National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report PP-Configuration for Mobile Device Fundamentals, Biometric enrolment and verification – for unlocking the device, Bluetooth, and WLAN Clients Version 1.0 11 October 2022 Report Number: CCEVS-VR-PP-0082 Dated: 24 February 2023 Version: 1.0 National Institute of Standards and Technology Information Technology Laboratory 100 Bureau Drive Gaithersburg, MD 20899 Department of Defense ATTN: NIAP, SUITE: 6982 9800 Savage Road Fort Meade, MD 20755-6982 ® TM ACKNOWLEDGMENTS Common Criteria Testing Laboratory Base and Additional Requirements Gossamer Security Solutions, Inc. Columbia, MD Table of Contents 1 Executive Summary................................................................................................................. 1 2 Identification............................................................................................................................ 2 3 CFG_MDF-BIO-BT-WLANC_V1.0 Description................................................................... 4 4 Security Problem Description and Objectives......................................................................... 5 4.1 Assumptions..................................................................................................................... 5 4.2 Threats.............................................................................................................................. 5 4.3 Organizational Security Policies...................................................................................... 7 4.4 Security Objectives .......................................................................................................... 7 5 Functional Requirements....................................................................................................... 11 6 Assurance Requirements ....................................................................................................... 19 7 Results of the Evaluation....................................................................................................... 20 8 Glossary................................................................................................................................. 21 9 Bibliography.......................................................................................................................... 22 1 1 Executive Summary This report documents the assessment of the National Information Assurance Partnership (NIAP) validation team of the evaluation of the PP-Configuration for Mobile Device Fundamentals, Biometric enrolment and verification – for unlocking the device, Bluetooth, and WLAN Clients, Version 1.0 (CFG_MDF-BIO-BT-WLANC_V1.0). This PP-Configuration defines how to evaluate a TOE that claims conformance to the Protection Profile for Mobile Device Fundamentals, Version 3.3 (PP_MDF_V3.3) Base-PP, the collaborative PP-Module for Biometric enrolment and verification – for unlocking the device, Version 1.1 (MOD_BIO_V1.1), the PP- Module for Bluetooth, Version 1.0 (MOD_BT_V1.0), and the PP-Module for WLAN Clients, Version 1.0 (MOD_WLANC_V1.0). It presents a summary of the CFG_MDF-BIO-BT- WLANC_V1.0 and the evaluation results. Gossamer Security Solutions, Inc., located in Columbia, Maryland, performed the evaluation of the CFG_MDF-BIO-BT-WLANC_V1.0 and the PP_MDF_V3.3, MOD_BIO_V1.1, MOD_BT_V1.0, and MOD_WLANC_V1.0 contained within the PP-Configuration, concurrent with the first product evaluation against the PP-Configuration’s requirements. The evaluated product was Google Pixel Devices on Android 13 (Google Pixel devices). This evaluation addressed the base security functional requirements of PP_MDF_V3.3, MOD_BIO_V1.1, MOD_BT_V1.0, and MOD_WLANC_V1.0 as part of CFG_MDF-BIO-BT- WLANC_V1.0. The PP-Modules define additional requirements, some of which the Google Pixel devices evaluation claimed. The Validation Report (VR) author independently performed an additional review of the PP-Configuration, Base-PP, and PP-Modules as part of the completion of this VR, to confirm they meet the claimed APE and ACE requirements. The evaluation determined the CFG_MDF-BIO-BT-WLANC_V1.0 is both Common Criteria Part 2 extended and Part 3 extended. An accredited Information Technology Security Evaluation Facility (ITSEF) evaluated the PP-Configuration and PP-Modules identified in this VR using the Common Methodology for IT Security Evaluation (Version 3.1, Revision 5) for conformance to the Common Criteria for IT Security Evaluation (Version 3.1, Revision 5). The Security Target (ST) includes material from the PP_MDF_V3.3, MOD_BIO_V1.1, MOD_BT_V1.0, and MOD_WLANC_V1.0; completion of the ASE workunits satisfied the APE workunits for this PP and ACE workunits for these PP-Modules, but only for the materials defined in these PP-Modules, and only when the PP-Modules are in the defined PP-Configuration. The evaluation laboratory conducted this evaluation in accordance with the provisions of the NIAP Common Criteria Evaluation and Validation Scheme (CCEVS). The conclusions of the testing laboratory in the evaluation technical report are consistent with the evidence given. 2 2 Identification The CCEVS is a joint National Security Agency (NSA) and National Institute of Standards and Technology (NIST) effort to establish commercial facilities to perform trusted product evaluations. Under this program, security evaluations are conducted by commercial testing laboratories called CCTLs. CCTLs evaluate products against Protection Profiles (PPs) and PP-Modules that have Evaluation Activities, which are interpretations of the Common Methodology for Information Technology Security Evaluation (CEM) v3.1 workunits specific to the technology described by the PP or PP-Modules. Products may only be evaluated against PP-Modules when a PP- Configuration is defined to include the PP-Modules with at least one corresponding Base-PP. To promote thoroughness and efficiency, the evaluation of the CFG_MDF-BIO-BT- WLANC_V1.0, PP_MDF_V3.3, MOD_BIO_V1.1, MOD_BT_V1.0, and MOD_WLANC_V1.0, was performed concurrent with the first product evaluation to claim conformance to the PP- Configuration. In this case, the Target of Evaluation (TOE) was Google Pixel devices on Android 13, performed by Gossamer Security Solutions, Inc. in Columbia, MD. This evaluation addressed the base security functional requirements of PP_MDF_V3.3, MOD_BIO_V1.1, MOD_BT_V1.0, and MOD_WLANC_V1.0, as part of CFG_MDF-BIO-BT- WLANC_V1.0. The PP-Module defines additional requirements, some of which the Google Pixel devices evaluation claimed. PP_MDF_V3.3, MOD_BIO_V1.1, MOD_BT_V1.0, and MOD_WLANC_V1.0 contain a set of base requirements that all conformant STs must include, and additionally some contain optional, selection-based, and objective requirements. Optional requirements may or may not be included within the scope of the evaluation, depending on whether the vendor provides that functionality within the tested product and chooses to include it inside the TOE boundary. Selection-based requirements are those that must be included based upon the selections made in other requirements and the abilities of the TOE. Objective requirements are not currently prescribed by the Base-PP or the PP-Modules but are expected to be included in future versions of the Base-PP and PP- Modules. Vendors planning on having evaluations performed against future products are encouraged to plan for these objective requirements to be met. The VR authors evaluated all discretionary requirements not claimed in the initial TOE evaluation as part of the evaluation of the APE_REQ workunits performed against the Base-PP and the ACE_REQ workunits performed against the PP-Modules. When an evaluation laboratory evaluates a TOE against any additional requirements not already referenced in this VR through an existing TOE evaluation, the VR may be amended to include reference to this as additional evidence that the corresponding portions of the CFG_MDF-BIO-BT-WLANC_V1.0 were evaluated. The following identifies the Base-PP and the PP-Modules in the PP-Configuration evaluated by this VR. It also includes supporting information from the initial product evaluation performed against these PP-Modules. PP-Configuration PP-Configuration for Mobile Device Fundamentals, Biometric enrolment and verification – for unlocking the device, Bluetooth, and WLAN Clients, Version 1.0, 11 October 2022 Base-PP Protection Profile for Mobile Device Fundamentals, Version 3.3, 2022-09-12 (PP_MDF_V3.3) 3 Modules in PP- Configuration collaborative PP-Module for Biometric enrolment and verification – for unlocking the device, Version 1.1, September 12, 2022 (MOD_BIO_V1.1) PP-Module for Bluetooth, Version 1.0, 2021-04-15 (MOD_BT_V1.0) PP-Module for WLAN Clients, Version 1.0, 2022-03-31 (MOD_WLANC_V1.0) ST (Base) Google Pixel Devices on Android 13 – Security Target, Version 1.0, January 23, 2023 CC Version Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5 Conformance Result CC Part 2 extended; CC Part 3 extended CCTL Gossamer Security Solutions, Inc. Columbia, MD 4 3 CFG_MDF-BIO-BT-WLANC_V1.0 Description CFG_MDF-BIO-BT-WLANC_V1.0 is a PP-Configuration that combines the following. • Protection Profile for Mobile Device Fundamentals, Version 3.3 (PP_MDF_V3.3) • collaborative PP-Module for Biometric enrolment and verification – for unlocking the device, Version 1.1 (MOD_BIO_V1.1) • PP-Module for Bluetooth, Version 1.0 (MOD_BT_V1.0) • PP-Module for WLAN Clients, Version 1.0 (MOD_WLANC_V1.0) This PP-Configuration is for a mobile device that includes biometric, Bluetooth, and WLAN client capabilities according to the requirements of the PP-Configuration. Biometric enrolment and verification capabilities are used to unlock the computer in the locked state using the user’s biometric characteristics, such as fingerprint, face, eye, etc. In the context of CFG_MDF-BIO-BT-WLANC_V1.0, the mobile device includes the hardware and software needed to implement biometric enrolment and verification functions. A Bluetooth device is a communications standard for short-range wireless transmissions, which is implemented in many commercial devices. It is a logical component that executes on an end-user personal computing or mobile device. In the context of CFG_MDF-BIO-BT-WLANC_V1.0, the mobile device includes the hardware and software needed to function as a Bluetooth device. A wireless client is a component executing on a device that allows for 802.11 network connectivity. In the context of CFG_MDF-BIO-BT-WLANC_V1.0, the mobile device includes the hardware and software needed to function as a WLAN client. 5 4 Security Problem Description and Objectives 4.1 Assumptions Table 1 shows the assumptions defined in the individual components of CFG_MDF-BIO-BT- WLANC_V1.0. Table 1: Assumptions Assumption Name Assumption Definition From PP_MDF_V3.3 A.CONFIG It is assumed that the TOE’s security functions are configured correctly in a manner to ensure that the TOE security policies will be enforced on all applicable network traffic flowing among the attached networks. A.NOTIFY It is assumed that the mobile user will immediately notify the administrator if the Mobile Device is lost or stolen. A.PRECAUTION It is assumed that the mobile user exercises precautions to reduce the risk of loss or theft of the Mobile Device. A.PROPER_USER Mobile Device users are not willfully negligent or hostile, and use the device within compliance of a reasonable Enterprise security policy. From MOD_BIO_V1.1 No additional assumptions defined in MOD_BIO_V1.1. From MOD_BT_V1.0 No additional assumptions defined in MOD_BT_V1.0. From MOD_WLANC_V1.0 A.NO_TOE_BYPASS Information cannot flow between the wireless client and the internal wired network without passing through the TOE. A.TRUSTED_ADMIN TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner. 4.2 Threats Table 2 shows the threats defined in the individual components of CFG_MDF-BIO-BT- WLANC_V1.0. Table 2: Threats Threat Name Threat Definition From PP_MDF_V3.3 T.NETWORK_EAVESDROP An attacker is positioned on a wireless communications channel or elsewhere on the network infrastructure. Attackers may monitor and gain access to data exchanged between the Mobile Device and other endpoints. T.NETWORK_ATTACK An attacker is positioned on a wireless communications channel or elsewhere on the network infrastructure. Attackers may initiate communications with the Mobile Device or alter communications between the Mobile Device and other endpoints in order to compromise the Mobile Device. These attacks include malicious software update of any applications or system software on the device. These attacks also include malicious web pages or email attachments, which are usually delivered to devices over the network. 6 Threat Name Threat Definition T.PHYSICAL_ACCESS An attacker, with physical access, may attempt to access user data on the Mobile Device including credentials. These physical access threats may involve attacks, which attempt to access the device through external hardware ports, impersonate the user authentication mechanisms, through its user interface, and also through direct and possibly destructive access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP Applications loaded onto the Mobile Device may include malicious or exploitable code. This code could be included intentionally or unknowingly by the developer, perhaps as part of a software library. Malicious apps may attempt to exfiltrate data to which they have access. They may also conduct attacks against the platform’s system software, which will provide them with additional privileges and the ability to conduct further malicious activities. Malicious applications may be able to control the device's sensors (GPS, camera, microphone) to gather intelligence about the user's surroundings even when those activities do not involve data resident or transmitted from the device. Flawed applications may give an attacker access to perform network- based or physical attacks that otherwise would have been prevented. T.PERSISTENT_PRESENCE Persistent presence on a device by an attacker implies that the device has lost integrity and cannot regain it. The device has likely lost this integrity due to some other threat vector, yet the continued access by an attacker constitutes an on-going threat in itself. In this case, the device and its data may be controlled by an adversary as well as by its legitimate owner. From MOD_BIO_V1.1 T.Casual_Attack An attacker may attempt to impersonate as a legitimate user without being enroled in the TOE. In order to perform the attack, the attacker only use one’s own biometric characteristic (in form of a zero-effort impostor attempt). From MOD_BT_V1.0 None defined – The PP-Module notes that the threats that apply to Bluetooth functionality are the same as those defined in the Base-PP as T.NETWORK_EAVESDROP and T.NETWORK_ATTACK because the Bluetooth capability is simply another interface over which those threats may be manifested. From MOD_WLANC_V1.0 T.TSF_FAILURE Security mechanisms of the TOE generally build up from a primitive set of mechanisms (e.g., memory management, privileged modes of process execution) to more complex sets of mechanisms. Failure of the primitive mechanisms could lead to a compromise in more complex mechanisms, resulting in a compromise of the TSF. T.UNAUTHORIZED_ACCESS A user may gain unauthorized access to the TOE data and TOE executable code. A malicious user, process, or external IT entity may masquerade as an authorized entity in order to gain unauthorized access to data or TOE resources. A malicious user, process, or external IT entity may misrepresent itself as the TOE to obtain identification and authentication data. T.UNDETECTED_ACTIONS Malicious remote users or external IT entities may take actions that adversely affect the security of the TOE. These actions may remain undetected and thus their effects cannot be effectively mitigated. 7 4.3 Organizational Security Policies Table 3 shows the organizational security policies defined in the individual components of CFG_MDF-BIO-BT-WLANC_V1.0. Table 3: Organizational Security Policies OSP Name OSP Definition From PP_MDF_V3.3 No OSPs defined in PP_MDF_V3.3. From MOD_BIO_V1.1 OSP.Enrol The TOE shall enrol a user for biometric verification, only after successful authentication of a user. The TOE shall ensure that templates are of sufficient quality in order to meet the relevant error rates for biometric verification. OSP.Protection The TOE in cooperation with its environment shall protect itself, its configuration and biometric data. OSP.Verification_Error The TOE shall meet relevant criteria for its security relevant error rates for biometric verification. From MOD_BT_V1.0 No OSPs defined in MOD_BT_V1.0. From MOD_WLANC_V1.0 No OSPs defined in MOD_WLANC_V1.0 4.4 Security Objectives Table 4 shows the security objectives for the TOE defined in the individual components of CFG_MDF-BIO-BT-WLANC_V1.0. Table 4: Security Objectives for the TOE TOE Security Objective TOE Security Objective Definition From PP_MDF_V3.3 O.PROTECTED_COMMS To address the network eavesdropping (T.NETWORK_EAVESDROP) and network attack (T.NETWORK_ATTACK) threats described in Section 3.1 Threats, concerning wireless transmission of Enterprise and user data and configuration data between the TOE and remote network entities, conformant TOEs will use a trusted communication path. The TOE must be capable of communicating using mutually authenticated TLS, EAP-TLS, HTTPS, 802.1X, and 802.11-2012. The TOE may optionally communicate using these standard protocols: IPsec, mutually-authenticated DTLS, or Bluetooth. These protocols are specified by RFCs that offer a variety of implementation choices. Requirements have been imposed on some of these choices (particularly those for cryptographic primitives) to provide interoperability and resistance to cryptographic attack. While conformant TOEs must support all of the choices specified in the ST including any optional SFRs defined in this PP, they may support additional algorithms and protocols. If such additional 8 TOE Security Objective TOE Security Objective Definition mechanisms are not evaluated, guidance must be given to the administrator to make clear the fact that they were not evaluated. O.STORAGE To address the issue of loss of confidentiality of user data in the event of loss of a Mobile Device (T.PHYSICAL_ACCESS), conformant TOEs will use data-at-rest protection. The TOE will be capable of encrypting data and keys stored on the device and will prevent unauthorized access to encrypted data. O.CONFIG To ensure a Mobile Device protects user and enterprise data that it may store or process, conformant TOEs will provide the capability to configure and apply security policies defined by the user and the Enterprise Administrator. If Enterprise security policies are configured these must be applied in precedence of user specified security policies. O.AUTH To address the issue of loss of confidentiality of user data in the event of loss of a Mobile Device (T.PHYSICAL_ACCESS), users are required to enter an authentication factor to the device prior to accessing protected functionality and data. Some non-sensitive functionality (e.g., emergency calling, text notification) can be accessed prior to entering the authentication factor. The device will automatically lock following a configured period of inactivity in an attempt to ensure authorization will be required in the event of the device being lost or stolen. Authentication of the endpoints of a trusted communication path is required for network access to ensure attacks are unable to establish unauthorized network connections to undermine the integrity of the device. Repeated attempts by a user to authorize to the TSF will be limited or throttled to enforce a delay between unsuccessful attempts. O.INTEGRITY To ensure the integrity of the Mobile Device is maintained conformant TOEs will perform self-tests to ensure the integrity of critical functionality, software/firmware and data has been maintained. The user shall be notified of any failure of these self-tests. This will protect against the threat T.PERSISTENT. To address the issue of an application containing malicious or flawed code (T.MALICIOUS_APP), the integrity of downloaded updates to software/firmware will be verified prior to installation/execution of the object on the Mobile Device. In addition, the TOE will restrict applications to only have access to the system services and data they are permitted to interact with. The TOE will further protect against malicious applications from gaining access to data they are not authorized to access by randomizing the memory layout. O.PRIVACY In a BYOD environment (use cases 3 and 4), a personally-owned mobile device is used for both personal activities and enterprise data. Enterprise management solutions may have the technical capability to monitor and enforce security policies on the device. However, the privacy of the personal activities and data must be ensured. In addition, since there are limited controls that the enterprise can enforce on the personal side, separation of personal and enterprise data is needed. This will protect against the T.MALICIOUS_APP and T.PERSISTENT_PRESENCE threats. 9 TOE Security Objective TOE Security Objective Definition From MOD_BIO_V1.1 O.BIO_Verification The TOE shall provide a biometric verification mechanism to verify a user with an adequate reliability. The TOE shall meet the relevant criteria for its security relevant error rates for biometric verification. Application Note 1 In this PP-Module, relevant criteria are FAR/FMR and FRR/FNMR. Corresponding error rates are specified in FIA_MBV_EXT.1. O.Enrol The TOE shall implement the functionality to enrol a user for biometric verification and bind the template to the user only after successful authentication of the user using NBAF. The TOE shall create templates of sufficient quality in order to meet the relevant error rates for biometric verification. Application Note 2 In this PP-Module, relevant criteria are FAR/FMR and FRR/FNMR. Corresponding error rates are specified in FIA_MBV_EXT.1. O.Protection The TOE shall protect biometric data using the SEE provided by the TOE environment during runtime and storage. Application Note 3 The TOE and TOE environment (i.e., the computer) satisfy relevant requirements defined in this PP-Module and Base-PP respectively to protect biometric data. From MOD_BT_V1.0 This PP-Module defines no additional TOE security objectives beyond those defined in the Base-PP. However, the SFRs defined in this PP-Module will assist in the achievement of O.PROTECTED_COMMS in the Base-PP. From MOD_WLANC_V1.0 O.AUTH_COMM The TOE will provide a means to ensure that it is communicating with an authorized access point and not some other entity pretending to be an authorized access point, and will provide assurance to the access point of its identity. O.CRYPTOGRAPHIC_FUNCTIONS The TOE will provide or use cryptographic functions (i.e., encryption/decryption and digital signature operations) to maintain the confidentiality and allow for detection of modification of data that are transmitted outside the TOE and its host environment. O.SELF_TEST The TOE will provide the capability to test some subset of its security functionality to ensure it is operating properly. O.SYSTEM_MONITORING The TOE will provide the capability to generate audit data. O.TOE_ADMINISTRATION The TOE will provide mechanisms to allow administrators to be able to configure the TOE. O.WIRELESS_ACCESS_POINT_CONN ECTION The TOE will provide the capability to restrict the wireless access points to which it will connect. Table 5 shows the security objectives for the Operational Environment defined in the individual components of CFG_MDF-BIO-BT-WLANC_V1.0. 10 Table 5: Security Objectives for the Operational Environment Environmental Security Objective Environmental Security Objective Definition From PP_MDF_V3.3 OE.CONFIG TOE administrators will configure the Mobile Device security functions correctly to create the intended security policy. OE.NOTIFY The Mobile User will immediately notify the administrator if the Mobile Device is lost or stolen. OE.PRECAUTION The mobile device user exercises precautions to reduce the risk of loss or theft of the Mobile Device. OE.DATA_PROPER_USER Administrators take measures to ensure that mobile device users are adequately vetted against malicious intent and are made aware of the expectations for appropriate use of the device. From MOD_BIO_V1.1 OE.Protection The TOE environment shall provide the SEE to protect the TOE, the TOE configuration and biometric data during runtime and storage. Application Note 4 The TOE and TOE environment (i.e. the computer) satisfy relevant requirements defined in this PP-Module and Base-PP respectively to protect biometric data. From MOD_BT_V1.0 No operational environment objectives defined in MOD_BT_V1.0. From MOD_WLANC_V1.0 OE.NO_TOE_BYPASS Information cannot flow between external and internal networks located in different enclaves without passing through the TOE. OE.TRUSTED_ADMIN TOE administrators are trusted to follow and apply all administrator guidance in a trusted manner. 11 5 Functional Requirements As indicated above, CFG_MDF-BIO-BT-WLANC_V1.0 includes the PP_MDF_V3.3, MOD_BIO_V1.1, MOD_BT_V1.0, and MOD_WLANC_V1.0. Requirements in the PP_MDF_V3.3, MOD_BIO_V1.1, MOD_BT_V1.0, and MOD_WLANC_V1.0 are comprised of the “base” requirements, additional requirements that are optional, selection-based, or objective, and, in the case of the PP-Modules, additional requirements that are dependent on the Base-PP that the PP-Modules are used with. The following table contains the “base” requirements that were validated as part of the Google Pixel devices evaluation activities referenced above as well as the additional requirements that depend on the Base-PP that is claimed. In the case of the Google Pixel devices evaluation, only those that apply when PP_MDF_V3.3 is the Base-PP were claimed by the TOE; those associated with other Base-PPs did not apply and have been evaluated through evaluation of the PP-Module workunits. Table 6: Base-PP Security Functional Requirements Requirement Class Requirement Component Verified By From MOD_BIO_V1.1 Modified when the Protection Profile for Mobile Device Fundamentals is the Base-PP FCS: Cryptographic Support FCS_CKM_EXT.4: Key Destruction Google Pixel Devices on Android 13 FPT: Protection of the TSF FPT_AEX_EXT.4: Domain Isolation Google Pixel Devices on Android 13 FPT_KST_EXT.1: Key Storage Google Pixel Devices on Android 13 FPT_KST_EXT.2: No Key Transmission Google Pixel Devices on Android 13 Additional when the Protection Profile for Mobile Device Fundamentals is the Base-PP There are no additional SFRs when the MDF PP is the Base-PP. From MOD_BT_V1.0 Modified when the Protection Profile for Mobile Device Fundamentals is the Base-PP FMT: Security Management FMT_SMF_EXT.1: Specification of Management Functions Google Pixel Devices on Android 13 Additional when the Protection Profile for Mobile Device Fundamentals is the Base-PP FMT: Security Management FMT_SMF_EXT.1/BT: Specification of Management Functions Google Pixel Devices on Android 13 From MOD_WLANC_V1.0 Modified when the Protection Profile for Mobile Device Fundamentals is the Base-PP There are no modified SFRs when the MDF PP is the Base-PP. Additional when the Protection Profile for Mobile Device Fundamentals is the Base-PP There are no additional SFRs when the MDF PP is the Base-PP. 12 The following table contains the “base” requirements specific to the TOE. Table 7: TOE Security Functional Requirements Requirement Class Requirement Component Verified By From PP_MDF_V3.3 FAU: Security Audit FAU_GEN.1: Audit Data Generation Google Pixel Devices on Android 13 FAU_SAR.1: Audit Review Google Pixel Devices on Android 13 FAU_STG.1: Audit Storage Protection Google Pixel Devices on Android 13 FAU_STG.4: Prevention of Audit Data Loss Google Pixel Devices on Android 13 FCS: Cryptographic Support FCS_CKM.1: Cryptographic Key Generation Google Pixel Devices on Android 13 FCS_CKM.2/LOCKED: Cryptographic Key Establishment Google Pixel Devices on Android 13 FCS_CKM.2/UNLOCKED: Cryptographic Key Establishment Google Pixel Devices on Android 13 FCS_CKM_EXT.1: Cryptographic Key Support Google Pixel Devices on Android 13 FCS_CKM_EXT.2: Cryptographic Key Random Generation Google Pixel Devices on Android 13 FCS_CKM_EXT.3: Cryptographic Key Generation Google Pixel Devices on Android 13 FCS_CKM_EXT.4: Key Destruction Google Pixel Devices on Android 13 FCS_CKM_EXT.5: TSF Wipe Google Pixel Devices on Android 13 FCS_CKM_EXT.6: Salt Generation Google Pixel Devices on Android 13 FCS_COP.1/CONDITION: Cryptographic Operation Google Pixel Devices on Android 13 FCS_COP.1/ENCRYPT: Cryptographic Operation Google Pixel Devices on Android 13 FCS_COP.1/HASH: Cryptographic Operation Google Pixel Devices on Android 13 FCS_COP.1/KEYHMAC: Cryptographic Operation Google Pixel Devices on Android 13 FCS_COP.1/SIGN: Cryptographic Operation Google Pixel Devices on Android 13 FCS_HTTPS_EXT.1: HTTPS Protocol Google Pixel Devices on Android 13 FCS_IV_EXT.1: Initialization Vector Generation Google Pixel Devices on Android 13 FCS_RBG_EXT.1: Random Bit Generation Google Pixel Devices on Android 13 FCS_SRV_EXT.1: Cryptographic Algorithm Services Google Pixel Devices on Android 13 FCS_STG_EXT.1: Cryptographic Key Storage Google Pixel Devices on Android 13 FCS_STG_EXT.2: Encrypted Cryptographic Key Storage Google Pixel Devices on Android 13 FCS_STG_EXT.3: Integrity of Encrypted Key Storage Google Pixel Devices on Android 13 13 Requirement Class Requirement Component Verified By FDP: User Data Protection FDP_ACF_EXT.1: Access Control for System Services Google Pixel Devices on Android 13 FDP_DAR_EXT.1: Protected Data Encryption Google Pixel Devices on Android 13 FDP_DAR_EXT.2: Sensitive Data Encryption Google Pixel Devices on Android 13 FDP_IFC_EXT.1: Subset Information Flow Control Google Pixel Devices on Android 13 FDP_STG_EXT.1: User Data Storage Google Pixel Devices on Android 13 FDP_UPC_EXT.1/APPS: Inter-TSF User Data Transfer Protection (Applications) Google Pixel Devices on Android 13 FIA: Identification and Authentication FIA_AFL_EXT.1: Authentication Failure Handling Google Pixel Devices on Android 13 FIA_PMG_EXT.1: Password Management Google Pixel Devices on Android 13 FIA_TRT_EXT.1: Authentication Throttling Google Pixel Devices on Android 13 FIA_UAU.5: Multiple Authentication Mechanisms Google Pixel Devices on Android 13 FIA_UAU.6/CREDENTIAL: Re-Authenticating (Credential Change) Google Pixel Devices on Android 13 FIA_UAU.6/LOCKED: Re-Authenticating (TSF Lock) Google Pixel Devices on Android 13 FIA_UAU.7: Protected Authentication Feedback Google Pixel Devices on Android 13 FIA_UAU_EXT.1: Authentication for Cryptographic Operation Google Pixel Devices on Android 13 FIA_UAU_EXT.2: Timing of Authentication Google Pixel Devices on Android 13 FIA_X509_EXT.1: X.509 Validation of Certificates Google Pixel Devices on Android 13 FIA_X509_EXT.2: X.509 Certificate Authentication Google Pixel Devices on Android 13 FIA_X509_EXT.3: Request Validation of Certificates Google Pixel Devices on Android 13 FMT: Security Management FMT_MOF_EXT.1: Management of Security Functions Behavior Google Pixel Devices on Android 13 FMT_SMF.1: Specification of Management Functions Google Pixel Devices on Android 13 FMT_SMF_EXT.2: Specification of Remediation Actions Google Pixel Devices on Android 13 FPT: Protection of the TSF FPT_AEX_EXT.1: Application Address Space Layout Randomization Google Pixel Devices on Android 13 FPT_AEX_EXT.2: Memory Page Permissions Google Pixel Devices on Android 13 FPT_AEX_EXT.3: Stack Overflow Protection Google Pixel Devices on Android 13 FPT_AEX_EXT.4: Domain Isolation Google Pixel Devices on Android 13 14 Requirement Class Requirement Component Verified By FPT_JTA_EXT.1: JTAG Disablement Google Pixel Devices on Android 13 FPT_KST_EXT.1: Key Storage Google Pixel Devices on Android 13 FPT_KST_EXT.2: No Key Transmission Google Pixel Devices on Android 13 FPT_KST_EXT.3: No Plaintext Key Export Google Pixel Devices on Android 13 FPT_NOT_EXT.1: Self-Test Notification Google Pixel Devices on Android 13 FPT_STM.1: Reliable Time Stamps Google Pixel Devices on Android 13 FPT_TST_EXT.1: TSF Cryptographic Functionality Testing Google Pixel Devices on Android 13 FPT_TST_EXT.2/PREKERNEL: TSF Integrity Checking (Pre-Kernel) Google Pixel Devices on Android 13 FPT_TUD_EXT.1: TSF Version Query Google Pixel Devices on Android 13 FPT_TUD_EXT.2: TSF Update Verification Google Pixel Devices on Android 13 FPT_TUD_EXT.3: Application Signing Google Pixel Devices on Android 13 FTA: TOE Access FTA_SSL_EXT.1: TSF- and User-Initiated Locked State Google Pixel Devices on Android 13 FTA_TAB.1: Default TOE Access Banners Google Pixel Devices on Android 13 FTP: Trusted Path/Channels FTP_ITC_EXT.1: Trusted Channel Communication Google Pixel Devices on Android 13 From MOD_BIO_V1.1 FIA: Identification and Authentication FIA_MBE_EXT.1: Biometric enrolment Google Pixel Devices on Android 13 FIA_MBE_EXT.2: Quality of biometric templates for biometric enrolment Google Pixel Devices on Android 13 (iterated by ST) FIA_MBV_EXT.1: Biometric verification Google Pixel Devices on Android 13 (iterated by ST) FIA_MBV_EXT.2: Quality of biometric samples for biometric verification Google Pixel Devices on Android 13 (iterated by ST) FPT: Protection of the TSF FPT_BDP_EXT.1: Biometric data processing Google Pixel Devices on Android 13 FPT_PBT_EXT.1: Protection of biometric template Google Pixel Devices on Android 13 From MOD_BT_V1.0 FAU: Security Audit FAU_GEN.1/BT: Audit Data Generation (Bluetooth) Google Pixel Devices on Android 13 FCS: Cryptographic Support FCS_CKM_EXT.8: Bluetooth Key Generation Google Pixel Devices on Android 13 FIA: Identification and Authentication FIA_BLT_EXT.1: Bluetooth User Authorization Google Pixel Devices on Android 13 FIA_BLT_EXT.2: Bluetooth Mutual Authentication Google Pixel Devices on Android 13 15 Requirement Class Requirement Component Verified By FIA_BLT_EXT.3: Rejection of Duplicate Bluetooth Connections Google Pixel Devices on Android 13 FIA_BLT_EXT.4: Secure Simple Pairing Google Pixel Devices on Android 13 FIA_BLT_EXT.6: Trusted Bluetooth Device User Authorization Google Pixel Devices on Android 13 FIA_BLT_EXT.7: Untrusted Bluetooth Device User Authorization Google Pixel Devices on Android 13 FTP: Trusted Path/Channels FTP_BLT_EXT.1: Bluetooth Encryption Google Pixel Devices on Android 13 FTP_BLT_EXT.2: Persistence of Bluetooth Encryption Google Pixel Devices on Android 13 FTP_BLT_EXT.3/BR: Bluetooth Encryption Parameters (BR/EDR) Google Pixel Devices on Android 13 From MOD_WLANC_V1.0 FAU: Security Audit FAU_GEN.1/WLAN: Audit Data Generation (Wireless LAN) Google Pixel Devices on Android 13 FCS: Cryptographic Support FCS_CKM.1/WPA: Cryptographic Key Generation (Symmetric Keys for WPA2/WPA3 Connections) Google Pixel Devices on Android 13 FCS_CKM.2/WLAN: Cryptographic Key Distribution (Group Temporal Key for WLAN) Google Pixel Devices on Android 13 FCS_TLSC_EXT.1/WLAN: TLS Client Protocol (EAP-TLS for WLAN) Google Pixel Devices on Android 13 FCS_WPA_EXT.1: Supported WPA Versions Google Pixel Devices on Android 13 FIA: Identification and Authentication FIA_PAE_EXT.1: Port Access Entity Authentication Google Pixel Devices on Android 13 FIA_X509_EXT.1/WLAN: X.509 Certificate Validation Google Pixel Devices on Android 13 FIA_X509_EXT.2/WLAN: X.509 Certificate Authentication (EAP-TLS for WLAN) Google Pixel Devices on Android 13 FIA_X509_EXT.6: X.509 Certificate Storage and Management Google Pixel Devices on Android 13 FMT: Security Management FMT_SMF.1/WLAN: Specification of Management Functions (WLAN Client) Google Pixel Devices on Android 13 FPT: Protection of the TSF FPT_TST_EXT.3/WLAN: TSF Cryptographic Functionality Testing (WLAN Client) Google Pixel Devices on Android 13 FTA: TOE Access FTA_WSE_EXT.1: Wireless Network Access Google Pixel Devices on Android 13 FTP: Trusted Path/Channels FTP_ITC.1/WLAN: Trusted Channel Communication (Wireless LAN) Google Pixel Devices on Android 13 16 The following table contains the “Optional” requirements contained in Appendix A.1 and A.3 of the Base-PP and PP-Modules (Chapter 10 in MOD_BIO_V1.1), and an indication of how those requirements were evaluated (from the list in the Identification section above). If no completed evaluations have claimed a given optional requirement, the VR author has evaluated it through the completion of the relevant APE and ACE workunits and has indicated its verification through “PP Evaluation” or “Module Evaluation.” Table 7: Optional Requirements Requirement Class Requirement Component Verified By From PP_MDF_V3.3 FDP: User Data Protection FDP_UPC_EXT.1/BLUETOOTH: Inter-TSF User Data Transfer Protection (Bluetooth) Google Pixel Devices on Android 13 FIA: Identification and Authentication FIA_UAU_EXT.4: Secondary User Authentication PP Evaluation From MOD_BIO_V1.1 FIA: Identification and Authentication FIA_MBE_EXT.3: Presentation attack detection for biometric enrolment Module Evaluation FIA_MBV_EXT.3: Presentation attack detection for biometric verification Module Evaluation From MOD_BT_V1.0 The MOD_BT_V1.0 does not define any additional optional requirements. From MOD_WLANC_V1.0 The MOD_WLANC_V1.0 does not define any additional optional requirements. The following table contains the “Selection-Based” requirements contained in Appendix B of the Base-PP and PP-Modules, and an indication of how those requirements were evaluated (from the list in the Identification section above). If no completed evaluations have claimed a given selection-based requirement, the VR author has evaluated it through the completion of the relevant APE and ACE workunits and has indicated its verification through “PP Evaluation” or “Module Evaluation.” Table 8: Selection-Based Requirements Requirement Class Requirement Component Verified By From PP_MDF_V3.3 FCS: Cryptographic Support FCS_CKM_EXT.7: Cryptographic Key Support (REK) PP Evaluation FDP: User Data Protection FDP_ACF_EXT.2: Access Control for System Resources Google Pixel Devices on Android 13 FPT: Protection of the TSF FPT_TST_EXT.3: TSF Integrity Testing PP Evaluation FPT_TUD_EXT.4: Trusted Update Verification PP Evaluation From MOD_BIO_V1.1 17 Requirement Class Requirement Component Verified By The MOD_BIO_V1.1 does not define any additional selection-based requirements. From MOD_BT_V1.0 FTP: Trusted Path/Channels FTP_BLT_EXT.3/LE: Bluetooth Encryption Parameters (LE) Google Pixel Devices on Android 13 From MOD_WLANC_V1.0 FCS: Cryptographic Support FCS_TLSC_EXT.2/WLAN: TLS Client Support for Supported Groups Extension (EAP-TLS for WLAN) Google Pixel Devices on Android 13 The following table contains the “Objective” requirements contained in Appendix A.2 of the Base-PP and PP-Modules (N/A in MOD_BIO_V1.1), and an indication of how those requirements were evaluated (from the list in the Identification section above). If no completed evaluations have claimed a given objective requirement, the VR author has evaluated it through the completion of the relevant APE and ACE workunits and has indicated its verification through “PP Evaluation” or “Module Evaluation.” Table 9: Objective Requirements Requirement Class Requirement Component Verified By From PP_MDF_V3.3 FAU: Security Audit FAU_SEL.1: Selective Audit PP Evaluation FCS: Cryptographic Support FCS_RBG_EXT.2: Random Bit Generator State Preservation PP Evaluation FCS_RBG_EXT.3: Support for Personalization String PP Evaluation FCS_SRV_EXT.2: Cryptographic Key Storage Services Google Pixel Devices on Android 13 FDP: User Data Protection FDP_ACF_EXT.3: Security Attribute Based Access Control PP Evaluation FDP_BCK_EXT.1: Application Backup PP Evaluation FDP_BLT_EXT.1: Limitation of Bluetooth Device Access PP Evaluation FIA: Identification and Authentication FIA_X509_EXT.4: X509 Certificate Enrollment PP Evaluation FIA_X509_EXT.5: X.509 Certificate Requests PP Evaluation FMT: Security Management FMT_SMF_EXT.3: Current Administrator Google Pixel Devices on Android 13 FPT: Protection of the TSF FPT_AEX_EXT.5: Kernel Address Space Layout Randomization Google Pixel Devices on Android 13 FPT_AEX_EXT.6: Write or Execute Memory Page Permissions PP Evaluation FPT_AEX_EXT.7: Heap Overflow Protection PP Evaluation 18 Requirement Class Requirement Component Verified By FPT_BBD_EXT.1: Application Processor Mediation Google Pixel Devices on Android 13 FPT_BLT_EXT.1: Limitation of Bluetooth Profile Support PP Evaluation FPT_NOT_EXT.2: Software Integrity Verification PP Evaluation FPT_TST_EXT.2/POSTKERNEL: TSF Integrity Checking (Post-Kernel) Google Pixel Devices on Android 13 FPT_TUD_EXT.5: Application Verification PP Evaluation FPT_TUD_EXT.6: Trusted Update Verification Google Pixel Devices on Android 13 From MOD_BIO_V1.1 The MOD_BIO_V1.1 does not define any additional objective requirements. From MOD_BT_V1.0 FIA: Identification and Authentication FIA_BLT_EXT.5: Bluetooth Secure Connections Module Evaluation From MOD_WLANC_V1.0 The MOD_WLANC_V1.0 does not define any additional objective requirements. 19 6 Assurance Requirements The PP-Configuration defines its security assurance requirements as those required by PP_MDF_V3.3. The SARs defined in that PP are applicable to MOD_BIO_V1.1, MOD_BT_V1.0, and MOD_WLANC_V1.0, as well as CFG_MDF-BIO-BT-WLANC_V1.0 as a whole. 20 7 Results of the Evaluation Note that for APE and ACE elements and workunits identical to ASE elements and workunits, the lab performed the ACE workunits concurrent to the ASE workunits. Table 10: Evaluation Results: PP_MDF_V3.3 APE Requirement Evaluation Verdict Verified By APE_INT.1 Pass PP Evaluation APE_CCL.1 Pass PP Evaluation APE_SPD.1 Pass PP Evaluation APE_OBJ.1 Pass PP Evaluation APE_ECD.1 Pass PP Evaluation APE_REQ.1 Pass PP Evaluation Table 10: Evaluation Results: MOD_BIO_V1.1 ACE Requirement Evaluation Verdict Verified By ACE_INT.1 Pass Module Evaluation ACE_CCL.1 Pass Module Evaluation ACE_SPD.1 Pass Module Evaluation ACE_OBJ.1 Pass Module Evaluation ACE_ECD.1 Pass Module Evaluation ACE_REQ.1 Pass Module Evaluation ACE_MCO.1 Pass Module Evaluation Table 10: Evaluation Results: MOD_BT_V1.0 ACE Requirement Evaluation Verdict Verified By ACE_INT.1 Pass Module Evaluation ACE_CCL.1 Pass Module Evaluation ACE_SPD.1 Pass Module Evaluation ACE_OBJ.1 Pass Module Evaluation ACE_ECD.1 Pass Module Evaluation ACE_REQ.1 Pass Module Evaluation ACE_MCO.1 Pass Module Evaluation Table 11: Evaluation Results: MOD_WLANC_V1.0 ACE Requirement Evaluation Verdict Verified By ACE_INT.1 Pass Module Evaluation ACE_CCL.1 Pass Module Evaluation ACE_SPD.1 Pass Module Evaluation ACE_OBJ.1 Pass Module Evaluation ACE_ECD.1 Pass Module Evaluation ACE_REQ.1 Pass Module Evaluation ACE_MCO.1 Pass Module Evaluation Table 12: Evaluation Results: CFG_MDF-BIO-BT-WLANC_V1.0 ACE Requirement Evaluation Verdict Verified By ACE_CCO.1 Pass PP-Config Evaluation 21 8 Glossary The following definitions are used throughout this document: • Common Criteria Testing Laboratory (CCTL). An IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the CCEVS Validation Body to conduct Common Criteria-based evaluations. • Conformance. The ability to demonstrate unambiguously that a given implementation is correct with respect to the formal model. • Evaluation. An IT product’s assessment against the Common Criteria using the Common Criteria Evaluation Methodology as the supplemental guidance, interprets it in the Evaluation Activities to determine whether the claims made are justified. • Evaluation Evidence. Any tangible resource (information) required from the sponsor or developer by the evaluator to perform one or more evaluation activities. • Target of Evaluation (TOE). A group of IT products configured as an IT system, or an IT product, and associated documentation that is the subject of a security evaluation under the CC. • Validation. The process the CCEVS Validation Body uses that leads to the issuance of a Common Criteria certificate. • Validation Body. A governmental organization responsible for carrying out validation and for overseeing the day-to-day operation of the NIAP Common Criteria Evaluation and Validation Scheme. 22 9 Bibliography The validation team used the following documents to produce this VR: [1] Common Criteria Project Sponsoring Organizations. Common Criteria for Information Technology Security Evaluation: Part 1: Introduction and General Model, Version 3.1, Revision 5, dated: April 2017. [2] Common Criteria Project Sponsoring Organizations. Common Criteria for Information Technology Security Evaluation: Part 2: Security Functional Requirements, Version 3.1, Revision 5, dated: April 2017. [3] Common Criteria Project Sponsoring Organizations. Common Criteria for Information Technology Security Evaluation: Part 3: Security Assurance Requirements, Version 3.1, Revision 5, dated: April 2017. [4] Common Criteria Project Sponsoring Organizations. Common Evaluation Methodology for Information Technology Security, Version 3.1, Revision 5, dated: April 2017. [5] CC and CEM addenda – Exact Conformance, Selection-Based SFRs, Optional SFRs, Version 0.5, dated: May 2017. [6] Protection Profile for Mobile Device Fundamentals, Version 3.3, 2022-09-12. [7] collaborative PP-Module for Biometric enrolment and verification – for unlocking the device, Version 1.1, September 12, 2022. [8] PP-Module for Bluetooth, Version 1.0, 2021-04-15. [9] PP-Module for WLAN Clients, Version 1.0, 2022-03-31 [10] PP-Configuration for Mobile Device Fundamentals, Biometric enrolment and verification – for unlocking the device, Bluetooth, and WLAN Clients, Version 1.0, 2022-10-11. [11] Google Pixel Devices on Android 13 – Security Target, Version 1.0, January 23, 2023.