Red Hat Enterprise Linux Version 5 Security Target for CAPP, RBAC and LSPP Compliance

Red Hat Enterprise Linux Version 5 Security Target for CAPP, RBAC and LSPP Compliance

Red Hat Enterprise Linux Version 5 Security Target for CAPP, RBAC and LSPP Compliance Version: 1.12 Last Update: 2007-06-06 Red Hat Enterprise Linux Version 5 Security Target for CAPP, RBAC and LSPP Compliance atsec is a trademark of atsec GmbH IBM, IBM logo, bladecenter, eServer, iSeries, OS/400, PowerPC, POWER3, POWER4, POWER4+, pSeries, System p, POWER5, POWER5+, System x, System z, S390, xSeries, zSeries, zArchitecture, and z/VM are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. Red Hat and the Red Hat logo are trademarks or registered trademarks of Red Hat, Inc. in the United States, other countries, or both. Intel, Xeon, and Pentium are trademarks of Intel Corporation in the United States, other countries, or both. Opteron and AMD Opteron are trademarks of Advanced Micro Devices, Inc. in the United States, other countries, or both. Java and all Java-based products are trademarks of Sun Microsystems, Inc., in the United States, other countries, or both. Linux is a registered trademark of Linus Torvalds. UNIX is a registered trademark of The Open Group in the United States and other countries. This document is provided AS IS with no express or implied warranties. Use the information in this document at your own risk. This document may be reproduced or distributed in any form without prior permission provided the copyright notice is retained on all copies. Modified versions of this document may be freely distributed provided that they are clearly identified as such, and this copyright is included intact. Copyright © 2004, 2005, 2006, 2007 by atsec Corporation, and IBM Corporation or its wholly owned subsidiaries. Page 2 of 101 © IBM, atsec 2007 2007-07-18 Red Hat Enterprise Linux Version 5 Security Target for CAPP, RBAC and LSPP Compliance Table of Content 1 Introduction ........................................................................................................................................................ 9 1.1 ST Identification .......................................................................................................................................... 9 1.2 ST Overview ......................................................................................................................................................... 9 1.3 CC Conformance ....................................................................................................................................... 10 1.4 Strength of Function .................................................................................................................................... 10 1.5 Structure ............................................................................................................................................. 10 1.6 Terminology .................................................................................................................................... 10 2 TOE Description ..................................................................................................................................................... 12 2.1 Intended Method of Use .......................................................................................................................... 12 2.2 Summary of Security Features ...................................................................................................... 13 2.2.1 Identification and Authentication ................................................................................................................. 13 2.2.2 Audit ...................................................................................................................................................... 14 2.2.3 Discretionary Access Control ....................................................................................................... 14 2.2.4 Mandatory Access Control (LSPP mode only) ..................................................................................... 14 2.2.5 Role-Based Access Control (LSPP mode only) ................................................................................ 14 2.2.6 Object Reuse ............................................................................................................................................... 15 2.2.7 Security Management ........................................................................................................................ 15 2.2.8 Secure Communication ........................................................................................................ 15 2.2.9 TSF Protection ......................................................................................................................................... 15 2.3 Software ........................................................................................................................................... 15 2.4 Configurations .............................................................................................................................................. 20 2.4.1 File systems ................................................................................................................................... 20 2.4.2 TOE Hardware .............................................................................................................................................. 20 2.4.3 TOE Environment ................................................................................................................. 21 3 TOE Security Environment ................................................................................................................... 22 3.1 Introduction ............................................................................................................................................. 22 3.2 Threats ...................................................................................................................................................... 22 3.2.1 Threats countered by the TOE ..................................................................................................... 22 3.2.2 Threats to be countered by measures within the TOE environment ........................................................... 22 3.3 Organizational Security Policies ................................................................................................................. 23 3.4 Assumptions ......................................................................................................................................... 23 3.4.1 Physical Aspects ............................................................................................................................ 24 3.4.2 Personnel Aspects .................................................................................................................................. 24 3.4.3 Procedural Aspects (LSPP-mode only) ..................................................................................... 24 3.4.4 Connectivity Aspects ..................................................................................................................... 24 4 Security Objectives ............................................................................................................................................... 25 4.1 Security Objectives for the TOE ................................................................................................................. 25 4.2 Security Objectives for the TOE Environment ................................................................................... 25 5 Security Requirements ............................................................................................................................................... 27 5.1 TOE Security Functional Requirements ......................................................................................... 27 2007-07-18 © IBM, atsec 2007 Page 3 of 101 Red Hat Enterprise Linux Version 5 Security Target for CAPP, RBAC and LSPP Compliance 5.1.1 Security Audit (FAU) .............................................................................................................. 27 5.1.2 Cryptographic Support (FCS) ................................................................................................ 34 5.1.3 User Data Protection (FDP) ....................................................................................................................... 36 5.1.4 Identification and Authentication (FIA) ............................................................................... 42 5.1.5 Security Management (FMT) ......................................................................................................... 44 5.1.6 Protection of the TOE Security Functions (FPT) .................................................................................... 47 5.1.7 TOE Access (FTA) ................................................................................................................. 49 5.1.8 Trusted path/channels (FTP) ....................................................................................................................... 49 5.1.9 Strength of Function ............................................................................................................................ 49 5.2 TOE Security Assurance Requirements .................................................................................................... 49 5.3 Security Requirements for

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    101 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us