration console. Administrators are required to use strong passwords that are enforced by the TOE. Strong passwords must contain at least eight characters, at least one number, and at least one uppercase letter. Strong passwords cannot have more than two repeated characters in a row Security Management Security management specifies how DLP manages several aspects of the TSF including TSF data and security functions. TSF data includes configuration data of the TOE, audit data, and data collected by the TOE. The TOE provides authorized administrators with the Enforce Server administration console to manage the security functions and TSF data of the TOE. DLP provides role-based access control to govern how authorized administrators can access product features and functionality. For example, a role might let an authorized administrator view reports, but prevent the administrator from creating policies or deleting incidents. Likewise, a role might let an authorized administrator author policy response rules but not detection rules. Roles determine what a user can see and do in the Enforce Server administration console. The summary of available roles and their privileges is as follows: ROLE System Administrator User Administrator Policy Administrator PRIVILEGE This role provides access to the System module and associated menu options in the Enforce Server administration console. Users in this role can monitor and manage the Enforce Server and detection servers(s). These detection servers include Network Discover Server, Network Monitor Server, Network Prevent Server ( ), Network Prevent Server (Web), and Endpoint Server.Users in this role can also deploy detection servers and run Network Discover scans. This role grants users the right to manage users and roles. Typically this role grants no other access or privileges. Because of the potential for misuse, it is recommended that no more than two people in the organization be assigned this role (primary and backup). This role grants users the right to manage policies and response rules. Typically this role grants no other access or privileges. Because of the potential for misuse, it is recommended that no more than two people in the organization be assigned this role (primary and backup). Document Version 1.0 Symantec Corporation Page 37 of 40
38 ROLE Policy Author Incident Responder Limited Administrator Table 23 Typical TOE Roles and Permissions PRIVILEGE This role provides access to the Policies module and associated menu options in the Enforce Server administration console. This role is suited for information security managers who track incidents and respond to risk trends. An information security manager can author new policies or modifying existing policies to prevent data loss. This role provides access to the Incidents module and associated menu options in the Enforce Server administration console. Users in this role can track and remediates incidents. Businesses often have at least two incident responder roles that provide two levels of privileges for viewing and responding to incidents. A first-level responder may view generic incident information, but cannot access incident details (such as sender or recipient identity). In addition, a first-level responder may also perform some incident remediation, such as escalating an incident or informing the violator of corporate security policies. A second-level responder might be escalation responder who has the ability to view incident details and edit custom attributes. A third-level responder might be an investigation responder who can create response rules, author policies, and create policy groups. The System Administrator can define custom privilege levels that may include one or more of the default role definitions. For example, a Policy Administrator may also have Policy Auditor rights. Roles and policy groups can be combined to limit the policies and detection servers that an administrator can configure. The System Administrator user (created during installation) has access to every part of the system and therefore is not a member of any access-control role. The management console ensures the default values of security attributes are restrictive in nature as to enforce the DLP Information Flow Control Policy for the TOE Policy Enforcement DLP collects information via the DLP Agents, Network Discover Servers, and Network Monitor Servers. Endpoint Discover uses DLP Agents to scan endpoint computers to find the information that an authorized administrator has defined as sensitive. The detection engine does not rely on file extensions to identify file type. The detection server checks the binary signature of the file to match its type. In the event that a file is in violation of the configured policies, Endpoint Discover sends an incident report back to the Enforce Server administration console. In addition, Endpoint Discover allows for the quarantine of confidential files to a secure location. Endpoint Prevent uses the DLP Agents to stop sensitive data from moving off of an endpoint computer. Endpoint Prevent blocks data transfers from a hard drive to a removable media device. Removable media includes the following devices: USB flash drive SD card Compact flash card Document Version 1.0 Symantec Corporation Page 38 of 40
39 FireWire connected device When the DLP Agent detects that a violation has occurred, the data is blocked from being transferred. An incident is created and sent to the Endpoint Server. When a violation occurs, the DLP Agent displays a pop-up notification to the user that informs the user that the violation has occurred. The notification also requires a justification for the file transfer. This justification appears in the incident snapshot. A DLP Agent is installed on each endpoint computer that an administrator wants to scan. The Enforce Server controls the DLP Agent and applies the policies and rules of that Endpoint Server. The DLP Agent contains an encrypted data store 1, called the Agent Store. It acts as a buffer or holding space for the incidents and files that the DLP Agent sends to the Endpoint Server. If the DLP Agent is disconnected from the Endpoint Server, the Agent Store holds the incidents and files until a connection is reestablished. The Endpoint Server connects to both Endpoint Prevent and Endpoint Discover. The Endpoint Server connects all of the DLP Agents that are deployed on endpoint computers to the Enforce Server. The Endpoint Server pushes the policies that an authorized administrator creates out to the DLP Agents. Any violations that are detected by the Symantec DLP Agents are sent to the Endpoint Server which then forwards them on to the Enforce Server. In addition, the Endpoint Server contains the detection policies for Endpoint Discover. Network Discover scans networked file shares, Web content servers, databases, document repositories, and endpoint systems at high speeds to detect exposed data and documents. Network Discover enables authorized administrators to understand exactly where confidential data is exposed and helps significantly reduce the risk of data loss. Once Network Discover finds a security breach, Network Protect, which sits on the Network Discover Server, removes the exposed confidential data, intellectual property, and/or classified information from open file shares on network servers or desktop computers. Network Protect will remediate the security breach by quarantining the exposed files or enforcing corporate access control and encryption policies. Network protect will access the managed device and will set the file permissions for the sensitive data on the device and encrypt 2 the data to meet corporate policies. Network Monitor provides packet capture of network traffic. The Network Monitor Servers gather network traffic from scanned ports or taps, and report on private or proprietary data leaking as it moves across the network. The Enforce Server defines the policy groups, protocols, and protocol filters that control the Network Monitor Servers. Authorized users in the environment are able to review the collected TOE data via reports that are generated by the TOE. Only authorized users that have been assigned a specific role and permissions are able to review the TOE data which is presented in reports. See Table 15 Roles and Privileges to 1 This encryption is provided by the environment and is not specifically included in this evaluation. 2 While the action of encrypt is included as a function of the TOE, the actual cryptography is provided by the environment and is not specifically included in this evaluation. Document Version 1.0 Symantec Corporation Page 39 of 40
40 view the specific user roles that have access to the incidents and reportstoe data. An authorized administrator can use incident reports to track and respond to incidents. DLP reports an incident when it detects data that matches the detection parameters of a policy rule. Such data may include specific file content, an sender or recipient, attachment file properties, or many other types of information. Each piece of data that matches detection parameters is called a match, and a single incident may include any number of individual matches. DLP tracks incidents for all detection servers. These servers include Network Discover Server, Network Monitor Server, Network Prevent Server ( ), Network Prevent Server (Web), and Endpoint Server. End of Document Document Version 1.0 Symantec Corporation Page 40 of 40
Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012
Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa
Security Target. McAfee Enterprise Mobility Management 12.0. Document Version 1.16
Security Target McAfee Enterprise Mobility Management 12.0 Document Version 1.16 September 17, 2014 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 Primasec Ltd
Security Target. Symantec TM Network Access Control Version 12.1.2. Document Version 0.12. February 14, 2013
Security Target Symantec TM Network Access Control Version 12.1.2 Document Version 0.12 February 14, 2013 Document Version 0.12 Symantec Page 1 of 39 Prepared For: Prepared By: Symantec Corporation 350
Security Target. Securonix Security Intelligence Platform 4.0. Document Version 1.12. January 9, 2015
Security Target Securonix Security Intelligence Platform 4.0 Document Version 1.12 January 9, 2015 Document Version 1.12 Copyright Securonix Page 1 of 41 Prepared For: Prepared By: Securonix 5777 W. Century
Security Target. McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5. Document Version 1.1. September 9, 2011
Security Target McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5 Document Version 1.1 September 9, 2011 Document Version 1.1 McAfee Page 1 of 61 Prepared For: Prepared By: McAfee, Inc. 2821
Security Target. McAfee Data Loss Prevention Endpoint 9.4 and epolicy Orchestrator 5.1.3. Document Version 1.0
Security Target McAfee Data Loss Prevention Endpoint 9.4 and epolicy Orchestrator 5.1.3 Document Version 1.0 November 24, 2015 Prepared For: Prepared By: Intel Corporation. 2821 Mission College Blvd. Santa
Security Target. McAfee Database Security 4.4.3. Document Version 1.4. June 18, 2013. Security Target: McAfee Database Security 4.4.
Security Target McAfee Database Security 4.4.3 Document Version 1.4 June 18, 2013 Document Version 1.4 McAfee Page 1 of 66 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara,
How To Evaluate A Security Target Of Evaluation (Toe)
Security Target McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 Document Version 1.1
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 0.7 Prepared for: Prepared by: Enterasys Networks, Inc. Corsec Security,
Trustwave DbProtect Version 6.4.3 Security Target
Trustwave DbProtect Version 6.4.3 Security Target Version 1.8 July 21, 2015 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane
Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0
Security Target NetIQ Access Manager 4.0 Document Version 1.13 August 7, 2014 Document Version 1.13 NetIQ Page 1 of 36 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite 810 Houston, TX
Security Target: IBM Internet Security Systems GX Series Security Appliances Version 4.1 and SiteProtector Version 2.0 Service Pack 8.
Security Target IBM Internet Security Systems GX Series Security Appliances Version 4.1 and Document Version 0.6 February 27, 2012 Document Version 0.6 IBM Internet Security Systems Page 1 of 55 Prepared
Mobile Billing System Security Target
Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing
IBM Internet Security Systems GX6116 Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 with Reporting Module
Security Target IBM Internet Security Systems GX6116 Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 with Reporting Module Document Version 2.0 July 6, 2011 Document Version
CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target
CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target Version 2.0 June Version 21, 2010 0.6 December 29, 2008 Prepared for: Prepared CA for: 100 Staples CA, Inc. Drive Framingham, 100
SolarWinds Log and Event Manager Software Security Target
SolarWinds Log and Event Manager Software Security Target Version 1.5 August 25, 2014 SolarWinds Worldwide, LLC 3711 South MoPac Expressway Building Two Austin, Texas 78746 Copyright 2013 SolarWinds Worldwide,
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction
BMC ProactiveNet Performance Management 9.5. Security Target
BMC ProactiveNet Performance Management 9.5 Security Target Version 0.4 18 July 2014 Copyright 2014 BMC Software, Inc. All rights reserved. BMC, BMC Software, and the BMC Software logo are the exclusive
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle
JMCS Northern Light Video Conferencing System Security Target
JMCS Northern Light Video Conferencing System Security Target Common Criteria: EAL2 Version 1.2 22 FEB 12 Document management Document identification Document ID Document title Product version NLVC_ST_EAL2
BMC Real End User Experience Monitoring and Analytics 2.5. Security Target
BMC Real End User Experience Monitoring and Analytics 2.5 Security Target Version 0.07 5 March 2015 Copyright 2015 BMC Software, Inc. All rights reserved. BMC, BMC Software, and the BMC Software logo
EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.
EMC Corporation Data Domain Operating System Version 5.2.1.0 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.11 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton,
Marimba Client and Server Management from BMC Software Release 6.0.3
Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...
Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0
Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 ST Version 1.6 August 20, 2007 Document Version 1.6 Symantec Corporation Page 1 of 55 Prepared For: Prepared By: Symantec Corporation
Security Target. Astaro Security Gateway V8 Packet Filter Version 1.000. Assurance Level EAL4+ Common Criteria v3.1
Astaro Security Gateway V8 Packet Filter Version 1.000 Assurance Level EAL4+ Common Criteria v3.1 This Security Target also covers the secunet wall 2 packet filter Version : 1.03 Date: 2011-05-20 Author:
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Author: Microsoft Corp. Version: 1.0 Last Saved: 2011-03-10 File Name: MS_UAG_ST_1.0.docx
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government
How To Understand The Toe
Rapid7 Nexpose Vulnerability Management and Penetration Testing System V.5.1 Security Target Version 1.7 May 11, 2012 Prepared for: Rapid7 LLC 545 Boylston Street, Suite 400 Boston, MA 02116 Prepared By:
EAL4+ Security Target
EAL4+ Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 21-DEC-10 Document management Document identification Document ID Document title Release authority E14_EAL4_ASE Microsoft
Trustwave Secure Web Gateway Security Target
Trustwave Secure Web Gateway Security Target Version 1.5 September 18, 2013 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane
EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0
EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305
SenSage, Inc. SenSage 4.6.2. Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1.2
SenSage, Inc. SenSage 4.6.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 1.2 Prepared for: Prepared by: SenSage, Inc. 55 Hawthorne Street San Francisco, CA 94105 United States of
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING Document No. 1735-005-D0001 Version: 1.0, 3 June 2014 Prepared for: Fortinet, Incorporated 326 Moodie Drive Ottawa, Ontario Canada, K2H
Firewall Protection Profile V2.0 2008. 4. 24
Firewall Protection Profile V2.0 2008. 4. 24 (This page left blank on purpose for double-side printing) Protection Profile Title Firewall Protection Profile for Government Evaluation Criteria Version This
U.S. Government Protection Profile for Database Management Systems
U.S. Government Protection Profile for Database Management Systems Information Assurance Directorate Version 1.3 December 24, 2010 Protection Profile Title: 1 U.S. Government Protection Profile for Database
Security Target: Symantec Endpoint Protection Version 11.0
Security Target: Symantec Endpoint Protection Version 11.0 ST Version 1.6 June 2, 2008 Document Version 1.6 Symantec Corporation Page 1 of 68 Prepared For: Prepared By: Symantec Corporation 20330 Stevens
RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5. Security Target
RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5 Security Target Evaluation Assurance Level: EAL2 Augmented with ALC_FLR.1 Document Version: 0.7 Prepared for: Prepared by: RSA, The
Firewall Protection Profile
samhällsskydd och beredskap 1 (38) ROS-ISÄK Ronny Janse 010-2404426 [email protected] Firewall Protection Profile samhällsskydd och beredskap 2 (38) Innehållsförteckning 1. Introduction... 4 1.1 PP reference...
Xceedium GateKeeper Version 5.2.1 Security Target
ceedium GateKeeper Version 521 Security Target February 3, 2011 Prepared for: ceedium, Inc 30 Montgomery Street Jersey City, NJ 07302 Prepared By: Science Applications International Corporation Common
Extreme Networks, Inc. ExtremeXOS Network Operating System v12.3.6.2
Extreme Networks, Inc. ExtremeXOS Network Operating System v12.3.6.2 Security Target Evaluation Assurance Level: EAL3+ Document Version: 0.9 Prepared for: Prepared by: Extreme Networks, Inc. 3585 Monroe
Security Target. McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5. Document Version 1.3. October 12, 2011
Security Target McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5 Document Version 1.3 October 12, 2011 Document Version 1.3 McAfee Page 1 of 69 Prepared For: Prepared By: McAfee, Inc. 2821
RSA, The Security Division of EMC envision platform v4.0 SP 1. Security Target
RSA, The Security Division of EMC envision platform v4.0 SP 1 Security Target Evaluation Assurance Level: 3+ Document Version: 0.8 Prepared for: Prepared by: RSA, The Security Division of EMC 174 Middlesex
LogLogic v4.6.1 Open Log Management Platform Security Target. Release Date: 30 June 2009 Version: 2.0
LogLogic v4.6.1 Open Log Management Platform Security Target Release Date: 30 June 2009 Version: 2.0 Prepared for: LogLogic Inc. 110 Rose Orchard Way, Suite 200 San Jose, CA 95134 Prepared by: Savvis Federal
DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75
DataPower S40 ML Security Gateway and DataPower I50 Integration Appliance Version 3.6 Security Target Version 0.75 10/09/2008 Prepared for: IBM SOA Appliance Group One Rogers St Cambridge, MA 02142 Prepared
Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target
Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target Evaluation Assurance Level: EAL2 augmented with ALC_FLR.2 Document Version: 1 Prepared for: Prepared by: Citrix
gateprotect Firewall Packet-Filtering-Core v10.3 Security Target Version:
Version: Status: Last Update: Classification: 1.0 Release 2013-02-08 public Legal tice This document is provided AS IS with no express or implied warranties. Use the information in this document at your
Wyse Technology Inc. Wyse Device Manager Enterprise Edition Version 4.7.2 Security Target
Wyse Technology Inc. Wyse Device Manager Enterprise Edition Version 4.7.2 Security Target Version 1.8 April 18, 2011 Wyse Technology Inc. 3471 N. First Street San Jose, CA 95134 DOCUMENT INTRODUCTION Prepared
SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2
SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2 Document No. 1769-000-D0007 Version: v0.89, 12 September 2013 Prepared for: Centrify Corporation 785 N. Mary Avenue, Suite 200 Sunnyvale, California USA,
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report
Cisco IronPort S-Series Web Security Appliance Security Target
Cisco IronPort S-Series Web Security Appliance Security Target Version 1.0 October 12, 2009 Prepared for: Cisco IronPort Systems 1100 Grundy Lane San Bruno, CA 94066 Prepared By: Science Applications International
Intrusion Detection System System Protection Profile
Intrusion Detection System System Protection Profile Prepared for National Security Agency 9800 Savage Road Fort Meade MD, 20755 Prepared by Science Applications International Corporation 7125 Gateway
LogRhythm Integrated Solution. Security Target
LogRhythm Integrated Solution Security Target Version 1.1 March 30, 2012 Prepared for: LogRhythm, Inc. 4780 Pearl East Circle Boulder, CO 80301 Prepared By: Science Applications International Corporation
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows,
Certification Report StoneGate FW/VPN 5.2.5
Ärendetyp: 6 Diarienummer: 11FMV3127-87:1 Dokument ID HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2012-01-23 Country of origin: Sweden Försvarets materielverk Swedish Certification Body
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN
REF: 2010-22-INF-764 V1 Distribution: Expediente Date: 21.11.2011 Created: CERT3 Reviewed: CALIDAD Approbed: TECNICO CERTIFICATION REPORT FOR FOR HUAWEI INTEGRATED MANAGEMENT APPLICATION PLATFORM VERSION
Fingerprint Spoof Detection Protection Profile
Fingerprint Spoof Detection Protection Profile based on Organisational Security Policies FSDPP_OSP v1.7 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 228 99
Secuware Virtual System (SVS)
Secuware Virtual System (SVS) SECURITY TARGET EAL2 Copyright 2008 by SECUWARE All rights reserved. The information in this document is exclusive property of SECUWARE and may not be changed without express
FOR EAL2 AUGMENTED WITH ALC_FLR.1. Version: 1.2 November 20, 2013
SECURITY TARGET FOR A10 NETWORKS THUNDER 5430S AND 6430S APPLICATIONS DELIVERY CONTROLLERS EAL2 AUGMENTED WITH ALC_FLR.1 Version: 1.2 November 20, 2013 DENMARK FINLAND NORWAY SWEDEN THE NETHERLANDS www.secode.no
How To Protect Your Computer From Being Hacked
Senforce Endpoint Security Suite Version 3.1.175 Security Target Version 1.0 06/19/07 Prepared for: Senforce Technologies, Inc. 147 W Election Rd Ste 110 Draper UT 84020 Prepared By: Science Applications
Forefront Identity Manager (FIM) 2010
Forefront Identity Manager (FIM) 2010 Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 24-MAR-2012 Document history Version Date Description 0.1 28-APR-11 Initial draft for review.
IBM WebSphere Message Broker Security Target
IBM WebSphere Message Broker Security Target Version 2.1.2 2007-08-22 Document History Version Date Summary Author 1.0 2006-10-23 Final EAL3 ST plus changes by IBM. SAIC / IBM 1.1 2006-12-11 Fixed inconsistencies.
Trustwave WebDefend Enterprise Software Security Target
Trustwave WebDefend Enterprise Software Security Target Version 1.5 June 22, 2012 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin
Natek Network Access Control (NAC)
Natek Network Access Control (NAC) V 5.4.2 Security Target Release Date: 28.08.2014 Version 1.13 AUTHOR: NATEK BİLİŞİM BİLGİSAYAR EĞİTİM DANIŞMANLIK YAZILIM TİCARET SANAYİ ANONİM ŞİRKETİ 1 Revision History
BMC Remedy Action Request System 6.3 Security Target
BMC Remedy Action Request System 6.3 Security Target Version 4.5 March 28, 2007 Part number: 60658 Prepared by: BMC Software, Inc. 1030 W. Maude Avenue Sunnyvale, CA 94085 Copyright 2004-2007 BMC Software,
Protection Profile for Server Virtualization
Protection Profile for Server Virtualization 29 October 2014 Version 1.0 i 0 Preface 0.1 Objectives of Document This document presents the Common Criteria (CC) Protection Profile (PP) to express the fundamental
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT
REF: 2010-15-INF-681 v1 Difusión: Expediente Fecha: 05.07.2011 Creado: CERT2 Revisado: TECNICO Aprobado: JEFEAREA CERTIFICATION REPORT Expediente: 2010-15 Datos del solicitante: 440301192W HUAWEI References:
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target Version: Status: Last Update: 1.19 Released 2014-03-05 Trademarks
HP TippingPoint Intrusion Prevention Systems Security Target
HP TippingPoint Intrusion Prevention Systems Security Target Version 1.0 July 29, 2011 Prepared for: TippingPoint/Hewlett-Packard Corporation 14231 Tandem Blvd Austin, TX 78728 USA Prepared By: Science
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3)
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3) Reference: ST January 2001 Version: 1.6 Europe: USA: CISCO Systems Ltd CISCO Systems Inc. 3 The Square 170 West Tasman Drive Stockley
Enterasys Dragon-EAL Intrusion Defense System. Security Target
Enterasys Dragon-EAL Intrusion Defense System Security Target Version 11 August 31, 2004 Enterasys Networks 50 Minuteman Road Andover Massachusetts 01810 www.enterasys.com Table of Contents 1. SECURITY
Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target
Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Revision 1.0 August 2011 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms
SAMSUNG SDS FIDO Server Solution V1.1 Certification Report
KECS-CR-15-73 SAMSUNG SDS FIDO Server Solution V1.1 Certification Report Certification No.: KECS-ISIS-0645-2015 2015. 9. 10 IT Security Certification Center History of Creation and Revision No. Date Revised
Top Layer Networks. Security Target V2.3
Top Layer Networks IDS Balancer TM Version 2.2 Appliance (IDSB3531-CCV1.0, IDSB3532-CCV1.0, IDSB4508-CCV1.0) Security Target V2.3 August 31, 2004 AppBalancing, AppSafe, DCFD, Flow Mirror, SecureWatch,
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN
REF: 2010-12-INF-626 V1 Distribution: Public Date: 29.04.2011 Created: CERT3 Reviewed: TECNICO Approved: JEFEAREA CERTIFICATION REPORT FOR EADS GROUND SEGMENT SYSTEMS PROTECTION PROFILE (GSS-PP) ISSUE
Certification Report
Certification Report EAL 3+ Evaluation of Rapid7 Nexpose Vulnerability Management and Penetration Testing System V5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Security Target Microsoft SQL Server Team
Security Target Microsoft SQL Server Team Author: Roger French Version: 1.27 Date 2008-07-23 File Name: MS_SQL_ST_1.27 Abstract This document is the Security Target (ST) for the Common Criteria evaluation
Extended Package for Mobile Device Management Agents
Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented
Blue Coat Systems, Inc. ProxySG v5.3.1.9 running on SG510, SG810, and SG8100. Security Target
Blue Coat Systems, Inc. ProxySG v5.3.1.9 running on SG510, SG810, and SG8100 Security Target Evaluation Assurance Level: EAL 2+ Document Version: 0.7 Prepared for: Prepared by: Blue Coat Systems, Inc.
Check Point Endpoint Security Media Encryption Security Target
Check Point Endpoint Security Media Encryption Security Target Version 1.0 June 23, 2010 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared By: Science Applications International Corporation
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
RSA, The Security Division of EMC RSA Access Manager v6.1. Security Target
RSA, The Security Division of EMC RSA Access Manager v6.1 Security Target Evaluation Assurance Level: EAL3+ Augmented with ALC_FLR.2 Document Version: 0.8 Prepared for: Prepared by: RSA, The Security Division
EXTOL epassport Suite v2.5 Security Target v2.0. ECSB/MyCC/JL/002 Common Criteria EAL1 Certification
Doc Ref RD/JL/069 Replaces: N/A EXTOL epassport Suite v2.5 ECSB/MyCC/JL/002 Common Criteria EAL1 Certification Extol Corporation (M) Sdn Bhd (121135-U) (643683-U) Extol Group www.extolcorp.com Unit G1,
McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 Security Target
v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 10 January 2012 Version 1.1 Prepared By: Primasec Ltd For McAfee Inc 2340 Energy Park Drive St. Paul, MN 55108 USA Contents 1 Introduction...
How To Understand The Security Of A System From A Microsoft Powerbook (Powerbook)
Trustwave SIEM LP Software and SIEM Operations Edition Security Target Trustwave SIEM LP Software and SIEM Operations Edition Security Target Version 1.12 June 28, 2012 Trustwave 70 West Madison Street
Certification Report
Certification Report Symantec Network Access Control Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition Version 1-0 7 February 2011 2011 Citrix Systems, Inc. All rights reserved. Summary of Amendments Version 1-0 7
BMC Remedy Action Request System 7.5.00 Security Target
BMC Remedy Action Request System 7.5.00 Security Target Version 1.10 October 2011 Prepared by BMC Software, Inc. 91 E. Tasman Drive San Jose, CA 95134 Copyright 2011 BMC Software, Inc. All rights reserved.
Intrusion, Inc. SecureNet Pro Intrusion Detection System Version 4.1 SP1 Security Target December 20, 2002 Document No.
Intrusion, Inc. SecureNet Pro Intrusion Detection System Version 4.1 SP1 Security Target December 20, 2002 Document No. F2-1202-004 COACT, Inc. Rivers Ninety Five 9140 Guilford Road, Suite L Columbia,
Active Directory Federation Services 2.0
Active Directory Federation Services 2.0 Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 23-MAR-12 Document history Version Date Description 0.1 10-MAY-11 Initial draft for review.
