Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0
|
|
|
- Harry Joseph
- 9 years ago
- Views:
Transcription
1 Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 ST Version 1.6 August 20, 2007 Document Version 1.6 Symantec Corporation Page 1 of 55
2 Prepared For: Prepared By: Symantec Corporation Stevens Creek Blvd. Cupertino, CA Apex Assurance Group, LLC 5448 Apex Peakway Drive, Ste. 101 Apex, NC This document provides the basis for an evaluation of a specific Target of Evaluation (TOE), the Symantec Mail Security 8300 Series Appliances Version 5.0. This Security Target (ST) defines a set of assumptions about the aspects of the environment, a list of threats that the product intends to counter, a set of security objectives, a set of security requirements and the IT security functions provided by the TOE which meet the set of requirements. Document Revision History REVISION DATE DESCRIPTION 1.0 October 25, 2006 Release to Symantec for review 1.1 November 2, 2006 Incorporate comments from Symantec 1.2 November 9, 2006 Incorporate comments from Symantec and submit to laboratory 1.3 January 15, 2007 Address initial round of verdicts 1.4 June 22, 2007 Include build number, resolve TBDs, minor revisions 1.5 July 13, 2007 Close verdicts 1.6 August 20, 2007 Update with certifier comments Document Version 1.6 Symantec Corporation Page 2 of 55
3 Table of Contents 1 INTRODUCTION IDENTIFICATION OVERVIEW CC CONFORMANCE CLAIM ORGANIZATION DOCUMENT CONVENTIONS DOCUMENT TERMINOLOGY TOE DESCRIPTION OVERVIEW AND MAIL FLOW SUMMARY ARCHITECTURE OVERVIEW TOE COMPONENTS Control Center Scanner Subcomponent Descriptions TOE BOUNDARIES Physical Boundaries Logical Boundaries Security Audit User Data Protection Identification and Authentication Security Management TSF Protection TOE Security Functional Policies Administrative Access Control SFP SMTP Information Flow Control SFP TOE SECURITY ENVIRONMENT ASSUMPTIONS Personnel Assumptions Physical Environment Assumptions Operational Assumptions THREATS Threats Addressed by the TOE Threats Addressed by Operating Environment ORGANIZATIONAL SECURITY POLICIES SECURITY OBJECTIVES SECURITY OBJECTIVES FOR THE TOE SECURITY OBJECTIVES FOR THE IT ENVIRONMENT SECURITY OBJECTIVES FOR THE NON-IT ENVIRONMENT IT SECURITY REQUIREMENTS TOE SECURITY FUNCTIONAL REQUIREMENTS Security Audit (FAU) FAU_ARP.1 Security Alarms FAU_GEN.1 Audit Data Generation FAU_SAA.1 Potential Violation Analysis FAU_SAR.1 Audit Review User Data Protection (FDP) FDP_ACC.1 Subset Access Control FDP_ACF.1 Security Attribute Based Access Control FDP_IFC.1 Subset Information Flow Control...23 Document Version 1.6 Symantec Corporation Page 3 of 55
4 FDP_IFF.1 Simple Security Attributes FDP_ITC.1 Import of User Data Without Security Attributes Identification and Authentication (FIA) FIA_UAU.2 User Authentication before Any Action FIA_UID.2 User Identification before Any Action Security Management (FMT) FMT_MSA.1(1) Management of security attributes FMT_MSA.1(2) Management of security attributes FMT_MSA.3(1) Static Attribute Initialization FMT_MSA.3(2) Static Attribute Initialization FMT_SMF.1 Specification of Management Functions FMT_SMR.1 Security Roles Protection of the TSF (FPT) FPT_ITT.1 Basic Internal TSF Data Transfer Protection FPT_RVM.1 Non-bypassability of the TSP FPT_SEP.1 TSF domain separation SECURITY FUNCTIONAL REQUIREMENTS FOR THE IT ENVIRONMENT Protection of the TSF (FPT) FPT_STM.1 Reliable time stamps SECURITY REQUIREMENTS FOR THE NON-IT ENVIRONMENT TOE SECURITY ASSURANCE REQUIREMENTS TOE SUMMARY SPECIFICATION TOE SECURITY FUNCTIONS Security Audit Event-Based Reporting Component Logging Alerts and Notifications User Data Protection Information Process Flow Access Control Identification and Authentication Security Management Security Audit Information Process Flow Access Control Component Services TSF Protection SECURITY ASSURANCE MEASURES PROTECTION PROFILE CLAIMS RATIONALE RATIONALE FOR SECURITY OBJECTIVES OF THE TOE, IT ENVIRONMENT, AND NON-IT ENVIRONMENT Summary Mapping of Security Objectives Rationale for Security Objectives of the TOE Rationale for Security Objectives of the IT Environment Rationale for Security Objectives of the Non-IT Environment SECURITY REQUIREMENTS RATIONALE Summary of TOE Security Requirements Sufficiency of Security Requirements TOE SUMMARY SPECIFICATION RATIONALE Sufficiency of IT Security Functions RATIONALE FOR EXPLICITLY STATED SECURITY REQUIREMENTS RATIONALE FOR IT SECURITY REQUIREMENT DEPENDENCIES RATIONALE FOR STRENGTH OF FUNCTION CLAIM RATIONALE FOR SECURITY ASSURANCE Document Version 1.6 Symantec Corporation Page 4 of 55
5 8.8 PROTECTION PROFILE CLAIMS RATIONALE List of Tables Table 1 ST Organization and Description... 7 Table 2 Acronyms Used in Security Target... 8 Table 3 Description of Components within the TOE Boundary Table 4 Evaluated Configuration for the TOE Table 5 TOE Security Functional Requirements Table 6 Management Actions and Available Services Table 7 Security Assurance Requirements at EAL Table 8 Available Spam and Virus Reports Table 9 Alert Settings and Descriptions Table 10 Handling Verdicts and Available Actions Table 11 Assurance Measures (EAL2) Table 12 Mapping of Assumptions, Threats, and OSPs to Security Objectives Table 13 Mapping of TOE Security Functional Requirements and Objectives Table 14 Sufficiency of Security Requirements Table 15 Mapping of Security Functional Requirements to IT Security Functions Table 16 Sufficiency of IT Security Functions Table 17 TOE SFR Dependency Rationale List of Figures Figure 1 Architecture Overview and TOE Boundaries Document Version 1.6 Symantec Corporation Page 5 of 55
6 1 Introduction This section identifies the Security Target (ST), Target of Evaluation (TOE), conformance claims, Security Target organization, document conventions, and terminology. It also includes an overview of the evaluated product. 1.1 Identification This section provides information necessary to identify and control this ST and its Target of Evaluation. ST Title: Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 ST Revision: 1.6 ST Publication Date: August 20, 2007 TOE Identification: Symantec Mail Security 8300 Series Appliances Version 5.0 Vendor: Symantec Corporation CC Version: Author: Keywords: Common Criteria for Information Technology Security Evaluation, Version 2.3 August 2005 (ISO/IEC 15408:2005). Apex Assurance Group Symantec, anti-spam, anti-virus, security appliance 1.2 Overview The TOE is Symantec Mail Security 8300 Series Appliances Version 5.0, which prevents unwanted s from entering the network. Robust management and audit capabilities support advanced filtering of all incoming SMTP traffic for spam and viruses. Symantec Mail Security 8300 Series Appliances Version 5.0 may hereafter also be referred to as the 8300 Series Appliances or the TOE in this document. 1.3 CC Conformance Claim The TOE is Common Criteria Version 2.3 Part 2 and Part 3 conformant at EAL Organization This Security Target follows the following format: Document Version 1.6 Symantec Corporation Page 6 of 55
7 SECTION TITLE DESCRIPTION 1 Introduction Provides an overview of the Security Target 2 TOE Description Defines the hardware and software that make up the TOE as well as the physical and logical boundaries of the TOE 3 TOE Security Environment Specifies the threats, assumptions and organizational security policies that affect the TOE 4 Security Objectives Defines the security objectives for the TOE and the TOE environment 5 IT Security Requirements Contains the functional and assurance requirements for this TOE 6 TOE Summary Specification Identifies the IT security functions provided by the TOE and also identifies the assurance measures targeted to meet the assurance requirements. 7 PP Claims Specifies Protection Profile conformance claims of the TOE 8 Rationale Provides a rationale to demonstrate that the security objectives satisfy the threats; provides justifications of dependency analysis and strength of function issues Table 1 ST Organization and Description 1.5 Document Conventions The notation, formatting, and conventions used in this Security Target are consistent with those used in Version 2.3 of the Common Criteria. Selected presentation choices are discussed here to aid the Security Target reader. The Common Criteria allows several operations to be performed on functional requirements: The allowable operations defined in paragraph of Part 2 of the Common Criteria are refinement, selection, assignment and iteration. The assignment operation is used to assign a specific value to an unspecified parameter, such as the length of a password. An assignment operation is indicated by showing the value in square brackets, i.e. [assignment_value(s)]. The refinement operation is used to add detail to a requirement, and thus further restricts a requirement. Refinement of security requirements is denoted by bold text. Any text removed is indicated with a strikethrough format (Example: TSF). The selection operation is picking one or more items from a list in order to narrow the scope of a component element. Selections are denoted by underlined italicized text. Iterated functional and assurance requirements are given unique identifiers by appending to the base requirement identifier from the Common Criteria an iteration number inside parenthesis, for example, FMT_MTD.1.1 (1) and FMT_MTD.1.1 (2) refer to separate instances of the FMT_MTD.1 security functional requirement component. Italicized text is used for both official document titles and text meant to be emphasized more than plain text. Document Version 1.6 Symantec Corporation Page 7 of 55
8 1.6 Document Terminology The following table provides a list of acronyms used within this document: TERM DEFINITION CC Common Criteria version 2.3 (ISO/IEC 15408:2005) EAL FTP IP LDAP MTA NTP OSP SFR SFP SOF SMS SMTP SPF ST TCP TOE TSF Evaluation Assurance Level File Transfer Protocol Internet Protocol Lightweight Directory Access Protocol Mail Transfer Agent Network Time Protocol Organizational Security Policy Security Functional Requirement Security Function Policy Strength Of Function Symantec Mail Security Simple Mail Transfer Protocol Sender Policy Framework Security Target Transmission Control Protocol Target Of Evaluation TOE Security Function TSP TOE Security Policy Table 2 Acronyms Used in Security Target Document Version 1.6 Symantec Corporation Page 8 of 55
9 2 TOE Description This section describes the Target of Evaluation (TOE), the provided security functionality (logical boundaries), and the physical TOE boundaries. 2.1 Overview and Mail Flow Summary Symantec Mail Security 8300 Series appliances offer enterprises an easy-to-deploy, comprehensive gateway-based security solution through the following: TCP-Layer Traffic Shaping This feature analyzes sources over time, classifying them as either legitimate or illegitimate. It slows the rate at which leaves attackers' networks, thereby saving resources, reducing volume, and penalizing spammers. Firewall This early response feature can vastly improve message throughput by analyzing incoming SMTP connections and enabling the end user to refuse connections or messages from hosts it perceives to be hostile. Antispam technology Symantec s state-of-the-art antispam filters assess and classify as it enters the end user s site. Antivirus technology Antivirus definitions and engines protect end users from borne viruses. Content Control These features help administrators enforce corporate policies, reduce legal liability, and ensure compliance with regulatory requirements. Group policies and filter policies An easy-to-use authoring tool lets administrators create powerful and flexible ad hoc filters for individuals and groups. The TOE provides high-performance, integrated mail protection against virus threats, spam, and other unwanted content at the earliest point of network entry, the Internet (SMTP) gateway. As mail flows into mail servers, the TOE analyzes and filters mail using a variety of techniques, incorporating up-to-the-minute filters from Symantec Security Response. Along with standard methods such as heuristics and pattern matching, the TOE incorporates many proprietary filtering methods, such as advanced signature technologies and reputation-based source filters. Filters are continuously and automatically refreshed by Symantec Security Response to combat the latest spam and other threats. Administrators can set up centralized policies to perform a variety of actions based on the verdict assigned to each message. For example, administrators can immediately delete spam identified by the TOE or choose to route spam to a central Webbased quarantine for a specific set of users. 2.2 Architecture Overview The Symantec Mail Security 8300 Series appliances process a mail message as follows (the scenario discussed below assumes a sample message passes through the Filtering Engine to the Transformation Engine without being rejected): At the gateway, TCP-Layer Traffic Shaping checks the message s IP address to determine if it comes from a known source of spam or -borne viruses. The incoming connection arrives at the inbound MTA via TCP/IP. Before accepting the connection, the inbound MTA sends the message s IP address to Document Version 1.6 Symantec Corporation Page 9 of 55
10 the Firewall to check whether it is a known source of spam or -borne viruses. If it is not, the inbound MTA accepts the connection and moves the message to its inbound queue. The Filtering Hub accepts a copy of the message for filtering. The Filtering Hub consults the LDAP Synchronization Service directory to expand the message s distribution list. The Filtering Engine determines each recipient s filtering policies. The Firewall checks the message s SMTP From field and IP address against Sender Group, Spam Attack, Directory Harvest Attack, and Virus Attack settings which the administrator configured via the Control Center. In addition, the message is checked against Blocked/Allowed Senders Lists defined by end users. The Firewall tries to authenticate the message using the Sender Policy Framework (SPF). Antivirus and configurable heuristic filters determine whether the message is infected. Content Compliance filters scan the message for restricted attachment types or words, as defined in configurable dictionaries. Antispam filters compare message elements with current filters published by Symantec Security Response to determine whether the message is spam. At this point, the message may also be checked against end-user defined Language settings. The Transformation Engine performs actions based on filtering results and configurable Group Policies. Document Version 1.6 Symantec Corporation Page 10 of 55
11 = TOE Boundary = IT Environment Figure 1 Architecture Overview and TOE Boundaries 2.3 TOE Components The TOE is Symantec Mail Security 8300 Series appliances, which are flexible units that can perform several different functions, depending on the size of the end user network and processing needs. Each Symantec Mail Security 8300 Series appliance can act as a Scanner, a Control Center, or both. The TOE boundary is indicated with a dashed green line in Figure 1 and includes the components listed in the sections below Control Center The Control Center enables Web-based configuration and administration of the TOE. With a single Control Center, the end user can centrally configure, monitor, and manage all the Scanners in the network. The Control Center also contains Quarantine, which is an optional storage area for caught spam. Document Version 1.6 Symantec Corporation Page 11 of 55
12 Each TOE installation has exactly one Control Center. The Control Center communicates with the Agent on each Scanner. From the Control Center s Web-based graphical user interface 1, a TOE Administrator can: Configure, start and stop each Scanner. Specify filtering options for groups of users or for all users at once. Monitor consolidated reports and logs for all Scanners. See summary information. Administer Quarantine. View online help for Control Center screens. The Control Center subcomponents and functionality are described in Table 3 Description of Components within the TOE Boundary Scanner The Scanner component performs filtering, and a TOE installation can have one or more Scanners. Each Scanner can reside on the same 8300 appliance as the Control Center component or on a separate appliance. The Scanner subcomponents and functionality are described in Table 3 Description of Components within the TOE Boundary Subcomponent Descriptions The table below provides a description of each subcomponent in the TOE boundary as referenced in Figure 1 Architecture Overview and TOE Boundaries: COMPONENT Inbound MTA Filtering Hub Filtering Engine Transformation Engine Outbound MTA Delivery MTA Live Update Client / Conduit DESCRIPTION Receives inbound mail and forwards it to the Filtering Hub for processing. Manages message filtering processes Performs message filtering Performs actions on messages Receives outbound mail and forwards it to the Filtering Hub for processing. Sends inbound and outbound messages that have already been filtered to their required destinations using the filtering results and the configuration settings for relaying inbound and outbound mail. Retrieves new and updated filters from Symantec Security Response through secure HTTPS file transfer. Once retrieved, the Conduit authenticates filters, and then alerts the Filter Hub that new filters are to be received and implemented. Finally, the Conduit manages statistics for use by Symantec Security Response and for generating reports. 1 The Administrator configures and manages the TOE with a workstation communicating with the TOE via SSL Document Version 1.6 Symantec Corporation Page 12 of 55
13 Agent COMPONENT Administrative Web Interface Virus Quarantine Web Quarantine Incident Folders LDAP Synch Service Alerts and Notifications Message Store DESCRIPTION Facilitates communicating configuration information between the Control Center and each Scanner. Allows configuration as well as review of configuration settings and reports Holds messages suspected of containing viruses Stores messages separately from the normal message flow and allows access to those messages 2. Holds incident notifications Provides automated synchronization between LDAP directory sources and Symantec Mail Security. Enables alias expansion, facilitates application of filtering policies to users and groups, and provides enhanced performance. Sends to the sender, recipients, or other addresses when a specified condition is met (such as stripping.exe attachments). Also sends periodic messages to users, providing a summary of their spam. Database in the Control Center that stores configuration information, logs, reports, and Quarantined messages (if using Quarantine). Table 3 Description of Components within the TOE Boundary 2.4 TOE Boundaries Physical Boundaries The TOE is a combined hardware/software TOE and is defined as the Symantec Mail Security 8300 Series Appliances Version 5.0. In order to comply with the evaluated configuration, the following hardware and software components should be used: TOE COMPONENT VERSION/MODEL NUMBER TOE Software Version TOE Hardware Symantec Mail Security 8380 Symantec Mail Security 8360 Table 4 Evaluated Configuration for the TOE The Linux-based Operating System (Red Hat version 9.0 running Linux Kernel version ) for each appliance is included as part of the TOE software and is installed when the appliance is provisioned. As such, the Operating System on the TOE hardware is included in the evaluation. 2 The User accesses their quarantined messages with a workstation communicating with the TOE via SSL Document Version 1.6 Symantec Corporation Page 13 of 55
14 2.4.2 Logical Boundaries This section outlines the boundaries of the security functionality of the TOE; the logical boundary of the TOE includes the security functionality described in the following sections. At a high level, the logical boundaries of the TOE are the functions of the TOE interfaces, including audit of security functions, authentication for the administrative functions, the management of the security configurations, controlling the flow of SMTP traffic, and the selfprotection of the TOE itself Security Audit The TOE provides spam reports and virus reports to provide the Administrator with insight on the filtering activity. Additionally, the TOE supports the provision of log data from each system component and supports the ability to notify an Administrator when a specific event is triggered User Data Protection The spam detection, virus detection, monitoring, and managing capabilities of the TOE ensure that the information received by the network is free of potential risks Identification and Authentication The TOE supports identity-based Identification and Authentication of an Operator. Operators authenticate via a Web-based GUI connected to the Control Center, and operators can assume a role of Administrator or Limited Administrator Security Management The TOE provides administrators with the capabilities to configure, monitor and manage the TOE to fulfill the Security Objectives. Security Management principles relate to Security Audit, SMTP Information Flow Control, and Component Services. Administrators configure the TOE via webbased connection TSF Protection The TOE provides various protection mechanisms for its security functions, including the enforcement of the information flow control policy and authentication rules at the applicable interfaces TOE Security Functional Policies The TOE supports the following Security Functional Policies: Administrative Access Control SFP The TOE implements an access control SFP named Administrative Access Control SFP. This SFP determines and enforces the privileges associated with operator roles. An authorized administrator can define specific services available to administrators and users via the Control Center. The Administrator can also configure LDAP support, view/configure Syslog data, and Document Version 1.6 Symantec Corporation Page 14 of 55
15 backup/restore configurations via FTP. All administration takes place via Web-based HTTPS GUI connected to the TOE via SSL-protected session SMTP Information Flow Control SFP The TOE implements an information process flow policy named SMTP Information Flow Control SFP. This SFP determines the procedures utilized to process information entering the TOE and the action taken when a security violation occurs. The security violations are defined as messages containing viruses or classified as spam. The actions taken at the occurrence of a violation is configurable by an authorized administrator via the Control Center. Document Version 1.6 Symantec Corporation Page 15 of 55
16 3 TOE Security Environment In order to clarify the nature of the security problem that the TOE is intended to solve, this section describes the following: Any assumptions about the security aspects of the environment and/or of the manner in which the TOE is intended to be used Any known or assumed threats to the assets against which specific protection within the TOE or its environment is required Any organizational security policy statements or rules with which the TOE must comply 3.1 Assumptions This section describes the security aspects of the environment in which the TOE is intended to be used. The assumptions are ordered into three groups: personnel, physical environment, and operational assumptions. The TOE is assured to provide effective security measures in a co-operative non-hostile environment only if it is installed, managed, and used correctly. The operational environment must be managed in accordance with assurance requirements documentation for delivery, operation, and user/administrator guidance. The following specific conditions are assumed to exist in an environment where the TOE is employed Personnel Assumptions A.MANAGE A.NOEVIL Administrators of the TOE are assumed to be appropriately trained to undertake the installation, configuration and management of the TOE in a secure and trusted manner. Administrators of the TOE are not careless, willfully negligent, nor hostile, and will follow and abide by the instructions provided by the TOE documentation Physical Environment Assumptions A.LOCATE The processing platform on which the TOE resides is assumed to be located within a facility that provides controlled access Operational Assumptions A.CONFIG A.TIMESOURCE The TOE is configured to handle all SMTP traffic flow. The TOE has a trusted source for system time Document Version 1.6 Symantec Corporation Page 16 of 55
17 3.2 Threats The TOE or IT environment addresses the threats identified in the following sections Threats Addressed by the TOE The TOE addresses the following threats: T.ATTACK T.FALSEPOS T.NOAUTH T.NOPRIV An attacker directs malicious network traffic against the network monitored by the TOE. An message that contains virus or is classified as spam may not be flagged malicious or may not be reviewed by the intended recipient. An unauthorized user may gain access to the TOE and alter the TOE configuration, causing malicious/unwanted traffic to enter the network. An authorized user of the TOE exceeds his/her assigned security privileges resulting in the illegal modification of the TOE configuration and/or data Threats Addressed by Operating Environment The TOE Operating Environment is not required to explicitly address any threats, although the TOE Operating Environment is constrained by the assumptions made above in the Assumptions section. 3.3 Organizational Security Policies The organizational security policies relevant to the operation of the TOE are as follows: P.INCOMING All incoming network traffic via SMTP shall be able to be monitored for malicious/undesired . Document Version 1.6 Symantec Corporation Page 17 of 55
18 4 Security Objectives This section describes the security objectives for the TOE and the TOE s operating environment. The security objectives are divided between TOE Security Objectives (i.e., security objectives addressed directly by the TOE) and Security Objectives for the Operating Environment (i.e., security objectives addressed by the IT domain or by non-technical or procedural means). 4.1 Security Objectives for the TOE The IT security objectives for the TOE are addressed below: O.AUDIT O.DETECT O.QUARANTINE O.SEC_ACCESS O.TOE_PROTECT The TOE shall record the necessary events to provide information on SMTP traffic and the results of the TOE s detection/filtering functions. The TOE shall be able to correctly detect s classified as spam or containing viruses. The TOE shall establish a quarantine area for user review of messages flagged as spam or containing viruses. The TOE shall ensure that only those authorized users and applications are granted access to the security functions, configuration and associated data. The TOE operating system shall provide mechanisms to isolate the TOE Security Functions (TSF) and assure that TSF components cannot be tampered with or bypassed. 4.2 Security Objectives for the IT Environment The IT security objectives for the IT environment are addressed below: OE.TIME The TOE operating environment shall provide an accurate timestamp (via reliable NTP server). 4.3 Security Objectives for the Non-IT Environment The non-it security objectives listed below are to be satisfied without imposing technical requirements on the TOE. Thus, they will be satisfied through application of procedural or administrative measures. ON.PERSONNEL Authorized administrators are non-hostile and follow all administrator guidance and must ensure that the TOE is delivered, installed, managed, and operated in a manner that maintains the TOE security objectives. Any administrator of the TOE must be trusted not to disclose their Document Version 1.6 Symantec Corporation Page 18 of 55
19 authentication credentials to any individual not authorized for access to the TOE. ON.PHYSEC The facility surrounding the processing platform in which the TOE resides must provide a controlled means of access into the facility. Document Version 1.6 Symantec Corporation Page 19 of 55
20 5 IT Security Requirements The security requirements that are levied on the TOE and the IT environment are specified in this section of the ST. The functional security requirements for this Security Target consist of the following components from Part 2 of the CC, and those that were explicitly stated, all of which are summarized in the following table. These security requirements are defined in Sections CLASS HEADING CLASS_FAMILY DESCRIPTION Security Audit User Data Protection Identification and Authentication Security Management Protection of the TSF FAU_ARP.1 FAU_GEN.1 FAU_SAA.1 FAU_SAR.1 FDP_ACC.1 FDP_ACF.1 FDP_IFC.1 FDP_IFF.1 FDP_ITC.1 FIA_UAU.2 FIA_UID.2 FMT_MSA.1(1) FMT_MSA.1(2) FMT_MSA.3(1) FMT_MSA.3(2) FMT_SMF.1 FMT_SMR.1 FPT_ITT.1 FPT_RVM.1 FPT_SEP.1 Security Alarms Audit Data Generation Potential Violation Analysis Audit Review Subset Access Control Security Attribute Based Access Control Subset Information Flow Control Simple Security Attributes Import of User Data Without Security Attributes User Authentication before Any Action User Identification before Any Action Management of Security Attributes Management of Security Attributes Static Attribute Initialization Static Attribute Initialization Specification of Management Functions Security Roles Basic Internal TSF Data Transfer Protection Non-bypassability of the TSP TSF Domain Separation Table 5 TOE Security Functional Requirements 5.1 TOE Security Functional Requirements The SFRs defined in this section are derived from Part 2 of the CC. Document Version 1.6 Symantec Corporation Page 20 of 55
21 5.1.1 Security Audit (FAU) FAU_ARP.1 Security Alarms FAU_ARP.1.1 The TSF shall take [action to notify the administrator s designated personnel via and generate an audit record] upon detection of a potential security violation FAU_GEN.1 Audit Data Generation FAU_GEN.1.1 The TSF shall be able to generate an audit record of the following auditable events: a) Start-up and shutdown of the audit functions; b) All auditable events for the not specified level of audit; and c) [Startup and shutdown of TOE services d) System Status including Whether anti-virus or anti-spam filtering is enabled or disabled Whether Servers are accessible Whether the filters are current Quarantine disk space usage e) Reports listed in Table 8 Available Spam and Virus Reports ] FAU_GEN.1.2 The TSF shall record within each audit record at last the following information: a) Date and time of the event, type of event, subject identity, and the outcome (success or failure) of the event; and b) For each audit event type, based on the auditable event definitions of the functional components included in the PP/ST, [no other information] FAU_SAA.1 Potential Violation Analysis FAU_SAA.1.1 FAU_SAA.1.2 The TSF shall be able to apply a set of rules in monitoring the audited events and based upon these rules indicate a potential violation of the TSP. The TSF shall enforce the following rules for monitoring audited events: a) Accumulation or combination of [detection of information process flow policy violation] known to indicate a potential security violation; b) [No additional rules]. Document Version 1.6 Symantec Corporation Page 21 of 55
22 FAU_SAR.1 Audit Review FAU_SAR.1.1 FAU_SAR.1.2 The TSF shall provide [an authorized administrator] with the capability to read [all audit data generated within the TOE] from the audit records. The TSF shall provide the audit records in a manner suitable for the user to interpret the information User Data Protection (FDP) FDP_ACC.1 Subset Access Control FDP_ACC.1.1 The TSF shall enforce the [Administrative Access Control SFP] on [ Subjects: All users Objects: System reports, component audit logs, Scanner/Controller configurations, operator account attributes Operations: all user actions] FDP_ACF.1 Security Attribute Based Access Control FDP_ACF.1.1 The TSF shall enforce the [Administrative Access Control SFP] to objects based on the following: [ Subjects: All users Objects: System reports, component audit logs, Scanner/Controller configurations, operator account attributes Operations: all user actions] FDP_ACF.1.2 The TSF shall enforce the following rules to determine if an operation among controlled subjects and controlled objects is allowed: [See Table 6 Management Actions and Available Services]. MANAGEMENT ACTIONS Full Administrative Privileges Manage Quarantine AVAILABLE SERVICES Access to the Policies Tab Access to the Status Tab Access to the Reports Tab Access to the Compliance Tab Access to the Quarantine Tab Access to the Administration Tab Access to all links on the Settings Tab Access to the Quarantine Tab Access to the Administration Tab with the following links only Administrators Document Version 1.6 Symantec Corporation Page 22 of 55
23 MANAGEMENT ACTIONS AVAILABLE SERVICES Access to the Settings Tab with the following links only: LDAP Quarantine Manage Status and Logs Access to the Status Tab Access to the Administration Tab with the following links only Administrators Access to the Settings Tab with the following links only: Hosts Logs LDAP Manage Reports Access to the Reports Tab Access to the Administration Tab with the following links only Administrators Access to the Settings Tab with the following links only: Reports Manage Group Policies Access to the Policies Tab Access to the Administration Tab with the following links only Administrators Table 6 Management Actions and Available Services FDP_ACF.1.3 FDP_ACF.1.4 The TSF shall explicitly authorize access of subjects to objects based on the following additional rules: [no additional rules]. The TSF shall explicitly deny access of subjects to objects based on the [no additional explicit denial rules] FDP_IFC.1 Subset Information Flow Control FDP_IFC.1.1 The TSF shall enforce the [SMTP Information Flow Control SFP] on [ Subjects: External IT entities attempting to send SMTP traffic through the TOE Information: Mail messages to the internal network Operations: Deliver, Delete, Quarantine, Forward] Document Version 1.6 Symantec Corporation Page 23 of 55
24 FDP_IFF.1 Simple Security Attributes FDP_IFF.1.1 The TSF shall enforce the [SMTP Information Flow Control SFP] based on the following types of subject and information security attributes: [ Subject Security Attributes: IP Address, Allowed Senders List, Blocked Senders List Information Security Attributes: Message structure type (i.e., virus, spam, mass-mailing worm)] FDP_IFF.1.2 The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules hold: [Monitoring option is enabled for the service and information structure type and: ]. 1. No malicious code is detected 2. Malicious code is detected and the following actions are configured: a. See Table 10 Handling Verdicts and Available Actions FDP_IFF.1.3 FDP_IFF.1.4 FDP_IFF.1.5 FDP_IFF.1.6 The TSF shall enforce the [no additional information flow control SFP rules]. The TSF shall provide the following [no additional SFP capabilities]. The TSF shall explicitly authorize an information flow based on the following rules: [no explicit authorization rules]. The TSF shall explicitly deny an information flow based on the following rules: [no explicit denial rules] FDP_ITC.1 Import of User Data Without Security Attributes FDP_ITC.1.1 FDP_ITC.1.2 FDP_ITC.1.3 The TSF shall enforce the [SMTP Information Flow Control SFP] when importing user data, controlled under the SFP, from outside the TSC. The TSF shall ignore any security attributes associated with the user data when imported from outside the TSC. The TSF shall enforce the following rules when importing user data controlled under the SFP from outside the TSC: [no additional importation control rules] Identification and Authentication (FIA) FIA_UAU.2 User Authentication before Any Action FIA_UAU.2.1 The TSF shall require each user to be successfully authenticated before allowing any other TSF-mediated actions on behalf of that user. Document Version 1.6 Symantec Corporation Page 24 of 55
25 FIA_UID.2 User Identification before Any Action FIA_UID.2.1 The TSF shall require each user to identify itself before allowing any other TSF-mediated actions on behalf of that user Security Management (FMT) FMT_MSA.1(1) Management of security attributes FMT_MSA.1.1 The TSF shall enforce the [SMTP Information Flow Control SFP] to restrict the ability to modify, delete, and [filter] the security attributes [TSF data] to [Administrator] FMT_MSA.1(2) Management of security attributes FMT_MSA.1.1 The TSF shall enforce the [Administrative Access Control SFP] to restrict the ability to modify and delete the security attributes [Administrator accounts, Limited Administrator accounts, privileges for Limited Administrators] to [Administrator] FMT_MSA.3(1) Static Attribute Initialization FMT_MSA.3.1 FMT_MSA.3.2 The TSF shall enforce the [SMTP Information Flow Control SFP] to provide restrictive default values for security attributes that are used to enforce the SFP. The TSF shall allow the [Administrator] to specify alternative initial values to override the default values when an object or information is created FMT_MSA.3(2) Static Attribute Initialization FMT_MSA.3.1 FMT_MSA.3.2 The TSF shall enforce the [Administrative Access Control SFP] to provide restrictive default values for security attributes that are used to enforce the SFP. The TSF shall allow the [Administrator] to specify alternative initial values to override the default values when an object or information is created FMT_SMF.1 Specification of Management Functions FMT_SMF.1.1 The TSF shall be capable of performing the following security management functions: [Create user accounts Modify user accounts Define privilege levels Export syslog data to external syslog server Document Version 1.6 Symantec Corporation Page 25 of 55
26 Backup or restore configurations via FTP Determine the behavior of the SMTP Information Flow Control SFP Modify the behavior of the SMTP Information Flow Control SFP] FMT_SMR.1 Security Roles FMT_SMR.1.1 FMT_SMR.1.2 The TSF shall maintain the roles [Administrator, Limited Administrator]. The TSF shall be able to associate users with roles Protection of the TSF (FPT) FPT_ITT.1 Basic Internal TSF Data Transfer Protection FPT_ITT.1.1 The TSF shall protect TSF data from disclosure when it is transmitted between separate parts of the TOE FPT_RVM.1 Non-bypassability of the TSP FPT_RVM.1.1 The TSF shall ensure that TSP enforcement functions are invoked and succeed before each function within the TSC is allowed to proceed FPT_SEP.1 TSF domain separation FPT_SEP.1.1 FPT_SEP.1.2 The TSF shall maintain a security domain for its own execution that protects it from interference and tampering by untrusted subjects. The TSF shall enforce separation between the security domains of subjects in the TSC. 5.2 Security Functional Requirements for the IT Environment Protection of the TSF (FPT) FPT_STM.1 Reliable time stamps FPT_STM.1.1 The TSF IT Environment shall be able to provide reliable time stamps for its own the TOE s use. 5.3 Security Requirements for the Non-IT Environment There are no security requirements for the non-it environment. Document Version 1.6 Symantec Corporation Page 26 of 55
27 5.4 TOE Security Assurance Requirements The assurance security requirements for this Security Target are taken from Part 3 of the CC. These assurance requirements compose an Evaluation Assurance Level 2 (EAL2). The assurance components are summarized in the following table: ASSURANCE CLASS ASSURANCE COMPONENTS Configuration Management ACM_CAP.2 Configuration items Delivery and Operation Development Guidance Documents Tests Vulnerability assessment ADO_DEL.1 ADO_IGS.1 ADV_FSP.1 ADV_HLD.1 ADV_RCR.1 AGD_ADM.1 AGD_USR.1 ATE_COV.1 ATE_FUN.1 ATE_IND.2 AVA_SOF.1 AVA_VLA.1 Delivery procedures Installation, generation, and start-up procedures Informal functional specification Descriptive high-level design Informal correspondence demonstration Administrator guidance User guidance Evidence of coverage Functional testing Independent testing - sample Strength of TOE security function evaluation Developer vulnerability analysis Table 7 Security Assurance Requirements at EAL2 Document Version 1.6 Symantec Corporation Page 27 of 55
28 6 TOE Summary Specification This section presents the Security Functions implemented by the TOE and the Assurance Measures applied to ensure their correct implementation. 6.1 TOE Security Functions The security functions described in the following subsections fulfill the security requirements that are defined in Section 5.1 TOE Security Functional Requirements. The security functions performed by the TOE are as follows: Security Audit Identification and Authentication User Data Protection Security Management TSF Protection Security Audit The TOE provides Spam Reports and Virus reports to provide the Administrator with insight on the filtering activity. Additionally, the TOE supports the provision of log data from each system component and supports the ability to notify an Administrator when a specific event is triggered Event-Based Reporting The TOE generates audit data for various events, and this audit data is aggregated into a series of pre-defined reports. The Administrator can query the following reports: REPORT TYPE DATA DISPLAYED REQUIRED REPORT DATA STORAGE OPTIONS (REPORTS SETTINGS PAGE) Mail Summary A summary of total mail. None. SPAM REPORTS Detection Top Sender Domains Top Senders A summary of total detected messages (spam, blocked, allowed and suspected spam messages). Also reports false positives. The domain names of the senders of detected messages. The addresses of the top senders of filtered messages. None Sender domains Senders Specific Senders Detected messages filtered by specific Senders Document Version 1.6 Symantec Corporation Page 28 of 55
29 REPORT TYPE senders. DATA DISPLAYED REQUIRED REPORT DATA STORAGE OPTIONS (REPORTS SETTINGS PAGE) Top Sender HELO Domains* Top Sender IP Connections* Top Recipients Domains Specific Recipients Top Recipients VIRUS REPORTS Domain names of the SMTP HELO servers from which messages have been received. The top IP connections from which spam has been received. The domain names of the recipients of detected messages. The filtering activity for specific addresses. The addresses of the top recipients of detected messages. Sender HELO domains Senders Recipient Domains Recipients Recipients Detection A summary of total viruses and worms None Top Sender Domains Top Senders Specific Senders Top Sender HELO Domains* Top Sender IP Connections* Top Recipients Domains Specific Recipients Top Recipients The domain names of the senders of viruses and worms. The addresses of the top senders of viruses and worms. Number of viruses and worms by specified senders Domain names of the SMTP HELO servers from which viruses and worms have been received. The top IP connections from which viruses and worms have been received The domain names of the recipients of viruses and worms. The filtering activity for specific addresses. The addresses of the top recipients of viruses and worms. Senders Sender domains Senders Sender domains Senders Sender domains Sender HELO domains Senders Sender domains Recipient Domains Recipients Recipients Table 8 Available Spam and Virus Reports * If running any Scanners in internal relay configurations, the SMTP HELO name or IP connection address could be the name or connection of the gateway machine, rather than the Internet address that might be expected. The Administrator can filter reports via the following parameters: Time Range Document Version 1.6 Symantec Corporation Page 29 of 55
30 o o Preset Range (i.e., Past Hour, Past Day, Past Week, and Past Month) Customized range (i.e., Administrator enters Start and End Dates) Grouping (i.e., by Hour, Day, Week, or Month) The TOE also supports robust system logging capability, including the following: System Status Summary o o o View at a glance how Symantec Anti-Spam is performing. View the graphs for recent spam and virus filtering statistics. View summary status about filters and enabled components. System Status o o o o Whether anti-virus or anti-spam filtering is enabled or disabled Whether Servers are accessible Whether filters are current Quarantine disk space usage Component Logging Each component of the TOE processes logging data 3, and the Administrator can designate the severity of errors to be written to the log files. The TOE provides five logging levels, with each successive level including all errors from the previous levels: Errors Warnings (the default) Notices Information Debug Alerts and Notifications The TOE can be configured to automatically send alerts to Administrators when certain operating conditions arise. The conditions that generate alerts are the following: 3 Logs can be viewed via the Web Interface available to the Administrator or via Syslog messages Document Version 1.6 Symantec Corporation Page 30 of 55
31 Send From ALERT SETTING System detected n viruses in the past interval Spam filters are older than Virus filters are older than New virus filters are available A message queue is larger than Available Spam Quarantine is less than Available Content Compliance Folder is less than LDAP Synchronization errors LDAP scanner replication errors Symantec Premium Content Control license expired Symantec Antivirus license expired Symantec Antispam license expired Software Updates license expired SSL/TLS certificate expiration warning New software release update available A component is not responding or working Hardware failures Service start after improper shutdown EXPLAINATION The address that will appear in the notification's From: header. An alert is sent because the system detects that the number of virus outbreaks occurring over a certain time period exceeds a set limit. An alert is sent because of the age of the spam filters. Spam filters update periodically, at different intervals for different types of filters. An alert is sent because of the age of the virus filters. Virus filter updates typically occur several times a week. An alert is sent because new virus rules are available for download from Symantec Security Response. New virus rules are updated daily, and Rapid Response rules are updated hourly. An alert is sent when the size of a message queue exceeds the size specified next to the alert description. Message queues include Inbound, Outbound and Delivery. Queues can grow if the MTA has stopped, or if an undeliverable message is blocking a queue. An alert is sent when the size of the Quarantine exceeds a certain number. An alert is sent when the size of the Content Compliance Folder exceeds a certain number. An alert is sent because of LDAP synchronization errors. These errors are caused by problems in directory synchronization. Only messages that log at the error level cause alerts. An alert is sent because of replication errors. These errors are caused by problems in the replication of LDAP data from the Control Center to attached and enabled Scanners. Only messages that log at the error level cause alerts. An alert is sent when the PCC license is approaching expiration. Another alert is sent when the license expires. An alert is sent when the antivirus license is approaching expiration. Another alert is sent when the license expires. An alert is sent when the antispam license is approaching expiration. Another alert is sent when the license expires. An alert is sent when the software update license is approaching expiration. Another alert is sent when the license expires. An alert is sent when a certificate expires. The first expiration warning is sent seven days prior to the expiration date. A second warning is sent one hour later. No more than two warnings per certificate are sent. An alert is sent when a new software update release is available An alert is sent because of a non-responsive component. Relevant components include the Conduit, Filtering Hub, MTA, and LiveUpdate. An alert is sent due to fan or disk failure. An alert is sent because a service restarted after an improper shutdown. Document Version 1.6 Symantec Corporation Page 31 of 55
32 ALERT SETTING Service shutdown Service start UPS status EXPLAINATION An alert is sent because a service was shut down normally. An alert is sent because a service was started. Selecting the UPS status check box on the Alert Settings page generates a device alert that indicates the uninterruptible power supply status has changed. This alert can be potentially generated every 7 minutes. Table 9 Alert Settings and Descriptions The Security Audit function is designed to satisfy the following security functional requirements: FAU_ARP.1 FAU_GEN.1 FAU_SAA.1 FAU_SAR.1 FPT_STM User Data Protection Information Process Flow The spam detection, virus detection, monitoring, and managing capabilities of the TOE ensure that the information received by the network is free of potential risks. The TOE implements a policy for SMTP information flow control to enforce actions upon detection of undesired messages, which may be spam or which may contain viruses. This policy is configured by the Administrator and supported by mechanisms within the TOE to identify such undesired messages. Upon detection of such messages, the TOE will either delete them or move them to the Quarantine component for further review. Additionally, the TOE will notify an Administrator when certain events occur. The following table maps the available actions 4 to the handling verdicts: VERDICT ACTION DESCRIPTION Directory Harvest Attack Virus Attack Virus Spam, Suspected Spam Content Compliance 4 Additional notes on filtering actions apply, including the capability to perform multiple actions for particular verdicts. For more details, please review the Symantec Mail Security Appliance Administration Guide. Document Version 1.6 Symantec Corporation Page 32 of 55
33 Add a Header Add annotation Add BCC recipients Archive the message Clean the message Create an incident Add an X-header to the message. Insert predefined text into the message (a disclaimer, for example). Blind carbon copy the message to the designated SMTP address(es). Deliver the original message and forward a copy to the designated SMTP address, and, optionally, host. Delete unrepairable virus infections and repair repairable virus infections. Create a record of a compliance or regulatory violation. Defer SMTP connection Using a 4xx SMTP response code, tell the sending MTA to try again later. Delete the message Delete the message. Deliver the message normally Deliver the message to the recipient s Spam folder Deliver the message with TLS protocol Deliver the message. Viruses and massmailing worms are neither cleaned nor deleted. Deliver the message to end-user Spam folder(s). Requires use of the Symantec Spam Folder Agent for Exchange or the Symantec Spam Folder Agent for Domino. According to some regulatory requirements (HIPAA and GLBA) send an protected message containing sensitive data. Document Version 1.6 Symantec Corporation Page 33 of 55
34 Forward the message Hold message in Spam Quarantine Hold message in Suspect Virus Quarantine Modify the Subject line Forward the message to designated SMTP address(es). Send the message to the Spam Quarantine. Hold the message in the Suspect Virus Quarantine for a configured number of hours (default is six hours), then re-filter using new virus definitions, if available. Only available for the suspicious attachment verdict. Add a tag to the message's Subject: line. Reject SMTP Connection Using a 5xx SMTP response code, notify the sending MTA that the message is not accepted. Remove invalid recipients If a directory harvest attack is taking place, remove each invalid recipient rather than sending a bounce message to the sender. Route the message Send a bounce message Send notification Route the message using the designated SMTP host. Return the message to its From: address with a custom response, and deliver it to the recipient. Optionally, the original message can be included. Deliver the original message and send a predefined notification to designated SMTP address(es) with or without attaching the original message. Document Version 1.6 Symantec Corporation Page 34 of 55
35 Strip and hold in Suspect Virus Quarantine Strip Attachments Treat as blocked sender Treat as massmailing worm Treat as an allowed sender Remove all message attachments and hold the message in the Suspect Virus Quarantine for a configured number of hours (default is six hours). Then refilter, with new virus definitions, if available. Only available for the suspicious attachment verdict. Remove all message attachments. Process the message using the action(s) specified in the domain-based Blocked Senders List. Applies even if the domain-based Blocked Senders List is disabled, and applies to inbound messages only. Process the message using the action(s) specified in the associated worm policy. The message is delivered normally if the worm policy is disabled or does not apply because of message direction. Process the message using the action(s) specified in the domain-based Allowed Senders List. Applies even if the domain-based Allowed Senders List is disabled, and applies to inbound messages only. Document Version 1.6 Symantec Corporation Page 35 of 55
36 Treat as a virus Treat as spam Treat as suspected spam Process the message using the action(s) specified in the associated virus policy. The message is delivered normally if the virus policy is disabled or does not apply because of message direction. Process the message using the action(s) specified in the associated spam policy. The message is delivered normally if the spam policy is disabled or does not apply because of message direction. Process the message using the action(s) specified in the associated suspected spam policy. The message is delivered normally if the suspected spam policy is disabled or does not apply because of message direction. Table 10 Handling Verdicts and Available Actions The TOE supports the import of user data without security attributes. Imported user data includes virus definitions and spam filters that are imported from Symantec Security Response, a team of dedicated intrusion experts, security engineers, virus hunters, threat analysts, and global technical support teams that work in tandem to provide extensive coverage for enterprise businesses and consumers. User data is imported from Symantec Security Response via SSL session to the Live Update Client / Conduit in the Scanner component of the TOE Access Control The TOE provides access control functionality to prevent unauthorized users from accessing reports, component logs, or component configuration details. The Administrator can create additional administrator accounts, granting each administrator the desired level of management privileges for different components of the TOE (e.g., an Administrator might want to delegate management of Quarantine to another administrator, who will only be able to modify Quarantine settings.). When granting limited privileges, the Administrator can assign any or all of the following management actions: Manage Quarantine Manage TOE Status and Component Logs Document Version 1.6 Symantec Corporation Page 36 of 55
37 Manage Reports Manage Group Policies The User Data Protection function is designed to satisfy the following security functional requirements: FAU_ARP.1 FDP_IFC.1 FDP_IFF.1 FDP_ITC.1 FMT_MSA.1(1) FMT_MSA.3(1) Identification and Authentication The TOE enforces individual identification and authentication and provides a centralized authentication mechanism. Users with management access must successfully authenticate themselves using a unique identifier and authenticator prior to performing any actions on the TOE (whether those actions are reviewing reports/component logs, managing user accounts, or configuring TOE components). Identification and Authentication occurs via web-based management GUI interfacing with the Control Center component. The Identification and Authentication function is designed to satisfy the following security functional requirements: FIA_UAU.2 FIA_UID.2 FMT_MSA.1(2) FMT_MSA.3(2) Security Management The functionality in the TOE requires management to ensure proper configuration control. These pieces of Security Management functionality are described in the following subsections: Security Audit A TOE Administrator can view system reports and specific component logs. The Administrator can further define lifespans for the storage of reports/logs and can view, print, save, schedule, and delete them as part of the Security Audit capabilities. Document Version 1.6 Symantec Corporation Page 37 of 55
38 Information Process Flow The Administrator configures the TOE components to meet the Security Objectives. IN addition to configuring the default policies for spam and virus detection, the Administrator can customize detection filters to: Specify Allowed and Blocked senders Adjust Spam scoring Enable language identification Adjust anti-virus settings Create custom filters (e.g., by message size, specific subject, etc.) Access Control The Administrator manages the creation and enforcement of different levels of access within the TOE, and each level of access has set of services available. The Administrator can define services available to various privilege levels/roles without granting full Administrator privileges Component Services The Administrator can configure the TOE to support several services, including the Quarantine component and multiple Scanners. Typical managed services for these components include: Configuring Administrative access to Quarantine Setting the lifespan for messages in Quarantine retention Adding, testing, enabling, disabling, and deleting Scanners The Security Management function is designed to satisfy the following security functional requirements: FDP_ACC.1 FDP_ACF.1 FMT_MSA.1(1) FMT_MSA.1(2) FMT_MSA.3(1) FMT_MSA.3(2) FMT_SMF.1 FMT_SMR.1 Document Version 1.6 Symantec Corporation Page 38 of 55
39 6.1.5 TSF Protection The TOE is integrated into a network, and all SMTP traffic flowing into the network must pass through the services provided by the TOE. Only an approved, authenticated Administrator can install, configure, and modify the TOE components (and all TOE Security Functions), which provides a protected domain for the TSFs. The TOE can be implemented in a distributed manner, where one appliance running as a Control Center communicated with multiple appliances running as Scanners. In this case, communications between the Scanners and the Control center appliances are protected via SSL tunnel. The TSF protection function is designed to satisfy the following security functional requirements: FPT_ITT.1 FPT_RVM.1 FPT_SEP Security Assurance Measures This section identifies the Configuration Management, Delivery/Operation, Development, Guidance Documents, Test, and Vulnerability Assessment measures applied to satisfy CC assurance requirements. Document Version 1.6 Symantec Corporation Page 39 of 55
40 SECURITY ASSURANCE REQUIREMENT ASSURANCE MEASURES DESCRIPTION ACM_CAP.2 CM_DOC Configuration items: The implementation and documentation of procedures for the development of the TOE, including a configuration list of uniquely identified items. Evidence Title: Configuration Management Processes and Procedures: Symantec Mail Security 8300 Series Appliances Version 5.0 ADO_DEL.1 DEL_DOC Delivery procedures: The implementation and documentation of procedures for delivering the TOE to a customer in a secure manner. Evidence Title: Secure Delivery Processes and Procedures: Symantec Mail Security 8300 Series Appliances Version 5.0 ADO_IGS.1 IGS_DOC Installation, generation, and start-up procedures: Documentation provided to the end users instructing the end users how to install and configure the TOE in a secure manner. Evidence Titles: Symantec Mail Security Appliance Installation Guide Administrative Guidance and Installation, Generation, and Startup Procedures: Symantec Mail Security 8300 Series Appliances Version 5.0 ADV_FSP.1 FUN_SPEC Informal functional specification: Functional Specification for the TOE describing the TSF and the TOE s external interfaces. Evidence Title: Functional Specification: Symantec Mail Security 8300 Series Appliances Version 5.0 ADV_HLD.1 HLD_DOC Descriptive high-level design: System Design for the TOE providing descriptions of the TSF structure in the form of subsystems and the functionality of each subsystem. Evidence Title: High Level Design and Representation Correspondence Analysis: Symantec Mail Security 8300 Series Appliances Version 5.0 ADV_RCR.1 RCR_DOC Informal correspondence demonstration: The documentation of the correspondence between the TSS, Document Version 1.6 Symantec Corporation Page 40 of 55
41 FSP and HLD in specifically provided deliverables. Evidence Title: High Level Design and Representation Correspondence Analysis: Symantec Mail Security 8300 Series Appliances Version 5.0 AGD_ADM.1 ADMIN_GUIDE Administrator guidance: Documentation provided to the customers instructing the customer how to configure the TOE in a secure manner. Evidence Title: Symantec Mail Security Appliance Administration Guide Administrative Guidance and Installation, Generation, and Startup Procedures: Symantec Mail Security 8300 Series Appliances Version 5.0 AGD_USR.1 USER_GUIDE User guidance: Documentation provided to the customers instructing the users how to use the TOE. Evidence Title: Administrative Guidance and Installation, Generation, and Startup Procedures: Symantec Mail Security 8300 Series Appliances Version 5.0 ATE_COV.1 TEST_COV Evidence of coverage: Documented correspondence between the security functions and tests. Evidence Title: Test Plan and Coverage Analysis: Symantec Mail Security 8300 Series Appliances Version 5.0 ATE_FUN.1 TEST_DOC Functional testing: The implementation and documentation of the test procedures including expected and actual results. Evidence Title: Test Plan and Coverage Analysis: Symantec Mail Security 8300 Series Appliances Version 5.0 AVA_SOF.1 SOF_DOC Strength of TOE security function evaluation: The documentation for the Strength of Function Assessment. Evidence Title: Security Target for Common Criteria Evaluation: Symantec Mail Security 8300 Series Appliances Version 5.0 AVA_VLA.1 VLA_DOC Developer vulnerability analysis: Vulnerability Assessment of the TOE and its deliverables is performed and documented to ensure that identified security flaws are Document Version 1.6 Symantec Corporation Page 41 of 55
42 Table 11 Assurance Measures (EAL2) countered. Evidence Title: Security Target for Common Criteria Evaluation: Symantec Mail Security 8300 Series Appliances Version 5.0 Document Version 1.6 Symantec Corporation Page 42 of 55
43 7 Protection Profile Claims This Security Target does not claim conformance to any Protection Profiles. Document Version 1.6 Symantec Corporation Page 43 of 55
44 8 Rationale 8.1 Rationale for Security Objectives of the TOE, IT Environment, and Non-IT Environment Summary Mapping of Security Objectives This section provides the summary that all security objectives are traced back to aspects of the addressed assumptions, threats, and Organizational Security Policies. OBJECTIVE THREATS/ ASSUMPTIONS O.AUDIT O.DETECT O.QUARANTINE O.SEC_ACCESS O.TOE_PROTECT OE.TIME ON.PERSONNEL ON.PHYSEC ASSUMPTIONS A.MANAGE A.NOEVIL A.LOCATE A.CONFIG A.TIMESOURCE THREATS T.ATTACK T.FALSEPOS T.NOAUTH T.NOPRIV OSPs P.INCOMING Table 12 Mapping of Assumptions, Threats, and OSPs to Security Objectives Rationale for Security Objectives of the TOE A.MANAGE This assumption is addressed by O.SEC_ACCESS, which ensures that the TOE allows access to the security functions, configuration, and associated data only by authorized users and applications. Document Version 1.6 Symantec Corporation Page 44 of 55
45 A.CONFIG T.ATTACK This assumption is addressed by O.DETECT, which ensures that the TOE will correctly detect s classified as spam or containing viruses. This threat is countered by the following: O.AUDIT, which ensures that the TOE monitors SMTP network traffic to allow the administrator to query detailed reports information (including spam and virus messages detected/filtered) and O.DETECT, which ensures that the TOE will correctly detect s classified as spam or containing viruses. T.FALSEPOS This threat is countered by the following: O.DETECT, which ensures that the TOE will correctly detect s classified as spam or containing viruses and O.QUARANTINE, which ensures that the TOE establishes a special area (known as a Quarantine area) for user review of messages flagged as spam or containing viruses. T.NOAUTH This threat is countered by the following: O.SEC_ACCESS, which ensures that the TOE allows access to the security functions, configuration, and associated data only by authorized users and applications and O.TOE_PROTECT, which provides mechanisms to isolate the TOE Security Functions (TSF) and assure that TSF components cannot be tampered with or bypassed. T.NOPRIV P.INCOMING This threat is countered by O.SEC_ACCESS, which ensures that the TOE allows access to the security functions, configuration, and associated data only by authorized users and applications. This organizational security policy is enforced by the following: O.AUDIT, which ensures that the TOE monitors SMTP network traffic to allow the administrator to query detailed reports information (including spam and virus messages detected/filtered) and O.DETECT, which ensures that the TOE will correctly detect s classified as spam or containing viruses Document Version 1.6 Symantec Corporation Page 45 of 55
46 8.1.3 Rationale for Security Objectives of the IT Environment The IT security objectives for the IT environment are addressed below: A.TIMESOURCE P.INCOMING This assumption is addressed by OE.TIME, which ensures the provision of an accurate time source. OE.TIME provides support for enforcement of this policy by ensuring the provision of an accurate time source Rationale for Security Objectives of the Non-IT Environment The non-it security objectives listed below are to be satisfied without imposing technical requirements on the TOE. Thus, they will be satisfied through application of procedural or administrative measures. A.MANAGE A.NOEVIL A.CONFIG A.LOCATE T.NOAUTH This assumption is addressed by ON.PERSONNEL, which ensures that the TOE is managed and administered by in a secure manner by a competent and security aware personnel in accordance with the administrator documentation. This objective also ensures that those responsible for the TOE install, manage, and operate the TOE in a secure manner. This assumption is addressed by ON.PERSONNEL, which ensures that the TOE is managed and administered by in a secure manner by a competent and security aware personnel in accordance with the administrator documentation. This objective also ensures that those responsible for the TOE install, manage, and operate the TOE in a secure manner. This assumption is addressed by ON.PERSONNEL, which ensures that the TOE is managed and administered by in a secure manner by a competent and security aware personnel in accordance with the administrator documentation. This objective also ensures that those responsible for the TOE install, manage, and operate the TOE in a secure manner. This assumption is addressed by ON.PHYSEC, which ensures that the TOE is operated in an environment that will protect it from unauthorized access and physical threats and attacks that can disturb and corrupt the information generated. This threat is countered by the following: ON.PERSONNEL, which ensures that the TOE is managed and administered by in a secure manner by a competent and security Document Version 1.6 Symantec Corporation Page 46 of 55
47 aware personnel in accordance with the administrator documentation. This objective also ensures that those responsible for the TOE install, manage, and operate the TOE in a secure manner. ON.PHYSEC, which ensures that the TOE is operated in an environment that will protect it from unauthorized access and physical threats and attacks that can disturb and corrupt the information generated. P.INCOMING ON.PERSONNEL provides support for the enforcement of this policy by ensuring that the TOE is managed and administered by in a secure manner by a competent and security aware personnel in accordance with the administrator documentation. This objective also ensures that those responsible for the TOE install, manage, and operate the TOE in a secure manner. 8.2 Security Requirements Rationale Summary of TOE Security Requirements The following table provides the correspondence mapping between security objectives for the TOE and the requirements that satisfy them. OBJECTIVE SFR O.AUDIT O.DETECT O.QUARANTINE O.SEC_ACCESS O.TOE_PROTECT OE.TIME FAU_ARP.1 FAU_GEN.1 FAU_SAA.1 FAU_SAR.1 FDP_ACC.1 FDP_ACF.1 FDP_IFC.1 FDP_IFF.1 Document Version 1.6 Symantec Corporation Page 47 of 55
48 OBJECTIVE SFR O.AUDIT O.DETECT O.QUARANTINE O.SEC_ACCESS O.TOE_PROTECT OE.TIME FDP_ITC.1 FIA_UAU.2 FIA_UID.2 FMT_MSA.1(1) FMT_MSA.1(2) FMT_MSA.3(1) FMT_MSA.3(2) FMT_SMF.1 FMT_SMR.1 FPT_ITT.1 FPT_RVM.1 FPT_SEP.1 FPT_STM.1 Table 13 Mapping of TOE Security Functional Requirements and Objectives Sufficiency of Security Requirements This section confirms that the security requirements are sufficient to satisfy the TOE security objectives, whether in a principal or supporting role. OBJECTIVE O.AUDIT ARGUMENT TO SUPPORT SUFFICIENCY OF SECURITY REQUIREMENTS The objective to ensure that the TOE monitors SMTP network traffic to allow the administrator to query detailed reports information (including spam and virus messages detected/filtered) is met by the following security requirements: FAU_ARP.1 provides a notification capability, which is utility to keep the administrator updated on SFP violations. FAU_GEN.1, FAU_SAA.1, and FAU_SAR.1 defines the auditing capability for SMTP information flow and administrative access control and requires that authorized users will have the capability to read and interpret data stored in the audit logs FIA_UAU.2 and FIA_UID.2 require the TOE to enforce identification and Document Version 1.6 Symantec Corporation Page 48 of 55
49 OBJECTIVE ARGUMENT TO SUPPORT SUFFICIENCY OF SECURITY REQUIREMENTS authentication of all users FMT_SMF.1 supports the security management functions relevant to the TOE, including the configuration of SMTP information flow control and user monitoring parameters FPT_STM.1 requires the provision of reliable time stamps that can be associated with security-relevant events O.DETECT The objective to ensure that the TOE will correctly detect s classified as spam or containing viruses is met by the following security requirements: FDP_IFC.1, FDP_IFF.1 defines the SFP that ensures that all inbound information is analyzed for SFP violations and that appropriate action is taken. FDP_ITC.1 allows the import of user data from outside the TSC (such as spam filters and virus definitions from Symantec Security Response) to help ensure the latest threats are detected. FMT_MSA.1(1) restricts the ability to modify, delete, or filter incoming SMTP traffic to an authorized administrator FMT_MSA.3(1) ensures that the default values of security attributes are restrictive in nature and enforce specification of initial configuration parameters to the Administrator FMT_SMF.1 and FMT_SMR.1 support the security functions relevant to the TOE and ensure the definition of an authorized administrator role FPT_RVM.1 ensures that the TOE is not bypassed (all SMTP information flows through the TOE) FPT_SEP.1 ensures that the a separate execution domain is maintained by the TOE to avoid intentional (or otherwise) tampering with the TOE security functions and configuration data by un-trusted agents O.QUARANTINE The objective to ensure that the TOE establishes a special area for user review of messages flagged as spam or containing viruses is met by the following security requirements: FDP_IFC.1, FDP_IFF.1 defines the SFP that ensures that all inbound information is analyzed for SFP violations and that appropriate action is taken. O.SEC_ACCESS This objective ensures that the TOE allows access to the security functions, configuration, and associated data only by authorized users and applications. FDP_ACC.1 requires that all user actions resulting in the access to TOE security functions and configuration data are controlled FDP_ACF.1 supports FDP_ACC.1 by ensuring that access to TOE security functions, configuration data, audit logs, and account attributes is based on the user privilege level and their allowable actions FIA_UAU.2 and FIA_UID.2 require the TOE to enforce identification and authentication of all users prior to configuration of the TOE FMT_MSA.1(2) specifies that only privileged administrators can access the TOE security functions and related configuration data Document Version 1.6 Symantec Corporation Page 49 of 55
50 OBJECTIVE ARGUMENT TO SUPPORT SUFFICIENCY OF SECURITY REQUIREMENTS FMT_MSA.3(2) ensures that the default values of security attributes are restrictive in nature as to enforce the access control policy for the TOE FPT_SEP.1 ensures that a separate execution domain is maintained by the TOE to help prevent unauthorized access to the TOE O.TOE_PROTECT The objective to ensure that the TOE provides mechanisms to isolate the TOE Security Functions (TSF) and assures that TSF components cannot be tampered with or bypassed is met by the following: FPT_ITT.1 ensures that communications between TOE components in a distributed environment are protected via SSL tunnel. FPT_SEP.1 ensures that the TOE is protected from untrusted processes that could attempt to tamper with or bypass the TOE. OE.TIME The objective to ensure that the TOE operating environment provides an accurate timestamp is met by the following: FPT_STM.1 requires the provision of reliable time stamps that can be associated with security-relevant events ON.PERSONNEL The objective to ensure that authorized administrators are non-hostile and follow all administrator guidance and that the TOE is delivered, installed, managed, and operated in a secure manner is met by the following: A.MANAGE assumes Administrators of the TOE are appropriately trained to undertake the installation, configuration and management of the TOE in a secure and trusted manner. A.NOEVIL assumes the Administrator is not careless, willfully negligent, nor hostile, and will follow and abide by the instructions provided by the TOE documentation. A.LOCATE assumes the processing platform on which the TOE resides is assumed to be located within a facility that provides controlled access. ON.PHYSEC The objective to ensure that the facility surrounding the processing platform in which the TOE resides provides a controlled means of access into the facility is met by the following: A.LOCATE assumes the processing platform on which the TOE resides is assumed to be located within a facility that provides controlled access. Table 14 Sufficiency of Security Requirements 8.3 TOE Summary Specification Rationale The following table provides a mapping of Security Functional Requirements to IT Security Functions: Document Version 1.6 Symantec Corporation Page 50 of 55
51 SFR IT SECURITY FUNCTION SECURITY AUDIT IDENTIFICATION AND AUTHENTICATION USER DATA PROTECTION SECURITY MANAGEMENT TSF PROTECTION FAU_ARP.1 FAU_GEN.1 FAU_SAA.1 FAU_SAR.1 FDP_ACC.1 FDP_ACF.1 FDP_IFC.1 FDP_IFF.1 FDP_ITC.1 FIA_UAU.2 FIA_UID.2 FMT_MSA.1(1) FMT_MSA.1(2) FMT_MSA.3(1) FMT_MSA.3(2) FMT_SMF.1 FMT_SMR.1 FPT_ITT.1 FPT_RVM.1 FPT_SEP.1 FPT_STM.1 Table 15 Mapping of Security Functional Requirements to IT Security Functions Sufficiency of IT Security Functions This section provides appropriate justification that the IT Security Functions are suitable to meet the TOE Security Functional Requirement and that when implemented, contributes to meeting that requirement. Document Version 1.6 Symantec Corporation Page 51 of 55
52 SFR FAU_ARP.1 FAU_GEN.1 FAU_SAA.1 FAU_SAR.1 FDP_ACC.1 FDP_ACF.1 FDP_IFC.1 FDP_IFF.1 FDP_ITC.1 FIA_UAU.2 FIA_UID.2 FMT_MSA.1(1) FMT_MSA.1(2) FMT_MSA.3(1) RATIONALE TO SUPPORT SUFFICIENCY OF SECURITY FUNCTION This TOE SFR is satisfied by the Security Audit functions and the User Data Protection functions. The TOE provides a method of alerting the select personnel of the occurrence of the policy violation and the actions taken. It then records the incident in an audit log. The notification is triggered by the user protection function that invokes the information process flow policy. This TOE SFR is satisfied by the Security Audit function, which generates audit logs from the audit of a variety of security events. This TOE SFR is satisfied by the Security Audit function, which provides the authorized administrator with the ability to review the number of violation occurrences via reviews of audit logs. The log viewing utility provides the total number of violations per service type and per date. This TOE SFR is satisfied by the Security Audit function by enabling only authorized users to review and query the audit logs based on the certain criteria. This TOE SFR is satisfied by the Security Management function, which permits each user to be assigned a privilege level and the respective privileges for that level. This TOE SFR is satisfied by the Security Management function by permitting TOE access based on the privileges assigned a specific privilege level. This TOE SFR is satisfied by the User Data Protection function, which utilizes the information process flow policy to monitor and process the information entering the system. The policy encourages the analysis of the information for potential violations and takes appropriate steps to rectify the presence of a violation, based on the administrator configuration. This TOE SFR is satisfied by the User Data Protection function, which utilizes the information process flow policy to monitor and process the information entering the system. The policy encourages the analysis of the information for potential violations and takes appropriate steps to rectify the presence of a violation, based on the administrator configuration. This TOE SFR is satisfied by the User Data Protection function, which utilizes the information process flow policy to monitor and process the information entering the system. The policy allows the import of user data from outside the TSC (in this case, spam filters and virus definitions from Symantec Security Response) to help ensure the latest threats are detected. This TOE SFR is satisfied by the Identification and Authentication security function by requiring users to successfully authenticate themselves using a unique identifier and password prior to performing any action on the TOE. This TOE SFR is satisfied by the Identification and Authentication security function by requiring users to successfully identify themselves using a unique identifier. This TOE SFR is satisfied by Security Management and User Data Protection function, which provides the TOE Administrator with full authority to configure the TOE to uphold SMTP information flow control policies. This TOE SFR is satisfied by Security Management and Identification and Authentication functions, which provides the TOE Administrator with full authority and ability to define user groups and their privileges. These security functions also provide complete control (via configuration) over the security functions of the TOE. This TOE SFR is satisfied by Security Management and User Data Protection functions, which allow the TOE Administrator to change default settings for how the Document Version 1.6 Symantec Corporation Page 52 of 55
53 SFR FMT_MSA.3(2) FMT_SMF.1 FMT_SMR.1 FPT_ITT.1 FPT_RVM.1 FPT_SEP.1 FPT_STM.1 RATIONALE TO SUPPORT SUFFICIENCY OF SECURITY FUNCTION TOE enforces the SMTP information flow controls. This TOE SFR is satisfied by Security Management and Identification and Authentication functions, which allow the TOE Administrator to change default settings for each user and privilege level. This TOE SFR is satisfied by Security Management function by providing the TOE Administrator the capability to enable, and disable the information process flow policy, select the actions that would be taken upon the violation of the policy and select the method and type of notification of violations. It provides the capability for the administrator to select the type of information structure with respect to selected services to be monitored and processed, and the ability to install and configure the TOE services to ensure that the information entering the system is subjected to the information process flow policy. The Security Management function also provides the capability to modify user accounts and privilege levels. This TOE SFR is satisfied by Security Management function, which assigns each user to the role of Administrator or Limited Administrator, the latter of which has a subset of Administrator services. These subset services are defined by the Administrator at the time the account is created. This TOE SFR is satisfied by the TSF Protection security functions by ensuring that communications between a Control Center and a Scanner in a distributed implementation are protected with SSL protocol. This TOE SFR is satisfied by the TSF Protection security functions by ensuring that all information traffic is subjected to the information process flow policy. The TOE provides protection mechanisms for its security functions, such as the restricted ability that only TOE Administrators can perform administrative actions on the TOE. This IT Environment SFR is satisfied by the TOE s connection to an NTP server to ensure that each audited event contains a date and time stamp for that event. Table 16 Sufficiency of IT Security Functions 8.4 Rationale for Explicitly Stated Security Requirements The TOE does not support any explicitly stated security requirements; therefore, this section does not apply. 8.5 Rationale for IT Security Requirement Dependencies This section of the ST demonstrates that the identified SFRs include the appropriate hierarchy and dependencies. The following table lists the TOE SFRs and the SFRs each are hierarchical to, dependent upon and any necessary rationale. SFR HIERARCHICAL TO DEPENDENCY RATIONALE FAU_ARP.1 No other components. FAU_SAA.1 Satisfied Document Version 1.6 Symantec Corporation Page 53 of 55
54 SFR HIERARCHICAL TO DEPENDENCY RATIONALE FAU_GEN.1 No other components. FPT_STM.1 Satisfied FAU_SAA.1 No other components. FAU_GEN.1 Satisfied FAU_SAR.1 No other components. FAU_GEN.1 Satisfied FDP_ACC.1 No other components. FDP_ACF.1 Satisfied FDP_ACF.1 No other components. FDP_ACC.1 Satisfied FMT_MSA.3 Satisfied by FMT_MSA.3(2) FDP_IFC.1 No other components. FDP_IFF.1 Satisfied FDP_IFF.1 No other components. FDP_IFC.1 Satisfied FMT_MSA.3 Satisfied by FMT_MSA.3(1) FDP_ITC.1 No other components FDP_IFC.1 Satisfied FMT_MSA.3 Satisfied by FMT_MSA.3(1)s FIA_UAU.2 FIA_UAU.1 FIA_UID.1 Satisfied by FIA_UID.2, which is hierarchical to FIA_UID.1 FIA_UID.2 FIA_UID.1 None Not applicable FMT_MSA.1(1) No other components. FDP_IFC.1 FMT_SMF.1 FMT_SMR.1 FMT_MSA.1(2) No other components. FDP_ACC.1 FMT_SMF.1 FMT_SMR.1 Satisfied Satisfied FMT_MSA.3(1) No other components. FMT_SMR.1 Satisfied FMT_MSA.1 Satisfied by FMT_MSA.1(1) FMT_MSA.3(2) No other components. FMT_SMR.1 Satisfied FMT_MSA.1 Satisfied by FMT_MSA.1(2) FMT_SMF.1 No other components. None Not applicable FMT_SMR.1 No other components. FIA_UID.1 Satisfied by FIA_UID.2, which is hierarchical to FIA_UID.1 FPT_ITT.1 No other components None Not applicable FPT_RVM.1 No other components. None Not applicable FPT_SEP.1 No other components. None Not applicable FPT_STM.1 No other components. None Not applicable Table 17 TOE SFR Dependency Rationale Document Version 1.6 Symantec Corporation Page 54 of 55
55 8.6 Rationale for Strength of Function Claim The TOE is targeted at a generalized IT environment with good physical access security and competent administrators. Within such environments it is assumed that attackers will have a low attack potential. As such, minimum and explicit strength of function claims is SOF-basic which is appropriate for the intended environment. Note that the only applicable mechanisms (i.e., those that are probabilistic or permutational yet not cryptographic) are related to the identification and authentication security function and specifically to the following security functional requirements: FIA_UAU.2, FIA_UID Rationale for Security Assurance The assurance documentation listed in Table 11 Assurance Measures (EAL2) meets the developer action and content and presentation of evidence elements for each assurance requirement defined in the CC. EAL2 was chosen to provide a low to moderate level of assurance that is consistent with good commercial practices. As such, minimal additional tasks are placed upon the vendor assuming the vendor follows reasonable software engineering practices and can provide support to the evaluation for design and testing efforts. The chosen assurance level is appropriate with the threats defined for the environment. While the System may monitor a hostile environment, it is expected to be in a non-hostile position and embedded in or protected by other products designed to address threats that correspond with the intended environment. At EAL2, the System will have incurred a search for obvious flaws to support its introduction into the nonhostile environment. 8.8 Protection Profile Claims Rationale This Security Target does not claim conformance to any Protection Profiles Document Version 1.6 Symantec Corporation Page 55 of 55
Security Target: Symantec Endpoint Protection Version 11.0
Security Target: Symantec Endpoint Protection Version 11.0 ST Version 1.6 June 2, 2008 Document Version 1.6 Symantec Corporation Page 1 of 68 Prepared For: Prepared By: Symantec Corporation 20330 Stevens
EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0
EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305
Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012
Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report
How To Evaluate A Security Target Of Evaluation (Toe)
Security Target McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 Document Version 1.1
Security Target. Securonix Security Intelligence Platform 4.0. Document Version 1.12. January 9, 2015
Security Target Securonix Security Intelligence Platform 4.0 Document Version 1.12 January 9, 2015 Document Version 1.12 Copyright Securonix Page 1 of 41 Prepared For: Prepared By: Securonix 5777 W. Century
Security Target. McAfee Enterprise Mobility Management 12.0. Document Version 1.16
Security Target McAfee Enterprise Mobility Management 12.0 Document Version 1.16 September 17, 2014 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 Primasec Ltd
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3)
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3) Reference: ST January 2001 Version: 1.6 Europe: USA: CISCO Systems Ltd CISCO Systems Inc. 3 The Square 170 West Tasman Drive Stockley
Security Target. Symantec TM Network Access Control Version 12.1.2. Document Version 0.12. February 14, 2013
Security Target Symantec TM Network Access Control Version 12.1.2 Document Version 0.12 February 14, 2013 Document Version 0.12 Symantec Page 1 of 39 Prepared For: Prepared By: Symantec Corporation 350
IBM WebSphere Message Broker Security Target
IBM WebSphere Message Broker Security Target Version 2.1.2 2007-08-22 Document History Version Date Summary Author 1.0 2006-10-23 Final EAL3 ST plus changes by IBM. SAIC / IBM 1.1 2006-12-11 Fixed inconsistencies.
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government
How To Protect Your Computer From Being Hacked
Senforce Endpoint Security Suite Version 3.1.175 Security Target Version 1.0 06/19/07 Prepared for: Senforce Technologies, Inc. 147 W Election Rd Ste 110 Draper UT 84020 Prepared By: Science Applications
EAL4+ Security Target
EAL4+ Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 21-DEC-10 Document management Document identification Document ID Document title Release authority E14_EAL4_ASE Microsoft
DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75
DataPower S40 ML Security Gateway and DataPower I50 Integration Appliance Version 3.6 Security Target Version 0.75 10/09/2008 Prepared for: IBM SOA Appliance Group One Rogers St Cambridge, MA 02142 Prepared
IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0
IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0 CipherTrust 4800 North Point Parkway Suite 400 Alpharetta, GA 30022 Phone: 678-969-9399
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction
Marimba Client and Server Management from BMC Software Release 6.0.3
Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...
Security Target for BorderWare Firewall Server 6.5
Security Target for BorderWare Firewall Server 6.5 Reference: ST January 2002 Version : 2.4 North America: Europe: 50 Burnhamthorpe Rd. W. 1 The Harlequin Centre Suite 502 Southall Lane Mississauga Southall
Security Target. McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5. Document Version 1.1. September 9, 2011
Security Target McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5 Document Version 1.1 September 9, 2011 Document Version 1.1 McAfee Page 1 of 61 Prepared For: Prepared By: McAfee, Inc. 2821
Top Layer Networks. Security Target V2.3
Top Layer Networks IDS Balancer TM Version 2.2 Appliance (IDSB3531-CCV1.0, IDSB3532-CCV1.0, IDSB4508-CCV1.0) Security Target V2.3 August 31, 2004 AppBalancing, AppSafe, DCFD, Flow Mirror, SecureWatch,
TRUSTED SECURITY FILTER SECURITY TARGET
TRUSTED SECURITY FILTER SECURITY TARGET Edition: 4 29 Oct 07 Previous editions: Ed. 1 11 May 2006 Ed. 2 16 Aug 2006 Ed. 3 28 June 2007 Author: KKK Appr.: PÅT All pages in this document shall have the same
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows,
Network Intrusion Prevention System Protection Profile V1.1
Network Intrusion Prevention System Protection Profile V1.1 December 21, 2005 (This page left blank on purpose for double-side printing) Protection Profile Title Network Intrusion Prevention System Protection
Mobile Billing System Security Target
Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing
Security Target. McAfee Database Security 4.4.3. Document Version 1.4. June 18, 2013. Security Target: McAfee Database Security 4.4.
Security Target McAfee Database Security 4.4.3 Document Version 1.4 June 18, 2013 Document Version 1.4 McAfee Page 1 of 66 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara,
Firewall Protection Profile V2.0 2008. 4. 24
Firewall Protection Profile V2.0 2008. 4. 24 (This page left blank on purpose for double-side printing) Protection Profile Title Firewall Protection Profile for Government Evaluation Criteria Version This
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 0.7 Prepared for: Prepared by: Enterasys Networks, Inc. Corsec Security,
Intrusion, Inc. SecureNet Pro Intrusion Detection System Version 4.1 SP1 Security Target December 20, 2002 Document No.
Intrusion, Inc. SecureNet Pro Intrusion Detection System Version 4.1 SP1 Security Target December 20, 2002 Document No. F2-1202-004 COACT, Inc. Rivers Ninety Five 9140 Guilford Road, Suite L Columbia,
Intrusion Detection System System Protection Profile
Intrusion Detection System System Protection Profile Prepared for National Security Agency 9800 Savage Road Fort Meade MD, 20755 Prepared by Science Applications International Corporation 7125 Gateway
Cisco IronPort S-Series Web Security Appliance Security Target
Cisco IronPort S-Series Web Security Appliance Security Target Version 1.0 October 12, 2009 Prepared for: Cisco IronPort Systems 1100 Grundy Lane San Bruno, CA 94066 Prepared By: Science Applications International
IBM Internet Security Systems GX6116 Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 with Reporting Module
Security Target IBM Internet Security Systems GX6116 Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 with Reporting Module Document Version 2.0 July 6, 2011 Document Version
Security Target. Symantec Data Loss Prevention 11.1.1. Document Version 1.0. January 23, 2012
Security Target Symantec Data Loss Prevention 11.1.1 Document Version 1.0 January 23, 2012 Document Version 1.0 Symantec Corporation Page 1 of 40 Prepared For: Prepared By: Symantec Corporation 350 Ellis
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING Document No. 1735-005-D0001 Version: 1.0, 3 June 2014 Prepared for: Fortinet, Incorporated 326 Moodie Drive Ottawa, Ontario Canada, K2H
Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0
Security Target NetIQ Access Manager 4.0 Document Version 1.13 August 7, 2014 Document Version 1.13 NetIQ Page 1 of 36 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite 810 Houston, TX
RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5. Security Target
RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5 Security Target Evaluation Assurance Level: EAL2 Augmented with ALC_FLR.1 Document Version: 0.7 Prepared for: Prepared by: RSA, The
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented
EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.
EMC Corporation Data Domain Operating System Version 5.2.1.0 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.11 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton,
Check Point Endpoint Security Media Encryption Security Target
Check Point Endpoint Security Media Encryption Security Target Version 1.0 June 23, 2010 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared By: Science Applications International Corporation
Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target
Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target Evaluation Assurance Level: EAL2 augmented with ALC_FLR.2 Document Version: 1 Prepared for: Prepared by: Citrix
Trust Technology Assessment Program. Validation Report
Trust Technology Assessment Program Validation Report U.S. Government Traffic Filter Firewall Protection Profile for Low-Risk Environments version 1.1 TTAP Report Number: TTAP-VR-0007 June, 1999 Mutual
Low Assurance Protection Profile for a VoIP Infrastructure
Low Assurance Protection Profile for a VoIP Infrastructure Version 1.1 Date Author(s) Dirk-Jan Out Certification ID Sponsor File name No of pages 12 TNO-ITSEF BV VoIP Low Assurance Protection Profile 1.1
Security Target. McAfee Data Loss Prevention Endpoint 9.4 and epolicy Orchestrator 5.1.3. Document Version 1.0
Security Target McAfee Data Loss Prevention Endpoint 9.4 and epolicy Orchestrator 5.1.3 Document Version 1.0 November 24, 2015 Prepared For: Prepared By: Intel Corporation. 2821 Mission College Blvd. Santa
Red Hat Enterprise Linux 3 (running on specified Dell and Hewlett-Packard hardware) Security Target
Red Hat Enterprise Linux 3 (running on specified Dell and Hewlett-Packard hardware) Security Target Version 1.7 January 2004 Document Control DOCUMENT TITLE Red Hat Enterprise Linux 3 Security Target Version
Security Target. Astaro Security Gateway V8 Packet Filter Version 1.000. Assurance Level EAL4+ Common Criteria v3.1
Astaro Security Gateway V8 Packet Filter Version 1.000 Assurance Level EAL4+ Common Criteria v3.1 This Security Target also covers the secunet wall 2 packet filter Version : 1.03 Date: 2011-05-20 Author:
U.S. Government Protection Profile for Database Management Systems
U.S. Government Protection Profile for Database Management Systems Information Assurance Directorate Version 1.3 December 24, 2010 Protection Profile Title: 1 U.S. Government Protection Profile for Database
Security Target: IBM Internet Security Systems GX Series Security Appliances Version 4.1 and SiteProtector Version 2.0 Service Pack 8.
Security Target IBM Internet Security Systems GX Series Security Appliances Version 4.1 and Document Version 0.6 February 27, 2012 Document Version 0.6 IBM Internet Security Systems Page 1 of 55 Prepared
Trustwave Secure Web Gateway Security Target
Trustwave Secure Web Gateway Security Target Version 1.5 September 18, 2013 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane
SenSage, Inc. SenSage 4.6.2. Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1.2
SenSage, Inc. SenSage 4.6.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 1.2 Prepared for: Prepared by: SenSage, Inc. 55 Hawthorne Street San Francisco, CA 94105 United States of
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Author: Microsoft Corp. Version: 1.0 Last Saved: 2011-03-10 File Name: MS_UAG_ST_1.0.docx
SECURITY TARGET CITADEL HERCULES ENTERPRISE VULNERABILITY MANAGEMENT (EVM) VERSION 4.1
SECURITY TARGET CITADEL HERCULES ENTERPRISE VULNERABILITY MANAGEMENT (EVM) VERSION 4.1 Document No. 1517-011-D001 Version 1.1, 3 August 2006 Prepared for: Citadel Security Software Inc. Two Lincoln Centre
Enterasys Dragon-EAL Intrusion Defense System. Security Target
Enterasys Dragon-EAL Intrusion Defense System Security Target Version 11 August 31, 2004 Enterasys Networks 50 Minuteman Road Andover Massachusetts 01810 www.enterasys.com Table of Contents 1. SECURITY
JMCS Northern Light Video Conferencing System Security Target
JMCS Northern Light Video Conferencing System Security Target Common Criteria: EAL2 Version 1.2 22 FEB 12 Document management Document identification Document ID Document title Product version NLVC_ST_EAL2
Low Assurance Security Target for a Cisco VoIP Telephony System
Low Assurance Security Target for a Cisco VoIP Telephony System Security Target Version 1.6 March 14, 2005 Document Control Preparation Action Name Date Prepared by: Rob Hunter of TNO-ITSEF BV on behalf
Firewall Protection Profile
samhällsskydd och beredskap 1 (38) ROS-ISÄK Ronny Janse 010-2404426 [email protected] Firewall Protection Profile samhällsskydd och beredskap 2 (38) Innehållsförteckning 1. Introduction... 4 1.1 PP reference...
BMC ProactiveNet Performance Management 9.5. Security Target
BMC ProactiveNet Performance Management 9.5 Security Target Version 0.4 18 July 2014 Copyright 2014 BMC Software, Inc. All rights reserved. BMC, BMC Software, and the BMC Software logo are the exclusive
Multi-Functional Printer (Digital Copier) 7222/7322/7228/7235 Series Security Target Version 10
Multi-Functional Printer (Digital Copier) 7222/7322/7228/7235 Series Security Target Version 10 This document is a translation of the security target written in Japanese which has been evaluated and certified.
BMC Real End User Experience Monitoring and Analytics 2.5. Security Target
BMC Real End User Experience Monitoring and Analytics 2.5 Security Target Version 0.07 5 March 2015 Copyright 2015 BMC Software, Inc. All rights reserved. BMC, BMC Software, and the BMC Software logo
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN
REF: 2010-12-INF-626 V1 Distribution: Public Date: 29.04.2011 Created: CERT3 Reviewed: TECNICO Approved: JEFEAREA CERTIFICATION REPORT FOR EADS GROUND SEGMENT SYSTEMS PROTECTION PROFILE (GSS-PP) ISSUE
Symantec Mail Security Appliance Version 7.5 Administration Guide
Symantec Mail Security Appliance Version 7.5 Administration Guide Symantec Information Foundation 12617000 Symantec Mail Security Appliance Version 7.5 Administration Guide The software described in this
Natek Network Access Control (NAC)
Natek Network Access Control (NAC) V 5.4.2 Security Target Release Date: 28.08.2014 Version 1.13 AUTHOR: NATEK BİLİŞİM BİLGİSAYAR EĞİTİM DANIŞMANLIK YAZILIM TİCARET SANAYİ ANONİM ŞİRKETİ 1 Revision History
Green Hills Software INTEGRITY-178B Separation Kernel Security Target
Green Hills Software INTEGRITY-178B Separation Kernel Security Target Version 1.0 Prepared for: Green Hills Software, Inc. 34125 US Hwy 19 North Suite 100 Palm Harbor, FL 34684 USA Prepared By: Science
BMC Remedy Action Request System 6.3 Security Target
BMC Remedy Action Request System 6.3 Security Target Version 4.5 March 28, 2007 Part number: 60658 Prepared by: BMC Software, Inc. 1030 W. Maude Avenue Sunnyvale, CA 94085 Copyright 2004-2007 BMC Software,
Symantec Mail Security for SMTP. Administration Guide
Symantec Mail Security for SMTP Administration Guide Symantec Mail Security for SMTP Administration Guide The software described in this book is furnished under a license agreement and may be used only
Security Target. McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5. Document Version 1.3. October 12, 2011
Security Target McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5 Document Version 1.3 October 12, 2011 Document Version 1.3 McAfee Page 1 of 69 Prepared For: Prepared By: McAfee, Inc. 2821
ARKOON FAST Firewall v3.0 SECURITY TARGET
Version Date October 28, 2004 Version 2.7p Ref. AKV3-CRT-EAL2-ST ARKOON FAST Firewall v3.0 SECURITY TARGET 20 Prepared for 40 ARKOON Network Security 13A avenue Victor HUGO F-69160 Tassin La Demi-Lune
LogLogic v4.6.1 Open Log Management Platform Security Target. Release Date: 30 June 2009 Version: 2.0
LogLogic v4.6.1 Open Log Management Platform Security Target Release Date: 30 June 2009 Version: 2.0 Prepared for: LogLogic Inc. 110 Rose Orchard Way, Suite 200 San Jose, CA 95134 Prepared by: Savvis Federal
SolarWinds Log and Event Manager Software Security Target
SolarWinds Log and Event Manager Software Security Target Version 1.5 August 25, 2014 SolarWinds Worldwide, LLC 3711 South MoPac Expressway Building Two Austin, Texas 78746 Copyright 2013 SolarWinds Worldwide,
Symantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
Top Layer Networks IPS 5500 E Security Target
Top Layer Networks IPS 5500 E Security Target Version 1.1 April 10, 2009 Prepared For: Top Layer Networks 2400 Computer Drive Westborough, MA 01581 Prepared By: CygnaCom Solutions Security Evaluations
RSA, The Security Division of EMC envision platform v4.0 SP 1. Security Target
RSA, The Security Division of EMC envision platform v4.0 SP 1 Security Target Evaluation Assurance Level: 3+ Document Version: 0.8 Prepared for: Prepared by: RSA, The Security Division of EMC 174 Middlesex
How To Understand The Toe
Rapid7 Nexpose Vulnerability Management and Penetration Testing System V.5.1 Security Target Version 1.7 May 11, 2012 Prepared for: Rapid7 LLC 545 Boylston Street, Suite 400 Boston, MA 02116 Prepared By:
Trustwave DbProtect Version 6.4.3 Security Target
Trustwave DbProtect Version 6.4.3 Security Target Version 1.8 July 21, 2015 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane
Symantec Mail Security Planning Guide
Symantec Mail Security Planning Guide Syamantec Mail Security Planning Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
Low Assurance Protection Profile for a VPN gateway
LAPP VPN gateway Low Assurance Protection Profile for a VPN gateway Version: 1.4 Date: 29/04/2005 Filename: lapp4_14 Product: VPN gateway Sponsor: SRC Security Research & Consulting GmbH, Graurheindorfer
Extreme Networks, Inc. ExtremeXOS Network Operating System v12.3.6.2
Extreme Networks, Inc. ExtremeXOS Network Operating System v12.3.6.2 Security Target Evaluation Assurance Level: EAL3+ Document Version: 0.9 Prepared for: Prepared by: Extreme Networks, Inc. 3585 Monroe
Forefront Identity Manager (FIM) 2010
Forefront Identity Manager (FIM) 2010 Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 24-MAR-2012 Document history Version Date Description 0.1 28-APR-11 Initial draft for review.
CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target
CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target Version 2.0 June Version 21, 2010 0.6 December 29, 2008 Prepared for: Prepared CA for: 100 Staples CA, Inc. Drive Framingham, 100
How To Manage Security In A Network Security System (Tsi)
SecureDoc Disk Encryption v4.3c Security Target for Common Criteria EAL-4 Abstract: This document represents Security Target Document for Secure Doc Disk Encryption product v4.3c. It specifies treats,
Security Target for Citrix Presentation Server 4.0 For Windows
Security Target for Citrix Presentation Server 4.0 For Windows Reference: ST/T488 July 2005 Version: 1.0 This document has been prepared on behalf of: Prepared by: Citrix Systems, Inc BT 851 West Cypress
Extended Package for Mobile Device Management Agents
Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes
OmniPCX Enterprise Common Criteria Security Target
OmniPCX Enterprise Common Criteria Security Target ALCATEL-LUCENT Enterprise Product Group March 2010 Ref: 3EU_29000_0019_DEZZA_03 Alcatel-Lucent All Rights Reserved Alcatel-Lucent 2010 Table of Content
gateprotect Firewall Packet-Filtering-Core v10.3 Security Target Version:
Version: Status: Last Update: Classification: 1.0 Release 2013-02-08 public Legal tice This document is provided AS IS with no express or implied warranties. Use the information in this document at your
WATCHGUARD XCS SERVER V9.2 SECURITY TARGET
WATCHGUARD XCS SERVER V9.2 SECURITY TARGET Evaluation Assurance Level: 4+ Augmented with ALC_FLR.2 Version: 1.9 WatchGuard Technologies Inc WatchGuard Canada 505 Fifth Avenue South, Suite 500 50 Burnhamthorpe
INLINE INGUARD E-MAIL GUARDIAN
INLINE INGUARD E-MAIL GUARDIAN Activation Guide December 8, 2008 600 Lakeshore Parkway, AL 35209 888.3InLine [email protected] 1 InLine InGuard E-Mail Guardian Activation Guide The InLine InGuard E-Mail
ESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2
SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2 Document No. 1769-000-D0007 Version: v0.89, 12 September 2013 Prepared for: Centrify Corporation 785 N. Mary Avenue, Suite 200 Sunnyvale, California USA,
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Security Target Microsoft SQL Server Team
Security Target Microsoft SQL Server Team Author: Roger French Version: 1.27 Date 2008-07-23 File Name: MS_SQL_ST_1.27 Abstract This document is the Security Target (ST) for the Common Criteria evaluation
