CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY



Similar documents
CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT

CPA SECURITY CHARACTERISTIC ENTERPRISE MANAGEMENT OF DATA AT REST ENCRYPTION

CPA SECURITY CHARACTERISTIC IPSEC VPN FOR REMOTE WORKING SOFTWARE CLIENT

UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved

UNCLASSIFIED

CPA SECURITY CHARACTERISTIC IPSEC VPN GATEWAY

UNCLASSIFIED CPA SECURITY CHARACTERISTIC WEB APPLICATION FIREWALLS. Version 1.3. Crown Copyright 2011 All Rights Reserved

UNCLASSIFIED CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION. Version 1.1. Crown Copyright 2011 All Rights Reserved

CPA SECURITY CHARACTERISTIC GATEWAY ENCRYPTION

CPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE

UNCLASSIFIED CPA SECURITY CHARACTERISTIC SERVER VIRTUALISATION. Version Crown Copyright 2012 All Rights Reserved

CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION

CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT

UNCLASSIFIED CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION. Version 1.0. Crown Copyright 2012 All Rights Reserved.

BlackBerry 10.3 Work and Personal Corporate

October 2015 Issue No: 1.1. Security Procedures Windows Server 2012 Hyper-V

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC)

Guidance Regarding Skype and Other P2P VoIP Solutions

October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services

CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS

Payment Card Industry (PCI) Terminal Software Security. Best Practices

End User Devices Security Guidance: Apple ios 8

Central Agency for Information Technology

Acano solution. Security Considerations. August E

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

90% of data breaches are caused by software vulnerabilities.

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

HMRC Secure Electronic Transfer (SET)

Oracle Business Intelligence Enterprise Edition (OBIEE) Version with Quick Fix running on Oracle Enterprise Linux 4 update 5 x86_64

SIP Security Controllers. Product Overview

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Securing SIP Trunks APPLICATION NOTE.

Guidance End User Devices Security Guidance: Apple ios 7

Information security controls. Briefing for clients on Experian information security controls

VOICE OVER IP SECURITY

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

U06 IT Infrastructure Policy

BYOD Guidance: BlackBerry Secure Work Space

Applying Cryptography as a Service to Mobile Applications

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

UNCLASSIFIED Version 1.0 May 2012

Cloud Computing Security Considerations

Egress Switch Best Practice Security Guide V4.x

Newcastle University Information Security Procedures Version 3

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

USB Portable Storage Device: Security Problem Definition Summary

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Best Practices for SIP Security

Recommended IP Telephony Architecture

INFORMATION TECHNOLOGY SECURITY STANDARDS

Client Server Registration Protocol

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Courtesy Translation

Policy Document. Communications and Operation Management Policy

Thick Client Application Security

05.0 Application Development

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

WEB SERVICES SECURITY

Ciphire Mail. Abstract

Technical Standards for Information Security Measures for the Central Government Computer Systems

EA-ISP-012-Network Management Policy

Service Definition Document

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf (Team Lead) Imran Bashir Khadija Akram

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide

USB Portable Storage Device: Security Problem Definition Summary

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

GE Measurement & Control. Cyber Security for NEI 08-09

Voice Over IP (VoIP) Denial of Service (DoS)

C015 Certification Report

Criteria for web application security check. Version

How To Manage Security On A Networked Computer System

CRYPTOGRAPHY AS A SERVICE

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

How To Secure An Rsa Authentication Agent

Chap. 1: Introduction

Integrating VoIP Phones and IP PBX s with VidyoGateway

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

IY2760/CS3760: Part 6. IY2760: Part 6

Where every interaction matters.

Why you need secure

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

SecureDoc Disk Encryption Cryptographic Engine

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

Security and the Mitel Teleworker Solution

HP PROTECTTOOLS RELEASE MANAGER

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1

DOMAIN NAME SECURITY EXTENSIONS

PENTEST. Pentest Services. VoIP & Web.

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

A Rackspace White Paper Spring 2010

Standard Information Communications Technology. Videoconferencing. January2013 Version 1.4. Department of Corporate and Information Services

External Supplier Control Requirements

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Transcription:

3166116 CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1

MIKEY-SAKKE Secure VoIP gateway About this document This document describes the features, testing and deployment requirements necessary to meet CPA certification for MIKEY-SAKKE Secure Gateway security products. It is intended for vendors, system architects, developers, evaluation and technical staff operating within the security arena. Section 1 is suitable for all readers. It outlines the purpose of the security product and defines the scope of the Security Characteristic. Section 2 and Section 3 describe the specific mitigations required to prevent or hinder attacks for this product. Some technical knowledge is assumed. For more information about CPA certification, refer to The Process for Performing CPA Foundation Grade Evaluations [a]. Document history The CPA Authority may review, amend, update, replace or issue new Scheme Documents as may be required from time to time. Soft copy location: DiscoverID 3166116 Version Date Description 2.0 11/2013 Publication This document is derived from the following Security Characteristic (SC) Maps. SC Map MIKEY-SAKKE Secure VoIP Gateway 2.0.2 Common Libraries 2.0.4 Crypt Libraries 2.0.4 Secure Voice Libraries 2.0.2 Map version Contact CESG This document is authorised by: Deputy Technical Director (Assurance), CESG. For queries about this document please contact: CPA Administration Team CESG, Hubble Road Cheltenham Gloucestershire GL51 0EX, UK Email: cpa@cesg.gsi.gov.uk Tel: +44 (0)1242 221 491 UNCLASSIFIED Page 2

Contents Section 1 Overview......... 4 1.1 Introduction... 4 1.2 Product description... 4 1.3 Typical use cases... 5 1.4 Expected operating environment... 6 1.5 Compatibility... 6 1.6 Interoperability... 6 1.7 Variants... 7 1.8 Additional threat information... 7 1.9 High level functional components... 8 1.10 Future enhancements... 9 Section 2 Security Characteristic Format...... 10 2.1 Requirement categories... 10 2.2 Understanding mitigations... 10 Section 3 Requirements......... 11 3.1 Development mitigations... 11 3.2 Verification mitigations... 16 3.3 Deployment mitigations... 17 Appendix A References......... 19 Appendix B Glossary......... 20 UNCLASSIFIED Page 3

Section 1 Overview 1.1 Introduction This document is a CPA Security Characteristic. It describes requirements for assured MIKEY- SAKKE [b] Secure Gateway products for evaluation and certification under CESG s Commercial Product Assurance (CPA) scheme. 1.2 Product description Secure Voice over IP (VoIP) clients using MIKEY-SAKKE for identity based encryption can be used to make secure voice calls over untrusted networks. A MIKEY-SAKKE Secure Gateway can provide multiple methods to enable MIKEY-SAKKE VoIP communications between devices by implementing at least one of the two following methods: providing a method to allow data to flow between a VoIP client which does not support MIKEY-SAKKE and one that does by converting between MIKEY-SAKKE protected data streams and unencrypted RTP data streams (described below as a Type 1 Gateway) providing a method of terminating the MIKEY-SAKKE security association and reestablishing it between disparate MIKEY-SAKKE devices (described below as a Type 2 Gateway) and optionally: Reducing bandwidth and processing requirements by only using a limited subset of the RTP protocol over the gateway (typically both the caller and recipient s ID and the voice data) Routing RTP traffic between networks of the same classification but also supporting MIKEY- SAKKE, allowing several calling domains to be joined (described below as a Type 3 Gateway) The gateway is also expected to support both Dial Through 1 and Dial Into 2 dialling plans to ensure compatibility with the network dialling plan that it is being deployed into. The gateway may be used to provide functional connectivity between multiple MIKEY-SAKKE or unencrypted content networks of the same protection level 3. However, it does not aim to mitigate the risk of connecting networks at different protection levels. The gateway must also support the ability to acquire new certificates from a Key Management Server (KMS) once deployed; how this key acquisition is implemented is out of the scope for this document. 1 Where a device is able to directly dial another device on a different network 2 Where a device is required to call a gateway, and once connected can then dial the extension required 3 The protection level is a value derived from both the classification of traffic flowing over the network and the risk the network is under from being attacked. UNCLASSIFIED Page 4

UNCLASSIFIED 1.3 MIKEY-SAKKE SAKKE Secure VoIP gateway Typical use cases There are two primary use cases that a MIKEY-SAKKE MIKEY SAKKE Secure VoIP Gateway can be deployed in. in In the following use cases it is assumed that the Key Management Server (KMS) and the gateway are hosted separately. 1.3.1 Type 1 Gateway The MIKEY-SAKKE Secure VoIP Gateway will be be used to allow communications between MIKEYSAKKE enabled and non MIKEY-SAKKE SAKKE enabled devices. The gateway should terminate MIKEYSAKKE encrypted tunnels and deliver RTP to the correct endpoint within the network by acting as a back-to-back user agent. This is is described below as a Type 1 Gateway. Figure 1 Type 1 Gateway Gateway: communication between MS and RTP VoIP clients 1.3.2 Type 2 Gateway This back-to-back user agent gateway will be able to terminate a MIKEY-SAKKE association and re reestablish a new association by potentially using a different KMS. This will enable devices on disparate MIKEY-SAKKE networks to communicate securely without the requirement to share the public keys of other MIKEY-SAKKE KMS servers to devices. MIKEY-SAKKE SAKKE keys will still have to be shared to the gateways (as shown by the established trust link between them in the diagram below) below). This is described below as a Type 2 Gatewayy. Figure 2 Type 2 Gateway: two differentt MS domains communicate, with traffic rekeyed with the destination's MS KMS Gateways can either support one or both of the use cases defined above. UNCLASSIFIED Page 5

UNCLASSIFIED MIKEY-SAKKE SAKKE Secure VoIP gateway The gateway can optionally lly support multiple back-to-back user agent interfaces as described below. This type of product routes RTP traffic between networks of the same classification but also supports MIKEY-SAKKE, allowing several calling domains to be joined. The domains are required to be at the same protection level. Figure 3 Communication between two RTP domains of the same protection level and MS communication to a lower level 1.4 Expected operating environment The MIKEY-SAKKE Secure Gateway is expected to be installed within a physically secure environment and logically sited att the boundary of a security domain, bordering a less trusted network (such as the Internet). erated within the local security In the Type 1 Gateway architecture (see Figure 1), traffic that is generated domain for recipients ecipients outside of the domain will be routed to the gateway. The gateway will then apply confidentiality, integrity and/or authentication cryptographic protection, according to rules determined by the gateway s policy. The resultant traffic will then be sent over the less trusted network to the client endpoints. This process is reversed for traffic inbound from the client to the trusted network. 1.5 Compatibility A security gateway product may exist as either a dedicated hardware device or as one or more software modules, deployed on a general purpose platform. In either case, this Security Characteristic does not place any specific specific hardware requirements upon the product beyond its normal technical requirements. For example, some products may have specific CPU or memory requirements in order to function effectively. This Security Characteristic does not define minimum hardware requirements. No specific requirements are placed on the operating system that hosts a software-based software based MIKEY MIKEYSAKKE Secure Gateway (conforming to this Security Characteristic) other than to allow the product to operate correctly whilst meeting the requirements in Section 3.. This said, there is a general expectation that the product will be compatible with the latest version of a given operating system. 1.6 Interoperability This Security Characteristic assumes that the security gateway conforms to to the specifications for MIKEY-SAKKE SAKKE as described in RFCs 6508, and 6509[b],, for SRTP as described in RFC 3711[c], as well as those for RTP as described in RFC 1889 and 3550[d].. Therefore the security gateway should interoperate with other MIKEY-SAKKE SAKKE devices. UNCLASSIFIED Page 6

MIKEY-SAKKE Secure VoIP gateway This has the benefit of enabling deployments to make use of a range of different MIKEY-SAKKE clients or gateways based on their particular business and technology requirements. As dialling plans in disparate networks could overlap, the gateway must support both Dial Through and Dial Into dialling plans. For usability reasons, Dial Through is preferred. However, it is recognised that overlapping dialling plans in networks could mean that Dial Through is impossible without a large scale re-architecting of either network. In this case, Dial Into should be used. The profiles below detail the cryptographic requirements around the implementations of MIKEY- SAKKE. Gateways must adhere to at least one of the defined profiles (of which there is currently only one). There will be future profiles created to enable MIKEY-SAKKE gateways to bridge different types of connection e.g. messaging and video. The plain text interface 4 is not required to utilise these profiles. 1.6.1 MIKEY-SAKKE voice profile The MIKEY-SAKKE voice profile consists of the following protocols, used with the cryptographic parameter configuration detailed in the Technical Specifications No. 63 A MIKEY-SAKKE / SRTP Profile [e]. Component Protocol Media Protocol SRTP RFC 3711 Key Transport MIKEY-SAKKE RFC 6509 1.6.2 Key Management Server (KMS) Interactions between the secure gateway product and the KMS are not standardised at this time. However, requirements describing the use of key management servers are given in this document at a high level, and any protocols used by the product must demonstrate the specific behaviours. CESG are currently looking to produce an example to meet these requirements, but the example will not be mandatory to follow. 1.7 Variants This Security Characteristic has the following variant type and associated variants: Variant Type: Gateway Platform: o Software Gateway The secure gateway is software that is deployed onto standard server hardware running a general purpose operating system. o Hardware Gateway The secure gateway is a dedicated appliance, for direct deployment into a network. 1.8 Additional threat information This Security Characteristic does not address the threat of devices at either end of the communication being compromised. Additionally, the host platform is assumed to be free of malware; any risk mitigations may not be effective if the host platform has already been compromised. 4 A plain text interface is one in which traffic flowing to and from it is not encrypted. UNCLASSIFIED Page 7

UNCLASSIFIED MIKEY-SAKKE SAKKE Secure VoIP gateway High level functional components 1.9 The following diagram illustrates the various high level functional components within this product. product Components shown with an asterisk(*) represent those relating to specific mitigations listed in Section 3.. These are used to structure the Security Characteristic, and to give context to each mitigation. Figure 4:: Functional co components of a MIKEY-SAKKE Secure Voice Gateway The functional components in Figure 4 are described as follows. Red Interface The connection to a network which does not support MIKEY MIKEY-SAKKE secure voice protocols on the end clients. Red Interface >> IP Red Side IP interface. Red Interface >> RTP When voice traffic is received it is processed as necessary and then handled by the RTP interface. The request is then passed to the Session Encryption component. Black Interface* The connection to a network which is untrusted and has clients supporting MIKEY-SAKKE SAKKE secure voice protocols. Black Interface >> IP Black Side IP interface. Black Interface >> SRTP When secure voice requests are received they are processed as necessary and then handled by the MIKEY-SAKKE MIKEY interface. The request is then passed to the Session Encryption interface Call Handling* Providess the interface with functionality to terminate the SIP call handing protocol. Encryption* Encrypts or decrypts traffic, depending on its source and destination, according to the requirements of the protection level level. Key Acquisition Acquires the MIKEY-SAKKE MIKEY configured profile key required to enable secure communication to occur. occur Key Management* Provides the functionality to use and protect keys provided to the gateway from a KMS server in line with CPA approved techniques. UNCLASSIFIED Page 8

MIKEY-SAKKE Secure VoIP gateway Management Provides the functionality to control and configure the security gateway. Management functionality is restricted to authorised administrators use only through an authentication mechanism. The exact details of this authentication mechanism are beyond the scope of this document, but could be provided by either the product or host operating system. 1.10 Future enhancements CESG welcomes feedback and suggestions on possible enhancements to this Security Characteristic. Future enhancements may also include the addition of Session Border Control (SBC) states to allow MIKEY-SAKKE communication channels between different protection levels. UNCLASSIFIED Page 9

Section 2 Security Characteristic Format 2.1 Requirement categories All CPA Security Characteristics contain a list of mitigations that describe the specific measures required to prevent or hinder attacks. The mitigations are grouped into three requirement categories; design, verification and deployment, and appear in Section 3 of this document in that order. Development mitigations (indicated by the DEV prefix) are measures integrated into the development of the product during its implementation. Development mitigations are checked by an evaluation team during a CPA evaluation. Verification mitigations (indicated by the VER prefix) are specific measures that an evaluator must test (or observe) during a CPA evaluation. Deployment mitigations (indicated by the DEP prefix) are specific measures that describe the deployment and operational control of the product. These are used by system administrators and users to ensure the product is securely deployed and used in practice, and form the basis of the Security Operating Procedures which are produced as part of the CPA evaluation. Within each of the above categories, the mitigations are further grouped into the functional areas that they relate to (as outlined in the High level functional components diagram (Figure 4)). The functional area for a designated group of mitigations is prefixed by double chevron characters ( >> ). For example, mitigations within a section that begins: Development >> Management - concern Development mitigations relating to the Management functional area of the product. Note: Mitigations that apply to the whole product (rather than a functional area within it) are listed at the start of each section. These sections do not contain double chevron characters. 2.2 Understanding mitigations Each of the mitigations listed in Section 3 of this document contain the following elements: The name of the mitigation. This will include a mitigation prefix (DEV, VER or DEP) and a unique reference number. A description of the threat (or threats) that the mitigation is designed to prevent or hinder. Threats are formatted in italic text. The explicit requirement (or group of requirements) that must be carried out. Requirements for foundation grade are formatted in green text. In addition, certain mitigations may also contain additional explanatory text to clarify each of the foundation grade requirements, as illustrated in the following diagram. Name of the mitigation Threat that this mitigation counters Requirements needed For Foundation Grade Explanatory comment for Foundation Grade requirement DEV.M267: Provide an automated configuration tool to enforce required settings This mitigation is required to counter exploitation of an accidental misconfiguration At Foundation Grade the product is required to be provided with a configuration tool, or other method, for an administrator to initially set it up into a suitable configuration. If the product requires more than 12 options to be changed or set by an administrator to comply with these Security Characteristics, the developer must supply a tool or policy template which helps the administrator to achieve this in fewer steps. Figure 5: Components of a typical mitigation UNCLASSIFIED Page 10

Section 3 Requirements This section lists the Development, Verification and Deployment mitigations for the MIKEY-SAKKE Secure Gateway Security Characteristic described hence forth as the product. 3.1 Development mitigations DEV.M41: Crash reporting This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the product is required to ensure crashes are logged. Where it is possible that sensitive data may end up in the crash data, this must be handled as red data and must only be available to an administrator. Crash data from both the product and the underlying operating system must be considered. DEV.M42: Heap hardening This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the product should use the memory management provided by the operating system. Products should not implement their own heap. DEV.M43: Stack protection This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the product is required to be compiled with support for stack protection including all libraries, where the tool chain supports it. If more recent versions of the tool chain support it for the target platform then they should be used in preference to a legacy tool chain. DEV.M159: Update product This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the product should support the use of software updates. DEV.M267: Provide an automated configuration tool to enforce required settings This mitigation is required to counter exploitation of an accidental misconfiguration At Foundation Grade the product is required to be provided with a configuration tool, or other method, for an administrator to initially set it up into a suitable configuration. If the product requires more than 12 options to be changed or set by an administrator to comply with these Security Characteristics, the developer must supply a tool or policy template which helps the administrator to achieve this in fewer steps. DEV.M321: Data Execution Prevention This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the product is required to support Data Execution Prevention (DEP) when enabled on its hosting platform and must not opt out of DEP. If the product is to be specifically deployed on a platform that does not support either Software DEP or Hardware-enforced DEP, there is no requirement for DEP compatibility. DEV.M340: Address Space Layout Randomisation This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the product is required to be compiled with full support for ASLR, including all libraries used. If the product is to be specifically deployed on an operating system that does not support ASLR, there is no requirement for ASLR compatibility. Note: ASLR may be disabled for specific aspects of the product, provided there is justification of why this is required. UNCLASSIFIED Page 11

MIKEY-SAKKE Secure VoIP gateway DEV.M349: Sanitise temporary variables This mitigation is required to counter reading non-sanitised sensitive data from memory At Foundation Grade the product is required to sanitise temporary variables containing sensitive information as soon as no longer required. A secure erase must consist of at least one complete overwrite. DEV.M353: Ensure product security configuration can only be altered by an authenticated system administrator This mitigation is required to counter unauthorised alteration of product's configuration At Foundation Grade the product is required to ensure that only authenticated administrators are able to change the product's security enforcing settings. DEV.M355: Secure software delivery This mitigation is required to counter installing compromised software using the update process At Foundation Grade the product should be distributed via a cryptographically protected mechanism, such that the authenticity of software can be ensured. DEV.M612: Sanitise logged data This mitigation is required to counter supplying a malicious script through logged data At Foundation Grade the product is required to ensure logged data is sanitised prior to display. The method and content of sanitisation will change depending on the content in the logs and where the logs are displayed. For example, output to a HTML viewer for the logs will need to be encoded whereas logging output to a text file may not need to be sanitised. Note: This requirement is only applicable if the product actually incorporates a log viewer. DEV.M627: Protect access to logs This mitigation is required to counter modification of logging generation This mitigation is required to counter sanitisation of illegitimate access from logs At Foundation Grade the product is required to ensure that all log entries are time stamped. Timestamps must be accurate and the deployment must take measures to ensure this. Such measures could be NTP synchronisation or a manual process. At Foundation Grade the product is required to ensure that only an authenticated administrator can manage logs. At Foundation Grade the product is required to not overwrite logs without alerting the administrator. DEV.M802: Export logs This mitigation is required to counter modification of locally stored logs At Foundation Grade the product is required to provide ability to automatically transfer logs to external device. This functionality could be provided by a host operating system, where available. UNCLASSIFIED Page 12

MIKEY-SAKKE Secure VoIP gateway DEV.1 - Development >> Black Interface DEV.1.M85: Resource prioritisation This mitigation is required to counter CPU exhaustion through repeated connect requests This mitigation is required to counter memory exhaustion through 'half open' attacks At Foundation Grade the product is required to prioritise resources for connections which are already open. This should be done at the expense of new, unauthenticated connections. At Foundation Grade the product should limit resources which can be consumed by a single client. DEV.2 - Development >> Call Handling DEV.2.M937: Call security identification This mitigation is required to counter interception of sensitive voice data accidentally sent unencrypted At Foundation Grade the product is required to have the ability to send identity information to the caller and to the recipient before the call is answered. This information should detail if the call is encrypted, if the other party is authenticated, who the other party purports to be and which entity has attested to their identity. DEV.3 - Development >> Encryption DEV.3.M138: State the Security Strength required for random numbers This mitigation is required to counter prediction of randomly generated values due to a weak entropy source At Foundation Grade the product is required to employ an entropy source of sufficient Security Strength for all random number generation required in the operation of the product. The developer must state the Security Strength required of their entropy source based on analysis of all random numbers used in the product, including any generated keys. At this grade, the Security Strength is likely to be 128 bits for products that do not use elliptic curve cryptography. For elliptic curve-based asymmetric mechanisms it is likely to be 256 bits, and for finite field based asymmetric mechanisms it is likely to be 192 bits. DEV.3.M140: Smooth output of entropy source with approved PRNG This mitigation is required to counter prediction of randomly generated values due to a weak PRNG At Foundation Grade the product is required to employ a PRNG of sufficient Security Strength for all random number generation required in the operation of the product. For more details on a suitable PRNG, please see the Process for Performing Foundation Grade Evaluations. DEV.3.M141: Reseed PRNG as required This mitigation is required to counter prediction of randomly generated values due to a weak PRNG At Foundation Grade the product is required to follow an approved reseeding methodology. UNCLASSIFIED Page 13

MIKEY-SAKKE Secure VoIP gateway DEV.3.M290: Employ an approved entropy source This mitigation is required to counter prediction of randomly generated values due to a weak entropy source At Foundation Grade the product is required to generate random bits using an entropy source whose entropy generation capability is understood. The developer must provide a detailed description of the entropy source used, giving evidence that it can generate sufficient entropy for use in the device, including an estimate of entropy per bit. If a hardware noise source is used, then the manufacturer's name, the part numbers and details of how this source is integrated into the product must be supplied. If a software entropy source is employed, the API calls used must be provided. Where appropriate, details must be given of how the output of multiple entropy sources are combined. DEV.3.M938: Encrypt call traffic over untrusted link This mitigation is required to counter interception of data from unencrypted calls At Foundation Grade the product is required to use an approved encryption profile from section 1.6. DEV.4 - Development >> Key Management DEV.4.M138: State the Security Strength required for random numbers This mitigation is required to counter prediction of randomly generated values due to a weak entropy source At Foundation Grade the product is required to employ an entropy source of sufficient Security Strength for all random number generation required in the operation of the product. The developer must state the Security Strength required of their entropy source based on analysis of all random numbers used in the product, including any generated keys. At this grade, the Security Strength is likely to be 128 bits for products that do not use elliptic curve cryptography. For elliptic curve-based asymmetric mechanisms it is likely to be 256 bits, and for finite field based asymmetric mechanisms it is likely to be 192 bits. DEV.4.M140: Smooth output of entropy source with approved PRNG This mitigation is required to counter prediction of randomly generated values due to a weak PRNG At Foundation Grade the product is required to employ a PRNG of sufficient Security Strength for all random number generation required in the operation of the product. For more details on a suitable PRNG, please see the Process for Performing Foundation Grade Evaluations. DEV.4.M141: Reseed PRNG as required This mitigation is required to counter prediction of randomly generated values due to a weak PRNG At Foundation Grade the product is required to follow an approved reseeding methodology. UNCLASSIFIED Page 14

MIKEY-SAKKE Secure VoIP gateway DEV.4.M290: Employ an approved entropy source This mitigation is required to counter prediction of randomly generated values due to a weak entropy source At Foundation Grade the product is required to generate random bits using an entropy source whose entropy generation capability is understood. The developer must provide a detailed description of the entropy source used, giving evidence that it can generate sufficient entropy for use in the device, including an estimate of entropy per bit. If a hardware noise source is used, then the manufacturer's name, the part numbers and details of how this source is integrated into the product must be supplied. If a software entropy source is employed, the API calls used must be provided. Where appropriate, details must be given of how the output of multiple entropy sources are combined. DEV.4.M808: Shared secret generation This mitigation is required to counter capture key exchange messages to deduce shared secrets At Foundation Grade the product is required to use an approved encryption profile from section 1.6. DEV.4.M812: No Private Key export This mitigation is required to counter export of private key material from the device At Foundation Grade the product is required to use operating system mechanisms, such as user privileges and the operating system certificate store, or another protected certificate store, to ensure that unencrypted private keys or machine certificates cannot be retrieved by a standard user. This must include protecting any APIs or interfaces added by the product which have access to the certificate store. DEV.4.M816: Key distribution credentials revocation This mitigation is required to counter using compromised key distribution credentials At Foundation Grade the product is required to ensure that a compromised user or device can be prevented from rekeying. DEV.4.M821: Key Exchange signature checks This mitigation is required to counter spoofing key exchange messages At Foundation Grade the product is required to verify signatures on key exchange messages and reject the call if the signature is invalid or the signing key is untrusted. UNCLASSIFIED Page 15

MIKEY-SAKKE Secure VoIP gateway 3.2 Verification mitigations VER.M80: Protocol robustness testing This mitigation is required to counter discovery of a vulnerability in the implementation of the protocol stack At Foundation Grade the evaluator will perform testing using commercial fuzzing tools. Fuzz testing is described in more detail in the Process for Performing Foundation Grade Evaluations. VER.M347: Verify update mechanism This mitigation is required to counter installing compromised software using the update process At Foundation Grade the evaluator will validate the developer's assertions regarding the suitability and security of their update process. The update process must provide a mechanism by which updates can be authenticated before they are applied. The process and any configuration required must be documented within the Security Procedures. VER.1 - Verify >> Encryption VER.1.M4: Evaluation/Cryptocheck This mitigation is required to counter exploitation of a cryptographic algorithm implementation error At Foundation Grade the evaluator will ensure all cryptographic algorithms employed for security functionality have been validated as per the "Cryptographic Validation" section in the CPA Foundation Process document. VER.2 - Verify >> Key Management VER.2.M4: Evaluation/Cryptocheck This mitigation is required to counter exploitation of a cryptographic algorithm implementation error At Foundation Grade the evaluator will ensure all cryptographic algorithms employed for security functionality have been validated as per the "Cryptographic Validation" section in the CPA Foundation Process document. UNCLASSIFIED Page 16

MIKEY-SAKKE Secure VoIP gateway 3.3 Deployment mitigations DEP.M38: Use automated configuration tool This mitigation is required to counter exploitation of an accidental misconfiguration At Foundation Grade the deployment is required to be configured using automated tools if provided. DEP.M39: Audit log review This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the deployment is required to regularly review audit logs for unexpected entries. DEP.M131: Operating system verifies signatures This mitigation is required to counter installation of a malicious privileged local service At Foundation Grade the deployment is required to enable signature verification for applications, services and drivers in the host operating system, where supported and where the product makes use of it. DEP.M159: Update product This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the deployment is required to update to the latest version where possible. DEP.M340: Address Space Layout Randomisation This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the deployment is required to enable ASLR in the host Operating System where available. DEP.M348: Administrator authorised updates This mitigation is required to counter installing compromised software using the update process At Foundation Grade the deployment is required to confirm the source of updates before they are applied to the system. The administrator is required to have authorised the updates before use. If an automatic process is used, the administrator must also configure the product to authenticate updates. The update procedure to be used by the administrator must be described within the product's security procedures. DEP.M625: Log all relevant actions This mitigation is required to counter modification of logging generation At Foundation Grade the deployment is required to assess impact of log entries and follow organisational procedures for incident resolution. At Foundation Grade the deployment is required to configure the product to log all actions deemed of interest. Ensure that log data is detailed enough to allow forensic investigation during any incident management. Sensitive data such as passwords and keys must not be written to the logs. At Foundation Grade the deployment should where available, automatically export logs to management/red side device. UNCLASSIFIED Page 17

MIKEY-SAKKE Secure VoIP gateway DEP.1 - Deployment >> Key Management DEP.1.M817: Secure private key distribution This mitigation is required to counter interception of private keys during distribution At Foundation Grade the deployment is required to use a private key distribution method which provides confidentiality, perfect forward secrecy and mutual authentication. UNCLASSIFIED Page 18

Appendix A References This document references the following resources. Label Title Location Notes [a] The Process for Performing Foundation Grade CPA Evaluations www.cesg.gov.uk/servicecatalogue/cpa [b] MIKEY-SAKKE RFCs www.ietf.org/rfc/rfc6508 www.ietf.org/rfc/rfc6509 [c] SRTP RFCs www.ietf.org/rfc/rfc3711 [d] RTP RFCs www.ietf.org/rfc/rfc1889 www.ietf.org/rfc/rfc3550 [e] MIKEY-SAKKE SRTP Profiles www.cesg.gov.uk/publications/document s/ts63-mikey-sakke-srtp_profile.pdf UNCLASSIFIED Page 19

Appendix B Glossary The following definitions are used in this document. Term CPA SC Map Security Characteristic Definition Commercial Product Assurance. A scheme run by CESG providing certificate-based assurance of commercial security products. Diagrammatic representation of a Security Characteristic (or part of one). A standard which describes necessary mitigations which must be present in a completed product, its evaluation or usage, particular to a type of security product. UNCLASSIFIED Page 20