Common Criteria Evaluation and Validation Scheme

National Information Assurance Partnership (NIAP)

Title: Some PP Name

Maintained by: NIAP and CESG

Unique Identifier: 42

Version: 1.0

Status: draft

Date of issue: 19 March 2015

Approved by:

Supersedes:

Background and Purpose
This section sets the context for not only the ESR, but what is expected of the resulting Protection Profile (PP). The intent is that the remaining sections provide succinct statements that highlight the relevant aspects to be addressed by the Technical Community (TC) constructing the PP. Here, the authors provide a narrative that introduces the reader to the problem being solved, and presents key aspects that support or guide the TC, and may elaborate on subtleties not apparent in the “bulleted” high level statements.
Use Cases
This section is intended to provide the initial scope/bound of the security problem by providing the reader with concise statements regarding the scenarios in which the technology is being used. The intended usage presented here should lay the groundwork for the identifying the resources to be protected, and what threats must be considered in the drafting of the Essential Security Requirements (ESR) and for the TC to consider when writing the PP.
Resources to be protected
This section is intended to provide the initial scope/bound of the security problem by providing the reader with concise statements regarding the scenarios in which the technology is being used. The intended usage presented here should lay the groundwork for the identifying the resources to be protected, and what threats must be considered in the drafting of the Essential Security Requirements (ESR) and for the TC to consider when writing the PP.
Attacker access
The following assumptions are made about attackers' ability to develop attacks:

The attacker is expected to engage in the following general classes of attack:
Essential Security Requirements
This is where the authors present an initial set of English requirements that specify security functionality, rather than design and/or implementation characteristics. These requirements will provide the foundation for which the detailed set of requirements is derived. It is important that the requirements captured here make an attempt to fully address the categories (e.g., access control, identification and authentication, management capabilities, roles of administration, secure communications, and audit). That's not to say the requirements are fully specified or detailed enough to simply translate to Common Criteria security functional requirements. The goal is that there is enough information contained here, as well as the other sections of this document, to provide the TC enough information to ensure they have an understanding of what is minimally required in breath.
Assumptions
Simply put, this section presents the aspects of the product and its intended environment that can be assumed to hold true. This will provide additional scope on the resulting PP. The following assumptions are made for the operating system product and its operational environment:
Optional Extensions
Additional security functionality that may be appropriate for some use cases, and can be expressed in extensions to this document, includes:
Outside the TOE's Scope
The following list contains items that are explicitly out-of-scope for any evaluation against the product PP