
| Version | Date | Comment |
|---|---|---|
| 1.0 | 2020-10-23 | First version released |
| 2.0 | 2025-06-13 | CC:2022 Conversion |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Direct Rationale | A type of Protection Profile, PP-Module, or Security Target in which the security problem definition (SPD) elements are mapped directly to the SFRs and possibly to the security objectives for the operational environment. There are no security objectives for the TOE. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Endpoint | A computing device that runs a general purpose OS, mobile device OS, or network device OS. Endpoints can include desktops, servers, and mobile devices. |
Endpoint Detection and Response (EDR) | A system that analyzes collected EDR Host Agent data for detecting, investigating, and remediating unauthorized activities on endpoints. |
Enrolled State | The state in which an endpoint with a running Host Agent is managed by an ESM. Also, referred to as Onboarding. |
Enrollment | The process of transitioning an endpoint from an unenrolled to an enrolled state. |
Enterprise Security Management (ESM) | A type of application hosted on a server or cloud service that provides support for security management, information flows, reporting, policy, and data analytics in complex enterprise environments. |
Host Agent | A logical piece of software that executes on endpoints to collect data about the endpoint and executes commands sent to the endpoint from an ESM server or service. An example command sent to an endpoint could be to enforce a policy from an ESM, to collect some files, or to run an OS command. |
Operating System (OS) | Software that manages physical and logical resources and provides services for applications. |
Unenrolled State | The state in which an endpoint, with or without a Host Agent, is not managed by an ESM. Also, referred to as Offboarding. |
An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.
This document does not define any additional OSPs.| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FAU_GEN.1/HA | ||
| No events specified | N/A | |
| FAU_STO_EXT.1 | ||
| No events specified | N/A | |
| FDP_NET_EXT.2 | ||
| No events specified | N/A | |
| FHA_HAD_EXT.1 | ||
| No events specified | N/A | |
| FMT_SMF.1/HA | ||
| No events specified | N/A | |
| FMT_UNR_EXT.1 | ||
| No events specified | N/A |
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
| Threat | Addressed by | Rationale |
|---|---|---|
| T.DATA_LOSS | FDP_NET_EXT.2 | The PP-Module includes FDP_NET_EXT.2 to define the trust network connection to another host. |
| FHA_HAD_EXT.1 | The PP-Module includes FHA_HAD_EXT.1 to define the interface between the Host Agent and the intended destination for the data it transmits | |
| FMT_SMF.1/HA | The PP-Module includes FMT_SMF.1/HA to define the management functions that are configurable on the Host Agent. | |
| FHA_CHA_EXT.1 (selection-based) | The PP-Module includes FHA_HAD_EXT.1 to define the interface between the Host Agent and the intended destination for the data it transmits. | |
| FHA_COL_EXT.1 (selection-based) | The PP-Module includes FHA_COL_EXT.1 to define the data that the Host Agent can collect from its Operational Environment. | |
| FTP_DIT_EXT.2 (selection-based) | The PP-Module includes FTP_DIT_EXT.2 to optionally define the trusted communications channel between multiple Host Agents. | |
| T.TAMPER | FAU_GEN.1/HA | The PP-Module includes FAU_GEN.1/HA to ensure that the TOE provides accountability through the generation of audit records for security-relevant events. |
| FAU_STO_EXT.1 | The PP-Module includes FAU_STO_EXT.1 to ensure that the TOE provides accountability by ensuring that audit records are stored using an appropriate mechanism. | |
| FMT_UNR_EXT.1 | The PP-Module includes FMT_UNR_EXT.1 to ensure that the Host Agent is protected from unenrollment actions that would result in it being unable to receive or enforce policy and/or commands sent to it. | |
| FMT_POL_EXT.1 (objective) | The PP-Module includes FMT_UNR_EXT.1 to ensure that the Host Agent is protected from unenrollment actions that would result in it being unable to receive or enforce policy and/or commands sent to it. |
| PP-Module Threat, Assumption, OSP | Consistency Rationale |
|---|---|
| T.DATA_LOSS | This threat relates to the loss of data that is collected by the ESM Host Agent. This relates to functionality defined by the PP-Module and does not interfere with the functionality described by the Base-PP. |
| T.TAMPER | This threat is an extension of the T.LOCAL_ATTACK threat defined by the Base-PP. The threat of tampering as applied to the PP-Module exists in addition to the local attacks that are possible on the capabilities defined by the Base-PP. |
This PP-Module does not define any objectives for the TOE's Operational Environment.
| PP-Module Requirement | Consistency Rationale |
|---|---|
| Modified SFRs | |
| This PP-Module does not modify any requirements when the App PP is the base. | |
| Additional SFRs | |
| This PP-Module does not add any requirements when the App PP is the base. | |
| Mandatory SFRs | |
| FAU_GEN.1/HA | The Base-PP does not define an audit mechanism for its own functionality. This function does not interfere with the Base-PP. |
| FAU_STO_EXT.1 | The Base-PP does not define an audit mechanism for its own functionality. This function does not interfere with the Base-PP. |
| FDP_NET_EXT.2 | The Base-PP does not define specific network communications for EDR - HA communications. This function does not interfere with the Base-PP. |
| FHA_HAD_EXT.1 | This SFR defines the type of software the Host Agent is intended to operate and communicate with. This relates to functionality not present in the Base-PP and does not affect the TOE's ability to satisfy the Base-PP's SFRs. |
| FMT_SMF.1/HA | This SFR defines management functions for the SFRs defined in this PP-Module. It does not affect the management functions defined in the Base-PP. |
| FMT_UNR_EXT.1 | This SFR defines protections to prevent users from tampering with the Host Agent. This relates to functionality not present in the Base-PP and does not affect the TOE's ability to satisfy the Base-PP's SFRs. |
| Optional SFRs | |
| This PP-Module does not define any Optional requirements. | |
| Objective SFRs | |
| FMT_POL_EXT.1 | This SFR defines protections for the integrity of commands sent to the Host Agent. This relates to functionality not present in the Base-PP and does not affect the TOE's ability to satisfy the Base-PP's SFRs. |
| Implementation-dependent SFRs | |
| This PP-Module does not define any Implementation-dependent requirements. | |
| Selection-based SFRs | |
| FHA_CHA_EXT.1 | This SFR defines how the Host Agent shall cache data locally. This relates to functionality not present in the Base-PP and does not affect the TOE's ability to satisfy the Base-PP's SFRs. |
| FHA_COL_EXT.1 | This SFR defines the type of software the Host Agent is intended to operate with. This relates to functionality not present in the Base-PP and does not affect the TOE's ability to satisfy the Base-PP's SFRs. |
| FTP_DIT_EXT.2 | This SFR defines the communication channel for Host Agents communicating with other Host Agents. This relates to functionality not present in the Base-PP and does not affect the TOE's ability to satisfy the Base-PP's SFRs. |
This PP-Module does not define any Strictly Optional SFRs or SARs.
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FMT_POL_EXT.1 | ||
| No events specified | N/A |
This PP-Module does not define any Implementation-dependent SFRs.
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FHA_CHA_EXT.1 | ||
| No events specified | N/A | |
| FHA_COL_EXT.1 | ||
| No events specified | N/A | |
| FTP_DIT_EXT.2 | ||
| No events specified | N/A |
| Functional Class | Functional Components |
|---|---|
| Host Agent (FHA) | FHA_CHA_EXT Cache Host Agent Collected Data FHA_COL_EXT Collected Audit |
| Security Audit (FAU) | FAU_STO_EXT Audit Data Storage |
| Security Management (FMT) | FMT_POL_EXT Trusted Policy Update FMT_UNR_EXT User Unenrollment Prevention |
| Trusted Path/Channels (FTP) | FTP_DIT_EXT Protection of Data in Transit |
| User Data Protection (FDP) | FDP_NET_EXT Network Communications |
FHA_CHA_EXT.1, Cache Host Agent Collected Data, requires either the TOE or its platform to store audit data using the platform's logging mechanism.
No specific management functions are identified.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FHA_COL_EXT.1 Collected Audit FHA_HAD_EXT.1 Host Agent Declaration |
FHA_COL_EXT.1, Collected Audit, requires the TOE to collect a specified set of data from its Operational Environment.
No specific management functions are identified.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FHA_HAD_EXT.1 Host Agent Declaration |
FAU_STO_EXT.1, Audit Data Storage, requires either the TOE or its platform to store audit data using the platform's audit mechanism.
No specific management functions are identified.
There are no auditable events foreseen.
FMT_UNR_EXT.1, User Unenrollment Prevention, requires the TSF to prevent its unenrollment by an unauthorized user.
No specific management functions are identified.
There are no auditable events foreseen.
FMT_POL_EXT.1, Trusted Policy Update, requires the TSF to reject any unsigned management policies or commands sent to it.
No specific management functions are identified.
There are no auditable events foreseen.
FTP_DIT_EXT.2, Protection of Data in Transit for Peer-to-Peer Host Agents, requires the TSF to secure data in transit between itself and another ESM Host Agent using a TSF-provided or platform-provided trusted channel.
No specific management functions are identified.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: |
FDN_NET_EXT.2 Network Communications FTP_DIT_EXT.1 Protection of Data in Transit |
FDP_NET_EXT.2, Network Communications, requires either the TSF restrict network communications.
There are no management functions foreseen.
There are no audit events foreseen.
This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP-Module. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.3 Dependencies between components.
This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP-Module provides evidence that these controls are present and have been evaluated.
| Requirement | Rationale for Satisfaction |
| FPT_STM.1 - Reliable Time Stamps | CC Part 2 specifies FPT_STM.1 as a dependency of FAU_GEN.1 because the audit records require a reliable timestamp to satisfy FAU_GEN.1.2. This dependency is implicitly addressed through the A.PLATFORM assumption of the Base-PP because a "trustworthy computing platform" is assumed to include a reliable system clock. |
| Acronym | Meaning |
|---|---|
| API | Application Programming Interface |
| Base-PP | Base Protection Profile |
| CC | Common Criteria |
| CEM | Common Evaluation Methodology |
| cPP | Collaborative Protection Profile |
| EA | Evaluation Activity |
| ECDSA | Elliptic Curve Digital Signature Algorithm |
| EDR | Endpoint Detection and Response |
| EP | Extended Package |
| ESM | Enterprise Security Management |
| FIPS | Federal Information Processing Standards |
| FP | Functional Package |
| IP | Internet Protocol |
| ISO | International Organization for Standardization |
| IT | Information Technology |
| NIAP | National Information Assurance Partnership |
| NIST | National Institute of Standards and Technology |
| OE | Operational Environment |
| OS | Operating System |
| PP | Protection Profile |
| PP-Configuration | Protection Profile Configuration |
| PP-Module | Protection Profile Module |
| RSA | Rivest, Shamir, Adleman (digital signature algorithm) |
| SAR | Security Assurance Requirement |
| SFR | Security Functional Requirement |
| ST | Security Target |
| TOE | Target of Evaluation |
| TSF | TOE Security Functionality |
| TSFI | TSF Interface |
| TSS | TOE Summary Specification |
| Identifier | Title |
|---|---|
| [CC] | Common Criteria for Information Technology Security Evaluation -
|
| [CEM] | Common Methodology for Information Technology Security Evaluation -
|