Teradata Database Security Target
Total Page:16
File Type:pdf, Size:1020Kb
Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. TERADATA DATABASE SECURITY TARGET TABLE OF CONTENTS 1. INTRODUCTION................................................................................................................. 1 1.1 SECURITY TARGET IDENTIFICATION AND OVERVIEW .......................................................... 1 1.2 TOE IDENTIFICATION .......................................................................................................... 1 1.3 COMMON CRITERIA CONFORMANCE.................................................................................... 2 2. TOE DESCRIPTION ........................................................................................................... 3 2.1 TOE OVERVIEW .................................................................................................................. 3 2.2 TOE ARCHITECTURE ........................................................................................................... 4 2.2.1 TOE Physical Boundaries....................................................................................... 5 2.2.2 TOE Logical Boundaries ........................................................................................ 6 2.3 TOE DOCUMENTATION........................................................................................................ 7 3. TOE SECURITY ENVIRONMENT................................................................................... 9 3.1 ASSUMPTIONS ...................................................................................................................... 9 3.2 THREATS............................................................................................................................ 10 3.3 ORGANIZATIONAL SECURITY POLICIES.............................................................................. 11 4. SECURITY OBJECTIVES ............................................................................................... 12 4.1 SECURITY OBJECTIVES FOR THE TOE ................................................................................ 12 4.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT ................................................................ 13 5. SECURITY REQUIREMENTS........................................................................................ 15 5.1 TOE SECURITY FUNCTIONAL REQUIREMENTS................................................................... 15 5.1.1 Security Audit (FAU) ........................................................................................... 16 5.1.2 User Data Protection (FDP).................................................................................. 18 5.1.3 Identification and Authentication (FIA) ............................................................... 20 5.1.4 Security Management (FMT) ............................................................................... 22 5.1.5 Protection of the TSF (FPT) ................................................................................. 24 5.1.6 Resource Utilization (FRU) .................................................................................. 24 5.1.7 TOE Access (FTA) ............................................................................................... 25 5.2 IT ENVIRONMENT SECURITY FUNCTIONAL REQUIREMENTS .............................................. 25 5.2.1 Identification and Authentication (FIA) ............................................................... 25 5.2.2 Protection of the TSF (FPT) ................................................................................. 26 5.3 TOE SECURITY ASSURANCE REQUIREMENTS .................................................................... 27 5.3.1 Configuration management (ACM)...................................................................... 27 5.3.2 Delivery and operation (ADO) ............................................................................. 29 5.3.3 Development (ADV)............................................................................................. 30 5.3.4 Guidance documents (AGD)................................................................................. 34 5.3.5 Life cycle support (ALC)...................................................................................... 35 5.3.6 Tests (ATE)........................................................................................................... 37 5.3.7 Vulnerability assessment (AVA) .......................................................................... 39 6. TOE SUMMARY SPECIFICATION............................................................................... 42 6.1 TOE SECURITY FUNCTIONS ............................................................................................... 42 6.1.1 TOE Access.......................................................................................................... 42 6.1.2 Identification and Authentication ......................................................................... 42 6.1.3 User Data Protection............................................................................................. 44 i TERADATA DATABASE SECURITY TARGET 6.1.4 Security Audit....................................................................................................... 46 6.1.5 Security Management ........................................................................................... 48 6.1.6 Resource Utilization..............................................................................................50 6.1.7 Protection of the TSF............................................................................................ 51 6.2 ASSURANCE MEASURES..................................................................................................... 52 6.2.1 Configuration management (ACM)...................................................................... 52 6.2.2 Delivery and operation (ADO) ............................................................................. 54 6.2.3 Development (ADV)............................................................................................. 54 6.2.4 Guidance documents (AGD)................................................................................. 58 6.2.5 Life cycle support (ALC)...................................................................................... 60 6.2.6 Tests (ATE)........................................................................................................... 61 6.2.7 Vulnerability assessment (AVA) .......................................................................... 63 7. PROTECTION PROFILE CLAIMS................................................................................ 65 8. RATIONALE ...................................................................................................................... 66 8.1 SECURITY OBJECTIVES RATIONALE ................................................................................... 66 8.2 SECURITY REQUIREMENTS RATIONALE ............................................................................. 71 8.3 EXPLICIT REQUIREMENTS RATIONALE............................................................................... 78 8.4 TOE SUMMARY SPECIFICATION RATIONALE ..................................................................... 79 8.5 TOE ASSURANCE REQUIREMENTS RATIONALE ................................................................. 80 8.6 STRENGTH OF FUNCTION RATIONALE ................................................................................ 81 8.7 DEPENDENCIES RATIONALE............................................................................................... 81 8.8 PROTECTION PROFILE CLAIMS RATIONALE ....................................................................... 82 APPENDIX A - ACRONYMS ................................................................................................... 83 ii TERADATA DATABASE SECURITY TARGET LIST OF FIGURES Figure 2-1 TOE Physical Boundaries ............................................................................................. 6 LIST OF TABLES Table 5-1 TOE Security Functional Requirements....................................................................... 15 Table 5-2 Auditable Events .......................................................................................................... 16 Table 5-3 IT Environment Security Functional Requirements..................................................... 25 Table 5-4 TOE Security Assurance Requirements ....................................................................... 27 Table 6-1 Configuration Management Assurance Measures........................................................ 52 Table 6-2 Delivery and Operation Assurance Measures .............................................................. 54 Table 6-3 Development Assurance Measures............................................................................... 55 Table 6-4 Guidance Documents Assurance Measures.................................................................. 58 Table 6-5 Life Cycle Support Assurance Measures ..................................................................... 60 Table 6-6 Tests Assurance Measures...........................................................................................