FIPS 140-2 Non-Proprietary Security Policy

Total Page:16

File Type:pdf, Size:1020Kb

FIPS 140-2 Non-Proprietary Security Policy Citrix Systems, Inc. Citrix ADC VPX Software Version: 12.1.51.152 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.12 Prepared for: Prepared by: Citrix Systems, Inc. Corsec Security, Inc. 851 Cypress Creek Road 13921 Park Center Road, Suite 460 Fort Lauderdale, FL 33309 Herndon, VA 20171 United States of America United States of America Phone: +1 954 267 3000 Phone: +1 703 267 6050 www.citrix.com www.corsec.com FIPS 140-2 Non-Proprietary Security Policy, Version 0.12 September 30, 2020 Table of Contents 1. Introduction ..........................................................................................................................................4 1.1 Purpose .....................................................................................................................................................4 1.2 References ................................................................................................................................................4 1.3 Document Organization ...........................................................................................................................4 2. Citrix ADC VPX .......................................................................................................................................5 2.1 Overview ...................................................................................................................................................5 2.2 Module Specification ................................................................................................................................6 2.2.1 Physical Cryptographic Boundary ............................................................................................. 11 2.2.2 Logical Cryptographic Boundary ............................................................................................... 13 2.3 Module Interfaces ................................................................................................................................. 13 2.4 Roles and Services ................................................................................................................................. 14 2.4.1 Authorized Roles ...................................................................................................................... 14 2.4.2 Operator Services ..................................................................................................................... 14 2.4.3 Additional Services ................................................................................................................... 21 2.5 Physical Security .................................................................................................................................... 23 2.6 Operational Environment ...................................................................................................................... 23 2.7 Cryptographic Key Management ........................................................................................................... 25 2.8 EMI / EMC .............................................................................................................................................. 34 2.9 Self-Tests ............................................................................................................................................... 34 2.9.1 Power-Up Self-Tests ................................................................................................................. 34 2.9.2 Conditional Self-Tests ............................................................................................................... 35 2.9.3 Critical Functions Self-Tests ...................................................................................................... 35 2.9.4 Self-Test Failures ...................................................................................................................... 35 2.10 Mitigation of Other Attacks ................................................................................................................... 36 3. Secure Operation ................................................................................................................................. 38 3.1 Installation and Setup ............................................................................................................................ 38 3.1.1 Installation ................................................................................................................................ 38 3.1.2 General Configuration .............................................................................................................. 38 3.1.3 FIPS-Approved Mode Configuration and Status ....................................................................... 39 3.2 Crypto Officer Guidance ........................................................................................................................ 41 3.2.1 Management ............................................................................................................................ 41 3.2.2 On-Demand Self-Tests .............................................................................................................. 41 3.2.3 Zeroization ................................................................................................................................ 41 3.2.4 Monitoring Status ..................................................................................................................... 41 3.3 User Guidance ....................................................................................................................................... 42 3.4 Additional Guidance and Usage Policies ............................................................................................... 42 3.5 Non-FIPS-Approved Mode ..................................................................................................................... 43 4. Acronyms ............................................................................................................................................ 44 Citrix ADC VPX ©2020 Citrix Systems, Inc. This document may be freely reproduced and distributed whole and intact including this copyright notice. Page 2 of 47 FIPS 140-2 Non-Proprietary Security Policy, Version 0.12 September 30, 2020 List of Tables Table 1 – Security Level per FIPS 140-2 Section .........................................................................................................6 Table 2 – Algorithm Certificate Numbers (Citrix ADC CP Cryptographic Library v1) ..................................................8 Table 3 – Algorithm Certificate Numbers (Citrix ADC DP Cryptographic Library v1) .................................................9 Table 4 – CVL Certificate Numbers .......................................................................................................................... 10 Table 5 – Allowed Algorithm Implementations ....................................................................................................... 11 Table 6 – VPX Interface Mappings ........................................................................................................................... 14 Table 7 – Mapping of Module Services to Roles, CSPs, and Type of Access ........................................................... 15 Table 8 – Additional Services ................................................................................................................................... 21 Table 9 – Cryptographic Keys, Cryptographic Key Components, and CSPs ............................................................. 25 Table 10 – Acronyms ............................................................................................................................................... 44 List of Figures Figure 1 – Block Diagram of the Host Server ........................................................................................................... 12 Figure 2 – VPX Logical Cryptographic Boundary...................................................................................................... 13 Citrix ADC VPX ©2020 Citrix Systems, Inc. This document may be freely reproduced and distributed whole and intact including this copyright notice. Page 3 of 47 FIPS 140-2 Non-Proprietary Security Policy, Version 0.12 September 30, 2020 1. Introduction 1.1 Purpose This is a non-proprietary Cryptographic Module Security Policy for the Citrix ADC VPX from Citrix Systems, Inc. (hereafter referred to as Citrix). This Security Policy describes how the Citrix ADC VPX meets the security requirements of Federal Information Processing Standards (FIPS) Publication 140-2, which details the U.S.1 and Canadian government requirements for cryptographic modules. More information about the FIPS 140-2 standard and validation program is available on the Cryptographic Module Validation Program (CMVP) website, which is maintained by the National Institute of Standards and Technology (NIST) and the Canadian Centre for Cyber Security (CCCS). This document also describes how to run the module in a secure FIPS-Approved mode of operation. This policy was prepared as part of the Level 1 FIPS 140-2 validation of the module. The Citrix ADC VPX is referred to in this document as “VPX” or “the module”. 1.2 References This document deals only with operations and capabilities of the module in the technical terms of a
Recommended publications
  • Citrix ADC SDX 12.1
    Citrix ADC SDX 12.1 Citrix Product Documentation | docs.citrix.com September 21, 2021 Citrix ADC SDX 12.1 Contents Introduction 3 Release Notes 3 Getting Started with the Management Service User Interface 3 Data governance 9 Introduction to Citrix ADM service connect for Citrix ADC SDX appliances 11 Single bundle upgrade 14 Upgrading a Citrix ADC instance 17 Manage and Monitor the SDX appliance 19 Creating SDX Administrative Domains 25 Managing RAID Disk Allocation on 22XXX Series SDX Appliances 27 SDX Licensing Overview 31 SDX Resource Visualizer 34 Manage interfaces 35 Jumbo Frames on SDX Appliances 38 Configuring SNMP on SDX Appliances 52 Configuring Syslog Notifications 58 Configuring Mail Notifications 59 Configuring SMS Notifications 59 Monitoring and Managing the Real‑Time Status of Entities Configured on an SDX Appliance 60 Monitoring and Managing Events Generated on Citrix ADC instances 65 Call Home Support for Citrix ADC instances on an SDX Appliance 73 System Health Monitoring 75 Configuring System Notification Settings 79 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 Citrix ADC SDX 12.1 Configuring the Management Service 80 Configuring Authentication and Authorization Settings 84 Configuring the External Authentication Server 89 Configuring Link Aggregation from the Management Service 94 Configuring a Channel from the Management Service 95 Access Control Lists 96 Set up a cluster of Citrix ADC instances 102 Configuring Cluster Link Aggregation 104 Configuring SSL Ciphers to Securely Access the Management Service
    [Show full text]
  • Ensure the Secure, Reliable, Delivery of Citrix Workspace to Any User
    White Paper Ensure the Secure, Reliable, Delivery of Citrix Workspace to Any User, Over Any Network Citrix ADC improves the Citrix Virtual Apps and Desktops experience for both end users and IT administrators Citrix | Ensure the Secure, Reliable Delivery of Citrix Workspace 2 Application and desktop application traffic. Without end-to-end visibility, it is extremely difficult to troubleshoot performance virtualization have dramatically problems. Proponents of application and desktop improved end-user productivity virtualization need to overcome these challenges in order to protect and extend the gains they have and data security. They have made in simplifying the end-user experience, also simplified the work of IT increasing the reliability of application performance, strengthening security, and improving management administrators and decreased of IT resources. overall computing costs. Yet the Citrix ADC specifically addresses these challenges. flexibility businesses need to Citrix ADC brings together the capabilities of application ensure they are competitive means delivery controllers (ADCs) and secure remote access (in the case of this white paper, for access IT must now consider: to Citrix Workspace powered by Citrix Virtual Apps and Desktops). The goal of Citrix ADC is to ensure • How to ensure the security posture is extended to compliance to the endpoint by enabling the secure, the endpoint in order to maintain compliance. IT reliable delivery of applications and virtual desktops to must manage secure access across all the different any user, anywhere. This white paper provides a brief use cases while deploying applications securely to overview of Citrix ADC and how it addresses these users on any device, over any network.
    [Show full text]
  • The Definitive Guide to Selecting the Right ADC for the Digital Transformation Era
    The definitive guide to selecting the right ADC for the digital transformation era ↑ ← Pg. 2 | Pg. 4 → Back to contents Citrix.com | eBook | App attack 1 Content Introduction .........................................................................................................3 Digital transformation’s impact .....................................................................4 Harness the power of the Cloud ...................................................................5 Application architectures ................................................................................7 Provide protection .............................................................................................8 Provide flexibility ................................................................................................9 Choosing an ADC ............................................................................................. 10 Meet Citrix ADC ................................................................................................ 11 ↑ Back← Pg. to 2 contents | Pg. 4 → 2 Introduction It used to be that you would build out your datacenter with all the right considerations in place, purchasing equipment that was sized to meet the needs of your organization for today and the near term future. Change used to be merely planning for capacity upgrades or network expansion, or migrating to the latest application version—or more simply put: things we could measure, control and manage. With the advent of the cloud, the rise in cyber-based threats,
    [Show full text]
  • Safeguard Application Uptime and Ensure Consistent Performance
    Safeguard application uptime and ensure consistent performance How a software-first approach can streamline app delivery across your hybrid, multi, and AWS clouds. Contents Introduction 3 Delivery, performance, and availability 6 ADC in AWS Marketplace 8 Cloud adopters 10 Key benefits and features 12 Marketplace advantage 14 Conclusion 16 Citrix | Safeguard application uptime and ensure consistent performance 2 Expectations for application delivery are on the rise. In today’s highly complex, distributed, • Imbalanced distribution of workloads hybrid-multi-cloud and multi-device world, across workers/partners/contractors organizations are feeling the impacts to the scattered around the globe user experience, and potential risks and loss • Cloud sprawl brought on by of control for IT. Users expect the applications and content moving applications they rely on every day to between on-premises and the cloud function without error, and deliver the and between clouds information they need on demand, around the clock wherever they are. • Employees accessing applications from multiple endpoints Scaling your workloads to the cloud helps your organization remain agile and • Lack of centralized visibility, data-driven. But even as you gain management, and control of infrastructure on demand, cloud adoption dispersed applications and the changing hybrid and multi-cloud landscapes bring business challenges, • Inability to effectively troubleshoot including: application performance and security issues that come up, as well as enforce • The need to rapidly
    [Show full text]
  • Citrix Application Delivery Management
    White Paper Citrix Application Delivery Management Simplify operations, gain insight and improve troubleshooting of application delivery infrastructure Citrix | Citrix Application Delivery Management 2 New applications come quickly and application Citrix Application delivery infrastructure is constantly changing. Delivery Management For all the potential benefits that cloud provides, including agility, scalability, security, and cost savings, Simplify operations, gain insight and the truth remains that it can be difficult or impossible to get visibility into your workloads—let alone effectively improve troubleshooting of application manage them—when you are running applications delivery infrastructure across cloud and on-premises. There is a desperate need to unify application delivery consistently across all environments. This is the only Cloud is transforming way to achieve the desired outcome of “define once and application delivery deploy everywhere” that will help business reach the speed and agility it needs to transform. Applications are at the heart of the modern business. They control everything that happens in the business. We effectively live in an application economy and the Citrix Application Delivery application is synonymous with productivity, growth strategy and user experience. Management (ADM): A single pane Users are changing the way that applications are of glass for end-to-end Application consumed. Customers want the application and data Delivery Management across hybrid delivered to them when it is convenient. They want it on the device they choose and they want it fast. This multi-cloud environments is driving the importance of customer experience and An effective Application Delivery Management system hence the importance of application delivery. must do more than provide monitoring of application delivery controllers (ADCs).
    [Show full text]
  • Hybrid Multi-Cloud Networking That Delivers a Better Application Experience 2
    Hybrid multi-cloud networking that delivers a better • application experience • Hybrid multi-cloud networking solutions from Citrix deliver connectivity, performance, security, and management for all applications,• on-premises and on Google Cloud Platform. • • Application performance and delivery have changed. Should your network change too? Cloud is changing the fundamentals of how IT teams deliver applications and manage their performance. Applications are increasingly deployed farther from users, crossing networks outside of IT’s direct control. Instead of enterprise data centers, many apps now reside in public and hybrid cloud environments. There are even new breeds of applications, built upon microservices and containers. Today, IT needs modern solutions that: ● Extend on-premises networks, apps, and infrastructure resources to the cloud. ● Maintain high levels of performance, user experience, and security across all applications, including microservices based apps. ● Sustain operational consistency across on-premises and cloud environments. ● Move away from the expense, complexity, and poor performance of traditional networking methods. These solutions are available for apps running on Google Cloud Platform (GCP) through the alliance of Citrix and Google Cloud. ● 90 percent of business innovation will depend on public cloud services by 20221 “We can help customers with their ● 124 SaaS applications cloud transformations by enabling on average are in use in 1 them to access and run the apps their an enterprise businesses depend on
    [Show full text]
  • Citrix Application Delivery Management Service Data Governance Document
    CITRIX SYSTEMS, INC. Citrix Application Delivery Management Service Data Governance Document Sep 7, 2020 Page 0 Contents Abstract ........................................................................................................................................................... 2 ADM Service Overview .................................................................................................................................... 2 Customer Content ........................................................................................................................................... 2 Methods for data collection, storage, and transmission ................................................................................. 3 Logs ................................................................................................................................................................. 4 Secure access to Customer Content and Logs ................................................................................................. 4 Data retention policy for ADM Service ............................................................................................................ 4 Third-party services used in ADM Service ........................................................................................................ 5 References ....................................................................................................................................................... 5 Citrix Cloud Technical Security Overview ....................................................................................................
    [Show full text]
  • Delivering an Optimal Application Experience Across Hybrid and Multi-Cloud Infrastructures
    Solution Brief Delivering an optimal application experience across hybrid and multi-cloud infrastructures Work and grow the way you want to, with application delivery and security from Citrix and Google Cloud that’s simple, flexible, and secure Citrix App Delivery and Security with Google Cloud Platform 2 Application performance and • Reduce risk by securing applications, APIs, delivery have changed users, and networks to drive consistency and resiliency across an expanding Here’s how your network can keep pace attack service. Cloud changed the fundamentals of how your IT • Use packet-based path selection to steer team delivers applications and manages their traffic based on application requirements and performance. Rather than hosting applications real-time network conditions for branch and solely on-premises, many enterprises now remote sites. choose a hybrid cloud strategy where applications reside both on-premises and in Gain all of these advantages and more when you public cloud. By leveraging public cloud, run your apps on Google Cloud Platform (GCP) enterprises can take full advantage of modern with Citrix. application architectures that use microservices and containers to rapidly deploy and scale their applications. With this increased agility comes 90 percent of business innovation faster innovation and time to market. will depend on public cloud services by 2022.¹ Today, IT needs modern application delivery and security solutions that: • Deliver an unmatched application experience 124 SaaS applications are in use for your users with the best performance and in an enterprise, on average.¹ flexibility for SaaS, cloud, and virtual apps. • Provide enhanced visibility and control for IT, while simplifying observability 92 percent of reported and troubleshooting.
    [Show full text]
  • Secure Remote Access to Any Application from Anywhere, on Any Device
    Solution Brief Secure remote access to any application from anywhere, on any device At Citrix, we empower our customers to provide In addition to allowing access to corporate data contextual and secure access to applications deployed from managed devices, Citrix Secure Workspace on-premises, in the cloud, or delivered as SaaS. In Access provides security controls to protect user and addition, we also provide security controls like web corporate information even when accessed from filtering and web isolation for customers who want to BYO and unmanaged devices. With browser isolation control what users access on the Internet. Currently, technology, it helps users access applications in an we offer three choices to customers looking to isolated environment to protect applications from any implement secure access and single sign-on solutions malicious content on user devices. In addition, app for their applications, network and data. protection policies in Citrix Secure Workspace Access protect user and corporate information from being stolen by key logger and screen capturing malware. Citrix Secure Workspace Access This allows IT to let their users access corporate data from BYO and unmanaged devices; thus making life Citrix Secure Workspace Access offers a easier for both IT and end-users. comprehensive, zero trust approach that delivers secure and contextual access to all applications you need and provides an enhanced user experience while Citrix Workspace Essentials maintaining security control. It allows for consolidation of traditional security products like VPN, single sign-on Citrix Workspace Essentialsis a component of Citrix and browser isolation technologies with one solution. Secure Workspace Access that can be purchased This allows for a holistic security approach based on separately as well.
    [Show full text]
  • Citrix Application Delivery Management (Citrix ADM )Data Sheet
    Data Sheet Citrix Application Delivery Management Citrix Application Delivery Management (ADM) is an intuitive, comprehensive platform that enables automation, orchestration, management, and analytics for application delivery across hybrid multi-cloud environments. To help you deliver the best application experience and availability for both monolithic and microservices-based applications, Citrix ADM provides one holistic view with the ability to drill down on specific details for easier troubleshooting, faster resolution, and actionable insights. Applications Drive Business We effectively live in an application economy where applications are synonymous with business productivity, growth, and customer experience. To stay competitive, organizations must be able to innovate rapidly and scale to meet customer demand while also minimizing downtime to prevent productivity and revenue loss. Doing this effectively and efficiently requires a transformation in application design, application delivery, and the type of network services employed by applications. Application Delivery Needs to Adapt As hybrid multi-cloud becomes the standard for application deployment, application components become distributed across disparate environments, which leads to fragmentation. This fragmentation introduces a number of challenges for delivering applications and network services: • Inconsistent configuration resulting from time-consuming and error-prone processes • Lack of clear visibility and insight across all environments • Fragmented troubleshooting With
    [Show full text]
  • Netscaler White Paper: a Foundation for Next-Generation Datacenter
    White Paper Citrix ADC (formerly NetScaler ADC) – A Foundation for Next- Generation Datacenter and Cloud-Based Security citrix.com White Paper Citrix NetScaler The need for robust datacenter security has never been greater. Traditional challenges and concerns—including extensive regulatory requirements, the rise of targeted attacks, and the continuing erosion of perimeter-centric security models—are now being joined by the need to account for highly dynamic enterprise cloud architectures and flat networks with fewer, natural ‘choke points.’ Add the ever-present budgetary pressures to do more with less, and it becomes clear that the foundation for stronger security must be built using existing datacenter infrastructure. Citrix® NetScaler®, the best application delivery controller (ADC) for building enterprise cloud networks, is precisely such a solution. Already a strategic component in thousands of enterprise datacenters, NetScaler delivers an extensive portfolio of essential datacenter security capabilities. Moreover, it minimizes the need for enterprises to invest in a large number of expensive, standalone security solutions. NetScaler not only provides critically important application security, network/ infrastructure security, and identity and access management, but also supports a rich ecosystem of partner products to cover adjacent security domains. NetScaler Datacenter Security Capabilities Application Security • NetScaler Application Firewall • Data Loss Protection • Layer 7 Attack Protection Network/Infrastructure Security • No Compromise SSL • DNS Security • Layer 4 Attack Protection Identity and Access Management Security Fabric / Partner Ecosystem The net result is a strong foundation for next-generation datacenter and cloud-based security that is also cost effective. citrix.com 2 White Paper Citrix NetScaler NetScaler for application security Security practitioners are justifiably investing substantial time, effort, and money on application- layer security.
    [Show full text]
  • Citrix Cloud
    Citrix Cloud Citrix Product Documentation | docs.citrix.com September 27, 2021 Citrix Cloud Contents Citrix Cloud 3 Service Level Agreement 4 Secure Deployment Guide for the Citrix Cloud Platform 7 How to Get Help and Support 15 Third Party Notifications 30 Sign up for Citrix Cloud 30 Geographical Considerations 47 Verify your email for Citrix Cloud 55 Citrix Cloud Service Trials 56 Extend Citrix Cloud service subscriptions 59 System and Connectivity Requirements 62 Connect to Citrix Cloud 70 Citrix Cloud Connector 73 Citrix Cloud Connector Technical Details 75 Cloud Connector Proxy and Firewall Configuration 85 Cloud Connector Installation 87 Log Collection for Citrix Cloud Connector 96 Connector Appliance for Cloud Services 98 Connector updates 118 Identity and access management 122 Connect Active Directory to Citrix Cloud 125 Connect Azure Active Directory to Citrix Cloud 128 Azure Active Directory Permissions for Citrix Cloud 132 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 Citrix Cloud Connect an on‑premises Citrix Gateway as an identity provider to Citrix Cloud 138 Connect Okta as an identity provider to Citrix Cloud 146 Connect SAML as an identity provider to Citrix Cloud 151 Select a primary resource location 160 Licensing for Citrix Cloud 161 Monitor licenses and active usage for cloud services 163 Monitor licenses and active usage for Endpoint Management 167 Monitor bandwidth usage for Gateway service (Technical Preview) 172 Monitor licenses and active usage for Citrix Virtual Apps and Desktops service (User/Device)174
    [Show full text]