Validation Report for Ianywhere SQL Anywhere Studio
Total Page:16
File Type:pdf, Size:1020Kb
National Information Assurance Partnership ® TM Common Criteria Evaluation and Validation Scheme Validation Report iAnywhere Solutions, Inc – A Sybase Company Dublin, CA Adaptive Server Anywhere 9.0.1/9.0.2 Component of SQL Anywhere Studio 9 Report Number: CCEVS-VR-06-0018 Dated: 24 April 2006 Version: 1.0 National Institute of Standards and Technology National Security Agency Information Technology Laboratory Information Assurance Directorate 100 Bureau Drive 9800 Savage Road STE 6740 Gaithersburg, MD 20899 Fort George G. Meade, MD 20755-6740 CCEVS-VR-06-0018: Adaptive Server Anywhere 9.0.1/9.0.2 Validation Report, Version 1.0 24 April 2006 ACKNOWLEDGEMENTS Validation Team Mr. Daniel P. Faigin The Aerospace Corporation El Segundo, California The Validation Team also thanks Ms. Nicole Carlson, The Aerospace Corporation, for the work she performed when she was Lead Validator, and Mr. Kenneth Elliott for his work as Senior Validator. Common Criteria Testing Laboratory Ms. Tammy Compton, Lead Evaluator Mr. Mike Boberski Science Applications International Corporation Columbia, Maryland Much of the material in this report was extracted from evaluation material prepared by the CCTL. The CCTL team deserves credit for their hard work in developing that material. Many of the product descriptions in this report were extracted from the Adaptive Server Anywhere Security Target. ii CCEVS-VR-06-0018: Adaptive Server Anywhere 9.0.1/9.0.2 Validation Report, Version 1.0 24 April 2006 Table of Contents 1 Executive Summary.................................................................................................... 1 2 Identification............................................................................................................... 3 3 Security Policy............................................................................................................ 5 3.1 User data protection ............................................................................................ 5 3.1.1 Access Control Policies .............................................................................. 5 3.1.2 Users and Groups........................................................................................ 6 3.1.3 Ownership and DAC Permissions .............................................................. 6 3.1.4 Residual Information Protection................................................................. 6 3.2 Security audit ...................................................................................................... 7 3.3 Identification and authentication......................................................................... 8 3.4 Security management.......................................................................................... 9 3.5 Protection of the TSF.......................................................................................... 9 4 Assumptions.............................................................................................................. 10 4.1 Usage Assumptions........................................................................................... 10 4.2 Environmental Assumptions............................................................................. 10 4.3 Clarification of Scope ....................................................................................... 10 4.3.1 Overarching Policies................................................................................. 10 4.3.2 Threats Countered and Not Countered ..................................................... 11 5 Architectural Information ......................................................................................... 11 5.1 TOE Components.............................................................................................. 12 5.2 TOE Boundaries................................................................................................ 12 5.3 Architecture....................................................................................................... 13 5.3.1 Communications Subsystem..................................................................... 13 5.3.2 Query Execution Engine Subsystem......................................................... 13 5.3.3 DB Tools Subsystem ................................................................................ 14 5.4 IT Security Environment................................................................................... 15 6 Documentation.......................................................................................................... 15 6.1 Design documentation ...................................................................................... 15 6.2 Guidance documentation .................................................................................. 15 6.3 Configuration Management and Lifecycle documentation............................... 16 6.4 Delivery and Operation documentation............................................................ 16 6.5 Test documentation........................................................................................... 16 6.6 Vulnerability Assessment documentation......................................................... 16 6.7 Security Target.................................................................................................. 16 7 IT Product Testing .................................................................................................... 17 7.1 Developer Testing............................................................................................. 17 7.2 Evaluation Team Independent Testing ............................................................. 17 7.3 Evaluation Team Penetration Testing............................................................... 18 8 Evaluated Configuration ........................................................................................... 18 9 Results of the Evaluation .......................................................................................... 19 9.1 Evaluation of the Security Target (ASE).......................................................... 19 9.2 Evaluation of the Configuration Management Capabilities (ACM)................. 20 iii CCEVS-VR-06-0018: Adaptive Server Anywhere 9.0.1/9.0.2 Validation Report, Version 1.0 24 April 2006 9.3 Evaluation of the Delivery and Operation Documents (ADO)......................... 20 9.4 Evaluation of the Development (ADV) ............................................................ 20 9.5 Evaluation of the Guidance Documents (AGD) ............................................... 20 9.6 Evaluation of the Life Cycle Support Activities (ALC) ................................... 21 9.7 Evaluation of the Test Documentation and the Test Activity (ATE) ............... 21 9.8 Vulnerability Assessment Activity (AVA)....................................................... 21 9.9 Summary of Evaluation Results........................................................................ 22 10 Validator Comments/Recommendations .............................................................. 22 11 Annexes................................................................................................................. 23 12 Security Target...................................................................................................... 23 13 Glossary ................................................................................................................ 23 14 Bibliography ......................................................................................................... 26 iv CCEVS-VR-06-0018: Adaptive Server Anywhere 9.0.1/9.0.2 Validation Report, Version 1.0 24 April 2006 1 Executive Summary This report documents the assessment of the National Information Assurance Partnership (NIAP) validation team of the evaluation of the Adaptive Server Anywhere 9.0.1/9.0.2 component of the Sybase SQL Anywhere Studio 9 product.1 It presents the evaluation results, their justifications, and the conformance results. This Validation Report is not an endorsement of the Target of Evaluation by any agency of the U.S. government, and no warranty is either expressed or implied. The evaluation was performed by the Science Applications International Corporation (SAIC) Common Criteria Testing Laboratory (CCTL) in Columbia, Maryland, United States of America, and was completed in April 2006. The information in this report is largely derived from the Evaluation Technical Report (ETR) and associated test reports, all written by SAIC. The evaluation determined that the product is both Common Criteria Part 2 Extended and Part 3 Conformant, and meets the assurance requirements of Evaluation Assurance Level (EAL) 3 augmented with ALC_FLR.2. Adaptive Server Anywhere (ASA) is a relational database management system (RDBMS). According to the vendor, it was designed to support multiple operating systems as well as operate efficiently with limited memory, CPU power, and disk space. Non-security relevant capabilities of the product include full transaction processing, referential integrity, SQL stored procedures,2 triggers, row-level locking, automatic event scheduling and automatic recovery. Core features such as the query optimizer and the data caching mechanism are designed specifically to operate with minimal resources. At the same time, ASA contains the features needed to take advantage of workgroup servers, including support for many users, scalability over multiple CPUs, and advanced concurrency