IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and Accessagent Fix Pack 22 Security Target
Total Page:16
File Type:pdf, Size:1020Kb
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target Version: 1.19 Status: Released Last Update: 2014-03-05 International Business Machines, Corporation IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target Trademarks IBM and the IBM logo are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. The following terms are trademarks of International Business Machines Corporation in the United States, other countries, or both: ● DB2® ● WebSphere® The following terms are trademarks of Oracle Corporation: ● Java® ● Oracle® The following terms are trademarks of Microsoft Corporation: ● Active Directory® ● SQL Server® ● Windows® ● Windows Server® Legal Notice This document is provided AS IS with no express or implied warranties. Use the information in this document at your own risk. This document may be reproduced or distributed in any form without prior permission provided the copyright notice is retained on all copies. Modified versions of this document may be freely distributed provided that they are clearly identified as such, and this copyright is included intact. Revision History Revision Date Author(s) Changes to Previous Revision 1.19 2014-03-05 Scott Chapman Initial ST. Version: 1.19 Page 2 of 46 Last update: 2014-03-05 Copyright © 2009 - 2014 by atsec information security and IBM International Business Machines, Corporation IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target Table of Contents 1 Introduction .................................................................................................... 7 1.1 Security Target Identification ......................................................................................... 7 1.2 TOE Identification .......................................................................................................... 7 1.3 TOE Type ....................................................................................................................... 7 1.4 TOE Overview ................................................................................................................ 7 1.4.1 Required non-TOE software .................................................................................. 7 1.4.2 Intended method of use ........................................................................................ 8 1.4.3 Major security features ......................................................................................... 8 1.5 TOE Description ............................................................................................................. 8 1.5.1 Introduction ........................................................................................................... 8 1.5.2 Architecture .......................................................................................................... 9 1.5.2.1 Communications ........................................................................................... 9 1.5.2.2 The IMS Server ........................................................................................... 10 1.5.2.3 AccessAgent ............................................................................................... 11 1.5.2.4 AccessAdmin .............................................................................................. 12 1.5.2.5 AccessAssistant .......................................................................................... 12 1.5.2.6 IMS Configuration Utility ............................................................................. 13 1.5.3 TOE boundaries ................................................................................................... 13 1.5.3.1 Physical ...................................................................................................... 13 1.5.3.2 Logical ........................................................................................................ 14 1.5.3.3 Evaluated configuration ............................................................................. 14 1.5.4 Security policy model .......................................................................................... 15 2 CC Conformance Claim ................................................................................... 16 3 Security Problem Definition ............................................................................ 17 3.1 Threat Environment ..................................................................................................... 17 3.1.1 Threats countered by the TOE ............................................................................ 17 3.2 Assumptions ................................................................................................................ 18 3.2.1 Environment of use of the TOE ........................................................................... 18 3.2.1.1 Physical ...................................................................................................... 18 3.2.1.2 Personnel .................................................................................................... 18 3.2.1.3 Logical ........................................................................................................ 18 3.3 Organizational Security Policies ................................................................................... 19 4 Security Objectives ........................................................................................ 20 4.1 Objectives for the TOE ................................................................................................. 20 4.2 Objectives for the Operational Environment ................................................................ 20 4.3 Security Objectives Rationale ...................................................................................... 21 4.3.1 Security objectives coverage .............................................................................. 21 4.3.2 Security objectives sufficiency ............................................................................ 22 5 Extended Components Definition .................................................................... 26 6 Security Requirements ................................................................................... 27 6.1 TOE Security Functional Requirements ........................................................................ 27 Version: 1.19 Page 3 of 46 Last update: 2014-03-05 Copyright © 2009 - 2014 by atsec information security and IBM International Business Machines, Corporation IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target 6.1.1 Security audit (FAU) ............................................................................................ 28 6.1.1.1 Audit data generation (FAU_GEN.1) .......................................................... 28 6.1.1.2 User identity association (FAU_GEN.2) ...................................................... 28 6.1.1.3 Audit review (FAU_SAR.1) .......................................................................... 28 6.1.1.4 Restricted audit review (FAU_SAR.2) ......................................................... 28 6.1.1.5 Protected audit trail storage (FAU_STG.1) ................................................. 29 6.1.2 User data protection (FDP) .................................................................................. 29 6.1.2.1 Subset access control (FDP_ACC.2) ........................................................... 29 6.1.2.2 Security attribute based access control (FDP_ACF.1) ................................ 30 6.1.3 Identification and authentication (FIA) ................................................................ 30 6.1.3.1 User attribute definition (FIA_ATD.1) ......................................................... 30 6.1.3.2 Verification of secrets (FIA_SOS.1) ............................................................ 30 6.1.3.3 User authentication before any action (FIA_UAU.2) ................................... 31 6.1.3.4 User identification before any action (FIA_UID.2) ...................................... 31 6.1.3.5 User-subject binding (FIA_USB.1) .............................................................. 31 6.1.4 Security management (FMT) ............................................................................... 31 6.1.4.1 Management of security attributes (FMT_MSA.1) ...................................... 31 6.1.4.2 Static attribute initialisation (FMT_MSA.3) ................................................. 32 6.1.4.3 Management of TSF data (FMT_MTD.1) ..................................................... 32 6.1.4.4 Specification of management functions (FMT_SMF.1) ............................... 32 6.1.4.5 Security roles (FMT_SMR.1) ....................................................................... 32 6.2 Security Functional Requirements Rationale ............................................................... 33 6.2.1 Security requirements coverage ......................................................................... 33 6.2.2 Security requirements sufficiency ....................................................................... 33 6.2.3 Security