Version | Date | Comment |
---|---|---|
1.0 | 2014-05-16 | Initial draft |
1.1 | 2016-07-07 | Formatting updates and changes based on TC feedback |
1.2 | 2016-10-26 | Updates based on additional TC feedback and internal review |
2.0 | 2016-10-28 | Second draft |
2.1 | 2017-12-01 | Updates based on first use in evaluation |
2.1x | 2020-07-10 | Converted to XML |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility, accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base Protection Profiles. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
The security functionality of the product under evaluation. | |
A description of how a TOE satisfies the SFRs in an ST. | |
Target of Evaluation (TOE) | The product under evaluation. |
Administrator | The Administrator is responsible for management activities, including configuration of the CA and its security functions. |
Authorized Organizational Representative (AOR) | An optional privileged user role which is delegated authority by the Certification Authority Staff or RA Staff to manage a restricted set of certificates associated to devices belonging to a particular organization |
Certificate Management over CMS. A standard certificate enrollment protocol. | |
Certificate Profile | A set of configuration parameters that defines everything associated with a type of certificate, in particular the contents (fields and extensions) of the generated certificate. |
Certification Authority (CA) | The set of hardware, software, firmware, or some combination thereof, that issues, revokes, and manages public key certificates and certificate status information. |
Compromise | The unauthorized disclosure, modification, substitution or use of sensitive data (including plaintext cryptographic keys and other CSPs). |
Confidentiality | The property that sensitive information is not disclosed to unauthorized individuals, entities or processes. |
Critical Security Parameter (CSP) | Security-related information (e.g., secret and private cryptographic keys, authentication data such as passwords and PINs) appearing in plaintext or otherwise unprotected form and whose disclosure or modification can compromise the security of a CA or the security of the information protected by the CA. |
Cryptographic key |
A parameter used in conjunction with a cryptographic algorithm that determines:
|
Data Encryption Key (DEK) | A key used to encrypt data-at-rest. |
Digital Signature | A non-forgeable transformation of data that allows proof of the source (with nonrepudiation) and verification of the integrity of that data. |
Encrypted key | A cryptographic key that has been encrypted with a key encrypting key, a PIN or a password in order to disguise the value of the underlying plaintext key. |
Error detection code (EDC) | A code computed from data and comprised of redundant bits of information designed to detect, but not correct, unintentional changes in the data. |
Integrity | The property that sensitive data has not been modified or deleted in an unauthorized and undetected manner. |
Key Encryption Key (KEK) | A key used to encrypt other keys, such as DEKs, or storage that contains keys. |
Key sharing | A multi-party computation (MPC) mechanism that allows two or more parties, each with key components, to jointly produce a plaintext key without revealing any of the key components. |
Private key | A cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity, and not made public. |
Privileged user | An individual with access and login privileges on the CA. |
Public key | A cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity, and which may be made public. (Public keys are not considered CSPs.) |
Public key (asymmetric) cryptographic algorithm | A cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that, given the public key, it is computationally infeasible to derive the private key. |
Public key certificate | A set of data that unambiguously identifies an entity, contains the entity's public key, is digitally signed by a trusted party, and binds the public key to the entity. |
Registration Authority (RA) | The set of hardware, software, firmware, or some combination thereof that is used to validate the identity of a subscriber before instructing the CA to manipulate a certificate on the subscriber’s behalf. |
Root Encryption Key (REK) | A key tied to hardware that is used to encrypt other keys such as KEKs. |
Secret key | A cryptographic key used with a secret key cryptographic algorithm, uniquely associated with one or more entities, and which shall not be made public. The use of the term "secret" in this context does not imply a classification level rather the term implies the need to protect the key from disclosure or substitution. |
Secret key (symmetric) cryptographic algorithm | A cryptographic algorithm that uses a single, secret key for both encryption and decryption. |
A token used by the CMC protocol to help provide identity proofing. | |
Subscriber | A human or machine entity that is bound to one or more certificates maintained by the CA. |
Trust Anchor Database | A list of trusted root Certification Authority certificates. |
Threat, Assumption, or OSP | Security Objectives | Rationale |
T.PRIVILEGED_USER_ERROR | O.AUDIT_LOSS_RESPONSE | The TOE will respond to possible loss of audit records when audit trail storage is full or nearly full by restricting auditable events. |
O.AUDIT_PROTECTION | The TOE will protect audit records against unauthorized access, modification, or deletion to ensure accountability of user actions. | |
O.SESSION_LOCK | The TOE will provide mechanisms that mitigate the risk of unattended sessions being hijacked. | |
O.TOE_ADMINISTRATION | The TOE will provide mechanisms to ensure that only privileged users are able to log in and configure the TOE, and provide protections for logged-in users. The TOE will ensure that administrative responsibilities are separated across different roles in order to mitigate the impact of improper administrative activities or unauthorized administrative access. | |
T.TSF_FAILURE | O.TSF_SELF_TEST | The TOE will provide the capability to test some subset of its security functionality to ensure it is operating properly. The TOE will provide integrity protection to detect modifications to firmware, software, and archived data. |
T.UNAUTHENTICATED_TRANSACTIONS | O.CERTIFICATES | The TSF must ensure that certificates, certificate revocation lists, and certificate status information are valid. |
O.CONFIGURATION_MANAGEMENT | The TOE will conduct configuration management to assure identification of system connectivity (software, hardware, and firmware), and components (software, hardware, and firmware), auditing of configuration data, and controlling changes to configuration items. | |
O.INTEGRITY_PROTECTION | The TOE will provide appropriate integrity protection for TSF data and software and any user data stored by the TOE. | |
O.NON_REPUDIATION | The TOE will prevent a subscriber from avoiding accountability for sending a message by providing evidence that the subscriber sent the message; and control communications from unknown source. | |
T.UNAUTHORIZED_ACCESS | O.PROTECTED_COMMUNICATIONS | The TOE will provide protected communication channels for administrators, other parts of a distributed TOE, and authorized IT entities. The TOE will protect data assets when they are being transmitted to and from the TOE, including through intervening untrusted components. |
O.SESSION_LOCK | The TOE will provide mechanisms that mitigate the risk of unattended sessions being hijacked. | |
O.TOE_ADMINISTRATION | The TOE will provide mechanisms to ensure that only privileged users are able to log in and configure the TOE, and provide protections for logged-in users. The TOE will ensure that administrative responsibilities are separated across different roles in order to mitigate the impact of improper administrative activities or unauthorized administrative access. | |
T.UNAUTHORIZED_UPDATE | O.VERIFIABLE_UPDATES | The TOE will provide the capability to help ensure that any updates to the TOE can be verified by the administrator to be unaltered and from a trusted source. |
T.UNDETECTED_ACTIONS | O.AUDIT_LOSS_RESPONSE | The TOE will respond to possible loss of audit records when audit trail storage is full or nearly full by restricting auditable events |
O.AUDIT_PROTECTION | The TOE will protect audit records against unauthorized access, modification, or deletion to ensure accountability of user actions. | |
O.SYSTEM_MONITORING | The TOE will provide the capability to generate audit data and send those data to an external IT entity. The TOE will record in audit records: date and time of action and the entity responsible for the action. | |
T.USER_DATA_REUSE | O.RESIDUAL_INFORMATION_CLEARING | The TOE will ensure that any data contained in a protected resource is not available when the resource is reallocated. |
T.WEAK_CRYPTO | O.PROTECTED_COMMUNICATIONS | The TOE will provide protected communication channels for administrators, other parts of a distributed TOE, and authorized IT entities. The TOE will protect data assets when they are being transmitted to and from the TOE, including through intervening untrusted components. |
O.VERIFIABLE_UPDATES | The TOE will provide the capability to help ensure that any updates to the TOE can be verified by the administrator to be unaltered and from a trusted source. | |
A.NO_GENERAL_PURPOSE | OE.NO_GENERAL_PURPOSE | There are no general-purpose computing capabilities (e.g., compilers or user applications) available on the TOE, other than those services necessary for the operation, administration and support of the TOE. |
A.PHYSICAL | OE.PHYSICAL | Physical security, commensurate with the value of the TOE and the data it contains, is provided by the environment. |
A.TRUSTED_ADMIN | OE.TRUSTED_ADMIN | The administrator of the TOE is not careless, willfully negligent or hostile, and administers the software within compliance of the applied enterprise security policy. |
P.ACCESS_BANNER | O.DISPLAY_BANNER | The TOE will display an advisory warning regarding use of the TOE. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_ADP_EXT.1 | No events specified | |
FAU_GCR_EXT.1 | No events specified | |
FAU_GEN.1 | No events specified | |
FAU_GEN.2 | No events specified | |
FAU_STG.4 | No events specified | |
FAU_STG_EXT.1 | No events specified | |
FCO_NRO_EXT.2 | No events specified | |
FCS_CDP_EXT.1 | No events specified | |
FCS_STG_EXT.1 | No events specified | |
FDP_CER_EXT.1 | Certificate generation: Success. | Certificate value or object identifier. |
FDP_CER_EXT.2 | Linking of certificate to certificate request: Success | Certificate value or object identifier Certificate request or link to certificate request object identifier |
FDP_CER_EXT.2 | Linking of certificate to certificate request: Failure | Reason for failure Certificate request or link to certificate request object identifier |
FDP_CER_EXT.3 | Failed certificate approvals | Reason for failure Certificate request or link to certificate request object identifier |
FDP_CSI_EXT.1 | No events specified | |
FDP_RIP.1 | No events specified | |
FIA_UAU_EXT.1 | All uses of the authentication mechanism used for access to TOE related functions | Origin of the attempt (e.g., IP address) |
FIA_UIA_EXT.1 | All use of the identification and authentication mechanism used for TOE-related roles | Provided user identity. Origin of the attempt (e.g., IP address) |
FIA_X509_EXT.1 | Failed certificate validations | |
FIA_X509_EXT.2 | Failed authentications | |
FMT_MOF.1/1 | No events specified | |
FMT_MOF.1/2 | No events specified | |
FMT_MOF.1/3 | No events specified | |
FMT_MOF.1/4 | No events specified | |
FMT_MOF.1/5 | No events specified | |
FMT_MTD.1 | No events specified | |
FMT_SMF.1 | No events specified | |
FMT_SMR.2 | Modifications to the group of users that are part of a role | Modifications to the group of users that are part of the role |
FPT_FLS.1 | Invocation of failures under the requirement | Indication that the TSF has failed with the type of failure that occurred |
FPT_KST_EXT.1 | No events specified | |
FPT_KST_EXT.2 | All unauthorized attempts to use the TOE secret abnd private keys. | Identifier of user or process that attempted access. |
FPT_RCV.1 | The fact that a faiure of service discontinuity occurred. | |
FPT_RCV.1 | Resumption of the regular operation. | TSF failure types that are available on recovery. |
FPT_SKP_EXT.1 | No events specified | |
FPT_STM.1 | Changes to the time | The new and old values for the time. |
FPT_TUD_EXT.1 | Initiation of update. | Version number |
FTA_SSL.4 | The termination of an interactive section. | |
FTA_TAB.1 | No events specified | |
FTP_TRP.1 | Initiation of the trusted channel. | Identification of the claimed user identity |
FTP_TRP.1 | Termination of the trusted channel. | Identification of the claimed user identity |
FTP_TRP.1 | Failures of the trusted path functions. | Identification of the claimed user identity |
The following rationale provides justification for each security objective for the TOE,
showing that the SFRs are suitable to meet and achieve the security objectives:
OBJECTIVE | ADDRESSED BY | RATIONALE |
---|---|---|
O.AUDIT_LOSS_RESPONSE | FAU_ADP_EXT.1 | Requires the TSF to implement or support audit functionality. |
FAU_STG.4 | Prevents audited events if the audit trail cannot be written to. | |
O.AUDIT_PROTECTION | FAU_ADP_EXT.1 | Requires the TSF to implement or support audit functionality. |
FAU_STG.1(1) | Requires the TSF protect audit records from unauthorized deletion. | |
FAU_STG.1(2) | Requires that audit records with retentaion requirements be retained for the appropriate period. | |
FAU_STG_EXT.2 | Specifies rules for the retention of audit data. | |
O.CERTIFICATES | FDP_CER_EXT.1 | Requires that the TSF support configured certifcate profiles. |
FDP_CER_EXT.2 | Requires that TSF associate certificate requests with certificates. | |
FDP_CER_EXT.3 | Requires that the TSF support approval of certificates against profiles. | |
FDP_CER_EXT.4 | (Optional) Requires that non-v3 certificates have certain characteristics. | |
FDP_CRL_EXT.1 | Specifies contents for certificate revocation lists. | |
FDP_CSI_EXT.1 | Requires that the TSF provide formatted certificatee status information. | |
FDP_OCSPG_EXT.1 | Specifies the contents of OCSP response messages. | |
FDP_SDP_EXT.1 | (Optional) Requires that the TSF protect certain information through encryption. | |
FDP_STG_EXT.1 | (OPtional) Requires that the TSF protect trusted public keys and certificates. | |
FIA_CMCS_EXT.1 | Defines the types of CMC reuests handled by the TSF. | |
FIA_ESTS_EXT.1 | Specifies requirements for EST enrollment requests. | |
FIA_X509_EXT.1 | Requires the TSF support validation of cerficates according to a set of rules. | |
FIA_X509_EXT.2 | Requires that the TOE use X.509 certificates for code signing and other purposes. | |
FPT_NPE_EXT.1 | (Optional) Requires the TSF enforce rules for submitting NPE certificate requests. | |
O.CONFIGURATION_MANAGEMENT | FDP_CER_EXT.1 | Requires that the TSF support configured certifcate profiles. |
FDP_CER_EXT.4 | (Optional) Requires that non-v3 certificates have certain characteristics. | |
FDP_CRL_EXT.1 | Specifies contents for certificate revocation lists. | |
FDP_OCSPG_EXT.1 | Specifies the contents of OCSP response messages. | |
FMT_MOF.1(1) | Defines management functions to be performed exclusively by Administrators. | |
FMT_MOF.1(2) | Defines management functions to be performed by CA or RA Staff. | |
FMT_MOF.1(3) | Defines management functions to be performed by CA Staff. | |
FMT_MOF.1(4) | Defines management functions to be performed by Administrators, Auditr, or CA Staff. | |
FMT_MOF.1(5) | Defines management functions to be performed by auditors. | |
FMT_MTD.1 | Requires that only priviledged users manage TSF data. | |
FPT_NPE_EXT.1 | (Optional) Requires the TSF enforce rules for submitting NPE certificate requests. | |
O.DISPLAY_BANNER | FTA_TAB.1 | Requires display of a consent banner prior to establishment of a user session. |
O.INTEGRITY_PROTECTION | FCS_CDP_EXT.1 | Requires that the TSF implements or invokes cryptographic functionality. |
FCS_CKM_EXT.5 | Requires that the TSF protect public keys from modification. | |
FDP_ITT.1 | Requires that the TSF protect user data during transmission between physically separate parts of the TOE. | |
FPT_ITT.1 | Requires that the TSF protect data transmissed between different parts of the TOE. | |
FPT_TST_EXT.1 | (Optional) Requires the TSF ensure the integrity of TOE software and firmware. | |
FPT_TST_EXT.2 | (Optional) Requires the TSF ensure the integrity of certain data relevant to TOE security. | |
O.NON_REPUDIATION | FCO_NRO_EXT.2 | Requires that the TSF provide proof of origin for certificates it issues. |
FCO_NRR_EXT.2 | Requires that the TSF provide certificate-based proof of receipt. | |
FIA_CMCC_EXT.1 | Specifies requirements for CMC requests and responses. | |
FIA_ESTC_EXT.1 | Specifies requirements for client-side EST enrollment requests. | |
O.PROTECTED_COMMUNICATIONS | FCS_CDP_EXT.1 | Requires that the TSF implements or invokes cryptographic functionality. |
FCS_CKM.1 | Specifies allowable algorithms for generation of assymmetric keys. | |
FCS_CKM.2 | Specifies allowable algorithms for key establishment. | |
FCS_CKM_EXT.1(1) | Specifies requirements for assymmetric key generation. | |
FCS_CKM_EXT.1(2) | Specifies requirements for generation of KEKs. | |
FCS_CKM_EXT.1(3) | Specifies requirements for assymmetric KEKs. | |
FCS_CKM_EXT.1(4) | Specifies requirements for key shares. | |
FCS_CKM_EXT.4 | Specifies requirements for cryptographic key destruction. | |
FCS_CKM_EXT.7 | Requires support for a hardware-protected REK. | |
FCS_CKM_EXT.8 | Requires that the TSF provide a traceable hierarchy of keys. | |
FCS_COP.1(1) | Defines permissible AES encryption algorithms and key sizes. | |
FCS_COP.1(2) | Defines permissible cryptographic signature algorithms. | |
FCS_COP.1(3) | Defines permissible cryptographic hash algorthms and sizes. | |
FCS_COP.1(4) | Defines permissible keyed-hash message authentication algorithms. | |
FCS_COP.1(5) | (Optional) Requires the TSF to support password-based key derivation. | |
FCS_HTTPS_EXT.1 | Requires that the TSF implement HTTPS over TLS. | |
FCS_IPSEC_EXT.1 | Specifies requirements for the TSF implementation of IPsec. | |
FCS_RBG_EXT.1 | Requires that the TSF have access to DRBG services. | |
FCS_STG_EXT.1 | Requires secure storage of private and secret keys. | |
FCS_TLSC_EXT.1 | Specifies requirements for the client-side implementation of TLS. | |
FCS_TLSS_EXT.1 | Specifies requirements for the server-side implementation of TLS. | |
FDP_ITT.1 | Requires that the TSF protect user data during transmission between physically separate parts of the TOE. | |
FIA_PSK_EXT.1 | Defines requiremetns for pre-shared keys used by the TSF. | |
FPT_ITT.1 | Requires that the TSF protect data transmissed between different parts of the TOE. | |
FPT_KST_EXT.1 | Requires that the TSF prevent export of plaintext keys. | |
FPT_KST_EXT.2 | Requires that the TSF prevent unauthorized use of provate and secret keys. | |
FPT_SKP_EXT.1 | Requires that the TSF be able to prevent reading of pre-shared, private and secret keys. | |
FPT_SKY_EXT.1 | (Optional) Requires two-party control for certain specified actions. | |
FPT_SKY_EXT.2 | Requires that key shares be accessible only by priviledged users. | |
FTP_ITC.1 | Requires secure communications between the TOE and external IT entities. | |
FTP_TRP.1 | Requires the TSF to provide a trusted path to remote entities. | |
O.RECOVERY | FCS_CDP_EXT.1 | Requires that the TSF implements or invokes cryptographic functionality. |
FCS_CKM_EXT.6 | Requires that the TSF protect keys needed for continuity of operations. | |
FPT_FLS.1 | Requires that the TSF preserve a secure state on failure. | |
FPT_RCV.1 | Requires that the TSF enter maintenance mode on certain failures. | |
O.RESIDUAL_INFORMATION_CLEARING | FDP_RIP.1 | Requires that the TSF ensure that residual information is not perpetuated. |
O.SESSION_LOCK | FTA_SSL_EXT.1 | (Optional) Requires an inactivity timeout on local user sessions. |
O.SYSTEM_MONITORING | FAU_ADP_EXT.1 | Requires the TSF to implement or support audit functionality. |
FAU_GEN.1 | Requires that the TSF an audit record for defined auditable events. | |
FAU_GEN.2 | Requires that the TSF be able to associate audit events with user actions. | |
FAU_SAR.1 | Requires that auditors be able to read all audit records. | |
FAU_SAR.3 | Requires support for searches of audit data based on certificate identifier. | |
FAU_GCR_EXT.1 | Requires that the TSF store certificates that it issues. | |
FAU_SCR_EXT.1 | Requires the TSF support review of certificates in a repository. | |
FAU_SEL.1 | Requires support for selelection of audit events based on specified attributes. | |
FAU_STG_EXT.1 | Requires that the TSF ensure the integrity of audit data. | |
FIA_UIA_EXT.1 | Defines the actions permitted prior to authentication of a user. | |
FPT_STM.1 | Requires thet the TSF provide or support reliable time stamps. | |
O.TOE_ADMINISTRATION | FIA_AFL.1 | Requires that the TSF detect exceessive unsuccessful login attempts from a remote user. |
FIA_PMG_EXT.1 | Specifies password composition rules. | |
FIA_UAU.7 | Defines feedback permitted to the user during authentication. | |
FIA_UAU_EXT.1 | Requires that he TSF provide a mechanism for authenticating privileged users. | |
FIA_UIA_EXT.1 | Defines the actions permitted prior to authentication of a user. | |
FMT_MOF.1(1) | Defines management functions to be performed exclusively by Administrators. | |
FMT_MOF.1(2) | Defines management functions to be performed by CA or RA Staff. | |
FMT_MOF.1(3) | Defines management functions to be performed by CA Staff. | |
FMT_MOF.1(4) | Defines management functions to be performed by Administrators, Auditr, or CA Staff. | |
FMT_MOF.1(5) | Defines management functions to be performed by auditors. | |
FMT_MTD.1 | Requires that only priviledged users manage TSF data. | |
FMT_SMF.1 | Defines management functions implemented or supported by the TOE. | |
FMT_SMR.2 | Defines user roles maintained or supported by the TSF. | |
FPT_APW_EXT.1 | Defines protections for plaintext passwords. | |
FTA_SSL_EXT.1 | (Optional) Requires an inactivity timeout on local user sessions. | |
FTA_SSL.3 | (Optional) Requires an inactivity timeout on remote user sessions. | |
FTA_SSL.4 | Requires that the TSF support user-initiated termination of their own SSL sessions. | |
O.TSF_SELF_TEST | FPT_TST_EXT.1 | (Optional) Requires the TSF ensure the integrity of TOE software and firmware. |
FPT_TST_EXT.2 | (Optional) Requires the TSF ensure the integrity of certain data relevant to TOE security. | |
O.VERIFIABLE_UPDATES | FCS_CDP_EXT.1 | Requires that the TSF implements or invokes cryptographic functionality. |
FCS_COP.1(2) | Defines permissible cryptographic signature algorithms. | |
FIA_X509_EXT.3 | Specifies the contents of Certificate Request Messages generated by the TSF. | |
FPT_TUD_EXT.1 | Requires that the TSF support a secure TOE update process. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_COP.1/5 | No events specified | |
FDP_CER_EXT.4 | Certificate generation | Name/identifier of the certificate. Value of the certificate generated |
FDP_SDP_EXT.1 | No events specified | |
FDP_STG_EXT.1 | Changes to the trusted public keys and certificates relevant to TOE functions, including additions and deletions. | The public key and all context information associated with the key. |
FPT_NPE_EXT.1 | All changes to NPE rule sets and NPE. | The changes made to the NPE rule sets and associations |
FPT_SKY_EXT.1 | No events specified | |
FPT_TST_EXT.1 | Execution of this set of TSF integrity tests | |
FPT_TST_EXT.1 | Detected integrity violations | The identity of the object that caused the integrity violation |
FPT_TST_EXT.2 | Execution of this set of TSF integrity tests | |
FPT_TST_EXT.2 | Detected integrity violations | The identity of the object that caused the integrity violation |
FTA_SSL.3 | The termination of a remote session by the session termination mechanism | |
FTA_SSL_EXT.1 | Any attempts at unlocking or termination of an interactive session. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_KSH_EXT.1 | No events specified | |
FIA_ENR_EXT.1 | No events specified | |
FIA_ESTC_EXT.2 | No events specified | |
FIA_ESTS_EXT.2 | No events specified |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_SAR.1 | No events specified | |
FAU_SAR.3 | No events specified | |
FAU_SEL.1 | All modifications to the audit configuration that occur while the audit collection functions are operating. | |
FAU_STG.1/1 | No events specified | |
FAU_STG.1/2 | No events specified | |
FCS_CKM_EXT.1/1 | No events specified |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_SCR_EXT.1 | No events specified | |
FAU_STG_EXT.2 | No events specified | |
FCO_NRR_EXT.2 | No events specified | |
FCS_CKM.1 | Generation of non-ephemeral key for TOE-related funtions. | Public key generated if successful |
FCS_CKM.1 | [selection: Generation of ephemeral key for TOE-related functions., None] | Public key generated if successful. |
FCS_CKM.2 | Establishment of non-ephemeral key for TOE-related funtions. | Key established if successful |
FCS_CKM.2 | [selection: Establishment of ephemeral key for TOE-related functions., None] | Key established if successful. |
FCS_CKM_EXT.1/2 | No events specified | |
FCS_CKM_EXT.1/3 | No events specified | |
FCS_CKM_EXT.1/4 | No events specified | |
FCS_CKM_EXT.4 | Failure of the key destruction process for TOE keys | Identity of object or entity being cleared. |
FCS_CKM_EXT.5 | Failure of the key destruction process for TOE related keys. | |
FCS_CKM_EXT.6 | All key archival actions. | |
FCS_CKM_EXT.7 | No events specified | |
FCS_CKM_EXT.8 | No events specified | |
FCS_COP.1/1 | No events specified | |
FCS_COP.1/2 | All occurrences of signature generation using a CA signing key. | Name/identifier of object being signed. Identifier of key used for signing. |
FCS_COP.1/2 | Failure in signature generation. | |
FCS_COP.1/3 | No events specified | |
FCS_COP.1/4 | No events specified | |
FCS_HTTPS_EXT.1 | Failure to establish an HTTPS session. | Reason for failure. Non-TOE endpoint of attempted connection (IP address). |
FCS_HTTPS_EXT.1 | Establishment/Termination of an HTTPS session. | Non-TOE enpoint of connection (IP address). |
FCS_IPSEC_EXT.1 | Failure to establish an IPsec SA. | Reason for failure. Non-TOE endpoint of connection attempt (IP address). |
FCS_IPSEC_EXT.1 | Establishment/Termination of an IPsec SA. | Non-TOE endpoint of connection attempt (IP address). |
FCS_RBG_EXT.1 | No events specified | |
FCS_TLSC_EXT.1 | Failure establish a TLS session. | Reason for failure. |
FCS_TLSC_EXT.1 | Establishment/Termination of a TLS session. | |
FCS_TLSS_EXT.1 | Failure to establish a TLS session. | Reason for failure. |
FCS_TLSS_EXT.1 | Establishment/termination of a TLS session. | |
FDP_CRL_EXT.1 | Failure to generate CRL. | |
FDP_ITT.1 | No events specified | |
FDP_OCSPG_EXT.1 | Failure to generate cerficate statuws information. | |
FIA_AFL.1 | The reaching of the threshold for the unsuccessful authentication attempts. | |
FIA_AFL.1 | The action taken. | |
FIA_AFL.1 | The reenablement of disabled nonadministrative accounts. | |
FIA_CMCC_EXT.1 | CMC requests (generated or received) containing certificate requests or revocation requests. | Identifiers for all entities authenticating the request, including the entity providing client authentication for the
CMC transport (if any). The submitted request |
FIA_CMCC_EXT.1 | CMC responses issued. | Any signed response. |
FIA_CMCS_EXT.1 | CMC requests (generated or received) containing certificate requests or revocation requests. | Identifiers for all entities authenticating the request, including the
entity providing client authentication for the CMC transport (if any). The submitted request |
FIA_CMCS_EXT.1 | CMC responses issued. | Any signed response. |
FIA_ESTC_EXT.1 | EST requests (generated or received) containing certificate requests or revocation requests. | Identifiers for all entities authenticating the request, including the
entity providing client authentication for the EST transport (if any). The submitted request. |
FIA_ESTC_EXT.1 | EST responses issued. | Any signed response. |
FIA_ESTS_EXT.1 | EST requests (generated or received) containing certificate requests or revocation requests. | Identifiers for all entities authenticating the request, including the
entity providing client authentication for the EST transport (if any). The submitted request. |
FIA_ESTS_EXT.1 | EST responses issued. | Any signed response. |
FIA_PMG_EXT.1 | No events specified | |
FIA_PSK_EXT.1 | No events specified | |
FIA_UAU.7 | No events specified | |
FIA_X509_EXT.3 | No events specified | |
FPT_ITT.1 | No events specified | |
FPT_SKY_EXT.1 | Access control violations for users involved in key share establishment or control. | |
FTP_ITC.1 | Initiation of the trusted channel. | |
FTP_ITC.1 | Termination of the trusted channel. | |
FTP_ITC.1 | Failure of the trusted channel functions. | Identification of the initiator and target of failed trusted channels
establishment attempt. |
Identifier | Title |
---|---|
[CC] | Common Criteria for Information Technology Security Evaluation -
|
[CC] | Common Criteria for Information Technology Security Evaluation -
|
[CEM] | Common Evaluation Methodology for Information Technology Security - Evaluation Methodology, CCMB-2012-09-004, Version 3.1, Revision 5, April 2017. |
[IR7924] | Second Draft NIST IR 7924, Reference Certificate Policy, May 2014. |
Acronym | Meaning |
---|---|
AES | Advanced Encryption Standard |
AOR | Authorized Organizational Representative |
API | Application Programming Interface |
Base-PP | Base Protection Profile |
CA | Certification Authority |
CBC | Cipher Block Chaining |
CC | Common Criteria |
CC | Common Criteria |
CCM | Counter with CBC-Message Authentication Code |
CCMP | CCM Protocol |
CCTL | Common Criteria Test Lab |
CEM | Common Evaluation Methodology |
CESG | Communications-Electronics Security Group |
CMC | Certificate Management over CMS |
CMS | Cryptographic Message Syntax |
CN | Common Names |
CRL | Certificate Revocation List |
CSA | Computer Security Act |
CSP | Critical Security Parameter |
CSS | Certificate Status Server |
DAR | Data At Rest |
DEK | Data Encryption Key |
DES | Data Encryption Standard |
DH | Diffie-Hellman |
DHE | Diffie-Hellman Key Exchange |
DKM | Derived Keying Material |
DNS | Domain Name System |
DRBG | Deterministic Random Bit Generator |
DSA | Digital Signature Algorithm |
DSS | Digital Signature Standard |
DT | Date/Time Vector |
DTLS | Datagram Transport Layer Security |
EAP | Extensible Authentication Protocol |
ECC | Elliptic Curve Cryptography |
ECDHE | Elliptic Curve Diffie-Hellman Ephemeral |
ECDSA | Elliptic Curve Digital Signature Algorithm |
EDC | Error detection code |
EEPROM | Electrically Erasable Programmable Read-Only Memory |
ESP | Encapsulating Security Payload (IPsec) |
EST | Enrollment over Secure Transport |
FFC | Finite-Field Cryptography |
FIPS | Federal Information Processing Standards |
GCM | Galois/Counter Mode |
HMAC | Hash-based Message Authentication Code |
HSM | Hardware Security Module |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
I and A | Identification and Authentication |
IETF | Internet Engineering Task Force |
IKE | Internet key Exchange |
IP | Internet Protocol |
IPsec | Internet Protocol Security |
ISO | International Organization for Standardization |
IT | Information Technology |
ITSEF | Information Technology Security Evaluation Facility |
IUT | Implementation Under Test |
IV | Initialization Vector |
KAT | Known Answer Tests |
KDF | Key Derivation Function |
KEK | Key Encryption Key |
KW | Key Wrap |
KWP | Key Wrapping with Padding |
MAC | Message Authentication Code |
MODP | Modular Exponential |
NAT | Network Address Translation |
NIAP | National Information Assurance Partnership |
NIST | National Institute of Standards and Technology |
NPE | Non-person Entity |
NTP | Network Time Protocol |
OCSP | Online Certificate Status Protocol |
OE | Operational Environment |
OID | Object Identifier |
OMB | Office of Management and Budget |
PGP | Pretty Good Privacy |
PKI | Public Key Infrastructure |
PKV | Public Key Verification |
PP | Protection Profile |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
RA | Registration Authority |
RAM | Random Access Memory |
RBG | Random Bit Generator |
REK | Root Encryption Key |
RFC | Request for Comment |
RNG | Random Number Generator |
RNGVS | Random Number Generator Validation System |
RSA | Rivest Shamir Adleman |
S/MIME | Secure/Multi-purpose Internet Mail Extensions |
SA | Security Association (IPsec) |
SAN | Subject Alternative Name |
SAR | Security Assurance Requirement |
SAR | Security Assurance Requirement |
SFR | Security Functional Requirement |
SFR | Security Functional Requirement |
SHA | Secure Hash Algorithm |
SIP | Session Initiation Protocol |
SNMP | Simple Network Management Protocol |
SSH | Secure Shell |
SSL | Secure Sockets Layer |
ST | Security Target |
ST | Security Target |
SWID | Software Identification |
TLS | Transport Layer Security |
TOE | Target of Evaluation |
TOE | Target of Evaluation |
TPM | Trusted Platform Module |
TSF | TOE Security Function |
TSF | TOE Security Functionality |
TSS | TOE Summary Specification |
TSS | TOE Summary Specification |
URI | Uniform Resource Identifier |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
XCCDF | eXtensible Configuration Checklist Description Format |
XOR | Exclusive Or |
rDSA | RSA Digital Signature Algorithm |