OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT
|
|
|
- Stephen Lee
- 10 years ago
- Views:
Transcription
1 SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved Page 1 of 12
2 About this document This document describes the features, testing and deployment requirements necessary to meet Foundation Grade Certification for Mobile Device Management security products. It is intended for vendors, system architects, developers, evaluation and technical staff operating within the security arena. Section 1 is suitable for all readers. It outlines the purpose of the security product and defines the scope of the Security Characteristic. Document history CESG may review, amend, update, replace or issue new Scheme Documents as may be required from time to time. Soft copy location: DiscoverID Version Date Description 0.8 May 2013 Initial Draft June 2013 Updates after internal review July 2013 Updates after external feedback August 2013 Updates after second internal review October 2013 Updates after review from Technical Director January 2014 Initial draft release 1.1 January 2015 Updated to only reference NIAP Protection Profile 1.2 April 2015 Updates following external feedback 1.3 June 2015 Updates following second external review Contact CESG This document is authorised by: Technical Director (Assurance), CESG. For queries about this document please contact: CPA Administration Team CESG, Hubble Road Cheltenham Gloucestershire GL51 0EX, UK [email protected] Tel: +44 (0) SECURITY CHARACTERISTIC: Mobile Device Management Page 2 of 12
3 Contents Section 1 Overview Introduction Mapping to the Common Criteria Protection Profile Product description Typical use cases Expected operating environment Compatibility Future enhancements... 6 Appendix A Common Criteria Protection Profile mappings... 7 A.1 Additional mandatory version 1.1 MDM PP requirements... 7 A.2 Additional mandatory version 2.0 MDM PP requirements... 8 A.2.1 Additional mandatory version 2.0 MDM Server PP requirements... 8 A.2.2 Additional mandatory version 2.0 MDM Agent PP requirements... 9 Appendix B Additional details for Foundation Grade certification B.1 Device features that cannot be managed by the MDM product Appendix C References Appendix D Glossary SECURITY CHARACTERISTIC: Mobile Device Management Page 3 of 12
4 Section 1 Overview 1.1 Introduction The NIAP Protection Profile for Mobile Device Management documents (references [b], [c], and [d]) describe a set of requirements for mobile devices that can be certified through the Common Criteria scheme. The document you are now reading is a Security Characteristic that: Provides a route to awarding a Foundation Grade Certification for MDM products, which already have CC certification. Highlights those requirements which are listed in the Protection Profile for Mobile Device Management as extended or optional, but which are mandatory in products that are to be successfully assessed against this Security Characteristic This Security Characteristic aligns with guidance from the UK Government s End User Devices (EUD) Security Framework [a]. 1.2 Mapping to the Common Criteria Protection Profile MDM products successfully certified via the Common Criteria against the Protection Profile for Mobile Device Management (either version 1.1 or 2.0) can be additionally awarded Foundation Grade Certification. This additional certification can be achieved by the product vendor providing CESG with the following details: Evidence to show that the CC assessment also successfully verified that the product met the extended Protection Profile requirements listed in Appendix A of this document. Other security-related information about the product, as described in Appendix B - in particular, the mobile devices supported by the MDM product and any features of those devices, which are required to be managed by this Security Characteristic, but which are not supported by one or more of the devices 1. Evidence to show that the MDM product uses appropriate OS APIs 2 (on supported mobile devices) to provide the required management of those devices, as defined in this document. A URL1, or equivalent public reference, that provides guidance to end users about how to securely provision, configure, operate, maintain and dispose of the product. This guidance should be clear, concise and focussed on security aspects, referencing other supporting documentation (such as installation guides, user manuals, etc) where necessary. Once CESG has confirmed the vendor s assertions and supporting information above, the product will be awarded a Foundation Grade Certification against this Security Characteristic. 1 This information will be made available via the CESG website. 2 It will not be possible to award Foundation Grade Certification where such APIs are provided by a platform supported by the MDM, but are not utilised by the MDM to manage the mandatory requirement associated with the feature. SECURITY CHARACTERISTIC: Mobile Device Management Page 4 of 12
5 1.3 Product description MDM solutions are designed to remotely administer, configure, and audit mobile devices deployed by an enterprise and comprise of three distinct components: the client software, residing on the mobile device the server software a communications protocol for messages between the device and server The MDM client software can be provided as part of the operating system, or provided by a third party. The purpose of the client is to enforce the configuration (including restrictions) and provide auditing information to the enterprise. The MDM server software can be provided by the device manufacturer or a third party. It allows an enterprise to push configuration policies, events (such as remote wipe) and remotely audit mobile devices. 1.4 Typical use cases The End User Devices Security Guidance [a] for each mobile platform provides guidance on the components required for a suitable deployment, including the requirement to make use of an appropriately assured Virtual Private Network (VPN) to protect all data in transit. MDM communications must be protected by an appropriately assured encryption overlay, such as the existing VPN tunnel (recommended) or a separate tunnel with the same level of assurance. When following this guidance in enterprise deployments, the MDM server is located in the presentation layer as illustrated in figure 1. The MDM can also be deployed on a suitably accredited cloud service. This could be provided through a fully managed Software as a Service (SaaS) offering or a departmentally administered solution through an Infrastructure as a Service (IaaS) offering. All cloud based deployments require network MDM communications to be protected to the same level of assurance as the protectively marked data that the device can hold. The diagram below illustrates a typical deployment. Figure 1 - Typical MDM deployment SECURITY CHARACTERISTIC: Mobile Device Management Page 5 of 12
6 1.5 Expected operating environment It is expected that the MDM client will be deployed on a suitably secured endpoint in a mobile environment (see reference [a] for guidance). As stated in section 1.4, the management communications between the MDM client and server must be protected via encapsulation in a suitably assured encryption overlay (e.g. VPN). 1.6 Compatibility The majority of mobile phone and tablet platforms have some integrated management capabilities which can be augmented with third party clients. MDM clients are only expected to be used on mobile platforms for which current CESG security risk management guidance exists (see reference [a]). Note: the MDM client is expected to be compatible with a mobile device configured to meet the CESG guidance. 1.7 Future enhancements CESG welcomes feedback and suggestions on possible enhancements to this Security Characteristic. SECURITY CHARACTERISTIC: Mobile Device Management Page 6 of 12
7 Appendix A Common Criteria Protection Profile mappings This appendix provides important mappings between this document and the NIAP Protection Profile for Mobile Device Management (reference [b]), for which there are two versions 1.1 and 2.0. There is a minor language difference between this document and the Protection Profile documents: where the Security Characteristic refers to an MDM Client, the Protection Profile uses the phrase MDM Agent. A.1 Additional mandatory version 1.1 MDM PP requirements An MDM product assessed against this version of the Protection Profile (reference [b]) needs to additionally meet the following optional requirements within [b] to achieve Foundation Grade Certification. FCS_IPSEC_EXT.1.2(1) and FCS_IPSEC_EXT.1.2(2): if IPsec is in scope, the selection must include tunnel mode. FMT_SMF.1.1(1): selections must include: 16: remove applications 18: install applications 28: enable/disable policy for [assignment: list of radios] 29: enable/disable policy for data transfer capabilities over [assignment: list of externally accessible hardware ports] Appropriate algorithm selections must also be included to match whichever of the cryptographic profile(s) the product claims compliance with (either the PRIME PSN end-state or PSN interim profile). These are summarised below: PP / EP Requirement PRIME PSN Interim FCS_CKM.1.1(2 & 4) FCS_COP.1.1(1 & 5) FIPS PUB 186-4, Digital Signature Standard (DSS), Appendix B.4 for ECDSA schemes Elliptic Curve Digital Signature Algorithm (ECDSA) Either of: FIPS PUB 186-4, Digital Signature Standard (DSS), Appendix B.3 for RSA schemes ANSI X , Appendix A.2.4 Using AES for RSA schemes RSA Digital Signature Algorithm (rdsa) FCS_COP.1.1(4 & 8) SHA-256 SHA-1 FCS_COP.1.1(2 & 6) HMAC-SHA-256 HMAC-SHA-1 FCS_IPSEC_EXT.1.4 AES-GCM-128 AES-CBC-128 FCS_IPSEC_EXT.1.5 IKEv2 IKEv1, with RFC 4304 for extended sequence numbers FCS_IPSEC_EXT.1.6 IKEv2, with AES-GCM-128 IKEv1, with AES-CBC-128 FCS_IPSEC_EXT.1.11 Group 19 Group 5 FCS_IPSEC_EXT.1.12 ECDSA RSA SECURITY CHARACTERISTIC: Mobile Device Management Page 7 of 12
8 A.2 Additional mandatory version 2.0 MDM PP requirements Version 2.0 of the MDM Protection Profile contains a number of changes, compared to 1.1, and has also been split into separate server and agent documents (references [c] and [d]). An MDM product assessed against this version of the Protection Profile needs to additionally meet the following optional requirements within those documents to achieve Foundation Grade Certification. It should also be noted that there are a small number of mandatory requirements in the version 2.0 Protection that are not considered essential to meet Foundation Grade. A.2.1 Additional mandatory version 2.0 MDM Server PP requirements The MDM server component of an MDM product must additionally meet the following optional requirements in [c] to achieve Foundation Grade Certification: FCS_IPSEC_EXT.1.3: if IPsec is in scope, the selections must include tunnel mode. FMT_SMF.1.1(1): the selections must include: 14: wipe Enterprise data 31: enable/disable policy for list of radios 32: enable/disable policy for data signalling over list of externally accessible hardware ports 33: enable/disable policy for list of protocols where the device acts as a server 48: enable/disable USB mass storage mode Appropriate algorithm selections must also be included to match whichever of the cryptographic profile(s) the product claims compliance with (either the PRIME PSN end-state profile or PSN interim profile). These are summarised below: PP / EP Requirement PRIME PSN Interim FCS_CKM.1.1 FIPS PUB 186-4, Digital Either of: Signature Standard (DSS), FIPS PUB 186-4, Digital Signature Appendix B.4 for ECDSA Standard (DSS), Appendix B.3 for RSA schemes schemes ANSI X , Appendix A.2.4 Using AES for RSA schemes FCS_COP.1.1(2) SHA-256 SHA-1 FCS_COP.1.1(3) Elliptic Curve Digital RSA Digital Signature Algorithm (rdsa) Signature Algorithm (ECDSA) FCS_COP.1.1(4) HMAC-SHA-256 HMAC-SHA-1 FCS_IPSEC_EXT.1.4 AES-GCM-128 AES-CBC-128 FCS_IPSEC_EXT.1.5 IKEv2 IKEv1, with RFC 4304 for extended sequence numbers FCS_IPSEC_EXT.1.6 IKEv2, with AES-GCM-128 IKEv1, with AES-CBC-128 FCS_IPSEC_EXT.1.11 Group 19 Group 5 FCS_IPSEC_EXT.1.13 ECDSA RSA SECURITY CHARACTERISTIC: Mobile Device Management Page 8 of 12
9 A.2.2 Additional mandatory version 2.0 MDM Agent PP requirements The MDM client component of an MDM product must additionally meet the following optional requirements in [d] to achieve Foundation Grade Certification: FAU_ALT_EXT.2.1: the selections must include: c: change in enrollment state d: failure to install an application from the MAS Server 1 e: failure to update an application from the MAS Server1 FMT_SMF_EXT.3.1: if the MDF PP selection is used, the following requirements in Table 8 in [d] must be met for columns 2 and 5: 22: enable/disable all data signalling over list of externally accessible hardware ports 25: enable data-at rest protection 26: enable removable media s data-at-rest protection 28: wipe Enterprise data 39: enable/disable USB mass storage mode 1 Only applicable if the MDM product supports the use of a MAS Server. SECURITY CHARACTERISTIC: Mobile Device Management Page 9 of 12
10 Appendix B Additional details for Foundation Grade certification Where a product is successfully assessed against this Security Characteristic, CESG will additionally make the following details available on its website: Which PP version (i.e. v1.1 or v2.0) was used in the associated CC evaluation List of mobile device types for which the MDM product was successfully evaluated for use with (via CC), also meeting the additional requirements of Appendix A in this document AND for which CESG platform guidance exists (see reference [a]). Any important features not implemented by the above mobile devices see B.1. URL to security-related guidance for the product, as described in section 1.2 If the version 2.0 profile is used, which selections are used by the product to meet FMT_SMF.1.1 (1), point 28, in [c]. Note: CESG considers the three selections here to be listed in decreasing order of preference. These details, which do not impact the applicability of the Foundation Grade Certification, are intended to provide useful additional security-related information to end users. The information should be provided by the vendor to CESG, along with appropriate supporting evidence (e.g. CC evaluation documentation) to allow the team to verify the details. B.1 Device features that cannot be managed by the MDM product It is possible a mobile device might not provide a feature that the MDM product is required to manage, due to platform and/or OS limitations of the device. Where this occurs, the MDM product can still be approved for use with the mobile device (due to not needing to manage the risks associated with an absent feature), but the details of any such device limitations need to be provided by the vendor. Important: If a mobile device provides a feature that needs to be managed and the MDM product fails to do so, the product will not be approved for use with the device. The example table below illustrates how these details (to be made available on the CESG website) should be provided to CESG, along with appropriate supporting evidence. PP requirement mandated by either the MDM PP or by CESG Reference Sub ref. Description Supported mobile device types Type A Type B Type C Type D FMT_SMF.1.1(1) 3 unenroll from management N/A N/A FMT_SMF.1.1(1) 29 enable/disable policy for [assignment: list of audio or visual collection devices] across MD SECURITY CHARACTERISTIC: Mobile Device Management Page 10 of 12 N/A - FMT_SMF.1.1(1) 48 enable/disable USB mass storage mode - N/A - For the purposes of clarity, the table only needs to cover requirements mandated by the PP and the additional requirements stated in Appendix A of this document and then only when there is at least one mobile device type (supported by the MDM) that does not implement the feature associated with the requirement. There can be multiple columns to represent the mobile device types the vendor wishes to claim support for. Each column may specify a specific device type (e.g. type, model and OS) or a range of types (i.e. to avoid duplicated column data for all the requirements listed). Each row will record one of three options for each supported mobile device types column, for the given requirement: Symbol Meaning Feature supported by mobile device platform and MDM uses the native feature via the appropriate OS level APIs As per section 1.2, an MDM solution must use OS level APIs on the mobile device to meet a requirement.) - Feature supported by mobile device platform but no OS level APIs exist to allow MDM to manage risks presented by feature N/A Feature is not present on mobile device s platform, so does not present any risks to be managed by MDM product
11 Appendix C References This document references the following resources. Label Title Location Notes [a] End User Devices Security Guidance [b] [c] [d] Protection Profile for Mobile Device Management Protection Profile for Mobile Device Management Extended Package for Mobile Device Management Agents Version 1.1, March Version 2.0, December 2014 Version 2.0, December 2014 SECURITY CHARACTERISTIC: Mobile Device Management Page 11 of 12
12 Appendix D Glossary The following definitions are used in this document. Term AP API CPA Enrolment MAS MDM OS PP Push Notification SC Security Characteristic VPN Definition Architectural Pattern Application Programming Interface Commercial Product Assurance. A scheme run by CESG providing certificate-based assurance of commercial security products. Creation of a trusted relationship between a mobile device and an MDM Server. Mobile Application Store Mobile Device Management Operating System Protection Profile Simple message sent from MDM Server to MDM client using Internet based data channel. Security Characteristic A standard which describes necessary mitigations which must be present in a completed product, its evaluation or usage, particular to a type of security product. Virtual Private Network SECURITY CHARACTERISTIC: Mobile Device Management Page 12 of 12
CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES
CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES Version 1.1 Crown Copyright 2016 All Rights Reserved 44335885 Page 1 of 6 About this document This document describes the features,
CPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE
12040940 CPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE Version 0.3 Crown Copyright 2012 All Rights Reserved CPA Security Characteristics for Data Sanitisation - Flash Based Storage
CPA SECURITY CHARACTERISTIC IPSEC VPN GATEWAY
CPA SECURITY CHARACTERISTIC IPSEC VPN GATEWAY Version 2.5 Crown Copyright 2016 All Rights Reserved 48770392 Page 1 of 25 About this document This document describes the features, testing and deployment
CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC)
CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC) Version 1.0 Crown Copyright 2016 All Rights Reserved Page 1 Document History Version Date Description 1.0 October 2013 Initial issue Soft copy
CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT
26579500 CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the features, testing and deployment
CPA SECURITY CHARACTERISTIC IPSEC VPN FOR REMOTE WORKING SOFTWARE CLIENT
24419250 CPA SECURITY CHARACTERISTIC IPSEC VPN FOR REMOTE WORKING SOFTWARE CLIENT Version 2.1 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the
CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT
29175671 CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT Version 1.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the
UNCLASSIFIED CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION. Version 1.0. Crown Copyright 2012 All Rights Reserved.
CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION Version 1.0 Crown Copyright 2012 All Rights Reserved Page 1 Document History Version Date Description 0.1 June 2012 Initial Draft Version 1.0 July
CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS
CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS Issue 1.1 Crown Copyright 2015 All Rights Reserved 1 of 9 Document History Version Date Description 0.1 November 2012 Initial Draft Version
End User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
Guidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
CPA SECURITY CHARACTERISTIC ENTERPRISE MANAGEMENT OF DATA AT REST ENCRYPTION
UNCLASSIFIED 24426399 CPA SECURITY CHARACTERISTIC ENTERPRISE MANAGEMENT OF DATA AT REST ENCRYPTION Version 1.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 UNCLASSIFIED Enterprise Management
Samsung SDS Co., LTD Samsung SDS CellWe EMM (MDMPP11) Security Target
Samsung SDS Co., LTD Samsung SDS CellWe EMM (MDMPP11) Security Target Version 0.6 2015/05/08 Prepared for: Samsung SDS 123, Olympic-ro 35-gil, Songpa-gu, Seoul, Korea 138-240 Prepared By: www.gossamersec.com
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved
18570909 CPA SECURITY CHARACTERISTIC REMOTE DESKTOP Version 1.0 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for CPA Security Characteristic Remote Desktop 1.0 Document History
CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY
3166116 CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 MIKEY-SAKKE Secure VoIP gateway About this document This document
Extended Package for Mobile Device Management Agents
Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes
Protection Profile for Mobile Device Management
31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes and clarifications to front-matter 2.0 31 December 2014
October 2015 Issue No: 1.1. Security Procedures Windows Server 2012 Hyper-V
October 2015 Issue No: 1.1 Security Procedures Windows Server 2012 Hyper-V Security Procedures Windows Server 2012 Hyper-V Issue No: 1.1 October 2015 This document describes the manner in which this product
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Site to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Guidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
Assurance Activities Report for a Target of Evaluation. Security Target (Version 0.9)
Assurance Activities Report for a Target of Evaluation Cisco Integrated Services Router (ISR) 800 Series Security Target (Version 0.9) Assurance Activities Report (AAR) Version 1.0 10/31/2014 Evaluated
DoD ANNEX FOR MOBILE DEVICE MANAGEMENT (MDM) PROTECTION PROFILE Version 1, Release 1. 14 February 2014
DoD ANNEX FOR MOBILE DEVICE MANAGEMENT (MDM) PROTECTION PROFILE Version 1, Release 1 14 February 2014 Trademark Information Names, products, and services referenced within this document may be the trade
Security Policy. Security Policy. www.clickmeeting.com
Security Policy www.clickmeeting.com 1 Introduction ClickMeeting is a worldwide, solid and easy to use SaaS platform. It s core was constructed with the hi-end technology. Data security the highest priority
End User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
WHITE PAPER COMBATANT COMMAND (COCOM) NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B
COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B TABLE OF CONTENTS COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B NSA COMMERCIAL SOLUTION FOR CLASSIFIED
iphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
Citrix Password Manager, Enterprise Edition Version 4.5
122-B COMMON CRITERIA CERTIFICATION REPORT No. CRP235 Citrix Password Manager, Enterprise Edition Version 4.5 running on Microsoft Windows and Citrix Presentation Server Issue 1.0 June 2007 Crown Copyright
Samsung KNOX 2. UK Government EUD Guidance Whitepaper
Samsung KNOX 2 UK Government EUD Guidance Whitepaper December 2014 Copyright Notice Copyright 2014 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung Electronics
Thales Service Definition for IL3 Encrypted Overlay for Cloud Services
Thales Service Definition for UK IL3 Encrypted Overlay Thales Service Definition for IL3 Encrypted Overlay for Cloud Services April 2014 Page 1 of 11 Thales Service Definition for UK IL3 Encrypted Overlay
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Microsoft Windows Common Criteria Evaluation
Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows RT Microsoft Windows Server 2012 IPsec VPN Client Security Target Document Information Version Number 1.0 Updated On January
Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance
Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance Juniper Networks, Inc. 1 Table of Contents Before we begin... 3 Configuring IKEv2 on IVE... 3 IKEv2 Client Side Configuration on Windows
Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64
122-B CERTIFICATION REPORT No. CRP250 Business Intelligence Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on update 5 Issue 1.0 June 2009 Crown Copyright 2009 All Rights Reserved Reproduction
Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved
NCP Secure Client Juniper Edition Service Release: 9.30 Build 102 Date: February 2012 1. New Features and Enhancements The following describe the new features introduced in this release: Visual Feedback
UNCLASSIFIED CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION. Version 1.1. Crown Copyright 2011 All Rights Reserved
11590282 CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION Version 1.1 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for software full disk encryption Document History [Publish
National Security Agency Perspective on Key Management
National Security Agency Perspective on Key Management IEEE Key Management Summit 5 May 2010 Petrina Gillman Information Assurance (IA) Infrastructure Development & Operations Technical Director National
UNCLASSIFIED 12686381
12686381 CPA SECURITY CHARACTERISTIC IP FILTERING FIREWALLS Version 1.1 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for IP Filtering firewalls 26/07/2011 Document History Version
Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances
122 CERTIFICATION REPORT No. CRP294 Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances Issue 1.0 November 2015
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
Protection Profile for Network Devices
Protection Profile for Network Devices Information Assurance Directorate 08 June 2012 Version 1.1 Table of Contents 1 INTRODUCTION... 1 1.1 Compliant Targets of Evaluation... 1 2 SECURITY PROBLEM DESCRIPTION...
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F
Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues
NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:
Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
PULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
Remote Connectivity for mysap.com Solutions over the Internet Technical Specification
Remote Connectivity for mysap.com Solutions over the Technical Specification June 2009 Remote Connectivity for mysap.com Solutions over the page 2 1 Introduction SAP has embarked on a project to enable
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
Certification Report
Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Mobile Billing System Security Target
Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing
SharePlus Enterprise: Security White Paper
INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with
October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
Service "NCPCLCFG" is not running In this case, increase the WaitForConfigService setting until the problem is circumvented
NCP Secure Client Juniper Edition Service Release: 9.30 Build 186 Date: July 2012 1. New Features and Enhancements The following describes the new feature introduced in this release: Configurable Service
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Public-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
Network Address Translation (NAT) Good Practice Guideline
Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku
Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Cisco Intercloud Fabric Security Features: Technical Overview
White Paper Cisco Intercloud Fabric Security Features: Technical Overview White Paper May 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
Payment Transactions Security & Enforcement
Payment Transactions Security & Enforcement A REPORT FROM NEWNET COMMUNICATION TECHNOLOGIES, LLC Copyright NewNet Communication Technologies, LLC. 700 East Butterfield Road, Suite 350, Lombard, IL 60148
Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W
Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing
PSN compliant remote access Whitepaper
PSN compliant remote access Whitepaper March 2015 www.celestix.com/directaccess DirectAccess and IPsec connectivity in the public sector Mobile working in the public sector is nothing new but in recent
Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -
Security - 1 - OPC UA - Security Security Access control Wide adoption of OPC SCADA & DCS Embedded devices Performance Internet Scalability MES Firewalls ERP Communication between distributed systems OPC
Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service.
i Compliant Fully managed Encryption Overlay service enabling data sharing across secure networks. Provides operational efficiencies and cost savings through simplified procurement Get Better Protected...
Service Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces
Introduction An Overview of the D Industrial Router Product Line Secure Access with VPN Technology in Industrial Networks Outlining the IPsec and VPN capabilities available in the GarrettCom D series of
2014 IBM Corporation
2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session
Security Requirements for Network Devices
Security Requirements for Network Devices Information Assurance Directorate 10 December 2010 Version 1.0 Table of Contents 1 INTRODUCTION... 1 1.1 Compliant Targets of Evaluation... 1 2 SECURITY PROBLEM
How To Test A Toe For Security
Supporting Document Mandatory Technical Document Evaluation Activities for Network Device cpp September-2014 Version 0.1 CCDB- Foreword This is a supporting
Policy and Profile Reference Guide
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy
Samsung Mobile Security
Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise
Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1
Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller July 24, 2015 Version 1 1 Table of Contents 1 Introduction... 4 1.1 Conformance Claims...4 1.2 How to
Virtual Private Networks (VPN) Connectivity and Management Policy
Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections
A Comparison of Protocols for Device Management and Software Updates
B L A C K B E R R Y M 2 M S O L U T I O N S A Comparison of Protocols for Device Management and Software Updates In the last two decades, the number of connected computing devices has grown at a staggering
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
