Ärendetyp: 6 Diarienummer: 20FMV3647-21:1 Dokument ID Enligt säkerhetsskyddslagen (2018:585) SEKRETESS Enligt offentlighets- och Sekretesslagen (2009:400) 2021-09-22 Försvarets materielverk Swedish Defence Material Administration Swedish Certification Body for IT Security Certification Report HP MS HCDPP Issue: 2.0, 2021-Sep-22 Authorisation: Helén Svensson, Lead certifier , CSEC Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 2 (21) Table of Contents 1 Executive Summary 3 2 Identification 4 3 Security Policy 5 3.1 Identification, Authentication, and Authorization to Use HCD Functions 5 3.2 Access Control 5 3.3 Data Encryption (a.k.a. cryptography) 6 3.4 Trusted communications 7 3.5 Administrative roles 7 3.6 Auditing 7 3.7 Trusted operation 7 4 Assumptions and Clarification of Scope 8 4.1 Assumptions 8 4.2 Clarification of Scope 8 5 Architectural Information 9 6 Documentation 11 7 IT Product Testing 12 7.1 Developer Testing 12 7.2 Evaluator Testing 12 7.3 Penetration Testing 12 8 Evaluated Configuration 14 9 Results of the Evaluation 16 10 Evaluator Comments and Recommendations 17 11 Glossary 18 12 Bibliography 20 Appendix A Scheme Versions 21 A.1 Scheme/Quality Management System 21 A.2 Scheme Notes 21 Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 3 (21) 1 Executive Summary The TOE is the HP Color LaserJet Enterprise M554/M555, HP Color LaserJet Enter- prise M652/M653, and HP Color LaserJet Managed E65050/E65060 printers with HP FutureSmart 4.11.0.1 Firmware. The TOE is a hardcopy device (HCD) also known as a single-function printer (SFP). The TOE is an HCD including internal firmware, but exclusive of non-security rele- vant options such as finishers. The TOE also includes the English-language guidance documentation. The following firmware modules are included in the TOE:  System firmware  Jetdirect Inside firmware The ST claims conformance to:  Protection Profile for Hardcopy Devices; IPA, NIAP, and the MFP Technical Community. Version 1.0 as of 2015-09-10; exact conformance.  Protection Profile for Hardcopy Devices - v1.0, Errata #1, Version 1.0 as of 2017- 06; exact conformance. The evaluation has been performed by atsec information security AB in their premises in Danderyd, Sweden. The evaluation was completed on 2021-06-30. The evaluation was conducted in accordance with the requirements of Common Criteria (CC), ver- sion. 3.1 release 5. atsec information security AB is a licensed evaluation facility for Common Criteria under the Swedish Common Criteria Evaluation and Certification Scheme. atsec infor- mation security AB is also accredited by the Swedish accreditation body according to ISO/IEC 17025 for Common Criteria. The certifier monitored the activities of the evaluator by reviewing all successive ver- sions of the evaluation reports. The certifier determined that the evaluation results both confirm both to the evaluation activities in the HCDPP and the security claims in the Security Target (ST) and the Common Methodology for evaluation assurance level EAL 1 augmented by e.g. ALC_SPD.1. The technical information in this report is based on the Security Target (ST) and the Final Evaluation Report (FER) produced by atsec information security AB. The Certification Report has been updated on 2021-09-22 with a new reference to the Security Target. The certification results only apply to the version of the product indicated in the certificate, and on the condition that all the stipulations in the Security Target are met. This certificate is not an endorsement of the IT product by CSEC or any other or- ganisation that recognises or gives effect to this certificate, and no warranty of the IT product by CSEC or any other organisation that recognises or gives effect to this certificate is either expressed or implied. Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 4 (21) 2 Identification Certification Identification Certification ID CSEC2020015 Name and version of the cer- tified IT product  HP Color LaserJet Enterprise M554/M555 Jetdirect Inside firmware version: JSI24110014 System firmware version: 2411097_060479  HP Color LaserJet Enterprise M652/M653/ E65050/ E65060 Jetdirect Inside firmware version: JSI24110014 System firmware version: 2411097_060484  HP Color LaserJet Managed E65050/ E65060 Jetdirect Inside firmware version: JSI24110014 System firmware version: 2411097_060484 Security Target Identification HP Color LaserJet Enterprise M554/M555, HP Color LaserJet Enterprise M652/M653, HP Color LaserJet Managed E65050/E65060 Security Target, HP Inc., 2021-08-24, document ver- sion 1.2 EAL for CCRA and EA_MLA: Protection Profile for Hardcopy Devices v1.0 with Errata #1, including ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, and AVA_VAN.1 for SOGIS: EAL 1 + ASE_SPD.1 Sponsor HP Inc. Developer HP Inc. ITSEF atsec information security AB Common Criteria version 3.1 release 5 CEM version 3.1 release 5 QMS version 1.25 Scheme Notes Release 18.0 Recognition Scope CCRA, SOGIS, EA/MLA Certification date 2021-07-09 Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 5 (21) 3 Security Policy The TOE provides the following security services:  Identification, authentication, and authorization to use HCD functions  Access control  Data encryption (a.k.a. cryptography)  Trusted communications  Administrative roles  Auditing  Trusted operation A brief description of each security policy is given below. A more detailed description is given in the ST. 3.1 Identification, Authentication, and Authorization to Use HCD Functions The following table shows the Internal and External Authentication mechanisms sup- ported by the TOE in the evaluated configuration and maps the mechanisms to the in- terfaces that use them. Authentication type Mechanism name Supported interfaces Internal Authentication Local Device Sign In Control Panel, EWS, REST External Authentication LDAP Sign In Control Panel, EWS Windows Sign In Control Panel, EWS, REST 3.2 Access Control The TOE enforces access control on TSF data and User Data. Each piece of User Data is assigned ownership and access to the data is limited by the access control mecha- nism. The permission sets used to define roles also affect the access control of each user. The TOE contains one field-replaceable nonvolatile storage device. This storage de- vice is a disk-based SED whose cryptographic functions have been FIPS 140-2 vali- dated. Together with the drive-lock password, the SED ensures that TSF Data and User Data on the drive is not stored as plaintext on the storage device. The TOE also supports the optional Image Overwrite function (O.IMAGE_OVER- WRITE) defined in [HCDPPv1.0]. [HCDPPv1.0] limits the scope of this function to a field-replaceable nonvolatile storage device. Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 6 (21) 3.3 Data Encryption (a.k.a. cryptography) 3.3.1 IPsec The TOE's IPsec supports both pre-shared keys (PSKs) and X.509v3 certificates for authentication, the Encapsulating Security Payload (ESP), Internet Security Associa- tion and Key Management Protocol (ISAKMP), Internet Key Exchange version 1 (IKEv1) protocol, and the following cryptographic algorithms: Diffie-Hellman (DH), Elliptic Curve DH (ECDH) Digital Signature Algorithm (DSA), Elliptic Curve DSA (ECDSA), Rivest-Shamir-Adleman (RSA), Advanced Encryption Standard-Cipher Block Chaining (AES-CBC), Advanced Encryption Standard-Electronic Code Book (AES-ECB), Secure Hash Algorithm-based (SHA-based) Hashed Message Authenti- cation Codes (HMACs), Public-Key Cryptography Standards (PKCS) #1 v1.5 signa- ture generation and verification, and counter mode deterministic random bit generator using AES (CTR_DRBG(AES)). 3.3.2 Drive-lock Password For secure storage, all TOE models contain one field-replaceable nonvolatile storage device. This storage device is a disk-based, self-encrypting drive that is FIPS 140-2 validated. The self-encrypting drive (SED) in the TOE uses a 256-bit "drive-lock password" as the border encryption value (BEV) which is used to unlock the data on the drive. The BEV is generated by the TOE using a CTR_DRBG(AES-256) algorithm and is stored as a key chain of one in non-field replaceable nonvolatile storage (i.e., EEPROM) lo- cated inside the TOE. The CTR_DRBG(AES-256) uses the Advanced Encryption Standard-Counter (AES-CTR) algorithm. 3.3.3 Digital Signatures for Trusted Update The TOE uses digital signatures based on the RSA 2048-bit algorithm, SHA2-256 al- gorithm, and PKCS#1 v1.5 to verify the authenticity of the signed update images. The TOE's EWS interface allows an administrator to verify and install the signed update images. 3.3.4 Digital Signatures for TSF Testing The TOE uses digital signatures as part of its TSF testing functionality. 3.3.5 Cryptographic Implementations/Modules The TOE uses multiple cryptographic implementations to accomplish its crypto- graphic functions. The table below provides the complete list of cryptographic imple- mentations and maps them to the firmware models:. Firmware module Cryptographic implementa- tion Usage Jetdirect Inside firmware HP FutureSmart OpenSSL FIPS Object Module 2.0.4 Drive-lock password (BEV) generation HP FutureSmart QuickSec 5.1 IPsec System firmware HP FutureSmart Windows Mobile Enhanced Crypto- graphic Provider (RSAENH) 6.00.1937 TSF testing Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 7 (21) HP FutureSmart Rebex Total Pack 2017 R1 2470159 Trusted update 3.4 Trusted communications The TOE uses IPsec to protect the communications between the TOE and trusted IT entities as well as between the TOE and client computers. IPsec provides assured iden- tification of the endpoints. It implements IKEv1 and transport mode. The TOE also supports both X.509v3 certificates and pre-shared keys (PSKs) for endpoint authenti- cation. 3.5 Administrative roles The TOE supports administrative and non-administrative roles. Assignment to these roles is controlled by the TOE's administrator. In the case of a user authenticated using an External Authentication mechanism (Windows Sign In and LDAP Sign In), the roles are implemented as permission sets. In the case of a user au- thenticated using an Internal Authentication mechanism (Local Device Sign In), only an administrative account exists. 3.6 Auditing The TOE supports both internal and external storage of audit records. The evaluated onfiguration requires the use of an external syslog server for external audit record stor- age. The connection between the TOE and the syslog server is protected using IPsec. No unauthorized access to the audit records is allowed by the TOE. 3.7 Trusted operation TOE updates can be downloaded from the HP Inc. website. These updates are digitally signed by HP Inc. using the RSA 2048-bit algorithm, SHA2-256 algorithm, and PKCS#1 v1.5 signature generation. The TOE's EWS interface allows an administrator to install the update images. When installing an update image, the TOE validates the digital signature of the update image before installing the update image. The TOE contains TSF testing functionality referred to as Whitelisting to help ensure only authentic, known-good System firmware files that have not been tampered with are loaded into memory. Whitelisting uses digital signatures based on the RSA 2048- bit algorithm, SHA2-256 algorithm, and PKCS#1 v1.5 to validate the firmware files. Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 8 (21) 4 Assumptions and Clarification of Scope 4.1 Assumptions The Security Target [ST] makes four assumptions on the usage and the operational en- vironment of the TOE. A.PHYSICAL - Physical security, commensurate with the value of the TOE and the data it stores or processes, is assumed to be provided by the environment. A.TRUSTED_ADMIN - TOE - Administrators are trusted to administer the TOE ac- cording to site security policies. A.TRAINED_USERS - Authorized Users are trained to use the TOE according to site security policies. A.NETWORK - The Operational Environment is assumed to protect the TOE from direct, public access to its LAN interface. 4.2 Clarification of Scope The Security Target contains five threats, which have been considered during the eval- uation. T.UNAUTHORIZED_ACCESS - An attacker may access (read, modify, or delete) User Document Data or change (modify or delete) User Job Data in the TOE through one of the TOE’s interfaces. T.TSF_COMPROMISE - An attacker may gain Unauthorized Access to TSF Data in the TOE through one of the TOE’s interfaces. T.TSF_FAILURE - A malfunction of the TSF may cause loss of security if the TOE is permitted to operate. T.UNAUTHORIZED_UPDATE - An attacker may cause the installation of unauthor- ized software on the TOE. T.NET_COMPROMISE - An attacker may access data in transit or otherwise compro- mise the security of the TOE by monitoring or manipulating network communication. The Security Target contains six Organisational Security Policies (OSPs), which have been considered during the evaluation. P.AUTHORIZATION - Users must be authorized before performing Document Pro- cessing and administrative functions. P.AUDIT - Security-relevant activities must be audited and the log of such actions must be protected and transmitted to an External IT Entity. P.COMMS_PROTECTION - The TOE must be able to identify itself to other devices on the LAN. P.STORAGE_ENCRYPTION - If the TOE stores User Document Data or Confiden- tial TSF Data on Field-Replaceable Nonvolatile Storage Devices, it will encrypt such data on those devices. P.KEY_MATERIAL - Cleartext keys, submasks, random numbers, or any other val- ues that contribute to the creation of encryption keys for Field-Replaceable Nonvola- tile Storage of User Document Data or Confidential TSF Data must be protected from unauthorized access and must not be stored on that storage device. P.IMAGE_OVERWRITE -Upon completion or cancellation of a Document Pro- cessing job, the TOE shall overwrite residual image data from its Field-Replaceable Nonvolatile Storage Device. Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 9 (21) 5 Architectural Information The TOE is designed to be shared by many client computers and human users. It per- forms the functions of printing and storing of documents. It can be connected to a lo- cal network through the embedded Jetdirect Inside's built-in Ethernet, or to a USB de- vice using its USB port (but the use of which must be disabled in the evaluated config- uration except when the administrator performs trusted update via the USB). The TOE's operating system is the Windows Embedded CE 6.0 R3 running on an Arm Cortex-A8 processor. The TOE supports Local Area Network (LAN) capabilities and protects all network communications with IPsec, which is part of the Jetdirect Inside firmware. It imple- ments Internet Key Exchange version 1 (IKEv1) and supports both pre-shared key (PSK) authentication and X.509v3 certificate-based authentication. The TOE supports both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). The HTTP-based EWS administrative interface allows administrators to remotely manage the features of the TOE using a web browser. This interface is protected using IPsec. The Web Services (WS) interfaces allow administrators to externally manage the TOE. The evaluated configuration only supports the REST Web Services interface. The REST Web Services interface is protected using IPsec. For design reasons, only one computer can be used as the Administrative Computer for the TOE in the evaluated configuration. This computer is used for administration of the TOE. All other client computers connecting to the TOE to perform non-admin- istrative tasks are known as Network Client Computers. The PJL interface is used by unauthenticated users via Network Client Computers to submit print jobs and receive job status (e.g., view the print queue). The unauthenti- cated users use PJL over an IPsec connection. It is also used in a non-administrative capacity by the Administrative Computer to send print jobs to the TOE as well as to receive job status. In general, PJL supports password-protected administrative com- mands, but in the evaluated configuration these commands are disabled. The TOE supports a remote file system for storing and retrieving backup files during Back up and Restore operations. The TOE uses IPsec to protect the communication to the remote file system. For remote file system connectivity, the TOE supports the SMB protocol. The TOE can send email alert messages to administrator-specified email addresses, or send automated emails regarding product configuration and HCD supplies to HP. The TOE supports protected communications between itself and Simple Mail Transfer Pro- tocol (SMTP) gateways. It uses IPsec to protect the communication with the SMTP gateway. The TOE can only send emails; it does not accept inbound emails. The TOE supports the auditing of security-relevant functions by generating and for- warding audit records to an external syslog server. It supports both internal and exter- nal storage of audit records. The TOE uses IPsec to protect the communications be- tween itself and the syslog server. The TOE requires a DNS server, an NTS server, and a WINS server in the Operational Environment. The TOE connects to them over an IPsec connection. Each HCD contains a user interface (UI) called the Control Panel. On the M554 and M652 models, the Control Panel consist of a 2.7-inch color graphics display with a 10- key keypad. On all other models, the Control Panel consists of a touchscreen LCD with a physical home screen button. Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 10 (21) The Control Panel is the physical interface that a user uses to communicate with the TOE when physically using the HCD. The LCD screen displays information such as menus and status to the user. It also provides virtual buttons to the user such as an al- phanumeric keypad for entering usernames and passwords. Both administrative and non-administrative users can access the Control Panel. The TOE supports both Internal Authentication mechanisms (Local Device Sign In) and External Authentication mechanisms (LDAP Sign In and Windows Sign In i.e., Kerberos). All TOE models contain one field-replaceable nonvolatile storage disk drive. This drive must be FIPS 140-2 validated SED. Depending on the TOE model, this drive may come pre-installed or the TOE may require the installation of the HP TAA Ver- sion Secure Hard Disk Drive accessory prior to deploying the TOE. The Jetdirect Inside firmware and System firmware components comprise the firm- ware on the system. Both firmware components work together to provide the security functionality of the TOE. They share the same operating system. The operating system is part of the System firmware. Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 11 (21) 6 Documentation  Common Criteria Evaluated Configuration Guide for HP Single-function Printers HP LaserJet Enterprise M554/M555, HP LaserJet Enterprise M652/M653, HP La- serJet Managed E65050/E65060 [CCECG]  HP Color LaserJet Enterprise M554 HP Color LaserJet Enterprise M555 User Guide [M554_5-UG]  HP Color LaserJet Enterprise M554 HP Color LaserJet Enterprise M555 Installa- tion Guide [M554_5-IG]  HP Color LaserJet Enterprise M652, M653 User Guide [M652_3-UG]  HP Color LaserJet Enterprise M652 M652n M652dn Installation Guide [M652- IG]  HP Color LaserJet Enterprise M653 M653dn M653x Installation Guide [M653- IG] Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 12 (21) 7 IT Product Testing 7.1 Developer Testing [HCDPPv1.0] does not requires the developer to perform any testing. 7.2 Evaluator Testing The evaluator performed testing remotely by connecting to the test environment using Microsoft Remote Desktop (RDP). The developers setup the test environment with the actual TOE models in Boise, Idaho, USA. The testing was performed between 2020- 08-14 and 2021-02-04. The tests included both automated and manual tests which the evaluator executed successfully. The developer configured the TOE according to the [CCECG]. Before initiating the testing the evaluator verified that TOE was configured correctly. He also verified that the test environment was properly set up by the developer. The evaluator performed independent testing on the following TOE models: TOE Name (hardware models) System Firmware Ver- sion Jetdirect Inside Firm- ware Version HP Color LaserJet Enter- prise M555 2411097_060479 JSI24110014 HP Color LaserJet Enter- prise M653 2411097_060484 JSI24110014 The evaluator executed all required tests in [HCDPPv1.0], [HCDPP-ERRATA] and Technical Decisions listed in [ST] 2.1.1 "Protection Profile for Hardcopy Devices; IPA, NIAP, and the MFP Technical Community ([HCDPP])". All the actual test results were consistent to the expected test results. 7.3 Penetration Testing Port scans penetration tests were performed against the TOE interfaces that are acces- sible to a potential attacker (IPv4 and IPv6 UDP and TCP ports of the TOE). Since an attack requires an attack surface, the evaluator decided to start by examining if the TOE exposes such interfaces, i.e., open ports. The TOE and operational environment was configured according to [ST] and [CCECG]. The following models were tested: TOE Name (hardware models) System Firmware Ver- sion Jetdirect Inside Firm- ware Version HP Color LaserJet Enter- prise M555 2411097_060479 JSI24110014 HP Color LaserJet Enter- prise M653 2411097_060484 JSI24110014 The evaluator examined all potential interfaces, i.e., all IPv4 and IPv6 UDP and TCP ports. Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 13 (21) The evaluator examined the results from the penetration test and provided a summari- zation within the "Evaluator penetration testing MS HCDPP". The evaluator deter- mined that only UDP port 500 (ISAKMP) is available outside of IPsec which was the expected outcome. Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 14 (21) 8 Evaluated Configuration The following items will need to be adhered to in the evaluated configuration.  Only one Administrative Computer is used to manage the TOE.  Third-party solutions must not be installed on the TOE.  Device USB must be disabled.  Host USB plug and play must be disabled.  Firmware upgrades through any means other than the EWS (e.g., PJL) and USB must be disabled.  Jetdirect Inside management via telnet and FTP must be disabled.  Jetdirect XML Services must be disabled.  External file system access through PJL and PS must be disabled.  Only X.509v3 certificates and pre-shared key are supported methods for IPsec au- thentication (IPsec authentication using Kerberos is not supported).  IPsec Authentication Headers (AH) must be disabled.  Control Panel Mandatory Sign-in must be enabled (this disables the Guest role).  SNMP must be disabled.  The Service PIN, used by a customer support engineer to access functions availa- ble to HP support personnel, must be disabled.  Wireless functionality must be disabled:  Near Field Communication (NFC) must be disabled.  Bluetooth Low Energy (BLE) must be disabled.  Wireless networking (WLAN) must be disabled.  Wireless station must be disabled.  PJL device access commands must be disabled.  When using Windows Sign In, the Windows domain must reject Microsoft NT LAN Manager (NTLM) connections.  Remote Control-Panel use is disallowed.  Local Device Sign In accounts must not be created (i.e., only the built-in Device Administrator account is allowed as a Local Device Sign In account).  Access must be blocked to the following Web Services (WS) using the Jetdirect Inside’s IPsec/Firewall:  Open Extensibility Platform device (OXPd) Web Services  WS* Web Services  Device Administrator Password must be set.  Remote Configuration password must not be set.  OAuth 2 use is disallowed.  Licenses must not be installed to enable features beyond what is supported in the evaluated configuration.  Firmware updates through REST Web Services is disallowed. The following components are required as part of the Operational Environment:  A Domain Name System (DNS) server  A Network Time Service (NTS) server  One administrative client computer connected to the TOE in the role of an Admin- istrative Computer. It must contain a web browser Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 15 (21)  One or both of the following:  Lightweight Directory Access Protocol (LDAP) server  Windows domain controller/Kerberos server  A syslog server  A Windows Internet Name Service (WINS) server The following components are optional in the Operational Environment:  Client computers connected to the TOE in a non-administrative computer role  HP Print Drivers, including the HP Universal Print Driver, for client computers (for submitting print job requests from client computers)  The following remote file system:  Server Message Block (SMB)  A Simple Mail Transfer Protocol (SMTP) gateway Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 16 (21) 9 Results of the Evaluation The evaluators applied each work unit of the Common Methodology [CEM] within the scope of the evaluation, and concluded that the TOE meets the security objectives stated in the Security Target [ST] for an attack potential of Basic. The certifier reviewed the work of the evaluators and determined that the evaluation was conducted in accordance with the Common Criteria [CC]. The evaluators' overall verdict is PASS. Assurance Class/Family Short name Verdict Development ADV PASS Basic functional specification ADV_FSP.1 PASS Guidance Documents AGD PASS Operational User Guidance AGD_OPE.1 PASS Preparative Procedures AGD_PRE.1 PASS PP assurance activities AGD_HCDPP.1 PASS Life-cycle Support ALC PASS Labeling of the TOE ALC_CMC.1 PASS TOE CM coverage ALC_CMS.1 PASS PP assurance activities ALC_HCDPP.1 PASS Security Target Evaluation ASE PASS ST Introduction ASE_INT.1 PASS Conformance Claims ASE_CCL.1 PASS Security Problem Definition ASE_SPD.1 PASS Security Objectives for the ASE_OBJ.1 PASS Operational Environment Extended Components Definition ASE_ECD.1 PASS Stated Security Requirements ASE_REQ.1 PASS TOE Summary Specification ASE_TSS.1 PASS PP assurance activities ASE_HCDPP.1 PASS Tests ATE PASS Independent Testing - ATE_IND.1 PASS conformance PP assurance activities ATE_HCDPP.1 PASS Vulnerability Assessment AVA PASS Vulnerability survey AVA_VAN.1 PASS PP assurance activities AVA_HCDPP.1 PASS Entropy Description AEN PP assurance activities AEN_HCDPP.1 PASS Key Management Description AKM PP assurance activities AKM_HCDPP.1 PASS Note that the evaluators have used a notation similar to assurance classes for PP assur- ance activities that does not belong to a particular assurance class in CC. For PP requirements that are related to existing assurance classes, the evaluators have used a notation similar to assurance components for the requirements. Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 17 (21) 10 Evaluator Comments and Recommendations None. Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 18 (21) 11 Glossary AES Advanced Encryption Standard AH Authentication Header (IPsec) Arm Advanced RISC Machine BEV Border Encryption Value CC Common Criteria cPP Collaborative Protection Profile CSEC The Swedish Certification Body for IT Security CTR Counter mode CTR_DRBG Counter mode DRBG DNS Domain Name System DRBG Deterministic Random Bit Generator DSS Digital Sending Software EAL Evaluated Assurance Level EEPROM Electrically Erasable Programmable Read-Only Memory ESP Encapsulating Security Payload (IPsec) EWS Embedded Web Server FIPS Federal Information Processing Standard HCD Hardcopy Device HCDPP Hardcopy Device Protection Profile HP Hewlett-Packard IKE Internet Key Exchange (IPsec) IP Internet Protocol IPv4 IP version 4 IPv6 IP version 6 IPsec Internet Protocol Security ISAKMP Internet Security Association Key Management Protocol (IPsec) LAN Local Area Network LDAP Lightweight Directory Access Protocol NIAP National Information Assurance Partnership NTLM Microsoft NT LAN Manager NTS Network Time Service OSP Organizational Security Policy OXP Open Extensibility Platform OXPd OXP device layer PJL Printer Job Language PKCS Public-Key Cryptography Standards PP Protection Profile PSK Pre-Shared Key PSTN Public Switched Telephone Network REST Representational State Transfer (a.k.a. RESTful) RSA Rivest-Shamir-Adleman SED Self-Encrypting Drive Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 19 (21) SFP Single-Function Printer SHA Secure Hash Algorithm SMB Server Message Block SMTP Simple Mail Transfer Protocol SNMP Simple Network Management Protocol SP Scheme Publication SPD Security Problem Definition (CC) ST Security Target TOE Target of Evaluation TSF TOE Security Functionality TSS TOE Summary Specification USB Universal Serial Bus WINS Windows Internet Name Service WLAN Wireless Local Area Network WS Web Services Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 20 (21) 12 Bibliography ST HP Color LaserJet Enterprise M554/M555, HP Color LaserJet En- terprise M652/M653, HP Color LaserJet Managed E65050/E65060 Security Target, 2021-08-24, Version 1.2 HCDPPv1.0 Protection Profile for Hardcopy Devices; IPA, NIAP, and the MFP, 2015-09-10, Version 1.0 ERRATA Protection Profile for Hardcopy Devices - v1.0, Errata #1, June 2017 CCECG Common Criteria Evaluated Configuration Guide for HP Single- function Printers HP LaserJet Enterprise M554/M555, HP LaserJet Enterprise M652/M653, HP LaserJet Managed E65050/E65060 Edition 1, 5/2021 M554_5-UG HP Color LaserJet Enterprise M554, HP Color LaserJet Enterprise M555, User Guide, Edition 1, 10/2020 M554_5-IG HP Color LaserJet Enterprise M554, HP Color LaserJet Enterprise M555, Installation Guide, Date 2020 M652_3-UG HP Color LaserJet Enterprise M652, M653, User Guide, Edition 2 Date 1/2019 M652-IG HP Color LaserJet Enterprise M652, M652n, M652dn, Installation Guide, Date 2017 M653-IG HP Color LaserJet Enterprise M653, M653dn M653x, Installation Guide, Date 2017 CCpart1 Common Criteria for Information Technology Security Evaluation, Part 1, version 3.1 revision 5, CCMB-2017-04-001 CCpart2 Common Criteria for Information Technology Security Evaluation, Part 2, version 3.1 revision 5, CCMB-2017-04-002 CCpart3 Common Criteria for Information Technology Security Evaluation, Part 3, version 3.1 revision 5, CCMB-2017-04-003 CC CCpart1 + CCpart2 + CCpart3 CEM Common Methodology for Information Technology Security Eval- uation, version 3.1 revision 5, CCMB-2017-04-004 SP-002 SP-002 Evaluation and Certification, CSEC, 2021-06-04, docu- ment version 33.0 SP-188 SP-188 Scheme Crypto Policy, CSEC, 2021-06-07, document ver- sion 11.0 Swedish Certification Body for IT Security Certification Report HP MS HCDPP 20FMV3647-21:1 2.0 2021-09-22 21 (21) Appendix A Scheme Versions During the certification the following versions of the Swedish Common Criteria Eval- uation and Certification scheme have been used. A.1 Scheme/Quality Management System During the certification project, the following versions of the quality management sys- tem (QMS) have been applicable since the certification application was received: QMS 1.24.1 valid from 2020-12-03 QMS 1.25 valid from 2021-06-17 In order to ensure consistency in the outcome of the certification, the certifier has ex- amined the changes introduced in each update of the quality management system. The changes between consecutive versions are outlined in “Ändringslista CSEC QMS 1.25”. The certifier concluded that, from QMS 1.24.1 to the current QMS 1.25, there are no changes with impact on the result of the certification. A.2 Scheme Notes The following Scheme interpretations have been considered during the certification.  Scheme Note 15 - Testing  Scheme Note 18 - Highlighted Requirements on the Security Target  Scheme Note 21 - NIAP PP Certifications  Scheme Note 22 - Vulnerability assessment  Scheme Note 23 - Evaluation reports for NIAP PPs and cPPs  Scheme Note 25 - Use of CAVP-tests in CC evaluations