Apple Ipad and Iphone Mobile Devices with Ios 12

Apple Ipad and Iphone Mobile Devices with Ios 12

Apple Inc. Apple iPad and iPhone Mobile Devices with iOS 12 Security Target PP_MD_V3.1 with EP_MDM_AGENT_V3.0, PP_WLAN_CLI_EP_V1.0, MOD_VPN_CLI_V2.1. Version 1.6 2019-03-12 VID: 10937 Prepared for: Prepared by: Apple Inc. atsec information security Corp. One Apple Park Way 9130 Jollyville Road, Suite 260 MS 927-1CPS Austin, TX 78759 Cupertino, CA 95014 www.atsec.com www.apple.com © 2019 Apple Inc. This document may be reproduced and distributed only in its original entirety without revision VID: 10937 Table of Contents Revision History ....................................................................................................................... 9 1 Security Target Introduction .......................................................................................... 11 1.1 Security Target Reference ............................................................................................... 11 1.2 TOE Reference .................................................................................................................. 11 1.3 TOE Overview .................................................................................................................... 11 1.4 TOE Description ................................................................................................................. 12 1.4.1 General information .............................................................................................. 12 1.4.2 Obtaining the mobile devices.............................................................................. 12 1.4.3 Obtaining software updates ................................................................................ 13 1.4.4 Supervising and configuring the mobile devices ............................................. 13 1.4.5 Mobile devices covered by this evaluation ....................................................... 13 1.5 TOE Architecture ............................................................................................................... 28 1.5.1 Physical Boundaries ............................................................................................. 29 1.5.2 Security Functions provided by the TOE .......................................................... 29 1.5.3 TOE Documentation ............................................................................................. 34 1.5.4 Other References ................................................................................................. 35 2 Conformance Claims ....................................................................................................... 36 2.1 CC Conformance ............................................................................................................... 36 2.2 Protection Profile (PP) Conformance ............................................................................. 36 2.2.1 Technical Decisions ............................................................................................. 36 2.3 Conformance Rationale .................................................................................................... 37 3 Security Problem Definition ........................................................................................... 38 3.1 Threats ................................................................................................................................ 38 3.2 Assumptions ....................................................................................................................... 41 3.3 Organizational Security Policies ...................................................................................... 42 4 Security Objectives.......................................................................................................... 43 4.1 Security Objectives for the TOE ...................................................................................... 43 4.2 Security Objectives for the TOE Environment .............................................................. 44 5 Extended Components Definition .................................................................................. 46 6 Security Functional Requirements ................................................................................ 47 6.1 Security Audit (FAU).......................................................................................................... 48 Agent Alerts (FAU_ALT) ............................................................................................................. 48 FAU_ALT_EXT.2 Extended: Agent Alerts ..................................................................... 48 Audit Data Generation (FAU_GEN).......................................................................................... 48 FAU_GEN.1(1) Audit Data Generation .......................................................................... 48 FAU_GEN.1(2) Audit Data Generation .......................................................................... 50 Security Audit Event Selection (FAU_SEL) ............................................................................. 52 FAU_SEL.1(2) Security Audit Event Selection ............................................................. 52 Security Audit Event Storage (FAU_STG) .............................................................................. 52 FAU_STG.1 Audit Storage Protection ............................................................................ 52 FAU_STG.4 Prevention of Audit Data Loss .................................................................. 52 6.2 Cryptographic Support (FCS) .......................................................................................... 53 Cryptographic Key Management (FCS_CKM)........................................................................ 53 FCS_CKM.1(1) Cryptographic Key Generation ............................................................ 53 Page 2 of 172 © 2019 Apple Inc. Version: 1.6 VID: 10937 FCS_CKM.1/WLAN Cryptographic Key Generation (Symmetric Keys for WPA2 Connections) ......................................................................................................... 53 FCS_CKM.1/VPN VPN Cryptographic Key Generation (IKE) .................................... 53 FCS_CKM.2(1) Cryptographic Key Establishment ...................................................... 53 FCS_CKM.2(2) Cryptographic Key Establishment (While device is locked) ........... 54 FCS_CKM.2/WLAN WLAN Cryptographic Key Distribution (GTK) ........................... 54 FCS_CKM_EXT.1 Extended: Cryptographic Key Support (REK) ............................. 54 FCS_CKM_EXT.2 Extended: Cryptographic Key Random Generation ................... 54 FCS_CKM_EXT.3 Extended: Cryptographic Key Generation.................................... 54 FCS_CKM_EXT.4 Extended: Key Destruction ............................................................. 55 FCS_CKM_EXT.5 Extended: TSF Wipe........................................................................ 55 FCS_CKM_EXT.6 Extended: Salt Generation.............................................................. 55 FCS_CKM_EXT.7 Extended: Cryptographic Key Support (REK) ............................. 56 Cryptographic Operations (FCS_COP).................................................................................... 57 FCS_COP.1(1) Confidentiality Algorithms ..................................................................... 57 FCS_COP.1(2) Hashing Algorithms ............................................................................... 57 FCS_COP.1(3) Signature Algorithms ............................................................................. 57 FCS_COP.1(4) Keyed Hash Algorithms ........................................................................ 57 FCS_COP.1(5) Password-Based Key Derivation Functions ...................................... 57 HTTPS Protocol (FCS_HTTPS) ................................................................................................ 58 FCS_HTTPS_EXT.1 Extended: HTTPS Protocol ........................................................ 58 IPsec Protocol (FCS_IPSEC) .................................................................................................... 58 FCS_IPSEC_EXT.1 Extended: IPsec ............................................................................ 58 Initialization Vector Generation (FCS_IV)................................................................................ 59 FCS_IV_EXT.1 Extended: Initialization Vector Generation ........................................ 59 Random Bit Generation (FCS_RBG) ....................................................................................... 60 FCS_RBG_EXT.1(Kernel and User space) Extended: Cryptographic Operation (Random Bit Generation) .................................................................................... 60 FCS_RBG_EXT.1(SEP) Extended: Cryptographic Operation (Random Bit Generation) ............................................................................................................ 60 Cryptographic Algorithm Services (FCS_SRV) ...................................................................... 60 FCS_SRV_EXT.1 Extended: Cryptographic Algorithm Services............................... 60 Cryptographic Key Storage (FCS_STG).................................................................................. 61 FCS_STG_EXT.1 Extended: Secure Key Storage ...................................................... 61 FCS_STG_EXT.2 Extended: Encrypted Cryptographic Key Storage ......................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    172 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us