Common Criteria Evaluation and Validation Scheme

National Information Assurance Partnership (NIAP)

Title: Enterprise Security Management - Privileged Access Management

Maintained by: NIAP

Unique Identifier: tbd

Version: 0.4

Status: draft

Date of issue: 05 October 2022

Approved by:

Supersedes:

Background and Purpose

Figure esm-framework: ESM Framework

Certain capabilities on an Enterprise network require an enhanced level of protection. For instance:

These capabilities are usually restricted to privileged accounts and are protected by restricting access to those accounts.

A Privileged Access Management solution manages these privileged accounts and associated credentials in order to provide increased granularity of control, improved monitoring of privileged activity, and to reduce the attack surface of the privileged accounts.

PAM solutions (as defined by Gartner) typically offer one or more of these features:

Use Cases

As a stand-alone physical appliance.

As the only guest on a virtual platform.

As one of several guests on a virtual host platform.

Notes on using a shared virtual host

Not Recommended. This use case may be covered in a future iteration of this profile.

Host Platform administrators have full access to guest systems – in this case the PAM. This is not an issue if the sole responsibility of the virtual platform administrators is to manage the PAM itself.

A virtual PAM is exposed to potential attacks from peer tenants on the host system. Peer tenants would have to be fully trusted. The following services, if provided by separate applications, may run on the same platform without being within the TOE. These services are trusted and should be certified if possible.

VM isolation mechanisms are not assumed to be sufficient to protect against managed credential leakage to other tenants.

Categories (as defined by Gartner):

Privileged account and session management (PASM). The PAM protects accounts by vaulting the credentials. Users (human or automated) first connect to the PAM, which then establishes and monitors the session. [Diagram: User ->PAM->managed account]

Privilege elevation and delegation management (PEDM). Host-based agents enable the users to execute specific privileged commands. Again, sessions are typically monitored. (Host based agent requirements could be covered by the ESM Host Agent module.) [Diagram: User->host agent contained within host]

Credentials management. A credential vault that manages machine-to-machine credentials. [Diagram: M1 to/from credential vault; M1 to M2]

While password management solutions for individual users may fit the definition of PAM, they are outside the scope of this profile.

Resources to be protected
The primary purpose of a PAM solution is to protect the privileged accounts or privileged access mechanisms that are under management by the PAM. To that end, the following resources and functions need to be protected:
Attacker access

(Non-Administrative) users may be malicious in nature. Users may attempt privilege escalation either on the assets for which they are permitted access, or other assets managed by the PAM to which they have no permissions.

The following assumptions are made about attackers' ability to develop attacks:

The attacker is expected to engage in the following general classes of attack:

Attack Scenarios
Privilege Escalation could entail:
  1. An unprivileged network user gains network privileged accesses.
  2. A user with some privileged accesses gains additional unauthorized privileged accesses.
  3. Any unauthorized user gaining the ability to administer or control the PAM itself.
Passive Eavesdropping Attacks Active Network Attacks Local attacks Limited Physical Access
Essential Security Requirements
Assumptions
The following assumptions are made for the TOE and its operational environment:
Optional Extensions
N/A
Outside the TOE's Scope
The following list contains items that are explicitly out-of-scope for any evaluation against the module: