User guide

Aruba Networks Security Target
Page 61 of 67
#
NDPP
Source
Requirement
Assurance
Family
team’s test activities.
37.
FPT_SKP_
EXT.1
The evaluator shall examine the TSS to determine that it details how any pre-
shared keys, symmetric keys, and private keys are stored and that they are
unable to be viewed through an interface designed specifically for that purpose,
as outlined in the application note. If these values are not stored in plaintext, the
TSS shall describe how they are protected/obscured.
ASE_TSS
38.
FPT_APW
_EXT.1
The evaluator shall examine the TSS to determine that it details all
authentication data that are subject to this requirement, and the method used to
obscure the plaintext password data when stored. The TSS shall also detail
passwords are stored in such a way that they are unable to be viewed through
an interface designed specifically for that purpose, as outlined in the application
note.
ASE_TSS
39.
FPT_STM.
1
The evaluator shall examine the TSS to ensure that it lists each security function
that makes use of time. The TSS provides a description of how the time is
maintained and considered reliable in the context of each of the time related
functions.
The evaluator examines the operational guidance to ensure it instructs the
administrator how to set the time. If the TOE supports the use of an NTP server,
the operational guidance instructs how a communication path is established
between the TOE and the NTP server, and any configuration of the NTP client
on the TOE to support this communication.
Test 1: The evaluator uses the operational guide to set the time. The evaluator
shall then use an available interface to observe that the time was set correctly.
Test2: [conditional] If the TOE supports the use of an NTP server; the evaluator
shall use the operational guidance to configure the NTP client on the TOE, and
set up a communication path with the NTP server. The evaluator will observe
that the NTP server has set the time to what is expected. If the TOE supports
multiple cryptographic protocols for establishing a connection with the NTP
server, the evaluator shall perform this test using each supported protocol.
ASE_TSS
AGD_OPE
ATE_IND
40.
FPT_TUD_
EXT.1
Updates to the TOE either have a hash associated with them, or are signed by
an authorized source. If digital signatures are used, the definition of an
authorized source is contained in the TSS, along with a description of how the
certificates used by the update verification mechanism are contained on the
device. The evaluator ensures this information is contained in the TSS. The
evaluator also ensures that the TSS (or the operational guidance) describes how
the candidate updates are obtained; the processing associated with verifying the
digital signature or calculating the hash of the updates; and the actions that take
place for successful (hash or signature was verified) and unsuccessful (hash or
signature could not be verified) cases. The evaluator shall perform the following
tests:
Test 1: The evaluator performs the version verification activity to determine the
current version of the product. The evaluator obtains a legitimate update using
procedures described in the operational guidance and verifies that it is
successfully installed on the TOE. Then, the evaluator performs a subset of
other assurance activity tests to demonstrate that the update functions as
expected. After the update, the evaluator performs the version verification
ASE_TSS
AGD_OPE
ATE_IND