| Common Criteria Evaluation and Validation SchemeNational Information
Assurance Partnership (NIAP) |
Title: Some PP NameMaintained by: NIAP and CESGUnique Identifier: 42Version: 1.0Status: draftDate of issue: 19 March 2015Approved by: Supersedes: Background and Purpose
This section sets the context for not only the ESR, but what is
expected of the resulting Protection Profile (PP). The intent is
that the remaining sections provide succinct statements that
highlight the relevant aspects to be addressed by the Technical
Community (TC) constructing the PP. Here, the authors provide a
narrative that introduces the reader to the problem being solved,
and presents key aspects that support or guide the TC, and may
elaborate on subtleties not apparent in the “bulleted” high level
statements.
Use Cases
This section is intended to provide the initial scope/bound of the
security problem by providing the reader with concise statements
regarding the scenarios in which the technology is being used. The
intended usage presented here should lay the groundwork for the
identifying the resources to be protected, and what threats must be
considered in the drafting of the Essential Security Requirements
(ESR) and for the TC to consider when writing the PP.
Resources to be protected
This section is intended to provide the initial scope/bound of the
security problem by providing the reader with concise statements
regarding the scenarios in which the technology is being used. The
intended usage presented here should lay the groundwork for the
identifying the resources to be protected, and what threats must be
considered in the drafting of the Essential Security Requirements
(ESR) and for the TC to consider when writing the PP.
Attacker access
The following assumptions are made about
attackers' ability to develop attacks:
- An attacker has an arbitrary amount of time to analyze the behavior of the product, its
interaction with its platform, and the data it transmits over the network.
- An attacker is able to acquire their own copy of the target product and study its
behavior on a platform that they control.
The attacker is expected to engage in the following general classes of attack:
- Network eavesdropping, in which an attacker may monitor and gain access to data
exchanged between the product and other endpoints.
- Network attack, in which an attacker may initiate malicious communications with the
product or alter communications between the product and other endpoints.
- Local attack, in which an attacker has gained the ability to execute code on the
system, which may be used to escalate privilege or access data without
authorization.
- Limited physical access attack, in which an attacker may attempt to access data on
the system by virtue of being physically present for a limited period of time. This
limited physical access does not include attacks in which the attacker could
disassemble the system to gain access to its storage media or manipulate the product's
underlying hardware and firmware. Systems used for working remotely, such as laptops
and tablets, for which an attacker could gain longer physical access to, should
apply additional protections that are provided by products evaluated against other
Protection Profiles (e.g. FDE cPP).
- Persistence, in which an attacker has already exploited the system and wishes to
maintain presence on the system.
Essential Security Requirements
This is where the authors present an initial set of English
requirements that specify security functionality, rather than
design and/or implementation characteristics. These requirements
will provide the foundation for which the detailed set of
requirements is derived. It is important that the requirements
captured here make an attempt to fully address the categories
(e.g., access control, identification and authentication,
management capabilities, roles of administration, secure
communications, and audit). That's not to say the requirements are
fully specified or detailed enough to simply translate to Common
Criteria security functional requirements. The goal is that there
is enough information contained here, as well as the other sections
of this document, to provide the TC enough information to ensure
they have an understanding of what is minimally required in breath.
Assumptions
Simply put, this section presents the aspects of the product and
its intended environment that can be assumed to hold true. This
will provide additional scope on the resulting PP.
The following assumptions are made for the operating system product and its operational
environment:
- The underlying platform is physically protected, to a large extent. The hardware
that the product manages is secured by defensive measures that make physical attacks
impractical for most attackers. At the same time, casual passersby might attempt to
trivially access the system.
- The product implements some security-relevant functionality that does not require
evaluation (e.g., network time synchronization, process scheduling, and virtual
memory management including process separation).
- Depending on configuration and capability, the product may or may not be:
- configuration-managed by the enterprise
- bound to directory services to support multi-user login
- The product runs application software developed by a third-party. The applications are
not intentionally developed to be malicious, but can contain inadvertent coding
errors. These errors introduce risk that control of an application may be seized by
a malicious entity. The product shall confine these applications within the originally
designated operating environment.
- The platform is connected to a network. For purposes of sending/receiving data, to
include software updates, the platform is connected to other entities. Other
entities on the network are not inherently trustable.
- Administrators are not malicious in nature.
- Users are not malicious in nature, though they may inadvertently or intentionally engage in risky behavior.
Optional Extensions
Additional security functionality that may
be appropriate for some use cases, and can be expressed in extensions to this document,
includes:
Outside the TOE's Scope
The following list contains items that are explicitly out-of-scope for any evaluation
against the product PP
- Malicious, Highly-Privileged Administrators - Highly-privileged administrators
acting maliciously can disable most, if not all, security protections on the product.
Additionally procedural controls that are out of scope of this document should be
considered to help highlight administrator accounts acting suspiciously.
- Zero Days - The disclosure of recently published vulnerabilities (Zero Days) should
not be used as a reason to fail an product undergoing evaluation.
- Unofficial Versions - Non-vendor supplied install images often contain added
functionality and may weaken the normal operating functionality of the product
- Platform - The product PP shall not address the hardware or firmware of its underlying
platform to include the boot sequence before control is handed off to the product. That
the platform itself is virtual or physical is irrelevant to any evaluations.
- Applications - The product PP shall not address applications that are not delivered as
part of the product installation process.