Version | Date | Comment |
---|---|---|
1.0 | 2022-12-16 | Initial Release |
This Base-PP is valid because a device that implements MACsec encryption is a specific type of network device, and there is nothing about the implementation of MACsec that would prevent any of the security capabilities defined by the Base-PP from being satisfied.
A Target of Evaluation (TOE) that conforms to a PP-Configuration containing this PP-Module may be a ‘Distributed TOE’ as defined in the NDcPP. This PP-Module does not prohibit the TOE from implementing other security functionality in a distributed manner. For example, a TOE may be deployed in such a manner that distributed nodes establish MACsec connectivity with physically separated networks while a centralized management device is used to configure the behavior of individual nodes.
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
The security functionality of the product under evaluation. | |
A description of how a TOE satisfies the SFRs in an ST. |
Carrier Ethernet | Metro Ethernet Forum (MEF) Carrier Ethernet standards define technology-agnostic layer-2 services. The standards include services aimed at end users (Subscriber Ethernet Services) and service providers (Operator Ethernet Services). Other related terms include Metro Ethernet Services, Provider Bridging and Provider Backbone Bridging. |
Connectivity Association Key (CAK) | A symmetric key that is used as the master key for MACsec connectivity and is shared between connected MACsec endpoints. |
Connectivity Association Key Name (CKN) | A unique identifier for a specific Connectivity Association Key. |
Ethernet Private Line (EPL) | A service transporting customer data form one User Network Interface (UNI) to another UNI. |
Ethernet Virtual Private Line (EVPL) | A Virtual Local Area Network (VLAN)-based service transporting customer data. The UNI is capable of service multiplexing. |
Extended Packet Numbering (XPN) | A scheme that allows MACsec communications to persist using a single Secure Association Key for a larger number of frames to reduce overhead and latency associated with key agreement. |
A port authentication protocol specified in IEEE 802.1X that is used to facilitate network authentication. | |
A key agreement protocol used for distribution of MACsec keys to distributed peers. | |
The basic MACsec frame structure that contains protcol and payload data. | |
Media Access Control (MAC) Security Entity | An entity (e.g., computer) that is implementing MACsec. |
Media Access Control Security (MACsec) | A standard for connectionless data confidentiality and integrity protection at the data link layer of a network connection. Formally defined in IEEE 802.1AE. |
Metro Ethernet Forum (MEF) | A non-profit international industry consortium. |
Packet Number (PN) | A monotonically increasing value that is guaranteed to be unique for each MACsec frame transmitted using a given Secure Association Key (SAK) |
SecTag | MAC Security Tag - a protocol header comprising a number of octets, beginning with an EtherType, that is prepended to the service data unit supplied by the client of the protocol and is used to provide security guarantees. |
Secure Association (SA) | A mechanism that uses a SAK to provide the MACsec service guarantees and security services for a sequence of transmitted frames. |
Secure Association Key (SAK) | A key derived from the CAK that is used to encrypt and decrypt traffic for a given SA. |
Secure Channel (SC) | A unidirectional channel (one to one or one to many) that uses symmetric key cryptography to provide a (possibly long lived) Secure Channel. |
Secure Device Identifier | A device authentication credential that can be used for EAPOL and is formally defined in IEEE 802.1AR. |
This PP-Module specifically addresses MACsec, which allows authorized systems using Ethernet Transport to maintain confidentiality of transmitted data and to take measures against frames that are transmitted or modified by unauthorized devices.
MACsec protects communication between trusted components of the network infrastructure, thus protecting the network operation. It facilitates maintenance of correct network connectivity and services as well as isolation of denial of service attacks.
The hardware, firmware, and software of the MACsec device define the physical boundary. All of the security functionality is contained and executed within the physical boundary of the device. For example, given a device with an Ethernet card, the whole device is considered to be within the boundary.
Since this PP-Module builds on the NDcPP, conformant TOEs are obligated to implement the functionality required in the NDcPP along with the additional functionality defined in this PP-Module in response to the threat environment discussed later in this document.
A pair of MACsec devices connected by a physical medium can protect Ethernet frames switched or routed from one device to the other. The two MACsec devices are provided with a CAK and use the MKA protocol to create a secure tunnel. MKA is used by the two MACsec devices to agree upon MACsec keys. A policy should be installed to protect traffic between the devices, with the exception of the MKA or Ethernet control traffic such as Extensible Authentication Protocol (EAP) over LAN (EAPOL) frames.
This PP-Module defines two potential use cases for the MACsec TOE.
In some markets network service providers have standardized their offerings according to various versions of the MEF specifications. One recent MEF specification is the “E-Line” (*) service type which is based on the use of point-to-point (P2P) Ethernet Virtual Circuits. A port-based service is known as an EPL and a VLAN-based service is known as an EVPL. EPL provides a P2P Ethernet virtual connection between a pair of dedicated user–network interfaces (UNIs), with a high degree of transparency. EVPL provides a P2P or point-to-multipoint connection between UNIs. A difference between the EVPL and EPL is the degree of transparency - while EPL is highly transparent, filtering only the pause frames, EVPL is required to either peer or drop most of the Layer 2 Control Protocols. The MEF has also defined other service types such as E-LAN and E-Tree.
(*) From MEF 6.3 – Subscriber Ethernet Services Definition – November 2019 – Table 3
This PP-Module inherits exact conformance as required from the specified Base-PP and as defined in the CC and CEM addenda for Exact Conformance, Selection-Based SFRs, and Optional SFRs (dated May 2017).
The following PP-Modules are allowed to be specified in a PP-Configuration with this PP-Module:
An attacker may modify data transmitted over the layer 2 link in a way that is not detected by the recipient.
Devices on a network may be exposed to attacks that attempt to corrupt or modify data in transit without authorization. If malicious devices are able to modify and replay data that is transmitted over a layer 2 link, then the data contained within the communications may be susceptible to a loss of integrity.
An attacker may send traffic through the TOE that enables them to access devices in the TOE’s operational environment without authorization.
A MACsec device may sit on the periphery of a network, which means that it may have an externally-facing interface to a public network. Devices located in the public network may attempt to exercise services located on the internal network that are intended to be accessed only from within the internal network or externally accessible only from specifically authorized devices. If the MACsec device allows unauthorized external devices access to the internal network, these devices on the internal network may be subject to compromise. Similarly, if two MACsec devices are deployed to facilitate end-to-end encryption of traffic that is contained within a single network, an attacker could use an insecure MACsec device as a method to access devices on a specific segment of that network such as an individual LAN.
An attacker may acquire sensitive TOE or user data that is transmitted to or from the TOE because an untrusted communication channel causes a disclosure of data in transit.
A generic network device may be threatened by the use of insecure communications channels to transmit sensitive data. The attack surface of a MACsec device also includes the MACsec trusted channels. Inability to secure communications channels, or failure to do so correctly, would expose user data that is assumed to be secure to the threat of unauthorized disclosure.
An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.
This document does not define any additional OSPs.To further address the issues associated with unauthorized disclosure of information, a compliant TOE’s authentication ability (MKA) will allow a MACsec peer to establish connectivity associations (CAs) with another MACsec peer. MACsec endpoints authenticate each other to ensure they are communicating with an authorized MAC Security Entity (SecY) entity.
Addressed by: FCS_MACSEC_EXT.4, FCS_MKA_EXT.1, FIA_PSK_EXT.1, FCS_DEVID_EXT.1 (selection-based), FCS_EAP-TLS_EXT.1 (selection-based)All network devices are expected to provide services that allow the security functionality of the device to be managed. The MACsec device, as a specific type of network device, has a refined set of management functions to address its specialized behavior. In order to further mitigate the threat of a compromise of its security functionality, the MACsec device prescribes the ability to limit brute-force authentication attempts by enforcing lockout of accounts that experience excessive failures and by limiting access to security-relevant data that administrators do not need to view.
Addressed by: FMT_SMF.1/MACSEC, FPT_CAK_EXT.1, FIA_AFL_EXT.1 (optional), FTP_TRP.1/MACSEC (optional), FMT_SNMP_EXT.1 (selection-based)To address the issues associated with unauthorized modification and disclosure of information, compliant TOEs will implement cryptographic capabilities. These capabilities are intended to maintain confidentiality and allow for detection and modification of data that is transmitted outside of the TOE.
Addressed by: FCS_COP.1/CMAC, FCS_COP.1/MACSEC, FCS_MACSEC_EXT.2, FCS_MACSEC_EXT.3, FTP_ITC.1/MACSEC, FTP_TRP.1/MACSEC (optional), FCS_SNMP_EXT.1 (selection-based)Threat, Assumption, or OSP | Security Objectives | Rationale |
T.DATA_INTEGRITY | O.CRYPTOGRAPHIC_FUNCTIONS_MACSEC | The TOE mitigates the threat of data integrity violations by implementing cryptographic functionality that includes integrity protection. |
O.REPLAY_DETECTION | The TOE mitigates the threat of data integrity violations by providing a mechanism to detect and discard replayed traffic for MPDUs. | |
T.NETWORK_ACCESS | O.PORT_FILTERING_MACSEC | The TOE’s port filtering capability reduces the threat of unauthorized access to devices in the TOE’s operational environment by restricting the flow of network traffic entering through the TOE interfaces based on layer 2 frame characteristics and whether or not the traffic represents valid MACsec frames and MKPDUs. |
T.UNTRUSTED_MACSEC_COMMUNICATION_CHANNELS | O.CRYPTOGRAPHIC_FUNCTIONS_MACSEC | The TOE mitigates the threat of unauthorized disclosure of information via untrusted thru traffic by providing MKA authentication functions to authorize endpoints. |
T.UNAUTHORIZED_ADMINISTRATOR_ACCESS (from NDcPP) | O.AUTHORIZED_ADMINISTRATION | The TOE further mitigates this threat originally defined in the Base-PP by defining additional management functions that require authorization and additional interfaces that can be used securely to execute management activities. |
T.UNDETECTED_ACTIVITY (from NDcPP) | O.SYSTEM_MONITORING_MACSEC | The TOE further mitigates this threat originally defined in the Base-PP by implementing measures to generate audit records for security-relevant events that are specific to the functionality defined by this PP-Module. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_MACSEC_EXT.1 | Session establishment | Secure Channel Identifier (SCI) |
FCS_MACSEC_EXT.3 | Creation and update of SAK | Creation and update times |
FCS_MACSEC_EXT.4 | Creation of CA | Connectivity Association Key Names (CKNs) |
FPT_RPL.1 | Detected replay attempt | None |
IEEE 802.1X-2010 specifies Management Information Base (MIB) objects for management functionality but configuration of management functions via other approved methods is acceptable. The ST author should select either the MIB object or provide the function used to achieve this management functionality.
If a selection containing “group CAK” is chosen in FCS_MKA_EXT.1.5, then “Cause key server to generate a new group CAK…” must be selected.
The following rationale provides justification for each security objective for the TOE, showing that the SFRs are suitable to meet and achieve the security objectives:
Objective | Addressed by | Rationale |
---|---|---|
O.AUTHENTICATION_MACSEC | FCS_MACSEC_EXT.4 | This SFR helps satisfy the TOE objective by defining the methods used for MACsec peer authentication and the handling of MACsec keys. |
FCS_MKA_EXT.1 | This SFR helps satisfy the TOE objective by defining the method used to perform MACsec key agreement. | |
FIA_PSK_EXT.1 | This SFR helps satisfy the TOE objective by defining requirements for the composition and use of PSKs that can be used for MACsec peer authentication. | |
FCS_DEVID_EXT.1 (selection-based) | This SFR helps satisfy the TOE objective by optionally implementing DevIDs as a method for authenticating MACsec peers. | |
FCS_EAPTLS_EXT.1 (selection-based) | This SFR helps satisfy the TOE objective by optionally implementing EAP-TLS as a method for authenticating MACsec peers. | |
O.AUTHORIZED_ADMINISTRATION | FMT_SMF.1/MACSEC | This SFR helps satisfy the TOE objective by defining management functions that are applicable to MACsec functionality. |
FPT_CAK_EXT.1 | This SFR helps satisfy the TOE objective by protecting data that could be used to compromise the security of remote administration. | |
FIA_AFL_EXT.1 (optional) | This SFR helps satisfy the TOE objective by optionally enforcing specific limitations on how the TSF throttles local authentication attempts to prevent brute-force impersonation. | |
FTP_TRP.1/MACSEC (optional) | This SFR helps satisfy the TOE objective by defining an optional method of remote administration for the management functionality defined in this PP-Module. | |
FMT_SNMP_EXT.1 (selection-based) | This SFR helps satisfy the TOE objective by defining how Simple Network Management Protocol (SNMP) must be securely implemented if it is used for remote administration. | |
O.CRYPTOGRAPHIC_FUNCTIONS_MACSEC | FCS_COP.1/CMAC | This SFR helps satisfy the TOE objective by defining the AES-CMAC algorithm that is used for MACsec communications. |
FCS_COP.1/MACSEC | This SFR helps satisfy the TOE objective by defining the AES Key Wrap algorithm that is used for MACsec communications. | |
FCS_MACSEC_EXT.2 | This SFR helps satisfy the TOE objective by implementing integrity protection for MACsec. | |
FCS_MACSEC_EXT.3 | This SFR helps satisfy the TOE objective by randomizing keys used for MACsec with sufficient entropy. | |
FTP_ITC.1/MACSEC | This SFR helps satisfy the TOE objective by defining the ability of the TOE to interact with external entities using MACsec, which is a cryptographically-secured communications channel. | |
FTP_TRP.1/MACSEC (optional) | This SFR helps satisfy the TOE objective by defining additional optional methods of secure remote administration for the TOE beyond those specified in the Base-PP. | |
FCS_SNMP_EXT.1 (selection-based) | This SFR helps satisfy the TOE objective by ensuring that SNMP, if implemented, is implemented securely using TLS. | |
O.PORT_FILTERING_MACSEC | FCS_MACSEC_EXT.1 | This SFR helps satisfy the TOE objective by implementing MACsec functionality in such a way that only authorized packet frames are permitted. |
FIA_PSK_EXT.1 | This SFR helps satisfy the TOE objective by using PSKs to determine which connections are authenticated and should therefore not be filtered. | |
FPT_DDP_EXT.1 (optional) | This SFR adds a time-based port filtering function. | |
O.REPLAY_DETECTION | FPT_RPL.1 | This SFR helps satisfy the TOE objective by requiring the TSF to detect and discard replayed MACsec traffic. |
FPT_RPL_EXT.1 (optional) | This SFR helps satisfy the TOE objective by optionally defining the ability of the TSF to use XPN for replay detection. | |
O.SYSTEM_MONITORING_MACSEC | FAU_GEN.1/MACSEC | This SFR helps satisfy the TOE objective by defining auditable events for security-relevant functions that are specific to this PP-Module. |
O.TSF_INTEGRITY | FPT_FLS.1 | This SFR helps satisfy the TOE objective by defining a fail-secure method that preserves the integrity of the TSF by ensuring that it does not operate when it’s in an insecure or unknown state. |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.DATA_INTEGRITY | The threat of data integrity compromise at the layer 2 level is a specific threat that can be countered by MACsec technology. |
T.NETWORK_ACCESS | The threat of a malicious entity accessing protected network resources without authorization is a specific example of the T.UNTRUSTED_COMMUNICATION_CHANNELS threat defined in the Base-PP. |
T.UNTRUSTED_MACSEC_COMMUNICATION_CHANNELS | The threat of disclosure of data in protected communications channels is the same as the T.UNTRUSTED_COMMUNICATION_CHANNELS threat in the NDcPP. This PP-Module expands on that by introducing additional logical interfaces (MACsec, SNMP) that this threat applies to. |
The objectives for the TOEs are consistent with the NDcPP based on the following rationale:
PP-Module TOE Objective | Consistency Rationale |
---|---|
O.AUTHENTICATION_MACSEC | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
O.AUTHORIZED_ADMINISTRATION | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
O.CRYPTOGRAPHIC_FUNCTIONS_MACSEC | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
O.PORT_FILTERING_MACSEC | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
O.REPLAY_DETECTION | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
O.SYSTEM_MONITORING_MACSEC | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
O.TSF_INTEGRITY | The Base-PP does not define any TOE objectives so PP-Module objectives do not conflict with it. |
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
This PP-Module does not modify any requirements when the NDcPP is the base. | |
Additional SFRs | |
This PP-Module does not levy any addition requirements when the NDcPP is the base. | |
Mandatory SFRs | |
FAU_GEN.1/MACSEC | This SFR is an iteration of a Base-PP requirement that defines additional auditable events for MACsec functionality that the Base-PP could not be expected to cover. |
FCS_COP.1/CMAC | This PP-Module iterates an SFR defined in the Base-PP to define new cryptographic operations that are specific to the protocols defined in the PP-Module. |
FCS_COP.1/MACSEC | This PP-Module iterates an SFR defined in the Base-PP to define new cryptographic operations that are specific to the protocols defined in the PP-Module. |
FCS_MACSEC_EXT.1 | This SFR applies to MACsec functionality, which is beyond the original scope of the Base-PP. |
FCS_MACSEC_EXT.2 | This SFR applies to MACsec functionality, which is beyond the original scope of the Base-PP. |
FCS_MACSEC_EXT.3 | This SFR applies to MACsec functionality, which is beyond the original scope of the Base-PP. |
FCS_MACSEC_EXT.4 | This SFR applies to MACsec functionality, which is beyond the original scope of the Base-PP. |
FCS_MKA_EXT.1 | This SFR applies to a MACsec peer authentication mechanism, which is beyond the original scope of the Base-PP, though it is based on the TLS implementation specified in the Base-PP. |
FIA_PSK_EXT.1 | This SFR applies to PSKs for MKA, which is beyond the original scope of the Base-PP. |
FMT_SMF.1/MACSEC | This SFR applies to management functions related to MACsec, which is beyond the original scope of the Base-PP. |
FPT_CAK_EXT.1 | This SFR requires that keys specific to MACsec be protected. This is similar to FPT_SKP_EXT.1 in the Base-PP but applies to keys that were beyond the original scope of the Base-PP. |
FPT_FLS.1 | This SFR requires the TSF to react in a specific manner upon failure of specific self-tests. The Base-PP defines FPT_TST_EXT.1 for self-test functionality, but does not define specific self-tests. This PP-Module implies that certain self-tests must be done at minimum, but this does not conflict with what is permitted by the Base-PP. |
FPT_RPL.1 | This SFR applies to replay detection functionality, which is beyond the original scope of the Base-PP. |
FTP_ITC.1/MACSEC | This PP-Module defines an additional trusted channel function for MACsec communications, which is beyond the original scope of the Base-PP. |
Optional SFRs | |
FIA_AFL_EXT.1 | This SFR defines a specific authentication limiting mechanism that exists on top of what FIA_AFL.1 in the Base-PP may also require. |
FPT_DDP_EXT.1 | Data delay protection uses packet counting information from MKA packets to drop differentially delayed MACsec packets at the receiver. |
FPT_RPL_EXT.1 | This SFR applies to replay detection functionality, which is beyond the original scope of the Base-PP. |
FTP_TRP.1/MACSEC | This PP-Module defines an optional method of administration for MACsec functionality using trusted protocols that are not defined in the Base-PP. As this functionality is optional, a conformant TOE may also use the Base-PP’s trusted path to administer these functions. |
Objective SFRs | |
This PP-Module does not define any Objective requirements. | |
Implementation-based SFRs | |
This PP-Module does not define any Implementation-based requirements. | |
Selection-based SFRs | |
FCS_DEVID_EXT.1 | This SFR applies to a MACsec peer authentication mechanism, which is beyond the original scope of the Base-PP. |
FCS_EAPTLS_EXT.1 | This SFR applies to a MACsec peer authentication mechanism, which is beyond the original scope of the Base-PP, though it is based on the TLS implementation specified in the Base-PP. |
FCS_SNMP_EXT.1 | This SFR applies to implementation of the SNMP protocol, which is beyond the original scope of the Base-PP, though it is based on the TLS implementation specified in the Base-PP. |
FMT_SNMP_EXT.1 | This SFR defines requirements for use of SNMP as a management interface, which is beyond the original scope of the Base-PP. |
If this SFR is selected, the FCS_(D)TLSC_EXT or FCS_(D)TLSS_EXT SFRs from the Base-PP must be included.
RFC 8996 deprecates TLS 1.1.
If this SFR is selected, the appropriate FCS_(D)TLSC_EXT and FCS_(D)TLSS_EXT SFRs from the Base-PP must be included.
Functional Class | Functional Components |
---|---|
Cryptographic Support (FCS) | |
FCS_MACSEC_EXT - MACsec | |
FCS_MKA_EXT - MACsec Key Agreement | |
FCS_DEVID_EXT - Secure Device Identifiers | |
FCS_EAPTLS_EXT - EAP-TLS Protocol | |
FCS_SNMP_EXT - SNMP Protocol | |
Identification and Authentication (FIA) | |
FIA_PSK_EXT - Pre-Shared Key Composition | |
FIA_AFL_EXT - Authentication Failure Handling | |
Protection of the TSF (FPT) | |
FPT_CAK_EXT - Protection of CAK Data | |
FPT_DDP_EXT - Data Delay Protection | |
FPT_RPL_EXT - Replay Protection | |
Security Management (FMT) | |
FMT_SNMP_EXT - SNMP Management |
FCS_MACSEC_EXT.1, MACsec, requires the TSF to implement MACsec in a specified manner.
FCS_MACSEC_EXT.2, MACsec Integrity and Confidentiality, requires the TSF to implement MACsec with support for integrity and confidentiality protection.
FCS_MACSEC_EXT.3, MACsec Randomness, requires the TSF to generate keys and key data using sufficient randomness.
FCS_MACSEC_EXT.4, MACsec Key Usage, requires the TSF to specify the supported methods of MACsec peer authentication and to define the lifecycle for keys used in support of this.
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: No other components.
Dependencies to: No dependencies.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: No other components.
Dependencies to: FCS_MACSEC_EXT.1 MACsec
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: No other components.
Dependencies to: FCS_MACSEC_EXT.1 MACsec
FCS_RBG_EXT.1 Random Bit Generation
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: No other components.
Dependencies to: FCS_COP.1 Cryptographic Operation
FCS_MACSEC_EXT.1 MACsec
FIA_PSK_EXT.1 Pre-Shared Key Composition
FCS_MKA_EXT.1, MACsec Key Agreement, defines the TSF’s implementation of the Key Agreement Protocol.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: No other components.
Dependencies to: FCS_MACSEC_EXT.1 MACsec
FCS_DEVID_EXT.1, Secure Device Identifiers, requires the TSF to implement and use DevIDs according to acceptable standards.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: No other components.
Dependencies to: FCS_EAPTLS_EXT.1 EAP-TLS Protocol
FCS_EAPTLS_EXT.1, EAP-TLS Protocol, requires the TSF to implement EAP and EAP-TLS according to appropriate standards.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: No other components.
Dependencies to: [(FCS_DTLSC_EXT.1 DTLS Client Protocol and
FCS_DTLSC_EXT.2 DTLS Client Support for Mutual Authentication), or
FCS_DTLSS_EXT.1 DTLS Server Protocol and
FCS_DTLSS_EXT.2 DTLS Server Support for Mutual Authentication), or
(FCS_TLSC_EXT.1 TLS Client Protocol and
FCS_TLSC_EXT.2 TLS Client Support for Mutual Authentication), or
FCS_TLSS_EXT.1 TLS Server Protocol and
FCS_TLSS_EXT.2 TLS Server Support for Mutual Authentication)]
FCS_SNMP_EXT.1, SNMP Protocol, requires the TSF to implement and support SNMP using TLS using only algorithms that meet certain standards.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: No other components.
Dependencies to: [(FCS_DTLSC_EXT.1 DTLS Client Protocol and
FCS_DTLSC_EXT.2 DTLS Client Support for Mutual Authentication), or
FCS_DTLSS_EXT.1 DTLS Server Protocol and
FCS_DTLSS_EXT.2 DTLS Server Support for Mutual Authentication), or
(FCS_TLSC_EXT.1 TLS Client Protocol and
FCS_TLSC_EXT.2 TLS Client Support for Mutual Authentication), or
FCS_TLSS_EXT.1 TLS Server Protocol and
FCS_TLSS_EXT.2 TLS Server Support for Mutual Authentication)]
FIA_PSK_EXT.1, Pre-Shared Key Composition, defines the TSF’s uses for PSKs and how they are obtained by the TOE.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: No other components.
Dependencies to: No dependencies
FIA_AFL_EXT.1, Authentication Attempt Limiting, requires the TSF to limit the rate of login attempts to a certain interval after a certain number of failed authentication attempts have occurred.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: No other components.
Dependencies to: FIA_UAU.1 Timing of Authentication
FPT_CAK_EXT.1, Protection of CAK Data, requires the TSF to prevent administrators from being able to read the CAK values.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: No other components.
Dependencies to: No dependencies
FPT_DDP_EXT.1, Data Delay Protection, requires the TSF to use MKA PN information to enforce a data delay protection check of two seconds on MACsec protected frames.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: No other components.
Dependencies to: FCS_MACSEC_EXT.4 MACsec Key Usage
FCS_MKA_EXT.1 MACsec Key Agreement
FPT_RPL_EXT.1, Replay Protection for XPN, requires the TSF to support XPN as a method for detection of replayed traffic.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: No other components.
Dependencies to: FCS_COP.1 Cryptographic Operation
FMT_SNMP_EXT.1, SNMP Management, requires the TSF to implement SNMP with (D)TLS in conformance with specific standards for use as a management interface.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: No other components.
Dependencies to: FCS_SNMP_EXT.1 SNMP Protocol
Requirement | Rationale for Satisfaction |
FIA_UAU.1 – Timing of Authentication | FIA_AFL_EXT.1 has a dependency on FIA_UAU.1 because the notion of authentication failure handling implies the existence of an authentication mechanism. This dependency is addressed by a conformant TOE through the Base-PP requirement FIA_UAU_EXT.2, which defines authentication mechanisms specific to network devices. |
Requirement | Description | Distributed TOE SFR Allocation |
FAU_GEN.1/MACSEC | Audit Data Generation (MACsec) | All |
FCS_COP.1/CMAC | Cryptographic Operation (AES-CMAC Keyed Hash Algorithm) | Feature Dependent |
FCS_COP.1/MACSEC | Cryptographic Operation (MACsec AES Data Encryption and Decryption) | Feature Dependent |
FCS_MACSEC_EXT.1 | MACsec | Feature Dependent |
FCS_MACSEC_EXT.2 | MACsec Integrity and Confidentiality | Feature Dependent |
FCS_MACSEC_EXT.3 | MACsec Randomness | Feature Dependent |
FCS_MACSEC_EXT.4 | MACsec Key Usage | Feature Dependent |
FCS_MKA_EXT.1 | MACsec Key Agreement | Feature Dependent |
FIA_PSK_EXT.1 | Pre-Shared Key Composition | Feature Dependent |
FMT_SMF.1/MACSEC | Specification of Management Functions (MACsec) | One |
FPT_CAK_EXT.1 | Protection of CAK Data | Feature Dependent |
FPT_FLS.1 | Failure with Preservation of Secure State | All |
FPT_RPL.1 | Replay Detection | Feature Dependent |
FPT_ITC.1/MACSEC | Inter-TSF Trusted Channel (MACsec Communications) | Feature Dependent |
FIA_AFL_EXT.1 | Authentication Attempt Limiting | One |
FPT_DDP_EXT.1 | Data Delay Protection | Feature Dependent |
FPT_RPL_EXT.1 | Replay Detection for XPN | Feature Dependent |
FTP_TRP.1/MACSEC | Trusted Path (MACsec Administration) | One |
FCS_DEVID_EXT.1 | Secure Device Identifiers | Feature Dependent |
FCS_EAPTLS_EXT.1 | EAP-TLS Protocol | Feature Dependent |
FCS_SNMP_EXT.1 | SNMP Protocol | Feature Dependent |
FMT_SNMP_EXT.1 | SNMP Management | Feature Dependent |
Acronym | Meaning |
---|---|
Base-PP | Base Protection Profile |
CA | Connectivity Association |
CAK | Connectivity Association Key |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
CKN | Connectivity Association Key Name |
CMAC | Cipher-based Message Authentication Code |
cPP | Collaborative Protection Profile |
DevID | Device Identifier |
EA | Evaluation Activity |
EAP | Extensible Authentication Protocol |
EAP-TLS | EAP Transport Layer Security |
EAPOL | Extensible Authentication Protocol over LAN |
EPL | Ethernet Private Line |
EVPL | Ethernet Virtual Private Line |
ICK | Integrity Check Value Key |
ICV | Integrity Check Value |
IEEE | Institute of Electrical and Electronics Engineers |
IV | Initialization Vector |
KaY | Key Agreement Entity |
KDF | Key Derivation Function |
KW | Key Wrap |
LAN | Local Area Network |
MAC | Media Access Control |
MACsec | Media Access Control Security |
MEF | Metro Ethernet Forum |
MIB | Management Information Base |
MKA | MACsec Key Agreement |
MKPDU | MACsec Key Agreement Protocol Data Unit |
MPDU | MACsec Protocol Data Unit |
NDcPP | collaborative Protection Profile for Network Devices |
OE | Operational Environment |
P2P | Point-to-Point |
PAE | Port Access Entity |
PN | Packet Number |
POST | Power On Self Test |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
PSK | Pre-Shared Key |
RFC | Request for Comment |
SA | Secure Association |
SAK | Secure Association Key |
SAR | Security Assurance Requirement |
SC | Secure Channel |
SCI | Secure Channel Identifier |
SFR | Security Functional Requirement |
SNMP | Simple Network Management Protocol |
ST | Security Target |
TOE | Target of Evaluation |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |
UNI | User Network Interface |
VLAN | Virtual Local Area Network |
XPN | Extended Packet Numbering |
Identifier | Title |
---|---|
[CC] | Common Criteria for Information Technology Security Evaluation -
|
[MOD_FW] | PP-Module for Stateful Traffic Filter Firewalls, Version 1.4 + Errata 20200625, June 25, 2020 |
[MOD_VPNGW] | PP-Module for VPN Gateways, Version 1.2, March 31, 2022 |
[NDcPP SD] | Supporting Document - Evaluation Activities for Network Device cPP, Version 2.2, December 2019 |
[NDcPP] | collaborative Protection Profile for Network Devices, Version 2.2e, March 23, 2020 |