Version | Date | Comment |
---|---|---|
1.0 | 2023-01-25 | Initial Release |
2.0 | 2025-03-24 | Incorporate NIAP Technical Decisions, Update to CC:2022 |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Assertion | A statement from the TOE to an RP that contains information about a subscriber. Assertions may also contain verified attributes. For the purposes of this PP-Module, assertions containing authentication status and identity attributes are made by EAP response messages in accordance with EAP-TLS or EAP-TTLS. |
Authentication Policy | A policy that specifies which authenticator types are required for a particular entity. The policy may be implicit for all entities, or configurable. |
Authenticator | Something the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant’s identity. |
Authenticator Output | The output value generated by an authenticator. The ability to generate valid authenticator outputs on demand proves that the claimant possesses and controls the authenticator. Protocol messages sent to the verifier are dependent upon the authenticator output, but they may or may not explicitly contain it. |
Claimant | A subject whose identity is to be verified using one or more authentication protocols. |
Credential | An object or data structure that authoritatively binds an identity via an identifier or identifiers and (optionally) additional attributes, to at least one authenticator possessed and controlled by a subscriber. |
Federation Protocol | A protocol to establish a trusted relationship with a relying party, and for the purposes of this PP module, to communicate authentication status for entities requesting access to resources managed by the relying party. In this PP-module, Federation Protocols include RADIUS, DIAMETER, and other standard protocols used in direct communication between the relying party and the TOE. Federation protocols that only support bearer assertions are out of scope for this PP-Module. |
Relying Party (RP) | An entity that relies upon the subscriber’s authenticators and credentials or a verifier’s assertion of a claimant’s identity, typically to process a transaction or grant access to information or a system. |
An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.
Assumption or OSP | Security Objectives | Rationale |
A.RP_FEDERATION | OE.RP_FEDERATION | The OE objective OE.RP_FEDERATION is realized through A.RP_FEDERATION. |
P.AUTH_POLICY | OE.REQUIRE_AUTH | Definition of an authentication policy, which can be enforced through deployment of a conformant TOE, can be used to ensure that organizational assets are protected by enforcing appropriate requirements for authentication. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_GEN.1/AuthSvr | ||
No events specified | N/A | |
FCO_NRO.1 | ||
Claimant request for which the TOE does not have credential verification data. | Identity of the claimant. | |
FCO_NRR.1 | ||
No events specified | N/A | |
FCS_CKM.3 | ||
[selection: Attempt to export plaintext key or CSP via defined interface., None] | If attempt is detected, record process identifier, authorized user's identifier (if any). | |
FCS_EAPTLS_EXT.1 | ||
Successful and failed authentication of claimant. | Identifier of claimant. | |
Protocol failures. | If failure occurs, record a descriptive reason for the failure. | |
FCS_RADIUS_EXT.1 | ||
Protocol failures. | If failure occurs, record a descriptive reason for the failure. | |
Success/failure of authentication. | No additional information | |
FCS_STG_EXT.1 | ||
No events specified | N/A | |
FIA_AFL.1/AuthSvr | ||
The reaching of the threshold for the unsuccessful authentication attempts. | The claimed identity of the entity attempting to authenticate or the IP where the attempts originated. | |
Disabling an account due to the threshold being reached. | No additional information | |
FIA_UAU.6 | ||
All use of the authentication mechanism. | Origin of the attempt (e.g., IP address). | |
FIA_X509_EXT.1/AuthSvr | ||
Certificate validation failure. | Reason for failure. | |
FMT_SMF.1/AuthSvr | ||
All management actions. | Identifier of initiator. | |
FTA_TSE.1 | ||
Denial of session establishment due to the session establishment mechanism. | Reason for denial, origin of establishment attempt. | |
FTP_ITC.1/NAS | ||
Initiation of the trusted channel. | Identification of the initiator. | |
Termination of the trusted channel. | Identification of the initiator. | |
Failure of the trusted channel functions. | Target of failed trusted channels establishment attempt. |
The auditable events defined in the audit tables are for the SFRs that are explicitly defined in this PP-Module and are intended to extend FAU_GEN.1 in the Base-PP. The events in the Auditable Events table should be combined with those of the NDcPP in the context of a conforming Security Target.
If the ST includes any selection-based SFRs, the selection for "Auditable events listed in the Auditable Events for Selection-Based SFRs table" must be made. If no selection-based SFRs are included, "no other events" should be selected. The auditing of selection-based SFRs is only required if that SFR is included in the ST.
Per FAU_STG.1 in the Base-PP, the TOE must support transfer of the audit data to an external IT entity using a trusted channel.
For FCS_CKM.3, if no defined interfaces have access to persistent keys or CSP, select 'none'.
This SFR is iterated from the Base-PP to define X.509 validation requirements that are specific to claimant authentication.
The ST author claims supported certificate validity checking options for each rule. For name constraints, all supported name types used to match names presented in a certificate to registered users and the associated standard matching method are described.
The ST author claims supported certificate policies. ‘Policy Constraints…’ is claimed if the TOE’s authentication policy depends on the certificate policies for claimant certificates. Other policy related extensions within the selection are claimed if supported. The extension inhibitPolicyMapping is not claimed if the TSF does not support certificate chains of length four or more. The policy related extensions, if supported, are primarily used in this PP-Module for claimant authentication, but are allowed for other certificate authentications. The ST author specifies the intended use and any limits of support for these extensions or specifies ‘no other policy related extension’ in the assignment of this selection.
The ST author specifies any additional supported X.509 extensions, and the associated extension processing rules used to determine claimant identity attributes or conditions that can be used in the TOE’s authentication policy.
If “an IPsec” is selected, the Base-PP SFR FCS_IPSEC_EXT.1 must be claimed.
If "a RadSec" is selected, the selection-based SFR FCS_RADSEC_EXT.1 must be claimed.
If “a mutually authenticated TLS” is selected, the Functional Package for Transport Layer Security (TLS), version 2.0 SFRs FCS_TLSS_EXT.1 and FCS_TLSS_EXT.2 must be claimed.
If “a mutually authenticated DTLS” is selected, the Functional Package for Transport Layer Security (TLS), version 2.0 SFRs FCS_DTLSS_EXT.1 and FCS_DTLSS_EXT.2 must be claimed.
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
Threat | Addressed by | Rationale |
---|---|---|
T.FALSE_ENDPOINTS | FIA_X509_EXT.1 (modified from Functional Package for X.509, version 1.0) | Mitigates the threat by authenticating relying parties via X.509 certificates. |
FIA_X509_EXT.2 (modified from Functional Package for X.509, version 1.0) | Mitigates the threat by authenticating relying parties via X.509 certificates. | |
FIA_X509_EXT.3 (modified from Functional Package for X.509, version 1.0) | Mitigates the threat by implementing a method for the TOE to obtain its own certificate for mutually-authenticated TLS or DTLS. | |
FCS_EAPTLS_EXT.1 | Mitigates the threat by utilizing either EAP-TLS or EAP-TTLS with mutual authentication to authenticate itself to a relying party. | |
FTP_ITC.1/NAS | Mitigates the threat by utilizing a cryptographically secure trusted channel with a relying party that allows mutual authentication with the relying party. | |
FCS_RADSEC_EXT.1 (selection-based) | Mitigates the threat by utilizing RadSec to establish a trusted channel with the relying party. | |
FIA_PSK_EXT.1/AuthSvr (selection-based) | Mitigates the threat by using a pre-shared key as the mechanism by which it authenticates itself to the relying party. | |
T.INVALID_USERS | FCO_NRO.1 | Mitigates the threat by providing a non-repudiation function to assert the source of origin of its communications with the relying party. |
FCO_NRR.1 | Mitigates the threat by providing a proof of receipt function to assert to a relying part that communications with it are successful. | |
FCS_EAPTLS_EXT.1 | Mitigates the threat by utilizing either EAP-TLS or EAP-TTLS as a mechanism to assert the success or failure of claimant authentication requests to the relying party. | |
FCS_RADIUS_EXT.1 | Mitigates the threat by implementing RADIUS, DIAMETER, or some other direct identity federation protocol to communicate the success or failure of claimant authentication requests. | |
FIA_AFL.1/AuthSvr | Mitigates the threat by implementing a mechanism to prevent claimant authentication attempts if an excessive number of failed attempts have been made. | |
FIA_X509_EXT.1/AuthSvr | Mitigates the threat by implementing a mechanism to determine the validity of X.509 certificates that are used as claimant authenticators. | |
FTA_TSE.1 | Mitigates the threat by implementing a mechanism to assert the failure of a claimant authentication attempt based on attributes of the claimant or of the attempt. | |
FIA_HOTP_EXT.1 (selection-based) | Mitigates the threat by utilizing HOTP as a form of claimant authenticator and implementing mechanisms to determine the validity of a HOTP credential if supported. | |
FIA_PSK_EXT.1/AuthSvr (selection-based) | Mitigates the threat by supporting PSKs in various forms as a form of claimant authenticator (password-based, HOTP, or TOTP). | |
FIA_PSK_EXT.2 (selection-based) | Mitigates the threat by utilizing randomly generated PSKs as a form of claimant authenticator. | |
FIA_PSK_EXT.3 (selection-based) | Mitigates the threat by utilizing password-based PSKs as a form of claimant authenticator and implementing mechanisms to determine the validity of a password-based PSK credential if supported. | |
FIA_TOTP_EXT.1 (selection-based) | Mitigates the threat by utilizing TOTP as a form of claimant authenticator and implementing mechanisms to determine the validity of a TOTP credential if supported. | |
T.UNAUTHORIZED_ADMINISTRATOR_ACCESS (from NDcPP) | FAU_GEN.1/AuthSvr | Mitigates the threat by implementing an audit mechanism to detect potential misuse of the TOE. |
FCS_CKM.3 | Mitigates the threat by implementing a cryptographic key access control mechanism to prevent compromise of the data in transit confidentiality mechanisms. | |
FCS_STG_EXT.1 | Mitigates the threat by implementing a secure cryptographic key storage mechanism to prevent compromise of the data in transit confidentiality mechanisms. | |
FIA_UAU.6 | Mitigates the threat by implementing a re-authentication mechanism to prevent compromise of an administrator account due to an unattended session. | |
FMT_SMF.1/AuthSvr | Mitigates the threat by defining management functions as a legitimate mechanism to control the behavior of the TSF. | |
T.UNDETECTED_ACTIVITY (from NDcPP) | FAU_GEN.1/AuthSvr | Mitigates the threat by implementing an audit mechanism to detect potential misuse of the TOE. |
FCS_CKM.3 | Mitigates the threat by implementing a cryptographic key access control mechanism to prevent compromise of the data in transit confidentiality mechanisms. | |
FCS_STG_EXT.1 | Mitigates the threat by implementing a secure cryptographic key storage mechanism to prevent compromise of the data in transit confidentiality mechanisms. | |
FIA_UAU.6 | Mitigates the threat by implementing a re-authentication mechanism to prevent compromise of an administrator account due to an unattended session. | |
FMT_SMF.1/AuthSvr | Mitigates the threat by defining management functions as a legitimate mechanism to control the behavior of the TSF. |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.FALSE_ENDPOINTS | This threat is similar to the T.WEAK_AUTHENTICATION_ENDPOINTS threat in the NDcPP but it applies specifically to the NAS, which is an environmental component that is defined specifically in this PP-Module. |
T.INVALID_USERS | This threat is similar to the T.UNAUTHORIZED_ADMINISTRATOR_ACCESS threat in the NDcPP but it applies to user authentication brokered by the TSF rather than to administrator authentication to the TOE itself. It is also similar to the T.UNTRUSTED_COMMUNICATION_CHANNELS threat in the NDcPP except that it applies specifically to the RADIUS communications and the protocols used to secure those, which is an interface that is defined specifically in this PP-Module. |
A.RP_FEDERATION | The NDcPP does not define any assumptions for the intended network architecture that the TOE is deployed into. Therefore, an assumption that the network can be set up in such a way that the TOE will have direct connectivity with one or more relying parties does not violate any assumptions of the NDcPP. |
P.AUTH_POLICY | This OSP relates to behavior that is not part of the Base-PP and so the Base-PP is not contradicted by guidance on its implementation. |
PP-Module OE Objective | Consistency Rationale |
---|---|
OE.RP_FEDERATION | The Base-PP does not define where in a particular network architecture a network device must be deployed since it is designed to be generic to various types of network devices. This PP-Module defines the expected architectural deployment specifically for a network device that acts as an authentication server. |
OE.REQUIRE_AUTH | The Base-PP does not define a particular use for a network device, so there is no consistency issue with the PP-Module defining expectations for the use of a specific type of device. |
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
FIA_X509_EXT.1 | There is currently no way to accurately model the status of this SFR (as well as FIA_X509_EXT.2 and FIA_X509_EXT.3). Since the X.509 package will be replacing the definitions in the NDcPP, these are technically not going to be defined in the Base-PP, but we do not have an authoritative way to denote this in the XML schema. Additionally, it may be such that we need to list FIA_XCU_EXT.1 in this section and define certain selections as required instead of directly listing the SFRs, since the X.509 package uses that SFR as its 'entry point'. For now, these have only been moved to the updated modified SFR schema and no substantive changes have been applied. This PP-Module modifies the Functional Package's definition of the SFR by making it mandatory rather than selection-based. |
FIA_X509_EXT.2 | This PP-Module modifies the Functional Package's definition of the SFR by making it mandatory rather than selection-based. |
FIA_X509_EXT.3 | This PP-Module modifies the Functional Package's definition of the SFR by making it mandatory rather than selection-based. |
Additional SFRs | |
This PP-Module does not add any requirements when the NDcPP is the base. | |
Mandatory SFRs | |
FAU_GEN.1/AuthSvr | This SFR iterates the FAU_GEN.1 SFR defined in the Base-PP to define auditable events for the functionality that is specific to this PP-Module. |
FCO_NRO.1 | This SFR applies to the implementation of the supported authentication protocol, which is beyond the original scope of the Base-PP. |
FCO_NRR.1 | This SFR applies to the implementation of the supported authentication protocol, which is beyond the original scope of the Base-PP. |
FCS_CKM.3 | The Base-PP requires confidentiality of cryptographic key data in FPT_SKP_EXT.1. This SFR defines more specific detail on how that function should be enforced. |
FCS_EAPTLS_EXT.1 | This SFR applies to the implementation of EAP-TLS; the Base-PP defines implementation requirements for (D)TLS, but EAP-TLS is beyond the original scope of the Base-PP. |
FCS_RADIUS_EXT.1 | This SFR applies to the implementation of authentication protocols, which is beyond the original scope of the Base-PP. |
FCS_STG_EXT.1 | This SFR is consistent with the FPT_SKP_EXT.1 requirement of the Base-PP but requires the TSF to implement a specific method of protecting key data rather than a general statement that such data is not stored in plaintext. |
FIA_AFL.1/AuthSvr | This SFR defines functional behavior enforced on external users being authenticated by the TOE, which is functionality that is not covered by the Base-PP. |
FIA_UAU.6 | This SFR defines support for re-authentication of administrators, which expands on the authentication functionality defined in the Base-PP. |
FIA_X509_EXT.1/AuthSvr | The Base-PP defines X.509 validation requirements for external entities presenting certificates to the TOE. This PP-Module defines a separate iteration of this function to define the certificate validation behavior that is enforced against claimants requesting to be authenticated by the TOE. It is substantially refined from its original definition to address issues specific to the handling of claimant certificates. |
FMT_SMF.1/AuthSvr | This SFR defines additional management functionality that is specific to the PP-Module’s product type and would therefore not be expected to be present in the Base-PP. |
FTA_TSE.1 | This SFR relates to the handling of claimants being authenticated by the TOE, which is functionality that is beyond the original scope of the Base-PP. |
FTP_ITC.1/NAS | This SFR iterates the FTP_ITC.1 SFR defined in the Base-PP to define trusted communication channels for the functionality that is specific to this PP-Module. |
Optional SFRs | |
This PP-Module does not define any Optional requirements. | |
Objective SFRs | |
This PP-Module does not define any Objective requirements. | |
Implementation-dependent SFRs | |
This PP-Module does not define any Implementation-dependent requirements. | |
Selection-based SFRs | |
FCS_RADSEC_EXT.1 | This SFR defines the implementation of RadSec and the peer authentication method that it uses. This relies on the TLS requirements defined by the Base-PP and may also use the X.509v3 certificate validation methods specified in the Base-PP, depending on the selected peer authentication method. |
FIA_HOTP_EXT.1 | This SFR extends the functionality of the Base-PP by defining the use of pre-shared keys as an authenticator. |
FIA_PSK_EXT.1/AuthSvr | This SFR extends the functionality of the Base-PP by defining the use of pre-shared keys as an authenticator. |
FIA_PSK_EXT.2 | This SFR extends the functionality of the Base-PP by defining the use of pre-shared keys as an authenticator. |
FIA_PSK_EXT.3 | This SFR extends the functionality of the Base-PP by defining the use of pre-shared keys as an authenticator. |
FIA_TOTP_EXT.1 | This SFR extends the functionality of the Base-PP by defining the use of pre-shared keys as an authenticator. |
This PP-Module does not define any Strictly Optional SFRs or SARs.
This PP-Module does not define any Objective SFRs.
This PP-Module does not define any Implementation-dependent SFRs.
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_RADSEC_EXT.1 | ||
No events specified | N/A | |
FIA_HOTP_EXT.1 | ||
Generation of a HOTP seed key. | Entity identifier. | |
Entity HOTP value comparison. | Result of comparison - success or failure. | |
FIA_PSK_EXT.1/AuthSvr | ||
No events specified | N/A | |
FIA_PSK_EXT.2 | ||
No events specified | N/A | |
FIA_PSK_EXT.3 | ||
No events specified | N/A | |
FIA_TOTP_EXT.1 | ||
Generation of a TOTP seed key. | Entity identifier. | |
Entity TOTP value comparison. | Result of comparison - success or failure. |
This SFR is claimed if "a RadSec" is selected in FTP_ITC.1.1/NAS.
If "RFC 6614" is claimed in the selection for FCS_RADSEC_EXT.1.1, "TLS in accordance with FCS_TLSS_EXT.1 and FCS_TLSS_EXT.2 from the Functional Package for Transport Layer Security (TLS), version 2.0" is claimed in FCS_RADSEC_EXT.1.3.
If "RFC 7360" is claimed in the selection for FCS_RADSEC_EXT.1.1, "DTLS in accordance with FCS_DTLSS_EXT.1 and FCS_DTLSS_EXT.2 from the Functional Package for Transport Layer Security (TLS), version 2.0" is claimed in FCS_RADSEC_EXT.1.3. Note that RFC 7360 is not directly updated by RFC 8996, but its references to DTLS 1.2 (RFC 6347) are.
It is the intent that TLS 1.0, TLS 1.1, and DTLS 1.0 (to include via downgrade as allowed in the original RFCs) are not allowed here.
If "pre-shared keys" is selected in FCS_RADSEC_EXT.1.2, the selection-based SFR FIA_PSK_EXT.1/AuthSvr must be claimed.Functional Class | Functional Components |
---|---|
Cryptographic Support (FCS) | FCS_EAPTLS_EXT EAP-TLS Protocol FCS_RADIUS_EXT Authentication Protocol FCS_RADSEC_EXT RadSec FCS_STG_EXT Cryptographic Key Storage |
Identification and Authentication (FIA) | FIA_HOTP_EXT HMAC-Based One-Time Password Pre-Shared Keys FIA_PSK_EXT Pre-Shared Keys FIA_TOTP_EXT Time-Based One-Time Password Pre-Shared Keys |
FCS_EAPTLS_EXT.1, EAP-TLS Protocol, requires the TSF to implement EAP and EAP-TLS according to appropriate standards.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_RBG.1 Random Bit Generation [FCS_TLSS_EXT.1 TLS Server Protocol Without Mutual Authentication, or FCS_DTLSS_EXT.1 DTLS Server Protocol Without Mutual Authentication] [FCS_TLSS_EXT.2 TLS Server Support for Mutual Authentication, or FCS_DTLSS_EXT.2 DTLS Server Support for Mutual Authentication] FIA_X509_EXT.1 X.509 Certificate Validation |
FCS_RADIUS_EXT.1, Authentication Protocol, requires the TSF to implement the specified authentication protocols.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_EAPTLS_EXT.1 EAP-TLS Protocol |
FCS_STG_EXT.1, Cryptographic Key Storage, requires the TSF to identify a mechanism used to securely store cryptographic keys.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_CKM.3 Cryptographic Key Access |
FCS_RADSEC_EXT.1, RadSec, defines implementation requirements for RadSec.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_RADIUS_EXT.1 Authentication Protocol FCS_RBG.1 Random Bit Generation [FIA_PSK_EXT.1 Pre-Shared Key Composition, or FIA_X509_EXT.1 X.509 Certificate Validation] [FCS_TLSS_EXT.1 TLS Server Protocol Without Mutual Authentication, or FCS_DTLSS_EXT.1 DTLS Server Protocol Without Mutual Authentication] [FCS_TLSS_EXT.2 TLS Server Support for Mutual Authentication, or FCS_DTLSS_EXT.2 DTLS Server Support for Mutual Authentication] |
FIA_HOTP_EXT.1, HMAC-Based One-Time Password Pre-Shared Keys, defines the implementation of HOTP.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation FCS_RBG.1 Random Bit Generation |
FIA_PSK_EXT.1, Pre-Shared Key Usage, defines the use and composition of pre-shared keys used for authentication.
FIA_PSK_EXT.2, Generated Pre-Shared Keys, defines the use and composition of generated pre-shared keys used for authentication.
FIA_PSK_EXT.3, Password-Based Pre-Shared Keys, defines the use and composition of password-based pre-shared keys used for authentication.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | [FCS_EAPTLS_EXT.1 EAP-TLS Protocol, or FCS_IPSEC_EXT.1 IPsec] |
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FIA_PSK_EXT.1 Pre-Shared Key Usage |
The following actions could be considered for the management functions in FMT:
No auditable events are foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation FCS_RBG.1 Random Bit Generation FIA_PSK_EXT.1 Pre-Shared Key Usage |
FIA_TOTP_EXT.1, Time-Based One-Time Password Pre-Shared Keys, defines the implementation of TOTP.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation FCS_NTP_EXT.1 NTP Protocol FCS_RBG.1 Random Bit Generation |
This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP-Module. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.3 Dependencies between components.
This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP-Module provides evidence that these controls are present and have been evaluated.
This PP-Module has no implicitly satisfied requirements. All SFR dependencies are explicitly met either through SFRs defined by the PP-Module or inherited from the Base-PP.Requirement | Description | Distributed TOE SFR Allocation |
FAU_GEN.1/AuthSvr | Audit Data Generation (Authentication Server) | All |
FCO_NRO.1 | Selective Proof of Origin | Feature Dependent |
FCO_NRR.1 | Selective Proof of Receipt | Feature Dependent |
FCS_CKM.3 | Cryptographic Key Access | All |
FCS_EAPTLS_EXT.1 | EAP-TLS Protocol | Feature Dependent |
FCS_RADIUS_EXT.1 | Authentication Protocol | Feature Dependent |
FCS_STG_EXT.1 | Cryptographic Key Storage | All |
FIA_AFL.1/AuthSvr | Authentication Failure Handling (Claimant) | Feature Dependent |
FIA_X509_EXT.1/AuthSvr | X.509 Certificate Validation (Claimant) | Feature Dependent |
FIA_UAU.6 | Re-Authenticating | Feature Dependent |
FMT_SMF.1/AuthSvr | Specification of Management Functions (Authentication Server) | All |
FTA_TSE.1 | TOE Session Establishment | Feature Dependent |
FTP_ITC.1/NAS | Inter-TSF Trusted Channel (Relying Party Communications) | Feature Dependent |
FCS_RADSEC_EXT.1 (selection-based) | RadSec | Feature Dependent |
FIA_HOTP_EXT.1 (selection-based) | HMAC-Based One-Time Password Pre-Shared Keys | Feature Dependent |
FIA_PSK_EXT.1/AuthSvr (selection-based) | Pre-Shared Key Usage | Feature Dependent |
FIA_PSK_EXT.2 (selection-based) | Generated Pre-Shared Keys | Feature Dependent |
FIA_PSK_EXT.3 (selection-based) | Password-Based Pre-Shared Keys | Feature Dependent |
FIA_TOTP_EXT.1 (selection-based) | Time-Based One-Time Password Pre-Shared Keys | Feature Dependent |
Acronym | Meaning |
---|---|
AAA | Authentication, Authorization, and Accounting |
Base-PP | Base Protection Profile |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
cPP | Collaborative Protection Profile |
CRL | Certificate Revocation List |
CSP | Critical Security Parameters |
DTLS | Datagram Transport Layer Security |
EAP | Extensible Authentication Protocol |
HOTP | Hash-Based One-Time Password |
IPsec | Internet Protocol Security |
MSK | Master Session Key |
OCSP | Online Certificate Status Protocol |
OE | Operational Environment |
PBKDF | Password-Based Key Derivation Function |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
PSK | Pre-Shared Key |
RADIUS | Remote Authentication Dial In User Service |
RBG | Random Bit Generator |
RP | Relying Party |
SAR | Security Assurance Requirement |
SFR | Security Functional Requirement |
SSH | Secure Shell |
ST | Security Target |
TLS | Transport Layer Security |
TOE | Target of Evaluation |
TOTP | Time-Based One-Time Password |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |
WLAN | Wireless Local Area Network |
Identifier | Title |
---|---|
[CC] | Common Criteria for Information Technology Security Evaluation -
|
[CEM] | Common Methodology for Information Technology Security Evaluation -
|
[NDcPP] | collaborative Protection Profile for Network Devices, Version 4.0, 06 December 2023 |
[NDcPP SD] | Supporting Document - Evaluation Activities for Network Device cPP, Version 3.0e, 06 December 2023 |