Installation guide

Motorola WS5100 Wireless Switch and RFS7000 RF Switch Security Target
Page 3 of 85
5.2.1.18
FIA_USB.1(1) User-subject binding. ....................................................................................... 26
5.2.1.19
FIA_USB.1(2) User-subject binding. ....................................................................................... 27
5.2.1.20
FMT_MOF.1(1) Management of cryptographic security functions behavior........................... 27
5.2.1.21
FMT_MOF.1(2) Management of audit security functions behavior......................................... 27
5.2.1.22
FMT_MOF.1(3) Management of authentication security functions behavior .......................... 28
5.2.1.23
FMT_MSA.2 Secure security attributes .................................................................................. 28
5.2.1.24
FMT_MTD.1(1) Management of Audit pre-selection data ...................................................... 28
5.2.1.25
FMT_MTD.1(2) Management of authentication data (administrator)...................................... 28
5.2.1.26
FMT_SMF.1(1) Specification of management functions (cryptographic function).................. 28
5.2.1.27
FMT_SMF.1(2) Specification of management functions (TOE audit record generation)........ 28
5.2.1.28
FMT_SMF.1(3) Specification of management functions (cryptographic key data)................. 29
5.2.1.29
FMT_SMR.1(1) Security roles................................................................................................. 29
5.2.1.30
FPT_RVM.1(1) Non-bypassability of the TOE Security Policy (TSP)..................................... 29
5.2.1.31
FPT_SEP.1(1) TSF domain separation .................................................................................. 29
5.2.1.32
FPT_STM_EXP.1 Reliable time stamps ................................................................................. 29
5.2.1.33
FPT_TST_EXP.1 TSF testing ................................................................................................. 29
5.2.1.34
FPT_TST_EXP.2 TSF testing of cryptographic modules........................................................ 30
5.2.1.35
FTA_SSL.3 TSF-initiated termination ..................................................................................... 30
5.2.1.36
FTA_TAB.1 Default TOE access banners .............................................................................. 30
5.2.1.37
FTP_ITC_EXP.1(1) Inter-TSF trusted channel ....................................................................... 30
5.2.1.38
FTP_TRP.1 Trusted path ........................................................................................................ 31
5.3 Security Requirements for the IT Environment. .....................................................31
5.3.1.1
FAU_GEN.1(2) Audit data generation .................................................................................... 32
5.3.1.2
FAU_SAR.1 Audit review ........................................................................................................ 34
5.3.1.3
FAU_SAR.2 Restricted audit review ....................................................................................... 34
5.3.1.4
FAU_SAR.3 Selectable audit review....................................................................................... 34
5.3.1.5
FAU_STG.1 Protected audit trail storage ............................................................................... 34
5.3.1.6
FAU_STG.3 Action in case of possible audit data loss........................................................... 35
5.3.1.7
FDP_RIP.1(2) Subset residual information protection............................................................ 35
5.3.1.8
FIA_AFL.1(2) Remote user authentication failure handling.................................................... 35
5.3.1.9
FIA_ATD.1(2) User attribute definition .................................................................................... 35
5.3.1.10
FIA_UAU_EXP.5(2) Remote authentication mechanisms...................................................... 35
5.3.1.11
FIA_UID.1 Timing of identification........................................................................................... 36
5.3.1.12
FMT_SMF.1(4) Specification of management functions (user identification and authentication)
36
5.3.1.13
FMT_SMF.1(5) Specification of management functions (time stamps).................................. 36
5.3.1.14
FMT_MOF.1(4) Management of security functions behavior ................................................. 36
5.3.1.15
FMT_MTD.1(3) Management of identification data (user)...................................................... 36
5.3.1.16
FMT_MTD.1(4) Management of authentication data (user) ................................................... 36
5.3.1.17
FMT_MTD.1(5) Management of time data.............................................................................. 37
5.3.1.18
FMT_SMR.1(2) Security roles................................................................................................. 37
5.3.1.19
FTP_ITC_EXP.1(2) Inter-TSF trusted channel ....................................................................... 37
5.3.1.20
FPT_RVM.1(2) Non-bypassability of the IT Environment Security Policy (TSP).................... 37
5.3.1.21
FPT_SEP.1(2) TSF domain separation .................................................................................. 37
5.3.1.22
FPT_STM.1 Reliable time stamps .......................................................................................... 37
5.4 TOE Security Assurance Requirements..................................................................38
6 TOE Summary Specification................................................................................ 40
6.1 TOE Security Functions ...........................................................................................40
6.1.1
Security Audit .......................................................................................................................... 40
6.1.2
Cryptographic Support ............................................................................................................ 41
6.1.3
User Data Protection ............................................................................................................... 41
6.1.4
Identification and Authentication ............................................................................................. 41
6.1.5
Security Management ............................................................................................................. 42