Security Target. McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5. Document Version 1.3. October 12, 2011

Size: px
Start display at page:

Download "Security Target. McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5. Document Version 1.3. October 12, 2011"

Transcription

1 Security Target McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5 Document Version 1.3 October 12, 2011 Document Version 1.3 McAfee Page 1 of 69

2 Prepared For: Prepared By: McAfee, Inc Mission College Blvd. Santa Clara, CA Apex Assurance Group, LLC 530 Lytton Avenue, Ste. 200 Palo Alto, CA Abstract This document provides the basis for an evaluation of a specific Target of Evaluation (TOE), the VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5. This Security Target (ST) defines a set of assumptions about the aspects of the environment, a list of threats that the product intends to counter, a set of security objectives, a set of security requirements and the IT security functions provided by the TOE which meet the set of requirements. Document Version 1.3 McAfee Page 2 of 69

3 Table of Contents 1 Introduction ST Reference TOE Reference Document Organization Document Conventions Document Terminology TOE Overview TOE Description VSE epolicy Orchestrator (epo) McAfee Agent Physical Boundary Hardware and Software Supplied by the IT Environment Logical Boundary TOE Data Rationale for Non- bypassability and Separation of the TOE Conformance Claims Common Criteria Conformance Claim Protection Profile Conformance Claim TOE Type Consistency Security Problem Definition Consistency Security Objectives Consistency Security Functional Requirements Consistency Security Assurance Requirements Consistency Security Problem Definition Threats Organizational Security Policies Assumptions Security Objectives Security Objectives for the TOE Security Objectives for the Operational Environment Security Objectives Rationale Extended Components Definition Anti- Virus (FAV) Class of SFRs FAV_ACT_(EXT).1 Anti- Virus Actions FAV_ALR_(EXT).1 Anti- Virus Alerts FAV_SCN_(EXT).1 Anti- Virus Scanning Extended Security Assurance Components Security Requirements Security Functional Requirements Security Audit (FAU) Anti- Virus (Explicitly Stated) Document Version 1.3 McAfee Page 3 of 69

4 6.1.3 Cryptographic Support (FCS) Identification and Authentication (FIA) Security Management (FMT) Security Assurance Requirements CC Component Hierarchies and Dependencies Security Requirements Rationale Security Functional Requirements for the TOE Security Assurance Requirements TOE Summary Specification Virus Scanning & Alerts Audit (AUDIT) Audit Generation Audit Record Review Management (MGMT) epo User Account Management Permission Set Management Audit Log Management Event Log Management Notification Management System Tree Management Query Management Dashboard Management VSE Policies VSE DAT File VSE On- Demand Scan Tasks Cryptographic Operations List of Tables Table 1 ST Organization and Section Descriptions... 7 Table 2 Terms and Acronyms Used in Security Target... 8 Table 3 Evaluated Configuration for the TOE Table 4 Management System Component Requirements Table 5 Managed System Platforms Table 6 Logical Boundary Descriptions Table 7 TOE Data (Legend: AD=Authentication data; UA=User attribute; GE=Generic Information) Table 8 Threats Addressed by the TOE Table 9 Organizational Security Policies Table 10 Assumptions Table 11 TOE Security Objectives Document Version 1.3 McAfee Page 4 of 69

5 Table 12 Operational Environment Security Objectives Table 13 Mapping of Assumptions, Threats, and OSPs to Security Objectives Table 14 Rationale for Mapping of Threats, Policies, and Assumptions to Objectives Table 15 TOE Functional Components Table 16 Audit Events and Details Table 17 - TSF Data Access Permissions Table 18 Security Assurance Requirements at EAL Table 19 TOE SFR Dependency Rationale Table 20 Mapping of TOE SFRs to Security Objectives Table 21 Rationale for Mapping of TOE SFRs to Objectives Table 22 Security Assurance Measures List of Figures Figure 1 TOE Boundary Document Version 1.3 McAfee Page 5 of 69

6 1 Introduction This section identifies the Security Target (ST), Target of Evaluation (TOE), Security Target organization, document conventions, and terminology. It also includes an overview of the evaluated product. 1.1 ST Reference ST Title ST Revision ST Publication Date Author Security Target: McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator October 12, 2011 Apex Assurance Group and McAfee 1.2 TOE Reference TOE Reference TOE Type McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5 Antivirus 1.3 Document Organization This Security Target follows the following format: SECTION TITLE DESCRIPTION 1 Introduction Provides an overview of the TOE and defines the hardware and software that make up the TOE as well as the physical and logical boundaries of the TOE 2 Conformance Claims Lists evaluation conformance to Common Criteria versions, Protection Profiles, or Packages where applicable 3 Security Problem Definition Specifies the threats, assumptions and organizational security policies that affect the TOE 4 Security Objectives Defines the security objectives for the TOE/operational environment and provides a rationale to demonstrate that the security objectives satisfy the threats 5 Extended Components Describes extended components of the evaluation (if any) Definition 6 Security Requirements Contains the functional and assurance requirements for this TOE 7 TOE Summary Specification Identifies the IT security functions provided by the TOE and also identifies the assurance measures targeted to meet the assurance requirements. Document Version 1.3 McAfee Page 6 of 69

7 Table 1 ST Organization and Section Descriptions 1.4 Document Conventions The notation, formatting, and conventions used in this Security Target are consistent with those used in Version 3.1 of the Common Criteria. Selected presentation choices are discussed here to aid the Security Target reader. The Common Criteria allows several operations to be performed on functional requirements: The allowable operations defined in Part 2 of the Common Criteria are refinement, selection, assignment and iteration. The assignment operation is used to assign a specific value to an unspecified parameter, such as the length of a password. An assignment operation is indicated by italicized text. The refinement operation is used to add detail to a requirement, and thus further restricts a requirement. Refinement of security requirements is denoted by bold text. Any text removed is indicated with a strikethrough format (Example: TSF). The selection operation is picking one or more items from a list in order to narrow the scope of a component element. Selections are denoted by underlined text. Iterated functional and assurance requirements are given unique identifiers by appending to the base requirement identifier from the Common Criteria an iteration number inside parenthesis, for example, FIA_UAU.1.1 (1) and FIA_UAU.1.1 (2) refer to separate instances of the FIA_UAU.1 security functional requirement component. Outside the SFRs, italicized text is used for both official document titles and text meant to be emphasized more than plain text. 1.5 Document Terminology The following table 1 describes the terms and acronyms used in this document: CC CCEVS CM EAL epo GB GUI I&A IT MB NIAP TERM DEFINITION Common Criteria Common Criteria Evaluation and Validation Scheme Configuration Management Evaluation Assurance Level epolicy Orchestrator Giga- Byte Graphical User Interface Identification and Authentication Information Technology Mega- Byte National Information Assurance Partnership 1 Derived from the IDSPP Document Version 1.3 McAfee Page 7 of 69

8 TERM DEFINITION OS Operating System OSP Organizational Security Policy PC Personal Computer PP Protection Profile RAM Random Access Memory SFR Security Functional Requirement SMTP Simple Mail Transfer Protocol SNMP Simple Network Management Protocol ST Security Target TOE Target of Evaluation TSC TOE Scope of Control TSF TOE Security Function TSFI TOE Security Function Interface Table 2 Terms and Acronyms Used in Security Target 1.6 TOE Overview VSE is a software package designed to protect Microsoft Windows- based desktop and server computers from viruses, worms, Trojans, as well as unwanted code and programs. VSE can be configured to scan local and network drives, as well as Microsoft Outlook and Lotus Notes messages and attachments. It is possible to configure VSE to respond to infections and malicious code that it finds by identifying the intrusive entities, removing them, and reporting on them. The management capabilities for VSE are provided by epo. epo manages McAfee Agents and VSE software that reside on client systems. By using epo you can manage a large enterprise network from a centralized system. epo also provides scheduling capabilities to distribute updated VSE security policies and maintains audit files. Communication between the distributed components of the TOE is protected from disclosure and modification by cryptographic functionality provided by the operational environment. 1.7 TOE Description The TOE consists of three components: VSE, epo and McAfee Agent VSE The VSE software provides protection from viruses, worms, Trojans, as well as unwanted code and programs Document Version 1.3 McAfee Page 8 of 69

9 1.7.2 epolicy Orchestrator (epo) epo distributes and manages agents that reside on client systems. By using epo you can manage a large enterprise network. epo provides the management interface and functionality for the administrators of the TOE. It also provides centralized audit collection and review functionality McAfee Agent The McAfee Agent is a vehicle of information and enforcement between the epo server and each managed system. It provides common communication functionality between epo and all of McAfee s product- specific software (such as VSE) Physical Boundary The TOE is a software TOE and includes: 1. The epo application executing on a dedicated server 2. The McAfee Agent and VSE software on each client to be protected The physical components of the TOE include the software that is installed during installation of VSE, McAfee Agent and epo. The TOE software is installed on a centralized epo server and on client workstations. The computer hardware platform that the TOE software is installed on is not part of the TOE. The components of the TOE are installed on systems with resident operating systems, but the operating systems are not part of the TOE. epo requires a database, but the DBMS is not part of the TOE. The following documentation provided to end users is included in the TOE boundary: 1. McAfee VirusScan Enterprise 8.8 Product Guide 2. McAfee VirusScan Enterprise 8.8 Installation Guide 3. McAfee epolicy Orchestrator 4.5 Installation Guide 4. McAfee epolicy Orchestrator 4.5 Product Guide In order to comply with the evaluated configuration, the following hardware and software components should be used: TOE COMPONENT TOE Software VERSION/MODEL NUMBER VSE 8.8 epolicy Orchestrator 4.5 McAfee Agent Database Capacity Monitor Extension McAfee Agent 4.5 is shipped/packaged with epo 4.5. From a clean installation, no additional steps are necessary to install McAfee Agent 4.5. Document Version 1.3 McAfee Page 9 of 69

10 TOE COMPONENT VERSION/MODEL NUMBER IT Environment Specified in the following: Table 4 Management System Component Requirements Table 5 Managed System Platforms Table 3 Evaluated Configuration for the TOE The evaluated configuration includes one or more instances of McAfee Agent and VSE and an instance of epo. The following configuration options must be selected for the evaluated configuration: 1. All user accounts defined in epo must specify Windows authentication. 2. Remote viewing of TOE log files on the clients is disabled. 3. Only authorized processes may initiate network connections to remote port 25 (SMTP). The Central Administrator configures the list of authorized processes. 4. The U.S. Government Protection Profile Anti- Virus Applications for Workstations in Basic Robustness Environments requires the TOE to restrict specific management functionality to the Central Administrator role. At least one epo user must be defined as a Central Administrator. For this TOE, the Central Administrator role is defined as an authorized administrator with Global Administrator status. 5. Because the U.S. Government Protection Profile Anti- Virus Applications for Workstations in Basic Robustness Environments requires the TOE to restrict specific management functionality to the Central Administrator role, the following permissions may never be assigned: a. View audit log b. View and purge audit log c. View VSE settings d. View and change VSE settings The following figure presents an example of an operational configuration. The shaded elements in the boxes at the top of the figure represent the TOE components. Document Version 1.3 McAfee Page 10 of 69

11 Figure 1 TOE Boundary The functionality that is not included in the evaluation is itemized below: 1. The ability to protect against buffer overflows 2. The ability to identify spyware 3. The Scriptscan feature that scans JavaScript and VBScript scripts 4. The ability to update the TOE (scan engine). Note that the ability to update the virus signatures (DAT file) is included in the evaluation. 5. The optional Alert Manager product Hardware and Software Supplied by the IT Environment The TOE consists of a set of software applications. The hardware, operating systems and all third party support software (e.g., DBMS) on the systems on which the TOE executes are excluded from the TOE boundary. The platform on which epo is installed must be dedicated to functioning as the management system. epo operates as a distribution system and management system for a client- server architecture offering components for the server part of the architecture (not the clients). The TOE requires the following hardware and software configuration on this platform. Document Version 1.3 McAfee Page 11 of 69

12 COMPONENT MINIMUM REQUIREMENTS Processor Intel Pentium III- class or higher; 1GHz or higher Memory 1 GB RAM Free Disk Space 1 GB Monitor 1024x768, 256- color, VGA monitor or higher Operating System Windows Server 2003 Enterprise with Service Pack 2 or later Windows Server 2003 Standard with Service Pack 2 or later Windows Server 2003 Web with Service Pack 2 or later Windows Server 2003 R2 Enterprise with Service Pack 2 or later Windows Server 2003 R2 Standard with Service Pack 2 or later Windows Server 2008 Enterprise Windows Server 2008 Standard DBMS SQL Server 2005 SQL 2005 Express SQL 2008 SQL 2008 Express Additional Software MSXML 6.0 Internet Explorer 7 or 8, or Firefox 3.0.NET Framework 2.0 Microsoft Visual C++ Redistributable Microsoft Visual C++ Redistributable - x MDAC 2.8 Microsoft updates MSI 3.1 RSA Crypto- C ME 2.0 RSA Crypto- J 4.0 Network Card Ethernet, 100Mb or higher Disk Partition Formats NTFS Domain Controllers The system must have a trust relationship with the Primary Domain Controller (PDC) on the network Table 4 Management System Component Requirements The supported platforms for McAfee Agent and VSE are: COMPONENT Processor Memory Free Disk Space Browser MINIMUM REQUIREMENTS Intel Pentium or Celeron processor running at a minimum of 166 MHz or Pentium II processor running at a minimum of 350 MHz 128MB RAM (minimum) for a Pentium or Celeron processor running at 166 MHz and 256MB RAM (minimum) for a Pentium II processor running at 350 MHz 240 MB Microsoft Internet Explorer version 6.0 or later Document Version 1.3 McAfee Page 12 of 69

13 COMPONENT Operating System MINIMUM REQUIREMENTS Server Operating Systems: Microsoft Windows 2000 Server with SP4 Microsoft Windows 2000 Advanced Server with SP4 Microsoft Windows 2000 Datacenter Server with SP4 Microsoft Windows Server 2003 Standard (32- bit and 64- bit) with SP1 or SP2 Microsoft Windows Server 2003 Enterprise (32- bit and 64- bit) with SP1 or SP2 Microsoft Windows Server 2003 Web Edition (32- bit and 64- bit) with SP1 or SP2 Microsoft Windows Server 2003 R2 (32- bit and 64- bit) Standard, Enterprise, Web Edition Microsoft Windows Server 2003 R2 Datacenter Edition (32- bit and 64- bit) Microsoft Windows Storage Server 2003 Microsoft Windows Server 2008 (32- bit and 64- bit) Microsoft Windows Server 2008 Datacenter (32- bit and 64- bit) Microsoft Windows Server 2008 Datacenter (32- bit and 64- bit) Microsoft Windows Server Core 2008 (32- bit and 64- bit) Microsoft Windows 7 Home Premium, Professional, and Ultimate (32 and 64 bit) Workstation Operating Systems: Microsoft Windows 2000 Professional with SP4 Microsoft Windows XP Home with SP1, SP2, or SP3 Microsoft Windows XP Professional with SP1, SP2, or SP3 Microsoft Windows XP Tablet PC Edition with SP3 Microsoft Windows Vista Home Basic Microsoft Windows Vista Home Premium Microsoft Windows Vista Business Microsoft Windows Vista Enterprise Microsoft Windows Vista Ultimate Microsoft Windows 7 Home Premium, Professional, and Ultimate (32 and 64 bit) Additional Software Microsoft Windows Installer (MSI) version 3.1 or later Network Card Ethernet, 10Mb or higher Table 5 Managed System Platforms The management system is accessed from remote systems via a browser. The supported browsers are Microsoft Internet Explorer 6.0 with Service Pack 1 or later or Microsoft Internet Explorer 7.0. Identification and authentication services for epo users and workstation users are provided by the operational environment. Windows services are invoked by the TOE to validate user credentials. Windows may be integrated with a credential store to perform the credential validation. Document Version 1.3 McAfee Page 13 of 69

14 1.7.6 Logical Boundary The logical boundaries of the TOE are defined by the functions provided by the TOE and are described in the following sections. The TOE includes management interfaces that the administrator uses to configure the VSE policies and review the log files. The management interface is provided by both epo and VSE. The virus scanning functionality is provided by VSE. The logical boundaries of the TOE include the security functionalities that the TOE provides to the system that utilize the product for the detection of viruses and malicious code. The security functions include Audit, Management, Virus Scanning and Alerts, and Cryptographic operations. TSF Virus Scanning and Alerts Audit Management DESCRIPTION VSE provides the following functionality related to virus scanning and alerts: 1. Access Protection - This function protects ports, files, the registry and processes resident in memory from intrusions by restricting access to them. You can create rules to block either inbound or outbound ports, and by doing so, restrict access to files and residual data allocated in memory. If an outbreak occurs, the administrator can restrict access to the infected areas to prevent further infection until new signature files are released. 2. Scanning - This function provides scanning of messages and databases in order to identify viruses, worms, and Trojans for the purpose of removing them and reporting on them. 3. Automatic Updates Allows signature (DAT) files to be updated automatically per the configured schedule. The OnAccess Scan Log provides audit viewing capabilities on the client for that system. Audit information is concurrently generated for transmission to the epo management databases. Audit logs for all clients can be reviewed from the epo console. epo enables the Central Administrator to centrally manage virus scan settings on workstations, configure and manage the actions the virus scan component takes when detection of an infection occurs, and manage the audit logs. Cryptographic Operation VirusScan anti- virus packages are distributed to the workstation with a SHA- 1 hash value used to verify the integrity of the package. Table 6 Logical Boundary Descriptions TOE Data TOE data consists of both TSF data and user data (information). TSF data consists of authentication data, security attributes, and other generic configuration information. Security attributes enable the TOE to enforce the security policy. Authentication data enables the TOE to identify and authenticate users. Document Version 1.3 McAfee Page 14 of 69

15 TSF Data Description AD UA GE Contacts A list of addresses that epolicy Orchestrator uses to send messages to specified users in response to events. Dashboards Collections of chart- based queries that are refreshed at a user- configured interval. Server SMTP server name and port used to send messages for notifications. Credentials may optionally be specified for authenticated interactions. epo User Accounts epo user name, authentication configuration, enabled status, Global Administrator status and permission sets for each user authorized to access TOE functionality on epo. Global Administrator Status Groups Notification Rules Individual epo user accounts may be configured as Global Administrators, which means they have read and write permissions and rights to all operations. Node on the hierarchical System Tree that may contain subordinate groups or systems. Rules associated with groups or systems used to generate messages and/or SNMP traps upon receipt of specified events Permission A privilege to perform a specific function. Permission Set A group of permissions that can be granted to any users by assigning it to those users accounts. Queries Configurable objects that retrieve and display data from the database. Server Settings Control how the epolicy Orchestrator server behaves. SNMP Trap Name and address of an SNMP server to receive trap Destination(s) messages as a result of notification rules. System Information specific to a single managed system (e.g. Information internet address) in the System Tree. System Tree A hierarchical collection of all of the systems managed by epolicy Orchestrator. VSE Access Protection Policies used to restrict access to specified ports, files, shares, registry keys, and registry values on the client Policies systems. VSE DAT Files Detection definition files used by VSE on the client systems. VSE On- Access Default Processes Policies VSE On- Access General Policies VSE On- Access High- Risk Processes Policies Policies that define the processes included in the default category, defining when scans for these processes are performed and the actions taken upon detection on the client systems. Policies that enable and configuration the operation of on- access scanning on the client systems. Policies that define the processes included in the High- Risk category, defining when scans for these processes are performed and the actions taken upon detection on the client systems. Document Version 1.3 McAfee Page 15 of 69

16 TSF Data Description AD UA GE Policies that define the processes included in the Low- Risk category, defining when scans for these processes are performed and the actions taken upon detection on the client systems. VSE On- Access Low- Risk Processes Policies VSE On- Demand Scan Tasks VSE Quarantine Policies VSE Quarantined Files VSE Unwanted Programs Policies VSE User Interface Policies Tasks that define the configuration of on- demand scans that may be invoked on the client systems. Policies that specify where quarantined files are stored on the client systems and how long they are kept. Collection of files on a client system that have been quarantined by VSE. Policies that specify unwanted programs on the client systems. Policies that control the access users have to the VirusScan Enterprise interface on the client systems. Table 7 TOE Data (Legend: AD=Authentication data; UA=User attribute; GE=Generic Information) 1.8 Rationale for Non- bypassability and Separation of the TOE The TOE is an application that executes on top of an underlying system that includes hardware and software required for operation. Therefore, responsibility for non- bypassability and separation are split between the TOE and the IT Environment. All access to objects in the TOE IT environment is validated by the IT environment security policies before they can succeed. Unless a user has been authenticated by the IT environment, the user will not be able to access any of the TOE security functions or any of the TOE files or directories. Arbitrary entry into the TOE is not possible and therefore the TSF is protected against external interference by untrusted objects. Because the TOE is isolated in its own domain, the TOE s IT environment maintains and controls execution for the TSF separately from other processes. The TOE provides strictly controlled functionality to the users within the TSC. By limiting access through role based access control, the TSF is protected from corruption or compromise from users within the TSC. The TOE interfaces are separated into 2 categories security enforcing and security supporting. Security enforcing interfaces invoke the TSF and ensure that all enforcement functions complete successfully before allowing the user invoked action to proceed. Security supporting interfaces ensure that the TSF cannot be interfered with via those interfaces (i.e., they are isolated from the TSF). The security enforcing role is separate from the security supporting role and each role has its own unique set of privileges associated with it. Multiple simultaneous users (and roles) are supported. Document Version 1.3 McAfee Page 16 of 69

17 The TOE associates distinct attributes and privileges with each process and restricts access according to the configured security policies. (A process is a program in execution.) Processes are separate from each other, each with their own memory buffer and it is impossible for one process to directly access the memory of another. The OS and hardware support non- bypassability by ensuring that access to protected resources pass through the TOE and is limited to access within the OS scope of control which is enforced by the security policies for the OS and the IT environment. The hardware and OS provide separate process spaces in which the TOE executes; these process spaces are protected from interference from other processes except through the defined TOE interfaces. Document Version 1.3 McAfee Page 17 of 69

18 2 Conformance Claims 2.1 Common Criteria Conformance Claim The TOE is Common Criteria Version 3.1 Revision 3 (July 2009) Part 2 extended and Part 3 conformant at Evaluation Assurance Level 2 and augmented by ALC_FLR.2 Flaw Reporting Procedures. 2.2 Protection Profile Conformance Claim The TOE claims demonstrable conformance to the U.S. Government Protection Profile Anti- Virus Applications for Workstations in Basic Robustness Environments, version 1.2, dated 25 July Even though SFRs for the operational environment are not required to be identified in the security target under CC Version 3.1, the end user must refer to and comply with those SFRs in the PP in order to be compliant with the Protection Profile TOE Type Consistency Both the PP and the TOE describe anti- virus systems Security Problem Definition Consistency This ST claims demonstrable conformance to the referenced PP. The threats, assumptions, and organizational security policies in the ST are identical to the threats, assumptions, and organizational security policies in the PP Security Objectives Consistency This ST claims demonstrable conformance to the referenced PP. In conformance to the errata sheet of the PP, OE.AUDIT_SEARCH has been added to the security objectives of the Operational Environment and mapped to T.UNIDENTIFIED_ACTIONS. No other additions or deletions to the objectives have been made. All objectives are consistent with the PP Security Functional Requirements Consistency This ST claims demonstrable conformance to the referenced PP. In conformance to the errata sheet of the PP, FAU_SAR.3 has been levied on the Operational Environment. An instance of FMT_SMR.1 has been added (as an iteration) to address functionality in the TOE to define additional administrative roles based upon user permissions. These additional roles may not be granted permission to view or manage VSE- specific policies, but may be granted permissions for other management functionality in the TOE (e.g. using or creating dashboards to review virus- related events). Document Version 1.3 McAfee Page 18 of 69

19 An instance of FMT_SMF.1 has been added (as an iteration) to address functionality in the TOE to perform additional management operations based upon user permissions. These additional operations are not directly related to VSE, but provide support functions for effective management of the TOE. An instance of FMT_MTD.1 has been added (as an iteration) to address the specific TSF data and operations on that data that may be performed by authorized administrators based upon their permissions. FIA_ATD.1 and FIA_USB.1 have been added to the ST. These SFRs address the mechanisms used by the TOE to associate a role with each user, as required by FMT_SMR.1. The TOE SFRs included in the ST are more restrictive than the TOE SFRs specified in the PP (after accounting for the errata sheets) Security Assurance Requirements Consistency The ST assurance claims are EAL2 augmented by ALC_FLR.2, which are the same as the assurance claims required by the PP (EAL2 augmented by ALC_FLR.2). Document Version 1.3 McAfee Page 19 of 69

20 3 Security Problem Definition In order to clarify the nature of the security problem that the TOE is intended to solve, this section describes the following: Any known or assumed threats to the assets against which specific protection within the TOE or its environment is required. Any organizational security policy statements or rules with which the TOE must comply. Any assumptions about the security aspects of the environment and/or of the manner in which the TOE is intended to be used. This chapter identifies assumptions as A.assumption, threats as T.threat and policies as P.policy. 3.1 Threats The following are threats identified for the TOE and the IT System the TOE monitors. The TOE itself has threats and the TOE is also responsible for addressing threats to the environment in which it resides. The assumed level of expertise of the attacker for all the threats is unsophisticated. The TOE addresses the following threats: THREAT T.ACCIDENTAL_ADMIN_ERROR T.AUDIT_ COMPROMISE T.MASQUERADE T.POOR_DESIGN T.POOR_IMPLEMENTATION T.POOR_TEST T.RESIDUAL_DATA DESCRIPTION An administrator may incorrectly install or configure the TOE resulting in ineffective security mechanisms. A user or process may gain unauthorized access to the audit trail and cause audit records to be lost or modified, or prevent future audit records from being recorded, thus masking a security relevant event. A user or process may masquerade as another entity in order to gain unauthorized access to data or TOE resources Unintentional errors in requirements specification or design of the TOE may occur, leading to flaws that may be exploited by a casually mischievous user or program. Unintentional errors in implementation of the TOE design may occur, leading to flaws that may be exploited by a casually mischievous user or program. Lack of or insufficient tests to demonstrate that all TOE security functions operate correctly (including in a fielded TOE) may result in incorrect TOE behavior being discovered thereby causing potential security vulnerabilities. A user or process may gain unauthorized access to data through reallocation of memory used by the TOE to scan files or process administrator requests. Document Version 1.3 McAfee Page 20 of 69

21 THREAT DESCRIPTION T.TSF_COMPROMISE A user or process may cause, through an unsophisticated attack, TSF data or executable code to be inappropriately accessed (viewed, modified, or deleted) A user may gain unauthorized access to an unattended session. T.UNATTENDED_SESSION T.UNIDENTIFIED_ACTIONS Failure of the authorized administrator to identify and act upon unauthorized actions may occur. T.VIRUS A malicious agent may attempt to introduce a virus onto a workstation via network traffic or removable media to compromise data on that workstation, or use that workstation to attack additional systems. Table 8 Threats Addressed by the TOE 3.2 Organizational Security Policies The following Organizational Security Policies apply to the TOE: POLICY DESCRIPTION P.ACCESS_BANNER The system shall display an initial banner describing restrictions of use, legal agreements, or any other appropriate information to which users consent by accessing the system. P.ACCOUNTABILITY The authorized users of the TOE shall be held accountable for their actions within the TOE. P.CRYPTOGRAPHY Only NIST FIPS validated cryptography (methods and implementations) are acceptable for key management (i.e.; generation, access, distribution, destruction, handling, and storage of keys) and cryptographic services (i.e. encryption, decryption, signature, hashing, key exchange, and random number generation services) P.MANUAL_SCAN The authorized users of the workstations shall initiate manual anti- virus scans of removable media (e.g., floppy disks, CDs) introduced into the workstation before accessing any data on the removable media. P.ROLES The TOE shall provide an authorized administrator role for secure administration of the TOE. This role shall be separate and distinct from other authorized users. Table 9 Organizational Security Policies 3.3 Assumptions This section describes the security aspects of the environment in which the TOE is intended to be used. The TOE is assured to provide effective security measures in a co- operative non- hostile environment only if it is installed, managed, and used correctly. The following specific conditions are assumed to exist in an environment where the TOE is employed. ASSUMPTION A.AUDIT_BACKUP DESCRIPTION Administrators will back up audit files and monitor disk usage to ensure audit information is not lost. Document Version 1.3 McAfee Page 21 of 69

22 ASSUMPTION A.NO_EVIL A.PHYSICAL A.SECURE_COMMS A.SECURE_UPDATES Table 10 Assumptions DESCRIPTION Administrators are non- hostile, appropriately trained, and follow all administrative guidance. It is assumed that the appropriate physical security is provided within the domain for the value of the IT assets protected by the TOE and the value of the stored, processed, and transmitted information. It is assumed that the IT environment will provide a secure line of communications between distributed portions of the TOE and between the TOE and remote administrators. Administrators will implement secure mechanisms for receiving and validating updated signature files from the Anti- Virus vendors, and for distributing the updates to the central management systems. Document Version 1.3 McAfee Page 22 of 69

23 4 Security Objectives 4.1 Security Objectives for the TOE The IT security objectives for the TOE are addressed below: OBJECTIVE O.ADMIN_GUIDANCE O.ADMIN_ROLE O.AUDIT_GENERATION O.AUDIT_PROTECT O.AUDIT_REVIEW O.CONFIGURATION_IDENTIFICATION O.CORRECT_TSF_OPERATION O.CRYPTOGRAPHY O.DOCUMENTED_DESIGN O.MANAGE O.PARTIAL_FUNCTIONAL_TEST O.PARTIAL_SELF_PROTECTION O.VIRUS O.VULNERABILITY_ANALYSIS Table 11 TOE Security Objectives DESCRIPTION The TOE will provide administrators with the necessary information for secure management. The TOE will provide an authorized administrator role to isolate administrative actions. The TOE will provide the capability to detect and create records of security- relevant events. The TOE will provide the capability to protect audit information. The TOE will provide the capability to selectively view audit information. The configuration of the TOE is fully identified in a manner that will allow implementation errors to be identified. The TOE will provide the capability to test the TSF to ensure the correct operation of the TSF at a customer s site. The TOE shall use NIST FIPS cryptographic services. The design of the TOE is adequately and accurately documented. The TOE will provide all the functions and facilities necessary to support the authorized users in their management of the TOE. The TOE will undergo some security functional testing that demonstrates the TSF satisfies some of its security functional requirements. The TSF will maintain a domain for its own execution that protects itself and its resources from external interference, tampering, or unauthorized disclosure through its own interfaces. The TOE will detect and take action against known viruses introduced to the workstation via network traffic or removable media. The TOE will undergo some vulnerability analysis to demonstrate the design and implementation of the TOE does not contain any obvious flaws. 4.2 Security Objectives for the Operational Environment The security objectives for the operational environment are addressed below: OBJECTIVE DESCRIPTION Document Version 1.3 McAfee Page 23 of 69

24 OBJECTIVE DESCRIPTION OE.AUDIT_BACKUP Audit log files are backed up and can be restored, and audit log files will not run out of disk space. OE.AUDIT_SEARCH The IT Environment will provide the capability to search and sort the audit information. OE.AUDIT_STORAGE The IT Environment will provide a means for secure storage of the TOE audit log files. OE.DISPLAY_BANNER The IT environment will display an advisory warning regarding the use of the system. OE.DOMAIN_SEPARATION The IT environment will provide an isolated domain for the execution of the TOE. OE.NO_BYPASS The IT environment shall ensure the TOE security mechanisms cannot be bypassed in order to gain access to the TOE resources. OE.NO_EVIL Sites using the TOE shall ensure that authorized administrators are non- hostile, appropriately trained and follow all administrator guidance. OE.PHYSICAL Physical security will be provided within the domain for the value of the IT assets protected by the TOE and the value of the stored, processed, and transmitted information. OE.RESIDUAL_INFORMATION The IT environment will ensure that any information contained in a protected resource within the TOE Scope of Control is not released when the resource is reallocated. OE.SECURE_COMMS The IT environment will provide a secure line of communications between distributed portions of the TOE and between the TOE and remote administrators. OE.SECURE_UPDATES Enterprises using the TOE shall ensure that signature file updates are received from the vendor via secure mechanisms, the updates are validated before being used, and the updates are distributed to central management systems with the Enterprise via secure mechanisms. OE.TIME_STAMPS The IT Environment will provide reliable time stamps. OE.TOE_ACCESS The IT environment will provide mechanisms that control a user s logical access to the TOE. Table 12 Operational Environment Security Objectives Application Note: OE.AUDIT_SEARCH has been added to the security objectives of the IT Environment in conformance to the PP errata sheet concerning FAU_SAR Security Objectives Rationale This section provides the summary that all security objectives are traced back to aspects of the addressed assumptions, threats, and Organizational Security Policies (if applicable). The following table provides a high level mapping of coverage for each threat, assumption, and policy: Document Version 1.3 McAfee Page 24 of 69

25 O.ADMIN_GUIDANCE O.ADMIN_ROLE A.AUDIT_BACKUP A.NO_EVIL A.PHYSICAL A.SECURE_COMMS A.SECURE_UPDATES T.ACCIDENTAL_ADMIN_ERROR T.AUDIT_ COMPROMISE T.MASQUERADE T.POOR_DESIGN T.POOR_IMPLEMENTATION T.POOR_TEST T.RESIDUAL_DATA T.TSF_COMPROMISE T.UNATTENDED_SESSION T.UNIDENTIFIED_ACTIONS T.VIRUS P.ACCESS_BANNER P.ACCOUNTABILITY P.CRYPTOGRAPHY P.MANUAL_SCAN P.ROLES O.AUDIT_GENERATION O.AUDIT_PROTECT O.AUDIT_REVIEW O.CONFIGURATION_IDENTIFICA TION O.CORRECT_TSF_OPERATION O.CRYPTOGRAPHY O.DOCUMENTED_DESIGN O.MANAGE O.PARTIAL_FUNCTIONAL_TEST O.PARTIAL_SELF_PROTECTION O.VIRUS O.VULNERABILITY_ANALYSIS OE.AUDIT_BACKUP OE.AUDIT_SEARCH OE.AUDIT_STORAGE OE.DISPLAY_BANNER OE.DOMAIN_SEPARATION OE.NO_BYPASS OE.NO_EVIL OE.PHYSICAL OE.RESIDUAL_INFORMATION OE.SECURE_COMMS OE.SECURE_UPDATES Document Version 1.3 McAfee Page 25 of 69

26 A.AUDIT_BACKUP A.NO_EVIL A.PHYSICAL A.SECURE_COMMS A.SECURE_UPDATES T.ACCIDENTAL_ADMIN_ERROR T.AUDIT_ COMPROMISE T.MASQUERADE T.POOR_DESIGN T.POOR_IMPLEMENTATION T.POOR_TEST T.RESIDUAL_DATA T.TSF_COMPROMISE T.UNATTENDED_SESSION T.UNIDENTIFIED_ACTIONS T.VIRUS P.ACCESS_BANNER P.ACCOUNTABILITY P.CRYPTOGRAPHY P.MANUAL_SCAN P.ROLES OE.TIME_STAMPS OE.TOE_ACCESS Table 13 Mapping of Assumptions, Threats, and OSPs to Security Objectives The following table provides detailed evidence of coverage for each threat, policy, and assumption: THREATS, POLICIES, AND ASSUMPTIONS T.ACCIDENTAL_ADMIN_ ERROR: An administrator may incorrectly install or configure the TOE resulting in ineffective security mechanisms. T.AUDIT_ COMPROMISE: A user or process may cause audit records to be lost or modified, or prevent future audit records from being recorded, thus masking a user s action. ADDRESSED BY O.ADMIN_GUIDANCE: The TOE will provide administrators with the necessary information for secure management. O.AUDIT_PROTECT: The TOE will provide the capability to protect audit information. OE.AUDIT_STORAGE: The IT environment will contain mechanisms to provide secure storage and management of the audit log. OE.RESIDUAL_ INFORMATION: The TOE will ensure that any information contained in a protected resource within its Scope of Control RATIONALE O.ADMIN_GUIDANCE helps to mitigate this threat by ensuring the TOE administrators have guidance that instructs them how to administer the TOE in a secure manner. Having this guidance helps to reduce the mistakes that an administrator might make that could cause the TOE to be configured in a way that is insecure. O.AUDIT_PROTECT contributes to mitigating this threat by controlling access to the individual audit log records. No one is allowed to modify audit records, the System Administrator is the only one allowed to delete audit records, and the TOE has the capability to prevent auditable actions from occurring if the audit trail is full. OE.AUDIT_STORAGE contributes to mitigating this threat by restricting the ability of users in the IT Document Version 1.3 McAfee Page 26 of 69

27 THREATS, POLICIES, AND ASSUMPTIONS T.MASQUERADE: A user or process may ADDRESSED BY is not released when the resource is reallocated. O.PARTIAL_SELF_PROTECTION: The TSF will maintain a domain for its own execution that protects itself and its resources from external interference, tampering, or unauthorized disclosure through its own interfaces. OE.DOMAIN_SEPARATION: The IT environment will provide an isolated domain for the execution of the TOE. OE.NO_BYPASS: The IT environment shall ensure the TOE security mechanisms cannot be bypassed in order to gain access to the TOE resources. OE.TOE_ACCESS: The IT Environment will provide RATIONALE Environment to access the audit log file. OE.RESIDUAL_INFORMATION pre- vents a user not authorized to read the audit trail from access to audit information that might otherwise be persistent in a resource used by the TOE (e.g., memory). By preventing residual information in a resource, audit information will not become available to any user or process except those explicitly authorized for that data. O.PARTIAL_SELF_PROTECTION con- tributes to countering this threat by ensuring that the TSF can protect itself from users via its own interfaces. This limits access to the audit information to the functions defined for the specified roles. OE.DOMAIN_SEPARATION contributes to countering this threat by ensuring that the TSF is protected from users through mechanisms other than its own interfaces. If the OS could not maintain and control a domain of execution for the TSF separate from other processes, the TSF could not be trusted to control access to the resources under its control, which includes the audit trail which are always invoked is also critical to the migration of this threat. OE.NO_BYPASS ensures audit compromise can not occur simply by bypassing the TSF. OE.TOE_ACCESS mitigates this threat by requiring authorized Document Version 1.3 McAfee Page 27 of 69

28 THREATS, POLICIES, AND ASSUMPTIONS masquerade as another entity in order to gain unauthorized access to data or TOE resources. T.POOR_DESIGN: Unintentional errors in requirements specification or design of the TOE may occur, leading to flaws that may be exploited by a casually mischievous user or program. T.POOR_IMPLEMENTATIO N: Unintentional errors in implementation of the TOE design may occur, leading to flaws that may be exploited by a casually mischievous user or program. ADDRESSED BY mechanisms that control a user s logical access to the TOE. O.CONFIGURATION_IDENTIFICATION: The configuration of the TOE is fully identified in a manner that will allow implementation errors to be identified. O.DOCUMENTED_DESIGN: The design of the TOE is adequately and accurately documented. O.VULNERABILITY_ANALYSIS: The TOE will undergo some vulnerability analysis to demonstrate the design and implementation of the TOE does not contain any obvious flaws. O.CONFIGURATION_IDENTIFICATION: The configuration of the TOE is fully identified in a manner that will allow implementation errors to be identified. O.PARTIAL_FUNCTIONAL_TESTING: The TOE will undergo some security functional testing that demonstrates the TSF satisfies some of its security functional requirements. O.VULNERABILITY_ANALYSIS: The TOE will undergo some RATIONALE administrators and workstation users to be identified and authenticated, a necessary step in controlling the logical access to the TOE and its resources by constraining how and when users can access the TOE. In addition, this objective provides the administrator the means to control the number of failed login attempts a user can generate before an account is locked out, further reducing the possibility of a user gaining unauthorized access to the TOE. O.CONFIGURATION_IDENTIFI- CATION plays a role in countering this threat by requiring the developer to provide control of the changes made to the TOE s design. O.DOCUMENTED_DESIGN ensures that the design of the TOE is documented, permitting detailed review by evaluators. O.VULNERABILITY_ANALYSIS_TEST ensures that the design of the TOE is analyzed for design flaws. O.CONFIGURATION_IDENTIFICATIO N plays a role in countering this threat by requiring the developer to provide control of the changes made to the TOE s implementation. O.PARTIAL_FUNCTIONAL_TESTING increases the likelihood that any errors that do exist in the implementation will be discovered through testing. O.VULNERABILITY_ANALYSIS_TEST helps reduce errors in the Document Version 1.3 McAfee Page 28 of 69

29 THREATS, POLICIES, AND ASSUMPTIONS T.POOR_TEST: Lack of or insufficient tests to demonstrate that all TOE security functions operate correctly may result in incorrect TOE behavior being undiscovered thereby causing potential security vulnerabilities. T.RESIDUAL_DATA: A user or process may gain unauthorized access to data through ADDRESSED BY vulnerability analysis demonstrate the design and implementation of the TOE does not contain any obvious flaws. O.DOCUMENTED_DESIGN The design of the TOE will be adequately and accurately documented. O.PARTIAL_FUNCTIONAL_TESTING: The TOE will undergo some security functional testing that demonstrates the TSF satisfies the security functional requirements. O.CORRECT_TSF_OPERATION: The TOE will provide the capability to test the TSF to ensure the correct operation of the TSF at a customer s site. O.VULNERABILITY_ANALYSIS: The TOE will undergo some vulnerability analysis demonstrate the design and implementation of the TOE does not contain any obvious flaws. OE.RESIDUAL_INFORMATION: The IT Environment will ensure that any information contained in a protected resource within the TOE RATIONALE implementation that may not be discovered during functional testing. Ambiguous design documentation and the fact that exhaustive testing of the external interfaces is not required may leave bugs in the implementation undiscovered in functional testing. O.DOCUMENTED_DESIGN helps to ensure that the TOE s documented design satisfies the security functional requirements. In order to ensure the TOE s design is correctly realized in its implementation, the appropriate level of functional testing of the TOE s security mechanisms must be performed during the evaluation of the TOE. O.PARTIAL_FUNCTIONAL_TESTING increases the likelihood that any errors that do exist in the implementation will be discovered through testing. O.CORRECT_TSF_OPERATION provides assurance that the TSF continues to operate as expected in the field. O.VULNERABILITY_ANALYSIS_TEST addresses this concern by requiring a vulnerability analysis be performed in conjunction with testing that goes beyond functional testing. This objective provides a measure of confidence that the TOE does not contain security flaws that may not be identified through functional testing. OE.RESIDUAL_INFORMATION counters this threat by ensuring that memory contents are not persistent when resources are Document Version 1.3 McAfee Page 29 of 69

Security Target. McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5. Document Version 1.1. September 9, 2011

Security Target. McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5. Document Version 1.1. September 9, 2011 Security Target McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5 Document Version 1.1 September 9, 2011 Document Version 1.1 McAfee Page 1 of 61 Prepared For: Prepared By: McAfee, Inc. 2821

More information

Security Target. Symantec TM Network Access Control Version 12.1.2. Document Version 0.12. February 14, 2013

Security Target. Symantec TM Network Access Control Version 12.1.2. Document Version 0.12. February 14, 2013 Security Target Symantec TM Network Access Control Version 12.1.2 Document Version 0.12 February 14, 2013 Document Version 0.12 Symantec Page 1 of 39 Prepared For: Prepared By: Symantec Corporation 350

More information

Security Target. McAfee Database Security 4.4.3. Document Version 1.4. June 18, 2013. Security Target: McAfee Database Security 4.4.

Security Target. McAfee Database Security 4.4.3. Document Version 1.4. June 18, 2013. Security Target: McAfee Database Security 4.4. Security Target McAfee Database Security 4.4.3 Document Version 1.4 June 18, 2013 Document Version 1.4 McAfee Page 1 of 66 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara,

More information

Security Target. McAfee Data Loss Prevention Endpoint 9.4 and epolicy Orchestrator 5.1.3. Document Version 1.0

Security Target. McAfee Data Loss Prevention Endpoint 9.4 and epolicy Orchestrator 5.1.3. Document Version 1.0 Security Target McAfee Data Loss Prevention Endpoint 9.4 and epolicy Orchestrator 5.1.3 Document Version 1.0 November 24, 2015 Prepared For: Prepared By: Intel Corporation. 2821 Mission College Blvd. Santa

More information

Security Target. Security Target SQL Server 2008 Team. Author: Roger French Version: 1.04 Date: 2011-09-26

Security Target. Security Target SQL Server 2008 Team. Author: Roger French Version: 1.04 Date: 2011-09-26 SQL Server 2008 Team Author: Roger French Version: 1.04 Date: 2011-09-26 Abstract This document is the (ST) for the Common Criteria certification of the database engine of Microsoft SQL Server 2008 R2.

More information

Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012

Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012 Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa

More information

Security Target: Symantec Endpoint Protection Version 11.0

Security Target: Symantec Endpoint Protection Version 11.0 Security Target: Symantec Endpoint Protection Version 11.0 ST Version 1.6 June 2, 2008 Document Version 1.6 Symantec Corporation Page 1 of 68 Prepared For: Prepared By: Symantec Corporation 20330 Stevens

More information

U. S. Government Protection Profile Anti-Virus Applications for Workstations In Basic Robustness Environments, Version 1.0

U. S. Government Protection Profile Anti-Virus Applications for Workstations In Basic Robustness Environments, Version 1.0 National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Common Criteria Evaluation and Validation Scheme Validation Report U. S. Government Protection Profile Anti-Virus

More information

Security Target: IBM Internet Security Systems GX Series Security Appliances Version 4.1 and SiteProtector Version 2.0 Service Pack 8.

Security Target: IBM Internet Security Systems GX Series Security Appliances Version 4.1 and SiteProtector Version 2.0 Service Pack 8. Security Target IBM Internet Security Systems GX Series Security Appliances Version 4.1 and Document Version 0.6 February 27, 2012 Document Version 0.6 IBM Internet Security Systems Page 1 of 55 Prepared

More information

Security Target. McAfee Enterprise Mobility Management 12.0. Document Version 1.16

Security Target. McAfee Enterprise Mobility Management 12.0. Document Version 1.16 Security Target McAfee Enterprise Mobility Management 12.0 Document Version 1.16 September 17, 2014 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 Primasec Ltd

More information

IBM Internet Security Systems GX6116 Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 with Reporting Module

IBM Internet Security Systems GX6116 Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 with Reporting Module Security Target IBM Internet Security Systems GX6116 Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 with Reporting Module Document Version 2.0 July 6, 2011 Document Version

More information

How To Evaluate A Security Target Of Evaluation (Toe)

How To Evaluate A Security Target Of Evaluation (Toe) Security Target McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 Document Version 1.1

More information

U.S. Government Protection Profile for Database Management Systems

U.S. Government Protection Profile for Database Management Systems U.S. Government Protection Profile for Database Management Systems Information Assurance Directorate Version 1.3 December 24, 2010 Protection Profile Title: 1 U.S. Government Protection Profile for Database

More information

McAfee Endpoint Encryption 7.0 for PC with McAfee epolicy Orchestrator 4.6 Common Criteria EAL2+ Security Target

McAfee Endpoint Encryption 7.0 for PC with McAfee epolicy Orchestrator 4.6 Common Criteria EAL2+ Security Target McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 888.847.8766 www.mcafee.com McAfee Endpoint Encryption 7.0 for PC with McAfee epolicy Orchestrator 4.6 Common Criteria EAL2+ Security Target

More information

Trustwave DbProtect Version 6.4.3 Security Target

Trustwave DbProtect Version 6.4.3 Security Target Trustwave DbProtect Version 6.4.3 Security Target Version 1.8 July 21, 2015 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane

More information

Certification Report

Certification Report Certification Report McAfee Enterprise Mobility Management 12.0 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and

More information

RSA, The Security Division of EMC RSA Access Manager v6.1. Security Target

RSA, The Security Division of EMC RSA Access Manager v6.1. Security Target RSA, The Security Division of EMC RSA Access Manager v6.1 Security Target Evaluation Assurance Level: EAL3+ Augmented with ALC_FLR.2 Document Version: 0.8 Prepared for: Prepared by: RSA, The Security Division

More information

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government

More information

Security Target Microsoft SQL Server Team

Security Target Microsoft SQL Server Team Security Target Microsoft SQL Server Team Author: Roger French Version: 1.27 Date 2008-07-23 File Name: MS_SQL_ST_1.27 Abstract This document is the Security Target (ST) for the Common Criteria evaluation

More information

Symantec Security Information Manager Version 4.8.1

Symantec Security Information Manager Version 4.8.1 Security Target Symantec Security Information Manager Version 4.8.1 Document Version 1.7 January 30, 2014 Document Version 1.7 Copyright Symantec Corporation Page 1 of 42 Prepared For: Prepared By: Symantec

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 11.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Security Target SQL Server 2012 Team

Security Target SQL Server 2012 Team Microsoft SQL Server 2012 Database Engine Common Criteria Evaluation (EAL2) Security Target SQL Server 2012 Team Author: Version: 1.2 Roger French (Microsoft Corporation) Date: 2012-08-07 Abstract This

More information

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0 EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305

More information

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle

More information

Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0

Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0 Security Target NetIQ Access Manager 4.0 Document Version 1.13 August 7, 2014 Document Version 1.13 NetIQ Page 1 of 36 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite 810 Houston, TX

More information

Voltage Security, Inc. Palo Alto, CA

Voltage Security, Inc. Palo Alto, CA National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Report Number: CCEVS-VR-07-0029 Dated: 29 May 2007 Version: 1.3 Validation Report TM Voltage Security, Inc. Palo

More information

SolarWinds Log and Event Manager Software Security Target

SolarWinds Log and Event Manager Software Security Target SolarWinds Log and Event Manager Software Security Target Version 1.5 August 25, 2014 SolarWinds Worldwide, LLC 3711 South MoPac Expressway Building Two Austin, Texas 78746 Copyright 2013 SolarWinds Worldwide,

More information

Author: Roger French Version: 1.2 Date: 2009-01-23

Author: Roger French Version: 1.2 Date: 2009-01-23 Security Target SQL Server 2008 Team Author: Roger French Version: 1.2 Date: 2009-01-23 Abstract This document is the Security Target (ST) for the Common Criteria certification of the database engine of

More information

Intrusion, Inc. SecureNet Pro Intrusion Detection System Version 4.1 SP1 Security Target December 20, 2002 Document No.

Intrusion, Inc. SecureNet Pro Intrusion Detection System Version 4.1 SP1 Security Target December 20, 2002 Document No. Intrusion, Inc. SecureNet Pro Intrusion Detection System Version 4.1 SP1 Security Target December 20, 2002 Document No. F2-1202-004 COACT, Inc. Rivers Ninety Five 9140 Guilford Road, Suite L Columbia,

More information

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction

More information

Certification Report

Certification Report Certification Report EAL 3+ Evaluation of Rapid7 Nexpose Vulnerability Management and Penetration Testing System V5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

Extended Package for Mobile Device Management Agents

Extended Package for Mobile Device Management Agents Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Certification Report

Certification Report Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Security Target. Securonix Security Intelligence Platform 4.0. Document Version 1.12. January 9, 2015

Security Target. Securonix Security Intelligence Platform 4.0. Document Version 1.12. January 9, 2015 Security Target Securonix Security Intelligence Platform 4.0 Document Version 1.12 January 9, 2015 Document Version 1.12 Copyright Securonix Page 1 of 41 Prepared For: Prepared By: Securonix 5777 W. Century

More information

Security Target. Symantec Data Loss Prevention 11.1.1. Document Version 1.0. January 23, 2012

Security Target. Symantec Data Loss Prevention 11.1.1. Document Version 1.0. January 23, 2012 Security Target Symantec Data Loss Prevention 11.1.1 Document Version 1.0 January 23, 2012 Document Version 1.0 Symantec Corporation Page 1 of 40 Prepared For: Prepared By: Symantec Corporation 350 Ellis

More information

McAfee Certified Product Specialist McAfee epolicy Orchestrator

McAfee Certified Product Specialist McAfee epolicy Orchestrator McAfee Certified Product Specialist McAfee epolicy Orchestrator Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 3 Recommended Exam Preparation 4 Exam Objectives

More information

Protection Profile for Server Virtualization

Protection Profile for Server Virtualization Protection Profile for Server Virtualization 29 October 2014 Version 1.0 i 0 Preface 0.1 Objectives of Document This document presents the Common Criteria (CC) Protection Profile (PP) to express the fundamental

More information

Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target

Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 0.7 Prepared for: Prepared by: Enterasys Networks, Inc. Corsec Security,

More information

Wyse Technology Inc. Wyse Device Manager Enterprise Edition Version 4.7.2 Security Target

Wyse Technology Inc. Wyse Device Manager Enterprise Edition Version 4.7.2 Security Target Wyse Technology Inc. Wyse Device Manager Enterprise Edition Version 4.7.2 Security Target Version 1.8 April 18, 2011 Wyse Technology Inc. 3471 N. First Street San Jose, CA 95134 DOCUMENT INTRODUCTION Prepared

More information

Trustwave Secure Web Gateway Security Target

Trustwave Secure Web Gateway Security Target Trustwave Secure Web Gateway Security Target Version 1.5 September 18, 2013 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report

More information

Certification Report

Certification Report Certification Report Symantec Network Access Control Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme

More information

Certification Report

Certification Report Certification Report EAL 3+ Evaluation of RSA envision platform v4.0 SP 1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING

SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING Document No. 1735-005-D0001 Version: 1.0, 3 June 2014 Prepared for: Fortinet, Incorporated 326 Moodie Drive Ottawa, Ontario Canada, K2H

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

Marimba Client and Server Management from BMC Software Release 6.0.3

Marimba Client and Server Management from BMC Software Release 6.0.3 Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...

More information

Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target

Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target Revision 1.0 August 2011 1 Table of Contents 1 SECURITY TARGET INTRODUCTION... 6 1.1 ST and TOE Reference... 6 1.2 Acronyms

More information

Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0

Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 ST Version 1.6 August 20, 2007 Document Version 1.6 Symantec Corporation Page 1 of 55 Prepared For: Prepared By: Symantec Corporation

More information

Check Point Endpoint Security Media Encryption Security Target

Check Point Endpoint Security Media Encryption Security Target Check Point Endpoint Security Media Encryption Security Target Version 1.0 June 23, 2010 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared By: Science Applications International Corporation

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Cisco Intrusion Detection System Sensor Appliance IDS-4200 series Version 4.1(3) Report

More information

Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target

Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows,

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

How To Protect Your Computer From Being Hacked

How To Protect Your Computer From Being Hacked Senforce Endpoint Security Suite Version 3.1.175 Security Target Version 1.0 06/19/07 Prepared for: Senforce Technologies, Inc. 147 W Election Rd Ste 110 Draper UT 84020 Prepared By: Science Applications

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5. Security Target

RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5. Security Target RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5 Security Target Evaluation Assurance Level: EAL2 Augmented with ALC_FLR.1 Document Version: 0.7 Prepared for: Prepared by: RSA, The

More information

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0 FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of McAfee Email and Web Security Appliance Version 5.5 Patch 2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of

More information

TIBCO ActiveMatrix BusinessWorks TM. Release 5.8

TIBCO ActiveMatrix BusinessWorks TM. Release 5.8 National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report TIBCO ActiveMatrix BusinessWorks TM Release 5.8 Report Number: CCEVS-VR-VID10230-2010 Dated:

More information

How To Evaluate Watchguard And Fireware V11.5.1

How To Evaluate Watchguard And Fireware V11.5.1 Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

LogRhythm Integrated Solution. Security Target

LogRhythm Integrated Solution. Security Target LogRhythm Integrated Solution Security Target Version 1.1 March 30, 2012 Prepared for: LogRhythm, Inc. 4780 Pearl East Circle Boulder, CO 80301 Prepared By: Science Applications International Corporation

More information

Symantec AntiVirus Enterprise Edition

Symantec AntiVirus Enterprise Edition Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise

More information

Certification Report

Certification Report Certification Report EAL 3+ Evaluation of AccessData Cyber Intelligence and Response Technology v2.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria

More information

IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0

IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0 IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0 CipherTrust 4800 North Point Parkway Suite 400 Alpharetta, GA 30022 Phone: 678-969-9399

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Protection Profile for Software Full Disk Encryption, Version 1.1 Report Number: CCEVS-VR-PP-0003

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification

More information

IMPP. Identity Management Protection Profile BSI-PP-0024

IMPP. Identity Management Protection Profile BSI-PP-0024 Identity Management Protection Profile IMPP BSI-PP-0024 Version Number 1.17 Date: January 12, 2006 Status: Final Author: David Ochel Owner: Brian Matthiesen Note: This document will become a public document

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition

Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition Version 1-0 7 February 2011 2011 Citrix Systems, Inc. All rights reserved. Summary of Amendments Version 1-0 7

More information

Certification Report

Certification Report Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government

More information

GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.

GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0. GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented

More information

Citrix Password Manager, Enterprise Edition Version 4.5

Citrix Password Manager, Enterprise Edition Version 4.5 122-B COMMON CRITERIA CERTIFICATION REPORT No. CRP235 Citrix Password Manager, Enterprise Edition Version 4.5 running on Microsoft Windows and Citrix Presentation Server Issue 1.0 June 2007 Crown Copyright

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Common Criteria for Information Technology Security Evaluation Protection Profile. General-Purpose Operating System Protection Profile

Common Criteria for Information Technology Security Evaluation Protection Profile. General-Purpose Operating System Protection Profile Common Criteria for Information Technology Security Evaluation Protection Profile General-Purpose Operating System Protection Profile 09 09 2013 Table of contents Table of Contents 1 INTRODUCTION... 7

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2

SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2 SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2 Document No. 1769-000-D0007 Version: v0.89, 12 September 2013 Prepared for: Centrify Corporation 785 N. Mary Avenue, Suite 200 Sunnyvale, California USA,

More information

Check Point Endpoint Security Full Disk Encryption Security Target

Check Point Endpoint Security Full Disk Encryption Security Target Check Point Endpoint Security Full Disk Encryption Security Target ST Version 2.4 June 22, 2009 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared by: Metatron Ltd. 66 Yosef St., Modiin, Israel

More information

Natek Network Access Control (NAC)

Natek Network Access Control (NAC) Natek Network Access Control (NAC) V 5.4.2 Security Target Release Date: 28.08.2014 Version 1.13 AUTHOR: NATEK BİLİŞİM BİLGİSAYAR EĞİTİM DANIŞMANLIK YAZILIM TİCARET SANAYİ ANONİM ŞİRKETİ 1 Revision History

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report NetIQ Security Manager Version 5.5 Report Number: CCEVS-VR-07-0058 Dated: 9 August 2007

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

RSA, The Security Division of EMC envision platform v4.0 SP 1. Security Target

RSA, The Security Division of EMC envision platform v4.0 SP 1. Security Target RSA, The Security Division of EMC envision platform v4.0 SP 1 Security Target Evaluation Assurance Level: 3+ Document Version: 0.8 Prepared for: Prepared by: RSA, The Security Division of EMC 174 Middlesex

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

Mobile Billing System Security Target

Mobile Billing System Security Target Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing

More information

Microsoft Windows Common Criteria Evaluation

Microsoft Windows Common Criteria Evaluation Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows Server 2012 Full Disk Encryption Security Target Document Information Version Number 1.0 Updated On April 3, 2014 Microsoft

More information

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

How To Understand The Toe

How To Understand The Toe Rapid7 Nexpose Vulnerability Management and Penetration Testing System V.5.1 Security Target Version 1.7 May 11, 2012 Prepared for: Rapid7 LLC 545 Boylston Street, Suite 400 Boston, MA 02116 Prepared By:

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Oracle Identity and Access Management 10g Release 10.1.4.0.1 running on Red Hat Enterprise Linux AS Release 4 Update 5

Oracle Identity and Access Management 10g Release 10.1.4.0.1 running on Red Hat Enterprise Linux AS Release 4 Update 5 122-B CERTIFICATION REPORT No. CRP245 Oracle Identity and Access Management 10g Release 10.1.4.0.1 running on Red Hat Enterprise Linux AS Release 4 Update 5 Issue 1.0 June 2008 Crown Copyright 2008 Reproduction

More information

The Comprehensive Guide to PCI Security Standards Compliance

The Comprehensive Guide to PCI Security Standards Compliance The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment

More information

Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64

Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64 122-B CERTIFICATION REPORT No. CRP250 Business Intelligence Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on update 5 Issue 1.0 June 2009 Crown Copyright 2009 All Rights Reserved Reproduction

More information