Installation guide
Motorola WS5100 Wireless Switch and RFS7000 RF Switch Security Target
Page 2 of 85
TABLE OF CONTENTS
SECTION PAGE
1 Introduction to the Security Target ....................................................................... 6
1.1 Security Target Identification.....................................................................................6
1.2 Security Target Overview ...........................................................................................6
1.3 Common Criteria Conformance.................................................................................6
1.4 Conventions................................................................................................................6
2 TOE Description...................................................................................................... 8
2.1 Overview......................................................................................................................8
2.2 TOE Hardware ...........................................................................................................10
2.3 Scope of Evaluation..................................................................................................10
2.4 IT Environment..........................................................................................................11
3 TOE Security Environment .................................................................................. 12
3.1 Secure Usage Assumptions.....................................................................................12
3.2 Threats to Security ...................................................................................................12
3.3 Organizational Security Policies..............................................................................14
4 Security Objectives .............................................................................................. 15
4.1 Security Objectives for the TOE ..............................................................................15
4.2 Security Objectives for the Environment ................................................................16
5 IT Security Requirements .................................................................................... 18
5.1 Strength of Function Claims ....................................................................................18
5.2 TOE Security Functional Requirements..................................................................18
5.2.1
Security Audit .......................................................................................................................... 20
5.2.1.1
FAU_GEN.1(1) Audit data generation .................................................................................... 20
5.2.1.2
FAU_GEN.2 User identity association .................................................................................... 23
5.2.1.3
FAU_SEL.1 Selective audit..................................................................................................... 23
5.2.1.4
FCS_BCM_EXP.1 Explicit: baseline cryptographic module ................................................... 23
5.2.1.5
FCS_CKM.1 Cryptographic key generation............................................................................ 23
5.2.1.6
FCS_CKM_EXP.2 Explicit: cryptographic key establishment................................................. 23
5.2.1.7
FCS_CKM.4 Cryptographic key destruction ........................................................................... 24
5.2.1.8
FCS_COP_EXP.1 Explicit: random number generation......................................................... 24
5.2.1.9
FCS_COP_EXP.2(1) Explicit: cryptographic operation .......................................................... 24
5.2.1.10
FCS_COP_EXP.2(2) Explicit: cryptographic operation .......................................................... 24
5.2.1.11
FDP_PUD_EXP.1 Protection of user data .............................................................................. 25
5.2.1.12
FDP_RIP.1(1) Subset residual information protection............................................................ 25
5.2.1.13
FIA_AFL.1(1) Administrator authentication failure handling ................................................... 25
5.2.1.14
FIA_ATD.1(1) Administrator attribute definition ...................................................................... 25
5.2.1.15
FIA_UAU.1 Timing of local authentication .............................................................................. 26
5.2.1.16
FIA_UAU_EXP.5(1) Explicit: multiple authentication mechanisms......................................... 26
5.2.1.17
FIA_UID.2 User identification before any action ..................................................................... 26