Bivio 6310-NC Common Criteria Administrative Guidance

Bivio 6310-NC Common Criteria Administrative Guidance

Bivio 6310-NC Common Criteria Administrative Guidance Version 1.10 Nov 23, 2020 Bivio 6310-NC Common Criteria Administrative Guidance CONTENTS 1. Introduction .......................................................................................................................................... 5 2. Operational Environment – IT Requirements ....................................................................................... 6 3. Operational Environment – Procedural/Policy Requirements ............................................................. 7 4. Installation and Initial Configuration .................................................................................................... 7 Initial configuration ............................................................................................................................................... 8 Logging in and out of the system ........................................................................................................................ 10 Setting time ......................................................................................................................................................... 10 Enabling the NTP Client for Time Synchronization ............................................................................................. 11 Rebooting the system ......................................................................................................................................... 12 Power cycling the system .................................................................................................................................... 12 5. Configuration Items for CC Compliance .............................................................................................. 13 6. The System Administrator ................................................................................................................... 14 7. Configuring login retries and account locking..................................................................................... 14 8. Common tasks ..................................................................................................................................... 15 9. Security Audit Data Generation .......................................................................................................... 16 Storage space for audit data ............................................................................................................................... 17 Audit log rotation ................................................................................................................................................ 17 Audit storage space running low – warning ........................................................................................................ 18 Audit log entry format ........................................................................................................................................ 18 Searching audit logs ............................................................................................................................................ 20 Starting the audit daemon .................................................................................................................................. 21 Stopping the audit daemon ................................................................................................................................ 21 Admin Login / Initiation of trusted path ............................................................................................................. 22 Admin logout / User initiated termination / Termination of trusted path ......................................................... 24 Security related information ............................................................................................................................... 25 Resetting a user’s password ................................................................................................................................ 25 Starting a service ................................................................................................................................................. 25 Stopping a service ............................................................................................................................................... 26 Capture all Administrator commands ................................................................................................................. 26 Failure to establish an SSH session (client) ......................................................................................................... 27 Successful SSH rekey (client) ............................................................................................................................... 29 Failure to establish an SSH session (server) ........................................................................................................ 30 Locking of user account ...................................................................................................................................... 31 Unlocking of user account ................................................................................................................................... 31 Nov 23, 2020 Version 1.10 Page 2 Bivio 6310-NC Common Criteria Administrative Guidance Successful SSH rekey (server) .............................................................................................................................. 31 Successful authentication for a login session over TLS ....................................................................................... 32 Termination of a login session over TLS .............................................................................................................. 33 Failed authentication for a login session over TLS .............................................................................................. 33 Failure to establish a TLS session ........................................................................................................................ 34 All use of the identification and authentication mechanism .............................................................................. 35 Unsuccessful attempt to validate a certificate (TLS server) ................................................................................ 35 Software integrity checking ................................................................................................................................ 38 Modification of the behavior of the handling of audit data, and modification of the behavior of the TSF ........ 39 Trusted updates .................................................................................................................................................. 41 Changes to time .................................................................................................................................................. 41 Termination of local session by session locking mechanism .............................................................................. 42 Termination of remote session by session locking mechanism .......................................................................... 42 Initiation of trusted channel (SSH client) ............................................................................................................ 42 Termination of trusted channel (SSH client) ....................................................................................................... 44 Failure of the trusted channel (public key) ......................................................................................................... 44 Running cryptographic tests (on the OpenSSL cryptography suite) ................................................................... 45 Modification, deletion, generation/import of cryptographic keys ..................................................................... 45 Configuration of a new time server and removal of an existing time server ...................................................... 48 10. Configuring the SSH tunnel client for transporting audit logs to remote server ............................ 49 Mitigating Against CVE-2020-14145 ................................................................................................................... 52 11. Admin login authentication ............................................................................................................ 52 Password based authentication .......................................................................................................................... 53 Strong passwords ................................................................................................................................................ 53 Public key based authentication ......................................................................................................................... 54 Login session timeout ......................................................................................................................................... 55 Login warning banner ......................................................................................................................................... 55 Changing the Administrator’s password ............................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    67 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us