RSA Certificate Manager Version 6.7 Security Target

RSA Certificate Manager Version 6.7 Security Target

RSA Certificate Manager Version 6.7 Security Target RSA Security Inc. 174 Middlesex Turnpike Bedford, MA 01730 USA Tel: 877-RSA-4900 Fax: 781-515-5010 E-mail: [email protected] Web: http://www.rsasecurity.com Document ID: ASE Issue Number: 1.7 Date: December 7, 2006 © RSA Security, Inc., 2006 RSA Certificate Manager Version 6.7 Security Target Revisions to Document Date Ver. Author Changes Made Aug. 18 2006 1.0 MJM Update to RCM v6.7 Aug. 24, 2006 1.1 TC Updated by SAIC for CCv2.3 changes Oct. 15, 2006 1.2 MJM Error corrections and updates Oct. 22, 2006 1.4 MJM Corrections per RSA ETR ASE – Revised (SAIC): • Changed cover page, updated year of pub. to 2006 • Section 1.1 corrected TOE identification • Section 1.1 corrected conformance “Part 3 augmented” • Many changes to SFR conventions • Section 5.1 backed out “based on the auditable event…” from FAU_GEN.1.2 (not a CCv2.3 change) • Section 5.1 fixed PP operation convention in FAU_SAR.1 • Section 5.1 backed out “no other actions” change from FAU_STG.4.1 (not a CCv2.3 change) • Section 5.2 added dependency to FMT_MOF.1.1, FMT_MSA.1.1, FMT_MTD.1.1 • Section 5.4 added FIA_USB.1.2 and FIA_USB.1.3 • Section 5.6 added AES/FIPS197 to FCS_CKM.1.1 • Section 5.6 added dependency to FCS_CKM.4.1 • Section 5.8 added algorithms, keylengths and dependency to FCS_COP.1.1 • Section 6.1 backed out “based on the auditable event…” from FAU_GEN.1.2 (not a CCv2.3 change) • Section 6.1 backed out “no other actions” change from FAU_STG.4.1 (not a CCv2.3 change) • Section 6.2 added dependency to FMT_MOF.1.1 • Section 6.5 removed reference to OCSP from assignment in FIA_UAU.1.1 and FIA_UID.1.1 • Section 6.5 added FIA_USB.1.2 and FIA_USB.1.3 • Section 6.6 reversed change in FDP_ITT.1.1 • Section 6.10 added note re. OCSP • Section 6.12 added note re. OCSP • Section 8.1.1 removed unsupported audit event from FAU_GEN.1 listing, “Local Data Entry/Remote Data Entry” listing, “CIMC Configuration” listing • Section 8.1.1 added “Final Audit Entry” to list of TOE audit startup/shutdown audit capabilities • Section 8.1.1 added clarifying text to FAU_STG.4 iteration 2 SFR mapping • Section 8.1.2 added clarifying text to Access Control © RSA Security, Inc., 2006 1 RSA Certificate Manager Version 6.7 Security Target Nov. 15, 2006 1.5 MJM Updated per ETR v0.3: • Section 6.5 FIA_USB.1 changes • Section 8.1.7 Identification & Authentication rewritten, SFR Mapping updated for FIA_USB.1 Nov. 16, 2006 1.6 MJM Updated per SAIC comments: • Add build number to TOE Identification, Section 1.1 • Add disclaimer to Section 2.2.4 CA Copy Tools, indicating tools were not evaluated Dec. 7, 2006 1.7 MJM Updated per ETR and Evaluator comments: • Update version and remove proprietary markings • Remove Copy CA feature from list in section 2.1 • Update evidence in assurance measure sections to match actual evidence from Part 1 of the ETR • Update hardware requirements to provide a short list of known working platforms • Update to include “excluded features rationale” © RSA Security, Inc., 2006 2 RSA Certificate Manager Version 6.7 Security Target Table of Contents 1.0 Security Target Introduction .....................................................................................6 1.1 ST and TOE Identification ....................................................................................6 1.2 Security Target Overview.....................................................................................6 2.0 TOE Description.......................................................................................................9 2.1 RSA Certificate Manager Version 6.7 ..................................................................9 2.2 TOE Boundary .....................................................................................................9 2.3 Non-TOE Boundary............................................................................................14 2.4 TOE Security Services .......................................................................................15 2.5 Features Excluded From CC Evaluation............................................................16 3.0 TOE Security Environment.....................................................................................17 3.1 Secure Usage Assumptions...............................................................................17 3.2 Threats ...............................................................................................................18 3.3 Organizational Security Policies.........................................................................19 4.0 Security Objectives ................................................................................................20 4.1 Security Objectives for the TOE.........................................................................20 4.2 Security Objectives for the TOE Environment....................................................20 4.3 Security Objectives for both the TOE and the Environment...............................22 5.0 TOE Environment IT Security Requirements .........................................................24 5.1 Security Audit .....................................................................................................25 5.2 Roles ..................................................................................................................28 5.3 Access Control ...................................................................................................29 5.4 Identification and Authentication ........................................................................31 5.5 Remote Data Entry and Export ..........................................................................32 5.6 Key Management ...............................................................................................33 5.7 Self-tests ............................................................................................................34 5.8 Cryptographic Modules ......................................................................................35 6.0 TOE IT Security Requirements ..............................................................................35 6.1 Security Audit .....................................................................................................37 6.2 Roles ..................................................................................................................40 6.3 Backup and Recovery ........................................................................................41 6.4 Access Control ...................................................................................................42 6.5 Identification and Authentication ........................................................................45 6.6 Remote Data Entry and Export ..........................................................................46 6.7 Key Management ...............................................................................................48 6.8 Certificate Profile Management..........................................................................50 6.9 Certificate Revocation List Profile Management ................................................50 6.10 Online Certificate Status Protocol (OCSP) Profile Management......................51 6.11 Certificate Registration.....................................................................................51 6.12 Certificate Revocation ......................................................................................52 7.0 Assurance Requirements.......................................................................................53 8.0 TOE Summary Specifications ................................................................................54 8.1 TOE Security Functions .....................................................................................54 8.2 Strength of Function Claims...............................................................................68 8.3 TOE Security Assurance Measures ...................................................................71 9.0 PP Claims ..............................................................................................................78 9.1 PP Conformance................................................................................................78 9.2 PP Refinements .................................................................................................78 9.3 PP Tailoring........................................................................................................78 10.0 Rationale ..............................................................................................................81 10.1 Security Objectives Coverage..........................................................................81 © RSA Security, Inc., 2006 3 RSA Certificate Manager Version 6.7 Security Target 10.2 Security Requirements Rationale.....................................................................93 10.3 Explicitly Stated Security Requirements Rationale ........................................104 10.4 Internal Consistency and Mutual Support ......................................................105 10.5 Rationale for Strength of Function..................................................................108 10.6 TOE Summary Specification Rationale..........................................................108 10.7 TOE Assurance Measure Requirements........................................................109 10.8 Rationale for SFR Dependencies...................................................................110

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    126 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us