Comment: Comment-1-
Comment: Comment-2-

PP-Module for Host Agent

NIAP Logo
Version: 2.0
2025-06-13
National Information Assurance Partnership

Revision History

VersionDateComment
1.02020-10-23First version released
2.02025-06-13CC:2022 Conversion

Contents

1Introduction1.1Overview1.2Terms1.2.1Common Criteria Terms1.2.2Technical Terms1.3Compliant Targets of Evaluation1.3.1TOE Boundary1.3.2TOE Platform1.4Use Cases2Conformance Claims3Security Problem Definition3.1Threats3.2Assumptions3.3Organizational Security Policies4Security Objectives4.1Security Objectives for the Operational Environment5Security Requirements5.1 Protection Profile for Application Software Security Functional Requirements Direction 5.1.1 Modified SFRs 5.2TOE Security Functional Requirements5.2.1Auditable Events for Mandatory SFRs5.2.2Security Audit (FAU)5.2.3User Data Protection (FDP)5.2.4Host Agent (FHA)5.2.5Security Management (FMT)5.3TOE Security Functional Requirements Rationale6Consistency Rationale6.1 Protection Profile for Application Software6.1.1 Consistency of TOE Type 6.1.2 Consistency of Security Problem Definition 6.1.3 Consistency of OE Objectives 6.1.4 Consistency of Requirements Appendix A - Optional SFRsA.1Strictly Optional Requirements A.2Objective Requirements A.2.1Auditable Events for Objective SFRsA.2.2Security Management (FMT)A.3Implementation-dependent Requirements Appendix B - Selection-based Requirements B.1Auditable Events for Selection-based SFRsB.2Host Agent (FHA)B.3Trusted Path/Channels (FTP)Appendix C - Extended Component DefinitionsC.1Extended Components TableC.2Extended Component DefinitionsC.2.1Host Agent (FHA)C.2.1.1FHA_CHA_EXT Cache Host Agent Collected DataC.2.1.2FHA_COL_EXT Collected AuditC.2.2Security Audit (FAU)C.2.2.1FAU_STO_EXT Audit Data StorageC.2.3Security Management (FMT)C.2.3.1FMT_UNR_EXT User Unenrollment PreventionC.2.3.2FMT_POL_EXT Trusted Policy UpdateC.2.4Trusted Path/Channels (FTP)C.2.4.1FTP_DIT_EXT Protection of Data in TransitC.2.5User Data Protection (FDP)C.2.5.1FDP_NET_EXT Network CommunicationsAppendix D - Implicitly Satisfied RequirementsAppendix E - AcronymsAppendix F - Bibliography

1 Introduction

1.1 Overview

The scope of this PP-Module is to describe the security functionality of a Host Agent in terms of [CC] and to define functional and assurance requirements for such products. This PP-Module is intended for use with the following Base-PPs: This Base-PP is valid because a Host Agent is deployed as a software application on a general-purpose operating system.

1.3 Compliant Targets of Evaluation

The PP-Module for Host Agent covers the security functionality needed on the endpoint device (desktop, mobile device, etc.) for ESM software products in general. This version of the PP-Module is paired with the PP-Module for EDR. Future versions of this PP-Module will include requirements for other classes of ESM software. It is expected that an ESM system will evaluate against a PP-Configuration that includes both the PP-Module for Host Agent and at least one other ESM PP-Module; currently, this only includes the PP-Module for EDR.

1.3.1 TOE Boundary

The boundary for the Host Agent includes all processes, all modules, and libraries bundled with the Host Agent. The Host Agent can run as a daemon or service on the platform but is not required to. The Host Agent is not expected to have a local or remote Graphical User Interface (GUI) for administration but having such an interface is not precluded by this PP-Module. It is expected that Host Agents will be managed by their associated ESM server or the underlying platform. The TOE boundary includes the communications channel with other Host Agents, an ESM server, or a cloud service. The platform operating system or execution environment upon which the Host Agent is executing is outside the scope of a Host Agent evaluation. The figures below show some sample Host Agents but are not inclusive of every possible Host Agent design.

Figure 1: Sample Host Agent TOE

Figure 2: Sample Host Agent TOE

1.3.2 TOE Platform

The TOE platform consists of a general purpose OS, a mobile device OS, a network device OS, or an Execution Environment on top of which the Host Agent software executes.

1.4 Use Cases

Requirements in this PP-Module are designed to address the security problem for the following use cases. These use cases are intentionally very broad, as many different types of ESM Host Agent products may exist. As this PP-Module is revised to allow for more specific types of ESM Host Agent products, additional use cases may be devised.
[USE CASE 1] Communication
The Host Agent allows for communication interactively or non-interactively with other ESM software over a communications channel. Example communications include but are not limited to; receiving policy, sending data, and running tasks or commands.

2 Conformance Claims

Update URLs in Bib. for pp and mod cc refs
Conformance Statement

An ST must claim exact conformance to this PP-Module.

The evaluation methods used for evaluating the TOE are a combination of the workunits defined in [CEM] as well as the Evaluation Activities for ensuring that individual SFRs and SARs have a sufficient level of supporting evidence in the Security Target and guidance documentation and have been sufficiently tested by the laboratory as part of completing ATE_IND.1. Any functional packages this PP claims similarly contain their own Evaluation Activities that are used in this same manner.
CC Conformance Claims

This PP-Module is conformant to Part 2 (extended) and Part 3 (extended) of Common Criteria CC:2022, Revision 1.
PP Claim

This PP-Module does not claim conformance to any Protection Profile.

The following PPs and PP-Modules are allowed to be specified in a PP-Configuration with this PP-Module:
Package Claim

The functional packages to which the PP conforms may include SFRs that are not mandatory to claim for the sake of conformance. An ST that claims one or more of these functional packages may include any non-mandatory SFRs that are appropriate to claim based on the capabilities of the TSF and on any triggers for their inclusion based inherently on the SFR selections made.

3 Security Problem Definition

The security problem is described in terms of the threats that the Host Agent is expected to address, assumptions about the Operational Environment, and any organizational security policies that the Host Agent is expected to enforce. These extend any threats, assumptions, and organizational security policies defined by the Base-PP.

3.1 Threats

Note that this PP-Module does not repeat the threats identified in the , though they all apply given the conformance and hence dependence of this PP-Module on the .
T.DATA_LOSS
A Host Agent can be susceptible to data loss during periods when connectivity to the ESM system is not present.
T.TAMPER
A Host Agent can be susceptible to tampering by unprivileged users who may try to uninstall or disrupt the Host Agent's ability to function properly.

3.2 Assumptions

This PP-Module defines no additional assumptions beyond those defined in the Base-PP. This document does not define any additional assumptions.

3.3 Organizational Security Policies

An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.

This document does not define any additional OSPs.

4 Security Objectives

4.1 Security Objectives for the Operational Environment

This PP-Module does not define any objectives for the OE.

5 Security Requirements

This chapter describes the security requirements which have to be fulfilled by the product under evaluation. Those requirements comprise functional components from Part 2 and assurance components from Part 3 of [CC]. The following conventions are used for the completion of operations:

5.1 Protection Profile for Application Software Security Functional Requirements Direction

In a PP-Configuration that includes App PP, the TOE is expected to rely on some of the security functions implemented by the application as a whole and evaluated against the Base-PP. The SFRs listed in this section are defined in the Base-PP and relevant to the secure operation of the Host Agent. This section describes any modifications that the ST author must make to the Base-PP SFRs to satisfy the required Host Agent functionality.

5.1.1 Modified SFRs

This PP-Module does not modify any SFRs defined by the App PP.

5.2 TOE Security Functional Requirements

The following section describes the SFRs that must be satisfied by any TOE that claims conformance to this PP-Module. These SFRs must be claimed regardless of which PP-Configuration is used to define the TOE.

5.2.1 Auditable Events for Mandatory SFRs

Table 1: Auditable Events for Mandatory Requirements
RequirementAuditable EventsAdditional Audit Record Contents
FAU_GEN.1/HA
No events specifiedN/A
FAU_STO_EXT.1
No events specifiedN/A
FDP_NET_EXT.2
No events specifiedN/A
FHA_HAD_EXT.1
No events specifiedN/A
FMT_SMF.1/HA
No events specifiedN/A
FMT_UNR_EXT.1
No events specifiedN/A

5.2.2 Security Audit (FAU)

FAU_GEN.1/HA Audit Data Generation

The TSF shall be able to generate audit data of the following auditable events:
  1. Start-up and shutdown of the audit functions;
  2. All auditable events for the [not specified] level of audit;
[
  1. Change in enrollment state with an ESM system,
  2. [selection: Receiving, Generating] periodic heartbeat events,
  3. [assignment: Other specifically defined auditable events]
].
Application Note: The required audit events must be generated by the Host Agent, but can leverage API's available from the platform if needed to generate the audit events. For the selection one or both options may be selected. The assignment may be empty, a single item, or multiple items. Changes in enrollment include new enrollment and unenrollment.
The [selection: TSF, TOE Platform] shall record within the audit data at least the following information:
  1. Date and time of the event, type of event, subject identity (if applicable), and the outcome (success or failure) of the event;
  2. For each audit type, based on the auditable event definitions of the functional components included in the PP, PP-Module, functional package, or ST, [assignment: other audit relevant information].
Application Note: All audits must contain at least the information mentioned in FAU_GEN.1.2/HA, but may contain more information. The term subject here is understood to be the user that the process is acting on behalf of or for network communication related events the server name/address. The subject identity can be blank if not applicable for a given process. The assignment may be empty, a single item, or multiple items.

FAU_STO_EXT.1 Audit Data Storage

The [selection: TSF, TOE Platform] shall store audit events in the platform-provided logging mechanism.
Application Note: The term audit events here is understood to be only the set of events defined in FAU_GEN.1/HA. If the job of this Host Agent is to generate or collect events for an ESM server it is not expected that those events will be stored in the platform-provided logging mechanism.

5.2.3 User Data Protection (FDP)

FDP_NET_EXT.2 Network Communications

The TSF shall restrict network communications to: [selection:
  • An ESM server
  • Another Host Agent
]
Application Note: By selecting another Host Agent the additional FTP_DIT_EXT.2 requirements must be included in the ST for peer-to-peer communication.
This restricts the selections in the Base-PP to a specific list of communications that may be user or application initiated.

5.2.4 Host Agent (FHA)

FHA_HAD_EXT.1 Host Agent Declaration

The TSF shall operate with the following ESM software: [selection:
  • Endpoint Detection and Response (EDR)
  • [assignment: Other NIAP-approved ESM servers]
].
Application Note: Currently, the only NIAP-approved ESM server is EDR; PP-Modules for other ESM servers (Systems Management and Audit Server) will be added in the future. By including EDR, the additional FHA_CHA_EXT.1 and FHA_COL_EXT.1 requirements must be included in the ST.

5.2.5 Security Management (FMT)

FMT_SMF.1/HA Specification of Management Functions (Configuration of Host Agent)

The TSF shall be capable of performing the following management functions: [assignment: list of management functions to be provided by the TSF].
Application Note: This requirement captures all the configuration functionality the TSF provides the administrator to configure the Host Agent. The configuration of these management functions can be achieved by either local configuration of the Host Agent or by remote configuration using the ESM server. The frequency for sending data to an ESM can be specified as a time value, but does not have to be. A value like Aggressive, Normal, Low Bandwidth is a measure of control of frequency and meets the requirement. Host Agent data refers to the data collected in the requirements in this PP-Module, such as FHA_COL_EXT.1.1.

FMT_UNR_EXT.1 User Unenrollment Prevention

The [selection: TSF, TOE Platform] shall enforce a mechanism to prevent unprivileged users of the platform from unenrolling the Host Agent with the ESM system.
Application Note: Unenrolling is the action of transitioning from the enrolled state to the unenrolled state. Preventing unprivileged users from unenrolling the Host Agent provides assurance that the enterprise can manage connected endpoints.

5.3 TOE Security Functional Requirements Rationale

The following rationale provides justification for each SFR for the TOE, showing that the SFRs are suitable to address the specified threats:

Table 2: SFR Rationale
ThreatAddressed byRationale
T.DATA_​LOSSFDP_NET_EXT.2The PP-Module includes FDP_NET_EXT.2 to define the trust network connection to another host.
FHA_HAD_EXT.1The PP-Module includes FHA_HAD_EXT.1 to define the interface between the Host Agent and the intended destination for the data it transmits
FMT_SMF.1/HAThe PP-Module includes FMT_SMF.1/HA to define the management functions that are configurable on the Host Agent.
FHA_CHA_EXT.1 (selection-based)The PP-Module includes FHA_HAD_EXT.1 to define the interface between the Host Agent and the intended destination for the data it transmits.
FHA_COL_EXT.1 (selection-based)The PP-Module includes FHA_COL_EXT.1 to define the data that the Host Agent can collect from its Operational Environment.
FTP_DIT_EXT.2 (selection-based)The PP-Module includes FTP_DIT_EXT.2 to optionally define the trusted communications channel between multiple Host Agents.
T.TAMPERFAU_GEN.1/HAThe PP-Module includes FAU_GEN.1/HA to ensure that the TOE provides accountability through the generation of audit records for security-relevant events.
FAU_STO_EXT.1The PP-Module includes FAU_STO_EXT.1 to ensure that the TOE provides accountability by ensuring that audit records are stored using an appropriate mechanism.
FMT_UNR_EXT.1The PP-Module includes FMT_UNR_EXT.1 to ensure that the Host Agent is protected from unenrollment actions that would result in it being unable to receive or enforce policy and/or commands sent to it.
FMT_POL_EXT.1 (objective)The PP-Module includes FMT_UNR_EXT.1 to ensure that the Host Agent is protected from unenrollment actions that would result in it being unable to receive or enforce policy and/or commands sent to it.

6 Consistency Rationale

6.1 Protection Profile for Application Software

6.1.1 Consistency of TOE Type

If this PP-Module is used to extend the Application Software PP, the TOE type for the overall TOE is still a software-based application. The TOE boundary is simply extended to include the Host Agent functionality that is built into the application so that additional security functionality is claimed within the scope of the TOE.

6.1.2 Consistency of Security Problem Definition

Table 3: Consistency of Security Problem Definition (App PP base)
PP-Module Threat, Assumption, OSPConsistency Rationale
T.DATA_LOSSThis threat relates to the loss of data that is collected by the ESM Host Agent. This relates to functionality defined by the PP-Module and does not interfere with the functionality described by the Base-PP.
T.TAMPERThis threat is an extension of the T.LOCAL_ATTACK threat defined by the Base-PP. The threat of tampering as applied to the PP-Module exists in addition to the local attacks that are possible on the capabilities defined by the Base-PP.

6.1.3 Consistency of OE Objectives

This PP-Module does not define any objectives for the TOE's Operational Environment.

6.1.4 Consistency of Requirements

This PP-Module identifies several SFRs from the App PP that are needed to support Host Agent functionality. This is considered to be consistent because the functionality provided by the App PP is being used for its intended purpose. The rationale for why this does not conflict with the claims defined by the App PP are as follows:
Table 4: Consistency of Requirements (App PP base)
PP-Module RequirementConsistency Rationale
Modified SFRs
This PP-Module does not modify any requirements when the App PP is the base.
Additional SFRs
This PP-Module does not add any requirements when the App PP is the base.
Mandatory SFRs
FAU_GEN.1/HA The Base-PP does not define an audit mechanism for its own functionality. This function does not interfere with the Base-PP.
FAU_STO_EXT.1 The Base-PP does not define an audit mechanism for its own functionality. This function does not interfere with the Base-PP.
FDP_NET_EXT.2 The Base-PP does not define specific network communications for EDR - HA communications. This function does not interfere with the Base-PP.
FHA_HAD_EXT.1 This SFR defines the type of software the Host Agent is intended to operate and communicate with. This relates to functionality not present in the Base-PP and does not affect the TOE's ability to satisfy the Base-PP's SFRs.
FMT_SMF.1/HA This SFR defines management functions for the SFRs defined in this PP-Module. It does not affect the management functions defined in the Base-PP.
FMT_UNR_EXT.1 This SFR defines protections to prevent users from tampering with the Host Agent. This relates to functionality not present in the Base-PP and does not affect the TOE's ability to satisfy the Base-PP's SFRs.
Optional SFRs
This PP-Module does not define any Optional requirements.
Objective SFRs
FMT_POL_EXT.1 This SFR defines protections for the integrity of commands sent to the Host Agent. This relates to functionality not present in the Base-PP and does not affect the TOE's ability to satisfy the Base-PP's SFRs.
Implementation-dependent SFRs
This PP-Module does not define any Implementation-dependent requirements.
Selection-based SFRs
FHA_CHA_EXT.1 This SFR defines how the Host Agent shall cache data locally. This relates to functionality not present in the Base-PP and does not affect the TOE's ability to satisfy the Base-PP's SFRs.
FHA_COL_EXT.1 This SFR defines the type of software the Host Agent is intended to operate with. This relates to functionality not present in the Base-PP and does not affect the TOE's ability to satisfy the Base-PP's SFRs.
FTP_DIT_EXT.2 This SFR defines the communication channel for Host Agents communicating with other Host Agents. This relates to functionality not present in the Base-PP and does not affect the TOE's ability to satisfy the Base-PP's SFRs.

Appendix A - Optional SFRs

A.1 Strictly Optional Requirements

This PP-Module does not define any Strictly Optional SFRs or SARs.

A.2 Objective Requirements

A.2.1 Auditable Events for Objective SFRs

Table 5: Auditable Events for Objective Requirements
RequirementAuditable EventsAdditional Audit Record Contents
FMT_POL_EXT.1
No events specifiedN/A

A.2.2 Security Management (FMT)

FMT_POL_EXT.1 Trusted Policy Update

The [selection: TSF, TOE Platform] shall only accept policies or commands that are digitally signed using [selection: RSA, ECDSA] signatures that meet FIPS PUB 186-5.
Application Note: The intent of this requirement is to cryptographically tie any policy updates or commands sent to the Host Agent as being from the ESM server. This is not to protect the policies in transit as they are already protected by FTP_ITC.1 in the PP-Module for EDR, FTP_DIT_EXT.2.1, or both. If the TSF implements this function, any signature algorithms used should be consistent with any selections made in FCS_COP.1/SigGen and FCS_COP.1/SigVer in the Protection Profile for Application Software, Version 2.0.

A.3 Implementation-dependent Requirements

This PP-Module does not define any Implementation-dependent SFRs.

Appendix B - Selection-based Requirements

B.1 Auditable Events for Selection-based SFRs

Table 6: Auditable Events for Selection-based Requirements
RequirementAuditable EventsAdditional Audit Record Contents
FHA_CHA_EXT.1
No events specifiedN/A
FHA_COL_EXT.1
No events specifiedN/A
FTP_DIT_EXT.2
No events specifiedN/A

B.2 Host Agent (FHA)

FHA_CHA_EXT.1 Cache Host Agent Collected Data

The inclusion of this selection-based component depends upon selection in FHA_HAD_EXT.1.1.
The TSF shall cache collected data up to [assignment: size of cache storage capacity] on [selection: persistent storage, non-persistent storage] if the trusted channel is not available.
Application Note: The term collected data here is understood to be any type of collected endpoint data by the Host Agent destined for an ESM server. The ST author specifies the size of the cache storage and whether it is implemented in persistent or non-persistent storage.
The TSF shall [selection: overwrite previous data according to the following rule: [assignment: rule for overwriting previously cached data], [assignment: other actions]] when the local cache is full.
Application Note: This requirement addresses how the Host Agent handles collected data while the trusted path is not available and the local cache is full.

FHA_COL_EXT.1 Collected Audit

The inclusion of this selection-based component depends upon selection in FHA_HAD_EXT.1.1.
The TSF shall collect the following minimum set of endpoint event data:
  1. Operating System (OS) version, architecture, and IP Address,
  2. Privileged and unprivileged endpoint account login activity,
  3. Process creation,
  4. Libraries and modules loaded by processes,
  5. Network connection activity, including destination IP,
  6. Files created on persistent storage,
  7. [assignment: other host data].
Application Note: The intent of this requirement is to specify the minimum set of endpoint data that the Host Agent for an ESM EDR system must be capable of collecting. This requirement only applies to Host Agents used with the PP-Module per the selection from FHA_HAD_EXT.1. The assignment may be empty, a single item, or multiple items.

B.3 Trusted Path/Channels (FTP)

FTP_DIT_EXT.2 Protection of Data in Transit for Peer-to-Peer Host Agents

The inclusion of this selection-based component depends upon selection in FDP_NET_EXT.2.1.
The TSF shall [selection: encrypt, invoke platform-provided functionality to encrypt] all transmitted data according to FTP_DIT_EXT.1 between itself and another Host Agent.
Application Note: This requirement is designed to protect the communications with other Host Agents in a peer-to-peer scenario where Host Agents are sending and receiving data from each other. The selection of whether the TSF of the TOE platform encrypts these communications should be consistent with any selections made in FTP_DIT_EXT.1

Appendix C - Extended Component Definitions

This appendix contains the definitions for all extended requirements specified in the PP-Module.

C.1 Extended Components Table

All extended components specified in the PP-Module are listed in this table:
Table 7: Extended Component Definitions
Functional ClassFunctional Components
Host Agent (FHA)FHA_CHA_EXT Cache Host Agent Collected Data
FHA_COL_EXT Collected Audit
Security Audit (FAU)FAU_STO_EXT Audit Data Storage
Security Management (FMT)FMT_POL_EXT Trusted Policy Update
FMT_UNR_EXT User Unenrollment Prevention
Trusted Path/Channels (FTP)FTP_DIT_EXT Protection of Data in Transit
User Data Protection (FDP)FDP_NET_EXT Network Communications

C.2 Extended Component Definitions

C.2.1 Host Agent (FHA)

This PP-Module defines the following extended components as part of the FHA class originally defined by CC Part 2:

C.2.1.1 FHA_CHA_EXT Cache Host Agent Collected Data

Family Behavior

Components in this family define requirements for the location and duration of storage for its collected data.

Component Leveling

FHA_CHA_EXT1

FHA_CHA_EXT.1, Cache Host Agent Collected Data, requires either the TOE or its platform to store audit data using the platform's logging mechanism.

Management: FHA_CHA_EXT.1

No specific management functions are identified.

Audit: FHA_CHA_EXT.1

There are no auditable events foreseen.

FHA_CHA_EXT.1 Cache Host Agent Collected Data

Hierarchical to:No other components.
Dependencies to:FHA_COL_EXT.1 Collected Audit
FHA_HAD_EXT.1 Host Agent Declaration

FHA_CHA_EXT.1.1

The TSF shall cache collected data up to [assignment: size of cache storage capacity] on [selection: persistent storage, non-persistent storage] if the trusted channel is not available.

FHA_CHA_EXT.1.2

The TSF shall [selection: overwrite previous data according to the following rule: [assignment: rule for overwriting previously cached data], [assignment: other actions]] when the local cache is full.

C.2.1.2 FHA_COL_EXT Collected Audit

Family Behavior

Components in this family define requirements for the collection of data the TOE collects from its Operational Environment as audit data.

Component Leveling

FHA_COL_EXT1

FHA_COL_EXT.1, Collected Audit, requires the TOE to collect a specified set of data from its Operational Environment.

Management: FHA_COL_EXT.1

No specific management functions are identified.

Audit: FHA_COL_EXT.1

There are no auditable events foreseen.

FHA_COL_EXT.1 Collected Audit

Hierarchical to:No other components.
Dependencies to:FHA_HAD_EXT.1 Host Agent Declaration

FHA_COL_EXT.1.1

The TSF shall collect the following minimum set of endpoint event data:
  1. Operating System (OS) version, architecture, and IP Address,
  2. Privileged and unprivileged endpoint account login activity,
  3. Process creation,
  4. Libraries and modules loaded by processes,
  5. Network connection activity, including destination IP,
  6. Files created on persistent storage,
  7. [assignment: other host data].

C.2.2 Security Audit (FAU)

This PP-Module defines the following extended components as part of the FAU class originally defined by CC Part 2:

C.2.2.1 FAU_STO_EXT Audit Data Storage

Family Behavior

Components in this family define requirements for the location and method of audit storage.

Component Leveling

FAU_STO_EXT1

FAU_STO_EXT.1, Audit Data Storage, requires either the TOE or its platform to store audit data using the platform's audit mechanism.

Management: FAU_STO_EXT.1

No specific management functions are identified.

Audit: FAU_STO_EXT.1

There are no auditable events foreseen.

FAU_STO_EXT.1 Audit Data Storage

Hierarchical to:No other components.
Dependencies to:No dependencies.

FAU_STO_EXT.1.1

The [selection: TSF, TOE Platform] shall store audit events in the platform-provided logging mechanism.

C.2.3 Security Management (FMT)

This PP-Module defines the following extended components as part of the FMT class originally defined by CC Part 2:

C.2.3.1 FMT_UNR_EXT User Unenrollment Prevention

Family Behavior

Components in this family define requirements for ensuring that an unprivileged user cannot remove the TOE from management by another ESM component.

Component Leveling

FMT_UNR_EXT1

FMT_UNR_EXT.1, User Unenrollment Prevention, requires the TSF to prevent its unenrollment by an unauthorized user.

Management: FMT_UNR_EXT.1

No specific management functions are identified.

Audit: FMT_UNR_EXT.1

There are no auditable events foreseen.

FMT_UNR_EXT.1 User Unenrollment Prevention

Hierarchical to:No other components.
Dependencies to:No dependencies.

FMT_UNR_EXT.1.1

The [selection: TSF, TOE Platform] shall enforce a mechanism to prevent unprivileged users of the platform from unenrolling the Host Agent with the ESM system.

C.2.3.2 FMT_POL_EXT Trusted Policy Update

Family Behavior

Components in this family define requirements for the TOE's verification of policies or commands transmitted to it.

Component Leveling

FMT_POL_EXT1

FMT_POL_EXT.1, Trusted Policy Update, requires the TSF to reject any unsigned management policies or commands sent to it.

Management: FMT_POL_EXT.1

No specific management functions are identified.

Audit: FMT_POL_EXT.1

There are no auditable events foreseen.

FMT_POL_EXT.1 Trusted Policy Update

Hierarchical to:No other components.
Dependencies to:FCS_COP.1 Cryptographic Operation

FMT_POL_EXT.1.1

The [selection: TSF, TOE Platform] shall only accept policies or commands that are digitally signed using [selection: RSA, ECDSA] signatures that meet FIPS PUB 186-5.

C.2.4 Trusted Path/Channels (FTP)

This PP-Module defines the following extended components as part of the FTP class originally defined by CC Part 2:

C.2.4.1 FTP_DIT_EXT Protection of Data in Transit

Family Behavior

This family is defined in the . This PP-Module adds a component to the existing family definition.

Component Leveling

FTP_DIT_EXT2

FTP_DIT_EXT.2, Protection of Data in Transit for Peer-to-Peer Host Agents, requires the TSF to secure data in transit between itself and another ESM Host Agent using a TSF-provided or platform-provided trusted channel.

Management: FTP_DIT_EXT.2

No specific management functions are identified.

Audit: FTP_DIT_EXT.2

There are no auditable events foreseen.

FTP_DIT_EXT.2 Protection of Data in Transit for Peer-to-Peer Host Agents

Hierarchical to:No other components.
Dependencies to: FDN_NET_EXT.2 Network Communications

FTP_DIT_EXT.1 Protection of Data in Transit

FTP_DIT_EXT.2.1

The TSF shall [selection: encrypt, invoke platform-provided functionality to encrypt] all transmitted data according to FTP_DIT_EXT.1 between itself and another Host Agent.

C.2.5 User Data Protection (FDP)

This PP-Module defines the following extended components as part of the FDP class originally defined by CC Part 2:

C.2.5.1 FDP_NET_EXT Network Communications

Family Behavior

Components in this family define requirements for recording the occurrence of security relevant events.

Component Leveling

FDP_NET_EXT2

FDP_NET_EXT.2, Network Communications, requires either the TSF restrict network communications.

Management: FDP_NET_EXT.2

There are no management functions foreseen.

Audit: FDP_NET_EXT.2

There are no audit events foreseen.

FDP_NET_EXT.2 Network Communications

Hierarchical to:No other components.
Dependencies to:No dependencies.

FDP_NET_EXT.2.1

The TSF shall restrict network communications to: [selection:
  • An ESM server
  • Another Host Agent
]

Appendix D - Implicitly Satisfied Requirements

This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP-Module. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.3 Dependencies between components.

This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP-Module provides evidence that these controls are present and have been evaluated.

Requirement Rationale for Satisfaction
FPT_STM.1 - Reliable Time Stamps CC Part 2 specifies FPT_STM.1 as a dependency of FAU_GEN.1 because the audit records require a reliable timestamp to satisfy FAU_GEN.1.2. This dependency is implicitly addressed through the A.PLATFORM assumption of the Base-PP because a "trustworthy computing platform" is assumed to include a reliable system clock.

Appendix E - Acronyms

Table 8: Acronyms
AcronymMeaning
APIApplication Programming Interface
Base-PPBase Protection Profile
CCCommon Criteria
CEMCommon Evaluation Methodology
cPPCollaborative Protection Profile
EAEvaluation Activity
ECDSAElliptic Curve Digital Signature Algorithm
EDREndpoint Detection and Response
EPExtended Package
ESMEnterprise Security Management
FIPSFederal Information Processing Standards
FPFunctional Package
IPInternet Protocol
ISOInternational Organization for Standardization
ITInformation Technology
NIAPNational Information Assurance Partnership
NISTNational Institute of Standards and Technology
OEOperational Environment
OSOperating System
PPProtection Profile
PP-ConfigurationProtection Profile Configuration
PP-ModuleProtection Profile Module
RSARivest, Shamir, Adleman (digital signature algorithm)
SARSecurity Assurance Requirement
SFRSecurity Functional Requirement
STSecurity Target
TOETarget of Evaluation
TSFTOE Security Functionality
TSFITSF Interface
TSSTOE Summary Specification

Appendix F - Bibliography

Table 9: Bibliography
IdentifierTitle
[CC]Common Criteria for Information Technology Security Evaluation -
[CEM]Common Methodology for Information Technology Security Evaluation -