EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
|
|
|
- Ilene Harris
- 10 years ago
- Views:
Transcription
1 COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION
2 TABLE OF CONTENTS Common Criteria Protection Profile Introduction PP Reference Title Version Author Publicatıon Date TOE Overview TOE Type TOE Usage and Major Security Properties Required Non-TOE Hardware/Software/Firmware The TOE Life-cycle The TOE Configurations Conformance Claims CC Conformance Claim PP Claim Package Claım Conformance Statement Security Problem Definition Assets and Actors Assets Subjects and External Entities Organisational Security Polıcıes Threats epassport Application Related Threats: ES Related Threats Attacks to the Hardware Platform Leakage and Emission Threats... 12
3 3.1.5 Environmental Stress Threats Functionality Abuse Threats Threat for the Flash Loader Configuration Assumptions Security Objectives Security Objectives for the TOE Application Specific Objectives ES Related Objectives Probing, Manipulation and Emission Threats: Environmental Stress Threats Leakage Threats Abuse of the Functionality Unique Identification Security Objectives for the Environment Security Objectives Ratıonale Security Objectives Rationale Table Security Objectives Justification Extended Components Class FCS Cryptographic Support Family FCS_RND Generation of Random Numbers Definition of the Family FIA_POI FIA_POI Ability to Prove Its Own Identity Class FPT Protection of the TSF Family FPT_SCP Side Channel Protection Security Requirements Security Functional Requirements Logical Data Access Control Physical Data Access Control Policy Secure Communication... 32
4 6.1.4 Class FIA Identification and Authentication Class FMT Security Management Class FPT Protection of the Security Functions Class FCS: Cryptographic Support Assurance Requirements Security Requirements Rationale SFRs Rationale Table SFRs Justification Dependencies for the Security Functional Requirements Rationale and Dependencies for the SARs Security Requirements Mutual Support and Internal Consistency References Accroynms... 57
5 ŞEKİL TABLOSU ÖĞESİ BULUNAMADI. Table 1: Security Objectives Rationale Table 2: Additional Rationale for the Flash Loader Table 3: SFRs Rationale Table Table 4: Additional SFRs Rationale for the Flash Loader Configuration Table 5: Dependencies for the SFRs Table 6: Dependencies for the Additional SFRs of the Flash Loader Table 7: The Dependencies for augmented SARs... 56
6 1. INTRODUCTION 1.1 PP Reference TITLE Protection Profile for epassport with Basic Access Control and Active Authentication VERSION Draft Version AUTHOR TURKISH STANDARDS INSTITUTION PUBLICATION DATE TOE OVERVIEW TOE TYPE The TOE is the composite smart card product consisting of: epassport Application with BAC 1 and AA 2 Embedded OS Security IC Unique Identification Data and Configuration Data (optional) Secure IC Platform [Secure IC Hardware and IC Dedicated Software] Security Guidance Documentation TOE USAGE AND MAJOR SECURITY PROPERTIES The TOE is used as an epassport s chip, as a proof of holder s identity. The TOE s usage is described below 3 : A state or an organisation issues an epassport for the passport holder. The issuing state or organisation ensures the correctness of the data of genuine epassport s. The receiving state trusts a genuine epassport of an issuing state or organisation. 1 BAC: Basic Access Control 2 AA: Active Authentication 3 From this PP s perspective physical properties of the epassport that are used to verify the genuineness of the epassport and the verification of the photograph printed on the epassport belongs to the passport holder are out of scope.
7 The epassport holder s identity is verified by the receiving state by validating the genuineness of the valid epassport and verification of the photo stored on the chip belongs to the passport holder 4 The data structure of the epassport is named as LDS and defined in [5]. The epassport offers following security properties: the passive authentication, basic access control and active authentication are also defined in [5]. Passive Authentication is out of this PP s scope. They are ensured by PKI which is operated by states and organisations; key distribution network is maintained by ICAO and participant states and organisation. The TOE offers following security properties: Write once access control to the LDS, Basic Access Control, Active Authentication, Security Management, Ability to detect the changes performed during TOE s delivery Protection against Physical Attacks, Protection against Side Channel Attacks, Protection against Environmental Stress Attacks REQUIRED NON-TOE HARDWARE/SOFTWARE/FIRMWARE None THE TOE LIFE-CYCLE Life-cycle of the TOE can be divided into two main phases: ES Prior Phase ES Active System Embedded operating system prior phase is described in the Security IC PP [6]. ES active phase is where the TOE s legitimate use is performed only through the interfaces provided by ES. ES active phase consists of five phases: Activation Phase Initialisation Phase Personalisation Phase Operational Phase Death Phase In the activation phase, the TOE is received from the manufacturer and checked against if it is the genuine TOE. After the originality verification, the Activation Agent (acting on behalf of the Card Issuer) authenticates itself to the TOE, and the Initialisation and Personalisation authentication reference data are written to the TOE. Afterwards the TOE is taken to the initialisation phase. 4 Additional biometric verification methods (the fingerprint and the iris) are out of the scope of this PP, since they are required to be protected by additional measure: Extended Access Control.
8 Initialisation phase is when the application specific data are written to the TOE. The phase when each card specific data is written to the TOE is personalisation phase. After the personalisation phase the TOE is taken to the operational phase, in the operational phase the TOE is assumed that it is hostile environment. Death phase is where the TOE stops normal functioning because of its internal secure state is corrupted or authentication attacks are performed during the activation, initialisation or personalisation phases THE TOE CONFIGURATIONS There are two different TOE configurations that depend on the choice of embedded OS storage technology exist in this PP: The ROM Based The Flash Based ROM Storage: This configuration requires the Embedded OS to be delivered prior to the manufacturing of the TOE. Embedded OS is stored in the ROM Memory of the TOE and rewrite is not possible. Flash Storage: Flash Technology enables the embedded OS to be loaded after the TOE is manufactured. There is Flash Loader Software in the TOE within this configuration and provides functionality to load the embedded OS to the Flash Memory. There are several options to load the embedded OS; the manufacturer may load the embedded OS and disable flash loader prior to the delivery to the Card Issuer; or the TOE is delivered without ES and flash loader is active. Starting from the lifecycles of the different configurations, differences for two configurations exist within this PP. Therefore any TOE that claims conformance to this PP has to state the embedded OS storage technology it supports in the PP conformance statement, whether ROM based or Flash Based. The TOE configuration differs in the way that how the embedded operating system is stored or loaded. Embedded operating system can be embedded during the manufacturing by using the Hard ROM masks which are prepared prior to the TOE manufacturing or may be loaded afterwards the manufacturing by a flash loader program if TOE is based on Flash Technology. Usage of Flash or ROM technology changes the lifecycle of the TOE and due to the flexibility the Flash Technology brings there are additional security concerns for the Flash based TOE s. For a TOE that is claiming conformance to this PP, which technology this TOE supports needs to be given in its security target. Besides the configurations stated in this PP; additional threats, organisational security policies, TOE security objectives and security requirements can be added. Any other addition to the assumptions and environment security objectives requires consistency to other elements of the PP. Note about the Configurations: ROM based technology is simpler and the only difference between the ROM based and Flash based TOE is that Flash based TOE s have additional security items. Therefore first the SPD, SOs and SRs of ROM based technology are given afterwards if exist additional items for Flash based TOE are given.
9 2. CONFORMANCE CLAIMS 2.1 CC CONFORMANCE CLAIM This Protection Profile claims conformance to the Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model; CCMB , Version 3.1, Revision 4, September 2012 Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Requirements; CCMB , Version 3.1, Revision 4, September 2012 Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance Requirements; CCMB , Version 3.1, Revision 1, September 2012 The Common Methodology for Information Technology Security Evaluation (CEM), Evaluation Methodology; CCMB , Version 3.1, Revision 4, September 2012 has to be taken into account 2.2 PP CLAIM This PP does not claim conformance to any other PP. 2.3 PACKAGE CLAIM This PP is conforming to assurance package EAL5 augmented with ALC_DVS.2 and AVA_VAN.5 defined in CC Part CONFORMANCE STATEMENT The Protection Profile requires strict conformance for the ST or PP claiming conformance to this PP.
10 3. SECURITY PROBLEM DEFINITION 3.1 ASSETS AND ACTORS ASSETS The primary assets are the LDS, identity of the passport holder and originality of the TOE. The protection of the LDS against unauthorised modification and disclosure; protection of the anonymity of the passport holder and protection of the originality of the TOE are the key security concerns. The secondary assets are: Unique IC Identification Data, Initialisation and Personalisation Agent Authentication Reference Data, Document Basic Access Keys, Active Authentication Private Key 5, TSF Code and TSF itself SUBJECTS AND EXTERNAL ENTITIES Manufacturer (Composite Product): The roles of the IC Manufacturer, the ES Developer, the epassport Application developer and the Composite Product Integrator are combined to the single subject within this PP. The TOE defined in the current PP is delivered to the epassport issuer as a whole product including the ES and the Secure IC. epassport Issuer: The epassport issuer performs all the legitimate security management roles; including activation agent, initialisation agent, personalisation agent, are assumed to be performed on behalf of epassport issuer. Activation Agent: The legitimate entity that performs the activation activities. Initialisation Agent: The legitimate entity that performs the initialisation activities. Personalisation Agent: The legitimate entity that performs the personalisation activities. Terminal: The external entity that the TOE communicates with. Inspection System: An inspection system is the system that verifies the authenticity of the epassport by the passive authentication mechanism. Basic Inspection System: It is the technical system that additionally applies the Basic Access Control and additionally may apply the Active Authentication mechanism. epassport Holder: epassport holder is the legitimate holder of the TOE and the subject for whom the TOE is personalised for. Attacker: The attacker is the entity who tries to undermine the security policies of the issuer state or the receiving state. Attacker is assumed to possess enhanced basic attack potential. 3.2 ORGANISATIONAL SECURITY POLICIES P.BAC: The authentication of BIS, session key generation and secure messaging between the TOE and the BIS will be performed as stated in ICAO Doc 9303 [5]. 5 Active Authentication Public Key is included in the LDS.
11 P.AA: The active authentication mechanism will be performed as stated in ICAO Doc 9303 [5]. P.Security_Management: The TOE shall support Activation, Initialisation and Personalisation management functions and respective security management roles. P.IC_Unique_Identification_Data: The TOE should be uniquely identified by the Activation Agent. ORGANISATIONAL SECURITY POLICY FOR THE FLASH LOADER CONFIGURATION P.Embedded_OS_Load: The TOE should provide ES loading capability to the epassport Issuer or the Manufacturer. 3.3 THREATS EPASSPORT APPLICATION RELATED THREATS: T.Anonymity_of_the_Holder: An attacker may try to establish communication to the TOE and obtain any information that may be linked to the identity of the passport holder. T.Unauthorised_Access_to_the_LDS: An attacker may logically access (read or write) to the LDS. T.Communication: An attacker may eavesdrop the communication between the BIS and the TOE to obtain the LDS. T.Act_Life_BIS: An attacker may imitate BIS and try to get read access to the LDS. T.Cloning: An attacker may read out the LDS and produce a cloned epassport. T.AA_Key_Disclose: An attacker may logically read the Active Authentication PrK ES RELATED THREATS T.Unauthorised_Management: An attacker may illegitimately manage the TSF ATTACKS TO THE HARDWARE PLATFORM The assets and the property of the asset which are the targets of the physical attacks to the platform are: Active Authentication Private Key (read), Activation Agent Authentication Reference Data read or manipulation, Initialisation and Personalisation Authentication Reference Data read or manipulation Document Basic Access Key read or manipulation Manipulation to the Authentication Failure Counters
12 TSF Operation (manipulation or bypass) The physical threats to the above assets are given below: T.Probing_on_Data_Storage: An attacker may physically attack to the memories of the TOE to gain illicit access to the TSF data. T.Probing_on_Data_Transfer: An attacker may probe the internals of the TOE to gain illicit access to the TSF data. T.Manipulation_on_Data_Storage: An attacker may physically attack to the memories of the TOE to make changes to the TSF data. T.Manipulation_on_Data_Transfer: An attacker may physically attack to the internals of the TOE to make changes to the TSF data that is transferred between internal parts of the TOE. T.Manipulation_on_Execution: An attacker may physically attack to the TSF code operation to bypass the TSF. T.Manipulation_on_RND: An attacker may physically attack to the random number entropy source to cause the TOE to generate random numbers with insufficient quality LEAKAGE AND EMISSION THREATS T.Information_Leakage_Surface: An attacker may monitor and interpret the emissions emanated from the physical surface of the TOE to disclose the TSF data. T.Information_Leakage_Side_Channel: An attacker may monitor the power consumption, timing of operation and other observables to interpret and get access to the TSF data ENVIRONMENTAL STRESS THREATS T.Environmental_Stress_Application: Attacker may apply temperature, frequency, voltage outside of the standard operating conditions to force the TOE to malfunction FUNCTIONALITY ABUSE THREATS T.Abuse_of_the_Test_Functions: Attacker may try to use the test functions to gain illicit access to the application data THREAT FOR THE FLASH LOADER CONFIGURATION T.Abuse_of_the_Flash_Loader: Attacker may try to load an unauthentic ES to the ES by using the functionality of the Flash Loader. (Applies to the Flash based TOEs)
13 3.4 ASSUMPTIONS A.Personalisation_Agent: It is assumed that the personalisation agent ensures the correctness of the LDS and the Document Basic Access Keys. The personalisation agent generates and signs the Document Security Object correctly. A.Passive_Authentication: It is assumed that the county signing certificate and private keys, document signer certificates and private keys are securely created, distributed and stored. Electronic signature creation and signature verification processes are functioning correctly. A.BAC_Keys_Security: It is assumed that the countries generate the Document Basic Access Keys with sufficient strength. A.Basic_Inspection_System: The Basic Inspection System which has privileges to create secure communication channel with the TOE and read the LDS through this channel and will act in responsive and secure manner. The session keys of the channel and the data read out through the channel will be protected accordingly. A.Security_Management: The subjects that have the privileges of the security roles and the entities that create and write the authentication reference data and any confidential or integrity sensitive data acts responsively. Any authentication reference data that is created outside of the TOE or exported from the TOE is securely protected outside of the TOE.
14 4. SECURITY OBJECTIVES 4.1 SECURITY OBJECTIVES FOR THE TOE APPLICATION SPECIFIC OBJECTIVES OT.Anonymity: The TOE will not disclose any information that can link with the identity of the epassport holder before BAC authentication takes place. OT.BIS_Authentication: The TOE will have BIS authentication mechanism that is compliant with BAC authentication in [5]. OT.Secure_Communication: The TOE will securely communicate (protecting the integrity and confidentiality of the transmitted data) with BIS compliant with [5]. OT.LDS_Access_Control: The TOE will only allow personalisation and initialisation agents to write user data to the TOE. The TOE will allow read access of LDS only to the BIS. The TOE will not allow any write access to the TOE in operational phase. OT.Active_Authentication: The TOE will have active authentication mechanism compliant with [5] to prove its originality. OT.AA_PrK_Protection: The TOE will not allow read or write access to the active authentication private key in operational phase ES RELATED OBJECTIVES OT.Security_Management: The TOE must have activation, initialisation and personalisation management functions and protect these functions from abuse. The TOE will not allow writing the TSF data to the unauthorised entities PROBING, MANIPULATION AND EMISSION THREATS: OT.Phy_Data_Access_Control: The TOE must protect the data stored and processed on the TOE from unauthorized access through physical probing. Access to the memories should only be granted via logical interface which is controlled by the embedded operating system. Unauthorized physical access covers the physical probing which may be performed by an attacker. OT.Data_Integrity: The TOE must detect the physical manipulation of the data stored on the TOE. OT.Internal_TOE_Transfer_Confidentiality_Protection: The TOE must protect the confidentiality of the data transferred between internal parts of the TOE from probing. OT.Internal_TOE_Transfer_Integrity_Protection: The TOE must protect the integrity of the transferred data between internal parts of the TOE.
15 OT.TSF_Operation_Protection: The TOE must have functionality to protect against any manipulation to the TSF operation. OT.Random_Number_Generation_Protection: The TOE must have functionality to protect the number random number generation functionality ENVIRONMENTAL STRESS THREATS OT.Environmental_Stress_Protection: The TOE must have mechanism(s) to protect the TSF from environmental stress LEAKAGE THREATS OT.Side_Channel_Protection: The TOE must have protection against T.Information_Leakage_Side_Channel ABUSE OF THE FUNCTIONALITY OT.Test_Functions_Disable_Mechanism: The TOE must have mechanism allowing the manufacturer to irreversibly disable the test functionality UNIQUE IDENTIFICATION OT.Unique_ID_Storage: The TOE must have functionality to store Unique Identification Data. This data should only be writable by the manufacturer. ADDITIONAL OBJECTIVES FOR THE FLASH LOADER CONFIGURATION OT.Flash_Loader_Functionality: The TOE must have embedded operating system loading functionality. OT.Flash_Loader_Authorization: The TOE must allow only authenticated entities to use the flash loader. OT.Flash_Loader_Disable_Mechanism: The TOE must have mechanism allowing the manufacturer and/or the card issuer to irreversibly disable the flash loader functionality. 4.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT OE.Personalisation_Agent: It is assumed that the personalisation agent ensures the correctness of the LDS and the Document Basic Access Keys. The personalisation agent generates and signs the Document Security Object correctly.
16 OE.Passive_Authentication: The country signing certificate and private keys, document signer certificates and private keys are securely created, distributed and stored. Electronic signature creation and signature verification processes are functioning correctly. OE.BAC_Keys_Security: The countries will generate the Document Basic Access Keys with sufficient strength. OE.Basic_Inspection_System: The Basic Inspection System which has privileges to create secure communication channel with the TOE and read the LDS through this channel and will act in responsive and secure manner. The session keys of the channel and the data read out through the channel will be protected accordingly. The Basic Inspection System will use the Active Authentication process. OE.Security_Management: The subjects that have the privileges of the security roles and the entities that create and write the authentication reference data and any confidential or integrity sensitive data acts responsively. Any authentication reference data that is created outside of the TOE or exported from the TOE is securely protected outside of the TOE. OE.Test_Functions_Disable: The manufacturer must ensure that for every TOE before delivery, test functionality has been disabled. OE.Unique_Identification: The manufacturer must use the unique ID storage mechanism of the TOE properly. The manufacturer must ensure that IDs written to the TOEs are unique. ADDITIONAL OBJECTIVES FOR THE FLASH LOADER CONFIGURATION OE.Flash_Loader_Disable: Depending on the life-cycle of the TOE, whether the manufacturer or the card issuer must ensure that any TOE that will be delivered; the flash loader functionality had been disabled.
17 l Common Criteria Protection Profile Draft Version 1.0, 21th May SECURITY OBJECTIVES RATIONALE SECURITY OBJECTIVES RATIONALE TABLE OT.Anonymity OT.BIS_Authentication OT.Secure_Communication OT.LDS_Access_Control OT.Active_Authentication OT.AA_PrK_Protection OT.Security_Management OT.Phy_Data_Access_Contro OT.Data_Integrity 1. P.BAC 2. P.AA 3. P.Security_Management 4. P.IC_Unique_Identification_Data 5. T.Anonymity_of_the_Holder 6. T.Unauthorised_Access_to_the_LDS 7. T.Communication 8. T.Act_Life_BIS 9. T.Cloning 10. T.AA_Key_Disclose 11. T.Unauthorized_Management 12. T.Probing_on_Data_Storage 13. T.Probing_on_Data_Transfer 14. T.Manipulation_on_Data_Storage 15. T.Manipulation_on_Data_Transfer 16. T.Manipulation_on_Execution 17. T.Manipulation_on_RND 18. T.Information_Leakage_Surface 19. T.Information_Leakage_Side_Channel 20. T.Environmental_Stress_Application 21. T.Abuse_of_the_Test_Functions 22. A.Personalisation_Agent 23. A.Passive_Authentication 24. A.BAC_Keys_Security 25. A.Basic_Inspection_System 26. A.Security_Management OT.Internal_TOE_Transfer_C onfidentiality_protection OT.Internal_TOE_Transfer_In tegrity_protection OT.TSF_Operation_Protectio n OT.Random_Number_Gener ation_protection OT.Environmental_Stress_Pr otection OT.Side_Channel_Protection OT.Test_Functions_Disable_ Mechanism OT.Unique_ID_Storage OE.Personalisation_Agent OE.Passive_Authentication OE.BAC_Keys_Security OE.Basic_Inspection_System OE.Security_Management OE.Test_Functions_Disable OE.Unique_Identification Table 1: Security Objectives Rationale
18 Additional Rationale for the Flash Loader Configuration 1. P.Embedded_OS_Load OT.Flash_Loader_Functionality 2. T.Abuse_of_the_Flash_Loader OT.Flash_Loader_Authorization, OT.Flash_Loader_Disable_Mechanism, OE.Flash_Loader_Disable Table 2: Additional Rationale for the Flash Loader SECURITY OBJECTIVES JUSTIFICATION P.BAC The OT.BIS_Authentication and OT.Secure_Communication define the BIS authentication and secure communication between the BIS and the TOE as stated in P.BAC. OT.BIS_Authentication and OT.Secure_Communication cover the policy. Security Objectives: OT.BIS_Authentication, OT.Secure_Communication P.AA The OT.Active_Authentication reflect the P.AA as it is. Security Objective: OT.Active_Authentication P.Security_Management The OT.Security_Management cover the P.Security_Management. Security Objective: OT.Security_Management P.IC_Unique_Identification_Data OT.Unique_ID_Storage enables the TOE to have ID storage capability and OE.Unique_Identification requires that manufacturer creates a unique identification data for the TOE and writes it to the TOE before delivery to the card issuer. So OT.Unique_ID_Storage and OE.Unique_Identification cover the P.IC_Unique_Identification_Data Security Objectives: OT.Unique_ID_Storage, OE.Unique_Identification P.Embedded_OS_Load OT.Flash_Loader_Functionality covers the policy P.Embedded_OS_Load.
19 Security Objective: OT.Flash_Loader_Functionality T.Anonymity_of_the_Holder The OT.Anonymity prevents the leakage of any information that can be linked to the epassport holder and so cover the threat. Security Objective: OT.Anonymity T.Unauthorised_Access_to_the_LDS OT.LDS_Access_Control defines who can access to the LDS and prevents from any unauthorised access to the LDS. Security Objectives: OT.LDS_Access_Control T.Communication OT.Secure_Communication and OE.Basic_Inspection_System together perform the secure communication between the TOE and the BIS and protect the communication channel from eavesdropping and manipulation attacks. Security Objectives: OT.Secure_Communication, OE.Basic_Inspection_System T.Act_Life_BIS OT.BIS_Authentication provides the authentication of the BIS and protects from attacks BIS masquareding attacks. OE.BAC_Keys_Security provides the security of the authentication reference data used to authenticate the BIS. Security Objectives: OT.BIS_Authentication, OE.BAC_Keys_Security T.Cloning: Active authentication mechanism prevents the TOE from cloning. OE.Basic_Inspection_System uses the mechanism to verify the originality of the TOE and OT.Active_Authentication enables the mechanism in the TOE. Security Objectives: OT.Active_Authentication, OE.Basic_Inspection_System T.AA_Key_Disclose: OT.AA_PrK_Protection protects the active authentication key from attacker accessing through the logical interface.
20 Security Objectives: OT.AA_PrK_Protection T.Unauthorized_Management: OT.Security_Management puts the management functions and management roles and necessary authentication mechanisms in place. OE.Security_Management protects the authentication reference data of the authentication mechanisms. So the objectives OT.Security_Management and OE.Security_Management address the threat. Security Objectives: OT.Security_Management, OE.Security_Management T.Probing_On_Data_Storage OT.Phy_Data_Access_Control protects the data stored and processed on the TOE from physical probing; and so the objective OT.Phy_Data_Access_Control counters the threat T.Probing_On_Data_Storage. Security Objective: OT.Phy_Data_Access_Control T.Probing_on_Data_Transfer OT.Internal_TOE_Transfer_Confidentiality_Protection protects the confidentiality of the transferred data between internals of the TOE; and so it covers the threat T.Probing_on_Data_Transfer. Security Objective: OT.Internal_TOE_Transfer_Confidentiality_Protection T.Manipulation_on_Data_Storage OT.Data_Integrity protects the integrity of the data stored and processed on the TOE from physical manipulation. And the OT.Phy_Data_Access_Control protects against reading the data, prevents the attacker knowing the physical location and content of the data. So with OT.Phy_Data_Access_Control, even if OT.Data_Integrity does not exist; an attacker may manipulate the data and can not foresee the changes he or she makes. OT.Data_Integrity and OT.Phy_Data_Access_Control cover this threat. Security Objective: OT.Phy_Data_Access_Control, OT.Data_Integrity T.Manipulation_on_Data_Transfer OT.Internal_TOE_Transfer_Integrity_Protection protects the integrity of the data transferred between internal parts of the TOE from physical manipulation. And the OT.Internal_TOE_Transfer_Confidentiality_Protection prevents the attacker from compromising the data in transfer so making reasonable changes is not possible. So with OT.Internal_TOE_Transfer_Confidentiality_Protection, even if OT.Internal_TOE_Transfer_Integrity_Protection does not exist; an attacker may manipulate the data and can
21 not foresee the changes he or she makes. OT.Internal_TOE_Transfer_Confidentiality_Protection and OT.Internal_TOE_Transfer_Integrity_Protection cover this threat. Security Objectives: OT.Internal_TOE_Transfer_Integrity_Protection, OT.Internal_TOE_Transfer_Confidentiality_Protection T.Manipulation_on_Execution OT.TSF_Operation_Protection protects the CPU operations from manipulation. So the objective OT.TSF_Operation_Protection covers T.Manipulation_on_Execution. Security Objective: OT.TSF_Operation_Protection T.Manipulation_on_RND OT.Random_Number_Generation_Protection protects the Random Number Generation functionality from manipulation. So the objective OT.Random_Number_Generation_Protection covers T.Manipulation_on_RND. Security Objective: T.Manipulation_on_RND T.Information_Leakage_Surface OT.Internal_TOE_Transfer_Confidentiality_Protection, protects the confidentiality of the transferred data, so interpretation of the emissions is not possible. OT.Internal_TOE_Transfer_Confidentiality_Protection covers this threat. Security Objective: OT.Internal_TOE_Transfer_Confidentiality_Protection T.Information_Leakage_Side_Channel OT.Side_Channel_Protection covers the threat T.Information_Leakage_Side_Channel. Security Objective: OT.Side_Channel_Protection T.Environmental_Stress_Application OT.Environmental_Stress_Protection covers the T.Environmental_Stress_Application. Security Objective: OT.Environmental_Stress_Protection T.Abuse_of_the_Test_Functions OT.Test_Functions_Disable_Mechanism and OE.Test_Functions_Disable cover the threat.
22 Security Objective: OT.Test_Functions_Disable_Mechanism, OE.Test_Functions_Disable T.Abuse_of_the_Flash_Loader OT.Flash_Loader_Authorization prevents the usage of Flash Loader by unauthorized entities, so even if during delivery or within the card issuer facility attacker accesses to the TOE, he or she will not be able to use the flash loader to load an unauthentic embedded operating system. OT.Flash_Loader_Disable_Mechanism enables the manufacturer or the card issuer to disable the flash loader functionality irreversebly. OE.Flash_Loader_Disable declares that the manufacturer or the card issuer (depending on the life-cycle model) to disable the flash loader before delivery from their facility. So the objectives OT.Flash_Loader_Authorization, OT.Flash_Loader_Disable_Mechanism, and OE.Flash_Loader_Disable together covers this threat. Security Objective: OT.Flash_Loader_Authorization, OT.Flash_Loader_Disable_Mechanism, OE.Flash_Loader_Disable A.Personalisation_Agent OE.Personalisation_Agent covers the assumption. Security Objective: OE.Personalisation_Agent A.Passive_Authentication OE.Passive_Authentication covers the assumption. Security Objective: OE.Passive_Authentication A.BAC_Keys_Security OE.BAC_Keys_Security covers the assumption. Security Objective: OE.BAC_Keys_Security A.Basic_Inspection_System OE.Basic_Inspection_System covers the assumption. Security Objective: OE.Basic_Inspection_System A.Security_Management OE.Security_Management covers the assumption. Security Objective: OE.Security_Management
23
24 5. EXTENDED COMPONENTS Following components are added: FCS_RND.1 FIA_POI.1 FPT_SCP CLASS FCS CRYPTOGRAPHIC SUPPORT FAMILY FCS_RND GENERATION OF RANDOM NUMBERS Family behavior This family defines quality requirements for the generation of random numbers which are intended to be used for cryptographic purposes. Component leveling: FCS_RND.1 Generation of random numbers requires that random numbers meet a defined quality metric. Management: FCS_RND.1 There are no management activities foreseen. Audit: FCS_RND.1 There are no actions defined to be auditable. FCS_RND.1 FCS_RND.1.1 Quality metric for random numbers No dependencies. The TSF shall provide a mechanism to generate random numbers that meet [assignment: a defined quality metric]. 5.2 DEFINITION OF THE FAMILY FIA_POI FIA_POI ABILITY TO PROVE ITS OWN IDENTITY Family Behavior: This family requires that the TOE has ability to prove its own identity to the external entities. Component Leveling
25 FIA_POI Ability to Prove Its Own Identity 1 FIA_POI.1 Ability to Prove Its Own Identity Management: FIA_POI.1 The following actions could be considered for the management functions in FMT: a) management of authentication data by an administrator Audit: FIA_POI.1 a) Minimal: The final decision on authentication; FIA_POI.1 Ability to Prove Its Own Identity No other components No dependencies FIA_POI.1.1 The TSF shall provide a [assignment: authentication mechanism] to prove the identity of the [assignment: authorized user or role] to the [assignment: external entity]. 5.3 CLASS FPT PROTECTION OF THE TSF FAMILY FPT_SCP SIDE CHANNEL PROTECTION The TOE shall prevent attacks against the TOE and other secret data where the attack is based on external observable physical phenomena of the TOE. Examples of such attacks are evaluation of TOE s simple power analysis (SPA), differential power analysis (DPA), timing attacks, etc. This family describes the functional requirements for the limitation of intelligible emanations which are not directly addressed by any other component of CC part 2. The family Side Channel Protection (FPT_SCP) is specified as follows. Family behavior: This family defines requirements to mitigate information leakage through time and power analysis. Component leveling:
26 FPT_SCP: Side Channel Protection 1 FPT_SCP.1 Side channel protection requires to not emit interface emanation enabling access to TSF data or user data. Management: FPT_SCP.1 There are no management activities foreseen. Audit: FPT_SCP.1 There are no actions defined to be auditable. FPT_SCP.1 Side Channel Protection FPT_SCP.1 No dependencies. The TSF shall ensure [assignment: type of users] are unable to use the following interface [assignment: type of connection] to gain access to [assignment: list of types of TSF data] and [assignment: list of types of user data].
27 6. SECURITY REQUIREMENTS 6.1 SECURITY FUNCTIONAL REQUIREMENTS LOGICAL DATA ACCESS CONTROL Logical data access control is covered by two policies: Pre-Operational Data Access Control Policy and epassport Data Access Control Policy.. Pre-operational data access control policy is the policy that enables the activation, initialisation and personalisation of the TOE. Application data access control policy is active during operational phase and consists of rules of the application PRE-OPERATIONAL DATA ACCESS CONTROL POLICY Pre-operational data access policy is related with the embedded operating system; this policy protects the application data during pre-operational phases. FDP_ACC.1/Pre-Operational Subset access control Pre-Operational Access Control No other components FDP_ACC.1.1 FDP_ACF.1 Security attribute based access control fulfilled by FDP_ACF.1/Pre-Operational The TSF shall enforce the Pre-Operational Data Access Control SFP 6 on attacker, initialization agent, personalisation agent, LDS and read, write, delete operations 7. FDP_ACF.1/Pre-Operational Security attribute based access control Pre-Operational Access Control FDP_ACC.1 Subset access control fulfilled by FDP_ACC.1/Pre-Operational FMT_MSA.3 Static attribute initialization not fulfilled but justified FDP_ACF.1.1 FDP_ACF.1.2 The TSF shall enforce the Pre-Operational Data Access Control SFP 8 to objects based on the following: initialization agent, personalisation agent, LDS, subject identity and lifecycle phase 9. The TSF shall enforce the following rules to determine if an operation among controlled subjects and controlled objects is allowed: if the life-cycle phase is at initialisation phase and the subject is initialisation agent access to the LDS is granted if the life-cycle phase is at personalisation phase and the subject is personalisation agent access to the LDS is granted [assignment: access control SFP] 7 [assignment: list of subjects, objects, and operations among subjects and objects covered by the SFP] 8 [assignment: access control SFP] 9 [assignment: list of subjects and objects controlled under the indicated SFP, and for each, the SFP-relevant security attributes, or named groups of SFP-relevant security attributes]
28 FDP_ACF.1.3 FDP_ACF.1.4 The TSF shall explicitly authorise access of subjects to objects based on the following additional rules: none 11. The TSF shall explicitly deny access of subjects to objects based on the following additional rules: none EPASSPORT DATA ACCESS CONTROL POLICY When the TOE is in the operational phase the epassport data access control policy (BAC policy) will be active. Writing to the LDS will not be allowed, read access will be granted only to the BIS. FDP_ACC.1/BAC Subset access control Basic Access Control No other components FDP_ACC.1.1 FDP_ACF.1 Security attribute based access control fulfilled by FDP_ACF.1/Application The TSF shall enforce the Basic Access Control SFP 13 on BIS, LDS, and read, write, delete operations 14. FDP_ACF.1/BAC Security attribute based access control Basic Access Control FDP_ACC.1 Subset access control fulfilled by FDP_ACC.1/Application FMT_MSA.3 Static attribute initialization not fulfilled but justified FDP_ACF.1.1 FDP_ACF.1.2 The TSF shall enforce the Basic Access Control SFP 15 to objects based on the following: BIS, LDS, subject identity and lifecycle phase 16. The TSF shall enforce the following rules to determine if an operation among controlled subjects and controlled objects is allowed: [assignment: rules governing access among controlled subjects and controlled objects using controlled operations on controlled objects] [assignment: rules governing access among controlled subjects and controlled objects using controlled operations on controlled objects] 11 [assignment: rules, based on security attributes, that explicitly authorise access of subjects to objects] 12 [assignment: rules, based on security attributes, that explicitly deny access of subjects to objects] 13 [assignment: access control SFP] 14 [assignment: list of subjects, objects, and operations among subjects and objects covered by the SFP] 15 [assignment: access control SFP] 16 [assignment: list of subjects and objects controlled under the indicated SFP, and for each, the SFP-relevant security attributes, or named groups of SFP-relevant security attributes] 17 [assignment: rules governing access among controlled subjects and controlled objects using controlled operations on controlled objects]
29 FDP_ACF.1.3 FDP_ACF.1.4 The TSF shall explicitly authorise access of subjects to objects based on the following additional rules: none 18. The TSF shall explicitly deny access of subjects to objects based on the following additional rules: none PHYSICAL DATA ACCESS CONTROL POLICY Probing threat can be modelled as the attacker tries to access to the physical memories and/or tries to monitor data traffic between the internal parts of the TOE. The security objectives Data Access Control, and Internal TOE Transfer Confidentiality Protection states that the TOE should provide protection against this kind of threat. These objectives can be achieved by the enforcement of the Physical Data Access Policy which briefly states: The TSF shall not allow only the attacker to physically access all data stored on memories and transmitted between internal parts of the TOE. Physical Data Access Policy is enforced by the three SFRs: FDP_ACC.1/Physical, FDP_ACF.1/Physical and FDP_ITT.1. Both FDP_ACF.1 and FDP_ITT.1 are performing the denial of access to the attacker by encrypting the data and allowing access to the embedded operating system by decrypting it. So they depend on the cryptographic operations (key generation, encryption and decryption, key destruction). FCS_CKM.1, FCS_CKM.4 and FCS_COP.1 is also added to the Protection against Probing SFRs. FDP_ACC.1/Physical Subset access control Physical Access Control No other components FDP_ACC.1.1 FDP_ACF.1 Security attribute based access control fulfilled by FDP_ACF.1/Physical The TSF shall enforce the Physical Data Access Control SFP 20 on attacker, application data and physical access 21. FDP_ACF.1/Physical Security attribute based access control FDP_ACC.1 Subset access control fulfilled by FDP_ACC.1/Physical FMT_MSA.3 Static attribute initialisation not fulfilled but justified FDP_ACF.1.1 The TSF shall enforce the Physical Data Access Control SFP 22 to objects based on the following: Attacker and Application Data, type of user] [assignment: rules, based on security attributes, that explicitly authorise access of subjects to objects] 19 [assignment: rules, based on security attributes, that explicitly deny access of subjects to objects] 20 [assignment: access control SFP] 21 [assignment: list of subjects, objects, and operations among subjects and objects covered by the SFP] 22 [assignment: access control SFP]
30 FDP_ACF.1.2 The TSF shall enforce the following rules to determine if an operation among controlled subjects and controlled objects is allowed: Physical access is not allowed to the attacker 24 FDP_ACF.1.3 FDP_ACF.1.4 The TSF shall explicitly authorise access of subjects to objects based on the following additional rules: none 25. The TSF shall explicitly deny access of subjects to objects based on the following additional rules: if the subject is attacker the physical access is explicitly denied. 26 FDP_ITT.1 Basic internal transfer protection FDP_ITT.1.1 [FDP_ACC.1 Subset access control, or FDP_IFC.1 Subset information flow control] fulfilled by FDP_ACC.1/Physical The TSF shall enforce the Physical Data Access Policy 27 to prevent the disclosure, and modification 28 of user data when it is transmitted between physically-separated parts of the TOE. FDP_ITT.1 also prevents any confidential data leak through emanations through the physical surface of the IC CRYPTOGRAPHIC SUPPORT TO DATA ACCESS CONTROL AND TRANSFER PROTECTION FCS_CKM.1/SP Cryptographic key generation Storage Protection [FCS_CKM.2 Cryptographic key distribution, or FCS_COP.1 Cryptographic operation] fulfilled by FCS_COP.1/SP FCS_CKM.4 Cryptographic key destruction fulfilled by FCS_CKM.4 FCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] 29 and specified 23 [assignment: list of subjects and objects controlled under the indicated SFP, and for each, the SFP-relevant security attributes, or named groups of SFP-relevant security attributes] 24 [assignment: rules governing access among controlled subjects and controlled objects using controlled operations on controlled objects] 25 [assignment: rules, based on security attributes, that explicitly authorise access of subjects to objects] 26 [assignment: rules, based on security attributes, that explicitly deny access of subjects to objects]. 27 [assignment: access control SFP(s) and/or information flow control SFP(s)] 28 [selection: disclosure, modification, loss of use] 29 [assignment: cryptographic key generation algorithm]
31 cryptographic key sizes [assignment: cryptographic key sizes] 30 that meet the following: [assignment: list of standards] 31. FCS_CKM.1/TP Cryptographic key generation Transfer Protection [FCS_CKM.2 Cryptographic key distribution, or FCS_COP.1 Cryptographic operation] fulfilled by FCS_COP.1/TP FCS_CKM.4 Cryptographic key destruction fulfilled by FCS_CKM.4 FCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] 32 and specified cryptographic key sizes [assignment: cryptographic key sizes] 33 that meet the following: [assignment: list of standards] 34. FCS_CKM.4/IC Cryptographic key destruction [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] fulfilled by FCS_CKM.1 FCS_CKM.4.1 The TSF shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method [assignment: cryptographic key destruction method] 35 that meets the following: [assignment: list of standards] 36. FCS_COP.1/SP Cryptographic operation Storage Protection [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] fulfilled by FCS_CKM.1/SP FCS_CKM.4 Cryptographic key destruction fulfilled by FCS_CKM.4 30 [assignment: cryptographic key sizes] 31 [assignment: list of standards] 32 [assignment: cryptographic key generation algorithm] 33 [assignment: cryptographic key sizes] 34 [assignment: list of standards] 35 [assignment: cryptographic key destruction method] 36 [assignment: list of standards]
32 FCS_COP.1.1 The TSF shall perform encryption and decryption 37 in accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm] 38 and cryptographic key sizes [assignment: cryptographic key sizes] 39 that meet the following: [assignment: list of standards] 40. FCS_COP.1/TP Cryptographic operation Transfer Protection [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] fulfilled by FCS_CKM.1/TP FCS_CKM.4 Cryptographic key destruction fulfilled by FCS_CKM.4 FCS_COP.1.1 The TSF shall perform encryption and decryptio 41 in accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm] 42 and cryptographic key sizes [assignment: cryptographic key sizes] 43 that meet the following: [assignment: list of standards] 44. FPT_SCP.1/IC Side Channel Protection No dependencies. FPT_SCP.1 The TSF shall ensure attackers 45 are unable to use the following interface physical contacts 46 to gain access to Data Storage Protection keys, Data Transfer Protection keys 47 and Stored Data and Transferred Data SECURE COMMUNICATION FDP_UCT.1 Basic Data Exchange Confidentiality 37 [assignment: list of cryptographic operations] 38 [assignment: cryptographic algorithm] 39 [assignment: cryptographic key sizes] 40 [assignment: list of standards] 41 [assignment: list of cryptographic operations] 42 [assignment: cryptographic algorithm] 43 [assignment: cryptographic key sizes] 44 [assignment: list of standards] 45 [assignment: type of users] 46 [assignment: type of connection] 47 [assignment: list of types of TSF data] 48 [assignment: list of types of user data]
33 No other components [FTP_ITC.1 Inter-TSF trusted channel, or FTP_TRP.1 Trusted path] not fulfilled but justified [FDP_ACC.1 Subset access control, or FDP_IFC.1 Subset information flow control] fulfilled by FDP_ACC.1/BAC FDP_UCT.1.1 The TSF shall enforce the Basic Access Control SFP 49 to transmit and receive 50 user data in a manner protected from unauthorised disclosure. FDP_UIT.1 Data Exchange Integrity No other components [FDP_ACC.1 Subset access control, or FDP_IFC.1 Subset information flow control] fulfilled by FDP_ACC.1/BAC [FTP_ITC.1 Inter-TSF trusted channel, or FTP_TRP.1 Trusted path] not fulfilled but justified FDP_UIT.1.1 FDP_UIT.1.2 The TSF shall enforce the Basic Access Control SFP 51 to transmit and receive 52 user data in a manner protected from [selection: modification, deletion, insertion, replay] 53 errors. The TSF shall be able to determine on receipt of user data, whether modification, deletion, insertion and replay 54 has occurred CLASS FIA IDENTIFICATION AND AUTHENTICATION OT.ANONYMITY FIA_UID.1/Operational Timing of identification FIA_UID.1.1 FIA_UID.1.2 No dependencies. The TSF shall allow none 55 on behalf of the user to be performed before the user is identified. The TSF shall require each user to be successfully identified before allowing any other TSFmediated actions on behalf of that user. 49 [assignment: access control SFP(s) and/or information flow control SFP(s)] 50 [selection: transmit, receive] 51 [assignment: access control SFP(s) and/or information flow control SFP(s)] 52 [selection: transmit, receive] 53 [selection: modification, deletion, insertion, replay] 54 [selection: modification, deletion, insertion, replay] 55 [assignment: list of TSF-mediated actions]
34 FIA_UAU.1/Operational Timing of authentication FIA_UAU.1.1 FIA_UAU.1.2 FIA_UID.1 Timing of identification fulfilled by FIA_UID.1/Operational The TSF shall allow none 56 on behalf of the user to be performed before the user is authenticated. The TSF shall require each user to be successfully authenticated before allowing any other TSF-mediated actions on behalf of that user. Application Note: The TOE shall not give out any information that can be linked to the identity of the Passport Holder. The TOE will generate a random identifier to initiate the contactless communication OT.ACTIVE_AUTHENTICATION FIA_POI.1 FIA_POI.1.1 Ability to Prove Its Own Identity No other components No dependencies The TSF shall provide an Active Authentication mechanism 57 to prove the identity of the epassport 58 to the BIS ACCESS BEFORE IDENTIFICATION AND AUTHENTICATION FIA_UID.1/Pre-Operational Timing of identification FIA_UID.1.1 FIA_UID.1.2 No dependencies. The TSF shall allow IC Identification data write and read; and Test Functions disable 60 on behalf of the user to be performed before the user is identified. The TSF shall require each user to be successfully identified before allowing any other TSFmediated actions on behalf of that user. 56 [assignment: list of TSF mediated actions] 57 [assignment: authentication mechanism] 58 [assignment: authorized user or role] 59 [assignment: external entity] 60 [assignment: list of TSF-mediated actions]
35 FIA_UAU.1/Pre-Operational Timing of authentication FIA_UAU.1.1 FIA_UAU.1.2 FIA_UID.1 Timing of identification fulfilled by FIA_UID.1 The TSF shall allow IC Identification data write and read; Test Functions disable 61 on behalf of the user to be performed before the user is authenticated. The TSF shall require each user to be successfully authenticated before allowing any other TSF-mediated actions on behalf of that user AUTHENTICATION MECHANISMS FIA_UAU.4 Single-use authentication mechanisms No dependencies. FIA_UAU.4.1 The TSF shall prevent reuse of authentication data related to BIS Authentication Mechanism 62 FIA_UAU.5 Multiple authentication mechanisms FIA_UAU.5.1 No dependencies. The TSF shall provide Flash Loader Authentication Mechanism* Activation Agent Authentication Mechanism Initialisation Agent Authentication Mechanism Personalisation Agent Authentication Mechanism BIS Authentication Mechanism 63 to support user authentication. FIA_UAU.5.2 The TSF shall authenticate any user's claimed identity according to the Flash Loader Authentication Mechanism authenticates the Card Issuer or the Manufacturer* Activation Agent authenticates mechanism the Activation Agent Initialisation Agent Authentication mechanism authenticates the Initialisation Agent Personalisation Agent Authentication mechanism authenticates the Personalisation Agent BIS Authentication mechanism authenticates the BIS [assignment: list of TSF mediated actions] 62 [assignment: identified authentication mechanism(s)] 63 [assignment: list of multiple authentication mechanisms]
36 *Application Note: Flash loader authentication mechanism exists only for the flash loader configuration AUTHENTICATION FAILURE HANDLING FIA_AFL.1/BAC Authentication failure handling FIA_AFL.1.1 FIA_AFL.1.2 FIA_UAU.1 Timing of authentication fulfilled by FIA_UAU.1 The TSF shall detect when [selection: [assignment: positive integer number], an administrator configurable positive integer within [assignment: range of acceptable values]] 65 unsuccessful authentication attempts occur related to BIS Authentication 66. When the defined number of unsuccessful authentication attempts has been [selection: met, surpassed] 67, the TSF shall [assignment: list of actions] 68. FIA_AFL.1/Activation Authentication failure handling FIA_AFL.1.1 FIA_AFL.1.2 FIA_UAU.1 Timing of authentication fulfilled by FIA_UAU.1 The TSF shall detect when [selection: [assignment: positive integer number], an administrator configurable positive integer within [assignment: range of acceptable values]] 69 unsuccessful authentication attempts occur related to Activation Agent Authentication 70. When the defined number of unsuccessful authentication attempts has been [selection: met, surpassed] 71, the TSF shall [assignment: list of actions] 72. FIA_AFL.1/Initialisation Authentication failure handling 64 assignment: rules describing how the multiple authentication mechanisms provide authentication] 65 [selection: [assignment: positive integer number], an administrator configurable positive integer within [assignment: range of acceptable values]] 66 [assignment: list of authentication events] 67 [selection: met, surpassed] 68 [assignment: list of actions] 69 [selection: [assignment: positive integer number], an administrator configurable positive integer within [assignment: range of acceptable values]] 70 [assignment: list of authentication events] 71 [selection: met, surpassed] 72 [assignment: list of actions]
37 FIA_AFL.1.1 FIA_AFL.1.2 FIA_UAU.1 Timing of authentication fulfilled by FIA_UAU.1 The TSF shall detect when [selection: [assignment: positive integer number], an administrator configurable positive integer within [assignment: range of acceptable values]] 73 unsuccessful authentication attempts occur related to Initialisation Agent Authentication 74. When the defined number of unsuccessful authentication attempts has been [selection: met, surpassed] 75, the TSF shall [assignment: list of actions] 76. FIA_AFL.1/Personalisation Authentication failure handling FIA_AFL.1.1 FIA_AFL.1.2 FIA_UAU.1 Timing of authentication fulfilled by FIA_UAU.1 The TSF shall detect when [selection: [assignment: positive integer number], an administrator configurable positive integer within [assignment: range of acceptable values]] 77 unsuccessful authentication attempts occur related to Personalisation Agent Authentication 78. When the defined number of unsuccessful authentication attempts has been [selection: met, surpassed] 79, the TSF shall [assignment: list of actions] 80. FIA_AFL.1/Flash Authentication failure handling* (See below Application Note) FIA_AFL.1.1 FIA_AFL.1.2 FIA_UAU.1 Timing of authentication fulfilled by FIA_UAU.1 The TSF shall detect when [selection: [assignment: positive integer number], an administrator configurable positive integer within [assignment: range of acceptable values]] 81 unsuccessful authentication attempts occur related to Flash Loader Authentication 82. When the defined number of unsuccessful authentication attempts has been [selection: met, surpassed] 83, the TSF shall [assignment: list of actions] 84. *Application Note: Present only for flash loader configuration 73 [selection: [assignment: positive integer number], an administrator configurable positive integer within [assignment: range of acceptable values]] 74 [assignment: list of authentication events] 75 [selection: met, surpassed] 76 [assignment: list of actions] 77 [selection: [assignment: positive integer number], an administrator configurable positive integer within [assignment: range of acceptable values]] 78 [assignment: list of authentication events] 79 [selection: met, surpassed] 80 [assignment: list of actions] 81 [selection: [assignment: positive integer number], an administrator configurable positive integer within [assignment: range of acceptable values]] 82 [assignment: list of authentication events] 83 [selection: met, surpassed] 84 [assignment: list of actions]
38 6.1.5 CLASS FMT SECURITY MANAGEMENT MANAGEMENT OF TSF DATA FMT_MTD.1/AA_PrK_Write Management of TSF data Writing of Active Authentication Private Key FMT_SMR.1 Security roles fulfilled by FMT_SMR.1 FMT_SMF.1 Specification of Management Functions fulfilled by FMT_SMF.1 FMT_MTD.1.1 The TSF shall restrict the ability to write 85 the Active Authentication Private Key 86 to the Initialisation and Personalisation Agents 87. FMT_MTD.1/AA_PrK_Read Management of TSF data Reading of Active Authentication Private Key FMT_SMR.1 Security roles fulfilled by FMT_SMR.1 FMT_SMF.1 Specification of Management Functions fulfilled by FMT_SMF.1 FMT_MTD.1.1 The TSF shall restrict the ability to read 88 the Active Authentication Private Key 89 to the none 90. FMT_MTD.1/DBAK_Write Management of TSF data Reading of Document Basic Access Keys FMT_SMR.1 Security roles fulfilled by FMT_SMR.1 FMT_SMF.1 Specification of Management Functions fulfilled by FMT_SMF.1 FMT_MTD.1.1 The TSF shall restrict the ability to write 91 the Document Basic Access Keys 92 to the Initialisation and Personalisation Agents 93. FMT_MTD.1/DBAK_Read Management of TSF data Reading of Document Basic Access Keys 85 [selection: change_default, query, modify, delete, clear, [assignment: other operations]] 86 [assignment: list of TSF data] 87 [assignment: the authorised identified roles] 88 [selection: change_default, query, modify, delete, clear, [assignment: other operations]] 89 [assignment: list of TSF data] 90 [assignment: the authorised identified roles] 91 [selection: change_default, query, modify, delete, clear, [assignment: other operations]] 92 [assignment: list of TSF data] 93 [assignment: the authorised identified roles]
39 FMT_SMR.1 Security roles fulfilled by FMT_SMR.1 FMT_SMF.1 Specification of Management Functions fulfilled by FMT_SMF.1 FMT_MTD.1.1 The TSF shall restrict the ability to read 94 the Document Basic Access Keys 95 to the none 96. FMT_MTD.1/Ini_Per_Data_Write Management of TSF data Writing of Initialisation and Personalisation Data FMT_SMR.1 Security roles fulfilled by FMT_SMR.1 FMT_SMF.1 Specification of Management Functions fulfilled by FMT_SMF.1 FMT_MTD.1.1 The TSF shall restrict the ability to write 97 the Initialisation and Personalisation Agent Authentication Reference Data 98 to the Activation Agent 99. FMT_MTD.1/Ini_Per_Data_Read Management of TSF data Reading of Initialisation and Personalisation Data FMT_SMR.1 Security roles fulfilled by FMT_SMR.1 FMT_SMF.1 Specification of Management Functions fulfilled by FMT_SMF.1 FMT_MTD.1.1 The TSF shall restrict the ability to read 100 the Initialisation and Personalisation Agent Authentication Reference Data 101 to the none ABUSE OF THE TEST FUNCTIONS FMT_MOF.1/Test Management of security functions behaviour FMT_SMR.1 Security roles fulfilled by FMT_SMR.1 FMT_SMF.1 Specification of Management Functions fulfilled by FMT_SMF.1 94 [selection: change_default, query, modify, delete, clear, [assignment: other operations]] 95 [assignment: list of TSF data] 96 [assignment: the authorised identified roles] 97 [selection: change_default, query, modify, delete, clear, [assignment: other operations]] 98 [assignment: list of TSF data] 99 [assignment: the authorised identified roles] 100 [selection: change_default, query, modify, delete, clear, [assignment: other operations]] 101 [assignment: list of TSF data] 102 [assignment: the authorised identified roles]
40 FMT_MOF.1.1 The TSF shall restrict the ability to disable 103 the functions the manufacturing test functions 104 to the Manufacturer 105. Refinement: Once test functions are disabled, the TSF should irreversibly and permanently disable the test functions, so that their abuse during the usage of the TOE by embedded OS is not possible IC UNIQUE IDENTIFICATION DATA FMT_MTD.1/ID Management of TSF data - Identification FMT_SMR.1 Security roles fulfilled by FMT_SMR.1 FMT_SMF.1 Specification of Management Functions fulfilled by FMT_SMF.1 FMT_MTD.1.1 The TSF shall restrict the ability to write once 106 the IC Identification Data 107 to the Manufacturer MANAGEMENT FUNCTIONS AND ROLES FMT_SMF.1 FMT_SMF.1.1 Specification of Management Functions No dependencies. The TSF shall be capable of performing the following management functions: Disabling the manufacturing test functions Write once the IC Identification data Embedded OS Loading Embedded OS Loading Locking Activation Initialisation Personalisation 109. Application Note: Embedded OS Loading, Embedded OS Loading Locking is valid for Flash Loader Configuration For the ROM based configuration they do not exist. 103 [selection: determine the behaviour of, disable, enable, modify the behaviour of] 104 [assignment: list of functions] 105 [assignment: the authorised identified roles] 106 [selection: change_default, query, modify, delete, clear, [assignment: other operations]] 107 [assignment: list of TSF data] 108 [assignment: the authorised identified roles] 109 [assignment: list of management functions to be provided by the TSF]
41 FMT_SMR.1 Security roles FMT_SMR.1.1 FIA_UID.1 Timing of identification not fulfilled but justified The TSF shall maintain the roles Manufacturer Activation Agent Initialisation Agent Personalisation Agent 110. FMT_SMR.1.2 The TSF shall be able to associate users with roles ADDITIONAL SFRS FOR THE FLASH LOADER CONFIGURATION FMT_MTD.1/ES Management of TSF data Embedded OS FMT_SMR.1 Security roles fulfilled by FMT_SMR.1 FMT_SMF.1 Specification of Management Functions fulfilled by FMT_SMF.1 FMT_MTD.1.1 The TSF shall restrict the ability to write 111 the Embedded OS 112 to the Manufacturer and the Card Issuer 113. FMT_MOF.1/FL Management of security functions behavior Flash Loader FMT_SMR.1 Security roles fulfilled by FMT_SMR.1 FMT_SMF.1 Specification of Management Functions fulfilled by FMT_SMF.1 FMT_MOF.1.1 The TSF shall restrict the ability to disable 114 the functions Embedded OS Loading 115 to Manufacturer and the Card Issuer CLASS FPT PROTECTION OF THE SECURITY FUNCTIONS 110 [assignment: the authorised identified roles] 111 [selection: change_default, query, modify, delete, clear, [assignment: other operations]] 112 [assignment: list of TSF data] 113 [assignment: the authorised identified roles] 114 [selection: determine the behaviour of, disable, enable, modify the behaviour of] 115 [assignment: list of functions] 116 [assignment: the authorised identified roles]
42 SIDE CHANNEL ATTACKS PROTECTION FPT_SCP.1/Application Side Channel Protection No dependencies. FPT_SCP.1 The TSF shall ensure attackers 117 are unable to use the following interface physical contacts 118 to gain access to Active Authentication Private Key 119 and none TSF TESTING FPT_TST.1 TSF testing FPT_TST.1.1 No dependencies. The TSF shall run a suite of self tests [selection: during initial start-up, periodically during normal operation, at the request of the authorised user, at the conditions [assignment: conditions under which self test should occur]] 121 to demonstrate the correct operation of CPU Operation and Random Number Generator 122. FPT_TST.1.2 The TSF shall provide authorised users with the capability to verify the integrity of TSF data 123. FPT_TST.1.3 The TSF shall provide authorised users with the capability to verify the integrity of TSF ADDITIONAL PROTECTION AGAINST PHYSICAL ATTACKS Memory and bus encryption and also error detection is not sufficient against physical attacks since still attacker may attack to these encryption and error detection mechanisms so additional physical protection is necessary. First of all FPT_PHP.3 is necessary for the protection of the TSF. FPT_PHP.3 Resistance to physical attack No dependencies. 117 [assignment: type of users] 118 [assignment: type of connection] 119 [assignment: list of types of TSF data] 120 [assignment: list of types of user data] 121 [selection: during initial start-up, periodically during normal operation, at the request of the authorised user, at the conditions[assignment: conditions under which self test should occur]] 122 [selection: [assignment: parts of TSF], the TSF] 123 [selection: [assignment: parts of TSF data], TSF data] 124 [selection: [assignment: parts of TSF], TSF]
43 FPT_PHP.3.1 The TSF shall resist physical probing and manipulation 125 to the [assignment: list of TSF devices/elements] 126 by responding automatically such that the SFRs are always enforced PROTECTION FROM ENVIRONMENTAL STRESS FPT_FLS.1 FPT_FLS.1.1 Failure with preservation of secure state No dependencies. The TSF shall preserve a secure state when the following types of failures occur: exposure to operating conditions which may not be tolerated CLASS FCS: CRYPTOGRAPHIC SUPPORT FAMILY CRYPTOGRAPHIC KEY MANAGEMENT (FCS_CKM) FCS_CKM.1/BAC Cryptographic key generation Basic Access Control [FCS_CKM.2 Cryptographic key distribution, or FCS_COP.1 Cryptographic operation] fulfilled by FCS_COP.1/TDES and FCS_COP.1/MAC FCS_CKM.4 Cryptographic key destruction fulfilled by FCS_CKM.4/ES FCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm Document Basic Access Keys Derivation Algorithm 128 and specified cryptographic key sizes that meet the following: [assignment: list of standards] 130. FCS_CKM.4/ES Cryptographic key destruction [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] fulfilled by FCS_CKM [assignment: physical tampering scenarios] 126 [assignment: list of TSF devices/elements] 127 [assignment: list of types of failures in the TSF] 128 [assignment: cryptographic key generation algorithm] 129 [assignment: cryptographic key sizes] 130 [assignment: list of standards]
44 FCS_CKM.4.1 The TSF shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method [assignment: cryptographic key destruction method] 131 that meets the following: [assignment: list of standards] FAMILY CRYPTOGRAPHIC OPERATIONS (FCS_COP) FCS_COP.1/SHA Cryptographic operation Secure Hash Algorithm [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] not fulfilled but justified FCS_CKM.4 Cryptographic key destruction not fulfilled but justified FCS_COP.1.1 The TSF shall perform hash value calculation 133 in accordance with a specified cryptographic algorithm SHA and cryptographic key sizes none 135 that meet the following: [assignment: list of standards] 136. FCS_COP.1/TDES Cryptographic operation Message Encryption and Decryption [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] fulfilled by FCS_CKM.1/BAC FCS_CKM.4 Cryptographic key destruction fulfilled by FCS_CKM.4/ES FCS_COP.1.1 The TSF shall perform encryption and decryption 137 in accordance with a specified cryptographic algorithm Triple-DES in CBC Mode 138 and cryptographic key sizes 112 bit 139 that meet the following: [assignment: list of standards] 140. FCS_COP.1/MAC Cryptographic operation Message Encryption and Decryption 131 [assignment: cryptographic key destruction method] 132 [assignment: list of standards] 133 [assignment: list of cryptographic operations] 134 [assignment: cryptographic algorithm] 135 [assignment: cryptographic key sizes] 136 [assignment: list of standards] 137 [assignment: list of cryptographic operations] 138 [assignment: cryptographic algorithm] 139 [assignment: cryptographic key sizes] 140 [assignment: list of standards]
45 [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] fulfilled by FCS_CKM.1/BAC FCS_CKM.4 Cryptographic key destruction fulfilled by FCS_CKM.4/ES FCS_COP.1.1 The TSF shall perform message authentication 141 in accordance with a specified cryptographic algorithm Retail MAC 142 and cryptographic key sizes 112 bit 143 that meet the following: [assignment: list of standards] 144. FCS_COP.1/AA Cryptographic operation Active Authentication [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] not fulfilled but justified FCS_CKM.4 Cryptographic key destruction fulfilled by FCS_CKM.4/ES FCS_COP.1.1 The TSF shall perform electronic signing 145 in accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm] 146 and cryptographic key sizes [assignment: cryptographic key sizes] 147 that meet the following: [assignment: list of standards] FAMILY RANDOM NUMBER GENERATION (FCS_RND.1) FCS_RND.1 FCS_RND.1.1 Quality metric for random numbers No dependencies. The TSF shall provide a mechanism to generate random numbers that meet [assignment: a defined quality metric] [assignment: list of cryptographic operations] 142 [assignment: cryptographic algorithm] 143 [assignment: cryptographic key sizes] 144 [assignment: list of standards] 145 [assignment: list of cryptographic operations] 146 [assignment: cryptographic algorithm] 147 [assignment: cryptographic key sizes] 148 [assignment: list of standards] 149 [assignment: a defined quality metric]
46 6.2 ASSURANCE REQUIREMENTS Security Assurance Requirements for the TOE for the evaluation of the TOE are those taken from the Evaluation Assurance Level 4 (EAL4) and augmented by taking the following components: ALC_DVS.2 Sufficiency of security measures 6.3 SECURITY REQUIREMENTS RATIONALE SFRS RATIONALE TABLE OT.Anonymity OT.BIS_Authentication OT.Secure_Communication FDP_ACC.1/Pre-Operational FDP_ACF.1/Pre-Operational FDP_ACC.1/BAC FDP_ACF.1/BAC FDP_ACC.1/Physical FDP_ACF.1/Physical FDP_ITT.1 FCS_CKM.1/SP FCS_CKM.1/TP FCS_CKM.4/IC FCS_COP.1/SP FCS_COP.1/TP FPT_SCP.1/IC FDP_UCT.1 FDP_UIT.1 FIA_UID.1/Operational FIA_UAU.1/Operational FIA_POI.1 FIA_UID.1/Pre-Operational FIA_UAU.1/Pre-Operational FIA_UAU.4 FIA_UAU.5 FIA_AFL.1/BAC FIA_AFL.1/Activation FIA_AFL.1/Initialisation FIA_AFL.1/Personalisation FMT_MTD.1/AA_PrK_Write FMT_MTD.1/AA_PrK_Read FMT_MTD.1/DBAK_Write FMT_MTD.1/DBAK_Read FMT_MTD.1/Ini_Per_Data_Write FMT_MTD.1/Ini_Per_Data_Read FMT_MOF.1/Test FMT_MTD.1/ID FMT_SMF.1 FMT_SMR.1 OT.LDS_Access_Control OT.Active_Authentication OT.AA_PrK_Protection OT.Security_Management OT.Phy_Data_Access_Control OT.Data_Integrity OT.Internal_TOE_Transfer_Confidentiality_Protection OT.Internal_TOE_Transfer_Integrity_Protection OT.TSF_Operation_Protection OT.Random_Number_Generation_Protection OT.Environmental_Stress_Protection OT.Side_Channel_Protection OT.Test_Functions_Disable_Mechanism OT.Unique_ID_Storage
47 FPT_SCP.1/Application FPT_TST.1 FPT_PHP.3 FPT_FLS.1 FCS_CKM.1/BAC FCS_CKM.4/ES FCS_COP.1/SHA FCS_COP.1/TDES FCS_COP.1/MAC FCS_COP.1/AA FCS_RND.1 Table 3: SFRs Rationale Table ADDITIONAL RATIONALE FOR THE FLASH LOADER CONFIGURATION OT.Flash_Loader_Functionality OT.Flash_Loader_Authorization OT.Flash_Loader_Disable_Mechanism FPT_MTD.1/ES, FMT_SMF.1, FMT_SMR.1 FIA_AFL.1/Flash, FIA_UAU.1, FIA_UAU.5, FIA_UID.1 FPT_MOF.1/FL, FMT_SMF.1, FMT_SMR.1 Table 4: Additional SFRs Rationale for the Flash Loader Configuration SFRS JUSTIFICATION OT.Anonymity FIA_UID.1/Operational and FIA_UAU.1/Operational do not let any information, that can be linked to the identity of the passport holder, be disclosed before BIS authentication takes place. So they cover OT.Anonymity. SFRs: FIA_UID.1/Operational, FIA_UAU.1/Operational OT.BIS_Authentication The authentication mechanism and the authentication rule of Basic Inspection System is given in FIA_UAU.5. FIA_UAU.4 requires the BIS authentication mechanism to be single use. The cryptographic support for the BIS authentication is given by FCS_COP.1/TDES, FCS_COP.1/SHA, FCS_RND.1. FIA_AFL.1/BAC protects the authentication mechanism from attacks. FMT_MTD.1/DBAK_Write is needed to securely write the authentication reference data for BIS authentication and FMT_MTD.1/DBAK_Read to protect the authentication reference data. SFRs: FIA_AFL.1/BAC, FIA_UAU.5, FIA_UAU.4, FCS_COP.1/TDES, FCS_COP.1/MAC, FCS_COP.1/SHA, FCS_RND.1, FMT_MTD.1/DBAK_Write, FMT_MTD.1/DBAK_Read. OT.Secure_Communication
48 The secure communication is performed by the FDP_UIT.1 and FDP_UCT.1 requirements. The cryptographic key generation necessary for the secure communication is stated in FCS_CKM.1/BAC, the crytographic operations for message confidentiality and authentication are performed by FCS_COP.1/TDES and FCS_COP.1/MAC. Finally after the secure communication channel is terminated, cryptographic key destruction is performed by FCS_CKM.4/ES. SFRs: FDP_UIT.1, FDP_UCT.1, FCS_CKM.1/BAC, FCS_COP.1/TDES, FCS_COP.1/MAC, FCS_CKM.4/ES OT.Logical_Data_Acces FDP_ACC.1/Pre-Operational, FDP_ACF.1/Pre-Operational, FDP_ACC.1/BAC and FDP_ACF.1/BAC control the user data access. FIA_UID.1/Pre-Operational, FIA_UAU.1/Pre-Operational, FIA_UID.1/Operational, FIA_UAU.1/Operational prevent the attackers to access to the user data without identification and authentication. FIA_UAU.5 enable the mechanisms to authenticate the users. SFRs: FDP_ACC.1/Pre-Operational, FDP_ACF.1/Pre-Operational, FDP_ACC.1/BAC, FDP_ACF.1/BAC, FIA_UID.1/Pre-Operational, FIA_UAU.1/Pre-Operational, FIA_UID.1/Operational, FIA_UAU.1/Operational,FIA_UAU.5 OT.Active_Authentication FIA_POI.1 requries the TOE to have ability to prove itself as stated in objective OT.Active_Authentication. FCS_COP.1/AA addresses the cryptographic support needed by FIA_POI.1 and FMT_MTD.1/AA_Write addresses the writing of Active Authentication Private Key to the TOE. SFRs: FIA_POI.1, FCS_COP.1/AA, FMT_MTD.1/AA_Write OT.AA_PrK_Protection FMT_MTD.1/AA_Read prevents from attackers to read the Active Authentication Private Key. SFR: FMT_MTD.1/AA_Read OT.Security_Management FMT_SMR.1 and FMT_SMF.1 require the necessary management functions and roles be present in the TOE. FIA_UID.1/Pre-Operational and FIA_UAU.1/Pre-Operational prevent the attackers to access to the roles without identification and authentication. FIA_UAU.5 enable the mechanisms to authenticate the management roles. FIA_AFL.1/Activation, FIA_AFL.1/Initialisation and FIA_AFL.1/Personalisation prevent the attackers to attack to the authentication mechanisms. FMT_MTD.1/Ini_Per_Data_Write and FMT_MTD.1/Ini_Per_Data_Read enable the secure entry of the authentication reference data to the TOE and protects from reading out and manipulations performed by the attackers.
49 SFRs: FMT_SMR.1, FMT_SMF.1, FIA_UID.1/Pre-Operational, FIA_UAU.1/Pre-Operational, FIA_UAU.5, FIA_AFL.1/Activation, FIA_AFL.1/Initialisation, FIA_AFL.1/Personalisation, FMT_MTD.1/Ini_Per_Data_Write, FMT_MTD.1/Ini_Per_Data_Read OT.Phy_Data_Access_Control FDP_ACC.1/Physical and FDP_ACF.1/Physical provides access to the embedded OS while prevents the attacker. This is performed by storing the data encrypted and decrypting it with the support of FCS_CKM.1/DP, FCS_CKM.4/IC and FCS_COP.1/DP. FPT_PHP.3 provides additional protection against physical attacks. SFRs: FDP_ACC.1/Physical, FDP_ACF.1/Physical, FCS_CKM.1/DP, FCS_CKM.4/IC, FCS_COP.1/DP, FPT_PHP.3 OT.Data_Integrity FPT_TST.1 monitors the integrity of the data and performs the actions determined by the ST writer. FPT_PHP.3 provides additional protection against physical attacks. The SFRs covering OT.Phys_Data_Access_Control is also valid for this objective, making reasonable changes to the encrypted data is not possible. SFRs: FPT_TST.1, FPT_PHP.3, FDP_ACC.1/Physical, FDP_ACF.1/Physical, FCS_CKM.1/DP, FCS_CKM.4/IC, FCS_COP.1/DP OT.Internal_TOE_Transfer_Confidentiality_Protection FDP_ITT.1 provides protection while the data is in transmit between internal parts of the TOE. Protection is performed by encrypting the internal data traffic; encryption and decryption operations are performed by FCS_CKM.1/TP, FCS_CKM.4, FCS_COP.1/TP requirements. FPT_PHP.3 provides additional protection against physical attacks. SFRs: FDP_ITT.1, FCS_CKM.1/TP, FCS_CKM.4, FCS_COP.1/TP, FPT_PHP.3 OT.Internal_TOE_Transfer_Integrity_Protection FPT_PHP.3 provide protection against physical attacks. The SFRs covering OT.Internal_TOE_Transfer_Confidentiality_Protection is also valid for this objective, making reasonable changes to the encrypted data is not possible. SFRs: FPT_PHP.3, FDP_ITT.1, FCS_CKM.1/TP, FCS_CKM.4, FCS_COP.1/TP OT.TSF_Operation_Protection FPT_TST.1 includes the test of correct operation of TSF, so covers the OT.TSF_Operation_Protection.
50 SFR: FPT_TST.1 OT.Random_Number_Generation_Protection FPT_TST.1 includes the test of correct operation of the Random Number Generation Functionality. So it covers the OT.Random_Number_Generation_Protection. SFR: FPT_TST.1 OT.Side_Channel_Protection FPT_SCP.1/IC and FPT_SCP.1/ES protect the TOE from side channel attacks. SFRs: FPT_SCP.1/IC, FPT_SCP.1/ES OT.Environmental_Stress_Protection FPT_FLS.1 require that if the TOE encounters environmental stress that it may not handle, it will preserve the secure state. SFR: FPT_FLS.1 OT.Unique_ID_Storage FMT_MTD.1/ID provides the functionality to the manufacturer to write the IC Identification data. So OT.Unique_ID_Storage is covered. SFR: FMT_MTD.1/ID OT.Test_Functions_Disable_Mechanism FMT_MOF.1/Test enables the functionality to irreversebly disable the test functionality. FMT_SMF.1 and FMT_SMR.1 defines this functionality and related roles. SFRs: FMT_MOF.1/Test, FMT_SMF.1, FMT_SMR.1 ADDITIONAL RATIONALE FOR THE FLASH LOADER CONFIGURATION OT.Flash_Loader_Functionality FPT_MTD.1/ES enables the embedded operating system loading function. FMT_SMF.1 and FMT_SMR.1 defines this functionality and related roles. SFRs: FMT_MTD.1/ES, FMT_SMF.1, FMT_SMR.1
51 OT.Flash_Loader_Authorization FIA_UAU.5 requires a Flash Loader Authentication mechanism exist and FIA_UAU.1/Pre-Operational and FIA_UID.1/Pre-Operational require that Flash Loader operation can be performed before identification and authentication of the user. Finally FIA_AFL.1/Flash protects the Flash Loader authentication mechanisms from false authentication attempts. SFRs: FIA_UAU.5, FIA_UAU.1/Pre-Operational, FIA_UID.1/Pre-Operational, FIA_AFL.1/Flash OT.Flash_Loader_Disable_Mechanism FMT_MOF.1/FL enables the functionality to irreversebly disable the flash loader mechanism. FMT_SMF.1 and FMT_SMR.1 defines this functionality and related roles. SFRs: FMT_MOF.1/FL, FMT_SMF.1, FMT_SMR DEPENDENCIES FOR THE SECURITY FUNCTIONAL REQUIREMENTS SFR Dependencies Support of the Dependencies FDP_ACC.1/Pre-Operational FDP_ACF.1 FDP_ACF.1/Pre-Operational FDP_ACF.1/Pre-Operational FDP_ACC.1 FMT_MSA.3 FDP_ACC.1/Pre-Operational justified (see justification 1) FDP_ACC.1/BAC FDP_ACF.1 FDP_ACF.1/Pre-Operational FDP_ACF.1/BAC FDP_ACC.1 FMT_MSA.3 FDP_ACC.1/Pre-Operational justified (see justification 1) FDP_ACC.1/Physical FDP_ACF.1 FDP_ACF.1/Pre-Operational FDP_ACF.1/Physical FDP_ITT.1 FCS_CKM.1/SP FDP_ACC.1 FMT_MSA.3 FDP_ACC.1 Subset access control, or FDP_IFC.1 Subset information flow control [FCS_CKM.2 Cryptographic key distribution, or FCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destruction FDP_ACC.1/Pre-Operational justified (see justification 1) fulfilled by FDP_ACC.1/Physical fulfilled by FCS_COP.1 /SP fulfilled by FCS_CKM.4/IC
52 FCS_CKM.1/TP FCS_CKM.4/IC FCS_COP.1/SP [FCS_CKM.2 Cryptographic key distribution, or FCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destruction [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] fulfilled by FCS_COP.1 /TP fulfilled by FCS_CKM.4/IC fulfilled by FCS_CKM.1/SP and FCS_CKM.1/TP fulfilled by FCS_CKM.1/SP FCS_COP.1/TP FCS_CKM.4 Cryptographic key destruction [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] fulfilled by FCS_CKM.4/IC fulfilled by FCS_CKM.1/TP FCS_CKM.4 Cryptographic key destruction FPT_SCP.1/IC None ---- FDP_UCT.1 [FTP_ITC.1 Inter-TSF trusted channel, or FTP_TRP.1 Trusted path] [FDP_ACC.1 Subset access control, or FDP_IFC.1 Subset information flow control] fulfilled by FCS_CKM.4 justified (see justification 2) fulfilled by FDP_ACC.1/BAC FDP_UIT.1 [FDP_ACC.1 Subset access control, or FDP_IFC.1 Subset information flow control] fulfilled by FDP_ACC.1/BAC]
53 [FTP_ITC.1 Inter-TSF trusted channel, or FTP_TRP.1 Trusted path justified (see justification 2) FIA_UID.1/Operational None ---- FIA_UAU.1/Operational FIA_UID.1 fulfilled by FIA_UID.1/Operational FIA_POI.1 None ---- FIA_UID.1/Pre-Operational None ---- FIA_UAU.1/Pre-Operational FIA_UID.1 fulfilled by FIA_UID.1/Pre-Operational FIA_UAU.4 None ---- FIA_UAU.5 None ---- FIA_AFL.1/BAC FIA_AFL.1/Activation FIA_AFL.1/Initialisation FIA_AFL.1/Personalisation FMT_MTD.1/AA_PrK_Write FMT_MTD.1/AA_PrK_Read FMT_MTD.1/DBAK_Write FMT_MTD.1/DBAK_Read FMT_MTD.1/Ini_Per_Data_Write FMT_MTD.1/ Ini_Per_Data_Read FIA_UAU.1 Timing of authentication FIA_UAU.1 Timing of authentication FIA_UAU.1 Timing of authentication FIA_UAU.1 Timing of authentication FMT_SMR.1 Security roles FMT_SMF.1 Specification of Management Functions FMT_SMR.1 Security roles FMT_SMF.1 Specification of Management Functions FMT_SMR.1 Security roles FMT_SMF.1 Specification of Management Functions FMT_SMR.1 Security roles FMT_SMF.1 Specification of Management Functions FMT_SMR.1 Security roles FMT_SMF.1 Specification of Management Functions FMT_SMR.1 Security roles FMT_SMF.1 Specification of Management Functions fulfilled by FIA_UAU.1/ Operational fulfilled by FIA_UAU.1//Pre- Operational fulfilled by FIA_UAU.1//Pre- Operational fulfilled by FIA_UAU.1//Pre- Operational fulfilled by FMT_SMR.1 fulfilled by FMT_SMF.1 fulfilled by FMT_SMR.1 fulfilled by FMT_SMF.1 fulfilled by FMT_SMR.1 fulfilled by FMT_SMF.1 fulfilled by FMT_SMR.1 fulfilled by FMT_SMF.1 fulfilled by FMT_SMR.1 fulfilled by FMT_SMF.1 fulfilled by FMT_SMR.1 fulfilled by FMT_SMF.1
54 FMT_MOF.1/Test FMT_SMR.1 Security roles fulfilled by FMT_SMR.1 FMT_SMF.1 Specification of Management Functions fulfilled by FMT_SMF.1 FMT_MTD.1/ID FMT_SMR.1 Security roles fulfilled by FMT_SMR.1 FMT_SMF.1 Specification of fulfilled by FMT_SMF.1 Management Functions FMT_SMF.1 None ---- FMT_SMR.1 FIA_UID.1 fulfilled by FIA_UID.1 FPT_SCP.1/Application None ---- FPT_TST.1 None --- FPT_PHP.3 None --- FPT_FLS.1 None --- FCS_CKM.1/BAC [FCS_CKM.2 Cryptographic key fulfilled by FCS_COP.1 /TDES and distribution, or FCS_COP.1 FCS_COP.1/MAC Cryptographic operation] FCS_CKM.4 Cryptographic key fulfilled by FCS_CKM.4/ES destruction FCS_CKM.4/ES [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data fulfilled by FCS_CKM.1/BAC with security attributes, or FCS_CKM.1 Cryptographic key generation] FCS_COP.1/SHA [FDP_ITC.1 Import of user data without security attributes, or justified (see justification 3) FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] FCS_COP.1/TDES FCS_CKM.4 Cryptographic key destruction [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or justified (see justification 3) fulfilled by FCS_CKM.1/BAC
55 FCS_CKM.1 Cryptographic key generation] fulfilled by FCS_CKM.4/ES FCS_COP.1/MAC FCS_CKM.4 Cryptographic key destruction [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] fulfilled by FCS_CKM.1/BAC fulfilled by FCS_CKM.4/ES FCS_CKM.4 Cryptographic key destruction FCS_COP.1/AA [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data justified (see justification 4) with security attributes, or FCS_CKM.1 Cryptographic key generation] fulfilled by FCS_CKM.4/ES FCS_CKM.4 Cryptographic key destruction FCS_RND.1 None --- Table 5: Dependencies for the SFRs Justification 1: The FPT_ACF.1/BAC, FPT_ACF.1/Pre-Operational and FPT_ACF.1/Physical apply to the all data. So security attribute management is not necessary. Justification 2: The SFRs FDP_UCT.1 and FDP_UIT.1 require the TOE to communicate securely with BIS, since there is no other communication channel and there is no human interface neither FTP_ITC.1 nor FTP_TRP.1 is necessary here. Justification 3: The hash algorithm defined in FCS_COP.1/SHA does not need any key to function. So neither key generation nor import is necessary. Justification 4: The active authentication private key is permanently stored in the TOE and it is written to the TOE by FMT_MTD.1/AA_Write, neither import nor generation is necessary. ADDITIONAL FOR FLASH LOADER
56 SFR Dependencies Support of the Dependencies FIA_AFL.1/Flash FIA_UAU.1 Timing of Authentication fulfilled by FIA_UAU.1 FMT_MTD.1/ES FMT_MOF.1/FL FMT_SMR.1 Security roles FMT_SMF.1 Specification of Management Functions FMT_SMR.1 Security roles FMT_SMF.1 Specification of Management Functions fulfilled by FMT_SMR.1 fulfilled by FMT_SMF.1 fulfilled by FMT_SMR.1 fulfilled by FMT_SMF.1 Table 6: Dependencies for the Additional SFRs of the Flash Loader RATIONALE AND DEPENDENCIES FOR THE SARS The EAL4 is chosen to permit a developer to gain maximum assurance from positive security engineering based on good commercial development practices which, though rigorous, do not require substantial specialist knowledge, skills, and other resources. EAL4 is the highest level at which it is likely to be economically feasible to retrofit to an existing product line. EAL4 is therefore applicable in those circumstances where developers or users require a moderate to high level of independently assured security in conventional commodity TOEs and are prepared to incur additional security-specific engineering costs. ALC_DVS.2 is added to the assurance requirements to obtain higher assurance of the TOE s development and manufacturing. The dependencies for augmented SARs: SAR Dependencies Support of the Dependencies ALC_DVS.2 None --- Table 7: The Dependencies for augmented SARs SECURITY REQUIREMENTS MUTUAL SUPPORT AND INTERNAL CONSISTENCY Current PP aims to withstand against attacker of Enhanced Basic attack potential. Both the SFRs and the SARs are selected to reach this goal. The rationale of both requirement types (functional requirements and assurance requirements are given and dependency analysis of them are made; no inconsistency exists. The SFRs and SARs internally support each other. The support for the SFRs and SFRs of each other is such that SARs are sufficient to give enough assurance for the required functionality.
57 7. REFERENCES [1] Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model; CCMB , Version 3.1, Revision 4, September 2012 [2] Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Requirements; CCMB , Version 3.1, Revision 4, September 2012 [3] Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance Requirements; CCMB , Version 3.1, Revision 1, September 2012 [4] Common Methodology for Information Technology Security Evaluation (CEM), Evaluation Methodology; CCMB , Version 3.1, Revision 4, September 2012 [5] ICAO Doc 9303, Machine Readable Travel Documents, part 1 Machine Readable Passports, Sixth Edition, 2006, International Civil Aviation Organisation [6] Common Criteria Protection Profile, Secure IC Platform, Draft Version ACCROYNMS AA: Active Authentication BAC: Basic Access Control BIS: Basic Inspection System LDS: Logical Data Structure
Protection Profile for UK Dual-Interface Authentication Card
Protection Profile for UK Dual-Interface Authentication Card Version 1-0 10 th July 2009 Reference: UNKT-DO-0002 Introduction This document defines a Protection Profile to express security, evaluation
MIFARE DESFire EV1 MF3ICD81
MIFARE DESFire EV1 MF3ICD81 Rev.1.5 10 May 2011 BSI-DSZ-CC-0712 Evaluation Documentation Document information Info Keywords Abstract Content, MF3ICD81 Evaluation of the NXP Secure Smart Card Controller
Common Criteria Protection Profile
Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE PP) Version 1.01, 22th July 2014 Foreword This Protection Profile Electronic Passport using Standard Inspection procedure
LEGIC advant Series. LEGIC card-in-card AFS4096-JP12 V1.2. Security Target Lite. Common Critera ISO 15408 EAL4+
LEGIC advant Series Security Target Lite LEGIC card-in-card AFS4096-JP12 V1.2 Common Critera ISO 15408 EAL4+ Classification: Public Document No.: LA-23-615a-en / BSI-DSZ-CC-0812 Edition: 6.2012 www.legic.com
Common Criteria Protection Profile for Inspection Systems (IS) BSI-CC-PP-0064. Version 1.01 (15 th April 2010)
Common Criteria Protection Profile for BSI-CC-PP-0064 Version 1.01 (15 th April 2010) Federal Office for Information Security Postfach 20 03 63 53133 Bonn Phone: +49 228 99 9582-0 e-mail: [email protected]
Mobile Billing System Security Target
Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing
Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0
Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 German Federal Office for Information Security PO Box 20 03 63 D-53133 Bonn Tel.:
Protection Profile Secure Signature-Creation Device Type 3
Protection Profile Secure Signature-Creation Device Type 3 Version: 1.05, EAL 4+ Wednesday, 25 July 2001 Prepared By: ESIGN Workshop - Expert Group F Prepared For: CEN/ISSS Note: This Protection Profile
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
Common Criteria Protection Profile. Electronic Identity Card (ID_Card PP) BSI-CC-PP-0061. Approved by the Federal Ministry of Interior. Version 1.
Common Criteria Protection Profile Approved by the Federal Ministry of Interior Version 1.03, 1 Common Criteria Protection Profile Version 1.03, Foreword This Protection Profile is issued by Bundesamt
Joint Interpretation Library
for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0
JMCS Northern Light Video Conferencing System Security Target
JMCS Northern Light Video Conferencing System Security Target Common Criteria: EAL2 Version 1.2 22 FEB 12 Document management Document identification Document ID Document title Product version NLVC_ST_EAL2
Security IC Platform Protection Profile
Security IC Platform Protection Profile Version 1.0 15.06.2007 developed by Atmel Infineon Technologies AG NXP Semiconductors Renesas Technology Europe Ltd. STMicroelectronics Registered and Certified
COMMON CRITERIA PROTECTION PROFILE. for SECURE COMMUNICATION MODULE FOR WATER TRACKING SYSTEM (SCM-WTS PP)
COMMON CRITERIA PROTECTION PROFILE for SECURE COMMUNICATION MODULE FOR WATER TRACKING SYSTEM (SCM-WTS PP) Revision No 1.1 Revision Date 11.07.2014 Document Code File Name SCM-WTS PROTECTION PROFILE Prepared
CardOS V4.4 CNS. Edition 04/2010. Security Target CardOS V4.4 CNS with Application for QES
CardOS V4.4 CNS Security Target CardOS V4.4 CNS with Application for QES Edition 04/2010 CardOS V4.4 CNS: ST Edition 04/2010 Public 1 The reproduction, transmission or use of this document or its contents
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING Document No. 1735-005-D0001 Version: 1.0, 3 June 2014 Prepared for: Fortinet, Incorporated 326 Moodie Drive Ottawa, Ontario Canada, K2H
CERTIFICATION REPORT
REF: 2011-11-INF-837 v1 Target: Público Date: 17.04.2012 Created by: CERT8 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2011-11 KONA 102J1 epassport EAC v1.1 Applicant: KEBTechnology
COMMON CRITERIA PROTECTION PROFILE. for NEW GENERATION CASH REGISTER FISCAL APPLICATON SOFTWARE (NGCRFAS PP) TSE-CCCS/PP-002
COMMON CRITERIA PROTECTION PROFILE for NEW GENERATION CASH REGISTER FISCAL APPLICATON SOFTWARE (NGCRFAS PP) TSE-CCCS/PP-002 Revision No 1.7 Revision Date 28.08.2013 Document Code File Name NGCRFAS PROTECTION
Certification Report
Certification Report EAL 2 Evaluation of Revenue Administration Department of Turkey/Gelir İdaresi Başkanlığı Common Criteria Protection Profile for New Generation Cash Register Fiscal Application Software-2
Firewall Protection Profile
samhällsskydd och beredskap 1 (38) ROS-ISÄK Ronny Janse 010-2404426 [email protected] Firewall Protection Profile samhällsskydd och beredskap 2 (38) Innehållsförteckning 1. Introduction... 4 1.1 PP reference...
Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.
Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to
Secuware Virtual System (SVS)
Secuware Virtual System (SVS) SECURITY TARGET EAL2 Copyright 2008 by SECUWARE All rights reserved. The information in this document is exclusive property of SECUWARE and may not be changed without express
Low Assurance Protection Profile for a VPN gateway
LAPP VPN gateway Low Assurance Protection Profile for a VPN gateway Version: 1.4 Date: 29/04/2005 Filename: lapp4_14 Product: VPN gateway Sponsor: SRC Security Research & Consulting GmbH, Graurheindorfer
Smartcard IC Platform Protection Profile
Smartcard IC Platform Protection Profile Version 1.0 July 2001 developed by Atmel Smart Card ICs Hitachi Europe Ltd. Infineon Technologies AG Philips Semiconductors Registered and Certified by Bundesamt
Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report
KECS-CR-16-36 Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report Certification No.: KECS-PP-0717-2016 2016. 6. 10 IT Security Certification Center History of Creation
Extended Package for Mobile Device Management Agents
Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes
Common Criteria for IT security evaluation
STMicroelectronics ST33F1M/1M0/896/768/640/512E, SC33F1M0/896/768/640/512/384E, SM33F1M/1M0/896/768/640/512E, SE33F1M/1M0/896/768/640/512E, SL33F1M/1M0/896/768/640/512E, SP33F1ME, with dedicated software
CERTIFICATION REPORT
REF: 2011-12-INF-1089 v1 Target: Expediente Date: 17.12.2012 Created by: CERT8 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2011-12 POLYMNIE LDS BAC applet Applicant: B340709534
Common Criteria for Information Technology Security Evaluation. Part 2: Security functional components. September 2007. Version 3.
Common Criteria for Information Technology Security Evaluation Part 2: Security functional components September 2007 Version 3.1 Revision 2 CCMB-2007-09-002 Foreword This version of the Common Criteria
Security Target. Astaro Security Gateway V8 Packet Filter Version 1.000. Assurance Level EAL4+ Common Criteria v3.1
Astaro Security Gateway V8 Packet Filter Version 1.000 Assurance Level EAL4+ Common Criteria v3.1 This Security Target also covers the secunet wall 2 packet filter Version : 1.03 Date: 2011-05-20 Author:
Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0
Security Target NetIQ Access Manager 4.0 Document Version 1.13 August 7, 2014 Document Version 1.13 NetIQ Page 1 of 36 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite 810 Houston, TX
Common Criteria Protection Profile. Electronic Identity Card (ID_Card PP)
elektronischer Die PDF-Datei der amtlichen Veröffentlichung ist aus Sicherheitsgründen mit einer qualifizierten elektronischen Signatur gemäß 2 Nr. 3 Signaturgesetz (SigG) versehen. Solange die elektronische
Windows Mobile 6.5 Security Target
EAL4 augmented with ALC_FLR.1 Version 1.0 January 2010 The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.
EAL4+ Security Target
EAL4+ Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 21-DEC-10 Document management Document identification Document ID Document title Release authority E14_EAL4_ASE Microsoft
Common Criteria Protection Profile. Machine Readable Travel Document with ICAO Application, Basic Access Control BSI-CC-PP-0055
Common Criteria Protection Profile Machine Readable Travel Document with ICAO Application, Basic Access Control BSI-CC-PP-0055 Common Criteria Protection Profile Version 1.10, 25 th March 2009 Foreword
Forefront Identity Manager (FIM) 2010
Forefront Identity Manager (FIM) 2010 Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 24-MAR-2012 Document history Version Date Description 0.1 28-APR-11 Initial draft for review.
TÜBİTAK BİLGEM ULUSAL ELEKTRONİK & KRİPTOLOJİ ARAŞTIRMA ENSTİTÜSÜ AKİS PROJESİ AKİS V1.4N
The contents of this document are the property of TÜBİTAK TÜBİTAK BİLGEM ULUSAL ELEKTRONİK & KRİPTOLOJİ ARAŞTIRMA ENSTİTÜSÜ AKİS PROJESİ AKİS-PASAPORT SECURITY TARGET LITE AKİS V1.4N Revision No 06 Revision
Common Criteria Security Target For 1E Power and Patch Management Pack
Intelligent Windows Management Common Criteria Security Target For 1E Power and Patch Management Pack 30 September 2009 Document Version 1-0 1E Limited. All Rights reserved. Summary of Amendments Version
Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP)
Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) Schutzprofil für das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen
Common Criteria for Information Technology Security Evaluation. Part 2: Security functional requirements. August 2005. Version 2.
Common Criteria for Information Technology Security Evaluation Part 2: Security functional requirements August 2005 Version 2.3 CCMB-2005-08-002 Foreword This version of the Common Criteria for Information
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction
Protection Profile for Server Virtualization
Protection Profile for Server Virtualization 29 October 2014 Version 1.0 i 0 Preface 0.1 Objectives of Document This document presents the Common Criteria (CC) Protection Profile (PP) to express the fundamental
EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0
EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305
Security Target for Cisco Remote Access VPN
Security Target for Cisco Remote Access VPN Reference: ST 16 May 2007 Version 1.17 CISCO Systems Inc. 170 West Tasman Drive San Jose CA 95124-1706 USA Copyright: 2007 Cisco Systems, Inc. Table of Contents
EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.
EMC Corporation Data Domain Operating System Version 5.2.1.0 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.11 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton,
Common Criteria Protection Profile. electronic Health Card (ehc) elektronische Gesundheitskarte (egk)
electronic Health Card (ehc) elektronische Gesundheitskarte (egk) BSI-CC-PP-0020-V3-2010-MA-01 Approved by the Federal Ministry of Health Version 2.9, 19th April 2011 electronic Health Card Version 2.9,
Canon ir6570/ir5570 Series ir Security Kit-B3. Security Target
Document ID: CANON-Device05-001 Canon ir6570/ir5570 Series ir Security Kit-B3 Security Target This document is a translation of the security target written in Japanese, which has been evaluated and certified.
AppGate Security Server, Version 8.0.4. Security Target. Document Version: 2.9 Date: 2008-04-10
AppGate Security Server, Version 8.0.4 Security Target Document Version: 2.9 Date: 2008-04-10 Contents 1 INTRODUCTION...6 1.1 ST Identification...6 1.2 ST Overview...6 1.3 CC Conformance Claim...6 1.4
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle
LINQUS USIM 128K Smartcard
LINQUS USIM 128K Smartcard ESIGN PKI Signature Application On GemXplore Generations G152B-EP3B OS platform, Running on Infineon SLE88CFX4002P/m8834b17 chip Ref T1004530 A3 / Version 1.0 Common Criteria
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Author: Microsoft Corp. Version: 1.0 Last Saved: 2011-03-10 File Name: MS_UAG_ST_1.0.docx
Protection Profile for Full Disk Encryption
Protection Profile for Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 01 December 2011 Version 1.0 Table of Contents 1 Introduction to the PP...
Security Target for Citrix Presentation Server 4.0 For Windows
Security Target for Citrix Presentation Server 4.0 For Windows Reference: ST/T488 July 2005 Version: 1.0 This document has been prepared on behalf of: Prepared by: Citrix Systems, Inc BT 851 West Cypress
Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012
Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa
Firewall Protection Profile V2.0 2008. 4. 24
Firewall Protection Profile V2.0 2008. 4. 24 (This page left blank on purpose for double-side printing) Protection Profile Title Firewall Protection Profile for Government Evaluation Criteria Version This
BSI-PP-0004-2002. for. Protection Profile Secure Signature-Creation Device Type 1, Version 1.05. developed by
BSI-PP-0004-2002 for Protection Profile Secure Signature-Creation Device Type 1, Version 1.05 developed by CEN/ISSS Information Society Standardization System, Workshop on Electronic Signatures - Bundesamt
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Common Criteria Evaluation for a Trusted Entrust/PKI
Common Criteria Evaluation for a Trusted Entrust/PKI Author: Marc Laroche Date: March 2000 Version: 2.0 2000, Entrust, Inc. Entrust is a registered trademark of Entrust Technologies Inc. in the United
Common Criteria Security Target
Common Criteria Security Target for Citrix XenDesktop 5.6 Platinum edition Version 1-1 16 November 2012 2012 Citrix Systems, Inc. All rights reserved Summary of Amendments Version Date Notes 1-1 16 November
CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target
CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target Version 2.0 June Version 21, 2010 0.6 December 29, 2008 Prepared for: Prepared CA for: 100 Staples CA, Inc. Drive Framingham, 100
PROTECTION PROFILE DEVELOPMENT
PROTECTION PROFILE DEVELOPMENT FOR CARD ACCEPTANCE DEVICE (CAD) WITH BIOMETRIC Norahana Salimin [email protected] ICCC 2013 Sept 10-12 Orlando Content PPWG Background Challenge Lesson Learn Sneak
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN
REF: 2010-12-INF-626 V1 Distribution: Public Date: 29.04.2011 Created: CERT3 Reviewed: TECNICO Approved: JEFEAREA CERTIFICATION REPORT FOR EADS GROUND SEGMENT SYSTEMS PROTECTION PROFILE (GSS-PP) ISSUE
EXTOL epassport Suite v2.5 Security Target v2.0. ECSB/MyCC/JL/002 Common Criteria EAL1 Certification
Doc Ref RD/JL/069 Replaces: N/A EXTOL epassport Suite v2.5 ECSB/MyCC/JL/002 Common Criteria EAL1 Certification Extol Corporation (M) Sdn Bhd (121135-U) (643683-U) Extol Group www.extolcorp.com Unit G1,
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN
REF: 2010-22-INF-764 V1 Distribution: Expediente Date: 21.11.2011 Created: CERT3 Reviewed: CALIDAD Approbed: TECNICO CERTIFICATION REPORT FOR FOR HUAWEI INTEGRATED MANAGEMENT APPLICATION PLATFORM VERSION
Low Assurance Protection Profile for a VoIP Infrastructure
Low Assurance Protection Profile for a VoIP Infrastructure Version 1.1 Date Author(s) Dirk-Jan Out Certification ID Sponsor File name No of pages 12 TNO-ITSEF BV VoIP Low Assurance Protection Profile 1.1
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
C038 Certification Report
C038 Certification Report TAXSAYA Online File name: Version: v1a Date of document: 15 August 2013 Document classification: For general inquiry about us or our services, please email: [email protected]
Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs
Joint Interpretation Library Security Evaluation and Certification of Digital Tachographs JIL interpretation of the Security Certification according to Commission Regulation (EC) 1360/2002, Annex 1B Version
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1
NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1 Rev. 1.1 24 October 2011 BSI-DSZ-CC-0707 Evaluation documentation Document information Info Keywords
Common Criteria Protection Profile. electronic Health Card (ehc) elektronische Gesundheitskarte (egk) BSI-PP-0020-V2-2007-MA01
VERSION 2.50 (ehc) elektronische Gesundheitskarte (egk) BSI-PP-0020-V2-2007-MA01 Approved by the Federal Ministry of Health Version 2.50, 2 nd January 2008 Version 2.50, 2nd January 2008 this page was
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government
McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 Security Target
v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 10 January 2012 Version 1.1 Prepared By: Primasec Ltd For McAfee Inc 2340 Energy Park Drive St. Paul, MN 55108 USA Contents 1 Introduction...
isas Security Target Lite EWSE23EN90002.10
isas Security Target Lite EWSE23EN90002.10 FREQUENTIS 2012 History Chart Rev. Date Changed Page(s) Cause of Change Implemented 1.0 2012-05-15 All sections Initial Version Döderlein No. Action Name Signature
Marimba Client and Server Management from BMC Software Release 6.0.3
Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP)
1 2 3 4 Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP) Schutzprofil für die Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen 5
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Active Directory Federation Services 2.0
Active Directory Federation Services 2.0 Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 23-MAR-12 Document history Version Date Description 0.1 10-MAY-11 Initial draft for review.
SECURITY TARGET CITADEL HERCULES ENTERPRISE VULNERABILITY MANAGEMENT (EVM) VERSION 4.1
SECURITY TARGET CITADEL HERCULES ENTERPRISE VULNERABILITY MANAGEMENT (EVM) VERSION 4.1 Document No. 1517-011-D001 Version 1.1, 3 August 2006 Prepared for: Citadel Security Software Inc. Two Lincoln Centre
Common Criteria for Information Technology Security Evaluation Protection Profile. General-Purpose Operating System Protection Profile
Common Criteria for Information Technology Security Evaluation Protection Profile General-Purpose Operating System Protection Profile 09 09 2013 Table of contents Table of Contents 1 INTRODUCTION... 7
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 0.7 Prepared for: Prepared by: Enterasys Networks, Inc. Corsec Security,
Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target
Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Revision 1.0 August 2011 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms
Java Card Protection Profile Open Configuration
Java Card Protection Profile Open Configuration May 2012 Security Evaluations Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 Java Card Protection Profile Open Configuration 1 Java Card
Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin
Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden [email protected] www.combitech.se
