Common Criteria Evaluation and Validation Scheme

National Information Assurance Partnership (NIAP)

Title: Enterprise Security Management (ESM) - Enterprise Management (EM)

Maintained by: National Information Assurance Partnership (NIAP)

Unique Identifier: 00x

Version: 0.2x

Status: draft

Date of issue:

Approved by:

Supersedes:

Background and Purpose
This document describes a core set of security requirements for Enterprise Security Management systems. These requirements cover basic security characteristics and behaviors for an ESM management server.

Enterprise Security Management is a Security framework designed to control the deployment, configuration and monitoring of security policies on host agents across multiple platforms. It is a suite of product/product components used to provide centralized management of a set of IT assets within an organization.

Figure : Enterprise Security Management Suite


The Enterprise Security Management- Enterprise Management module in the Enterprise Security Management Suite is a centralized host system used to deploy software and manage systems across an enterprise. A service is deployed to host agents and allow for the discovery, data capture, reporting and remediation of IT policy and security issue.
Use Cases
[USE CASE] Monitoring and Management

[USE CASE 1] Custom Events

The ability to handle custom event management and monitoring across server and workstation endpoints.

[USE CASE 2] Standard Services and Alerts

The ability to monitor multiple system services across endpoints, such as alerting for low disk space, high memory usage alerts, account creations, accounts being added or removed from groups, services stopping.

[USE CASE 3] Patching and Policies

The ability to deploy patches, security, and business policies to server and workstation endpoints, in addition to deploying instructions to network configurable infrastructure devices.

[USE CASE 4] Discovery

The capability to effectively browse, query, and export aggregated host-based endpoint data through a management dashboard query interface, in addition to automatically add newly discovered endpoints to a monitored database.

[USE CASE] Expandability

[USE CASE 1] Vendor Expansion

The ability to integrate and expand with additional vendor packages for custom monitoring and configuration of varying physical and virtual hardware.

[USE CASE 2] Resource Expansion

The capability to generate performance and predictive analysis to estimate when a monitored resource will be exhausted and allow for administrators to plan accordingly.

[USE CASE] Security

The ability to function in any configuration of endpoints with or without agents in the following ways.

Agent

[USE CASE 1] Detection of Potential Unauthorized Activity

The ability for agents to detect potentially unauthorized activity, software, or users by collection of host-based endpoint data and reporting back to the management server for further analysis.

[USE CASE 2] Remediation of Malicious Activity

The ability for the management server to instruct agents to perform remediation activities on the endpoints to cleanup detected malicious activity and report back through secured channels.

Agentless

[USE CASE 1] Detection of Potential Unauthorized Activity

The detection of potentially unauthorized activity, software, or users is enabled by remote collection of host-based endpoint data by the management server.

[USE CASE 2] Remediation of Malicious Activity

The ability to perform remediation activities on the endpoint remotely from the management server to cleanup detected malicious activity.

Resources to be protected
Attacker access
Essential Security Requirements
Assumptions
The following assumptions are made for the ESM product and its operational environment:
Outside the TOE's Scope