Trust Technology Assessment Program. Validation Report



Similar documents
DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments

Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3)

McAfee Web Gateway Version EAL 2 + ALC_FLR.2 Security Target

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

Top Layer Networks. Security Target V2.3

Common Criteria Evaluation for a Trusted Entrust/PKI

Security Target for BorderWare Firewall Server 6.5

Security Target: Symantec Endpoint Protection Version 11.0

How To Protect Your Computer From Being Hacked

Security Target for Citrix Presentation Server 4.0 For Windows

GuardianEdge Data Protection Framework with GuardianEdge Hard Disk Encryption and GuardianEdge Removable Storage Encryption 3.0.

Faculty of Informatics Masaryk University Application-Level Firewall Protection Profile for High Robustness Environments Initial Considerations

Canon ir6570/ir5570 Series ir Security Kit-B3. Security Target

TRUSTED SECURITY FILTER SECURITY TARGET

Intrusion Detection System System Protection Profile

Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report

IBM WebSphere Message Broker Security Target

Teradata Database Version 2 Release (V2R6.1.0) Security Target

BSI-PP for. Smart Card Security User Group Smart Card Protection Profile (SCSUG-SCPP) Version 3.0. developed by

Compucat Research Pty Limited 14 Wales St, Belconnen ACT 2617 ABN

Cisco IronPort S-Series Web Security Appliance Security Target

Multi-Functional Printer (Digital Copier) 7222/7322/7228/7235 Series Security Target Version 10

Red Hat Enterprise Linux 3 (running on specified Dell and Hewlett-Packard hardware) Security Target

Security Target: Symantec Mail Security 8300 Series Appliances Version 5.0

National Information Assurance Partnership

Check Point Endpoint Security Media Encryption Security Target

Mobile Billing System Security Target

How To Manage Security In A Network Security System (Tsi)

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0

Intrusion Detection System Scanner Protection Profile

Network Intrusion Prevention System Protection Profile V1.1

Firewall Protection Profile V

Océ Technologies B.V. Oce Venlo DAC Security Target 3.0.doc

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN

Low Assurance Protection Profile for a VPN gateway

Security Target. Astaro Security Gateway V8 Packet Filter Version Assurance Level EAL4+ Common Criteria v3.1

Firewall Protection Profile

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme

How To Evaluate Watchguard And Fireware V11.5.1

McAfee Web Gateway Version EAL 2 + ALC_FLR.2 Security Target

McAfee Firewall Enterprise v Security Target

Common Criteria for Information Technology Security Evaluation

Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT

Enterasys Dragon-EAL Intrusion Defense System. Security Target

McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 Security Target

Security Target for Cisco Firewall Services Module (FWSM)

F5 Networks BIG-IP Local Traffic Manager 6400 High Availability pair (qty 2) Security Target

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN

EMC Corporation Data Domain Operating System Version Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.

JMCS Northern Light Video Conferencing System Security Target

Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target

F5 Networks FirePass 4100 Version Security Target EAL 2 + ALC_FLR.1, ADV_SPM.1

U.S. Government Protection Profile for Database Management Systems

Security Target. NetIQ Access Manager 4.0. Document Version August 7, Security Target: NetIQ Access Manager 4.0

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT

BSI-PP for. Protection Profile Secure Signature-Creation Device Type 1, Version developed by

AppGate Security Server, Version Security Target. Document Version: 2.9 Date:

Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX FIPS, MPX FIPS, MPX FIPS appliances

Green Hills Software INTEGRITY-178B Separation Kernel Security Target

Security Target for Cisco Remote Access VPN

CERTIFICATION REPORT

FOR EAL2 AUGMENTED WITH ALC_FLR.1. Version: 1.2 November 20, 2013

Certification Report

Security Target. Symantec TM Network Access Control Version Document Version February 14, 2013

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February Version 1.

EAL4+ Security Target

Certification Report. SafeNet Luna PCI configured for use in Luna SA (RF) with Backup

Courtesy Translation

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT

C038 Certification Report

U.S. DoD. Remote Access. Protection Profile. for. High Assurance Environments

ARKOON FAST Firewall v3.0 SECURITY TARGET

Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team

CERTIFICATION REPORT

Certification Report

Extreme Networks, Inc. ExtremeXOS Network Operating System v

Low Assurance Security Target for a Cisco VoIP Telephony System

AUTOMATIC CASH DISPENSERS/ TELLER MACHINES PROTECTION PROFILE. ecf. Version Registered at the French Certification Body under the number PP/9907

HP StoreOnce Backup System Generation 3 Version Security Target

Xceedium GateKeeper Version Security Target

Transcription:

Trust Technology Assessment Program Validation Report U.S. Government Traffic Filter Firewall Protection Profile for Low-Risk Environments version 1.1 TTAP Report Number: TTAP-VR-0007 June, 1999

Mutual Recognition Arrangement of Common Criteria Certificates in the Field of Information Technology Security The Trust Technology Assessment Program (TTAP) Oversight Board is a member of the above Arrangement. As such, it confirms that a Common Criteria certificate has been issued by or under the authority of a Party to this Arrangement and that the certificate has been issued in accordance with the terms of this Arrangement. The judgements contained in the evaluation and this Validation Report are those of the Oversight Board which issues it and of the evaluation facility which carried out the evaluation. There is no implication of acceptance by Members of the Arrangement of liability with respect to judgements or losses sustained as a result of reliance placed upon information contained herein. 2

Executive Summary Production and evaluation of the U.S. Government Traffic Filter Firewall Protection Profile for Low-Risk Environments, version 1.1 was sponsored by the National Institute of Standards and Technology and the National Security Agency. This profile has been designed for use under a Common Criteria Scheme party to the Mutual Recognition Arrangement. It completed evaluation in May, 1999 by Computer Sciences Corporation (an accredited Trust Technology Assessment Program evaluation facility in the United States) and has been shown to be conformant with Part 3 of the Common Criteria for Information Technology Security Evaluation, version 2.0 (CCv2.0) requirements for Protection Profiles. Products found to be compliant with this protection profile meet the minimum security requirements for firewalls used by the U.S. Government handling unclassified information in a low-risk environment. Such devices are capable of screening network traffic at the network and transport protocol levels (i.e., TCP/IP), authenticating authorized administrators for actions taken on the firewall, and auditing security-relevant events that occur through and on the firewall. 3

Introduction This report states the outcome of the IT security evaluation of the U.S. Government Traffic Filter Protection Profile for Low-Risk Environments, Version 1.1 dated April, 1999 (TFPP). It is intended to characterize the nature of the profile and its evaluation to assist potential users when judging the suitability of the PP in the context of their specific requirements. Prospective users are advised to read this report in conjunction with the TFPP which specifies the functional, environmental and assurance requirements for TFPP conformant firewalls. Protection Profile Overview The TFPP comprises functional and assurances requirements. This section of the report characterizes the functional behavior of TFPP compliant products and explicitly identifies the CCv2.0 functional and assurance requirements that have been included. TFPP Functional Characteristics The TFPP defines the minimum security requirements for firewalls used by U.S. Government organizations handling unclassified information in a low-risk environment. Compliant products selectively route information flows among internal and external networks according to a site s security policy rules (defined by the firewall authorized administrator). Only an authorized administrator has the authority to change the security policy rules. Traffic filtering decisions are based on source address, destination address, transport layer source port, transport layer destination port and the network from which packets arrive. Administration of a firewall may be provided locally or remotely. If performed locally, the authorized administrators must identify and authenticate before accessing the TOE (e.g., name and password). If the firewall provides the capability for remote administration, then authorized administrators must identify and authenticate themselves using a single use authentication mechanism (e.g., name and one time password). Upon authentication via a remote means, administrative traffic is protected via a trusted channel using U.S. Nationally approved encryption (i.e., FIPS PUB 140-1 compliant) algorithms and modules. TFPP Compliant firewalls provide auditing functions to record firewall security relevant events. Audit trail data is stamped with a dependable date and time of action. Auditable events include modifications to the group of users associated with the authorized administrator role, all use of the identification/authentication mechanism, and all information flow control decisions made by the firewall according to the security policy. Common Criteria Requirements The TFPP comprises functional and assurance requirements. Functional requirements drawn from Part 2 of CCv2.0 included in this PP are: Cryptography for Remote Administration FCS_COP.1 Routing Information Flow Control FDP_IFC.1, FDP_IFF.1 Authorized Administrator (I/A and FIA_UAU.1, FIA_UAU.4 required administrative FIA_UID.1, functions) FIA_ATD.1, FMT_SMR.1, 4

Object Reuse Prevention Non-Bypassability, Domain Separation Protection by Default FIA_AFL.1 FDP_RIP.1 FPT_RVM, FPT_SEP.1 FMT_MSA.3 Assurance requirements drawn from Part 3 of the CCv2.0 included in this PP are the requirements which comprise the Evaluation Assurance Level 2 (EAL2). They are: Configuration Management ACM_CAP.2 Delivery ADO_DEL.1 Installation ADO_IGS.1 Functional Specification ADV_FSP.1 High Level Design ADV_HLD.1 Design Representation Correspondence ADV_RCR.1 Administrative Security Guidance AGD_ADM.1 User Security Guidance AGD_USR.1 Functional Testing ATE_COV.1, ATE_FUN.1, ATE_IND.2 Search for Obvious Vulnerabilities AVA_VLA.1 Probabilistic Security Feature Strength of Function AVA_SOF Evaluation Results The TFPP evaluation was performed by Computer Sciences Corporation in the United States. It was completed and certified by the TTAP Oversight Board in April, 1999. The evaluation was carried out in accordance with requirements drawn from CCv2.0, Part 3, Class APE: Protection Profile Evaluation. 1 A CCv2.0 PP evaluation using these requirements comprises the following evaluator activities: Evaluation of the TOE Description APE_DES.1 Evaluation of the Security Environment APE_ENV.1 Evaluation of the PP Introduction APE_INT.1 Evaluation of the Security Objectives APE_OBJ.1 Evaluation of the IT Security Requirements APE_REQ.1 Evaluation of Explicitly (i.e., non-cc) stated requirementsape_sre.1. Application of these requirements in the context of a CCv2.0 PP evaluation offers assurance that the TFPP contains requirements that are: a) justifiably included to counter stated threats and meet realistic security objectives, b) internally consistent and coherent and c) technically sound. 1. A draft version of the Common Evaluation Methodology (version 0.6) was used as input into the evaluation. Because of its draft nature, strict compliance to this draft version was not required. 5

1. Common Criteria Part 1, Common Criteria Implementation Board CCIB-98-026, Version 2.0, May 1998. 2. Common Criteria Part 2, Common Criteria Implementation Board, CCIB-98-027, Version 2.0, May 1998. 3. Common Criteria Part 3, Common Criteria Implementation Board, CCIB-98-028, Version 2.0, May 1998. References 4. [DRAFT] Common Evaluation Methodology, Common Evaluation Methodology Editorial Board, CEMEB-99/08, Version 0.6, January 1999. 5. Security Requirements for Cryptographic Modules National Institute of Standards and Technology, FIP PUB 140-1, January 1994. 6. U.S. Government Traffic Filter Firewall Protection Profile for Low-Risk Environments National Security Agency/National Institute of Standards and Technology Version 1.0, April 1999. 6