
| Version | Date | Comment |
|---|---|---|
| 1.0 | 2020-10-23 | First version released |
| 2.0 | 2025-06-13 | CC:2022 conversion |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Direct Rationale | A type of Protection Profile, PP-Module, or Security Target in which the security problem definition (SPD) elements are mapped directly to the SFRs and possibly to the security objectives for the operational environment. There are no security objectives for the TOE. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Alert | An event or notification on the management dashboard that highlights potentially unauthorized activity. |
Endpoint | A computing device that runs a general purpose OS, a mobile device OS, or network device OS. Endpoints can include desktops, servers, and mobile devices. |
Endpoint Detection and Response (EDR) | Server software that analyzes collected EDR Host Agent data for detecting, investigating, and remediating unauthorized activities on endpoints. The terms TOE and EDR are interchangeable in this document. |
Endpoint Detection and Response System | The EDR server and the Host Agents they operate with. |
Enroll | The act of registering an HA endpoint with the EDR. |
Host Agent | Complementary software that executes on endpoints to collect data about the endpoint and executes commands sent to the endpoint from an Enterprise Security Management (ESM) server or service. An example command sent to an endpoint could be to enforce a policy from an ESM, to collect some files, or to run an OS command. |
Management Dashboard | A management interface for the configuration of EDR policy, visualization of collected endpoint alert data, and issuing of remediation commands. |
| This refers to the set of activities detected by the TOE, specific items detected may be unique to the TOE | |
SOC Analyst | Security Operations Center (SOC) Analyst is typically the person responsible for reviewing potentially unauthorized activities via alerts and performing remediation and clean up. |
An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.
This document does not define any additional OSPs.| Assumption or OSP | Security Objectives | Rationale |
| A.CONNECTIVITY | OE.RELIABLE_TRANSIT | The OE objective OE.RELIABLE_TRANSIT is realized through A.CONNECTIVITY. |
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FAU_ALT_EXT.1 | ||
| No events specified | N/A | |
| FAU_COL_EXT.1 | ||
| No events specified | N/A | |
| FAU_GEN.1/EDR | ||
| No events specified | N/A | |
| FIA_AUT_EXT.1 | ||
| No events specified | N/A | |
| FIA_PWD_EXT.1 | ||
| No events specified | N/A | |
| FMT_SMF.1/ENDPOINT | ||
| No events specified | N/A | |
| FMT_SMF.1/HOST | ||
| No events specified | N/A | |
| FMT_SMR.1 | ||
| No events specified | N/A | |
| FMT_SRF_EXT.1 | ||
| No events specified | N/A | |
| FPT_ITT.1 | ||
| No events specified | N/A | |
| FTP_TRP.1 | ||
| No events specified | N/A |
| # | Management Function | Administrator | SOC Analyst | Read-Only User |
| 1 | Configure the amount of time to retain data collected by the EDR [assignment: time frame to retain data] | MMandatory | OOptional/Conditional | -N/A |
| 2 | Obtain or display the connectivity status of a Host Agent | MMandatory | OOptional/Conditional | OOptional/Conditional |
| 3 | Define a configurable list of [selection: filenames, folders, file hashes, [assignment: other factors]] | OOptional/Conditional | MMandatory | -N/A |
| 4 | Configure visual suppression of incident alerts based on a configurable list of [selection: filenames, folders, file hashes, [assignment: other factors]] | OOptional/Conditional | MMandatory | -N/A |
| # | Management Function | Administrator | SOC Analyst | Read-Only User |
| 5 | Configure the frequency for sending Host Agent data to the EDR [assignment: list of configurable frequencies] | MMandatory | OOptional/Conditional | -N/A |
| 6 | Assign a label or tag to categorize or group individual endpoint systems | MMandatory | OOptional/Conditional | -N/A |
| # | Management Function | Administrator | SOC Analyst | Read-Only User |
| 7 | Quarantine an endpoint by [selection: logically quarantining the endpoint from the network unless allowlisted, quarantining the malicious file on the endpoint] | OOptional/Conditional | MMandatory | -N/A |
| 8 | Terminate a running process on an endpoint | OOptional/Conditional | MMandatory | -N/A |
| 9 | Retrieve potentially unauthorized or affected files from an endpoint | OOptional/Conditional | OOptional/Conditional | -N/A |
This requirement captures all the remediation functionality the EDR provides the SOC Analyst and optionally the Administrator.
Logically quarantine from the network refers to restricting communications from the endpoint to the rest of the network, it may include a restricted allowlist.
Any function that is not mandatory for at least one role is considered optional for the TOE.
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
| Threat | Addressed by | Rationale |
|---|---|---|
| T.MISCONFIGURATION | FAU_ALT_EXT.1 | The PP-Module includes FAU_ALT_EXT.1 to facilitate management by providing a function for authorized users to interact with security-relevant data that is provided to the TSF. |
| FAU_COL_EXT.1 | The PP-Module includes FAU_COL_EXT.1 to facilitate management by defining the security-relevant data that is collected by the TSF. | |
| FAU_GEN.1/EDR | The PP-Module includes FAU_GEN.1/EDR to ensure that the TOE provides accountability through the generation of audit data for security-relevant events. | |
| FIA_AUT_EXT.1 | The PP-Module includes FIA_AUT_EXT.1 to define how management users are authenticated by the TSF to limit the subjects that can execute management functions on the TOE. | |
| FIA_PWD_EXT.1 | The PP-Module includes FIA_PWD_EXT.1 to define composition requirements for the Password Authentication Factor to ensure that an authorized user cannot access protected management functions without authorization. | |
| FMT_SMF.1/ENDPOINT | The PP-Module includes FMT_SMF.1/ENDPOINT to define the management functions that can be performed to control the behavior of the TSF and the management roles that are authorized to perform those functions. | |
| FMT_SMF.1/HOST | The PP-Module includes FMT_SMF.1/HOST to define the management functions that can be performed to control the behavior of Host Agents that are connected to the TOE and the management roles that are authorized to perform those functions. | |
| FMT_SMR.1 | The PP-Module includes FMT_SMR.1 to define the management roles that the TSF supports so that its management functions can be separated by role. | |
| FMT_SRF_EXT.1 | The PP-Module includes FMT_SRF_EXT.1 to define the remediation functions that are available to authorized users to issue corrective actions on a system that has a connected Host Agent. | |
| FMT_TRM_EXT.1 | The PP-Module includes FMT_TRM_EXT.1 to provide an optional capability to ensure the integrity of management commands and policies issued to external Host Agents through use of a digital signature. | |
| T.CREDENTIAL_REUSE | FPT_ITT.1 | The PP-Module includes FPT_ITT.1 to define the internal trusted channel that the TSF uses to communicate with connected Host Agents as well as the communications protocols used to establish these trusted channels. |
| FTP_TRP.1 | The PP-Module includes FTP_TRP.1 to define the communications protocols used to support secure remote administration of the TSF. |
| PP-Module Threat, Assumption, OSP | Consistency Rationale |
|---|---|
| T.MISCONFIGURATION | This threat applies to management functionality that is introduced in this PP-Module and does not affect the functionality described by the Base-PP. |
| T.CREDENTIAL_REUSE | This threat applies to authentication functionality that is introduced in this PP-Module and does not affect the functionality described by the Base-PP. |
| A.CONNECTIVITY | This assumption is consistent with the Base-PP because assuming network availability is consistent with the A.PLATFORM assumption defined by the Base-PP, which expects the TOE to have a trustworthy computing platform. |
| PP-Module OE Objective | Consistency Rationale |
|---|---|
| OE.RELIABLE_TRANSIT | This objective relates to an external interface that does not exist in the Base-PP and does not affect Base-PP functionality. |
| PP-Module Requirement | Consistency Rationale |
|---|---|
| Modified SFRs | |
| This PP-Module does not modify any requirements when the App PP is the base. | |
| Additional SFRs | |
| This PP-Module does not add any requirements when the App PP is the base. | |
| Mandatory SFRs | |
| FAU_ALT_EXT.1 | This SFR defines auditable alerts for the EDR. It does not impact the functionality. |
| FAU_COL_EXT.1 | This SFR defines the minimum event data that the EDR collects from a Host Agent. It does not impact the functionality. |
| FAU_GEN.1/EDR | This SFR defines the minimum event data that the EDR server must record about authorized management dashboard activity. It does not impact the functionality. |
| FIA_AUT_EXT.1 | This SFR defines authentication mechanisms for the EDR. It does not impact the functionality. |
| FIA_PWD_EXT.1 | This SFR defines specific authentication criteria for passwords. It does not impact the functionality. |
| FMT_SMF.1/ENDPOINT | This SFR defines a specific set of management functions for an EDR by an EDR. It does not impact the functionality. |
| FMT_SMF.1/HOST | This SFR defines a specific set of management functions for a Host Agent by an EDR. It does not impact the functionality. |
| FMT_SMR.1 | This SFR defines a specific set of management roles for an EDR. It does not impact the functionality. |
| FMT_SRF_EXT.1 | This SFR defines a specific set of remediation functions for an EDR. It does not impact the functionality. |
| FPT_ITT.1 | This SFR defines a specific set of functions for logically distinct secure communication with a Host Agent. It does not impact the functionality. |
| FTP_TRP.1 | This SFR defines a specific set of functions for secure remote administration of the EDR. It does not impact functionality. |
| Optional SFRs | |
| This PP-Module does not define any Optional requirements. | |
| Objective SFRs | |
| FMT_TRM_EXT.1 | This SFR defines protections for the integrity of commands sent to the Host Agent. It does not impact the functionality. |
| Implementation-dependent SFRs | |
| This PP-Module does not define any Implementation-dependent requirements. | |
| Selection-based SFRs | |
| This PP-Module does not define any Selection-based requirements. | |
This PP-Module does not define any Strictly Optional SFRs or SARs.
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FMT_TRM_EXT.1 | ||
| No events specified | N/A |
This PP-Module does not define any Implementation-dependent SFRs.
This PP-Module does not define any Selection-based SFRs.
| Functional Class | Functional Components |
|---|---|
| Identification and Authentication (FIA) | FIA_AUT_EXT Dashboard Authentication Mechanisms FIA_PWD_EXT Password Authentication |
| Security Audit (FAU) | FAU_ALT_EXT Server Alerts FAU_COL_EXT Collected Endpoint Data |
| Security Management (FMT) | FMT_SRF_EXT Specification of Remediation Functions FMT_TRM_EXT Trusted Remediation Functions |
FIA_AUT_EXT.1, Dashboard Authentication Mechanisms, identifies the only authentication factors that may be used for authentication to a management interface of an EDR.
There are no management functions foreseen.
There are no audit events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FIA_PWD_EXT.1, Password Authentication, defines the length and character set requirements for password authentication factors.
There are no management functions foreseen.
There are no audit events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FIA_AUT_EXT.1 Dashboard Authentication Mechanisms |
FAU_ALT_EXT.1, Server Alerts, describes alert triggers and the information contained in alerts.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FAU_COL_EXT.1, Collected Endpoint Data, identifies the specific data collected from a Host Agent.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FMT_SRF_EXT.1, Specification of Remediation Functions, lists the supported remediation functions and identifies the management roles that may perform these functions.
There are no management functions foreseen.
There are no audit events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FMT_SMR.1 Security Management Roles |
| # | Management Function | Administrator | SOC Analyst | Read-Only User |
| 7 | Quarantine an endpoint by [selection: logically quarantining the endpoint from the network unless allowlisted, quarantining the malicious file on the endpoint] | OOptional/Conditional | MMandatory | -N/A |
| 8 | Terminate a running process on an endpoint | OOptional/Conditional | MMandatory | -N/A |
| 9 | Retrieve potentially unauthorized or affected files from an endpoint | OOptional/Conditional | OOptional/Conditional | -N/A |
FMT_TRM_EXT.1, Trusted Remediation Functions, requires all management activities bound for a Host Agent to be digitally signed.
There are no management functions foreseen.
There are no audit events foreseen.
This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP-Module. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.3 Dependencies between components.
This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP-Module provides evidence that these controls are present and have been evaluated.
| Requirement | Rationale for Satisfaction |
| FIA_UID.1 - Timing of Identification | CC Part 2 specifies FIA_UID.1 as a dependency of FMT_SMR.1 because the TSF must have some way of identifying users so that they can be associated with management roles. This dependency is implicitly addressed through FIA_AUT_EXT.1, which specifies an alternative method of user identification. |
| FPT_STM.1 - Reliable Time Stamps | CC Part 2 specifies FPT_STM.1 as a dependency of FAU_GEN.1 because the audit data require a reliable timestamp to satisfy FAU_GEN.1.2. This dependency is implicitly addressed through the A.PLATFORM assumption of the Base-PP because a "trustworthy computing platform" is assumed to include a reliable system clock. |
| Acronym | Meaning |
|---|---|
| API | Application Programming Interface |
| Base-PP | Base Protection Profile |
| CC | Common Criteria |
| CEF | Common Event Format |
| CEM | Common Evaluation Methodology |
| cPP | Collaborative Protection Profile |
| CybOX | Cyber Observable expression |
| DRBG | Deterministic Random Bit Generator |
| DSS | Digital Signature Standard |
| DTLS | Datagram Transport Layer Security |
| EDR | Endpoint Detection and Response |
| EDR | Endpoint Detection and Response |
| EP | Extended Package |
| FP | Functional Package |
| HTTPS | Hypertext Transfer Protocol Secure |
| IODEF | Incident Object Description Exchange Format |
| IP | Internet Protocol |
| IT | Information Technology |
| LEEF | Log Event Extended Format |
| OE | Operational Environment |
| OS | Operating System |
| PP | Protection Profile |
| PP-Configuration | Protection Profile Configuration |
| PP-Module | Protection Profile Module |
| RBG | Random Bit Generator |
| SAR | Security Assurance Requirement |
| SFR | Security Functional Requirement |
| ST | Security Target |
| STIX | Structured Threat Information expression |
| TLS | Transport Layer Security |
| TOE | Target of Evaluation |
| TSF | TOE Security Functionality |
| TSFI | TSF Interface |
| TSS | TOE Summary Specification |
| Identifier | Title |
|---|---|
| [CC] | Common Criteria for Information Technology Security Evaluation -
|
| [CEM] | Common Methodology for Information Technology Security Evaluation -
|