Version | Date | Comment |
---|---|---|
1.0 | 2013-10-21 | Initial Release |
1.1 | 2014-02-07 | Typographical changes and clarifications to front-matter |
2.0 | 2014-12-31 | Separation of MDM agent SFRs Updated cryptography, protocol, X.509 requirements. Updated management functions to match MDFPPv2.0. Included SSH as a remote administration protocol. Removed IPsec as protocol to communicate to MDM agent. Added X509 enrollment objective requirement. Added Optional Mobile Application Store requirements. |
3.0 | 2016-11-21 | Updates to align with Technical Decisions Added requirements to support BYOD use case Removed IPsec and SSH requirements, which are now contained in EPs |
4.0 | 2018-09-24 |
Updates to align with Technical Decisions Removed platform dependency Removed TLS SFRs and use the TLS Functional Package Allowed for a distributed TOE |
4.1 | 2024-11-15 |
Updates to align with Technical Decisions Updates to align with CC:2022 |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
API Application Programming Interface (API) | A specification of routines, data structures, object classes, and variables that allows an application to make use of services provided by another software component, such as a library. APIs are often provided for a set of libraries included with the platform. |
Administrator | The person who is responsible for management activities, including setting the policy that is applied by the enterprise on the MD. |
Critical Security Parameter (CSP) | Security-related information whose disclosure or modification can compromise the security of a cryptographic module or authentication system. |
Data | Program or application or data files that are stored or transmitted by a server or MD. |
Data Encryption Key (DEK) | A key used to encrypt data-at-rest. |
Developer Modes | States in which additional services are available to a user in order to provide enhanced system access for debugging of software. |
Enrolled State | The state in which a MD is administered and configured by a policy from an MDM. |
Enrollment over Secure Transport (EST) | Cryptographic protocol that describes an X.509 certificate management protocol targeting public key infrastructure (PKI) clients that need to acquire client certificates and associated certificate authority (CA) certificates. |
Enterprise Applications | Applications that are provided and managed by the enterprise as opposed to a public application store. |
Enterprise Data | Any data residing in enterprise servers or temporarily stored on MDs to which the MD user is allowed access according to the security policy defined by the enterprise and implemented by the administrator. |
Key Encryption Key (KEK) | A key that is used to encrypt other keys, such as DEKs or storage repositories that contain keys. |
Locked State | Device state where the device is powered on but most functionality is unavailable for use without authentication. |
Managed Device (MD) | A device which is composed of a hardware platform and its system software. The device typically provides wireless connectivity and may include software for functions like secure messaging, email, web, VPN connection, and VoIP (Voice over IP), for access to the protected enterprise network, enterprise data and applications, and for communicating to other MDs. |
Managed Device User | The person who uses and is held responsible for an MD. |
Mobile Device Management (MDM) | Products that allow enterprises to apply security policies to MDs. This system consists of two primary components: the MDM server and the MDM agent. |
Operating System (OS) | Software which runs at the highest privilege level and can directly control hardware resources. Modern mobile devices typically have at least two primary operating systems: one which runs on the cellular baseband processor and one which runs on the application processor. The platform of the application processor handles most user interaction and provides the execution environment for apps. The platform of the cellular baseband processor handles communications with the cellular network and may control other peripherals. The term OS, without context, may be assumed to refer to the platform of the application processor. |
Powered-Off State | MD shutdown state. |
Protected Data | All non-TSF data on the MD, including user or enterprise data. Protected data is encrypted while the MD is in the powered-off state. This includes keys in software-based storage. May overlap with sensitive data. |
Root Encryption Key (REK) | A key tied to a particular device that is used to encrypt all other keys for that device. |
Sensitive Data | Data that is encrypted by the MD. May include all user or enterprise data or may be data for specific applications such as emails, messaging, documents, calendar items, or contacts. May be protected while the MD is in the locked state. Must include at minimum some keys in software-based key storage. |
Trust Anchor Database | A list of trusted root Certificate Authority certificates. |
Unenrolled State | Device state when it is not managed by an MDM. |
Unlocked State | Device state where it is powered on and the user has been authenticated. The device functionality is available for use by the user. |
Requirement | Description | Distributed TOE SFR Allocation |
FAU_ALT_EXT.1 | Server Alerts | One |
FAU_CRP_EXT.1 | Support for Compliance Reporting of Mobile Device Configuration | One |
FAU_GEN.1/AUDITGEN | Audit Data Generation | All |
FAU_GEN.1/MAS_SERVER | Audit Data Generation | Feature Dependent |
FAU_NET_EXT.1 | Network Reachability Review | One |
FAU_SAR.1 | Audit Review | Feature Dependent |
FAU_SEL.1 | Security Audit Event Selection | One |
FAU_STG.1 | External Trail Storage | All |
FAU_STG.2 | Audit Event Storage | Feature Dependent |
FCO_CPC_EXT.1 | Communication Partner Control | All |
FCS_CKM.1 | Cryptographic Key Generation | Feature Dependent |
FCS_CKM.2 | Cryptographic Key Establishment | All |
FCS_CKM.6 | Cryptographic Key Destruction | All |
FCS_COP.1.1/CONF_ALG | Cryptographic Operation (Confidentiality Algorithms) | All |
FCS_COP.1.1/HASH_ALG | Cryptographic Operation (Hashing Algorithms) | All |
FCS_COP.1.1/KEY_HASH | Cryptographic Operation (Keyed-Hash Message Authentication) | All |
FCS_COP.1.1/SIGN_ALG | Cryptographic Operation (Signature Algorithms) | All |
FCS_HTTPS_EXT.1 | HTTPS Protocol | Feature Dependent |
FCS_IV_EXT.1 | Initialization Vector Generation | Feature Dependent |
FCS_RBG.1 | Random Bit Generation (RBG) | All |
FCS_RBG.2 | Random Bit Generation (External Seeding) | Feature Dependent |
FCS_RBG.3 | Random Bit Generation (Internal Seeding - Single Source) | Feature Dependent |
FCS_RBG.4 | Random Bit Generation (Internal Seeding - Multiple Sources) | Feature Dependent |
FCS_RBG.5 | Random Bit Generation (Combining Noise Sources) | Feature Dependent |
FCS_STG_EXT.1 | Cryptographic Key Storage | All |
FCS_STG_EXT.2 | Encrypted Cryptographic Key Storage | Feature Dependent |
FIA_CLI_EXT.1 | Client Authorization | One |
FIA_ENR_EXT.1 | Enrollment of Mobile Device into Management | One |
FIA_TOK_EXT.1 | Client Tokens | One |
FIA_UAU.1 | Timing of Authentication | One |
FIA_UAU.4 | Single-Use Authentication Mechanisms | One |
FIA_X509_EXT.1/CERTVAL_MAN | X.509 Certification Validation | Feature Dependent |
FIA_X509_EXT.1/CERTVAL_SEL | X.509 Certification Validation | Feature Dependent |
FIA_X509_EXT.2 | X.509 Certificate Authentication | Feature Dependent |
FIA_X509_EXT.3 | X.509 Enrollment | Feature Dependent |
FIA_X509_EXT.4 | Alternate X.509 Enrollment | Feature Dependent |
FMT_MOF.1/FUNCBE | Management of functions behaviour | Feature Dependent |
FMT_MOF.1/MANAGEMENT_ENROLL | Management of functions behaviour (Enrollment) | Feature Dependent |
FMT_MOF.1/MANAGEMENT_MAS | Management of Functions in (MAS Server Downloads) | Feature Dependent |
FMT_POL_EXT.1 | Trusted Policy Update | One |
FMT_SAE_EXT.1 | Security Attribute Expiration | One |
FMT_SMF.1/MAS | Specification of Management Functions (MAS Server) | Feature Dependent |
FMT_SMF.1/SERVER_CONF_AGENT | Specification of Management Functions (Server configuration of Agent) | One |
FMT_SMF.1/SERVER_CONF_SERVER | Specification of Management Functions (Server configuration of Server) | Feature Dependent |
FMT_SMR.1/SECMAN_ROLES | Security Management Roles | One |
FMT_SMR.1/SECMAN_ROLES_MAS | Security Management Roles | Feature Dependent |
FPT_API_EXT.1 | Use of Supported Services and APIs | All |
FPT_FLS.1 | Failure with Preservation of Secure State | All |
FPT_ITT.1/INTER_XFER | Internal TOE TSF Data Transfer | Feature Dependent |
FPT_ITT.1/INTER_XFER_AGENT | Internal TOE TSF Data Transfer (MDM Agent) | Feature Dependent |
FPT_LIB_EXT.1 | Use of Third-Party Libraries | All |
FPT_TST.1 | TSF Self-Testing | All |
FPT_TST_EXT.1 | Functionality Testing | All (except for agent components) |
FPT_TUD_EXT.1 | Trusted Update | All |
FTA_TAB.1 | Default TOE Access Banners | One |
FTP_ITC.1/INTER_TSF_XFER_AGENT | Inter-TSF Trusted Channel (MDM Agent) | One |
FTP_ITC.1/INTER_XFER_IT | Inter-TSF Trusted Channel (Authorized IT Entities) | One |
FTP_ITC_EXT.1 | Trusted Channel | One |
FTP_TRP.1/TRUSTPATH_ENROLL | Trusted Path for Enrollment | Feature Dependent |
FTP_TRP.1/TRUSTPATH_JOIN | Trusted Path for Joining | Feature Dependent |
FTP_TRP.1/TRUSTPATH_REM_ADMIN | Trusted Path for Remote Administration | Feature Dependent |
Assumption or OSP | Security Objectives | Rationale |
A.COMPONENTS_RUNNING | OE.COMPONENTS_RUNNING | The operational environment objective OE.COMPONENTS_RUNNING is realized through A.COMPONENTS_RUNNING. |
A.CONNECTIVITY | OE.WIRELESS_NETWORK | The operational environment objective OE.WIRELESS_NETWORK is realized through A.CONNECTIVITY. |
A.MDM_SERVER_PLATFORM | OE.TIMESTAMP | The operational environment objective OE.TIMESTAMP is realized through A.MDM_SERVER_PLATFORM. |
A.PROPER_ADMIN | OE.PROPER_ADMIN | The operational environment objective OE.PROPER_ADMIN is realized through A.PROPER_ADMIN. |
A.PROPER_USER | OE.PROPER_USER | The operational environment objective OE.PROPER_USER is realized through A.PROPER_USER. |
P.ACCOUNTABILITY | O.ACCOUNTABILITY | The organizational security policy O.ACCOUNTABILITY is realized through P.ACCOUNTABILITY. |
P.ADMIN | OE.PROPER_ADMIN | The organizational security policy P.ADMIN is realized through OE.PROPER_ADMIN. |
P.DEVICE_ENROLL | OE.IT_ENTERPRISE | The organizational security policy P.DEVICE_ENROLL is realized through OE.IT_ENTERPRISE. |
P.NOTIFY | OE.PROPER_USER | The organizational security policy P.NOTIFY is realized through OE.PROPER_USER. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_ALT_EXT.1 | ||
Type of alert | Identity of MD that sent alert. | |
FAU_GEN.1/AUDITGEN | ||
No events specified | N/A | |
FAU_NET_EXT.1 | ||
No events specified | N/A | |
FAU_STG.1 | ||
No events specified | N/A | |
FCS_CKM.1 | ||
[selection: Failure of key generation activity for authentication keys, None] | No additional information | |
FCS_CKM.2 | ||
No events specified | N/A | |
FCS_CKM.6 | ||
No events specified | N/A | |
FCS_COP.1/CONF_ALG | ||
No events specified | N/A | |
FCS_COP.1/HASH_ALG | ||
No events specified | N/A | |
FCS_COP.1/KEY_HASH | ||
No events specified | N/A | |
FCS_COP.1/SIGN_ALG | ||
No events specified | N/A | |
FCS_RBG.1 | ||
Failure of the randomization process. | None. | |
FCS_STG_EXT.1 | ||
No events specified | N/A | |
FIA_CLI_EXT.1 | ||
No events specified | N/A | |
FIA_ENR_EXT.1 | ||
Failure of MD user authentication | Presented username | |
FIA_UAU.1 | ||
No events specified | N/A | |
FIA_X509_EXT.1/CERTVAL_MAN | ||
Failure to validate X.509 certificate | Reason for failure | |
FIA_X509_EXT.2 | ||
Failure to establish connection to determine revocation status. | No additional information | |
FMT_MOF.1/FUNCBE | ||
Issuance of command to perform function | Command sent and identity of MDM agent recipients | |
Change of policy settings | Policy changed and value or full policy | |
FMT_MOF.1/MANAGEMENT_ENROLL | ||
Enrollment by a user | Identity of user | |
FMT_POL_EXT.1 | ||
No events specified | N/A | |
FMT_SMF.1/SERVER_CONF_AGENT | ||
No events specified | N/A | |
FMT_SMF.1/SERVER_CONF_SERVER | ||
Success or failure of function | No additional information | |
FMT_SMR.1/SECMAN_ROLES | ||
No events specified | N/A | |
FPT_API_EXT.1 | ||
No events specified | N/A | |
FPT_FLS.1 | ||
Failure of the TSF. | None. | |
FPT_LIB_EXT.1 | ||
No events specified | N/A | |
FPT_TST.1 | ||
Execution of self-tests. | None. | |
FPT_TST_EXT.1 | ||
Initiation of self-test | No additional information | |
Failure of self-test | Algorithm that caused failure | |
Detected integrity violation | The TSF code file that caused the integrity violation | |
FPT_TUD_EXT.1 | ||
Success or failure of signature verification | No additional information | |
FTP_ITC.1/INTER_XFER_IT | ||
Initiation and termination of the trusted channel |
| |
FTP_ITC_EXT.1 | ||
No events specified | N/A | |
FTP_TRP.1/TRUSTPATH_ENROLL | ||
Initiation and termination of the trusted channel | Trusted channel protocol | |
FTP_TRP.1/TRUSTPATH_REM_ADMIN | ||
Initiation and termination of the trusted channel |
|
Requirement | Auditable Events | Additional Audit Data Contents |
FCS_TLSC_EXT.1 | Failure to establish a TLS session. | Reason for failure. |
FCS_TLSC_EXT.1 | Failure to verify presented identifier. | Presented identifier and reference identifier. |
FCS_TLSS_EXT.1 | Failure to establish a TLS session. | Reason for failure. |
FCS_DTLSC_EXT.1 | Failure of the certificate validity check. | Issuer Name and Subject Name of certificate. |
FCS_DTLSS_EXT.1 | Failure of the certificate validity check. | Issuer Name and Subject Name of certificate. |
For the selection in this requirement, the ST author selects "TSF noise source" if a single noise source is used as input to the DRBG. The ST author selects "multiple TSF noise sources" if a seed is formed from a combination of two or more noise sources within the TOE boundary. If the TSF implements two or more separate DRBGs that are seeded in separate manners, this SFR should be iterated for each DRBG. It multiple distinct noise sources exist such that each DRBG only uses one of them, then each iteration would select "TSF noise source"; "multiple TSF noise sources" is only selected if a single DRBG uses multiple noise sources for its seed. The ST author selects "TSF interface for seeding" if noise source data is generated outside the TOE boundary.
If "TSF noise source" is selected, FCS_RBG.3 must be claimed.
If "multiple TSF noise sources" is selected, FCS_RBG.4 and FCS_RBG.5 must be claimed.
If "TSF interface for seeding" is selected, FCS_RBG.2 must be claimed.
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
Threat | Addressed by | Rationale |
---|---|---|
T.MALICIOUS_APPS | FAU_ALT_EXT.1 | A conformant TOE mitigates the threat of malicious apps by generating an alert if application of a policy fails, as this may indicate that a mechanism used to prevent the execution of malicious apps was not able to be enforced. |
FAU_NET_EXT.1 | A conformant TOE mitigates this threat by providing network status information so that an inaccessible MD can be flagged as potentially non-conformant to an MDM policy (and therefore potentially subject to the threat of executing malicious apps) | |
FCS_COP.1/HASH_ALG | A conformant TOE mitigates the threat of malicious apps by implementing cryptographic algorithms which may be used to verify the integrity of apps (if the TOE includes its own MAS). | |
FCS_COP.1/SIGN_ALG | A conformant TOE mitigates the threat of malicious apps by implementing cryptographic algorithms which may be used to verify the authenticity of apps (if the TOE includes its own MAS). | |
FIA_ENR_EXT.1 | A conformant TOE mitigates the threat of malicious apps by providing a means to enroll MDs into management, where policies prohibiting the installation of potential malicious apps can be enforced. | |
FMT_POL_EXT.1 | A conformant TOE mitigates the threat of malicious apps by providing signed policy updates that can prohibit the execution of potentially malicious apps. | |
FMT_MOF.1/FUNCBE | A conformant TOE mitigates the threat of malicious apps by implementing mechanisms to control the apps that can be installed on an enrolled MD. | |
FMT_SMF.1/SERVER_CONF_AGENT | A conformant TOE mitigates the threat of malicious apps by implementing mechanisms to control the apps that can be installed on an enrolled MD. | |
FTP_ITC_EXT.1 | A conformant TOE mitigates the threat of malicious apps by communicating its policy data to enrolled MDs securely over a trusted channel. | |
FAU_CRP_EXT.1 (objective) | A conformant TOE mitigates the threat of malicious apps by allowing MDs to report on their configuration status so it can be determined whether they have any unauthorized (and potentially malicious) apps installed. | |
FIA_UAU.4 (objective) | A conformant TOE mitigates the threat of malicious apps by limiting reuse of authentication credentials used to enroll MDs to provide assurance that MDs are properly enrolled into management. | |
FMT_SAE_EXT.1 (objective) | A conformant TOE mitigates the threat of malicious apps by limiting the validity period of an enrollment request to provide assurance that MDs are properly enrolled into management. | |
FIA_TOK_EXT.1 (selection-based) | A conformant TOE mitigates the threats of malicious apps by providing a mechanism to securely enroll a unique MD into management. | |
FMT_MOF.1/MANAGEMENT_MAS (selection-based) | A conformant TOE may mitigate the threat of malicious apps by implementing a MAS server that limits the apps that can be installed on enrolled MDs to those hosted by the TOE. | |
FMT_SMF.1/MAS (selection-based) | A conformant TOE may mitigate the threat of malicious apps by implementing a MAS server that limits the apps that can be installed on enrolled MDs to those hosted by the TOE. | |
T.NETWORK_ATTACK | FAU_GEN.1/AUDITGEN | A conformant TOE mitigates the threat of network attack by generating audit records of activity which may indicate attempts of such attacks. |
FAU_STG.1 | A conformant TOE mitigates the threat of network attack by retaining audit records of activity which may indicate attempts of such attacks. | |
FCS_CKM.1 | A conformant TOE mitigates the threat of network attack by implementing secure key generation functions that prevent impersonation of the TOE. | |
FCS_CKM.2 | A conformant TOE mitigates the threat of network attack by implementing secure key establishment functions that prevent impersonation of the TOE. | |
FCS_CKM.6 | A conformant TOE mitigates the threat of network attack by securely destroying cryptographic keys to prevent their malicious reuse. | |
FCS_COP.1/CONF_ALG | A conformant TOE mitigates the threat of network attack by implementing encryption algorithms to maintain confidentiality of data in transit. | |
FCS_COP.1/HASH_ALG | A conformant TOE mitigates the threat of network attack by implementing hash algorithms to maintain integrity of data in transit. | |
FCS_COP.1/KEY_HASH | A conformant TOE mitigates the threat of network attack by implementing HMAC algorithms to maintain authenticity and integrity of data in transit. | |
FCS_COP.1/SIGN_ALG | A conformant TOE mitigates the threat of network attack by implementing hash algorithms to maintain authenticity of data in transit. | |
FCS_RBG.1 | A conformant TOE mitigates the threat of network attack by implementing a cryptographically strong DRBG to ensure generation of strong cryptographic keys. | |
FCS_STG_EXT.1 | A conformant TOE mitigates the threat of network attack by implementing protected storage for secret and private keys that must be stored persistently for use in trusted communications and in proving the authenticity of policy information. | |
FIA_CLI_EXT.1 | A conformant TOE mitigates the threat of network attack by implementing a mechanism to ensure that the MD being enrolled is genuine. | |
FIA_ENR_EXT.1 | A conformant TOE mitigates the threat of network attack by implementing a mechanism to ensure that the MD is enrolled via a trusted channel. | |
FMT_POL_EXT.1 | A conformant TOE mitigates the threat of network attack by implementing a mechanism to ensure the authenticity of policies issued by the TOE. | |
FPT_FLS.1 | A conformant TOE mitigates the threat of network attack by implementing a mechanism to fail into a secure state if it cannot generate strong random numbers. | |
FPT_TST.1 | A conformant TOE mitigates the threat of network attack by implementing a mechanism to self-test its ability to generate strong random numbers. | |
FTP_ITC.1/INTER_XFER_IT | A conformant TOE mitigates the threat of network attack by implementing a mechanism to protect data in transit between the TOE and external IT entities that support its operation. | |
FTP_ITC_EXT.1 | A conformant TOE mitigates the threat of network attack by specifying the channels over which data in transit is protected. | |
FTP_TRP.1/TRUSTPATH_ENROLL | A conformant TOE mitigates the threat of network attack by implementing a trusted path for enrollment of MDs. | |
FTP_TRP.1/TRUSTPATH_REM_ADMIN | A conformant TOE mitigates the threat of network attack by implementing a trusted path for remote administration. | |
FAU_SAR.1 (optional) | A conformant TOE may mitigate the threat of network attack by implementing a mechanism within the TOE boundary to review audit data that may indicate attempted network attacks. | |
FAU_SEL.1 (optional) | A conformant TOE may mitigate the threat of network attack by implementing a mechanism to specify the events that are audited by the TOE, which could include activities suggestive of a potential network attack. | |
FCO_CPC_EXT.1 (objective) | A conformant TOE may mitigate the threat of network attack by implementing a mechanism to register distributed TOE components so that individual endpoints are protected against impersonation. | |
FTP_TRP.1/TRUSTPATH_JOIN (objective) | A conformant TOE may mitigate the threat of network attack by implementing a mechanism to securely join distributed TOE components to one another using a trusted path. | |
FAU_STG.2 (selection-based) | A conformant TOE mitigates the threat of network attack by preventing unauthorized modification of locally stored audit records of activity which may indicate attempts of such attacks. | |
FCS_HTTPS_EXT.1 (selection-based) | A conformant TOE may mitigate the threat of network attack by implementing the HTTPS protocol to protect data in transit. | |
FCS_IV_EXT.1 (selection-based) | A conformant TOE may mitigate the threat of network attack by implementing functionality for appropriate IV generation based on the encryption algorithms it supports. | |
FCS_RBG.2 (selection-based) | A conformant TOE mitigates the threat of network attack by using sufficient entropy data to seed its DRBG to ensure a uniform keyspace of cryptographic key generation. | |
FCS_RBG.3 (selection-based) | A conformant TOE mitigates the threat of network attack by using sufficient entropy data to seed its DRBG to ensure a uniform keyspace of cryptographic key generation. | |
FCS_RBG.4 (selection-based) | A conformant TOE mitigates the threat of network attack by using sufficient entropy data to seed its DRBG to ensure a uniform keyspace of cryptographic key generation. | |
FCS_RBG.5 (selection-based) | A conformant TOE mitigates the threat of network attack by using sufficient entropy data to seed its DRBG to ensure a uniform keyspace of cryptographic key generation. | |
FCS_STG_EXT.2 (selection-based) | A conformant TOE mitigates the threat of network attack by using a particular method to protect persistently stored key data used for network communications. | |
FPT_ITT.1/INTER_XFER (selection-based) | A conformant TOE mitigates the threat of network attack by implementing a protected channel to protect data in transit between separate parts of the TOE. | |
FPT_ITT.1/INTER_XFER_AGENT (selection-based) | A conformant TOE mitigates the threat of network attack by implementing a protected channel to protect data in transit between separate parts of the TOE, specifically in the case where an MDM Agent is also part of the TOE. | |
FTP_ITC.1/INTER_TSF_XFER_AGENT (selection-based) | A conformant TOE mitigates the threat of network attack by implementing a protected channel to protect data in transit between the TOE and an environmental MDM Agent. | |
T.NETWORK_EAVESDROP | FCS_CKM.1 | A conformant TOE mitigates the threat of network eavesdrop by implementing secure key generation functions that prevent impersonation of the TOE. |
FCS_CKM.2 | A conformant TOE mitigates the threat of network eavesdrop by implementing secure key establishment functions that prevent impersonation of the TOE. | |
FCS_CKM.6 | A conformant TOE mitigates the threat of network eavesdrop by securely destroying cryptographic keys to prevent their malicious reuse. | |
FCS_COP.1/CONF_ALG | A conformant TOE mitigates the threat of network eavesdrop by implementing encryption algorithms to maintain confidentiality of data in transit. | |
FCS_RBG.1 | A conformant TOE mitigates the threat of network eavesdrop by implementing a cryptographically strong DRBG to ensure generation of strong cryptographic keys. | |
FCS_STG_EXT.1 | A conformant TOE mitigates the threat of network eavesdrop by implementing protected storage for secret and private keys that must be stored persistently for use in trusted communications and in proving the authenticity of policy information. | |
FIA_ENR_EXT.1 | A conformant TOE mitigates the threat of network attack by implementing a mechanism to ensure that the MD is enrolled via a trusted channel. | |
FPT_FLS.1 | A conformant TOE mitigates the threat of network eavesdrop by implementing a mechanism to fail into a secure state if it cannot generate strong random numbers. | |
FPT_TST.1 | A conformant TOE mitigates the threat of network eavesdrop by implementing a mechanism to self-test its ability to generate strong random numbers. | |
FTP_ITC.1/INTER_XFER_IT | A conformant TOE mitigates the threat of network eavesdrop by implementing a mechanism to protect data in transit between the TOE and external IT entities that support its operation. | |
FTP_ITC_EXT.1 | A conformant TOE mitigates the threat of network eavesdrop by specifying the channels over which data in transit is protected. | |
FTP_TRP.1/TRUSTPATH_ENROLL | A conformant TOE mitigates the threat of network eavesdrop by implementing a trusted path for enrollment of MDs. | |
FTP_TRP.1/TRUSTPATH_REM_ADMIN | A conformant TOE mitigates the threat of network eavesdrop by implementing a trusted path for remote administration. | |
FTP_TRP.1/TRUSTPATH_JOIN (objective) | A conformant TOE may mitigate the threat of network eavesdrop by implementing a mechanism to securely join distributed TOE components to one another using a trusted path. | |
FCS_HTTPS_EXT.1 (selection-based) | A conformant TOE may mitigate the threat of network eavesdrop by implementing the HTTPS protocol to protect data in transit. | |
FCS_IV_EXT.1 (selection-based) | A conformant TOE may mitigate the threat of network eavesdrop by implementing functionality for appropriate IV generation based on the encryption algorithms it supports. | |
FCS_RBG.2 (selection-based) | A conformant TOE mitigates the threat of network eavesdrop by using sufficient entropy data to seed its DRBG to ensure a uniform keyspace of cryptographic key generation. | |
FCS_RBG.3 (selection-based) | A conformant TOE mitigates the threat of network eavesdrop by using sufficient entropy data to seed its DRBG to ensure a uniform keyspace of cryptographic key generation. | |
FCS_RBG.4 (selection-based) | A conformant TOE mitigates the threat of network eavesdrop by using sufficient entropy data to seed its DRBG to ensure a uniform keyspace of cryptographic key generation. | |
FCS_RBG.5 (selection-based) | A conformant TOE mitigates the threat of network eavesdrop by using sufficient entropy data to seed its DRBG to ensure a uniform keyspace of cryptographic key generation. | |
FCS_STG_EXT.2 (selection-based) | A conformant TOE mitigates the threat of network eavesdrop by using a particular method to protect persistently stored key data used for network communications. | |
FPT_ITT.1/INTER_XFER (selection-based) | A conformant TOE mitigates the threat of network eavesdrop by implementing a protected channel to protect data in transit between separate parts of the TOE. | |
FPT_ITT.1/INTER_XFER_AGENT (selection-based) | A conformant TOE mitigates the threat of network eavesdrop by implementing a protected channel to protect data in transit between separate parts of the TOE, specifically in the case where an MDM Agent is also part of the TOE. | |
FTP_ITC.1/INTER_TSF_XFER_AGENT (selection-based) | A conformant TOE mitigates the threat of network eavesdrop by implementing a protected channel to protect data in transit between the TOE and an environmental MDM Agent. | |
T.PHYSICAL_ACCESS | FAU_ALT_EXT.1 | A conformant TOE mitigates the threat of physical access to the MD by generating an alert when a MD is unable to receive policy information or has its enrollment status altered (e.g. unenrollment may be evidence of physical compromise). |
FAU_GEN.1/AUDITGEN | A conformant TOE mitigates the threat of physical access to the MD by generating audit records of the management activities performed on the TOE that are applied to that device. | |
FAU_STG.1 | A conformant TOE mitigates the threat of physical access to the MD by retaining audit logs that may indicate potential misuse of the TOE to misconfigure a MD. | |
FIA_UAU.1 | A conformant TOE mitigates the threat of physical access to the MD by enforcing user authentication on the TOE so that MDs cannot be configured without authorization. | |
FMT_MOF.1/FUNCBE | A conformant TOE mitigates the threat of physical access to the MD by implementing management functions that allow for the TOE to place it into a secure configuration. | |
FMT_MOF.1/MANAGEMENT_ENROLL | A conformant TOE mitigates the threat of physical access to the MD by implementing management functions that allow for the TOE to place it into a secure configuration. | |
FMT_SMF.1/SERVER_CONF_AGENT | A conformant TOE mitigates the threat of physical access to the MD by implementing management functions that allow for the TOE to place it into a secure configuration. | |
FMT_SMF.1/SERVER_CONF_SERVER | A conformant TOE mitigates the threat of physical access to the MD by implementing management functions that allow the TSF to ensure its own secure operation with respect to applying policies. | |
FMT_SMR.1/SECMAN_ROLES | A conformant TOE mitigates the threat of physical access to the MD by implementing roles for its own management that allow the TSF to ensure its own secure operation with respect to applying policies. | |
FPT_API_EXT.1 | A conformant TOE mitigates the threat of physical access to the MD by ensuring that the TSF is not subject to compromise through improper API usage. | |
FPT_LIB_EXT.1 | A conformant TOE mitigates the threat of physical access to the MD by ensuring that the TSF is not subject to compromise through insecure library usage. | |
FPT_TST_EXT.1 | A conformant TOE mitigates the threat of physical access to the MD by ensuring that the TSF performs self-tests to verify its own integrity so that it can be trusted as a management platform. | |
FPT_TUD_EXT.1 | A conformant TOE mitigates the threat of physical access to the MD by ensuring that the TSF uses a trusted update mechanism to verify its own integrity so that it can be trusted as a management platform. | |
FAU_SAR.1 (optional) | A conformant TOE potentially mitigates the threat of physical access to the MD by providing a review mechanism for audit records of the management activities performed on the TOE that are applied to that device (to detect potential misconfiguration of the device). | |
FAU_SEL.1 (optional) | A conformant TOE potentially mitigates the threat of physical access to the MD by providing a mechanism to specify audit records of the specific management activities performed on the TOE that are applied to that device (to detect potential misconfiguration of the device). | |
FTA_TAB.1 (optional) | A conformant TOE potentially mitigates the threat of physical access to the MD by providing a mechanism on the TOE that advises of actionable consequences for its misuse in configuration of MDs. | |
FAU_GEN.1/MAS_SERVER (selection-based) | A conformant TOE potentially mitigates the threat of physical access to the MD by providing a mechanism on the TOE that logs a failure of the TSF to affect an enrolled MD's installed apps. | |
FAU_STG.2 (selection-based) | A conformant TOE potentially mitigates the threat of physical access to the MD by providing a mechanism on the TOE that protects audit records of configuration of that device from unauthorized modification or destruction. | |
FMT_MOF.1/MANAGEMENT_MAS (selection-based) | A conformant TOE potentially mitigates the threat of physical access to the MD by implementing management functions that allow for the TOE to download and install applications. | |
FMT_SMF.1/MAS (selection-based) | A conformant TOE potentially mitigates the threat of physical access to the MD by implementing management functions for its MAS Server functionality that allow the TSF to securely configure enrolled devices. | |
FMT_SMR.1/SECMAN_ROLES_MAS (selection-based) | A conformant TOE potentially mitigates the threat of physical access to the MD by implementing roles for its own management that allow the TSF to ensure its own secure operation with respect to applying MAS Server policies. |
Assurance Class | Assurance Components |
Security Target (ASE) |
ST introduction (ASE_INT.1) Conformance claims (ASE_CCL.1) Security objectives for the operational environment (ASE_OBJ.1) Extended components definition (ASE_ECD.1) Stated security requirements (ASE_REQ.1) TOE summary specification (ASE_TSS.1) |
Development (ADV) | Basic functional specification (ADV_FSP.1) |
Guidance documents (AGD) | Operational user guidance (AGD_OPE.1) Preparative procedures (AGD_PRE.1) |
Life cycle support (ALC) | Labeling of the TOE (ALC_CMC.1) TOE CM coverage (ALC_CMS.1) |
Tests (ATE) | Independent testing - sample (ATE_IND.1) |
Vulnerability assessment (AVA) | Vulnerability survey (AVA_VAN.1) |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_SAR.1 | ||
No events specified | N/A | |
FAU_SEL.1 | ||
All modifications to the audit configuration that occur while the audit collection functions are operating. | No additional information | |
FTA_TAB.1 | ||
Change in banner setting | No additional information |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_CRP_EXT.1 | ||
No events specified | N/A | |
FCO_CPC_EXT.1 | ||
Enabling or disabling communications between a pair of components. | Identities of the endpoint's pairs enabled or disabled. | |
FIA_UAU.4 | ||
Attempt to reuse enrollment data | Enrollment data | |
FIA_X509_EXT.3 | ||
Generation of Certificate Request Message | Content of Certificate Request Message | |
Success or failure of verification | Issuer and Subject name of added certificate or reason for failure | |
FIA_X509_EXT.4 | ||
Update of EST Trust Anchor Database | Subject name of added Root CA | |
Generation of Certificate Enrollment Request |
| |
Success or failure of enrollment | Issuer and Subject name of added certificate or reason for failure | |
FMT_SAE_EXT.1 | ||
Enrollment attempted after expiration of authentication data | Identity of user | |
FTP_TRP.1/TRUSTPATH_JOIN | ||
Initiation and termination of the trusted channel | Trusted channel protocol |
This PP does not define any Implementation-dependent requirements.
As indicated in the introduction to this PP, the baseline requirements (those that must be performed by the TOE or its underlying platform) are contained in the body of this PP. There are additional requirements based on selections in the body of the PP: if certain selections are made, then additional requirements below must be included.
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_GEN.1/MAS_SERVER | ||
No events specified | N/A | |
FAU_STG.2 | ||
No events specified | N/A | |
FCS_HTTPS_EXT.1 | ||
Failure of the certificate validity check |
| |
FCS_IV_EXT.1 | ||
No events specified | N/A | |
FCS_RBG.2 | ||
No events specified | N/A | |
FCS_RBG.3 | ||
No events specified | N/A | |
FCS_RBG.4 | ||
No events specified | N/A | |
FCS_RBG.5 | ||
No events specified | N/A | |
FCS_STG_EXT.2 | ||
No events specified | N/A | |
FIA_TOK_EXT.1 | ||
No events specified | N/A | |
FIA_X509_EXT.1/CERTVAL_SEL | ||
Failure to validate X.509 certificate | Reason for failure | |
FMT_MOF.1/MANAGEMENT_MAS | ||
No events specified | N/A | |
FMT_SMF.1/MAS | ||
No events specified | N/A | |
FMT_SMR.1/SECMAN_ROLES_MAS | ||
No events specified | N/A | |
FPT_ITT.1/INTER_XFER | ||
Initiation and termination of the trusted channel |
| |
FPT_ITT.1/INTER_XFER_AGENT | ||
Initiation and termination of the trusted channel |
| |
FTP_ITC.1/INTER_TSF_XFER_AGENT | ||
Initiation and termination of the trusted channel |
|
Cipher Mode | Reference | IV Requirement |
Electronic Codebook (ECB) | SP800-38A | No IV |
Counter (CTR) | SP800-38A | "Initial Counter" shall be non-repeating. No counter value shall be repeated across multiple messages with the same secret key. |
Cipher Block Chaining (CBC) | SP800-38A | IVs shall be unpredictable. Repeating IVs leak information about whether the first one or more blocks are shared between two messages, so IVs should be non-repeating in such situations. |
Output Feedback (OFB) | SP800-38A | IVs shall be non-repeating and shall not be generated by invoking the cipher on another IV. |
Cipher Feedback (CFB) | SP800-38A | IVs should be non-repeating as repeating IVs leak information about the first plaintext block and about common shared prefixes in messages. |
XOR Encrypt XOR (XEX) Tweakable Block Cipher with Ciphertext Stealing (XTS) | SP800-38E | No IV. Tweak values shall be non-negative integers, assigned consecutively, and starting at an arbitrary non-negative integer. |
Cipher-based Message Authentication Code (CMAC) | SP800-38B | No IV |
Key Wrap and Key Wrap with Padding | SP800-38F | No IV |
Counter with CBC-Message Authentication Code (CCM) | SP800-38C | No IV. Nonces shall be non-repeating. |
Galois Counter Mode (GCM) | SP800-38D | IV shall be non-repeating. The number of invocations of GCM shall not exceed 2^32 for a given secret key unless an implementation only uses 96-bit IVs (default length). |
Functional Class | Functional Components |
---|---|
Communication (FCO) | FCO_CPC_EXT Component Registration Channel Definition |
Cryptographic Support (FCS) | FCS_HTTPS_EXT HTTPS Protocol FCS_IV_EXT Initialization Vector Generation FCS_STG_EXT Encrypted Cryptographic Key Storage |
Identification and Authentication (FIA) | FIA_CLI_EXT Client Authorization FIA_ENR_EXT Enrollment of Mobile Device into Management FIA_TOK_EXT Client Tokens |
Protection of the TSF (FPT) | FPT_API_EXT Use of Supported Services and APIs FPT_LIB_EXT Use of Third-Party Libraries FPT_TST_EXT Functionality Testing FPT_TUD_EXT Trusted Update |
Security Audit (FAU) | FAU_ALT_EXT Server Alerts FAU_CRP_EXT Support for Compliance Reporting of Mobile Device Configuration FAU_NET_EXT Network Reachability Review |
Security Management (FMT) | FMT_POL_EXT Trusted Policy Update FMT_SAE_EXT Security Attribute Expiration |
Trusted Path/Channels (FTP) | FTP_ITC_EXT Trusted Channel |
FCO_CPC_EXT.1, Component Registration Channel Definition, defines requirements for the registration process for distributed TOEs.
There are no management activities foreseen.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: |
FPT_ITT.1 TSF Data Transfer FTP_TRP.1 Trusted Path |
FCS_HTTPS_EXT.1, HTTPS Protocol, defines requirements for the implementation of the HTTPS protocol.
There are no management activities foreseen.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: |
FCS_TLS_EXT.1 TLS Protocol [FCS_TLSC_EXT.1 TLS Client Protocol or FCS_TLSS_EXT.1 TLS Server Protocol |
FCS_IV_EXT.1, Initialization Vector Generation, defines requirements for generating IVs.
There are no management activities foreseen.
There are no auditable events foreseen.
FCS_STG_EXT.1, Cryptographic Key Storage, defines requirements for the security of persistent secrets and private keys.
FCS_STG_EXT.2, Encrypted Cryptographic Key Storage, defines requirements for preventing access to private keys and persistent secrets.
The following actions could be considered for the management functions in FMT.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FIA_CLI_EXT.1, Client Authorization, defines requirements for a unique certificate or token for each client device.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FIA_ENR_EXT.1, Enrollment of Mobile Device into Management, defines requirements for authenticating and limiting user actions.
The following actions could be considered for the management functions in FMT.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: |
FIA_UAU.4 Single-Use Authentication Mechanisms FMT_SMF.1 Specification of Management Functions |
FIA_TOK_EXT.1, Client Tokens, defines requirements for generating unique tokens.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_API_EXT.1, Use of Supported Services and APIs, defines requirements for API usage.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_LIB_EXT.1, Use of Third-Party Libraries, defines requirements for third-party libraries.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_TST_EXT.1, Functionality Testing, defines requirements for the integrity of self-testing.
There are no management activities foreseen.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: | FPT_TST.1 TSF Self-Testing |
FPT_TUD_EXT.1, Trusted Update, defines requirements for authorized administrators to manage software versions and updates.
The following actions could be considered for the management functions in FMT.
The following action should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FAU_ALT_EXT.1, Server Alerts, defines requirements for alerting the administrator to events.
The following actions could be considered for the management functions in FMT.
The following actions should be auditable if FAU_GEN security audit data generation is include in the PP or ST.
FAU_CRP_EXT.1, Support for Compliance Reporting of Mobile Device Configuration, defines requirements for providing information to enrolled MDs through a secure channel.
The following actions could be considered for the management functions in FMT.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FTP_ITC.1 Inter-TSF Trusted Channel |
FAU_NET_EXT.1, Network Reachability Review, defines requirements for authorized administrators to read network connectivity status.
The following actions could be considered for the management functions in FMT.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FAU_ALT_EXT.2 Agent Alerts |
FMT_POL_EXT.1, Trusted Policy Update, defines requirements for using digitally signed policies and policy updates.
There are no management activities foreseen.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FMT_SAE_EXT.1, Security Attribute Expiration, defines requirements for the expiration time for enrollment authentication.
The following action could be considered for the management functions in FMT.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: |
FIA_ENR_EXT.1 Enrollment of Mobile Device into Management FIA_UAU.4 Single-Use Authentication Mechanisms |
FTP_ITC_EXT.1, Trusted Channel, defines requirements for providing logically distinct communication channels.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: |
FTP_ITC.1 Inter-TSF Trusted Channel FTP_TRP.1 Trusted Path |
This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.3 Dependencies between components.
This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP provides evidence that these controls are present and have been evaluated.
Table 12: Implicitly Satisfied RequirementsRequirement | Rationale for Satisfaction |
FIA_UID.1 - Timing of Identification |
FIA_UAU.1 has a dependency on FIA_UID.1 because authentication of an external entity requires that entity to first identify
itself so that its identity can be validated by the authentication process. This SFR has not been defined in this PP-Module because authentication of a user implicitly requires them to be identified as well. There are two cases in which a user must be authenticated by the TSF per the application note in FIA_UAU.1: enrollment of a user’s MD into management, and authentication of a user to the TOE’s management interface. FIA_ENR_EXT.1 requires authentication of the user using a method such as a directory server, which implicitly expects that the user must identify themselves as well as provide a credential associated with the claimed identity. For management, FMT_SMR.1(1) requires the TSF to maintain an administrator role but it does not specify whether authentication to this role is role-based or identity-based. Therefore, the PP is not concerned with the specific mechanism by which an administrator presents their identity to the TSF, only that there is a mechanism to validate and authorize whatever information they do present. |
FMT_MTD.1 - Management of TSF Data |
FAU_SEL.1 has a dependency on FMT_MTD.1 because the configuration settings that determine what events are audited is considered to be
TSF data. While FAU_SEL.1 determines the extent to which the TOE’s audit function is configured, it relies on FMT_MTD.1 to determine
the administrative roles that are permitted to manipulate this data. The PP allows FAU_SEL.1 to be implemented either by the TSF or by the TOE platform because the TOE may rely on the audit functionality provided by the OS it runs on. If this is configured entirely through the platform, the administrator does not necessarily need to be authenticated by the TOE to do this. Therefore, requiring FMT_MTD.1 does not make sense in this situation. If this is configured through the TOE, it can be implied from a review of FMT_SMR.1(1) that the ‘MD user’ role cannot perform this function as they lack the authority to manage the TSF. It is therefore understood that this function can be performed by the ‘administrator’ role or potentially by one or more roles specified by the ST author if the selection to specify additional roles is chosen. An additional SFR that explicitly identifies the roles permitted to manage this function is redundant in this context. |
FPT_STM.1 - Reliable Time Stamps | The PP’s iterations of FAU_GEN.1 as well as its cryptographic functionality have a dependency on FPT_STM.1 because audit data require accurate timestamps as well as some cryptographic operations, such as determining if a presented X.509 certificate is expired. The TOE is installed on a general-purpose computer or specialized network device that is assumed to have the ability to provide certain functions to the TOE as specified in A.MDM_SERVER_PLATFORM. This assumption explicitly lists ‘reliable timestamps’ as a function that the TSF is expected to have available to it. |
Factor | Same or Different | Guidance |
PP-Specified Functionality | Same | If the differences between Models affect only non-PP-specified functionality, then the Models are equivalent. |
Different | If PP-specified security functionality is affected by the differences between Models, then the Models are not equivalent and must be tested separately. It is necessary only to test the functionality affected by the software differences. If only differences are tested, then the differences must be enumerated, and for each difference the Vendor must provide an explanation of why each difference does or does not affect PP-specified functionality. If the Product Models are separately tested fully, then there is no need to document the differences. |
Factor | Same or Different | Guidance |
Product Models | Different | Versions of different Product Models are not equivalent unless the Models are equivalent as defined in subsection 3. |
PP-Specified Functionality | Same | If the differences affect only non-PP-specified functionality, then the Versions are equivalent. |
Different | If PP-specified security functionality is affected by the differences, then the Versions are not considered equivalent and must be tested separately. It is necessary only to test the functionality affected by the changes. If only the differences are tested, then for each difference the Vendor must provide an explanation of why the difference does or does not affect PP-specified functionality. If the Product Versions are separately tested fully, then there is no need to document the differences. |
Factor | Same, Different, or None | Guidance |
Platform Architectures | Different | Platforms that present different processor architectures and instruction sets to the MDM are not equivalent. |
PP-Specified Functionality | Same | For platforms with the same processor architecture, the platforms are equivalent with respect to the MDM if execution of all PP-specified security functionality follows the same code path on both platforms. |
Factor | Same, Different, or None | Guidance |
Platform Architectures | Different | Platforms that run on different processor architectures and instruction sets are not equivalent. |
Platform Vendors | Different | Platforms from different vendors are not equivalent. |
Platform Versions | Different | Platforms from the same vendor with different major version numbers are not equivalent. |
Platform Interfaces | Different | Platforms from the same vendor and major version are not equivalent if there are differences in device interfaces and OS APIs that are relevant to the way the platform provides PP-specified security functionality to the MDM. |
Platform Interfaces | Same | Platforms from the same vendor and major version are equivalent if there are no differences in device interfaces and OS APIs that are relevant to the way the platform provides PP-specified security functionality to the MDM, or if the Platform does not provide such functionality to the MDM. |
Factor | Same, Different, or None | Guidance |
Platform Type or Vendor | Different | Software-based execution environments that are substantially different or come from different vendors are not equivalent. For example, a java virtual machine is not the same as a container. A Docker container is not the same as a CoreOS container. |
Platform Versions | Different | Execution environments that are otherwise equivalent are not equivalent if they have different major version numbers. |
PP-Specified Security Functionality | Same | All other things being equal, execution environments are equivalent if there is no significant difference in the interfaces through which the environments provide PP-specified security functionality to MDMs. |
Requirement | Action |
FMT_SMF.1/SERVER_CONF_AGENT Function 32 | Include in ST and assign GPS. |
FMT_SMF.1/SERVER_CONF_AGENT Function 34 | Include in ST. Assign personal hotspot connections (if feature exists). |
FMT_SMF.1/SERVER_CONF_AGENT Function 47 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 49 | Include in ST and select "a. USB mass storage mode." |
FMT_SMF.1/SERVER_CONF_AGENT Function 51 | Include in ST. Select both options. |
Requirement | Action |
FMT_SMF.1/SERVER_CONF_AGENT Function 15 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 16 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 31 | Include in ST and select "no other method." |
FMT_SMF.1/SERVER_CONF_AGENT Function 32 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 33 | Include in ST. Assign at least USB. |
FMT_SMF.1/SERVER_CONF_AGENT Function 34 | Include in ST. Assign all protocols where the TSF acts as a server. |
FMT_SMF.1/SERVER_CONF_AGENT Function 36 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 37 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 40 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 42 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 47 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 52 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 54 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function c.1 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function c.2 | Include in ST. |
FCS_CKM.1.1 | Select RSA with key size of 3072 or select ECC schemes. |
FCS_CKM.2.1 | Select "RSA schemes" or select "ECC schemes." |
FCS_COP.1.1/CONF_ALG | Select 256 bits |
FCS_COP.1.1/HASH_ALG | Select SHA-384 |
FCS_COP.1.1/SIGN_ALG | Select RSA with key size of 3072 or select ECC schemes. |
FIA_X509_EXT.2.2 | Select either "allow the administrator to choose…" or "not accept the certificate." |
FCS_TLSC_EXT.1.1 (from TLS Package) | If included in ST, select "TLS 1.2." |
FCS_TLSC_EXT.2.1 (from TLS Package) | If included in ST, select "secp384r1." |
Requirement | Action |
FMT_SMF.1/SERVER_CONF_AGENT Function 13 | Include in ST |
FMT_SMF.1/SERVER_CONF_AGENT Function 14 | Include in ST |
FMT_SMF.1/SERVER_CONF_AGENT Function 21 | Include in ST |
FMT_SMF.1/SERVER_CONF_AGENT Function 22 | Include in ST |
FMT_SMF.1/SERVER_CONF_AGENT Function 30 | Select "on a per-app basis," "on a per-group of application processes basis," or both |
FMT_SMF.1/SERVER_CONF_AGENT Function 31 | If included in ST, select "on a per-app basis," "on a per-group of application processes basis," or both |
FMT_SMF.1/SERVER_CONF_AGENT Function 48 | Include in ST |
FMT_SMF.1/SERVER_CONF_AGENT Function 52 | If included in ST, select "on a per-app basis," "on a per-group of application processes basis," or both |
FMT_SMF.1/SERVER_CONF_SERVER Function f | Include in the ST |
Acronym | Meaning |
---|---|
API | API Application Programming Interface |
Base-PP | Base Protection Profile |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
cPP | Collaborative Protection Profile |
CSP | Critical Security Parameter |
DEK | Data Encryption Key |
EP | Extended Package |
EST | Enrollment over Secure Transport |
FP | Functional Package |
KEK | Key Encryption Key |
MD | Managed Device |
MDM | Mobile Device Management |
OE | Operational Environment |
OS | Operating System |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
REK | Root Encryption Key |
SAR | Security Assurance Requirement |
SFR | Security Functional Requirement |
ST | Security Target |
TOE | Target of Evaluation |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |