Low Assurance Protection Profile for a VPN gateway
|
|
|
- Loren Jacobs
- 9 years ago
- Views:
Transcription
1 LAPP VPN gateway Low Assurance Protection Profile for a VPN gateway Version: 1.4 Date: 29/04/2005 Filename: lapp4_14 Product: VPN gateway Sponsor: SRC Security Research & Consulting GmbH, Graurheindorfer Straße 149a, D Bonn, Germany, Phone: +49 (228) , Fax: +49 (228) Certification ID: BSI PP-0013 Author(s): Dirk Feldhusen Sandro Amendola No of pages: SRC Security Research & Consulting GmbH
2 LAPP VPN gateway version 1.4 Document Information History of changes Version Date Changes /08/2004 First Draft /09/2004 Updated version after internal revision /10/2004 Updated version after comments by BSI /10/2004 Updated version after further comments by BSI /10/2004 Updated version after some more comments by BSI /11/2004 Updated version after intermediate evaluation report by TNO /11/2004 Updated version after comments by TNO /11/2004 Updated version after one more comment by TNO /11/2004 Updated version after final comment by TNO /04/2005 Incorporated Raised Interpretations, added certification ID Document Invariants Name Invariant (edit here) Output value Filename and size calculated automatically lapp4_14 ( Byte) Last version Date 29/04/ /04/2005 Classification Final Final TOE name (long) VPN gateway VPN gateway TOE name (short) VPN gateway VPN gateway Certification ID BSI PP-0013 BSI PP-0013 Author(s) Dirk Feldhusen Sandro Amendola Dirk Feldhusen Sandro Amendola Sponsor (long) SRC Security Research & Consulting GmbH Sponsor (short) SRC SRC Evaluation facility (long) TNO-ITSEF BV Delftechpark XJ Delft The Netherlands SRC Security Research & Consulting GmbH TNO-ITSEF BV Delftechpark XJ Delft The Netherlands Evaluation facility (short) TNO-ITSEF BV TNO-ITSEF BV Certification body (long) Bundesamt für Sicherheit in der Informationstechnik Godesberger Allee Bonn Certification body (short) BSI BSI Bundesamt für Sicherheit in der Informationstechnik Godesberger Allee Bonn 29/04/2005 SRC Security Research & Consulting GmbH page 2
3 LAPP VPN gateway version 1.4 Table of contents 1 PP Introduction PP Reference TOE overview Conformance claims Conformance claim Conformance claim rationale Conformance statement Definition of terms Subjects Objects Operations Security Objectives Security Requirements Extended components definition SFRs SARs /04/2005 SRC Security Research & Consulting GmbH page 3
4 PP Introduction LAPP VPN gateway version PP Introduction 1.1 PP Reference This is the Low Assurance Protection Profile for a VPN gateway, version 1.4, SRC Security Research & Consulting GmbH, 29/04/ TOE overview The TOE is a VPN gateway which is used to build up a virtual private network as depicted below. A Virtual Private Network, or VPN, is a private communication network communicating over a public network, i.e. the Internet. Normally, a local network is protected against unauthorised access from the public network by means of a firewall which limits the permitted types of traffic. The TOE provides a remote authorised users a full connection into the local network without bypassing this protection against unauthorised users. This connection is established by a so called VPN tunnel between a VPN gateway on the side of the network and a VPN client on the side of the remote user, which is a reduced form of a gateway. Also two networks can be connected via two VPN gateways, in which case, one of the VPN gateways plays the role of the server and the other gateway plays the role of the client. There is no difference in the functionality offered by the VPN client irrespective of whether the remote VPN client is actually a single personal computer running a trusted VPN client software application or a VPN gateway device attached to a remote LAN. The TOE provides the following functionality: identifying and authenticating remote VPN users or networks, building up VPN tunnels between the TOE and the VPN client by exchanging cryptographic keys and using agreed cryptographic algorithms and routing network traffic between the two sides of the VPN tunnel. The VPN message traffic is carried on public networking infrastructure using standard protocols. VPNs use cryptographic tunnelling protocols to provide the necessary confidentiality (preventing snooping), sender authentication (preventing identity spoofing), and message integrity (preventing message alteration) to achieve the privacy intended. Such techniques can provide secure communications over possibly insecure networks. Typical VPN protocols are: IPSec (IP security), the most common protocol specified by an IETF working group, OpenVPN, a SSL based encryption available for many operating systems, and proprietary protocols like o PPTP (point-to-point tunneling protocol) or o L2F (Layer 2 Forwarding) as well as o L2TP (Layer 2 Tunnelling Protocol). 29/04/2005 SRC Security Research & Consulting GmbH page 4
5 PP Introduction LAPP VPN gateway version 1.4 The TOE requires a supporting computing platform equipped with a connection to the public network as well as the local network to provide its functionality. Furthermore, the communication between the local network and the public network will be only through the TOE. This object will be supported by the use of a firewall that is configured to allow the minimum set of traffic to pass that is required for the operation of the TOE and any other services that are exposed to the outside world. Further non-toe hardware/firmware/software is not required by the TOE. TOE local network Internet VPN tunnel VPN client remote user Figure 1 The TOE and its operational environment 29/04/2005 SRC Security Research & Consulting GmbH page 5
6 Conformance claims LAPP VPN gateway version Conformance claims 2.1 Conformance claim This Protection Profile: claims conformance to CC version 2.4 release 256 and CC v2.4 Draft Interpretations #1 - #17, is CC Part 2 conformant and CC Part 3 conformant, does not claim conformance to any other PP, is EAL 1 conformant. 2.2 Conformance claim rationale The conformance claim rationale consists in a PP-related conformance claim rationale and a package-related conformance claim rationale. PP-related conformance claim rationale This PP does not claim conformance to another PP, so there is no rationale related to this. Package-related conformance claim rationale This PP is EAL1 conformant. The EAL1 package contains no uncompleted operations. As no SARs were added to EAL1, the SARs in this PP are consistent with EAL Conformance statement Security targets or other PPs wishing to claim conformance to this PP can do so as strict-ppconformance. Demonstrable-PP-conformance is not allowed for this PP. 29/04/2005 SRC Security Research & Consulting GmbH page 6
7 Definition of terms LAPP VPN gateway version Definition of terms This section is added to define the terms like subjects, objects and operations, that are used in the Security Objectives of the Operational Environment and SFRs. 3.1 Subjects S.USER S.ADMIN user of the TOE, typically a remote user or an administrator of a remote network. attribute: data used for the authentication like for instance public Diffie- Hellman key. administrator, authorised to modify the list of authorised users and administrating the corresponding security attributes of S.USER. 3.2 Objects O.NETWORK local network to which the TOE provides the connection. 3.3 Operations R.CONNECT establish connection between S.USER and the O.NETWORK by a so-called VPN tunnel. 29/04/2005 SRC Security Research & Consulting GmbH page 7
8 Security Objectives LAPP VPN gateway version Security Objectives Security Objectives for the operational environment OE.PRIV_DATA OE.CLIENT OE.ADMIN OE.ENVIRON 1 OE.NETWORK The private data belonging to the security attributes of S.USER, typically a Diffie-Hellman key pair, are generated and handled in a secure manner. The remote user S.USER utilise a trusted IT product (VPN client or another VPN gateway) for the connection to the TOE. The security attributes of S.USER, typically a public Diffie-Hellman key or a X.509 certificate, are adequately imported and handled by S.ADMIN. In addition, S.ADMIN shall keep the computing platform of the TOE integer. For these purpose he shall: o update the computing platform with the latest patches and updates for this environment and o downloading and running only executable content which does not corrupt the integrity of the computing platform. The operational environment of the TOE shall be a general office environment. This means low physical security measures. There will be no direct connection between O.NETWORK and the public network. Communication between the two will be only through the TOE. This object will be supported by the use of a firewall that is configured to allow the minimum set of traffic to pass that is required for the operation of the TOE and any other services that are exposed to the outside world. 1 Application Note: The goal of this security objective is to ensure that any PP or ST claiming compliance to this PP cannot add objectives for the operational environment that are inconsistent with this objective, such as The TOE shall be guarded for 24 hours a day. 29/04/2005 SRC Security Research & Consulting GmbH page 8
9 Security Requirements LAPP VPN gateway version Security Requirements 5.1 Extended components definition As this PP does not contain extended security requirements, there are no extended components. 5.2 SFRs Authentication and Identification Informal explanation: Authentication and identification is one of the two main security functionalities of the VPN gateway. The user must identify and authenticate on behalf a security attribute like a public key known to the TOE before gaining access to the network FIA_UAU.2 User authentication before any action FIA_UAU.2.1 The TSF shall require each user to be successfully authenticated before allowing any other TSF-mediated actions on behalf of that user. Dependencies: FIA_UID.1 Timing of identification FIA_UID.2 User identification before any action FIA_UID.2.1 The TSF shall require each user to identify itself before allowing any other TSF-mediated actions on behalf of that user. Dependencies: No dependencies FIA_ATD.1 User attribute definition FIA_ATD.1.1 The TSF shall maintain the following list of security attributes belonging to individual users: [assignment: list of security attributes which can be used to authenticate S.USER] Informal explanation: Security attributes can be e.g. pre-shared secrets in form of public Diffie-Hellman keys according to IPSEC or X.509 certificates which contain such public keys stored by a PKI. This depends on the implementation of the TOE and is therefore left to the ST. Dependencies: No dependencies Application note: The security mechanisms used for authentication like e.g. Diffie-Hellman key exchange algorithm, should be specified by the security target 2. They should be of reasonable strength in order to support the security functionality of the TOE. For instance, cryptographic operations specified in the security target along with the recommended key length should be resistant against known cryptanalytic techniques. 2 Since the required security functionality can be provided by several cryptographic algorithms or possibly even other security mechanisms, they are not specified in the protection profile. 29/04/2005 SRC Security Research & Consulting GmbH page 9
10 Security Requirements LAPP VPN gateway version 1.4 Management Informal explanation: This functionality supports the authentication by maintaining the list of security attributes. The access to the list of security attributes of authorised users is restricted to an administrator. FMT_MSA.1 Management of security attributes FMT_MSA.1.1 The TSF shall enforce the SFP_VPN 3 to restrict the ability to modify the security attributes [assignment: list of security attributes which can be used to authenticate S.USER] to S.ADMIN. Dependencies: FDP_ACC.1 Subset access control FDP_ACC.1 Subset access control FMT_SMF.1 Specification of management functions FMT_SMR.1 Security roles FDP_ACC.1.1 The TSF shall enforce the SFP_VPN 3 R.CONNECT}. Dependencies: FDP_ACF.1 Security attribute based access control FDP_ACF.1 Security attribute based access control on {S.USER, O.NETWORK, FDP_ACF.1.1 The TSF shall enforce the SFP_VPN 3 to objects based on the following {security attributes of S.USER}. FDP_ACF.1.2 The TSF shall enforce the following rules to determine if an operation among controlled subjects and controlled objects is allowed: S.USER is only allowed to R.CONNECT to O.NETWORK if it is identified and authenticated on behalf of its security attribute. FDP_ACF.1.3 The TSF shall explicitly authorise access of subjects to objects based on the following additional rules: None. FDP_ACF.1.4 The TSF shall explicitly deny access of subjects to objects based on the None. Dependencies: FMT_MSA.3 Static attribute initialisation FDP_ACC.1 Subset access control FMT_MSA.3 Static attribute initialisation FMT_MSA.3.1 The TSF shall enforce the SFP_VPN 3 to provide restrictive default values for security attributes that are used to enforce the SFP. FMT_MSA.3.2 The TSF shall allow the S.ADMIN to specify alternative initial values to override the default values when an object or information is created. 3 The Security Function Policy SFP_VPN is identified by the elements FDP_ACC.1.1 and FDP_ACF.1.1 and consists in the rules FMT_MSA.3.2. defined by the elements FDP_ACF.1.2, FMT_MSA.1.1, FMT_MSA.3.1 and 29/04/2005 SRC Security Research & Consulting GmbH page 10
11 Security Requirements LAPP VPN gateway version 1.4 Dependencies: FMT_MSA.1 Management of security attributes FMT_SMR.1 Security roles FMT_SMF.1 Specification of Management Functions FMT_SMF.1.1 The TSF shall be capable of performing the following security management functions: administrating the list of authorised users by adding and deleting the users along with their corresponding security attributes. Dependencies: No Dependencies FMT_SMR.1 Security roles FMT_SMR.1.1 The TSF shall maintain the roles S.USER and S.ADMIN. FMT_SMR.1.2 The TSF shall be able to associate users with roles. Dependencies: FIA_UID.1 Timing of identification Trusted channel Informal explanation: The trusted channel is the second of the two main security functionalities. FTP_ITC.1 Inter-TSF trusted channel FTP_ITC.1.1 The TSF shall provide a communication channel between itself and a remote trusted IT product that is logically distinct from other communication channels and provides assured identification of its end points and protection of the channel data from modification or disclosure. FTP_ITC.1.2 The TSF shall permit both the TSF and the remote trusted IT product to initiate communication via the trusted channel. FTP_ITC.1.3 The TSF shall initiate communication via the trusted channel for R.CONNECT. Dependencies: No dependencies Application note: The security mechanisms used for the trusted channel, like e.g. triple DES encryption, should be specified by the security target 2. They should be of reasonable strength in order to support the security functionality of the TOE. For instance, cryptographic operations specified in the security target along with the recommended key length should be resistant against known cryptanalytic techniques. Self-protection Informal explanation: The self-protection of the TOE supports the other security functionalities. FPT_RVM.1 Non-bypassability of the TSP FPT_RVM.1.1 The TSF shall ensure that TSP enforcement functions are invoked and succeed before each function within the TSC is allowed to proceed. Dependencies: No dependencies 29/04/2005 SRC Security Research & Consulting GmbH page 11
12 Security Requirements LAPP VPN gateway version 1.4 FPT_SEP.1 TSF domain separation FPT_SEP.1.1 The TSF shall maintain a security domain for its own execution that protects it from interference and tampering by untrusted subjects. FPT_SEP.1.2 The TSF shall enforce separation between the security domains of subjects in the TSC. Dependencies: No dependencies 5.3 SARs The SARs for this PP are the package EAL 1. 29/04/2005 SRC Security Research & Consulting GmbH page 12
Low Assurance Protection Profile for a VoIP Infrastructure
Low Assurance Protection Profile for a VoIP Infrastructure Version 1.1 Date Author(s) Dirk-Jan Out Certification ID Sponsor File name No of pages 12 TNO-ITSEF BV VoIP Low Assurance Protection Profile 1.1
Mobile Billing System Security Target
Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing
Low Assurance Security Target for a Cisco VoIP Telephony System
Low Assurance Security Target for a Cisco VoIP Telephony System Security Target Version 1.6 March 14, 2005 Document Control Preparation Action Name Date Prepared by: Rob Hunter of TNO-ITSEF BV on behalf
BSI-PP-0004-2002. for. Protection Profile Secure Signature-Creation Device Type 1, Version 1.05. developed by
BSI-PP-0004-2002 for Protection Profile Secure Signature-Creation Device Type 1, Version 1.05 developed by CEN/ISSS Information Society Standardization System, Workshop on Electronic Signatures - Bundesamt
EAL4+ Security Target
EAL4+ Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 21-DEC-10 Document management Document identification Document ID Document title Release authority E14_EAL4_ASE Microsoft
EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...
EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0
EMC Documentum EMC Documentum Content Server TM V5.3 and EMC Documentum Administrator TM V5.3 Security Target V2.0 December 8, 2005 ST prepared by Suite 5200, 4925 Jones Branch Drive McLean, VA 22102-3305
Security Target for Citrix Presentation Server 4.0 For Windows
Security Target for Citrix Presentation Server 4.0 For Windows Reference: ST/T488 July 2005 Version: 1.0 This document has been prepared on behalf of: Prepared by: Citrix Systems, Inc BT 851 West Cypress
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Author: Microsoft Corp. Version: 1.0 Last Saved: 2011-03-10 File Name: MS_UAG_ST_1.0.docx
Certification Report BSI-DSZ-CC-0306-2005. for. Cisco VoIP Telephony Solution. Version 1.0. from. Cisco Systems, Inc.
Bundesamt für Sicherheit in der Informationstechnik for Cisco VoIP Telephony Solution Version 1.0 from Cisco Systems, Inc. - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133
Network Intrusion Prevention System Protection Profile V1.1
Network Intrusion Prevention System Protection Profile V1.1 December 21, 2005 (This page left blank on purpose for double-side printing) Protection Profile Title Network Intrusion Prevention System Protection
Security Target for Cisco Remote Access VPN
Security Target for Cisco Remote Access VPN Reference: ST 16 May 2007 Version 1.17 CISCO Systems Inc. 170 West Tasman Drive San Jose CA 95124-1706 USA Copyright: 2007 Cisco Systems, Inc. Table of Contents
OmniPCX Enterprise Common Criteria Security Target
OmniPCX Enterprise Common Criteria Security Target ALCATEL-LUCENT Enterprise Product Group March 2010 Ref: 3EU_29000_0019_DEZZA_03 Alcatel-Lucent All Rights Reserved Alcatel-Lucent 2010 Table of Content
JMCS Northern Light Video Conferencing System Security Target
JMCS Northern Light Video Conferencing System Security Target Common Criteria: EAL2 Version 1.2 22 FEB 12 Document management Document identification Document ID Document title Product version NLVC_ST_EAL2
Security Target. Astaro Security Gateway V8 Packet Filter Version 1.000. Assurance Level EAL4+ Common Criteria v3.1
Astaro Security Gateway V8 Packet Filter Version 1.000 Assurance Level EAL4+ Common Criteria v3.1 This Security Target also covers the secunet wall 2 packet filter Version : 1.03 Date: 2011-05-20 Author:
Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.
Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to
Protection Profile for UK Dual-Interface Authentication Card
Protection Profile for UK Dual-Interface Authentication Card Version 1-0 10 th July 2009 Reference: UNKT-DO-0002 Introduction This document defines a Protection Profile to express security, evaluation
Firewall Protection Profile
samhällsskydd och beredskap 1 (38) ROS-ISÄK Ronny Janse 010-2404426 [email protected] Firewall Protection Profile samhällsskydd och beredskap 2 (38) Innehållsförteckning 1. Introduction... 4 1.1 PP reference...
Trust Technology Assessment Program. Validation Report
Trust Technology Assessment Program Validation Report U.S. Government Traffic Filter Firewall Protection Profile for Low-Risk Environments version 1.1 TTAP Report Number: TTAP-VR-0007 June, 1999 Mutual
Joint Interpretation Library
for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0
Top Layer Networks. Security Target V2.3
Top Layer Networks IDS Balancer TM Version 2.2 Appliance (IDSB3531-CCV1.0, IDSB3532-CCV1.0, IDSB4508-CCV1.0) Security Target V2.3 August 31, 2004 AppBalancing, AppSafe, DCFD, Flow Mirror, SecureWatch,
IBM WebSphere Message Broker Security Target
IBM WebSphere Message Broker Security Target Version 2.1.2 2007-08-22 Document History Version Date Summary Author 1.0 2006-10-23 Final EAL3 ST plus changes by IBM. SAIC / IBM 1.1 2006-12-11 Fixed inconsistencies.
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows,
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:
Table of Content I. What is VPN?... 2 II. Types of VPN connection... 2 III. Types of VPN Protocol... 3 IV. Remote Access VPN configuration... 4 a. PPTP protocol configuration... 4 Network Topology... 4
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments
U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments Information Assurance Directorate Version 1.1 July 25, 2007 Forward This Protection Profile US Government
AppGate Security Server, Version 8.0.4. Security Target. Document Version: 2.9 Date: 2008-04-10
AppGate Security Server, Version 8.0.4 Security Target Document Version: 2.9 Date: 2008-04-10 Contents 1 INTRODUCTION...6 1.1 ST Identification...6 1.2 ST Overview...6 1.3 CC Conformance Claim...6 1.4
Windows Mobile 6.5 Security Target
EAL4 augmented with ALC_FLR.1 Version 1.0 January 2010 The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3)
Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3) Reference: ST January 2001 Version: 1.6 Europe: USA: CISCO Systems Ltd CISCO Systems Inc. 3 The Square 170 West Tasman Drive Stockley
Forefront Identity Manager (FIM) 2010
Forefront Identity Manager (FIM) 2010 Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 24-MAR-2012 Document history Version Date Description 0.1 28-APR-11 Initial draft for review.
Operating System Protection Profile. Common Criteria Protection Profile BSI-CC-PP-0067 Version 2.0
Common Criteria Protection Profile BSI-CC-PP-0067 Version 2.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 22899 9582-111 E-Mail: [email protected]
Océ Technologies B.V. Oce Venlo DAC Security Target 3.0.doc
Océ Technologies B.V. ST-Océ DAC R10.1.5-3.3 Security Target The Océ Digital Access Controller (DAC) R10.1.5, as used in the Océ VarioPrint 1055, 1055 BC, 1055 DP, 1065, 1075, 2062, 2075, 2075 DP printer/copier/scanner
Protection Profile Secure Signature-Creation Device Type 3
Protection Profile Secure Signature-Creation Device Type 3 Version: 1.05, EAL 4+ Wednesday, 25 July 2001 Prepared By: ESIGN Workshop - Expert Group F Prepared For: CEN/ISSS Note: This Protection Profile
Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0
Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0 ST Version 1.6 August 20, 2007 Document Version 1.6 Symantec Corporation Page 1 of 55 Prepared For: Prepared By: Symantec Corporation
Secuware Virtual System (SVS)
Secuware Virtual System (SVS) SECURITY TARGET EAL2 Copyright 2008 by SECUWARE All rights reserved. The information in this document is exclusive property of SECUWARE and may not be changed without express
Multi-Functional Printer (Digital Copier) 7222/7322/7228/7235 Series Security Target Version 10
Multi-Functional Printer (Digital Copier) 7222/7322/7228/7235 Series Security Target Version 10 This document is a translation of the security target written in Japanese which has been evaluated and certified.
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle
Firewall Protection Profile V2.0 2008. 4. 24
Firewall Protection Profile V2.0 2008. 4. 24 (This page left blank on purpose for double-side printing) Protection Profile Title Firewall Protection Profile for Government Evaluation Criteria Version This
System Center Mobile Device Manager 2008 Service Pack 1 Security Target
System Center Mobile Device Manager 2008 Service Pack 1 EAL4 augmented with ALC_FLR.3 Version 1.1 July 2009 The information contained in this document represents the current view of Microsoft Corporation
C038 Certification Report
C038 Certification Report TAXSAYA Online File name: Version: v1a Date of document: 15 August 2013 Document classification: For general inquiry about us or our services, please email: [email protected]
Security Target for BorderWare Firewall Server 6.5
Security Target for BorderWare Firewall Server 6.5 Reference: ST January 2002 Version : 2.4 North America: Europe: 50 Burnhamthorpe Rd. W. 1 The Harlequin Centre Suite 502 Southall Lane Mississauga Southall
Common Criteria Security Target For 1E Power and Patch Management Pack
Intelligent Windows Management Common Criteria Security Target For 1E Power and Patch Management Pack 30 September 2009 Document Version 1-0 1E Limited. All Rights reserved. Summary of Amendments Version
Commercial Database Management System Protection Profile (C.DBMS PP)
Common Commercial Database Management System (C.DBMS PP) March 1998 Common Commercial Database Management System March 1998 Page ii Contents March 1998 1 Introduction... 1 1.1 Identification of... 1 1.2
BSI-PP-0003-2001. for. Smart Card Security User Group Smart Card Protection Profile (SCSUG-SCPP) Version 3.0. developed by
Certification Report Bundesamt für Sicherheit in der Informationstechnik BSI-PP-0003-2001 for Smart Card Security User Group Smart Card Protection Profile (SCSUG-SCPP) Version 3.0 developed by Smart Card
Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012
Security Target McAfee Enterprise Mobility Management 9.7 Document Version 0.9 July 5, 2012 Document Version 0.9 McAfee Page 1 of 39 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa
Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0
Security Target NetIQ Access Manager 4.0 Document Version 1.13 August 7, 2014 Document Version 1.13 NetIQ Page 1 of 36 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite 810 Houston, TX
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Red Hat Enterprise Linux 3 (running on specified Dell and Hewlett-Packard hardware) Security Target
Red Hat Enterprise Linux 3 (running on specified Dell and Hewlett-Packard hardware) Security Target Version 1.7 January 2004 Document Control DOCUMENT TITLE Red Hat Enterprise Linux 3 Security Target Version
EMC Corporation Data Domain Operating System Version 5.2.1.0. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.
EMC Corporation Data Domain Operating System Version 5.2.1.0 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.11 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton,
Marimba Client and Server Management from BMC Software Release 6.0.3
Marimba Client and Server Management from BMC Software Release 6.0.3 Version 2.3.0 4 June, 2007 Prepared by: BMC Software, Inc. 2101 City West Blvd. Houston, Texas 77042 TABLE OF CONTENTS 1. Introduction...
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 0.7 Prepared for: Prepared by: Enterasys Networks, Inc. Corsec Security,
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction
Common Criteria for Information Technology Security Evaluation. Part 2: Security functional requirements. August 2005. Version 2.
Common Criteria for Information Technology Security Evaluation Part 2: Security functional requirements August 2005 Version 2.3 CCMB-2005-08-002 Foreword This version of the Common Criteria for Information
Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target
Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target Evaluation Assurance Level: EAL2 augmented with ALC_FLR.2 Document Version: 1 Prepared for: Prepared by: Citrix
U.S. Government Protection Profile for Database Management Systems
U.S. Government Protection Profile for Database Management Systems Information Assurance Directorate Version 1.3 December 24, 2010 Protection Profile Title: 1 U.S. Government Protection Profile for Database
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING
SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING Document No. 1735-005-D0001 Version: 1.0, 3 June 2014 Prepared for: Fortinet, Incorporated 326 Moodie Drive Ottawa, Ontario Canada, K2H
Security Target. McAfee Enterprise Mobility Management 12.0. Document Version 1.16
Security Target McAfee Enterprise Mobility Management 12.0 Document Version 1.16 September 17, 2014 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054 Primasec Ltd
Check Point Endpoint Security Media Encryption Security Target
Check Point Endpoint Security Media Encryption Security Target Version 1.0 June 23, 2010 Prepared for: 5 Ha Solelim St. Tel Aviv, Israel 67897 Prepared By: Science Applications International Corporation
IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0
IronMail Secure Email Gateway Software Version 4.0.0 Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0 CipherTrust 4800 North Point Parkway Suite 400 Alpharetta, GA 30022 Phone: 678-969-9399
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition Version 1-0 7 February 2011 2011 Citrix Systems, Inc. All rights reserved. Summary of Amendments Version 1-0 7
SECURITY TARGET CITADEL HERCULES ENTERPRISE VULNERABILITY MANAGEMENT (EVM) VERSION 4.1
SECURITY TARGET CITADEL HERCULES ENTERPRISE VULNERABILITY MANAGEMENT (EVM) VERSION 4.1 Document No. 1517-011-D001 Version 1.1, 3 August 2006 Prepared for: Citadel Security Software Inc. Two Lincoln Centre
Protection Profile Digital Tachograph Vehicle Unit (VU PP) Version 1.0 BSI-CC-PP-0057-2010
Protection Profile Digital Tachograph Vehicle Unit (VU PP) Version 1.0 BSI-CC-PP-0057-2010 Dipl.-Phys. Certification Federal Office for Information Security (BSI), Germany Topics of VU-PP CC 3.1 R3 Overview
CardOS V4.4 CNS. Edition 04/2010. Security Target CardOS V4.4 CNS with Application for QES
CardOS V4.4 CNS Security Target CardOS V4.4 CNS with Application for QES Edition 04/2010 CardOS V4.4 CNS: ST Edition 04/2010 Public 1 The reproduction, transmission or use of this document or its contents
Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router
print email Article ID: 4938 Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router Objective Virtual Private
Canon ir6570/ir5570 Series ir Security Kit-B3. Security Target
Document ID: CANON-Device05-001 Canon ir6570/ir5570 Series ir Security Kit-B3 Security Target This document is a translation of the security target written in Japanese, which has been evaluated and certified.
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target Version: Status: Last Update: 1.19 Released 2014-03-05 Trademarks
MIFARE DESFire EV1 MF3ICD81
MIFARE DESFire EV1 MF3ICD81 Rev.1.5 10 May 2011 BSI-DSZ-CC-0712 Evaluation Documentation Document information Info Keywords Abstract Content, MF3ICD81 Evaluation of the NXP Secure Smart Card Controller
How To Protect Your Computer From Being Hacked
Senforce Endpoint Security Suite Version 3.1.175 Security Target Version 1.0 06/19/07 Prepared for: Senforce Technologies, Inc. 147 W Election Rd Ste 110 Draper UT 84020 Prepared By: Science Applications
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented
National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report
MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN
REF: 2010-12-INF-626 V1 Distribution: Public Date: 29.04.2011 Created: CERT3 Reviewed: TECNICO Approved: JEFEAREA CERTIFICATION REPORT FOR EADS GROUND SEGMENT SYSTEMS PROTECTION PROFILE (GSS-PP) ISSUE
McAfee Firewall Enterprise v7.0.1.02 Security Target
McAfee Firewall Enterprise v7.0.1.02 Security Target 8 Nov 2010 Version 1.3 Prepared By: Primasec Ltd For McAfee Inc 2340 Energy Park Drive St. Paul, MN 55108 USA McAfee Inc. Page 1 of 60 Contents 1 Introduction...
IPsec VPN Application Guide REV: 1.0.0 1910010876
IPsec VPN Application Guide REV: 1.0.0 1910010876 CONTENTS Chapter 1. Overview... 1 Chapter 2. Before Configuration... 2 Chapter 3. Configuration... 5 3.1 Configure IPsec VPN on TL-WR842ND (Router A)...
Natek Network Access Control (NAC)
Natek Network Access Control (NAC) V 5.4.2 Security Target Release Date: 28.08.2014 Version 1.13 AUTHOR: NATEK BİLİŞİM BİLGİSAYAR EĞİTİM DANIŞMANLIK YAZILIM TİCARET SANAYİ ANONİM ŞİRKETİ 1 Revision History
Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP)
1 2 3 4 Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP) Schutzprofil für die Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen 5
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 Security Target
v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 10 January 2012 Version 1.1 Prepared By: Primasec Ltd For McAfee Inc 2340 Energy Park Drive St. Paul, MN 55108 USA Contents 1 Introduction...
Common Criteria Protection Profile for Inspection Systems (IS) BSI-CC-PP-0064. Version 1.01 (15 th April 2010)
Common Criteria Protection Profile for BSI-CC-PP-0064 Version 1.01 (15 th April 2010) Federal Office for Information Security Postfach 20 03 63 53133 Bonn Phone: +49 228 99 9582-0 e-mail: [email protected]
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Certification Report
Bundesamt für Sicherheit in der Informationstechnik BSI-PP-0020-2005 Protection Profile for electronic Health Card (ehc) elektronische Gesundheitskarte (egk), Version 1.02 developed on behalf of the Federal
Active Directory Federation Services 2.0
Active Directory Federation Services 2.0 Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 23-MAR-12 Document history Version Date Description 0.1 10-MAY-11 Initial draft for review.
DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75
DataPower S40 ML Security Gateway and DataPower I50 Integration Appliance Version 3.6 Security Target Version 0.75 10/09/2008 Prepared for: IBM SOA Appliance Group One Rogers St Cambridge, MA 02142 Prepared
FOR EAL2 AUGMENTED WITH ALC_FLR.1. Version: 1.2 November 20, 2013
SECURITY TARGET FOR A10 NETWORKS THUNDER 5430S AND 6430S APPLICATIONS DELIVERY CONTROLLERS EAL2 AUGMENTED WITH ALC_FLR.1 Version: 1.2 November 20, 2013 DENMARK FINLAND NORWAY SWEDEN THE NETHERLANDS www.secode.no
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Common Criteria Evaluation for a Trusted Entrust/PKI
Common Criteria Evaluation for a Trusted Entrust/PKI Author: Marc Laroche Date: March 2000 Version: 2.0 2000, Entrust, Inc. Entrust is a registered trademark of Entrust Technologies Inc. in the United
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
Site to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
Security Target Microsoft SQL Server Team
Security Target Microsoft SQL Server Team Author: Roger French Version: 1.27 Date 2008-07-23 File Name: MS_SQL_ST_1.27 Abstract This document is the Security Target (ST) for the Common Criteria evaluation
HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target
HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target Version 1.0 February 12, 2014 Prepared for: Hewlett-Packard Long Down Avenue Stoke Gifford Bristol BS34 8QZ UK Prepared By: Leidos
