Apple Ios 9.3 PP MD V2.0 & PP MDM AGENT V2.0 Security Target
Total Page:16
File Type:pdf, Size:1020Kb
Apple Inc. Apple iOS 9.3 PP_MD_V2.0 & PP_MDM_AGENT_V2.0 Security Target Version 3.3 2016-09-29 VID: 10725 Prepared for: Apple Inc. 1 Infinite Loop Cupertino, CA 95014 www.apple.com Prepared by: atsec information security Corp. 9130 Jollyville Road, Suite 260 Austin, TX 78759 www.atsec.com © 2016 Apple Inc. This document may be reproduced and distributed only in its original entirety without revision Table of Contents Revision History 7 1. Security Target Introduction 10 1.1. Security Target Reference .............................................................................................................. 10 1.2. TOE Reference .............................................................................................................................. 10 1.3. TOE Overview ................................................................................................................................ 10 1.4. TOE Description ............................................................................................................................. 11 1.5. TOE Architecture ............................................................................................................................ 17 1.5.1. Physical Boundaries ................................................................................................................... 18 1.5.2. Security Functions provided by the TOE .................................................................................... 18 1.5.2.1. Cryptographic Support 18 1.5.2.2. User Data Protection 21 1.5.2.3. Identification and Authentication 21 1.5.2.4. Security Management 21 1.5.2.5. Protection of the TSF 21 1.5.2.6. TOE Access 22 1.5.2.7. Trusted Path/Channels 22 1.5.2.8. Audit 22 1.5.3. TOE Documentation ................................................................................................................... 22 1.5.4. Technical Decisions .................................................................................................................... 23 1.5.5. Other References ....................................................................................................................... 23 2. Conformance Claims 24 2.1. CC Conformance ........................................................................................................................... 24 2.2. Protection Profile (PP) Conformance ............................................................................................. 24 2.3. Conformance Rationale ................................................................................................................. 24 3. Security Problem Definition 25 3.1. Threats ........................................................................................................................................... 25 3.2. Assumptions ................................................................................................................................... 26 3.3. Organizational Security Policies..................................................................................................... 27 4. Security Objectives 28 4.1. Security Objectives for the TOE ..................................................................................................... 28 4.2. Security Objectives for the TOE Environment................................................................................ 30 5. Extended Components Definition 31 6. Security Functional Requirements 32 6.1. Security Audit (FAU) ....................................................................................................................... 32 6.1.1. Agent Alerts (FAU_ALT) ............................................................................................................. 32 6.2. Cryptographic Support (FCS) ......................................................................................................... 32 6.2.1. Cryptographic Key Management (FCS_CKM) ........................................................................... 32 6.2.1.1. Cryptographic Key Generation 32 6.2.1.2. Cryptographic Key Generation (WLAN) 33 6.2.1.3. Cryptographic Key Establishment 33 6.2.1.4. Cryptographic Key Distribution 33 6.2.1.5. Cryptographic Key Support (REK) 33 6.2.1.6. Cryptographic Data Encryption Keys 34 6.2.1.7. Cryptographic Key Encryption Keys 34 © 2016 Apple Inc. Version: 3.2 Page 2 of 94 6.2.1.8. Cryptographic Key Destruction 34 6.2.1.9. TSF Wipe 35 6.2.1.10. Cryptographic Salt Generation 35 6.2.2. Cryptographic Operations (FCS_COP) ...................................................................................... 35 6.2.2.1. Confidentiality Algorithms 35 6.2.2.2. Hashing Algorithms 35 6.2.2.3. Signature Algorithms 35 6.2.2.4. Keyed Hash Algorithms 36 6.2.2.5. Password-Based Key Derivation Functions 36 6.2.3. HTTPS Protocol (FCS_HTTPS) ................................................................................................. 36 6.2.4. Initialization Vector Generation (FCS_IV) .................................................................................. 36 6.2.5. Random Bit Generation (FCS_RBG) ......................................................................................... 36 6.2.6. Cryptographic Algorithm Services (FCS_SRV) .......................................................................... 37 6.2.7. Cryptographic Key Storage (FCS_STG) .................................................................................... 37 6.2.7.1. Secure Key Storage 37 6.2.7.2. Encryption of Stored Keys 38 6.2.7.3. Integrity of Stored Keys 38 6.2.7.4. Cryptographic Key Storage 38 6.2.8. TLS Client Protocol (FCS_TLSC) .............................................................................................. 38 6.2.8.1. EAP-TLS Client Protocol 38 6.2.8.2. TLS Client Protocol 39 6.3. User Data Protection (FDP) ........................................................................................................... 39 6.3.1. Access Control (FDP_ACF) ....................................................................................................... 39 6.3.2. Data-At-Rest Protection (FDP_DAR) ......................................................................................... 40 6.3.3. Subset Information Flow Control - VPN (FDP_IFC) ................................................................... 40 6.3.4. Certificate Data Storage (FDP_STG) ......................................................................................... 40 6.3.5. Inter-TSF User Data Protected Channel (FDP_UPC) ................................................................ 40 6.4. Identification and Authentication (FIA) ........................................................................................... 41 6.4.1. Authentication Failures (FIA_AFL) ............................................................................................. 41 6.4.2. Bluetooth Authorization and Authentication (FIA_BLT) .............................................................. 41 6.4.3. Enrollment of Mobile Device into Management (FIA_ENR) ....................................................... 41 6.4.4. Port Access Entity Authentication (FIA_PAE)............................................................................. 41 6.4.5. Password Management (FIA_PMG) .......................................................................................... 41 6.4.6. Authentication Throttling (FIA_TRT) .......................................................................................... 41 6.4.7. User Authentication (FIA_UAU) ................................................................................................. 42 6.4.7.1. Protected Authentication Feedback 42 6.4.7.2. Authentication for Cryptographic Operation 42 6.4.7.3. Timing of Authentication 42 6.4.7.4. Re-Authentication 42 6.4.8. X509 Certificates (FIA_X509) .................................................................................................... 42 6.4.8.1. Validation of Certificates 42 6.4.8.2. X509 Certificate Authentication 43 6.4.8.3. Request Validation of Certificates 43 6.5. Security Management (FMT) ......................................................................................................... 43 6.5.1. Management of Functions in TSF (FMT_MOF) ......................................................................... 43 6.5.2. Specification of Management Functions (FMT_SMF) ................................................................ 43 6.5.2.1. Specification of Management Functions 43 6.5.2.2. Specification of Remediation Actions 48 6.5.2.3. Specification of Management Functions 48 6.5.2.4. User Unenrollment Prevention 48 © 2016 Apple Inc. Version: 3.2 Page 3 of 94 6.6. Protection of the TSF (FPT) ........................................................................................................... 49 6.6.1. Anti-Exploitation Services (FPT_AEX) ....................................................................................... 49 6.6.1.1. Address-Space Layout Randomization 49 6.6.1.2. Memory Page Permissions 49 6.6.1.3. Overflow Protection 49 6.6.1.4. Domain Isolation 49 6.6.2. Key Storage (FPT_KST) ............................................................................................................ 49 6.6.2.1. Plaintext Key Storage 49 6.6.2.2. No Key Transmission 49 6.6.2.3. No Plaintext Key Export 50 6.6.3. Self-Test Notification (FPT_NOT) ............................................................................................... 50 6.6.4. Reliable Time