IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and Accessagent Fix Pack 22 Security Target

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and Accessagent Fix Pack 22 Security Target

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target Version: 1.19 Status: Released Last Update: 2014-03-05 International Business Machines, Corporation IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target Trademarks IBM and the IBM logo are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. The following terms are trademarks of International Business Machines Corporation in the United States, other countries, or both: ● DB2® ● WebSphere® The following terms are trademarks of Oracle Corporation: ● Java® ● Oracle® The following terms are trademarks of Microsoft Corporation: ● Active Directory® ● SQL Server® ● Windows® ● Windows Server® Legal Notice This document is provided AS IS with no express or implied warranties. Use the information in this document at your own risk. This document may be reproduced or distributed in any form without prior permission provided the copyright notice is retained on all copies. Modified versions of this document may be freely distributed provided that they are clearly identified as such, and this copyright is included intact. Revision History Revision Date Author(s) Changes to Previous Revision 1.19 2014-03-05 Scott Chapman Initial ST. Version: 1.19 Page 2 of 46 Last update: 2014-03-05 Copyright © 2009 - 2014 by atsec information security and IBM International Business Machines, Corporation IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target Table of Contents 1 Introduction .................................................................................................... 7 1.1 Security Target Identification ......................................................................................... 7 1.2 TOE Identification .......................................................................................................... 7 1.3 TOE Type ....................................................................................................................... 7 1.4 TOE Overview ................................................................................................................ 7 1.4.1 Required non-TOE software .................................................................................. 7 1.4.2 Intended method of use ........................................................................................ 8 1.4.3 Major security features ......................................................................................... 8 1.5 TOE Description ............................................................................................................. 8 1.5.1 Introduction ........................................................................................................... 8 1.5.2 Architecture .......................................................................................................... 9 1.5.2.1 Communications ........................................................................................... 9 1.5.2.2 The IMS Server ........................................................................................... 10 1.5.2.3 AccessAgent ............................................................................................... 11 1.5.2.4 AccessAdmin .............................................................................................. 12 1.5.2.5 AccessAssistant .......................................................................................... 12 1.5.2.6 IMS Configuration Utility ............................................................................. 13 1.5.3 TOE boundaries ................................................................................................... 13 1.5.3.1 Physical ...................................................................................................... 13 1.5.3.2 Logical ........................................................................................................ 14 1.5.3.3 Evaluated configuration ............................................................................. 14 1.5.4 Security policy model .......................................................................................... 15 2 CC Conformance Claim ................................................................................... 16 3 Security Problem Definition ............................................................................ 17 3.1 Threat Environment ..................................................................................................... 17 3.1.1 Threats countered by the TOE ............................................................................ 17 3.2 Assumptions ................................................................................................................ 18 3.2.1 Environment of use of the TOE ........................................................................... 18 3.2.1.1 Physical ...................................................................................................... 18 3.2.1.2 Personnel .................................................................................................... 18 3.2.1.3 Logical ........................................................................................................ 18 3.3 Organizational Security Policies ................................................................................... 19 4 Security Objectives ........................................................................................ 20 4.1 Objectives for the TOE ................................................................................................. 20 4.2 Objectives for the Operational Environment ................................................................ 20 4.3 Security Objectives Rationale ...................................................................................... 21 4.3.1 Security objectives coverage .............................................................................. 21 4.3.2 Security objectives sufficiency ............................................................................ 22 5 Extended Components Definition .................................................................... 26 6 Security Requirements ................................................................................... 27 6.1 TOE Security Functional Requirements ........................................................................ 27 Version: 1.19 Page 3 of 46 Last update: 2014-03-05 Copyright © 2009 - 2014 by atsec information security and IBM International Business Machines, Corporation IBM Security Access Manager for Enterprise Single Sign-On Version 8.2 with IMS Server Interim Fix 4 and AccessAgent Fix Pack 22 Security Target 6.1.1 Security audit (FAU) ............................................................................................ 28 6.1.1.1 Audit data generation (FAU_GEN.1) .......................................................... 28 6.1.1.2 User identity association (FAU_GEN.2) ...................................................... 28 6.1.1.3 Audit review (FAU_SAR.1) .......................................................................... 28 6.1.1.4 Restricted audit review (FAU_SAR.2) ......................................................... 28 6.1.1.5 Protected audit trail storage (FAU_STG.1) ................................................. 29 6.1.2 User data protection (FDP) .................................................................................. 29 6.1.2.1 Subset access control (FDP_ACC.2) ........................................................... 29 6.1.2.2 Security attribute based access control (FDP_ACF.1) ................................ 30 6.1.3 Identification and authentication (FIA) ................................................................ 30 6.1.3.1 User attribute definition (FIA_ATD.1) ......................................................... 30 6.1.3.2 Verification of secrets (FIA_SOS.1) ............................................................ 30 6.1.3.3 User authentication before any action (FIA_UAU.2) ................................... 31 6.1.3.4 User identification before any action (FIA_UID.2) ...................................... 31 6.1.3.5 User-subject binding (FIA_USB.1) .............................................................. 31 6.1.4 Security management (FMT) ............................................................................... 31 6.1.4.1 Management of security attributes (FMT_MSA.1) ...................................... 31 6.1.4.2 Static attribute initialisation (FMT_MSA.3) ................................................. 32 6.1.4.3 Management of TSF data (FMT_MTD.1) ..................................................... 32 6.1.4.4 Specification of management functions (FMT_SMF.1) ............................... 32 6.1.4.5 Security roles (FMT_SMR.1) ....................................................................... 32 6.2 Security Functional Requirements Rationale ............................................................... 33 6.2.1 Security requirements coverage ......................................................................... 33 6.2.2 Security requirements sufficiency ....................................................................... 33 6.2.3 Security

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    46 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us