Ärendetyp: 6 Diarienummer: 16FMV11716-55:1 Dokument ID CSEC-37-1272 Uncontrolled copy when printed Template: CSEC_mall_doc, 7.0 HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2017-06-28 Country of origin: Sweden Försvarets materielverk Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 Issue: 1.0, 2017-jun-28 Authorisation: Imre Juhász, Lead Certifier , CSEC Report Distribution: Arkiv Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 2 (19) Table of Contents 1 Executive Summary 3 2 Identification 4 3 Security Policy 5 4 Assumptions and Clarification of Scope 7 4.1 Usage Assumptions 7 4.2 Environmental Assumptions 7 4.3 Clarification of Scope 7 5 Architectural Information 9 6 Documentation 11 7 IT Product Testing 12 8 Evaluated Configuration 14 9 Results of the Evaluation 15 10 Evaluator Comments and Recommendations 16 11 Glossary 17 12 Bibliography 18 Appendix A Scheme Versions 19 A.1 Scheme/Quality Management System 19 Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 3 (19) 1 Executive Summary The Target of Evaluation (TOE) is the TRITON APX 8.2 solution, including the For- cepoint V10000 G4 appliances on which the Forcepoint Web Security and Forcepoint Email Security components are installed. The TOE is a web proxy, residing between the internal and an external network, which it monitors in- and outbound network traf- fic applying filters and rules in order to protect the internal network and the resources residing there. The TOE is comprised of the following components:  Forcepoint TRITON Manager 8.2.0.89  Forcepoint Web Security 8.2.0.1264  Forcepoint DLP 8.2.0.92  Forcepoint Email Security 8.2.0.0101  Forcepoint DLP Endpoint 8.2.0.2324 (Windows)  Forcepoint DLP Endpoint 8.2.0.2323 (MacOS). The evaluated deployment supports the TRITON APX components installed on On- Premise equipment. The major security functionalities that the TOE offers are; security audit, user data protection, identification and authentication, security management, resource utilization and TOE access. There are five assumptions made in the ST regarding the secure usage and environ- ment of the TOE. The TOE rely on these being met in order to be able to counter the six threats in the ST. The assumptions and the threats are described in chapter 4 As- sumptions and Clarification of Scope. The evaluation has been performed by Combitech AB and EWA-Canada. The evalua- tion was conducted in accordance with the requirements of Common Criteria, version 3.1, release 4, and the Common Methodology for IT security Evaluation, version 3.1, release 4. The evaluation was performed at the evaluation assurance level EAL2, augmented by ALC_FLR.2. Combitech AB is a licensed evaluation facility for Common Criteria under the Swe- dish Common Criteria Evaluation and Certification Scheme. Combitech AB is also accredited by the Swedish accreditation body SWEDAC according to ISO/IEC 17025 for Common Criteria evaluation. EWA-Canada operates as a Foreign location for Combitech AB within scope of the Swedish Common Criteria Evaluation and Certifi- cation Scheme. The certifier monitored the activities of the evaluator by reviewing all successive ver- sions of the evaluation reports. The certifier determined that the evaluation results confirm the security claims in the Security Target, and have been reached in agree- ment with the requirements of the Common Criteria and the Common Methodology for evaluation assurance level:  EAL2 + ALC_FLR.2. The certification results only apply to the version of the product indicated in the cer- tificate, and on the condition that all the stipulations in the Security Target are met. This certificate is not an endorsement of the IT product by CSEC or any other organ- isation that recognises or gives effect to this certificate, and no warranty of the IT product by CSEC or any other organisation that recognises or gives effect to this certificate is either expressed or implied. Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 4 (19) 2 Identification Certification Identification Certification ID CSEC2016010 Name and version of the certified IT product TRITON APX 8.2 with Forcepoint Email Security and Forcepoint Web Security components running on Forcepoint V10000 Appliance Comprised of the following components: - Forcepoint TRITON Manager 8.2.0.89 - Forcepoint Web Security 8.2.0.1264 - Forcepoint DLP 8.2.0.92 - Forcepoint Email Security 8.2.0.0101 - Forcepoint DLP Endpoint 8.2.0.2324 (Windows) - Forcepoint DLP Endpoint 8.2.0.2323 (MacOS). Security Target Identification Security Target: TRITON APX 8.2 version 1.0 EAL EAL2+ ALC_FLR.2 Sponsor Forcepoint LLC Developer Forcepoint LLC ITSEF Combitech AB and EWA-Canada Common Criteria version 3.1, revision 4 CEM version 3.1, revision 4 National and international interpretations None Recognition Scope CCRA: EAL2+ALC_FLR.2, SOGIS-MRA: EAL2 and EA-MLA: EAL2+ALC_FLR.2 Certification date 2017-06-30 Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 5 (19) 3 Security Policy The TOE consists of seven security functions. Below is a short description of each of them. For more information, see Security Target [ST] Security Audit The TOE generates audit logs of Forcepoint TRITON Manager activity; recording administrator login attempts, policy changes, and configuration changes in the Audit Logs for each component. Only Super Administrators and System Administrators can review the audit logs. The TOE provides reliable timestamps to accurately record the sequence of events within the audit records. User Data Protection The TOE enforces web, data and email filters and policies on user traffic (inbound and/or outbound) to prevents internal entities from accessing potentially harmful or inappropriate content on external data, prevent loss of organization data and prevent infected email from entering the network. Identification and Authentication The TOE enforces identification and authentication for administrators before they can access any management functionality via the CLI. The TOE also prevents administra- tors from accessing Forcepoint TRITON Manager content before providing and au- thenticating a valid identity. The TOE maintains a list of security attributes (such as login credentials) for administrators. Depending on the web policy applied, unprivi- leged users are able to browse the internet anonymously. Email users have to identify and authenticate themselves before the TOE will permit access to their Personal Email Management UI to manage quarantined email messages. Security Management The TOE provides robust management interfaces that authorized administrators can use to manage the TOE and configure policies to control access to content. By default proxy filtering is enabled, but all traffic is allowed; therefore, the TOE has a permis- sive default posture. The TOE defines two categories of administrator — TRITON Administrator and Delegated Administrator. Protection of the TSF Communications to the Forcepoint DLP Endpoint client devices, from the Secondary Forcepoint DLP Server, are transmitted over HTTPS connections. The TOE protects these transmissions between the Secondary Forcepoint DLP server component and the Forcepoint DLP Endpoint client device from disclosure and modification by encrypt- ing the transmissions under TLS v1.0. Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 6 (19) Resource Utilization The TOE enforces maximum limits on usage and availability of controlled traffic. TOE Access The TOE can assign a limit on the number of concurrent sessions that administrative users are allowed to have with Forcepoint TRITON Manager. If this limit is reached, the TOE prevents any new sessions from being created. A TRITON console session ends 30 minutes after the last action taken in the user in- terface (clicking from page to page, entering information, caching changes, or saving changes). A warning message is displayed 5 minutes before session end. Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 7 (19) 4 Assumptions and Clarification of Scope 4.1 Usage Assumptions The following assumptions about the usage are made: A.INSTAL: TRITON-APX has been installed and configured according to the appro- priate installation guides. A.NOEVIL: It is assumed that administrators who manage TRITON-APX are not careless, negligent, or willfully hostile; are appropriately trained; and follow all guid- ance. Similarly is it assumed that users of the TRITON-APX endpoint component are not negligent or willfully hostile. A.MANAGE: There are one or more competent individuals assigned to manage TRI- TON-APX and the security of the information it contains. 4.2 Environmental Assumptions The following assumption about the environment are made: A.NETWORK: All policy-controlled traffic between the internal and external net- works traverses TRITON-APX. A.LOCATE: It is assumed that the TRITON-APX appliance and associated servers are located within the same controlled-access facility and exclude unauthorized access to the internal physical network. 4.3 Clarification of Scope The threat agents are divided into two categories:  Attackers who are not TOE users: They have public knowledge of how the TOE operates and are assumed to possess a low skill level, limited resources to alter TOE configuration settings or parameters and no physical access to the TOE.  TOE users: They have extensive knowledge of how the TOE operates and are as- sumed to possess a high skill level, moderate resources to alter TOE configuration settings or parameters and physical access to the TOE. (TOE users are, however, assumed not to be willfully hostile to the TOE.) Both are assumed to have a low level of motivation. The IT assets requiring protection are the TSF and user data saved on or transitioning through the TOE and the hosts on the protected network. The identified threats against the TOE are listed below: T.EXTERNAL_CONTENT: A user on the internal network may access or post con- tent to an external network that has been deemed inappropriate or potentially harmful to the internal network. T.DATA_LOSS: A user may intentionally or inadvertently release sensitive data to unauthorized recipients. T.MASQUERADE: A user may masquerade as another entity in order to gain unau- thorized access to user data or TRITON-APX controlled resources. T.NACCESS: An unauthorized person or external IT entity may be able to view or modify TRITON-APX configuration and control data by hijacking an unattended ad- ministrator session. Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 8 (19) T.UNAUTHORIZED_ACCESS: A user may gain access to security data controlled by TRITON-APX that they are not authorized to access. T.RESOURCE: TRITON-APX users or attackers may cause network connection re- sources to become overused and therefore unavailable Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 9 (19) 5 Architectural Information The TOE physical boundary is shown in Figure 1. Figure 1, Physical TOE Boundry Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 10 (19) 5.1.1 The TOE is comprised of the following subsystems: Core (CentOS Hypervisor) Subsystem The Core Subsystem whose purpose is to provide the implementation of the TOE’s physical hardware, including the Xen hypervisor, and hosted CentOS operating sys- tem. Appliance Controller Subsystem The Appliance Controller Subsystem provides administrators with access to setup and manage the appliance. The Appliance Controller Subsystem processes commands en- tered through one of the management interfaces to request updates to configuration changes as needed. Content Gateway Subsystem The Content Gateway Subsystem whose purpose is to enforce proxy filtering policies by delivering policy decisions to permit or deny access to requested Web content. Network Agent Subsystem The Network Agent monitors Internet traffic and filters non-HTTP protocols such as instant messaging. It provides bandwidth optimization data and enhanced logging de- tail. Web Filtering Subsystem The Web Filtering Subsystem whose purpose is to calculate proxy filtering policies by reading and interpreting policy rules. Email Security Gateway Subsystem Email Security Gateway filters email traffic by managing IP addresses and domain names. Traffic coming from certain IP address and domain names can be blocked or allowed through filtering rules defined by the administrator Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 11 (19) 6 Documentation The physical scope of the TOE also includes the following guidance documentation:  Installation Guide Forcepoint TRITON APX v8.2.x  Installation Instructions TRITON AP-Web v8.2.x  Installation Guide Forcepoint TRITON AP-Data Gateway and Discover v8.2.x  Installing email protection appliance-based solutions, Email Protection Solutions, Version 8.2.x  Installation and deployment guide Forcepoint Endpoint Solutions v8.2.x  TRITON Manager Help Forcepoint TRITON Solutions v8.2.x  Administrator Help Forcepoint TRITON AP-Web v8.2  Administrator Help Forcepoint TRITON AP-Data Gateway and Discover v8.2  Administrator Help Forcepoint TRITON AP-Email v8.2  V-Series Appliance Manager Help TRITON AP-Web, TRITON AP-Email, Web Filter & Security, Models V10000, V5000. v8.2.x  Content Gateway Manager Help Forcepoint Content Gateway, v8.2.x  TRITON AP-Email Personal Email Manager User Help v8.2.x  Quick Start Guide V10000 G22  TRITON APX 8.2Common Criteria Guidance Supplement, v1.0 Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 12 (19) 7 IT Product Testing Both the developer and evaluator testing were executed at Forcepoint site in San Diego, USA. Developer Tests The general test approach was to provide a specific functional test for each behavioral implication of the Security Functional Requirements claimed in the Security Target. The tests focused on covering all security behaviors and ensuring that the functional testing was thorough without being unnecessarily detailed. Test Runs were functional tests conducted externally and manually. Test Procedures involve actions taken by the tester through the following external interfaces:  Appliance Controller GUI  Appliance Controller CLI  Content Gateway GUI  TRITON Manager GUI  Authentication Interface  Content Gateway Traffic Interface  Email Security Gateway Traffic Interface  Network Agent Traffic Interface  Data crawler The functionality of the product was tested through usage scenarios. The basic func- tionality of the TOE was tested when the tester initially set up the TOE by following the procedures outlined in the installation and setup documentation. Independent Evaluator Tests The evaluator conducted nineteen different test cases divided into four different test groups:  Test Group 1: TOE Installation, verification of the guidance documentation  Test Case 1.1 – Walkthrough of TOE installation  Test Group 2: Repetition of a chosen subset of developer tests  Re-test of a subset of the developer tests  Test Group 3: Additional tests defined by the evaluator  Delay caused by incorrect login  User Data Protection (email quarantine, virus)  TOE implementation of FMT_SMF.1  Test Group 4: Penetration testing (vulnerability scanning)  Vulnerability scanning, TRITON Manager  Vulnerability scanning, Forcepoint DLP Secondary Server The results of all the test cases were consistent with the expected test results and all tests were judged as pass. Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 13 (19) Penetration Tests Vulnerability and port scanning were performed using Nessus vulnerability scanner at Forcepoint Triton Manager and Forcepoint DLP Secondary Server, Endpoint inter- face. No high severity vulnerabilities were found. The Medium severity findings were analyzed and none of the vulnerabilities were found exploitable in TOE operational environment. An additional analysis was performed since the endpoint client is outside of the con- trolled environment and therefore is more exposed to attackers. That an attacker is to carry out any potent attack against the TOE is judged low since:  This data flow is protected by TLS  The traffic between an endpoint client and the secondary DLP server is not thought of as being sensitive.  Due to Perfect Forward Secrecy an attacker would have to extract every session key to decrypt every session to have a continuous flow of information. Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 14 (19) 8 Evaluated Configuration The server components of the TOE are intended to be deployed in a physically- secured cabinet room, room, or data center with the appropriate level of physical ac- cess control and physical protection (e.g. fire control, locks, alarms, etc.). Access to the physical console or USB ports on the appliance and associated TOE servers should be restricted via a locked data cabinet within the data center. The TOE is intended to be managed by administrators operating under a consistent security policy. In addi- tion, any authentication server used by the TOE (e.g. Active Directory server) should also be hosted within this secured environment. The TOE environment is responsible for providing protection of network communication between the TOE server compo- nents and also between the TOE and the administrative user. Dependencies to Other Hardware, Firmware and Software The TRITON Manager, Web Log Server and Email Log are not hosted on the For- cepoint appliance. These TOE components are installed on Microsoft Windows server (these components are installed on a single server in the evaluated deployment). The TRITON solution also requires a Microsoft SQL Server to host the Log Server Data- base (the Database and Forcepoint TRITON Manager must be hosted on separate ser- vers). In the evaluated deployment these components are all installed on Windows Servers. The ST specifies the minimum requirements regarding the hardware needed in the en- viroment. The following minimum platform requirements specified in the ST are nec- essary for the deployment of the Forcepoint DLP Endpoint component, depending on the type of endpoint device. The platforms may either be physical devices or provided by Citrix XenDesktop v7.6:  Forcepoint Triton Manager  Microsoft SQL Server  Forcepoint DLP (data security) Servers (primary and secondary)  Forcepoint DLP Appliance (Protector)  Windows Forcepoint DLP Endpoint Client  MacOS Forcepoint DLP Endpoint Client The Forcepoint TRITON Manager is accessed via a web browser on a management workstation using a standard web browser (such as Internet Explorer 11, Firefox 40). Excluded from the TOE Evaluated Configuration Features/Functionality/Components that are not part of the evaluated configuration of the TOE are:  Hybrid Services (Web Hybrid Module and the Email Hybrid Module).  Optional Web components, including Remote Filtering Server, Sync Service, and transparent identification agents (DC Agent, Logon Agent, eDirectory Agent, and RADIUS Agent).  Forcepoint DLP Endpoint DLP used in Forcepoint DLP hybrid and cloud deploy- ments.  Forcepoint DLP ENDPOINT Web and Remote Filtering clients. Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 15 (19) 9 Results of the Evaluation The verdicts for the assurance classes and components are summarised in the follow- ing table: Assurance Class Name / Assurance Family Name Short name Verdict Security Target Evaluation ASE PASS ST Introduction ASE_INT.1 PASS Conformance claims ASE_CCL.1 PASS Security Problem Definition ASE_SPD.1 PASS Security objectives ASE_OBJ.2 PASS Extended components definition ASE_ECD.1 PASS Derived security requirements ASE_REQ.2 PASS TOE summary specification ASE_TSS.1 PASS Life-cycle support ALC PASS Use of a CM system ALC_CMC.2 PASS Parts of the TOE CM Coverage ALC_CMS.2 PASS Delivery procedures ALC_DEL.1 PASS Flaw reporting procedures ALC_FLR.2 PASS Development ADV PASS Security Architecure description ADV_ARC.1 PASS Security-enforcing functional specification ADV_FSP.2 PASS Basic design ADV_TDS.1 PASS Guidance documents AGD PASS Operational user guidance AGD_OPE.1 PASS Preparative procedures AGD_PRE.1 PASS Tests ATE PASS Evidence of coverage ATE_COV.1 PASS Functional testing ATE_FUN.1 PASS Independent testing - Sampling ATE_IND.2 PASS Vulnerability assessment AVA PASS Vulnerability analysis AVA_VAN.2 PASS Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 16 (19) 10 Evaluator Comments and Recommendations The evaluator has no recommendation for the TOE. Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 17 (19) 11 Glossary CEM Common Methodology for Information Technology Security, document describing the methodology used in Common Cri- teria evaluations CentOS Community Enterprise Operating System CLI Command Line Interface DLP Data Loss Prevention EAL Evaluation Assurance Level HTTPS Hypertext Transfer Protocol (Secure) ITSEF IT Security Evaluation Facility, test laboratory licensed to operate within a evaluation and certification scheme GUI Graphical User Interface LAN Local Area Network SAR Security Assurance Requirements SFR Security Functional Requirements ST Security Target, document containing security requirements and specifications , used as the basis of a TOE evaluation TLS Transport Layer Security TOE Target of Evaluation TSF TOE Security Functions Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 18 (19) 12 Bibliography [CCp1] Common Criteria for Information Technology Security Eval- uation, Part 1, version 3.1, revision 4, September 2012, CCMB-2012-09-001 [CCp2] Common Criteria for Information Technology Security Eval- uation, Part 2, version 3.1, revision 4, September 2012, CCMB-2012-09-002 [CCp3] Common Criteria for Information Technology Security Eval- uation, Part 3:, version 3.1, revision 4, September 2012, CCMB-2012-09-003 [CEM] Common Methodology for Information Technology Security Evaluation, version 3.1, revision 4, September 2012, CCMB- 2012-09-004 [ST] Forcepoint, Security Target, TRITON APX 8.2 , Forcepoint LLC., 2017-04-27, version 0.11 Swedish Certification Body for IT Security Certification Report - Forcepoint Triton APX 8.2 16FMV11716-55:1 1.0 2017-06-28 CSEC-37-1272 19 (19) Appendix A Scheme Versions During the certification the following versions of the Swedish Common Criteria Eval- uation and Certification scheme has been used. A.1 Scheme/Quality Management System Version Introduced Impact of changes 1.20.4 2017-05-11 None 1.20.3 2017-04-24 None 1.20.2 2017-02-27 None 1.20.1 2017-01-12 None 1.20 2016-10-20 Original version Scheme Notes Release 9.0:  Scheme Note 15 - Demonstration of test coverage  Scheme Note 18 - Highlighted Requirements on the Security Target