BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 1 / 16 Certification Report EAL 2 Evaluation of Promedart Bioteknoloji ve Özel Sağlık Hizmetleri Ltd. Şti. ProMedArt HIS and LIS Güvenlik Modülü Uygulamaları v1.0.5.14 issued by Turkish Standards Institution Common Criteria Certification Scheme Certificate Number: 21.0.03/TSE-CCCS-67 BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 2 / 16 TABLE OF CONTENTS TABLE OF CONTENTS ..........................................................................................................................................................2 DOCUMENT INFORMATION...............................................................................................................................................3 DOCUMENT CHANGE LOG .................................................................................................................................................3 DISCLAIMER ...........................................................................................................................................................................3 FOREWORD .............................................................................................................................................................................4 RECOGNITION OF THE CERTIFICATE............................................................................................................................5 1 EXECUTIVE SUMMARY ....................................................................................................................................................6 2 CERTIFICATION RESULTS...............................................................................................................................................8 2.1 IDENTIFICATION OF TARGET OF EVALUATION ..................................................................................................8 2.2 SECURITY POLICY ..........................................................................................................................................................9 2.3 ASSUMPTIONS AND CLARIFICATION OF SCOPE ..................................................................................................9 2.4 ARCHITECTURAL INFORMATION ...........................................................................................................................10 2.5 DOCUMENTATION ........................................................................................................................................................10 2.6 IT PRODUCT TESTING..................................................................................................................................................11 2.7 EVALUATED CONFIGURATION.................................................................................................................................12 2.8 RESULTS OF THE EVALUATION ...............................................................................................................................12 2.9 COMMENTS / RECOMMENDATIONS........................................................................................................................12 3 SECURITY TARGET..........................................................................................................................................................14 4 GLOSSARY ..........................................................................................................................................................................15 5 BIBLIOGRAPHY.................................................................................................................................................................15 6 ANNEXES .............................................................................................................................................................................16 BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 3 / 16 Document Information Date of Issue 25.06.2020 Approval Date 25.06.2020 Certification Report Number 21.0.03/20-004 Sponsor and Developer ProMedArt Biyoteknoloji ve Özel Sağlık Hizmetleri Ltd. Şti. Evaluation Facility BEAM Teknoloji A.Ş. TOE ProMedArt HIS and LIS Güvenlik Modülü Uygulamaları 1.0.5.14 Pages 16 Prepared by İbrahim Halil KIRMIZI Reviewed by Halime Eda BİTLİSLİ ERDİVAN This report has been prepared by the Certification Expert and reviewed by the Technical Responsible of which signatures are above. Document Change Log Release Date Pages Affected Remarks/Change Reference 1.0 25.06.2020 All First Release DISCLAIMER This certification report and the IT product defined in the associated Common Criteria document has been evaluated at an accredited and licensed evaluation facility conformant to Common Criteria for IT Security Evaluation, version 3.1, revision 5, using Common Methodology for IT Products Evaluation, version 3.1, revision 5. This certification report and the associated Common Criteria document apply only to the identified version and release of the product in its evaluated configuration. Evaluation has been conducted BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 4 / 16 in accordance with the provisions of the CCCS, and the conclusions of the evaluation facility in the evaluation report are consistent with the evidence adduced. FOREWORD The Certification Report is drawn up to submit the Certification Commission the results and evaluation information upon the completion of a Common Criteria evaluation service performed under the Common Criteria Certification Scheme. Certification Report covers all non-confidential security and technical information related with a Common Criteria evaluation which is made under the ITCD Common Criteria Certification Scheme. This report is issued publicly to and made available to all relevant parties for reference and use. The Common Criteria Certification Scheme (CCCS) provides an evaluation and certification service to ensure the reliability of Information Security products. Evaluation and tests are conducted by a public or commercial Common Criteria Evaluation Facility (CCTL = Common Criteria Testing Laboratory) under CCCS’ supervision. CCTL is a facility, licensed as a result of inspections carried out by CCCS for performing tests and evaluations which will be the basis for Common Criteria certification. As a prerequisite for such certification, the CCTL has to fulfill the requirements of the standard ISO/IEC 17025 and should be accredited by accreditation bodies. The evaluation and tests related with the concerned product have been performed by BEAM Teknoloji A.Ş., which is a public/commercial CCTL. A Common Criteria Certificate given to a product means that such product meets the security requirements defined in its security target document that has been approved by the CCCS. The Security Target document is where requirements defining the scope of evaluation and test activities are set forth. Along with this certification report, the user of the IT product should also review the security target document in order to understand any assumptions made in the course of evaluations, the environment where the IT product will run, security requirements of the IT product and the level of assurance provided by the product. This certification report is associated with the Common Criteria Certificate issued by the CCCS for Promedart HIS and LIS Güvenlik Modülü Uygulamaları v1.0.5.14 whose evaluation was completed on 06.05.2020 and with the Security Target document with version no 1.11 of the relevant product. BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 5 / 16 The certification report, certificate of product evaluation and security target document are posted on the ITCD Certified Products List at bilisim.tse.org.tr portal and the Common Criteria Portal (the official web site of the Common Criteria Project). RECOGNITION OF THE CERTIFICATE The Common Criteria Recognition Arrangement logo is printed on the certificate to indicate that this certificate is issued in accordance with the provisions of the CCRA. The CCRA has been signed by the Turkey in 2003 and provides mutual recognition of certificates based on the CC evaluation assurance levels up to and including EAL2. The current list of signatory nations and approved certification schemes can be found on: http://www.commoncriteriaportal.org BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 6 / 16 1. EXECUTIVE SUMMARY This report constitutes the certification results by the certification body on the evaluation results applied with requirements of the Common Criteria for Information Security Evaluation. Evaluated IT product name: Promedart HIS and LIS Güvenlik Modülü Uygulamaları IT Product version: v1.0.5.14 Developer’s Name: ProMedArt Biyoteknoloji ve Özel Sağlık Hizmetleri Ltd. Şti. Name of CCTL: BEAM Teknoloji A.Ş. Assurance Package: EAL 2 Completion date of evaluation: 06.05.2020 1.1. Brief Description The TOE is an online application used for tracking the patients and their transactions during their visit to Healthcare providers. BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 7 / 16 1.2. Major Security Features The TOE provides the following security services; • Identification and Authentication, • Security Management, • User Data Protection, • Security Audit, • Secure Communication 1.3. Threats The threats are; • T.Comm: The unauthorized user gains access to the user data and the patient data when it is traversing across the internet from to the application resulting in a loss of confidentiality and integrity of user data. • T.Prvlg_Esc: An attacker/ a limitedly authorized user may modify management data that they are not authorized and gain access to the sensitive like patient data and system data by privilege escalation. • T.Unauth: An unauthorized user obtains or modifies stored user data that they are not authorized to access resulting in a loss of confidentiality or integrity of the data. • T.Audit_Trail: A threat agent may perform a large amount of transactions in order to fill the logs and hence make audit unavailable. • T.DoS: An attacker may attempt to make service unavailable by overwhelming it with traffic from multiple sources. BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 8 / 16 • T.Password: An attacker/unauthorized user may get the passwords in the database and authenticate to the TOE by these passwords causing confidentiality or integrity damage of user or management data. 2. CERTIFICATION RESULTS 2.1. Identification of Target of Evaluation Certificate Number 21.0.03/TSE-CCCS-67 TOE Name and Version Promedart HIS and LIS Güvenlik Modülü Uygulamaları v1.0.5.14 Security Target Title Promedart HIS and LIS Güvenlik Modülü Uygulamaları v1.0.5.14 Security Target Security Target Version 1.11 Security Target Date 05.04.2019 Assurance Level EAL 2 Criteria • Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model; CCMB-2017-04-001, Version 3.1, Revision 5, April 2017 • Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Components; CCMB-2017-04-002, Version 3.1, Revision 5, April 2017 • Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance Components; CCMB-2017-04-003, Version 3.1, Revision 5, April 2017 BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 9 / 16 Methodology Common Criteria for Information Technology Security Evaluation, Evaluation Methodology; CCMB-2017-04-004, Version 3.1, Revision 5, April 2017 Protection Profile Conformance Protection Profile for Security Module of General-Purpose Health Informatics Software v1.0 Sponsor and Developer ProMedArt Biyoteknoloji ve Özel Sağlık Hizmetleri Ltd. Şti. Evaluation Facility BEAM Teknoloji A.Ş. Certification Scheme TSE CCCS 2.2. Security Policy There are one Organisational Security Policy presented at the Security Target; • P.VEM: TOE should be able to transfer the available data (if available) stored in the database securely whenever the TOE is installed in the first time. Besides whenever TOE is uninstalled, TOE should be able to prepare the data for the transfer to a new software. During this data transfer process, the integrity of the data should be provided by the TOE. 2.3. Assumptions and Clarification of Scope Assumptions for the operational environment of the TOE are; • A.Physical: It is assumed that the servers that host the ProServis server and database servers are hosted in a secure operating facility with restricted physical access with non-shared hardware. • A.Admin: It is assumed that all users who is responsible to install, configure and operate the TOE and the IT entities in the operational environment of the TOE are experienced, trained and meet the security conditions. BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 10 / 16 2.4. Architectural Information TOE is an application consists of several software components. The subsytems are within the WCF Application and the Trigger. They are; • WCF Service Subsytem, • Identification Subsytem, • Authentication Subsytem, • Account Management Subsystem, • Log Management Subsystem 1 (on Control Center), • Log Management Subsytem 2 (on Database Server) 2.5. Documentation Documents below are provided to the customer by the developer alongside the TOE; BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 11 / 16 Name of Document Version Number Date Promedart HIS and LIS Güvenlik Modülü Uygulamaları v1.0.5.14 Security Target V1.11 05.04.2019 Promedart HIS and LIS Güvenlik Modülü Uygulamaları v1.0.5.14 Kullanıcı Kılavuzu Dokümanı V1.5 11.04.2020 Promedart HIS and LIS Güvenlik Modülü Uygulamaları v1.0.5.14 Kurulum Prosedürü Dokümanı V1.7 03.04.2019 2.6. IT Product Testing During the evaluation, all evaluation evidences of TOE were delivered and transferred completely to CCTL by the developer. All the delivered evaluation evidences which include software, documents, etc. are mapped to the assurance families Common Criteria and Common Methodology; so the connections between the assurance families and the evaluation evidences has been established. The evaluation results are available in the final Evaluation Technical Report (ETR) of Promedart HIS and LIS Güvenlik Modülü Uygulamaları v1.0.5.14. It is concluded that the TOE supports EAL 2. There are 19 assurance families which are all evaluated with the methods detailed in the ETR. 2.6.1.Developer Testing Developer has prepared TOE Test Document according to the TOE Functional Specification documentation, TOE Design documentation which includes TSF subsystems and its interactions. All SFR- Enforcing TSFIs have been tested by developer. Developer has conducted 16 functional tests in total. 2.6.2.Evaluator Testing BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 12 / 16 • Independent Testing: Evaluator has performed all developer tests to conduct by itself. Additionally, evaluator has prepared 9 independent tests. TOE has passed all 25 functional tests to demonstrate that its security functions work as it is defined in the ST. • Penetration Testing: TOE has been tested against common threats and other threats surfaced by vulnerability analysis. As a result, 10 penetration tests have been conducted. 2.7. Evaluated Configuration The evaluated TOE configuration is composed of; • Promedart HIS and LIS Güvenlik Modülü Uygulamaları v1.0.5.14, • Guidance Documents Also as consistent with the minimum Hardware/Software/OS requirements for the TOE, the test environment presented at the ETR is composed of; • Burp Suite, • Nessus 2.8. Results of the Evaluation The table below provides a complete listing of the Security Assurance Requirements for the TOE. These requirements consists of the Evaluation Assurance Level 2 (EAL 2) components as specified in Part 3 of the Common Criteria. Assurance Class Component Component Title Development ADV_ARC.1 Security Architecture Description ADV_FSP.2 Security Enforcing functional specification BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 13 / 16 ADV_TDS.1 Basic Design Guidance Documents AGD_OPE.1 Operational User Guidance AGD_PRE.1 Preparative Procedures Life-Cycle Support ALC_CMC.2 Use of a CM System ALC_CMS.2 Parts of the TOE CM Coverage ALC_DEL.1 Delivery Procedures Security Target Evaluation ASE_CCL.1 Conformance Claims ASE_ECD.1 Extended Components Definition ASE_INT.1 ST Introduction ASE_OBJ.2 Security Objectives ASE_REQ.2 Derived Security Requirements ASE_SPD.1 Security Problem Definition ASE_TSS.1 TOE Summary Specification Tests ATE_COV.1 Evidence of coverage ATE_FUN.1 Functional Testing ATE_IND.2 Independent testing - sample Vulnerability Analysis AVA_VAN.2 Vulnerability analysis BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 14 / 16 The Evaluation Team assigned a Pass, Fail, or Inconclusive verdict to each work unit of each EAL 2 assurance component. For Fail or Inconclusive work unit verdicts, the Evaluation Team advised the developer about the issues requiring resolution or clarification within the evaluation evidence. In this way, the Evaluation Team assigned an overall Pass verdict to the assurance component only when all of the work units for that component had been assigned a Pass verdict. So for TOE “Promedart HIS and LIS Güvenlik Modülü Uygulamaları v1.0.5.14”, the results of the assessment of all evaluation tasks are “Pass”. 2.9. Comments / Recommendations It is recommended that all guidance outlined in the Guidance Documents be followed and all assumptions are fulfilled in order to the secure usage of the TOE. 3. SECURITY TARGET The Security Target associated with this Certification Report is identified by the following terminology: Title: Promedart HIS and LIS Güvenlik Modülü Uygulamaları v1.0.5.14 Security Target Version: 1.11 Date of Document: 05.04.2019 BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 15 / 16 4. GLOSSARY CCCS: Common Criteria Certification Scheme CCMB: Common Criteria Management Board ITCD: Information Technologies Test and Certification Department EAL : Evaluation Assurance Level OSP : Organisational Security Policy SAR : Security Assurance Requirements SFR : Security Functional Requirements ST : Security Target TOE : Target of Evaluation TSF : TOE Secırity Functionality TSFI : TSF Interface BİLİŞİM TEKNOLOJİLERİ TEST VE BELGELENDİRME DAİRESİ BAŞKANLIĞI CCCS CERTIFICATION REPORT Doküman Kodu: BTBD-03-01-FR-01 Yayın Tarihi: 04.08.2015 Revizyon Tarih/No: 06.03.2019/6 Bu dokümanın güncelliği, elektronik ortamda TSE Doküman Yönetim Sisteminden takip edilmelidir. Sayfa 16 / 16 5. BIBLIOGRAPHY [1] Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 5, April 2017, [2] Common Methodology for Information Technology Security Evaluation, CEM, Version 3.1 Revision 5, April 2017, [3] BTBD-03-01-TL-01 Certification Report Preparation Instructions, Rel.Date: February 8th 2016, [4] BTTM-CC-060 Promedart HIS and LIS Güvenlik Modülü Uygulamaları v1.0.5.14 DTR v.1.2, May 6th 2020 [5] 2006-04-004 ST sanitizing for publication, April 2006 6. ANNEXES There is no additional information which is inappropriate for reference in other sections