Specifications
81
satisfies the security functional requirements. In order to ensure the TOE's
design is correctly realized in its implementation, the appropriate level of
functional testing of the TOE's security mechanisms must be performed during
the evaluation of the TOE.
T.RESIDUAL_DATA
O.RESIDUAL_INFORMATION; OE.RESIDUAL_INFORMATION contribute
to the mitigation of this threat by ensuring that any residual data is removed
from network packet objects and ensuing that cryptographic material is not
accessible once it is no longer needed.
T.TSF_COMPROMISE
O.MANAGE mitigates this threat by restricting access to administrative
functions and management of TSF data to the administrator.
OE.MANAGE ensures that the TOE operational environment limits access to
management functions to the administrator.
O.RESIDUAL_INFORMATION and OE.RESIDUAL_INFORMATION
contributes to the mitigation of this threat by ensuring that any residual data is
removed from network packet objects and ensuring that cryptographic material
is not accessible once it is no longer needed.
O.SELF_PROTECTION requires that the TOE be able to protect itself from
tampering and that the security mechanisms in the TOE cannot be bypassed.
Without this objective, there could be no assurance that users could not view or
modify TSF data or TSF executables.
OE.SELF_PROTECTION ensures that the TOE operational environment will
have protection similar to that of the TOE.
T.UNATTENDED_ SESSION
The only sessions that are established with the TOE are anticipated to be
administrative sessions. Hence, this threat is restricted to administrative
sessions. The termination of general user sessions is expected to be handled by
the operational environment.
O.TOE_ACCESS helps to mitigate this threat by including mechanisms that
place controls on administrator sessions. Administrator sessions are dropped
after an administrator defined time period of inactivity. Dropping the connection
of a session (after the specified time period) reduces the risk of someone
accessing the machine where the session was established, thus gaining
unauthorized access to the session.