Apple Ipad and Iphone Mobile Devices with Ios 12
Total Page:16
File Type:pdf, Size:1020Kb
Apple Inc. Apple iPad and iPhone Mobile Devices with iOS 12 Security Target PP_MD_V3.1 with EP_MDM_AGENT_V3.0, PP_WLAN_CLI_EP_V1.0, MOD_VPN_CLI_V2.1. Version 1.6 2019-03-12 VID: 10937 Prepared for: Prepared by: Apple Inc. atsec information security Corp. One Apple Park Way 9130 Jollyville Road, Suite 260 MS 927-1CPS Austin, TX 78759 Cupertino, CA 95014 www.atsec.com www.apple.com © 2019 Apple Inc. This document may be reproduced and distributed only in its original entirety without revision VID: 10937 Table of Contents Revision History ....................................................................................................................... 9 1 Security Target Introduction .......................................................................................... 11 1.1 Security Target Reference ............................................................................................... 11 1.2 TOE Reference .................................................................................................................. 11 1.3 TOE Overview .................................................................................................................... 11 1.4 TOE Description ................................................................................................................. 12 1.4.1 General information .............................................................................................. 12 1.4.2 Obtaining the mobile devices.............................................................................. 12 1.4.3 Obtaining software updates ................................................................................ 13 1.4.4 Supervising and configuring the mobile devices ............................................. 13 1.4.5 Mobile devices covered by this evaluation ....................................................... 13 1.5 TOE Architecture ............................................................................................................... 28 1.5.1 Physical Boundaries ............................................................................................. 29 1.5.2 Security Functions provided by the TOE .......................................................... 29 1.5.3 TOE Documentation ............................................................................................. 34 1.5.4 Other References ................................................................................................. 35 2 Conformance Claims ....................................................................................................... 36 2.1 CC Conformance ............................................................................................................... 36 2.2 Protection Profile (PP) Conformance ............................................................................. 36 2.2.1 Technical Decisions ............................................................................................. 36 2.3 Conformance Rationale .................................................................................................... 37 3 Security Problem Definition ........................................................................................... 38 3.1 Threats ................................................................................................................................ 38 3.2 Assumptions ....................................................................................................................... 41 3.3 Organizational Security Policies ...................................................................................... 42 4 Security Objectives.......................................................................................................... 43 4.1 Security Objectives for the TOE ...................................................................................... 43 4.2 Security Objectives for the TOE Environment .............................................................. 44 5 Extended Components Definition .................................................................................. 46 6 Security Functional Requirements ................................................................................ 47 6.1 Security Audit (FAU).......................................................................................................... 48 Agent Alerts (FAU_ALT) ............................................................................................................. 48 FAU_ALT_EXT.2 Extended: Agent Alerts ..................................................................... 48 Audit Data Generation (FAU_GEN).......................................................................................... 48 FAU_GEN.1(1) Audit Data Generation .......................................................................... 48 FAU_GEN.1(2) Audit Data Generation .......................................................................... 50 Security Audit Event Selection (FAU_SEL) ............................................................................. 52 FAU_SEL.1(2) Security Audit Event Selection ............................................................. 52 Security Audit Event Storage (FAU_STG) .............................................................................. 52 FAU_STG.1 Audit Storage Protection ............................................................................ 52 FAU_STG.4 Prevention of Audit Data Loss .................................................................. 52 6.2 Cryptographic Support (FCS) .......................................................................................... 53 Cryptographic Key Management (FCS_CKM)........................................................................ 53 FCS_CKM.1(1) Cryptographic Key Generation ............................................................ 53 Page 2 of 172 © 2019 Apple Inc. Version: 1.6 VID: 10937 FCS_CKM.1/WLAN Cryptographic Key Generation (Symmetric Keys for WPA2 Connections) ......................................................................................................... 53 FCS_CKM.1/VPN VPN Cryptographic Key Generation (IKE) .................................... 53 FCS_CKM.2(1) Cryptographic Key Establishment ...................................................... 53 FCS_CKM.2(2) Cryptographic Key Establishment (While device is locked) ........... 54 FCS_CKM.2/WLAN WLAN Cryptographic Key Distribution (GTK) ........................... 54 FCS_CKM_EXT.1 Extended: Cryptographic Key Support (REK) ............................. 54 FCS_CKM_EXT.2 Extended: Cryptographic Key Random Generation ................... 54 FCS_CKM_EXT.3 Extended: Cryptographic Key Generation.................................... 54 FCS_CKM_EXT.4 Extended: Key Destruction ............................................................. 55 FCS_CKM_EXT.5 Extended: TSF Wipe........................................................................ 55 FCS_CKM_EXT.6 Extended: Salt Generation.............................................................. 55 FCS_CKM_EXT.7 Extended: Cryptographic Key Support (REK) ............................. 56 Cryptographic Operations (FCS_COP).................................................................................... 57 FCS_COP.1(1) Confidentiality Algorithms ..................................................................... 57 FCS_COP.1(2) Hashing Algorithms ............................................................................... 57 FCS_COP.1(3) Signature Algorithms ............................................................................. 57 FCS_COP.1(4) Keyed Hash Algorithms ........................................................................ 57 FCS_COP.1(5) Password-Based Key Derivation Functions ...................................... 57 HTTPS Protocol (FCS_HTTPS) ................................................................................................ 58 FCS_HTTPS_EXT.1 Extended: HTTPS Protocol ........................................................ 58 IPsec Protocol (FCS_IPSEC) .................................................................................................... 58 FCS_IPSEC_EXT.1 Extended: IPsec ............................................................................ 58 Initialization Vector Generation (FCS_IV)................................................................................ 59 FCS_IV_EXT.1 Extended: Initialization Vector Generation ........................................ 59 Random Bit Generation (FCS_RBG) ....................................................................................... 60 FCS_RBG_EXT.1(Kernel and User space) Extended: Cryptographic Operation (Random Bit Generation) .................................................................................... 60 FCS_RBG_EXT.1(SEP) Extended: Cryptographic Operation (Random Bit Generation) ............................................................................................................ 60 Cryptographic Algorithm Services (FCS_SRV) ...................................................................... 60 FCS_SRV_EXT.1 Extended: Cryptographic Algorithm Services............................... 60 Cryptographic Key Storage (FCS_STG).................................................................................. 61 FCS_STG_EXT.1 Extended: Secure Key Storage ...................................................... 61 FCS_STG_EXT.2 Extended: Encrypted Cryptographic Key Storage ......................