Teradata Database Security Target

Teradata Database Security Target

Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. TERADATA DATABASE SECURITY TARGET TABLE OF CONTENTS 1. INTRODUCTION................................................................................................................. 1 1.1 SECURITY TARGET IDENTIFICATION AND OVERVIEW .......................................................... 1 1.2 TOE IDENTIFICATION .......................................................................................................... 1 1.3 COMMON CRITERIA CONFORMANCE.................................................................................... 2 2. TOE DESCRIPTION ........................................................................................................... 3 2.1 TOE OVERVIEW .................................................................................................................. 3 2.2 TOE ARCHITECTURE ........................................................................................................... 4 2.2.1 TOE Physical Boundaries....................................................................................... 5 2.2.2 TOE Logical Boundaries ........................................................................................ 6 2.3 TOE DOCUMENTATION........................................................................................................ 7 3. TOE SECURITY ENVIRONMENT................................................................................... 9 3.1 ASSUMPTIONS ...................................................................................................................... 9 3.2 THREATS............................................................................................................................ 10 3.3 ORGANIZATIONAL SECURITY POLICIES.............................................................................. 11 4. SECURITY OBJECTIVES ............................................................................................... 12 4.1 SECURITY OBJECTIVES FOR THE TOE ................................................................................ 12 4.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT ................................................................ 13 5. SECURITY REQUIREMENTS........................................................................................ 15 5.1 TOE SECURITY FUNCTIONAL REQUIREMENTS................................................................... 15 5.1.1 Security Audit (FAU) ........................................................................................... 16 5.1.2 User Data Protection (FDP).................................................................................. 18 5.1.3 Identification and Authentication (FIA) ............................................................... 20 5.1.4 Security Management (FMT) ............................................................................... 22 5.1.5 Protection of the TSF (FPT) ................................................................................. 24 5.1.6 Resource Utilization (FRU) .................................................................................. 24 5.1.7 TOE Access (FTA) ............................................................................................... 25 5.2 IT ENVIRONMENT SECURITY FUNCTIONAL REQUIREMENTS .............................................. 25 5.2.1 Identification and Authentication (FIA) ............................................................... 25 5.2.2 Protection of the TSF (FPT) ................................................................................. 26 5.3 TOE SECURITY ASSURANCE REQUIREMENTS .................................................................... 27 5.3.1 Configuration management (ACM)...................................................................... 27 5.3.2 Delivery and operation (ADO) ............................................................................. 29 5.3.3 Development (ADV)............................................................................................. 30 5.3.4 Guidance documents (AGD)................................................................................. 34 5.3.5 Life cycle support (ALC)...................................................................................... 35 5.3.6 Tests (ATE)........................................................................................................... 37 5.3.7 Vulnerability assessment (AVA) .......................................................................... 39 6. TOE SUMMARY SPECIFICATION............................................................................... 42 6.1 TOE SECURITY FUNCTIONS ............................................................................................... 42 6.1.1 TOE Access.......................................................................................................... 42 6.1.2 Identification and Authentication ......................................................................... 42 6.1.3 User Data Protection............................................................................................. 44 i TERADATA DATABASE SECURITY TARGET 6.1.4 Security Audit....................................................................................................... 46 6.1.5 Security Management ........................................................................................... 48 6.1.6 Resource Utilization..............................................................................................50 6.1.7 Protection of the TSF............................................................................................ 51 6.2 ASSURANCE MEASURES..................................................................................................... 52 6.2.1 Configuration management (ACM)...................................................................... 52 6.2.2 Delivery and operation (ADO) ............................................................................. 54 6.2.3 Development (ADV)............................................................................................. 54 6.2.4 Guidance documents (AGD)................................................................................. 58 6.2.5 Life cycle support (ALC)...................................................................................... 60 6.2.6 Tests (ATE)........................................................................................................... 61 6.2.7 Vulnerability assessment (AVA) .......................................................................... 63 7. PROTECTION PROFILE CLAIMS................................................................................ 65 8. RATIONALE ...................................................................................................................... 66 8.1 SECURITY OBJECTIVES RATIONALE ................................................................................... 66 8.2 SECURITY REQUIREMENTS RATIONALE ............................................................................. 71 8.3 EXPLICIT REQUIREMENTS RATIONALE............................................................................... 78 8.4 TOE SUMMARY SPECIFICATION RATIONALE ..................................................................... 79 8.5 TOE ASSURANCE REQUIREMENTS RATIONALE ................................................................. 80 8.6 STRENGTH OF FUNCTION RATIONALE ................................................................................ 81 8.7 DEPENDENCIES RATIONALE............................................................................................... 81 8.8 PROTECTION PROFILE CLAIMS RATIONALE ....................................................................... 82 APPENDIX A - ACRONYMS ................................................................................................... 83 ii TERADATA DATABASE SECURITY TARGET LIST OF FIGURES Figure 2-1 TOE Physical Boundaries ............................................................................................. 6 LIST OF TABLES Table 5-1 TOE Security Functional Requirements....................................................................... 15 Table 5-2 Auditable Events .......................................................................................................... 16 Table 5-3 IT Environment Security Functional Requirements..................................................... 25 Table 5-4 TOE Security Assurance Requirements ....................................................................... 27 Table 6-1 Configuration Management Assurance Measures........................................................ 52 Table 6-2 Delivery and Operation Assurance Measures .............................................................. 54 Table 6-3 Development Assurance Measures............................................................................... 55 Table 6-4 Guidance Documents Assurance Measures.................................................................. 58 Table 6-5 Life Cycle Support Assurance Measures ..................................................................... 60 Table 6-6 Tests Assurance Measures...........................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    88 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us