Version | Date | Comment |
---|---|---|
1.0 | 2014-05-16 | Initial draft |
1.1 | 2016-07-07 | Formatting updates and changes based on TC feedback |
1.2 | 2016-10-26 | Updates based on additional TC feedback and internal review |
2.0 | 2016-10-28 | Second draft |
2.1 | 2017-12-01 | Updates based on first use in evaluation |
2.1x | 2020-07-10 | Converted to XML |
3.0 | 2025-06-13 | Conversion to CC:2022, Incorporation of NIAP TDs |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Direct Rationale | A type of Protection Profile, PP-Module, or Security Target in which the security problem definition (SPD) elements are mapped directly to the SFRs and possibly to the security objectives for the operational environment. There are no security objectives for the TOE. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Administrator | The Administrator is responsible for management activities, including configuration of the CA and its security functions. |
Authorized Organizational Representative (AOR) | An optional privileged user role which is delegated authority by the Certification Authority Staff or RA Staff to manage a restricted set of certificates associated to devices belonging to a particular organization |
Certificate Management over CMS (CMC) | Certificate Management over CMS. A standard certificate enrollment protocol. |
Certificate Profile | A set of configuration parameters that defines everything associated with a type of certificate, in particular the contents (fields and extensions) of the generated certificate. |
Certification Authority (CA) | The set of hardware, software, firmware, or some combination thereof, that issues, revokes, and manages public key certificates and certificate status information. |
Compromise | The unauthorized disclosure, modification, substitution or use of sensitive data (including plaintext cryptographic keys and other CSPs). |
Confidentiality | The property that sensitive information is not disclosed to unauthorized individuals, entities or processes. |
Critical Security Parameter (CSP) | Security-related information (e.g., secret and private cryptographic keys, authentication data such as passwords and PINs) appearing in plaintext or otherwise unprotected form and whose disclosure or modification can compromise the security of a CA or the security of the information protected by the CA. |
Cryptographic key |
A parameter used in conjunction with a cryptographic algorithm that determines:
|
Data Encryption Key (DEK) | A key used to encrypt data-at-rest. |
Digital Signature | A non-forgeable transformation of data that allows proof of the source (with nonrepudiation) and verification of the integrity of that data. |
Encrypted key | A cryptographic key that has been encrypted with a key encrypting key, a PIN or a password in order to disguise the value of the underlying plaintext key. |
Error detection code (EDC) | A code computed from data and comprised of redundant bits of information designed to detect, but not correct, unintentional changes in the data. |
Integrity | The property that sensitive data has not been modified or deleted in an unauthorized and undetected manner. |
Key Encryption Key (KEK) | A key used to encrypt other keys, such as DEKs, or storage that contains keys. |
Key sharing | A multi-party computation (MPC) mechanism that allows two or more parties, each with key components, to jointly produce a plaintext key without revealing any of the key components. |
Private key | A cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity, and not made public. |
Privileged user | An individual with access and login privileges on the CA. |
Public key | A cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity, and which may be made public. (Public keys are not considered CSPs.) |
Public key (asymmetric) cryptographic algorithm | A cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that, given the public key, it is computationally infeasible to derive the private key. |
Public key certificate | A set of data that unambiguously identifies an entity, contains the entity's public key, is digitally signed by a trusted party, and binds the public key to the entity. |
Registration Authority (RA) | The set of hardware, software, firmware, or some combination thereof that is used to validate the identity of a subscriber before instructing the CA to manipulate a certificate on the subscriber’s behalf. |
Root Encryption Key (REK) | A key tied to hardware that is used to encrypt other keys such as KEKs. |
Secret key | A cryptographic key used with a secret key cryptographic algorithm, uniquely associated with one or more entities, and which shall not be made public. The use of the term "secret" in this context does not imply a classification level rather the term implies the need to protect the key from disclosure or substitution. |
Secret key (symmetric) cryptographic algorithm | A cryptographic algorithm that uses a single, secret key for both encryption and decryption. |
A token used by the CMC protocol to help provide identity proofing. | |
Subscriber | A human or machine entity that is bound to one or more certificates maintained by the CA. |
Trust Anchor Database | A list of trusted root Certification Authority certificates. |
If this feature is implemented by the TOE, the following requirements must be claimed in the ST:
If this feature is implemented by the TOE, the following requirements must be claimed in the ST:
If this feature is implemented by the TOE, the following requirements must be claimed in the ST:
If this feature is implemented by the TOE, the following requirements must be claimed in the ST:
Assumption or OSP | Security Objectives | Rationale |
A.NO_GENERAL_PURPOSE | OE.NO_GENERAL_PURPOSE | There are no general-purpose computing capabilities (e.g., compilers or user applications) available on the TOE, other than those services necessary for the operation, administration and support of the TOE. |
A.PHYSICAL | OE.PHYSICAL | Physical security, commensurate with the value of the TOE and the data it contains, is provided by the environment. |
A.TRUSTED_ADMIN | OE.TRUSTED_ADMIN | The administrator of the TOE is not careless, willfully negligent or hostile, and administers the software within compliance of the applied enterprise security policy. |
P.ACCESS_BANNER | O.DISPLAY_BANNER | The TOE will display an advisory warning regarding use of the TOE. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_ADP_EXT.1 | ||
No events specified | N/A | |
FAU_GCR_EXT.1 | ||
No events specified | N/A | |
FAU_GEN.1 | ||
No events specified | N/A | |
FAU_GEN.2 | ||
No events specified | N/A | |
FAU_STG.1 | ||
No events specified | N/A | |
FAU_STG.5 | ||
No events specified | N/A | |
FCO_NRO_EXT.2 | ||
No events specified | N/A | |
FCS_CDP_EXT.1 | ||
No events specified | N/A | |
FCS_STG_EXT.1 | ||
No events specified | N/A | |
FDP_CER_EXT.1 | ||
Certificate generation: Success. (Retention: Extended) | Certificate value or object identifier. | |
FDP_CER_EXT.2 | ||
Linking of certificate to certificate request: Success (Retention: Extended) |
| |
Linking of certificate to certificate request: Failure (Retention: Extended) |
| |
FDP_CER_EXT.3 | ||
Failed certificate approvals (Retention: Normal) |
| |
FDP_CSI_EXT.1 | ||
No events specified | N/A | |
FDP_RIP.1 | ||
No events specified | N/A | |
FIA_UAU_EXT.1 | ||
All uses of the authentication mechanism used for access to TOE related functions (Retention: Normal) | Origin of the attempt (e.g., IP address) | |
FIA_UIA_EXT.1 | ||
All use of the identification and authentication mechanism used for TOE-related roles (Retention: Normal) |
| |
FIA_X509_EXT.1 | ||
Failed certificate validations (Retention: Normal) | No additional information | |
FIA_X509_EXT.2 | ||
Failed authentications (Retention: Normal) | No additional information | |
FMT_MOF.1/Admin | ||
No events specified | N/A | |
FMT_MOF.1/Auditor | ||
No events specified | N/A | |
FMT_MOF.1/CA | ||
No events specified | N/A | |
FMT_MOF.1/CO | ||
No events specified | N/A | |
FMT_MOF.1/RA | ||
No events specified | N/A | |
FMT_MTD.1 | ||
No events specified | N/A | |
FMT_SMF.1 | ||
No events specified | N/A | |
FMT_SMR.2 | ||
Modifications to the group of users that are part of a role (Retention: Extended) | Modifications to the group of users that are part of the role | |
FPT_FLS.1 | ||
Invocation of failures under the requirement (Retention: Normal) | Indication that the TSF has failed with the type of failure that occurred | |
FPT_KST_EXT.1 | ||
No events specified | N/A | |
FPT_KST_EXT.2 | ||
All unauthorized attempts to use the TOE secret and private keys. (Retention: Normal) | Identifier of user or process that attempted access. | |
FPT_RCV.1 | ||
The fact that a failure of service discontinuity occurred. (Retention: Extended) | The type of failure or service discontinuity. | |
Resumption of the regular operation. (Retention: Extended) | The type of failure or service discontinuity. | |
FPT_SKP_EXT.1 | ||
No events specified | N/A | |
FPT_STM.1 | ||
Changes to the time (Retention: Normal) | The new and old values for the time. | |
FPT_TUD_EXT.1 | ||
Initiation of update. (Retention: Extended) | Version number | |
FTA_SSL.4 | ||
The termination of an interactive section. (Retention: Normal) | No additional information | |
FTA_TAB.1 | ||
No events specified | N/A | |
FTP_TRP.1 | ||
Initiation of the trusted channel. (Retention: Normal) | Identification of the claimed user identity | |
Termination of the trusted channel. (Retention: Normal) | Identification of the claimed user identity | |
Failures of the trusted path functions. (Retention: Normal) | Identification of the claimed user identity |
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
Threat | Addressed by | Rationale |
---|---|---|
T.PRIVILEGED_USER_ERROR | FAU_ADP_EXT.1 | Requires the TSF to implement or support audit functionality. |
FAU_STG.5 | Prevents audited events if the audit trail cannot be written to. | |
FIA_UAU_EXT.1 | Requires that he TSF provide a mechanism for authenticating privileged users. | |
FIA_UIA_EXT.1 | Defines the actions permitted prior to authentication of a user. | |
FMT_MOF.1/Admin | Defines management functions to be performed exclusively by Administrators. | |
FMT_MOF.1/Auditor | Defines management functions to be performed by auditors. | |
FMT_MOF.1/CA | Defines management functions to be performed by CA Staff. | |
FMT_MOF.1/CO | Defines management functions to be performed by Administrators, Auditor, or CA Staff. | |
FMT_MOF.1/RA | Defines management functions to be performed by CA or RA Staff. | |
FMT_MTD.1 | Requires that only privileged users manage TSF data. | |
FMT_SMF.1 | Defines management functions implemented or supported by the TOE. | |
FMT_SMR.2 | Defines user roles maintained or supported by the TSF. | |
FTA_SSL.4 | Requires that the TSF support user-initiated termination of their own SSL sessions. | |
FTA_SSL_EXT.1 (optional) | (Optional) Requires an inactivity timeout on local user sessions. | |
FTA_SSL.3 (optional) | (Optional) Requires an inactivity timeout on remote user sessions. | |
FTA_SSL_EXT.1 (optional) | (Optional) Requires an inactivity timeout on local user sessions. | |
FAU_STG.2/EXT (selection-based) | Requires the TSF protect audit records from unauthorized deletion. | |
FAU_STG.2/STA (selection-based) | Requires that audit records with retention requirements be retained for the appropriate period. | |
FAU_STG_EXT.1 (selection-based) | Specifies rules for the retention of audit data. | |
FIA_AFL.1 (selection-based) | Requires that the TSF detect excessive unsuccessful login attempts from a remote user. | |
FIA_PMG_EXT.1 (selection-based) | Specifies password composition rules. | |
FIA_UAU.7 (selection-based) | Defines feedback permitted to the user during authentication. | |
FPT_APW_EXT.1 (selection-based) | Defines protections for plaintext passwords. | |
T.TSF_FAILURE | FPT_FLS.1 | Requires that the TSF enters a secure state if failures in the TSF occur. |
FPT_RCV.1 | Requires that the TSF provide a maintenance mode where the ability to return to secure state is provided. | |
FPT_TST_EXT.1 (optional) | (Optional) Requires the TSF ensure the integrity of TOE software and firmware. | |
FPT_TST_EXT.2 (optional) | (Optional) Requires the TSF ensure the integrity of certain data relevant to TOE security. | |
FPT_TST.1 (selection-based) | Requires that the TSF test the health of the DRBG. | |
T.UNAUTHENTICATED_TRANSACTIONS | FCO_NRO_EXT.2 | Requires that the TSF provide proof of origin for certificates it issues. |
FCS_CDP_EXT.1 | Requires that the TSF implements or invokes cryptographic functionality. | |
FDP_CER_EXT.1 | Requires that the TSF support configured certifcate profiles. | |
FDP_CER_EXT.2 | Requires that TSF associate certificate requests with certificates. | |
FDP_CER_EXT.3 | Requires that the TSF support approval of certificates against profiles. | |
FDP_CSI_EXT.1 | Requires that the TSF provide formatted certificate status information. | |
FIA_X509_EXT.1 | Requires the TSF support validation of certificates according to a set of rules. | |
FIA_X509_EXT.2 | Requires that the TOE use X.509 certificates for code signing and other purposes. | |
FIA_X509_EXT.3 | Requires that the TOE support the use of Certificate Requests to receive a certificate chain. | |
FMT_MOF.1/Admin | Defines management functions to be performed exclusively by Administrators. | |
FMT_MOF.1/Auditor | Defines management functions to be performed by auditors. | |
FMT_MOF.1/CA | Defines management functions to be performed by CA Staff. | |
FMT_MOF.1/CO | Defines management functions to be performed by Administrators, Auditor, or CA Staff. | |
FMT_MOF.1/RA | Defines management functions to be performed by CA or RA Staff. | |
FMT_MTD.1 | Requires that only privileged users manage TSF data. | |
FDP_CER_EXT.4 (optional) | (Optional) Requires that non-v3 certificates have certain characteristics. | |
FDP_STG_EXT.1(optional) | (Optional) Requires that the TSF protect trusted public keys and certificates. | |
FPT_NPE_EXT.1 (optional) | (Optional) Requires the TSF enforce rules for submitting NPE certificate requests. | |
FPT_TST_EXT.1 (optional) | (Optional) Requires the TSF ensure the integrity of TOE software and firmware. | |
FPT_TST_EXT.2 (optional) | (Optional) Requires the TSF ensure the integrity of certain data relevant to TOE security. | |
FIA_ENR_EXT.1 (objective) | Requires the TSF to use secure request mechanisms to receive a CA certificate for the TSF's use. | |
FIA_ESTC_EXT.2 (objective) | Requires that the TSF use a strengthened implementation of EST through the incorporation of the tls-unique values in its generated requests. | |
FIA_ESTS_EXT.2 (objective) | Requires that the TSF use a strengthened implementation of EST through the verification of tls-unique values in requests it receives. | |
FCO_NRR_EXT.2 (selection-based) | Requires that the TSF provide certificate-based proof of receipt. | |
FCS_CKM_EXT.5 (selection-based) | Requires that the TSF protect public keys from modification. | |
FIA_CMCC_EXT.1(selection-based) | Specifies requirements for CMC requests and responses. | |
FIA_CMCS_EXT.1 (selection-based) | Defines the types of CMC requests handled by the TSF. | |
FIA_ESTC_EXT.1 (selection-based) | Specifies requirements for client-side EST enrollment requests. | |
FIA_ESTS_EXT.1 (selection-based) | Specifies requirements for EST enrollment requests. | |
FDP_CRL_EXT.1 (selection-based) | Specifies contents for certificate revocation lists. | |
FDP_OCSPG_EXT.1 (selection-based) | Specifies the contents of OCSP response messages. | |
FDP_SDP_EXT.1 (selection-based) | (Optional) Requires that the TSF protect certain information through encryption. | |
FDP_ITT.1 (selection-based) | Requires that the TSF protect user data during transmission between physically separate parts of the TOE. | |
FPT_ITT.1 (selection-based) | Requires that the TSF protect data transmitted between different parts of the TOE. | |
FPT_TST.1 (selection-based) | Requires that the TSF test the health of the DRBG. | |
T.UNAUTHORIZED_ACCESS | FCS_CDP_EXT.1 | Requires that the TSF implements or invokes cryptographic functionality. |
FCS_STG_EXT.1 | Requires secure storage of private and secret keys. | |
FIA_UAU_EXT.1 | Requires that he TSF provide a mechanism for authenticating privileged users. | |
FIA_UIA_EXT.1 | Defines the actions permitted prior to authentication of a user. | |
FMT_MOF.1/Admin | Defines management functions to be performed exclusively by Administrators. | |
FMT_MOF.1/Auditor | Defines management functions to be performed by auditors. | |
FMT_MOF.1/CA | Defines management functions to be performed by CA Staff. | |
FMT_MOF.1/CO | Defines management functions to be performed by Administrators, Auditor, or CA Staff. | |
FMT_MOF.1/RA | Defines management functions to be performed by CA or RA Staff. | |
FMT_MTD.1 | Requires that only privileged users manage TSF data. | |
FMT_SMF.1 | Defines management functions implemented or supported by the TOE. | |
FMT_SMR.2 | Defines user roles maintained or supported by the TSF. | |
FPT_KST_EXT.1 | Requires that the TSF prevent export of plaintext keys. | |
FPT_KST_EXT.2 | Requires that the TSF prevent unauthorized use of private and secret keys. | |
FPT_SKP_EXT.1 | Requires that the TSF be able to prevent reading of pre-shared, private and secret keys. | |
FTA_SSL.4 | Requires that the TSF support user-initiated termination of their own SSL sessions. | |
FTP_TRP.1 | Requires the TSF to provide a trusted path to remote entities. | |
FCS_COP.1/PBKDF (optional) | (Optional) Requires the TSF to support password-based key derivation. | |
FPT_SKY_EXT.1/CA (optional) | (Optional) Requires two-party control for the export of CA signing keys. | |
FPT_SKY_EXT.1/OTH (optional) | (Optional) Requires two-party control for the export of other sensitive data or keys. | |
FTA_SSL.3 (optional) | (Optional) Requires an inactivity timeout on remote user sessions. | |
FTA_SSL_EXT.1 (optional) | (Optional) Requires an inactivity timeout on local user sessions. | |
FCS_KSH_EXT.1 (objective) | Requires two-party control for the export of critical keys to the CA operation. | |
FCS_COP.1/Hash (selection-based) | Defines permissible cryptographic hash algorithms and sizes. | |
FCS_COP.1/KeyedHash (selection-based) | Defines permissible keyed-hash message authentication algorithms. | |
FCS_COP.1/Sig (selection-based) | Defines permissible cryptographic signature algorithms. | |
FCS_COP.1/SKC (selection-based) | Defines permissible AES encryption algorithms and key sizes. | |
FCS_CKM.1 (selection-based) | Specifies allowable algorithms for generation of asymmetric keys. | |
FCS_CKM.2 (selection-based) | Specifies allowable algorithms for key establishment. | |
FCS_CKM.6 (selection-based) | Specifies requirements for cryptographic key destruction. | |
FCS_CKM_EXT.1/DEK (selection-based) | Specifies requirements for asymmetric key generation. | |
FCS_CKM_EXT.1/KEK (selection-based) | Specifies requirements for generation of KEKs. | |
FCS_CKM_EXT.1/KEKT (selection-based) | Specifies requirements for asymmetric KEKs. | |
FCS_CKM_EXT.1/SHARE (selection-based) | Specifies requirements for key shares. | |
FCS_CKM_EXT.6 (selection-based) | Requires the TSF to support the secure archival, import and export of keys required for continuity of TOE operations. | |
FCS_CKM_EXT.7 (selection-based) | Requires support for a hardware-protected REK. | |
FCS_CKM_EXT.8 (selection-based) | Requires that the TSF provide a traceable hierarchy of keys. | |
FCS_HTTPS_EXT.1 (selection-based) | Requires that the TSF implement HTTPS over TLS. | |
FCS_IPSEC_EXT.1 (selection-based) | Specifies requirements for the TSF implementation of IPsec. | |
FCS_RBG.1 (selection-based) | Requires that the TSF have access to DRBG services. | |
FCS_RBG.2 (selection-based) | Allows the DRBG to be seeded by an external source. | |
FCS_RBG.3 (selection-based) | Allows the DRBG to be seeded by a single internal source. | |
FCS_RBG.4 (selection-based) | Allows the DRBG to be seeded by multiple internal sources. | |
FCS_RBG.5 (selection-based) | Allows the DRBG to combine noise from multiple sources. | |
FIA_AFL.1 (selection-based) | Requires that the TSF detect excessive unsuccessful login attempts from a remote user. | |
FIA_PMG_EXT.1 (selection-based) | Specifies password composition rules. | |
FIA_PSK_EXT.1 (selection-based) | Defines requirements for pre-shared keys used by the TSF. | |
FIA_UAU.7 (selection-based) | Defines feedback permitted to the user during authentication. | |
FDP_ITT.1 (selection-based) | Requires that the TSF protect user data during transmission between physically separate parts of the TOE. | |
FPT_APW_EXT.1 (selection-based) | Defines protections for plaintext passwords. | |
FPT_ITT.1 (selection-based) | Requires that the TSF protect data transmitted between different parts of the TOE. | |
FPT_SKY_EXT.2 (selection-based) | Requires that key shares be accessible only by privileged users. | |
FTP_ITC.1 (selection-based) | Requires secure communications between the TOE and external IT entities. | |
T.UNAUTHORIZED_UPDATE | FCS_CDP_EXT.1 | Requires that the TSF implements or invokes cryptographic functionality. |
FCS_COP.1/Sig (selection-based) | Defines permissible cryptographic signature algorithms. | |
FIA_X509_EXT.2 | Specifies the contents of Certificate Request Messages generated by the TSF. | |
FPT_TUD_EXT.1 | Requires that the TSF support a secure TOE update process. | |
T.UNDETECTED_ACTIONS | FAU_ADP_EXT.1 | Requires the TSF to implement or support audit functionality. |
FAU_GCR_EXT.1 | Requires that the TSF store certificates that it issues. | |
FAU_GEN.1 | Requires that the TSF an audit record for defined auditable events. | |
FAU_GEN.2 | Requires that the TSF be able to associate audit events with user actions. | |
FAU_STG.1 | Requires that the TSF identify where audit events are stored. | |
FAU_STG.5 | Prevents audited events if the audit data storage cannot be written to. | |
FIA_UIA_EXT.1 | Defines the actions permitted prior to authentication of a user. | |
FPT_STM.1 | Requires that the TSF provide or support reliable time stamps. | |
FAU_SAR.1 (selection-based) | Requires that auditors be able to read all audit records. | |
FAU_SAR.3 (selection-based) | Requires support for searches of audit data based on certificate identifier. | |
FAU_SCR_EXT.1 (selection-based) | Requires the TSF support review of certificates in a repository. | |
FAU_SEL.1 (selection-based) | Requires support for selection of audit events based on specified attributes. | |
FAU_STG.2/EXT (selection-based) | Requires the TSF protect audit records from unauthorized deletion. | |
FAU_STG.2/STA (selection-based) | Requires that audit records with retention requirements be retained for the appropriate period. | |
FAU_STG_EXT.1 (selection-based) | Requires that the TSF ensure the integrity of audit data. | |
T.USER_DATA_REUSE | FDP_RIP.1 | Requires that the TSF ensure that residual information is not perpetuated. |
T.WEAK_CRYPTO | FCS_CDP_EXT.1 | Requires that the TSF implements or invokes cryptographic functionality. |
FCS_STG_EXT.1 | Requires secure storage of private and secret keys. | |
FIA_X509_EXT.2 | Specifies the contents of Certificate Request Messages generated by the TSF. | |
FPT_KST_EXT.1 | Requires that the TSF prevent export of plaintext keys. | |
FPT_KST_EXT.2 | Requires that the TSF prevent unauthorized use of private and secret keys. | |
FPT_SKP_EXT.1 | Requires that the TSF be able to prevent reading of pre-shared, private and secret keys. | |
FPT_TUD_EXT.1 | Requires that the TSF support a secure TOE update process. | |
FTP_TRP.1 | Requires the TSF to provide a trusted path to remote entities. | |
FCS_COP.1/PBKDF (optional) | (Optional) Requires the TSF to support password-based key derivation. | |
FPT_SKY_EXT.1/CA (optional) | (Optional) Requires two-party control for the export of CA signing keys. | |
FPT_SKY_EXT.1/OTH (optional) | (Optional) Requires two-party control for the export of other sensitive data or keys. | |
FCS_COP.1/Hash (selection-based) | Defines permissible cryptographic hash algorithms and sizes. | |
FCS_COP.1/KeyedHash (selection-based) | Defines permissible keyed-hash message authentication algorithms. | |
FCS_COP.1/Sig (selection-based) | Defines permissible cryptographic signature algorithms. | |
FCS_COP.1/SKC (selection-based) | Defines permissible AES encryption algorithms and key sizes. | |
FCS_CKM.1 (selection-based) | Specifies allowable algorithms for generation of asymmetric keys. | |
FCS_CKM.2 (selection-based) | Specifies allowable algorithms for key establishment. | |
FCS_CKM_EXT.1/DEK (selection-based) | Specifies requirements for asymmetric key generation. | |
FCS_CKM_EXT.1/KEK (selection-based) | Specifies requirements for generation of KEKs. | |
FCS_CKM_EXT.1/KEKT (selection-based) | Specifies requirements for asymmetric KEKs. | |
FCS_CKM_EXT.1/SHARE (selection-based) | Specifies requirements for key shares. | |
FCS_CKM.6 (selection-based) | Specifies requirements for cryptographic key destruction. | |
FCS_CKM_EXT.7 (selection-based) | Requires support for a hardware-protected REK. | |
FCS_CKM_EXT.8 (selection-based) | Requires that the TSF provide a traceable hierarchy of keys. | |
FCS_HTTPS_EXT.1 (selection-based) | Requires that the TSF implement HTTPS over TLS. | |
FCS_IPSEC_EXT.1 (selection-based) | Specifies requirements for the TSF implementation of IPsec. | |
FCS_RBG.1 (selection-based) | Requires that the TSF have access to DRBG services. | |
FCS_RBG.2 (selection-based) | Allows the DRBG to be seeded by an external source. | |
FCS_RBG.3 (selection-based) | Allows the DRBG to be seeded by a single internal source. | |
FCS_RBG.4 (selection-based) | Allows the DRBG to be seeded by multiple internal sources. | |
FCS_RBG.5 (selection-based) | Allows the DRBG to combine noise from multiple sources. | |
FDP_ITT.1 (selection-based) | Requires that the TSF protect user data during transmission between physically separate parts of the TOE. | |
FIA_PSK_EXT.1 (selection-based) | Defines requirements for pre-shared keys used by the TSF. | |
FPT_ITT.1 (selection-based) | Requires that the TSF protect data transmitted between different parts of the TOE. | |
FPT_SKY_EXT.2 (selection-based) | Requires that key shares be accessible only by privileged users. | |
FTP_ITC.1 (selection-based) | Requires secure communications between the TOE and external IT entities. |
Assurance Class | Assurance Components |
Development (ADV) | Basic Functional Specification (ADV_FSP.1) |
Guidance Documents (AGD) | Operational User Guidance (AGD_OPE.1) |
Preparative Procedures (AGD_PRE.1) | |
Life Cycle Support (ALC) | Labeling of the TOE (ALC_CMC.1) |
TOE CM Coverage (ALC_CMS.1) | |
Security Target (ASE) | ST Introduction (ASE_INT.1) |
Conformance Claims (ASE_CCL.1) | |
Security Objectives for the Operational Environment (ASE_OBJ.1) | |
Extended Components Definition (ASE_ECD.1) | |
Stated Security Requirements (ASE_REQ.1) | |
Tests (ATE) | Independent Testing – Conformance (ATE_IND.1) |
Vulnerability Assessment (AVA) | Vulnerability Survey (AVA_VAN.1) |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_COP.1/PBKDF | ||
No events specified | N/A | |
FDP_CER_EXT.4 | ||
Certificate generation (Retention: Extended) |
| |
FDP_SDP_EXT.1 | ||
No events specified | N/A | |
FDP_STG_EXT.1 | ||
Changes to the trusted public keys and certificates relevant to TOE
functions, including additions and deletions. (Retention: Normal) | The public key and all context information associated with the key. | |
FPT_NPE_EXT.1 | ||
All changes to NPE rule sets and NPE. (Retention: Extended) | The changes made to the NPE rule sets and associations | |
FPT_SKY_EXT.1/CA | ||
No events specified | N/A | |
FPT_SKY_EXT.1/OTH | ||
No events specified | N/A | |
FPT_TST_EXT.1 | ||
Execution of this set of TSF integrity tests (Retention: Normal) | No additional information | |
Detected integrity violations (Retention: Normal) | The identity of the object that caused the integrity violation | |
FPT_TST_EXT.2 | ||
Execution of this set of TSF integrity tests (Retention: Normal) | No additional information | |
Detected integrity violations | The identity of the object that caused the integrity violation | |
FTA_SSL.3 | ||
The termination of a remote session by the session termination mechanism (Retention: Normal) | No additional information | |
FTA_SSL_EXT.1 | ||
Any attempts at unlocking or termination of an interactive session. (Retention: Normal) | No additional information |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_KSH_EXT.1 | ||
No events specified | N/A | |
FIA_ENR_EXT.1 | ||
No events specified | N/A | |
FIA_ESTC_EXT.2 | ||
No events specified | N/A | |
FIA_ESTS_EXT.2 | ||
No events specified | N/A |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_SAR.1 | ||
No events specified | N/A | |
FAU_SAR.3 | ||
No events specified | N/A | |
FAU_SEL.1 | ||
All modifications to the audit configuration that occur while the audit
collection functions are operating. (Retention: Normal) | No additional information | |
FAU_STG.2/EXT | ||
No events specified | N/A | |
FAU_STG.2/STA | ||
No events specified | N/A | |
FCS_CKM_EXT.1/DEK | ||
No events specified | N/A |
As indicated in the introduction to this PP, the baseline requirements (those that must be performed by the TOE or its underlying platform) are contained in the body of this PP. There are additional requirements based on selections in the body of the PP: if certain selections are made, then additional requirements below must be included.
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_SCR_EXT.1 | ||
No events specified | N/A | |
FAU_STG_EXT.1 | ||
No events specified | N/A | |
FCO_NRR_EXT.2 | ||
No events specified | N/A | |
FCS_CKM.1 | ||
Generation of non-ephemeral key for TOE-related funtions. (Retention: Normal) | Public key generated if successful | |
[selection: Generation of ephemeral key for TOE-related functions. (Retention: Normal), None] | Public key generated if successful. | |
FCS_CKM.2 | ||
Establishment of non-ephemeral key for TOE-related funtions. (Retention: Normal) | Key established if successful | |
[selection: Establishment of ephemeral key for TOE-related functions. (Retention: Normal), None] | Key established if successful. | |
FCS_CKM.6 | ||
Failure of the key destruction process for TOE keys (Retention: Normal) | Identity of object or entity being cleared. | |
FCS_CKM_EXT.1/KEK | ||
No events specified | N/A | |
FCS_CKM_EXT.1/KEKT | ||
No events specified | N/A | |
FCS_CKM_EXT.1/SHARE | ||
No events specified | N/A | |
FCS_CKM_EXT.5 | ||
Failure of the key destruction process for TOE related keys. (Retention: Normal) | No additional information | |
FCS_CKM_EXT.6 | ||
All key archival actions. (Retention: Extended) | No additional information | |
FCS_CKM_EXT.7 | ||
No events specified | N/A | |
FCS_CKM_EXT.8 | ||
No events specified | N/A | |
FCS_COP.1/Hash | ||
No events specified | N/A | |
FCS_COP.1/KeyedHash | ||
No events specified | N/A | |
FCS_COP.1/SKC | ||
No events specified | N/A | |
FCS_COP.1/SigGen | ||
All occurrences of signature generation using a CA signing key. (Retention: Extended) |
| |
Failure in signature generation. (Retention: Normal) | No additional information | |
FCS_COP.1/SigVer | ||
All occurrences of signature generation using a CA signing key. (Retention: Extended) |
| |
Failure in signature generation. (Retention: Normal) | No additional information | |
FCS_HTTPS_EXT.1 | ||
Failure to establish an HTTPS session. (Retention: Normal) |
| |
Establishment/Termination of an HTTPS session. (Retention: Normal) | Non-TOE enpoint of connection (IP address). | |
FCS_IPSEC_EXT.1 | ||
Failure to establish an IPsec SA. (Retention: Normal) |
| |
Establishment/Termination of an IPsec SA. (Retention: Normal) | Non-TOE endpoint of connection attempt (IP address). | |
FCS_RBG.1 | ||
No events specified | N/A | |
FCS_RBG.2 | ||
No events specified | N/A | |
FCS_RBG.3 | ||
No events specified | N/A | |
FCS_RBG.4 | ||
No events specified | N/A | |
FCS_RBG.5 | ||
No events specified | N/A | |
FDP_CRL_EXT.1 | ||
Failure to generate CRL. (Retention: Normal) | No additional information | |
FDP_ITT.1 | ||
No events specified | N/A | |
FDP_OCSPG_EXT.1 | ||
Failure to generate cerficate status information. (Retention: Normal) | No additional information | |
FIA_AFL.1 | ||
The reaching of the threshold for the unsuccessful authentication attempts. (Retention: Normal) | No additional information | |
The action taken. | No additional information | |
The reenablement of disabled nonadministrative accounts. (Retention: Normal) | No additional information | |
FIA_CMCC_EXT.1 | ||
CMC requests (generated or received) containing certificate requests or revocation requests. (Retention: Extended) |
| |
CMC responses issued. (Retention: Extended) | Any signed response. | |
FIA_CMCS_EXT.1 | ||
CMC requests (generated or received) containing certificate requests or revocation
requests. (Retention: Extended) |
| |
CMC responses issued. (Retention: Extended) | Any signed response. | |
FIA_ESTC_EXT.1 | ||
EST requests (generated or received) containing certificate requests
or revocation requests. (Retention: Extended) |
| |
EST responses issued. (Retention: Extended) | Any signed response. | |
FIA_ESTS_EXT.1 | ||
EST requests (generated or received) containing certificate
requests or revocation requests. (Retention: Extended) |
| |
EST responses issued. (Retention: Extended) | Any signed response. | |
FIA_PMG_EXT.1 | ||
No events specified | N/A | |
FIA_PSK_EXT.1 | ||
No events specified | N/A | |
FIA_UAU.7 | ||
No events specified | N/A | |
FIA_X509_EXT.3 | ||
No events specified | N/A | |
FPT_APW_EXT.1 | ||
No events specified | N/A | |
FPT_ITT.1 | ||
No events specified | N/A | |
FPT_SKY_EXT.2 | ||
Access control violations for users involved in key share establishment or control. (Retention: Extended) | No additional information | |
FPT_TST.1 | ||
Execution of this set of TSF integrity tests (Retention: Normal) | No additional information | |
Detected integrity violations (Retention: Normal) | The identity of the object that caused the integrity violation | |
FTP_ITC.1 | ||
Initiation of the trusted channel. (Retention: Normal) | No additional information | |
Termination of the trusted channel. (Retention: Normal) | No additional information | |
Failure of the trusted channel functions. (Retention: Normal) | Identification of the initiator and target of failed trusted channels establishment attempt. |
For the selection in this requirement, the ST author selects "TSF noise source" if a single noise source is used as input to the DRBG. The ST author selects "multiple TSF noise sources" if a seed is formed from a combination of two or more noise sources within the TOE boundary. If the TSF implements two or more separate DRBGs that are seeded in separate manners, this SFR should be iterated for each DRBG. If multiple distinct noise sources exist such that each DRBG only uses one of them, then each iteration would select "TSF noise source"; "multiple TSF noise sources" is only selected if a single DRBG uses multiple noise sources for its seed. The ST author selects "TSF interface for seeding" if noise source data is generated outside the TOE boundary.
If "TSF noise source" is selected, FCS_RBG.3 must be claimed.
If "multiple TSF noise sources" is selected, FCS_RBG.4 and FCS_RBG.5 must be claimed.
If "TSF interface for seeding" is selected, FCS_RBG.2 must be claimed.
Functional Class | Functional Components |
---|---|
Class: Communications (FCO) | FCO_NRO_EXT Certificate-Based Proof of Origin FCO_NRR_EXT Certificate-Based Proof of Receipt |
Class: Cryptographic Support (FCS) | FCS_CDP_EXT Cryptographic Dependencies FCS_CKM_EXT Cryptographic Key Management FCS_HTTPS_EXT HTTPS Protocol FCS_IPSEC_EXT IPsec Protocol FCS_KSH_EXT Key Sharing FCS_STG_EXT Cryptographic Key Storage |
Class: Identification and Authentication (FIA) | FIA_CMCC_EXT Certificate Management over CMS Client FIA_CMCS_EXT Certificate Management over CMS Server FIA_ENR_EXT Certificate Enrollment FIA_ESTC_EXT Enrollment over Secure Transport Client FIA_ESTS_EXT Enrollment over Secure Transport Server FIA_PMG_EXT Password Management FIA_PSK_EXT Pre-Shared Key Composition FIA_UAU_EXT Authentication Mechanism FIA_UIA_EXT User Identification and Authentication |
Class: Protection of the TSF (FPT) | FPT_APW_EXT Protection of User Password FPT_KST_EXT No Plaintext Key Export FPT_NPE_EXT NPE Constraints FPT_SKP_EXT Protection of Keys FPT_SKY_EXT Split Knowledge Procedures FPT_TST_EXT TOE Testing FPT_TUD_EXT Trusted Update |
Class: Security Audit (FAU) | FAU_ADP_EXT Audit Dependencies FAU_GCR_EXT Generation of Certificate Repository FAU_SCR_EXT Certificate Repository Review |
Class: TOE Access (FTA) | FTA_SSL_EXT TSF-Initiated Session Locking |
Class: User Data Protection (FDP) | FDP_CER_EXT Certificate Generation FDP_CRL_EXT Certificate Revocation Lists FDP_CSI_EXT Certificate Status Information FDP_OCSPG_EXT OCSP Response Generation FDP_SDP_EXT Sensitive Data Protection FDP_STG_EXT Sensitive Data Storage |
FCO_NRO_EXT.2, Certificate-Based Proof of Origin, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FCO_NRR_EXT.2, Certificate-Based Proof of Receipt, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FCS_CDP_EXT.1, Cryptographic Dependencies, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FCS_CKM_EXT.1, Symmetric Key Generation, requires a conformant TOE to TODO: QQQQQ
FCS_CKM_EXT.5, Public Key Integrity, requires a conformant TOE to TODO: QQQQQ
FCS_CKM_EXT.6, Key Archival, requires a conformant TOE to TODO: QQQQQ
FCS_CKM_EXT.7, Key Generation for KEKs, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FCS_HTTPS_EXT.1, HTTPS Protocol, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
FCS_IPSEC_EXT.1, IPsec Protocol, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FCS_KSH_EXT.1, Key Sharing, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FCS_STG_EXT.1, Cryptographic Key Storage, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FIA_CMCC_EXT.1, Certificate Management over CMS (CMC) Client, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FIA_CMCS_EXT.1, Certificate Management over CMS (CMC) Server, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FIA_ENR_EXT.1, Certificate Enrollment, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FIA_ESTC_EXT.1, Enrollment over Secure Transport (EST) Client, requires a conformant TOE to TODO: QQQQQ
FIA_ESTC_EXT.2, EST Client use of TLS-unique value, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FIA_ESTS_EXT.1, Enrollment over Secure Transport (EST) Server, requires a conformant TOE to TODO: QQQQQ
FIA_ESTS_EXT.2, Enrollment over Secure Transport (EST) Server, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FIA_PMG_EXT.1, Password Management, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FIA_PSK_EXT.1, Pre-Shared Key Composition, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FIA_UAU_EXT.1, Authentication Mechanism, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
FIA_UIA_EXT.1, User Identification and Authentication, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FPT_APW_EXT.1, Protection of Privileged User Password, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
FPT_KST_EXT.1, No Plaintext Key Export, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
FPT_NPE_EXT.1, NPE Constraints, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FPT_SKP_EXT.1, Protection of Keys, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FPT_SKY_EXT.1, Split Knowledge Procedures, requires a conformant TOE to TODO: QQQQQ
FPT_SKY_EXT.2, Key Share Access, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FPT_TST_EXT.1, TOE Integrity Test, requires a conformant TOE to TODO: QQQQQ
FPT_TST_EXT.2, Integrity Test, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FPT_TUD_EXT.1, Trusted Update, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FAU_ADP_EXT.1, Audit Dependencies, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FAU_GCR_EXT.1, Generation of Certificate Repository, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
FAU_SCR_EXT.1, Certificate Repository Review, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FTA_SSL_EXT.1, TSF-Initiated Session Locking, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FDP_CER_EXT.1, Certificate Profiles, requires a conformant TOE to TODO: QQQQQ
FDP_CER_EXT.2, Certificate Request Matching, requires a conformant TOE to TODO: QQQQQ
FDP_CER_EXT.3, Certificate Issuance Approval, requires a conformant TOE to TODO: QQQQQ
FDP_CER_EXT.4, Certificate Status Information, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FDP_CRL_EXT.1, Certificate Revocation List Validation, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FDP_CSI_EXT.1, Certificate Status Information, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FDP_OCSPG_EXT.1, OCSP Basic Response Generation, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FDP_SDP_EXT.1, User Sensitive Data Protection, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
FDP_STG_EXT.1, User Sensitive Data Protection, requires a conformant TOE to TODO: QQQQQ
TODO: QQQQQ
TODO: QQQQQ
Hierarchical to: | No other components. |
Dependencies to: | TODO: QQQQQ |
Acronym | Meaning |
---|---|
AES | Advanced Encryption Standard |
AOR | Authorized Organizational Representative |
API | Application Programming Interface |
Base-PP | Base Protection Profile |
CA | Certification Authority |
CBC | Cipher Block Chaining |
CC | Common Criteria |
CC | Common Criteria |
CCM | Counter with CBC-Message Authentication Code |
CCMP | CCM Protocol |
CCTL | Common Criteria Test Lab |
CEM | Common Evaluation Methodology |
CESG | Communications-Electronics Security Group |
CMC | Certificate Management over CMS |
CMS | Cryptographic Message Syntax |
CN | Common Names |
cPP | Collaborative Protection Profile |
CRL | Certificate Revocation List |
CSA | Computer Security Act |
CSP | Critical Security Parameter |
CSS | Certificate Status Server |
DAR | Data At Rest |
DEK | Data Encryption Key |
DES | Data Encryption Standard |
DH | Diffie-Hellman |
DHE | Diffie-Hellman Key Exchange |
DKM | Derived Keying Material |
DNS | Domain Name System |
DRBG | Deterministic Random Bit Generator |
DSA | Digital Signature Algorithm |
DSS | Digital Signature Standard |
DT | Date/Time Vector |
DTLS | Datagram Transport Layer Security |
EAP | Extensible Authentication Protocol |
ECC | Elliptic Curve Cryptography |
ECDHE | Elliptic Curve Diffie-Hellman Ephemeral |
ECDSA | Elliptic Curve Digital Signature Algorithm |
EDC | Error detection code |
EEPROM | Electrically Erasable Programmable Read-Only Memory |
ESP | Encapsulating Security Payload (IPsec) |
EST | Enrollment over Secure Transport |
FFC | Finite-Field Cryptography |
FIPS | Federal Information Processing Standards |
FP | Functional Package |
GCM | Galois/Counter Mode |
HMAC | Hash-based Message Authentication Code |
HSM | Hardware Security Module |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
I and A | Identification and Authentication |
IETF | Internet Engineering Task Force |
IKE | Internet key Exchange |
IP | Internet Protocol |
IPsec | Internet Protocol Security |
ISO | International Organization for Standardization |
IT | Information Technology |
ITSEF | Information Technology Security Evaluation Facility |
IUT | Implementation Under Test |
IV | Initialization Vector |
KAT | Known Answer Tests |
KDF | Key Derivation Function |
KEK | Key Encryption Key |
KW | Key Wrap |
KWP | Key Wrapping with Padding |
MAC | Message Authentication Code |
MODP | Modular Exponential |
NAT | Network Address Translation |
NIAP | National Information Assurance Partnership |
NIST | National Institute of Standards and Technology |
NPE | Non-person Entity |
NTP | Network Time Protocol |
OCSP | Online Certificate Status Protocol |
OE | Operational Environment |
OID | Object Identifier |
OMB | Office of Management and Budget |
PGP | Pretty Good Privacy |
PKI | Public Key Infrastructure |
PKV | Public Key Verification |
PP | Protection Profile |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
RA | Registration Authority |
RAM | Random Access Memory |
RBG | Random Bit Generator |
rDSA | RSA Digital Signature Algorithm |
REK | Root Encryption Key |
RFC | Request for Comment |
RNG | Random Number Generator |
RNGVS | Random Number Generator Validation System |
RSA | Rivest Shamir Adleman |
S/MIME | Secure/Multi-purpose Internet Mail Extensions |
SA | Security Association (IPsec) |
SAN | Subject Alternative Name |
SAR | Security Assurance Requirement |
SAR | Security Assurance Requirement |
SFR | Security Functional Requirement |
SFR | Security Functional Requirement |
SHA | Secure Hash Algorithm |
SIP | Session Initiation Protocol |
SNMP | Simple Network Management Protocol |
SSH | Secure Shell |
SSL | Secure Sockets Layer |
ST | Security Target |
ST | Security Target |
SWID | Software Identification |
TLS | Transport Layer Security |
TOE | Target of Evaluation |
TOE | Target of Evaluation |
TPM | Trusted Platform Module |
TSF | TOE Security Function |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |
TSS | TOE Summary Specification |
URI | Uniform Resource Identifier |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
XCCDF | eXtensible Configuration Checklist Description Format |
XOR | Exclusive Or |
Identifier | Title |
---|---|
[CC] | Common Criteria for Information Technology Security Evaluation -
|
[CEM] | Common Methodology for Information Technology Security Evaluation -
|
[IR7924] | Second Draft NIST IR 7924, Reference Certificate Policy, May 2014. |