Microsoft Windows Common Criteria Evaluation Security Target
Total Page:16
File Type:pdf, Size:1020Kb
Microsoft Common Criteria Security Target Microsoft Windows Common Criteria Evaluation Microsoft Windows 10 version 1809 (October 2018 Update) Microsoft Windows Server 2019 (October 2018 Update) Security Target Document Information Version Number 0.05 Updated On June 18, 2019 Microsoft © 2019 Page 1 of 126 Microsoft Common Criteria Security Target Version History Version Date Summary of changes 0.01 June 27, 2018 Initial draft 0.02 December 21, 2018 Updates from security target evaluation 0.03 February 21, 2019 Updates from evaluation 0.04 May 6, 2019 Updates from GPOS PP v4.2.1 0.05 June 18, 2019 Public version Microsoft © 2019 Page 2 of 126 Microsoft Common Criteria Security Target This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The example companies, organizations, products, people and events depicted herein are fictitious. No association with any real company, organization, product, person or event is intended or should be inferred. © 2019 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Visual Basic, Visual Studio, Windows, the Windows logo, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Microsoft © 2019 Page 3 of 126 Microsoft Common Criteria Security Target TABLE OF CONTENTS SECURITY TARGET .........................................................................................................................1 VERSION HISTORY ..............................................................................................................................2 TABLE OF CONTENTS ........................................................................................................................4 LIST OF TABLES .................................................................................................................................8 1 SECURITY TARGET INTRODUCTION .................................................................................... 10 1.1 ST REFERENCE ...................................................................................................................... 10 1.2 TOE REFERENCE.................................................................................................................... 10 1.3 TOE OVERVIEW .................................................................................................................... 10 1.3.1 TOE TYPES ..................................................................................................................................... 10 1.3.2 TOE USAGE .................................................................................................................................... 11 1.3.3 TOE SECURITY SERVICES ................................................................................................................... 11 1.3.4 NON-TOE HARDWARE, SOFTWARE, FIRMWARE IN THE EVALUATION ....................................................... 13 1.4 TOE DESCRIPTION ................................................................................................................. 13 1.4.1 EVALUATED CONFIGURATIONS ........................................................................................................... 13 1.4.2 SECURITY ENVIRONMENT AND TOE BOUNDARY ................................................................................... 13 1.4.2.1 Logical Boundaries ...................................................................................................................... 14 1.4.2.2 Physical Boundaries .................................................................................................................... 14 1.5 PRODUCT DESCRIPTION .......................................................................................................... 15 1.6 CONVENTIONS, TERMINOLOGY, ACRONYMS ................................................................................ 16 1.6.1 CONVENTIONS ................................................................................................................................ 16 1.6.2 TERMINOLOGY ................................................................................................................................ 16 1.6.3 ACRONYMS..................................................................................................................................... 19 1.7 ST OVERVIEW AND ORGANIZATION ........................................................................................... 19 2 CC CONFORMANCE CLAIMS ............................................................................................... 21 3 SECURITY PROBLEM DEFINITION ........................................................................................ 22 3.1 THREATS TO SECURITY ............................................................................................................ 22 3.2 ORGANIZATIONAL SECURITY POLICIES ......................................................................................... 23 3.3 SECURE USAGE ASSUMPTIONS .................................................................................................. 23 4 SECURITY OBJECTIVES ....................................................................................................... 25 Microsoft © 2019 Page 4 of 126 Microsoft Common Criteria Security Target 4.1 TOE SECURITY OBJECTIVES ...................................................................................................... 25 4.2 SECURITY OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT .......................................................... 26 4.3 SECURITY OBJECTIVES RATIONALE ............................................................................................. 27 5 SECURITY REQUIREMENTS ................................................................................................. 32 5.1 TOE SECURITY FUNCTIONAL REQUIREMENTS ............................................................................... 32 5.1.1 SECURITY AUDIT (FAU) .................................................................................................................... 34 5.1.1.1 Audit Data Generation (FAU_GEN.1) and FAU_GEN.1(WLAN) ................................................... 34 5.1.2 CRYPTOGRAPHIC SUPPORT (FCS) ....................................................................................................... 35 5.1.2.1 Cryptographic Key Generation (FCS_CKM.1) .............................................................................. 35 5.1.2.2 Cryptographic Key Generation for WPA2 Connections (FCS_CKM.1(WLAN)) ............................ 35 5.1.2.3 Cryptographic Key Establishment (FCS_CKM.2) ......................................................................... 36 5.1.2.4 Cryptographic Key Distribution for GTK (FCS_CKM.2(WLAN)).................................................... 36 5.1.2.5 Cryptographic Key Destruction (FCS_CKM_EXT.4) ..................................................................... 36 5.1.2.6 Cryptographic Operation for Encryption / Decryption (FCS_COP.1(SYM)) ................................. 36 5.1.2.7 Cryptographic Operation for Hashing (FCS_COP.1(HASH)) ........................................................ 37 5.1.2.8 Cryptographic Operation for Signing (FCS_COP.1(SIGN)) ........................................................... 37 5.1.2.9 Cryptographic Operation for Keyed Hash Algorithms (FCS_COP.1(HMAC)) ............................... 37 5.1.2.10 Random Bit Generation (FCS_RBG_EXT.1).............................................................................. 37 5.1.2.11 Storage of Sensitive Data (FCS_STO_EXT.1) ............................................................................ 38 5.1.2.12 TLS Client Protocol (FCS_TLSC_EXT.1) ..................................................................................... 38 5.1.2.13 Extended: Extensible Authentication Protocol-Transport Layer Security (FCS_TLSC_EXT.1(WLAN)) ..........................................................................................................................