Version | Date | Comment |
---|---|---|
0.5 | 2022-01-20 | Conversion to PP-Module; Updated to include WPA 3 and Wi-Fi 6. WPA 3 is required. WPA 2 can additionally be included in the ST. 256 bit keys are required. 128 and 192 bit keys can additionally be included in the ST. |
1.0 | 2022-03-31 | Initial Release |
2.0 | 2025-01-15 | Incorporation of NIAP TDs and CC:2022 changes |
A conformant TOE will claim conformance to a PP-Configuration that includes exactly one of the Base-PPs identified above, this PP-Module, and any of the PP-Modules or packages identified in Section 2.
These Base-PPs are valid because a WLAN Client is a part of either a commercial operating system that can be installed on a general-purpose computer or an operating system that runs on a purpose-built mobile device.
Assurance | Grounds for confidence that a TOE meets the SFRs [CC]. |
Base Protection Profile (Base-PP) | Protection Profile used as a basis to build a PP-Configuration. |
Collaborative Protection Profile (cPP) | A Protection Profile developed by international technical communities and approved by multiple schemes. |
Common Criteria (CC) | Common Criteria for Information Technology Security Evaluation (International Standard ISO/IEC 15408). |
Common Criteria Testing Laboratory | Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the NIAP Validation Body to conduct Common Criteria-based evaluations. |
Common Evaluation Methodology (CEM) | Common Evaluation Methodology for Information Technology Security Evaluation. |
Distributed TOE | A TOE composed of multiple components operating as a logical whole. |
Extended Package (EP) | A deprecated document form for collecting SFRs that implement a particular protocol, technology, or functionality. See Functional Packages. |
Functional Package (FP) | A document that collects SFRs for a particular protocol, technology, or functionality. |
Operational Environment (OE) | Hardware and software that are outside the TOE boundary that support the TOE functionality and security policy. |
Protection Profile (PP) | An implementation-independent set of security requirements for a category of products. |
Protection Profile Configuration (PP-Configuration) | A comprehensive set of security requirements for a product type that consists of at least one Base-PP and at least one PP-Module. |
Protection Profile Module (PP-Module) | An implementation-independent statement of security needs for a TOE type complementary to one or more Base-PPs. |
Security Assurance Requirement (SAR) | A requirement to assure the security of the TOE. |
Security Functional Requirement (SFR) | A requirement for security enforcement by the TOE. |
Security Target (ST) | A set of implementation-dependent security requirements for a specific product. |
Target of Evaluation (TOE) | The product under evaluation. |
TOE Security Functionality (TSF) | The security functionality of the product under evaluation. |
TOE Summary Specification (TSS) | A description of how a TOE satisfies the SFRs in an ST. |
Access Point (AP) | A device that provides the network interface that enables wireless client hosts to access a wired network. Once authenticated as trusted nodes on the wired infrastructure, the APs provide the encryption service on the wireless network between the wireless client and the radio frequency (RF) interface of the AP. |
Administrator | A user that has administrative privilege to configure the TOE. |
Authentication Credentials | The information the system uses to verify that the user or administrator is authorized to access the TOE or network. Credentials can exist in various forms, such as username/password or digital certificates. |
Authentication Server (AS) | A server on the wired network that receives authentication credentials from wireless clients and determines their validity. |
Critical Security Parameter (CSP) | Security related information, e.g. secret and private cryptographic keys, and authentication data such as passwords and Personal Identification Numbers (PINs), whose disclosure or modification can compromise the security of a cryptographic module. |
Entropy Source | A cryptographic function that provides a seed for a random number generator by accumulating the outputs from one or more noise sources. The functionality includes a measure of the minimum work required to guess a given output and tests to ensure that the noise sources are operating properly. |
Extensible Authentication Protocol (EAP) | An authentication framework, used in wireless networks, that uses Public Key Infrastructure (PKI) to authenticate both the authentication server and the wireless client. |
FIPS-Approved Cryptographic Function | A cryptographic operation that is specified for use by FIPS 140. |
IEEE 802.1X | A standard for port-based network access control that defines an authentication mechanism for WLAN Clients to attach to a wired network. |
A user that has not been granted the ability to use the TOE. |
This document specifies SFRs for a WLAN Client. The TOE defined by this PP-Module is a WLAN Client, a software component executing on a client machine (often referred to as a "remote access client") to control the use of a wireless networking interface on that machine. The TOE establishes a secure wireless tunnel between the client device and a WLAN Access System through which all data will traverse. The TOE will implement the same security functionality regardless of whether it is a component of a general-purpose operating system or of a mobile device.
A WLAN Client allows remote users to use client machines to establish wireless communication with a private network through a WLAN Access System. IP packets passing between the private network and a WLAN Client are encrypted. The WLAN Client protects the confidentiality and integrity of data in transit between itself and the private network, even though it traverses a wireless connection. The focus of the SFRs in this PP-Module is on the following fundamental aspects of a WLAN Client:
An organization deploying the TOE is expected to satisfy the organizational security policy listed below in addition to all organizational security policies defined by the claimed Base-PP.
This document does not define any additional OSPs.Assumption or OSP | Security Objectives | Rationale |
A.NO_TOE_BYPASS | OE.NO_TOE_BYPASS | The operational environment objective OE.NO_TOE_BYPASS is realized through A.NO_TOE_BYPASS. |
A.TRUSTED_ADMIN | OE.TRUSTED_ADMIN | The Operational Environment objective OE.TRUSTED ADMIN is realized through A.TRUSTED_ADMIN. |
Requirement | Auditable Events | Additional Audit Record Contents |
---|---|---|
FAU_GEN.1/WLAN | ||
No events specified | N/A | |
FCS_CKM.1/WPA | ||
No events specified | N/A | |
FCS_CKM.2/WLAN | ||
No events specified | N/A | |
FCS_WPA_EXT.1 | ||
No events specified | N/A | |
FIA_PAE_EXT.1 | ||
No events specified | N/A | |
FIA_X509_EXT.1/WLAN | ||
No events specified | N/A | |
FIA_X509_EXT.2/WLAN | ||
No events specified | N/A | |
FIA_X509_EXT.6 | ||
Attempts to load certificates. | No additional information | |
Attempts to revoke certificates. | No additional information | |
FMT_SMF.1/WLAN | ||
No events specified | N/A | |
FPT_TST_EXT.3/WLAN | ||
Execution of this set of TSF self-tests. | No additional information | |
[selection: Detected integrity violation, None] | [selection: The TSF binary file that caused the integrity violation, No additional information] | |
FTA_WSE_EXT.1 | ||
All attempts to connect to access points. | ||
FTP_ITC.1/WLAN | ||
All attempts to establish a trusted channel. | Identification of the non-TOE endpoint of the channel. |
If auditing for the WLAN Client cannot be controlled separately from its underlying platform, the "Startup and shutdown of the audit functions" event defined in each Base-PP is sufficient to address that event for this iteration of the SFR.
Auditable events for selection-based SFRs are found in Table 11. If the TOE does not claim a particular selection-based SFR, it is not expected to generate any corresponding audit data for that SFR.
Table 2 includes auditable events for FPT_TST_EXT.3/WLAN. If the TOE does not perform its own self-tests (i.e., "TOE platform" is selected in FPT_TST_EXT.3.1/WLAN and FPT_TST_EXT.3.2/WLAN), the audit data for this event may also be generated by the TOE platform.
The cryptographic key derivation algorithm required by IEEE 802.11-2020 (Section 11.6.1.2) and verified in WPA2 certification is PRF-384, which uses the HMAC-SHA-1 function and outputs 384 bits. The use of GCMP was first defined in IEEE 802.11ac-2014 (Section 11.4.5) but subsequently integrated into 802.11-2020. This protocol requires a key derivation function (KDF) KDF based on HMAC-SHA-256 (for 128-bit symmetric keys) or HMAC-SHA384 (for 256-bit symmetric keys). This KDF outputs 704 bits.
This requirement applies only to the keys that are generated/derived for the communications between the access point and the client once the client has been authenticated. It refers to the derivation of the Pairwise Temporal Key (PTK) from the PMK, which is done using a random value generated by the RBG specified in this PP-Module, the HMAC function using SHA-1 as specified in this PP-Module, as well as other information.
This requirement covers the TOE's role as the supplicant in an 802.1X authentication exchange. If the exchange is completed successfully, the TOE will derive the PMK as a result of the EAP-TLS (or other appropriate EAP exchange) and perform the 4-way handshake with the wireless access system (authenticator) to begin 802.11 communications.
As indicated previously, there are at least two communication paths present during the exchange; one with the wireless access system and one with the authentication server that uses the wireless access system as a relay. The TOE establishes an EAP over LAN (EAPOL) connection with the wireless access system as specified in 802.1X-2020. The TOE and authentication server establish an EAP-TLS session (RFC 5216).
The point of performing 802.1X authentication is to gain access to the network (assuming the authentication was successful and that all 802.11 negotiations are performed successfully); in the terminology of 802.1X, this means the TOE will gain access to the "controlled port" maintained by the wireless access system.
# | Management Function | Impl | Admin | User |
WL-1 | configure security policy for each wireless network:
| MMandatory | MMandatory | OOptional/Conditional |
WL-2 | specify wireless networks (SSIDs) to which the TSF may connect | MMandatory | MMandatory | OOptional/Conditional |
WL-3 | enable/disable wireless network bridging capability (for example, bridging a connection between the WLAN and cellular radios to function as a hotspot) authenticated by [selection: pre-shared key, passcode, no authentication] | MMandatory | MMandatory | OOptional/Conditional |
WL-4 | enable/disable certificate revocation list checking | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
WL-5 | disable ad hoc wireless client-to-client connection capability | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
WL-6 | disable roaming capability | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
WL-7 | enable/disable IEEE 802.1X pre-authentication | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
WL-8 | loading X.509 certificates into the TOE | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
WL-9 | revoke X.509 certificates loaded into the TOE | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
WL-10 | enable/disable and configure PMK caching: | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
WL-11 | configure security policy for each wireless network: set wireless frequency band to [selection: 2.4 GHz, 5 GHz, 6 GHz] | OOptional/Conditional | OOptional/Conditional | OOptional/Conditional |
For installation, the WLAN Client relies on the underlying platform to authenticate the administrator to the client machine on which the TOE is installed.
For the function "configure the cryptoperiod for the established session keys," the unit of measure for configuring the cryptoperiod must be no greater than an hour. For example: units of measure in seconds, minutes and hours are acceptable and units of measure in days or greater are not acceptable.
The intent of the above requirement is to use the cryptographic protocols identified in the requirement to protect communications between the TOE and the Access Point.
The requirement implies that not only are communications protected when they are initially established, but also on resumption after an outage. It may be the case that some part of the TOE setup involves manually setting up tunnels to protect other communication, and if after an outage the TOE attempts to re-establish the communication automatically with (the necessary) manual intervention, there may be a window created where an attacker might be able to gain critical information or compromise a connection. The following tests are only intended to cover the WLAN communication channel (not other communication channels that may be available on the TOE such as mobile broadband).
The following rationale provides justification for each SFR for the TOE,
showing that the SFRs are suitable to address the specified threats:
Threat | Addressed by | Rationale |
---|---|---|
T.TSF_FAILURE | FPT_TST_EXT.3/WLAN | Mitigates the threat by performing self-tests to design if a TSF failure has occurred. |
T.UNAUTHORIZED_ACCESS | FCS_CKM.1/WPA | Mitigates the threat by performing secure key generation in support of protected wireless communications. |
FCS_CKM.2/WLAN | Mitigates the threat by performing secure key distribution in support of protected wireless communications. | |
FCS_TLSC_EXT.1/WLAN | Mitigates the threat by implementing EAP-TLS for secure authentication of wireless communications. | |
FCS_WPA_EXT.1 | Mitigates the threat by requiring the use of WPA for security. | |
FIA_PAE_EXT.1 | Mitigates the threat by implementing 802.1X for secure authentication of wireless communications. | |
FIA_X509_EXT.1/WLAN | Mitigates the threat by using X.509 for secure connectivity and non-repudiation of external IT entities. | |
FIA_X509_EXT.2/WLAN | Mitigates the threat by using X.509 for secure connectivity and non-repudiation of external IT entities. | |
FIA_X509_EXT.6 | Mitigates the threat by implementing a mechanism to establish a root of trust for X.509 certificates presented to the TOE. | |
FMT_SMF.1/WLAN | Mitigates the threat by defining the authorization that is required to access the management functions of the TOE. | |
FTA_WSE_EXT.1 | Mitigates the threat by operating in a default-deny posture for wireless networks so that the TOE will not communicate with unknown entities. | |
FTP_ITC.1/WLAN | Mitigates the threat by defining the trusted communications protocols the TSF implements to communicate with external entities. | |
FCS_TLSC_EXT.2/WLAN (selection-based) | Mitigates the threat by defining secure connection parameters for EAP-TLS. | |
T.UNDETECTED_ACTIONS | FAU_GEN.1/WLAN | Mitigates the threat by implementing a mechanism to detect actions performed on or by the TOE. |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.TSF_FAILURE | The Base-PP defines threats for local attacks and remote attacks, both of which could cause a failure of the TSF. This PP-Module adds a generic TSF failure threat in the event that the WLAN Client fails through unintended system behavior rather than a direct malicious attack. |
T.UNAUTHORIZED_ACCESS | The Base-PP defines threats for local attacks and remote attacks. The threat of unauthorized access to the WLAN Client is a specific threat that results from successful exploitation of one of these Base-PP threats. |
T.UNDETECTED_ACTIONS | The Base-PP defines threats for local attacks and remote attacks. It does not define a threat specifically for undetected actions but it does map the local attack and remote attack threats to a TOE objective for accountability. Therefore, the threat of undetected actions is consistent with the Base-PP because this is a subset of the threats defined in the Base-PP, or a mechanism to increase the likelihood that these threats will successfully be exploited. |
A.NO_TOE_BYPASS | This assumption relates to the deployment of the TOE in relation to the network resources that it interacts with. It does not enforce any restrictions on the TOE's deployment that are contrary to what the Base-PP requires. |
A.TRUSTED_ADMIN | The Base-PP defines A.PROPER_USER and A.PROPER_ADMIN assumptions that serve the same purpose as A.TRUSTED_ADMIN in this PP-Module. |
PP-Module OE Objective | Consistency Rationale |
---|---|
OE.NO_TOE_BYPASS | This objective relates to the deployment of the TOE in relation to the network resources that it interacts with. It does not enforce any restrictions on the TOE's deployment that are contrary to what the Base-PP requires. |
OE.TRUSTED_ADMIN | The Base-PP defines OE.PROPER_USER and OE.PROPER_ADMIN objectives that serve the same purpose as OE.TRUSTED_ADMIN in this PP-Module. |
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
This PP-Module does not modify any requirements when the GPOS PP is the base. | |
Additional SFRs | |
This PP-Module does not add any requirements when the GPOS PP is the base. | |
Mandatory SFRs | |
FAU_GEN.1/WLAN | The Base-PP defines its own auditing mechanism; this PP-Module can use that mechanism or implement its own to generate audit data for security-relevant events that are specific to this PP-Module. |
FCS_CKM.1/WPA | This SFR requires the TOE to generate cryptographic keys that are only used by the PP-Module's functionality. It invokes Base-PP functionality to do this in a manner that the Base-PP permits. |
FCS_CKM.2/WLAN | This SFR requires the TOE to perform a decryption operation using AES Key Wrap, which is a function that the Base-PP provides. |
FCS_TLSC_EXT.1/WLAN | This SFR requires the TOE to implement EAP-TLS; this protocol relies on the same cryptographic functionality that the Base-PP uses to implement TLS. |
FCS_WPA_EXT.1 | This SFR requires the TOE to specify the WPA versions it supports; this is functionality that is specific to the PP-Module and does not affect any Base-PP functionality. |
FIA_PAE_EXT.1 | This SFR defines the ability of the TOE to implement IEEE 802.1X. This behavior relates entirely to the PP-Module and does not affect the ability of the Base-PP to implement its security functionality. |
FIA_X509_EXT.1/WLAN | This SFR defines the TOE's X.509 certificate validation specifically when validating EAP-TLS certificates. The Base-PP also defines an iteration of this SFR but the PP-Module requires a separate iteration because EAP-TLS certificates have specific handling requirements that are not present in the Base-PP because the Base-PP does not define implementation of the EAP-TLS protocol. |
FIA_X509_EXT.2/WLAN | This SFR defines the TOE's use of X.509 certificates in EAP-TLS. This function uses the same certificate validation functionality that the Base-PP defines. |
FIA_X509_EXT.6 | This SFR defines behavior for implementing certificate storage. The SFR allows for the possibility that existing platform storage can be used, so it does not conflict with the Base-PP if that portion of the TOE already implements its own storage mechanism. |
FMT_SMF.1/WLAN | This SFR defines the management activities that are specific to this PP-Module. This behavior relates entirely to the PP-Module and does not affect the ability of the Base-PP to implement its security functionality. |
FPT_TST_EXT.3/WLAN | This SFR defines self-test behavior for the WLAN Client. This behavior relates entirely to the PP-Module and does not affect the ability of the Base-PP to implement its security functionality. |
FTA_WSE_EXT.1 | This SFR requires the TOE to restrict the wireless networks that it can connect to. This behavior relates entirely to the PP-Module and does not affect the ability of the Base-PP to implement its security functionality. |
FTP_ITC.1/WLAN | This SFR defines the protocols that the TOE uses for secure wireless communications. This behavior relates entirely to the PP-Module and does not affect the ability of the Base-PP to implement its security functionality. |
Optional SFRs | |
This PP-Module does not define any Optional requirements. | |
Objective SFRs | |
This PP-Module does not define any Objective requirements. | |
Implementation-dependent SFRs | |
This PP-Module does not define any Implementation-dependent requirements. | |
Selection-based SFRs | |
FCS_TLSC_EXT.2/WLAN | This SFR requires the TOE to validate a specific TLS extension when establishing EAP-TLS communications. This behavior relates entirely to the PP-Module and does not affect the ability of the Base-PP to implement its security functionality. |
PP-Module Threat, Assumption, OSP | Consistency Rationale |
---|---|
T.TSF_FAILURE | The Base-PP defines the T.FLAWAPP threat for the threat that application failures may pose to the device as a whole. The T.TSF_FAILURE threat from this PP-Module is a specific example of the T.FLAWAPP threat, though it relates to the WLAN Client as an intrinsic part of the mobile device rather than a third-party application installed on top of it. The Base-PP also defines the T.PERSISTENT threat, which is another specific case of TSF failure. |
T.UNAUTHORIZED_ACCESS | The Base-PP defines threats for network eavesdropping and network attacks. Exploiting either threat could allow an attacker to exploit the T.UNAUTHORIZED_ACCESS threat defined by this PP-Module. |
T.UNDETECTED_ACTIONS | The Base-PP defines threats for persistent access to the TOE and flawed applications on the TOE. It does not define a threat specifically for undetected actions but the threat of undetected actions defined by this PP-Module could increase the likelihood that the Base-PP threats can be successfully exploited. |
A.NO_TOE_BYPASS | This assumption relates to the deployment of the TOE in relation to the network resources that it interacts with. It does not enforce any restrictions on the TOE's deployment that are contrary to what the Base-PP requires. |
A.TRUSTED_ADMIN | The Base-PP defines the A.TRUSTED_ADMIN assumptions that expects administrators will configure the TOE correctly, which also implies they are non-malicious. |
PP-Module OE Objective | Consistency Rationale |
---|---|
OE.NO_TOE_BYPASS | This objective relates to the deployment of the TOE in relation to the network resources that it interacts with. It does not enforce any restrictions on the TOE's deployment that are contrary to what the Base-PP requires. |
OE.TRUSTED_ADMIN | The Base-PP defines the OE.CONFIG objective that expects administrators will configure the TOE correctly, which also implies they are non-malicious. |
PP-Module Requirement | Consistency Rationale |
---|---|
Modified SFRs | |
This PP-Module does not modify any requirements when the MDF PP is the base. | |
Additional SFRs | |
This PP-Module does not add any requirements when the MDF PP is the base. | |
Mandatory SFRs | |
FAU_GEN.1/WLAN | The Base-PP defines its own auditing mechanism; this PP-Module can use that mechanism or implement its own to generate audit data for security-relevant events that are specific to this PP-Module. |
FCS_CKM.1/WPA | This SFR requires the TOE to generate cryptographic keys that are only used by the PP-Module's functionality. It invokes Base-PP functionality to do this in a manner that the Base-PP permits.This SFR requires the TOE to generate cryptographic keys that are only used by the PP-Module's functionality. It invokes Base-PP functionality to do this in a manner that the Base-PP permits. |
FCS_CKM.2/WLAN | This SFR requires the TOE to perform a decryption operation using AES Key Wrap, which is a function that the Base-PP provides. |
FCS_TLSC_EXT.1/WLAN | This SFR requires the TOE to implement EAP-TLS; this protocol relies on the same cryptographic functionality that the Base-PP uses to implement TLS. |
FCS_WPA_EXT.1 | This SFR requires the TOE to specify the WPA versions it supports; this is functionality that is specific to the PP-Module and does not affect any Base-PP functionality. |
FIA_PAE_EXT.1 | This SFR defines the ability of the TOE to implement IEEE 802.1X. This behavior relates entirely to the PP-Module and does not affect the ability of the Base-PP to implement its security functionality. |
FIA_X509_EXT.1/WLAN | This SFR defines the TOE's X.509 certificate validation specifically when validating EAP-TLS certificates. The Base-PP also defines an iteration of this SFR but the PP-Module requires a separate iteration because EAP-TLS certificates have specific handling requirements that are not present in the Base-PP because the Base-PP does not define implementation of the EAP-TLS protocol. |
FIA_X509_EXT.2/WLAN | This SFR defines the TOE's use of X.509 certificates in EAP-TLS. This function uses the same certificate validation functionality that the Base-PP defines. |
FIA_X509_EXT.6 | This SFR defines behavior for implementing certificate storage. The SFR allows for the possibility that existing platform storage can be used, so it does not conflict with the Base-PP if that portion of the TOE already implements its own storage mechanism. |
FMT_SMF.1/WLAN | This SFR defines the management activities that are specific to this PP-Module. This behavior relates entirely to the PP-Module and does not affect the ability of the Base-PP to implement its security functionality. |
FPT_TST_EXT.3/WLAN | This SFR defines self-test behavior for the WLAN Client. This behavior relates entirely to the PP-Module and does not affect the ability of the Base-PP to implement its security functionality. |
FTA_WSE_EXT.1 | This SFR requires the TOE to restrict the wireless networks that it can connect to. This behavior relates entirely to the PP-Module and does not affect the ability of the Base-PP to implement its security functionality. |
FTP_ITC.1/WLAN | This SFR defines the protocols that the TOE uses for secure wireless communications. This behavior relates entirely to the PP-Module and does not affect the ability of the Base-PP to implement its security functionality. |
Optional SFRs | |
This PP-Module does not define any Optional requirements. | |
Objective SFRs | |
This PP-Module does not define any Objective requirements. | |
Implementation-dependent SFRs | |
This PP-Module does not define any Implementation-dependent requirements. | |
Selection-based SFRs | |
FCS_TLSC_EXT.2/WLAN | This SFR requires the TOE to validate a specific TLS extension when establishing EAP-TLS communications. This behavior relates entirely to the PP-Module and does not affect the ability of the Base-PP to implement its security functionality. |
This PP-Module does not define any Strictly Optional SFRs or SARs.
This PP-Module does not define any Objective SFRs.
This PP-Module does not define any Implementation-dependent SFRs.
Requirement | Auditable Events | Additional Audit Record Contents |
---|
Functional Class | Functional Components |
---|---|
Cryptographic Support (FCS) | FCS_WPA_EXT Supported WPA Versions |
Identification and Authentication (FIA) | FIA_PAE_EXT Port Access Entity Authentication FIA_X509_EXT X.509 Certificate Use and Management |
Protection of the TSF (FPT) | FPT_TST_EXT TSF Self-Test |
TOE Access (FTA) | FTA_WSE_EXT Wireless Network Access |
FCS_WPA_EXT.1, Supported WPA Versions, requires the TSF to support WPA3 at minimum, with optional support for WPA2.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation |
FIA_PAE_EXT.1, Port Access Entity Authentication, describes the ability of the TOE to act as a supplicant for 802.1X authentication.
The following actions could be considered for the management functions in FMT:
There are no auditable events foreseen.
FIA_X509_EXT.6, X.509 Certificate Storage and Management, requires the TOE to implement the ability to store X.509 certificates.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | No dependencies. |
FPT_TST_EXT.3, TSF Cryptographic Functionality Testing, requires the TOE or its platform to perform power on self-tests to verify its functionality and the integrity of its stored executable code.
No management functions are foreseen.
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FCS_COP.1 Cryptographic Operation |
FTA_WSE_EXT.1, Wireless Network Access, describes the ability of the TOE to apply administrative limits on the wireless networks that it can connect to.
The following actions could be considered for the management functions in FMT:
The following actions should be auditable if FAU_GEN Security audit data generation is included in the PP/ST:
Hierarchical to: | No other components. |
Dependencies to: | FMT_SMF.1 Specification of Management Functions |
This appendix lists requirements that should be considered satisfied by products successfully evaluated against this PP-Module. These requirements are not featured explicitly as SFRs and should not be included in the ST. They are not included as standalone SFRs because it would increase the time, cost, and complexity of evaluation. This approach is permitted by [CC] Part 1, 8.3 Dependencies between components.
This information benefits systems engineering activities which call for inclusion of particular security controls. Evaluation against the PP-Module provides evidence that these controls are present and have been evaluated.
This PP-Module has no implicitly satisfied requirements. All SFR dependencies are explicitly met either through SFRs defined by the PP-Module, SFRs inherited from the Base-PPs, or SFRs that are hierarchical to the listed dependency.Acronym | Meaning |
---|---|
AES | Advanced Encryption Standard |
AP | Access Point |
AS | Authentication Server |
Base-PP | Base Protection Profile |
CA | Certification Authority |
CBC | Cipher Block Chaining |
CC | Common Criteria |
CCEVS | Common Criteria Evaluation and Validation Scheme |
CCMP | Counter mode CBC-MAC Protocol |
CCTL | Common Criteria Test Laboratory |
CEM | Common Evaluation Methodology |
cPP | Collaborative Protection Profile |
CSP | Critical Security Parameter |
EAP | Extensible Authentication Protocol |
EAPOL | EAP over LAN |
EP | Extended Package |
FIPS | Federal Information Processing Standards |
FP | Functional Package |
FQDN | Fully Qualified Domain Name |
GPOS | General-Purpose Operating System |
GTK | Group Temporal Key |
HMAC | Hash-Based Message Authentication Code |
IEC | International Electrotechnical Commission |
IEEE | Institute of Electrical and Electronics Engineers |
ISO | International Organization for Standardization |
IT | Information Technology |
KDF | Key Derivation Function |
LAN | Local Area Network |
MAC | Message Authentication Code (cryptography) or Media Control Address (system property) |
MDF | Mobile Device Fundamentals |
NIAP | National Information Assurance Partnership |
NVLAP | National Voluntary Laboratory Accreditation Program |
OE | Operational Environment |
OSP | Organizational Security Policy |
PAE | Port Access Entity |
PIN | Personal Identification Number |
PKI | Public Key Infrastructure |
PMK | Pairwise Master Key |
PP | Protection Profile |
PP | Protection Profile |
PP-Configuration | Protection Profile Configuration |
PP-Module | Protection Profile Module |
PRF | Pseudo-Random Function |
PTK | Pairwise Temporal Key |
RBG | Random Bit Generator |
RF | Radio Frequency |
RFC | Request for Comment |
SAR | Security Assurance Requirement |
SFR | Security Functional Requirement |
SFR | Security Functional Requirement |
SHA | Secure Hash Algorithm |
SSID | Service Set Identifier |
ST | Security Target |
ST | Security Target |
TLS | Transport Layer Security |
TOE | Target of Evaluation |
TOE | Target of Evaluation |
TSF | TOE Security Function |
TSF | TOE Security Functionality |
TSFI | TSF Interface |
TSS | TOE Summary Specification |
TSS | TOE Summary Specification |
WLAN | Wireless Local Area Network |
WPA | Wireless Protected Access |