gateprotect Firewall Packet-Filtering-Core v10.3 Security Target Version:
|
|
|
- Monica Jemima Wheeler
- 10 years ago
- Views:
Transcription
1 Version: Status: Last Update: Classification: 1.0 Release public
2 Legal tice This document is provided AS IS with no express or implied warranties. Use the information in this document at your own risk. This document may be reproduced or distributed in any form without prior permission provided the copyright notice is retained on all copies. Modified versions of this document may be freely distributed provided that they are clearly identified as such, and this copyright is included intact. Revision History Revision Date Author(s) Changes to Previous Revision Andreas Siegert Public release Page 2 of 30
3 Table of Contents 1 Introduction Identification TOE Identification TOE Type TOE Overview TOE Description Introduction Architecture TOE Scope Physical and Logical Evaluated Configuration Security Functionality TOE Security Functions IT-Environment Support CC Conformance Claim Security Problem Definition Threat Environment Threats countered by the TOE Threats countered by the Operational Environment Assumptions Environment of use of the TOE Organizational Security Policies Security Objectives Objectives for the TOE Objectives for the Operational Environment Security Objectives Rationale Coverage Sufficiency Extended Components Definition Class FMT: Security management TOE Configuration (FMT_CFG) FMT_CFG.1 - Configuration of security functions FMT_CFG.2 - Static attribute initialisation Security Requirements Network Information Flow Control Policy TOE Security Functional Requirements Security audit (FAU) Audit data generation (FAU_GEN.1) Protected audit trail storage (FAU_STG.1) Action in case of possible audit data loss (FAU_STG.3) User data protection (FDP) Subset information flow control (FDP_IFC.1) Simple security attributes (FDP_IFF.1) Security management (FMT) Configuration of security functions (FMT_CFG.1) Page 3 of 30
4 Static attribute initialisation (FMT_CFG.2) Security Functional Requirements Rationale Coverage Sufficiency Security Requirements Dependency Analysis Security Assurance Requirements Security Assurance Requirements Rationale TOE Summary Specification TOE Security Functionality Network Information Flow Control Audit Configuration Abbreviations, Terminology and References Abbreviations Terminology References Page 4 of 30
5 List of Tables Table 1: Mapping of security objectives to threats and policies Table 2: Mapping of security objectives for the Operational Environment to assumptions, threats and policies Table 3: Sufficiency of objectives countering threats Table 4: Sufficiency of objectives holding assumptions Table 5: Sufficiency of objectives enforcing Organizational Security Policies Table 6: Security functional requirements for the TOE Table 7: Audit Events Table 8: Mapping of security functional requirements to security objectives Table 9: Security objectives for the TOE rationale Table 10: TOE SFR dependency analysis Table 11: Security assurance requirements Page 5 of 30
6 List of Figures Figure 1: TOE Overview... 9 Figure 2: TOE Environment Page 6 of 30
7 1 Introduction 1.1 Identification Title: Version: Status: Date: Sponsor: Developer: 1.0 Certification body: BSI Certification ID: Keywords: Release gateprotect AG gateprotect AG BSI-DSZ-CC TOE Identification, Common Criteria, firewall, packet filter, network security, information flow control The TOE is gateprotect Firewall Packet-Filtering-Core Version TOE Type The TOE type is Packet Filtering Firewall. 1.4 TOE Overview The TOE () is the network information flow enforcing software component of the gateprotect Firewall v10.3. The gateprotect Firewall v10.3 product containing the TOE is a next generation high performance firewall system. It secures businesses from malware attacks, viruses, unauthorized access and abuse. The gateprotect firewall protects networks from very small to large enterprises. It is characterized by optimal scaleability, security and performance. Based on an innovative technological architecture the gateprotect Firewall v10.3 is provided with a new web-based ergonomic Graphic User Interface egui. gateprotect's egui provides an intuitive and effective visual management interface. The process-oriented egui provides the following major advantages: Huge time-savings through a significant reduction in the number of rules. Reduction in the number of user errors due to the visualization of the entire network. Reduced operating costs through active management. Besides these features the firewall product also provides application visibility and control. V10.3 supports 64Bit Systems, auditing and full IPV6 integration. Network features such as Deep Packet Inspection, bridging, VLAN, and VPN crypto acceleration are included in gateprotect Firewall v10.3. The gateprotect Firewall v10.3 product is shipped as a Linux-based appliance. The TOE as part of the above described product is limited to the Packet-Filtering-Core and the configuration engine that simplifies the rule specification. Other product features (Deep Packet Inspection,VPN, egui) are excluded from the evaluation due to resource constraints, not because of any security relevant restrictions. Page 7 of 30
8 The Packet-Filtering-Core implements the Network Information Flow Control Policy in the running system. That policy acts on IP packets based on packet header information. In contrast to classic network access control devices, the TOE uses a high-level description of the Network Information Flow Control Policy to generate the rules for the filter allowing the administrator to focus on the big picture and not the details of how to protect the devices behind the firewall. Events from the filter and the configuration subsystem generate audit log events that can be used by the administrator to monitor the system. The administration of the TOE is performed in the TOE environment. The TOE itself just takes a configuration file from the environment and applies the configuration changes to the running system. 1.5 TOE Description Introduction The gateprotect Firewall v10.3 product is based on a Packet-Filtering-Core implemented by the TOE, which provides network access control based on a user-supplied rule base used to model the Network Information Flow Control Policy. The TOE is therefore a solution for secure network segregation and network border protection. The enforcement of the network information flow control policy is handled by the TOE providing a proprietary packet filtering component used by the appliance's underlying Linux operating system. The key difference between a regular IPTables firewall and the gateprotect firewall product is the way the rule base is configured. Instead of having to manually specify many detailed rules for IPTables, the gateprotect Firewall v10.3 product works with high level descriptive rules that model communication relationships. The configuration loading and rule transforming parts, a configuration database and the enforcing kernel components are all part of the TOE together with the audit daemon. The Linux appliance that hosts the firewall and the TOE contained within can provide other functionality as well, but such functionality is not part of the evaluated configuration as shown in the section about the evaluated configuration below. The additional product functionality does not interfere with the TSFI and therefore may be used in the evaluated configuration Architecture The enforcing components of the system (the Network Information Flow Control Subsystem) are implemented via IPTables. The filtering modules are embedded in the network stack of the appliance's underlying Linux system. Figure 1 shows the structure of the TOE. The physical and logical network interfaces (If) provided by the Linux environment deliver packets to the Network Information Flow Control Subsystem (NIFC) which handles the information flow control decisions based on the configuration of the NIFC and on the packet header information. This happens for all packets arriving at the network interfaces, regardless of whether they are destined locally or are to be routed through. The "Rules" part in figure 1 is implemented via IPTables. The Network Information Flow Control Subsystem configuration is loaded by a configuration loader (cltool) that reads the supplied configuration file and passes it on to the configuration daemon (stated) that transforms the user rules into IPTables rules and manages the available configurations in a configuration database. The configuration daemon then uses the iptables-restore script to load and activate the required IPTables rules into the kernel. Audit information including statistical data about the packet flow is provided by the packet filter. The configuration daemon provides audit information about configuration changes. The audit log daemons (ulogd, rsyslogd) gather that information and provide the audit log files on disk. A Page 8 of 30
9 watchdog daemon (monit) monitors the available file space for the audit data and generates alerts via the log file and should a configured threshold be reached. The configuration for monit is provided via stated. The visible interfaces to the TOE are the configuration file, the audit logs and the logical (and therefore also physical) network interfaces. gateprotect firewall Database TOE Boundary Kernel iptables-restore NIFC-Subsystem If stated HTTP cltool pipe (stdin) rsyslog ulogd Rules Logs / Statistics If If Configuration File Audit Log File Audit Partition monit Figure 1: TOE Overview A typical setup of the firewall is shown in figure 2. The firewall sits between two or more networks. One network is trusted (the internal network) and another one is untrusted (external network). The administrator uses TOE environment functions (secured network access via a dedicated network interface protected by the environment or console access to the underlying operating system) to access the TOE environment to deposit configuration information or fetch audit records. Page 9 of 30
10 TOE Environment External Network Database gateprotect firewall TOE Boundary Kernel iptables-restore NIFC-Subsystem If stated pipe (stdin) Rules If HTTP ulogd Logs / Statistics cltool rsyslog If Configuration File Audit Log File Audit Partition monit Internal Network Admin Workstation Figure 2: TOE Environment TOE Scope Physical and Logical The TOE is software only. It is included in the downloadable ISO install image for the gateprotect firewall appliances that is to be installed by the user. The explicit installation is only needed so that the integrity of the code can be verified. Relevant guidance documents for the secure operation of the TOE are: gateprotect Firewall v10.3 Packet Filtering Core Evaluated Configuration Guide The following components can be found in the IT environment: Debian Linux and its hardware platform. The logical scope of the TOE consists of the packet filter (IPTables) that are integrated into the IP stack of the underlying host system the configuration loading mechanism (cltool, stated with the associated database and iptables-restore script) the audit log daemons (ulogd, rsyslogd) and the monitoring watchdog daemon (monit) Evaluated Configuration The following configuration specifics apply to the evaluated configuration of the TOE: Page 10 of 30
11 Hardware The following appliances are supported platforms for the TOE: GPA 250 GPA 400 GPX 2500 The operating system used is Debian Linux 6.0 Network Protocols IPv4, IPv6 ICMP, ICMPv6, UDP, TCP, ESP, AH Bridging and VLAN support The following features and functions of the gateprotect Firewall appliance may be used but are not part of the evaluated TSF: Management egui to generate the configuration file. Deep Packet Inspection VPN Support (the packet filter does control the packet flow of VPN packets, but the use of the TOE as a VPN endpoint is not in the scope of the evaluation) Security Functionality TOE Security Functions Network Information Flow Control Packets arriving at the physical or logical network interfaces are subject to the network information flow control policy. They are either passed on or dropped according to the policy. Audit All packets handled by the firewall are subject to a statistics gathering module that records connections and provides a log of all connections and connection attempts handled by the firewall. Configuration changes are subject to audit record generation. Configuration The network information flow control can be modified by a configuration file in the TOE environment that the TOE uses to configure its runtime behaviour. The default policy is to drop packets and only by configuring explicit policies packets can be transported to or through the firewall. The configuration encompasses the behaviour of the Network Information Flow Control and the audit subsystem. Configuration changes are performed by editing a configuration file in the environment that is read by the configuration daemon IT-Environment Support The TOE relies on the Linux environment to provide Identification and Authentication for the administrator as well as data storage (configuration information and audit records) and basic networking support (network interfaces, routing). The reliable timestamps for the audit function are provided by the environment. Page 11 of 30
12 2 CC Conformance Claim This is CC Part 2 extended and conformant, with a claimed Evaluation Assurance Level of EAL4, augmented by ALC_FLR.1. This does not claim conformance to any Protection Profile. Common Criteria [CC] version 3.1 revision 3 is the basis for this conformance claim. Page 12 of 30
13 3 Security Problem Definition 3.1 Threat Environment This section describes the threat model for the TOE and identifies the individual threats that are assumed to exist in the TOE environment. The assets to be protected by the TOE are Subjects The network resources that are protected by the NIFCP. Configuration Data Configuration data of the TSF. Audit Records Audit records generated in the TOE. The threat agents having an interest to subvert the NIFCP are attackers (unauthorized users or systems) accessing the TOE or TOE protected systems from the networks connected to the TOE. Attackers with an Enhanced-Basic attack potential are assumed. TOE administrators which are actually administrators of the TOE environment, are assumed to be trustworthy, trained and to follow the instructions provided to them with respect to the secure configuration and operation of the systems under their responsibility. Hence, only inadvertent attempts to manipulate the safe operation of the TOE are expected from this community Threats countered by the TOE T.ASPOOF An external attacker may cause information to flow through the TOE into a connected network where the source address in the information is obviously spoofed. T.INISEC Network packets may inadvertently be routed through the TOE because the packet is not matched by any explicit rule. T.MEDIAT An attacker in the external network may send impermissible information through the TOE, including illegally formed packets, that circumvent the restrictions of the Network Information Flow Control Policy Threats countered by the Operational Environment TE.AUDIT An attacker may manipulate the underlying system of the TOE in a way that authorised administrators are not able to read the audit data. TE.FILE An attacker may alter TSF data without being detected. Page 13 of 30
14 3.2 Assumptions Environment of use of the TOE A.ADMINACC The IT-environment protects the logical and physical administrative access to the TOE. A.ADMINPORT A dedicated network port is used for administrative access to the TOE. A.NOEVIL Authorised administrators having access to the TOE environment, are competent, non-hostile and follow all their guidance; however, they are capable of error. A.PHYSEC The TOE is physically secure, i.e. no unauthorised persons have physical access to the TOE and its underlying system. A.RELHARD The underlying hardware, firmware (BIOS and device drivers) and the operating system functions needed by the TOE to guarantee secure operation, are working correctly and have no undocumented security critical side effect on the functions of the TOE. A.SINGIF Information cannot flow among the internal and external networks unless it passes through the TOE, i.e. the TOE is the only connection point between those two networks. A.RTS The IT-environment provides reliable timestamps 3.3 Organizational Security Policies P.AUDIT The TOE shall record all of its security relevant actions. P.CONFIG The TOE shall support the means to configure the network information flow control policy. Page 14 of 30
15 4 Security Objectives 4.1 Objectives for the TOE O.AUDIT The TOE must be able to provide audit evidence of security relevant events as well as for the use of security functions. O.MEDIAT The TOE must mediate the flow of all information between the TOE's network interfaces. O.CONFIG The TOE must provide the means to configure the network information flow control policy. O.SECSTA Upon initial start-up of the TOE or during configuration, the TOE shall provide well-defined restrictive initial settings for security relevant functions. 4.2 Objectives for the Operational Environment OE.ADMINACC The IT-environment must provide logical and physical protection of the administrative access to the TOE. OE.ADMINPORT The administrative network access to the TOE must only use a dedicated port of the appliance and not any of the other available network ports. OE.NOEVIL Authorised administrators are competent, non-hostile and are trained as to establishment and maintenance of sound security policies and practices for the privileges they have been given. OE.AUDIT The underlying operating system must enable the authorised administrator to read the recorded audit trail. OE.FILESEC The TOE environment must protect configuration and other TSF data stored in files against any undetected unauthorised modification. OE.PHYSEC The TOE and its underlying hardware must be protected from physical access by unauthorised personnel. Page 15 of 30
16 OE.RELHARD The underlying hardware, firmware (BIOS and device drivers) and operating system functions needed by the TOE to guarantee secure operation, must be working correctly and must not have undocumented security critical side effects on the functions of the TOE. OE.SINGIF The connection provided by the TOE is the only one between the connected networks so that all information must flow through the TOE. OE.RTS The IT environment provides reliable timestamps. 4.3 Security Objectives Rationale Coverage The following table provides a mapping of TOE objectives to threats and policies, showing that each objective counters or enforces at least one threat or policy, respectively. Objective O.AUDIT O.MEDIAT O.CONFIG O.SECSTA Threats / OSPs P.AUDIT T.ASPOOF T.MEDIAT P.CONFIG T.INISEC Table 1: Mapping of security objectives to threats and policies The following table provides a mapping of the objectives for the Operational Environment to assumptions, threats and policies, showing that each objective holds, counters or enforces at least one assumption, threat or policy, respectively. Objective OE.ADMINACC OE.ADMINPORT OE.NOEVIL OE.AUDIT OE.FILESEC OE.PHYSEC OE.RELHARD OE.SINGIF Assumptions / Threats / OSPs A.ADMINACC A.ADMINPORT A.NOEVIL TE.AUDIT TE.FILE A.PHYSEC A.RELHARD A.SINGIF T.ASPOOF T.MEDIAT Page 16 of 30
17 Objective OE.RTS Assumptions / Threats / OSPs A.RTS P.AUDIT Table 2: Mapping of security objectives for the Operational Environment to assumptions, threats and policies Sufficiency The following rationale provides justification that the security objectives are suitable to counter each individual threat and that each security objective tracing back to a threat, when achieved, actually contributes to the removal, diminishing or mitigation of that threat: Threat T.ASPOOF T.INISEC T.MEDIAT TE.AUDIT TE.FILE Rationale for security objectives By demanding that the TOE must mediate (i.e. examine and control) every information sent between different networks connected to the TOE as in O.MEDIAT, the threat of address spoofing as in T.ASPOOF can be removed. This requires the TOE to be the single interface between the networks (OE.SINGIF). By requiring well-defined restrictive default setting in O.SECSTA, an initial insecure configuration of the TOE is prevented and the threat T.INISEC of packets being routed through the firewall because the packet is not matched by any explicit firewall rule is removed. By demanding that the TOE must mediate (i.e. examine) every information sent between different networks connected to the TOE as in O.MEDIAT, the threat of impermissible information sent through the TOE as in T.MEDIAT can be diminished to an acceptable level. This requires the TOE to be the single interface between the networks (OE.SINGIF). The threat TE.AUDIT that an administrator on the console cannot inspect this audit evidence is removed by demanding the possibility to view this log files in OE.AUDIT. Protection of files in the TOE IT-environment against undetected unauthorised modification as in OE.FILESEC diminishes the threat TE.FILE to an acceptable level. Table 3: Sufficiency of objectives countering threats The following rationale provides justification that the security objectives for the environment are suitable to cover each individual assumption, that each security objective for the environment that traces back to an assumption about the environment of use of the TOE, when achieved, actually contributes to the environment achieving consistency with the assumption, and that if all security objectives for the environment that trace back to an assumption are achieved, the intended usage is supported: Assumption A.ADMINACC Rationale for security objectives The protection of the administrative access to the TOE is supported by OE.ADMINACC Page 17 of 30
18 Assumption A.ADMINPORT A.NOEVIL A.PHYSEC A.RELHARD A.SINGIF A.RTS Rationale for security objectives The assumption that the administrative access to the TOE is limited to a dedicated port is supported by OE.ADMINPORT. The assumption of A.NOEVIL that administrators are non-hostile and trained is supported by OE.NOEVIL. By demanding physical security for the TOE in OE.PHYSEC the environment is consistent with the assumption of such security in A.PHYSEC. The assumption of correct underlying hardware, firmware and operating system without security critical side effects as in A.RELHARD is consistent with OE.RELHARD demanding the absence of such side effects. The correct working of the underlying machine, e.g. related to memory management, program execution, access control and privilege management or identification and authentication, is the basis for the correct working of the TSF. The assumption of information that cannot flow among internal and external networks without passing the TOE as in A.SINGIF is consistent with the objective for the environment, OE.SINGIF which demands that the TOE is the only connection between those networks is provided by the TOE. The assumption about the provisioning of reliable time stamps by the environment is backed by the corresponding objective for the operational environment. Table 4: Sufficiency of objectives holding assumptions The following rationale provides justification that the security objectives are suitable to cover each individual organizational security policy, that each security objective that traces back to an OSP, when achieved, actually contributes to the implementation of the OSP, and that if all security objectives that trace back to an OSP are achieved, the OSP is implemented: OSP P.AUDIT P.CONFIG Rationale for security objectives The policy to provide audit records for all security relevant actions performed by the TOE is implemented by the objective O.AUDIT which provides an audit mechanism and is supported by the objective OE.RTS to provide a reliable time source in the runtime environment. The policy to provide the means to configure the NIFC is implemented by the objective O.CONFIG which supports the configuration of the NIFC. Table 5: Sufficiency of objectives enforcing Organizational Security Policies Page 18 of 30
19 5 Extended Components Definition The TOE itself does not support administrators, this is handled in the environment. Nevertheless, the TOE does support management by configuration files. To better model this, the family CFG is introduced in class FMT instead of using FMT_MSA/FMT_SMF. 5.1 Class FMT: Security management TOE Configuration (FMT_CFG) Family behaviour This family defines requirements for TOE configuration that are independent of administrative roles. Component levelling FMT_CFG.1 specifies configurability of the TOE without the need of management roles. FMT_CFG.1 is not hierarchical to any other component within the FMT_CFG family. FMT_CFG.2 specifies TOE configuration value initialization. FMT_CFG.2 is not hierarchical to any other component within the FMT_CFG family. Management: FMT_CFG.1 There are no management activities foreseen. Management: FMT_CFG.2 There are no management activities foreseen. Audit: FMT_CFG.1 The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST: a) Minimal: Changes of the TOE configuration. Audit: FMT_CFG.2 There are no audit events foreseen FMT_CFG.1 - Configuration of security functions Hierarchical to: Dependencies: other components. dependencies. FMT_CFG.1.1 The TSF shall be capable of configuring the following security functions: [assignment: list of functions to be configurable by the TSF]. Rationale The configuration of the TOE is specified with a configuration method that is not dependent on TOE supported roles FMT_CFG.2 - Static attribute initialisation Hierarchical to: Dependencies: other components. dependencies. Page 19 of 30
20 FMT_CFG.2.1 FMT_CFG.2.2 The TSF shall enforce the [assignment: access control SFP, information flow control SFP] to provide [selection, choose one of: restrictive, permissive, [assignment: other property]] default values for security attributes that are used to enforce the SFP. The TSF shall support the specification of alternative initial values to override the default values used in enforcing the security policy. Rationale The defaults of the TOE configuration are specified with a configuration method that is not dependent on TOE supported roles. Page 20 of 30
21 6 Security Requirements 6.1 Network Information Flow Control Policy The TOE implements the following network information flow control policy (NIFCP): Subjects: Users (external entities) Send and/or receive information through the TOE. Subject security attributes Subjects are identified by IP or MAC addresses. A user in this context is any entity (human or IT) outside the TOE that interacts (or may interact) with the TOE. Information Packets Data sent, received or routed through the TOE. Information security attributes Source and Destination IP address; MAC address; the logical or physical network interface through which the network data entered the TOE; VLAN tag; Network protocol: IPv4, IPv6, ICMP, ICMPv6, ESP, AH; Protocol specific header information. The policy allows or denies information flow according to the rules that use information security attributes to control the network information flow. 6.2 TOE Security Functional Requirements The following table shows the Security functional requirements for the TOE, and the operations performed on the components according to CC part 2: iteration (Iter.), refinement (Ref.), assignment (Ass.) and selection (Sel.). Security functional group Security functional requirement Source Iter. Operations Ref. Ass. Sel. FAU - Security audit FAU_GEN.1 Audit data generation FAU_STG.1 Protected audit trail storage CC Part 2 CC Part 2 Yes Yes Yes Yes FAU_STG.3 Action in case of possible audit data loss CC Part 2 Yes Yes FDP - User data protection FDP_IFC.1 Subset information flow control FDP_IFF.1 Simple security attributes CC Part 2 CC Part 2 Yes Yes FMT - Security management FMT_CFG.1 Configuration of security functions FMT_CFG.2 Static attribute initialisation ECD ECD Yes Yes Yes Table 6: Security functional requirements for the TOE Page 21 of 30
22 6.2.1 Security audit (FAU) Audit data generation (FAU_GEN.1) FAU_GEN.1.1 FAU_GEN.1.2 The TSF shall be able to generate an audit record of the following auditable events: a) Start-up and shutdown of the audit functions; b) All auditable events for the not specified level of audit; and c) The audit events specified in table 7. The TSF shall record within each audit record at least the following information: a) Date and time of the event, type of event, subject identity (if applicable), and the outcome (success or failure) of the event; and b) For each audit event type, based on the auditable event definitions of the functional components included in the PP/ST, the information listed in table 7. Event Config daemon started Config daemon stopped Activation of configuration started Activation of configuration finished Configuration element added Configuration element deleted Configuration element changed Generic packet dropped event IP was blacklisted New connection established New local connection established Connection ended Type CONFIGSTART CONFIGSTOP ACTIVATING ACTIVATED ADD DELETE CHANGE DROPPED BLACKLISTED NEW NEWLO CLOSED Information DateTime, Message string DateTime, Message string DateTime, Message string DateTime, Message string DateTime, Message string, Added value DateTime, Message string, Deleted value DateTime, Message string, Old Value, New Value DateTime, Message string, PCAP formatted packet capture DateTime, Message string, Source IP DateTime, Message string, Destination IP, Service, Protocol DateTime, Message string, Destination IP, Service, Protocol DateTime, Message string, Destination IP, Service, Protocol, Connection time Table 7: Audit Events Protected audit trail storage (FAU_STG.1) FAU_STG.1.1 FAU_STG.1.2 The TSF shall protect the stored audit records in the audit trail from unauthorised deletion. The TSF shall be able to prevent unauthorised modifications to the stored audit records in the audit trail. Page 22 of 30
23 Application te: The TOE prevents the unauthorised modifications (including deletion) of the audit trail by specifying the appropriate restrictive permissions when creating the audit trail files Action in case of possible audit data loss (FAU_STG.3) FAU_STG.3.1 The TSF shall generate a notification if the available space for the audit trail exceedsreaches a configured limit. Application te: When the audit trail reaches the configuration file defined limit, a warning message is generated in the audit trail so that any post-processing application can pick up the message. The configuration can also specify that the TOE generates a warning to an administrator configured address. Application te: A log rotate mechanism is employed that creates a new log file weekly. Four weeks of logs are stored User data protection (FDP) Subset information flow control (FDP_IFC.1) FDP_IFC.1.1 The TSF shall enforce the network information flow control policy (NIFCP) on a) Subjects: entities identified by IP and/or MAC addresses; b) Information: data packets to be transferred between entities; c) Operations: the transfer of data packets to and from entities via network connections Simple security attributes (FDP_IFF.1) FDP_IFF.1.1 FDP_IFF.1.2 FDP_IFF.1.3 The TSF shall enforce the network information flow control policy (NIFCP) based on the following types of subject and information security attributes: a) Source and Destination IP address b) MAC address c) The logical or physical network interface through which the network data entered the TOE and the associated VLAN tag of the interface d) Network protocol: IPv4, IPv6, ICMP, ICMPv6, ESP, AH e) Protocol specific header information The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules hold: If the packet filter matches the analyzed packet and the rule accepts the packet, the packet is forwarded according to the network protocol stack's configured behavior. The TSF shall enforce the following rules: a) Identification of network packets using one or more of the following concepts: 1. Subject security attribute matching; 2. Information security attribute matching; 3. Matching based on the state of a TCP connection; Page 23 of 30
24 4. Statistical analysis matching; b) Performing one of the following actions with identified network data: 1. Discard the network data without any further processing, without sending a notification to the sender (DROP); 2. Discard the network data without any further processing, with sending a notification to the sender (REJECT); 3. Allow the network data to be processed unaltered by the TOE according to the routing information maintained by the TOE (ACCEPT); FDP_IFF.1.4 FDP_IFF.1.5 The TSF shall explicitly authorise an information flow based on the following rules: If the network data is not matched by the rule set and the default rule of the packet filter is ACCEPT then the data is forwarded unaltered based on the normal operation of the host system's networking stack. The TSF shall explicitly deny an information flow based on the following rules: If the network data is not matched by the rule set, one of the following default rules applies: a) DROP: the data is discarded; b) REJECT: then the data is discarded and a notification is returned to the sender. Application te: The TOE is shipped with an explicit deny policy that drops packets, but can be configured for an explicit allow policy Security management (FMT) Configuration of security functions (FMT_CFG.1) FMT_CFG.1.1 The TSF shall be capable of configuring the following security functions: a) Network Information Flow Control Static attribute initialisation (FMT_CFG.2) FMT_CFG.2.1 FMT_CFG.2.2 The TSF shall enforce the network information flow control policy (NIFCP) to provide restrictive default values for security attributes that are used to enforce the SFP. The TSF shall support the specification of alternative initial values to override the default values used in enforcing the security policy. Application te:: The TOE does not distinguish between audit records for normal configuration changes or changes to defaults. Changes to defaults are recorded as regular configuration changes. 6.3 Security Functional Requirements Rationale Coverage The following table provides a mapping of SFR to the security objectives, showing that each security functional requirement addresses at least one security objective. Page 24 of 30
25 Security Functional Requirements FAU_GEN.1 FAU_STG.1 FAU_STG.3 FDP_IFC.1 FDP_IFF.1 FMT_CFG.1 FMT_CFG.2 Objectives O.AUDIT O.AUDIT O.AUDIT O.MEDIAT O.MEDIAT O.CONFIG O.SECSTA Table 8: Mapping of security functional requirements to security objectives Sufficiency The following rationale provides justification for each security objective for the TOE, showing that the security functional requirements are suitable to meet and achieve the security objectives: Security objectives O.AUDIT O.MEDIAT O.CONFIG O.SECSTA Rationale The objective is satisfied by the audit generation in FAU_GEN.1. Audit records are protected via FAU_STG.1 and the TOE configuration can specify the actions to be taken by the TOE when the audit trail can not be written via FAU_STG.3. The objective is satisfied by the instantiation of the network flow control policy in FDP_IFC.1 and FDP_IFF.1. The network information flow control policy is configured via FMT_CFG.1. Secure default values are mandated through FMT_CFG.2 Table 9: Security objectives for the TOE rationale Security Requirements Dependency Analysis Dependencies within the EAL4 package selected for the security assurance requirements have been considered by the authors of and are not analyzed here again. The included component on flaw remediation, ALC_FLR.1, has no dependencies on other requirements. The security functional requirements in this do not introduce dependencies on any security assurance requirement; neither do the security assurance requirements in this introduce dependencies on any security functional requirement. The following table demonstrates the dependencies of SFRs modeled in CC Part 2 and how the SFRs for the TOE resolve those dependencies: Page 25 of 30
26 Security Functional Requirement FAU_GEN.1 FAU_STG.1 FAU_STG.3 FDP_IFC.1 FDP_IFF.1 FMT_CFG.1 FMT_CFG.2 Dependencies FPT_STM.1 FAU_GEN.1 FAU_STG.1 FDP_IFF.1 FDP_IFC.1 FMT_MSA.3 dependencies. dependencies. Resolution t resolved: The TOE itself does not generate reliable time stamps but uses them from the environment (OE.RTS). FAU_GEN.1 FAU_STG.1 FDP_IFF.1 FDP_IFC.1 t resolved: The TOE does not support administrative roles. Therefore the configuration aspects are covered by FMT_CFG.2 instead of FMT_MSA.3. Table 10: TOE SFR dependency analysis 6.4 Security Assurance Requirements The security assurance requirements for the TOE are the Evaluation Assurance Level 4 components as specified in [CC] part 3, augmented by ALC_FLR.1. The following table shows the Security assurance requirements, and the operations performed on the components according to CC part 3: iteration (Iter.), refinement (Ref.), assignment (Ass.) and selection (Sel.). Security assurance class Security assurance requirement Source Iter. Operations Ref. Ass. Sel. ADV Development ADV_ARC.1 Security architecture description ADV_FSP.4 Complete functional specification ADV_IMP.1 Implementation representation of the TSF ADV_TDS.3 Basic modular design AGD Guidance documents AGD_OPE.1 Operational user guidance AGD_PRE.1 Preparative procedures ALC Life-cycle support ALC_CMC.4 Production support, acceptance pro cedures and automation ALC_CMS.4 Problem tracking CM coverage ALC_DEL.1 Delivery procedures Page 26 of 30
27 Security assurance class Security assurance requirement Source Operations Iter. Ref. Ass. Sel. ALC_DVS.1 Identification of security measures ALC_FLR.1 Basic flaw remediation ALC_LCD.1 Developer defined life-cycle model ALC_TAT.1 Well-defined development tools ASE Security Target evaluation ASE_INT.1 ST introduction ASE_CCL.1 Conformance claims ASE_SPD.1 Security problem definition ASE_OBJ.2 Security objectives ASE_ECD.1 Extended components definition ASE_REQ.2 Derived security requirements ASE_TSS.1 TOE summary specification ATE Tests ATE_COV.2 Analysis of coverage ATE_DPT.1 Testing: basic design ATE_FUN.1 Functional testing ATE_IND.2 Independent testing - sample AVA Vulnerability assessment AVA_VAN.3 Focused vulnerability analysis Table 11: Security assurance requirements 6.5 Security Assurance Requirements Rationale The basis for the justification of EAL4 is the threat environment experienced by the typical consumers of the TOE. This matches the package description for EAL4 (enhanced-basic). In addition, the evaluation assurance level has been augmented with ALC_FLR.1 commensurate with the flaw remediation capabilities offered by the developer beyond those required by the evaluation assurance level. Page 27 of 30
28 7 TOE Summary Specification 7.1 TOE Security Functionality Network Information Flow Control The Network Information Flow Control Policy (NIFCP) is enforced by the TOE providing a filtering mechanism that is integrated into the networking stack of the underlying system. All packets flowing to, from or through the system are subject to this filtering mechanism. The filtering mechanism is implemented via IPTables. It uses a high level configuration language that abstracts from the actual rule set. Instead configuration happens in terms of a network graph consisting of nodes and connections between them. Allowed services, forwarding of packets and connection constraints (like limiting of parallel connections, connection quotas and so on) can all be configured in terms of this network graph. Eventually the graph is translated into a concrete set of enforceable IPTables rules. Additionally enhanced logging and statistics about the packet flow are provided. For example, log information is generated with knowledge about the configured network graph, so that the raw log data can be improved by adding user supplied node and edge labels (office names, user names, ). The rules generated for IPTables use the first match for the packet handling decision. The high-level configuration is translated into the IPTables rules so that the best match is the first match. IPTables handles packets at the network layer and up (IP and higher layers) but also supports filtering at MAC layer. Where exactly the enforcement happens is of no concern for the user supplied configuration, those details are hidden to reduce the complexity of the configuration. In addition to the connection-oriented filtering, filters can also be set on connection and rate limits which can be used to protect systems that are shielded by the firewall from DOS attacks. When the configured packet filter connection thresholds are reached for a specific system, the filter can automatically add a rule to block the system that reached this threshold in quota rule. The filters are using hooks in several places within the IP stack of the underlying system. This allows the filter to provide packet handling decisions based on the Information Flow Control Policy at all points in the system from inception via routing to the final sending. The filter uses the incoming interface, MAC, VLAN tag and IP Addresses as well as packet header contents depending on the protocol (IP (both v4, v6), ICMP, ICMPv6, UDP, TCP, IPsec (AH and ESP)) and statistical information to allow or deny packets according to the configured rule base. This security functionality implements the requirements from FDP_IFC.1 and FDP_IFF Audit The filtering mechanism can generate audit events for all actions that are performed on packets. The configuration daemon (stated) generates audit events for changes to the configuration and the activation of a specific configuration. All the events are collected by user space daemons (ulogd, rsyslogd) and stored in the TOE's environment with restrictive DAC settings. Theoretically all packets inspected by the filter could generate audit events with the appropriate configuration. But that would lead to impractical audit log files with huge amounts of redundant information. Therefore the available audit events focus on connections instead of individual packets if connections can be detected from the packet flow. In addition to packet and connection oriented logging, reaching configured thresholds (quota limits) for connections will also generate audit events. Changes to the configuration also generate audit records. Page 28 of 30
29 The audit trail is protected by the TOE environment, the protection needed is specified via the permission bits set by the audit log daemon when creating the audit trail file. The audit trail is implemented as multiple files. New log files are generated every week and up to four weeks are stored. The logrotate utility in the TOE environment handles this task. When a configuration-specified threshold for the available audit trail storage is reached, the TOE generates a warning log entry and sends an alert to an administrator configured address. This security functionality implements the requirements from FAU_GEN.1, FAU_STG.1 and FAU_STG.3. The audit mechanism relies on the underlying system to provide a reliable time source for the audit records Configuration The Network Information Flow Control Policy and the events to be audited are loaded from a file in the TOE environment. All of the high level configuration information is stored in a database in the TOE environment which is read by the TOE via a parser and translated into the detailed rules for the enforcement component. Access to the configuration information on disk is controlled by the IT environment granted only to the environments authenticated administrators. The abstract rule configuration can be changed at any time during the operation of the TOE via a command that reads updated configuration information from a file. These changes will be registered and stored in a configuration database. A separate activation step is necessary to convert this configuration into an actual rule set to be used by the filtering mechanism. The activation mechanism can also be used to recall older configurations that are stored in the configuration database. The configuration file can be edited with any text editor, it uses JSON. Within the file, objects and object relationships are defined. Network entities (hosts or networks defined by IP address ranges) are defined by address and interface over which they are connected to the firewall. Connections are defined by specifying source and destination network entities and the allowed and prohibited communication forms The initial defaults prevent any traffic to pass, therefore the system maintains a secure state also during startup before loading of the configured rules. This security functionality implements the requirements from FMT_CFG.1 and FMT_CFG.2. Page 29 of 30
30 8 Abbreviations, Terminology and References 8.1 Abbreviations DAC Discretionary Access Control DOS Denial Of Service 8.2 Terminology This section contains definitions of technical terms that are used with a meaning specific to this document. Terms defined in the [CC] are not reiterated here, unless stated otherwise. Administrator Humans that interact with the TOE environment to provide a configuration file for the TOE. JSON JavaScript object notation, a structured way to define objects. PCAP Packet Capture, usually a shorthand to refer to functions and formats used by libpcap. User Humans or machines interacting with the TOE via network interfaces. 8.3 References CC Common Criteria for Information Technology Security Evaluation Version 3.1R3 Date July 2009 Location PART1V3.1R3.pdf Location PART2V3.1R3.pdf Location PART3V3.1R3.pdf Page 30 of 30
Security Target. Astaro Security Gateway V8 Packet Filter Version 1.000. Assurance Level EAL4+ Common Criteria v3.1
Astaro Security Gateway V8 Packet Filter Version 1.000 Assurance Level EAL4+ Common Criteria v3.1 This Security Target also covers the secunet wall 2 packet filter Version : 1.03 Date: 2011-05-20 Author:
Certification Report StoneGate FW/VPN 5.2.5
Ärendetyp: 6 Diarienummer: 11FMV3127-87:1 Dokument ID HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2012-01-23 Country of origin: Sweden Försvarets materielverk Swedish Certification Body
Security Target. Symantec TM Network Access Control Version 12.1.2. Document Version 0.12. February 14, 2013
Security Target Symantec TM Network Access Control Version 12.1.2 Document Version 0.12 February 14, 2013 Document Version 0.12 Symantec Page 1 of 39 Prepared For: Prepared By: Symantec Corporation 350
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3)
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3) Reference: ST January 2001 Version: 1.6 Europe: USA: CISCO Systems Ltd CISCO Systems Inc. 3 The Square 170 West Tasman Drive Stockley
DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75
DataPower S40 ML Security Gateway and DataPower I50 Integration Appliance Version 3.6 Security Target Version 0.75 10/09/2008 Prepared for: IBM SOA Appliance Group One Rogers St Cambridge, MA 02142 Prepared
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 0.7 Prepared for: Prepared by: Enterasys Networks, Inc. Corsec Security,
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Author: Microsoft Corp. Version: 1.0 Last Saved: 2011-03-10 File Name: MS_UAG_ST_1.0.docx
Firewall Protection Profile V2.0 2008. 4. 24
Firewall Protection Profile V2.0 2008. 4. 24 (This page left blank on purpose for double-side printing) Protection Profile Title Firewall Protection Profile for Government Evaluation Criteria Version This
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction
Firewall Protection Profile
samhällsskydd och beredskap 1 (38) ROS-ISÄK Ronny Janse 010-2404426 [email protected] Firewall Protection Profile samhällsskydd och beredskap 2 (38) Innehållsförteckning 1. Introduction... 4 1.1 PP reference...
Mobile Billing System Security Target
Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing
Guidelines for Developer Documentation
Guidelines for Developer Documentation according to Common Criteria Version 3.1 Version 1.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Phone: +49 (0)3018 9582-111
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle
Build a CC assurance package dedicated to your risk assessment. Francois GUERIN Security Program Manager francois.guerin@gemalto.
Build a CC assurance package dedicated to your risk assessment Francois GUERIN Security Program Manager [email protected] Gemplus & Axalto merge into Gemalto 1.7 billion in combined pro-forma
Xceedium GateKeeper Version 5.2.1 Security Target
ceedium GateKeeper Version 521 Security Target February 3, 2011 Prepared for: ceedium, Inc 30 Montgomery Street Jersey City, NJ 07302 Prepared By: Science Applications International Corporation Common
Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012
Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa
How To Evaluate A Security Target Of Evaluation (Toe)
Security Target McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 Document Version 1.1
EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.
EMC Corporation Data Domain Operating System Version 5.2.1.0 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.11 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton,
Security Target. Securonix Security Intelligence Platform 4.0. Document Version 1.12. January 9, 2015
Security Target Securonix Security Intelligence Platform 4.0 Document Version 1.12 January 9, 2015 Document Version 1.12 Copyright Securonix Page 1 of 41 Prepared For: Prepared By: Securonix 5777 W. Century
Fingerprint Spoof Detection Protection Profile
Fingerprint Spoof Detection Protection Profile based on Organisational Security Policies FSDPP_OSP v1.7 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 228 99
EAL4+ Security Target
EAL4+ Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 21-DEC-10 Document management Document identification Document ID Document title Release authority E14_EAL4_ASE Microsoft
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government
Common Criteria for Information Technology Security Evaluation. Part 3: Security assurance components. September 2012. Version 3.
Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components September 2012 Version 3.1 Revision 4 CCMB-2012-09-003 Foreword This version of the Common Criteria
Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT
Template: CSEC_mall_doc.dot, 7.0 Ärendetyp: 6 Diarienummer: 14FMV10188-21:1 Dokument ID CB-015 HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2015-06-12 Country of origin: Sweden Försvarets
TRUSTED SECURITY FILTER SECURITY TARGET
TRUSTED SECURITY FILTER SECURITY TARGET Edition: 4 29 Oct 07 Previous editions: Ed. 1 11 May 2006 Ed. 2 16 Aug 2006 Ed. 3 28 June 2007 Author: KKK Appr.: PÅT All pages in this document shall have the same
Security Target. McAfee Enterprise Mobility Management 12.0. Document Version 1.16
Security Target McAfee Enterprise Mobility Management 12.0 Document Version 1.16 September 17, 2014 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 Primasec Ltd
How To Understand The Toe
Rapid7 Nexpose Vulnerability Management and Penetration Testing System V.5.1 Security Target Version 1.7 May 11, 2012 Prepared for: Rapid7 LLC 545 Boylston Street, Suite 400 Boston, MA 02116 Prepared By:
Joint Interpretation Library
Document purpose: provide rules to ensure that CC is used for hardware integrated circuits in a manner consistent with today s state of the art hardware Version 3.0 February 2009 Joint Interpretation Library
Extreme Networks, Inc. ExtremeXOS Network Operating System v12.3.6.2
Extreme Networks, Inc. ExtremeXOS Network Operating System v12.3.6.2 Security Target Evaluation Assurance Level: EAL3+ Document Version: 0.9 Prepared for: Prepared by: Extreme Networks, Inc. 3585 Monroe
How To Protect Your Computer From Being Hacked
Senforce Endpoint Security Suite Version 3.1.175 Security Target Version 1.0 06/19/07 Prepared for: Senforce Technologies, Inc. 147 W Election Rd Ste 110 Draper UT 84020 Prepared By: Science Applications
JMCS Northern Light Video Conferencing System Security Target
JMCS Northern Light Video Conferencing System Security Target Common Criteria: EAL2 Version 1.2 22 FEB 12 Document management Document identification Document ID Document title Product version NLVC_ST_EAL2
BMC ProactiveNet Performance Management 9.5. Security Target
BMC ProactiveNet Performance Management 9.5 Security Target Version 0.4 18 July 2014 Copyright 2014 BMC Software, Inc. All rights reserved. BMC, BMC Software, and the BMC Software logo are the exclusive
IBM WebSphere Message Broker Security Target
IBM WebSphere Message Broker Security Target Version 2.1.2 2007-08-22 Document History Version Date Summary Author 1.0 2006-10-23 Final EAL3 ST plus changes by IBM. SAIC / IBM 1.1 2006-12-11 Fixed inconsistencies.
Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0
Security Target NetIQ Access Manager 4.0 Document Version 1.13 August 7, 2014 Document Version 1.13 NetIQ Page 1 of 36 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite 810 Houston, TX
CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target
CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target Version 2.0 June Version 21, 2010 0.6 December 29, 2008 Prepared for: Prepared CA for: 100 Staples CA, Inc. Drive Framingham, 100
Security Target. Symantec Data Loss Prevention 11.1.1. Document Version 1.0. January 23, 2012
Security Target Symantec Data Loss Prevention 11.1.1 Document Version 1.0 January 23, 2012 Document Version 1.0 Symantec Corporation Page 1 of 40 Prepared For: Prepared By: Symantec Corporation 350 Ellis
BMC Real End User Experience Monitoring and Analytics 2.5. Security Target
BMC Real End User Experience Monitoring and Analytics 2.5 Security Target Version 0.07 5 March 2015 Copyright 2015 BMC Software, Inc. All rights reserved. BMC, BMC Software, and the BMC Software logo
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows,
Secuware Virtual System (SVS)
Secuware Virtual System (SVS) SECURITY TARGET EAL2 Copyright 2008 by SECUWARE All rights reserved. The information in this document is exclusive property of SECUWARE and may not be changed without express
Trustwave DbProtect Version 6.4.3 Security Target
Trustwave DbProtect Version 6.4.3 Security Target Version 1.8 July 21, 2015 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane
Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target
Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target Evaluation Assurance Level: EAL2 augmented with ALC_FLR.2 Document Version: 1 Prepared for: Prepared by: Citrix
CERTIFICATION REPORT
REF: 2010-24-INF-831 v1 Target: Público Date: 07.03.2012 Created by: CERT3 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2010-24 Huawei BSC6900 Multimode Base Station Controller (MBSC)
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN
REF: 2010-22-INF-764 V1 Distribution: Expediente Date: 21.11.2011 Created: CERT3 Reviewed: CALIDAD Approbed: TECNICO CERTIFICATION REPORT FOR FOR HUAWEI INTEGRATED MANAGEMENT APPLICATION PLATFORM VERSION
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Protection Profile for Server Virtualization
Protection Profile for Server Virtualization 29 October 2014 Version 1.0 i 0 Preface 0.1 Objectives of Document This document presents the Common Criteria (CC) Protection Profile (PP) to express the fundamental
FOR EAL2 AUGMENTED WITH ALC_FLR.1. Version: 1.2 November 20, 2013
SECURITY TARGET FOR A10 NETWORKS THUNDER 5430S AND 6430S APPLICATIONS DELIVERY CONTROLLERS EAL2 AUGMENTED WITH ALC_FLR.1 Version: 1.2 November 20, 2013 DENMARK FINLAND NORWAY SWEDEN THE NETHERLANDS www.secode.no
Joint Interpretation Library. Guidance for smartcard evaluation
Joint Interpretation Library Guidance for smartcard evaluation Version 2.0 February 2010 Table of content 1. REFERENCES 5 2. OBJECTIVE 6 3. SMARTCARD PRODUCT PRESENTATION AND DEFINITIONS 7 3.1. Glossary
Security Target for BorderWare Firewall Server 6.5
Security Target for BorderWare Firewall Server 6.5 Reference: ST January 2002 Version : 2.4 North America: Europe: 50 Burnhamthorpe Rd. W. 1 The Harlequin Centre Suite 502 Southall Lane Mississauga Southall
U.S. Government Protection Profile for Database Management Systems
U.S. Government Protection Profile for Database Management Systems Information Assurance Directorate Version 1.3 December 24, 2010 Protection Profile Title: 1 U.S. Government Protection Profile for Database
Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0
Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 ST Version 1.6 August 20, 2007 Document Version 1.6 Symantec Corporation Page 1 of 55 Prepared For: Prepared By: Symantec Corporation
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
Trustwave Secure Web Gateway Security Target
Trustwave Secure Web Gateway Security Target Version 1.5 September 18, 2013 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented
SenSage, Inc. SenSage 4.6.2. Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1.2
SenSage, Inc. SenSage 4.6.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 1.2 Prepared for: Prepared by: SenSage, Inc. 55 Hawthorne Street San Francisco, CA 94105 United States of
SAMSUNG SDS FIDO Server Solution V1.1 Certification Report
KECS-CR-15-73 SAMSUNG SDS FIDO Server Solution V1.1 Certification Report Certification No.: KECS-ISIS-0645-2015 2015. 9. 10 IT Security Certification Center History of Creation and Revision No. Date Revised
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING Document No. 1735-005-D0001 Version: 1.0, 3 June 2014 Prepared for: Fortinet, Incorporated 326 Moodie Drive Ottawa, Ontario Canada, K2H
Top Layer Networks. Security Target V2.3
Top Layer Networks IDS Balancer TM Version 2.2 Appliance (IDSB3531-CCV1.0, IDSB3532-CCV1.0, IDSB4508-CCV1.0) Security Target V2.3 August 31, 2004 AppBalancing, AppSafe, DCFD, Flow Mirror, SecureWatch,
Certification Report
Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of
Certification Report
Certification Report EAL 3+ Evaluation of Rapid7 Nexpose Vulnerability Management and Penetration Testing System V5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian
ARKOON FAST Firewall v3.0 SECURITY TARGET
Version Date October 28, 2004 Version 2.7p Ref. AKV3-CRT-EAL2-ST ARKOON FAST Firewall v3.0 SECURITY TARGET 20 Prepared for 40 ARKOON Network Security 13A avenue Victor HUGO F-69160 Tassin La Demi-Lune
SolarWinds Log and Event Manager Software Security Target
SolarWinds Log and Event Manager Software Security Target Version 1.5 August 25, 2014 SolarWinds Worldwide, LLC 3711 South MoPac Expressway Building Two Austin, Texas 78746 Copyright 2013 SolarWinds Worldwide,
How To Evaluate Watchguard And Fireware V11.5.1
Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation
Common Criteria for Information Technology Security Evaluation Protection Profile. General-Purpose Operating System Protection Profile
Common Criteria for Information Technology Security Evaluation Protection Profile General-Purpose Operating System Protection Profile 09 09 2013 Table of contents Table of Contents 1 INTRODUCTION... 7
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target Version: Status: Last Update: 1.19 Released 2014-03-05 Trademarks
Joint Interpretation Library
for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0
Natek Network Access Control (NAC)
Natek Network Access Control (NAC) V 5.4.2 Security Target Release Date: 28.08.2014 Version 1.13 AUTHOR: NATEK BİLİŞİM BİLGİSAYAR EĞİTİM DANIŞMANLIK YAZILIM TİCARET SANAYİ ANONİM ŞİRKETİ 1 Revision History
Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1
Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller July 24, 2015 Version 1 1 Table of Contents 1 Introduction... 4 1.1 Conformance Claims...4 1.2 How to
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT
REF: 2010-16-INF-682 v2 Difusión: Expediente Fecha: 13.07.2011 Creado: CERT2 Revisado: TECNICO Aprobado: JEFEAREA CERTIFICATION REPORT Expediente: 2010-16 Datos del solicitante: 440301192W HUAWEI References:
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT
REF: 2010-15-INF-681 v1 Difusión: Expediente Fecha: 05.07.2011 Creado: CERT2 Revisado: TECNICO Aprobado: JEFEAREA CERTIFICATION REPORT Expediente: 2010-15 Datos del solicitante: 440301192W HUAWEI References:
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
Forefront Identity Manager (FIM) 2010
Forefront Identity Manager (FIM) 2010 Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 24-MAR-2012 Document history Version Date Description 0.1 28-APR-11 Initial draft for review.
CERTIFICATION REPORT
REF: 2010-23-INF-808 v4 Target: Expediente Date: 22.12.2011 Created by: CERT3 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2010-23 Huawei 3900 Series LTE enodeb Software V100R004C00SPC100
Security Target. McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5. Document Version 1.1. September 9, 2011
Security Target McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5 Document Version 1.1 September 9, 2011 Document Version 1.1 McAfee Page 1 of 61 Prepared For: Prepared By: McAfee, Inc. 2821
EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0
EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305
Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1.
Supporting Document Mandatory Technical Document Evaluation Activities for Stateful Traffic Filter Firewalls cpp February-2015 Version 1.0 CCDB-2015-01-002 Foreword This is a supporting document, intended
Common Methodology for Information Technology Security Evaluation. Evaluation methodology. September 2012. Version 3.1 Revision 4 CCMB-2012-09-004
Common Methodology for Information Technology Security Evaluation Evaluation methodology September 2012 Version 3.1 Revision 4 CCMB-2012-09-004 Foreword This version of the Common Methodology for Information
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Wyse Technology Inc. Wyse Device Manager Enterprise Edition Version 4.7.2 Security Target
Wyse Technology Inc. Wyse Device Manager Enterprise Edition Version 4.7.2 Security Target Version 1.8 April 18, 2011 Wyse Technology Inc. 3471 N. First Street San Jose, CA 95134 DOCUMENT INTRODUCTION Prepared
Green Hills Software INTEGRITY-178B Separation Kernel Security Target
Green Hills Software INTEGRITY-178B Separation Kernel Security Target Version 1.0 Prepared for: Green Hills Software, Inc. 34125 US Hwy 19 North Suite 100 Palm Harbor, FL 34684 USA Prepared By: Science
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme 2008 Government of Canada, Communications
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
BSI-DSZ-CC-0698-2012. for
BSI-DSZ-CC-0698-2012 for Database Engine of Microsoft SQL Server 2008 R2 Enterprise Edition and Datacenter Edition (English) x64, Version 10.50.2500.0 from Microsoft Corporation BSI - Bundesamt für Sicherheit
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report
Operating System Protection Profile. Common Criteria Protection Profile BSI-CC-PP-0067 Version 2.0
Common Criteria Protection Profile BSI-CC-PP-0067 Version 2.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 22899 9582-111 E-Mail: [email protected]
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5. Security Target
RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5 Security Target Evaluation Assurance Level: EAL2 Augmented with ALC_FLR.1 Document Version: 0.7 Prepared for: Prepared by: RSA, The
Automating Server Firewalls
Automating Server Firewalls With CloudPassage Halo Contents: About Halo Server Firewalls Implementing Firewall Policies Create and Assign a Firewall Policy Specify Firewall-Related Components Managing
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
