CA ACF2™ R14 SP1 for Z/OS Security Target

CA ACF2™ R14 SP1 for Z/OS Security Target

CA ACF2™ r14 SP1 for z/OS Security Target Version 1.1 March 7, 2011 Prepared for: CA 2400 Cabot Drive Lisle, IL 60532 Prepared by: Booz Allen Hamilton Common Criteria Testing Laboratory 900 Elkridge Landing Road, Suite 100 Linthicum, MD 21090-2950 Page 1 Table of Contents 1 Security Target Introduction ....................................................................................... 7 1.1 ST Reference ....................................................................................................... 7 1.1.1 ST Identification ............................................................................................. 7 1.1.2 Document Organization .................................................................................. 7 1.1.3 Terminology .................................................................................................... 8 1.1.4 Acronyms ...................................................................................................... 10 1.1.5 References ..................................................................................................... 11 1.1.6 CC Concepts ................................................................................................. 11 1.2 TOE Reference.................................................................................................. 12 1.2.1 TOE Identification ........................................................................................ 12 1.3 TOE Overview .................................................................................................. 12 1.4 TOE Type.......................................................................................................... 14 2 TOE Description ....................................................................................................... 15 2.1 Evaluated Components of the TOE .................................................................. 15 2.2 Components in the Operational Environment ................................................... 16 2.3 Excluded from the TOE .................................................................................... 18 2.3.1 Not Installed .................................................................................................. 18 2.3.2 Installed but Requires a Separate License .................................................... 18 2.3.3 Installed But Not Part of the TSF ................................................................. 19 2.4 Physical Boundary ............................................................................................ 20 2.5 Logical Boundary.............................................................................................. 23 2.5.1 Security Audit ............................................................................................... 23 2.5.2 Identification & Authentication .................................................................... 24 2.5.3 Security Management ................................................................................... 24 2.5.4 User Data Protection ..................................................................................... 25 2.5.5 TOE Access .................................................................................................. 25 2.6 Logical Boundary of the Operational Environment .......................................... 26 2.6.1 Cryptographic Support .................................................................................. 26 2.6.2 Time Stamps ................................................................................................. 26 2.6.3 Audit Storage ................................................................................................ 26 3 Conformance Claims ................................................................................................ 27 3.1 CC Version........................................................................................................ 27 3.2 CC Part 2 Conformant ...................................................................................... 27 3.3 CC Part 3 Conformant plus flaw remediation................................................... 27 3.4 PP Claims .......................................................................................................... 27 3.5 Package Claims ................................................................................................. 27 3.6 Package Name Conformant or Package Name Augmented ............................. 27 3.7 Conformance Claim Rationale .......................................................................... 27 4 Security Problem Definition ..................................................................................... 28 4.1 Threats............................................................................................................... 28 4.2 Organizational Security Policies ....................................................................... 28 4.3 Secure Usage Assumptions ............................................................................... 28 Booz Allen Hamilton CCTL – CA Proprietary Page 2 4.3.1 Personnel Assumptions ................................................................................. 28 4.3.2 Connectivity Assumptions ............................................................................ 29 4.3.3 Physical Assumptions ................................................................................... 29 5 Security Objectives ................................................................................................... 30 5.1 Security Objectives for the TOE ....................................................................... 30 5.1.1 Security Objectives for the operational environment of the TOE ................ 30 6 Extended Security Functional Requirements ............................................................ 32 6.1 Extended Security Functional Requirements for the TOE ............................... 32 6.2 Extended Security Assurance Requirements .................................................... 32 7 Security Functional Requirements ............................................................................ 33 7.1 Security Functional Requirements for the TOE................................................ 33 7.1.1 Class FAU: Security Audit .......................................................................... 34 7.1.1.1 FAU_GEN.1 Audit data generation ..................................................... 34 7.1.1.2 FAU_GEN.2 User identity association ................................................ 36 7.1.1.3 FAU_SAR.1 (1) Audit review ............................................................. 36 7.1.1.4 FAU_SAR.1 (2) Audit review ............................................................. 37 7.1.1.5 FAU_SAR.2 Restricted audit review .................................................... 37 7.1.1.6 FAU_SEL.1 Selective audit ................................................................. 38 7.1.2 Class FDP: User Data Protection .................................................................. 38 7.1.2.1 FDP_ACC.2 (1) Complete access control ........................................... 38 7.1.2.2 FDP_ACC.2 (2) Complete access control ........................................... 39 7.1.2.3 FDP_ACF.1 (1) Security Attribute based access control ..................... 40 7.1.2.4 FDP_ACF.1 (2) Security attribute based access control ..................... 42 7.1.3 Class FIA: Identification & Authentication .................................................. 43 7.1.3.1 FIA_AFL.1 Authentication Failure Handling ....................................... 43 7.1.3.2 FIA_ATD.1 Security Attributes........................................................... 44 7.1.3.3 FIA_SOS.1 (1) Verification of Secrets ................................................ 45 7.1.3.4 FIA_SOS.1 (2) Verification of Secrets ................................................ 46 7.1.3.5 FIA_UAU.2 User authentication before any action ............................ 47 7.1.3.6 FIA_UAU.4 Single-use authentication mechanisms ........................... 47 7.1.3.7 FIA_UAU.5 Multiple authentication mechanisms .............................. 47 7.1.3.8 FIA_UID.2 User identification before any action ............................... 48 7.1.3.9 FIA_USB.1 User-subject binding ........................................................ 48 7.1.4 Class FMT: Security Management ............................................................... 49 7.1.4.1 FMT_MOF.1 (1) Management of security functions behavior ............ 49 7.1.4.2 FMT_MOF.1 (2) Management of security functions behavior ............ 49 7.1.4.3 FMT_MOF.1 (3) Management of security functions behavior ............ 49 7.1.4.4 FMT_MOF.1 (4) Management of security functions behavior ............ 50 7.1.4.5 FMT_MSA.1 Management of security attributes ................................. 50 7.1.4.6 FMT_MSA.3 Static attribute initialization ........................................... 50 7.1.4.7 FMT_SMF.1 Specification of management functions.......................... 51 7.1.4.8 FMT_SMR.1 Security Roles ................................................................ 51 7.1.5 Class FTA: TOE Access ............................................................................... 51 7.1.5.1 FTA_TSE.1 TOE Session Establishment ............................................. 51 7.2 Operations Defined ........................................................................................... 52 Booz Allen Hamilton

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    108 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us