Technical data

Brocade Communications Systems, Inc. Page 3 of 48
Table of Contents
1. SECURITY TARGET INTRODUCTION ........................................................................................................... 5
1.1 SECURITY TARGET, TOE AND CC IDENTIFICATION ........................................................................................ 5
1.2 CONFORMANCE CLAIMS ................................................................................................................................. 6
1.3 CONVENTIONS ................................................................................................................................................ 6
1.4 ACRONYMS AND TERMINOLOGY .................................................................................................................... 6
2. TOE DESCRIPTION .......................................................................................................................................... 8
2.1 TOE OVERVIEW ............................................................................................................................................. 9
2.2 TOE ARCHITECTURE .................................................................................................................................... 10
2.2.1 Physical Boundaries ............................................................................................................................ 11
2.2.2 Logical Boundaries .............................................................................................................................. 12
2.3 TOE DOCUMENTATION ................................................................................................................................ 14
3. SECURITY ENVIRONMENT ......................................................................................................................... 15
3.1 THREATS ...................................................................................................................................................... 15
3.2 ASSUMPTIONS .............................................................................................................................................. 15
4. SECURITY OBJECTIVES .............................................................................................................................. 16
4.1 SECURITY OBJECTIVES FOR THE TOE ........................................................................................................... 16
4.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT ........................................................................................... 16
5. IT SECURITY REQUIREMENTS .................................................................................................................. 17
5.1 TOE SECURITY FUNCTIONAL REQUIREMENTS ............................................................................................. 17
5.1.1 Security audit (FAU) ............................................................................................................................ 17
5.1.2 Cryptographic Support ........................................................................................................................ 18
5.1.3 User data protection (FDP) ................................................................................................................. 19
5.1.4 Identification and authentication (FIA) ............................................................................................... 20
5.1.5 Security management (FMT) ............................................................................................................... 21
5.1.6 Protection of the TSF (FPT) ................................................................................................................ 22
5.1.7 TOE access (FTA) ................................................................................................................................ 22
5.1.8 Trusted Path (FTP) .............................................................................................................................. 23
5.2 TOE SECURITY ASSURANCE REQUIREMENTS ............................................................................................... 23
5.2.1 Development (ADV) ............................................................................................................................. 23
5.2.2 Guidance documents (AGD) ................................................................................................................ 25
5.2.3 Life-cycle support (ALC) ..................................................................................................................... 25
5.2.4 Tests (ATE) .......................................................................................................................................... 27
5.2.5 Vulnerability assessment (AVA) ........................................................................................................... 28
6. TOE SUMMARY SPECIFICATION .............................................................................................................. 29
6.1 TOE SECURITY FUNCTIONS .......................................................................................................................... 29
6.1.1 Audit..................................................................................................................................................... 29
6.1.2 User data protection ............................................................................................................................ 30
6.1.2.1 User Data Encryption .......................................................................................................................... 32
6.1.2.1.1 Key Management System ................................................................................................................. 33
6.1.2.1.2 CryptoTarget Container .................................................................................................................. 34
6.1.3 Identification and authentication ......................................................................................................... 35
6.1.4 Security management ........................................................................................................................... 36
6.1.5 Protection of the TSF ........................................................................................................................... 37
6.1.6 TOE Access .......................................................................................................................................... 38
6.1.7 Trusted Path......................................................................................................................................... 39
7. PROTECTION PROFILE CLAIMS ............................................................................................................... 40
8. RATIONALE ..................................................................................................................................................... 41