Version | Date | Comment |
---|---|---|
0.1 | 2020-11-16 | Started |
1.0 | 2022-02-10 | Initial publication. |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility, accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base Protection Profiles. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
The security functionality of the product under evaluation. | |
A description of how a TOE satisfies the SFRs in an ST. |
Administrator | An Administrator is responsible for management activities, including setting policies that are applied by the enterprise on the platform. An Administrator can act remotely through a management server, from which the platform receives configuration policies and updates. An Administrator can enforce settings on the system that cannot be overridden by non-Administrator users. |
American National Standards Institute (ANSI) | A private organization that oversees development of standards in the United States. |
Application | Software that runs on a platform and performs tasks on behalf of the user or owner of the platform. |
Application Programming Interface (API) | A specification of routines, data structures, object classes, and variables that allows an application to make use of services provided by another software component, such as a library. APIs are often provided for a set of libraries included with the platform. |
Baseboard Management Controller (BMC) | Or Management Controller. A small computer generally found on Server motherboards that performs management tasks on behalf of an Administrator. |
Cipher-based Message Authentication Code (CMAC) | A mode of AES that provides authentication, but not confidentiality. |
Commercial Solutions for Classified (CSfC) | An US Department of Defense program for delivering cybersecurity solutions that leverage commercial technologies and products. |
Credential | Data that establishes the identity of a user, e.g. a cryptographic key or password. |
Critical Security Parameters (CSP) | Information that is either user or system defined and is used to operate a cryptographic module in processing encryption functions including cryptographic keys and authentication data, such as passwords, the disclosure or modification of which can compromise the security of a cryptographic module or the security of the information protected by the module. |
Data-at-Rest (DAR) Protection | Countermeasures that prevent attackers, even those with physical access, from extracting data from non-volatile storage. Common techniques include data encryption and wiping. |
Developer | An entity that writes OS software. For the purposes of this document, vendors and developers are the same. |
Diffie-Hellman Key Exchange (DH) | A cryptographic key exchange protocol using public/private key pairs. |
Distinguished Name (DN) | Information used in certificate-based operations to uniquely identify a person, organization, or business. |
End-User Device (EUD) | A class of computing platform characterized by having a user interface for a single user. Often, EUDs are portable (e.g., laptop, tablet, mobile device), but this is not necessarily the case (e.g., desktop PC). |
General Purpose Operating System | A class of OS designed to support a wide-variety of workloads consisting of many concurrent applications or services. Typical characteristics for OSes in this class include support for third-party applications, support for multiple users, and security separation between users and their respective resources. |
General-Purpose Computing Platform (GPCP) | A physical computing platform designed to support general-purpose operating systems, virtualization systems, and applications. |
Internet of Things (IoT) | Physical computing devices that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over communications networks. |
Joint Test Action Group (JTAG) | A standard for verifying and testing circuit boards after manufacture. |
KECCAK Message Authentication Code (KMAC) | A variable-length keyed hash function described in NIST SP 800-185. |
Management Controller (MC) | Or Baseboard Management Controller (BMC). A small computer generally found on server motherboards that performs management tasks on behalf of an Administrator. |
Open Mobile Terminal Platform (OMTP) | A forum created by mobile network operators to discuss standards with manufacturers of mobile devices. |
Operating System (OS) | Software that manages physical and logical resources and provides services for applications. Operating systems are the generally the primary tenant of a GPCP. |
Physical Presence | A user or administrator having physical access to the TOE. An assertion of physical presence can take the form, for example, of requiring entry of a password at a boot screen, unlocking of a physical lock (e.g., a motherboard jumper), or inserting a USB cable before permitting platform firmware to be updated. |
Root of Trust (RoT) | Roots of trust are highly reliable hardware, firmware, and software components that perform specific, critical security functions. Roots of trust are the foundation for integrity of computing devices. |
Sensitive Data | Sensitive data may include all user or enterprise data or may be specific application data such as PII, emails, messaging, documents, calendar items, and contacts. Sensitive data must minimally include credentials and keys. |
Subject Alternative Name (SAN) | An extended X.509 certificate field. |
Tenant Software | Software that runs on and is supported by a platform. In the case of a GPCP, tenant software generally consists of an operating system, virtualization system, or "bare-metal" application. |
Trusted Execution Environment (TEE) | An isolated and secure area that ensures the confidentiality and integrity of code and data loaded inside. |
User | In the context of a GPCP, a User is a human who interacts with the platform through a user interface. Users do not need to be authenticated by the platform to use the platform, but generally authenticate to tenant software such as on Operating System. |
Virtualization System (VS) | A software product that enables multiple independent computing systems to execute on the same physical hardware platform without interference from one other. |
For changes to included SFRs, selections, and assignments required for this use case, see G.1 Server-Class Platform, Basic.
For changes to included SFRs, selections, and assignments required for this use case, see G.2 Server-Class Platform, Enhanced.
For changes to included SFRs, selections, and assignments required for this use case, see G.4 Portable Clients (laptops, tablets), Enhanced.
For changes to included SFRs, selections, and assignments required for this use case, see G.5 CSfC EUD.
For changes to included SFRs, selections, and assignments required for this use case, see G.6 Tactical EUD.
For changes to included SFRs, selections, and assignments required for this use case, see G.7 Enterprise Desktop clients.
For changes to included SFRs, selections, and assignments required for this use case, see G.8 IoT Devices.
Threat, Assumption, or OSP | Security Objectives | Rationale |
T.PHYSICAL | O.PHYSICAL_INTEGRITY | The threat T.PHYSICAL is countered by O.PHYSICAL_INTEGRITY as this objective supports detection or prevention of attempts to compromise the physical platform. |
O.ATTACK_DETECTION_AND_RESPONSE | The threat T.PHYSICAL is countered by O.ATTACK_DETECTION_AND_RESPONSE as this objective supports detection and reporting of attempts to compromise the TOE. | |
T.SIDE_CHANNEL_LEAKAGE | O.MITIGATE_FUNDAMENTAL_FLAWS | The threat T.SIDE_CHANNEL_LEAKAGE is countered by O.MITIGATE_FUNDAMENTAL_FLAWS as this objective supports the remedy of critical flaws through update or other technical or operational means. |
T.PERSISTENCE | O.PROTECTED_FIRMWARE | The threat T.PERSISTENCE is countered by O.PROTECTED_FIRMWARE as this objective supports maintenance of platform firmware integrity. |
T.UPDATE_COMPROMISE | O.UPDATE_INTEGRITY | The threat T.UPDATE_COMPROMISE is countered by O.UPDATE_INTEGRITY as this objective supports ensuring that platform firmware updates are authentic and properly validated prior to installation. |
O.STRONG_CRYPTOGRAPHY | The threat T.UPDATE_COMPROMISE is countered by O.STRONG_CRYPTOGRAPHY as this objective supports use of proven, standards-based cryptographic mechanisms for ensuring that updates are authentic and maintain their integrity. | |
O.ATTACK_DETECTION_AND_RESPONSE | The threat T.UPDATE_COMPROMISE is countered by O.ATTACK_DETECTION_AND_RESPONSE as this objective supports detection and reporting of attempts to compromise the TOE. | |
T.SECURITY_FUNCTIONALITY_FAILURE | O.SECURITY_FUNCTIONALITY_INTEGRITY | The threat T.SECURITY_FUNCTIONALITY_FAILURE is countered by O.SECURITY_FUNCTIONALITY_INTEGRITY as this objective supports integrity and proper functioning of security functionality. |
T.TENANT_BASED_ATTACK | O.TENANT_SECURITY | The threat T.TENANT_BASED_ATTACK is countered by O.TENANT_SECURITY as this objective supports tenant-based security mechanisms to prevent tenant compromise. |
T.NETWORK_BASED_ATTACK | O.TRUSTED_CHANNELS | The threat T.NETWORK_BASED_ATTACK is countered by O.TRUSTED_CHANNELS as this provides for integrity and confidentiality of transmitted data. |
T.UNAUTHORIZED_RECONFIGURATION | O.CONFIGURATION_INTEGRITY | The threat T.UNAUTHORIZED_RECONFIGURATION is countered by O.CONFIGURATION_INTEGRITY as this provides for integrity of platform configuration. |
T.UNAUTHORIZED_PLATFORM_ADMINISTRATOR | O.AUTHORIZED_ADMINISTRATOR | The threat T.UNAUTHORIZED_PLATFORM_ADMINISTRATOR is countered by O.AUTHORIZED_ADMINISTRATOR as this provides for authentication of privileged Administrators. |
A.PHYSICAL_PROTECTION | OE.PHYSICAL_PROTECTION | The operational environment objective OE.PHYSICAL_PROTECTION is realized through A.PHYSICAL_PROTECTION. |
A.ROT_INTEGRITY | OE.SUPPLY_CHAIN | The operational environment objective OE.SUPPLY_CHAIN is realized through A.ROT_INTEGRITY. |
A.TRUSTED_ADMIN | OE.TRUSTED_ADMIN | The operational environment objective OE.TRUSTED_ADMIN is realized through A.TRUSTED_ADMIN. |
A.MFR_ROT | OE.TRUSTED_ADMIN | The operational environment objective OE.TRUSTED_ADMIN is realized through A.TRUSTED_ADMIN. |
A.TRUSTED_DEVELOPMENT_AND_BUILD_PROCESSES | OE.TRUSTED_ADMIN | The operational environment objective OE.TRUSTED_ADMIN is realized through A.TRUSTED_ADMIN. |
A.SUPPLY_CHAIN_SECURITY | OE.TRUSTED_ADMIN | The operational environment objective OE.TRUSTED_ADMIN is realized through A.TRUSTED_ADMIN. |
A.CORRECT_INITIAL_CONFIGURATION | OE.TRUSTED_ADMIN | The operational environment objective OE.TRUSTED_ADMIN is realized through A.TRUSTED_ADMIN. |
A.TRUSTED_USERS | OE.TRUSTED_ADMIN | The operational environment objective OE.TRUSTED_ADMIN is realized through A.TRUSTED_ADMIN. |
A.REGULAR_UPDATES | OE.TRUSTED_ADMIN | The operational environment objective OE.TRUSTED_ADMIN is realized through A.TRUSTED_ADMIN. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FMT_CFG_EXT.1 | No events specified. | N/A |
FMT_MOF.1 | No events specified. | N/A |
FMT_SMF.1 | No events specified. | N/A |
FMT_SMR.1 | No events specified. | N/A |
FPT_JTA_EXT.1 | No events specified. | N/A |
FPT_PPF_EXT.1 | No events specified. | N/A |
FPT_ROT_EXT.1 | No events specified. | N/A |
FPT_ROT_EXT.2 | [selection: Failure of integrity verification, None]. | None. |
FPT_STM.1 | No events specified. | N/A |
FPT_TUD_EXT.1 | No events specified. | N/A |
Number | Function | Admin | User | Notes |
---|---|---|---|---|
1 | Ability to administer the platform [selection: locally, remotely, not at all] | M | X | If "remotely" is selected, then FTP_TRP.1 mush be claimed in the ST and Management Function 5 must be selected. If "not at all" is selected, then no other management functions may be selected. |
2 | Ability to configure and manage the audit functionality and audit data | O | X | If FAU_GEN.1 is included in the ST, then this function must be selected. |
3 | Ability to configure name/address of audit/logging server to which to send audit/logging records | O | X | If FAU_STG_EXT.1 is included in the ST, then this function must be selected. |
4 | Ability to review audit records. | O | X | If FAU_SAR.1 in included in the ST, then this function must be selected. |
5 | Ability to initiate a trusted channel for remote administration. | O | X | If FTP_TRP.1 is included in the ST, then this function must me selected. |
6 | Ability to set parameters for allowable number of authentication failures. | O | X | If FIA_AFL_EXT.1 is included in the ST, then this function must be selected. |
7 | Ability to configure password length and complexity. | O | X | If FIA_PMG_EXT.1 is included in the ST, then this function must be selected if password length and complexity are configurable. |
8 | Ability to configure authentication throttling policy. | O | X | If FIA_TRT_EXT.1 is included in the ST, then this function must be selected if authentication throttling policy is configurable. |
9 | Ability to manage authentication methods and change default authorization factors | O | X | If FIA_UAU.5 is included in the ST, then this function must be selected if authentication methods are configurable. |
10 | Ability to configure of certificate revocation checking methods. | O | X | If FIA_X509_EXT.1 is included in the ST, then this function must be selected if TOE supports configuration of certificate revocation checking methods. |
11 | Ability to configure TSF behavior when certificate revocation status cannot be determined. | O | X | If FIA_X509_EXT.2 is included in the ST and " allow the administrator to choose whether to accept the certificate in these cases" is selected, then this function must be selected. |
12 | Ability to configure default action to take on integrity failure. | O | X | If FPT_ROT_EXT.2 or FPT_ROT_EXT.3 is included in the ST and "in accordance with Administrator-configurable policy" is selected in FPT_ROT_EXT.2.2 or FPT_ROT_EXT.3.2, then this function must be selected. |
13 | Ability to configure default action to take on update failure. | O | X | If FPT_TUD_EXT.2 or FPT_TUD_EXT.3 is included in the ST and "in accordance with Administrator-configurable policy" is selected in FPT_TUD_EXT.2.5 or FPT_TUD_EXT.3.4, then this function must be selected. |
14 | Ability to initiate the update process. | O | X | If "no mechanism for platform firmware update" is selected in FPT_TUD_EXT.1.1, then this function must be selected. |
15 | Ability to determine the action to take on update failure. | O | O | If FPT_TUD_EXT.2 or FPT_TUD_EXT.3 is included in the ST and "by express determination of an [Administrator]" is selected in FPT_TUD_EXT.2.5 or FPT_TUD_EXT.3.4, then this function must be selected for Administrators. If "by express determination of an [User]" is selected, then this function must be selected for Users. |
16 | Ability to determine the action to take on integrity check failure. | O | O | If FPT_ROT_EXT.2 or FPT_ROT_EXT.3 is included in the ST and "by express determination of an [Administrator]" is selected in FPT_ROT_EXT.2.2 or FPT_ROT_EXT.3.2, then this function must be selected for Administrators. If "by express determination of an [User]" is selected, then this function must be selected for Users. |
17 | Ability to manage import and export keys/secrets to and from protected storage. | O | X | If FCS_STG_EXT.1 is included in the ST, then this function must be selected. |
The following rationale provides justification for each security objective for the TOE,
showing that the SFRs are suitable to meet and achieve the security objectives:
Objective | Addressed by | Rationale |
---|---|---|
O.PHYSICAL_INTEGRITY | FPT_JTA_EXT.1 | Supports the objective through restricting access to debug ports. |
FPT_TUD_EXT.1 | Supports the objective through requiring that a TOE be either updateable or immutable. | |
FPT_ROT_EXT.3 (objective) | Supports the objective through requiring supply chain traceability. | |
FPT_JTA_EXT.2 (sel-based) | Supports the objective through requiring debug ports to be disabled. | |
FPT_PHP.1 (sel-based) | Supports the objective through passive detection of physical tampering. | |
FPT_PHP.2 (sel-based) | Supports the objective through detection and reporting of physical tampering. | |
FPT_PHP.3 (sel-based) | Supports the objective through resistance to physical tampering. | |
FPT_TUD_EXT.2 (sel-based) | Supports the objective through specifying an authenticated firmware update mechanism. | |
FPT_TUD_EXT.3 (sel-based) | Supports the objective through specifying a firmware update mechanism with delayed authentication. | |
FPT_TUD_EXT.4 (sel-based) | Supports the objective through specifying a secure local firmware update mechanism. | |
O.ATTACK_DETECTION_AND_RESPONSE | FPT_ROT_EXT.2 | Supports the objective by indicating integrity failures in platform firmware. |
FPT_STM.1 | Supports the objective by ensuring that audit events are marked with reliable time stamps. | |
FAU_GEN.1 (sel-based) | Supports the objective by requiring reporting of security-related audit events. | |
FAU_SAR.1 (sel-based) | Supports the objective by requiring that audit events be readable by an Administrator. | |
FAU_STG.1 (sel-based) | Supports the objective by requiring that audit records be protected from unauthorized deletion. | |
FAU_STG.4 (sel-based) | Supports the objective by requiring that audit records be protected from automatic deletion. | |
FAU_STG_EXT.1 (sel-based) | Supports the objective by requiring that audit records be off-loaded to an external IT entity. | |
FPT_PHP.1 (sel-based) | Supports the objective through passive detection of physical tampering. | |
FPT_PHP.3 (sel-based) | Supports the objective through resistance to physical tampering. | |
O.MITIGATE_FUNDAMENTAL_FLAWS | FPT_TUD_EXT.1 | Supports the objective through requiring that a TOE be either updateable or immutable. |
FPT_TUD_EXT.2 (sel-based) | Supports the objective through specifying an authenticated firmware update mechanism. | |
FPT_TUD_EXT.3 (sel-based) | Supports the objective through specifying a firmware update mechanism with delayed authentication. | |
FPT_TUD_EXT.4 (sel-based) | Supports the objective through specifying a secure local firmware update mechanism. | |
O.PROTECTED_FIRMWARE | FPT_ROT_EXT.1 | Supports the objective by ensuring that platform integrity is rooted in a trust anchor. |
FPT_PPF_EXT.1 | Supports the objective by requiring that platform firmware be modifiable only through the update process. | |
FPT_TUD_EXT.1 | Supports the objective through requiring that a TOE be either updateable or immutable. | |
FPT_ROT_EXT.2 (sel-based) | Supports the objective by detecting integrity failures in platform firmware. | |
FPT_RVR_EXT.1 (sel-based) | Supports the objective by specifying a means for recovery from a boot firmware failure. | |
FPT_TUD_EXT.2 (sel-based) | Supports the objective through specifying an authenticated firmware update mechanism. | |
FPT_TUD_EXT.3 (sel-based) | Supports the objective through specifying a firmware update mechanism with delayed authentication. | |
FPT_TUD_EXT.4 (sel-based) | Supports the objective through specifying a secure local firmware update mechanism. | |
O.UPDATE_INTEGRITY | FPT_PPF_EXT.1 | Supports the objective by requiring that platform firmware be modifiable only through the update process. |
FPT_ROT_EXT.2 | Supports the objective by validating the integrity of platform firmware prior to execution. | |
FPT_TUD_EXT.1 | Supports the objective through requiring that a TOE be either updateable or immutable. | |
FPT_TUD_EXT.2 (sel-based) | Supports the objective through specifying an authenticated firmware update mechanism. | |
FPT_TUD_EXT.3 (sel-based) | Supports the objective through specifying a firmware update mechanism with delayed authentication. | |
FPT_TUD_EXT.4 (sel-based) | Supports the objective through specifying a secure local firmware update mechanism. | |
O.STRONG_CRYPTOGRAPHY | FCS_SLT_EXT.1 (optional) | Supports the objective by specifying the requirements for cryptographic salt generation. |
FCS_CKM.1/AK (sel-based/optional) | Supports the objective by specifying the requirements for generating asymmetric keys. | |
FCS_CKM.1/SK (sel-based/optional) | Supports the objective by specifying the requirements for generating symmetric keys. | |
FCS_CKM.2 (sel-based/optional) | Supports the objective by specifying the requirements for cryptographic key establishment. | |
FCS_CKM_EXT.5 (sel-based/optional) | Supports the objective by specifying the requirements for cryptographic key derivation. | |
FCS_COP.1/Hash (sel-based/optional) | Supports the objective by specifying the requirements for cryptographic hashing. | |
FCS_COP.1/KAT (sel-based/optional) | Supports the objective by specifying the requirements for key agreement and transport. | |
FCS_COP.1/KeyedHash (sel-based/optional) | Supports the objective by specifying the requirements for keyed hashes. | |
FCS_COP.1/SigGen (sel-based/optional) | Supports the objective by specifying the requirements for digital signature generation. | |
FCS_COP.1/SigVer (sel-based/optional) | Supports the objective by specifying the requirements for digital signature verification. | |
FCS_COP.1/SKC (sel-based/optional) | Supports the objective by specifying the requirements for symmetric-key cryptography. | |
FCS_RBG_EXT.1 (sel-based/optional) | Supports the objective by specifying the requirements for random-bit generation services. | |
O.SECURITY_FUNCTIONALITY_INTEGRITY | FPT_PPF_EXT.1 | Supports the objective by requiring that platform firmware be modifiable only through the update process. |
FCS_STG_EXT.1 (optional) | Supports the objective by specifying the types of credential storage supported by the TOE. | |
FCS_CKM.4 (sel-based) | Supports the objective by specifying the requirements for credential and key destruction. | |
FCS_CKM_EXT.4 (sel-based) | Supports the objective by specifying the timing for credential and key destruction. | |
FCS_STG_EXT.2 (sel-based) | Supports the objective by specifying the types of material that must be encrypted for storage. | |
FCS_STG_EXT.3 (sel-based) | Supports the objective by specifying the encryption requirements for credential storage. | |
FDP_ITC_EXT.1 (sel-based) | Supports the objective by specifying the requirements for import of keys and credentials. | |
O.TENANT_SECURITY | FCS_ENT_EXT.1 (optional) | Supports the objective by requiring that the TOE provide entropy to tenant software. |
FCS_STG_EXT.1 (optional) | Supports the objective by specifying the types of credential storage supported by the TOE. | |
FDP_TEE_EXT.1 (optional) | Supports the objective by specifying the requirements for a trusted execution environment. | |
FCS_STG_EXT.2 (sel-based) | Supports the objective by specifying the types of material that must be encrypted for storage. | |
FCS_STG_EXT.3 (sel-based) | Supports the objective by specifying the encryption requirements for credential storage. | |
FDP_ITC_EXT.1 (sel-based) | Supports the objective by specifying the requirements for import of keys and credentials. | |
O.TRUSTED_CHANNELS | FCS_HTTPS_EXT.1 (sel-based) | Supports the objective by specifying requirements for the HTTPS protocol. |
FCS_IPSEC_EXT.1 (sel-based) | Supports the objective by specifying requirements for the IPSec protocol. | |
FIA_X509_EXT.1 (sel-based) | Supports the objective by specifying how X.509 certificate validation is performed. | |
FIA_X509_EXT.2 (sel-based) | Supports the objective by specifying how X.509 certificate authentication is performed. | |
FTP_ITC_EXT.1 (sel-based) | Supports the objective by specifying allowable trusted channel protocols. | |
FTP_ITE_EXT.1 (sel-based) | Supports the objective by specifying requirements for moving data through untrusted channels. | |
FTP_ITP_EXT.1 (sel-based) | Supports the objective by allowing physically protected communications channels. | |
FTP_TRP.1 (sel-based) | Supports the objective by specifying allowable uses for trusted channels. | |
O.CONFIGURATION_INTEGRITY | FMT_CFG_EXT.1 | Supports the objective by requiring that default Administrator credentials be changed. |
FIA_UIA_EXT.1 (sel-based) | Supports the objective by requiring Administrators be authenticated before making changes. | |
FMT_MOF_EXT.1 (sel-based) | Supports the objective by specifying that management functions be performed by Administrators. | |
FMT_SMF.1 (sel-based) | Supports the objective by specifying the management functions implemented by the TOE. | |
FMT_SMR.1 (sel-based) | Supports the objective by defining the roles of Administrator and User. | |
O.AUTHORIZED_ADMINISTRATOR | FMT_CFG_EXT.1 | Supports the objective by requiring that default Administrator credentials be changed. |
FIA_TRT_EXT.1 (optional) | Supports the objective by limiting the number of automated authentication attempts. | |
FIA_AFL_EXT.1 (sel-based) | Supports the objective by requiring that Administrators be authenticated. | |
FIA_PMG_EXT.1 (sel-based) | Supports the objective by specifying password complexity requirements. | |
FIA_UAU.5 (sel-based) | Supports the objective by specifying supported authentication mechanisms. | |
FIA_UAU.7 (sel-based) | Supports the objective by requiring that authentication factor feedback be suppressed. | |
FIA_UIA_EXT.1 (sel-based) | Supports the objective by requiring Administrators be authenticated before making changes. | |
FIA_X509_EXT.1 (sel-based) | Supports the objective by specifying how X.509 certificate validation is performed. | |
FIA_X509_EXT.2 (sel-based) | Supports the objective by specifying how X.509 certificate authentication is performed. | |
FMT_MOF_EXT.1 (sel-based) | Supports the objective by specifying that management functions be performed by Administrators. | |
FMT_SMF.1 (sel-based) | Supports the objective by specifying the management functions implemented by the TOE. | |
FMT_SMR.1 (sel-based) | Supports the objective by defining the roles of Administrator and User. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_CKM_EXT.5 | No events specified. | N/A |
FCS_ENT_EXT.1 | No events specified. | N/A |
FCS_SLT_EXT.1 | No events specified. | N/A |
FCS_STG_EXT.1 | No events specified. | N/A |
FDP_TEE_EXT.1 | No events specified. | N/A |
FIA_TRT_EXT.1 | Authentication throttling triggered. | None. |
Identifier | Input parameters | Key derivation algorithm | Cryptographic key sizes | List of standards |
---|---|---|---|---|
KDF-CTR | [selection: Direct Generation from a Random Bit Generator as specified in FCS_RBG_EXT.1, Concatenated keys] | KDF in Counter Mode using [selection: CMAC-AES-128, CMAC-AES-192, CMAC-AES-256, HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-512] as the PRF | [selection: 128, 192, 256] bits | NIST SP 800-108 sec. 5.1 (KDF in Counter Mode) [selection: ISO/IEC 9797-1:2011 (CMAC), NIST SP 800-38B (CMAC), ISO/IEC 18033-3:2010 (AES), ISO/IEC 9797-2:2011 (HMAC), FIPS PUB 198-1 (HMAC), ISO/IEC 10118-3:2018 (SHA), FIPS PUB 180-4 (SHA)] |
KDF-FB | [selection: Direct Generation from a Random Bit Generator as specified in FCS_RBG_EXT.1, Concatenated keys] | KDF in Feedback Mode using [selection: CMAC-AES-128, CMAC-AES-192, CMAC-AES-256, HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-512] as the PRF | [selection: 128, 192, 256] bits | NIST SP 800-108 sec 5.2 (KDF in Feedback Mode) [selection: ISO/IEC 9797-1:2011 (CMAC), NIST SP 800-38B (CMAC), ISO/IEC 18033-3:2010 (AES), ISO/IEC 9797-2:2011 (HMAC), FIPS PUB 198-1 (HMAC), ISO/IEC 10118-3:2018 (SHA), FIPS PUB 180-4 (SHA)] |
KDF-DPI | [selection: Direct Generation from a Random Bit Generator as specified in FCS_RBG_EXT.1, Concatenated keys] | KDF in Double Pipeline Iteration Mode using [selection: CMAC-AES-128, CMAC-AES-192, CMAC-AES-256, HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-512] as the PRF | [selection: 128, 192, 256]bits | NIST SP 800-108 sec. 5.3 (KDF in n Double Pipeline Iteration Mode) [selection: ISO/IEC 9797-1:2011 (CMAC), NIST SP 800-38B (CMAC), ISO/IEC 18033-3:2010 (AES), ISO/IEC 9797-2:2011 (HMAC), FIPS PUB 198-1 (HMAC), ISO/IEC 10118-3:2018 (SHA), FIPS PUB 180-4 (SHA)] |
KDF-XOR | Intermediary keys | [selection: exclusive OR (XOR), SHA-256, SHA-512] | [selection: 128, 192, 256] bits | [selection: ISO/IEC 10118-3:2018 (SHA), FIPS PUB 180-4 (SHA)] |
KDF-ENC | Two keys | Encryption using [selection: AES-CCM, AES-GCM, AES-CBC, AES-KWP, AES-KW] | [selection: 128, 192, 256] bits | [selection: ISO/IEC 18033-3:2010 (subclause 5.2) (AES), FIPS PUB 197 (AES), ISO/IEC 10116:2017 (clause 7) (CBC), NIST SP 800-38A sec. 6.2 (CBC), ISO/IEC 19772:2009 (clause 8) (CCM), NIST SP 800-38C (CCM), ISO/IEC 19772:2009 (clause 11) (GCM), NIST SP 800-38D (GCM), IEEE Std. 1619-2007 (XTS), NIST SP 800-38E (XTS), ISO/IEC 19772:2009, clause 7 (Key wrap), NIST SP 800-38F sec. 6.2 (KW), NIST SP 800-38F sec. 6.3 (KWP)] |
KDF-HASH | Shared secret, salt, output length, fixed information | [assignment: Hash function from FCS_COP.1/Hash] | [selection: 128, 192, 256] bits | NIST SP 800-56C rev2, sec. 4 |
KDF-MAC | Shared secret, salt, IV, output length, fixed information | [assignment: keyed hash from FCS_COP.1/KeyedHash] | [selection: 128, 192, 256] bits | NIST SP 800-56C rev2, sec. 4 |
KDF-PBKDF | Password, salt, iteration count | [selection: HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, HMAC-SHA-512/224, HMAC-SHA-512/256, HMAC-SHA3-224, HMAC-SHA3-256, HMAC-SHA3-384, HMAC-SHA3-512] | [selection: 128, 192, 256] bits | NIST SP 800-132 |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FPT_ROT_EXT.3 | Detection of attempted intrusion. | None. |
This PP does not define any Implementation-Based requirements.
As indicated in the introduction to this PP, the baseline requirements (those that must be performed by the TOE or its underlying platform) are contained in the body of this PP. There are additional requirements based on selections in the body of the PP: if certain selections are made, then additional requirements below must be included.
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_GEN.1 | No events specified. | N/A |
FAU_STG.1 | No events specified. | N/A |
FAU_STG.4 | No events specified. | N/A |
FAU_STG_EXT.1 | On failure of logging function, capture record of failure and record upon restart of logging function. | None. |
FCS_CKM.1/AK | No events specified. | N/A |
FCS_CKM.1/SK | No events specified. | N/A |
FCS_CKM.2 | No events specified. | N/A |
FCS_CKM.4 | No events specified. | N/A |
FCS_CKM_EXT.4 | No events specified. | N/A |
FCS_COP.1/Hash | No events specified. | N/A |
FCS_COP.1/KeyedHash | No events specified. | N/A |
FCS_COP.1/KAT | No events specified. | N/A |
FCS_COP.1/SigGen | No events specified. | N/A |
FCS_COP.1/SigVer | No events specified. | N/A |
FCS_COP.1/SKC | No events specified. | N/A |
FCS_HTTPS_EXT.1 | Failure to establish a HTTPS Session. | Reason for failure. Non-TOE endpoint of connection (IP address) for failures. |
FCS_HTTPS_EXT.1 | Establishment/Termination of a HTTPS session. | Non-TOE endpoint of connection (IP address). |
FCS_IPSEC_EXT.1 | Failure to establish an IPsec SA. | Reason for failure. Non-TOE endpoint of connection (IP address). |
FCS_IPSEC_EXT.1 | Establishment/Termination of an IPsec SA. | Non-TOE endpoint of connection (IP address). |
FCS_RBG_EXT.1 | Failure of the randomization process | None. |
FDP_ITC_EXT.1 | No events specified. | N/A |
FIA_AFL_EXT.1 | Failed attempt at Administrator authentication. | None. |
FIA_PMG_EXT.1 | No events specified. | N/A |
FIA_UAU.5 | No events specified. | N/A |
FIA_UAU.7 | No events specified. | N/A |
FIA_UIA_EXT.1 | All use of the identification and authentication mechanism. | Provided user identity, origin of the attempt (e.g. console, remote IP address). |
FIA_X509_EXT.1 | Failure to validate a certificate. | Reason for failure. |
FIA_X509_EXT.2 | No events specified. | N/A |
FPT_JTA_EXT.2 | No events specified. | N/A |
FPT_PHP.1 | Detection of intrusion. | None. |
FPT_PHP.2 | Detection of intrusion. | None. |
FPT_PHP.3 | Detection of attempted intrusion. | None. |
FPT_RVR_EXT.1 | No events specified. | N/A |
FPT_TUD_EXT.2 | [selection: Failure of update authentication/integrity check/rollback, None]. | Version numbers of the current firmware and of the attempted update. |
FPT_TUD_EXT.2 | [selection: Failure of update operation, None]. | Version numbers of the current firmware and of the attempted update. |
FPT_TUD_EXT.2 | [selection: Success of update operation, None]. | Version numbers of the new and old firmware images. |
FPT_TUD_EXT.3 | [selection: Failure of update authentication/integrity/rollback check, None]. | Version numbers of the current firmware and of the attempted update. |
FPT_TUD_EXT.3 | [selection: Failure of update operation, None]. | Version numbers of the current firmware and of the attempted update. |
FPT_TUD_EXT.3 | [selection: Success of update operation, None]. | Version numbers of the new and old firmware images. |
FPT_TUD_EXT.4 | No events specified. | N/A |
FTP_ITC_EXT.1 | Initiation of the trusted channel. | User ID and remote source (IP Address) if feasible. |
FTP_ITC_EXT.1 | Termination of the trusted channel. | User ID and remote source (IP Address) if feasible. |
FTP_ITC_EXT.1 | Failures of the trusted path functions. | User ID and remote source (IP Address) if feasible. |
FTP_ITE_EXT.1 | No events specified. | N/A |
FTP_ITP_EXT.1 | No events specified. | N/A |
FTP_TRP.1 | Initiation of the trusted channel. | Administrator ID and remote source (IP Address), if feasible. |
FTP_TRP.1 | Termination of the trusted channel. | Administrator ID and remote source (IP Address), if feasible. |
FTP_TRP.1 | Failures of the trusted path functions. | User ID and remote source (IP Address), if feasible. |
FCS_TLSC_EXT.1 | Failure to establish a session. | Reason for failure. |
FCS_TLSC_EXT.1 | Failure to verify presented identifier. | Presented identifier and reference identifier. |
FCS_TLSC_EXT.1 | Establishment/termination of a TLS session. | Non-TOE endpoint of connection. |
FCS_TLSS_EXT.1 | Failure to establish a session. | Reason for failure. |
FCS_DTLSC_EXT.1 | Failure of the certificate validity check. | Issuer Name and Subject Name of certificate. |
FCS_DTLSS_EXT.1 | Failure of the certificate validity check. | Issuer Name and Subject Name of certificate. |
This component may also be included in the ST as if optional.
Cryptographic key generation algorithm | Cryptographic key sizes | List of standards |
---|---|---|
RSA | [selection: 2048 bit, 3072-bit] | FIPS PUB 186-4 sec. B.3 [key generation] |
ECC-N | [selection: 256 (P-256), 384 (P-384), 521 (P-521)] | FIPS PUB 186-4 sec. D.1.2 [NIST curves] FIPS PUB 186-4 sec. B.4 [key generation] |
ECC-B | [selection: 256 (brainpoolP256r1), 384 (brainpoolP384r1), 512 (brainpoolP512r1)] | RFC 5639 sec. 3 [Brainpool Curves] FIPS PUB 186-4 sec. B.4 [key generation] |
DSA | DSA Bit lengths of p and q respectively (L, N) [selection: (2048, 224), (2048, 256), (3027, 256)] | FIPS PUB 186-4 sec. B.1 [key generation] |
Curve25519 | 256 bits | RFC 7748 [Curve25519] FIPS PUB 186-4 sec. B.4 [key generation] |
This component may also be included in the ST as if optional.
This component may also be included in the ST as if optional.
This component may also be included in the ST as if optional.
This component may also be included in the ST as if optional.
This component may also be included in the ST as if optional.
Cryptographic algorithm | Cryptographic key size | List of standards |
---|---|---|
KAS1 (RSA single-party) | [selection: 2048, 3072, 4096, 6144, 8192] bits | NIST SP 800-56B rev2 sec. 8.2 |
KAS2 (RSA Two-party) | [selection: 2048, 3072, 4096, 6144, 8192] bits | NIST SP 800-56B rev2 sec. 8.3 |
KTS-OAEP (RSA) | [selection: 2048, 3072, 4096, 6144, 8192] bits | NIST SP 800-56B rev2 sec. 9 |
RSAES-PKCS1-v1_5 (RSA) | [selection: 2048, 3072, 4096, 6144, 8192] bits | RFC 8017 sec. 7.2 |
ECDH-NIST (ECDH with NIST curves) | [selection: 256 (P-256), 384 (P-384), 512 (P-521)] | NIST SP 800-56A rev3 |
ECDH-BPC (ECDH with Brainpool curves) | [selection: 256 (brainpoolP256r1), 384 (brainpoolP384r1, 512 (brainpoolP512r1)] | RFC 5639 sec. 3 |
DH (Diffie-Hellman) | [selection: 2048, 3072, 4096, 6144, 8192] bits | NIST SP 800-56A rev3, [selection: ] |
ECDH-25519 (ECDH with Curve25519) | 256 bits | RFC 7748 |
ECIES | [selection: 256, 384, 512] bits | [selection: ANSI X9.63, IEEE 1363a, ISO/IEC 18033-2 Part 2, SECG SEC1 sec. 5.1] |
This component may also be included in the ST as if optional.
Identifier | Cryptographic algorithm | Cryptographic key sizes | List of standards |
---|---|---|---|
RSASSA-PKCS1 | RSASSA-PKCS1-v1_5 using [selection: SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-384, SHA3-512] | [selection: 2048 bit, 3072 bit] | [selection: RFC 8017, PKCS #1 v2.2 (sec. 8.2), FIPS PUB 186-4, (sec. 5.5)](RSASSA-PKCS1-v1_5) [selection: ISO/IEC 10118-3 (cl. 10, 11) [SHA1/2], FIPS PUB 180-4 (sec. 6) [SHA1/2], FIPS PUB 202 [SHA3]] |
DSS2 | Digital signature scheme 2 using [selection: SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-384, SHA3-512] | [selection: 2048 bit, 3072 bit] | ISO/IEC 9796-2 (cl. 9) [Digital signature scheme 2] [selection: ISO/IEC 10118-3 (cl. 10, 11) [SHA1/2], FIPS PUB 180-4 (sec. 6) [SHA1/2], FIPS PUB 202 [SHA3]] |
DSS3 | Digital signature scheme 3 using [selection: SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-384, SHA3-512] | [selection: 2048 bit, 3072 bit] | ISO/IEC 9796-2 (cl. 10) [Digital signature scheme 3] [selection: ISO/IEC 10118-3 (cl. 10, 11) [SHA1/2], FIPS PUB 180-4 (sec. 6) [SHA1/2], FIPS PUB 202 [SHA3]] |
RSASSA-PSS | RSASSA-PSS using [selection: SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-384, SHA3-512] | [selection: 2048 bit, 3072 bit] | RFC 8017, PKCS#1v2.2 sec. 8.1 [RSASSAPSS] [selection: ISO/IEC 10118-3 (cl. 10, 11) [SHA1/2], FIPS PUB 180-4 (sec. 6) [SHA1/2], FIPS PUB 202 [SHA3]] |
ECDSA | ECDSA on [selection: brainpoolP256r1, brainpoolP384r1, brainpoolP512r1, NIST P-256, NIST P-384, NIST P-521] using [selection: SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-384, SHA3-512] | [selection: 2048 bit, 3072 bit] |
[selection:
|
This component may also be included in the ST as if optional.
Identifier | Cryptographic algorithm | Cryptographic key sizes | List of standards |
---|---|---|---|
RSASSA-PKCS1 | RSASSA-PKCS1-v1_5 using [selection: SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-384, SHA3-512] | [selection: 2048 bit, 3072 bit] | [selection: RFC 8017, PKCS #1 v2.2 (sec. 8.2), FIPS PUB 186-4, (sec 5.5)][RSASSA-PKCS1-v1_5] [selection: ISO/IEC 10118-3 (cl. 10, 11) [SHA1/2], FIPS PUB 180-4 (sec. 6) [SHA1/2], FIPS PUB 202 [SHA3]] |
DSS2 | Digital signature scheme 2 using [selection: SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-384, SHA3-512] | [selection: 2048 bit, 3072 bit] | ISO/IEC 9796-2 (cl. 9) [Digital signature scheme 2] [selection: ISO/IEC 10118-3 (cl. 10, 11) [SHA1/2], FIPS PUB 180-4 (sec. 6) [SHA1/2], FIPS PUB 202 [SHA3]] |
DSS3 | Digital signature scheme 3 using [selection: SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-384, SHA3-512] | [selection: 2048 bit, 3072 bit] | ISO/IEC 9796-2, (Clause 10) (Digital signature scheme 3) [selection: ISO/IEC 10118-3 (cl. 10, 11) [SHA1/2], FIPS PUB 180-4 (sec. 6) [SHA1/2], FIPS PUB 202 [SHA3]] |
RSASSA-PSS | RSASSA-PSS using [selection: SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-384, SHA3-512] | [selection: 2048 bit, 3072 bit] | [RFC 8017, PKCS#1v2.2 (Section 8.1)] (RSASSAPSS) [selection: ISO/IEC 10118-3 (cl. 10, 11) [SHA1/2], FIPS PUB 180-4 (sec. 6) [SHA1/2], FIPS PUB 202 [SHA3]] |
ECDSA | ECDSA on [selection: brainpoolP256r1, brainpoolP384r1, brainpoolP512r1, NIST P-256, NIST P-384, NIST P-521] using [selection: SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-384, SHA3-512] | [selection: 2048 bit, 3072 bit] |
[selection:
|
This component may also be included in the ST as if optional.
Cryptographic algorithm | Cryptographic key sizes | List of standards | |
---|---|---|---|
AES-CCM | AES in CCM mode with unpredictable, non-repeating nonce, minimum size of 64 bits | [selection: 128 bits, 192 bits, 256 bits] | ISO/IEC 18033-3, FIPS PUB 197 [AES] ISO/IEC 19772 cl. 8, NIST SP 800-38C [CCM] |
AES-GCM | AES in GCM mode with non-repeating IVs; IV length must be equal to 96 bits; the deterministic IV construction method (SP 800-38D, Section 8.2.1) must be used; the MAC length t must be one of the values [selection: 96, 104, 112, 120, 128] | [selection: 128 bits, 192 bits, 256 bits] | ISO/IEC 18033-3, FIPS PUB 197 [AES] ISO/IEC 19772 cl. 11, NIST SP 800-38D [GCM] |
AES-CBC | AES in CBC mode with non-repeating and unpredictable IVs | [selection: 128 bits, 192 bits, 256 bits] | ISO/IEC 18033-3, FIPS PUB 197 [AES] ISO/IEC 10116, NIST SP 800-38A [CBC] |
AES-CTR | AES in counter mode with a non-repeating initial counter and with no repeated use of counter values across multiple messages with the same secret key | [selection: 128 bits, 192 bits, 256 bits] | ISO/IEC 18033-3, FIPS PUB 197 [AES] ISO/IEC 10116, NIST SP 800-38A [CTR] |
XTS-AES | AES in XTS mode with unique [selection: consecutive non-negative integers starting at an arbitrary non-negative integer, data unit sequence numbers] tweak values | [selection: 256 bits, 512 bits] | ISO/IEC 18033-3, FIPS PUB 197 [AES] IEEE 1619, NIST SP 800-38E [XTS] |
AES-KWP | KWP based on AES | [selection: 128 bits, 192 bits, 256 bits] | ISO/IEC 18033-3, FIPS PUB 197 [AES] ISO/IEC 19772 cl. 7 [key wrap] NIST SP 800-38F sec. 6.3 [KWP] |
AES-KW | KW based on AES | [selection: 128 bits, 192 bits, 256 bits] | ISO/IEC 18033-3, FIPS PUB 197 [AES] ISO/IEC 19772 cl. 7 [key wrap] NIST SP 800-38F, sec. 6.2 (KW) |
This component may also be included in the ST as if optional.
Functional Class | Functional Components |
---|---|
Class: Security Audit (FAU) | FAU_STG_EXT Off-Loading of Audit Data |
Class: Cryptographic Support (FCS) | FCS_CKM_EXT Cryptographic Key Management FCS_ENT_EXT Entropy for Virtual Machines FCS_HTTPS_EXT HTTPS Protocol FCS_IPSEC_EXT IPsec Protocol FCS_RBG_EXT Cryptographic Operation (Random Bit Generation) FCS_SLT_EXT Cryptographic Salt Generation FCS_STG_EXT Cryptographic Key Storage |
Class: User Data Protection (FDP) | FDP_ITC_EXT Key Import FDP_TEE_EXT Trusted Execution Environment |
Class: Identification and Authentication (FIA) | FIA_AFL_EXT Authentication Failure Handling FIA_PMG_EXT Password Management FIA_TRT_EXT Authentication Throttling FIA_UIA_EXT Administrator Identification and Authentication FIA_X509_EXT X.509 Certificate Handling |
Class: Security Management (FMT) | FMT_CFG_EXT Secure by Default |
Class: Protection of the TSF (FPT) | FPT_JTA_EXT Debug Port Access FPT_PPF_EXT Protection of Platform Firmware FPT_ROT_EXT Platform Integrity FPT_RVR_EXT Platform Firmware Recovery FPT_TUD_EXT Platform Firmware Update |
Class: Trusted Path/Channels (FTP) | FTP_ITC_EXT Trusted Channel Communications FTP_ITE_EXT Encrypted Data Communications FTP_ITP_EXT Physically Protected Channel |
FAU_STG_EXT.1, Off-Loading of Audit Data, specifies how audit data may be transmitted or removed from the TOE, which is not covered by any FCS_STG component.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
FCS_CKM_EXT.4, Cryptographic Key and Key Material Destruction Timing, specifies the timing for key destruction, which is not addressed by FCS_CKM.4.
FCS_CKM_EXT.5, Cryptographic Key Derivation, requires the TSF to perform key derivation using a defined method, which is not addressed by any other FCS_CKM component.
Hierarchical to: No other components.
Dependencies to:
FCS_CKM.4 Cryptographic Key Destruction
Hierarchical to: No other components.
Dependencies to:
[FCS_CKM.1 Cryptographic Key Generation or
FDP_ITC_EXT.1 Key/Credential Import]
FCS_ENT_EXT.1, Entropy for Tenant Software, requires the TSF to provide entropy data to tenant software in a specified manner.
Hierarchical to: No other components.
Dependencies to:
FCS_RBG_EXT.1 Cryptographic Operation (Random Bit Generation)
FCS_HTTPS_EXT.1, HTTPS Protocol, defines requirements for the implementation of the HTTPS protocol.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: No other components.
Dependencies to:
[FCS_TLSC_EXT.1 TLS Client Protocol, or
FCS_TLSC_EXT.2 TLS Client Protocol with Mutual Authentication, or
FCS_TLSS_EXT.1 TLS Server Protocol, or
FCS_TLSS_EXT.2 TLS Server Protocol with Mutual Authentication]
FCS_IPSEC_EXT.1, IPsec Protocol, requires that IPsec be implemented as specified manner.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: No other components.
Dependencies to:
FCS_CKM.1 Cryptographic Key Generation
FCS_CKM.2 Cryptographic Key Establishment
FCS_COP.1 Cryptographic Operation
FCS_RBG_EXT.1 Cryptographic Operation (Random Bit Generation)
FIA_X509_EXT.1 X.509 Certificate Validation
FCS_RBG_EXT.1, Random Bit Generation, requires random bit generation to be performed in accordance with selected standards and seeded by an entropy source.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: No other components.
Dependencies to:
FCS_COP.1 Cryptographic Operation
FCS_SLT_EXT.1, Cryptographic Salt Generation, requires the TSF to generate salt values in a specified manner.
Hierarchical to: No other components.
Dependencies to:
FCS_RBG_EXT.1 Cryptographic Operation (Random Bit Generation)
FCS_STG_EXT.1, Protected Storage, requires the TSF to enforce protected storage for keys and secrets so that they cannot be accessed or destroyed without authorization.
FCS_STG_EXT.2, Key Storage Encryption, requires the TSF to ensure the confidentiality of stored data using a specified method.
FCS_STG_EXT.3, Key Integrity Protection, requires the TSF to ensure the integrity of stored data using a specified method.
The following actions could be considered for the management functions in FMT:
Hierarchical to: No other components.
Dependencies to:
FCS_CKM.4 Cryptographic Key Destruction
Hierarchical to: No other components.
Dependencies to:
FCS_COP.1 Cryptographic Operation
FCS_STG_EXT.1 Protected Storage
Hierarchical to: No other components.
Dependencies to:
FCS_COP.1 Cryptographic Operation
FDP_ITC_EXT.1, Key/Credential Import, requires the TSF to implement one or more means for importing keys and credentials into the TOE, which are not addressed by the FDP_ITC component.
Hierarchical to: No other components.
Dependencies to:
FCS_COP.1 Cryptographic Operation
FCS_STG_EXT.1 Key Storage Encryption
FTP_ITC_EXT.1 Trusted Channel Communications
FTP_ITE_EXT.1 Encrypted Data Communications
FTP_ITP_EXT.1 Physically Protected Channel
FDP_TEE_EXT.1, Trusted Execution Environment for Tenant Software, requires the TSF to implement a trusted execution environment for the use of tenant software.
FIA_AFL_EXT.1, Authentication Failure Handling, requires the TSF to monitor authorization attempts, including counting and limiting the number of attempts at failed or passed authorizations. This extended component permits considerably more flexibility for dealing with multiple authentication mechanisms than FIA_AFL.
The following actions could be considered for the management functions in FMT:
If FAU_GEN.1 is included in the ST, then the following audit events should be considered:
Hierarchical to: No other components.
Dependencies to:
FCS_CKM_EXT.4 Key Destruction
FIA_SMF.1 Specification of Management Functions
FIA_PMG_EXT.1, Password Management, requires the TSF to support passwords with varying composition and length requirements.
The following actions could be considered for the management functions in FMT:
FIA_TRT_EXT.1, Authentication Throttling, requires that the TSF enforce a limit on authentication attempts.
The following actions could be considered for the management functions in FMT:
The following should be considered for auditable events if FAU_GEN.1 is included in the ST:
Hierarchical to: No other components.
Dependencies to:
FIA_UAU.5 Multiple Authentication Mechanisms
FIA_UIA_EXT.1, Administrator Identification and Authentication, requires the TSF to ensure that all subjects attempting to perform TSF-mediated actions are identified and authenticated prior to authorizing these actions to be performed.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: No other components.
Dependencies to:
FIA_UAU.5 Multiple Authentication Mechanisms
FIA_X509_EXT.1, X.509 Certificate Validation, defines how the TSF must validate X.509 certificates that are presented to it.
FIA_X509_EXT.2, X.509 Certificate Authentication, requires the TSF to identify the functions for which it uses X.509 certificates for authentication
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: No other components.
Dependencies to:
FCS_COP.1 Cryptographic Operation
FCS_RBG_EXT.1 Cryptographic Operation (Random Bit Generation)
FPT_STM.1 Reliable Time Stamps
The following actions could be considered for the management functions in FMT:
Hierarchical to: No other components.
Dependencies to:
FIA_X509_EXT.1 X.509 Certificate Validation
FMT_CFG_EXT.1, Secure by Default Configuration, requires that default Administrator credentials be changed immediately after first use.
Hierarchical to: No other components.
Dependencies to:
FIA_UAU.1 Timing of Authentication
FMT_SMR.1 Security Roles
FPT_JTA_EXT.1, JTAG/Debug Port Access, requires that debug ports be accessible only to authorized Administrators.
FPT_JTA_EXT.2, JTAG/Debug Port Disablement, requires that debug ports be disabled.
Hierarchical to: No other components.
Dependencies to: No dependencies.
FPT_ROT_EXT.1, Platform Integrity Root, requires that the platform integrity be anchored in a root of trust.
FPT_ROT_EXT.2, Platform Integrity Extension, specifies how platform integrity is extended from the integrity root to other platform firmware.
FPT_ROT_EXT.3, Hardware component integrity, requires that the TOE support hardware supply chain integrity.
Hierarchical to: No other components.
Dependencies to: No dependencies.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: No other components.
Dependencies to:
FPT_ROT_EXT.1 Platform Integrity Root
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: No other components.
Dependencies to:
FPT_ROT_EXT.1 Platform Integrity Root
FPT_PPF_EXT.1, Protection of Platform Firmware and Critical Data, requires that the TSF prevent platform firmware from being modified outside of the update mechanisms defined in FPT_TUD_EXT.
Hierarchical to: No other components.
Dependencies to: No dependencies.
FPT_RVR_EXT.1, Platform Firmware Recovery, defines mechanisms for recovering from a platform firmware integrity failure.
The following actions could be considered for the management functions in FMT:
Hierarchical to: No other components.
Dependencies to:
FPT_TUD_EXT.4 Secure Local Update Mechanism
FPT_TUD_EXT.1, TOE Firmware Update, requires that the TSF support update of platform firmware.
FPT_TUD_EXT.2, Platform Firmware Authenticated Update Mechanism, specifies the requirements for authenticated update of platform firmware.
FPT_TUD_EXT.3, Platform Firmware Delayed-Authentication Update Mechanism, specifies the requirements for delayed-authentication update of platform firmware.
FPT_TUD_EXT.4, Secure Local Platform Firmware Update Mechanism, specifies the requirements for secure local update of platform firmware.
The following actions could be considered for the management functions in FMT:
Hierarchical to: No other components.
Dependencies to:
FPT_TUD_EXT.2 Platform Firmware Authenticated Update Mechanism
FPT_TUD_EXT.3 Platform Firmware Delayed-Authentication Update Mechanism
FPT_TUD_EXT.4 Secure Local Platform Firmware Update Mechanism
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: No other components.
Dependencies to:
FCS_COP.1 Cryptographic Operations
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: No other components.
Dependencies to: No dependencies.
Hierarchical to: No other components.
Dependencies to: No dependencies.
FTP_ITC_EXT.1, Trusted Channel Communication, requires the TSF to implement one or more cryptographic protocols to secure connectivity between the TSF and various external entities.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: No other components.
Dependencies to: No dependencies.
FTP_ITE_EXT.1, Encrypted Data Communications, requires the TSF to encrypt data in the specified manner using key data that is provided to an external entity in the specified manner.
Hierarchical to: No other components.
Dependencies to:
FCS_COP.1 Cryptographic Operation
FTP_ITP_EXT.1, Physically Protected Channel, requires the TSF to use a physically protected channel for transmission of data to an external entity.
This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.2 Dependencies between components.
This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP provides evidence that these controls are present and have been evaluated.
. Table 16: Implicitly Satisfied RequirementsRequirement | Rationale for Satisfaction |
FIA_UAU.1 – Timing of Authentication | FMT_CFG_EXT.1 has a dependency on FIA_UAU.1 because it cannot exist unless the TOE supports an authentication mechanism. |
Factor | Same/Different | Guidance |
Product Type | Different | Products in different product classes are not equivalent. Servers, EUDs, and IoT devices are not equivalent. |
Product Vendors | Different | Products manufactured by different vendors are not equivalent. |
PP-Specified Functionality | Same | If differences between products affect only non-PP-specified functionality, then the models are equivalent. |
Different | If PP-specified security functionality is affected by the differences between products, then the products are not equivalent and must be tested separately. It is necessary to test only the functionality affected by the differences. If only differences are tested, then the differences must be enumerated, and for each difference the Vendor must provide an explanation of why each difference does or does not affect PP-specified functionality. If the products are fully tested separately, then there is no need to document the differences. |
Factor | Same/Different/None | Guidance |
Processor Vendors | Different | Functionality implemented through processors manufactured by different vendors is not equivalent. |
Processor/Chipset Architecture | Different | Functionality implemented through processors with different processor and chipset architectures are not equivalent. |
Firmware Versions | Same | Functionality implemented through equivalent processors by the same version of firmware is considered equivalent. |
PP-Specified Functionality | Same | For PP-specified security functionality implemented through equivalent processors and different firmware versions, the platforms are equivalent with respect to the functionality if execution of the functionality follows the same code paths on both platforms. |
PP-Specified Functionality | Different | For PP-specified security functionality implemented through equivalent processors and different firmware versions, the platforms are not equivalent with respect to the functionality if execution of the functionality follows different code paths on both platforms. |
Acronym | Meaning |
---|---|
AES | Advanced Encryption Standard |
AK | Asymmetric Key |
ANSI | American National Standards Institute |
API | Application Programming Interface |
BAF | Biometric Authentication Factor |
BMC | Baseboard Management Controller |
Base-PP | Base Protection Profile |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
CMAC | Cipher-based Message Authentication Code |
CN | Common Names |
CRL | Certificate Revocation List |
CSP | Critical Security Parameters |
CSfC | Commercial Solutions for Classified |
DAR | Data-at-Rest |
DH | Diffie-Hellman Key Exchange |
DN | Distinguished Name |
DRBG | Deterministic Random Bit Generator |
DSS | Digital Signature Standard |
DTLS | Datagram Transport Layer Security |
ECDHE | Elliptic Curve Diffie-Hellman Ephemeral |
ECDSA | Elliptic Curve Digital Signature Algorithm |
ECIES | Elliptic Curve Integrated Encryption Scheme |
EP | Extended Package |
EUD | End-User Device |
FIPS | Federal Information Processing Standards |
FP | Functional Package |
FQDN | Fully Qualified Domain Name |
GPCP | General-Purpose Computing Platform |
HMAC | Hash-based Message Authentication Code |
HTTPS | Hypertext Transfer Protocol Secure |
IEC | International Electrotechnical Commission |
IEEE | Institute of Electrical and Electronics Engineers |
IP | Internet Protocol |
ISO | International Organization for Standardization |
IT | Information Technology |
ITSEF | Information Technology Security Evaluation Facility |
IoT | Internet of Things |
JTAG | Joint Test Action Group |
KDF | Key-Derivation Function |
KMAC | KECCAK Message Authentication Code |
MAC | Message Authentication Code |
MC | Management Controller |
NIST | National Institute of Standards and Technology |
OCSP | Online Certificate Status Protocol |
OE | Operational Environment |
OEM | Original Equipment Manufacturer |
OID | Object Identifier |
OMTP | Open Mobile Terminal Platform |
OS | Operating System |
PBKDF | Password-based Key-Derivation Function |
PKCS | Public Key Cryptography Standards |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
RBG | Random Bit Generator |
RFC | Request for Comment |
RNG | Random Number Generator |
RoT | Root of Trust |
SA | Security Association |
SAN | Subject Alternative Name |
SAR | Security Assurance Requirement |
SFR | Security Functional Requirement |
SHA | Secure Hash Algorithm |
SK | Symmetric Key |
SPD | Security Policy Database |
SSH | Secure Shell |
ST | Security Target |
SWID | Software Identification |
TEE | Trusted Execution Environment |
TLS | Transport Layer Security |
TOE | Target of Evaluation |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |
USB | Universal Serial Bus |
VPN | Virtual Private Network |
VS | Virtualization System |
XCCDF | eXtensible Configuration Checklist Description Format |
XOR | Exclusive Or |
cPP | Collaborative Protection Profile |
Identifier | Title |
---|---|
[CC] | Common Criteria for Information Technology Security Evaluation -
|
[CEM] | Common Evaluation Methodology for Information Technology Security - Evaluation Methodology, CCMB-2012-09-004, Version 3.1, Revision 4, September 2012. |