Validation Report. McAfee, Inc.
|
|
|
- Godfrey Jones
- 10 years ago
- Views:
Transcription
1 Validation Report McAfee, Inc. McAfee Network Security Platform Release 5.1 Document ID: R-0035 V1.4 May 27, 2010
2 Table of Contents 1 Executive Summary Identification of the TOE Interpretations Security Policy Security Audit Cryptographic Operations Identification and Authentication Security Management Protection of the TSF System Data Collection System Data Analysis TOE Security Environment Secure Usage Assumptions Threats Countered by the TOE Organizational Security Policies Architectural Information NSP Sensors Network Security Manager (NSM) Documentation and Delivery Design Documentation Guidance Documentation Configuration Management and Lifecycle Test Documentation Vulnerability Assessment Documentation Security Target Delivery IT Product Testing Developer Testing Evaluation Team Independent Testing Vulnerability Analysis Evaluated Configuration Clarification of Scope Results of the Evaluation Validator Comments/Recommendations Security Target Terms Glossary Acronyms Bibliography
3 1 Executive Summary This report is intended to assist the end-user of this product with determining the suitability of this IT product in their environment. End-users should review the Security Target (ST), which is where specific security claims are made, in conjunction with this Validation Report (VR), which describes how those security claims were evaluated. This report documents the assessment of the National Information Assurance Partnership (NIAP) validation team of the evaluation of the McAfee Network Security Platform Release 5.1, the target of evaluation (TOE). It presents the evaluation results, their justifications, and the conformance results. This report is not an endorsement of the TOE by any agency of the U.S. government, and no warranty is either expressed or implied. The evaluation of the McAfee Network Security Platform (NSP) Release 5.1 Intrusion Detection System (IDS) product was performed by InfoGard Laboratories, Inc., in San Luis Obispo, CA in the United States of America (USA) and was completed in May, The information in this report is largely derived from the Security Target (ST), Evaluation Technical Report (ETR), and the functional testing report. The ST was written by InfoGard Laboratories, Inc. The evaluation was conducted in accordance with the requirements of the Common Criteria for Information Technology Security Evaluation, Version 3.1 July 2009, Evaluation Assurance Level 2 (EAL 2), and the Common Evaluation Methodology for IT Security Evaluation (CEM), Version 3.1 r.3, July The NSP IDS product is a combination of network appliances and software built for the detection of intrusions, denial of service (DoS) attacks, distributed denial of service (DDoS) attacks, and network misuse. The NSP IDS system is composed of a family of sensor appliances and an NSP management platform referred to as an NSM. The sensor appliances are stand-alone appliances from McAfee Incorporated. The sensor appliances are the M-2750, M-1450, M-1250, M-6050, M-4050, M- 8000, M3050, I-4010, I-4000, I-3000, I-2700, I-1400, and I-1200 sensors. All other components of the product are software only components that run on a Windows workstation. The NSM management platform is an IDS management solution for managing NSP sensor appliance deployments for large and distributed enterprise networks. Access to the NSM is supported through a McAfee thick client application installed on a Console Machine. Access to the NSM is authenticated using certificate credentials obtained from a Common Access Card (CAC) in the Operational Environment. Certificates presented are checked for revocation status using an OCSP server in the Operational Environment. The NSM operates with a MySQL Database to persist configuration information and alert data. NSM for Windows Server 2003/2008 includes the MySQL database. The TOE requires the following software components and supports the following network devices: Component Windows Server 2003 SP3/2008 SP1 Description Underlying OS for the NSM Console platform including RSAENH cryptographic module for TLS session support. 3
4 Internet Explorer 6 or later McAfee Update Server software Common Access Card software/drivers OCSP Server software NSM Hardware Platform Console Workstation McAfee Update Server hardware Common Access Card (CAC) reader hardware OCSP Server hardware Browser support for establishing Console sessions with NSM. Software running on the McAfee update server supporting the TOE with threat signature updates. Software to support CAC authentication from the NSM Console as applicable based on deployment. OCSP server used to support certificate revocation checking. Hardware Platform for NSM Management Platform capable of running Windows Server 2003/2008; minimum two network interface cards (nic) available. Console Platform supporting browser interface used for accessing NSM GUI sessions. Hardware platform hosting the McAfee threat signature update service. Reader hardware for use with CAC as applicable based on deployment. OCSP server hardware used to support certificate revocation checking. Table 1: Operational Environment 2 Identification of the TOE Table 2 provides information needed to completely identify the product, including: The Target of Evaluation (TOE), the fully qualified identifier of the product as evaluated; The Security Target (ST), describing the security features, claims, and assurances of the product; The conformance result of the evaluation; The organizations and individuals participating in the evaluation. Evaluation Scheme Evaluated Target of Evaluation Protection Profile Security Target United States Common Criteria Evaluation Validation Scheme McAfee Network Security Platform Release 5.1 U.S. Government Protection Profile Intrusion Detection System For Basic Robustness Environments, Version 1.7 McAfee Network Security Platform (NSP) Intrusion Detection System Security Target EAL 2 augmented ALC_FLR.2, Version 1.0 4
5 Dates of Evaluation August 2009 May 2010 Conformance Result EAL 2 augmented ALC_FLR.2 Common Criteria Version Common Criteria for Information Technology Security Evaluation Version 3.1 R3, July 2009 Common Evaluation CEM Version 3.1 R3, July 2009 Methodology (CEM) Version Evaluation Technical Report R-0030 V1.1 (ETR) Sponsor/Developer McAfee, Inc. Common Criteria Testing InfoGard Laboratories, Inc. Lab (CCTL) CCTL Evaluators Kenji Yoshino, Annie Browne CCEVS Validators Jerome Myers, Jean Petty Table 2: Product Identification 3 Interpretations The Evaluation Team performed an analysis of the international interpretations of the CC and the CEM and determined that none of the International interpretations issued by the Common Criteria Interpretations Management Board (CCIMB) identified below were applicable to this evaluation. The TOE is also compliant with all International interpretations with effective dates on or before August 24, Security Policy The McAfee Network Security Platform supports the following security policies as described in the Security Target: 4.1 Security Audit The NSM management platform generates audit records for Administrative sessions and stores them into the MySQL database, running on the same dedicated platform as does the NSM management software. The MySQL Database provides storage and retrieval for audit log information. This function records attempts to access the system itself, such as successful and failed authentication, as well as the actions taken by the user once authenticated. Auditable actions include changes to the IDS rules and viewing the audit records. The NSP Sensor also generates audit records based on Sensor detected events and forwards these logs to the NSM platform where they may be integrated into a single (NSP) log resource stored on the MySQL Database platform. 4.2 Cryptographic Operations The NSP system utilizes symmetric key cryptography to secure communications between TOE components and with the McAfee Update Server in the Operational Environment. Cryptographic services within the Sensor component are provided by a Level 2 FIPS validated cryptographic module that includes an OpenSSL implementation. All sessions, except SNMPv3, 5
6 are conducted using TLSv1 and leverage an OpenSSL Module. Key exchange between the Console browser client and the NSM and the NSM and NSP Sensor are performed using RSA public/private key exchange. Cryptographic library support is provided for the NSM by RSA BSafe cryptographic libraries and for the NSP Sensor by XySSL library. OpenSSL and both cryptographic libraries are contained within NSP software release packages. When TLS Administration sessions are closed, the OpenSSL module within the Sensor component zeroizes all cryptographic keys used for the sessions. SNMPv3 sessions are secured using the AES algorithm 128 bit key size. 4.3 Identification and Authentication An X.509 certificate (derived from a CAC) is passed to the NSM during the session negotiation process and, within that certificate, a Common Name (CN) that is extracted and checked against a user list on the NSM. The certificate also is required to be signed by a trusted CA as configured during NSP system installation. 4.4 Security Management The NSM provides a detailed security management interface used to configure and manage the NSP TOE as well as provide a report and analysis utility for investigating traffic events. 4.5 Protection of the TSF The McAfee Incorporated Sensors and NSM management platform all protect TSF data from disclosure and modification, when it is transmitted between separate parts of the TOE, by communicating using TLS version 1.0 connections. The Sensor communicates with the NSM management platform through its dedicated 10M/100M/1G Ethernet, out-of-band management port using TCP/IP. This communications uses secure channels; providing link privacy using encryption and mutual authentication using public key authentication. The ciphers suites used for this communications are TLSv1 (AES 128 and SHA-1). It is recommended that the NSM use a separate, dedicated management subnet to interconnect with the sensor. 4.6 System Data Collection The TOE has the ability to set rules to govern the collection of data regarding potential intrusions. While the signatures available on the Update Server contain default rules to detect currently known vulnerabilities and exploits, new rules can be created to detect new vulnerabilities as well as specific network traffic, allowing the administrator complete control over the types of traffic that will be monitored. Logs are generated automatically when traffic matches a threat signature. These are stored in the traffic log repository where authorized users can evaluate the traffic and determine appropriate action. 4.7 System Data Analysis The TOE provides many pre-configured rule sets and policies for immediate application in a number of different network areas. Each pre-configured policy is matched with an identically named rule set designed to address the common attacks targeting specific network environments. 6
7 Existing rule sets cannot be modified but they may be cloned and then modified to create a custom rule set. Data Analysis is conducted using threat signatures that contain characteristics know to be representative of malicious traffic, malware, virus, or worm infections. A series of threat signatures are provided and regularly updated to allow the NSP TOE to identify potentially malicious traffic. In addition, the User Defined Signature feature allows Security Expert users to develop custom signatures and use them for traffic analysis. 5 TOE Security Environment 5.1 Secure Usage Assumptions The following assumptions are made about the usage of the TOE: A.ACCESS The TOE has access to all the IT System data it needs to perform its functions. A.DYNMIC The TOE will be managed in a manner that allows it to appropriately address changes in the IT System the TOE monitors. A.ASCOPE The TOE is appropriately scalable to the IT System the TOE monitors. A.PROTCT The TOE hardware and software critical to security policy enforcement will be protected from unauthorized physical modification. A.LOCATE The processing resources of the TOE will be located within controlled access facilities, which will prevent unauthorized physical access. A.MANAGE There will be one or more competent individuals assigned to manage the TOE and the security of the information it contains. A.NOEVIL The authorized administrators are not careless, willfully negligent, or hostile, and will follow and abide by the instructions provided by the TOE documentation. A.NOTRST The TOE can only be accessed by authorized users. A.OCSP An OCSP Server will be available in the Operational Environment for the purpose of verifying the revocation status of certificates on behalf of the TOE. 5.2 Threats Countered by the TOE The TOE is designed to counter the following threats: T.COMINT T.COMDIS T.LOSSOF T.NOHALT T.PRIVIL T.IMPCON An unauthorized user may attempt to compromise the integrity of the data collected and produced by the TOE by bypassing a security mechanism. An unauthorized user may attempt to disclose the data collected and produced by the TOE by bypassing a security mechanism. An unauthorized user may attempt to remove or destroy data collected and produced by the TOE. An unauthorized user may attempt to compromise the continuity of the System s collection and analysis functions by halting execution of the TOE. An unauthorized user may gain access to the TOE and exploit system privileges to gain access to TOE security functions and data. An unauthorized user may inappropriately change the configuration of the TOE causing potential intrusions to go undetected. 7
8 T.INFLUX T.FACCNT An unauthorized user may cause malfunction of the TOE by creating an influx of data that the TOE cannot handle. Unauthorized attempts to access TOE data or security functions may go undetected. T.EAVESDROP A malicious user or process may observe or modify TSF data transmitted between a separate part of the TOE or between the TOE and a trusted IT Entity. T.FALACT T.FALREC T.FALASC T.MISUSE T.INADVE T.MISACT The TOE may fail to react to identified or suspected vulnerabilities or inappropriate activity. The TOE may fail to recognize vulnerabilities or inappropriate activity based on IDS data received from each data source. The TOE may fail to identify vulnerabilities or inappropriate activity based on association of IDS data received from all data sources. Unauthorized accesses and activity indicative of misuse may occur on an IT System the TOE monitors. Inadvertent activity and access may occur on an IT System the TOE monitors. Malicious activity, such as introductions of Trojan horses and viruses, may occur on an IT System the TOE monitors. 5.3 Organizational Security Policies The TOE enforces the following OSPs: P.DETECT P.ANALYZ P.MANAGE P.ACCESS Static configuration information that might be indicative of the potential for a future intrusion or the occurrence of a past intrusion of an IT System or events that are indicative of inappropriate activity that may have resulted from misuse, access, or malicious activity of IT System assets must be collected. Analytical processes and information to derive conclusions about intrusions (past, present, or future) must be applied to IDS data and appropriate response actions taken. The TOE shall only be managed by authorized users. All data collected and produced by the TOE shall only be used for authorized purposes. Users of the TOE shall be accountable for their actions within the IDS. P.ACCACT P.INTGTY Data collected and produced by the TOE shall be protected from modification. P. PROTCT The TOE shall be protected from unauthorized accesses and disruptions of TOE data and functions. P. SYSADMIN The NSM platform shall be configured such that only the System Admin user has access to the underlying Operating System file system. 6 Architectural Information The TOE is classified as an Intrusion Detection System (IDS) for Common Criteria purposes. The TOE is made up of hardware and software components. The TOE consists of two main components that are: the NSP sensor(s) appliance and the Network Security Manager. Figure 1 depicts an example deployment of the TOE and shows the TOE/Operational 8
9 Environment Boundary. TOE Update Server Network S e n s o r Collection TLS AES128SHA NSM Manager Browser TLS AES128SHA ( Administrator and user interface) Browser Client OCSP Console browser client 6.1 NSP Sensors Figure 1 Network Architecture NSP sensors are content processing appliances that perform stateful inspection on a packet basis to discover and prevent intrusions, misuse, denial of service (DoS) attacks, and distributed denial of service (DDoS) attacks. McAfee Incorporated offers various types of sensor appliances providing different bandwidth and deployment strategies. These include the following organized by aggregate performance: M-Series M8000 v Gbps M6050 v Gbps M4050 v Gbps M3050 v Gbps M2750 v Mbps M1450 v Mbps M1250 v Mbps I-Series I-4010 v Gbps I-4000 v Gbps I-3000 v Gbps I-2700 v Mbps I-1400 v Mbps I-1200 v Mbps 9
10 All sensor types provide the same security functions. 6.2 Network Security Manager (NSM) The Network Security Manager consists of software that is used to configure and manage an NSP deployment. The NSM is a set of applications coupled with an embedded MySQL Database. The MySQL Database is installed during NSM installation and is configured so that it can be accessed only by the NSM application. The MySQL Database must reside on the same platform as does the NSM. The Network System Manager (NSM) is available in three versions: NSM Global Manager, NSM Standard Manager, and NSM Starter Manager. All versions of the NSM are part of the TOE and part of the same core software release. All versions of the NSM operate within an Operational Environment composed of an Intel-based hardware platform with a Windows Server 2003/2008 operating system (OS). The difference between the three versions is one of scalability. The NSM Starter Manager supports up to 2 NSP Sensors, the NSM Standard Manager supports up to 6 NSP sensors, and the NSM Global Manager supports an unlimited number of NSP sensors of any type or combination. The McAfee Incorporated Update Server is a McAfee-owned and operated file server that provides updates to the signature files and software of NSP sensors in customer installations. The Update Server resides at McAfee Incorporated facilities. Note: Software updates beyond signature updates, such as those to update the core NSP software suite, are excluded for the CC Evaluated Configuration. 7 Documentation and Delivery This section details the documentation that is (a) delivered to the customer, and (b) was used as evidence for the evaluation of the Network Security Platform and methodology for delivery of the evaluated configuration. In these tables, the following conventions are used: Documentation that is delivered to the customer is shown with bold titles. Documentation that was used as evidence but is not delivered is shown in a normal typeface. Documentation that is delivered as part of the product but was not used as evaluation is shown with a hashed background. The TOE is physically delivered to the End-User. The guidance is part of the TOE and is delivered in printed form and as PDFs on the installation media. 7.1 Design Documentation Document Revision Date McAfee IntruShield TOE Design Document (ADV_TDS) 1.0 May 5,
11 7.2 Guidance Documentation Document Revision Date McAfee Network Security Platform (NSP) Common Criteria Supplement EAL2 + ALC_FLR.2 McAfee IntruShield IPS System version 2.1 Quick Start Guide (INTR_I-1200_I-1400_quick_start.pdf) McAfee IntruShield IPS System version 2.1 Quick Start Guide (INTR_I-2700_Quick_Start.pdf) McAfee IntruShield IPS System version 2.1 Quick Start Guide (INTR_I-3000_I-4010_quick_start.pdf) McAfee IntruShield IPS System version 2.1 Quick Start Guide (INTR_I-4000_Quick_Start.pdf) Addendum I to 5.1 Documentation Network Security Manager version 5.1 (NSP_Addendum_I_to_5_1_Doc.pdf) Addendum II to 5.1 Documentation Network Security Manager version 5.1 (NSP_Addendum_II_to_5_1_Doc.pdf) Security Manager version 5.1 (NSP_Admin_Domain_Configuration_5.1.pdf) McAfee Network Security Platform version 5.1 (NSP_Best_Practices_5.1.pdf) McAfee Network Security Platform version 5.1 (NSP_Getting_Started_5.1.pdf) Security Sensor (NSP_I1200_Sensor_EN.pdf) Security Sensor (NSP_I1400_Sensor_EN.pdf) Security Sensor (NSP_I2700_Sensor_EN.pdf) Security Sensor (NSP_I3000_Sensor_EN.pdf) 1.0 May 5, revB / / / / / / / / /
12 Document Revision Date / / / / / / / G / G / 2.0 Security Sensor (NSP_I4000_Sensor_EN.pdf) Security Sensor (NSP_I4010_Sensor_EN.pdf) Security Manager version 5.1 (NSP_IPS_Configuration_5.1.pdf) Security Sensor version 5.1 (NSP_IPS_Deployment_5.1.pdf) Security Sensor (NSP_M1250_M1450_Sensor_EN.pdf) Security Sensor (NSP_M2750_Sensor_EN.pdf) Security Sensor (NSP_M3050_M4050_Sensor_EN.pdf) McAfee Network Security Platform M-6050 Quick Start Guide (NSP_M6050_Quick_Start_Guide_5.1.pdf) Security Sensor (NSP_M6050_Sensor_EN.pdf) McAfee Network Security Platform M-8000 Quick Start Guide (NSP_M8000_Quick_Start_Guide_5.1.pdf) Security Sensor (NSP_M8000_Sensor_EN.pdf) McAfee Network Security Platform M- 1250/M-1450 Quick Start Guide (NSP_M-1250_M- 1450_Quick_Start_Guide_5.1.pdf) McAfee Network Security Platform M-2750 Quick Start Guide (NSP_M-2750_Quick_Start_Guide_5.1.pdf) McAfee Network Security Platform M- 3050/M-4050 Quick Start Guide (NSP_M-3050_M-4050_Quick_Start_Guide.pdf) G 12
13 Document Revision Date Security Manager version 5.1 (NSP_Manager_Configuration_Basics_5.1.pdf) Security Manager version 5.1 (NSP_Manager_Installation_5.1.pdf) Security Manager version 5.1 (NSP_Manager_Server_Configuration_5.1.pdf) Security Manager version 5.1 (NSP_Reports_5.1.pdf) Security Sensor version 5.1 (NSP_Sensor_CLI_5.1.pdf) Security Manager version 5.1 (NSP_Sensor_Configuration_5.1.pdf) Security Sensor version 5.1 (NSP_ST_Virtualization_5.1.pdf) Security Manager version 5.1 (NSP_System_Status_Monitoring_5.1.pdf) McAfee Network Security Platform version 5.1 (NSP_Troubleshooting_5.1.pdf) Security Manager version 5.1 (NSP_User-Defined_Signatures_5.1.pdf) / / / / / / / / / / Configuration Management and Lifecycle Document Revision Date EAL 2 + ALC_FLR.2 Life Cycle Support Documentation McAfee Network Security Platform (NSP) Intrusion Detection System Configuration Management ALC_CMS.2, ALC_CMC May 5,
14 7.4 Test Documentation Document Revision Date McAfee Network Security Platform Test (ATE) 1.0 May 5, 2010 Document Independent and Penetration Test Plan 1.1 April 28, Vulnerability Assessment Documentation Document Revision Date McAfee Network Security Platform (NSP) Version 5.1 Common Criteria Vulnerability Analysis AVA_VAN.2 EAL2 1.1 May 5, Security Target Document Revision Date Network Security Platform (NSP) Intrusion Detection System Security Target EAL 2 augmented ALC_FLR May 5, Delivery As defined in the McAfee Network Security Platform (NSP) Common Criteria Supplement EAL2 + ALC_FLR.2 document, which is listed above and is provided with the product, the product must be purchased and then instructions are provided by McAfee for download of the evaluated configuration. As stated in the supplement document, the purchaser should refer to the sent from McAfee after product purchase, which includes the applicable Licensing information and License Keys. As per McAfee instructions, the purchaser should save the License files for later use and contact McAfee support at or for instructions on how to download the applicable image and documentation files. McAfee support personnel will advise where the purchaser can download the NSM and Sensor image files and the associated password required for file access. To download the files, the purchaser should follow instructions in the supplement document and provided by McAfee support personnel. The McAfee support personnel will provide a password to access the applicable image and document files. The purchaser must initiate the download by clicking on the image/document hyperlinks. The applicable image versions for the evaluated configuration that comprise McAfee NSP Release 5.1 are as follows: NSM: M-Series Sensor:
15 I-Series Sensor: The purchaser should ensure that these are the image versions downloaded to complete delivery. 8 IT Product Testing This section describes the testing efforts of the Developer and the evaluation team. 8.1 Developer Testing The test procedures were written by the Developer and designed to be conducted using manual interaction with the TOE interfaces along with test tools to simulate attacks and alerts. The Developer tested the TOE consistent with the Common Criteria evaluated configuration identified in the ST. The Developer s approach to testing is defined in the TOE Test Plan. The expected and actual test results are also included in the TOE Test Plan. The Developer testing effort tested the available interfaces to the TSF. The evaluation team verified that the Developer s testing tested aspects of the SFRs defined in the ST. This analysis ensures adequate coverage for EAL 2. The evaluation team determined that the Developer s actual test results matched the Developer s expected test results. 8.2 Evaluation Team Independent Testing The evaluation team conducted independent testing at McAfee s Santa Clara location. The evaluation team installed the TOE according to vendor installation instructions and the evaluated configuration as identified in the Security Target. The hardware and software used for testing is listed below. Evaluated Configuration Testing Hardware Requirements NSP Sensor, I-Series 1200, 1400, 2600, 2700, 3000, 4000, and 4010 NSP Sensor, M-Series , 1450, 2750, 3050, 4050, 6050, 8000 Windows 2003, or Linux PC Attack Client Machine Windows 2003, or Linux PC Attack Server Machine Windows XP ( for IE client browser) Windows 2003 SP3 PC NSM/Manager Hubs and Switches Evaluated Configuration Testing Software Requirements NSP I-Series Sensor Image for 1200, 1400, 2600, 2700, 3,000, 4000, 4010 NSP M-Series Sensor Image for 1250, 1450, 2750, 3050, 4050, 6050, 8000 NSM Image Signature Set Web Browser software: Internet Explorer 6.0 or higher. MySQL Database (embedded in the NSM) QA Test Scripts Attack Scripts Replay Traffic 15
16 McAfee Audit fill tool The test configuration is depicted below. This test topology allows the traffic to be sent in In- Line mode through the sensor. All Sensor models both the I-series 1200, 1400, 2600, 2700, 3000, 4000, 4010 and M-series sensors 1250, 1450, 2750,3050,4050,6050, and 8000 are tested in this mode. NSM Client Hub Sensor Hub Server The evaluation team confirmed the technical accuracy of the setup and installation guide during installation of the TOE while performing work unit ATE_IND.2-2. The evaluation team confirmed that the TOE version delivered for testing was identical to the version identified in the ST. The evaluation team used the Developer s Test Plan as a basis for creating the Independent Test Plan. The evaluation team analyzed the Developer s test procedures to determine their relevance and adequacy to test the security function under test. The following items represent a subset of the factors considered in selecting the functional tests to be conducted: Security functions not extensively tested by the developer s tests Security functions that implement critical security features Security functions critical to the TOE s security objectives Security functions with open parameters (e.g. text fields, unbounded number fields) The evaluation team reran 8 of the Developer s test cases and specified 6 additional tests. The additional test coverage was determined based on the analysis of the Developer test coverage and the ST. Each TOE Security Function was exercised at least once and the evaluation team verified that 16
17 each test passed. 8.3 Vulnerability Analysis The evaluation team ensured that the TOE does not contain exploitable flaws or weaknesses in the TOE based upon the evaluation team s vulnerability analysis and penetration tests. The evaluators performed a vulnerability analysis of the TOE to identify any obvious vulnerabilities in the product and to determine if they are exploitable in the intended environment for the TOE operation. In addition, the evaluation team performed a public domain search for potential vulnerabilities. The public domain search did not identify any known vulnerabilities in the TOE as a whole or any components of the TOE. Based on the results of the evaluation team s vulnerability analysis, the evaluation team devised penetration testing to confirm that the TOE was resistant to penetration attacks performed by an attacker with Basic attack potential. The evaluation team conducted testing using the same test configuration that was used for the independent testing. In addition to the documentation review used in the independent testing, the team used the knowledge gained during independent testing and the design activity to devise the penetration tests. The penetration tests attempted to misuse components of the TOE (e.g., directly access the MySQL database) and put the TOE in undefined states. This resulted in a set of four penetration tests. 9 Evaluated Configuration The Evaluated Configuration consists of the NSM software installed on a dedicated Windows Server 2003 SP3 or Windows Server 2008 SP1 platform and an NSP Sensor. The Sensor models that may be used as part of an evaluated configuration are models M-2750, M-1450, M-1250, M-6050, M-4050, M-8000, M3050, I-4010, I-4000, I-3000, I-2700, I-1400, and I NSM version was evaluated. M series sensor software version was evaluated. I series sensor software version was evaluated. The communications between NSM and Sensors must be performed on an isolated network. An administrative console running Internet Explorer 6 or later and CAC authentication hardware and software is also required. NSM requires connectivity to an OCSP server and the McAfee Update Server. 10 Clarification of Scope The following features are excluded from the Common Criteria Evaluated configuration and were not included in the evaluation: Update of TOE Software (other than threat signature updates) Incident Generator Sensor Failover Functionality; Sensor/Port Clustering (including associated interface groups) Features associated with e-policy Orchestrator Integration (Host Intrusion Prevention (HIP)) 17
18 Features associated with McAfee Virus Scan (MVS) Integration Network Access Control (NAC) features & integration with MNAC agents/server components Terminal Access Controller Access-Control System (TACACS) N-450 Sensor Appliance as this model pertains to the (excluded) NAC feature/deployment option Multiple NSM configuration deployments: Manager Disaster Recovery (MDR), hierarchical NSM (Network Security Central Manager) Decrypting SSL for IPS inspection NSM: XML converter tool for ACL rules Sensor Auxiliary Port The Sensor CLI interface is excluded for use from the CC Evaluated configuration. External Authentication server (LDAP/RADIUS) and username/password based authentication to the NSM (CAC only allowed for CC Evaluated configuration) Compact Flash Readers and/or PCMCIA/CardBus interfaces on Sensor Appliances (based on model) Use of any of these functions will cause the system to be out of the evaluated configuration. The user should specifically note that software updates are not included. As part of the evaluated configuration The evaluated configuration uses CAC authentication only and this is the only authentication mechanism tested as part of the evaluation. The inclusion of only CAC authentication in the evaluation was due to customer needs for the evaluation and does not imply that other authentication mechanisms are invalid; other authentication mechanisms exist, but were not tested as part of this evaluation. 11 Results of the Evaluation The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures. The TOE was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 3. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 3. InfoGard has determined that the TOE meets the security criteria in the Security Target, which specifies an assurance level of EAL 2 + ALC_FLR.2. A team of Validators, on behalf of the CCEVS Validation Body, monitored the evaluation. The evaluation was completed in April
19 12 Validator Comments/Recommendations The TOE was successfully evaluated in the defined evaluated configuration and scope described in sections 9 and 10 of this Validation Report. The validation team recommends certification of the TOE at EAL 2 augmented with ALC_FLR Security Target McAfee Network Security Platform (NSP) Intrusion Detection System Security Target EAL 2 augmented ALC_FLR.2, Version 1.0, May 5, Terms 14.1 Glossary Alert An alert is a notification of a system event, attack, or other incident that triggers the Intrusion Detection System. Authorized Administrator(s) A general term used to refer to administrative users holding the Super User, System Administrator, or Security Expert roles. Attack A set of actions performed by an attacker that poses a threat to the security state of a protected entity in terms of confidentiality, integrity, authenticity, availability, authorization, and access policies. CIDR (Classless Inter-Domain Routing) A scheme which allocates blocks of Internet addresses in a way that allows summarization into a smaller number of routing table entries. A CIDR address contains the standard 32-bit IP address but includes information on how many bits are used for the network prefix. For example, in the CIDR address /22, the /22 indicates the first 25 bits are used to identify the unique network leaving the remaining bits to identify the specific host. Denial of Service In a Denial of Service (DoS) attack, the attacker attempts to crash a service (or the machine), overload network links, overload the CPU, or fill up the disk. The attacker does not always try to gain information, but to simply act as a vandal to prevent you from making use of your machine. Ping floods and Smurf attacks are examples of DoS attacks. Distributed DDoS These attacks usually consist of standard DoS attacks Denial of orchestrated by attackers covertly controlling many, sometimes hundreds, of different machines. HTTPS The secure hypertext transfer protocol (HTTPS) is a communications protocol designed to transfer encrypted information between computers over the World Wide Web. HTTPS is http using Secure Socket layer (SSL) or Transport Layer Security (TLS) encryption. Intrusion Unauthorized access to, and/or activity in, an information system, usually for the purpose of tampering with or disrupting normal 19
20 Intrusion Detection Policy Policy Violations Port Cluster MySQL Roles Sensor Signature Span Mode services. See also Attack. The process of identifying that an intrusion has been attempted, is occurring, or has occurred. A user-configured security rule that determines the permission of traffic across a network. Policies can set rules for protocols (HTTP, UDP), machines (NT, Solaris), operating systems (Unix), and other types of network information. A policy also defines what actions should be taken in the event of non-permissible activity. All activities for which the underlying traffic content may not be malicious by itself, but are explicitly forbidden by the usage policies of the network as defined by a security policy. These can include protocol violations wherein packets do not conform to network protocol standards. (For example, they are incorrectly structured, have an invalid combination of flags set, or contain incorrect values.) Examples might include TCP packets with their SYN and RST flags enabled, or an IP packet whose specified length doesn t match its actual length. A protocol violation can be an indication of a possible attack, but can also be triggered by malfunctioning software, hardware or could be applications/protocols forbidden in the network (e.g. Peer to Peer (P2P)). Port Cluster is a more intuitive term for an Interface Group. An interface group enables multiple sensor ports to be grouped together for the effective monitoring of asymmetric environments. Interface groups normalize the impact of traffic flows split across multiple interfaces, thus maintaining state to avoid information loss. Once configured, an interface group appears in the Resource Tree as a single interface node (icon) under the sensor where it is located. All of the ports that make up the interface are configured as one logical entity, keeping the configuration consistent. A Relational database. Allows the definition of data structures, storage/retrieval operations, and integrity constraints. The data and relations between them are kept in organized tables, which are collections of records and each record in a table contains the same fields. A class of user privileges that determines the authorized activities of the various users in the system. The sensor is a network device containing the intrusion detection engine. It analyzes network traffic, searching for signs of unauthorized activity. Activities or alterations to an information system indicating an attack or attempted attack, detectable by examination of audit trail logs. One of the monitoring modes available for an NSP sensor. Functions by mirroring the packet information on a switch or hub 20
21 SPAN Port Threat Analyzer TLS Tap Tap Mode Virtual IDS VLAN Vulnerability 14.2 Acronyms AES EAL FIPS IDS IPS NSM and sending the information to a sensor for inspection, while continuing the transmission of traffic with negligible latency. SPAN mode is typically half-duplex, and works through a connection of a sensor to a port on a hub or the SPAN port of a switch. On a switch, SPAN mirrors the traffic at one switched segment onto a predefined port, known as a SPAN port. A graphical user interface for viewing specific attack information in the NSM System. The Threat Analyzer interface is part of the NSM component, and focuses on alert forensic analysis. A secure socket layer (TLS) is an encryption protocol invoked on a Web server that uses HTTPS. A tap is hardware device that passes traffic unidirectionally from a network segment to the IDS. Traffic is mirrored as it passes through the tap. This mirror image is sent to the IDS for inspection. This prevents traffic passing from being directed at the IDS. One of the monitoring modes available for an NSP sensor. Functions by mirroring the packet information and sending the information to a sensor for inspection, while continuing the transmission of traffic with negligible latency. Tap mode works through installation of an external wire tap, a port on a hub, the SPAN port of a switch, or through an internal tap when deploying the I Also known as passive monitoring mode. An NSM feature that enables you to logically segment a sensor into a large number of virtual sensors, each of which can be customized with its own security policy. Virtual IDS (VIDS) are represented in the NSM as interfaces and sub-interfaces. Virtual Local Area Network. A logical grouping of two or more nodes which are not necessarily on the same physical network segment, but which share the same network number. This is often associated with switched Ethernet networks. Any characteristic of a computer system that will allow someone to keep it from operating correctly, or that will let unauthorized users take control of the system. Advanced Encryption Standard Evaluation Assurance Level Federal Information Processing Standards Publication Intrusion Detection System Intrusion Prevention System Network Security Manager 21
22 NSP OCSP PP SF SFR ST TOE TSF VLAN Network Security Platform Online Certificate Status Protocol Protection Profile Security Functions Security Functional Requirements Security Target Target of Evaluation TOE Security Functions Virtual Local Area Network 15 Bibliography [1] Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model, dated July 2009, Version 3.1 Revision 3, CCMB [2] Common Criteria (CC) for Information Technology Security Evaluation Part 2: Security functional components, July 2009, Version 3.1, Revision 3, CCMB [3] Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components, July 2009, Version 3.1, Revision 3, CCMB [4] Common Methodology for Information Technology Security Evaluation Evaluation methodology, July 2009, Version 3.1, Revision 3, CCMB
Network Security Platform (NSP) Security Target
Network Security Platform (NSP) Security Target Release Date: January 10, 2012 Document ID: 10-2280-R-0044 Version: 1.1 Prepared By: InfoGard Laboratories, Inc. Prepared For: McAfee, Incorporated 2821
Certification Report
Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Security Target. McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5. Document Version 1.1. September 9, 2011
Security Target McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5 Document Version 1.1 September 9, 2011 Document Version 1.1 McAfee Page 1 of 61 Prepared For: Prepared By: McAfee, Inc. 2821
Network Security Platform (NSP) Security Target (M-series sensors)
Network Security Platform (NSP) Security Target (M-series sensors) Release Date: July 19, 2013 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee, Incorporated 2821 Mission College Blvd Santa
Certification Report
Certification Report EAL 3+ Evaluation of Rapid7 Nexpose Vulnerability Management and Penetration Testing System V5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Security Target. McAfee Database Security 4.4.3. Document Version 1.4. June 18, 2013. Security Target: McAfee Database Security 4.4.
Security Target McAfee Database Security 4.4.3 Document Version 1.4 June 18, 2013 Document Version 1.4 McAfee Page 1 of 66 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara,
Security Target: IBM Internet Security Systems GX Series Security Appliances Version 4.1 and SiteProtector Version 2.0 Service Pack 8.
Security Target IBM Internet Security Systems GX Series Security Appliances Version 4.1 and Document Version 0.6 February 27, 2012 Document Version 0.6 IBM Internet Security Systems Page 1 of 55 Prepared
Voltage Security, Inc. Palo Alto, CA
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Report Number: CCEVS-VR-07-0029 Dated: 29 May 2007 Version: 1.3 Validation Report TM Voltage Security, Inc. Palo
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
IBM Internet Security Systems GX6116 Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 with Reporting Module
Security Target IBM Internet Security Systems GX6116 Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 with Reporting Module Document Version 2.0 July 6, 2011 Document Version
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012
Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa
TIBCO ActiveMatrix BusinessWorks TM. Release 5.8
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report TIBCO ActiveMatrix BusinessWorks TM Release 5.8 Report Number: CCEVS-VR-VID10230-2010 Dated:
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Certification Report
Certification Report EAL 3+ Evaluation of RSA envision platform v4.0 SP 1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report
Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report
KECS-CR-16-36 Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report Certification No.: KECS-PP-0717-2016 2016. 6. 10 IT Security Certification Center History of Creation
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Report Number: CCEVS-VR-VID10257-2011 Dated: 31 March 2011 Version: 1.0 National Institute
Certification Report
Certification Report HP Universal CMDB and Universal Discovery v10.21 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 11.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report McAfee Network Security Platform M-Series and NS- Series Sensors Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
How To Evaluate Watchguard And Fireware V11.5.1
Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation
Security Target. McAfee Enterprise Mobility Management 12.0. Document Version 1.16
Security Target McAfee Enterprise Mobility Management 12.0 Document Version 1.16 September 17, 2014 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 Primasec Ltd
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
Security Target. McAfee Data Loss Prevention Endpoint 9.4 and epolicy Orchestrator 5.1.3. Document Version 1.0
Security Target McAfee Data Loss Prevention Endpoint 9.4 and epolicy Orchestrator 5.1.3 Document Version 1.0 November 24, 2015 Prepared For: Prepared By: Intel Corporation. 2821 Mission College Blvd. Santa
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
Certification Report StoneGate FW/VPN 5.2.5
Ärendetyp: 6 Diarienummer: 11FMV3127-87:1 Dokument ID HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2012-01-23 Country of origin: Sweden Försvarets materielverk Swedish Certification Body
Mobile Billing System Security Target
Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing
Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT
Template: CSEC_mall_doc.dot, 7.0 Ärendetyp: 6 Diarienummer: 14FMV10188-21:1 Dokument ID CB-015 HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2015-06-12 Country of origin: Sweden Försvarets
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition Version 1-0 7 February 2011 2011 Citrix Systems, Inc. All rights reserved. Summary of Amendments Version 1-0 7
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Common Criteria Evaluation and Validation Scheme Validation Report Arbor Networks Peakflow X Version 3.1.4 Report
Trustwave DbProtect Version 6.4.3 Security Target
Trustwave DbProtect Version 6.4.3 Security Target Version 1.8 July 21, 2015 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane
Certification Report
Certification Report EAL 3+ Evaluation of AccessData Cyber Intelligence and Response Technology v2.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Security Target. McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5. Document Version 1.3. October 12, 2011
Security Target McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5 Document Version 1.3 October 12, 2011 Document Version 1.3 McAfee Page 1 of 69 Prepared For: Prepared By: McAfee, Inc. 2821
Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64
122-B CERTIFICATION REPORT No. CRP250 Business Intelligence Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on update 5 Issue 1.0 June 2009 Crown Copyright 2009 All Rights Reserved Reproduction
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme 2008 Government of Canada, Communications
Certification Report
Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of
Certification Report
Certification Report Symantec Network Access Control Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Certification Report
Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Citrix Password Manager, Enterprise Edition Version 4.5
122-B COMMON CRITERIA CERTIFICATION REPORT No. CRP235 Citrix Password Manager, Enterprise Edition Version 4.5 running on Microsoft Windows and Citrix Presentation Server Issue 1.0 June 2007 Crown Copyright
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Marimba Client and Server Management from BMC Software Release 6.0.3
Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...
Certification Report
Certification Report EAL 3+ Evaluation of Extreme Networks ExtremeXOS Network Operating System v12.3.6.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Oracle Identity and Access Management 10g Release 10.1.4.0.1 running on Red Hat Enterprise Linux AS Release 4 Update 5
122-B CERTIFICATION REPORT No. CRP245 Oracle Identity and Access Management 10g Release 10.1.4.0.1 running on Red Hat Enterprise Linux AS Release 4 Update 5 Issue 1.0 June 2008 Crown Copyright 2008 Reproduction
McAfee Intrusion Prevention System
McAfee Protection-in-Depth Strategy Internal Use Only IntruShield 1200 and 1400 Appliances Pioneering and Industry-Leading, Next-Generation s Features and Details What Is Intrusion Prevention? Intrusion
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications
Certification Report
Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances
122 CERTIFICATION REPORT No. CRP294 Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances Issue 1.0 November 2015
SAMSUNG SDS FIDO Server Solution V1.1 Certification Report
KECS-CR-15-73 SAMSUNG SDS FIDO Server Solution V1.1 Certification Report Certification No.: KECS-ISIS-0645-2015 2015. 9. 10 IT Security Certification Center History of Creation and Revision No. Date Revised
Fundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
C015 Certification Report
C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please
CERTIFICATION REPORT No. CRP253
122-B CERTIFICATION REPORT No. CRP253 Citrix NetScaler Platinum Edition Load Balancer Version 9.1 (Build 100.3.cl) running on NetScaler 9010 FIPS, MPX 7000 platform, MPX 9000 platform, MPX 10000 platform
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Network Security Platform 7.5
M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Certification Report
Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
Extended Package for Mobile Device Management Agents
Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Managing Latency in IPS Networks
Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended
Executive Summary and Purpose
ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on
C033 Certification Report
C033 Certification Report Mobile Billing System File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please email: [email protected]
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
Certification Report
Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
