Specifications
58
6.2.4 FAU_SAR.3 Selectable Audit Review
FAU_SAR.3.1 The TOE IT environment shall provide the ability to perform [searches] of audit data based
on event type, date, time, and/or [message contents].
6.2.5 FAU_STG.1 Protected audit trail storage
FAU_STG.1.1 The TOE IT environment shall protect the stored audit records from unauthorized deletion.
FAU_STG.1.2 The TOE IT environment shall be able to prevent unauthorized modifications to the audit
records in the audit trail.
6.2.6 FAU_STG.3 Action in case of possible audit data loss
FAU_STG.3.1 The TOE IT environment shall [immediately alert the administrator by displaying a message
at the local console,[none] if the audit trail exceeds an administrator-settable percentage of
storage capacity.
6.2.7 FAU_SEL.1(2) Selective Audit
FAU_SEL.1.1(2) The TOE IT environment shall be able to include or exclude auditable events from the set of
audited events based on the following attributes:
a) user identity;
b) [device interface, wireless client identity].
6.2.8 FDP_RIP.1(2) Subset Residual Information Protection
FDP_RIP.1.1(2) The TOE IT Environment shall ensure that any previous information content of a resource is
made unavailable upon the allocation of the resource to the following objects: network packet
objects.
6.2.9 FIA_AFL.1(2) Remote User Authentication failure handling
FIA_AFL.1.1(2) The TOE IT Environment shall detect when an administrator configurable positive integer
within [a non-zero positive integer] of unsuccessful authentication attempts occur related to
[remote users logging on to the WLAN access system].
FIA_AFL.1.2 (2) When the defined number of unsuccessful authentication attempts has been met or surpassed,
the TOE IT Environment shall prevent the remote user from authenticating until action is
taken by an administrator.
6.2.10 FIA_ATD.1(3) User attribute definition
FIA_ATD.1.1(3) The TOE IT environment shall maintain the following minimum list of security attributes
belonging to individual remotely authenticated users: [user ID, password, host MAC
address, X.509 certificates (for EAP-TLS), PAC (for EAP-FAST), smart card token (for
EAP-GCT), 802.11i session encryption keys].