Details for the structure and content of the ETR for Site Certification. Version 1.0



Similar documents
BSI-DSZ-CC-S for. Dream Chip Technologies GmbH Germany. Dream Chip Technologies GmbH

BSI-DSZ-CC-S for. GLOBALFOUNDRIES Singapore Pte. Ltd. GLOBALFOUNDRIES Singapore Pte. Ltd.

Common Methodology for Information Technology Security Evaluation. Evaluation methodology. September Version 3.1 Revision 4 CCMB

ETSI TS : Electronic Signatures and Infrastructures (ESI): Policy

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD

Certification Report

BSI-DSZ-CC for. tru/cos tacho v1.1. from. Trueb AG

Joint Interpretation Library. ETR-lite for composition : Annex A Composite smartcard evaluation : Recommended best practice. IC and ES composition

Protection Profile Digital Tachograph Vehicle Unit (VU PP) Version 1.0 BSI-CC-PP

Supporting Document Guidance. Smartcard Evaluation. February Version 2.0 CCDB

BSI-DSZ-CC for. Oracle Database 11g Release 2 Enterprise Edition. from. Oracle Corporation

BSI-DSZ-CC for

BSI-DSZ-CC for. NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3. from. NXP Semiconductors Germany GmbH

Joint Interpretation Library. Guidance for smartcard evaluation

Guidelines for Developer Documentation

BSI-DSZ-CC for. Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version (including Service Pack 1)

CERTIFICATION REPORT

BSI-DSZ-CC For. Microsoft Windows Server 2008 R2 Hyper-V, Release from. Microsoft Corporation

Security IC Platform Protection Profile

BSI-DSZ-CC for. IBM Tivoli Access Manager for e-business version FP4 with IBM Tivoli Federated Identity Manager version 6.2.

Certification Report. NXP J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, and J2E082_M65 Secure Smart Card Controller Revision 3

BSI-DSZ-CC for. Microsoft Forefront Threat Management Gateway 2010 Version / Build from. Microsoft Corporation

Common Criteria for Information Technology Security Evaluation. Part 3: Security assurance components. September Version 3.

Build a CC assurance package dedicated to your risk assessment. Francois GUERIN Security Program Manager francois.guerin@gemalto.

Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium , Miami Beach FL / USA

BSI-DSZ-CC for. JBoss Enterprise Application Platform 5 Version and from. Red Hat

JTEMS A Community for the Evaluation and Certification of Payment Terminals

BSI-DSZ-CC for. Digital Tachograph EFAS-4.0, Version 02. from. intellic GmbH

Smartcard IC Platform Protection Profile

BSI-DSZ-CC for. MN67S150 Smart Card IC Version RV08 including IC Dedicated Software. from. Panasonic Semiconductor Solutions Co., Ltd.

Supporting Document Guidance. ETR template for composite evaluation of Smart Cards and similar devices. September Version 1.

SAMSUNG SDS FIDO Server Solution V1.1 Certification Report

Technical information on the IT security certification of products, protection profiles and sites

COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES

Lessons learnt in writing PP/ST. Wolfgang Killmann T-Systems

Application of ALC requirements to Open Source projects

C033 Certification Report

Protection Profile for UK Dual-Interface Authentication Card

BSI-DSZ-CC for

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April Version 2.

BSI-DSZ-CC for. LANCOM Systems Operating System LCOS 8.70 CC with IPsec VPN. from. LANCOM Systems GmbH

Courtesy Translation

Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report

Fingerprint Spoof Detection Protection Profile

Certification Report. Utimaco Safeware AG. debiszert-dsz-itsec SafeGuard Sign&Crypt, Version 2.0. The Modern Service Provider

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

BSI-CC-PP for. Cryptographic Modules, Security Level "Enhanced", Version from. Bundesamt für Sicherheit in der Informationstechnik

Low Assurance Protection Profile for a VPN gateway

Certification Report

BSI-PP for. Protection Profile Secure Signature-Creation Device Type 1, Version developed by

Low Assurance Protection Profile for a VoIP Infrastructure

Certification Report

Certification Report BSI-DSZ-CC for. Renesas AE45C1 (HD65145C1) Smartcard Integrated Circuit Version 01. from. Renesas Technology Corp.

Certification Report

CERTIFICATION REPORT

BSI-DSZ-CC for

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. August Version 2.

Common Criteria Protection Profile. electronic Health Card (ehc) elektronische Gesundheitskarte (egk) BSI-PP-0020-V MA01

Security Target. Astaro Security Gateway V8 Packet Filter Version Assurance Level EAL4+ Common Criteria v3.1

BSI-DSZ-CC for. Red Hat Enterprise Linux, Version 6.2 on IBM Hardware for Power and System z Architectures. from. Red Hat, Inc.

Certification Report

C015 Certification Report

Common Criteria Protection Profile

Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs

Certification Report

Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP)

Conformance test specification for BSI-TR Biometrics for public sector applications

Certification Report StoneGate FW/VPN 5.2.5

Certification Report

Security Standards BS7799 and ISO17799

Joint Interpretation Library

BSI-PP for. Smart Card Security User Group Smart Card Protection Profile (SCSUG-SCPP) Version 3.0. developed by

Certification Report

Certification Report

Certification Report

Biometrics for Public Sector Applications

Common Criteria V3.1. Evaluation of IT products and IT systems

ISO The international IT security standard. Marcel Weinand / Marcel Weinand

Information Technology Security Evaluation Manual

Certification Report

EXIN Information Security Management Advanced

Certification Report

Spoof Detection and the Common Criteria

Transcription:

Details for the structure and content of the ETR for Site Certification Version 1.0

Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 22899 9582-111 E-Mail: zerti@bsi.bund.de Internet: https://www.bsi.bund.de Bundesamt für Sicherheit in der Informationstechnik 2010

Table of Content Table of Content 1 Background...5 2 Specific References...6 3 Application notes and interpretation...7 3.1 Site Evaluation Information...7 3.2 Deliverables...8 3.3 Evaluated configuration...8 3.4 ETR-Parts...8 3.5 Errors and inconsistencies...9 3.6 Further directions and recommendations...9 3.7 Re-evaluation and reuse...9 3.8 Final verdict of the Security Evaluation Facility...9 4 Comments...11 5 Annexes...12 5.1 List of Abbreviations and Glossery...12 5.2 Sources...12 5.3 ETR-Parts and additional evaluators's documentation...13 Bundesamt für Sicherheit in der Informationstechnik 3

Background 1 1 Background Site visits have been part of all TOE certifications of the Common Criteria (ISO/IEC 14508). Within Version 3.1 the site certification process was established, which allows a TOE external site handling. This document describes in chapter 3, 4 and 5 how to write an ETR as part of the Site Certification process. Bundesamt für Sicherheit in der Informationstechnik 5

2 Specific References 2 Specific References 1. CC, Part 3, [1] 2. CEM [2] 3. CCDB [3] 4. AIS 19 [4] 5. AIS 32 [5] 6. CCMC [6] 7. PP 0035 [7] 8. Evaluation Deliverables (see section 5.2.) 9. Evaluation Reports and additional Documentation by the Evaluators (see section 5.2.) 6 Bundesamt für Sicherheit in der Informationstechnik

ETR for Site Certification 3 3 ETR for Site Certification The following table includes all relevant data of the document: Name Value Filename Current version Date Classification (Confidential) Site name (long) Site name (short) Sponsor (long) Sponsor (short) Certification ID Certification body (long) Certification body (short) 3.1 Site Evaluation Information 3.1.1 Site under evaluation The description of the site under evaluation must include the physical and logical scope. This comprises: Address of the site which is subject to this site evaluation project is. Service provided by the site (e.g. assembly and embedding) as well as the logical scope of the evaluation. 3.1.2 Persons involved Persons who were involved in the evaluation process: Sponsor: Address of sponsors of this site evaluation. Address of whom the evaluation deliverables are provided. Evaluators/Evaluation Facility: Bundesamt für Sicherheit in der Informationstechnik 7

3 ETR for Site Certification By whom the evaluation was performed and their companies address. Certification Body: By whom of the certification body the evaluation was accompanied by: Address and name of Certification Body. 3.1.3 Timetable of evaluation The time-frame when the evaluation took place. 3.1.4 Evaluation basis The evaluation basis upon this report is based on shall be listed here (e.g. the CC version, supporting documents, AIS). The certification ID is recorded here. The evaluation deliverables and further documents used during the evaluation are listed in 5.2. Sources. 3.2 Deliverables The current evaluation is a site evaluation and therefore the only deliverables existing is the internal documentation of the site as provided during the evaluation and as referred to in the referred document list. However this chapter shall describe if guidance is provided by the site. The guidance may be needed to comply with specific requirements needed to comply with the evaluated processes or to use specific services that were in the scope of the evaluation. 3.3 Evaluated configuration 3.3.1 Description of the site This chapter shall include a short summary of the scope of evaluation considering separate premises of the same site involved in the evaluation if applicable. The description shall include possible options of the services provided by the site and information on the delivery of the output. In addition it shall be address if all transfers of configuration items are considered as internal transport or if the site is involved in the delivery to customers. The site description can be cited from the Site Security Target. Further on describe how the site is involved in the production process of the TOE, how the site is related to the TOE configurations, which life cycle phase is covered, how the TOE is traced during production. Describe, by whom the transport of the TOE is organised and labelled and how it is controlled by the client. 3.4 ETR-Parts The ETR-Parts and additional evaluator s documentation shall be referenced in section 5.3. 8 Bundesamt für Sicherheit in der Informationstechnik

3.4.1 List of ETR-Parts ETR for Site Certification 3 Documentation and additional Evaluation Documentation worked out by the evaluators shall be listed here. 3.4.2 Results of the ETR-Parts The verdict of each ETR-Part should be presented here as a table. 3.4.3 Open issues from the ETR-parts. Open issues from the ETR-parts should be stated here. 3.4.4 Addenda to the ETR-Parts 3.4.4.1 Addendum to the ETR-Part AST The developer had updated the Site Security Target during the generation of the Site Security Target Lite. The impact on the evaluation results provided in ETR-Part AST shall be stated here. During the examination the evaluator compared the Security Target with the Site Security Target Lite. The Site Security Target Lite complies with the requirements of [3]. Therefore the evaluators determine the Site Security Target Lite is a correct sanitised version of the Site Security Target. 3.5 Errors and inconsistencies To collect all errors and inconsistencies the evaluators shall review the respective section of each ETR-Part. Errors or the status of error finding shall be listed here. 3.6 Further directions and recommendations 3.6.1 Imposed conditions and directions to the developer. Imposed conditions and directions to the developer shall be listed here. If none was stated, this should also be claimed. 3.6.2 Recommendations and directions to the user The relevant information or reference for using the evaluated site is given in this section. This is related to the usage of the site in the production flow for a specific product. These recommendations and directions can include a list of assumptions which reflect the expectations of the site. The assumptions of the Site Security Target shall be reproduced in this chapter including further explanatory notes of the evaluator if needed. Note that the assumptions do not cover requirements of the environment of the site under evaluation they cover requirements that must be addressed by the product developer who wants to use the site. Bundesamt für Sicherheit in der Informationstechnik 9

3 ETR for Site Certification 3.7 Re-evaluation and reuse The results of this site evaluation and the resulting site certificate are to be re-used in TOE evaluations. The main information for the integration of the site evaluation into a product evaluation is provided in the Site Security Target. Note that especially the assumptions given in section 6.2 of the SST shall be followed when re-using the results of this site evaluation. 3.8 Final verdict of the Security Evaluation Facility All changes impacting already completed ETR-Parts shall be discussed in chapter 3.4. of this document. Therefore the evaluators shall confirm that all results given in chapters 3.4. are still valid. The errors and inconsistencies that may be listed in chapter 3.5., the further directions and recommendations of chapter 3.6., and the information on re-evaluation and reuse as given in chapter 3.7. shall be a complete summary as gained from the ETR-Parts. Based on the results of the ETR-Parts the evaluators may come to the following final verdict: - The life cycle part of the site described in the SST should fulfil the requirements as stated in the documentation. - All security objectives contained in the SST should be achieved. - The life cycle security assurance requirements as stated in the SST for the site shall be listed here.: - The life cycle part as evaluated for the site and its integration into product evaluations is quoted against the claim of attack potential. The chapter shall include the conclusion of the site evaluation regarding the statements on evaluation assurance level and the chosen security assurance requirements. Not e that a site evaluation cannot comply to a complied evaluation assurance level because the site certification can only include security assurance requirements of the class ALC. It shall be explicitly stated if security assurance requirements are not completely addressed by the site, e.g. for ALC_DEL or ALC_TAT. Signatures have to be given from the: Author/s, Evaluator/s, Evaluation manager, Person responsible for the quality assurance of the ETR 10 Bundesamt für Sicherheit in der Informationstechnik

Comments 4 4 Comments Comments shall be stated here. Bundesamt für Sicherheit in der Informationstechnik 11

5 Annexes 5 Annexes 5.1 List of Abbreviations and Glossery ALC AST CC CM CMC CMS CCDB DEL DVS ETR LCD PP SAR SSS SST TAT UID CC Assurance Class for Life Cycle Support CC Assurance Class for Site Security Target Evaluation Common Criteria Configuation Management CC Assurance Family ALC_CMC for CM Capabilities CC Assurance Family ALC_CMS for CM Scope Common Criteria Development Board CC Assurance Family ALC_DEL for Delivery Procedures CC Assurance Family ALC_DVS for Development Security Evaluation Technical Report CC AssuranceFamily ALC_LCD for Life Cycle Definition Protection Profile Security Assurance Requirement Site Summary Specification (Section of the SST) Site Security Target CC Assurance Family ALC_TAT for Tools and Techniques Unique Identification number, stored in the product Table 1: List of abbreviations The list of abbreviations shall be expanded on demand. 5.2 Sources Evaluation basis: Criteria and Methodology [1] Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance Requirements; Version 3.1, Revision 3, July 2009 12 Bundesamt für Sicherheit in der Informationstechnik

[2] Common Methodology for Information Technology Security Evaluation, Evaluation methodology, Version 3.1 Revision 3, July 2009 Annexes 5 [3] Supporting Document Guidance: Site Certification, CCDB-2007-11-001, Bundesamt für Sicherheit in der Informationstechnik, Version 1.0, Revision 1, October 2007 [4] Anwendungshinweise und Interpretationen zum Schema, AIS19, Version 3, 07.05.2009, Bundesamt für Sicherheit in der Informationstechnik [5] Anwendungshinweise und Interpretationen zum Schema, AIS25, Version 5, 02.04.2007, Bundesamt für Sicherheit in der Informationstechnik [6] Policies and Procedures: ST sanitising for publication, Document Number: 2006-04-004, Version 1.0, April, 2006, Common Criteria Management Committee [7] Security IC Platform Protection Profile, Version 1.0, 15.06.2007, registered and certified by Bundesamt für Sicherheit in der Informationstechnik (BSI) under the reference BSI-CC-PP- 0035 Evaluation Deliverables The Site Security Target Lite, the Site Security Target and all other developer documents shall be listed here. Evaluation Reports and additional Documentation by the Evaluators The ETR Part AST, the ETR part ALC and the site visit report shall be listed here. 5.3 ETR-Parts and additional evaluators's documentation These documents are not part of this Word-file but delivered as distinguished files resp. appended in Paper form. Bundesamt für Sicherheit in der Informationstechnik 13