Version | Date | Comment |
---|---|---|
1.0 | 2019-07-25 | Initial Release |
2.0 | 2025-01-31 | Update to CC:2022 |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Administrator | Authorized Users with higher privileges and typically handle configuration and management functions, such as configuring and updating the TOE. |
Authorization factor (AF) | A value submitted by the user, present on the host, or present on a separate protected hardware physical device used to establish that the user (and potentially the host) is in the community authorized to use the TOE. The authorization factors are used to generate the KEK. Note that these AFs are not used to establish the particular identity of the user. |
Authorized User | A user who has been provided Authorization factors by the administrator to use the TOE. |
Data Encryption | The process of encrypting all user data written to volatile memory. |
Deterministic Random Bit Generator (DRBG) | A cryptographic algorithm that produces a sequence of bits from a secret initial seed value. Without knowledge of the seed value, the output sequence should be unpredictable up to the security level of the DRBG. |
Entropy Source | This cryptographic function provides a seed for a random bit generator by accumulating the outputs from one or more noise sources. The functionality includes a measure of the minimum work required to guess a given output and tests to ensure that the noise sources are operating properly. |
File Authentication Key (FAK) | The secret value used as input when a keyed hash function is used to perform data authentication. |
File Encryption Key (FEK) | The key that is used by the encryption algorithm to encrypt the selected user data on the host machine. |
File/Set of files | The user data that is selected to be encrypted, which can include individual file encryption (with a FEK per file) or a set of files encrypted with a single FEK. |
Key Chaining | The method of using multiple layers of encryption keys to protect data. A top layer key encrypts a lower layer key which encrypts the data; this method can have any number of layers. |
Key Encryption Key (KEK) | The key that is used to encrypt another key. |
Key Sanitization | A method of sanitizing encrypted data by securely overwriting the key, as described in the key destruction requirement, that was encrypting the data. |
Keying Material | The KEK, FEK, authorization factors and random numbers or any other values from which keys are derived. |
Noise Source | The component of an RBG that contains the non-deterministic, entropy-producing activity. |
Operational Environment | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy, including the platform, its firmware, and the operating system. |
Passphrase | A string of words that may be used for authorization to the data on the device. |
Password | A short string of characters used for authorization to the data on the device. |
Primary Key Chain | The direct key chain from the authorization factor to the FEK. |
Random Bit Generator (RBG) | A cryptographic function composed of an entropy source and DRBG that is invoked for random bits needed to produce keying material. |
Sensitive Data | Any data of which the compromise with respect to loss, misuse, or unauthorized access to or modification of could adversely affect the interest of the TOE user. |
Shutdown | Power down or unintentional loss of power of the TOE or platform. |
Supplemental Key Chain | Other key chains that add protection or functionality without compromising the security of the primary key chain. |
System files | Files that reside on the host machine that are used in the operation of the file encryption software. |
Temporary File | A file created by an application for short term storage of sensitive data. |
Trusted Host | Source/destination host configured and maintained to provide the TOE with appropriate IT security commensurate with the value of the user data protected by the TOE. |
A user who has not been authorized to use the TOE and decrypt encrypted user data. | |
User Data | All data that originate on the host, or is derived from data that originate on the host, excluding system files and signed firmware updates from the TOE manufacturer. |
Volatile memory | Memory that loses its content when power is turned off. |
Zeroize | This term is used to make a distinction between dereferencing a memory location and actively overwriting it with a constant. Keying material needs to be overwritten when it is no longer needed |
An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.
This document does not define any additional OSPs.Assumption or OSP | Security Objectives | Rationale |
A.AUTH_FACTOR | OE.AUTHORIZATION_FACTOR_STRENGTH | The operational environment objective OE.AUTHORIZATION_FACTOR_STRENGTH is realized through A.AUTH_FACTOR. |
A.EXTERNAL_FEK_PROTECTION | OE.STRONG_ENVIRONMENT_CRYPTO | The operational environment objective OE.STRONG_ENVIRONMENT_CRYPTO is realized through A.EXTERNAL_FEK_PROTECTION. |
A.SHUTDOWN | OE.POWER_SAVE | The operational environment objective OE.POWER_SAVE is realized through A.SHUTDOWN. |
A.STRONG_OE_CRYPTO | OE.STRONG_ENVIRONMENT_CRYPTO | The operational environment objective OE.STRONG_ENVIRONMENT_CRYPTO is realized through A.STRONG_OE_CRYPTO. |
A.FILE_INTEGRITY | OE.STRONG_ENVIRONMENT_CRYPTO | The operational environment objective OE.STRONG_ENVIRONMENT_CRYPTO is realized through A.STRONG_OE_CRYPTO. |
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
Threat | Addressed by | Rationale |
---|---|---|
T.UNAUTHORIZED_DATA_ACCESS | FCS_COP.1/SKC (from Base-PP) | Mitigates the threat by encrypting/decrypting according to a specified approved algorithm. |
FCS_IV_EXT.1 | Mitigates the threat by generating the IV unpredictably. | |
FDP_PRT_EXT.1 | Mitigates the threat by encrypting a file or files in accordance with a specified algorithm. | |
FDP_PRT_EXT.2 | Mitigates the threat by ensuring original plaintext data is destroyed once the data is decrypted or encrypted. | |
FCS_CKM_EXT.5 (optional) | Mitigates the threat by authenticating data using a FAK. | |
FCS_COP_EXT.1 (optional) | Mitigates the threat by protecting a FAK with the same protections as a FEK. | |
FDP_AUT_EXT.1 (optional) | Mitigates the threat by verifying the authenticity of files and providing notice if modification is detected. | |
FDP_AUT_EXT.2 (optional) | Mitigates the threat by authenticating the encrypted data using a keyed-hash function. | |
FDP_AUT_EXT.3 (optional) | Mitigates the threat by authenticating the encrypted data using an asymmetric signing and verification function. | |
FDP_PM_EXT.1 (optional) | Mitigates the threat by encrypting data during a power-managed state. | |
FDP_PRT_EXT.3 (optional | Mitigates the threat by removing or encrypting temporary files created during encryption/decryption upon completion of the encryption/decryption. | |
FIA_FCT_EXT.1 (optional) | Mitigates the threat by ensuring that files can be encrypted with unique KEKs per user. | |
FIA_FCT_EXT.2 (optional) | Mitigates the threat by providing a key sharing mechanism to safely share files between users. | |
T.MANAGEMENT_ACCESS | FMT_MEC_EXT.1 (from Base-PP) | Mitigates the threat by storing configuration in a protected manner. |
FMT_SMF.1/FE | Mitigates the threat by enumerating and protecting management functions. | |
T.KEYING_MATERIAL_COMPROMISE | FCS_CKM.6 | Mitigates the threat by destroying keys and key material when not needed. |
FPT_KYP_EXT.1 | Mitigates the threat by protecting keys stored on non-volatile memory. | |
T.UNSAFE_AUTHFACTOR_VERIFICATION | FCS_VAL_EXT.1 | Mitigates the threat by requiring the user be validated using an appropriate validation factor before any decryption occurs. |
FIA_AUT_EXT.1 | Mitigates the threat by authorizing the user using an appropriate authorization factor. | |
T.KEYSPACE_EXHAUST | FCS_COP.1/SKC (from Base-PP) | Mitigates the threat by encrypting/decrypting according to a specified approved algorithm. |
FCS_CKM_EXT.2 | Mitigates the threat by generating FEKs in a secure manner. | |
FCS_IV_EXT.1 | Mitigates the threat by generating the IV unpredictably. | |
FCS_KYC_EXT.1 | Mitigates the threat by maintaining and storing secure key chains. | |
FCS_VAL_EXT.1 | Mitigates the threat by using validation elements that are generated or protected in a secure manner. | |
FCS_CKM_EXT.3 (selection-based) | Mitigates the threat by using or generating secure KEKs. | |
FCS_CKM_EXT.6 (selection-based) | Mitigates the threat by conditioning a password or passphrase before using it for key-related functions. | |
FCS_COP.1/KE (selection-based) | Mitigates the threat by encrypting keys using a specified secure algorithm. | |
FCS_COP.1/KT (selection-based) | Mitigates the threat by transporting keys using a specified secure algorithm. | |
FCS_COP.1/KW (selection-based) | Mitigates the threat by wrapping keys using a specified secure algorithm. | |
FCS_KDF_EXT.1 (selection-based | Mitigates the threat by creating intermediate keys from source material through a secure derivation method. | |
FCS_SMC_EXT.1 (selection-based) | Mitigates the threat by combining submasks using a secure method. | |
FCS_VAL_EXT.2 (selection-based) | Mitigates the threat by limiting the amount or rate of failed validation attempts. | |
T.PLAINTEXT_COMPROMISE | FDP_PRT_EXT.1 | Mitigates the threat by encrypting a file or files. |
FDP_PRT_EXT.2 | Mitigates the threat by destroying original plaintext data is once the original data is decrypted or encrypted. | |
FDP_PRT_EXT.3 (optional) | Mitigates the threat by destroying or encrypting temporary files when decrypting or encryption of files are completed. |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.UNAUTHORIZED_DATA_ACCESS | This threat is a variation on T.PHYSICAL_ACCESS defined in the Base-PP. In this case, the "sensitive data at rest" is the data that the TOE is intended to protect. |
T.MANAGEMENT_ACCESS | This threat is a variation on T.LOCAL_ATTACK defined in the Base-PP. The Base-PP does not define access-controlled management functions so this PP-Module goes beyond it by specifying misuse of the management interface, or inability to fully use the management interface, as threats to the TSF. |
T.KEYING_MATERIAL_COMPROMISE | This threat is a specific example of T.PHYSICAL_ACCESS defined in the Base-PP. Specifically, this PP-Module defines a method of maliciously gaining access to sensitive data at rest that is particular to the technology type of this PP-Module. |
T.UNSAFE_AUTHFACTOR_VERIFICATION | This threat is a specific example of T.PHYSICAL_ACCESS defined in the Base-PP. Specifically, this PP-Module defines a method of maliciously gaining access to sensitive data at rest that is particular to the technology type of this PP-Module. |
T.KEYSPACE_EXHAUST | This threat is a specific example of T.PHYSICAL_ACCESS defined in the Base-PP. Specifically, this PP-Module defines a method of maliciously gaining access to sensitive data at rest that is particular to the technology type of this PP-Module. |
T.PLAINTEXT_COMPROMISE | This threat is a specific example of T.PHYSICAL_ACCESS defined in the Base-PP. Specifically, this PP-Module defines a method of maliciously gaining access to sensitive data at rest that is particular to the technology type of this PP-Module. |
A.AUTH_FACTOR | |
A.EXTERNAL_FEK_PROTECTION | |
A.SHUTDOWN | |
A.STRONG_OE_CRYPTO | |
A.FILE_INTEGRITY |
PP-Module OE Objective | Consistency Rationale |
---|---|
OE.AUTHORIZATION_FACTOR_STRENGTH | This objective is consistent with the Base-PP because this functionality is beyond the scope of what the Base-PP defines. Therefore, the use and strength of external authorization factors does not affect the ability of any Base-PP SFRs or objectives to be satisfied. |
OE.POWER_SAVE | This objective is consistent with the Base-PP because it is an extension of the Base-PP's OE.PLATFORM objective that is specific to this technology type. |
OE.STRONG_ENVIRONMENT_CRYPTO | This objective is consistent with the Base-PP because the Base-PP allows for the TOE to use platform-provided cryptography. |
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
This PP-Module does not modify any requirements when the App PP is the base. | |
Additional SFRs | |
This PP-Module does not add any requirements when the App PP is the base. | |
Mandatory SFRs | |
FCS_CKM_EXT.2 | This SFR describes behavior that is not in scope of the Base-PP. It is consistent with the Base-PP because it may use the same random bit generation function defined in the Base-PP. |
FCS_CKM.6 | This SFR extends the cryptographic functionality defined in the Base-PP by specifying a method for key destruction. It is consistent with the Base-PP because keys generated by the Base-PP portion of the TOE may also be destroyed in the manner specified by this SFR. |
FCS_KYC_EXT.1 | The Base-PP defines how stored keys are protected. This SFR extends that functionality by defining the logical hierarchy of how keys are logically protected by other keys or other secret data. |
FCS_VAL_EXT.1 | This SFR goes beyond the functionality defined by the Base-PP by defining a method by which the TSF can validate the correctness of data input to it. |
FCS_VAL_EXT.2 | This SFR goes beyond the functionality defined by the Base-PP by defining a method by which the TSF can take security-relevant action if some data input to it is invalid. |
FDP_PRT_EXT.1 | This SFR is consistent with the Base-PP because it is a specific application of the FCS_COP.1/SKC function defined in the Base-PP. |
FDP_PRT_EXT.2 | This SFR relates to the destruction of key data, which is beyond the scope defined by the Base-PP and does not affect the ability of the Base-PP SFRs to be enforced. |
FIA_AUT_EXT.1 | This SFR defines how user requests to access protected data are authorized. It uses FCS_RBG_EXT.1 from the Base-PP in a manner consistent with its definition, but otherwise does not relate to functionality defined by the Base-PP. |
FMT_SMF.1/FE | This SFR defines management functions for the TOE for functionality specific to this PP-Module. These functions are defined in addition to what the Base-PP defines for its own operation. |
FPT_KYP_EXT.1 | The Base-PP defines an SFR for secure storage of sensitive data. This SFR expands on that definition by describing the supported logical methods for storage of key data. |
Optional SFRs | |
FCS_CKM_EXT.5 | This SFR supports the PP-Module's data authentication function, which does not relate to any functionality defined in the Base-PP. |
FCS_COP_EXT.1 | This SFR defines usage of AES functionality not defined by the Base-PP. However, this functionality is only used in certain situations that are specific to this PP-Module and do not affect the ability for any Base-PP SFRs to be enforced. |
FDP_AUT_EXT.1 | This SFR relates to data authentication, which does not relate to any functionality defined in the Base-PP. |
FDP_AUT_EXT.2 | This SFR relies on cryptographic functionality defined by the Base-PP. However, the function itself does not relate to any behavior defined in the Base-PP. |
FDP_AUT_EXT.3 | This SFR relies on cryptographic functionality defined by the Base-PP. However, the function itself does not relate to any behavior defined in the Base-PP. |
FDP_PM_EXT.1 | This SFR describes the behavior of the TSF when its host platform is in a locked or unpowered state, which does not relate to any functionality defined in the Base-PP. |
FDP_PRT_EXT.3 | This SFR relates to the PP-Module's file encryption capability. This goes beyond the sensitive data protection defined in the Base-PP but does not prevent the Base-PP functions from being enforced. |
FIA_FCT_EXT.1 | This SFR relates to the use of authorization factors, which does not relate to any behavior described in the Base-PP. |
FIA_FCT_EXT.2 | This SFR relates to key sharing, which does not relate to any behavior described in the Base-PP. |
Objective SFRs | |
This PP-Module does not define any Objective requirements. | |
Implementation-dependent SFRs | |
This PP-Module does not define any Implementation-dependent requirements. | |
Selection-based SFRs | |
FCS_CKM_EXT.3 | This SFR relates to how KEKs are made available to the TSF, which are used for functionality that does not relate to the Base-PP. |
FCS_CKM_EXT.6 | This SFR defines a key derivation method based on passphrase conditioning. It uses the FCS_RBG_EXT.1 SFR from the Base-PP in its intended manner but otherwise does not relate to the Base-PP's functionality. |
FCS_COP.1/KT | This SFR defines key transport functionality that is outside the scope of the original cryptographic operations defined in the Base-PP. |
FCS_COP.1/KE | This SFR defines key encryption functionality that is outside the scope of the original cryptographic operations defined in the Base-PP. |
FCS_COP.1/KW | This SFR defines usage of AES functionality not defined by the Base-PP. However, this functionality is only used in certain situations that are specific to this PP-Module and do not affect the ability of any Base-PP SFRs to be enforced. |
FCS_KDF_EXT.1 | This SFR defines key transport functionality. It uses random bit generation and keyed-hash message authentication functionality from the Base-PP as they are intended but is otherwise outside the scope of the original cryptographic operations defined in the Base-PP. |
FCS_SMC_EXT.1 | This SFR relates to submask combining as a method of generating intermediate keys. Key hierarchy functionality is outside the scope of the Base-PP. |
This PP-Module does not define any Objective SFRs.
This PP-Module does not define any Implementation-dependent SFRs.
Functional Class | Functional Components |
---|---|
Cryptographic Support (FCS) | FCS_CKM_EXT Cryptographic Key Management FCS_COP_EXT Cryptographic Operation FCS_KDF_EXT Cryptographic Key Derivation Function FCS_KYC_EXT Key Chaining and Key Storage FCS_SMC_EXT Submask Combining FCS_VAL_EXT Validation |
Identification and Authentication (FIA) | FIA_AUT_EXT Authorization FIA_FCT_EXT Authorization Factors |
Protection of the TSF (FPT) | FPT_KYP_EXT Protection of Key and Key Material |
User Data Protection (FDP) | FDP_AUT_EXT User Data Authentication FDP_PM_EXT Protection of Data in Power Managed States FDP_PRT_EXT Protection of Selected User Data |
FCS_CKM_EXT.2, File Encryption Key (FEK) Generation, describes the method by which the TSF acquires or generates file encryption keys.
FCS_CKM_EXT.5, File Authentication Key (FAK) Support, describes the secure storage of file encryption keys.
FCS_CKM_EXT.3, Key Encrypting Key (KEK) Support, describes the method by which the TSF acquires or generates key encryption keys.
FCS_CKM_EXT.6, Cryptographic Password/Passphrase Conditioning, requires the TSF to implement password/passphrase conditioning using a specified algorithm and with specific constraints on the password/passphrase composition.
There are no specific management functions identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_RBG_EXT.1 Random Bit Generation Services |
There are no specific management functions identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP_EXT.1 FAK Encryption/Decryption Support FCS_RBG_EXT.1 Random Bit Generation Services FDP_AUT_EXT.2 Data Authentication Using Cryptographic Keyed-Hash Functions |
There are no specific management functions identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_RBG_EXT.1 Random Bit Generation Services |
There are no specific management functions identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation FCS_RBG_EXT.1 Random Bit Generation Services |
FCS_KYC_EXT.1, Key Chaining and Key Storage, requires the TSF to specify how it implements key chaining.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation FCS_KDF_EXT.1 Cryptographic Key Derivation Function FCS_SMC_EXT.1 Submask Combining |
FCS_VAL_EXT.1, Validation, requires the TSF to specify what data is being validated and how the validation is performed.
FCS_VAL_EXT.2, Validation Remediation, requires the TSF to specify what the TOE’s response is in the event of a data validation failure.
There are no specific management functions identified.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation |
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_VAL_EXT.1 Validation |
FCS_COP_EXT.1, FAK Encryption/Decryption Support, defines requirements for how to protect a file encryption key.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
FCS_KDF_EXT.1, Cryptographic Key Derivation Function, requires the TSF to specify how it performs key derivation.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation FCS_RBG_EXT.1 Random Bit Generation Services FCS_SMC_EXT.1 Submask Combining |
FCS_SMC_EXT.1, Submask Combining, requires the TSF to implement submask combining in a specific manner to support the generation of intermediate keys.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FIA_AUT_EXT.1, Subject Authorization, specifies the manner in which the TSF performs user authorization.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_CKM_EXT.6 Cryptographic Password/Passphrase Conditioning FCS_RBG_EXT.1 Random Bit Generation Services |
FIA_FCT_EXT.1, Multi-User Authorization, requires the TSF to maintain differing authorization factors for multiple users.
FIA_FCT_EXT.2, Authorized Key Sharing, requires the TSF to support some mechanism to share a valid authorization factor between different users.
There are no specific management functions identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FIA_AUT_EXT.1 User Authorization |
There are no specific management functions identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_CKM.2 Cryptographic Key Distribution FCS_COP.1 Cryptographic Operation |
FPT_KYP_EXT.1, Protection of Keys and Key Material, requires the TSF to protect stored key data in a specified manner.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation FCS_KDF_EXT.1 Cryptographic Key Derivation Function FCS_KYC_EXT.1 Key Chaining and Key Storage FCS_SMC_EXT.1 Submask Combining FCS_STO_EXT.1 Storage of Credentials |
FDP_PRT_EXT.1, Protection of Selected User Data, requires the TOE to encrypt and decrypt sensitive data using a specified cryptographic algorithm.
FDP_PRT_EXT.2, Destruction of Plaintext Data, requires the TOE to destroy any plaintext data that is created as a result of the encryption/decryption process for sensitive data.
FDP_PRT_EXT.3, Protection of Third-Party Data, requires the TOE to destroy temporary files that may be created during the encryption or decryption process to prevent the inadvertent disclosure of sensitive data.
There are no specific management functions identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_CKM.6 Timing and event of cryptographic key destruction FCS_COP.1 Cryptographic Operation |
There are no specific management functions identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_CKM.6 Timing and event of cryptographic key destruction FDP_PRT_EXT.1 Protection of Selected User Data |
There are no specific management functions identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FDP_PRT_EXT.1 Protection of Selected User Data |
FDP_AUT_EXT.1, Authentication of Selected User Data, requires the TSF to support data authentication and to specify the particular data authentication method that is supported.
FDP_AUT_EXT.2, Data Authentication Using cryptographic Keyed-Hash Functions, requires the TOE to implement data authentication using a keyed hash function with a FAK as its key.
FDP_AUT_EXT.3, Data Authentication Using Asymmetric Signing and Verification, requires the TOE to implement data authentication using a cryptographic signature and hash.
There are no specific management functions identified.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FDP_AUT_EXT.2 Data Authentication Using Cryptographic Keyed-Hash Functions FDP_AUT_EXT.3 Data Authentication Using Asymmetric Signing and Verification |
There are no specific management functions identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_CKM_EXT.5 File Authentication Key (FAK) Support FCS_COP.1 Cryptographic Operation FCS_COP_EXT.1 FAK Encryption/Decryption Support FCS_RBG_EXT.1 Random Bit Generation Services |
There are no specific management functions identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_CKM.1 Cryptographic Key Generation FCS_COP.1 Cryptographic Operation |
FDP_PM_EXT.1, Protection of Data in Power Managed States, requires the TOE to ensure that TSF-protected data does not lose its protections if the host platform is placed in a locked or unpowered state.
There are no specific management functions identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FDP_PRT_EXT.1 Protection of Selected User Data FIA_AUT_EXT.1 User Authorization |
Acronym | Meaning |
---|---|
AF | Authorization factor |
Base-PP | Base Protection Profile |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
cPP | Collaborative Protection Profile |
DRBG | Deterministic Random Bit Generator |
EP | Extended Package |
FAK | File Authentication Key |
FEK | File Encryption Key |
FP | Functional Package |
KEK | Key Encryption Key |
OE | Operational Environment |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
RBG | Random Bit Generator |
SAR | Security Assurance Requirement |
SFR | Security Functional Requirement |
ST | Security Target |
TOE | Target of Evaluation |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |
Identifier | Title |
---|---|
[AppPP] | Protection Profile for Application Software, Version 2.0, June 16, 2025 |
[CC] | Common Criteria for Information Technology Security Evaluation -
|
[CEM] | Common Methodology for Information Technology Security Evaluation -
|
[FIPS140-2] | Federal Information Processing Standard Publication (FIPS-PUB) 140-2, Security Requirements for Cryptographic Modules, National Institute of Standards and Technology, March 19, 2007 |
[FIPS180-4] | Federal Information Processing Standards Publication (FIPS-PUB) 180-4, Secure Hash Standard, March, 2012 |
[FIPS186-5] | Federal Information Processing Standard Publication (FIPS-PUB) 186-5, Digital Signature Standard (DSS), National Institute of Standards and Technology, February 2023 |
[FIPS197] | Federal Information Processing Standards Publication (FIPS-PUB) 197, Specification for the Advanced Encryption Standard (AES), November 26, 2001 |
[FIPS198-1] | Federal Information Processing Standards Publication (FIPS-PUB) 198-1, The Keyed-Hash Message Authentication Code (HMAC), July 2008 |
[NIST800-132] | NIST Special Publication 800-132, Recommendation for Password-Based Key Derivation, December 2010 |
[NIST800-38A] | NIST Special Publication 800-38A, Recommendation for Block Cipher Modes of Operation: Methods and Techniques, 2001 Edition |
[NIST800-38F] | NIST Special Publication 800-38F,Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping, December 2012 |
[NIST800-56A] | NIST Special Publication 800-56A, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised), March 2007 |
[NIST800-56B] | NIST Special Publication 800-56B, Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography, August 2009 |
[NIST800-90] | NIST Special Publication 800-90, Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised), March 2007 |