Certification Report Certificate Number: 2010/65
Total Page:16
File Type:pdf, Size:1020Kb
Australasian Information Security Evaluation Program Certification Report Certificate Number: 2010/65 5 Feb 2010 Version 1.0 Commonwealth of Australia 2010. Reproduction is authorised provided that the report is copied in its entirety. 5 Feb 2010 Version 1.0 Page i Amendment Record Version Date Description 1.0 5/02/2010 Public release. 5 Feb 2010 Version 1.0 Page ii Executive Summary 1 Windows Mobile 6.5 is a compact operating system for use on Smartphones enabling users to extend their corporate Windows desktop to mobile devices in a secure manner. Windows Mobile 6.5 is the Target of Evaluation (TOE). 2 The core functionality of the TOE includes: a) Device data protection. The TOE provides the capability to protect data at rest and in transit. b) Device application control. The TOE provides the capability to only permit trusted applications to be installed and executed on the Mobile Device. c) Secure enterprise access. The TOE provides the capability to securely connect the TOE to trusted Enterprise assets and facilitate data transfer. d) Device access control. The TOE has inbuilt security mechanisms that can be enabled to provide controlled access to the Mobile Device. e) Device security management. The TOE has configurable security policies that establish which actions a user or application may take. 3 This report describes the findings of the IT security evaluation of Microsoft Corporation’s Windows Mobile 6.5, to the Common Criteria (CC) evaluation assurance level EAL4 + ALC_FLR.1. The report concludes that the product has met the target assurance level of EAL4 + ALC_FLR.1 and that the evaluation was conducted in accordance with the relevant criteria and the requirements of the Australasian Information Security Evaluation Program (AISEP). The evaluation was performed by stratsec and was completed on 22 December 2009. 4 The TOE forms the software part of a software and hardware ‘composed evaluation’ product. The TOE evaluation technical report (ETR) (Ref [1])33 provides composition guidance for an Original Equipment Manufacturer (OEM) to meet in developing a hardware component for a composed product. 5 The OEM is the primary customer of the operating system. Microsoft provides the OEM with security updates and they are expected to pass them on to the end users. 6 The TOE User for the composed product is the end user. The end user administrator should ensure that the TOE is used in a composed product evaluated to EAL4+. 7 With regard to the secure operation of the TOE, the Australasian Certification Authority (ACA) recommends that: a) The administrator ensures that no applications are installed which will allow the user to change the security areas of the registry. 5 Feb 2010 Version 1.0 Page iii b) The administrator reviews the certificates in the Software Publishing Certificate (SPC), privileged and unprivileged certificate stores and removes any certificates that are not required. This action prevents unwanted, signed applications from being installed on the TOE. Note: some certificates are required for the TOE to operate, and the administrator should verify that the TOE can function without the certificates that are removed during provisioning. c) The administrator ensures that users are aware of the importance of running the TOE in the evaluated configuration. In the event of a device wipe, the mobile device should be returned to the administrator for reconfiguration. d) The administrator advises users against using the device as a primary data store. This is because data on the device and storage card is encrypted, and the keys stored on the device are destroyed during a device wipe. e) The administrator sets the lockout time on a device to reflect the criticality of the data stored on a mobile device. The reduction in lockout time reduces the chances of an attacker gaining access to a device in an unlocked state. f) The administrator sets mobile device policy to encrypt all areas of the device that may contain user data. g) The administrator ensures that the SD card and local device encryption is enabled prior to users placing any files into internal stores or SD media. h) The administrator lock down all unrequired physical ports on mobile devices to reduce the risk of vulnerabilities in OEM hardware and firmware. i) The administrator considers disabling the use of the Bluetooth radio in order to prevent exploitation of publically published weaknesses in the Bluetooth key pairing process. 8 This report includes information about the underlying security policies and architecture of the TOE, and information regarding the conduct of the evaluation. 9 It is the responsibility of the user to ensure that the TOE meets their requirements. For this reason, Australian Government users should refer to the ISM (Ref 33[3]) for guidance on Australian Government policy requirements. New Zealand Government users should consult the GCSB. It is recommended that a prospective user of the TOE refer to the Security Target at Ref [2],33 and read this Certification Report prior to deciding whether to use the product. 5 Feb 2010 Version 1.0 Page iv Table of Contents CHAPTER00H 1 - INTRODUCTION ........................................................................................................137H37H37H 1.11H1H1H OVERVIEW ................................................................................................................................138H38H38H 1.22H2H2H PURPOSE....................................................................................................................................139H39H39H 1.33H3H3H IDENTIFICATION ........................................................................................................................140H40H40H CHAPTER4H4H4H 2 - TARGET OF EVALUATION.....................................................................................241H41H41H 2.15H5H5H OVERVIEW ................................................................................................................................242H42H42H 2.26H6H6H DESCRIPTION OF THE TOE ........................................................................................................243H43H43H 2.37H7H7H TOE ARCHITECTURE.................................................................................................................344H44H44H 2.48H8H8H CLARIFICATION OF SCOPE .........................................................................................................445H45H45H 2.4.19H9H9H Evaluated Functionality....................................................................................................446H46H46H 2.4.210H10H10H Non-evaluated Functionality ............................................................................................547H47H47H 2.4.311H11H11H TOE for Composition........................................................................................................648H48H48H 2.4.412H12H12H TOE User..........................................................................................................................649H49H49H 2.513H13H13H USAGE.......................................................................................................................................650H50H50H 2.5.114H14H14H Evaluated Configuration ..................................................................................................651H51H51H 2.5.215H15H15H Delivery procedures .........................................................................................................752H52H52H 2.5.316H16H16H Determining the Evaluated Configuration........................................................................953H53H53H 2.5.417H17H17H Documentation................................................................................................................1054H54H54H 2.5.518H18H18H Secure Usage ..................................................................................................................1055H55H55H CHAPTER19H19H19H 3 - EVALUATION ...........................................................................................................1156H56H56H 3.120H20H20H OVERVIEW ..............................................................................................................................1157H57H57H 3.221H21H21H EVALUATION PROCEDURES .....................................................................................................1158H58H58H 3.322H22H22H FUNCTIONAL TESTING.............................................................................................................1259H59H59H 3.423H23H23H PENETRATION TESTING ...........................................................................................................1260H60H60H CHAPTER24H24H24H 4 - CERTIFICATION......................................................................................................1261H61H61H 4.125H25H25H OVERVIEW ..............................................................................................................................1262H62H62H 4.226H26H26H CERTIFICATION RESULT ..........................................................................................................1363H63H63H 4.327H27H27H ASSURANCE LEVEL INFORMATION..........................................................................................1364H64H64H 4.428H28H28H RECOMMENDATIONS ...............................................................................................................1365H65H65H ANNEX29H29H29H A - REFERENCES AND ABBREVIATIONS....................................................................1566H66H66H