Cohesity Dataplatform & Dataprotect Version 6.3.1E Security Target
Total Page:16
File Type:pdf, Size:1020Kb
Cohesity DataPlatform & DataProtect Version 6.3.1e Security Target Version 1.3 7 May 2020 Prepared for: 300 Park Ave Suite 1700 San Jose, CA 95110 Prepared By: Accredited Testing and Evaluation Labs 6841 Benjamin Franklin Drive Columbia, MD 21046 TABLE OF CONTENTS 1. INTRODUCTION ........................................................................................................................................... 1 1.1 SECURITY TARGET, TOE AND CC IDENTIFICATION...................................................................................... 1 1.2 CONFORMANCE CLAIMS ............................................................................................................................. 1 1.3 CONVENTIONS ........................................................................................................................................... 1 1.4 ABBREVIATIONS AND ACRONYMS ............................................................................................................... 2 2. TOE DESCRIPTION ...................................................................................................................................... 4 2.1 OVERVIEW ................................................................................................................................................. 4 2.2 ARCHITECTURE .......................................................................................................................................... 4 2.3 PHYSICAL BOUNDARIES ............................................................................................................................. 6 2.3.1 Physical TOE Components ................................................................................................................. 6 2.3.2 Operational Environment Components ............................................................................................... 6 2.3.3 Excluded from the TOE ...................................................................................................................... 7 2.4 LOGICAL BOUNDARIES ............................................................................................................................... 7 2.4.1 Security Audit .................................................................................................................................... 7 2.4.2 Cryptographic Support....................................................................................................................... 8 2.4.3 User Data Protection ......................................................................................................................... 8 2.4.4 Identification & Authentication .......................................................................................................... 8 2.4.5 Security Management ......................................................................................................................... 8 2.4.6 Protection of the TSF ......................................................................................................................... 9 2.4.7 Resource Utilization........................................................................................................................... 9 2.4.8 Trusted Path/Channels ....................................................................................................................... 9 2.5 CAPABILITIES PROVIDED BY THE OPERATIONAL ENVIRONMENT .................................................................. 9 2.6 TOE DOCUMENTATION .............................................................................................................................. 9 3. SECURITY PROBLEM DEFINITION ....................................................................................................... 10 3.1 ASSUMPTIONS .......................................................................................................................................... 10 3.2 THREATS ................................................................................................................................................. 10 4. SECURITY OBJECTIVES .......................................................................................................................... 11 4.1 SECURITY OBJECTIVES FOR THE TOE........................................................................................................ 11 4.2 SECURITY OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT .................................................................. 11 5. IT SECURITY REQUIREMENTS .............................................................................................................. 12 5.1 EXTENDED COMPONENTS DEFINITION ...................................................................................................... 12 5.1.1 Cryptographic Support (FCS) .......................................................................................................... 12 5.1.2 User Data Protection (FDP) ............................................................................................................ 14 5.1.3 Protection of the TSF (FPT) ............................................................................................................. 15 5.2 TOE SECURITY FUNCTIONAL REQUIREMENTS ........................................................................................... 16 5.2.1 Security Audit (FAU) ....................................................................................................................... 17 5.2.2 Cryptographic Support (FCS) .......................................................................................................... 18 5.2.3 User Data Protection (FDP) ............................................................................................................ 19 5.2.4 Identification and Authentication (FIA) ............................................................................................ 20 5.2.5 Security Management (FMT) ............................................................................................................ 21 5.2.6 Protection of the TSF (FPT) ............................................................................................................. 22 5.2.7 Resource Utilization (FRU) .............................................................................................................. 22 5.2.8 Trusted Path/Channels (FTP)........................................................................................................... 22 5.3 TOE SECURITY ASSURANCE REQUIREMENTS ............................................................................................ 22 5.3.1 Development (ADV) ......................................................................................................................... 23 5.3.2 Guidance Documents (AGD) ............................................................................................................ 24 5.3.3 Life-cycle Support (ALC).................................................................................................................. 25 5.3.4 Security Target Evaluation (ASE) ..................................................................................................... 26 Page i of ii 5.3.5 Tests (ATE) ...................................................................................................................................... 28 5.3.6 Vulnerability Assessment (AVA) ....................................................................................................... 29 6. TOE SUMMARY SPECIFICATION ........................................................................................................... 30 6.1 SECURITY AUDIT ..................................................................................................................................... 30 6.2 CRYPTOGRAPHIC SUPPORT ....................................................................................................................... 31 6.3 USER DATA PROTECTION ......................................................................................................................... 32 6.4 IDENTIFICATION AND AUTHENTICATION ................................................................................................... 35 6.5 SECURITY MANAGEMENT ......................................................................................................................... 36 6.6 PROTECTION OF THE TSF.......................................................................................................................... 38 6.7 RESOURCE UTILIZATION........................................................................................................................... 39 6.8 TRUSTED PATH/CHANNELS ...................................................................................................................... 39 7. RATIONALE ................................................................................................................................................ 41 7.1 SECURITY OBJECTIVES RATIONALE .......................................................................................................... 41 7.2 SECURITY FUNCTIONAL REQUIREMENTS RATIONALE ................................................................................ 44 7.3 SECURITY ASSURANCE REQUIREMENTS RATIONALE.................................................................................. 48 7.4 REQUIREMENT DEPENDENCY RATIONALE ................................................................................................