Version | Date | Comment |
---|---|---|
1.0 | 2016-11-17 | Initial Publication |
1.1 | 2021-06-14 | Incorporate TDs, Reference TLS Package, Add Equivalency Guidelines, etc. |
1.1.1 | 2021-08-19 | Errata release. Fixes a few typos. |
2.0 | 2025-05-07 | CC:2022 conversion. |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Administrator | Administrators perform management activities on the VS. These management functions do not include administration of software running within Guest VMs, such as the Guest OS. Administrators need not be human as in the case of embedded or headless VMs. Administrators are often nothing more than software entities that operate within the VM. |
Auditor | Auditors are responsible for managing the audit capabilities of the TOE. An Auditor may also be an Administrator. It is not a requirement that the TOE be capable of supporting an Auditor role that is separate from that of an Administrator. |
Domain | A Domain or Information Domain is a policy construct that groups together execution environments and networks by sensitivity of information and access control policy. For example, classification levels represent information domains. Within classification levels, there might be other domains representing communities of interest or coalitions. In the context of a VS, information domains are generally implemented as collections of VMs connected by virtual networks. The VS itself can be considered an Information Domain, as can its Management Subsystem. |
Guest Network | See Operational Network. |
Guest Operating System (OS) | An operating system that runs within a Guest VM. |
Guest VM | A Guest VM is a VM that contains a virtual environment for the execution of an independent computing system. Virtual environments execute mission workloads and implement customer-specific client or server functionality in Guest VMs, such as a web server or desktop productivity applications. |
Helper VM | A Helper VM is a VM that performs services on behalf of one or more Guest VMs, but does not qualify as a Service VM—and therefore is not part of the VMM. Helper VMs implement functions or services that are particular to the workloads of Guest VMs. For example, a VM that provides a virus scanning service for a Guest VM would be considered a Helper VM. For the purposes of this document, Helper VMs are considered a type of Guest VM, and are therefore subject to all the same requirements, unless specifically stated otherwise. |
Host Operating System (OS) | An operating system onto which a VS is installed. Relative to the VS, the Host OS is part of the Platform. There need not be a Host OS, but often VSes employ a Host OS or Control Domain to support guest access to host resources. Sometimes these domains are themselves encapsulated within VMs. |
Hypercall | An API function that allows VM-aware software running within a VM to invoke VMM functionality. |
Hypervisor | The Hypervisor is part of the VMM. It is the software executive of the physical platform of a VS. A Hypervisor’s primary function is to mediate access to all CPU and memory resources, but it is also responsible for either the direct management or the delegation of the management of all other hardware devices on the hardware platform. |
Information Domain | See Domain. |
Introspection | A capability that allows a specially designated and privileged domain to have visibility into another domain for purposes of anomaly detection or monitoring. |
Management Network | A network, which may have both physical and virtualized components, used to manage and administer a VS. Management networks include networks used by VS Administrators to communicate with management components of the VS, and networks used by the VS for communications between VS components. For purposes of this document, networks that connect physical hosts and backend storage networks for purposes of VM transfer or backup are considered management networks. |
Management Subsystem | Components of the VS that allow VS Administrators to configure and manage the VMM, as well as configure Guest VMs. VMM management functions include VM configuration, virtualized network configuration, and allocation of physical resources. |
Operational Network | An Operational Network is a network, which may have both physical and virtualized components, used to connect Guest VMs to each other and potentially to other entities outside of the VS. Operational Networks support mission workloads and customer-specific client or server functionality. Also called a “Guest Network.” |
Physical Platform | The hardware environment on which a VS executes. Physical platform resources include processors, memory, devices, and associated firmware. |
Platform | The hardware, firmware, and software environment into which a VS is installed and executes. |
Service VM | A Service VM is a VM whose purpose is to support the Hypervisor in providing the resources or services necessary to support Guest VMs. Service VMs may implement some portion of Hypervisor functionality, but also may contain important system functionality that is not necessary for Hypervisor operation. As with any VM, Service VMs necessarily execute without full Hypervisor privileges—only the privileges required to perform its designed functionality. Examples of Service VMs include device driver VMs that manage access to physical devices, VMs that provide life-cycle management and provisioning of Hypervisor and Guest VMs, and name-service VMs that help establish communication paths between VMs. |
System Security Policy (SSP) | The overall policy enforced by the VS defining constraints on the behavior of VMs and users. |
User | Users operate Guest VMs and are subject to configuration policies applied to the VS by Administrators. Users need not be human as in the case of embedded or headless VMs, users are often nothing more than software entities that operate within the VM. |
Virtual Machine (VM) | A Virtual Machine is a virtualized hardware environment in which an operating system may execute. |
Virtual Machine Manager (VMM) | A VMM is a collection of software components responsible for enabling VMs to function as expected by the software executing within them. Generally, the VMM consists of a Hypervisor, Service VMs, and other components of the VS, such as virtual devices, binary translation systems, and physical device drivers. It manages concurrent execution of all VMs and virtualizes platform resources as needed. |
Virtualization System (VS) | A software product that enables multiple independent computing systems to execute on the same physical hardware platform without interference from one another. For the purposes of this document, the VS consists of a Virtual Machine Manager (VMM), Virtual Machine abstractions, a management subsystem, and other components. |
Assumption or OSP | Security Objectives | Rationale |
A.PLATFORM_INTEGRITY | OE.PHYSICAL | If the underlying platform has not been compromised prior to installation of the TOE, its integrity can be assumed to be intact. |
A.PHYSICAL | OE.PHYSICAL | If the TOE is deployed in a location that has appropriate physical safeguards, it can be assumed to be physically secure. |
A.TRUSTED_ADMIN | OE.TRUSTED_ADMIN | Providing guidance to administrators and ensuring that individuals are properly trained and vetted before being given administrative responsibilities will ensure that they are trusted. |
A.NON_MALICIOUS_USER | OE.NON_MALICIOUS_USER | If the organization properly vets and trains users, it is expected that they will be non-malicious. |
OE.CONFIG | If the TOE is administered by a non-malicious and non-negligent user, the expected result is that the TOE will be configured in a correct and secure manner. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_GEN.1 | ||
No events specified | N/A | |
FAU_SAR.1 | ||
No events specified | N/A | |
FAU_STG.1 | ||
Failure of audit data capture due to lack of disk space or pre-defined limit. | No additional information | |
On failure of logging function, capture record of failure and record upon restart of logging function. | No additional information | |
FAU_STG.2 | ||
No events specified | N/A | |
FCS_CKM.1 | ||
No events specified | N/A | |
FCS_CKM.2 | ||
No events specified | N/A | |
FCS_CKM.6 | ||
No events specified | N/A | |
FCS_COP.1/Hash | ||
No events specified | N/A | |
FCS_COP.1/KeyedHash | ||
No events specified | N/A | |
FCS_COP.1/Sig | ||
No events specified | N/A | |
FCS_COP.1/UDE | ||
No events specified | N/A | |
FCS_ENT_EXT.1 | ||
No events specified | N/A | |
FCS_RBG.1 | ||
Failure of the randomization process. | No additional information | |
FDP_HBI_EXT.1 | ||
No events specified | N/A | |
FDP_PPR_EXT.1 | ||
Successful and failed VM connections to physical devices where connection is governed by configurable policy. | VM and physical device identifiers. | |
Security policy violations. | Identifier for the security policy that was violated. | |
FDP_RIP_EXT.1 | ||
No events specified | N/A | |
FDP_RIP_EXT.2 | ||
No events specified | N/A | |
FDP_VMS_EXT.1 | ||
No events specified | N/A | |
FDP_VNC_EXT.1 | ||
Successful and failed attempts to connect VMs to virtual and physical networking components. | VM and virtual or physical networking component identifiers. | |
Security policy violations. |
| |
Administrator configuration of inter-VM communications channels between VMs. | VM and virtual or physical networking component identifiers. | |
FIA_AFL_EXT.1 | ||
Unsuccessful login attempts limit is met or exceeded. | Origin of attempt (e.g., IP address). | |
FIA_UAU.5 | ||
No events specified | N/A | |
FIA_UIA_EXT.1 | ||
Administrator authentication attempts. | Provided user identity, origin of the attempt (e.g., console, remote IP address). | |
All use of the identification and authentication mechanism. | Provided user identity, origin of the attempt (e.g., console, remote IP address). | |
[selection: Start and end of administrator session., None] | Start time and end time of administrator session. | |
FMT_SMO_EXT.1 | ||
No events specified | N/A | |
FPT_DVD_EXT.1 | ||
No events specified | N/A | |
FPT_EEM_EXT.1 | ||
No events specified | N/A | |
FPT_HAS_EXT.1 | ||
No events specified | N/A | |
FPT_HCL_EXT.1 | ||
[selection: Invalid parameter to hypercall detected., None] | Hypercall interface for which access was attempted. | |
[selection: Hypercall interface invoked when documented preconditions are not met., None] | No additional information | |
FPT_RDM_EXT.1 | ||
Connection/disconnection of removable media or device to/from a VM. | VM Identifier, Removable media/device identifier, event description or identifier (connect/disconnect, ejection/insertion, etc.). | |
Ejection/insertion of removable media or device from/to an already connected VM. | VM Identifier, Removable media/device identifier, event description or identifier (connect/disconnect, ejection/insertion, etc.). | |
FPT_TUD_EXT.1 | ||
Initiation of update. | No additional information | |
Failure of signature verification. | No additional information | |
FPT_VDP_EXT.1 | ||
No events specified | N/A | |
FPT_VIV_EXT.1 | ||
No events specified | N/A | |
FTA_TAB.1 | ||
No events specified | N/A | |
FTP_ITC_EXT.1 | ||
Initiation of the trusted channel. | User ID and remote source (IP Address) if feasible. | |
Termination of the trusted channel. | User ID and remote source (IP Address) if feasible. | |
Failures of the trusted path functions. | User ID and remote source (IP Address) if feasible. | |
FTP_UIF_EXT.1 | ||
No events specified | N/A | |
FTP_UIF_EXT.2 | ||
No events specified | N/A |
FCS_TLSC_EXT.1 | Failure to establish a session. | Reason for failure. |
FCS_TLSC_EXT.1 | Failure to verify presented identifier. | Presented identifier and reference identifier. |
FCS_TLSC_EXT.1 | Establishment/termination of a TLS session. | Non-TOE endpoint of connection. |
FCS_TLSS_EXT.1 | Failure to establish a session. | Reason for failure. |
FCS_DTLSC_EXT.1 | Failure of the certificate validity check. | Issuer Name and Subject Name of certificate. |
FCS_DTLSS_EXT.1 | Failure of the certificate validity check. | Issuer Name and Subject Name of certificate. |
For the selection in this requirement, the ST author selects "TSF noise source" if a single noise source is used as input to the DRBG. The ST author selects "multiple TSF noise sources" if a seed is formed from a combination of two or more noise sources within the TOE boundary. If the TSF implements two or more separate DRBGs that are seeded in separate manners, this SFR should be iterated for each DRBG. If multiple distinct noise sources exist such that each DRBG only uses one of them, then each iteration would select "TSF noise source"; "multiple TSF noise sources" is only selected if a single DRBG uses multiple noise sources for its seed. The ST author selects "TSF interface for seeding" if noise source data is generated outside the TOE boundary.
If "TSF noise source" is selected, FCS_RBG.3 must be claimed.
If "multiple TSF noise sources" is selected, FCS_RBG.4 and FCS_RBG.5 must be claimed.
If "TSF interface for seeding" is selected, FCS_RBG.2 must be claimed.
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
Threat | Addressed by | Rationale |
---|---|---|
T.DATA_LEAKAGE | FAU_GEN.1 | This threat is mitigated by this SFR because the audit events can report attempts to breach isolation. |
FCS_CKM.6 | This threat is mitigated by this SFR by requiring cryptographic key destruction to protect domain data in shared storage. | |
FDP_PPR_EXT.1 | This threat is mitigated by this SFR by requiring support for reducing attack surface through disabling access to unneeded physical platform resources. | |
FDP_RIP_EXT.1 | This threat is mitigated by this SFR by ensuring that domain data is cleared from memory before memory is re-allocated. | |
FDP_RIP_EXT.2 | This threat is mitigated by this SFR by ensuring that domain data is cleared from physical storage upon re-allocation of the storage. | |
FDP_VMS_EXT.1 | This threat is mitigated by this SFR by ensuring that authorized data transfers between VMs are done securely. | |
FDP_VNC_EXT.1 | This threat is mitigated by this SFR by ensuring that network traffic is visible only to VMs configured to be that network. | |
FPT_DVD_EXT.1 | This threat is mitigated by this SFR by ensuring that VMs can access only those virtual devices that they are configured to access. | |
FPT_EEM_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use security mechanisms supported by the physical platform. | |
FPT_HAS_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use platform-supported virtualization assists to reduce attack surface. | |
FPT_VDP_EXT.1 | This threat is mitigated by this SFR by requiring validation of parameter data passed to the hardware abstraction by untrusted VMs. | |
FPT_VIV_EXT.1 | This threat is mitigated by this SFR by ensuring that untrusted VMs cannot invoke privileged code without proper hypervisor mediation. | |
FCS_ENT_EXT.1 | This threat is mitigated by this SFR by requiring that domains have access to high-quality entropy for cryptographic purposes. | |
FCS_RBG.1 | This threat is mitigated by this SFR by requiring that the TOE has access to high-quality entropy for cryptographic purposes. | |
FCS_RBG.2 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from an external source. | |
FCS_RBG.3 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from a single internal source. | |
FCS_RBG.4 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from multiple internal sources. | |
FCS_RBG.5 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding while combining noise sources. | |
FPT_GVI_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE support Guest VM measurements and integrity checks (optional). | |
FPT_INT_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE support introspection into Guest VMs (optional). | |
FPT_RDM_EXT.1 | This threat is mitigated by this SFR by requiring support for rules for switching removable media between domains to reduce the chance of data spillage. | |
FTP_UIF_EXT.1 | This threat is mitigated by this SFR by ensuring that users are able to determine the domain with the current input focus. | |
FTP_UIF_EXT.2 | This threat is mitigated by this SFR by ensuring that users can know the identity of any VM that they can access. | |
T.UNAUTHORIZED_UPDATE | FAU_GEN.1 | This threat is mitigated by this SFR because the audit events can report potential integrity breaches and attempts. |
FCS_CKM.1 | This threat is mitigated by this SFR by requiring generation of asymmetric keys for protection of integrity measures. | |
FCS_COP.1/Hash | This threat is mitigated by this SFR by ensuring proper functioning of cryptographic hashing. | |
FCS_COP.1/KeyedHash | This threat is mitigated by this SFR by ensuring proper functioning of keyed-hash message authentication. | |
FCS_COP.1/Sig | This threat is mitigated by this SFR by ensuring proper functioning of cryptographic signature services. | |
FCS_COP.1/UDE | This threat is mitigated by this SFR by ensuring proper functioning of encryption and decryption. | |
FCS_RBG.1 | This threat is mitigated by this SFR by requiring that the TOE has access to high-quality entropy for cryptographic purposes. | |
FDP_PPR_EXT.1 | This threat is mitigated by this SFR by requiring support for reducing attack surface through disabling access to unneeded physical platform resources. | |
FDP_VMS_EXT.1 | This threat is mitigated by this SFR by ensuring that authorized data transfers between VMs are done securely. | |
FDP_VNC_EXT.1 | This threat is mitigated by this SFR by ensuring that network traffic is visible only to VMs configured to be that network. | |
FPT_EEM_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use security mechanisms supported by the physical platform. | |
FPT_HAS_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use platform-supported virtualization assists to reduce attack surface. | |
FPT_HCL_EXT.1 | This threat is mitigated by this SFR by requiring that Hypercall parameters be validated. | |
FPT_VDP_EXT.1 | This threat is mitigated by this SFR by requiring validation of parameter data passed to the hardware abstraction by untrusted VMs. | |
FPT_VIV_EXT.1 | This threat is mitigated by this SFR by ensuring that untrusted VMs cannot invoke privileged code without proper hypervisor mediation. | |
FPT_DDI_EXT.1 | This threat is mitigated by this SFR by requiring that physical device drivers be isolated other parts of the TOE and from one another (optional). | |
FPT_ML_EXT.1 | This threat is mitigated by this SFR by requiring measured launch of the platform and VMM (objective). | |
FCS_RBG.2 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from an external source. | |
FCS_RBG.3 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from a single internal source. | |
FCS_RBG.4 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from multiple internal sources. | |
FCS_RBG.5 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding while combining noise sources. | |
T.UNAUTHORIZED_MODIFICATION | FAU_GEN.1 | This threat is mitigated by this SFR because the audit events can report potential integrity breaches and attempts. |
FAU_SAR.1 | This threat is mitigated by this SFR by requiring support for Administrator review of audit records. | |
FCS_CKM.1 | This threat is mitigated by this SFR by requiring generation of asymmetric keys for protection of integrity measures. | |
FAU_STG.1 | This threat is mitigated by this SFR by requiring support for protected transmission of audit records off the TOE. | |
FAU_STG.2 | This threat is mitigated by this SFR by requiring protection of stored audit records. | |
FCS_CKM.1 | This threat is mitigated by this SFR by requiring generation of asymmetric keys for protection of integrity measures. | |
FCS_COP.1/Hash | This threat is mitigated by this SFR by ensuring proper functioning of cryptographic hashing. | |
FCS_COP.1/KeyedHash | This threat is mitigated by this SFR by ensuring proper functioning of keyed-hash message authentication. | |
FCS_COP.1/Sig | This threat is mitigated by this SFR by ensuring proper functioning of cryptographic signature services. | |
FCS_COP.1/UDE | This threat is mitigated by this SFR by ensuring proper functioning of encryption and decryption. | |
FCS_RBG.1 | This threat is mitigated by this SFR by requiring that the TOE has access to high-quality entropy for cryptographic purposes. | |
FDP_PPR_EXT.1 | This threat is mitigated by this SFR by requiring support for reducing attack surface through disabling access to unneeded physical platform resources. | |
FDP_VMS_EXT.1 | This threat is mitigated by this SFR by ensuring that authorized data transfers between VMs are done securely. | |
FDP_VNC_EXT.1 | This threat is mitigated by this SFR by ensuring that network traffic is visible only to VMs configured to be that network. | |
FPT_EEM_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use security mechanisms supported by the physical platform. | |
FPT_HAS_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use platform-supported virtualization assists to reduce attack surface. | |
FPT_HCL_EXT.1 | This threat is mitigated by this SFR by requiring that Hypercall parameters be validated. | |
FPT_VDP_EXT.1 | This threat is mitigated by this SFR by requiring validation of parameter data passed to the hardware abstraction by untrusted VMs. | |
FPT_VIV_EXT.1 | This threat is mitigated by this SFR by ensuring that untrusted VMs cannot invoke privileged code without proper hypervisor mediation. | |
FAU_ARP.1 | This threat is mitigated by this SFR by requiring support for automatic responses to audit events (optional). | |
FAU_SAA.1 | This threat is mitigated by this SFR by requiring support for rules for indicating security violations based on audit events (optional). | |
FPT_DDI_EXT.1 | This threat is mitigated by this SFR by requiring that physical device drivers be isolated other parts of the TOE and from one another (optional). | |
FPT_ML_EXT.1 | This threat is mitigated by this SFR by requiring measured launch of the platform and VMM (objective). | |
FCS_RBG.2 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from an external source. | |
FCS_RBG.3 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from a single internal source. | |
FCS_RBG.4 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from multiple internal sources. | |
FCS_RBG.5 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding while combining noise sources. | |
T.USER_ERROR | FAU_GEN.1 | This threat is mitigated by this SFR because the audit events can report attempts to breach isolation. |
FCS_CKM.6 | This threat is mitigated by this SFR by requiring cryptographic key destruction to protect domain data in shared storage. | |
FDP_PPR_EXT.1 | This threat is mitigated by this SFR by requiring support for reducing attack surface through disabling access to unneeded physical platform resources. | |
FDP_RIP_EXT.1 | This threat is mitigated by this SFR by ensuring that domain data is cleared from memory before memory is re-allocated. | |
FDP_RIP_EXT.2 | This threat is mitigated by this SFR by ensuring that domain data is cleared from physical storage upon re-allocation of the storage. | |
FDP_VMS_EXT.1 | This threat is mitigated by this SFR by ensuring that authorized data transfers between VMs are done securely. | |
FDP_VNC_EXT.1 | This threat is mitigated by this SFR by ensuring that network traffic is visible only to VMs configured to be that network. | |
FPT_DVD_EXT.1 | This threat is mitigated by this SFR by ensuring that VMs can access only those virtual devices that they are configured to access. | |
FPT_EEM_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use security mechanisms supported by the physical platform. | |
FPT_HAS_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use platform-supported virtualization assists to reduce attack surface. | |
FPT_VDP_EXT.1 | This threat is mitigated by this SFR by requiring validation of parameter data passed to the hardware abstraction by untrusted VMs. | |
FPT_VIV_EXT.1 | This threat is mitigated by this SFR by ensuring that untrusted VMs cannot invoke privileged code without proper hypervisor mediation. | |
T.3P_SOFTWARE | FAU_GEN.1 | This threat is mitigated by this SFR because the audit events can report potential integrity breaches and attempts. |
FCS_CKM.1 | This threat is mitigated by this SFR by requiring generation of asymmetric keys for protection of integrity measures. | |
FCS_COP.1/Hash | This threat is mitigated by this SFR by ensuring proper functioning of cryptographic hashing. | |
FCS_COP.1/KeyedHash | This threat is mitigated by this SFR by ensuring proper functioning of keyed-hash message authentication. | |
FCS_COP.1/Sig | This threat is mitigated by this SFR by ensuring proper functioning of cryptographic signature services. | |
FCS_COP.1/UDE | This threat is mitigated by this SFR by ensuring proper functioning of encryption and decryption. | |
FCS_RBG.1 | This threat is mitigated by this SFR by requiring that the TOE has access to high-quality entropy for cryptographic purposes. | |
FDP_PPR_EXT.1 | This threat is mitigated by this SFR by requiring support for reducing attack surface through disabling access to unneeded physical platform resources. | |
FDP_VMS_EXT.1 | This threat is mitigated by this SFR by ensuring that authorized data transfers between VMs are done securely. | |
FDP_VNC_EXT.1 | This threat is mitigated by this SFR by ensuring that network traffic is visible only to VMs configured to be that network. | |
FPT_EEM_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use security mechanisms supported by the physical platform. | |
FPT_HAS_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use platform-supported virtualization assists to reduce attack surface. | |
FPT_HCL_EXT.1 | This threat is mitigated by this SFR by requiring that Hypercall parameters be validated. | |
FPT_VDP_EXT.1 | This threat is mitigated by this SFR by requiring validation of parameter data passed to the hardware abstraction by untrusted VMs. | |
FPT_VIV_EXT.1 | Ensures that untrusted VMs cannot invoke privileged code without proper hypervisor mediation. | |
FPT_DDI_EXT.1 | This threat is mitigated by this SFR by requiring that physical device drivers be isolated other parts of the TOE and from one another (optional). | |
FPT_ML_EXT.1 | This threat is mitigated by this SFR by requiring measured launch of the platform and VMM (objective). | |
FCS_RBG.2 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from an external source. | |
FCS_RBG.3 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from a single internal source. | |
FCS_RBG.4 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from multiple internal sources. | |
FCS_RBG.5 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding while combining noise sources. | |
T.VMM_COMPROMISE | FAU_GEN.1 | This threat is mitigated by this SFR because the audit events can report potential integrity breaches and attempts. |
FCS_CKM.1 | This threat is mitigated by this SFR by requiring generation of asymmetric keys for protection of integrity measures. | |
FCS_CKM.6 | This threat is mitigated by this SFR by requiring cryptographic key destruction to protect domain data in shared storage. | |
FCS_COP.1/Hash | This threat is mitigated by this SFR by ensuring proper functioning of cryptographic hashing. | |
FCS_COP.1/KeyedHash | This threat is mitigated by this SFR by ensuring proper functioning of keyed-hash message authentication. | |
FCS_COP.1/Sig | This threat is mitigated by this SFR by ensuring proper functioning of cryptographic signature services. | |
FCS_COP.1/UDE | This threat is mitigated by this SFR by ensuring proper functioning of encryption and decryption. | |
FCS_RBG.1 | This threat is mitigated by this SFR by requiring that the TOE has access to high-quality entropy for cryptographic purposes. | |
FDP_PPR_EXT.1 | This threat is mitigated by this SFR by requiring support for reducing attack surface through disabling access to unneeded physical platform resources. | |
FDP_RIP_EXT.1 | This threat is mitigated by this SFR by ensuring that domain data is cleared from memory before memory is re-allocated. | |
FDP_RIP_EXT.2 | This threat is mitigated by this SFR by ensuring that domain data is cleared from physical storage upon re-allocation of the storage. | |
FDP_VMS_EXT.1 | This threat is mitigated by this SFR by ensuring that authorized data transfers between VMs are done securely. | |
FDP_VNC_EXT.1 | This threat is mitigated by this SFR by ensuring that network traffic is visible only to VMs configured to be that network. | |
FPT_DVD_EXT.1 | This threat is mitigated by this SFR by ensuring that VMs can access only those virtual devices that they are configured to access. | |
FPT_EEM_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use security mechanisms supported by the physical platform. | |
FPT_HAS_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use platform-supported virtualization assists to reduce attack surface. | |
FPT_HCL_EXT.1 | This threat is mitigated by this SFR by requiring that Hypercall parameters be validated. | |
FPT_VDP_EXT.1 | This threat is mitigated by this SFR by requiring validation of parameter data passed to the hardware abstraction by untrusted VMs. | |
FPT_VIV_EXT.1 | This threat is mitigated by this SFR by ensuring that untrusted VMs cannot invoke privileged code without proper hypervisor mediation. | |
FPT_DDI_EXT.1 | This threat is mitigated by this SFR by requiring that physical device drivers be isolated other parts of the TOE and from one another (optional). | |
FPT_ML_EXT.1 | This threat is mitigated by this SFR by requiring measured launch of the platform and VMM (objective). | |
FCS_RBG.2 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from an external source. | |
FCS_RBG.3 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from a single internal source. | |
FCS_RBG.4 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from multiple internal sources. | |
FCS_RBG.5 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding while combining noise sources. | |
T.PLATFORM_COMPROMISE | FDP_HBI_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use platform-supported mechanisms for access to physical devices. |
FDP_PPR_EXT.1 | This threat is mitigated by this SFR by requiring support for reducing attack surface through disabling access to unneeded physical platform resources. | |
FDP_VMS_EXT.1 | This threat is mitigated by this SFR by ensuring that authorized data transfers between VMs are done securely. | |
FDP_VNC_EXT.1 | This threat is mitigated by this SFR by ensuring that network traffic is visible only to VMs configured to be that network. | |
FPT_DVD_EXT.1 | This threat is mitigated by this SFR by ensuring that VMs cannot access virtual devices that they are not configured to access. | |
FPT_EEM_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use security mechanisms supported by the physical platform. | |
FPT_HAS_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE use platform-supported virtualization assists to reduce attack surface. | |
FPT_HCL_EXT.1 | This threat is mitigated by this SFR by requiring that Hypercall parameters be validated. | |
FPT_VDP_EXT.1 | This threat is mitigated by this SFR by requiring validation of parameter data passed to the hardware abstraction by untrusted VMs. | |
FPT_VIV_EXT.1 | This threat is mitigated by this SFR by ensuring that untrusted VMs cannot invoke privileged code without proper hypervisor mediation. | |
FPT_ML_EXT.1 | This threat is mitigated by this SFR by requiring measured launch of the platform and VMM (objective). | |
T.UNAUTHORIZED_ACCESS | FAU_GEN.1 | This threat is mitigated by this SFR because the audit events can report potential attempts to access the management subsystem. |
FCS_CKM.1 | This threat is mitigated by this SFR by requiring generation of asymmetric keys for protection of integrity measures. | |
FCS_CKM.2 | This threat is mitigated by this SFR by using secure cryptographic key distribution for trusted communications channels. | |
FCS_COP.1/Hash | This threat is mitigated by this SFR by ensuring proper functioning of cryptographic hashing. | |
FCS_COP.1/KeyedHash | This threat is mitigated by this SFR by ensuring proper functioning of keyed-hash message authentication. | |
FCS_COP.1/Sig | This threat is mitigated by this SFR by ensuring proper functioning of cryptographic signature services. | |
FCS_COP.1/UDE | This threat is mitigated by this SFR by ensuring proper functioning of encryption and decryption. | |
FCS_RBG.1 | This threat is mitigated by this SFR by requiring that the TOE has access to high-quality entropy for cryptographic purposes. | |
FIA_AFL_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE detect failed authentication attempts for Administrator access. | |
FIA_UAU.5 | This threat is mitigated by this SFR by ensuring that strong mechanisms are used for Administrator authentication. | |
FIA_UIA_EXT.1 | This threat is mitigated by this SFR by requiring that Administrators be successfully authenticated before performing management functions. | |
FMT_SMO_EXT.1 | This threat is mitigated by this SFR by requiring that the TOE support having separate management and operational networks. | |
FTA_TAB.1 | This threat is mitigated by this SFR by displays advisory notice and consent warning message regarding use of the TOE to Administrators. | |
FTP_ITC_EXT.1 | This threat is mitigated by this SFR by ensuring that trusted communications channels are implemented using good cryptography. | |
FCS_HTTPS_EXT.1 | This threat is mitigated by this SFR by ensuring that HTTPS trusted communications channels are implemented properly. | |
FCS_IPSEC_EXT.1 | This threat is mitigated by this SFR by ensuring that IPsec trusted communications channels are implemented properly. | |
FCS_RBG.2 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from an external source. | |
FCS_RBG.3 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from a single internal source. | |
FCS_RBG.4 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding from multiple internal sources. | |
FCS_RBG.5 | This threat is mitigated by this SFR by defining how entropy is obtained for secure DRBG seeding while combining noise sources. | |
FIA_PMG_EXT.1 | This threat is mitigated by this SFR by ensuring that password-based administrator login is properly implemented. | |
FIA_X509_EXT.1 | This threat is mitigated by this SFR by ensuring that certificate validation is implemented properly. | |
FIA_X509_EXT.2 | This threat is mitigated by this SFR by ensuring that certificate-based authentication is implemented properly.t functions. | |
FIA_X509_EXT.4 | This threat is mitigated by this SFR by requiring an exception to be met without the need to validate the revocation of the certificate. | |
FTP_TRP.1 | This threat is mitigated by this SFR by ensuring that certain communications use a trusted path. | |
T.WEAK_CRYPTO | FCS_ENT_EXT.1 | This threat is mitigated by this SFR by requiring that domains have access to high-quality entropy for cryptographic purposes. |
FCS_RBG.1 | This threat is mitigated by this SFR by requiring that the TOE has access to high-quality entropy for cryptographic purposes. | |
T.UNPATCHED_SOFTWARE | FPT_TUD_EXT.1 | This threat is mitigated by this SFR by requiring support for product updates. |
FPT_IDV_EXT.1 | This threat is mitigated by this SFR by requiring support for software identification labels (optional). | |
FPT_TUD_EXT.2 | This threat is mitigated by this SFR by requiring specific requirements for certificate-based code signing for update. | |
T.MISCONFIGURATION | FDP_VMS_EXT.1 | This threat is mitigated by this SFR by ensuring that data sharing between VMs is turned off by default. |
T.DENIAL_OF_SERVICE | FCS_CKM.6 | This threat is mitigated by this SFR by requiring cryptographic key destruction to ensure residual data in shared storage is unrecoverable. |
FDP_RIP_EXT.1 | This threat is mitigated by this SFR by ensuring that domain data is cleared from memory before memory is re-allocated. | |
FDP_RIP_EXT.2 | This threat is mitigated by this SFR by ensuring that domain data is cleared from storage upon re-allocation of the storage. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_ARP.1 | ||
Actions taken due to potential security violations. | No additional information | |
FAU_SAA.1 | ||
Enabling and disabling of any of the analysis mechanisms. | No additional information | |
Automated responses performed by the TSF. | No additional information | |
FPT_GVI_EXT.1 | ||
Actions taken due to failed integrity check. | No additional information |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FPT_DDI_EXT.1 | ||
No events specified | N/A | |
FPT_IDV_EXT.1 | ||
No events specified | N/A | |
FPT_INT_EXT.1 | ||
Introspection initiated/enabled. | The VM introspected. | |
FPT_ML_EXT.1 | ||
Integrity initiated/enabled. | Integrity measurement values. |
This PP does not define any Implementation-dependent requirements.
As indicated in the introduction to this PP, the baseline requirements (those that must be performed by the TOE or its underlying platform) are contained in the body of this PP. There are additional requirements based on selections in the body of the PP: if certain selections are made, then additional requirements below must be included.
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_HTTPS_EXT.1 | ||
Establishment/Termination of a HTTPS session. | Non-TOE endpoint of connection (IP address). | |
Failure to establish a HTTPS Session. |
| |
FCS_IPSEC_EXT.1 | ||
Failure to establish an IPsec SA. |
| |
Establishment/Termination of an IPsec SAA. | Non-TOE endpoint of connection (IP address). | |
FCS_RBG.2 | ||
No events specified | N/A | |
FCS_RBG.3 | ||
No events specified | N/A | |
FCS_RBG.4 | ||
No events specified | N/A | |
FCS_RBG.5 | ||
No events specified | N/A | |
FIA_PMG_EXT.1 | ||
No events specified | N/A | |
FIA_X509_EXT.1 | ||
Failure to validate a certificate. | Reason for failure. | |
FIA_X509_EXT.2 | ||
No events specified | N/A | |
FIA_X509_EXT.4 | ||
No events specified | N/A | |
FPT_TUD_EXT.2 | ||
No events specified | N/A | |
FTP_TRP.1 | ||
Initiation of the trusted channel. | User ID and remote source (IP Address) if feasible. | |
Termination of the trusted channel. | User ID and remote source (IP Address) if feasible. | |
Failures of the trusted path functions. | User ID and remote source (IP Address) if feasible. |
If the TOE cannot perform revocation in accordance with one of the specified methods in FIA_X509_EXT.1.1, then "exceptions as specified in FIA_X509_EXT.4" should be chosen and FIA_X509_EXT.4 included in the ST.
OCSP responses are signed using either the certificate’s issuer’s CA certificate or an OCSP certificate issued to an OCSP responder delegated by that issuer to sign OCSP responses. A compliant TOE is able to validate OCSP responses in either case, but the OCSP signing extended key usage purpose is only required to be checked in OCSP certificates.
Functional Class | Functional Components |
---|---|
Cryptographic Support (FCS) | FCS_ENT_EXT Entropy for Virtual Machines FCS_HTTPS_EXT HTTPS Protocol FCS_IPSEC_EXT IPsec Protocol |
Identification and Authentication (FIA) | FIA_AFL_EXT Authentication Failure Handling FIA_PMG_EXT Password Management FIA_UIA_EXT Administrator Identification and Authentication FIA_X509_EXT X.509 Certificate |
Protection of the TSF (FPT) | FPT_DDI_EXT Device Driver Isolation FPT_DVD_EXT Non-Existence of Disconnected Virtual Devices FPT_EEM_EXT Execution Environment Mitigations FPT_GVI_EXT Guest VM Integrity FPT_HAS_EXT Hardware Assists FPT_HCL_EXT Hypercall Controls FPT_IDV_EXT Software Identification and Versions FPT_INT_EXT Support for Introspection FPT_ML_EXT Measured Launch of Platform and VMM FPT_RDM_EXT Removable Devices and Media FPT_TUD_EXT Trusted Updates FPT_VDP_EXT Virtual Device Parameters FPT_VIV_EXT VMM Isolation from VMs |
Security Management (FMT) | FMT_SMO_EXT Separation of Management and Operational Networks |
Trusted Path/Channel (FTP) | FTP_ITC_EXT Trusted Channel Communications FTP_UIF_EXT User Interface |
User Data Protection (FDP) | FDP_HBI_EXT Hardware-Based Isolation Mechanisms FDP_PPR_EXT Physical Platform Resource Controls FDP_RIP_EXT Residual Information in Memory FDP_VMS_EXT VM Separation FDP_VNC_EXT Virtual Networking Components |
FCS_ENT_EXT.1, Entropy for Virtual Machines, requires the TSF to provide entropy data to VMs in a specified manner.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_RBG.1 Cryptographic Operation (Random Bit Generation) |
FCS_HTTPS_EXT.1, HTTPS Protocol, defines requirements for the implementation of the HTTPS protocol.
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | [FCS_TLSC_EXT.1 TLS Client Protocol, or FCS_TLSC_EXT.2 TLS Client Protocol with Mutual Authentication, or FCS_TLSS_EXT.1 TLS Server Protocol, or FCS_TLSS_EXT.2 TLS Server Protocol with Mutual Authentication] |
FCS_IPSEC_EXT.1, IPsec Protocol, requires that IPsec be implemented as specified.
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_CKM.1 Cryptographic Key Generation FCS_CKM.2 Cryptographic Key Establishment FCS_COP.1 Cryptographic Operation FCS_RBG.1 Cryptographic Operation (Random Bit Generation) FIA_X509_EXT.1 X.509 Certificate Validation |
FIA_AFL_EXT.1, Authentication Failure Handling, requires the TSF to lock an administrator account when an excessive number of failed authentication attempts have been observed until some restorative event occurs to enable the account.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FIA_UIA_EXT.1 Administrator Identification and Authentication FMT_SMR.1 Security Roles |
FIA_PMG_EXT.1, Password Management, requires the TSF to ensure that administrator passwords meet a defined password policy.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FIA_UIA_EXT.1 Administrator Identification and Authentication |
FIA_UIA_EXT.1, Administrator Identification and Authentication, requires the TSF to ensure that all subjects attempting to perform TSF-mediated actions are identified and authenticated prior to authorizing these actions to be performed.
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FIA_UAU.5 Multiple Authentication Mechanisms |
FIA_X509_EXT.1, X.509 Certificate Validation, defines how the TSF must validate X.509 certificates that are presented to it.
FIA_X509_EXT.2, X.509 Certificate Authentication, requires the TSF to identify the functions for which it uses X.509 certificates for authentication
FIA_X509_EXT.4, Exceptions to X509 Certificate Revocation Checking,
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FPT_STM.1 Reliable Time Stamps |
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FIA_X509_EXT.1 X.509 Certificate Validation FTP_ITC_EXT.1 Trusted Channel Communications |
There are no management functions foreseen.
There are no audit events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FIA_X509_EXT.1 X.509 Certificate Validation |
FPT_DDI_EXT.1, Device Driver Isolation, requires the TSF to isolate device drivers for physical devices from all virtual domains.
No specific management functions are identified.
There are no auditable events foreseen.
FPT_DVD_EXT.1, Non-Existence of Disconnected Virtual Devices, requires the TSF to prevent Guest VMs from accessing virtual devices that it is not configured to have access to.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FPT_VDP_EXT.1 Virtual Device Parameters |
FPT_EEM_EXT.1, Execution Environment Mitigations, requires the TSF to identify the execution environment-based protection mechanisms that it can use for self-protection.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_GVI_EXT.1, Guest VM Integrity, requires the TSF to specify the mechanisms it uses to verify the integrity of Guest VMs.
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
FPT_HAS_EXT.1, Hardware Assists, requires the TSF to identify the hardware assists it uses to reduce TOE complexity.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_HCL_EXT.1, Hypercall Controls, requires the TSF to implement appropriate parameter validation to protect the VMM from unauthorized access through a hypercall interface.
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
FPT_IDV_EXT.1, Software Identification and Versions, requires the TSF to identify itself using SWID tags.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_INT_EXT.1, Support for Introspection, requires the TSF to support introspection.
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
FPT_ML_EXT.1, Measured Launch of Platform and VMM, requires the TSF to support a measured launch of itself.
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_RDM_EXT.1, Removable Devices and Media, requires the TSF to ensure that VMs are not inadvertently given access to information in different domains because removable media is simultaneously accessible from separate domains.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FDP_VMS_EXT.1 VM Separation |
FPT_TUD_EXT.1, Trusted Updates to the Virtualization System, requires the TSF to define the mechanism for applying and verifying TOE updates.
FPT_TUD_EXT.2, Trusted Update Based on Certificates, requires the TSF to validate updates using a code signing certificate.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation |
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FPT_TUD_EXT.1 Trusted Updates to the Virtualization System FIA_X509_EXT.1 X.509 Validation FIA_X509_EXT.2 X.509 Authentication |
FPT_VDP_EXT.1, Virtual Device Parameters, requires the TSF to interface with Guest VMs through virtual hardware abstractions so that any data transmitted to the TOE from a Guest VM can be validated as well-formed.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FPT_VIV_EXT.1 VMM Isolation from VMs |
FPT_VIV_EXT.1, VMM Isolation from VMs, requires the TSF to ensure that there is no mechanism by which a Guest VM can interface with the TOE, other VMs, or the hardware platform without authorization.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FDP_PPR_EXT.1 Physical Platform Resource Controls FDP_VMS_EXT.1 VM Separation |
FMT_SMO_EXT.1, Separation of Management and Operational Networks, requires the TSF to separate its management and operational networks through a defined mechanism.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FTP_ITC_EXT.1, Trusted Channel Communications, requires the TSF to implement one or more cryptographic protocols to secure connectivity between the TSF and various external entities.
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FAU_STG.1 External Audit Storage |
FTP_UIF_EXT.1, User Interface: I/O Focus, requires the TSF to unambiguously identify the Guest VM that has the current input focus for input peripherals.
FTP_UIF_EXT.2, User Interface: Identification of VM, requires the TOE to perform power on self-tests to verify its functionality and the integrity of its stored executable code.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies |
No specific management functions are identified.
There are no auditable events foreseen.
FDP_HBI_EXT.1, Hardware-Based Isolation Mechanisms, requires the TSF to identify the mechanisms used to isolate Guest VMs from platform hardware resources.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FDP_VMS_EXT.1 VM Separation |
FDP_PPR_EXT.1, Physical Platform Resource Controls, requires the TSF to define the hardware resources that Guest VMs may always access, may never access, and may conditionally access based on administrative configuration.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FDP_HBI_EXT.1 Hardware-Based Isolation Mechanisms FMT_SMR.1 Security Roles |
FDP_RIP_EXT.1, Residual Information in Memory, requires the TSF to ensure that physical memory is cleared to zeros prior to its allocation to a Guest VM.
FDP_RIP_EXT.2, Residual Information on Disk, requires the TSF to ensure that physical disk storage is cleared upon allocation to a Guest VM.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
No specific management functions are identified.
There are no auditable events foreseen.
FDP_VMS_EXT.1, VM Separation, requires the TSF to maintain logical separation between Guest VMs except through the use of specific configurable methods.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FDP_VNC_EXT.1, Virtual Networking Components, requires the TSF to support the configuration of virtual networking between Guest VMs.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FDP_VMS_EXT.1 VM Separation FMT_SMR.1 Security Roles |
Factor | Same/Different | Guidance |
Target Platform | Different | Product Models that virtualize different instruction sets (e.g., x86, ARM, POWER, SPARC, MIPS) are not equivalent. |
Installation Types | Different | If a Product can be installed either on bare metal or onto an operating system and the vendor wants to claim that both installation types constitute a single Model, then see the guidance for “PP-Specified Functionality,” below. |
Software Platform | Different | Product Models that run on substantially different software environments, such as different host operating systems, are not equivalent. Models that install on different versions of the same software environment may be equivalent depending on the below factors. |
PP-Specified Functionality | Same | If the differences between Models affect only non-PP-specified functionality, then the Models are equivalent. |
Different | If PP-specified security functionality is affected by the differences between Models, then the Models are not equivalent and must be tested separately. It is necessary to test only the functionality affected by the software differences. If only differences are tested, then the differences must be enumerated, and for each difference the Vendor must provide an explanation of why each difference does or does not affect PP-specified functionality. If the Product Models are fully tested separately, then there is no need to document the differences. |
Factor | Same/Different | Guidance |
Product Models | Different | Versions of different Product Models are not equivalent unless the Models are equivalent as defined in Section 3. |
PP-Specified Functionality | Same | If the differences affect only non-PP-specified functionality, then the Versions are equivalent. |
Different | If PP-specified security functionality is affected by the differences, then the Versions are considered to be not equivalent and must be tested separately. It is necessary only to test the functionality affected by the changes. If only the differences are tested, then for each difference the Vendor must provide an explanation of why the difference does or does not affect PP-specified functionality. If the Product Versions are fully tested separately, then there is no need to document the differences. |
Factor | Same/Different/None | Guidance |
Platform Architectures | Different | Hardware platforms that implement different processor architectures and instruction sets are not equivalent. |
PP-Specified Functionality | Same | For platforms with the same processor architecture, the platforms are equivalent with respect to the application if execution of all PP-specified security functionality follows the same code path on both platforms. |
Factor | Same/Different/None | Guidance |
Platform Type/Vendor | Different | Operating systems that are substantially different or come from different vendors are not equivalent. |
Platform Versions | Different | Operating systems are not equivalent if they have different major version numbers. |
PP-Specified Functionality | Same | If the differences between software platform models or versions affect only non-PP-specified functionality, then the software platforms are equivalent. |
Different | If PP-specified security functionality is affected by the differences between software platform versions or models, then the software platforms are not considered equivalent and must be tested separately. It is necessary only to test the functionality affected by the changes. If only the differences are tested, then for each difference the Vendor must provide an explanation of why the difference does or does not affect PP-specified functionality. If the Products are fully tested on each platform, then there is no need to document the differences. |
Acronym | Meaning |
---|---|
AES | Advanced Encryption Standard |
Base-PP | Base Protection Profile |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
cPP | Collaborative Protection Profile |
CPU | Central Processing Unit |
DEP | Data Execution Prevention |
DKM | Derived Keying Material |
DSS | Digital Signature Standard |
ECC | Elliptic Curve Cryptography |
EP | Extended Package |
FFC | Finite-Field Cryptography |
FIPS | Federal Information Processing Standard |
FP | Functional Package |
IEC | International Electrotechnical Commission |
IP | Internet Protocol |
ISO | International Organization for Standardization |
IT | Information Technology |
ITSEF | Information Technology Security Evaluation Facility |
KDF | Key Derivation Function |
MAC | Message Authentication Code |
NIST | National Institute of Standards and Technology |
NVLAP | National Voluntary Laboratory Accreditation Program |
OE | Operational Environment |
OS | Operating System |
PKV | Public Key Verification |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
RSA | Rivest, Shamir, Adleman |
SAR | Security Assurance Requirement |
SFR | Security Functional Requirement |
SP | Special Publication |
SPD | Security Policy Database |
SSP | System Security Policy |
ST | Security Target |
SWID | Software Identification |
TOE | Target of Evaluation |
TPM | Trusted Platform Module |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |
VM | Virtual Machine |
VMM | Virtual Machine Manager |
VS | Virtualization System |
Identifier | Title |
---|---|
[CC] | Common Criteria for Information Technology Security Evaluation -
|
[CEM] | Common Methodology for Information Technology Security Evaluation -
|