System information

Cisco Cat3K ST 6 June 2012
44
Assurance Class Components Components Description
DEVELOPMENT ADV_ARC.1 Security Architectural Description
ADV_FSP.2 Security-enforcing functional specification
ADV_TDS.1 Basic design
GUIDANCE DOCUMENTS AGD_OPE.1 Operational user guidance
AGD_PRE.1 Preparative User guidance
LIFE CYCLE SUPPORT ALC_CMC.2 Use of a CM system
ALC_CMS.2 Parts of the TOE CM coverage
ALC_DEL.1 Delivery procedures
ALC_DVS.1 Identification of security measures
ALC_FLR.2 Flaw Reporting Procedures
TESTS ATE_COV.1 Evidence coverage
ATE_FUN.1 Functional testing
ATE_IND.2 Independent testing – sample
VULNERABILITY
ASSESSMENT
AVA_VAN.2 Vulnerability analysis
5.5.2 Security Assurance Requirements Rationale
This Security Target claims conformance to EAL2 Augmented with ALC_DVS.1 and
ALC_FLR.2. This target was chosen to ensure that the TOE has a low to moderate level
of assurance in enforcing its security functions when instantiated in its intended
environment which imposes no restrictions on assumed activity on applicable networks.
Augmentation was chosen to demonstrate the security measures followed at the
developments sites and to address having flaw remediation procedures and correcting
security flaws as they are reported and to ensure that TOE users are aware of the
corrections and the fixes.
5.6 Assurance Measures
The TOE satisfies the identified assurance requirements. This section identifies the
Assurance Measures applied by Cisco to satisfy the assurance requirements. The table
below lists the details.
Table 13: Assurance Measures
Component How requirement will be met
ADV_ARC.1 The architecture description provides the justification how the security functional requirements
are enforced, how the security features (functions) cannot be bypassed, and how the TOE
protects itself from tampering by untrusted active entities. The architecture description also
identifies the system initialization components and the processing that occurs when the TOE is
brought into a secure state (e.g. transition form a down state to the initial secure state
(operational)).