PP-Module for Client Virtualization Systems

NIAP Logo
Version: 1.1
2021-06-14
National Information Assurance Partnership

Revision History

VersionDateComment
1.02016-11-17Initial Publication
1.12021-06-14Published as a PP-Module

Contents

1Introduction1.1Overview1.2Terms1.2.1Common Criteria Terms1.2.2Technical Terms1.3Compliant Targets of Evaluation1.3.1TOE Boundary1.4Use Cases2Conformance Claims3Security Problem Description3.1Threats3.2Assumptions3.3Organizational Security Policies4Security Objectives4.1Security Objectives for the TOE4.2Security Objectives for the Operational Environment4.3Security Objectives Rationale5Security Requirements5.1Client Virtualization Systems PP Security Functional Requirements Direction 5.1.1 Modified SFRs 5.2TOE Security Functional Requirements5.2.1Auditable Events for Mandatory SFRs5.2.2Security Management (FMT)5.3TOE Security Functional Requirements Rationale6Consistency Rationale6.1 Protection Profile for Client Virtualization Systems6.1.1 Consistency of TOE Type 6.1.2 Consistency of Security Problem Definition 6.1.3 Consistency of Objectives 6.1.4 Consistency of Requirements Appendix A - Optional SFRsA.1Strictly Optional Requirements A.2Objective Requirements A.3Implementation-based Requirements Appendix B - Selection-based Requirements Appendix C - Extended Component DefinitionsC.1Extended Components TableC.2Extended Component DefinitionsC.2.1Security Management (FMT)C.2.1.1FMT_MOF_EXT Management of Security Functions BehaviorAppendix D - EntropyAppendix E - AcronymsAppendix F - Bibliography

1 Introduction

1.1 Overview

The scope of this PP-Module is to define the security functionality of a Client Virtualization product in terms of [CC] and to define functional and assurance requirements for such products. This PP-Module is not complete in itself, but rather is intended for use with the following Base-PP: This Base-PP is valid because Client Virtualization is a specific type of Virtualization System and is expected to implement security functionality that is not common to all Virtualization Systems. One additional SFR has been defined in this PP-Module to define security functionality that is unique to this particular type of Virtualization System.

1.3 Compliant Targets of Evaluation

Client Virtualization, for the purposes of this PP-Module, refers to a Virtualization System that implements virtualized hardware components locally on an endpoint machine. Endpoints are typically client hardware such as desktop or laptop computers that a user interacts with directly, but may also include headless embedded systems without direct human interaction. A Virtualization System creates a virtualized hardware environment for each instance of a guest operating system (a virtual machine) permitting these environments to execute concurrently while maintaining isolation and the appearance of exclusive control over assigned computing resources. Client virtualization is generally used on endpoint systems, making use of the local machine's resources (memory, CPU, etc.) to provide isolated user environments.

This document does not address virtualization on mobile devices (typically devices that use a baseband processor or connect to a cellular network), nor does it address application virtualization or containers.

1.3.1 TOE Boundary

The TOE boundary is the same as that which is defined for a Virtualization System in general. Refer to the base Virtualization PP for an outline of the TOE boundary.

1.4 Use Cases

Requirements in this PP-Module are designed to address the security problem in the following use cases. The description of these use cases provides examples for how the TOE and its Operational Environment could support the functionality required by this PP-Module.
[USE CASE 1] Locally Managed Client
A local administrator creates and runs one or more VMs locally. This client could be stand-alone or connected to a network.
[USE CASE 2] Enterprise Managed Client
An enterprise administrator for the VS centrally manages one or more client hypervisors, creating and configuring VMs which are then pushed to the clients. These VMs are then available for users on that client to run using the computing resources of that client. (Note that this is not Virtual Desktop Infrastructure where the hypervisors and the VMs run on remote servers. While both can be centrally managed and accessed from clients, for client virtualization, the VMs are local to the endpoint machine.)
[USE CASE 3] Headless Client
A VM is used by a program without direct human interaction.

2 Conformance Claims

Conformance Statement
This PP-Module inherits exact conformance as required from the Virtualization PP and as defined in the CC and CEM addenda for Exact Conformance, Selection-Based SFRs, and Optional SFRs (dated May 2017).

There are no other PP-Modules that are allowed to be specified in a PP-Configuration with this PP-Module.
CC Conformance Claims
This PP Module is conformant to Parts 2 (extended) and 3 (extended) of Common Criteria Version 3.1, Release 5 [CC].

3 Security Problem Description

The security problem is described in terms of the threats that the TOE is expected to address, assumptions about its operational environment, and any organizational security policies that the TOE is expected to enforce.

3.1 Threats

This PP-Module defines no additional threats beyond those defined in the base Virtualization PP. Note however that the SFRs defined in this PP-Module will assist in the mitigation of the following threats defined in the Base-PP:
T.UNAUTHORIZED_UPDATE
See Virtualization PP, Section 3.1.
T.UNAUTHORIZED_ACCESS
See Virtualization PP, Section 3.1.

3.2 Assumptions

This document does not define any additional assumptions.

3.3 Organizational Security Policies

An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.

This document does not define any additional OSPs.

4 Security Objectives

4.1 Security Objectives for the TOE

This PP-Module defines no additional TOE security objectives beyond those defined in the base Virtualization PP. Note however that the SFR defined in this PP-Module will assist in the achievement of the following objectives defined in the Base-PP:
O.VMM_INTEGRITY
See Virtualization PP, Section 4.1.
O.MANAGEMENT_ACCESS
See Virtualization PP, Section 4.1.

4.2 Security Objectives for the Operational Environment

This PP-Module does not define any objectives for the OE. Because this Module does not define any additional assumptions or organizational security policies, there are no additional security objectives for the Operational Environment to satisfy.

4.3 Security Objectives Rationale

This section describes how the assumptions, threats, and organizational security policies map to the security objectives.
Table 1: Security Objectives Rationale
Threat, Assumption, or OSPSecurity ObjectivesRationale
T.UNAUTHORIZED_​UPDATEO.VMM_​INTEGRITYIntegrity of a Virtualization System can be maintained by ensuring that the only way to modify the VS is through a trusted update process initiated by an authorized Administrator as required by FMT_MOF_EXT.
T.UNAUTHORIZED_​ACCESSO.MANAGEMENT_​ACCESSAccess to management functions must be limited to authorized Administrators as managed through controls required by FMT_MOF_EXT.1.

5 Security Requirements

This chapter describes the security requirements which have to be fulfilled by the product under evaluation. Those requirements comprise functional components from Part 2 and assurance components from Part 3 of [CC]. The following conventions are used for the completion of operations:

5.1 Client Virtualization Systems PP Security Functional Requirements Direction

In a PP-Configuration that includes the Virtualization PP, the TOE is expected to rely on some of the security functions implemented by the Virtualization System as a whole and evaluated against the Base-PP. This section describes any modifications that the ST author must make to Base-PP SFRs to satisfy the required VS functionality.

5.1.1 Modified SFRs

This PP-Module does not modify any SFRs defined by the Client Virtualization Systems PP.

5.2 TOE Security Functional Requirements

The following section describes the SFRs that must be satisfied by any TOE that claims conformance to this PP-Module. These SFRs must be claimed regardless of which PP-Configuration is used to define the TOE.

5.2.1 Auditable Events for Mandatory SFRs

Table 2: Auditable Events for Mandatory Requirements
RequirementAuditable EventsAdditional Audit Record Contents
FMT_MOF_EXT.1
Attempts to invoke any of the management functions listed in Table 3
  • Success or failure of attempt
  • Identity of actor

5.2.2 Security Management (FMT)

FMT_MOF_EXT.1 Management of Security Functions Behavior

The TSF shall be capable of supporting [selection: local, remote ] administration.
Application Note: Selection of “remote” requires the selection-based requirement FTP_TRP.1 defined in the Base-PP to be included in the ST.
The TSF shall be capable of performing the following management functions, [controlled by an Administrator or User as shown in Table 3, based on the following key:

Table 3: Client Virtualization Management Functions

X = Mandatory (TOE must provide that function to that role)
O = Optional (TOE may or may not provide that function to that role)
N = Not Permitted (TOE must not provide that function to that role)
S = Selection-Based (TOE must provide that function to that role if the TOE claims a particular selection-based SFR)
Number Function Admin User Notes (all SFR references are from the base Virtualization PP
1 Ability to update the Virtualization System X N See FPT_TUD_EXT.1
2 [selection: Ability to configure Administrator password policy as defined in FIA_PMG_EXT.1, Not applicable. ] S N Must be selected if ST includes FIA_PMG_EXT.1.
3 Ability to create, configure and delete VMs X O
4 Ability to set default initial VM configurations X O
5 Ability to configure virtual networks including VM X O See FDP_VNC_EXT.1
6 Ability to configure and manage the audit system and audit data X N
7 Ability to configure VM access to physical devices X O See FDP_PPR_EXT.1
8 Ability to configure inter-VM data sharing X O See FDP_VMS_EXT.1
9 Ability to enable/disable VM access to Hypercall functions O O Management function 9 is no longer required
10 Ability to configure removable media policy X O See FPT_RDM_EXT.1
11 Ability to configure the cryptographic functionality O O See FCS_CKM.1, FCS_CKM.2, and FCS_COP.1/HASH. See also, the Functional Packages for Transport Layer Security (TLS) and for Secure Shell (SSH) if claimed for methods to configure their respective cryptographic functionality.
12 Ability to change default authorization factors X N See FIA_PMG_EXT.1
13 Ability to enable/disable screen lock O O
14 Ability to configure screen lock inactivity timeout O O
15 Ability to configure remote connection inactivity timeout X N
16 Ability to configure lockout policy for unsuccessful authentication attempts through [selection: timeouts between attempts, limiting number of attempts during a time period ] X N See FIA_AFL_EXT.1
17 [selection: Ability to configure name/address of directory server to bind with, Not applicable ] S O Must be selected if "directory-based" is selected anywhere in FIA_UAU.5.1 in the base Virtualization PP.
18 Ability to configure name/address of audit/logging server to which to send audit/logging records X N See FAU_STG_EXT.1.
19 Ability to configure name/address of network time server X O
20 Ability to configure banner X N See FTA_TAB.1
21 Ability to connect/disconnect removable devices to/from a VM O O See FPT_RDM_EXT.1
22 Ability to start a VM O O
23 Ability to stop/halt a VM O O
24 Ability to checkpoint a VM O O
25 Ability to suspend a VM O O
26 Ability to resume a VM O O
27 [selection: Ability to configure action taken if unable to determine the validity of a certificate, Not applicable ] S N This function must be selected if "allow the administrator to choose whether to accept the certificate in these cases" in FIA_X509_EXT.2.2 in the Base-PP.

]
Application Note: The ST author is expected to update Table 3 with an indication as to whether any of the ‘optional’ or ‘selection-based’ functions are included as part of the TOE. The ST author may also omit the ‘Notes’ column as it is provided in this PP-Module as an aid to the ST author in constructing the table.

This SFR addresses the roles of the CC Part 2 SFRs FMT_MOF.1, FMT_SMF.1, and FMT_SMR.2.

Administration is considered “local” if the Administrator is physically present at the machine on which the VS is installed.

Administration is considered “remote” if communications between the Administrator and the Management Subsystem travel on a network.

There is no requirement to authenticate Users of the Virtualization System. Users that have access to VMs but not to the Management Subsystem need not authenticate to the Virtualization System in order to use Guest VMs. Requirements for authentication of VM users is determined by the policies of the domains running within the Guest VMs.

For a VS where the OS is part of the platform and not part of the TOE, it is acceptable for the VS to invoke the Host OS screen lock.

5.3 TOE Security Functional Requirements Rationale

The following rationale provides justification for each security objective for the TOE, showing that the SFRs are suitable to meet and achieve the security objectives:

Table 4: SFR Rationale
ObjectiveAddressed byRationale
O.VMM_​INTEGRITY
FMT_MOF_EXT.1Integrity of a Virtualization System can be maintained by ensuring that the only way to modify the VS is through a trusted update process initiated by an authorized Administrator as required by FMT_MOF_EXT.1.
O.MANAGEMENT_​ACCESS
FMT_MOF_EXT.1Access to management functions must be limited to authorized Administrators as managed through controls required by FMT_MOF_EXT.1.

6 Consistency Rationale

6.1 Protection Profile for Client Virtualization Systems

6.1.1 Consistency of TOE Type

When this PP-Module is used to extend the Virtualization PP, the TOE type for the overall TOE is still a Virtualization System. The TOE boundary does not change.

6.1.2 Consistency of Security Problem Definition

PP-Module Threat, Assumption, OSPConsistency Rationale
T.UNAUTHORIZED_UPDATEThis threat applies to functionality that is described in the Base-PP, but is managed through functionality described in this PP-module.
T.UNAUTHORIZED_ACCESSThis threat applies to functionality that is described in the Base-PP, but is managed through functionality described in this PP-module.

6.1.3 Consistency of Objectives

The objectives for the TOEs are consistent with the Client Virtualization Systems PP based on the following rationale:

PP-Module TOE ObjectiveConsistency Rationale
O.VMM_INTEGRITYThis objective comes directly from the PP.
O.MANAGEMENT_ACCESSThis objective comes directly from the PP.

6.1.4 Consistency of Requirements

This PP-Module identifies several SFRs from the Client Virtualization Systems PP that are needed to support Client Virtualization Systems functionality. This is considered to be consistent because the functionality provided by the Client Virtualization Systems PP is being used for its intended purpose. The rationale for why this does not conflict with the claims defined by the Client Virtualization Systems PP are as follows:
PP-Module RequirementConsistency Rationale
Modified SFRs
This PP-Module does not modify any requirements when the Client Virtualization Systems PP is the base.
Additional SFRs
This PP-Module does not add any requirements when the Client Virtualization Systems PP is the base.
Mandatory SFRs
FMT_MOF_EXT.1This SFR requires the Client Virtualization product to manage security functionality defined in the Virtualization PP in FPT_TUD_EXT.1, FIA_PMG_EXT.1, FDP_VNC_EXT.1, FDP_PPR_EXT.1, FDP_VMS_EXT.1, FIA_UAU.5, FPT_RDM_EXT.1, FCS_CKM.1, FCS_CKM.2, FCS_COP.1/HASH, FIA_AFL_EXT.1, FAU_STG_EXT.1, FIA_X509_EXT.2.2, and FTA_TAB.1.
Optional SFRs
This PP-Module does not define any Optional requirements.
Objective SFRs
This PP-Module does not define any Objective requirements.
Implementation-based SFRs
This PP-Module does not define any Implementation-based requirements.
Selection-based SFRs
This PP-Module does not define any Selection-based requirements.

Appendix A - Optional SFRs

A.1 Strictly Optional Requirements

This PP-Module does not define any Strictly Optional SFRs.

A.2 Objective Requirements

This PP-Module does not define any Objective SFRs.

A.3 Implementation-based Requirements

This PP-Module does not define any Implementation-based SFRs.

Appendix B - Selection-based Requirements

This PP-Module does not define any Selection-based SFRs.

Appendix C - Extended Component Definitions

This appendix contains the definitions for all extended requirements specified in the PP-Module.

C.1 Extended Components Table

All extended components specified in the PP-Module are listed in this table:
Table 5: Extended Component Definitions
Functional ClassFunctional Components
Security Management (FMT)FMT_MOF_EXT Management of Security Functions Behavior

C.2 Extended Component Definitions

C.2.1 Security Management (FMT)

This PP-Module defines the following extended components as part of the FMT class originally defined by CC Part 2:

C.2.1.1 FMT_MOF_EXT Management of Security Functions Behavior

This family is defined in the Virtualization PP. This Module augments the extended family by adding one additional component, FMT_MOF_EXT.1.

FMT_MOF_EXT.1, Management of Security Functions Behavior, defines required management functions and responsibilities.

Management: FMT_MOF_EXT.1

There are no additional management functions beyond those already described in FMT_MOF_EXT.1.

Audit: FMT_MOF_EXT.1

There are no auditable events defined for this SFR.

FMT_MOF_EXT.1 Management of Security Functions Behavior

Hierarchical to: No other components.

Dependencies to: No other dependencies.

FMT_MOF_EXT.1.1

The TSF shall be capable of supporting [assignment: a type of administration] administration.

FMT_MOF_EXT.1.2

The TSF shall be capable of performing the following management functions [assignment: description of management functions].

Appendix D - Entropy

The TOE does not require any additional supplementary information to describe its entropy sources beyond the requirements outlined in the ‘Entropy Documentation and Assessment’ section of the base Virtualization PP. As with other Base-PP requirements, the only additional requirement is that the entropy documentation also applies to the specific Client Virtualization capabilities of the TOE in addition to the functionality required by the Base-PP.

Appendix E - Acronyms

AcronymMeaning
Base-PPBase Protection Profile
CCCommon Criteria
CEMCommon Evaluation Methodology
cPPCollaborative Protection Profile
EPExtended Package
FPFunctional Package
OEOperational Environment
OSOperating System
PPProtection Profile
PP-ConfigurationProtection Profile Configuration
PP-ModuleProtection Profile Module
SARSecurity Assurance Requirement
SFRSecurity Functional Requirement
STSecurity Target
TOETarget of Evaluation
TSFTOE Security Functionality
TSFITSF Interface
TSSTOE Summary Specification
VMVirtual Machine
VMMVirtual Machine Manager
VSVirtualization System

Appendix F - Bibliography

IdentifierTitle
[CC]Common Criteria for Information Technology Security Evaluation -
[VirtPP]Protection Profile for Virtualization, Version: 1.1, 2021-06-14