Version | Date | Comment |
---|---|---|
2.6 | 2025-01-31 | CC:2022 conversion, limitation of cryptographic algorithms to CNSA 1.0, incorporation of TDs |
2.5 | 2024-06-24 | Incorporation of TC feedback: |
2.4 | 2022-03-31 | Incorporation of TC feedback |
2.3 | 2021-08-10 | Support for MDF, Bluetooth updates |
2.2 | 2021-01-05 | Update release |
2.1 | 2019-11-14 | Initial Release |
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Administrator | A user that has administrative privilege to configure the TOE in privileged mode. |
Authorized | An entity granted access privileges to an object, system, or system entity. |
Critical Security Parameter (CSP) | Security related information such as secret and private cryptographic keys, and authentication data such as passwords and PINs, whose disclosure or modification can compromise the security of a cryptographic module. |
Entropy Source | This cryptographic function provides a seed for a random number generator by accumulating the outputs from one or more noise sources. The functionality includes a measure of the minimum work required to guess a given output and tests to ensure that the noise sources are operating properly. |
IT Environment | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Private Network | A network that is protected from access by unauthorized users or entities. |
Privileged Mode | A TOE operational mode that allows a user to perform functions that require IT environment administrator privileges. |
Public Network | A network that is visible to all users and entities and does not protect against unauthorized access (e.g. internet). |
Threat Agent | An entity that tries to harm an information system through destruction, disclosure, modification of data, or denial of service. |
An entity (device or user) that has not been authorized by an authorized administrator to access the TOE or private network. | |
Unprivileged Mode | A TOE operational mode that only provides VPN client functions for the VPN client user. |
VPN Client | The TOE; allows remote users to use client computers to establish an encrypted IPsec tunnel across an unprotected public network to a private network. |
VPN Client User | A user operating the TOE in unprivileged mode. |
VPN Gateway | A component that performs encryption and decryption of IP packets as they cross the boundary between a private network and a public network. |
An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.
This document does not define any additional OSPs.Assumption or OSP | Security Objectives | Rationale |
A.NO_TOE_BYPASS | OE.NO_TOE_BYPASS | This assumption is satisfied by the environmental objective that ensures network routes do not exist that allow traffic to be transmitted from the TOE system to its intended destination without going through the TOE’s IPsec tunnel. |
A.PHYSICAL | OE.PHYSICAL | This assumption is satisfied by the environmental objective that ensures the TOE is not deployed on a system that is vulnerable to loss of physical custody. |
A.TRUSTED_CONFIG | OE.TRUSTED_CONFIG | This assumption is satisfied by the environmental objective that ensures that anyone responsible for administering the TOE can be trusted not to misconfigure it, whether intentionally or not. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_CKM_EXT.2 | ||
No events specified | N/A | |
FIA_X509_EXT.4 | ||
No events specified | N/A | |
FTP_ITC.1 | ||
Initiation of the trusted channel. | Identification of the initiator and target. | |
Termination of the trusted channel. | No additional information. | |
Failure of the trusted channel functions. | Identification of the initiator and target, reason for failure. |
This SFR is functionally identical to what is defined in the MDF PP except that ECC key generation with support for P-384 has been made mandatory in support of IPsec due to the mandated support for DH group 20 in FCS_IPSEC_EXT.1.8. Curve25519 schemes remain selectable for their potential use in satisfying FDP_DAR_EXT.2.2 in the MDF PP; these schemes are not used in support of IPsec. RSA support remains present as a selection since it may be used by parts of the TOE that are not specifically related to VPN client functionality.
The text of the requirement is replaced with:This SFR differs from its definition in the MDF PP by moving elliptic curve-based key establishment schemes from selectable to mandatory, due to the mandated support for DH group 20 in FCS_IPSEC_EXT.1.8. This PP-Module does not require the use of RSA for any function but it is present in the selection in case other MDF PP functions require its use.
The text of the requirement is replaced with:This SFR is identical to what is defined in the MDF PP except that support for GCM mode and support for 256-bit key sizes are both mandatory in order to address the requirements for FCS_IPSEC_EXT.1.
The text of the requirement is replaced with:This SFR is identical to its definition in the Base-PP except that the selection item that requires the TOE to implement its own VPN client is always selected when the TOE’s conformance claim includes this PP-Module.
The text of the requirement is replaced with:This PP-Module requires that Always On VPN protection be enabled across the entire device and does not permit this to be applied at the level of an application or group of application processes.
This SFR is not reproduced in its entirety for size purposes. The only change to this SFR is the following change to management function 45:
45. enable/disable the Always On VPN protection:
|
M | O | O | O |
This SFR is identical to what is defined in the Base-PP except that support for IPsec is mandated. Additionally, since the Base-PP requires ‘at least one of’ the selected protocols which previously included IPsec, ‘no other protocols’ is now available as an option in the selection.
The text of FTP_ITC_EXT.1.1 is replaced with (the other elements are unaffected):Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FDP_VPN_EXT.1 | ||
No events specified | N/A |
This SFR is selection-based in the App PP depending on the selection made in
FCS_CKM_EXT.1. Because key generation services (whether implemented by the
TOE or invoked from the platform) are required for IPsec, this SFR is mandatory
for any TOE that claims conformance to this PP-Module.
This SFR is functionally identical to what is defined in the App PP except that ECC
key generation with P-384 has been made mandatory in support of IPsec due to the
mandated support for DH group 20 in FCS_IPSEC_EXT.1.8. RSA remains
present as a selection since it may be used by parts of the TOE that are not
specifically related to VPN client functionality. The selection for "no other key generation methods"
was added in case the algorithms that IPsec requires are the TSF's only use of key generation.
This SFR differs from its definition in the App PP by moving elliptic curve-based key establishment schemes from selectable to mandatory due to the mandated support for DH group 20 in FCS_IPSEC_EXT.1.8. The selection for "no other schemes" was added in case the algorithms that IPsec requires are the TSF's only use of key establishment.
The text of the requirement is replaced with:This selection differs from its definition in the App PP by removing the selection for “generate no asymmetric cryptographic keys” for this PP-Module because a VPN client TOE will either perform its own key generation or interface with the underlying platform to provide this service, either of which causes FCS_CKM.1/AK to be claimed.
The text of the requirement is replaced with:This SFR is selection-based in the Base-PP and remains selection-based here because this PP-Module allows for the possibility that the TSF relies on platform-provided cryptographic algorithm services for its own implementation of IPsec. However, if the TSF does claim this SFR to support IPsec, the ST author must select at minimum both AES-CBC and AES-GCM for consistency with the relevant IPsec claims (FCS_IPSEC_EXT.1.4 requires AES-GCM and FCS_IPSEC_EXT.1.6 requires AES-CBC). The "no other modes" selection is added for the case where no AES claims need to be made beyond what is mandated for IPsec.
The text of the requirement is replaced with:This SFR is identical to what is defined in the App PP except that the selection for IPsec is mandated, the ST author is forced to select the "encrypt all transmitted sensitive data" option, and the options for invoking platform-provided IPsec functionality have been removed. Since it is possible for a conformant TOE to implement IPsec while relying on the platform for some other protocol (e.g., using platform-provided TLS to obtain IPsec configuration from a gateway), the other platform-provided protocol selections remain. Additionally, since it is possible that a conformant TOE may not implement any encryption protocols other than IPsec, “no other protocols” is provided as a selectable option in the list of supported protocols.
The text of the requirement is replaced with:Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_CKM.6 | ||
Destruction of cryptographic key. | Identification of key. | |
FCS_CKM_EXT.2 | ||
No events specified | N/A |
This SFR is modified from its definition in the MDM PP by mandating the key generation algorithms that are required by this PP-Module in support of IPsec due to the mandated support for DH group 20 in FCS_IPSEC_EXT.1.8. Other selections may be chosen by the ST author as needed for parts of the TOE that are not specifically related to VPN client functionality. The selection for "no other key generation methods" was added in case the algorithms that IPsec requires are the TSF's only use of key generation.
The text of the requirement is replaced with:This SFR is modified from its definition in the MDM PP by mandating the key establishment algorithms that are required by this PP-Module in support of IPsec due to the mandated support for DH group 20 in FCS_IPSEC_EXT.1.8. Other selections may be chosen by the ST author as needed for parts of the TOE that are not specifically related to VPN client functionality. The selection for "no other schemes" was added in case the algorithms that IPsec requires are the TSF's only use of key establishment.
The text of the requirement is replaced with:This SFR is modified from its definition in the Base-PP by mandating support for both 256-bit implementations of AES-CBC (which this PP-Module requires for the use of IKE and allows for the use of ESP) and AES-GCM (which this PP-Module requires for the use of ESP and allows for the use of IKE). Other AES modes may be selected by the ST author as needed to address functions not required by this PP-Module. The "no other modes" selection is added for the case where no AES claims need to be made beyond what is mandated for IPsec.
The text of the requirement is replaced with:When the MDM TOE claims this PP-Module, at least one of its interfaces will implement IPsec communications. However, this PP-Module does not specify that any one particular interface must be implemented using IPsec. If the TOE is distributed and uses IPsec to secure communications between its distributed components, FPT_ITT.1/INTER_XFER is defined as below.
The text of the requirement is replaced with:This SFR is selection-based in the Base-PP depending on the selections made in the Base-PP requirement FTP_ITC_EXT.1. This is not changed by the PP-Module.
This SFR is modified from its definition in the Base-PP by mandating that the TSF implement IPsec communications and by prohibiting the TOE from relying on platform-provided functionality to implement this.
When the MDM TOE claims this PP-Module, at least one of its interfaces will implement IPsec communications. However, this PP-Module does not specify that any one particular interface must be implemented using IPsec. If the TOE uses IPsec to secure communications between itself and external trusted IT entities, FTP_ITC.1/INTER_XFER_IT is refined as noted by the refinements above.
This SFR is refined from its definition in the Base-PP by mandating that the “implement functionality” selection be chosen at minimum for IPsec and by prohibiting the TOE from relying on platform-provided IPsec functionality. Since the TOE may support multiple trusted channel interfaces, the ST author is given the option to select other protocols (SSH, TLS, DTLS, HTTPS) either as being implemented by the TSF or invoked from the platform. The "not invoke or implement any other protocol functionality" is added for the case where the TOE's implementation of IPsec is the only trusted channel protocol the TSF uses.
The text of FTP_ITC.1.1/INTER_XFER_IT is replaced with (the other elements are unaffected):When the MDM TOE claims this PP-Module, at least one of its interfaces will implement IPsec communications. However, this PP-Module does not specify that any one particular interface must be implemented using IPsec. If the TOE uses IPsec to secure communications between itself and trusted remote administrators, FPT_TRP.1/TRUSTPATH_REM_ADMIN is refined as below.
This SFR is refined from its definition in the Base-PP by mandating that the “implement functionality” selection be chosen at minimum for IPsec and by prohibiting the TOE from relying on platform-provided IPsec functionality. Since the TOE may support multiple remote administrative interfaces, the ST author is given the option to select other protocols (SSH, TLS, HTTPS) either as being implemented by the TSF or invoked from the platform. The "not invoke or implement any other protocol functionality" is added for the case where the TOE's implementation of IPsec is the only trusted path protocol the TSF uses.
The text of FTP_TRP.1.1/TRUSTPATH_REM_ADMIN is replaced with (the other elements are unaffected):Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_CKM.1/VPN | ||
No events specified | N/A | |
FCS_IPSEC_EXT.1 | ||
Decisions to DISCARD or BYPASS network packets processed by the TOE. |
| |
Failure to establish an IPsec SA. |
| |
Establishment/Termination of an IPsec SA. |
| |
FDP_RIP.2 | ||
No events specified | N/A | |
FMT_SMF.1/VPN | ||
Success or failure of management function. | No additional information. | |
FPT_TST_EXT.1/VPN | ||
No events specified | N/A |
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
Threat | Addressed by | Rationale |
---|---|---|
T.UNAUTHORIZED_ACCESS | FTP_ITC.1 (additional to GPOS PP) | This SFR mitigates the threat by defining the use of IPsec for protecting data in transit. |
FCS_IPSEC_EXT.1 | This SFR mitigates the threat by requiring the TOE’s implementation of IPsec to include requirements for how the remote VPN gateway or peer is authenticated. | |
FIA_BMA_EXT.1 (optional) | This SFR mitigates the threat by optionally defining the TOE's support for a platform-based biometric mechanism to use as an authentication mechanism. | |
FPF_MFA_EXT.1 (optional) | This SFR mitigates the threat by optionally enforcing a multifactor authentication requirement on an IPsec connection. | |
FCS_EAP_EXT.1 (selection-based) | This SFR mitigates the threat by optionally implementing EAP-TLS or EAP-TTLS as a mechanism for authentication. | |
FIA_PSK_EXT.1 (selection-based) | This SFR mitigates the threat by optionally requiring support for pre-shared keys as an alternate authentication method for IPsec. | |
FIA_PSK_EXT.2 (selection-based) | This SFR mitigates the threat by optionally specifying whether the TOE generates its own pre-shared keys used for authentication or accept them from an external source. | |
FIA_PSK_EXT.3 (selection-based) | This SFR mitigates the threat by optionally defining the composition and use of password-based pre-shared keys used for authentication. | |
FIA_PSK_EXT.4 (selection-based) | This SFR mitigates the threat by optionally defining HOTP as an authentication mechanism. | |
FIA_PSK_EXT.5 (selection-based) | This SFR mitigates the threat by optionally defining TOTP as an authentication mechanism. | |
T.TSF_CONFIGURATION | FIA_X509_EXT.4 (additional to GPOS PP) | This SFR mitigates the threat by providing the ability to verify the integrity of the TSF using X.509 certificates. |
FMT_SMF.1/VPN | This SFR mitigates the threat by requiring the TOE to implement certain administratively-configurable functions. | |
FPT_TST_EXT.1/VPN | This SFR mitigates the threat by requiring the TOE to execute self-tests that demonstrate that its integrity is maintained. | |
FAU_GEN.1/VPN (optional) | This SFR mitigates the threat by optionally requiring the TOE to generate audit data for its behavior. | |
FAU_SEL.1/VPN (optional) | This SFR mitigates the threat by optionally requiring the TOE to allow for the configuration of what behavior is audited. | |
T.USER_DATA_REUSE | FCS_CKM_EXT.2 (additional to GPOS PP) | This SFR mitigates the threat by requiring the TOE to store sensitive data in the OS’ key storage. |
FDP_VPN_EXT.1 (additional to MDF PP) | This SFR mitigates the threat by optionally requiring the TOE to prohibit split-tunneling so that network traffic cannot be transmitted outside of an established IPsec tunnel. | |
FCS_CKM_EXT.2 (additional to App PP) | This SFR mitigates the threat by requiring the TOE or its platform to store sensitive data in the OS' key storage. | |
FCS_CKM.6 (additional to App PP) | This SFR mitigates the threat by requiring the TOE or its platform to zeroize key data when no longer needed. | |
FDP_RIP.2 | This SFR mitigates the threat by requiring the TOE or its platform to ensure that residual data is purged from the system. | |
FPF_MFA_EXT.1 (optional) | This SFR mitigates the threat by optionally requiring the TOE to prohibit transmission of packet data aside from those packets needed to perform multifactor authentication. | |
T.TSF_FAILURE | FPT_TST_EXT.1/VPN | This SFR mitigates the threat by requiring the TOE to execute self-tests that demonstrate that its integrity is maintained. |
FAU_GEN.1/VPN (optional) | This SFR mitigates the threat by optionally requiring the TOE to generate audit data for its behavior. | |
FAU_SEL.1/VPN (optional) | This SFR mitigates the threat by optionally requiring the TOE to allow for the configuration of what behavior is audited. |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.UNAUTHORIZED_ACCESS | The threat of an attacker gaining access to a network interface or data that is transmitted over it is consistent with the T.NETWORK_ATTACK and T.NETWORK_EAVESDROP threats in the GPOS PP. |
T.TSF_CONFIGURATION | The threat of a misconfigured VPN client is consistent with the T.NETWORK_ATTACK and T.NETWORK_EAVESDROP threats on the GPOS PP because misconfiguration could allow VPN traffic to be subjected unexpectedly to unauthorized modification or disclosure. |
T.USER_DATA_REUSE | Inadvertent disclosure of user data to an unauthorized recipient is consistent with the T.NETWORK_EAVESDROP threat in the GPOS PP. |
T.TSF_FAILURE | A failure of TSF functionality could compromise the local system, which is consistent with the T.LOCAL_ATTACK threat in the GPOS PP. |
A.NO_TOE_BYPASS | The A.NO_TOE_BYPASS assumption assumes that the OE is configured in such a manner that the only network route to the protected network is through the TOE. This does not conflict with the GPOS PP because the GPOS PP makes no assumptions about the network architecture in which the TOE is deployed. |
A.PHYSICAL | The assumption that physical security is provided by the environment is not explicitly stated in the GPOS PP but is consistent with the A.PLATFORM assumption defined in the GPOS PP, which expects the computing platform to be trusted. |
A.TRUSTED_CONFIG | The assumption that personnel responsible for the TOE’s configuration are trusted to follow the guidance is consistent with the A.PROPER_ADMIN defined in the GPOS PP. |
PP-Module OE Objective | Consistency Rationale |
---|---|
OE.NO_TOE_BYPASS | This objective addresses behavior that is out of scope of the GPOS PP and does not define an environment that a GPOS TOE is incapable of existing in. |
OE.PHYSICAL | This is part of satisfying OE.PLATFORM as defined in the GPOS PP because physical security is required for hardware to be considered ‘trusted.’ |
OE.TRUSTED_CONFIG | The expectation of trusted configuration is consistent with OE.PROPER_USER and OE.PROPER_ADMIN in the GPOS PP. |
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
FCS_CKM.1 | The ST author is instructed to make specific selections at minimum to address VPN client requirements; the SFR behavior itself is unmodified. |
FCS_CKM.2 | The ST author is instructed to make specific selections at minimum to address VPN client requirements; the SFR behavior itself is unmodified. |
FCS_COP.1/ENCRYPT | The SFR is refined to mandate AES modes that must be supported to address VPN client requirements; the use of these modes for VPN connectivity does not impact the ability of the TSF to satisfy any of its other security requirements. |
Additional SFRs | |
FCS_CKM_EXT.2 | Storage of key data related to VPN functionality can be accomplished using the same mechanism defined by FCS_STO_EXT.1 in the GPOS PP. |
FIA_X509_EXT.4 | This SFR defines additional uses for X.509 certificate functionality that do not conflict with those defined in the GPOS PP. |
FTP_ITC.1 | This SFR defines a trusted channel for IPsec, which is added functionality that does not prevent the existing GPOS functions from being performed. |
Mandatory SFRs | |
FCS_CKM.1/VPN | Generation of IKE peer authentication keys is added functionality that does not prevent the existing GPOS functions from being performed. |
FCS_IPSEC_EXT.1 | This SFR defines the VPN client’s IPsec implementation, which is added functionality that does not interfere with the GPOS functions. |
FDP_RIP.2 | The requirement to protect against reuse of residual data is a property of the VPN client behavior and does not impact the GPOS functionality. |
FMT_SMF.1/VPN | The ability to configure the VPN client behavior does not affect whether the GPOS as a whole can perform its security functions. |
FPT_TST_EXT.1/VPN | Self-testing of the VPN client functionality does not impact the ability of the GPOS to perform its security functions. |
Optional SFRs | |
FIA_BMA_EXT.1 | This SFR relates to biometric authentication, which does not conflict with the GPOS PP because it may be a function offered by the part of the TOE described by the GPOS PP. |
FPF_MFA_EXT.1 | This SFR relates specifically to the handling of traffic that is used for the establishment of IPsec connections. |
Objective SFRs | |
FAU_SEL.1/VPN | The ability to suppress the generation of certain audit data related to VPN activity does not interfere with the ability of the GPOS to satisfy its security functionality. |
Implementation-dependent SFRs | |
FAU_GEN.1/VPN | Audit data generated by the VPN client does not interfere with GPOS functionality. The possibility of the underlying OS platform generating audit records is consistent with the GPOS PP, which already contains FAU_GEN.1. |
Selection-based SFRs | |
FCS_EAP_EXT.1 | This SFR defines an additional cryptographic protocol that is beyond the scope of those defined in the GPOS PP but does not prevent any GPOS PP functionality from being implemented. |
FIA_PSK_EXT.1 | This SFR defines the use of pre-shared keys, which is behavior that only relates to the establishment of IPsec connections. |
FIA_PSK_EXT.2 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.3 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.4 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.5 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.UNAUTHORIZED_ACCESS | The threat of an attacker gaining access to a network interface or data that is transmitted over it is consistent with the T.NETWORK and T.EAVESDROP threats in the MDF PP. |
T.TSF_CONFIGURATION | The threat of a misconfigured VPN client is consistent with the T.NETWORK and T.EAVESDROP threats in the MDF PP because failure to mitigate against misconfiguration makes these threats more significant. |
T.USER_DATA_REUSE | Inadvertent disclosure of user data to an unauthorized recipient is consistent with the T.EAVESDROP threat in the MDF PP. |
T.TSF_FAILURE | A failure of TSF functionality could compromise the local system, which is consistent with the T.FLAWAPP threat in the MDF PP. |
A.NO_TOE_BYPASS | The A.NO_TOE_BYPASS assumption assumes that the OE is configured in such a manner that the only network route to the protected network is through the TOE. This does not conflict with the MDF PP because the MDF PP makes no assumptions about the network architecture in which the TOE is deployed. |
A.PHYSICAL | The MDF PP includes the A.NOTIFY and A.PRECAUTION assumptions to mitigate the risk of physical theft of the TOE. This is consistent with the A.PHYSICAL assumption in this PP-Module because the MDF PP includes reasonable assumptions about the physical security of the TOE. |
A.TRUSTED_CONFIG | This assumption is consistent with the MDF PP because the MDF PP includes the A.CONFIG assumption which assumes that all security functions are appropriately configured. |
PP-Module OE Objective | Consistency Rationale |
---|---|
OE.NO_TOE_BYPASS | This objective addresses behavior that is out of scope of the MDF PP and does not define an environment that an MDF TOE is incapable of existing in. |
OE.PHYSICAL | The operational environment of a mobile device cannot guarantee physical security, but the OE.PRECAUTION objective in the MDF PP ensures that an appropriate level of physical security is provided. |
OE.TRUSTED_CONFIG | The expectation of trusted configuration is consistent with OE.CONFIG in the MDF PP. |
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
FCS_CKM.1 | The ST author is instructed to make specific selections at minimum to address VPN client requirements; the SFR behavior itself is unmodified. |
FCS_CKM.2/UNLOCKED | The ST author is instructed to make specific selections at minimum to address VPN client requirements; the SFR behavior itself is unmodified. |
FCS_COP.1/ENCRYPT | The ST author is instructed to make specific selections at minimum to address VPN client requirements; the SFR behavior itself is unmodified. |
FDP_IFC_EXT.1 | The ST author is instructed to make specific selections at minimum to address VPN client requirements; the SFR behavior itself is unmodified. |
FMT_SMF_EXT.1 | This PP-Module modifies the management function regarding Always-on VPN protection. |
FTP_ITC_EXT.1 | This PP-Module adds IPsec as a new protocol that is used to implement trusted channels. |
Additional SFRs | |
FDP_VPN_EXT.1 | The ability of the VPN client to prevent split tunneling of IPsec traffic requires it to have hooks into lower-level mobile device behavior, but there are no requirements in the MDF PP that would prevent this functionality from being supported. |
Mandatory SFRs | |
FCS_CKM.1/VPN | This SFR defines the method of key generation for IKE peer authentication, which is a function that does not interfere with the functionality defined in the MDF PP. |
FCS_IPSEC_EXT.1 | This SFR defines the VPN client’s IPsec implementation, which is added functionality that does not interfere with the MDF functions. |
FDP_RIP.2 | The requirement to protect against reuse of residual data is a property of the VPN client behavior and does not impact the MDF functionality. |
FMT_SMF.1/VPN | The ability to configure the VPN client behavior does not affect whether the MDF as a whole can perform its security functions. |
FPT_TST_EXT.1/VPN | Self-testing of the VPN client functionality does not impact the ability of the MDF to perform its security functions. |
Optional SFRs | |
FIA_BMA_EXT.1 | This SFR relates to biometric authentication, which does not conflict with the MDF PP because it may be a function offered by the part of the TOE described by the MDF PP. |
FPF_MFA_EXT.1 | This SFR relates specifically to the handling of traffic that is used for the establishment of IPsec connections. |
Objective SFRs | |
FAU_SEL.1/VPN | The ability to suppress the generation of certain VPN client audit data does not interfere with MDM functionality. The MDF PP already contains FAU_SEL.1 as an objective SFR which means that this functionality does not conflict with the expected behavior of a mobile device. |
Implementation-dependent SFRs | |
FAU_GEN.1/VPN | Audit data generated by the VPN client does not interfere with MDF functionality. The possibility of the underlying MDF platform generating audit data is consistent with the MDF PP, which already contains FAU_GEN.1. |
Selection-based SFRs | |
FCS_EAP_EXT.1 | This SFR defines an additional cryptographic protocol that is beyond the scope of those defined in the MDF PP but does not prevent any MDF PP functionality from being implemented. |
FIA_PSK_EXT.1 | This SFR defines the use of pre-shared keys, which is behavior that only relates to the establishment of IPsec connections. |
FIA_PSK_EXT.2 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.3 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.4 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.5 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.UNAUTHORIZED_ACCESS | The threat of an attacker gaining access to a network interface or data that is transmitted over it is consistent with the T.NETWORK_ATTACK and T.NETWORK_EAVESDROP threats in the App PP. |
T.TSF_CONFIGURATION | The threat of a misconfigured VPN client is consistent with the T.LOCAL_ATTACK threat in the App PP. |
T.USER_DATA_REUSE | Inadvertent disclosure of user data to an unauthorized recipient is consistent with the T.NETWORK_EAVESDROP threat in the App PP. |
T.TSF_FAILURE | A failure of TSF functionality could compromise the local system, which is consistent with the T.LOCAL_ATTACK threat in the App PP. |
A.NO_TOE_BYPASS | The A.NO_TOE_BYPASS assumption assumes that the OE is configured in such a manner that the only network route to the protected network is through the TOE. This does not conflict with the App PP because the App PP makes no assumptions about the network architecture in which the TOE is deployed. |
A.PHYSICAL | The assumption that physical security is provided by the environment is not explicitly stated in the App PP but is consistent with the A.PLATFORM assumption defined in the App PP, which expects the computing platform to be trusted. |
A.TRUSTED_CONFIG | The assumption that personnel responsible for the TOE’s configuration are trusted to follow the guidance is consistent with the A.PROPER_ADMIN defined in the App PP. |
PP-Module OE Objective | Consistency Rationale |
---|---|
OE.NO_TOE_BYPASS | This objective addresses behavior that is out of scope of the App PP and does not define an environment that is globally applicable to all software applications. |
OE.PHYSICAL | This is part of satisfying OE.PLATFORM as defined in the App PP because physical security is required for the underlying platform to be considered ‘trustworthy’. |
OE.TRUSTED_CONFIG | The expectation of trusted configuration is consistent with OE.PROPER_USER and OE.PROPER_ADMIN in the App PP. |
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
FCS_CKM.1/AK | The ST author is instructed to make specific selections at minimum to address VPN client requirements; the SFR behavior itself is unmodified. Additionally, this behavior is selection-based in the App PP but is made mandatory since it is required for VPN client functionality. |
FCS_CKM.2 | The ST author is instructed to make specific selections at minimum to address VPN client requirements and is modified to include DH group 14 as an additional supported method for key establishment. |
FCS_CKM_EXT.1 | The ST author is instructed to make specific selections at minimum to address VPN client requirements; specifically, since key generation services are required in some capacity in order to support VPN functionality, the ST author loses the choice of stating that the application does not have any key generation functionality. Additionally, this behavior is selection-based in the App PP but is made mandatory since it is required for VPN client functionality. |
FCS_COP.1/SKC | The ST author is instructed to make specific selections at minimum to address VPN client requirements; the SFR behavior itself is unmodified. |
FTP_DIT_EXT.1 | This PP-Module requires the existing selection of IPsec to be chosen to satisfy the dependency on this PP-Module |
Additional SFRs | |
FCS_CKM_EXT.2 | This PP-Module adds a requirement for key storage, which is new functionality when compared to the App PP but does not interfere with its existing security functions. |
FCS_CKM.6 | This PP-Module adds a requirement for key destruction, which is new functionality when compared to the App PP but does not interfere with its existing security functions. |
Mandatory SFRs | |
FCS_CKM.1/VPN | This SFR defines the method of key generation for IKE peer authentication, which is a function that does not interfere with the functionality defined in the App PP. |
FCS_IPSEC_EXT.1 | This SFR defines the VPN client’s IPsec implementation, which is added functionality that does not interfere with the application functions. |
FDP_RIP.2 | The requirement to protect against reuse of residual data is a property of the VPN client behavior and does not impact the general application functionality. |
FMT_SMF.1/VPN | The ability to configure the VPN client behavior does not affect whether the application as a whole can perform its security functions. |
FPT_TST_EXT.1/VPN | Self-testing of the VPN client functionality does not impact the ability of the application to perform its security functions. |
Optional SFRs | |
FIA_BMA_EXT.1 | This SFR relates to biometric authentication, which does not conflict with the App PP because it may be a function offered by the OE in which a TOE defined by the App PP is deployed. |
FPF_MFA_EXT.1 | This SFR relates specifically to the handling of traffic that is used for the establishment of IPsec connections. |
Objective SFRs | |
FAU_SEL.1/VPN | The ability to suppress the generation of certain audit data related to VPN activity does not interfere with the ability of the application to satisfy its security functionality. |
Implementation-dependent SFRs | |
FAU_GEN.1/VPN | Audit data generated by the VPN client does not interfere with application functionality. For cases where auditing is performed by the TOE platform, a software application is installed on a general-purpose OS or mobile device, both of which can reasonably be expected to provide audit functionality. |
Selection-based SFRs | |
FCS_EAP_EXT.1 | This SFR defines an additional cryptographic protocol that is beyond the scope of those defined in the App PP but does not prevent any App PP functionality from being implemented. |
FIA_PSK_EXT.1 | This SFR defines the use of pre-shared keys, which is behavior that only relates to the establishment of IPsec connections. |
FIA_PSK_EXT.2 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.3 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.4 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.5 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.UNAUTHORIZED_ACCESS | The threat of an attacker gaining access to a network interface or data that is transmitted over it is consistent with the T.NETWORK_ATTACK and T.NETWORK_EAVESDROP threats in the MDM PP. |
T.TSF_CONFIGURATION | The threat of a misconfigured VPN client is consistent with the T.NETWORK_ATTACK and T.NETWORK_EAVESDROP threats in the MDM PP because failure to mitigate against misconfiguration makes these threats more significant. |
T.USER_DATA_REUSE | Inadvertent disclosure of user data to an unauthorized recipient is consistent with the T.NETWORK_EAVESDROP threat in the MDM PP. |
T.TSF_FAILURE | A failure of TSF functionality could compromise the implementation of the IPsec channel, which would lead to an exploitation of the T.NETWORK_ATTACK threat. |
A.NO_TOE_BYPASS | The A.NO_TOE_BYPASS assumption assumes that the OE is configured in such a manner that the only network route to the protected network is through the TOE. This does not conflict with the MDM PP because the MDM PP makes no assumptions about the network architecture in which the TOE is deployed. |
A.PHYSICAL | The assumption that physical security is provided by the environment is not explicitly stated in the MDM PP but is consistent with the A.MDM_SERVER_PLATFORM assumption defined in the MDM PP, which expects the computing platform to be trusted. |
A.TRUSTED_CONFIG | The assumption that personnel responsible for the TOE’s configuration are trusted to follow the guidance is consistent with the A.PROPER_ADMIN defined in the MDM PP. |
PP-Module OE Objective | Consistency Rationale |
---|---|
OE.NO_TOE_BYPASS | This objective addresses behavior that is out of scope of the MDM PP and does not define an environment that an MDM TOE is incapable of existing in. |
OE.PHYSICAL | This is part of satisfying OE.IT_ENTERPRISE as defined in the MDM PP because provisioning of physical security is a reasonable expectation for an IT enterprise. |
OE.TRUSTED_CONFIG | The expectation of trusted configuration is consistent with OE.PROPER_USER and OE.PROPER_ADMIN in the MDM PP. |
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
FCS_CKM.1 | The ST author is instructed to make specific selections at minimum to address VPN client requirements; the SFR behavior itself is unmodified. |
FCS_CKM.2 | The ST author is instructed to make specific selections at minimum to address VPN client requirements; the SFR behavior itself is unmodified. |
FCS_COP.1/CONF_ALG | The ST author is instructed to make specific selections at minimum to address VPN client requirements; the SFR behavior itself is unmodified. |
FPT_ITT.1/INTER_XFER | When this SFR relates to the PP-Module’s functionality, the ST author is instructed to make specific selections to implement this behavior using the VPN client. This is done by forcing the ST author to make specific selections that are already present in the MDM PP definition of the SFR; no new behavior is introduced by this. |
FTP_ITC.1/INTER_XFER_IT | When this SFR relates to the PP-Module’s functionality, the ST author is instructed to make specific selections to implement this behavior using the VPN client at minimum. This is done by forcing the ST author to make a specific selection that is already present in the MDM PP definition of the SFR and by removing a selection option; no new behavior is introduced by this. |
FTP_TRP.1/TRUSTPATH_REM_ADMIN | When this SFR relates to the PP-Module’s functionality, the ST author is instructed to make specific selections to implement this behavior using the VPN client at minimum. This is done by forcing the ST author to make a specific selection that is already present in the MDM PP definition of the SFR and by removing a selection option; no new behavior is introduced by this. |
Additional SFRs | |
This PP-Module does not add any requirements when the MDM PP is the base. | |
Mandatory SFRs | |
FCS_CKM.1/VPN | This SFR defines the method of key generation for IKE peer authentication, which is a function that does not interfere with the functionality defined in the MDM PP. |
FCS_IPSEC_EXT.1 | This SFR defines the VPN client’s IPsec implementation, which is added functionality that does not interfere with the MDM functions. |
FDP_RIP.2 | The requirement to protect against reuse of residual data is a property of the VPN client behavior and does not impact the MDM functionality. |
FMT_SMF.1/VPN | The ability to configure the VPN client behavior does not affect whether the MDM as a whole can perform its security functions. |
FPT_TST_EXT.1/VPN | Self-testing of the VPN client functionality does not impact the ability of the MDM to perform its security functions. |
Optional SFRs | |
FIA_BMA_EXT.1 | This SFR relates to biometric authentication, which does not conflict with the MDM PP because it may be a function offered by the part of the TOE described by the MDM PP. |
FPF_MFA_EXT.1 | This SFR relates specifically to the handling of traffic that is used for the establishment of IPsec connections. |
Objective SFRs | |
FAU_SEL.1/VPN | The ability to suppress the generation of certain VPN client audit data does not interfere with MDM functionality. The MDM PP already contains FAU_SEL.1 as an optional SFR which means that this functionality does not conflict with the expected behavior of an MDM. |
Implementation-dependent SFRs | |
FAU_GEN.1/VPN | Audit data generated by the VPN client do not interfere with MDM functionality. The possibility of the MDM as a whole generating audit records is consistent with the MDM PP, which already contains FAU_GEN.1. |
Selection-based SFRs | |
FCS_EAP_EXT.1 | This SFR defines an additional cryptographic protocol that is beyond the scope of those defined in the MDM PP but does not prevent any MDM PP functionality from being implemented. |
FIA_PSK_EXT.1 | This SFR defines the use of pre-shared keys, which is behavior that only relates to the establishment of IPsec connections. |
FIA_PSK_EXT.2 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.3 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.4 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
FIA_PSK_EXT.5 | This SFR relates to use of pre-shared keys, which is behavior that only applies to the establishment of IPsec connections. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FIA_BMA_EXT.1 | ||
No events specified | N/A | |
FPF_MFA_EXT.1 | ||
No events specified | N/A |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_SEL.1/VPN | ||
All modifications to the audit configuration that occur while the audit collection functions are operating. | No additional information. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_GEN.1/VPN | ||
No events specified | N/A |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FCS_EAP_EXT.1 | ||
No events specified | N/A | |
FIA_PSK_EXT.1 | ||
No events specified | N/A | |
FIA_PSK_EXT.2 | ||
No events specified | N/A | |
FIA_PSK_EXT.3 | ||
No events specified | N/A | |
FIA_PSK_EXT.4 | ||
No events specified | N/A | |
FIA_PSK_EXT.5 | ||
No events specified | N/A |
Functional Class | Functional Components |
---|---|
Cryptographic Support (FCS) | FCS_CKM_EXT Cryptographic Key Management FCS_EAP_EXT EAP-TLS FCS_IPSEC_EXT IPsec |
Identification and Authentication (FIA) | FIA_BMA_EXT Biometric Activation FIA_PSK_EXT Pre-Shared Key Composition FIA_X509_EXT X.509 Certificate Use and Management |
Packet Filtering (FPF) | FPF_MFA_EXT Multifactor Authentication Filtering |
Protection of the TSF (FPT) | FPT_TST_EXT TSF Self-Test |
User Data Protection (FDP) | FDP_VPN_EXT Subset Information Flow Control |
FCS_CKM_EXT.2, Cryptographic Key Storage, requires the TSF to securely store key data when not in use.
No specific management functions are identified.
There are no auditable events foreseen.
FCS_IPSEC_EXT.1, IPsec, requires the TSF to securely implement the IPsec protocol.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: |
FCS_CKM.1 Cryptographic Key Generation FCS_CKM.2 Cryptographic Key Distribution FCS_COP.1 Cryptographic Operation |
FCS_EAP_EXT.1, EAP-TLS, defines the use of EAP-TLS.
No specific management functions are identified.
No specific audit functions are identified.
Hierarchical to: | No other components. |
Dependencies to: | FCS_IPSEC_EXT.1 IPsec |
FIA_X509_EXT.4, X.509 Certificate Use and Management, requires the TOE to perform X.509 certificate authentication and describes the behavior that is followed if the status of the certificate is unknown or invalid.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FIA_X509_EXT.1 X.509 Certificate Validation FPT_TST_EXT.1 TSF Self-Test FPT_TUD_EXT.1 Trusted Update |
FIA_BMA_EXT.1, Biometric Activation, defines the use of biometrics when using the VPN client.
No specific management functions are identified.
No specific audit functions are identified.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FIA_PSK_EXT.1, Pre-Shared Key Composition, defines the use and composition of pre-shared keys used for IPsec.
FIA_PSK_EXT.2, Generated Pre-Shared Keys, defines the use and composition of generated pre-shared keys used for IPsec.
FIA_PSK_EXT.3, Password-Based Pre-Shared Keys, defines the use and composition of password-based pre-shared keys used for IPsec.
FIA_PSK_EXT.4, HMAC-Based One-Time Password Pre-shared Keys Support, defines the use and composition of HOTP pre-shared keys used for IPsec.
FIA_PSK_EXT.5, Time-Based One-Time Password Pre-shared Keys Support, defines the use and composition of TOTP pre-shared keys used for IPsec.
No specific management functions are identified.
No specific audit functions are identified.
Hierarchical to: | No other components. |
Dependencies to: | FCS_IPSEC_EXT.1 IPsec |
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FIA_PSK_EXT.1 Pre-Shared Key Composition |
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_RBG.1 Random Bit Generation (RBG) FIA_PSK_EXT.1 Pre-Shared Key Composition |
No specific management functions are identified.
No specific audit functions are identified.
Hierarchical to: | No other components. |
Dependencies to: | FIA_PSK_EXT.1 Pre-Shared Key Composition |
No specific management functions are identified.
No specific audit functions are identified.
FPF_MFA_EXT.1, Multifactor Authentication Filtering, defines the use and composition of multifactor authentication filtering.
No specific management functions are identified.
No specific audit functions are identified.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_TST_EXT.1, TSF Self-Test, requires the TOE to perform power on self-tests to verify its functionality and the integrity of its stored executable code.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FDP_VPN_EXT.1, Split Tunnel Prevention, requires the TSF to process all IP traffic through its VPN client functionality.
No specific management functions are identified.
There are no auditable events foreseen.
This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP-Module. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.3 Dependencies between components.
This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP-Module provides evidence that these controls are present and have been evaluated.
Table 24: Implicitly Satisfied RequirementsRequirement | Rationale for Satisfaction |
FCS_CKM.2 – Cryptographic Key Distribution, or FCS_COP.1 – Cryptographic Operation | FCS_CKM.1 (which is defined in this PP-Module as FCS_CKM.1/VPN) requires one of FCS_CKM.2 or FCS_COP.1 to be claimed so that the generated keys can serve some security-relevant purpose. Each of the Base-PPs for this PP-Module define an iteration of FCS_COP.1 for symmetric cryptography that is expected to use the IKE keys generated by FCS_CKM.1/VPN. Therefore, this dependency is satisfied through requirements defined in the Base-PPs. |
FCS_COP.1 – Cryptographic Operation | FCS_IPSEC_EXT.1 has a dependency on FCS_COP.1 because of the cryptographic operations that are needed in support of implementing the IPsec protocol. FCS_COP.1 is not defined in this PP-Module because each of the supported Base-PPs define iterations of FCS_COP.1 that support the functions that are relevant to IPsec. |
FMT_MTD.1 – Management of TSF Data |
FAU_SEL.1/VPN has a dependency on FMT_MTD.1 to enforce
appropriate access controls on the audit configuration, as this
is TSF data. This SFR is not explicitly defined in any of the
supported Base-PPs but the dependency is implicitly
addressed by each Base-PP in the following manner:
|
FPT_STM.1 – Reliable Time Stamps |
FAU_GEN.1/VPN has a dependency on FPT_STM.1 because
audit data is required to have timestamps that are based
on reliable clock data. All of the supported Base-PPs either
define this requirement explicitly or provide rationale for why
the reader should expect that a reliable clock service should
be present. Depending on the claimed Base-PP, the
dependency is satisfied in the following manner:
|
FPT_STM.1 – Reliable Time Stamps | FAU_GEN.1 has a dependency on FPT_STM.1. While not explicitly stated in the PP, it is assumed that this will be provided by the underlying hardware platform on which the TOE is installed. This is because the TOE is installed as a software or firmware product that runs on general-purpose computing hardware so a hardware clock is assumed to be available. |
Acronym | Meaning |
---|---|
AES | Advanced Encryption Standard |
Base-PP | Base Protection Profile |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
cPP | Collaborative Protection Profile |
CRL | Certificate Revocation List |
CSP | Critical Security Parameter |
DH | Diffie-Hellman |
DN | Distinguished Name |
DSS | Digital Signature Standard |
ECC | Elliptic Curve Cryptography |
EP | Extended Package |
ESP | Encapsulating Security Protocol |
EUD | End-User Device |
FFC | Finite Field Cryptography |
FIPS | Federal Information Processing Standards |
FP | Functional Package |
FQDN | Fully Qualified Domain Name |
IKE | Internet Key Exchange |
IP | Internet Protocol |
IT | Information Technology |
MD | Mobile Device (Fundamentals) |
NAT | Network Address Translation |
NIST | National Institute of Standards and Technology |
OCSP | Online Certificate Status Protocol |
OE | Operational Environment |
OS | (General Purpose) Operating System |
OSP | Organizational Security Policy |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
PUB | Publication |
RBG | Random Bit Generation |
RFC | Request For Comment |
SA | Security Association |
SAR | Security Assurance Requirement |
SD | Supporting Document |
SFR | Security Functional Requirement |
SHA | Secure Hash Algorithm |
SPD | Security Policy Database |
ST | Security Target |
TOE | Target of Evaluation |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |
VPN | Virtual Private Network |
Identifier | Title |
---|---|
[CC] | Common Criteria for Information Technology Security Evaluation -
|
[CEM] | Common Methodology for Information Technology Security Evaluation -
|
[App PP] | Protection Profile for Application Software, Version 2.0, June 16, 2025 |
[GPOS PP] | Protection Profile for General Purpose Operating Systems, Version 4.3, September 27, 2022 |
[MDF PP] | Protection Profile for Mobile Device Fundamentals, Version 3.3, Version 3.3, September 12, 2022 |
[MDM PP] | Protection Profile for Mobile Device Management, Version 4.0, April 25, 2019 |