
| Version | Date | Comment |
|---|---|---|
| 4.0 | 2015-08-14 | Release - significant revision |
| 4.1 | 2016-03-09 | Minor updates - cryptographic modes |
| 4.2 | 2018-05-22 | Multiple Technical Decisions applied |
| 4.2.1 | 2019-04-22 | Formatting changes as a result of PP evaluation |
| 4.3 | 2022-09-27 | |
| 5.0 | 2024-09-06 |
|
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Direct Rationale | A type of Protection Profile, PP-Module, or Security Target in which the security problem definition (SPD) elements are mapped directly to the SFRs and possibly to the security objectives for the operational environment. There are no security objectives for the TOE. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Address Space Layout Randomization (ASLR) | An anti-exploitation feature which loads memory mappings into unpredictable locations. ASLR makes it more difficult for an attacker to redirect control to code that they have introduced into the address space of a process. |
Administrator | An administrator is responsible for management activities, including setting policies that are applied by the enterprise on the operating system. This administrator could be acting remotely through a management server, from which the system receives configuration policies. An administrator can enforce settings on the system which cannot be overridden by non-administrator users. |
Application (app) | Software that runs on a platform and performs tasks on behalf of the user or owner of the platform, as well as its supporting documentation. |
Application Programming Interface (API) | A specification of routines, data structures, object classes, and variables that allows an application to make use of services provided by another software component, such as a library. APIs are often provided for a set of libraries included with the platform. |
Credential | Data that establishes the identity of a user, e.g. a cryptographic key or password. |
Critical Security Parameters (CSP) | Information that is either user or system defined and is used to operate a cryptographic module in processing encryption functions including cryptographic keys and authentication data, such as passwords, the disclosure or modification of which can compromise the security of a cryptographic module or the security of the information protected by the module. |
Data At Rest Protection | Countermeasures that prevent attackers, even those with physical access, from extracting data from non-volatile storage. Common techniques include data encryption and wiping. |
Data Encryption Key (DEK) | A key used to encrypt data-at-rest. |
Data Execution Prevention (DEP) | An anti-exploitation feature of modern operating systems executing on modern computer hardware, which enforces a non-execute permission on pages of memory. DEP prevents pages of memory from containing both data and instructions, which makes it more difficult for an attacker to introduce and execute code. |
Developer | An entity that writes OS software. For the purposes of this document, vendors and developers are the same. |
General Purpose Operating System | A class of OSes designed to support a wide-variety of workloads consisting of many concurrent applications or services. Typical characteristics for OSes in this class include support for third-party applications, support for multiple users, and security separation between users and their respective resources. General Purpose Operating Systems also lack the real-time constraint that defines Real Time Operating Systems which are typically used in routers, switches, and embedded devices. |
Host-based Firewall | A software-based firewall implementation running on the OS for filtering inbound and outbound network traffic to and from processes running on the OS. |
Hybrid Authentication | A hybrid authentication factor is one where a user has to submit a combination of authentication factors and both must pass. If either factor fails, the entire attempt fails. Examples can include a combination of a cryptographic token and a PIN or password, or a biometric factor and a PIN or password. |
Key Encryption Key (KEK) | A key used to encrypt other keys, such as DEKs or storage that contains keys. |
Locked State | Powered on but most functionality is unavailable for use. User authentication is required to access functionality. |
MDM Agent | The MDM Agent is installed on a Mobile Device as an application or is part of the Mobile Device’s OS. The MDM Agent establishes a secure connection back to the MDM Server controlled by the administrator. |
Mobile Device Management (MDM) | Mobile device management (MDM) products allow enterprises to apply security policies to mobile devices. This system consists of two primary components: the MDM Server and the MDM Agent. |
Operating System (OS) | Software that manages physical and logical resources and provides services for applications. The terms TOE and OS are interchangeable in this document. |
Personal Identification Number (PIN) | An authentication factor that is comprised of a set of numeric or alphabetic characters that may be used in addition to a cryptographic token to provide a hybrid authentication factor. At this time it is not considered as a stand-alone authentication mechanism. A PIN is distinct from a password in that the allowed character set and required length of a PIN is typically smaller than that of a password as it is designed to be input quickly. |
Personally Identifiable Information (PII) | Any information about an individual maintained by an agency, including, but not limited to, education, financial transactions, medical history, and criminal or employment history and information which can be used to distinguish or trace an individual's identity, such as their name, social security number, date and place of birth, mother's maiden name, biometric records, etc., including any other personal information which is linked or linkable to an individual.[OMB] |
Root Encryption Key (REK) | A key tied to the device used to encrypt other keys. |
Sensitive Data | Sensitive data may include all user or enterprise data or may be specific application data such as PII, emails, messaging, documents, calendar items, and contacts. Sensitive data must minimally include credentials and keys. Sensitive data shall be identified in the OS's TSS by the ST author. |
User | A user is subject to configuration policies applied to the operating system by administrators. On some systems under certain configurations, a normal user can temporarily elevate privileges to that of an administrator. At that time, such a user should be considered an administrator. |
The OS provides a platform for end user devices such as desktops, laptops, convertibles, and tablets. These devices may optionally be bound to a directory server or management server.
As this Protection Profile does not address threats against data at rest, enterprises deploying operating systems in mobile scenarios should ensure that these systems include data at rest protection spelled out in other Protection Profiles. Specifically, this includes the Protection Profiles for Full Drive Encryption - Encryption Engine, Full Drive Encryption - Authorization Acquisition, and Software File Encryption. The Protection Profile for Mobile Device Fundamentals includes requirements for data at rest protection and is appropriate for many mobile devices.
The OS provides a platform for providing cloud services running on physical or virtual hardware. An OS is typically part of offerings identified as Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS).
This use case typically involves the use of virtualization technology which should be evaluated against the Protection Profile for Server Virtualization.
If this feature is implemented by the TOE, the following requirements must be claimed in the ST:
If this feature is implemented by the TOE, the following requirements must be claimed in the ST:
If this feature is implemented by the TOE, the following requirements must be claimed in the ST:
If this feature is implemented by the TOE, the following requirements must be claimed in the ST:
If this feature is implemented by the TOE, the following requirements must be claimed in the ST:
| Assumption or OSP | Security Objectives | Rationale |
| A.PLATFORM | OE.PLATFORM | The operational environment objective OE.PLATFORM is realized through A.PLATFORM. |
| A.PROPER_USER | OE.PROPER_USER | The operational environment objective OE.PROPER_USER is realized through A.PROPER_USER. |
| A.PROPER_ADMIN | OE.PROPER_ADMIN | The operational environment objective OE.PROPER_ADMIN is realized through A.PROPER_ADMIN. |
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FAU_GEN.1 | ||
| No events specified | N/A | |
| FCS_CKM.1/AKG | ||
| No events specified | N/A | |
| FCS_CKM.1/SKG | ||
| No events specified | N/A | |
| FCS_CKM.6 | ||
| No events specified | N/A | |
| FCS_COP.1/AEAD | ||
| No events specified | N/A | |
| FCS_COP.1/Hash | ||
| No events specified | N/A | |
| FCS_COP.1/KeyedHash | ||
| No events specified | N/A | |
| FCS_COP.1/SKC | ||
| No events specified | N/A | |
| FCS_COP.1/SigGen | ||
| No events specified | N/A | |
| FCS_COP.1/SigVer | ||
| No events specified | N/A | |
| FCS_RBG.1 | ||
| No events specified | N/A | |
| FCS_STO_EXT.1 | ||
| No events specified | N/A | |
| FDP_ACF_EXT.1 | ||
| Successful and unsuccessful attempts to access data | No additional information | |
| FIA_AFL.1 | ||
| No events specified | N/A | |
| FIA_UAU.5 | ||
| No events specified | N/A | |
| FMT_MOF_EXT.1 | ||
| Successful or unsuccessful management of the behavior of any TOE functions | No additional information | |
| Change in permissions to a set of users that have the ability to manage a given function | No additional information | |
| FMT_SMF_EXT.1 | ||
| No events specified | N/A | |
| FPT_ACF_EXT.1 | ||
| Unauthorized attempts to perform operations against sensitive data | No additional information | |
| FPT_ASLR_EXT.1 | ||
| No events specified | N/A | |
| FPT_FLS.1 | ||
| No events specified | N/A | |
| FPT_SBOP_EXT.1 | ||
| No events specified | N/A | |
| FPT_STM.1 | ||
| No events specified | N/A | |
| FPT_TST.1 | ||
| No events specified | N/A | |
| FPT_TST_EXT.1 | ||
| Failure of the integrity checking mechanism | No additional information | |
| FPT_TUD_EXT.1 | ||
| Failure of the integrity checking mechanism | No additional information | |
| Successful completion of updates | No additional information | |
| FPT_TUD_EXT.2 | ||
| Failure of the integrity checking mechanism | No additional information | |
| Successful completion of updates | No additional information | |
| FTP_ITC_EXT.1 | ||
| Initiation of trusted channel | No additional information | |
| Termination of trusted channel | No additional information | |
| Failure of trusted channel functions | No additional information | |
| FTP_TRP.1 | ||
| No events specified | N/A |
| Identifier | Cryptographic Key Generation Algorithm | Cryptographic Algorithm Parameters | List of Standards |
|---|---|---|---|
| RSA | RSA | Modulus of size [selection: 3072, 4096, 6144, 8192] bits | NIST FIPS PUB 186-5 (Section A.1.1) |
| ECC-ERB | ECC-ERB - Extra Random Bits | Elliptic Curve [selection: P-256, P-384, P-521] | FIPS PUB 186-5 (Section A.2.1) NIST SP 800-186 (Section 3) [NIST Curves] |
| ECC-RS | ECC-RS - Rejection Sampling | Elliptic Curve [selection: P-256, P-384, P-521] | FIPS PUB 186-5 (Section A.2.2) NIST SP 800-186 (Section 3) [NIST Curves] |
| FFC-ERB | FFC-ERB - Extra Random Bits | Static domain parameters approved for [selection:
| NIST SP 800-56A Revision 3 (Section 5.6.1.1.3) [key pair generation] [selection: RFC 3526 [IKE groups], RFC 7919 [TLS groups]] |
| FFC-RS | FFC-RS - Rejection Sampling | Static domain parameters approved for [selection:
| NIST SP 800-56A Revision 3 (Section 5.6.1.1.3) [key pair generation] [selection: RFC 3526 [IKE groups], RFC 7919 [TLS groups]] |
| ML-KEM | ML-KEM KeyGen | Parameter set = ML-KEM-1024 | NIST FIPS 203 (Section 7.1) |
| ML-DSA | ML-DSA KeyGen | Parameter set = ML-DSA-87 | NIST FIPS 204 (Section 5.1) |
For RSA the choice of the modulus implies the resulting key sizes of the public and private keys generated using the specified standard methods. RSA key generation with modulus size 2048 bits is no longer permitted by CNSA.
For Finite Field Cryptography (FFC) DSA, ST authors should consult schemes for guidelines on use. FIPS PUB 186-5 does not approve DSA for digital signature generation but allows DSA for digital signature verification for legacy purposes. “FFC-ERB” or “FFC–RS” may be claimed only for generating private and public keys when “DH” is claimed in FCS_CKM_EXT.7.
For ECC selections, “P-256” may only be selected if the PP-Module for Bluetooth is included in the ST and P-256 may only be used specifically for Bluetooth functions.
When generating ECC keys pairs for key agreement and if “ECDH” is claimed in FCS_CKM_EXT.7, then “ECC–ERB” or “ECC–RS” must be claimed. The sizes of the private key, which is a scalar, and the public key, which is a point on the elliptic curve, are determined by the choice of the curve.
When generating ECC key pairs for digital signature generation and if “ECDSA” is claimed in FCS_COP.1/SigGen, then “ECC–ERB” or “ECC–RS” must be claimed. The sizes of the private key, which is a scalar, and the public key, which is a point on the elliptic curve, are determined by the choice of the curve.
If the TSF acts only as a receiver in the RSA key establishment scheme, the ST does not need to implement RSA key generation.
| Identifier | Cryptographic Key Generation Algorithm | Cryptographic Key Sizes | List of standards |
|---|---|---|---|
| RSK | Direct Generation from a Random Bit Generator as specified in FCS_RBG.1 | [selection: 256, 384, 512] bits | NIST SP 800-133 Revision 2 (Section 6.1)[Direct generation of symmetric keys] |
For the purposes of this requirement, keying material refers to authentication data, passwords, secret/private symmetric keys, private asymmetric keys, data used to derive keys, values derived from passwords, etc. “Plaintext keying material” may refer to a KEK that is used to encrypt other keying material. Destruction of encrypted keying material may be accomplished by destroying the KEK used to encrypt it. If different mechanisms are used for destroying different keying material, all relevant claims should be selected and the TSS should identify which keying material is destroyed by which mechanism.
Key storage areas in non-volatile storage can be overwritten with any value that renders the keys unrecoverable. The value used can be all zeroes, all ones, or any other pattern or combination of values significantly different than the value of the key itself. When ‘a value that does not contain any CSP’ is chosen, it means that the TOE uses some other specified data not drawn from a source that may contain keying material or reveal information about it or any other TSF-protected data. In other words, the data used for overwriting is carefully selected and not taken from a general ‘pool’ that might contain current or residual data that itself requires confidentiality protection. If multiple copies exist, all copies must be destroyed.
Since this is a software-only TOE, the hardware controllers that manage non-volatile storage media are necessarily outside the TOE boundary. Thus, the TOE developer is likely to have little control over—or insight into—the functioning of these storage devices. The TOE must make a “best-effort” to destroy disused cryptographic keys by invoking the appropriate hardware interfaces—recognizing that the specific actions taken by the hardware are out of the TOE’s control. But in cases where the TOE has insight into the non-volatile storage technologies used by the hardware, or where the TOE can specify a preference or method for destroying keys, the destruction should be executed by a single, direct overwrite consisting of pseudorandom data or a new key, by a repeating pattern of any static value, or by a block erase.
| Identifier | Cryptographic algorithm | Cryptographic key sizes | List of standards |
|---|---|---|---|
| AES-CCM | AES in CCM mode with unpredictable, non-repeating nonce, minimum size of 64 bits | [selection: 128 bits, 256 bits] | [selection: ISO/IEC 18033-3:2010 (Subclause 5.2), FIPS PUB 197] [AES] [selection: ISO/IEC 19772:2020 (Clause 7), NIST SP 800-38C] [CCM] |
| AES-GCM | AES in GCM mode with non-repeating IVs using [selection: deterministic, RBG-based], IV construction; the tag must be of length [selection: 96, 104, 112, 120, 128] bits. | 256 bits | [selection: ISO/IEC 18033-3:2010 (Subclause 5.2), FIPS PUB 197] [AES] [selection: ISO/IEC 19772:2020 (Clause 10), NIST SP 800-38D] [GCM] |
In accordance with CNSA 1.0 and 2.0:
| Keyed Hash Algorithm | Cryptographic Key Sizes | List of Standards |
|---|---|---|
| HMAC-SHA-256 | 256 bits | [selection: ISO/IEC 9797-2:2021 (Section 7 “MAC Algorithm 2”), FIPS PUB 198-1] |
| HMAC-SHA-384 | [selection: 384 (ISO, FIPS), 256 (FIPS)] bits | [selection: ISO/IEC 9797-2:2021 (Section 7 “MAC Algorithm 2”), FIPS PUB 198-1] |
| HMAC-SHA-512 | [selection: 512 (ISO, FIPS), 384 (FIPS), 256 (FIPS)] bits | [selection: ISO/IEC 9797-2:2021 (Section 7 “MAC Algorithm 2”), FIPS PUB 198-1] |
The intent of this requirement is to specify the keyed-hash message authentication function used for key establishment purposes for the various cryptographic protocols used by the OS (e.g., trusted channel). The hash selection must support the message digest size selection. The hash selection should be consistent with the overall strength of the algorithm used for FCS_COP.1/Hash.
In accordance with CNSA 1.0 and 2.0, HMAC-SHA-256 may be used only as a PRF or MAC step in a key derivation function.
| Identifier | Cryptographic Algorithm | Cryptographic Key Sizes | List of Standards |
|---|---|---|---|
| RSA-PKCS | RSASSA-PKCS1-v1_5 | Modulus of size [selection: 3072, 4096, 6144, 8192] bits, hash [selection: SHA-384, SHA-512] | RFC 8017 (Section 8.2) [PKCS #1 v2.2] FIPS PUB 186-5 (Section 5.4) [RSASSA-PKCS1-v1_5] |
| RSA-PSS | RSASSA-PSS | Modulus of size [selection: 3072, 4096, 6144, 8192] bits, hash [selection: SHA-384, SHA-512], Salt Length (sLen) such that [assignment: 0 ≤ sLen ≤ hLen (Hash Output Length)] and Mask Generation Function = MGF1 | RFC 8017 (Section 8.1) [PKCS#1 v2.2] FIPS PUB 186-5 (Section 5.4) [RSASSA-PSS] |
| ECDSA | ECDSA | Elliptic Curve [selection: P-384, P-521], per-message secret number generation [selection: extra random bits, rejection sampling, deterministic] and hash function using [selection: SHA-384, SHA-512] | [selection: ISO/IEC 14888-3:2018 (Subclause 6.6), FIPS PUB 186-5 (Sections 6.3.1, 6.4.1][ECDSA] NIST SP-800 186 (Section 4) [NIST Curves] |
| ML-DSA | ML-DSA Signature Generation | Parameter set = ML-DSA-87 | NIST FIPS 204 (Section 5.2) |
| Identifier | Cryptographic Algorithm | Cryptographic Key Sizes | List of Standards |
|---|---|---|---|
| RSA-PKCS | RSASSA-PKCS1-v1_5 | Modulus of size [selection: 2048 (for secure boot only), 3072, 4096, 6144, 8192] bits and hash [selection: SHA-384, SHA-512] | RFC 8017 (Section 8.2) [PKCS #1 v2.2] FIPS PUB 186-5 (Section 5.4) [RSASSA-PKCS1-v1_5] |
| RSA-PSS | RSASSA-PSS | Modulus of size [selection: 2048 (for secure boot only), 3072, 4096, 6144, 8192] bits and hash [selection: SHA-384, SHA-512] | RFC 8017 (Section 8.1) [PKCS#1 v2.2] FIPS PUB 186-5 (Section 5.4) [RSASSA-PSS] |
| ECDSA | ECDSA | Elliptic Curve [selection: P-384, P-521] using hash [selection: SHA-384, SHA-512] | [selection: ISO/IEC 14888-3:2018 (Subclause 6.6), FIPS PUB 186-5 (Section 6.4.2)][ECDSA] NIST SP-800 186 (Section 4) [NIST Curves] |
| LMS | LMS | Private key size = [selection: ] Winternitz parameter = [selection: 1, 2, 4, 8] Tree height = [selection: 5, 10, 15, 20, 25] | RFC 8554 [LMS] NIST SP 800-208 [parameters] |
| XMSS | XMSS | Private key size = [selection: ] Tree height = [selection: 10, 16, 20] | RFC 8391 [XMSS] NIST SP 800-208 [parameters] |
| ML-DSA | ML-DSA Signature Verification | Parameter set = ML-DSA-87 | NIST FIPS 204 (Section 5.3) |
| Identifier | Cryptographic Algorithm | Cryptographic Key Sizes | List of Standards |
|---|---|---|---|
| AES-CBC | AES in CBC mode with non-repeating and unpredictable IVs | 256 bits | [selection: ISO/IEC 18033-3:2010 (Subclause 5.2), FIPS PUB 197] [AES][selection: ISO/IEC 10116:2017 (Clause 7), NIST SP 800-38A] [CBC] |
| XTS-AES | AES in XTS mode with unique tweak values that are consecutive non-negative integers starting at an arbitrary non-negative integer | 512 bits | [selection: ISO/IEC 18033-3:2010 (Subclause 5.2), FIPS PUB 197] [AES][selection: IEEE Std. 1619-2018, NIST SP 800-38E] [XTS] |
| AES-CTR | AES in Counter Mode with a non-repeating initial counter and with no repeated use of counter values across multiple messages with the same secret key | 256 bits | [selection: ISO/IEC 18033-3:2010 (Subclause 5.2), FIPS PUB 197] [AES][selection: ISO/IEC 10116:2017 (Clause 10), NIST SP 800-38A] [CBC] |
For the selection in this requirement, the ST author selects "TSF noise source" if a single noise source is used as input to the DRBG. The ST author selects "multiple TSF noise sources" if a seed is formed from a combination of two or more noise sources within the TOE boundary. If the TSF implements two or more separate DRBGs that are seeded in separate manners, this SFR should be iterated for each DRBG. If multiple distinct noise sources exist such that each DRBG only uses one of them, then each iteration would select "TSF noise source"; "multiple TSF noise sources" is only selected if a single DRBG uses multiple noise sources for its seed. The ST author selects "TSF interface for seeding" if noise source data is generated outside the TOE boundary.
If "TSF noise source" is selected, FCS_RBG.3 must be claimed.
If "multiple TSF noise sources" is selected, FCS_RBG.4 and FCS_RBG.5 must be claimed.
If "TSF interface for seeding" is selected, FCS_RBG.2 must be claimed.
The SSH public key-based authentication selection can only be included, and must be included, if FTP_ITC_EXT.1.1 selects SSH.
If "authentication based on X.509 certificates" is claimed, the TOE must claim conformance to Functional Package for X.509, version 1.0.
The TSF may optionally implement a Biometric Authentication Factor. A hybrid authentication factor is where a user has to submit a combination of primary authentication factor (e.g. username and password) and biometric sample where both have to pass and if either fails the user is not made aware of which factor failed.
If biometric in accordance with the Biometric Enrollment and Verification, version 1.1 or hybrid is selected, then the TSF must be validated against requirements from the Biometric Enrollment and Verification, version 1.1.
If hybrid is selected, biometric in accordance with the Biometric Enrollment and Verification, version 1.1 does not need to be selected, but should be selected if the biometric authentication can be used independent of the hybrid authentication, i.e. without having to enter a PIN/password.
| # | Management Function | User | Administrator | Administrator (When enrolled in management) | Administrator Only (When enrolled in management) |
| 1 |
Configure password policy:
| OOptional/Conditional | MMandatory | MMandatory | MMandatory |
| 2 |
Configure screen/session locking policy:
| OOptional/Conditional | MMandatory | MMandatory | MMandatory |
| 3 |
Enable/disable the VPN protection:
[selection:
| OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 4 | Enable/disable [assignment: list of all radios] | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 5 |
Enable/disable [assignment:
list of audio or visual
collection devices]:
[selection:
| OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 6 | Transition to the locked state | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 7 | TSF wipe of sensitive data | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 8 |
Configure application installation policy by
[selection:
| OOptional/Conditional | OOptional/Conditional | MMandatory | MMandatory |
| 9 | Import keys or secrets into the secure key storage | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 10 | Destroy imported keys or secrets and [selection: no other keys or secrets, [assignment: list of other categories of keys or secrets]] in the secure key storage | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 11 | Import X.509v3 certificates into the Trust Anchor Database | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 12 | Remove imported X.509v3 certificates and [selection: no other X.509v3 certificates, [assignment: list of other categories of X.509v3 certificates]] in the Trust Anchor Database | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 13 | Enroll the TOE in management | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 14 | Remove applications | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 15 | Update system software | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 16 | Install applications | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 17 | Remove Enterprise applications | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 18 |
Enable/disable display notification in the locked state of: [selection:
| OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 19 | Enable data-at rest protection | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 20 | Enable removable media’s data-at-rest protection | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 21 |
Enable/disable location services:
[selection:
| OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 22 | Enable/disable the use of [selection: Biometric Authentication Factor, Hybrid Authentication Factor] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 23 | Configure whether to allow or disallow establishment of [assignment: configurable trusted channel in FTP_ITC_EXT.1.1 or FDP_UPC_EXT.1.1/APPS] if the peer or server certificate is deemed invalid. | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 24 | Enable/disable all data signaling over [assignment: list of externally accessible hardware ports] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 25 | Enable/disable [assignment: list of protocols where the device acts as a server] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 26 | Enable/disable developer modes | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 27 | Enable/disable bypass of local user authentication | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 28 | Wipe Enterprise data | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 29 | Approve [selection: import, removal] by applications of X.509v3 certificates in the Trust Anchor Database | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 30 | Configure whether to allow or disallow establishment of a trusted channel if the TSF cannot establish a connection to determine the validity of a certificate | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 31 | Enable/disable the cellular protocols used to connect to cellular network base stations | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 32 | Read audit logs kept by the TSF | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 33 | Configure [selection: certificate, public-key] used to validate digital signature on applications | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 34 | Approve exceptions for shared use of keys or secrets by multiple applications | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 35 | Approve exceptions for destruction of keys or secrets by applications that did not import the key or secret | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 36 | Configure the unlock banner | OOptional/Conditional | OOptional/Conditional | MMandatory | MMandatory |
| 37 | Configure the auditable items | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 38 | Retrieve TSF-software integrity verification values | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 39 | Enable/disable [selection: ] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 40 | Enable/disable backup of [selection: all applications, selected applications, selected groups of applications, configuration data] to [selection: locally connected system, remote system] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 41 |
Enable/disable [selection:
| OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 42 | Approve exceptions for sharing data between [selection: applications, groups of applications] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 43 | Place applications into application groups based on [assignment: enterprise configuration settings] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 44 | Unenroll the TOE from management | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 45 |
Enable/disable the Always On VPN protection:
[selection:
| OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 46 | Revoke Biometric template | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 47 | Configure local audit storage capacity | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 48 | Configure lockout policy for unsuccessful authentication attempts through [selection: timeouts between attempts, limiting number of attempts during a time period] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 49 | Configure host-based firewall | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 50 | Configure name/address of directory server with which to bind | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 51 | Configure name/address of audit/logging server to which to send audit/logging records | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 52 | Configure name/address of network time server | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 53 | Enable/disable automatic software update | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 54 | [assignment: list of other management functions to be provided by the TSF] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
The ST should indicate which of the optional management functions are implemented in the TOE. This can be done by copying the above table into the ST and adjusting the "Administrator" and "User" columns to "M" according to which capabilities are present or not present, and for which privilege level. The Application Note for FMT_MOF_EXT.1 explains how to indicate Administrator or User capability.
The terms "Administrator" and "User" are defined in section 1.2.2. The intent of this requirement is to ensure that the ST is populated with the relevant management functions that are provided by the OS.
The columns labled with "When enrolled in management" refer to situations when "Mobile Device Management Support" is claimed as an implemented feature of the TOE and the OS is enrolled in a management infrastructure utilizing a Mobile Device Managenment system. The functions containing an "M" under these colums are manadtory and must be implemented by the TOE. The functions with an "M" in the "Administrator Only" column must be restricted to (or overridden by) the administrator. The functions with an "O" in the "Administrator Only" column may optionally be restricted to (or overridden by) the administrator when implemented in the TOE at the discretion of the ST author. For such functions, the ST author indicates this by replacing an "O" with an "M" in the ST. If the TOE does not claim "Mobile Device Management Support" as an implemented feature then the columns labeled with "When enrolled in managemet" are not applicable.
For management functions 12, 13, and 14, it is expected that the interfaces to these remote entities are trusted channels and the ST author is expected to claim them in FTP_ITC_EXT.1 accordingly.
Functions 3 , 5 , and 21 must be implemented on a device-wide basis but may also be implemented on a per-app basis or on a per-group of applications basis in which the configuration includes the list of applications or groups of applications to which the enable/disable applies.
Function 3 addresses enabling and disabling the IPsec VPN only. The configuration of the VPN Client itself (with information such as VPN Gateway, certificates, and algorithms) is addressed by the PP-Module for Virtual Private Network (VPN) Clients, version 3.0. The administrator options should only be listed if the administrator can remotely enable/disable the VPN connection.
Function 3 optionally allows the VPN to be configured per-app or per-groups of apps. If this configuration is selected, it does not void FDP_IFC_EXT.1. Instead FDP_IFC_EXT.1 is applied to the application or group of applications the VPN is applied to. In other words, all traffic destined for the VPN-enabled application or group of applications, must travel through the VPN, but traffic not destined for that application or group of applications can travel outside the VPN. When the VPN is configured across the device FDP_IFC_EXT.1 applies to all traffic and the VPN must not split tunnel.
The assignment in function 4 consists of all radios present on the TSF, such as Wi-Fi, cellular, NFC, Bluetooth BR/EDR, and Bluetooth LE, which can be enabled and disabled. In the future, if both Bluetooth BR/EDR and Bluetooth LE are supported, they will be required to be enabled and disabled separately. Disablement of the cellular radio does not imply that the radio may not be enabled in order to place emergency phone calls; however, it is not expected that a device in "airplane mode", where all radios are disabled, will automatically (without authorization) turn on the cellular radio to place emergency calls.
The assignment in function 5 consists of at least one audio or visual device, such as camera and microphone, which can be enabled and disabled by either the user or administrator. Disablement of the microphone does not imply that the microphone may not be enabled in order to place emergency phone calls. If certain devices are able to be restricted to the enterprise (either device-wide, per-app or per-group of applications) and others are able to be restricted to users, then this function should be iterated in the table with the appropriate table entries.
Regarding functions 4 and 5, disablement of a particular radio or audio/visual device must be effective as soon as the TOE has power. Disablement must also apply when the TOE is booted into auxiliary boot modes, for example, associated with updates or backup. If the TOE supports states in which security management policy is inaccessible, for example, due to data-at-rest protection, it is acceptable to meet this requirement by ensuring that these devices are disabled by default while in these states. That these devices are disabled during auxiliary boot modes does not imply that the device (particularly the cellular radio) may not be enabled in order to perform emergency phone calls.
Wipe of the TSF (function 7) is performed according to FCS_CKM_EXT.5. Sensitive data is all non-TSF data, including all user or enterprise data.
The selection in function 8 allows the ST author to select which mechanisms are available to the administrator through the MDM Agent to restrict the applications which the user may install. The ST author must state if application allowlist is applied device-wide or if it can be specified to apply to either the Enterprise or Personal applications.
In the future, function 12 may require destruction or disabling of any default trusted CA certificates, excepting those CA certificates necessary for continued operation of the TSF, such as the developer’s certificate. At this time, the ST author must indicate in the assignment whether pre-installed or any other category of X.509v3 certificates may be removed from the Trust Anchor Database.
For function 13, the enrollment function may be installing an MDM agent and includes the policies to be applied to the device. It is acceptable for the user approval notice to require the user to intentionally opt to view the policies (for example, by "tapping" on a "View" icon) rather than listing the policies in full in the notice.
For function 15, the administrator capability to update the system software may be limited to causing a prompt to the user to update rather than the ability to initiate the update itself. As the administrator is likely to be acting remotely, he/she would be unaware of inopportune situations, such as low power, which may cause the update to fail and the device to become inoperable. The user can refuse to accept the update in such situations. It is expected that system architects will be cognizant of this limitation and will enforce network access controls in order to enforce enterprise-critical updates.
Function 16 addresses both installation and update. This protection profile does not distinguish between installation and update of applications because mobile devices typically completely overwrite the previous installation with a new installation during an application update.
For function 17, "Enterprise applications" are those applications that belong to the Enterprise application group. Applications installed by the enterprise administrator (including automatic installation by the administrator after being requested by the user from a catalog of enterprise applications) are by default placed in the Enterprise application group unless an exception has been made in function 43 of FMT_SMF_EXT.1.1.
If the display of notifications in the locked state is supported, the configuration of these notifications (function 18) must be included in the selection.
Function 19 must be included in the selection if data-at-rest protection is not natively enabled.
Function 20 is implicitly met if the TSF does not support removable media.
For function 21, location services include location information gathered from GPS, cellular, and Wi-Fi.
Function 22 must be included in the ST if the TOE contains a BAF. This selection must correspond with the selection made in FIA_UAU.5.1. If biometric in accordance with the Biometric Enrollment and Verification, version 1.1 is selected in FIA_UAU.5.1, "Biometric Authentication Factor" must be selected and the user or admin must have the option to disable the use of it. If multiple BAFs are claimed in FIA_MBV_EXT.1.1 in the Biometric Enrollment and Verification, version 1.1, this applies to all different modalities. If hybrid is selected in FIA_UAU.5.1 it must be selected and the user or admin must have the option to disable the use of it.
Function 23 must be included in the ST if the function is configurable on the TOE for any of the trusted channels either mandated or selected in or . The configuration can be different depending on the specific trusted channel(s) and they must be filled in for the assignment.
The assignment in function 24 consists of all externally accessible hardware ports, such as USB, the SD card, and HDMI, whose data transfer capabilities can be enabled and disabled by either the user or administrator. Disablement of data transfer over an external port must be effective during and after boot into the normal operative mode of the device. If the TOE supports states in which configured security management policy is inaccessible, for example, due to data-at-rest protection, it is acceptable to meet this requirement by ensuring that data transfer is disabled by default while in these states. Each of the ports may be enabled or disabled separately. The configuration policy need not disable all ports together. In the case of USB, charging is still allowed if data transfer capabilities have been disabled.
The assignment in function 25 consists of all protocols where the TSF acts as a server, which can be enabled and disabled by either the user or administrator.
Function 26 must be included in the selection if developer modes are supported by the TSF.
Function 27 must be included in the selection if bypass of local user authentication, such as a "Forgot Password", password hint, or remote authentication feature, is supported.
Function 29 must be included in the selection if the TSF allows applications, other than the MDM Agents, to import or remove X.509v3 certificates from the Trust Anchor Database. The MDM Agent is considered the administrator. This function does not apply to applications trusting a certificate for its own validations. The function only applies to situations where the application modifies the device-wide Trust Anchor Database, affecting the validations performed by the TSF for other applications. The user or administrator may be provided the ability to globally allow or deny any application requests in order to meet this requirement.
Function 30 must be included in the ST if "administrator is allowed to configure certificate acceptance" is selected in FIA_X509_EXT.2.2 in
Function 33 should be included in the selection if FPT_TUD_EXT.5.1 is included in the ST and the configurable option is selected.
Function 34 should be included in the selection if user or administrator is selected in FCS_STG_EXT.1.4.
Function 35 should be included in the selection if the user or the administrator is selected in FCS_STG_EXT.1.5.
Function 37 must be included in the selection if FAU_SEL.1 is included in the ST.
For function 41, hotspot functionality refers to the condition in which the mobile device is serving as an access point to other devices, not the connection of the TOE to external hotspots.
Functions 42 and 43 correspond to FDP_ACF_EXT.2.2 and should be included if FDP_ACF_EXT.2.2 is included in the ST.
For function 44, FMT_SMF_EXT.2.1 specifies actions to be performed when the TOE is unenrolled from management.
Function 45 must be included in the ST if IPsec is selected in FTP_ITC_EXT.1 and the native IPsec VPN client can be configured to be Always-On. Always-On is defined as when the TOE has a network connection the VPN attempts to connect, all data leaving the device uses the VPN when the VPN is connected and no data leaves that device when the VPN is disconnected. The configuration of the VPN Client itself (with information such as VPN Gateway, certificates, and algorithms) is addressed by the PP-Module for Virtual Private Network (VPN) Clients, version 3.0.
The bootchain of the OS is the sequence of software, to include the OS loader, the kernel, system drivers or modules, and system files, which ultimately result in loading the OS. The first part of the OS, usually referred to as the first-stage bootloader, must be loaded by the platform. Assessing its integrity, while critical, is the platform's responsibility; and therefore outside the scope of this PP. All software loaded after this stage is potentially within the control of the OS and is in scope.
The verification may be transitive in nature: a hardware-protected public key, X.509 certificate, or hash may be used to verify the mutable bootloader code which contains a key, certificate, or hash used by the bootloader to verify the mutable OS kernel code, which contains a key, certificate, or hash to verify the next layer of executable code, and so on. However, the way in which the hardware stores and protects these keys is out of scope.
If all executable code (including bootloader(s), kernel, device drivers, pre-loaded applications, user-loaded applications, and libraries) is verified, all executable code stored in mutable media should be selected.
If certificates are used, they can be hardware-protected trust store elements or leaf certificates in a certificate chain that terminates in a root CA which is an element of a hardware protected trust store. If the certificates themselves are not trust store elements, revocation information is expected to be available for each CA certificate in the chain that is not a trust element, in accordance with FIA_X509_EXT.1 as defined in the Functional Package for X.509, version 1.0.
The ST author must include the security functional requirements for the trusted channel protocol selected in FTP_ITC_EXT.1.1 as part of the TSF.
If TLS, DTLS, or their mutually authenticated versions are selected, the TSF must be validated against the appropriate requirements in the Functional Package for Transport Layer Security (TLS), version 2.1.
If IPsec as conforming to the PP-Module for Virtual Private Network (VPN) Clients is selected, then FDP_IFC_EXT.1 must be included in the ST.
If SSH is selected, the TSF must be validated against the Functional Package for Secure Shell (SSH), version 2.0 and the corresponding selection is expected to be made in FIA_UAU.5.1. The ST author must include the security functional requirements for the trusted channel protocol selected in FTP_ITC_EXT.1 as part of the TSF.
If HTTPS is selected, FCS_HTTPS_EXT.1 must be included in the ST.
Claims from the Functional Package for X.509, version 1.0 are only required to the extent that they are needed to support the functionality required by the trusted protocols that are claimed.
If the TSF implements a protocol that requires the validation of a certificate presented by an external entity, FIA_X509_EXT.1 and FIA_X509_EXT.2 will be claimed, as will FIA_TSM_EXT.1 for management of the trust store.
If the TSF implements a protocol that requires the presentation of any certificates to an external entity, FIA_XCU_EXT.2 will be claimed. FIA_X509_EXT.3 will also be claimed, along with any applicable dependencies, depending on how the certificates presented by the TOE are obtained.
This requirement ensures that all remote administrative actions are protected. Authorized remote administrators must initiate all communication with the OS via a trusted path and all communication with the OS by remote administrators must be performed over this path. The data passed in this trusted communication channel is encrypted as defined in FTP_ITC_EXT.1.1.
If "local" is selected and no unprotected traffic is sent to remote users, then this requirement is met.
If "remote" is selected, the ST author must include the security functional requirements for the trusted channel protocol selected in FTP_ITC_EXT.1.1 as part of the TSF.
This requirement ensures that authorized remote administrators initiate all communication with the OS via a trusted path, and that all communication with the OS by remote administrators is performed over this path. The data passed in this trusted communication channel is encrypted as defined in FTP_ITC_EXT.1.
If "remote" is selected in FTP_TRP.1.1, "all remote administrative actions" must be selected in FTP_TRP.1.3.
If "local" is selected in FTP_TRP.1.1, then "initial user authentication" must be selected in FTP_TRP.1.3.
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
| Threat | Addressed by | Rationale |
|---|---|---|
| T.NETWORK_ATTACK | FAU_GEN.1 | FAU_GEN.1 helps mitigate the threat of a network attack by logging evidence of potential malicious activity. |
| FCS_CKM.1/AKG | FCS_CKM.1/AKG helps mitigate the threat of a network attack by ensuring the generation of strong keys used for trusted communications. | |
| FCS_CKM.1/SKG | FCS_CKM.1/SKG helps mitigate the threat of a network attack by ensuring the generation of strong keys used for trusted communications. | |
| FCS_CKM.6 | FCS_CKM.6 helps mitigate the threat of a network attack by ensuring that keys used for trusted communications are destroyed in a secure manner. | |
| FCS_COP.1/AEAD | FCS_COP.1/AEAD helps mitigate the threat of a network attack by ensuring the use of authenticated encryption algorithms in trusted communications. | |
| FCS_COP.1/Hash | FCS_COP.1/Hash helps mitigate the threat of a network attack by ensuring that secure hash algorithms are used for trusted communications. | |
| FCS_COP.1/KeyedHash | FCS_COP.1/KeyedHash helps mitigate the threat of a network attack by ensuring that secure HMAC algorithms are used for trusted communications. | |
| FCS_COP.1/SigGen | FCS_COP.1/SigGen helps mitigate the threat of a network attack by ensuring that secure digital signature algorithms are used for trusted communications. | |
| FCS_COP.1/SigVer | FCS_COP.1/SigVer helps mitigate the threat of a network attack by implementing signature verification functions used for protected storage. | |
| FCS_COP.1/SKC | FCS_COP.1/SKC helps mitigate the threat of a network attack by ensuring that secure symmetric algorithms are used for trusted communications. | |
| FCS_RBG.1 | FCS_RBG.1 helps mitigate the threat of a network attack by ensuring that keys used for trusted communications are generated using a secure DRBG. | |
| FIA_AFL.1 | FIA_AFL.1 helps mitigate the threat of a network attack by preventing an unprivileged user from logging into a network interface by brute force guessing the credential. | |
| FIA_UAU.5 | FIA_UAU.5 helps mitigate the threat of a network attack by providing specified authentication mechanisms for network user authentication. | |
| FMT_MOF_EXT.1 | FMT_MOF_EXT.1 helps mitigate the threat of a network attack by limiting the management functions that are available to a given user. | |
| FMT_SMF_EXT.1 | FMT_SMF_EXT.1 helps mitigate the threat of a network attack by limiting the management functions that are available to a given user. | |
| FPT_ACF_EXT.1 | FPT_ACF_EXT.1 helps mitigate the threat of a network attack by limiting the ability of an unprivileged user to modify the behavior of the TSF. | |
| FPT_ASLR_EXT.1 | helps mitigate the threat of a network attack by limiting the ability to modify the behavior of the TSF via memory overflow. | |
| FPT_FLS.1 | FPT_FLS.1 helps mitigate the threat of a network attack by ensuring that a malfunctioning DRBG function cannot be used to generate potentially insecure keys. | |
| FPT_SBOP_EXT.1 | helps mitigate the threat of a network attack by limiting the ability to modify the behavior of the TSF via stack overflow. | |
| FPT_TST.1 | FPT_TST.1 helps mitigate the threat of a network attack by implementing a mechanism to detect when the DRBG may be failing to generate secure cryptographic keys. | |
| FTP_ITC_EXT.1 | FTP_ITC_EXT.1 helps mitigate the threat of a network attack by requiring the TSF to implement trusted protocols for network communication. | |
| FTP_TRP.1 | FTP_TRP.1 helps mitigate the threat of a network attack by requiring the use of a trusted path for any remote administration that can be performed on the TOE. | |
| FCS_RBG.6 (optional) | FCS_RBG.6 helps mitigate the threat of a network attack by providing a secure DRBG service for third-party applications running on the TOE which may use this service to generate their own cryptographic keys for trusted communications. | |
| FPT_STM.1 | FPT_STM.1 helps mitigate the threat of malicious activity by providing reliable time stamps for the audit trail. | |
| FPT_W^X_EXT.1 (optional) | FPT_W^X_EXT.1 helps mitigate the threat of a network attack by enforcing data execution prevention so that an external interface cannot attempt to write data to executable memory. | |
| FTA_TAB.1 (optional) | FTA_TAB.1 helps mitigate the threat of a network attack by providing actionable consequences for misuse of the TSF. | |
| FPT_BLT_EXT.1 (objective) | FPT_BLT_EXT.1 helps mitigate the threat of a network attack by enforcing least functionality of the TOE's Bluetooth interface. | |
| FCS_CKM.2 (implementation-dependent) | FCS_CKM.2 helps mitigate the threat of a network attack by implementing secure methods to perform key distribution for trusted communications. | |
| FCS_CKM_EXT.7 (implementation-dependent) | FCS_CKM_EXT.7 helps mitigate the threat of a network attack by implementing secure methods to perform key agreement for trusted communications. | |
| FCS_COP.1/KeyEncap (selection-based) | FCS_COP.1/KeyEncap helps mitigate the threat of a network attack by using a secure key encapsulation method to transmit a symmetric key to a third party as part of key establishment for trusted communications. | |
| FCS_COP.1/KeyWrap (selection-based) | FCS_COP.1/KeyWrap helps mitigate the threat of a network attack by using a secure key wrap method to distribute key material to a third party for use in trusted communications. | |
| FCS_COP.1/XOF (selection-based) | FCS_COP.1/XOF helps mitigate the threat of a network attack by supporting extendable output function implementations that are dependencies of some secure key generation and signature verification algorithms. | |
| FCS_RBG.2 (selection-based) | FCS_RBG.2 helps mitigate the threat of a network attack by ensuring that the TOE's DRBG is seeded with sufficient entropy to ensure the generation of strong cryptographic keys. | |
| FCS_RBG.3 (selection-based) | FCS_RBG.3 helps mitigate the threat of a network attack by ensuring that the TOE's DRBG is seeded with sufficient entropy to ensure the generation of strong cryptographic keys. | |
| FCS_RBG.4 (selection-based) | FCS_RBG.4 helps mitigate the threat of a network attack by ensuring that the TOE's DRBG is seeded with sufficient entropy to ensure the generation of strong cryptographic keys. | |
| FCS_RBG.5 (selection-based) | FCS_RBG.5 helps mitigate the threat of a network attack by ensuring that the TOE's DRBG is seeded with sufficient entropy to ensure the generation of strong cryptographic keys. | |
| FDP_IFC_EXT.1 (selection-based) | FDP_IFC_EXT.1 helps mitigate the threat of a network attack by ensuring that the TOE has the ability to enforce the use of an IPsec VPN for all network traffic. | |
| T.NETWORK_EAVESDROP | FCS_CKM.1/AKG | FCS_CKM.1/AKG helps mitigate the threat of network eavesdropping by ensuring the generation of strong keys used for trusted communications. |
| FCS_CKM.1/SKG | FCS_CKM.1/SKG helps mitigate the threat of network eavesdropping by ensuring the generation of strong keys used for trusted communications. | |
| FCS_CKM.6 | FCS_CKM.6 helps mitigate the threat of network eavesdropping by ensuring that keys used for trusted communications are destroyed in a secure manner. | |
| FCS_COP.1/AEAD | FCS_COP.1/AEAD helps mitigate the threat of network eavesdrop by enforcing the use of a cryptographic algorithm to protect data in transit that includes assurance of both authenticity and confidentiality. | |
| FCS_COP.1/Hash | FCS_COP.1/Hash helps mitigate the threat of network eavesdropping by ensuring that secure hash algorithms are used for trusted communications. | |
| FCS_COP.1/KeyedHash | FCS_COP.1/KeyedHash helps mitigate the threat of network eavesdropping by ensuring that secure HMAC algorithms are used for trusted communications. | |
| FCS_COP.1/SigGen | FCS_COP.1/SigGen helps mitigate the threat of network eavesdropping by ensuring that secure digital signature algorithms are used for trusted communications. | |
| FCS_COP.1/SigVer | FCS_COP.1/SigVer helps mitigate the threat of network eavesdropping by implementing signature verification functions used for protected storage. | |
| FCS_COP.1/SKC | FCS_COP.1/SKC helps mitigate the threat of network eavesdropping by ensuring that secure symmetric algorithms are used for trusted communications. | |
| FCS_RBG.1 | FCS_RBG.1 helps mitigate the threat of network eavesdropping by ensuring that keys used for trusted communications are generated using a secure DRBG. | |
| FPT_FLS.1 | FPT_FLS.1 helps mitigate the threat of network eavesdropping by ensuring that a malfunctioning DRBG function cannot be used to generate potentially insecure keys. | |
| FPT_TST.1 | FPT_TST.1 helps mitigate the threat of network eavesdropping by implementing a mechanism to detect when the DRBG may be failing to generate secure cryptographic keys. | |
| FTP_ITC_EXT.1 | FTP_ITC_EXT.1 helps mitigate the threat of network eavesdropping by requiring the TSF to implement trusted protocols for network communication. | |
| FTP_TRP.1 | FTP_TRP.1 helps mitigate the threat of network eavesdropping by requiring the use of a trusted path for any remote administration that can be performed on the TOE. | |
| FCS_RBG.6 (optional) | FCS_RBG.6 helps mitigate the threat of network eavesdropping by providing a secure DRBG service for third-party applications running on the TOE which may use this service to generate their own cryptographic keys for trusted communications. | |
| FPT_BLT_EXT.1 (objective) | FPT_BLT_EXT.1 helps mitigate the threat of network eavesdropping by enforcing least functionality of the TOE's Bluetooth interface. | |
| FCS_CKM.2 (implementation-dependent) | FCS_CKM.2 helps mitigate the threat of network eavesdropping by enforcing the use of a cryptographic algorithm to protect key data that is distributed in transit to a third party for use in trusted communications. | |
| FCS_CKM_EXT.7 (implementation-based) | FCS_CKM_EXT.7 helps mitigate the threat of network eavesdropping by ensuring that a third party cannot obtain the key used by the TOE to communicate securely with a remote entity. | |
| FCS_COP.1/KeyEncap (selection-based) | FCS_COP.1/KeyWrap helps mitigate the threat of network eavesdrop by using a key encapsulation algorithm to protect data in transit | |
| FCS_COP.1/KeyWrap (selection-based) | FCS_COP.1/KeyWrap helps mitigate the threat of network eavesdrop by using a key wrap algorithm to protect data in transit. | |
| FCS_RBG.2 (selection-based) | FCS_RBG.2 helps mitigate the threat of network eavesdropping by ensuring that the TOE's DRBG is seeded with sufficient entropy to ensure the generation of strong cryptographic keys. | |
| FCS_RBG.3 (selection-based) | FCS_RBG.3 helps mitigate the threat of network eavesdropping by ensuring that the TOE's DRBG is seeded with sufficient entropy to ensure the generation of strong cryptographic keys. | |
| FCS_RBG.4 (selection-based) | FCS_RBG.4 helps mitigate the threat of network eavesdropping by ensuring that the TOE's DRBG is seeded with sufficient entropy to ensure the generation of strong cryptographic keys. | |
| FCS_RBG.5 (selection-based) | FCS_RBG.5 helps mitigate the threat of network eavesdropping by ensuring that the TOE's DRBG is seeded with sufficient entropy to ensure the generation of strong cryptographic keys. | |
| FCS_COP.1/XOF (selection-based) | FCS_COP.1/XOF helps mitigate the threat of network eavesdrop by supporting extendable output function implementations that are dependencies of algorithms used for protection of data in transit. | |
| FDP_IFC_EXT.1 (selection-based) | FDP_IFC_EXT.1 helps mitigate the threat of network eavesdropping by ensuring that the TOE has the ability to enforce the use of an IPsec VPN for all network traffic. | |
| T.LOCAL_ATTACK | FAU_GEN.1 | FAU_GEN.1 helps mitigate the threat of a local attack by logging evidence of potential malicious activity. |
| FCS_COP.1/Hash | FCS_COP.1/Hash helps mitigate the threat of a local attack by ensuring that secure hash algorithms are used for trusted updates. | |
| FCS_COP.1/KeyedHash | FCS_COP.1/KeyedHash helps mitigate the threat of a local attack by ensuring that secure HMAC algorithms are used for trusted updates. | |
| FCS_COP.1/SigGen | FCS_COP.1/SigGen helps mitigate the threat of a local attack by ensuring that secure digital signature algorithms are used for trusted updates. | |
| FCS_COP.1/SigVer | FCS_COP.1/SigVer helps mitigate the threat of local attack by implementing signature verification functions used for protected storage. | |
| FCS_STO_EXT.1 | FCS_STO_EXT.1 helps mitigate the threat of a local attack by providing a mechanism to protect sensitive data at rest. | |
| FDP_ACF_EXT.1 | FDP_ACF_EXT.1 helps mitigate the threat of a local attack by providing a mechanism to restrict the ability of one user account to access data owned by another user. | |
| FIA_AFL.1 | FIA_AFL.1 helps mitigate the threat of a local attack by preventing an unprivileged user from gaining access to the TSF by brute force guessing the credential. | |
| FIA_UAU.5 | FIA_UAU.5 helps mitigate the threat of a local attack by providing specified authentication mechanisms for user authentication. | |
| FMT_MOF_EXT.1 | FMT_MOF_EXT.1 helps mitigate the threat of a local attack by limiting the management functions that are available to a given user. | |
| FMT_SMF_EXT.1 | FMT_SMF_EXT.1 helps mitigate the threat of a local attack by limiting the management functions that are available to a given user. | |
| FPT_ACF_EXT.1 | FPT_ACF_EXT.1 helps mitigate the threat of a local attack by limiting the ability of an unprivileged user to modify the behavior of the TSF. | |
| FPT_ASLR_EXT.1 | helps mitigate the threat of a local attack by limiting the ability of an application to modify the behavior of the TSF via memory overflow. | |
| FPT_SBOP_EXT.1 | helps mitigate the threat of a local attack by limiting the ability of an application to modify the behavior of the TSF via stack overflow. | |
| FPT_TST_EXT.1 | helps mitigate the threat of a local attack by ensuring the integrity of the TSF on boot. | |
| FPT_TUD_EXT.1 | helps mitigate the threat of a local attack by ensuring the authenticity and integrity of updates applied to the TOE. | |
| FPT_TUD_EXT.2 | helps mitigate the threat of a local attack by ensuring the integrity of updates applied to applications running the TOE. | |
| FPT_W^X_EXT.1 (optional) | FPT_W^X_EXT.1 helps mitigate the threat of a local attack by enforcing data execution prevention so that an application cannot attempt to write data to executable memory. | |
| FTA_TAB.1 (optional) | FTA_TAB.1 helps mitigate the threat of a local attack by providing actionable consequences for misuse of the TSF. | |
| FPT_SRP_EXT.1 (objective) | FPT_SRP_EXT.1 helps mitigate the threat of a local attack by preventing the execution of unknown or untrusted software. | |
| T.LIMITED_PHYSICAL_ACCESS | FAU_GEN.1 | FAU_GEN.1 helps mitigate the threat of by logging evidence of potential malicious activity should illicit access to the TSF be gained. |
| FCS_STO_EXT.1 | FCS_STO_EXT.1 helps mitigate the threat by providing a mechanism to protect sensitive data at rest which prevents exfiltration of sensitive data during a limited access window. | |
| FIA_AFL.1 | FIA_AFL.1 helps mitigate the threat by preventing an unprivileged user from gaining access to the TSF by brute force guessing the credential in a limited time window. | |
| FIA_UAU.5 | FIA_UAU.5 helps mitigate the threat by providing specified authentication mechanisms for user authentication to prevent unauthorized access to the TOE. | |
| FMT_MOF_EXT.1 | FMT_MOF_EXT.1 helps mitigate the threat by limiting the management functions that are available to a given user which minimizes the impact of compromise should illicit access be gained. | |
| FMT_SMF_EXT.1 | FMT_SMF_EXT.1 helps mitigate the threat by limiting the management functions that are available to a given user which minimizes the impact of compromise should illicit access be gained. | |
| FPT_ACF_EXT.1 | FPT_ACF_EXT.1 helps mitigate the threat by limiting the ability of an unprivileged user to modify the behavior of the TSF should illicit access be gained. |
The Security Functional Requirements (SFRs) in Section 5.1 Security Functional Requirements are specified to mitigate the threats defined in Section 3.1 Threats. The PP identifies the Security Assurance Requirements (SARs) to frame the extent to which the evaluator assesses the documentation applicable for the evaluation and performs independent testing.
This section lists the set of SARs from CC part 3 that are required in evaluations against this PP. Individual evaluation activities to be performed are specified both in Section 5 Security Requirements as well as in this section.
The general model for evaluation of TOEs against STs written to conform to this PP is as follows:
After the ST has been approved for evaluation, the ITSEF
will obtain the OS, supporting environmental IT, and the administrative/user guides for
the OS. The ITSEF is expected to perform actions mandated by the Common Evaluation
Methodology (CEM) for the ASE and ALC SARs.
The ITSEF also performs the evaluation activities contained within
Section 5 Security Requirements, which are intended to be an interpretation of the
other CEM assurance requirements as they apply to the specific technology instantiated in the
OS.
The evaluation activities that are captured in
Section 5 Security Requirements also provide
clarification as to what the developer needs to provide to demonstrate the OS is compliant
with the PP.
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FCS_RBG.6 | ||
| No events specified | N/A | |
| FIA_UAU_EXT.4 | ||
| No events specified | N/A | |
| FPT_W^X_EXT.1 | ||
| No events specified | N/A | |
| FTA_TAB.1 | ||
| No events specified | N/A |
For the BYOD use case, Enterprise applications and data must be protected using a different password than the user authentication to gain access to the personal applications and data, if configured.
This requirement must be included in the ST if the TOE implements a container solution, in which there is a separate authentication, to separate user and Enterprise applications and resources.
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FAU_SEL.1 | ||
| All modifications to the audit configuration that occur while the audit collection functions are operating | No additional information | |
| FPT_BLT_EXT.1 | ||
| No events specified | N/A | |
| FPT_SRP_EXT.1 | ||
| No events specified | N/A |
Some Bluetooth services incur more serious consequences if unauthorized remote devices gain access to them. Such services should be protected by measures like disabling support for the associated Bluetooth profile unless it is actively being used by an application on the OS (in order to prevent discovery by a Service Discovery Protocol search), and then requiring explicit user action to enable those profiles in order to use the services. It may be further appropriate to require additional user action before granting a remote device access to that service.
For example, it may be appropriate to disable the OBEX Push Profile until a user pushes a button in an application indicating readiness to transfer an object. After completion of the object transfer, support for the OBEX profile should be suspended until the next time the user requests its use.
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FCS_CKM.2 | ||
| No events specified | N/A | |
| FCS_CKM_EXT.3 | ||
| No events specified | N/A | |
| FCS_CKM_EXT.5 | ||
| [selection, choose one of: Failure of the wipe, none] | No additional information | |
| FCS_CKM_EXT.7 | ||
| No events specified | N/A | |
| FCS_CKM_EXT.8 | ||
| No events specified | N/A | |
| FCS_HTTPS_EXT.1 | ||
| Failure of the certificate validity check. |
| |
| FCS_STG_EXT.1 | ||
| Import or destruction of key | Identity of key, role and identity of requester | |
| [selection, choose one of: Exceptions to use and destruction rules, none] | Identity of key, role and identity of requester | |
| FCS_STG_EXT.2 | ||
| No events specified | N/A | |
| FDP_ACF_EXT.2 | ||
| No events specified | N/A | |
| FDP_UPC_EXT.1/APPS | ||
| Application initiation of trusted channel | Identifier of application. Trusted channel protocol. Non-TOE endpoint of connection | |
| FMT_SMF_EXT.2 | ||
| Unenrollment, Initiation of unenrollment | Identity of administrator Remediation action performed, failure of accepting command to unenroll |
Key encapsulation is used in support of TLS when ML-KEM is used as the method of key establishment. Key wrapping is used in support of wireless LAN communications.
| Identifier | Cryptographic algorithm | Cryptographic parameters | List of standards |
|---|---|---|---|
| KAS2 | RSA | Modulus size [selection: 3072, 4096, 6144, 8192] bits | NIST SP 800-56B Revision 2 (Section 8.3) [KAS2] |
| DH | Finite Field Cryptography Diffie-Hellman | Static domain parameters approved for [selection:
| NIST SP 800-56A Revision 3 (Section 5.7.1.1) [DH] [selection: RFC 3526 [IKE groups], RFC 7919 [TLS groups]] |
| ECDH | Elliptic Curve Diffie-Hellman | Elliptic Curve [selection: P-256, P-384, P-521] | NIST SP 800-56A Revision 3 (Section 5.7.1.2) [ECDH] NIST SP 800-186 (Section 3.2.1) [NIST Curves] |
The intent of this requirement is that one of the selected protocols is available for use by user applications running on the device for use in connecting to distant-end services that are not necessarily part of the enterprise infrastructure. It should be noted that the FTP_ITC_EXT.1 requires that all TSF communications be protected using the protocols indicated in that requirement, so the protocols required by this component ride "on top of" those listed in FTP_ITC_EXT.1.
It should also be noted that some applications are part of the TSF, and FTP_ITC_EXT.1 requires that TSF applications be protected by at least one of the protocols in first selection in FTP_ITC_EXT.1. It is not required to have two different implementations of a protocol, or two different protocols, to satisfy both this requirement (for non-TSF apps) and FTP_ITC_EXT.1 (for TSF apps), as long as the services specified are provided.
The ST author must list which trusted channel protocols are implemented by the TOE for use by non-TSF apps.
If ST author selects IPsec as defined in the PP-Module for Virtual Private Network (VPN) Clients, version 3.0, the TSF must be validated against the PP-Module for Virtual Private Network (VPN) Clients, version 3.0.
Unenrollment may consist of removing the MDM agent or removing the administrator's policies. The functions in the selection are remediation actions that TOE may provide (perhaps via APIs) to the administrator (perhaps via an MDM agent) that may be performed upon unenrollment. "Enterprise applications" refers to applications that are in the Enterprise application group. "Enterprise resource data" refers to all stored Enterprise data and the separate resources that are available to the Enterprise application group, per FDP_ACF_EXT.3.1. If FDP_ACF_EXT.3.1 is included in the ST, then "remove all device-stored Enterprise resource data" must be selected, and is defined to be all resources selected in FDP_ACF_EXT.3.1.
If FIA_UAU_EXT.4.1 is included in the ST, then "remove Enterprise secondary authentication data" must be selected. If FIA_UAU_EXT.4.1 is not included in the ST, then "remove Enterprise secondary authentication data" cannot be selected. Enterprise secondary authentication data only refers to any data stored on the TOE that is specifically used as part of a secondary authentication mechanism to authenticate access to Enterprise applications and shared resources. Material that is used for the TOE's primary authentication mechanism or other purposes not related to authentication to or protection of Enterprise applications or shared resources should not be removed.
If wipe of sensitive data is selected the wipe must be in accordance with FCS_CKM_EXT.5.1. Thus cryptographically wiping the device is an acceptable remediation action.
As indicated in the introduction to this PP, the baseline requirements (those that must be performed by the TOE or its underlying platform) are contained in the body of this PP. There are additional requirements based on selections in the body of the PP: if certain selections are made, then additional requirements below must be included.
| Requirement | Auditable Events | Additional Audit Record Contents |
|---|---|---|
| FCS_COP.1/KeyEncap | ||
| No events specified | N/A | |
| FCS_COP.1/KeyWrap | ||
| No events specified | N/A | |
| FCS_COP.1/XOF | ||
| No events specified | N/A | |
| FCS_RBG.2 | ||
| No events specified | N/A | |
| FCS_RBG.3 | ||
| No events specified | N/A | |
| FCS_RBG.4 | ||
| No events specified | N/A | |
| FCS_RBG.5 | ||
| No events specified | N/A | |
| FDP_ACF_EXT.3 | ||
| No events specified | N/A | |
| No events specified | N/A | |
| FDP_IFC_EXT.1 | ||
| No events specified | N/A |
| Identifier | Cryptographic algorithm | Cryptographic key sizes | List of standards |
|---|---|---|---|
| ML-KEM | ML-KEM | Parameter set = ML-KEM-1024 | NIST FIPS 203 |
| Identifier | Cryptographic algorithm | Cryptographic key sizes | List of standards |
|---|---|---|---|
| AES-KW | AES in KW mode | 256 bits | [selection: ISO/IEC 18033-3:2010 (Subclause 5.2), FIPS PUB 197] [AES] [selection: ISO/IEC 19772:2020 (clause 6), NIST SP 800-38F (Section 6.2)] [KW mode] |
| AES-KWP | AES in KWP mode | 256 bits | [selection: ISO/IEC 18033-3:2010 (Subclause 5.2), FIPS PUB 197] [AES] NIST SP 800-38F (Section 6.3) [KWP mode] |
| AES-CCM | AES in CCM mode with unpredictable, non-repeating nonce, minimum size of 64 bits | 256 bits | [selection: ISO/IEC 18033-3:2010 (Subclause 5.2), FIPS PUB 197] [AES] [selection: ISO/IEC 19772:2020 (Clause 7), NIST SP 800-38C] [CCM] |
| AES-GCM | AES in GCM mode with non-repeating IVs using [selection: deterministic, RBG-based], IV construction; the tag must be of length [selection: 96, 104, 112, 120, 128] bits. | 256 bits | [selection: ISO/IEC 18033-3:2010 (Subclause 5.2), FIPS PUB 197] [AES] [selection: ISO/IEC 19772:2020 (Clause 10), NIST SP 800-38D] [GCM] |
| Cryptographic Algorithm | Parameters | List of Standards |
|---|---|---|
| SHAKE | Functions = [SHAKE256] | NIST FIPS PUB 202 Section 6.2 [SHAKE] |
Typically, the traffic required to establish the VPN connection is referred to as "Control Plane" traffic, whereas the IP traffic protected by the IPsec VPN is referred to as "Data Plane" traffic. All Data Plane traffic must flow through the VPN connection and the VPN must not split-tunnel.
If no native IPsec client is validated or third-party VPN clients may also implement the required Information Flow Control, the first option must be selected. In these cases, the TOE provides an API to third-party VPN clients that allows them to configure the TOE's network stack to perform the required Information Flow Control.
If the TSF implements a native VPN client, then the ST author must select provide a VPN client that can protect all IP traffic using IPsec and includes the PP-Module for VPN Client as part of the ST.
In the future, this requirement may also make a distinction between the current requirement (which requires that when the IPsec trusted channel is enabled, all traffic from the TSF is routed through that channel) and having an option to force the establishment of an IPsec trusted channel to allow any communication by the TSF.
| Functional Class | Functional Components |
|---|---|
| Cryptographic Support (FCS) | FCS_CKM_EXT Cryptographic Key Management FCS_HTTPS_EXT HTTPS Protocol FCS_STG_EXT Cryptographic Key Storage FCS_STO_EXT Storage of Sensitive Data |
| Protection of the TSF (FPT) | FPT_ACF_EXT Access Controls FPT_ASLR_EXT Address Space Layout Randomization FPT_BLT_EXT Limitation of Bluetooth Profile Support FPT_SBOP_EXT Stack Buffer Overflow Protection FPT_SRP_EXT Software Restriction Policies FPT_TST_EXT Boot Integrity FPT_TUD_EXT Trusted Update FPT_W^X_EXT Write XOR Execute Memory Pages |
| Security Management (FMT) | FMT_MOF_EXT Management of Functions Behavior FMT_SMF_EXT Specification of Management Functions |
| Trusted Path/Channels (FTP) | FTP_ITC_EXT Trusted Channel Communication |
| User Data Protection (FDP) | FDP_ACF_EXT Access Controls for Protecting User Data FDP_IFC_EXT Information Flow Control |
FCS_CKM_EXT.7, Cryptographic Key Agreement, requires that cryptographic key agreement be performed in accordance with specified standards.
FCS_CKM_EXT.3, Cryptographic Key Generation, requires the TSF to generate and manage the strength of Key Encryption Keys (KEKs).
FCS_CKM_EXT.5, TSF Wipe, requires the TSF to implement a cryptographic or other mechanism to make non-TSF data unreadable.
FCS_CKM_EXT.8, Password-Based Key Derivation, requires that password-based key derivation be performed in accordance with specified standards.
There are no management functions foreseen.
The following actions should be auditable if FAU_GEN Security audit data generation is
included in the PP, PP-Module, functional package or ST:
| Hierarchical to: | No other components. |
| Dependencies to: | [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation, or FCS_CKM.5 Cryptographic key derivation, or FCS_CKM_EXT.8 Password-based key derivation], [FCS_CKM.2 Cryptographic key distribution, or FCS_COP.1 Cryptographic operation] FCS_CKM.6 Timing and event of cryptographic key destruction FCS_COP.1 Cryptographic operation |
There are no management activities foreseen.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FCS_CKM.1 Cryptographic Key Generation FCS_COP.1 Cryptographic Operation FCS_RBG.1 Random Bit Generation |
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
| Hierarchical to: | No other components. |
| Dependencies to: |
FCS_CKM.6 Timing and Event of Cryptographic Key Destruction FCS_RBG.1 Random Bit Generation |
There are no management functions foreseen.
The following actions should be auditable if FAU_GEN Security audit data generation is
included in the PP, PP-Module, functional package or ST:
| Hierarchical to: | No other components. |
| Dependencies to: | [FCS_CKM.2 Cryptographic Key Distribution, or FCS_COP.1 Cryptographic Operation] FCS_CKM_EXT.7 Cryptographic Key Agreement], FCS_CKM.6 Timing and Event of Cryptographic Key Destruction |
FCS_HTTPS_EXT.1, HTTPS Protocol, requires the TSF to implement the HTTPS protocol in accordance with the specified standard, using TLS, and notifying the application if invalid.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
| Hierarchical to: | No other components. |
| Dependencies to: |
FCS_TLS_EXT.1 TLS Protocol FIA_X509_EXT.1 X.509 Validation of Certificates |
FCS_STG_EXT.1, Cryptographic Key Storage, requires the TSF to implement a secure key storage and defines the access restrictions to be enforced on this.
FCS_STG_EXT.2, Encrypted Cryptographic Key Storage, requires the TSF to implement confidentiality measures to protect the key storage.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
| Hierarchical to: | No other components. |
| Dependencies to: | [FCS_CKM.1 Cryptographic Key Generation, or FDP_ITC.1 Import of User Data without Security Attributes, or FDP_ITC.2 Import of User Data with Security Attributes] FMT_SMF.1 Specification of Management Functions FMT_SMR.1 Security Roles |
There are no management activities foreseen.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FCS_CKM_EXT.3 Cryptographic Key Generation FCS_COP.1 Cryptographic Operation FCS_STG_EXT.1 Cryptographic Key Storage |
FCS_STO_EXT.1, Storage of Sensitive Data, requires the TSF to include a mechanism that encrypts sensitive data and that can be invoked by third-party applications in addition to internal TSF usage.
There are no management activities foreseen.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FCS_COP.1 Cryptographic Operation |
FPT_ACF_EXT.1, Access Controls, requires the TSF to prohibit unauthorized users from reading or modifying specific TSF data.
There are no management functions foreseen.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP or ST:
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FPT_ASLR_EXT.1, Address Space Layout Randomization, defines the ability of the TOE to use ASLR as well as the objects that ASLR is applied to.
There are no management functions foreseen.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FPT_BLT_EXT.1, Limitation of Bluetooth Profile Support, requires the TSF to maintain a disabled by default posture for Bluetooth profiles.
There are no management activities foreseen.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FPT_SBOP_EXT.1, Stack Buffer Overflow Protection, requires the TSF to be compiled using stack-based buffer overflow protections or to store data in such a manner that a stack-based buffer overflow cannot compromise the TSF.
There are no management activities foreseen.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FPT_SRP_EXT.1, Software Restriction Policies, defines the criteria the TSF can use to prevent execution of restricted programs.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FPT_TST_EXT.1, Boot Integrity, defines the mechanisms that the TSF uses to assert its own integrity at startup.
There are no management functions foreseen.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP or ST:
| Hierarchical to: | No other components. |
| Dependencies to: |
FCS_COP.1 Cryptographic Operation FIA_X509_EXT.1 X.509 Certificate Validation |
FPT_TUD_EXT.1, Integrity for Installation and Update, requires the TOE to provide a mechanism to verify the integrity of updates to itself.
FPT_TUD_EXT.2, Integrity for Installation and Update of Application Software, requires the TOE to provide a mechanism to verify the integrity of updates to non-TSF applications that are running on the TOE.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP or ST:
| Hierarchical to: | No other components. |
| Dependencies to: | FCS_COP.1 Cryptographic Operation |
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP or ST:
| Hierarchical to: | No other components. |
| Dependencies to: | FCS_COP.1 Cryptographic Operation |
FPT_W^X_EXT.1, Write XOR Execute Memory Pages, defines the ability of the TOE to prevent memory from being simultaneously writable and executable unless otherwise specified.
There are no management functions foreseen.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FMT_MOF_EXT.1, Management of Functions Behavior, requires the TSF to define a set of management functions for the TOE and the privileges that are required to administer them.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP or ST:
| Hierarchical to: | No other components. |
| Dependencies to: | FMT_SMF_EXT.1 Specification of Management Functions |
FMT_SMF_EXT.1, Specification of Management Functions, requires the TSF to define a set of management functions for the TOE.
FMT_SMF_EXT.2, Specification of Remediation Actions, requires the TSF to automatically perform specific management functions in response to a specific event.
There are no management functions foreseen.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
| # | Management Function | User | Administrator | Administrator (When enrolled in management) | Administrator Only (When enrolled in management) |
| 1 |
Configure password policy:
| OOptional/Conditional | MMandatory | MMandatory | MMandatory |
| 2 |
Configure screen/session locking policy:
| OOptional/Conditional | MMandatory | MMandatory | MMandatory |
| 3 |
Enable/disable the VPN protection:
[selection:
| OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 4 | Enable/disable [assignment: list of all radios] | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 5 |
Enable/disable [assignment:
list of audio or visual
collection devices]:
[selection:
| OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 6 | Transition to the locked state | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 7 | TSF wipe of sensitive data | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 8 |
Configure application installation policy by
[selection:
| OOptional/Conditional | OOptional/Conditional | MMandatory | MMandatory |
| 9 | Import keys or secrets into the secure key storage | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 10 | Destroy imported keys or secrets and [selection: no other keys or secrets, [assignment: list of other categories of keys or secrets]] in the secure key storage | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 11 | Import X.509v3 certificates into the Trust Anchor Database | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 12 | Remove imported X.509v3 certificates and [selection: no other X.509v3 certificates, [assignment: list of other categories of X.509v3 certificates]] in the Trust Anchor Database | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 13 | Enroll the TOE in management | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 14 | Remove applications | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 15 | Update system software | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 16 | Install applications | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 17 | Remove Enterprise applications | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 18 |
Enable/disable display notification in the locked state of: [selection:
| OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 19 | Enable data-at rest protection | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 20 | Enable removable media’s data-at-rest protection | OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 21 |
Enable/disable location services:
[selection:
| OOptional/Conditional | OOptional/Conditional | MMandatory | OOptional/Conditional |
| 22 | Enable/disable the use of [selection: Biometric Authentication Factor, Hybrid Authentication Factor] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 23 | Configure whether to allow or disallow establishment of [assignment: configurable trusted channel in FTP_ITC_EXT.1.1 or FDP_UPC_EXT.1.1/APPS] if the peer or server certificate is deemed invalid. | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 24 | Enable/disable all data signaling over [assignment: list of externally accessible hardware ports] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 25 | Enable/disable [assignment: list of protocols where the device acts as a server] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 26 | Enable/disable developer modes | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 27 | Enable/disable bypass of local user authentication | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 28 | Wipe Enterprise data | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 29 | Approve [selection: import, removal] by applications of X.509v3 certificates in the Trust Anchor Database | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 30 | Configure whether to allow or disallow establishment of a trusted channel if the TSF cannot establish a connection to determine the validity of a certificate | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 31 | Enable/disable the cellular protocols used to connect to cellular network base stations | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 32 | Read audit logs kept by the TSF | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 33 | Configure [selection: certificate, public-key] used to validate digital signature on applications | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 34 | Approve exceptions for shared use of keys or secrets by multiple applications | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 35 | Approve exceptions for destruction of keys or secrets by applications that did not import the key or secret | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 36 | Configure the unlock banner | OOptional/Conditional | OOptional/Conditional | MMandatory | MMandatory |
| 37 | Configure the auditable items | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 38 | Retrieve TSF-software integrity verification values | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 39 | Enable/disable [selection: ] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 40 | Enable/disable backup of [selection: all applications, selected applications, selected groups of applications, configuration data] to [selection: locally connected system, remote system] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 41 |
Enable/disable [selection:
| OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 42 | Approve exceptions for sharing data between [selection: applications, groups of applications] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 43 | Place applications into application groups based on [assignment: enterprise configuration settings] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 44 | Unenroll the TOE from management | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 45 |
Enable/disable the Always On VPN protection:
[selection:
| OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 46 | Revoke Biometric template | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 47 | Configure local audit storage capacity | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 48 | Configure lockout policy for unsuccessful authentication attempts through [selection: timeouts between attempts, limiting number of attempts during a time period] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 49 | Configure host-based firewall | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 50 | Configure name/address of directory server with which to bind | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 51 | Configure name/address of audit/logging server to which to send audit/logging records | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 52 | Configure name/address of network time server | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 53 | Enable/disable automatic software update | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
| 54 | [assignment: list of other management functions to be provided by the TSF] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
FTP_ITC_EXT.1, Trusted Channel Communication, defines the specific secure communications protocols the TSF uses to communicate with a specific set of non-TOE entities in the Operational Environment.
There are no management functions foreseen.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP or ST:
| Hierarchical to: | No other components. |
| Dependencies to: |
FCS_DTLSC_EXT.1 DTLS Client Protocol FCS_IPSEC_EXT.1 IPsec FCS_SSH_EXT.1 SSH Protocol FCS_TLSC_EXT.1 TLS Client Protocol |
FDP_ACF_EXT.1, Access Controls for Protecting User Data, requires the TSF to prevent unprivileged users from accessing operating system objects owned by other users.
FDP_ACF_EXT.2, Access Control for System Services, requires the TSF to be able to control access to its own services.
FDP_ACF_EXT.3, Access Control for System Resources, requires the TSF to be able to provide separate copies of system resources for different application groups.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP or ST:
| Hierarchical to: | No other components. |
| Dependencies to: | No dependencies. |
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FMT_MOF_EXT.1.1 Management of Functions Behavior |
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FDP_ACF_EXT.2 Access Control for System Services FMT_MOF_EXT.1.1 Management of Functions Behavior |
FDP_IFC_EXT.1, Information Flow Control, requires the TSF to provide the ability to protect IP traffic using IPsec.
There are no management activities foreseen.
There are no auditable events foreseen.
| Hierarchical to: | No other components. |
| Dependencies to: | FTP_ITC_EXT.1 Trusted Channel Communication |
This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.3 Dependencies between components.
This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP provides evidence that these controls are present and have been evaluated.
| Requirement | Rationale for Satisfaction |
| FIA_UAU.1 - Timing of authentication | FIA_AFL.1 implicitly requires that the OS perform all necessary actions, including those on behalf of the user who has not been authenticated, in order to authenticate; therefore it is duplicative to include these actions as a separate assignment and test. |
| FIA_UID.1 - Timing of identification | FIA_AFL.1 implicitly requires that the OS perform all necessary actions, including those on behalf of the user who has not been identified, in order to authenticate; therefore it is duplicative to include these actions as a separate assignment and test. |
| FMT_SMR.1 - Security roles | FMT_MOF_EXT.1 specifies role-based management functions that implicitly defines user and privileged accounts; therefore, it is duplicative to include separate role requirements. |
| FTA_SSL.1 - TSF-initiated session locking | FMT_MOF_EXT.1 defines requirements for managing session locking; therefore, it is duplicative to include a separate session locking requirement. |
| FTA_SSL.2 - User-initiated locking | FMT_MOF_EXT.1 defines requirements for user-initiated session locking; therefore, it is duplicative to include a separate session locking requirement. |
| FAU_STG.2 - Protected audit data storage | FPT_ACF_EXT.1 defines a requirement to protect audit logs; therefore, it is duplicative to include a separate protection of audit trail requirements. |
| FAU_GEN.2 - User identity association | FAU_GEN.1.2 explicitly requires that the OS record any user account associated with each event; therefore, it is duplicative to include a separate requirement to associate a user account with each event. |
| FAU_SAR.1 - Audit review | FPT_ACF_EXT.1.2 requires that audit logs (and other objects) are protected from reading by unprivileged users; therefore, it is duplicative to include a separate requirement to protect only the audit information. |
This appendix describes the required supplementary information for the entropy source used by the OS.
The documentation of the entropy source should be detailed enough that, after reading, the evaluator shall thoroughly understand the entropy source and why it can be relied upon to provide sufficient entropy. This documentation should include multiple detailed sections: design description, entropy justification, operating conditions, and health testing. This documentation is not required to be part of the TSS.
Documentation will include the design of the entropy source as a whole, including the interaction of all entropy source components. Any information that can be shared regarding the design should also be included for any third-party entropy sources that are included in the product.
The documentation will describe the operation of the entropy source to include, how entropy is produced, and how unprocessed (raw) data can be obtained from within the entropy source for testing purposes. The documentation should walk through the entropy source design indicating where the entropy comes from, where the entropy output is passed next, any post-processing of the raw outputs (hash, XOR, etc.), if/where it is stored, and finally, how it is output from the entropy source. Any conditions placed on the process (e.g., blocking) should also be described in the entropy source design. Diagrams and examples are encouraged.
This design must also include a description of the content of the security boundary of the entropy source and a description of how the security boundary ensures that an adversary outside the boundary cannot affect the entropy rate.
If implemented, the design description will include a description of how third-party applications can add entropy to the RBG. A description of any RBG state saving between power-off and power-on will be included.
There should be a technical argument for where the unpredictability in the source comes from and why there is confidence in the entropy source delivering sufficient entropy for the uses made of the RBG output (by this particular OS). This argument will include a description of the expected min-entropy rate (i.e. the minimum entropy (in bits) per bit or byte of source data) and explain that sufficient entropy is going into the OS randomizer seeding process. This discussion will be part of a justification for why the entropy source can be relied upon to produce bits with entropy.
The amount of information necessary to justify the expected min-entropy rate depends on the type of entropy source included in the product.
For developer provided entropy sources, in order to justify the min-entropy rate, it is expected that a large number of raw source bits will be collected, statistical tests will be performed, and the min-entropy rate determined from the statistical tests. While no particular statistical tests are required at this time, it is expected that some testing is necessary in order to determine the amount of min-entropy in each output.
For third-party provided entropy sources, in which the OS vendor has limited access to the design and raw entropy data of the source, the documentation will indicate an estimate of the amount of min-entropy obtained from this third-party source. It is acceptable for the vendor to "assume" an amount of min-entropy, however, this assumption must be clearly stated in the documentation provided. In particular, the min-entropy estimate must be specified and the assumption included in the ST.
Regardless of type of entropy source, the justification will also include how the DRBG is initialized with the entropy stated in the ST, for example by verifying that the min-entropy rate is multiplied by the amount of source data used to seed the DRBG or that the rate of entropy expected based on the amount of source data is explicitly stated and compared to the statistical rate. If the amount of source data used to seed the DRBG is not clear or the calculated rate is not explicitly related to the seed, the documentation will not be considered complete.
The entropy justification will not include any data added from any third-party application or from any state saving between restarts.
| IF |
From FCS_HTTPS_EXT.1.3: * select not establish the connection |
| THEN |
From FCS_TLSC_EXT.1.6: * select the server certificate is invalid [selection: with no TLS-specific exceptions, except when override is authorized in accordance with [assignment:
override rules] in the case where valid revocation information is not available] * select with no TLS-specific exceptions |
| IF |
From FCS_HTTPS_EXT.1.3: |
| THEN |
From FCS_TLSC_EXT.1.6: * select the server certificate is invalid [selection: with no TLS-specific exceptions, except when override is authorized in accordance with [assignment:
override rules] in the case where valid revocation information is not available] * select except when override is authorized in accordance with [assignment:
override rules] in the case where valid revocation information is not available |
| IF |
From FCS_STG_EXT.1.1: * select software-based |
| THEN |
From FCS_STG_EXT.2.1: * select all software-based key storage |
| IF |
From FCS_STG_EXT.1.5: * select the user |
| THEN |
From FMT_SMF_EXT.1.1: |
| IF |
From FCS_STG_EXT.1.5: * select the administrator |
| THEN |
From FMT_SMF_EXT.1.1: |
| Acronym | Meaning |
|---|---|
| AES | Advanced Encryption Standard |
| API | Application Programming Interface |
| app | Application |
| ASLR | Address Space Layout Randomization |
| Base-PP | Base Protection Profile |
| CC | Common Criteria |
| CEM | Common Evaluation Methodology |
| CESG | Communications-Electronics Security Group |
| CMC | Certificate Management over CMS |
| CMS | Cryptographic Message Syntax |
| CN | Common Names |
| cPP | Collaborative Protection Profile |
| CRL | Certificate Revocation List |
| CSP | Critical Security Parameters |
| DEK | Data Encryption Key |
| DEP | Data Execution Prevention |
| DES | Data Encryption Standard |
| DHE | Diffie-Hellman Ephemeral |
| DNS | Domain Name System |
| DRBG | Deterministic Random Bit Generator |
| DT | Date/Time Vector |
| DTLS | Datagram Transport Layer Security |
| ECDSA | Elliptic Curve Digital Signature Algorithm |
| EST | Enrollment over Secure Transport |
| FIPS | Federal Information Processing Standards |
| FP | Functional Package |
| HMAC | Hash-based Message Authentication Code |
| HTTP | Hypertext Transfer Protocol |
| HTTPS | Hypertext Transfer Protocol Secure |
| IP | Internet Protocol |
| ISO | International Organization for Standardization |
| IT | Information Technology |
| ITSEF | Information Technology Security Evaluation Facility |
| KEK | Key Encryption Key |
| MDM | Mobile Device Management |
| NIAP | National Information Assurance Partnership |
| NIST | National Institute of Standards and Technology |
| OCSP | Online Certificate Status Protocol |
| OE | Operational Environment |
| OID | Object Identifier |
| OMB | Office of Management and Budget |
| OS | Operating System |
| PII | Personally Identifiable Information |
| PIN | Personal Identification Number |
| PKI | Public Key Infrastructure |
| PP | Protection Profile |
| PP-Configuration | Protection Profile Configuration |
| PP-Module | Protection Profile Module |
| RBG | Random Bit Generator |
| REK | Root Encryption Key |
| RFC | Request for Comment |
| RNG | Random Number Generator |
| S/MIME | Secure/Multi-purpose Internet Mail Extensions |
| SAN | Subject Alternative Name |
| SAR | Security Assurance Requirement |
| SFR | Security Functional Requirement |
| SHA | Secure Hash Algorithm |
| SIP | Session Initiation Protocol |
| ST | Security Target |
| SWID | Software Identification |
| TLS | Transport Layer Security |
| TOE | Target of Evaluation |
| TSF | TOE Security Functionality |
| TSFI | TSF Interface |
| TSS | TOE Summary Specification |
| URI | Uniform Resource Identifier |
| URL | Uniform Resource Locator |
| USB | Universal Serial Bus |
| VPN | Virtual Private Network |
| XCCDF | eXtensible Configuration Checklist Description Format |
| XOR | Exclusive Or |
| Identifier | Title |
|---|---|
| [CC] | Common Criteria for Information Technology Security Evaluation -
|
| [CEM] | Common Methodology for Information Technology Security Evaluation -
|
| [CSA] | Computer Security Act of 1987, H.R. 145, June 11, 1987. |
| [OMB] | Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency Information Technology Investments, OMB M-06-19, July 12, 2006. |
| [NCSC] | National Cyber Security Centre - End User Device (EUD) Security Guidance |
| [SHAVS] | The Secure Hash Algorithm Validation System, NIST, 22 July 2004 |