Verdasys Digital Guardian V6.0.1 ST

Verdasys Digital Guardian V6.0.1 ST

Verdasys ® Digital Guardian ™ v6.0.1 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 1.4 Prepared for: Prepared by: Verdasys Corsec Security, Inc. 404 Wyman Street, Suite 320 13135 Lee Jackson Memorial Hwy., Suite 220 Waltham, MA 02451 Fairfax, VA 22033 United States of America United States of America Phone: +1 781 788 -8180 Phone: +1 703 267 6050 Email: [email protected] Email: [email protected] http://www.verdasys.com http://www.corsec.com Security Target , V ersion 1.4 October 2, 2012 Table of Contents 1 INTRODUCTION ................................................................................................................... 5 1.1 PURPOSE ................................................................................................................................................................ 5 1.2 SECURITY TARGET AND TOE REFERENCES ...................................................................................................... 5 1.3 PRODUCT OVERVIEW .......................................................................................................................................... 6 1.4 TOE OVERVIEW ................................................................................................................................................... 9 1.4.1 Brief Description of the Components of the TOE........................................................................................ 9 1.4.2 TOE Environment ................................................................................................................................................ 11 1.5 TOE DESCRIPTION ............................................................................................................................................ 13 1.5.1 Physical Scope ....................................................................................................................................................... 13 1.5.2 Logical Scope ........................................................................................................................................................ 16 1.5.3 Product Physical/Logical Features and Functionality not included in the TOE ................................. 19 1.5.4 FIPS 140-2 Considerations for the TOE Environment............................................................................. 19 2 CONFORMANCE CLAIMS .................................................................................................. 21 3 SECURITY PROBLEM .......................................................................................................... 22 3.1 THREATS TO SECURITY ...................................................................................................................................... 22 3.2 ORGANIZATIONAL SECURITY POLICIES .......................................................................................................... 23 3.3 ASSUMPTIONS ..................................................................................................................................................... 24 4 SECURITY OBJECTIVES ...................................................................................................... 26 4.1 SECURITY OBJECTIVES FOR THE TOE .............................................................................................................. 26 4.2 SECURITY OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT .................................................................. 27 4.2.1 IT Security Objectives ......................................................................................................................................... 27 4.2.2 Non-IT Security Objectives ............................................................................................................................... 28 5 EXTENDED COMPONENTS .............................................................................................. 29 5.1 EXTENDED TOE SECURITY FUNCTIONAL COMPONENTS ........................................................................... 29 5.1.1 Class ESM: Enterprise Security Management .......................................................................................... 30 5.2 EXTENDED TOE SECURITY ASSURANCE COMPONENTS .............................................................................. 35 6 SECURITY REQUIREMENTS .............................................................................................. 36 6.1 CONVENTIONS ................................................................................................................................................... 36 6.2 SECURITY FUNCTIONAL REQUIREMENTS ........................................................................................................ 36 6.2.1 Class ESM: Enterprise Security Management ........................................................................................... 38 6.2.2 Class FAU: Security Audit .................................................................................................................................. 40 6.2.3 Class FCS: Cryptographic Support ................................................................................................................. 44 6.2.4 Class FDP: User Data Protection .................................................................................................................... 46 6.2.5 Class FIA: Identification and Authentication................................................................................................ 50 6.2.6 Class FMT: Security Management ................................................................................................................. 51 6.2.7 Class FPT: Protection of the TSF ..................................................................................................................... 55 6.2.8 Class FRU: Resource Utilization ...................................................................................................................... 56 6.2.9 Class FTA: TOE Access ...................................................................................................................................... 57 6.3 SECURITY ASSURANCE REQUIREMENTS ........................................................................................................... 58 7 TOE SUMMARY SPECIFICATION ..................................................................................... 59 7.1 TOE SECURITY FUNCTIONS ............................................................................................................................. 59 7.1.1 Robust Security Management ......................................................................................................................... 60 7.1.2 Enterprise Information Protection .................................................................................................................. 62 7.1.3 Cryptographic Protection ................................................................................................................................... 65 7.1.4 Violation Analysis, Alerting, and Reporting .................................................................................................. 65 7.1.5 Fault Tolerance ..................................................................................................................................................... 66 8 RATIONALE .......................................................................................................................... 68 8.1 CONFORMANCE CLAIMS RATIONALE ............................................................................................................. 68 8.2 SECURITY OBJECTIVES RATIONALE .................................................................................................................. 68 Verdasys Digital Guardian™ v6.0.1 Page 2 of 91 © 2012 Verdasys ® This document may be freely reproduced and distributed whole and intact including this copyright notice. Security Target , V ersion 1.4 October 2, 2012 8.2.1 Security Objectives Rationale Relating to Threats .................................................................................... 68 8.2.2 Security Objectives Rationale Relating to Policies ..................................................................................... 73 8.2.3 Security Objectives Rationale Relating to Assumptions ........................................................................... 74 8.3 RATIONALE FOR EXTENDED SECURITY FUNCTIONAL REQUIREMENTS ...................................................... 76 8.4 RATIONALE FOR EXTENDED TOE SECURITY ASSURANCE REQUIREMENTS ............................................... 77 8.5 SECURITY REQUIREMENTS RATIONALE ........................................................................................................... 78 8.5.1 Rationale for Security Functional Requirements of the TOE Objectives ............................................ 78 8.5.2 Security Assurance Requirements Rationale ............................................................................................... 85 8.5.3 Dependency Rationale ....................................................................................................................................... 85 9 ACRONYMS .......................................................................................................................... 88 9.1 ACRONYMS ........................................................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    91 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us