Comment: Comment-1-
Comment: Comment-2-
Comment: Comment-3-
Comment: Comment-4-
Comment: Comment-5-
Comment: Comment-6-
Comment: Comment-7-

PP-Module for Wireless Intrusion Detection/Prevention System

NIAP Logo
Version: 3.0
2025-07-15
National Information Assurance Partnership

Revision History

VersionDateComment
1.02020-09-30Initial Release - PP-Module for NDcPP
2.02022-09-30Added 6 GHz spectrum slice
3.02025-07-15Incorporate NIAP Technical Decisions, Update to CC:2022

Contents

1Introduction1.1Overview1.2Terms1.2.1Common Criteria Terms1.2.2Technical Terms1.3Compliant Targets of Evaluation1.3.1TOE Boundary1.4Use Cases2Conformance Claims3Security Problem Definition3.1Threats3.2Assumptions3.3Organizational Security Policies4Security Objectives4.1Security Objectives for the Operational Environment4.2Security Objectives Rationale5Security Requirements5.1Collaborative Protection Profile for Network Device Security Functional Requirements Direction 5.1.1 Modified SFRs 5.1.1.1Security Audit (FAU)5.1.1.2Communications (FCO)5.1.1.3Protection of the TSF (FPT)5.1.1.4Trusted Paths/Channels (FTP)5.2TOE Security Functional Requirements5.2.1Auditable Events for Mandatory SFRs5.2.2Security Audit (FAU)5.2.3User Data Protection (FDP)5.2.4Security Management (FMT)5.3TOE Security Functional Requirements Rationale6Consistency Rationale6.1Collaborative Protection Profile for Network Device6.1.1 Consistency of TOE Type 6.1.2 Consistency of Security Problem Definition 6.1.3 Consistency of OE Objectives 6.1.4 Consistency of Requirements Appendix A - Optional SFRsA.1Strictly Optional Requirements A.1.1Auditable Events for Optional SFRsA.1.2Security Audit (FAU)A.2Objective Requirements A.2.1Auditable Events for Objective SFRsA.2.2Security Audit (FAU)A.2.3Protection of the TSF (FPT)A.3Implementation-dependent Requirements Appendix B - Selection-based Requirements B.1Audit Events for Selection-Based SFRsB.2Security Audit (FAU)Appendix C - Extended Component DefinitionsC.1Extended Components TableC.2Extended Component DefinitionsC.2.1Security Audit (FAU)C.2.1.1FAU_ARP_EXT Security Alarm FilteringC.2.1.2FAU_IDS_EXT Intrusion Detection MethodsC.2.1.3FAU_INV_EXT Environmental InventoryC.2.1.4FAU_MAC_EXT Device ImpersonationC.2.1.5FAU_RPT_EXT Reporting MethodsC.2.1.6FAU_WID_EXT Wireless Intrusion DetectionC.2.1.7FAU_ANO_EXT Anomaly-Based Intrusion DetectionC.2.1.8FAU_SIG_EXT Signature-Based Intrusion DetectionC.2.1.9FAU_WIP_EXT Wireless Intrusion PreventionAppendix D - Implicitly Satisfied RequirementsAppendix E - Allocation of Requirements in Distributed TOEsAppendix F - Entropy Documentation and AssessmentAppendix G - AcronymsAppendix H - Bibliography

1 Introduction

1.1 Overview

This Protection Profile Module (PP-Module) describes security requirements for a 802.11 Wireless Intrusion Detection System (WIDS) defined to be an IEEE 802.11 network intrusion detection product located at the edge of a private network that can collect, inspect, and analyze real-time network traffic and alert the administrator of policy violations. This PP-Module is intended to provide a minimal baseline set of requirements that are targeted at mitigating well defined and described threats.

This PP-Module contains optional requirements for a Wireless Intrusion Protection System (WIPS), a security product that in addition to the 802.11 WIDS capability, provides network security administrators with the additional ability to react in real-time to potentially malicious wireless (IEEE 802.11) network traffic.

This PP-Module is intended for use with the following Base-PP:

A TOE that conforms to a PP-Configuration containing this PP-Module must be a 'Distributed TOE' as defined in the NDcPP. The expectation for this PP-Module is that a WIDS must include distributed sensor nodes to ensure that the full physical range of a wireless network to ensure that user interactions with the network cannot evade detection.

A part or parts of the TOE that have to be relied upon for enforcing a closely related subset of the rules from the TSP. The security policy enforced by an SF.

1.3 Compliant Targets of Evaluation

1.3.1 TOE Boundary

This PP-Module specifically addresses WIDS/WIPS. A conformant WIDS is a product that can monitor, collect, inspect, and analyze real-time network traffic and alert the administrator of policy violations. WIPS functionality is not required to conform to this PP-Module, and it is optional for the TOE to have the additional ability to react in real-time to potentially malicious wireless (IEEE 802.11) network traffic.

A WIDS/WIPS TOE consists of multiple sensors that passively scan the RF environment on the WLAN radio frequency spectrum and a centralized mechanism such as a Server or Controller that processes the data collected by the sensors. Conformant TOEs must use a secure communication path(s) between WIDS/WIPS components.

A WIDS/WIPS can be Integrated (be part of the WLAN infrastructure) or Standalone (independent from WLAN) architecture depending on vendor implementation. The two different architectures are illustrated in Figure 1 below. The TOE boundary is indicated by the yellow box.

A WIDS/WIPS is expected to inspect layers 1 and 2 network traffic, per the OSI network model, and monitor wireless frames in the RF spectrum utilized by IEEE 802.11 a, b, g, n, and ac. Monitoring and inspection of other technologies (e.g., cellular) and protocols are optional.

Conformant TOEs will detect potentially malicious network traffic using various approaches. Broadly speaking, the traffic analysis could be based on identification of 'known' threats, or 'unknown' threats. Identification of 'known' threats may be performed through pattern matching, (e.g. by matching strings of characters within a frame with known patterns, or by matching traffic patterns common with reconnaissance or denial of service (DoS) attacks). Identification of 'unknown' threats may be performed through use of various forms of anomaly detection whereby the WIDS/WIPS is provided with (or learns/creates) a definition of expected/typical traffic patterns, such that it’s able to detect and react to anomalous (unexpected/atypical) traffic patterns.


Figure 1: General TOE

1.4 Use Cases

[USE CASE 1] Use Case 1

A WIDS consists of sensors (preferably dedicated) and a central controller working together to provide 24/7 monitoring, primarily to the 802.11 Wireless Local Area Network (WLAN) spectrum and protocol, to detect, identify, and geolocate WLAN devices within a controlled space.

The WIDS may be capable of detecting or monitoring traffic other than 802.11 WLAN, such as 802.15.4 based protocols, which enhances the security of the controlled space. However, a WIDS is not required to monitor additional protocols outside of 802.11. A WIDS monitors all 802.11 WLAN traffic emanating from and traversing the controlled space, thus inadvertent collection of any 802.11 signals is possible when operating a WIDS.

2 Conformance Claims

Conformance Statement

An ST must claim exact conformance to this PP-Module.

The evaluation methods used for evaluating the TOE are a combination of the workunits defined in [CEM] as well as the Evaluation Activities for ensuring that individual SFRs and SARs have a sufficient level of supporting evidence in the Security Target and guidance documentation and have been sufficiently tested by the laboratory as part of completing ATE_IND.1. Any functional packages this PP claims similarly contain their own Evaluation Activities that are used in this same manner.
CC Conformance Claims

This PP-Module is conformant to Part 2 (extended) and Part 3 (conformant) of Common Criteria CC:2022, Revision 1.
PP Claim

This PP-Module does not claim conformance to any Protection Profile.

The following PPs and PP-Modules are allowed to be specified in a PP-Configuration with this PP-Module:
Package Claim

This PP-Module is not conformant to any Functional or Assurance Packages.

3 Security Problem Definition

WIDS address a range of security threats related to detection of and reaction to potentially malicious WLAN traffic. The malicious traffic may pose a threat to one or more endpoints on the monitored networks, to the network infrastructure, or to the TOE itself. Attacks against a WLAN could compromise the confidentiality and integrity of WLAN users and system data as well as the availability of the WLAN to legitimate users.

The term “monitored network” is used here to represent any WLAN and/or wired network that the TOE is configured to monitor and detect intrusions on. This extends to the wired networks as intrusions on the wireless network can also be damaging to the wired infrastructure. The WIDS/WIPS also protect the wired infrastructure by detecting rogue devices that are directly connected to the wired infrastructure, which may expose the wired network, or unauthorized WLAN devices deployed in a no-wireless zone.

The proper installation, configuration, and administration of the WIDS is critical to its correct operation. A site is responsible for developing its security policy and configuring a rule set that the WIDS will enforce and provide an appropriate response to meet their needs, relative to their own risk analysis and their perceived threats.

Note that this PP-Module does not repeat the threats identified in the NDcPP, though they all apply given the conformance and hence dependence of this PP-Module on the NDcPP. Note also that while the NDcPP contains only threats to the ability of the TOE to provide its security functions, this PP-Module addresses only threats to resources in the operational environment. Together the threats of the NDcPP and those defined in this PP-Module define the comprehensive set of security threats addressed by a WIDS TOE.

3.1 Threats

T.UNAUTHORIZED_DISCLOSURE_OF_INFORMATION
A malicious actor may take advantage of unintended/unauthorized disclosure of sensitive information on a protected WLAN, such as sending unencrypted sensitive data, without detection. A malicious actor may also force the modification or disclosure of data in transit between distributed components of a WIDS to impede or gain visibility into its data collection capabilities.
T.UNAUTHORIZED_ACCESS
An attacker may attempt to gain unauthorized access to a network, endpoints, or services, by methods such as impersonation of an authorized AP to get an EUD to connect to the unauthorized AP If malicious external APs or EUDs are able to communicate with APs or EUDs on the protected WLAN, then those devices may be susceptible to the unauthorized disclosure of information.
T.DISRUPTION
Attacks against the WLAN infrastructure might lead to denial of service (DoS) attacks within a protected WLAN. A wireless DoS may occur in two ways: at the physical layer through RF Jamming, or at the data link layer through packet injection.

3.2 Assumptions

These assumptions are made on the Operational Environment (OE) in order to be able to ensure that the security functionality specified in the PP-Module can be provided by the TOE. If the TOE is placed in an OE that does not meet these assumptions, the TOE may no longer be able to provide all of its security functionality.
A.CONNECTIONS
It is assumed that the TOE is connected to distinct networks in a manner that ensures that the TOE's security policies will be enforced on all applicable network traffic flowing among the attached networks.
A.PROPER_ADMIN
The administrator of the WIDS is not careless, willfully negligent or hostile, and administers the WIDS within compliance of the applied enterprise security policy.

3.3 Organizational Security Policies

An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.

P.ANALYZE
Analytical processes and information to derive conclusions about potential intrusions must be applied to WIDS data and appropriate response actions taken.

4 Security Objectives

4.1 Security Objectives for the Operational Environment

The following security objectives for the operational environment assist the TOE in correctly providing its security functionality. These track the assumptions about the environment.
OE.CONNECTIONS
TOE administrators will ensure that the TOE is installed in a manner that will allow the TOE to effectively enforce its policies on the network traffic of monitored networks.
OE.PROPER_ADMIN
The administrator of the WIDS is not careless, willfully negligent or hostile, and administers the WIDS within compliance of the applied enterprise security policy.

4.2 Security Objectives Rationale

This section describes how the assumptions and organizational security policies map to operational environment security objectives.
Table 1: Security Objectives Rationale
Assumption or OSPSecurity ObjectivesRationale
A.CONNECTIONSOE.CONNECTIONS The operational environment objective OE.CONNECTIONS is realized through A.CONNECTIONS.
A.PROPER_​ADMINOE.PROPER_​ADMIN The operational environment objective OE.PROPER_ADMIN is realized through A.PROPER_ADMIN.
P.ANALYZEOE.CONNECTIONSThe proper placement of the TOE within a network allows the P.ANALYZE policy to be enforced.

5 Security Requirements

This chapter describes the security requirements which have to be fulfilled by the product under evaluation. Those requirements comprise functional components from Part 2 and assurance components from Part 3 of [CC]. The following conventions are used for the completion of operations:

5.1 Collaborative Protection Profile for Network Device Security Functional Requirements Direction

In a PP-Configuration that includes the NDcPP, the TOE is expected to rely on some of the security functions implemented by the Network Device as a whole and evaluated against the NDcPP. The following sections describe any modifications that the ST author must make to the SFRs defined in the NDcPP in addition to what is mandated by Section 5.2 TOE Security Functional Requirements.

5.1.1 Modified SFRs

The SFRs listed in this section are defined in the NDcPP and relevant to the secure operation of the TOE.

5.1.1.1 Security Audit (FAU)

FAU_GEN_EXT.1: Security Audit Data Generation for Distributed TOE Components

This SFR has been modified from its definition in the NDcPP to mandate the selection of options that correspond to distributed TOEs. A TOE that conforms to this PP-Module will always be a distributed TOE.

The text of the requirement is replaced with:

The TSF shall be able to generate audit records for each TOE component. The audit records generated by the TSF of each TOE component shall include the subset of security relevant audit events which can occur on the TOE component.

Application Note: This SFR is selection-based in the Base-PP but is mandated by this PP-Module because the ST author must claim a distributed TOE selection in FAU_STG_EXT.1.2.

FAU_STG_EXT.1: Protected Audit Event Storage

Any element not specified in this section is unchanged from its definition in the Base-PP.

FAU_STG_EXT.1.2: This SFR has been modified from its definition in the NDcPP to remove a selection that is not permitted by the architecture required by the PP-Module.

The text of the requirement is replaced with:

The TSF shall be able to store generated audit data on the TOE itself. In addition [selection:

].

Application Note: This SFR is modified from its definition in the Base-PP by removing the selection option for the TOE to be standalone. A TOE that conforms to this PP-Module is expected to be distributed.

5.1.1.2 Communications (FCO)

FCO_CPC_EXT.1: Communication Partner Control

This SFR is mandated for inclusion by this PP-Module because the WIDS TOE is expected to be a distributed system. Any element not specified in this section is unchanged from its definition in the Base-PP.

FCO_CPC_EXT.1.2: This SFR has been modified from its definition in the NDcPP to specify which communications channels are acceptable for registration.

The text of the requirement is replaced with:

The TSF shall implement a registration process in which components establish and use a communications channel that uses [selection:

] for at least TSF data.

Application Note: This SFR is optional in the NDcPP but is mandated by this PP-Module because the WIDS TOE is expected to be a distributed system.

5.1.1.3 Protection of the TSF (FPT)

FPT_ITT.1: Basic Internal TSF Data Transfer Protection

This SFR is unchanged from its definition in the Base-PP, it is only mandated for inclusion because a TOE that conforms to this PP-Module is expected to be a distributed system.

This requirement ensures all communications between components of a distributed TOE is protected through the use of an encrypted communications channel. The data passed in this trusted communication channel are encrypted as defined in the protocol chosen in the selection. The ST author chooses the mechanisms supported by the TOE, and then ensures that the detailed protocol requirements in Appendix B of NDcPP corresponding to their selection are included in the ST, if not already present.

5.1.1.4 Trusted Paths/Channels (FTP)

FTP_ITC.1: Inter-TSF Trusted Channel

This SFR is modified from its definition in the Base-PP to add a selection for database server capability. Any element not specified in this section is unchanged from its definition in the Base-PP.

The text of the requirement is replaced with:

FTP_ITC.1.1: The TSF shall be capable of using [selection: IPsec, SSH [v2], TLS [1.2 or 1.3], DTLS, HTTPS] to provide a trusted communication channel between itself and authorized IT entities supporting the following capabilities: audit server, [selection: authentication server, database server, [assignment: other capabilities], no other capabilities] that is logically distinct from other communication channels and provides assured identification of its end points and protection of the channel data from disclosure and detection of modification of the channel data.

Application Note: If the TSF uses a separate database server to support its security-relevant functionality, this selection must be included in the ST. The intent of the database server is to store WIDS/WIPS data that must be queryable, such as events/alarms, triangulation calculations, wireless spectrum analysis (including RF jammer/Denial of Service (DoS)), and packet capture analysis. Authorized Administrators must be permitted to view alarms, raw event data, and any other data stored in the database. The Administrator must access the database through a trusted channel if done so remotely.

The intent of this requirement is to provide a means by which a cryptographic protocol may be used to protect external communications with authorized IT entities that the TOE interacts with to perform its functions. The TOE uses at least one of the listed protocols for communications with the server that collects the audit information.

If other authorized IT entities are protected, the ST author makes the appropriate assignments (for those entities) and selections (for the protocols that are used to protect those connections). The ST author selects the mechanism or mechanisms supported by the TOE, and then ensures that the detailed protocol requirements in Appendix B of NDcPP corresponding to their selection are included in the ST.

TLS and DTLS are defined in the Functional Package for TLS. SSH is defined in the Functional Package for SSH.

5.2 TOE Security Functional Requirements

The following section describes the SFRs that must be satisfied by any TOE that claims conformance to this PP-Module. These SFRs must be claimed regardless of which PP-Configuration is used to define the TOE.

5.2.1 Auditable Events for Mandatory SFRs

Table 2: Auditable Events for Mandatory Requirements
RequirementAuditable EventsAdditional Audit Record Contents
FAU_ARP.1
Actions taken due to potential security violationsNone.
FAU_ARP_EXT.1
No events specifiedN/A
FAU_GEN.1/WIDS
Any authentication eventFailed login attempts, successful login attempts, administrator logins, changes to the WIDS native authentication system (creation of an account, deletion of an account, modification of user accounts, changes to groups or group membership, attempts for privilege escalation) This appears to be a list of events that should be logged and not "additional audit record contents". If this is the case, these should be defined as separate auditable events. If not, suggest making it more clear as to how each of these details relate to the overarching "authentication event", e.x. for the first three, "Type of authentication attempt and its result (i.e., administrator vs user, success or failure)".
FAU_IDS_EXT.1
No events specifiedN/A
FAU_INV_EXT.1
Presence of allowlisted device
FAU_INV_EXT.2
No events specifiedN/A
FAU_INV_EXT.3
Location of AP or EUD
  • MAC address
  • Device type
  • Classification of device
  • Sensor(s) that detected device
  • Signal strength as received by detecting sensor(s)
  • Proximity to detecting sensor(s)
FAU_MAC_EXT.1
No events specifiedN/A
FAU_RPT_EXT.1
No events specifiedN/A
FAU_SAA.1
No events specifiedN/A
FAU_WID_EXT.1
Detection of rogue AP or EUDNone.
Detection of unauthorized SSIDNone.
FAU_WID_EXT.2
Sensor wireless transmission capabilitiesWireless transmission capabilities are turned on.
FDP_IFC.1
No events specifiedN/A
FMT_SMF.1/WIDS
No events specifiedN/A

5.2.2 Security Audit (FAU)

FAU_ARP.1 Security Alarms

The TSF shall [display an alert to Authorized Administrator in sufficient detail to include identity of APs and EUDs involved, signal strength, accurate event timestamp, description of alert and severity level and [selection: capture raw frame traffic that triggered the violation, no other actions]] upon detection of a potential security violation.
Application Note:

If "capture raw frame traffic that triggers the violation" is selected then FAU_STG.1/PCAP and FAU_STG.5/PCAP must be included in the ST.

FAU_SAA.1 defines the rules for monitoring the wireless traffic to detect for potential security violations. FAU_INV_EXT.2 defines the information the TOE needs to collect for all APs and EUDs within range of the TOE's sensors. Device attributes can then be individually filtered and/or selected in order to be displayed as part of the alert.

FAU_ARP_EXT.1 Security Alarm Filtering

The TSF shall provide the ability to apply [assignment: methods of selection] to selectively exclude alerts from being generated.

FAU_GEN.1/WIDS Audit Data Generation (WIDS)

The TSF shall be able to generate audit data of the following auditable events:
  1. Start-up and shutdown of the audit functions;
  2. All auditable events for the [not specified] level of audit;
  3. [Auditable events listed in the Auditable Events for Mandatory SFRs table (Table 2);
  4. Failure of wireless sensor communication;
  5. [selection:
    • Auditable events listed in the Auditable Events for Optional SFRs table (Table 7) for SFRs that are present in the ST
    • Auditable events listed in the Auditable Events for Objective SFRs table (Table 8) for SFRs that are present in the ST
    • no other events
    ]
].
Application Note:

The auditable events defined in Table 2 are for the SFRs that are explicitly defined in this PP-Module and are intended to extend FAU_GEN.1 in the Base-PP. The events in the Auditable Events table should be combined with those of the NDcPP in the context of a conforming Security Target.

If the ST includes any optional or objective SFRs, the selection for the respective "Auditable events listed in the Auditable Events..." must be included. If no optional or objective SFRs are included in the ST, "no other events" should be selected. The auditing of the specific optional and objective SFRs is only required if that SFR is included in the ST.

Per FAU_STG_EXT.1 in the Base-PP, the TOE must support transfer of the audit data to an external IT entity using a trusted channel.

The TSF shall record within the audit data at least the following information:
  1. Date and time of the auditable event, type of event, subject identity (if applicable), and the outcome (success or failure) of the event;
  2. For each auditable event type, based on the auditable event definitions of the functional components included in the PP, PP-Module, functional package or ST, [ information specified in column three of the Auditable Events table in which the auditable event was defined].
Application Note: The subject identity in this case is the allowlisted inventory item.

FAU_IDS_EXT.1 Intrusion Detection System - Intrusion Detection Methods

The TSF shall detect intrusions using [selection: anomaly-based, signature-based, [assignment: other detection method]] methods.
Application Note:

At least one detection method must be selected. If multiple detection methods are supported, each supported method must be selected.

If anomaly-based detection is selected, then FAU_ANO_EXT.1 shall be included in the ST. If signature-based detection is selected, then FAU_SIG_EXT.1 shall be included in the ST.

FAU_INV_EXT.1 Environmental Inventory

The TSF shall determine if a given AP is authorized based on [selection: MAC addresses, [assignment: other unique device identifier]]
The TSF shall determine if a given EUD is authorized based on [selection: MAC addresses, [assignment: other unique device identifier]]
The TSF shall detect the presence of non-allowlisted EUDs and APs in the Operational Environment.
Application Note:

This inventory is used as an allowlist to indicate to the WIDS which APs and EUDs are authorized members of the wireless network. The inventory of authorized APs and EUDs is configured by FMT_SMF.1/WIDS.

The terminology used to describe an inventoried or allowlisted device may vary by vendor product. This PP-Module utilizes allowlisted to describe APs and EUDs that are part of the inventory and non-allowlisted to describe APs and EUDs that are not part of the inventory.

FAU_INV_EXT.2 Characteristics of Environmental Objects

The TSF shall detect the
  • Current RF band
  • Current channel
  • MAC Address
  • Received signal strength
  • Device detection timestamps
  • Classification of APs and EUDs
  • [selection: [assignment: other details], no other details]
of all APs and EUDs within range of the TOE's wireless sensors.
The TSF shall detect the following additional details for all APs within range of the TOE's wireless sensors:
  • encryption
  • number of connected EUDs.
  • Received frames/packets
  • Beacon rate
  • SSID of AP (if not hidden).
Application Note: For detection of encryption type, the TSF should be able to differentiate between the different WLAN encryption methods and when no encryption is in use.
The TSF shall detect the following additional details for all EUDs within range of the TOE's wireless sensors:

FAU_INV_EXT.3 Location of Environmental Objects

The TSF shall detect the physical location of rogue APs and EUDs, and [selection: allow-listed APs, allow-listed EUDs, neighboring APs and EUDs, no other devices] to within [assignment: value equal or less than 25 feet].
The TSF shall detect received signal strength and [selection: RF power levels above a predetermined threshold, no other characteristics] of hardware operating within range of the TOE’s wireless sensors.

FAU_MAC_EXT.1 Device Impersonation

The TSF shall detect when two sensors in non-overlapping locations receive traffic from the same MAC address simultaneously.
Application Note: The intent of this SFR is to detect MAC spoofing where an attacker is able to cause the allowlisted EUD to disconnect and promptly connects a non-allowlisted device using the MAC address of the allowlisted EUD.
The TSF shall detect when two sensors in non-overlapping locations receive traffic from the MAC addresses of non-allowlisted EUDs within an Authorized administrator-configurable timeframe based on distance between sensors.
Application Note: The intent of this SFR is to allow the administrator to determine the time that should be allowed between an allowlisted EUD connecting in two distant locations.

FAU_RPT_EXT.1 Intrusion Detection System - Reporting Methods

The TSF shall provide [selection:
  • Syslog using [selection: defined API, Syslog, [assignment: other detection method]]
  • SNMP trap reporting using [selection: defined API, Simple Network Management Protocol (SNMP), [assignment: other detection method]]
] for reporting of collected data.
Application Note: Syslog and/or SNMP trap reporting can be used. At least one reporting method must be selected.
The TSF shall provide the ability to import data, such as an allowlist of APs and EUDs, and WIDS/WIPS configuration files from the system using [selection: custom API, Syslog, common log format, comma separated values (CSV), [assignment: vendor detection method]].
Application Note: The system must provide the ability to interact with an extensible interface to a third party wireless monitoring system for the purposes of importing data from the wireless system.

FAU_SAA.1 Potential Violation Analysis

The TSF shall be able to apply a set of rules in monitoring the wireless traffic and based upon these rules indicate a potential malicious action.
The TSF shall enforce the following rules for monitoring wireless traffic:
  1. Accumulation or combination of [selection: [assignment: subset of defined auditable events], no defined auditable events] known to indicate a potential security violation];
  2. [Detection of non-allowlisted AP,
  3. Detection of non-allowlisted EUD,
  4. Detection of authorized EUD establishing peer-to-peer (P2P) connection with any other EUD,
  5. Detection of a single EUD, or multiple EUDs, bridging two network interfaces,
  6. Detection of unauthorized point-to-point wireless bridges by allowlisted APs,
  7. Alert generated by violation of user defined signature,
  8. Detection of ICS connection,
  9. Detection of MAC spoofing,
  10. Detection of unauthorized AP broadcasting authorized SSIDs,
  11. Detection of authorized AP broadcasting an unauthorized SSID,
  12. Detection of allowlisted EUD connected to unauthorized SSID,
  13. Detection of NULL SSID associations,
  14. Detection of active probing,
  15. Detection of packet flooding/DoS/DDoS,
  16. Detection of RF-based denial of service,
  17. Detection of deauthentication flooding,
  18. Detection of disassociation flooding,
  19. Detection of request-to-send/clear-to-send abuse,
  20. Detection of unauthorized authentication scheme use,
  21. Detection of unauthorized encryption scheme use,
  22. Detection of unencrypted traffic,
  23. Detection of allowlisted EUD or AP that is using weak/outdated WLAN protocols and protocol implementations,
  24. Detection of extremely high numbers of client devices using a particular allowlisted AP,
  25. Detection of a high number of failed attempts to join the WLAN in a short period of time,
  26. Detection of the use of active WLAN scanners (e.g. wardriving tools) to generate WLAN traffic, such as Probes, Auths, and Assoc frames,
  27. Detection of the physical location of an identified WLAN threat by using triangulation,
  28. Detection of an SSID using weak/unsupported/disallowed encryption options,
  29. Detection of AP SSID larger than 32 bytes,
  30. [assignment: any other rules].
]
Application Note:

These rules are used to detect a potential security violation. A malicious actor who has gained unauthorized access to the TSF possesses the ability to alter its configuration and overall security posture. Maintenance of the rules by adding, modifying or deletion of rules from the set of rules is handled by FMT_SMF.1/WIDS.

There is no expectation that the TOE classify or categorize audit records related to TSF configuration changes as malicious activity. If a potential security violation is detected the alert generated for the Administrator is handled by FAU_ARP.1.

FAU_WID_EXT.1 Wireless Intrusion Detection - Malicious Environmental Objects

The TSF shall distinguish between benign and malicious APs and EUDs based on if the APs and EUDs are authorized and [selection: automatic detection metrics, no other method].
Application Note: FAU_INV_EXT.1 defines that an AP or EUD is authorized based on if the AP/EUD is allowlisted as configured in FMT_SMF.1. A non-allowlisted device does not always have to be conducting malicious activity. However, it is acceptable to equate an allowlisted AP/EUD as both authorized/benign and a non-allowlisted AP/EUD as both not authorized and thus malicious. If the TOE supports automatic malicious device detection, based on in-depth network traffic analysis, "automatic detection metrics" must be selected. This can be used to further distinguish if the AP/EUD is benign or malicious. If the TOE does not support automatic detection metrics, "no other method" must be selected.
The TSF shall provide the ability to determine if a given SSID is authorized.
Application Note: FMT_SMF.1/WIDS defines the subset of authorized SSID(s).

FAU_WID_EXT.2 Wireless Intrusion Detection - Passive Information Flow Monitoring

The TSF shall [selection: simultaneously, nonsimultaneously] monitor and analyze network traffic matching the 802.11 monitoring SFP for all channels in the following RF frequencies: [
  • 2.4 GHz
  • 5.0 GHz
and [selection:
  • 6.0 GHz
  • [assignment: specified Wi-Fi channels] in the 4.9 GHz regulatory domain
  • channels outside regulatory domain
  • non-standard channel frequencies
  • no other domains
]
].
Application Note:

If nonsimultaneously is selected, then Define the amount of time sensor monitors a specific channel must be selected in FMT_SMF.1/WIDS.

The "802.11 monitoring SFP" is a security function policy and the SFRs that reference this policy describe what the policy does. The "802.11 monitoring SFP" is established in FDP_IFC.1 and defined through FAU_WID_EXT.1, FAU_WID_EXT.2, in addition to optional SFRs FAU_WID_EXT.3/RF and FAU_WID_EXT.4. A vendor does not have to formally define this policy, it only needs to comply with the SFRs.

The TSF shall provide wireless sensors to detect network traffic matching the 802.11 monitoring SFP that [selection: can be configured to prevent transmission of data, does not transmit data].
Application Note:

If "can be configured to prevent transmission of data" is selected then "Enable/Disable transmission of data by wireless sensor" must be selected in FMT_SMF.1/WIDS.

The intent of this SFR is to employ WIDS sensors that can have all wireless transmission capabilities disabled for instances where a site wishes to implement a no wireless policy.

The "802.11 monitoring SFP" is a security function policy and the SFRs that reference this policy describe what the policy does. The "802.11 monitoring SFP" is established in FDP_IFC.1 and defined through FAU_WID_EXT.1, FAU_WID_EXT.2, in addition to optional SFRs FAU_WID_EXT.3/RF and FAU_WID_EXT.4. A vendor does not have to formally define this policy, it only needs to comply with the SFRs.

The TSF shall perform stateful frame inspection and log attacks spanning multiple frames.
Application Note: Attackers possess the capability to distribute an attack across multiple frames in an attempt to avoid traditional detection measures that solely focus on packet headers. Stateful frame inspection will allow for the identification of obfuscation techniques centered around spreading an attack across multiple frames.

5.2.3 User Data Protection (FDP)

FDP_IFC.1 Subset Information Flow Control

The TSF shall enforce the [802.11 monitoring SFP] on [all IEEE 802.11 a, b, g, n, ac frame types and subtypes between:
  • authorized APs and authorized EUDs
  • authorized APs and unauthorized EUDs
  • unauthorized APs and authorized EUDs].
Application Note:

"Authorized" EUDs/APs are those that are assigned to the allowlist as defined by FMT_SMF.1/WIDS.

The "802.11 monitoring SFP" is a security function policy and the SFRs that reference this policy describe what the policy does. The "802.11 monitoring SFP" is established in FDP_IFC.1 and defined through FAU_WID_EXT.1, FAU_WID_EXT.2, in addition to optional SFRs FAU_WID_EXT.3/RF and FAU_WID_EXT.4. A vendor does not have to formally define this policy, it only needs to comply with the SFRs.

5.2.4 Security Management (FMT)

FMT_SMF.1/WIDS Specification of Management Functions (WIDS)

The TSF shall be capable of performing the following management functions for WIDS functionality: [
  • Define an inventory of authorized APs based on [selection: MAC addresses, [assignment: other unique device identifier]],
  • Define an inventory of authorized EUDs based on MAC addresses,
  • Define rules for monitoring and alerting on the wireless traffic,
  • Define authorized SSID(s),
  • Define authorized WLAN authentication schemes,
  • Define authorized WLAN encryption schemes,
  • [selection:
    • Specify periods of network activity that constitute baseline of expected behavior
    • Define anomaly activity
    • Define classification rules to detect rogue APs
    • [selection: enable, disable] transmission of data by wireless sensor
    • Define attack signatures
    • Define rules for overwriting previous packet captures
    • Define the amount of time sensor monitors a specific frequency
    • Define the amount of time sensor monitors a specific channel
    • Define authorized and unauthorized TCP/IP and UDP traffic
    • Define known malicious activity ports
    • No other capabilities
    ]
].
Application Note:

Define authorized WLAN authentication and encryption schemes does not enforce, but rather establishes a baseline to determine if an unauthorized scheme is used.

If FAU_ANO_EXT.1 is included in the ST, "Specification of periods of network activity that constitute baseline of expected behavior" must be selected. If FAU_ANO_EXT.1 is included in the ST and "manual configuration by administrators" is selected in FAU_ANO_EXT.1, then "Definition of anomaly activity" must be selected.

If "can be configured to prevent transmission of data" is selected in FAU_WID_EXT.2 then "Enable/Disable transmission of data by wireless sensor" must be selected.

It is expected that an Authorized Administrator will be responsible for configuring the AP to operate on a specific frequency pursuant to the 802.11 standard. The TSF will have the ability to adjust the amount of time it passively monitors and captures WLAN traffic on a given frequency and channel.

5.3 TOE Security Functional Requirements Rationale

The following rationale provides justification for each SFR for the TOE, showing that the SFRs are suitable to address the specified threats:

Table 3: SFR Rationale
ThreatAddressed byRationale
T.UNAUTHORIZED_​DISCLOSURE_​OF_​INFORMATION
FAU_ARP.1Mitigates the threat by generating alerts for potential violations of security policy.
FAU_ARP_EXT.1Mitigates the threat by allowing for nuisance or undesirable alarms from generation, preventing alarm fatigue.
FAU_GEN.1/WIDSMitigates the threat by generating audit data related to operation, including abnormal conditions and potential threat detections.
FAU_GEN_EXT.1 (from Base-PP)Mitigates the threat by generating audit data on each component of the TOE.
FAU_IDS_EXT.1Mitigates the threat by detecting intrusions or potential intrusions.
FAU_INV_EXT.1Mitigates the threat by defining an allowlist of authorized equipment for use in the network.
FAU_INV_EXT.2Mitigates the threat by detecting all wireless devices present in the vicinity.
FAU_INV_EXT.3Mitigates the threat by determining the physical location of wireless devices in the vicinity.
FAU_MAC_EXT.1Mitigates the threat by detecting when a device is attempting to spoof a trusted device's MAC address.
FAU_RPT_EXT.1Mitigates the threat by transmitting audit data to a central location.
FAU_SAA.1Mitigates the threat by defining rules that indicate a potential malicious action.
FAU_STG_EXT.1 (from Base-PP)Mitigates the threat by storing audit data in specified locations and optionally forwarding this data to a central point. Note that any FAU_STG_EXT.1 references will likely need to change before publication because the unpublished CC:2022 version of NDcPP is expected to convert this to FAU_STG.1. It has been included throughout this module as if that will not change because that is the only reference that currently exists to be used.
FAU_WID_EXT.1Mitigates the threat by classifying wireless devices as benign or malicious based on device metrics.
FAU_WID_EXT.2Mitigates the threat by monitoring 802.11 wireless traffic in the vicinity.
FCO_CPC_EXT.1 (from Base-PP)Mitigates the threat by securely registering components to the TOE.
FDP_IFC.1Mitigates the threat by enforcing monitoring on all wireless 802.11 traffic that involves an authorized device as at least one party.
FMT_SMF.1/WIDSMitigates the threat by allowing configuration of rules, configuration, and other TOE operational settings.
FPT_FLS.1/WIDS (objective)Mitigates the threat by at minimum generating an audit record when potential security failures of the TSF are detected, which could include failures to properly monitor or alert to potential threats.
FTP_ITC.1 (from Base-PP)Mitigates the threat by securely transmitting data from the TOE to other trusted entities.
FPT_ITT.1 (from Base-PP)Mitigates the threat by securely transmitting data between TOE components.
FAU_WID_EXT.3/BT (optional)Mitigates the threat by monitoring Bluetooth wireless traffic in the vicinity for potential violations of policy.
FAU_WID_EXT.3/CELL (optional)Mitigates the threat by monitoring cellular wireless traffic in the vicinity for potential violations of policy.
FAU_WID_EXT.3/RF (optional)Mitigates the threat by monitoring non-802.11 wireless traffic in the vicinity for potential violations of policy.
FAU_WID_EXT.4 (optional)Mitigates the threat by using a dedicated sensor for analysis of wireless traffic.
FAU_INV_EXT.4 (objective)Mitigates the threat by detecting non-authorized wireless equipment being attached to an internal wired network.
FAU_INV_EXT.5 (objective)Mitigates the threat by including a signal library.
FAU_WIP_EXT.1 (objective)Mitigates the threat by isolating confirmed threats to the internal network, either wired (unauthorized AP) or wireless.
FAU_ANO_EXT.1 (selection-based)Mitigates the threat by defining thresholds of baseline and anomalous traffic for analysis and action.
FAU_SIG_EXT.1 (selection-based)Mitigates the threat by defining signatures for an attack.
FAU_STG.1/PCAP (selection-based)Mitigates the threat by storing packet captures generated by the TOE, and optionally forwarding this data to a central point.
FAU_STG.5/PCAP (selection-based)Mitigates the threat by defining how storage of packet capture data is prioritized in the case of limited storage space.
T.UNAUTHORIZED_​ACCESS
FAU_IDS_EXT.1Mitigates the threat by detecting intrusions or potential intrusions.
FAU_INV_EXT.1Mitigates the threat by defining an allowlist of authorized equipment for use in the network.
FAU_INV_EXT.2Mitigates the threat by detecting all wireless devices present in the vicinity, to use against the allowlist for detection of potentially unauthorized access points or end-user devices.
FAU_INV_EXT.3Mitigates the threat by determining the physical location of wireless devices in the vicinity, to allow for locating any potentially rogue devices.
FAU_MAC_EXT.1Mitigates the threat by detecting when a device is attempting to spoof a trusted device's MAC address.
FAU_SAA.1Mitigates the threat by defining rules that indicate a potential malicious action.
FAU_WID_EXT.1Mitigates the threat by classifying wireless devices as benign or malicious based on device metrics.
FAU_WID_EXT.2Mitigates the threat by monitoring 802.11 wireless traffic in the vicinity for comparison against defined policies.
FDP_IFC.1Mitigates the threat by enforcing monitoring on all wireless 802.11 traffic that involves an authorized device as at least one party.
FMT_SMF.1/WIDSMitigates the threat by allowing configuration of rules, configuration, and other TOE operational settings.
FAU_WID_EXT.3/RF (optional)Mitigates the threat by monitoring non-802.11 wireless traffic in the vicinity for potential violations of policy.
FAU_WID_EXT.3/BT (optional)Mitigates the threat by monitoring Bluetooth wireless traffic in the vicinity for potential violations of policy.
FAU_WID_EXT.3/CELL (optional)Mitigates the threat by monitoring cellular wireless traffic in the vicinity for potential violations of policy.
FAU_WID_EXT.4 (optional)Mitigates the threat by using a dedicated sensor for analysis of wireless traffic.
FAU_INV_EXT.4 (objective)Mitigates the threat by detecting non-authorized wireless equipment being attached to an internal wired network.
FAU_INV_EXT.5 (objective)Mitigates the threat by including a signal library.
FAU_WIP_EXT.1 (objective)Mitigates the threat by isolating confirmed threats to the internal network, either wired (unauthorized AP) or wireless.
FAU_ANO_EXT.1 (selection-based)Mitigates the threat by defining thresholds of baseline and anomalous traffic for analysis and action.
FAU_SIG_EXT.1 (selection-based)Mitigates the threat by defining signatures for an attack.
T.DISRUPTION
FAU_IDS_EXT.1Mitigates the threat by detecting intrusions or potential intrusions.
FAU_INV_EXT.1Mitigates the threat by defining an allowlist of authorized equipment for use in the network.
FAU_INV_EXT.2Mitigates the threat by detecting all wireless devices present in the vicinity, to use against the allowlist for detection of potentially unauthorized access points or end-user devices.
FAU_INV_EXT.3Mitigates the threat by determining the physical location of wireless devices in the vicinity, to allow for locating any potentially rogue devices.
FAU_MAC_EXT.1Mitigates the threat by detecting when a device is attempting to spoof a trusted device's MAC address.
FAU_SAA.1Mitigates the threat by defining rules that indicate a potential malicious action, including signs of a DoS attack.
FAU_WID_EXT.1Mitigates the threat by classifying wireless devices as benign or malicious based on device metrics, including throughput (which may indicate a DoS threat).
FAU_WID_EXT.2Mitigates the threat by monitoring 802.11 wireless traffic in the vicinity for comparison against defined policies.
FAU_WIP_EXT.1Mitigates the threat by isolating confirmed threats to the internal network, either wired (unauthorized AP) or wireless.
FDP_IFC.1Mitigates the threat by enforcing monitoring on all wireless 802.11 traffic types that involve an authorized device as at least one party.
FMT_SMF.1/WIDSMitigates the threat by allowing configuration of rules, configuration, and other TOE operational settings.
FAU_WID_EXT.3/BT (optional)Mitigates the threat by monitoring Bluetooth wireless traffic in the vicinity for potential violations of policy.
FAU_WID_EXT.3/CELL (optional)Mitigates the threat by monitoring cellular wireless traffic in the vicinity for potential violations of policy.
FAU_WID_EXT.3/RF (optional)Mitigates the threat by monitoring non-802.11 wireless traffic in the vicinity for potential violations of policy.
FAU_WID_EXT.4 (optional)Mitigates the threat by using a dedicated sensor for analysis of wireless traffic.
FAU_INV_EXT.4 (objective)Mitigates the threat by detecting non-authorized wireless equipment being attached to an internal wired network.
FAU_INV_EXT.5 (objective)Mitigates the threat by including a signal library.
FAU_ANO_EXT.1 (selection-based)Mitigates the threat by defining thresholds of baseline and anomalous traffic for analysis and action.
FAU_SIG_EXT.1 (selection-based)Mitigates the threat by defining signatures for an attack.

6 Consistency Rationale

6.1 Collaborative Protection Profile for Network Device

6.1.1 Consistency of TOE Type

When this PP-Module extends the Network Device cPP, the TOE type for the overall TOE is still WIDS/WIPS products.

6.1.2 Consistency of Security Problem Definition

Table 4: Consistency of Security Problem Definition (NDcPP base)
PP-Module Threat, Assumption, OSPConsistency Rationale
T.UNAUTHORIZED_DISCLOSURE_OF_INFORMATIONThis threat is similar to the T.UNDETECTED_ACTIVITY threat in the Base-PP but it applies to the attacker performing malicious actions on the network monitored by the TOE rather than against the TOE itself.
T.UNAUTHORIZED_ACCESSThis threat is similar to the T.UNAUTHORIZED_ADMINISTRATOR_ACCESS threat in the Base-PP but it applies to the attacker gaining unauthorized access to an asset on the network monitored by the TOE rather than against the TOE itself.
T.DISRUPTIONThis threat is for a denial-of-service attack against an asset on the network monitored by the TOE. The Base-PP does not define any threats for availability but there is no consistency issue here because the threat applies to an interface that does not exist in the Base-PP.
A.CONNECTIONSThis assumption defines the TOE’s placement in a network such that it is able to perform its required security functionality. The Base-PP does not define any assumptions about the TOE’s architectural deployment so there is no conflict here.
A.PROPER_ADMINThis assumption is comparable to the A.TRUSTED_ADMINISTRATOR assumption from the Base-PP, applied to the specific administrative functions defined in this PP-Module.
P.ANALYZEThis organizational security policy expects the data produced by the TSF about the behavior of external entities to be used in an organization’s analytical process. There is no conflict with the Base-PP because the Base-PP does not define any functionality for the TOE to produce data about any entities other than itself.

6.1.3 Consistency of OE Objectives

Table 5: Consistency of OE Objectives (NDcPP base)
PP-Module OE ObjectiveConsistency Rationale
OE.CONNECTIONSThis objective expects the TOE to be placed in a network such that it is able to perform its required security functionality. The Base-PP does not define any objectives about the TOE’s architectural deployment so there is no conflict here.
OE.PROPER_ADMINThis objective is comparable to the OE.TRUSTED_ADMIN objective from the Base-PP, applied to the specific administrative functions defined in this PP-Module.

6.1.4 Consistency of Requirements

This PP-Module identifies several SFRs from the NDcPP that are needed to support Wireless Intrusion Detection/Prevention System functionality. This is considered to be consistent because the functionality provided by the NDcPP is being used for its intended purpose. The rationale for why this does not conflict with the claims defined by the NDcPP are as follows:
Table 6: Consistency of Requirements (NDcPP base)
PP-Module RequirementConsistency Rationale
Modified SFRs
FAU_GEN_EXT.1This PP-Module mandates the inclusion of this selection-based SFR because a TOE that conforms to this PP-Module will always be deployed in a configuration that requires this SFR to be claimed.
FAU_STG_EXT.1This PP-Module modifies the Base-PP SFR to remove a selection that is not permitted by the TOE architecture that it specifies.
FCO_CPC_EXT.1This PP-Module mandates the inclusion of this optional SFR because it is required to implement functionality required by this PP-Module.
FPT_ITT.1This PP-Module mandates the inclusion of this optional SFR because it is required to implement functionality required by this PP-Module.
FTP_ITC.1This PP-Module refines the Base-PP SFR to add a selection for a specific external entity that may be applicable to a TOE that conforms to this PP-Module.
Additional SFRs
This PP-Module does not add any requirements when the NDcPP is the base.
Mandatory SFRs
FAU_ARP.1This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_ARP_EXT.1This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_GEN.1/WIDSThis SFR iterates the FAU_GEN.1 SFR defined in the Base-PP to define auditable events for the functionality that is specific to this PP-Module.
FAU_IDS_EXT.1This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_INV_EXT.1This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_INV_EXT.2This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_INV_EXT.3This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_MAC_EXT.1This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_RPT_EXT.1This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_SAA.1This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_WID_EXT.1This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_WID_EXT.2This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FDP_IFC.1This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FMT_SMF.1/WIDSThis SFR iterates the FMT_SMF.1 SFR defined in the Base-PP to define management functions for the functionality that is specific to this PP-Module.
Optional SFRs
FAU_WID_EXT.3/BTThis SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_WID_EXT.3/CELLThis SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_WID_EXT.3/RFThis SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_WID_EXT.4This SFR defines an optional capability for a distributed component to be dedicated to one particular function. This function (wireless spectrum analysis) is defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
Objective SFRs
FAU_INV_EXT.4This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_INV_EXT.5This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_WIP_EXT.1This SFR defines WIPS behavior in response to detection of potential malicious activity in the TOE’s operational environment. This extends the logical scope of the TOE beyond what the Base-PP defines.
FPT_FLS.1/WIDSThis SFR defines preservation of a secure state in the event that a failure condition is detected. The Base-PP does not define an SFR for this behavior but this SFR mitigates the T.SECURITY_FUNCTIONALITY_FAILURE threat defined in the Base-PP, so it is clear that this behavior is consistent with the security expectations of the Base-PP.
Implementation-dependent SFRs
This PP-Module does not define any Implementation-dependent requirements.
Selection-based SFRs
FAU_ANO_EXT.1This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_SIG_EXT.1This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines.
FAU_STG.1/PCAPThis SFR iterates the FAU_STG.1 SFR defined in CC Part 2 for storage of audit data and applies it to storage of packet captures.
FAU_STG.5/PCAPThis SFR iterates the FAU_STG.5 SFR defined in CC Part 2 for storage of audit data and applies it to storage of packet captures.

Appendix A - Optional SFRs

A.1 Strictly Optional Requirements

A.1.1 Auditable Events for Optional SFRs

Table 7: Auditable Events for Strictly Optional Requirements
RequirementAuditable EventsAdditional Audit Record Contents
FAU_WID_EXT.3/BT
Detection of Bluetooth devices (for each selection made that includes an action of "log")Information contained within each selection that contains a requirement to log information. It is unclear what information needs to be logged to constitute the logging of a particular Bluetooth device. This applies to selections that include logging the presence of a Bluetooth device, as well as selections that include logging a device that carries out a particular action, such as performing a particular procedure.
FAU_WID_EXT.3/CELL
Detection of cellular devices (for each selection made that includes an action of "log")
  • Unique device identifier
  • Information contained within each selection that contains a requirement to log information. It is unclear what information needs to be logged to constitute logging the "presence" of a cellular device.
FAU_WID_EXT.3/RF
Detection of network devices operating in selected RF bands
  • Frequency band
  • Channel used within frequency band
  • Identification information (MAC address if applicable or other similar unique ID)
  • Device technology (i.e. cellular)
  • Sensor(s) that detected devices
FAU_WID_EXT.4
No events specifiedN/A

A.1.2 Security Audit (FAU)

FAU_WID_EXT.3/BT Wireless Intrusion Detection - Spectrum Monitoring (Bluetooth)

The TSF shall detect the presence of devices [that operate a specified protocol and take a specified action: [selection:
  • Detect and log the presence of 2.4 GHz Bluetooth BR/EDR devices operating within a controlled space
  • Detect and log the presence of Bluetooth Low Energy (BLE) devices operating within a controlled space
  • Detect and log the Bluetooth BR/EDR devices LAP and half the Bluetooth MAC address within a controlled space
  • Detect and log the BLE device's Bluetooth MAC address within a controlled space
  • Geo-locate Bluetooth BR/EDR devices within 25 feet of their actual location
  • Geo-locate BLE devices within 25 feet of their actual location
  • Detect and log Bluetooth BR/EDR devices conducting the Inquiry Procedure within a controlled space
  • Detect and log Bluetooth BR/EDR devices responding to the Inquiry Procedure within the controlled space
  • Capture and log any device information transmitted during the Bluetooth BR/EDR Inquiry Procedure when occurring within a controlled space
  • Detect and log BLE devices advertisements on the Advertisement channels
  • Detect and log BLE devices exchanging information or data on the Advertisement channels
  • Detect and log Bluetooth BR/EDR devices using the SDP procedure
  • Capture and log any device information exchanged during the Bluetooth BR/EDR SDP procedure
  • Detect and log any Bluetooth BR/EDR devices performing the Paging Procedure
  • Detect and log any BLE device performing the Paging Procedure
  • Detect and log the piconet membership of any Bluetooth BR/EDR device. This includes role in the piconet (Central or Peripheral), piconet ID, device ID, and number of piconets which they are members of
  • Detect and log the piconet membership of any Low Energy (LE) device. This includes role in the piconet (Central or Peripheral), piconet ID, device ID, and number of piconets which they are members of
  • Use Bluetooth BR/EDR Inquiry Procedure to detect Bluetooth BR/EDR devices in discoverable mode within a controlled area
  • Use Bluetooth BR/EDR SDP procedure to gather information about Bluetooth BR/EDR devices within a controlled area
  • Use BLE SDP procedure to gather information about BLE devices within a controlled area
]
].
Application Note: This SFR refers to Bluetooth and Bluetooth Low-Energy (BLE) (IEEE 802.15) network devices that operate in the specified frequencies. There is an understanding that this capability requires a TOE to use specialized, licensed radio systems. This SFR will allow for the introduction of an open API, set of defined interoperability standards, or other proprietary solution(s), to allow for third-party integration.

FAU_WID_EXT.3/CELL Wireless Intrusion Detection - Spectrum Monitoring (Cellular)

The TSF shall detect the presence of devices [that operate a specified protocol and take a specified action: [selection:
  • Detect and log the presence of cellular 3G devices operating within a controlled space
  • Detect and log the presence of cellular 4G/LTE devices operating within a controlled space
  • Detect and log the presence of cellular 5G low and mid-band devices operating within a controlled space
  • Detect and identify base stations which had clients within the area monitored by the WIDS
  • Capture temporary identifiers (e.g. TMSI) of cellular devices within a controlled space
  • Detect and identify which cellular technology (such as 3G, LTE, UTMS, 5G, etc.) the cellular device is using within a controlled space
  • Detect and identify which cellular carrier a cellular device is using within a controlled space
  • Detect and identify which base station a cellular device is connected to while operating within a controlled space
  • Detect and identify whether a cellular device is using a cellular uplink or downlink operating within a controlled space
  • Geo-locate cellular devices operating within the operation area of the WIDS
]
].
Application Note: This SFR refers to Bluetooth and Bluetooth Low-Energy (BLE) (IEEE 802.15) network devices that operate in the specified frequencies. There is an understanding that this capability requires a TOE to use specialized, licensed radio systems. This SFR will allow for the introduction of an open API, set of defined interoperability standards, or other proprietary solution(s), to allow for third-party integration.

FAU_WID_EXT.3/RF Wireless Intrusion Detection - Spectrum Monitoring (Non-Wireless RF)

The TSF shall detect the presence of devices [that operate in the following RF bands:[selection: 3.6 GHz, 6 GHz, 60 GHz, sub-GHz (0-900 MHz), all cellular bands]].
Application Note: This SFR refers to Non-WLAN (IEEE 802.11 a, b, g, n, y, ac, ad and ay) network devices that operate in the specified frequencies. There is an understanding that this capability requires a TOE to use specialized, licensed radio systems. This SFR will allow for the introduction of an open API, set of defined interoperability standards, or other proprietary solution(s), to allow for third-party integration.

FAU_WID_EXT.4 Wireless Intrusion Detection - Wireless Spectrum Analysis

The TSF shall provide a dedicated sensor for wireless spectrum analysis.

A.2 Objective Requirements

A.2.1 Auditable Events for Objective SFRs

All objective SFRs need a review to determine if they should change status with the new release of this module.
Table 8: Auditable Events for Objective Requirements
RequirementAuditable EventsAdditional Audit Record Contents
FAU_INV_EXT.4
No events specifiedN/A
FAU_INV_EXT.5
No events specifiedN/A
FAU_WIP_EXT.1
Isolation of AP or EUD
  • Description of violation
  • Type of containment used
  • Was containment triggered manually or automatically
  • Sensor performing the containment (if wireless)
  • Details about the device(s) being contained (classification, device type, MAC address)
FPT_FLS.1/WIDS
Information about failure
  • Indication that there was a failure
  • Type of failure
  • Device that failed
  • Sensor connectivity and operating status
  • Time of failure

A.2.2 Security Audit (FAU)

FAU_INV_EXT.4 Detection of Unauthorized Connections

The TSF shall detect when non-allowlisted APs have a wired connection to the internal corporate network.

FAU_INV_EXT.5 Signal Library

The TSF shall include a signal library.
Application Note: The TSF will need to have the ability to import, export, or update the existing signal library.

FAU_WIP_EXT.1 Wireless Intrusion Prevention

The TSF shall allow an Authorized Administrator to isolate a wireless AP or EUD from the network monitored by the TSF using the following methods: [selection: wireless containment, wire-side containment of an unauthorized AP connected to the internal corporate wired network].
Application Note:

It is expected that an Authorized Administrator will be responsible for confirming the AP or EUD as a rogue AP or EUD to initiate wireless containment.

In this SFR the containment of an unauthorized AP connected to the internal corporate wired network refers to an unauthorized AP that is physically connected (via wire) to the protected internal wired infrastructure.

A.2.3 Protection of the TSF (FPT)

FPT_FLS.1/WIDS Basic Internal TSF Data Transfer Protection (WIDS)

The TSF shall preserve a secure state when the following types of failures occur: [sensor functionality failure, potential compromise of the TSF].
Application Note: At minimum, the preservation of a secure state requires the generation of audit records when the defined failure conditions occur.

A.3 Implementation-dependent Requirements

This PP-Module does not define any Implementation-dependent SFRs.

Appendix B - Selection-based Requirements

B.1 Audit Events for Selection-Based SFRs

Table 9: Auditable Events for Selection-based Requirements
RequirementAuditable EventsAdditional Audit Record Contents
FAU_ANO_EXT.1
No events specifiedN/A
FAU_SIG_EXT.1
No events specifiedN/A
FAU_STG.1/PCAP
No events specifiedN/A
FAU_STG.5/PCAP
Configuration of TOE audit storage behavior (if configurable)No additional information

B.2 Security Audit (FAU)

FAU_ANO_EXT.1 Anomaly-Based Intrusion Detection

The inclusion of this selection-based component depends upon selection in FAU_IDS_EXT.1.1.
The TSF shall support the definition of [selection: baselines ('expected and approved'), anomaly ('unexpected') traffic patterns] including the specification of [selection:
  • throughput (data elements (e.g. bytes, packets, etc.) per time period (e.g. minutes, hours, days))
  • time of day
  • frequency
  • thresholds
  • [assignment: other methods]
] and the following network protocol fields:
  • all management and control frame header elements.
The TSF shall support the definition of anomaly activity through [selection: manual configuration by administrators, automated configuration].
Application Note: The "baseline" and "anomaly" can be something manually defined/configured by a TOE administrator (or importing definitions), or something that the TOE is able to automatically define/create by inspecting network traffic over a period of time (a.k.a. "profiling").

FAU_SIG_EXT.1 Signature-Based Intrusion Detection

The inclusion of this selection-based component depends upon selection in FAU_IDS_EXT.1.1.
The TSF shall support user-defined and customizable attack signatures.

FAU_STG.1/PCAP Protected Audit Event Storage (Packet Captures)

The inclusion of this selection-based component depends upon selection in FAU_ARP.1.1.
The TSF shall be able to store generated packet captures on the [[assignment: list of distributed TOE components on which packet capture data is stored] components of the TOE itself, transmit the generated audit data to an external IT entity hosting a protocol analyzer using a trusted channel according to FTP_ITC].
Application Note: This SFR is modified from its definition in CC Part 2 to define storage for packet capture data. Specifically, it is required that this data be stored both on the TOE itself and that it be transmitted securely to an external entity. Since the TOE is distributed, the first item has been refined to require the ST author to identify the specific TOE components on which the data is stored, since not all components will necessarily store them. If capture raw frame traffic that triggered the violation is selected in FAU_ARP.1.1, then this SFR must be included in the ST, and this iteration is for the packet captures generated as a selectable action completed upon detection of a potential security violation in FAU_ARP.1.

FAU_STG.5/PCAP Prevention of Audit Data Loss (Packet Captures)

The inclusion of this selection-based component depends upon selection in FAU_ARP.1.1.
The TSF shall [selection: ignore packet captures, overwrite the oldest stored packet captures, [assignment: other actions to be taken in case of packet capture storage failure and conditions for the actions]] if the packet capture storage is full.
Application Note: This SFR is modified from its definition in CC Part 2 to define storage for packet capture data. If capture raw frame traffic that triggered the violation is selected in FAU_ARP.1.1, then this SFR must be included in the ST, and this iteration is for the packet captures generated as a selectable action completed upon detection of a potential security violation in FAU_ARP.1.

Appendix C - Extended Component Definitions

This appendix contains the definitions for all extended requirements specified in the PP-Module.

C.1 Extended Components Table

All extended components specified in the PP-Module are listed in this table:
Table 10: Extended Component Definitions
Functional ClassFunctional Components
Security Audit (FAU)FAU_ANO_EXT Anomaly-Based Intrusion Detection
FAU_ARP_EXT Security Alarm Filtering
FAU_IDS_EXT Intrusion Detection Methods
FAU_INV_EXT Environmental Inventory
FAU_MAC_EXT Device Impersonation
FAU_RPT_EXT Reporting Methods
FAU_SIG_EXT Signature-Based Intrusion Detection
FAU_WID_EXT Wireless Intrusion Detection
FAU_WIP_EXT Wireless Intrusion Prevention

C.2 Extended Component Definitions

C.2.1 Security Audit (FAU)

This PP-Module defines the following extended components as part of the FAU class originally defined by CC Part 2:

C.2.1.1 FAU_ARP_EXT Security Alarm Filtering

Family Behavior

This family defines requirements for suppression of audit events. It is intended to complement the FAU_ARP family already defined in CC Part 2.

Component Leveling

FAU_ARP_EXT1

FAU_ARP_EXT.1, Security Alarm Filtering, requires the TSF to implement a filtering mechanism to selectively suppress the generation of security alarms.

Management: FAU_ARP_EXT.1

No specific management functions have been identified.

Audit: FAU_ARP_EXT.1

There are no auditable events foreseen.

FAU_ARP_EXT.1 Security Alarm Filtering

Hierarchical to:No other components.
Dependencies to:FAU_ARP.1 Security Alarms

FAU_ARP_EXT.1.1

The TSF shall provide the ability to apply [assignment: methods of selection] to selectively exclude alerts from being generated.

C.2.1.2 FAU_IDS_EXT Intrusion Detection Methods

Family Behavior

This family defines requirements for supported methods of intrusion detection.

Component Leveling

FAU_IDS_EXT1

FAU_IDS_EXT.1, Intrusion Detection System - Intrusion Detection Methods, requires the TSF to specify the methods of intrusion detection that it supports.

Management: FAU_IDS_EXT.1

No specific management functions are identified.

Audit: FAU_IDS_EXT.1

There are no auditable events foreseen.

FAU_IDS_EXT.1 Intrusion Detection System - Intrusion Detection Methods

Hierarchical to:No other components.
Dependencies to:No dependencies.

FAU_IDS_EXT.1.1

The TSF shall detect intrusions using [assignment: detection strategies] methods.

C.2.1.3 FAU_INV_EXT Environmental Inventory

Family Behavior

This family defines requirements for detection and inventorying of network assets in the TOE’s operational environment.

Component Leveling

FAU_INV_EXT12345

FAU_INV_EXT.1, Environmental Inventory, requires the TSF to determine if inventoried objects are authorized or unauthorized.

FAU_INV_EXT.2, Characteristics of Environmental Objects, requires the TSF to discover network assets in its operational environment and maintain an inventory of them based on collected attributes.

FAU_INV_EXT.3, Location of Environmental Objects, requires the TSF to approximate the physical location of network assets in its operational environment based on triangulation of wireless emissions.

FAU_INV_EXT.4, Detection of Unauthorized Connections, requires the TSF to identify if an unauthorized network asset in its inventory is attempting to access a protected network using a wired connection.

FAU_INV_EXT.5, Signal Library, requires the TSF to maintain a signal library.

Management: FAU_INV_EXT.1

The following actions could be considered for the management functions in FMT:

  • Definition of inventory of authorized APs based on MAC address
  • Definition of inventory of authorized EUDs based on MAC address

Audit: FAU_INV_EXT.1

The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:

  • Presence of allowlisted device

FAU_INV_EXT.1 Environmental Inventory

Hierarchical to:No other components.
Dependencies to:

FAU_INV_EXT.2 Characteristics of Environmental Objects

FMT_SMF.1 Specification of Management Functions

FAU_INV_EXT.1.1

The TSF shall determine if a given AP is authorized based on [selection: MAC addresses, [assignment: other unique device identifier]]

FAU_INV_EXT.1.2

The TSF shall determine if a given EUD is authorized based on [selection: MAC addresses, [assignment: other unique device identifier]]

FAU_INV_EXT.1.3

The TSF shall detect the presence of non-allowlisted EUDs and APs in the Operational Environment.

Management: FAU_INV_EXT.2

The following actions could be considered for the management functions in FMT:

  • Definition of classification rules to detect rogue APs

Audit: FAU_INV_EXT.2

There are no auditable events foreseen.

FAU_INV_EXT.2 Characteristics of Environmental Objects

Hierarchical to:No other components.
Dependencies to:No dependencies.

FAU_INV_EXT.2.1

The TSF shall detect the
  • Current RF band
  • Current channel
  • MAC Address
  • Received signal strength
  • Device detection timestamps
  • Classification of APs and EUDs
  • [selection: [assignment: other details], no other details]
of all APs and EUDs within range of the TOE's wireless sensors.

FAU_INV_EXT.2.2

The TSF shall detect the following additional details for all APs within range of the TOE's wireless sensors:
  • encryption
  • number of connected EUDs.
  • Received frames/packets
  • Beacon rate
  • SSID of AP (if not hidden).

FAU_INV_EXT.2.3

The TSF shall detect the following additional details for all EUDs within range of the TOE's wireless sensors:

Management: FAU_INV_EXT.3

No specific management functions are identified.

Audit: FAU_INV_EXT.3

The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:

  • Physical location and identification of AP or EUD

FAU_INV_EXT.3 Location of Environmental Objects

Hierarchical to:No other components.
Dependencies to:FAU_INV_EXT.2 Characteristics of Environmental Objects

FAU_INV_EXT.3.1

The TSF shall detect the physical location of rogue APs and EUDs, and [selection: allow-listed APs, allow-listed EUDs, neighboring APs and EUDs, no other devices] to within [assignment: value equal or less than 25 feet].

FAU_INV_EXT.3.2

The TSF shall detect received signal strength and [selection: RF power levels above a predetermined threshold, no other characteristics] of hardware operating within range of the TOE’s wireless sensors.

Management: FAU_INV_EXT.4

No specific management functions are identified.

Audit: FAU_INV_EXT.4

There are no auditable events foreseen.

FAU_INV_EXT.4 Detection of Unauthorized Connections

Hierarchical to:No other components.
Dependencies to:FAU_INV_EXT.1 Environmental Inventory

FAU_INV_EXT.4.1

The TSF shall detect when non-allowlisted APs have a wired connection to the internal corporate network.

Management: FAU_INV_EXT.5

No specific management functions are identified.

Audit: FAU_INV_EXT.5

There are no auditable events foreseen.

FAU_INV_EXT.5 Signal Library

Hierarchical to:No other components.
Dependencies to:No dependencies.

FAU_INV_EXT.5.1

The TSF shall include a signal library.

C.2.1.4 FAU_MAC_EXT Device Impersonation

Family Behavior

This family defines requirements for detection of potential device impersonation on the basis of MAC address spoofing.

Component Leveling

FAU_MAC_EXT1

FAU_MAC_EXT.1, Device Impersonation, requires the TSF to detect possible MAC address spoofing using various methods.

Management: FAU_MAC_EXT.1

No specific management functions are identified.

Audit: FAU_MAC_EXT.1

There are no auditable events foreseen.

FAU_MAC_EXT.1 Device Impersonation

Hierarchical to:No other components.
Dependencies to:FAU_INV_EXT.2 Characteristics of Environmental Objects

FAU_MAC_EXT.1.1

The TSF shall detect when two sensors in non-overlapping locations receive traffic from the same MAC address simultaneously.

FAU_MAC_EXT.1.2

The TSF shall detect when two sensors in non-overlapping locations receive traffic from the MAC addresses of non-allowlisted EUDs within an Authorized administrator-configurable timeframe based on distance between sensors.

C.2.1.5 FAU_RPT_EXT Reporting Methods

Family Behavior

This family defines requirements for the format of generated reports.

Component Leveling

FAU_RPT_EXT1

FAU_RPT_EXT.1, Intrusion Detection System - Reporting Methods, requires the TSF to implement a specified reporting mechanism for collected data for compatibility with third parties that may consume this data.

Management: FAU_RPT_EXT.1

No specific management functions are identified.

Audit: FAU_RPT_EXT.1

There are no auditable events foreseen.

FAU_RPT_EXT.1 Intrusion Detection System - Reporting Methods

Hierarchical to:No other components.
Dependencies to:No dependencies.

FAU_RPT_EXT.1.1

The TSF shall provide [selection:
  • Syslog using [selection: defined API, Syslog, [assignment: other detection method]]
  • SNMP trap reporting using [selection: defined API, Simple Network Management Protocol (SNMP), [assignment: other detection method]]
] for reporting of collected data.

FAU_RPT_EXT.1.2

The TSF shall provide the ability to import data, such as an allowlist of APs and EUDs, and WIDS/WIPS configuration files from the system using [selection: custom API, Syslog, common log format, comma separated values (CSV), [assignment: vendor detection method]].

C.2.1.6 FAU_WID_EXT Wireless Intrusion Detection

Family Behavior

This family defines requirements for data collection of potentially malicious wireless network activity.

Component Leveling

FAU_WID_EXT1234

FAU_WID_EXT.1, Wireless Intrusion Detection - Malicious Environmental Objects, requires the TSF to implement a mechanism to distinguish between authorized and unauthorized network assets.

FAU_WID_EXT.2, Wireless Intrusion Detection - Passive Information Flow Monitoring, requires the TSF to surveil certain wireless frequency bands and perform stateful inspection of traffic on them.

FAU_WID_EXT.3, Wireless Intrusion Detection - Spectrum Monitoring, requires the TSF to surveil specified radio frequency bands or protocols to detect potential unauthorized devices.

FAU_WID_EXT.4, Wireless Intrusion Detection - Wireless Spectrum Analysis, requires the TSF to implement wireless spectrum analysis in a dedicated physical component.

Management: FAU_WID_EXT.1

The following actions could be considered for the management functions in FMT:

  • Definition of authorized SSID(s)
  • Definition of authorized WLAN authentication schemes
  • Definition of authorized WLAN encryption schemes
  • Definition of authorized WLAN traffic schemes

Audit: FAU_WID_EXT.1

The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:

  • Detection of rogue AP or EUD
  • Detection of unauthorized SSID

FAU_WID_EXT.1 Wireless Intrusion Detection - Malicious Environmental Objects

Hierarchical to:No other components.
Dependencies to:FAU_INV_EXT.1 Environmental Inventory

FAU_WID_EXT.1.1

The TSF shall distinguish between benign and malicious APs and EUDs based on if the APs and EUDs are authorized and [selection: automatic detection metrics, no other method].

FAU_WID_EXT.1.2

The TSF shall provide the ability to determine if a given SSID is authorized.

Management: FAU_WID_EXT.2

The following actions could be considered for the management functions in FMT:

  • Definition of authorized and unauthorized TCP/IP and UDP traffic
  • Definition of known malicious activity ports
  • Definition of the amount of time that a sensor monitors a specific frequency or channel

Audit: FAU_WID_EXT.2

The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:

  • Sensor wireless transmission capabilities

FAU_WID_EXT.2 Wireless Intrusion Detection - Passive Information Flow Monitoring

Hierarchical to:No other components.
Dependencies to:No dependencies.

FAU_WID_EXT.2.1

The TSF shall [selection: simultaneously, nonsimultaneously] monitor and analyze network traffic matching the 802.11 monitoring SFP for all channels in the following RF frequencies: [assignment: a list of frequency ranges].

FAU_WID_EXT.2.2

The TSF shall provide wireless sensors to detect network traffic matching the 802.11 monitoring SFP that [selection: can be configured to prevent transmission of data, does not transmit data].

FAU_WID_EXT.2.3

The TSF shall perform stateful frame inspection and log attacks spanning multiple frames.

Management: FAU_WID_EXT.3

No specific management functions are identified.

Audit: FAU_WID_EXT.3

The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:

  • Detection of network devices operating in selected RF bands and/or protocols

FAU_WID_EXT.3 Wireless Intrusion Detection - Spectrum Monitoring

Hierarchical to:No other components.
Dependencies to:No dependencies.

FAU_WID_EXT.3.1

The TSF shall detect the presence of devices [selection:
  • that operate in the following RF bands: [assignment: RF bands]
  • that operate a specified protocol and take a specified action: [assignment: specify protocol and action]
].

Management: FAU_WID_EXT.4

No specific management functions are identified.

Audit: FAU_WID_EXT.4

There are no auditable events foreseen.

FAU_WID_EXT.4 Wireless Intrusion Detection - Wireless Spectrum Analysis

Hierarchical to:No other components.
Dependencies to:

[FAU_WID_EXT.2 Wireless Intrusion Detection - Passive Information Flow Monitoring, or

FAU_WID_EXT.3 Wireless Intrusion Detection - Spectrum Monitoring]

FAU_WID_EXT.4.1

The TSF shall provide a dedicated sensor for wireless spectrum analysis.

C.2.1.7 FAU_ANO_EXT Anomaly-Based Intrusion Detection

Family Behavior

This family defines requirements for detection of malicious network activity based on anomalous behavior.

Component Leveling

FAU_ANO_EXT1

FAU_ANO_EXT.1, Anomaly-Based Intrusion Detection, requires the TSF to define how it determines anomalous network traffic that may be indicative of malicious activity.

Management: FAU_ANO_EXT.1

The following actions could be considered for the management functions in FMT:

  • Specification of periods of network activity that constitute baselines of expected behavior
  • Definition of anomaly activity

Audit: FAU_ANO_EXT.1

There are no auditable events foreseen.

FAU_ANO_EXT.1 Anomaly-Based Intrusion Detection

Hierarchical to:No other components.
Dependencies to:FAU_IDS_EXT.1 Intrusion Detection System - Intrusion Detection Methods

FAU_ANO_EXT.1.1

The TSF shall support the definition of [selection: baselines ('expected and approved'), anomaly ('unexpected') traffic patterns] including the specification of [selection:
  • throughput (data elements (e.g. bytes, packets, etc.) per time period (e.g. minutes, hours, days))
  • time of day
  • frequency
  • thresholds
  • [assignment: other methods]
] and the following network protocol fields:
  • all management and control frame header elements.

FAU_ANO_EXT.1.2

The TSF shall support the definition of anomaly activity through [selection: manual configuration by administrators, automated configuration].

C.2.1.8 FAU_SIG_EXT Signature-Based Intrusion Detection

Family Behavior

This family defines requirements for detection of malicious network activity based on traffic signatures.

Component Leveling

FAU_SIG_EXT1

FAU_SIG_EXT.1, Signature-Based Intrusion Detection, requires the TSF to support the definition of traffic signatures that can be compared to observed network traffic for the purpose of identifying potential malicious activity.

Management: FAU_SIG_EXT.1

The following actions could be considered for the management functions in FMT:

  • Definition of attack signatures

Audit: FAU_SIG_EXT.1

There are no auditable events foreseen.

FAU_SIG_EXT.1 Signature-Based Intrusion Detection

Hierarchical to:No other components.
Dependencies to:FAU_IDS_EXT.1 Intrusion Detection System - Intrusion Detection Methods

FAU_SIG_EXT.1.1

The TSF shall support user-defined and customizable attack signatures.

C.2.1.9 FAU_WIP_EXT Wireless Intrusion Prevention

Family Behavior

This family defines requirements for wireless intrusion prevention.

Component Leveling

FAU_WIP_EXT1

FAU_WIP_EXT.1, Wireless Intrusion Prevention, requires the TSF to support reactive behavior if potential malicious traffic is observed to be originating from or targeted to a particular network asset.

Management: FAU_WIP_EXT.1

The following actions could be considered for the management functions in FMT:

  • Enabling or disabling transmission of data by wireless sensor

Audit: FAU_WIP_EXT.1

The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:

FAU_WIP_EXT.1 Wireless Intrusion Prevention

Hierarchical to:No other components.
Dependencies to:FAU_WID_EXT.1 Wireless Intrusion Detection - Malicious Environmental Objects

FAU_WIP_EXT.1.1

The TSF shall allow an Authorized Administrator to isolate a wireless AP or EUD from the network monitored by the TSF using the following methods: [selection: wireless containment, wire-side containment of an unauthorized AP connected to the internal corporate wired network].

Appendix D - Implicitly Satisfied Requirements

This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP-Module. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.3 Dependencies between components.

This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP-Module provides evidence that these controls are present and have been evaluated.

Requirement Rationale for Satisfaction
FDP_IFF.1 - Information Flow Control Functions CC Part 2 specifies FDP_IFF.1 as a dependency of FDP_IFC.1 because the TSF must define the information flow control SFP rules associated with a given SFP. This dependency is implicitly addressed through FAU_WID_EXT.2, which defines the rules for the 802.11 monitoring SFP defined by FDP_IFC.1.

Appendix E - Allocation of Requirements in Distributed TOEs

For a distributed TOE, the security functional requirements in this PP-Module need to be met by the TOE as a whole, but not all SFRs will necessarily be implemented by all components. The following categories are defined in order to specify when each SFR must be implemented by a component: The table below specifies how each of the SFRs in this PP-Module must be met, using the categories above.
Requirement Description Distributed TOE SFR Allocation
FAU_ANO_EXT.1 Anomaly-Based Intrusion Detection Feature Dependent
FAU_ARP.1 Security Alarms One
FAU_ARP_EXT.1 Security Alarm Filtering One
FAU_GEN.1/WIDS Audit Data Generation (WIDS) Feature Dependent
FAU_IDS_EXT.1 Intrusion Detection System - Intrusion Detection Methods Feature Dependent
FAU_INV_EXT.1 Environmental Inventory Feature Dependent
FAU_INV_EXT.2 Characteristics of Environmental Objects Feature Dependent
FAU_INV_EXT.3 Location of Environmental Objects Feature Dependent
FAU_INV_EXT.4 Detection of Unauthorized Connections Feature Dependent
FAU_INV_EXT.5 Signal Library Feature Dependent
FAU_MAC_EXT.1 Device Impersonation Feature Dependent
FAU_RPT_EXT.1 Intrusion Detection System - Reporting Methods Feature Dependent
FAU_SAA.1 Potential Violation Analysis Feature Dependent
FAU_SIG_EXT.1 Signature-Based Intrusion Detection Feature Dependent
FAU_STG.1/PCAP Protected Audit Event Storage (Packet Captures) Feature Dependent
FAU_STG.5/PCAP Prevention of Audit Data Loss (Packet Captures) Feature Dependent
FAU_WID_EXT.1 Wireless Intrusion Detection - Malicious Environmental Objects Feature Dependent
FAU_WID_EXT.2 Wireless Intrusion Detection - Passive Information Flow Monitoring Feature Dependent
FAU_WID_EXT.3 Wireless Intrusion Detection - Spectrum Monitoring Feature Dependent
FAU_WID_EXT.4 Wireless Intrusion Detection - Wireless Spectrum Analysis Feature Dependent
FAU_WIP_EXT.1 Wireless Intrusion Prevention Feature Dependent
FDP_IFC.1 Subset Information Flow Control Feature Dependent
FMT_SMF.1/WIDS Specification of Management Functions (WIDS) Feature Dependent
FPT_FLS.1/WIDS Basic Internal TSF Data Transfer Protection Feature Dependent

Appendix F - Entropy Documentation and Assessment

The TOE does not require any additional supplementary information to describe its entropy sources beyond the requirements outlined in the Base-PP.

Appendix G - Acronyms

Table 11: Acronyms
AcronymMeaning
AESAdvanced Encryption Standard
APAccess Point
Base-PPBase Protection Profile
BSSIDBasic Service Set Identifier
CCCommon Criteria
CEMCommon Evaluation Methodology
cPPCollaborative Protection Profile
DDoSDistributed Denial of Service
DHCPDynamic Host Configuration Protocol
DoSDenial of Service
EUDEnd User Device
FPFunctional Package
HTTPSHypertext Transfer Protocol Secure
ICSInternet Connection Sharing
IPsecInternet Protocol Security
MACMedia Access Control
OEOperational Environment
OSIOpen Systems Interconnection
PPProtection Profile
PP-ConfigurationProtection Profile Configuration
PP-ModuleProtection Profile Module
SARSecurity Assurance Requirement
SFSecurity Function
SFPSecurity Function Policy
SFRSecurity Functional Requirement
SNMPSimple Network Management Protocol
SSHSecure Shell
SSIDService Set Identifier
STSecurity Target
TKIPTemporal Key Integrity Protocol
TLSTransport Layer Security
TOETarget of Evaluation
TSFTOE Security Functionality
TSFITSF Interface
TSSTOE Summary Specification
WEPWired Equivalent Protocol
WIDSWireless Intrusion Detection System
WIPSWireless Intrusion Prevention System
WLANWireless Local Area Network
WPAWLAN Protected Access

Appendix H - Bibliography

Table 12: Bibliography
IdentifierTitle
[CC]Common Criteria for Information Technology Security Evaluation -
[CEM]Common Methodology for Information Technology Security Evaluation -
[NDcPP] collaborative Protection Profile for Network Devices, Version 4.0, March 23, 2020 Adjust date when published
[NDcPP SD] Supporting Document - Evaluation Activities for Network Device cPP, Version 4.0, December 2019 Adjust date when published