Verdasys ® Digital Guardian ™ v6.0.1 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 1.4 Prepared for: Prepared by: Verdasys Corsec Security, Inc. 404 Wyman Street, Suite 320 13135 Lee Jackson Memorial Hwy., Suite 220 Waltham, MA 02451 Fairfax, VA 22033 United States of America United States of America Phone: +1 781 788 -8180 Phone: +1 703 267 6050 Email: [email protected] Email: [email protected] http://www.verdasys.com http://www.corsec.com Security Target , V ersion 1.4 October 2, 2012 Table of Contents 1 INTRODUCTION ................................................................................................................... 5 1.1 PURPOSE ................................................................................................................................................................ 5 1.2 SECURITY TARGET AND TOE REFERENCES ...................................................................................................... 5 1.3 PRODUCT OVERVIEW .......................................................................................................................................... 6 1.4 TOE OVERVIEW ................................................................................................................................................... 9 1.4.1 Brief Description of the Components of the TOE........................................................................................ 9 1.4.2 TOE Environment ................................................................................................................................................ 11 1.5 TOE DESCRIPTION ............................................................................................................................................ 13 1.5.1 Physical Scope ....................................................................................................................................................... 13 1.5.2 Logical Scope ........................................................................................................................................................ 16 1.5.3 Product Physical/Logical Features and Functionality not included in the TOE ................................. 19 1.5.4 FIPS 140-2 Considerations for the TOE Environment............................................................................. 19 2 CONFORMANCE CLAIMS .................................................................................................. 21 3 SECURITY PROBLEM .......................................................................................................... 22 3.1 THREATS TO SECURITY ...................................................................................................................................... 22 3.2 ORGANIZATIONAL SECURITY POLICIES .......................................................................................................... 23 3.3 ASSUMPTIONS ..................................................................................................................................................... 24 4 SECURITY OBJECTIVES ...................................................................................................... 26 4.1 SECURITY OBJECTIVES FOR THE TOE .............................................................................................................. 26 4.2 SECURITY OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT .................................................................. 27 4.2.1 IT Security Objectives ......................................................................................................................................... 27 4.2.2 Non-IT Security Objectives ............................................................................................................................... 28 5 EXTENDED COMPONENTS .............................................................................................. 29 5.1 EXTENDED TOE SECURITY FUNCTIONAL COMPONENTS ........................................................................... 29 5.1.1 Class ESM: Enterprise Security Management .......................................................................................... 30 5.2 EXTENDED TOE SECURITY ASSURANCE COMPONENTS .............................................................................. 35 6 SECURITY REQUIREMENTS .............................................................................................. 36 6.1 CONVENTIONS ................................................................................................................................................... 36 6.2 SECURITY FUNCTIONAL REQUIREMENTS ........................................................................................................ 36 6.2.1 Class ESM: Enterprise Security Management ........................................................................................... 38 6.2.2 Class FAU: Security Audit .................................................................................................................................. 40 6.2.3 Class FCS: Cryptographic Support ................................................................................................................. 44 6.2.4 Class FDP: User Data Protection .................................................................................................................... 46 6.2.5 Class FIA: Identification and Authentication................................................................................................ 50 6.2.6 Class FMT: Security Management ................................................................................................................. 51 6.2.7 Class FPT: Protection of the TSF ..................................................................................................................... 55 6.2.8 Class FRU: Resource Utilization ...................................................................................................................... 56 6.2.9 Class FTA: TOE Access ...................................................................................................................................... 57 6.3 SECURITY ASSURANCE REQUIREMENTS ........................................................................................................... 58 7 TOE SUMMARY SPECIFICATION ..................................................................................... 59 7.1 TOE SECURITY FUNCTIONS ............................................................................................................................. 59 7.1.1 Robust Security Management ......................................................................................................................... 60 7.1.2 Enterprise Information Protection .................................................................................................................. 62 7.1.3 Cryptographic Protection ................................................................................................................................... 65 7.1.4 Violation Analysis, Alerting, and Reporting .................................................................................................. 65 7.1.5 Fault Tolerance ..................................................................................................................................................... 66 8 RATIONALE .......................................................................................................................... 68 8.1 CONFORMANCE CLAIMS RATIONALE ............................................................................................................. 68 8.2 SECURITY OBJECTIVES RATIONALE .................................................................................................................. 68 Verdasys Digital Guardian™ v6.0.1 Page 2 of 91 © 2012 Verdasys ® This document may be freely reproduced and distributed whole and intact including this copyright notice. Security Target , V ersion 1.4 October 2, 2012 8.2.1 Security Objectives Rationale Relating to Threats .................................................................................... 68 8.2.2 Security Objectives Rationale Relating to Policies ..................................................................................... 73 8.2.3 Security Objectives Rationale Relating to Assumptions ........................................................................... 74 8.3 RATIONALE FOR EXTENDED SECURITY FUNCTIONAL REQUIREMENTS ...................................................... 76 8.4 RATIONALE FOR EXTENDED TOE SECURITY ASSURANCE REQUIREMENTS ............................................... 77 8.5 SECURITY REQUIREMENTS RATIONALE ........................................................................................................... 78 8.5.1 Rationale for Security Functional Requirements of the TOE Objectives ............................................ 78 8.5.2 Security Assurance Requirements Rationale ............................................................................................... 85 8.5.3 Dependency Rationale ....................................................................................................................................... 85 9 ACRONYMS .......................................................................................................................... 88 9.1 ACRONYMS ........................................................................................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages91 Page
-
File Size-