Common Criteria Evaluation for a Trusted Entrust/PKI
|
|
|
- Barrie Ramsey
- 10 years ago
- Views:
Transcription
1 Common Criteria Evaluation for a Trusted Entrust/PKI Author: Marc Laroche Date: March 2000 Version: , Entrust, Inc.
2 Entrust is a registered trademark of Entrust Technologies Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Technologies Limited. All other Entrust Technologies product names and service names are trademarks of Entrust Technologies. All other company and product names are trademarks or registered trademarks of their respective owners. The material provided in this document is for information purposes only. It is not intended to be advice. You should not act or abstain from acting based upon such information without first consulting a professional. ENTRUST TECHNOLOGIES DOES NOT WARRANT THE QUALITY, ACCURACY OR COMPLETENESS OF THE INFORMATION CONTAINED IN THIS ARTICLE. SUCH INFORMATION IS PROVIDED "AS IS" WITHOUT REPRESENTATION, WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY, BY USAGE OF TRADE, OR OTHERWISE, AND ENTRUST TECHNOLOGIES SPECIFICALLY DISCLAIMS ANY AND ALL REPRESENTATIONS, AND WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, OR FITNESS FOR A SPECIFIC PURPOSE. 2
3 Table of Contents Introduction... 4 Common Criteria... 5 Background to the Common Criteria... 5 Evaluation Process... 5 International Recognition... 6 What does it mean for Entrust?... 6 Security Evaluation of Entrust/Authority and Entrust/RA... 7 Delivered Services... 7 Core Services... 7 Support Services... 7 Evaluated Security Functions... 8 Security Assurance Components excluded References
4 Introduction The notion of trust is fundamental in public-key infrastructures (PKIs). For PKIs to be valuable, users must be assured that the parties they communicate with are safe, i.e. their identities and keys are valid and trustworthy. To provide this assurance, there must be confidence that the technology involved in binding the names of users to their public keys is trusted. The technology used to create these bindings includes security mechanisms and services that provide the secure generation, destruction, and distribution of cryptographic keys, cryptographic operations, identification and authentication, complete access control, management of security functions and services, roles and separation of duties, audit of security critical events, secure communications, data protection, and more. These mechanisms and services contribute jointly in allowing the Certification Authority (CA) to securely bind together the user identities and public keys in a digital format known as a public-key certificate. In creating these certificates, CAs act as trusted third parties in a PKI. As long as users trust the CA and its business policies for issuing and managing certificates, they can trust the public-key certificates issued by the CA. Trust is a fundamental requirement for any large-scale implementation of security services based on public key cryptography. Trusting a PKI implies that the people, processes and tools involved in the creation and management of cryptographic keys and certificates ensures an absolute reliable binding between user identities and public keys. Therefore there must be confidence that the technology involved in creating and maintaining the public-key certificates can be trusted to operate with an appropriate level of security. Security evaluations performed by certified third party evaluation facilities against recognized security criteria are instrumental in establishing trust in PKI technology. They allow unbiased security experts to analyze the security functions, interface specifications, guidance documentation and design of the product. So far, five versions of the Entrust software cryptographic module have been validated against the FIPS standard. These validations provide Entrust users with assurance that the cryptographic services delivered by Entrust, i.e. encryption/decryption, digital signature creation/verification, hashing, random number generation, key generation/zeroization, etc., are secure. The Common Criteria Evaluation of Entrust/Authority and Entrust/RA (previously known as Entrust/Admin ) serves as a fundamental extension to the FIPS process in that it extends the security assurance to the services involved in issuing and managing the life cycle of public-key certificates. The certification of these products by the UK Certification Body (CESG) confirms that these products have met the specified ISO (Common Criteria Part 3) Evaluation Assurance Level (EAL) 3 augmented requirements, and can be trusted to reliably and securely deliver CA services. 4
5 Common Criteria Background to the Common Criteria The Common Criteria (CC), which became ISO standard in 1999, is an alignment and development of a number of source IT security evaluation criteria including existing European (ITSEC), US (TCSEC - Orange Book) and Canadian (CTCPEC). The CC permits comparability between the results of independent security evaluations. By establishing such a common criteria base, the intent is for the results of an IT security evaluation to be meaningful to a wider audience. It does so by providing a common set of requirements for the security functions of Information Technology (IT) products and for assurance measures applied to them during a security evaluation. The CC describes Security functionality in the form of 11 classes of requirements: Security Audit, Communication, Cryptographic Support, User Data Protection, Identification and Authentication, Security Management, Privacy, Protection of security Functions, Resource Utilization, Access, and Trusted Path/Channels. The CC also contains a set of defined assurance levels constructed using components from assurance families. The assurance families consist of Configuration Management, Delivery and Operation, Development, Guidance Documents, Life Cycle Support, Test, Vulnerability Assessment and Maintenance of Assurance. Evaluation Process The principal inputs to a CC evaluation are the Security Target, the set of evidence documentation about the product under evaluation, and the product itself (referred to as the Target of Evaluation TOE). The Security Target is the basis for the agreement between the product vendor, evaluators and certification agencies as to what security functionality the product (TOE) offers and the scope of the evaluation. The Security Target identifies, and refines as appropriate, a set of CC IT security and assurance requirements. It provides a definition of the TOE security functions claimed to meet the functional requirements and the assurance measures taken to meet the assurance requirements. The ST also addresses the organizational security policies with which the TOE must comply and the security aspects for the environment in which the TOE will be used. The set of evidence documentation includes the documents, which describe the TOE in the form of design description, functional specification, configuration management, delivery and operations, support and maintenance, vulnerability analysis, functional testing and more. These documents, the TOE, the administration and user guides and the Security Target are submitted to a third party certified laboratory that proceeds with the evaluation. Using the procedures and interpretations detailed in the Common Evaluation Methodology (CEM), the certified laboratory facility will evaluate the Security Target for completeness and consistency. The evaluators will then analyze the evidence documentation, and proceed with functional and penetration testing of the TOE, to verify conformance to the CC. The results of the evaluation confirm that the ST is satisfied with the TOE, in other words the functional and assurance security claimed in the ST has been verified. The certified laboratory facility produces a report documenting the findings. The report is submitted to a government agency acting as the Certification Body, which then proceeds with certification/validation of the product (i.e. TOE certification/validation). The evaluation process establishes a level of confidence that the security functions of a product and the assurance measures applied to it meet the requirements. The evaluation results help consumers gain confidence that the IT product is secure enough for their intended application and that the security risks implicit in its use are tolerable. 5
6 International Recognition The following countries: United States, United Kingdom, Canada, Germany, France, Australia and New Zealand officially signed a Mutual Recognition Arrangement (MRA). The MRA allows IT products that earn a CC certificate to be procured and used in different jurisdictions without the need for them to be evaluated and certified/validated more than once. By recognizing the results of each other s evaluations, products evaluated in one MRA member nation can be accepted in the other member nations. What does it mean for Entrust? Basically, the evaluation and validation of Entrust products allow Entrust to provide "trusted" security solutions to its customers. With FIPS validations, the Entrust cryptographic modules have been verified and tested by a third party, and thus can be trusted to provide reliable and well designed cryptographic services. The CC evaluation is a fundamental extension to the FIPS validation process; an autonomous third party has examined the cryptography in detail, determined its compliance with strict security requirements, and analyzed the security functions, interface specifications, guidance documentation and design of the product as a whole. Entrust/Authority and Entrust/RA have been successfully "methodically tested and checked", and can be trusted to provide secure and reliable public key management services. 6
7 Security Evaluation of Entrust/Authority and Entrust/RA Delivered Services Entrust/Authority and Entrust/RA are responsible for creating and issuing end-entity public-key certificates, Certificate Revocation Lists (CRLs), and Authority Revocation Lists (ARLs). In addition, they provide the infrastructure support functions that are expected in a PKI such as maintaining end-entity encryption key-pair history and end-entity verification certificate history, providing mechanisms for trusted key revocation and trusted recovery of public keys and certificates, providing automatic public key and certificate updates, auditing security-related events; and maintaining CA data confidentiality and integrity in distributed environments. The functionality that Entrust/Authority and Entrust/RA jointly provide can be categorized in two broad categories of services, namely Core Services and Support Services. Core Services The Core Services are the basis for Entrust/PKI management functionality. These services include CA Key Management, End-entity Management, Operator (i.e. administrative user) Management, and Cross-Certificate Management. 1) CA Key Management Service: This service is responsible for providing secure management of the CA signing key pair and other information, and maintaining CA data integrity. 2) Operator Management Service: This service is responsible for providing the capability (to privileged operators) to manage other operators. Passwords, keys, privileges, and all other operator characteristics are managed through this service. 3) End-entity Management Service: Similar to Operator Management, the End-entity Management Service allows authorized operators to manage End-entities (i.e. end-users) associated with a CA domain. This service allows for creating, initializing, and deleting users, recovering, revoking, and updating keys, and others. 4) Cross-Certificate Management Service: This service manages the generation and maintenance of cross-certificates that allow different CA domains to establish and maintain trustworthy electronic relationships. It provides the ability to support and maintain a strict PKI hierarchy and peer-to-peer relationships with other CAs and provides fine-grained control to limit these relationships. Support Services The Support Services consist of a set of services relating to management of Entrust/PKI components. These services include CA Self-Management, Database Management, Audit Trail Management, and management of repository components (i.e. Database and X.500 Directory). 1) Self Management: Services to initialize the CA, start and stop CA services, and validate passwords. 2) Database Management: Services to operate and maintain the repository that stores encryption key pairs for end-entities, user information, and system and security policy data. 7
8 3) Audit Trail Management: Service to maintain and analyze an audit record of critical and non-critical events that have occurred within the CA infrastructure. 4) Directory Management: Services to operate and maintain the Directory (e.g., search the directory, create directory entries, etc.). Evaluated Security Functions Entrust/Authority and Entrust/RA include security functions that ensure that the CA services described above are delivered in a secure fashion. These functions were assessed as part of the evaluation process, meaning that they have been successfully verified and tested, and therefore trusted. These functions can be grouped in the following categories where TOE refers to Target of Evaluation i.e. Entrust/Authority and Entrust/RA: 1) Identification and Authentication All individual users (administrative or not) are assigned a unique user identifier. This user identifier supports individual accountability. The TOE authenticates the claimed identity of the user before allowing the user to perform any further actions. The TOE enforces password policies. The authentication data (i.e. passwords and authentication codes) is protected against unauthorized disclosure, and also against re-use for one-time only operations (e.g. initialization of end-users and key recovery). The TOE requires administrative users to re-authenticate or forces multiple-authentication before executing security-critical operations (e.g. security policy change, password change, etc.). The TOE terminates active sessions after a timeout period has lapsed and terminates a login process after three consecutive authentication failures. 2) Access Control The TOE enforces controls such that access to the data objects (including cryptographic key material and other CA data) and the permitted actions with respect to them including access to the various CA services can only take place in accordance with an accesscontrol policy based on privileges associated with the role and identity of users. 3) Roles and Privileges The TOE maintains default roles for: management of security policies, management of administrative users, everyday management of end users and key management of end entities, view audit information, and more. The TOE also provides for custom roles to be defined. Associations between users and roles can only be placed and removed by users operating under a privileged role. Each role can be assigned to more than one user. 4) Audit The TOE generates an audit record of any security-critical event including, but not limited to password rule changed, password (for privileged user) changed, privileged user login completed/failed, security policy changed, integrity check or encryption failed, backup completed/failed, user permissions modified, key/certificate expire date changed, operation/transaction failed to successfully complete, audit error, cross-certification completed/failed, services started/stopped, key recovery/update completed/failed, end entities added/removed/initialized. Each audit record includes a log number, the date and time the event occurred, a description of the event, a severity level and an encrypted integrity checksum. The TOE can associate each audit record with the identity of the user that caused the event and can detect modifications to the audit records. 8
9 The TOE provides administrative users with the necessary privileges and the capability to read all audit records. Searches of audit data based on ranges of dates can be made. 5) Trusted Communication Path The TOE ensures that data transmitted between itself and remote administrative users, between itself and other CAs and between itself and end-users is protected against unauthorized disclosure and modification including deletion, insertion and replay. Such data is transferred during normal administrative operations and key management transactions. 6) Non-Repudiation The TOE enforces proof of origin on any certificate it generates, including end-entity certificates, Certification Revocation Lists (CRLs) and Authorization Revocation Lists (ARLs), as well as on data objects transferred during remote administrative operations and key management transactions. The TOE also provides trusted IT products with the capability to verify the evidence of origin of information. The TOE enforces the generation of evidence of receipt for received public key certificates and provides a capability to verify the evidence of receipt and exchanges. 7) Data Integrity Monitoring The TOE monitors the integrity of all data objects it stores and exchanges, including cryptographic keys, cryptographic parameters, authentication information, certificates, security attributes and other security critical information. 8) Cryptographic Operations The TOE performs encryption/decryption, digital signature generation and verification, hashing, random number generation, and key generation and destruction in accordance with recognized FIPS and ANSI standards. These cryptographic operations are performed by the TOE, or on behalf of the TOE, using a FIPS validated cryptographic module or equivalent. 9) Key Storage and Distribution The cryptographic aspect of the TOE requires that cryptography-related data items and other security critical items be protected. The TOE provides the functions and services to ensure that the following security-critical assets are protected against unauthorized disclosure and/or modification as appropriate: Cryptographic variables (including secret keys, public and private keys, publickey certificates, other parameters such initialization vectors, etc.); these are always protected while in storage (as described in Section Access Control) and in transit. Input and output data from the cryptographic function (e.g., plain text and cipher text). Implementation of the cryptographic services. Other critical security parameters (e.g., authentication data). The TOE provides mechanisms to securely distribute, destruct, recover, revoke and update keys as required in accordance with recognized FIPS and ANSI standards. 9
10 10) Protection of Security Functions and Automated Recovery The TOE ensures that security enforcement functions are invoked and succeed before each function within it is allowed to proceed. Also, a security domain is maintained to protect the execution of TOE s functions from interference and tampering by untrusted subjects. Secure functions are provided that ensure the return of the TOE to a secure state after failures or service discontinuities. A set of security functional components was extracted from the CC to express the security functional requirements within the ST. In other words, the security functions described above are detailed in the form of CC security functional requirements (SFRs) within the ST, which forms the basis for the evaluation. Entrust/Authority and Entrust/RA, in conjunction with the FIPS validated Entrust cryptographic module, have been successfully evaluated against the CC SFRs listed in Table 1. Table 1 TOE security functional requirements # Component Name 1. FAU_GEN.1 Audit data generation 2. FAU_GEN.2 User identity generation 3. FAU_STG.2 Guarantees of audit data availability 4. FCO_NRO.2 Enforced proof of origin 5. FCO_NRR.2 Enforced proof of receipt 6. FCS_CKM.1 Cryptographic key generation 7. FCS_CKM.2 Cryptographic key distribution 8. FCS_CKM.3 Cryptographic key access 9. FCS_CKM.4 Cryptographic key destruction 10. FCS_COP.1 Cryptographic operation 11. FDP_ACC.2 Complete access control 12. FDP_ACF.1 Security attribute based access control 13. FDP_DAU.1 Basic data authentication 14. FDP_RIP.1 Subset residual information protection 15. FDP_SDI.1 Stored data integrity monitoring 16. FDP_UIT.1 Data exchange integrity 17. FIA_AFL.1 Basic authentication failure handling 18. FIA_ATD.1 User attribute definition 19. FIA_SOS.1 Selection of secrets 20. FIA_SOS.2 TSF generation of secrets 21. FIA_UAU.2 User authentication before any action 22. FIA_UAU.4 Single-use authentication mechanisms 23. FIA_UAU.6 Re-authenticating 24. FIA_UAU.7 Protected authentication feedback 25. FIA_UID.2 User identification before any action 26. FMT_MOF.1 Management of security functions behavior 27. FMT_MSA.1 Management of security attributes 28. FMT_MSA.2 Secure security attributes 29. FMT_MSA.3 Static attribute initialization 30. FMT_MTD.1 Management of TSF data 31. FMT_MTD.3 Secure TSF data 32. FMT_SAE.1 Time-Limited authorization 33. FMT_SMR.2 Restrictions on security roles 34. FPT_ITI.1 Inter-TSF detection of modification 35. FPT_RCV.2 Automated recovery 36. FPT_RPL.1 Replay detection 10
11 37. FPT_RVM.1 Non-bypassability of the TSP 38. FPT_TST.1 TSF testing 39. FPT_TDC.1 Inter-TSF basic TSF data consistency 40. FTA_SSL.3 TSF-initiated termination 41. FTP_ITC.1 Inter-TSF trusted channel 42. FTP_TRP.1 Trusted path Security Assurance Entrust/Authority and Entrust/RA have been evaluated at the CC EAL3 (augmented) assurance level and this evaluation satisfies the U.S. CS2 Protection Profile assurance requirements (EAL- CS2). EAL3 (and EAL-CS2) provide assurance by an analysis of the security functions using a functional and interface specification, guidance documentation and the high-level design of the TOE, to understand the security behavior. The analysis is supported by independent testing of the TOE security functions, evidence of developer testing based on the functional specification and high-level design, selective independent confirmation of the developer test results, strength of function analysis and evidence of a developer search for obvious vulnerabilities (e.g. those in the public domain). EAL3 also provides assurance through the use of development environment controls, TOE configuration management and evidence of secure delivery procedures. The augmentation to EAL3 addresses the area of problem tracking and flaw remediation providing assurance that any problems or flaws that may appear would be effectively remedied. The augmentation also adds the TOE component categorization report that is required for maintaining the assurance rating of the TOE and an informal TOE Security Policy Model. The CC assurance components included in this evaluation are summarized in Table 2 and those components that augment EAL3 are listed in Table 3. Table 2 EAL3 assurance components Assurance Component Component ID Component Title Configuration Management ACM_CAP.3 Authorization Controls ACM_SCP.2 Problem Tracking CM Requirements Delivery and Operation ADO_DEL.1 Delivery procedures ADO_IGS.1 Installation, Generation, and Start-up Procedures Development ADV_FSP.1 Informal functional specification ADV_HLD.2 Security Enforcing High-Level Design ADV_RCR.1 Informal Correspondence Demonstration ADV_SPM.1 Informal TOE Security Policy Model Guidance Documents AGD_ADM.1 Administrator Guidance Life Cycle Support ALC_DVS.1 Identification of Security Measures ALC_FLR.2 Flaw Remediation Requirements Tests ATE_COV.2 Analysis of Coverage ATE_DPT.1 Testing - High-Level Design ATE_FUN.1 Functional Testing ATE_IND.2 Independent Testing - Sample Vulnerability Assessment AVA_MSU.2 Validation of Analysis AVA_SOF.1 Strength of TOE Security Function Evaluation AVA_VLA.1 Developer Vulnerability Analysis Maintenance of assurance AMA_CAT.1 Categorization Report Table 3 Augmentation to EAL3 Component ID Component title Note ACM_SCP.2 Problem Tracking CM Requirements Upgrade from ACM_SCP.1 TOE CM coverage 11
12 Component ID Component title Note AVA_MSU.2 Validation of Analysis Upgrade from AVA_MSU.1 Examination of Guidance ADV_SPM.1 Informal TOE Security Policy Model Addition ALC_FLR.2 Flaw Remediation requirements Addition AMA_CAT.1 Categorization Report Addition Components excluded The Entrust/PKI components excluded from the evaluation, with justification for their exclusion, are given below: 1) Entrust Cryptographic module: The justification for excluding the cryptomodule from the TOE boundary is that the Entrust cryptomodule has been assessed under the FIPS validation program. 2) Entrust/Authority database: The justification for excluding the database from the Entrust/Authority TOE boundary is based on the following factor: Database security is provided by Entrust, not the database. As such, all data items stored in the Entrust/Authority database are encrypted and MACs are generated for each data item. Thus, the evaluation makes no claims about database functionality (aside from the inherent, fundamental and basic function of data storage) and database functionality is not mapped to any of the SFRs in the Security Target. 3) Hardware and operating system platform (Abstract Machine): The TOE abstract machine consists of the Windows NT 4.0 operating system and any hardware for which the operating system and TOE configurations are valid. The operating system is trusted to operate correctly, to provide reliable time stamps, to protect stored audit records against unauthorized deletion and to protect the execution of the TOE against interference and tampering by untrusted subjects. The justification for excluding the abstract machine from the Entrust/Authority TOE boundary is based on the following factors: Each security policy is enforced by the TOE only, and the SFRs are completely satisfied by TOE functions. The TOE is hardware independent, as Entrust software does not interact with the hardware platform directly. That is, the Entrust software interacts with the operating system which, in turn, interacts with the hardware platform. 4) Directory: The directory serves as the repository for publicly accessible data, such user certificates, CA certificates, revocation lists and so on. The justification for excluding the directory from the TOE boundary is based on the following factors: Entrust/Authority digitally signs all data it stores on the Directory to allow for verification of authenticity, integrity and origin; security on these data items is provided by Entrust, not the Directory. The evaluation makes no claims about Directory functionality (aside from the inherent, fundamental and basic function of data storage) and Directory functionality is not mapped to any of the SFRs in the Security Target. 12
13 References [Reference 1] Common Criteria for Information Security Evaluation, Version 2.1. CCIMB August [Reference 2] Information Technology - Security techniques - Evaluation criteria for IT security ISO/IEC , and , First edition, [Reference 3] FIPS PUB (Federal Information Processing Standards Publication), Security Requirements For Cryptographic Modules, National Institute Of Standards And Technology, 1994 January 11. [Reference 4] UK ITSEC Scheme Certification Report No. P122, Entrust/Authority and Entrust/Admin from Entrust/PKI 4.0a on Microsoft Windows NT 4.0 Service Pack 3, March [Reference 5] UK ITSEC Scheme Certification Report No. P141, Entrust/Authority and Entrust/RA from Entrust/PKI 5.0 on Microsoft Windows NT 4.0 Service Pack 3, March
Trust Technology Assessment Program. Validation Report
Trust Technology Assessment Program Validation Report U.S. Government Traffic Filter Firewall Protection Profile for Low-Risk Environments version 1.1 TTAP Report Number: TTAP-VR-0007 June, 1999 Mutual
DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75
DataPower S40 ML Security Gateway and DataPower I50 Integration Appliance Version 3.6 Security Target Version 0.75 10/09/2008 Prepared for: IBM SOA Appliance Group One Rogers St Cambridge, MA 02142 Prepared
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows,
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report
How To Protect Your Computer From Being Hacked
Senforce Endpoint Security Suite Version 3.1.175 Security Target Version 1.0 06/19/07 Prepared for: Senforce Technologies, Inc. 147 W Election Rd Ste 110 Draper UT 84020 Prepared By: Science Applications
How To Manage Security In A Network Security System (Tsi)
SecureDoc Disk Encryption v4.3c Security Target for Common Criteria EAL-4 Abstract: This document represents Security Target Document for Secure Doc Disk Encryption product v4.3c. It specifies treats,
Mobile Billing System Security Target
Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3)
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3) Reference: ST January 2001 Version: 1.6 Europe: USA: CISCO Systems Ltd CISCO Systems Inc. 3 The Square 170 West Tasman Drive Stockley
IBM WebSphere Message Broker Security Target
IBM WebSphere Message Broker Security Target Version 2.1.2 2007-08-22 Document History Version Date Summary Author 1.0 2006-10-23 Final EAL3 ST plus changes by IBM. SAIC / IBM 1.1 2006-12-11 Fixed inconsistencies.
Check Point Endpoint Security Media Encryption Security Target
Check Point Endpoint Security Media Encryption Security Target Version 1.0 June 23, 2010 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared By: Science Applications International Corporation
Security Target for Citrix Presentation Server 4.0 For Windows
Security Target for Citrix Presentation Server 4.0 For Windows Reference: ST/T488 July 2005 Version: 1.0 This document has been prepared on behalf of: Prepared by: Citrix Systems, Inc BT 851 West Cypress
BSI-PP-0003-2001. for. Smart Card Security User Group Smart Card Protection Profile (SCSUG-SCPP) Version 3.0. developed by
Certification Report Bundesamt für Sicherheit in der Informationstechnik BSI-PP-0003-2001 for Smart Card Security User Group Smart Card Protection Profile (SCSUG-SCPP) Version 3.0 developed by Smart Card
Canon ir6570/ir5570 Series ir Security Kit-B3. Security Target
Document ID: CANON-Device05-001 Canon ir6570/ir5570 Series ir Security Kit-B3 Security Target This document is a translation of the security target written in Japanese, which has been evaluated and certified.
Security Target: Symantec Endpoint Protection Version 11.0
Security Target: Symantec Endpoint Protection Version 11.0 ST Version 1.6 June 2, 2008 Document Version 1.6 Symantec Corporation Page 1 of 68 Prepared For: Prepared By: Symantec Corporation 20330 Stevens
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle
Faculty of Informatics Masaryk University Application-Level Firewall Protection Profile for High Robustness Environments Initial Considerations
} w!"#$%&'()+,-./012345
EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0
EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305
Certification Report
Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Multi-Functional Printer (Digital Copier) 7222/7322/7228/7235 Series Security Target Version 10
Multi-Functional Printer (Digital Copier) 7222/7322/7228/7235 Series Security Target Version 10 This document is a translation of the security target written in Japanese which has been evaluated and certified.
EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...
Firewall Protection Profile V2.0 2008. 4. 24
Firewall Protection Profile V2.0 2008. 4. 24 (This page left blank on purpose for double-side printing) Protection Profile Title Firewall Protection Profile for Government Evaluation Criteria Version This
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Common Criteria for Information Technology Security Evaluation. Part 2: Security functional components. September 2007. Version 3.
Common Criteria for Information Technology Security Evaluation Part 2: Security functional components September 2007 Version 3.1 Revision 2 CCMB-2007-09-002 Foreword This version of the Common Criteria
Certification Report
Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Common Criteria for Information Technology Security Evaluation. Part 2: Security functional requirements. August 2005. Version 2.
Common Criteria for Information Technology Security Evaluation Part 2: Security functional requirements August 2005 Version 2.3 CCMB-2005-08-002 Foreword This version of the Common Criteria for Information
Certification Report
Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian
System Assurance C H A P T E R 12
C H A P T E R 12 System Assurance 169 The aim of system assurance is to verify that a system enforces a desired set of security goals. For example, we would like to know that a new operating system that
CERTIFICATE. certifies that the. Info&AA v1.0 Attribute Service Provider Software. developed by InfoScope Ltd.
CERTIFICATE HUNGUARD Informatics and IT R&D and General Service Provider Ltd. as a certification authority assigned by the assignment document No. 001/2010 of the Minister of the Prime Minister s Office
Certification Report
Certification Report Symantec Network Access Control Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme
BSI-PP-0004-2002. for. Protection Profile Secure Signature-Creation Device Type 1, Version 1.05. developed by
BSI-PP-0004-2002 for Protection Profile Secure Signature-Creation Device Type 1, Version 1.05 developed by CEN/ISSS Information Society Standardization System, Workshop on Electronic Signatures - Bundesamt
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 11.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Intrusion Detection System System Protection Profile
Intrusion Detection System System Protection Profile Prepared for National Security Agency 9800 Savage Road Fort Meade MD, 20755 Prepared by Science Applications International Corporation 7125 Gateway
Top Layer Networks. Security Target V2.3
Top Layer Networks IDS Balancer TM Version 2.2 Appliance (IDSB3531-CCV1.0, IDSB3532-CCV1.0, IDSB4508-CCV1.0) Security Target V2.3 August 31, 2004 AppBalancing, AppSafe, DCFD, Flow Mirror, SecureWatch,
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Security Target for BorderWare Firewall Server 6.5
Security Target for BorderWare Firewall Server 6.5 Reference: ST January 2002 Version : 2.4 North America: Europe: 50 Burnhamthorpe Rd. W. 1 The Harlequin Centre Suite 502 Southall Lane Mississauga Southall
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs
Joint Interpretation Library Security Evaluation and Certification of Digital Tachographs JIL interpretation of the Security Certification according to Commission Regulation (EC) 1360/2002, Annex 1B Version
Red Hat Enterprise Linux 3 (running on specified Dell and Hewlett-Packard hardware) Security Target
Red Hat Enterprise Linux 3 (running on specified Dell and Hewlett-Packard hardware) Security Target Version 1.7 January 2004 Document Control DOCUMENT TITLE Red Hat Enterprise Linux 3 Security Target Version
Check Point Endpoint Security Full Disk Encryption Security Target
Check Point Endpoint Security Full Disk Encryption Security Target ST Version 2.4 June 22, 2009 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared by: Metatron Ltd. 66 Yosef St., Modiin, Israel
U.S. Government Protection Profile for Database Management Systems
U.S. Government Protection Profile for Database Management Systems Information Assurance Directorate Version 1.3 December 24, 2010 Protection Profile Title: 1 U.S. Government Protection Profile for Database
Certification Report
Certification Report EAL 3+ Evaluation of AccessData Cyber Intelligence and Response Technology v2.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
How To Evaluate Watchguard And Fireware V11.5.1
Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
Certification Report
Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of
C038 Certification Report
C038 Certification Report TAXSAYA Online File name: Version: v1a Date of document: 15 August 2013 Document classification: For general inquiry about us or our services, please email: [email protected]
Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0
Security Target NetIQ Access Manager 4.0 Document Version 1.13 August 7, 2014 Document Version 1.13 NetIQ Page 1 of 36 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite 810 Houston, TX
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN
REF: 2010-12-INF-626 V1 Distribution: Public Date: 29.04.2011 Created: CERT3 Reviewed: TECNICO Approved: JEFEAREA CERTIFICATION REPORT FOR EADS GROUND SEGMENT SYSTEMS PROTECTION PROFILE (GSS-PP) ISSUE
TRUSTED SECURITY FILTER SECURITY TARGET
TRUSTED SECURITY FILTER SECURITY TARGET Edition: 4 29 Oct 07 Previous editions: Ed. 1 11 May 2006 Ed. 2 16 Aug 2006 Ed. 3 28 June 2007 Author: KKK Appr.: PÅT All pages in this document shall have the same
Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center [email protected]
Common Criteria Evaluation Challenges for SELinux Doc Shankar IBM Linux Technology Center [email protected] Agenda Common Criteria Roadmap/Achievements CAPP/LSPP Overview EAL4 Overview Open Sourcing
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme 2008 Government of Canada, Communications
AppGate Security Server, Version 8.0.4. Security Target. Document Version: 2.9 Date: 2008-04-10
AppGate Security Server, Version 8.0.4 Security Target Document Version: 2.9 Date: 2008-04-10 Contents 1 INTRODUCTION...6 1.1 ST Identification...6 1.2 ST Overview...6 1.3 CC Conformance Claim...6 1.4
Certification Report
Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Certification Report
Certification Report EAL 3+ Evaluation of Rapid7 Nexpose Vulnerability Management and Penetration Testing System V5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian
COMMON CRITERIA PROTECTION PROFILE. for SECURE COMMUNICATION MODULE FOR WATER TRACKING SYSTEM (SCM-WTS PP)
COMMON CRITERIA PROTECTION PROFILE for SECURE COMMUNICATION MODULE FOR WATER TRACKING SYSTEM (SCM-WTS PP) Revision No 1.1 Revision Date 11.07.2014 Document Code File Name SCM-WTS PROTECTION PROFILE Prepared
Green Hills Software INTEGRITY-178B Separation Kernel Security Target
Green Hills Software INTEGRITY-178B Separation Kernel Security Target Version 1.0 Prepared for: Green Hills Software, Inc. 34125 US Hwy 19 North Suite 100 Palm Harbor, FL 34684 USA Prepared By: Science
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING Document No. 1735-005-D0001 Version: 1.0, 3 June 2014 Prepared for: Fortinet, Incorporated 326 Moodie Drive Ottawa, Ontario Canada, K2H
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction
Voice-over-IP Risk Analysis. [email protected]
Voice-over-IP Risk Analysis Enno Rey CISSP/ISSAP CISA Enno Rey, CISSP/ISSAP, CISA [email protected] Risk ISO/IEC GUIDE 73:2002 Combination of the probability of an event and its consequence where Probability
Operating System Protection Profile. Common Criteria Protection Profile BSI-CC-PP-0067 Version 2.0
Common Criteria Protection Profile BSI-CC-PP-0067 Version 2.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 22899 9582-111 E-Mail: [email protected]
EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.
EMC Corporation Data Domain Operating System Version 5.2.1.0 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.11 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton,
McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 Security Target
v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 10 January 2012 Version 1.1 Prepared By: Primasec Ltd For McAfee Inc 2340 Energy Park Drive St. Paul, MN 55108 USA Contents 1 Introduction...
National Information Assurance Partnership
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Cisco IOS Firewall Versions 12.3(14)T and 12.4(4)T Report Number: CCEVS-VR-06-0050 Dated:
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN
REF: 2010-22-INF-764 V1 Distribution: Expediente Date: 21.11.2011 Created: CERT3 Reviewed: CALIDAD Approbed: TECNICO CERTIFICATION REPORT FOR FOR HUAWEI INTEGRATED MANAGEMENT APPLICATION PLATFORM VERSION
Common Criteria for Information Technology Security Evaluation
Common Criteria for Information Technology Security Evaluation Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness) Version 3.0
Network Intrusion Prevention System Protection Profile V1.1
Network Intrusion Prevention System Protection Profile V1.1 December 21, 2005 (This page left blank on purpose for double-side printing) Protection Profile Title Network Intrusion Prevention System Protection
Certification Report
Certification Report HP Universal CMDB and Universal Discovery v10.21 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
CERTIFICATION REPORT
REF: 2010-24-INF-831 v1 Target: Público Date: 07.03.2012 Created by: CERT3 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2010-24 Huawei BSC6900 Multimode Base Station Controller (MBSC)
Low Assurance Protection Profile for a VPN gateway
LAPP VPN gateway Low Assurance Protection Profile for a VPN gateway Version: 1.4 Date: 29/04/2005 Filename: lapp4_14 Product: VPN gateway Sponsor: SRC Security Research & Consulting GmbH, Graurheindorfer
Compucat Research Pty Limited 14 Wales St, Belconnen ACT 2617 ABN 48 008 602 980
Compucat Research Pty Limited 14 Wales St, Belconnen ACT 2617 ABN 48 008 602 980 Secure Optical Switch Version-01 Security Target P/N 2066-0012-05 P/N 2066-0012-05 February 08 Page -1 Table of Contents
Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012
Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa
McAfee Firewall Enterprise v7.0.1.02 Security Target
McAfee Firewall Enterprise v7.0.1.02 Security Target 8 Nov 2010 Version 1.3 Prepared By: Primasec Ltd For McAfee Inc 2340 Energy Park Drive St. Paul, MN 55108 USA McAfee Inc. Page 1 of 60 Contents 1 Introduction...
Certification Report
Certification Report EAL 3+ Evaluation of RSA envision platform v4.0 SP 1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
AUTOMATIC CASH DISPENSERS/ TELLER MACHINES PROTECTION PROFILE. ecf. Version 1.00. Registered at the French Certification Body under the number PP/9907
PROTECTION PROFILE Version 1.00 AUTOMATIC CASH DISPENSERS/ TELLER MACHINES Registered at the French Certification Body under the number PP/9907 ecf Evaluation et Certifica ti on Fr ança is e CONTENTS I.
LUNA PCI CONFIGURED FOR USE IN LUNA SA 4.1 WITH BACKUP SECURITY TARGET
LUNA PCI CONFIGURED FOR USE IN LUNA SA 4.1 WITH BACKUP SECURITY TARGET DOCUMENT NUMBER: AUTHOR: DEPARTMENT: LOCATION OF ISSUE: CR-2386 Terry Fletcher Engineering Ottawa DATE ORIGINATED: November 20, 2006
JMCS Northern Light Video Conferencing System Security Target
JMCS Northern Light Video Conferencing System Security Target Common Criteria: EAL2 Version 1.2 22 FEB 12 Document management Document identification Document ID Document title Product version NLVC_ST_EAL2
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications
Certification Report
Certification Report EAL 3+ Evaluation of Extreme Networks ExtremeXOS Network Operating System v12.3.6.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Certificate Policies and Certification Practice Statements
Entrust White Paper Certificate Policies and Certification Practice Statements Author: Sharon Boeyen Date: February 1997 Version: 1.0 Copyright 2003 Entrust. All rights reserved. Certificate Policies and
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Author: Microsoft Corp. Version: 1.0 Last Saved: 2011-03-10 File Name: MS_UAG_ST_1.0.docx
CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target
CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target Version 2.0 June Version 21, 2010 0.6 December 29, 2008 Prepared for: Prepared CA for: 100 Staples CA, Inc. Drive Framingham, 100
