Version | Date | Comment |
---|---|---|
1.0 | 2013-10-21 | Initial Release |
1.1 | 2014-02-07 | Typographical changes and clarifications to front-matter |
2.0 | 2014-12-31 | Separation of MDM agent SFRsUpdated cryptography, protocol, X.509 requirements. Updated management functions to match MDFPPv2.0. Included SSH as a remote administration protocol. Removed IPsec as protocol to communicate to MDM agent. Added X509 enrollment objective requirement. Added Optional Mobile Application Store requirements. |
3.0 | 2016-11-21 | Updates to align with Technical Decisions Added requirements to support BYOD use case Removed IPsec and SSH requirements, which are now contained in EPs |
4.0 | 2018-09-24 | Updates to align with Technical Decisions Removed platform dependency Removed TLS SFRs and use the TLS Functional Package Allowed for a distributed TOE |
4.1 | 2024-11-15 | Updates to align with Technical Decisions Updates to align with CC:2022 |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
API Application Programming Interface | A specification of routines, data structures, object classes, and variables that allows an application to make use of services provided by another software component, such as a library. APIs are often provided for a set of libraries included with the platform. |
Administrator | The person who is responsible for management activities, including setting the policy that is applied by the enterprise on the mobile device. |
Critical Security Parameter | Security-related information whose disclosure or modification can compromise the security of a cryptographic module or authentication system. |
Data | Program or application or data files that are stored or transmitted by a server or MD. |
Data Encryption Key | A key used to encrypt data-at-rest. |
Developer Modes | States in which additional services are available to a user in order to provide enhanced system access for debugging of software. |
Enrolled State | The state in which a mobile device is managed by a policy from an MDM. |
Enrollment over Secure Transport | Cryptographic protocol that describes an X.509 certificate management protocol targeting public key infrastructure (PKI) clients that need to acquire client certificates and associated certificate authority (CA) certificates. |
Enterprise Applications | Applications that are provided and managed by the enterprise as opposed to a public application store. |
Enterprise Data | Any data residing in enterprise servers or temporarily stored on mobile devices to which the mobile device user is allowed access according to the security policy defined by the enterprise and implemented by the administrator. |
Key Encryption Key | A key that is used to encrypt other keys, such as DEKs or storage repositories that contain keys. |
Locked State | Mobile device state where the device is powered on but most functionality is unavailable for use without authentication. |
Mobile Device | A device which is composed of a hardware platform and its system software. The device typically provides wireless connectivity and may include software for functions like secure messaging, email, web, VPN connection, and VoIP (Voice over IP), for access to the protected enterprise network, enterprise data and applications, and for communicating to other MDs. |
Mobile Device Management | Products that allow enterprises to apply security policies to MDs. This system consists of two primary components: the MDM server and the MDM agent. |
Mobile Device User | The person who uses and is held responsible for an MD. |
Operating System | Software which runs at the highest privilege level and can directly control hardware resources. Modern mobile devices typically have at least two primary operating systems: one which runs on the cellular baseband processor and one which runs on the application processor. The platform of the application processor handles most user interaction and provides the execution environment for apps. The platform of the cellular baseband processor handles communications with the cellular network and may control other peripherals. The term OS, without context, may be assumed to refer to the platform of the application processor. |
Powered-Off State | Mobile device shutdown state. |
Protected Data | All non-TSF data on the mobile device, including user or enterprise data. Protected data is encrypted while the mobile device is in the powered-off state. This includes keys in software-based storage. May overlap with sensitive data. |
Root Encryption Key | A key tied to a particular device that is used to encrypt all other keys for that device. |
Sensitive Data | Data that is encrypted by the mobile device. May include all user or enterprise data or may be data for specific applications such as emails, messaging, documents, calendar items, or contacts. May be protected while the mobile device is in the locked state. Must include at minimum some keys in software-based key storage. |
Trust Anchor Database | A list of trusted root Certificate Authority certificates. |
Unenrolled State | Mobile device state when it is not managed by an MDM. |
Unlocked State | Mobile device state where it is powered on and its functionality is available for use. |
Requirement | Description | Distributed TOE SFR Allocation |
FAU_ALT_EXT.1 | Server Alerts | One |
FAU_CRP_EXT.1 | Support for Compliance Reporting of Mobile Device Configuration | One |
FAU_GEN.1/AUDITGEN | Audit Data Generation | All |
FAU_GEN.1/MAS_SERVER | Audit Data Generation | Feature Dependent |
FAU_NET_EXT.1 | Network Reachability Review | One |
FAU_SAR.1 | Audit Review | Feature Dependent |
FAU_SEL.1 | Security Audit Event Selection | One |
FAU_STG.1 | External Trail Storage | All |
FAU_STG.2 | Audit Event Storage | Feature Dependent |
FCO_CPC_EXT.1 | Communication Partner Control | All |
FCS_CKM.1 | Cryptographic Key Generation | Feature Dependent |
FCS_CKM.2 | Cryptographic Key Establishment | All |
FCS_CKM.6 | Cryptographic Key Destruction | All |
FCS_COP.1.1/CONF_ALG | Cryptographic Operation (Confidentiality Algorithms) | All |
FCS_COP.1.1/HASH_ALG | Cryptographic Operation (Hashing Algorithms) | All |
FCS_COP.1.1/KEY_HASH | Cryptographic Operation (Keyed-Hash Message Authentication) | All |
FCS_COP.1.1/SIGN_ALG | Cryptographic Operation (Signature Algorithms) | All |
FCS_HTTPS_EXT.1 | HTTPS Protocol | Feature Dependent |
FCS_IV_EXT.1 | Initialization Vector Generation | Feature Dependent |
FCS_RBG.1 | Random Bit Generation (RBG) | All |
FCS_RBG.2 | Random Bit Generation (External Seeding) | Feature Dependent |
FCS_RBG.3 | Random Bit Generation (Internal Seeding - Single Source) | Feature Dependent |
FCS_RBG.4 | Random Bit Generation (Internal Seeding - Multiple Sources) | Feature Dependent |
FCS_RBG.5 | Random Bit Generation (Combining Noise Sources) | Feature Dependent |
FCS_STG_EXT.1 | Cryptographic Key Storage | All |
FCS_STG_EXT.2 | Encrypted Cryptographic Key Storage | Feature Dependent |
FIA_CLI_EXT.1 | Client Authorization | One |
FIA_ENR_EXT.1 | Enrollment of Mobile Device into Management | One |
FIA_TOK_EXT.1 | Client Tokens | One |
FIA_UAU.1 | Timing of Authentication | One |
FIA_UAU.4 | Single-Use Authentication Mechanisms | One |
FIA_X509_EXT.1/CERTVAL_MAN | X.509 Certification Validation | Feature Dependent |
FIA_X509_EXT.1/CERTVAL_SEL | X.509 Certification Validation | Feature Dependent |
FIA_X509_EXT.2 | X.509 Certificate Authentication | Feature Dependent |
FIA_X509_EXT.3 | X.509 Enrollment | Feature Dependent |
FIA_X509_EXT.4 | Alternate X.509 Enrollment | Feature Dependent |
FMT_MOF.1/FUNCBE | Management of functions behaviour | Feature Dependent |
FMT_MOF.1/MANAGEMENT_ENROLL | Management of functions behaviour (Enrollment) | Feature Dependent |
FMT_MOF.1/MANAGEMENT_MAS | Management of Functions in (MAS Server Downloads) | Feature Dependent |
FMT_POL_EXT.1 | Trusted Policy Update | One |
FMT_SAE_EXT.1 | Security Attribute Expiration | One |
FMT_SMF.1/MAS | Specification of Management Functions (MAS Server) | Feature Dependent |
FMT_SMF.1/SERVER_CONF_AGENT | Specification of Management Functions (Server configuration of Agent) | One |
FMT_SMF.1/SERVER_CONF_SERVER | Specification of Management Functions (Server configuration of Server) | Feature Dependent |
FMT_SMR.1/SECMAN_ROLES | Security Management Roles | One |
FMT_SMR.1/SECMAN_ROLES_MAS | Security Management Roles | Feature Dependent |
FPT_API_EXT.1 | Use of Supported Services and APIs | All |
FPT_FLS.1 | Failure with Preservation of Secure State | All |
FPT_ITT.1/INTER_XFER | Internal TOE TSF Data Transfer | Feature Dependent |
FPT_ITT.1/INTER_XFER_AGENT | Internal TOE TSF Data Transfer (MDM Agent) | Feature Dependent |
FPT_LIB_EXT.1 | Use of Third-Party Libraries | All |
FPT_TST.1 | TSF Self-Testing | All |
FPT_TST_EXT.1 | Functionality Testing | All (except for agent components) |
FPT_TUD_EXT.1 | Trusted Update | All |
FTA_TAB.1 | Default TOE Access Banners | One |
FTP_ITC.1/INTER_TSF_XFER_AGENT | Inter-TSF Trusted Channel (MDM Agent) | One |
FTP_ITC.1/INTER_XFER_IT | Inter-TSF Trusted Channel (Authorized IT Entities) | One |
FTP_ITC_EXT.1 | Trusted Channel | One |
FTP_TRP.1/TRUSTPATH_ENROLL | Trusted Path for Enrollment | Feature Dependent |
FTP_TRP.1/TRUSTPATH_JOIN | Trusted Path for Joining | Feature Dependent |
FTP_TRP.1/TRUSTPATH_REM_ADMIN | Trusted Path for Remote Administration | Feature Dependent |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_SAR.1 | ||
No events specified | N/A | |
FAU_SEL.1 | ||
All modifications to the audit configuration that occur while the audit collection functions are operating. | No additional information | |
FTA_TAB.1 | ||
Change in banner setting | No additional information |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_CRP_EXT.1 | ||
No events specified | N/A | |
FCO_CPC_EXT.1 | ||
Enabling or disabling communications between a pair of components. | Identities of the endpoint's pairs enabled or disabled. | |
FIA_UAU.4 | ||
Attempt to reuse enrollment data | Enrollment data | |
FIA_X509_EXT.3 | ||
Generation of Certificate Request Message | Content of Certificate Request Message | |
Success or failure of verification | Issuer and Subject name of added certificate or reason for failure | |
FIA_X509_EXT.4 | ||
Update of EST Trust Anchor Database | Subject name of added Root CA | |
Generation of Certificate Enrollment Request |
| |
Success or failure of enrollment | Issuer and Subject name of added certificate or reason for failure | |
FMT_SAE_EXT.1 | ||
Enrollment attempted after expiration of authentication data | Identity of user | |
FTP_TRP.1/TRUSTPATH_JOIN | ||
Initiation and termination of the trusted channel | Trusted channel protocol |
This PP does not define any Implementation-dependent requirements.
As indicated in the introduction to this PP, the baseline requirements (those that must be performed by the TOE or its underlying platform) are contained in the body of this PP. There are additional requirements based on selections in the body of the PP: if certain selections are made, then additional requirements below must be included.
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_GEN.1/MAS_SERVER | ||
No events specified | N/A | |
FAU_STG.2 | ||
No events specified | N/A | |
FCS_HTTPS_EXT.1 | ||
Failure of the certificate validity check |
| |
FCS_IV_EXT.1 | ||
No events specified | N/A | |
FCS_RBG.2 | ||
No events specified | N/A | |
FCS_RBG.3 | ||
No events specified | N/A | |
FCS_RBG.4 | ||
No events specified | N/A | |
FCS_RBG.5 | ||
No events specified | N/A | |
FCS_STG_EXT.2 | ||
No events specified | N/A | |
FIA_TOK_EXT.1 | ||
No events specified | N/A | |
FIA_X509_EXT.1/CERTVAL_SEL | ||
Failure to validate X.509 certificate | Reason for failure | |
FMT_MOF.1/MANAGEMENT_MAS | ||
No events specified | N/A | |
FMT_SMF.1/MAS | ||
No events specified | N/A | |
FMT_SMR.1/SECMAN_ROLES_MAS | ||
No events specified | N/A | |
FPT_ITT.1/INTER_XFER | ||
Initiation and termination of the trusted channel |
| |
FPT_ITT.1/INTER_XFER_AGENT | ||
Initiation and termination of the trusted channel |
| |
FTP_ITC.1/INTER_TSF_XFER_AGENT | ||
Initiation and termination of the trusted channel |
|
Cipher Mode | Reference | IV Requirement |
Electronic Codebook (ECB) | SP800-38A | No IV |
Counter (CTR) | SP800-38A | "Initial Counter" shall be non-repeating. No counter value shall be repeated across multiple messages with the same secret key. |
Cipher Block Chaining (CBC) | SP800-38A | IVs shall be unpredictable. Repeating IVs leak information about whether the first one or more blocks are shared between two messages, so IVs should be non-repeating in such situations. |
Output Feedback (OFB) | SP800-38A | IVs shall be non-repeating and shall not be generated by invoking the cipher on another IV. |
Cipher Feedback (CFB) | SP800-38A | IVs should be non-repeating as repeating IVs leak information about the first plaintext block and about common shared prefixes in messages. |
XOR Encrypt XOR (XEX) Tweakable Block Cipher with Ciphertext Stealing (XTS) | SP800-38E | No IV. Tweak values shall be non-negative integers, assigned consecutively, and starting at an arbitrary non-negative integer. |
Cipher-based Message Authentication Code (CMAC) | SP800-38B | No IV |
Key Wrap and Key Wrap with Padding | SP800-38F | No IV |
Counter with CBC-Message Authentication Code (CCM) | SP800-38C | No IV. Nonces shall be non-repeating. |
Galois Counter Mode (GCM) | SP800-38D | IV shall be non-repeating. The number of invocations of GCM shall not exceed 2^32 for a given secret key unless an implementation only uses 96-bit IVs (default length). |
Functional Class | Functional Components |
---|---|
Class: Communication (FCO) | FCO_CPC_EXT Component Registration Channel Definition |
Class: Cryptographic Support (FCS) | FCS_HTTPS_EXT HTTPS Protocol FCS_IV_EXT Initialization Vector Generation FCS_STG_EXT Encrypted Cryptographic Key Storage |
Class: Identification and Authentication (FIA) | FIA_CLI_EXT Client Authorization FIA_ENR_EXT Enrollment of Mobile Device into Management FIA_TOK_EXT Client Tokens |
Class: Protection of the TSF (FPT) | FPT_API_EXT Use of Supported Services and APIs FPT_LIB_EXT Use of Third-Party Libraries FPT_TST_EXT Functionality Testing FPT_TUD_EXT Trusted Update |
Class: Security Audit (FAU) | FAU_ALT_EXT Server Alerts FAU_CRP_EXT Support for Compliance Reporting of Mobile Device Configuration FAU_NET_EXT Network Reachability Review |
Class: Security Management (FMT) | FMT_POL_EXT Trusted Policy Update FMT_SAE_EXT Security Attribute Expiration |
Class: Trusted Path/Channels (FTP) | FTP_ITC_EXT Trusted Channel |
FCO_CPC_EXT.1, Component Registration Channel Definition, defines requirements for the registration process for distributed TOEs.
There are no management activities foreseen.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST. Enabling or disabling communications between a pair of components.Identities of the endpoint's pairs enabled or disabled.
Hierarchical to: | No other components. |
Dependencies to: | FPT_ITT.1 TSF Data TransferFTP_TRP.1 Trusted Path |
FCS_HTTPS_EXT.1, HTTPS Protocol, defines requirements for the implementation of the HTTPS protocol.
There are no management activities foreseen.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST. Failure of the certificate validity check.Issuer Name and Subject Name of certificate.User's authorization decisionNo additional information
Hierarchical to: | No other components. |
Dependencies to: | FCS_TLS_EXT.1 TLS Protocol[FCS_TLSC_EXT.1 TLS Client Protocol or FCS_TLSS_EXT.1 TLS Server Protocol |
FCS_IV_EXT.1, Initialization Vector Generation, defines requirements for generating IVs.
There are no management activities foreseen.
There are no auditable events foreseen.
FCS_STG_EXT.1, Cryptographic Key Storage, defines requirements for the security of persistent secrets and private keys.
FCS_STG_EXT.2, Encrypted Cryptographic Key Storage, defines requirements for preventing access to private keys and persistent secrets.
The following actions could be considered for the management functions in FMT. Import keys or secrets into the secure key storage (MDF Function 9)
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FIA_CLI_EXT.1, Client Authorization, defines requirements for a unique certificate or token for each client device.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FIA_ENR_EXT.1, Enrollment of Mobile Device into Management, defines requirements for authenticating and limiting user actions.
The following actions could be considered for the management functions in FMT. Configure the specific device models.Configure the specific time period.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST. Failure of MD user authentication.Presented username.
Hierarchical to: | No other components. |
Dependencies to: | FIA_UAU.4 Single-Use Authentication MechanismsFMT_SMF.1 Specification of Management Functions |
FIA_TOK_EXT.1, Client Tokens, defines requirements for generating unique tokens.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_API_EXT.1, Use of Supported Services and APIs, defines requirements for API usage.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_LIB_EXT.1, Use of Third-Party Libraries, defines requirements for third-party libraries.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_TST_EXT.1, Functionality Testing, defines requirements for the integrity of self-testing.
There are no management activities foreseen.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST. Initiation of self-test.Failure of self-test.Detected integrity violation
Hierarchical to: | No other components. |
Dependencies to: | FPT_TST.1 TSF Self-Testing |
FPT_TUD_EXT.1, Trusted Update, defines requirements for authorized administrators to manage software versions and updates.
The following actions could be considered for the management functions in FMT. Query the current version of the MD firmware or software.Update system software (MDF Function 15).
The following action should be auditable if FAU_GEN security audit data generation is included in the PP or ST. Success or failure of signature verification
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FAU_ALT_EXT.1, Server Alerts, defines requirements for alerting the administrator to events.
The following actions could be considered for the management functions in FMT. Install policies.
The following actions should be auditable if FAU_GEN security audit data generation is include in the PP or ST. Type of alert.Identity of Mobile Device that sent alert.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FAU_CRP_EXT.1, Support for Compliance Reporting of Mobile Device Configuration, defines requirements for providing information to enrolled mobile devices through a secure channel.
The following actions could be considered for the management functions in FMT. Query the current version of the MD firmware or software.Query the current version of the hardware model of the device.Query the current version of installed mobile applications.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FTP_ITC.1 Inter-TSF Trusted Channel |
FAU_NET_EXT.1, Network Reachability Review, defines requirements for authorized administrators to read network connectivity status.
The following actions could be considered for the management functions in FMT. Query connectivity status.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FAU_ALT_EXT.2 Agent Alerts |
FMT_POL_EXT.1, Trusted Policy Update, defines requirements for using digitally signed policies and policy updates.
There are no management activities foreseen.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST. Attempt to reuse enrollment data.Enrollment data.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FMT_SAE_EXT.1, Security Attribute Expiration, defines requirements for the expiration time for enrollment authentication.
The following action could be considered for the management functions in FMT. Configure the length of time the enrollment authenticator is valid.
The following actions should be auditable if FAU_GEN security audit data generation is included in the PP or ST. Enrollment attempted after expiration of authentication data.Identity of user.
Hierarchical to: | No other components. |
Dependencies to: | FIA_ENR_EXT.1 Enrollment of Mobile Device into ManagementFIA_UAU.4 Single-Use Authentication Mechanisms |
FTP_ITC_EXT.1, Trusted Channel, defines requirements for providing logically distinct communication channels.
There are no management activities foreseen.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FPT_ITC.1 Inter-TSF Trusted ChannelFTP_TRP.1 Trusted Path |
Acronym | Meaning |
---|---|
Base-PP | Base Protection Profile |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
cPP | Collaborative Protection Profile |
EP | Extended Package |
FP | Functional Package |
OE | Operational Environment |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
SAR | Security Assurance Requirement |
SFR | Security Functional Requirement |
ST | Security Target |
TOE | Target of Evaluation |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |