Ärendetyp 5.3 Diarienummer: 24FMV1230-33 Dokument ID CSEC2024001 Enligt säkerhetsskyddslagen (2018:585) SEKRETESS Enligt offentlighets- och Sekretesslagen (2009:400) 2024-11-08 Försvarets materielverk Swedish Defence Material Administration Swedish Certification Body for IT Security Certification Report - HP EH HCDPP Issue: 1.0, 2024-nov-08 Authorisation: Helén Svensson, Lead Certifier , CSEC Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 2 (20) Table of Contents 1 Executive Summary 3 2 Identification 4 3 Security Policy 5 3.1 Auditing 5 3.2 Data encryption (a.k.a cryptography) 5 3.3 Identification, authentication, and authorization to use HCD functions 6 3.4 Access control 6 3.5 Trusted communications 7 3.6 Administrative roles 7 3.7 Trusted operation 7 4 Assumptions and Clarification of Scope 8 4.1 Clarification of Scope 8 5 Architectural Information 10 6 Documentation 12 7 IT Product Testing 13 7.1 Developer Testing 13 7.2 Evaluator Testing 13 7.3 Penetration Testing 13 8 Evaluated Configuration 14 9 Results of the Evaluation 16 10 Evaluator Comments and Recommendations 18 11 Bibliography 19 Appendix A Scheme Versions 20 A.1 Scheme/Quality Management System 20 A.2 Scheme Notes 20 Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 3 (20) 1 Executive Summary The TOE is the HP Color LaserJet Enterprise 5700, HP Color LaserJet Enterprise 6700/6701, HP Color LaserJet Enterprise X55745, and HP Color LaserJet Enterprise X65455/X65465 printers with HP FutureSmart 5.7.1.1 Firmware. The TOE is a hardcopy device (HCD) also known as a single-function printer (SFP). The TOE is an HCD including internal firmware, but exclusive of non-security rele- vant options such as finishers. The TOE also includes the English-language guidance documentation. The following firmware modules are included in the TOE: • System firmware • Jetdirect Inside firmware • Protection Profile for Hardcopy Devices; IPA, NIAP, and the MFP Technical Community . Version 1.0 as of 2015-09-10; exact conformance. • Protection Profile for Hardcopy Devices - v1.0, Errata #1 . Version 1.0 as of 2017- 06; exact conformance. The evaluation has been performed by atsec information security AB in in their prem- ises in Danderyd, Sweden. The evaluation was completed on 2024-10-22. The evaluation was conducted in ac- cordance with the requirements of Common Criteria (CC), version. 3.1 release 5. atsec information security AB is a licensed evaluation facility for Common Criteria under the Swedish Common Criteria Evaluation and Certification Scheme. atsec infor- mation security AB is also accredited by the Swedish accreditation body according to ISO/IEC 17025 for Common Criteria. (Repeat if more than one ITSEF is involved) The certifier monitored the activities of the evaluator by reviewing all successive ver- sions of the evaluation reports. The certifier determined that the evaluation results confirm the security claims in the Security Target (ST) and the Common Methodology for evaluation assurance level EAL 1 augmented by e.g. ALC_SPD.1. The technical information in this report is based on the Security Target (ST) and the Final Evaluation Report (FER) produced by atsec information security AB The certification results only apply to the version of the product indicated in the certificate, and on the condition that all the stipulations in the Security Target are met. This certificate is not an endorsement of the IT product by CSEC or any other or- ganisation that recognises or gives effect to this certificate, and no warranty of the IT product by CSEC or any other organisation that recognises or gives effect to this certificate is either expressed or implied. Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 4 (20) 2 Identification Certification Identification Certification ID CSEC2024001 Name and version of the cer- tified IT product • HP Color LaserJet Enterprise 5700 HP Color LaserJet Enterprise X55745 System firmware version: 2507252_046154 Jetdirect Inside firmware version: JOL25077219 • HP Color LaserJet Enterprise 6700/6701 HP Color LaserJet Enterprise X65455/X65465 System firmware version: 2507252_046165 Jetdirect Inside firmware version JOL25077219 Security Target Identification HP Color LaserJet Enterprise 5700, HP Color Laser- Jet Enterprise 6700/6701, HP Color LaserJet Enter- prise X55745, HP Color LaserJet Enterprise X65455/X65465 Security Target, HP Inc., 2024-05- 22, document version 1.0 EAL for CCRA and EA_MLA: Protection Profile for Hardcopy Devices v1.0 with Errata #1, including ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, and AVA_VAN.1 for SOGIS: EAL 1 + ASE_SPD.1 Sponsor HP Inc. Developer HP Inc. ITSEF atsec information security AB Common Criteria version 3.1 release 5 CEM version 3.1 release 5 QMS version QMS 2.5.2 Scheme Notes Release 22.0 Recognition Scope CCRA, SOGIS, EA/MLA Certification date 2024-11-08 Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 5 (20) 3 Security Policy The TOE provides the following security services: • Auditing • Data encryption (a.k.a cryptography) • Identification, authentication, and authorization to use HCD functions • Access control • Image Overwrite • Trusted Communications • Administrative Roles • Trusted Operation A brief description of each security policy is given below. A more detailed de-scrip- tion is given in the ST. 3.1 Auditing The TOE supports both internal and external storage of audit records. The evaluated configuration requires the use of an external syslog server for external audit record storage. The connection between the TOE and the syslog server is protected using IP- sec. No unauthorized access to the audit records is allowed by the TOE. 3.2 Data encryption (a.k.a cryptography) 3.2.1 IPsec The TOE's IPsec supports both pre-shared keys (PSKs) and X.509v3 certificates for authentication, the Encapsulating Security Payload (ESP), Internet Security Associa- tion and Key Management Protocol (ISAKMP), Internet Key Exchange version 1 (IKEv1) protocol, and the following crypto algorithms and key sizes: DH (P=2048, SHA2-256), DSA (L=2048, N=224; L=2048, N=256; L=3072, N=256), RSA (2048 and 3072 bits), AES-CBC (128 and 256 bits), AES-ECB (256 bits), SHA-1, SHA2- 256, SHA2-384, SHA2-512, HMAC-SHA-1, HMAC-SHA2-256, HMAC-SHA2-384, and HMAC-SH2-512. 3.2.2 Drive-lock password For secure storage, all TOE models contain one field-replaceable, nonvolatile storage device. This storage device is disk-based, self-encrypting drive (SED). The SED in the TOE uses the 256-bit "drive-lock password" as the border encryption value (BEV), which is used to unlock the data on the drive. The BEV is generated by the TOE using a CTR_DRBG(AES) algorithm and is stored as a key chain of one in non-field re- placeable nonvolatile storage (SPI flash and EEPROM) located inside the TOE. 3.2.3 Digital signatures for trusted update The TOE uses digital signatures based on the RSA 2048-bit algorithm, SHA2-256 al- gorithm, and PKCS#1 v1.5 to verify the authenticity of the signed update images. The TOE's EWS interface allows an administrator to verify and install the signed update images. 3.2.4 Digital signatures for TSF testing The TOE uses digital signatures as part of its TSF testing functionality. Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 6 (20) 3.2.5 Cryptographic implementations/modules The TOE uses multiple cryptographic implementations to accomplish its crypto- graphic functions. The table below provides the complete list of cryptographic imple- mentations: Cryptographic implementation Usage HP FurtureSmart Firmware OpenSSL 1.1.1 Drive-lock password (BEV) generation, TSF testing, Trusted Update HP FutureSmart Firmware QuickSec 7.3 Cryptographic Module IKE HP FutureSmart Firmware Linux Kernel Crypto API IPsec 3.3 Identification, authentication, and authorization to use HCD functions The following table shows the Internal and External Authentication mechanisms sup- ported by the TOE in the evaluated configuration and maps the mechanisms to the in- terfaces that use them. Authentication type Mechanism name Supported interfaces Internal Authentication Local Device Sign In Control Panel, EWS, REST External Authentication LDAP Sign In Control Panel, EWS Windows Sign In Control Panel, EWS REST 3.4 Access control The TOE enforces access control on TSF data and User Data. Each piece of User Data is assigned ownership and access to the data is limited by the access control mecha- nism. The permission sets used to define roles also affect the access control of each user. The TOE contains one field-replaceable, nonvolatile storage device. This storage de- vice is a disk-based SED whose cryptographic functions have been CC certified. To- gether with the drive-lock password, the SED ensures that TSF Data and User Data on the drives is not stored as plaintext. 3.4.1 Image overwrite The TOE also supports the optional Image Overwrite function (O.IMAGE_OVER- WRITE) defined in [HCDPPv1.0]. [HCDPPv1.0] limits the scope of this function to a field-replaceable nonvolatile storage device. Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 7 (20) 3.5 Trusted communications The TOE uses IPsec to protect the communications between the TOE and trusted IT entities as well as between the TOE and client computers. IPsec provides assured iden- tification of the endpoints. It implements IKEv1 and transport mode. The TOE also supports both X.509v3 certificates and pre-shared keys (PSKs) for endpoint authentication. 3.6 Administrative roles The TOE supports administrative and non-administrative roles. Assignment to these roles is controlled by the TOE's administrator. In the case of a user authenticated using an External Authentication mechanism (Windows Sign In and LDAP Sign In), the roles are implemented as permission sets. In the case of a user au- thenticated using an Internal Authentication mechanism (Local Device Sign In), only an administrative account exists. 3.7 Trusted operation TOE updates can be downloaded from the HP Inc. website. These updates are digitally signed by HP Inc. using the RSA 2048-bit algorithm, SHA2-256 algorithm, and PKCS#1 v1.5 signature generation. The TOE's EWS interface allows an administrator to install the update images. When installing an update image, the TOE validates the digital signature of the update image before installing the update image. The TOE contains TSF testing functionality referred to as Whitelisting to help ensure only authentic, known-good System firmware files that have not been tampered with are loaded into memory. The TOE supports dm-verity to protect the integrity of the SquashFS file system firmware images. On each boot, the TOE verifies the digital sig- nature of the dm-verity hash tree corresponding to a SquashFS file system firmware image. During operation, dm-verity verifies the integrity of a file system block before loading it into memory. The TOE uses digital signatures based on the RSA 2048-bit algorithm, SHA2-256 algorithm, and PKCS#1 v1.5 to verify the integrity of a dm-ver- ity hash tree. Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 8 (20) 4 Assumptions and Clarification of Scope The Security Target [ST] makes four assumptions on the usage and the operational en- vironment of the TOE. A.PHYSICAL Physical security, commensurate with the value of the TOE and the data it stores or processes, is assumed to be provided by the environment. A.TRUSTED_ADMIN TOE Administrators are trusted to administer the TOE according to site security poli- cies. A.TRAINED_USERS Authorized Users are trained to use the TOE according to site security policies. A.NETWORK The Operational Environment is assumed to protect the TOE from direct, public ac- cess to its LAN interface. 4.1 Clarification of Scope The Security Target contains five threats, which have been considered during the eval- uation. T.UNAUTHORIZED_ACCESS An attacker may access (read, modify, or delete) User Document Data or change (modify or delete) User Job Data in the TOE through one of the TOE’s interfaces. T.TSF_COMPROMISE An attacker may gain Unauthorized Access to TSF Data in the TOE through one of the TOE’s interfaces. T.TSF_FAILURE A malfunction of the TSF may cause loss of security if the TOE is permitted to oper- ate while in a degraded state. T.UNAUTHORIZED_UPDATE An attacker may cause the installation of unauthorized software on the TOE. T.NET_COMPROMISE An attacker may access data in transit or otherwise compromise the security of the TOE by monitoring or manipulating network communication The Security Target contains six Organisational Security Policies (OSPs), which have been considered during the evaluation. P.AUTHORIZATION Users must be authorized before performing Document Processing and administrative functions. P.AUDIT Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 9 (20) Security-relevant activities must be audited and the log of such actions must be pro- tected and transmitted to an External IT Entity. P.COMMS_PROTECTION The TOE must be able to identify itself to other devices on the LAN. P.STORAGE_ENCRYPTION If the TOE stores User Document Data or Confidential TSF Data on Field-Replacea- ble Nonvolatile Storage Devices, it will encrypt such data on those devices. P.KEY_MATERIAL Cleartext keys, submasks, random numbers, or any other values that contribute to the creation of encryption keys for Field-Replaceable Nonvolatile Storage of User Docu- ment Data or Confidential TSF Data must be protected from unauthorized access and must not be stored on that storage device. P.IMAGE_OVERWRITE Upon completion or cancellation of a Document Processing job, the TOE shall over- write residual image data from its Field-Replaceable Nonvolatile Storage Device. Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 10 (20) 5 Architectural Information The TOE is designed to be shared by many client computers and human users. It per- forms the functions of printing and storing of documents. It can be connected to a lo- cal network through the embedded Jetdirect Inside's built-in Ethernet, or to a USB de- vice using its USB port (but the use of which must be disabled in the evaluated config- uration except when the administrator performs trusted update via the USB). The TOE's operating system is Linux 4.9.230 running on an ARM Cortex-A53 proces- sor. The TOE supports Local Area Network (LAN) capabilities and protects all network communications with IPsec, which is part of the Jetdirect Inside firmware. It imple- ments Internet Key Exchange version 1 (IKEv1) and supports both pre-shared key (PSK) authentication and X.509v3 certificate-based authentication. The TOE supports both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). The HTTP-based EWS administrative interface allows administrators to remotely manage the features of the TOE using a web browser. This interface is protected using IPsec. The Web Services (WS) interfaces allow administrators to externally manage the TOE. The evaluated configuration only supports the REST Web Services interface. The REST Web Services interface is protected using IPsec. For design reasons, only one computer can be used as the Administrative Computer for the TOE in the evaluated configuration. This computer is used for administration of the TOE. All other client computers connecting to the TOE to perform non-admin- istrative tasks are known as Network Client Computers. The PJL interface is used by unauthenticated users via Network Client Computers to submit print jobs and receive job status (e.g., view the print queue). The unauthenti- cated users use PJL over an IPsec connection. It is also used in a non-administrative capacity by the Administrative Computer to send print jobs to the TOE as well as to receive job status. In general, PJL supports password-protected administrative com- mands, but in the evaluated configuration these commands are disabled. The TOE supports a remote file system for storing and retrieving backup files during Back up and Restore operations.. The TOE uses IPsec to protect the communication to the remote file system. For remote file system connectivity, the TOE supports the SMB protocol. The TOE can send email alert messages to administrator-specified email addresses, mobile devices, or to a website. The TOE supports protected communications between itself and Simple Mail Transfer Protocol (SMTP) gateways. It uses IPsec to protect the communication with the SMTP gateway. The TOE can only send emails; it does not accept inbound emails. The TOE supports the auditing of security-relevant functions by generating and for- warding audit records to an external syslog server. It supports both internal and exter- nal storage of audit records. The TOE uses IPsec to protect the communications be- tween itself and the syslog server. The TOE requires a DNS server, an NTS server, and a WINS server in the Operational Environment. The TOE connects to them over an IPsec connection. Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 11 (20) Each HCD contains a user interface (UI) called the Control Panel. The Control Panel consists of a touchscreen LCD. The Control Panel is the physical interface that a user uses to communicate with the TOE when physically using the HCD. The LCD screen displays information such as menus and status to the user. It also provides virtual but- tons to the user such as an alphanumeric keypad for entering usernames and pass- words. Both administrative and non-administrative users can access the Control Panel. The TOE supports both Internal Authentication mechanisms (Local Device Sign In) and External Authentication mechanisms (LDAP Sign In and Windows Sign In i.e., Kerberos). All TOE models contain one field-replaceable nonvolatile storage device. This storage device is a disk-based self-encrypting drive (SED). It contains a section called Job Storage which is a user-visible file system where user document data, such as stored print, are located. The Jetdirect Inside firmware and System firmware components comprise the firm- ware on the system. Both firmware components work together to provide the security functionality of the TOE. They share the same operating system. Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 12 (20) 6 Documentation Common Criteria Evaluated Configuration Guide for HP Single-function Printers HP Color LaserJet Enterprise 5700, HP Color LaserJet Enterprise 6700/6701, HP Color LaserJet Enterprise X55745, HP Color LaserJet Enterprise X65455/X65465 Edition 1, 6/2024 [CCECG] Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 13 (20) 7 IT Product Testing 7.1 Developer Testing [HCDPPv1.0] does not requires the developer to perform any testing. 7.2 Evaluator Testing The evaluator performed testing remotely by connecting to the test environment using Microsoft Remote Desktop (RDP). The developers setup the test environment with the actual TOE models in Boise, Idaho, USA. The testing was performed between 2024- 03-27 and 2024-05-21. The tests included both automated and manual tests which the evaluator executed successfully The developer configured the TOE according to the [CCECG]. Before initiating test- ing the evaluator verified that the TOE was configured correctly. The evaluator also verified that the test environment was properly set up by the developer. The following models were tested: TOE Name (hardware models) System Firmware Vers- ion Jetdirect Inside Firmware Version HP Color LaserJet Enter- prise 5700dn 2507252_046154 JOL25077219 HP Color LaserJet Enter- prise 6700dn 2507252_046165 JOL25077219 7.3 Penetration Testing Port scans penetration tests were performed against the TOE interfaces that are acces- sible to a potential attacker (IPv4 and IPv6 UDP and TCP ports of the TOE). Since an attack requires an attack surface, the evaluator decided to start by examining if the TOE exposes such interfaces, i.e., open ports. The TOE and operational environment was configured according to [ST] and [CCECG]. The following models were tested: TOE Name (hardware models) System Firmware Vers- ion Jetdirect Inside Firmware Version HP Color LaserJet Enter- prise 5700dn 2507252_046154 JOL25077219 HP Color LaserJet Enter- prise 6700dn 2507252_046165 JOL25077219 The evaluator examined all potential interfaces, i.e., all IPv4 and IPv6 UDP and TCP ports. The evaluator examined the results from the penetration test and provided a summari- zation within the "Evaluator penetration testing EH HCDPP". The evaluator deter- mined that only UDP port 500 (ISAKMP) is available outside of IPsec which was the expected outcome. Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 14 (20) 8 Evaluated Configuration The physical boundary of the TOE is the physical boundary of the HCD product. Op- tions and add-ons that are not security relevant, such as finishers, are not part of the evaluation but can be added to the TOE without any security implications. The following items will need to be adhered to in the evaluated configuration. • Only one Administrative Computer is used to manage the TOE. • Third-party solutions must not be installed on the TOE. • Device USB must be disabled. • Host USB plug and play must be disabled. • Firmware Upgrades through any means other than the EWS (e.g., PJL) and USB must be disabled. • HP Jetdirect XML Services must be disabled. • External file system access through PJL and PS must be disabled. • Only X.509v3 certificates and pre-shared key are supported methods for IPsec authentication (IPsec authentication using Kerberos is not supported). • IPsec Authentication Headers (AH) must be disabled. • Control Panel Mandatory Sign-in must be enabled (this disables the Guest role). • SNMP must be disabled. • The Service PIN, used by a customer support engineer to access functions availa- ble to HP support personnel, must be disabled. • Wireless functionality must be disabled: − Near Field Communication (NFC) must be disabled. − Bluetooth Low Energy (BLE) must be disabled. − Wireless Direct Print must be disabled. − Wireless station must be disabled. • PJL device access commands must be disabled. • When using Windows Sign In, the Windows domain must reject Microsoft NT LAN Manager (NTLM) connections. • Remote Control-Panel use is disallowed. • Local Device Sign In accounts must not be created (i.e., only the Device Admin- istrator account is allowed as a Local Device Sign In account). • Access must be blocked to the following Web Services (WS) using IPsec: − Open Extensibility Platform device (OXPd) Web Services − WS* Web Services • Device Administrator Password must be set. • Remote Configuration Password must not be set. • OAUTH2 use is disallowed. • SNMP over HTTP use is disallowed. • HP Workpath Platform must be disabled. • Licenses must not be installed to enable features beyond what is supported in the evaluated configuration. • Firmware updates through REST Web Services is disallowed. • PS privileged operators must be disabled. • Cancel print jobs after unattended error must be enabled. Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 15 (20) • FIPS-140 must be disabled. • Partial clean functionality of the TOE is disallowed. • Smart Cloud Print must be disabled. The following components are required as part of the Operational Environment: • A Domain Name System (DNS) server • A Network Time Service (NTS) server • One administrative client computer connected to the TOE in the role of an Ad- ministrative Computer. It must contain a web browser • One or both of the following: − Lightweight Directory Access Protocol (LDAP) server − Windows domain controller/Kerberos server • A syslog server • A Windows Internet Name Service (WINS) server The following components are optional in the Operational Environment: • Client computers connected to the TOE in a non-administrative computer role • HP Print Drivers, including the HP Universal Print Driver, for client computers (for submitting print job requests from client computers) • The following remote file systems: − Server Message Block (SMB) • A Simple Mail Transfer Protocol (SMTP) gateway Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 16 (20) 9 Results of the Evaluation The evaluators applied each work unit of the Common Methodology [CEM] within the scope of the evaluation, and concluded that the TOE meets the security objectives stated in the Security Target [ST] for an attack potential of Basic. The certifier reviewed the work of the evaluators and determined that the evaluation was conducted in accordance with the Common Criteria [CC]. The evaluators' overall verdict is PASS. The verdicts for the assurance classes and components are summarised in the follow- ing table: Assurance Class/Family Short name Verdict Development ADV PASS Basic functional specification ADV_FSP.1 PASS Guidance Documents AGD PASS Operational User Guidance AGD_OPE.1 PASS Preparative Procedures AGD_PRE.1 PASS PP assurance activities AGD_HCDPP.1 PASS Life-cycle Support ALC PASS Labeling of the TOE ALC_CMC.1 PASS TOE CM coverage ALC_CMS.1 PASS PP assurance activities ALC_HCDPP.1 PASS Security Target Evaluation ASE PASS ST Introduction ASE_INT.1 PASS Conformance Claims ASE_CCL.1 PASS Security Problem Definition ASE_SPD.1 PASS Security Objectives for the ASE_OBJ.1 PASS Operational Environment Extended Components Definition ASE_ECD.1 PASS Stated Security Requirements ASE_REQ.1 PASS TOE Summary Specification ASE_TSS.1 PASS PP assurance activities ASE_HCDPP.1 PASS Tests ATE PASS Independent Testing - ATE_IND.1 PASS conformance PP assurance activities ATE_HCDPP.1 PASS Vulnerability Assessment AVA PASS Vulnerability survey AVA_VAN.1 PASS PP assurance activities AVA_HCDPP.1 PASS Entropy Description AEN PP assurance activities AEN_HCDPP.1 PASS Key Management Description AKM PP assurance activities AKM_HCDPP.1 PASS Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 17 (20) Note that the evaluators have used a notation similar to assurance classes for PP assur- ance activities that does not belong to a particular assurance class in CC. For PP requirements that are related to existing assurance classes, the evaluators have used a notation similar to assurance components for the requirements. Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 18 (20) 10 Evaluator Comments and Recommendations None. Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 19 (20) 11 Bibliography ST HP Color LaserJet Enterprise 5700, HP Color LaserJet Enterprise 6700/6701, HP Color LaserJet Enterprise X55745, HP Color La- serJet Enterprise X65455/X65465 Security Target, HP Inc., 2024- 05-22, document version 1.0 HCDPPv1.0 Protection Profile for Hardcopy Devices; IPA, NIAP, and the MFP, 2015-09-10, Version 1.0 ERRATA Protection Profile for Hardcopy Devices - v1.0, Errata #1, June 2017 CCECG Common Criteria Evaluated Configuration Guide for HP Single- function Printers HP Color LaserJet Enterprise 5700, HP Color LaserJet Enterprise 6700/6701, HP Color LaserJet Enterprise X55745, HP Color LaserJet Enterprise X65455/X65465 Edition 1, 6/2024 CCpart1 Common Criteria for Information Technology Security Evaluation, Part 1, version 3.1 revision 5, CCMB-2017-04-001 CCpart2 Common Criteria for Information Technology Security Evaluation, Part 2, version 3.1 revision 5, CCMB-2017-04-002 CCpart3 Common Criteria for Information Technology Security Evaluation, Part 3, version 3.1 revision 5, CCMB-2017-04-003 CC CCpart1 + CCpart2 + CCpart3 CEM Common Methodology for Information Technology Security Eval- uation, version 3.1 revision 5, CCMB-2017-04-004 SP-002 002 Evaluation and Certification, CSEC, 2023-Jun-02, document version 35.0 SP-188 SP-188 Scheme Crypto Policy, CSEC, 2023-Sep-06, document version 13.0 Swedish Certification Body for IT Security Certification Report - HP EH HCDPP 24FMV1230-33 1.0 2024-11-08 CSEC2024001 20 (20) Appendix A Scheme Versions During the certification the following versions of the Swedish Common Criteria Eval- uation and Certification scheme have been used. A.1 Scheme/Quality Management System Version Introduced Impact of changes 2.5.2 2024-06-14 None 2.5.1 Application Original version A.2 Scheme Notes Scheme Note 15 - Testing Scheme Note 18 - Highlighted Requirements on the Security Target Scheme Note 21 - NIAP PP Certifications Scheme Note 22 - Vulnerability assessment Scheme Note 23 - Evaluation reports for NIAP PPs and cPPs Scheme Note 25 - Use of CAVP-tests in CC evaluations Scheme Note 27 - ST requirements at the time of application for certification Scheme Note 28 - Updated procedures for application, evaluation and certification.