Specifications

Security Target Version 1.0 9/29/2014
2
1. SECURITY TARGET INTRODUCTION ........................................................................................................... 4
1.1 SECURITY TARGET, TOE AND CC IDENTIFICATION ........................................................................................ 4
1.2 CONFORMANCE CLAIMS ................................................................................................................................. 7
1.3 CONVENTIONS ................................................................................................................................................ 7
1.3.1 Acronyms ............................................................................................................................................... 7
2. TOE DESCRIPTION .......................................................................................................................................... 9
2.1 TOE OVERVIEW ........................................................................................................................................... 10
2.2 TOE ARCHITECTURE .................................................................................................................................... 10
2.2.1 Physical Boundaries ............................................................................................................................ 12
2.2.2 Logical Boundaries .............................................................................................................................. 13
2.3 TOE DOCUMENTATION ................................................................................................................................ 15
3. SECURITY PROBLEM DEFINITION .......................................................................................................... 17
3.1 ORGANIZATIONAL POLICIES ......................................................................................................................... 17
3.2 THREATS ...................................................................................................................................................... 17
3.3 ASSUMPTIONS .............................................................................................................................................. 18
4. SECURITY OBJECTIVES .............................................................................................................................. 19
4.1 SECURITY OBJECTIVES FOR THE TOE ........................................................................................................... 19
4.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT ........................................................................................... 20
5. IT SECURITY REQUIREMENTS .................................................................................................................. 21
5.1 EXTENDED REQUIREMENT DEFINITIONS ...................................................................................................... 21
5.2 TOE SECURITY FUNCTIONAL REQUIREMENTS ............................................................................................. 21
5.2.1 Security audit (FAU) ............................................................................................................................ 23
5.2.2 Cryptographic support (FCS) .............................................................................................................. 30
5.2.3 User data protection (FDP) ................................................................................................................. 42
5.2.4 Identification and authentication (FIA) ............................................................................................... 43
5.2.5 Security management (FMT) ............................................................................................................... 48
5.2.6 Protection of the TSF (FPT) ................................................................................................................ 50
5.2.7 Resource utilisation (FRU) .................................................................................................................. 52
5.2.8 TOE access (FTA) ................................................................................................................................ 52
5.2.9 Trusted path/channels (FTP) ............................................................................................................... 54
5.3 TOE SECURITY ASSURANCE REQUIREMENTS ............................................................................................... 55
5.3.1 Development (ADV) ............................................................................................................................. 56
5.3.2 Guidance documents (AGD) ................................................................................................................ 56
5.3.3 Life-cycle support (ALC) ..................................................................................................................... 58
5.3.4 Tests (ATE) .......................................................................................................................................... 58
5.3.5 Vulnerability assessment (AVA) ........................................................................................................... 59
6. TOE SUMMARY SPECIFICATION .............................................................................................................. 61
6.1 SECURITY AUDIT .......................................................................................................................................... 61
6.2 CRYPTOGRAPHIC SUPPORT ........................................................................................................................... 63
6.3 USER DATA PROTECTION .............................................................................................................................. 71
6.4 IDENTIFICATION AND AUTHENTICATION ....................................................................................................... 71
6.5 SECURITY MANAGEMENT ............................................................................................................................. 74
6.6 PROTECTION OF THE TSF ............................................................................................................................. 75
6.7 RESOURCE UTILIZATION ............................................................................................................................... 76
6.8 TOE ACCESS ................................................................................................................................................. 76
6.9 TRUSTED PATH/CHANNELS ........................................................................................................................... 77
7. PROTECTION PROFILE CLAIMS ............................................................................................................... 79
8. RATIONALE ..................................................................................................................................................... 80
8.1 SECURITY OBJECTIVES RATIONALE .............................................................................................................. 80