Version | Date | Comment |
---|---|---|
1.0 | 2021-06-18 | Initial release as PP-Module |
1.1 | 2023-08-25 | Updates to conform to CC:2022 |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Add-on | Capabilities or functionality added to an application. This term includes plug-ins, extensions, and other controls. |
Administrator | The Administrator is responsible for management activities, including setting the policy that is applied by the enterprise on the browser. This administrator is likely to be acting remotely. If the platform is unmanaged by an enterprise, the user can act as the administrator. |
Cross-Site Request Forgery (CSRF) | A vulnerability where an attacker gets a target user to execute a script with that user's privileges. |
Cross-Site Scripting (XSS) | Injection of untrusted content into a vulnerable web application to render or execute that content on a victim's system. |
Domain | A realm of administrative autonomy, authority or control on the internet (e.g., cnn.com). |
Extension | A bundle of code added to the browser to add specific functionality that the browser does not provide by default. |
HTML5 | A new version of HTML that incorporates many new features that enrich the browsing experience. |
HyperText Markup Language (HTML) | A language used by web servers to present content to browsers. |
HyperText Transfer Protocol (HTTP) | A protocol for communicating on the web. |
HyperText Transfer Protocol Secure (HTTPS) | A secure version of HTTP that runs over an encrypted channel (SSL/TLS). |
JavaScript | A scripting language commonly integrated into webpages to generate dynamic, interactive content |
Mobile Code | Software transmitted from a remote system for execution within a limited execution environment on the local system. Typically, there is no persistent installation and execution begins without the user's consent or even notification. Examples of mobile code technologies include Java applets, Adobe ActionScript, and Microsoft Silverlight. Note that references to mobile code do not refer to JavaScript. |
Plug-in | A browser add-on to handle specific types of web content. |
Pop-up | A piece of web code that causes a browser to open a window outside the window that is currently in focus. |
Port | An application-specific construct that functions as a communications endpoint in a computer's host OS; in a web environment, port 80 is the default port for HTTP communications, although other ports can be used. In a web address, the port follows the domain or sub-domain name (e.g., http://www.cnn.com:80). |
Protocol | A system of digital rules for data exchange within or between computers; in a web environment, the typical protocols are HTTP and HTTPS. |
Sandbox | A security mechanism for separating running processes, most often used to run untrusted or vulnerable processes by reducing their privileges to such an extent that they should not be able to harm the host system. |
Sensitive Data | Sensitive data may include all user or enterprise data or may be specific application data such as data transferred to submit a form or complete a transaction. Sensitive data must minimally include personally identifiable information (PII), credentials, and keys. Sensitive data is expected to be identified in the ST. |
Sub-domain | An internet domain which is part of a primary domain, denoted by a prefix before the primary domain (e.g., news.cnn.com). |
Tabs | A mechanism that allows a browser to display content from multiple websites in the same window. |
Web Browser | An application that retrieves and renders content provided by a web server. The terms web browser, browser, and TOE are interchangeable in this document. |
An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.
This document does not define any additional OSPs.Threat, Assumption, or OSP | Security Objectives | Rationale |
T.FLAWED_ADDON | O.ADDON_INTEGRITY | The threat T.FLAWED_ADDON is countered by O.ADDON_INTEGRITY, which ensures that a conformant TOE either does not support add-ons at all (in which case there is no possibility of it executing a flawed add-on) or that it supports only add-ons that can prove their integrity. |
T.NETWORK_ATTACK (from AppPP) | O.BROWSER_PROTECTED_COMMS | The threat T.NETWORK_ATTACK is countered by O.BROWSER_PROTECTED_COMMS as this provides for the ability of the TOE to resist unauthorized modification via a network vector. |
O.BROWSER_MANAGEMENT | The threat T.NETWORK_ATTACK is countered by O.BROWSER_MANAGEMENT as this provides for the ability to configure the application to defend against network attack. | |
O.BROWSER_INTEGRITY | The threat T.NETWORK_ATTACK is countered by O.BROWSER_INTEGRITY as this provides for integrity of transmitted data. | |
T.NETWORK_EAVESDROP (from AppPP) | O.BROWSER_MANAGEMENT | The threat T.NETWORK_EAVESDROP is countered by O.BROWSER_MANAGEMENT as this provides for the ability to configure the application to protect the confidentiality of its transmitted data. |
O.BROWSER_PROTECTED_COMMS | The threat T.NETWORK_EAVESDROP is countered by O.BROWSER_PROTECTED_COMMS as this provides for confidentiality of transmitted data. | |
T.PHYSICAL_ACCESS (from AppPP) | O.BROWSER_PROTECTED_STORAGE | The threat T.PHYSICAL_ACCESS is countered by O.BROWSER_PROTECTED_STORAGE, which protects against unauthorized attempts to access physical storage used by the TOE. |
T.SAME_ORIGIN_VIOLATION | O.DOMAIN_ISOLATION | The threat T.SAME_ORIGIN_VIOLATION is countered by O.DOMAIN_ISOLATION, which ensures that a conformant TOE will prevent leakage of content between multiple windows or tabs being rendered by the same application. |
# | Management Function | Administrator | User |
1 | Enable and disable storage of third-party cookies | OOptional | MMandatory |
2 | Enable and disable use of OCSP for obtaining the revocation status of X.509 certificates | OOptional | OOptional |
3 | Configure inclusion of user-agent information in HTTP headers | OOptional | OOptional |
4 | Enable and disable ability for websites to collect tracking information about the user through [selection: zombie cookies, add-on based tracking (e.g., Flash cookies), browsing history, [assignment: other tracking mechanisms] ] | OOptional | OOptional |
5 | Enable and disable deletion of stored browsing data (cache, web form information) | OOptional | MMandatory |
6 | Enable and disable storage of sensitive information (e.g., auto-fill, auto-complete) in persistent storage | OOptional | OOptional |
7 | Configure cookie cache size | OOptional | OOptional |
8 | Configure cache size | OOptional | OOptional |
9 | Enable and disable interaction with Graphic Processing Units (GPUs) | OOptional | OOptional |
10 | Configure the ability to advance to a website with an invalid or unvalidated X.509 certificate | OOptional | OOptional |
11 | Enable and disable establishment of a trusted channel if the browser cannot establish a connection to determine the validity of a certificate | OOptional | OOptional |
12 | Configure the use of an application reputation service to detect malicious applications prior to download | OOptional | OOptional |
13 | Configure the use of a URL reputation service to detect sites that contain malware or phishing content | OOptional | OOptional |
14 | Enable and disable automatic installation of software updates and patches | OOptional | OOptional |
15 | Enable and disable ability for websites to register protocol handlers | OOptional | OOptional |
16 | Enable and disable display notification when unsigned, untrusted, or unverified mobile code is encountered | OOptional | OOptional |
17 | Enable and disable user's ability to select default actions upon download of a file (e.g., always open or always save a downloaded file) | OOptional | OOptional |
18 | Enable and disable launching of downloaded files outside the browser | OOptional | OOptional |
19 | Enable and disable JavaScript | OOptional | OOptional |
20 | Enable and disable [selection: ActiveX, Flash, Java, [assignment: other mobile code types supported by the browser] ] mobile code | OOptional | OOptional |
21 | Enable and disable support for add-ons | OOptional | OOptional |
22 | Enable and disable individual add-ons | OOptional | OOptional |
23 | Enable and disable HSTS mode | OOptional | OOptional |
The following rationale provides justification for each security objective for the TOE,
showing that the SFRs are suitable to meet and achieve the security objectives:
Objective | Addressed by | Rationale |
---|---|---|
O.BROWSER_INTEGRITY | FPT_DNL_EXT.1 | FPT_DNL_EXT.1 supports the objective by preventing the automatic execution of downloaded files which could otherwise cause integrity violations to the TOE itself or to its platform. |
FPT_MCD_EXT.1 | FPT_MCD_EXT.1 supports the objective by preventing the automatic execution of mobile code which could otherwise cause integrity violations to the TOE itself or to its platform. | |
FPT_INT_EXT.1 (objective) | FPT_INT_EXT.1 supports the objective by optionally requiring the TSF to implement a reputation service to prevent the acquisition of potentially malicious applications. | |
O.BROWSER_MANAGEMENT | FDP_TRK_EXT.1 | FDP_TRK_EXT.1 supports the objective by notifying the user when various data is being tracked to allow for control of the disclosure of configuration information. |
FMT_MOF_EXT.1 | FMT_MOF_EXT.1 supports the objective by defining the management functionality that is specific to web browser applications. | |
O.BROWSER_PROTECTED_STORAGE | FDP_COO_EXT.1 | FDP_COO_EXT.1 supports the objective by defining a mechanism to prevent untrusted data from being loaded into protected storage. |
FDP_PST_EXT.1 (optional) | FDP_PST_EXT.1 supports the objective by optionally defining the minimum set of persistent data that the TSF is required to store. | |
FPT_INT_EXT.1 (objective) | FPT_INT_EXT.1 supports the objective by optionally requiring the TSF to implement a mechanism to protect against downloading known malicious applications that may adversely affect data stored at rest. | |
O.BROWSER_PROTECTED_COMMS | FCS_CKM_EXT.1 (modified from Base-PP) | FCS_CKM_EXT.1 supports the objective by requiring that the TSF provide or invoke a cryptographic function for asymmetric key generation. |
FCS_HTTPS_EXT.1/Client (from Base-PP) | FCS_HTTPS_EXT.1/Client supports the objective by defining the TSF's implementation of HTTPS. | |
FCS_RBG_EXT.1 (modified from Base-PP) | FCS_RBG_EXT.1 supports the objective by requiring that the TSF provide or invoke a DRBG for secure key generation. | |
FIA_X509_EXT.1 (from Base-PP) | FIA_X509_EXT.1 supports the objective by requiring the TSF to implement or invoke an X.509 certificate validation service. | |
FIA_X509_EXT.2 (from Base-PP) | FIA_X509_EXT.2 supports the objective by defining the TOE's use of X.509 certificates and what behavior the TOE takes when the revocation status of a certificate cannot be determined. | |
FTP_DIT_EXT.1 (modified from Base-PP) | FTP_DIT_EXT.1 supports the objective by specifying the trusted communications channels used by the TOE to protect data in transit. | |
FDP_STR_EXT.1 | FDP_STR_EXT.1 supports the objective by requiring the use of HTTPS for certain types of data transfer. | |
FCS_STS_EXT.1 (objective) | FCS_STS_EXT.1 supports the objective by optionally requiring the TSF to implement HSTS for secure data transmission. | |
FPT_INT_EXT.2 (objeictve) | FPT_INT_EXT.2 supports the objective by optionally requiring the TSF to implement a URL reputation service that can block communications with malicious entities. | |
O.DOMAIN_ISOLATION | FDP_ACF_EXT.1 | FDP_ACF_EXT.1 supports the objective by isolating local and session storage to its origin point. |
FDP_SBX_EXT.1 | FDP_SBX_EXT.1 supports the objective by ensuring that rendering of content is isolated to its origin point. | |
FDP_SOP_EXT.1 | FDP_SOP_EXT.1 supports the objective by enforcing the concept of a same origin policy to prevent web content with different origins from interacting with one another. | |
O.ADDON_INTEGRITY | FPT_AON_EXT.1 | FPT_AON_EXT.1 supports the objective by specifying whether the TSF has the ability to load add-ons. |
FPT_AON_EXT.2 (selection-based) | FPT_AON_EXT.2 supports the objective by defining a cryptographic method for the TSF to validate the integrity of add-ons if the TOE supports their use. |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.FLAWED_ADDON | The threat of a user installing a flawed add-on is consistent with the T.LOCAL_ATTACK threat from the Base-PP. A flawed add-on, whether crafted deliberately or unintentionally, could cause the product to operate in a manner where it or its platform can be compromised. |
T.SAME_ORIGIN_VIOLATION | This threat extends the security problem definition of the Base-PP by defining a potential vulnerability that specifically applies to the content that is handled by web browsers. |
Listed below are the security objectives defined in this PP-Module with rationale for their consistency with the App PP. The PP-Module shares the
executable application asset with the App PP but defines additional security objectives because the PP-Module defines a specific type of software application
with security functionality that is common to the application type.
Note that the PP-Module is implicitly consistent with any claimed functional packages because the applicable functional packages do not have
TOE objecitves of their own; per section 2, any claimed functional package is intended to support the O.PROTECTED_COMMS objective in the
App PP.
The objectives for the TOEs are consistent with the App PP based on the following rationale:
PP-Module TOE Objective | Consistency Rationale |
---|---|
O.BROWSER_INTEGRITY | This objective is an enhancement to the O.INTEGRITY objective defined in the Base-PP, specifically in regards to the integrity protection mechanisms that apply to web browsers. |
O.BROWSER_MANAGEMENT | This objective is an enhancement to the O.MANAGEMENT objective defined in the Base-PP, specifically in regards to the secure administration of functions that are particular to web browser applications. |
O.BROWSER_PROTECTED_STORAGE | This objective is an enhancement to the O.PROTECTED_STORAGE objective defined in the Base-PP, specifically in regards to the data-at-rest protection that applies to web browser applications. |
O.BROWSER_PROTECTED_COMMS | This objective is an enhancement to the O.PROTECTED_COMMS objective defined in the Base-PP, specifically in regards to the data-in-transit protection that applies to web browser applications. |
O.DOMAIN_ISOLATION | This objective applies to functionality that is specific to web browser applications and is therefore beyond the original scope of the Base-PP. |
O.ADDON_INTEGRITY | This objective is an enhancement to the O.BROWSER_INTEGRITY objective defined in the Base-PP. Where O.BROWSER_INTEGRITY is concerned with the integrity of the TOE application, O.ADDON_INTEGRITY is concerned with the integrity of third-party add-ons that can be loaded into the TOE. |
This PP-Module does not define any objectives for the TOE's operational environment.
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
FCS_CKM_EXT.1 | This SFR is changed from its definition in the App PP to remove one of the available selection options because it will never apply in the case where the TOE conforms to this PP-Module. |
FCS_HTTPS_EXT.1/Client | This SFR is unchanged from its definition in the App PP; the SFR is recategorized from selection-based to mandatory when the TOE conforms to this PP-Module. |
FCS_RBG_EXT.1 | This SFR is changed from its definition in the App PP to remove one of the available selection options because it will never apply in the case where the TOE conforms to this PP-Module. |
FIA_X509_EXT.1 | This SFR is unchanged from its definition in the App PP; the SFR is recategorized from selection-based to mandatory when the TOE conforms to this PP-Module. |
FIA_X509_EXT.2 | This SFR is unchanged from its definition in the App PP; the SFR is recategorized from selection-based to mandatory when the TOE conforms to this PP-Module. |
FTP_DIT_EXT.1 | This SFR is changed from its definition in the App PP to mandate the protection of sensitive data using only specified protocols. |
Additional SFRs | |
This PP-Module does not add any requirements when the App PP is the base. | |
Mandatory SFRs | |
FDP_ACF_EXT.1 | This SFR defines domain separation of web content when a web browser is simultaneously accessing content from multiple sources. It does not impact the App PP functionality. |
FDP_COO_EXT.1 | This SFR defines behavior for handling cookies, which are data specific to web browser applications. It does not impact the App PP functionality. |
FDP_SBX_EXT.1 | This SFR defines behavior for rendering of webpages, which is by definition functionality that is associated with web browser applications. It does not impact the App PP functionality. |
FDP_SOP_EXT.1 | This SFR defines behavior for script execution on webpages, which is by definition functionality that is associated with web browser applications. It does not impact the App PP functionality. |
FDP_STR_EXT.1 | This SFR defines behavior for handling cookies, which are data specific to web browser applications. It does not impact the App PP functionality. |
FDP_TRK_EXT.1 | This SFR defines behavior for handling tracking information that is specific to web browser applications. It does not impact the App PP functionality. |
FMT_MOF_EXT.1 | This SFR defines a specific set of management functions for a web browser. It does not impact the App PP functionality. |
FPT_AON_EXT.1 | This SFR defines what types of add-ons a web browser may use. It does not impact the App PP functionality. |
FPT_DNL_EXT.1 | This SFR defines behavior for handling file data that can be downloaded by a web browser. It does not impact the App PP functionality. |
FPT_MCD_EXT.1 | This SFR defines behavior for mobile code that is rendered by a web browser. It does not impact the App PP functionality. |
Optional SFRs | |
FDP_PST_EXT.1 | This SFR defines the persistent information that must be stored for web browser functionality to work as intended. It does not impact functionality described by the App PP. |
Objective SFRs | |
FCS_STS_EXT.1 | This SFR defines behavior for implementation of HSTS, which is a communications mechanism specific to web content. It does not impact the App PP functionality. |
FPT_INT_EXT.1 | This SFR defines behavior interaction with a reputation service for file data that the TOE can be used to download. It does not impact the App PP functionality. |
FPT_INT_EXT.2 | This SFR defines behavior interaction with a reputation service for web content that the TOE can be used to interact with. It does not impact the App PP functionality. |
Implementation-based SFRs | |
This PP-Module does not define any Implementation-based requirements. | |
Selection-based SFRs | |
FPT_AON_EXT.2 | This SFR defines how web browsers verify add-ons. It does not impact functionality described by the App PP. |
This PP-Module does not define any Implementation-based SFRs.
Functional Class | Functional Components |
---|---|
Cryptographic Support (FCS) | FCS_STS_EXT Strict Transport Security |
Protection of the TSF (FPT) | FPT_AON_EXT Add-Ons FPT_DNL_EXT File Downloads FPT_INT_EXT Reputation Service Interaction FPT_MCD_EXT Mobile Code |
Security Management (FMT) | FMT_MOF_EXT Management of Functions Behavior |
User Data Protection (FDP) | FDP_ACF_EXT Access Control Functions FDP_COO_EXT Cookie Blocking FDP_PST_EXT Storage of Persistent Information FDP_SBX_EXT Sandboxing FDP_SOP_EXT Same Origin Policy FDP_STR_EXT Secure Transmission of Cookie Data FDP_TRK_EXT Tracking Information Collection |
FCS_STS_EXT.1, Strict Transport Security, requires the TSF to implement HTTP Strict-Transport-Security.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_HTTPS_EXT.1 HTTPS Protocol |
FPT_AON_EXT.1, Support for Only Trusted Add-ons, requires the TSF to either support no add-ons or to only support trusted add-ons.
FPT_AON_EXT.2, Trusted Installation and Update for Add-ons, requires the TSF to implement a method to verify the integrity of add-ons and ensure that untrusted or unknown add-ons are not loaded for use.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation FPT_AON_EXT.1 Support for Only Trusted Add-Ons |
FPT_DNL_EXT.1, File Downloads, requires the TSF to intervene in the case it is prompted to download executable file data.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
FPT_MCD_EXT.1, Mobile Code, requires the TSF to identify the mobile code types it supports and to ensure that a mechanism exists to prevent the automatic execution of potentially malicious mobile code.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_INT_EXT.1, Interactions with Application Reputation Services, requires the TSF to be able to interact with an application reputation service to assess whether application data is potentially malicious.
FPT_INT_EXT.2, Interactions with URL Reputation Services, requires the TSF to be able to interact with a URL reputation service to assess whether websites are potentially malicious.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
FMT_MOF_EXT.1, Management of Functions Behavior, requires the TSF to implement management functions specified in the SFR.
No specific management functions are identified.
There are no auditable events foreseen.
FDP_ACF_EXT.1, Local and Session Storage Separation, requires the TSF to enforce data protection mechanisms such that user data is only accessible from its originator.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FDP_COO_EXT.1, Cookie Blocking, requires the TSF to have a configurable mechanism for blocking the storage of third-party cookies.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
FDP_SBX_EXT.1, Sandboxing of Rendering Processes, requires the TSF to implement sandboxing of rendering processes such that least privilege is enforced on the rendering process.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FDP_SOP_EXT.1, Same Origin Policy, requires the TSF to implement the Same Origin Policy concept for web content.
No specific management functions are identified.
There are no auditable events foreseen.
FDP_STR_EXT.1, Secure Transmission of Cookie Data, requires the TSF to use HTTPS to transmit cookie data that has a security-relevant attribute.
No specific management functions are identified.
There are no auditable events foreseen.
FDP_TRK_EXT.1, Tracking Information Collection, requires the TSF to specify the data tracking that results in user notification.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
FDP_PST_EXT.1, Storage of Persistent Information, requires the TSF to enumerate the minimum set of data that it must store persistently in order to function normally.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Acronym | Meaning |
---|---|
Base-PP | Base Protection Profile |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
cPP | Collaborative Protection Profile |
CRL | Certificate Revocation List |
CSRF | Cross-Site Request Forgery |
EP | Extended Package |
FP | Functional Package |
GPU | Graphics Processing Unit |
HSTS | HTTP Strict Transport Security |
HTML | HyperText Markup Language |
HTTP | HyperText Transfer Protocol |
HTTPS | HyperText Transfer Protocol Secure |
IETF | Internet Engineering Task Force |
IPC | Inter-Process Communication |
OCSP | Online Certificate Status Protocol |
OE | Operational Environment |
Portable Document Format | |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
SaaS | Software as a Service |
SAR | Security Assurance Requirement |
SFR | Security Functional Requirement |
ST | Security Target |
TLS | Transport Layer Security |
TOE | Target of Evaluation |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |
W3C | World Wide Web Consortium |
XSS | Cross-Site Scripting |
Identifier | Title |
---|---|
[App PP] | Protection Profile for Application Software, Version 2.0, TBD |
[CEM] | Common Methodology for Information Technology Security - Evaluation Methodology, CCMB-2022-11-006, CEM:2022, Revision 1, November 2022. |
[CC] | Common Criteria for Information Technology Security Evaluation -
|