Assurance Activity Report for Apple Filevault 2 on T2 Systems Running Macos Catalina 10.15

Assurance Activity Report for Apple Filevault 2 on T2 Systems Running Macos Catalina 10.15

Assurance Activity Report for Apple FileVault 2 on T2 systems running macOS Catalina 10.15 Apple FileVault 2 on T2 systems running macOS Catalina 10.15 Security Target Version 2.5 collaborative Protection Profile for Full Drive Encryption – Authorization Acquisition, Version 2.0e collaborative Protection Profile for Full Drive Encryption – Encryption Engine, Version 2.0e AAR Version 1.9, April 2021 Evaluated by: 2400 Research Blvd, Suite 395 Rockville, MD 20850 Prepared for: National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme 1 © 2021 Apple Inc., All rights reserved. This document may be reproduced and distributed only in its original entirety without revision. The Developer of the TOE: Apple Inc. The Author of the Security Target: Acumen Security, LLC. The TOE Evaluation was Sponsored by: Apple Inc. Evaluation Personnel: Danielle Canoles Rutwij Kulkarni Dayanandini Pathmanathan Acumen Security, LLC. Common Criteria Version Common Criteria Version 3.1 Revision 5 Common Evaluation Methodology Version CEM Version 3.1 Revision 5 2 © 2021 Apple Inc., All rights reserved. This document may be reproduced and distributed only in its original entirety without revision. Revision History VERSION DATE CHANGES 1.0 November 2020 Initial Release 1.1 December 2020 Update based on updated ST 1.2 January 2021 Internal Review 1.3 February 2021 Updates based on updated ST and AGD 1.4 March 2021 Internal Review 1.5 March 2021 Updates based on updated vendor documents 1.6 March 2021 Updates based on updated ST 1.7 April 2021 Updates based on validator feedback 1.8 April 2021 Updates bases on validator feedback 1.9 April 2021 Updates bases on validator feedback 3 © 2021 Apple Inc., All rights reserved. This document may be reproduced and distributed only in its original entirety without revision. Contents 1 TOE Overview ............................................................................................ 11 1.1 TOE Description .................................................................................................. 11 1.1.1 Evaluated Configuration ................................................................................ 11 2 Assurance Activities Identification ............................................................. 17 3 Test Equivalency Justification .................................................................... 18 3.1 Introduction ....................................................................................................... 18 3.2 Architectural Description .................................................................................... 18 3.3 Analysis .............................................................................................................. 18 3.4 Platform/Hardware Differences.......................................................................... 31 3.5 TOE Device Driver Differences ............................................................................ 31 3.6 Software/OS Dependencies ................................................................................ 32 3.7 Differences in TOE Software Binaries .................................................................. 32 3.8 Differences in Libraries Used to Provide Functionality ......................................... 32 3.9 TOE Functional Differences ................................................................................. 32 3.10 TOE Management Interfaces Differences ............................................................ 32 3.11 Test Subset Justification/Rationale ..................................................................... 32 4 Test Bed Descriptions ................................................................................ 34 4.1 Test Bed (Coffee Lake) ........................................................................................ 34 4.1.1 Visual Diagram #1 .......................................................................................... 34 4.1.2 Configuration Information #1 ........................................................................ 34 4.1.3 Visual Diagram #2 .......................................................................................... 35 4.1.4 Configuration Information #2 ........................................................................ 35 4.3 Test Bed (Ice Lake) .............................................................................................. 37 4.3.1 Visual Diagram #1 .......................................................................................... 37 4.3.2 Configuration Information #1 ........................................................................ 37 4.3.3 Visual Diagram #2 .......................................................................................... 38 4.3.4 Configuration Information #2 ........................................................................ 38 4.4 Test Time and Location ....................................................................................... 39 5 Detailed Test Cases (TSS, Guidance and KMD Activities) ............................ 42 5.1 TSS, Guidance and KMD Activities (Cryptographic Support) ................................. 42 5.1.1 FCS_AFA_EXT.1 .............................................................................................. 42 5.1.1.1 FCS_AFA_EXT.1 TSS 1 ................................................................................. 42 5.1.1.2 FCS_AFA_EXT.1 TSS 2 ................................................................................. 42 5.1.1.4 FCS_AFA_EXT.1 Guidance 1 ........................................................................ 43 5.1.1.5 FCS_AFA_EXT.1 KMD 1 ............................................................................... 43 5.1.1.6 FCS_AFA_EXT.1 KMD 2 ............................................................................... 43 5.1.2 FCS_AFA_EXT.2 .............................................................................................. 44 5.1.2.1 FCS_AFA_EXT.2 TSS 1 ................................................................................. 44 5.1.2.2 FCS_AFA_EXT.2 Guidance 1 ........................................................................ 44 5.1.3 FCS_CKM.1(a) ................................................................................................. 45 5.1.3.1 FCS_CKM.1(a) TSS 1 .................................................................................... 45 5.1.3.2 FCS_CKM.1(a) Guidance 1 .......................................................................... 45 4 © 2021 Apple Inc., All rights reserved. This document may be reproduced and distributed only in its original entirety without revision. 5.1.3.3 FCS_CKM.1(a) Test/CAVP 1 ........................................................................ 45 5.1.3.4 FCS_CKM.1(a) KMD 1 ................................................................................. 47 5.1.4 FCS_CKM.1(b) ................................................................................................. 48 5.1.4.1 FCS_CKM.1(b) TSS 1 .................................................................................... 48 5.1.4.2 FCS_CKM.1(b) Guidance 1 .......................................................................... 48 5.1.4.3 FCS_CKM.1(b) KMD 1 ................................................................................. 48 5.1.5 FCS_CKM.1(c) ................................................................................................. 49 5.1.5.1 FCS_CKM.1(c) TSS 1 .................................................................................... 49 5.1.5.2 FCS_CKM.1(c) TSS 2 .................................................................................... 49 5.1.5.3 FCS_CKM.1(c) TSS 3 .................................................................................... 50 5.1.5.4 FCS_CKM.1(c) KMD 1 .................................................................................. 50 5.1.6 FCS_CKM.4(a) ................................................................................................. 50 5.1.6.1 FCS_CKM.4(a) TSS 1 .................................................................................... 50 5.1.6.2 FCS_CKM.4(a) Guidance 1 .......................................................................... 51 5.1.6.3 FCS_CKM.4(a) KMD 1 ................................................................................. 51 5.1.7 FCS_CKM.4(b) ................................................................................................. 52 5.1.7.1 FCS_CKM.4(b) TSS/KMD 1 .......................................................................... 52 5.1.7.2 FCS_CKM.4(b) TSS/KMD 2 .......................................................................... 52 5.1.7.3 FCS_CKM.4(b) TSS/KMD 3 .......................................................................... 52 5.1.7.4 FCS_CKM.4(b) TSS/KMD 4 .......................................................................... 53 5.1.7.5 FCS_CKM.4(b) TSS/KMD 5 .......................................................................... 53 5.1.7.6 FCS_CKM.4(b) TSS/KMD 6 .......................................................................... 53 5.1.7.7 FCS_CKM.4(b) Guidance 1 .......................................................................... 54 5.1.8 FCS_CKM.4(d) ................................................................................................. 54 5.1.8.1 FCS_CKM.4(d) TSS/KMD 1 .......................................................................... 54 5.1.8.2 FCS_CKM.4(d) TSS/KMD 2 .........................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    142 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us