Version | Date | Comment |
---|---|---|
1.0 | 2013-10-21 | Initial Release |
1.1 | 2014-02-07 | Typographical changes and clarifications to front-matter |
2.0 | 2014-12-31 | Separation of MDM agent SFRs Updated cryptography, protocol, X.509 requirements. Updated management functions to match MDFPPv2.0. Included SSH as a remote administration protocol. Removed IPsec as protocol to communicate to MDM agent. Added X509 enrollment objective requirement. Added Optional Mobile Application Store requirements. |
3.0 | 2016-11-21 | Updates to align with Technical Decisions Added requirements to support BYOD use case Removed IPsec and SSH requirements, which are now contained in EPs |
4.0 | 2018-09-24 |
Updates to align with Technical Decisions Removed platform dependency Removed TLS SFRs and use the TLS Functional Package Allowed for a distributed TOE |
4.1 | 2024-11-15 |
Updates to align with Technical Decisions Updates to align with CC:2022 |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
API Application Programming Interface (API) | A specification of routines, data structures, object classes, and variables that allows an application to make use of services provided by another software component, such as a library. APIs are often provided for a set of libraries included with the platform. |
Administrator | The person who is responsible for management activities, including setting the policy that is applied by the enterprise on the mobile device. |
Critical Security Parameter (CSP) | Security-related information whose disclosure or modification can compromise the security of a cryptographic module or authentication system. |
Data | Program or application or data files that are stored or transmitted by a server or MD. |
Data Encryption Key (DEK) | A key used to encrypt data-at-rest. |
Developer Modes | States in which additional services are available to a user in order to provide enhanced system access for debugging of software. |
Enrolled State | The state in which a mobile device is managed by a policy from an MDM. |
Enrollment over Secure Transport (EST) | Cryptographic protocol that describes an X.509 certificate management protocol targeting public key infrastructure (PKI) clients that need to acquire client certificates and associated certificate authority (CA) certificates. |
Enterprise Applications | Applications that are provided and managed by the enterprise as opposed to a public application store. |
Enterprise Data | Any data residing in enterprise servers or temporarily stored on mobile devices to which the mobile device user is allowed access according to the security policy defined by the enterprise and implemented by the administrator. |
Key Encryption Key (KEK) | A key that is used to encrypt other keys, such as DEKs or storage repositories that contain keys. |
Locked State | Mobile device state where the device is powered on but most functionality is unavailable for use without authentication. |
Mobile Device (MD) | A device which is composed of a hardware platform and its system software. The device typically provides wireless connectivity and may include software for functions like secure messaging, email, web, VPN connection, and VoIP (Voice over IP), for access to the protected enterprise network, enterprise data and applications, and for communicating to other MDs. |
Mobile Device Management (MDM) | Products that allow enterprises to apply security policies to MDs. This system consists of two primary components: the MDM server and the MDM agent. |
Mobile Device User | The person who uses and is held responsible for an MD. |
Operating System (OS) | Software which runs at the highest privilege level and can directly control hardware resources. Modern mobile devices typically have at least two primary operating systems: one which runs on the cellular baseband processor and one which runs on the application processor. The platform of the application processor handles most user interaction and provides the execution environment for apps. The platform of the cellular baseband processor handles communications with the cellular network and may control other peripherals. The term OS, without context, may be assumed to refer to the platform of the application processor. |
Powered-Off State | Mobile device shutdown state. |
Protected Data | All non-TSF data on the mobile device, including user or enterprise data. Protected data is encrypted while the mobile device is in the powered-off state. This includes keys in software-based storage. May overlap with sensitive data. |
Root Encryption Key (REK) | A key tied to a particular device that is used to encrypt all other keys for that device. |
Sensitive Data | Data that is encrypted by the mobile device. May include all user or enterprise data or may be data for specific applications such as emails, messaging, documents, calendar items, or contacts. May be protected while the mobile device is in the locked state. Must include at minimum some keys in software-based key storage. |
Trust Anchor Database | A list of trusted root Certificate Authority certificates. |
Unenrolled State | Mobile device state when it is not managed by an MDM. |
Unlocked State | Mobile device state where it is powered on and its functionality is available for use. |
Requirement | Description | Distributed TOE SFR Allocation |
FAU_ALT_EXT.1 | Server Alerts | One |
FAU_CRP_EXT.1 | Support for Compliance Reporting of Mobile Device Configuration | One |
FAU_GEN.1/AUDITGEN | Audit Data Generation | All |
FAU_GEN.1/MAS_SERVER | Audit Data Generation | Feature Dependent |
FAU_NET_EXT.1 | Network Reachability Review | One |
FAU_SAR.1 | Audit Review | Feature Dependent |
FAU_SEL.1 | Security Audit Event Selection | One |
FAU_STG.1 | External Trail Storage | All |
FAU_STG.2 | Audit Event Storage | Feature Dependent |
FCO_CPC_EXT.1 | Communication Partner Control | All |
FCS_CKM.1 | Cryptographic Key Generation | Feature Dependent |
FCS_CKM.2 | Cryptographic Key Establishment | All |
FCS_CKM.6 | Cryptographic Key Destruction | All |
FCS_COP.1.1/CONF_ALG | Cryptographic Operation (Confidentiality Algorithms) | All |
FCS_COP.1.1/HASH_ALG | Cryptographic Operation (Hashing Algorithms) | All |
FCS_COP.1.1/KEY_HASH | Cryptographic Operation (Keyed-Hash Message Authentication) | All |
FCS_COP.1.1/SIGN_ALG | Cryptographic Operation (Signature Algorithms) | All |
FCS_HTTPS_EXT.1 | HTTPS Protocol | Feature Dependent |
FCS_IV_EXT.1 | Initialization Vector Generation | Feature Dependent |
FCS_RBG.1 | Random Bit Generation (RBG) | All |
FCS_RBG.2 | Random Bit Generation (External Seeding) | Feature Dependent |
FCS_RBG.3 | Random Bit Generation (Internal Seeding - Single Source) | Feature Dependent |
FCS_RBG.4 | Random Bit Generation (Internal Seeding - Multiple Sources) | Feature Dependent |
FCS_RBG.5 | Random Bit Generation (Combining Noise Sources) | Feature Dependent |
FCS_STG_EXT.1 | Cryptographic Key Storage | All |
FCS_STG_EXT.2 | Encrypted Cryptographic Key Storage | Feature Dependent |
FIA_CLI_EXT.1 | Client Authorization | One |
FIA_ENR_EXT.1 | Enrollment of Mobile Device into Management | One |
FIA_TOK_EXT.1 | Client Tokens | One |
FIA_UAU.1 | Timing of Authentication | One |
FIA_UAU.4 | Single-Use Authentication Mechanisms | One |
FIA_X509_EXT.1/CERTVAL_MAN | X.509 Certification Validation | Feature Dependent |
FIA_X509_EXT.1/CERTVAL_SEL | X.509 Certification Validation | Feature Dependent |
FIA_X509_EXT.2 | X.509 Certificate Authentication | Feature Dependent |
FIA_X509_EXT.3 | X.509 Enrollment | Feature Dependent |
FIA_X509_EXT.4 | Alternate X.509 Enrollment | Feature Dependent |
FMT_MOF.1/FUNCBE | Management of functions behaviour | Feature Dependent |
FMT_MOF.1/MANAGEMENT_ENROLL | Management of functions behaviour (Enrollment) | Feature Dependent |
FMT_MOF.1/MANAGEMENT_MAS | Management of Functions in (MAS Server Downloads) | Feature Dependent |
FMT_POL_EXT.1 | Trusted Policy Update | One |
FMT_SAE_EXT.1 | Security Attribute Expiration | One |
FMT_SMF.1/MAS | Specification of Management Functions (MAS Server) | Feature Dependent |
FMT_SMF.1/SERVER_CONF_AGENT | Specification of Management Functions (Server configuration of Agent) | One |
FMT_SMF.1/SERVER_CONF_SERVER | Specification of Management Functions (Server configuration of Server) | Feature Dependent |
FMT_SMR.1/SECMAN_ROLES | Security Management Roles | One |
FMT_SMR.1/SECMAN_ROLES_MAS | Security Management Roles | Feature Dependent |
FPT_API_EXT.1 | Use of Supported Services and APIs | All |
FPT_FLS.1 | Failure with Preservation of Secure State | All |
FPT_ITT.1/INTER_XFER | Internal TOE TSF Data Transfer | Feature Dependent |
FPT_ITT.1/INTER_XFER_AGENT | Internal TOE TSF Data Transfer (MDM Agent) | Feature Dependent |
FPT_LIB_EXT.1 | Use of Third-Party Libraries | All |
FPT_TST.1 | TSF Self-Testing | All |
FPT_TST_EXT.1 | Functionality Testing | All (except for agent components) |
FPT_TUD_EXT.1 | Trusted Update | All |
FTA_TAB.1 | Default TOE Access Banners | One |
FTP_ITC.1/INTER_TSF_XFER_AGENT | Inter-TSF Trusted Channel (MDM Agent) | One |
FTP_ITC.1/INTER_XFER_IT | Inter-TSF Trusted Channel (Authorized IT Entities) | One |
FTP_ITC_EXT.1 | Trusted Channel | One |
FTP_TRP.1/TRUSTPATH_ENROLL | Trusted Path for Enrollment | Feature Dependent |
FTP_TRP.1/TRUSTPATH_JOIN | Trusted Path for Joining | Feature Dependent |
FTP_TRP.1/TRUSTPATH_REM_ADMIN | Trusted Path for Remote Administration | Feature Dependent |
Assumption or OSP | Security Objectives | Rationale |
T.MALICIOUS_APPS | O.APPLY_POLICY | The threat T.MALICIOUS_APPS is countered by O.APPLY_POLICY as this provides the capability to limit the ability to install applications on the MD. |
O.INTEGRITY | The threat T.MALICIOUS_APPS is countered by O.INTEGRITY as this provides the capability to perform self-tests to ensure the integrity of critical functionality, software and firmware and data has been maintained. | |
T.NETWORK_ATTACK | O.DATA_PROTECTION_TRANSIT | The threat T.NETWORK_ATTACK is countered by O.DATA_PROTECTION_TRANSIT as this provides authentication of the endpoints of a trusted communication path. |
T.NETWORK_EAVESDROP | O.DATA_PROTECTION_TRANSIT | The threat T.NETWORK_EAVESDROP is countered by O.DATA_PROTECTION_TRANSIT as this provides the capability to communicate using one (or more) standard protocols as a means to maintain the confidentiality of data that are transmitted outside and within the TOE. |
O.QUALITY | The threat T.NETWORK_EAVESDROP is countered by O.QUALITY as this provides the capability to invoke platform resources to ensure quality of implementation. | |
T.PHYSICAL_ACCESS | O.APPLY_POLICY | The threat T.PHYSICAL_ACCESS is countered by O.APPLY_POLICY as this provides the capability to configure and apply security policies to ensure the Mobile Device can protect user and enterprise data that it may store or process. |
A.COMPONENTS_RUNNING | OE.COMPONENTS_RUNNING | The operational environment objective OE.COMPONENTS_RUNNING is realized through A.COMPONENTS_RUNNING. |
A.CONNECTIVITY | OE.WIRELESS_NETWORK | The operational environment objective OE.WIRELESS_NETWORK is realized through A.CONNECTIVITY. |
A.MDM_SERVER_PLATFORM | OE.TIMESTAMP | The operational environment objective OE.TIMESTAMP is realized through A.MDM_SERVER_PLATFORM. |
A.PROPER_ADMIN | OE.PROPER_ADMIN | The operational environment objective OE.PROPER_ADMIN is realized through A.PROPER_ADMIN. |
A.PROPER_USER | OE.PROPER_USER | The operational environment objective OE.PROPER_USER is realized through A.PROPER_USER. |
P.ACCOUNTABILITY | O.ACCOUNTABILITY | The organizational security policy O.ACCOUNTABILITY is realized through P.ACCOUNTABILITY. |
P.ADMIN | OE.PROPER_ADMIN | The organizational security policy P.ADMIN is realized through OE.PROPER_ADMIN. |
P.DEVICE_ENROLL | OE.IT_ENTERPRISE | The organizational security policy P.DEVICE_ENROLL is realized through OE.IT_ENTERPRISE. |
P.NOTIFY | OE.PROPER_USER | The organizational security policy P.NOTIFY is realized through OE.PROPER_USER. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_ALT_EXT.1 | ||
Type of alert | Identity of Mobile Device that sent alert. | |
FAU_GEN.1/AUDITGEN | ||
No events specified | N/A | |
FAU_NET_EXT.1 | ||
No events specified | N/A | |
FAU_STG.1 | ||
No events specified | N/A | |
FCS_CKM.1 | ||
[selection: Failure of key generation activity for authentication keys, None] | No additional information | |
FCS_CKM.2 | ||
No events specified | N/A | |
FCS_CKM.6 | ||
No events specified | N/A | |
FCS_COP.1/CONF_ALG | ||
No events specified | N/A | |
FCS_COP.1/HASH_ALG | ||
No events specified | N/A | |
FCS_COP.1/KEY_HASH | ||
No events specified | N/A | |
FCS_COP.1/SIGN_ALG | ||
No events specified | N/A | |
FCS_RBG.1 | ||
Failure of the randomization process. | None. | |
FCS_STG_EXT.1 | ||
No events specified | N/A | |
FIA_CLI_EXT.1 | ||
No events specified | N/A | |
FIA_ENR_EXT.1 | ||
Failure of MD user authentication | Presented username | |
FIA_UAU.1 | ||
No events specified | N/A | |
FIA_X509_EXT.1/CERTVAL_MAN | ||
Failure to validate X.509 certificate | Reason for failure | |
FIA_X509_EXT.2 | ||
Failure to establish connection to determine revocation status. | No additional information | |
FMT_MOF.1/FUNCBE | ||
Issuance of command to perform function | Command sent and identity of MDM agent recipients | |
Change of policy settings | Policy changed and value or full policy | |
FMT_MOF.1/MANAGEMENT_ENROLL | ||
Enrollment by a user | Identity of user | |
FMT_POL_EXT.1 | ||
No events specified | N/A | |
FMT_SMF.1/SERVER_CONF_AGENT | ||
No events specified | N/A | |
FMT_SMF.1/SERVER_CONF_SERVER | ||
Success or failure of function | No additional information | |
FMT_SMR.1/SECMAN_ROLES | ||
No events specified | N/A | |
FPT_API_EXT.1 | ||
No events specified | N/A | |
FPT_FLS.1 | ||
Failure of the TSF. | None. | |
FPT_LIB_EXT.1 | ||
No events specified | N/A | |
FPT_TST.1 | ||
Execution of self-tests. | None. | |
FPT_TST_EXT.1 | ||
Initiation of self-test | No additional information | |
Failure of self-test | Algorithm that caused failure | |
Detected integrity violation | The TSF code file that caused the integrity violation | |
FPT_TUD_EXT.1 | ||
Success or failure of signature verification | No additional information | |
FTP_ITC.1/INTER_XFER_IT | ||
Initiation and termination of the trusted channel |
| |
FTP_ITC_EXT.1 | ||
No events specified | N/A | |
FTP_TRP.1/TRUSTPATH_ENROLL | ||
Initiation and termination of the trusted channel | Trusted channel protocol | |
FTP_TRP.1/TRUSTPATH_REM_ADMIN | ||
Initiation and termination of the trusted channel |
|
Requirement | Auditable Events | Additional Audit Data Contents |
FCS_TLSC_EXT.1 | Failure to establish a TLS session. | Reason for failure. |
FCS_TLSC_EXT.1 | Failure to verify presented identifier. | Presented identifier and reference identifier. |
FCS_TLSS_EXT.1 | Failure to establish a TLS session. | Reason for failure. |
FCS_DTLSC_EXT.1 | Failure of the certificate validity check. | Issuer Name and Subject Name of certificate. |
FCS_DTLSS_EXT.1 | Failure of the certificate validity check. | Issuer Name and Subject Name of certificate. |
Cipher Mode | Reference | IV Requirement |
Electronic Codebook (ECB) | SP800-38A | No IV |
Counter (CTR) | SP800-38A | "Initial Counter" shall be non-repeating. No counter value shall be repeated across multiple messages with the same secret key. |
Cipher Block Chaining (CBC) | SP800-38A | IVs shall be unpredictable. Repeating IVs leak information about whether the first one or more blocks are shared between two messages, so IVs should be non-repeating in such situations. |
Output Feedback (OFB) | SP800-38A | IVs shall be non-repeating and shall not be generated by invoking the cipher on another IV. |
Cipher Feedback (CFB) | SP800-38A | IVs should be non-repeating as repeating IVs leak information about the first plaintext block and about common shared prefixes in messages. |
XOR Encrypt XOR (XEX) Tweakable Block Cipher with Ciphertext Stealing (XTS) | SP800-38E | No IV. Tweak values shall be non-negative integers, assigned consecutively, and starting at an arbitrary non-negative integer. |
Cipher-based Message Authentication Code (CMAC) | SP800-38B | No IV |
Key Wrap and Key Wrap with Padding | SP800-38F | No IV |
Counter with CBC-Message Authentication Code (CCM) | SP800-38C | No IV. Nonces shall be non-repeating. |
Galois Counter Mode (GCM) | SP800-38D | IV shall be non-repeating. The number of invocations of GCM shall not exceed 2^32 for a given secret key unless an implementation only uses 96-bit IVs (default length). |
For the selection in this requirement, the ST author selects "TSF noise source" if a single noise source is used as input to the DRBG. The ST author selects "multiple TSF noise sources" if a seed is formed from a combination of two or more noise sources within the TOE boundary. If the TSF implements two or more separate DRBGs that are seeded in separate manners, this SFR should be iterated for each DRBG. It multiple distinct noise sources exist such that each DRBG only uses one of them, then each iteration would select "TSF noise source"; "multiple TSF noise sources" is only selected if a single DRBG uses multiple noise sources for its seed. The ST author selects "TSF interface for seeding" if noise source data is generated outside the TOE boundary.
If "TSF noise source" is selected, FCS_RBG.3 must be claimed.
If "multiple TSF noise sources" is selected, FCS_RBG.4 and FCS_RBG.5 must be claimed.
If "TSF interface for seeding" is selected, FCS_RBG.2 must be claimed.
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
Threat | Addressed by | Rationale |
---|
Assurance Class | Assurance Components |
Security Target (ASE) |
ST introduction (ASE_INT.1) Conformance claims (ASE_CCL.1) Security objectives for the operational environment (ASE_OBJ.1) Extended components definition (ASE_ECD.1) Stated security requirements (ASE_REQ.1) TOE summary specification (ASE_TSS.1) |
Development (ADV) | Basic functional specification (ADV_FSP.1) |
Guidance documents (AGD) | Operational user guidance (AGD_OPE.1) Preparative procedures (AGD_PRE.1) |
Life cycle support (ALC) | Labeling of the TOE (ALC_CMC.1) TOE CM coverage (ALC_CMS.1) |
Tests (ATE) | Independent testing - sample (ATE_IND.1) |
Vulnerability assessment (AVA) | Vulnerability survey (AVA_VAN.1) |
Functional Class | Functional Components |
---|---|
Communication (FCO) | FCO_CPC_EXT Component Registration Channel Definition |
Cryptographic Support (FCS) | FCS_HTTPS_EXT HTTPS Protocol FCS_IV_EXT Initialization Vector Generation FCS_STG_EXT Encrypted Cryptographic Key Storage |
Identification and Authentication (FIA) | FIA_CLI_EXT Client Authorization FIA_ENR_EXT Enrollment of Mobile Device into Management FIA_TOK_EXT Client Tokens |
Protection of the TSF (FPT) | FPT_API_EXT Use of Supported Services and APIs FPT_LIB_EXT Use of Third-Party Libraries FPT_TST_EXT Functionality Testing FPT_TUD_EXT Trusted Update |
Security Audit (FAU) | FAU_ALT_EXT Server Alerts FAU_CRP_EXT Support for Compliance Reporting of Mobile Device Configuration FAU_NET_EXT Network Reachability Review |
Security Management (FMT) | FMT_POL_EXT Trusted Policy Update FMT_SAE_EXT Security Attribute Expiration |
Trusted Path/Channels (FTP) | FTP_ITC_EXT Trusted Channel |
FCO_CPC_EXT.1, Component Registration Channel Definition, defines requirements for the registration process for distributed TOEs.
There are no management activities foreseen.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: |
FPT_ITT.1 TSF Data Transfer FTP_TRP.1 Trusted Path |
FCS_HTTPS_EXT.1, HTTPS Protocol, defines requirements for the implementation of the HTTPS protocol.
There are no management activities foreseen.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: |
FCS_TLS_EXT.1 TLS Protocol [FCS_TLSC_EXT.1 TLS Client Protocol or FCS_TLSS_EXT.1 TLS Server Protocol |
FCS_IV_EXT.1, Initialization Vector Generation, defines requirements for generating IVs.
There are no management activities foreseen.
There are no auditable events foreseen.
FCS_STG_EXT.1, Cryptographic Key Storage, defines requirements for the security of persistent secrets and private keys.
FCS_STG_EXT.2, Encrypted Cryptographic Key Storage, defines requirements for preventing access to private keys and persistent secrets.
The following actions could be considered for the management functions in FMT.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FIA_CLI_EXT.1, Client Authorization, defines requirements for a unique certificate or token for each client device.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FIA_ENR_EXT.1, Enrollment of Mobile Device into Management, defines requirements for authenticating and limiting user actions.
The following actions could be considered for the management functions in FMT.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: |
FIA_UAU.4 Single-Use Authentication Mechanisms FMT_SMF.1 Specification of Management Functions |
FIA_TOK_EXT.1, Client Tokens, defines requirements for generating unique tokens.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_API_EXT.1, Use of Supported Services and APIs, defines requirements for API usage.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_LIB_EXT.1, Use of Third-Party Libraries, defines requirements for third-party libraries.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_TST_EXT.1, Functionality Testing, defines requirements for the integrity of self-testing.
There are no management activities foreseen.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: | FPT_TST.1 TSF Self-Testing |
FPT_TUD_EXT.1, Trusted Update, defines requirements for authorized administrators to manage software versions and updates.
The following actions could be considered for the management functions in FMT.
The following action should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FAU_ALT_EXT.1, Server Alerts, defines requirements for alerting the administrator to events.
The following actions could be considered for the management functions in FMT.
The following actions should be auditable if FAU_GEN security audit data generation is include in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FAU_CRP_EXT.1, Support for Compliance Reporting of Mobile Device Configuration, defines requirements for providing information to enrolled mobile devices through a secure channel.
The following actions could be considered for the management functions in FMT.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FTP_ITC.1 Inter-TSF Trusted Channel |
FAU_NET_EXT.1, Network Reachability Review, defines requirements for authorized administrators to read network connectivity status.
The following actions could be considered for the management functions in FMT.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FAU_ALT_EXT.2 Agent Alerts |
FMT_POL_EXT.1, Trusted Policy Update, defines requirements for using digitally signed policies and policy updates.
There are no management activities foreseen.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FMT_SAE_EXT.1, Security Attribute Expiration, defines requirements for the expiration time for enrollment authentication.
The following action could be considered for the management functions in FMT.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST.
Hierarchical to: | No other components. |
Dependencies to: |
FIA_ENR_EXT.1 Enrollment of Mobile Device into Management FIA_UAU.4 Single-Use Authentication Mechanisms |
FTP_ITC_EXT.1, Trusted Channel, defines requirements for providing logically distinct communication channels.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: |
FPT_ITC.1 Inter-TSF Trusted Channel FTP_TRP.1 Trusted Path |
This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.3 Dependencies between components.
This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP provides evidence that these controls are present and have been evaluated.
Table 9: Implicitly Satisfied RequirementsRequirement | Rationale for Satisfaction |
FIA_UID.1 - Timing of Identification |
FIA_UAU.1 has a dependency on FIA_UID.1 because authentication of an external entity requires that entity to first identify
itself so that its identity can be validated by the authentication process. This SFR has not been defined in this PP-Module because authentication of a user implicitly requires them to be identified as well. There are two cases in which a user must be authenticated by the TSF per the application note in FIA_UAU.1: enrollment of a user’s mobile device into management, and authentication of a user to the TOE’s management interface. FIA_ENR_EXT.1 requires authentication of the user using a method such as a directory server, which implicitly expects that the user must identify themselves as well as provide a credential associated with the claimed identity. For management, FMT_SMR.1(1) requires the TSF to maintain an administrator role but it does not specify whether authentication to this role is role-based or identity-based. Therefore, the PP is not concerned with the specific mechanism by which an administrator presents their identity to the TSF, only that there is a mechanism to validate and authorize whatever information they do present. |
FMT_MTD.1 - Management of TSF Data |
FAU_SEL.1 has a dependency on FMT_MTD.1 because the configuration settings that determine what events are audited is considered to be
TSF data. While FAU_SEL.1 determines the extent to which the TOE’s audit function is configured, it relies on FMT_MTD.1 to determine
the administrative roles that are permitted to manipulate this data. The PP allows FAU_SEL.1 to be implemented either by the TSF or by the TOE platform because the TOE may rely on the audit functionality provided by the OS it runs on. If this is configured entirely through the platform, the administrator does not necessarily need to be authenticated by the TOE to do this. Therefore, requiring FMT_MTD.1 does not make sense in this situation. If this is configured through the TOE, it can be implied from a review of FMT_SMR.1(1) that the ‘MD user’ role cannot perform this function as they lack the authority to manage the TSF. It is therefore understood that this function can be performed by the ‘administrator’ role or potentially by one or more roles specified by the ST author if the selection to specify additional roles is chosen. An additional SFR that explicitly identifies the roles permitted to manage this function is redundant in this context. |
FPT_STM.1 - Reliable Time Stamps | The PP’s iterations of FAU_GEN.1 as well as its cryptographic functionality have a dependency on FPT_STM.1 because audit data require accurate timestamps as well as some cryptographic operations, such as determining if a presented X.509 certificate is expired. The TOE is installed on a general-purpose computer or specialized network device that is assumed to have the ability to provide certain functions to the TOE as specified in A.MDM_SERVER_PLATFORM. This assumption explicitly lists ‘reliable timestamps’ as a function that the TSF is expected to have available to it. |
Factor | Same or Different | Guidance |
PP-Specified Functionality | Same | If the differences between Models affect only non-PP-specified functionality, then the Models are equivalent. |
Different | If PP-specified security functionality is affected by the differences between Models, then the Models are not equivalent and must be tested separately. It is necessary only to test the functionality affected by the software differences. If only differences are tested, then the differences must be enumerated, and for each difference the Vendor must provide an explanation of why each difference does or does not affect PP-specified functionality. If the Product Models are separately tested fully, then there is no need to document the differences. |
Factor | Same or Different | Guidance |
Product Models | Different | Versions of different Product Models are not equivalent unless the Models are equivalent as defined in subsection 3. |
PP-Specified Functionality | Same | If the differences affect only non-PP-specified functionality, then the Versions are equivalent. |
Different | If PP-specified security functionality is affected by the differences, then the Versions are not considered equivalent and must be tested separately. It is necessary only to test the functionality affected by the changes. If only the differences are tested, then for each difference the Vendor must provide an explanation of why the difference does or does not affect PP-specified functionality. If the Product Versions are separately tested fully, then there is no need to document the differences. |
Factor | Same, Different, or None | Guidance |
Platform Architectures | Different | Platforms that present different processor architectures and instruction sets to the MDM are not equivalent. |
PP-Specified Functionality | Same | For platforms with the same processor architecture, the platforms are equivalent with respect to the MDM if execution of all PP-specified security functionality follows the same code path on both platforms. |
Factor | Same, Different, or None | Guidance |
Platform Architectures | Different | Platforms that run on different processor architectures and instruction sets are not equivalent. |
Platform Vendors | Different | Platforms from different vendors are not equivalent. |
Platform Versions | Different | Platforms from the same vendor with different major version numbers are not equivalent. |
Platform Interfaces | Different | Platforms from the same vendor and major version are not equivalent if there are differences in device interfaces and OS APIs that are relevant to the way the platform provides PP-specified security functionality to the MDM. |
Platform Interfaces | Same | Platforms from the same vendor and major version are equivalent if there are no differences in device interfaces and OS APIs that are relevant to the way the platform provides PP-specified security functionality to the MDM, or if the Platform does not provide such functionality to the MDM. |
Factor | Same, Different, or None | Guidance |
Platform Type or Vendor | Different | Software-based execution environments that are substantially different or come from different vendors are not equivalent. For example, a java virtual machine is not the same as a container. A Docker container is not the same as a CoreOS container. |
Platform Versions | Different | Execution environments that are otherwise equivalent are not equivalent if they have different major version numbers. |
PP-Specified Security Functionality | Same | All other things being equal, execution environments are equivalent if there is no significant difference in the interfaces through which the environments provide PP-specified security functionality to MDMs. |
Requirement | Action |
FMT_SMF.1/SERVER_CONF_AGENT Function 32 | Include in ST and assign GPS. |
FMT_SMF.1/SERVER_CONF_AGENT Function 34 | Include in ST. Assign personal hotspot connections (if feature exists). |
FMT_SMF.1/SERVER_CONF_AGENT Function 47 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 49 | Include in ST and select "a. USB mass storage mode." |
FMT_SMF.1/SERVER_CONF_AGENT Function 51 | Include in ST. Select both options. |
Requirement | Action |
FMT_SMF.1/SERVER_CONF_AGENT Function 15 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 16 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 31 | Include in ST and select "no other method." |
FMT_SMF.1/SERVER_CONF_AGENT Function 32 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 33 | Include in ST. Assign at least USB. |
FMT_SMF.1/SERVER_CONF_AGENT Function 34 | Include in ST. Assign all protocols where the TSF acts as a server. |
FMT_SMF.1/SERVER_CONF_AGENT Function 36 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 37 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 40 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 42 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 47 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 52 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function 54 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function c.1 | Include in ST. |
FMT_SMF.1/SERVER_CONF_AGENT Function c.2 | Include in ST. |
FCS_CKM.1.1 | Select RSA with key size of 3072 or select ECC schemes. |
FCS_CKM.2.1 | Select "RSA schemes" or select "ECC schemes." |
FCS_COP.1.1/CONF_ALG | Select 256 bits |
FCS_COP.1.1/HASH_ALG | Select SHA-384 |
FCS_COP.1.1/SIGN_ALG | Select RSA with key size of 3072 or select ECC schemes. |
FIA_X509_EXT.2.2 | Select either "allow the administrator to choose…" or "not accept the certificate." |
FCS_TLSC_EXT.1.1 (from TLS Package) | If included in ST, select "TLS 1.2." |
FCS_TLSC_EXT.2.1 (from TLS Package) | If included in ST, select "secp384r1." |
Requirement | Action |
FMT_SMF.1/SERVER_CONF_AGENT Function 13 | Include in ST |
FMT_SMF.1/SERVER_CONF_AGENT Function 14 | Include in ST |
FMT_SMF.1/SERVER_CONF_AGENT Function 21 | Include in ST |
FMT_SMF.1/SERVER_CONF_AGENT Function 22 | Include in ST |
FMT_SMF.1/SERVER_CONF_AGENT Function 30 | Select "on a per-app basis," "on a per-group of application processes basis," or both |
FMT_SMF.1/SERVER_CONF_AGENT Function 31 | If included in ST, select "on a per-app basis," "on a per-group of application processes basis," or both |
FMT_SMF.1/SERVER_CONF_AGENT Function 48 | Include in ST |
FMT_SMF.1/SERVER_CONF_AGENT Function 52 | If included in ST, select "on a per-app basis," "on a per-group of application processes basis," or both |
FMT_SMF.1/SERVER_CONF_SERVER Function f | Include in the ST |
Acronym | Meaning |
---|---|
API | API Application Programming Interface |
Base-PP | Base Protection Profile |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
cPP | Collaborative Protection Profile |
CSP | Critical Security Parameter |
DEK | Data Encryption Key |
EP | Extended Package |
EST | Enrollment over Secure Transport |
FP | Functional Package |
KEK | Key Encryption Key |
MD | Mobile Device |
MDM | Mobile Device Management |
OE | Operational Environment |
OS | Operating System |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
REK | Root Encryption Key |
SAR | Security Assurance Requirement |
SFR | Security Functional Requirement |
ST | Security Target |
TOE | Target of Evaluation |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |