Specifications

Brocade MLXand NetIron® Family Devices with Multi-Service IronWare R05.7.00
Security Target Version 1., July 15, 2014
Page 2 of 50
1. SECURITY TARGET INTRODUCTION ........................................................................................................ 4
1.1 SECURITY TARGET REFERENCE ...................................................................................................................... 5
1.2 TOE REFERENCE ............................................................................................................................................ 5
1.3 TOE OVERVIEW ............................................................................................................................................. 6
1.4 TOE DESCRIPTION ......................................................................................................................................... 6
1.4.1 TOE Architecture ................................................................................................................................... 7
1.4.2 TOE Documentation ............................................................................................................................ 10
2. CONFORMANCE CLAIMS ............................................................................................................................ 11
2.1 CONFORMANCE RATIONALE ......................................................................................................................... 11
3. SECURITY OBJECTIVES .............................................................................................................................. 12
3.1 SECURITY OBJECTIVES FOR THE TOE ........................................................................................................... 12
3.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT ........................................................................................... 12
4. EXTENDED COMPONENTS DEFINITION ................................................................................................ 14
5. SECURITY REQUIREMENTS ....................................................................................................................... 15
5.1 TOE SECURITY FUNCTIONAL REQUIREMENTS ............................................................................................. 15
5.1.1 Security Audit (FAU) ........................................................................................................................... 16
5.1.2 Cryptographic Support (FCS).............................................................................................................. 19
5.1.3 User Data Protection (FDP) ............................................................................................................... 26
5.1.4 Identification and Authentication (FIA) ............................................................................................... 26
5.1.5 Security management (FMT) ............................................................................................................... 28
5.1.6 Protection of the TSF (FPT) ................................................................................................................ 29
5.1.7 TOE access (FTA) ................................................................................................................................ 31
5.1.8 Trusted path/channels (FTP) ............................................................................................................... 32
5.2 TOE SECURITY ASSURANCE REQUIREMENTS ............................................................................................... 34
5.2.1 Development (ADV) ............................................................................................................................. 34
5.2.2 Guidance documents (AGD) ................................................................................................................ 35
5.2.3 Life-cycle support (ALC) ..................................................................................................................... 37
5.2.4 Tests (ATE) .......................................................................................................................................... 37
5.2.5 Vulnerability assessment (AVA) ........................................................................................................... 38
5.3 REQUIREMENT DEPENDENCY RATIONALE .................................................................................................... 39
6. TOE SUMMARY SPECIFICATION .............................................................................................................. 41
6.1 SECURITY AUDIT .......................................................................................................................................... 41
6.2 CRYPTOGRAPHIC SUPPORT ........................................................................................................................... 42
6.3 USER DATA PROTECTION .............................................................................................................................. 45
6.4 IDENTIFICATION AND AUTHENTICATION ....................................................................................................... 45
6.5 SECURITY MANAGEMENT ............................................................................................................................. 46
6.6 PROTECTION OF THE TSF ............................................................................................................................. 48
6.7 TOE ACCESS ................................................................................................................................................. 49
6.8 TRUSTED PATH/CHANNELS ........................................................................................................................... 49
LIST OF TABLES
Table 1 TOE Security Functional Components ...................................................................................................... 16
Table 2 Auditable Events .......................................................................................................................................... 18
Table 3 EAL 1 Assurance Components ................................................................................................................... 34
Table 4 Requirement Dependencies ......................................................................................................................... 40
Table 5 Cryptographic Functions ............................................................................................................................ 42
Table 6 NIST SP800-56B Conformance .................................................................................................................. 43
Table 7 Keys and CSPs ............................................................................................................................................. 44
Table 8 Security Related Configuration Commands .............................................................................................. 47