Version | Date | Comment |
---|---|---|
1.0 | 2020-09-30 | Initial Release - PP-Module for NDcPP |
2.0 | 2022-09-30 | Added 6 GHz spectrum slice |
3.0 | 2025-07-15 | Incorporate NIAP Technical Decisions, Update to CC:2022 |
This Protection Profile Module (PP-Module) describes security requirements for a 802.11 Wireless Intrusion Detection System (WIDS) defined to be an IEEE 802.11 network intrusion detection product located at the edge of a private network that can collect, inspect, and analyze real-time network traffic and alert the administrator of policy violations. This PP-Module is intended to provide a minimal baseline set of requirements that are targeted at mitigating well defined and described threats.
This PP-Module contains optional requirements for a Wireless Intrusion Protection System (WIPS), a security product that in addition to the 802.11 WIDS capability, provides network security administrators with the additional ability to react in real-time to potentially malicious wireless (IEEE 802.11) network traffic.
This PP-Module is intended for use with the following Base-PP:
A TOE that conforms to a PP-Configuration containing this PP-Module must be a 'Distributed TOE' as defined in the NDcPP. The expectation for this PP-Module is that a WIDS must include distributed sensor nodes to ensure that the full physical range of a wireless network to ensure that user interactions with the network cannot evade detection.
A part or parts of the TOE that have to be relied upon for enforcing a closely related subset of the rules from the TSP. The security policy enforced by an SF.Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Function (SF) | A part or parts of the TOE that have to be relied upon for enforcing a closely related subset of the rules from the TSP. |
Security Function Policy (SFP) | The security policy enforced by an SF. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Access Point (AP) | A device that provides the network interface that enables 802.11 wireless client hosts to access a wired network. |
End User Device (EUD) | An 802.11 enabled device that has the ability to process, transmit, and/or store information. |
Service Set Identifier (SSID) | The primary name associated with an 802.11 wireless local area network (WLAN). |
Wireless Intrusion Detection System (WIDS) | A security product that provides network security administrators with the ability to monitor, collect, and log real-time to potentially malicious wireless (IEEE 802.11) network traffic. |
Wireless Intrusion Prevention System (WIPS) | A security product that provides network security administrators with the ability to monitor, collect, log, and react in real-time to potentially malicious wireless (IEEE 802.11) network traffic. |
Wireless Local Area Network (WLAN) | An 802.11 wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, office building etc. |
This PP-Module specifically addresses WIDS/WIPS. A conformant WIDS is a product that can monitor, collect, inspect, and analyze real-time network traffic and alert the administrator of policy violations. WIPS functionality is not required to conform to this PP-Module, and it is optional for the TOE to have the additional ability to react in real-time to potentially malicious wireless (IEEE 802.11) network traffic.
A WIDS/WIPS TOE consists of multiple sensors that passively scan the RF environment on the WLAN radio frequency spectrum and a centralized mechanism such as a Server or Controller that processes the data collected by the sensors. Conformant TOEs must use a secure communication path(s) between WIDS/WIPS components.
A WIDS/WIPS can be Integrated (be part of the WLAN infrastructure) or Standalone (independent from WLAN) architecture depending on vendor implementation. The two different architectures are illustrated in Figure 1 below. The TOE boundary is indicated by the yellow box.
A WIDS/WIPS is expected to inspect layers 1 and 2 network traffic, per the OSI network model, and monitor wireless frames in the RF spectrum utilized by IEEE 802.11 a, b, g, n, and ac. Monitoring and inspection of other technologies (e.g., cellular) and protocols are optional.
Conformant TOEs will detect potentially malicious network traffic using various approaches. Broadly speaking, the traffic analysis could be based on identification of 'known' threats, or 'unknown' threats. Identification of 'known' threats may be performed through pattern matching, (e.g. by matching strings of characters within a frame with known patterns, or by matching traffic patterns common with reconnaissance or denial of service (DoS) attacks). Identification of 'unknown' threats may be performed through use of various forms of anomaly detection whereby the WIDS/WIPS is provided with (or learns/creates) a definition of expected/typical traffic patterns, such that it’s able to detect and react to anomalous (unexpected/atypical) traffic patterns.
A WIDS consists of sensors (preferably dedicated) and a central controller working together to provide 24/7 monitoring, primarily to the 802.11 Wireless Local Area Network (WLAN) spectrum and protocol, to detect, identify, and geolocate WLAN devices within a controlled space.
The WIDS may be capable of detecting or monitoring traffic other than 802.11 WLAN, such as 802.15.4 based protocols, which enhances the security of the controlled space. However, a WIDS is not required to monitor additional protocols outside of 802.11. A WIDS monitors all 802.11 WLAN traffic emanating from and traversing the controlled space, thus inadvertent collection of any 802.11 signals is possible when operating a WIDS.
WIDS address a range of security threats related to detection of and reaction to potentially malicious WLAN traffic. The malicious traffic may pose a threat to one or more endpoints on the monitored networks, to the network infrastructure, or to the TOE itself. Attacks against a WLAN could compromise the confidentiality and integrity of WLAN users and system data as well as the availability of the WLAN to legitimate users.
The term “monitored network” is used here to represent
any WLAN and/or wired network that the TOE is configured to monitor and detect intrusions on.
This extends to the wired networks as intrusions on the wireless network can also be damaging to
the wired infrastructure. The WIDS/WIPS also protect the wired infrastructure by detecting rogue
devices that are directly connected to the wired infrastructure, which may expose the wired
network, or unauthorized WLAN devices deployed in a no-wireless zone.
The proper installation, configuration, and administration of the WIDS is critical to
its correct operation. A site is responsible for developing its security policy and configuring
a rule set that the WIDS will enforce and provide an appropriate response to meet their needs,
relative to their own risk analysis and their perceived threats.
Note that this PP-Module does not repeat the threats identified in the NDcPP, though they all apply given the conformance and hence dependence of this PP-Module on the NDcPP. Note also that while the NDcPP contains only threats to the ability of the TOE to provide its security functions, this PP-Module addresses only threats to resources in the operational environment. Together the threats of the NDcPP and those defined in this PP-Module define the comprehensive set of security threats addressed by a WIDS TOE.
An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.
Assumption or OSP | Security Objectives | Rationale |
A.CONNECTIONS | OE.CONNECTIONS | The operational environment objective OE.CONNECTIONS is realized through A.CONNECTIONS. |
A.PROPER_ADMIN | OE.PROPER_ADMIN | The operational environment objective OE.PROPER_ADMIN is realized through A.PROPER_ADMIN. |
P.ANALYZE | OE.CONNECTIONS | The proper placement of the TOE within a network allows the P.ANALYZE policy to be enforced. |
This SFR has been modified from its definition in the NDcPP to mandate the selection of options that correspond to distributed TOEs. A TOE that conforms to this PP-Module will always be a distributed TOE.
The text of the requirement is replaced with:
The TSF shall be able to generate audit records for each TOE component. The audit records generated by the TSF of each TOE component shall include the subset of security relevant audit events which can occur on the TOE component.
Application Note: This SFR is selection-based in the Base-PP but is mandated by this PP-Module because the ST author must claim a distributed TOE selection in FAU_STG_EXT.1.2.
Any element not specified in this section is unchanged from its definition in the Base-PP.
FAU_STG_EXT.1.2: This SFR has been modified from its definition in the NDcPP to remove a selection that is not permitted by the architecture required by the PP-Module.
The text of the requirement is replaced with:
The TSF shall be able to store generated audit data on the TOE itself. In addition [selection:
Application Note: This SFR is modified from its definition in the Base-PP by removing the selection option for the TOE to be standalone. A TOE that conforms to this PP-Module is expected to be distributed.
This SFR is mandated for inclusion by this PP-Module because the WIDS TOE is expected to be a distributed system. Any element not specified in this section is unchanged from its definition in the Base-PP.
FCO_CPC_EXT.1.2: This SFR has been modified from its definition in the NDcPP to specify which communications channels are acceptable for registration.
The text of the requirement is replaced with:
The TSF shall implement a registration process in which components establish and use a communications channel that uses [selection:
Application Note: This SFR is optional in the NDcPP but is mandated by this PP-Module because the WIDS TOE is expected to be a distributed system.
This SFR is unchanged from its definition in the Base-PP, it is only mandated for inclusion because a TOE that conforms to this PP-Module is expected to be a distributed system.
This requirement ensures all communications between components of a distributed TOE is protected through the use of an encrypted communications channel. The data passed in this trusted communication channel are encrypted as defined in the protocol chosen in the selection. The ST author chooses the mechanisms supported by the TOE, and then ensures that the detailed protocol requirements in Appendix B of NDcPP corresponding to their selection are included in the ST, if not already present.
This SFR is modified from its definition in the Base-PP to add a selection for database server capability. Any element not specified in this section is unchanged from its definition in the Base-PP.
The text of the requirement is replaced with:
FTP_ITC.1.1: The TSF shall be capable of using [selection: IPsec, SSH [v2], TLS [1.2 or 1.3], DTLS, HTTPS] to provide a trusted communication channel between itself and authorized IT entities supporting the following capabilities: audit server, [selection: authentication server, database server, [assignment: other capabilities], no other capabilities] that is logically distinct from other communication channels and provides assured identification of its end points and protection of the channel data from disclosure and detection of modification of the channel data.
Application Note: If the TSF uses a separate database server to support its security-relevant functionality, this selection must be included in the ST. The intent of the database server is to store WIDS/WIPS data that must be queryable, such as events/alarms, triangulation calculations, wireless spectrum analysis (including RF jammer/Denial of Service (DoS)), and packet capture analysis. Authorized Administrators must be permitted to view alarms, raw event data, and any other data stored in the database. The Administrator must access the database through a trusted channel if done so remotely.
The intent of this requirement is to provide a means by which a cryptographic protocol may be used to protect external communications with authorized IT entities that the TOE interacts with to perform its functions. The TOE uses at least one of the listed protocols for communications with the server that collects the audit information.
If other authorized IT entities are protected, the ST author makes the appropriate assignments (for those entities) and selections (for the protocols that are used to protect those connections). The ST author selects the mechanism or mechanisms supported by the TOE, and then ensures that the detailed protocol requirements in Appendix B of NDcPP corresponding to their selection are included in the ST.
TLS and DTLS are defined in the Functional Package for TLS. SSH is defined in the Functional Package for SSH.
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_ARP.1 | ||
Actions taken due to potential security violations | None. | |
FAU_ARP_EXT.1 | ||
No events specified | N/A | |
FAU_GEN.1/WIDS | ||
Any authentication event | Failed login attempts, successful login attempts, administrator logins, changes to the WIDS native authentication system (creation of an account, deletion of an account, modification of user accounts, changes to groups or group membership, attempts for privilege escalation) This appears to be a list of events that should be logged and not "additional audit record contents". If this is the case, these should be defined as separate auditable events. If not, suggest making it more clear as to how each of these details relate to the overarching "authentication event", e.x. for the first three, "Type of authentication attempt and its result (i.e., administrator vs user, success or failure)". | |
FAU_IDS_EXT.1 | ||
No events specified | N/A | |
FAU_INV_EXT.1 | ||
Presence of allowlisted device | ||
FAU_INV_EXT.2 | ||
No events specified | N/A | |
FAU_INV_EXT.3 | ||
Location of AP or EUD |
| |
FAU_MAC_EXT.1 | ||
No events specified | N/A | |
FAU_RPT_EXT.1 | ||
No events specified | N/A | |
FAU_SAA.1 | ||
No events specified | N/A | |
FAU_WID_EXT.1 | ||
Detection of rogue AP or EUD | None. | |
Detection of unauthorized SSID | None. | |
FAU_WID_EXT.2 | ||
Sensor wireless transmission capabilities | Wireless transmission capabilities are turned on. | |
FDP_IFC.1 | ||
No events specified | N/A | |
FMT_SMF.1/WIDS | ||
No events specified | N/A |
If "capture raw frame traffic that triggers the violation" is selected then FAU_STG.1/PCAP and FAU_STG.5/PCAP must be included in the ST.
FAU_SAA.1 defines the rules for monitoring the wireless traffic to detect for potential security violations. FAU_INV_EXT.2 defines the information the TOE needs to collect for all APs and EUDs within range of the TOE's sensors. Device attributes can then be individually filtered and/or selected in order to be displayed as part of the alert.
The auditable events defined in Table 2 are for the SFRs that are explicitly defined in this PP-Module and are intended to extend FAU_GEN.1 in the Base-PP. The events in the Auditable Events table should be combined with those of the NDcPP in the context of a conforming Security Target.
If the ST includes any optional or objective SFRs, the selection for the respective "Auditable events listed in the Auditable Events..." must be included. If no optional or objective SFRs are included in the ST, "no other events" should be selected. The auditing of the specific optional and objective SFRs is only required if that SFR is included in the ST.
Per FAU_STG_EXT.1 in the Base-PP, the TOE must support transfer of the audit data to an external IT entity using a trusted channel.
At least one detection method must be selected. If multiple detection methods are supported, each supported method must be selected.
If anomaly-based detection is selected, then FAU_ANO_EXT.1 shall be included in the ST. If signature-based detection is selected, then FAU_SIG_EXT.1 shall be included in the ST.
This inventory is used as an allowlist to indicate to the WIDS which APs and EUDs are authorized members of the wireless network. The inventory of authorized APs and EUDs is configured by FMT_SMF.1/WIDS.
The terminology used to describe an inventoried or allowlisted device may vary by vendor product. This PP-Module utilizes allowlisted to describe APs and EUDs that are part of the inventory and non-allowlisted to describe APs and EUDs that are not part of the inventory.
These rules are used to detect a potential security violation. A malicious actor who has gained unauthorized access to the TSF possesses the ability to alter its configuration and overall security posture. Maintenance of the rules by adding, modifying or deletion of rules from the set of rules is handled by FMT_SMF.1/WIDS.
There is no expectation that the TOE classify or categorize audit records related to TSF configuration changes as malicious activity. If a potential security violation is detected the alert generated for the Administrator is handled by FAU_ARP.1.
If nonsimultaneously is selected, then Define the amount of time sensor monitors a specific channel must be selected in FMT_SMF.1/WIDS.
The "802.11 monitoring SFP" is a security function policy and the SFRs that reference this policy describe what the policy does. The "802.11 monitoring SFP" is established in FDP_IFC.1 and defined through FAU_WID_EXT.1, FAU_WID_EXT.2, in addition to optional SFRs FAU_WID_EXT.3/RF and FAU_WID_EXT.4. A vendor does not have to formally define this policy, it only needs to comply with the SFRs.
If "can be configured to prevent transmission of data" is selected then "Enable/Disable transmission of data by wireless sensor" must be selected in FMT_SMF.1/WIDS.
The intent of this SFR is to employ WIDS sensors that can have all wireless transmission capabilities disabled for instances where a site wishes to implement a no wireless policy.
The "802.11 monitoring SFP" is a security function policy and the SFRs that reference this policy describe what the policy does. The "802.11 monitoring SFP" is established in FDP_IFC.1 and defined through FAU_WID_EXT.1, FAU_WID_EXT.2, in addition to optional SFRs FAU_WID_EXT.3/RF and FAU_WID_EXT.4. A vendor does not have to formally define this policy, it only needs to comply with the SFRs.
"Authorized" EUDs/APs are those that are assigned to the allowlist as defined by FMT_SMF.1/WIDS.
The "802.11 monitoring SFP" is a security function policy and the SFRs that reference this policy describe what the policy does. The "802.11 monitoring SFP" is established in FDP_IFC.1 and defined through FAU_WID_EXT.1, FAU_WID_EXT.2, in addition to optional SFRs FAU_WID_EXT.3/RF and FAU_WID_EXT.4. A vendor does not have to formally define this policy, it only needs to comply with the SFRs.
Define authorized WLAN authentication and encryption schemes does not enforce, but rather establishes a baseline to determine if an unauthorized scheme is used.
If FAU_ANO_EXT.1 is included in the ST, "Specification of periods of network activity that constitute baseline of expected behavior" must be selected. If FAU_ANO_EXT.1 is included in the ST and "manual configuration by administrators" is selected in FAU_ANO_EXT.1, then "Definition of anomaly activity" must be selected.
If "can be configured to prevent transmission of data" is selected in FAU_WID_EXT.2 then "Enable/Disable transmission of data by wireless sensor" must be selected.
It is expected that an Authorized Administrator will be responsible for configuring the AP to operate on a specific frequency pursuant to the 802.11 standard. The TSF will have the ability to adjust the amount of time it passively monitors and captures WLAN traffic on a given frequency and channel.
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
Threat | Addressed by | Rationale |
---|---|---|
T.UNAUTHORIZED_DISCLOSURE_OF_INFORMATION | FAU_ARP.1 | Mitigates the threat by generating alerts for potential violations of security policy. |
FAU_ARP_EXT.1 | Mitigates the threat by allowing for nuisance or undesirable alarms from generation, preventing alarm fatigue. | |
FAU_GEN.1/WIDS | Mitigates the threat by generating audit data related to operation, including abnormal conditions and potential threat detections. | |
FAU_GEN_EXT.1 (from Base-PP) | Mitigates the threat by generating audit data on each component of the TOE. | |
FAU_IDS_EXT.1 | Mitigates the threat by detecting intrusions or potential intrusions. | |
FAU_INV_EXT.1 | Mitigates the threat by defining an allowlist of authorized equipment for use in the network. | |
FAU_INV_EXT.2 | Mitigates the threat by detecting all wireless devices present in the vicinity. | |
FAU_INV_EXT.3 | Mitigates the threat by determining the physical location of wireless devices in the vicinity. | |
FAU_MAC_EXT.1 | Mitigates the threat by detecting when a device is attempting to spoof a trusted device's MAC address. | |
FAU_RPT_EXT.1 | Mitigates the threat by transmitting audit data to a central location. | |
FAU_SAA.1 | Mitigates the threat by defining rules that indicate a potential malicious action. | |
FAU_STG_EXT.1 (from Base-PP) | Mitigates the threat by storing audit data in specified locations and optionally forwarding this data to a central point. Note that any FAU_STG_EXT.1 references will likely need to change before publication because the unpublished CC:2022 version of NDcPP is expected to convert this to FAU_STG.1. It has been included throughout this module as if that will not change because that is the only reference that currently exists to be used. | |
FAU_WID_EXT.1 | Mitigates the threat by classifying wireless devices as benign or malicious based on device metrics. | |
FAU_WID_EXT.2 | Mitigates the threat by monitoring 802.11 wireless traffic in the vicinity. | |
FCO_CPC_EXT.1 (from Base-PP) | Mitigates the threat by securely registering components to the TOE. | |
FDP_IFC.1 | Mitigates the threat by enforcing monitoring on all wireless 802.11 traffic that involves an authorized device as at least one party. | |
FMT_SMF.1/WIDS | Mitigates the threat by allowing configuration of rules, configuration, and other TOE operational settings. | |
FPT_FLS.1/WIDS (objective) | Mitigates the threat by at minimum generating an audit record when potential security failures of the TSF are detected, which could include failures to properly monitor or alert to potential threats. | |
FTP_ITC.1 (from Base-PP) | Mitigates the threat by securely transmitting data from the TOE to other trusted entities. | |
FPT_ITT.1 (from Base-PP) | Mitigates the threat by securely transmitting data between TOE components. | |
FAU_WID_EXT.3/BT (optional) | Mitigates the threat by monitoring Bluetooth wireless traffic in the vicinity for potential violations of policy. | |
FAU_WID_EXT.3/CELL (optional) | Mitigates the threat by monitoring cellular wireless traffic in the vicinity for potential violations of policy. | |
FAU_WID_EXT.3/RF (optional) | Mitigates the threat by monitoring non-802.11 wireless traffic in the vicinity for potential violations of policy. | |
FAU_WID_EXT.4 (optional) | Mitigates the threat by using a dedicated sensor for analysis of wireless traffic. | |
FAU_INV_EXT.4 (objective) | Mitigates the threat by detecting non-authorized wireless equipment being attached to an internal wired network. | |
FAU_INV_EXT.5 (objective) | Mitigates the threat by including a signal library. | |
FAU_WIP_EXT.1 (objective) | Mitigates the threat by isolating confirmed threats to the internal network, either wired (unauthorized AP) or wireless. | |
FAU_ANO_EXT.1 (selection-based) | Mitigates the threat by defining thresholds of baseline and anomalous traffic for analysis and action. | |
FAU_SIG_EXT.1 (selection-based) | Mitigates the threat by defining signatures for an attack. | |
FAU_STG.1/PCAP (selection-based) | Mitigates the threat by storing packet captures generated by the TOE, and optionally forwarding this data to a central point. | |
FAU_STG.5/PCAP (selection-based) | Mitigates the threat by defining how storage of packet capture data is prioritized in the case of limited storage space. | |
T.UNAUTHORIZED_ACCESS | FAU_IDS_EXT.1 | Mitigates the threat by detecting intrusions or potential intrusions. |
FAU_INV_EXT.1 | Mitigates the threat by defining an allowlist of authorized equipment for use in the network. | |
FAU_INV_EXT.2 | Mitigates the threat by detecting all wireless devices present in the vicinity, to use against the allowlist for detection of potentially unauthorized access points or end-user devices. | |
FAU_INV_EXT.3 | Mitigates the threat by determining the physical location of wireless devices in the vicinity, to allow for locating any potentially rogue devices. | |
FAU_MAC_EXT.1 | Mitigates the threat by detecting when a device is attempting to spoof a trusted device's MAC address. | |
FAU_SAA.1 | Mitigates the threat by defining rules that indicate a potential malicious action. | |
FAU_WID_EXT.1 | Mitigates the threat by classifying wireless devices as benign or malicious based on device metrics. | |
FAU_WID_EXT.2 | Mitigates the threat by monitoring 802.11 wireless traffic in the vicinity for comparison against defined policies. | |
FDP_IFC.1 | Mitigates the threat by enforcing monitoring on all wireless 802.11 traffic that involves an authorized device as at least one party. | |
FMT_SMF.1/WIDS | Mitigates the threat by allowing configuration of rules, configuration, and other TOE operational settings. | |
FAU_WID_EXT.3/RF (optional) | Mitigates the threat by monitoring non-802.11 wireless traffic in the vicinity for potential violations of policy. | |
FAU_WID_EXT.3/BT (optional) | Mitigates the threat by monitoring Bluetooth wireless traffic in the vicinity for potential violations of policy. | |
FAU_WID_EXT.3/CELL (optional) | Mitigates the threat by monitoring cellular wireless traffic in the vicinity for potential violations of policy. | |
FAU_WID_EXT.4 (optional) | Mitigates the threat by using a dedicated sensor for analysis of wireless traffic. | |
FAU_INV_EXT.4 (objective) | Mitigates the threat by detecting non-authorized wireless equipment being attached to an internal wired network. | |
FAU_INV_EXT.5 (objective) | Mitigates the threat by including a signal library. | |
FAU_WIP_EXT.1 (objective) | Mitigates the threat by isolating confirmed threats to the internal network, either wired (unauthorized AP) or wireless. | |
FAU_ANO_EXT.1 (selection-based) | Mitigates the threat by defining thresholds of baseline and anomalous traffic for analysis and action. | |
FAU_SIG_EXT.1 (selection-based) | Mitigates the threat by defining signatures for an attack. | |
T.DISRUPTION | FAU_IDS_EXT.1 | Mitigates the threat by detecting intrusions or potential intrusions. |
FAU_INV_EXT.1 | Mitigates the threat by defining an allowlist of authorized equipment for use in the network. | |
FAU_INV_EXT.2 | Mitigates the threat by detecting all wireless devices present in the vicinity, to use against the allowlist for detection of potentially unauthorized access points or end-user devices. | |
FAU_INV_EXT.3 | Mitigates the threat by determining the physical location of wireless devices in the vicinity, to allow for locating any potentially rogue devices. | |
FAU_MAC_EXT.1 | Mitigates the threat by detecting when a device is attempting to spoof a trusted device's MAC address. | |
FAU_SAA.1 | Mitigates the threat by defining rules that indicate a potential malicious action, including signs of a DoS attack. | |
FAU_WID_EXT.1 | Mitigates the threat by classifying wireless devices as benign or malicious based on device metrics, including throughput (which may indicate a DoS threat). | |
FAU_WID_EXT.2 | Mitigates the threat by monitoring 802.11 wireless traffic in the vicinity for comparison against defined policies. | |
FAU_WIP_EXT.1 | Mitigates the threat by isolating confirmed threats to the internal network, either wired (unauthorized AP) or wireless. | |
FDP_IFC.1 | Mitigates the threat by enforcing monitoring on all wireless 802.11 traffic types that involve an authorized device as at least one party. | |
FMT_SMF.1/WIDS | Mitigates the threat by allowing configuration of rules, configuration, and other TOE operational settings. | |
FAU_WID_EXT.3/BT (optional) | Mitigates the threat by monitoring Bluetooth wireless traffic in the vicinity for potential violations of policy. | |
FAU_WID_EXT.3/CELL (optional) | Mitigates the threat by monitoring cellular wireless traffic in the vicinity for potential violations of policy. | |
FAU_WID_EXT.3/RF (optional) | Mitigates the threat by monitoring non-802.11 wireless traffic in the vicinity for potential violations of policy. | |
FAU_WID_EXT.4 (optional) | Mitigates the threat by using a dedicated sensor for analysis of wireless traffic. | |
FAU_INV_EXT.4 (objective) | Mitigates the threat by detecting non-authorized wireless equipment being attached to an internal wired network. | |
FAU_INV_EXT.5 (objective) | Mitigates the threat by including a signal library. | |
FAU_ANO_EXT.1 (selection-based) | Mitigates the threat by defining thresholds of baseline and anomalous traffic for analysis and action. | |
FAU_SIG_EXT.1 (selection-based) | Mitigates the threat by defining signatures for an attack. |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.UNAUTHORIZED_DISCLOSURE_OF_INFORMATION | This threat is similar to the T.UNDETECTED_ACTIVITY threat in the Base-PP but it applies to the attacker performing malicious actions on the network monitored by the TOE rather than against the TOE itself. |
T.UNAUTHORIZED_ACCESS | This threat is similar to the T.UNAUTHORIZED_ADMINISTRATOR_ACCESS threat in the Base-PP but it applies to the attacker gaining unauthorized access to an asset on the network monitored by the TOE rather than against the TOE itself. |
T.DISRUPTION | This threat is for a denial-of-service attack against an asset on the network monitored by the TOE. The Base-PP does not define any threats for availability but there is no consistency issue here because the threat applies to an interface that does not exist in the Base-PP. |
A.CONNECTIONS | This assumption defines the TOE’s placement in a network such that it is able to perform its required security functionality. The Base-PP does not define any assumptions about the TOE’s architectural deployment so there is no conflict here. |
A.PROPER_ADMIN | This assumption is comparable to the A.TRUSTED_ADMINISTRATOR assumption from the Base-PP, applied to the specific administrative functions defined in this PP-Module. |
P.ANALYZE | This organizational security policy expects the data produced by the TSF about the behavior of external entities to be used in an organization’s analytical process. There is no conflict with the Base-PP because the Base-PP does not define any functionality for the TOE to produce data about any entities other than itself. |
PP-Module OE Objective | Consistency Rationale |
---|---|
OE.CONNECTIONS | This objective expects the TOE to be placed in a network such that it is able to perform its required security functionality. The Base-PP does not define any objectives about the TOE’s architectural deployment so there is no conflict here. |
OE.PROPER_ADMIN | This objective is comparable to the OE.TRUSTED_ADMIN objective from the Base-PP, applied to the specific administrative functions defined in this PP-Module. |
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
FAU_GEN_EXT.1 | This PP-Module mandates the inclusion of this selection-based SFR because a TOE that conforms to this PP-Module will always be deployed in a configuration that requires this SFR to be claimed. |
FAU_STG_EXT.1 | This PP-Module modifies the Base-PP SFR to remove a selection that is not permitted by the TOE architecture that it specifies. |
FCO_CPC_EXT.1 | This PP-Module mandates the inclusion of this optional SFR because it is required to implement functionality required by this PP-Module. |
FPT_ITT.1 | This PP-Module mandates the inclusion of this optional SFR because it is required to implement functionality required by this PP-Module. |
FTP_ITC.1 | This PP-Module refines the Base-PP SFR to add a selection for a specific external entity that may be applicable to a TOE that conforms to this PP-Module. |
Additional SFRs | |
This PP-Module does not add any requirements when the NDcPP is the base. | |
Mandatory SFRs | |
FAU_ARP.1 | This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_ARP_EXT.1 | This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_GEN.1/WIDS | This SFR iterates the FAU_GEN.1 SFR defined in the Base-PP to define auditable events for the functionality that is specific to this PP-Module. |
FAU_IDS_EXT.1 | This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_INV_EXT.1 | This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_INV_EXT.2 | This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_INV_EXT.3 | This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_MAC_EXT.1 | This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_RPT_EXT.1 | This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_SAA.1 | This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_WID_EXT.1 | This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_WID_EXT.2 | This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FDP_IFC.1 | This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FMT_SMF.1/WIDS | This SFR iterates the FMT_SMF.1 SFR defined in the Base-PP to define management functions for the functionality that is specific to this PP-Module. |
Optional SFRs | |
FAU_WID_EXT.3/BT | This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_WID_EXT.3/CELL | This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_WID_EXT.3/RF | This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_WID_EXT.4 | This SFR defines an optional capability for a distributed component to be dedicated to one particular function. This function (wireless spectrum analysis) is defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
Objective SFRs | |
FAU_INV_EXT.4 | This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_INV_EXT.5 | This SFR defines operations to be performed on assets in the TOE’s operational environment, which is behavior defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_WIP_EXT.1 | This SFR defines WIPS behavior in response to detection of potential malicious activity in the TOE’s operational environment. This extends the logical scope of the TOE beyond what the Base-PP defines. |
FPT_FLS.1/WIDS | This SFR defines preservation of a secure state in the event that a failure condition is detected. The Base-PP does not define an SFR for this behavior but this SFR mitigates the T.SECURITY_FUNCTIONALITY_FAILURE threat defined in the Base-PP, so it is clear that this behavior is consistent with the security expectations of the Base-PP. |
Implementation-dependent SFRs | |
This PP-Module does not define any Implementation-dependent requirements. | |
Selection-based SFRs | |
FAU_ANO_EXT.1 | This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_SIG_EXT.1 | This SFR defines operations to be performed on collected WIDS data, which is collected using an external interface defined in this PP-Module that extends the logical scope of the TOE beyond what the Base-PP defines. |
FAU_STG.1/PCAP | This SFR iterates the FAU_STG.1 SFR defined in CC Part 2 for storage of audit data and applies it to storage of packet captures. |
FAU_STG.5/PCAP | This SFR iterates the FAU_STG.5 SFR defined in CC Part 2 for storage of audit data and applies it to storage of packet captures. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_WID_EXT.3/BT | ||
Detection of Bluetooth devices (for each selection made that includes an action of "log") | Information contained within each selection that contains a requirement to log information. It is unclear what information needs to be logged to constitute the logging of a particular Bluetooth device. This applies to selections that include logging the presence of a Bluetooth device, as well as selections that include logging a device that carries out a particular action, such as performing a particular procedure. | |
FAU_WID_EXT.3/CELL | ||
Detection of cellular devices (for each selection made that includes an action of "log") |
| |
FAU_WID_EXT.3/RF | ||
Detection of network devices operating in selected RF bands |
| |
FAU_WID_EXT.4 | ||
No events specified | N/A |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_INV_EXT.4 | ||
No events specified | N/A | |
FAU_INV_EXT.5 | ||
No events specified | N/A | |
FAU_WIP_EXT.1 | ||
Isolation of AP or EUD |
| |
FPT_FLS.1/WIDS | ||
Information about failure |
|
It is expected that an Authorized Administrator will be responsible for confirming the AP or EUD as a rogue AP or EUD to initiate wireless containment.
In this SFR the containment of an unauthorized AP connected to the internal corporate wired network refers to an unauthorized AP that is physically connected (via wire) to the protected internal wired infrastructure.
This PP-Module does not define any Implementation-dependent SFRs.
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_ANO_EXT.1 | ||
No events specified | N/A | |
FAU_SIG_EXT.1 | ||
No events specified | N/A | |
FAU_STG.1/PCAP | ||
No events specified | N/A | |
FAU_STG.5/PCAP | ||
Configuration of TOE audit storage behavior (if configurable) | No additional information |
Functional Class | Functional Components |
---|---|
Security Audit (FAU) | FAU_ANO_EXT Anomaly-Based Intrusion Detection FAU_ARP_EXT Security Alarm Filtering FAU_IDS_EXT Intrusion Detection Methods FAU_INV_EXT Environmental Inventory FAU_MAC_EXT Device Impersonation FAU_RPT_EXT Reporting Methods FAU_SIG_EXT Signature-Based Intrusion Detection FAU_WID_EXT Wireless Intrusion Detection FAU_WIP_EXT Wireless Intrusion Prevention |
FAU_ARP_EXT.1, Security Alarm Filtering, requires the TSF to implement a filtering mechanism to selectively suppress the generation of security alarms.
No specific management functions have been identified.
There are no auditable events foreseen.
FAU_IDS_EXT.1, Intrusion Detection System - Intrusion Detection Methods, requires the TSF to specify the methods of intrusion detection that it supports.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FAU_INV_EXT.1, Environmental Inventory, requires the TSF to determine if inventoried objects are authorized or unauthorized.
FAU_INV_EXT.2, Characteristics of Environmental Objects, requires the TSF to discover network assets in its operational environment and maintain an inventory of them based on collected attributes.
FAU_INV_EXT.3, Location of Environmental Objects, requires the TSF to approximate the physical location of network assets in its operational environment based on triangulation of wireless emissions.
FAU_INV_EXT.4, Detection of Unauthorized Connections, requires the TSF to identify if an unauthorized network asset in its inventory is attempting to access a protected network using a wired connection.
FAU_INV_EXT.5, Signal Library, requires the TSF to maintain a signal library.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FAU_INV_EXT.2 Characteristics of Environmental Objects FMT_SMF.1 Specification of Management Functions |
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FAU_INV_EXT.2 Characteristics of Environmental Objects |
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FAU_INV_EXT.1 Environmental Inventory |
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FAU_MAC_EXT.1, Device Impersonation, requires the TSF to detect possible MAC address spoofing using various methods.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FAU_INV_EXT.2 Characteristics of Environmental Objects |
FAU_RPT_EXT.1, Intrusion Detection System - Reporting Methods, requires the TSF to implement a specified reporting mechanism for collected data for compatibility with third parties that may consume this data.
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FAU_WID_EXT.1, Wireless Intrusion Detection - Malicious Environmental Objects, requires the TSF to implement a mechanism to distinguish between authorized and unauthorized network assets.
FAU_WID_EXT.2, Wireless Intrusion Detection - Passive Information Flow Monitoring, requires the TSF to surveil certain wireless frequency bands and perform stateful inspection of traffic on them.
FAU_WID_EXT.3, Wireless Intrusion Detection - Spectrum Monitoring, requires the TSF to surveil specified radio frequency bands or protocols to detect potential unauthorized devices.
FAU_WID_EXT.4, Wireless Intrusion Detection - Wireless Spectrum Analysis, requires the TSF to implement wireless spectrum analysis in a dedicated physical component.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FAU_INV_EXT.1 Environmental Inventory |
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
No specific management functions are identified.
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
No specific management functions are identified.
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: |
[FAU_WID_EXT.2 Wireless Intrusion Detection - Passive Information Flow Monitoring, or FAU_WID_EXT.3 Wireless Intrusion Detection - Spectrum Monitoring] |
FAU_ANO_EXT.1, Anomaly-Based Intrusion Detection, requires the TSF to define how it determines anomalous network traffic that may be indicative of malicious activity.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FAU_IDS_EXT.1 Intrusion Detection System - Intrusion Detection Methods |
FAU_SIG_EXT.1, Signature-Based Intrusion Detection, requires the TSF to support the definition of traffic signatures that can be compared to observed network traffic for the purpose of identifying potential malicious activity.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FAU_IDS_EXT.1 Intrusion Detection System - Intrusion Detection Methods |
FAU_WIP_EXT.1, Wireless Intrusion Prevention, requires the TSF to support reactive behavior if potential malicious traffic is observed to be originating from or targeted to a particular network asset.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FAU_WID_EXT.1 Wireless Intrusion Detection - Malicious Environmental Objects |
This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP-Module. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.3 Dependencies between components.
This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP-Module provides evidence that these controls are present and have been evaluated.
Requirement | Rationale for Satisfaction |
FDP_IFF.1 - Information Flow Control Functions | CC Part 2 specifies FDP_IFF.1 as a dependency of FDP_IFC.1 because the TSF must define the information flow control SFP rules associated with a given SFP. This dependency is implicitly addressed through FAU_WID_EXT.2, which defines the rules for the 802.11 monitoring SFP defined by FDP_IFC.1. |
Requirement | Description | Distributed TOE SFR Allocation |
FAU_ANO_EXT.1 | Anomaly-Based Intrusion Detection | Feature Dependent |
FAU_ARP.1 | Security Alarms | One |
FAU_ARP_EXT.1 | Security Alarm Filtering | One |
FAU_GEN.1/WIDS | Audit Data Generation (WIDS) | Feature Dependent |
FAU_IDS_EXT.1 | Intrusion Detection System - Intrusion Detection Methods | Feature Dependent |
FAU_INV_EXT.1 | Environmental Inventory | Feature Dependent |
FAU_INV_EXT.2 | Characteristics of Environmental Objects | Feature Dependent |
FAU_INV_EXT.3 | Location of Environmental Objects | Feature Dependent |
FAU_INV_EXT.4 | Detection of Unauthorized Connections | Feature Dependent |
FAU_INV_EXT.5 | Signal Library | Feature Dependent |
FAU_MAC_EXT.1 | Device Impersonation | Feature Dependent |
FAU_RPT_EXT.1 | Intrusion Detection System - Reporting Methods | Feature Dependent |
FAU_SAA.1 | Potential Violation Analysis | Feature Dependent |
FAU_SIG_EXT.1 | Signature-Based Intrusion Detection | Feature Dependent |
FAU_STG.1/PCAP | Protected Audit Event Storage (Packet Captures) | Feature Dependent |
FAU_STG.5/PCAP | Prevention of Audit Data Loss (Packet Captures) | Feature Dependent |
FAU_WID_EXT.1 | Wireless Intrusion Detection - Malicious Environmental Objects | Feature Dependent |
FAU_WID_EXT.2 | Wireless Intrusion Detection - Passive Information Flow Monitoring | Feature Dependent |
FAU_WID_EXT.3 | Wireless Intrusion Detection - Spectrum Monitoring | Feature Dependent |
FAU_WID_EXT.4 | Wireless Intrusion Detection - Wireless Spectrum Analysis | Feature Dependent |
FAU_WIP_EXT.1 | Wireless Intrusion Prevention | Feature Dependent |
FDP_IFC.1 | Subset Information Flow Control | Feature Dependent |
FMT_SMF.1/WIDS | Specification of Management Functions (WIDS) | Feature Dependent |
FPT_FLS.1/WIDS | Basic Internal TSF Data Transfer Protection | Feature Dependent |
Acronym | Meaning |
---|---|
AES | Advanced Encryption Standard |
AP | Access Point |
Base-PP | Base Protection Profile |
BSSID | Basic Service Set Identifier |
CC | Common Criteria |
CEM | Common Evaluation Methodology |
cPP | Collaborative Protection Profile |
DDoS | Distributed Denial of Service |
DHCP | Dynamic Host Configuration Protocol |
DoS | Denial of Service |
EUD | End User Device |
FP | Functional Package |
HTTPS | Hypertext Transfer Protocol Secure |
ICS | Internet Connection Sharing |
IPsec | Internet Protocol Security |
MAC | Media Access Control |
OE | Operational Environment |
OSI | Open Systems Interconnection |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
SAR | Security Assurance Requirement |
SF | Security Function |
SFP | Security Function Policy |
SFR | Security Functional Requirement |
SNMP | Simple Network Management Protocol |
SSH | Secure Shell |
SSID | Service Set Identifier |
ST | Security Target |
TKIP | Temporal Key Integrity Protocol |
TLS | Transport Layer Security |
TOE | Target of Evaluation |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |
WEP | Wired Equivalent Protocol |
WIDS | Wireless Intrusion Detection System |
WIPS | Wireless Intrusion Prevention System |
WLAN | Wireless Local Area Network |
WPA | WLAN Protected Access |
Identifier | Title |
---|---|
[CC] | Common Criteria for Information Technology Security Evaluation -
|
[CEM] | Common Methodology for Information Technology Security Evaluation -
|
[NDcPP] | collaborative Protection Profile for Network Devices, Version 4.0, March 23, 2020 Adjust date when published |
[NDcPP SD] | Supporting Document - Evaluation Activities for Network Device cPP, Version 4.0, December 2019 Adjust date when published |