The PKI Secure Kernel Protection Profile
Version “1.1 evaluated”
April 4, 2002
ii
This document is the first of a series of Protection Profiles to cover a “Public Key
Infrastructure” architecture. It has been produced by the so called “PKI PP working
group”.
The authors gracefully donate this document to the public domain, encouraging its
wide distribution, usage and adoption. No patent of copyright shall be claimed by the
group, who, by putting it in public domain, deter others of doing so.
The “PKI PP working group” at the time of issuing this version is defined by the fol-
lowing members. The actual group members can be reached at pkipp@safelayer.com.
"Arturo Ribagorda Garnacho" <arturo@inf.uc3m.es>
"Benjamín Ramos" <benja1@inf.uc3m.es>
"Eduardo Rojas" <erojas@dissc.presidencia.gob.es>
"Fernando Fazio" <ffazio@setsi.mcyt.es>
"Fernando Ledrado" <fernando.ledrado@comadrid.es>
"Fernando Piera Gómez" <fpiera@indra.es>
"Francisco Jordán" <jordan@safelayer.com>
"Francisco López" <Francisco.Lopez-Crespo@sgci.dgopti.map.es>
"Gemma Déler" <GDeler@lgai.es>
"Jaime Agudo" <jagudo@elacaixa.com>
"Jaime Pereda" <jaime.pereda@amena.es>
"Jaume Díaz Serret" <jdiaz@ctele.gencat.es>
"Javier Balsa" <javier.balsa@comadrid.es>
"Javier Santos" <fsantos@europamc.com>
"Jordi Buch" <jbt@safelayer.com>
"Jordi Iñigo" <jig@safelayer.com>
"Jorge Dávila Muro" <jdavila@fi.upm.es>
"José A. Mañas" <jmanas@dit.upm.es>
"José C. Santos" <jcsantos@exceldata.es>
"José Luis Huertas" <huertasjl@inta.es>
"Julián Marcelo" <julian.marcelo@sema.es>
"Julio Berrocal" <berrocal@dit.upm.es>
"Liaquat Khan" <liaquat.khan@gta.multicert.org>
"Luis Fernandez" <codasic@jet.es>
"Luis Jiménez" <infosec@areatec.com>
"Manuel Jacinto Martínez Álvarez" <mjma@notes.banesto.es>
"Marcos López Chávarri" <mlopez@bancopopular.es>
"María José Caro" <carobm@inta.es>
"Miguel Bañón" <bagnonm@safelayer.com>
"María del Mar Solís" <mar.solis@safelayer.com>
"Pedro Pablo López" <pedro_pablo_lopez_rsi@cajarural.com>
"Pino Caballero" <pcaballe@ull.es>
"Rafael Molina Palomo" <rmp1@bancosantander.es>
"Ramon Miralles López" <rmiralles@ctele.gencat.es>
"Roberto Moya Quiles" <rmoya@dimasoft.es>
"Rosa María García Ontoso" <rgo608@comadrid.es>
"Stefan Kelm" <kelm@secorvo.de>
"Teresa Nuñez" <tnunez@europamc.com>
"Tomás Sánchez" <tsancheza@fnmt.es>
"Xavier Sanz" <xsanz@ctele.gencat.es>
Contents
Revision History xxvii
Acronyms and prefixes xxix
1 INTRODUCTION 1
1.1 Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2 TOE DESCRIPTION 3
3 TOE SECURITY ENVIRONMENT 5
3.1 Assumptions regarding threats . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.1.1 Assumptions about the administrative users of the TOE . . . . . . . . . 5
3.1.2 Assumptions about the expected hacking threats over the TOE . . . . . . 7
3.1.3 Assumptions about the TOE physical environment . . . . . . . . . . . . 8
3.1.4 Assumptions about the TOE hardware and software . . . . . . . . . . . 8
3.1.5 Assumptions about the TOE user behaviour . . . . . . . . . . . . . . . 8
3.2 Assumptions regarding policies . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.2.1 Assumptions about TOE availability . . . . . . . . . . . . . . . . . . . 9
3.2.2 Assumptions about TOE access control policies . . . . . . . . . . . . . 10
3.2.3 Assumptions about TOE integrity policy . . . . . . . . . . . . . . . . . 10
3.2.4 Assumptions about physical control policies . . . . . . . . . . . . . . . 10
3.3 Threats addressed by the TOE . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.3.1 Administrative errors of commission . . . . . . . . . . . . . . . . . . . 12
3.3.2 Administrative errors of omission . . . . . . . . . . . . . . . . . . . . . 12
3.3.3 Hostile administrator modification of user or system data . . . . . . . . 12
3.3.4 Software containing security-related flaws . . . . . . . . . . . . . . . . 13
3.3.5 Hacker undetected system access . . . . . . . . . . . . . . . . . . . . . 13
3.3.6 Message content modification . . . . . . . . . . . . . . . . . . . . . . . 13
3.3.7 Unexpected disruption of system or component power . . . . . . . . . . 14
3.3.8 Sender denies sending information . . . . . . . . . . . . . . . . . . . . 14
3.3.9 Hostile user acts cause confidentiality breaches . . . . . . . . . . . . . . 14
3.3.10 User abuses authorization to collect data . . . . . . . . . . . . . . . . . 15
3.3.11 User errors cause confidentiality breaches . . . . . . . . . . . . . . . . 15
3.3.12 User errors cause integrity breaches . . . . . . . . . . . . . . . . . . . . 15
3.3.13 User errors undermine the system’s security features . . . . . . . . . . . 16
3.3.14 User abuses authorization to modify data . . . . . . . . . . . . . . . . . 16
3.3.15 User abuses authorization to send data . . . . . . . . . . . . . . . . . . 16
3.4 Detailed Attacks countered by the TOE . . . . . . . . . . . . . . . . . . . . . . 17
3.4.1 Accidental mismanagement of cryptographic functions . . . . . . . . . . 17
3.4.2 Destruction or modification of audit data . . . . . . . . . . . . . . . . . 17
3.4.3 Administrator modifies or destroys user data or applications . . . . . . . 17
iii
iv CONTENTS
3.4.4 Administrator maliciously modifies or deletes data access control attributes 18
3.4.5 The administrator maliciously modifies information flow control. . . . . 18
3.4.6 Administrator maliciously modifies system entry parameters . . . . . . . 19
3.4.7 Administrator maliciously modifies security-critical code . . . . . . . . 19
3.4.8 Administrator maliciously modifies user/subject bindings . . . . . . . . 20
3.4.9 Administrator maliciously modifies user attributes and/or roles . . . . . 20
3.4.10 User privileges and/or authorizations are not updated upon reassignment 20
3.4.11 Administrator error modifies access control or information flow policy . 21
3.4.12 Administrator error changes audit behavior . . . . . . . . . . . . . . . . 21
3.4.13 Administrator error modifies authentication enforcement . . . . . . . . . 21
3.4.14 Administrator error makes information unavailable . . . . . . . . . . . . 22
3.4.15 Back door left open . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.4.16 Administrator error makes resource unavailable . . . . . . . . . . . . . 22
3.4.17 Administrator error modifies entry policy . . . . . . . . . . . . . . . . . 23
3.4.18 Administrator fails to update security configuration . . . . . . . . . . . 23
3.4.19 Administrator error modifies user security attributes . . . . . . . . . . . 23
3.4.20 Inconsistent interpretation of audit data attributes . . . . . . . . . . . . . 24
3.4.21 Buffers not cleared by the system . . . . . . . . . . . . . . . . . . . . . 24
3.4.22 Incorrect modification of control data . . . . . . . . . . . . . . . . . . . 24
3.4.23 System data incorrectly exchanged . . . . . . . . . . . . . . . . . . . . 24
3.4.24 Non-secure recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.4.25 Inaccurate system-data replication . . . . . . . . . . . . . . . . . . . . 24
3.4.26 System modification by unauthorized source . . . . . . . . . . . . . . . 24
3.4.27 Malicious developer creates secret trapdoor in system . . . . . . . . . . 24
3.4.28 Hacker gains access through a vulnerability in code . . . . . . . . . . . 25
3.4.29 Weak system access control mechanism or system access control imple-
mentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.4.30 The communication mechanism emanates data . . . . . . . . . . . . . . 25
3.4.31 Outsider intercepts user communications . . . . . . . . . . . . . . . . . 25
3.4.32 Hacker causes overload of communication resources . . . . . . . . . . . 26
3.4.33 Accidental or deliberate mishandling of cryptographic assets external to
the TOE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.4.34 A hacker assumes the identity of an authorized user . . . . . . . . . . . 26
3.4.35 A user assumes the identity of an authorized user . . . . . . . . . . . . . 27
3.4.36 Modification of security-critical data in transit from a remote trusted site 27
3.4.37 Modification of user data in transit from a remote site . . . . . . . . . . 28
3.4.38 Modification of security-critical data in transit to a remote site . . . . . . 28
3.4.39 Modification of user data in transit to a remote site . . . . . . . . . . . . 29
3.4.40 Attacker modifies protocol headers . . . . . . . . . . . . . . . . . . . . 29
3.4.41 Hacker activities cause storage overload . . . . . . . . . . . . . . . . . 29
3.4.42 Resource depletion failure . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.4.43 Unexpected power reset . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.4.44 Denial of having sent information to another local user . . . . . . . . . . 30
3.4.45 Denial of having sent information to a remote user . . . . . . . . . . . . 30
3.4.46 Denial of having sent data by a remote user . . . . . . . . . . . . . . . . 30
3.4.47 Accidental release of cryptographic assets due to TSF flaw or malfunction 30
3.4.48 User smuggles data using removable media . . . . . . . . . . . . . . . . 30
3.4.49 Steganographic data smuggling . . . . . . . . . . . . . . . . . . . . . . 30
3.4.50 User collects data by browsing . . . . . . . . . . . . . . . . . . . . . . 31
3.4.51 User collects authentication data by deception . . . . . . . . . . . . . . 31
3.4.52 User collects data by deduction . . . . . . . . . . . . . . . . . . . . . . 31
3.4.53 User collects data by eavesdropping . . . . . . . . . . . . . . . . . . . 32
3.4.54 User collects residual data . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.4.55 User’s unauthorized use causes overload of communication resources . . 33
CONTENTS v
3.4.56 Denial of service due to exhausted audit storage . . . . . . . . . . . . . 33
3.4.57 Falsification of information quality in data export . . . . . . . . . . . . 33
3.4.58 Under-classification of data sensitivity on export . . . . . . . . . . . . . 34
3.4.59 Accidental release of cryptographic assets due to user error . . . . . . . 34
3.4.60 Confidentiality violation of export control policy . . . . . . . . . . . . . 34
3.4.61 User error modifying attributes availability . . . . . . . . . . . . . . . . 35
3.4.62 Failure to provide object security attributes in data export . . . . . . . . 35
3.4.63 Incorrectly set object attributes . . . . . . . . . . . . . . . . . . . . . . 35
3.4.64 User error setting attributes availability . . . . . . . . . . . . . . . . . . 36
3.4.65 User modifies audit trail . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3.4.66 User improperly modifies authentication data . . . . . . . . . . . . . . . 37
3.4.67 User improperly modifies user data . . . . . . . . . . . . . . . . . . . . 37
3.4.68 User improperly modifies TSF data . . . . . . . . . . . . . . . . . . . . 37
3.4.69 User’s unauthorized actions over-task the system causing processor over-
load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
3.4.70 User sends data violating confidentiality . . . . . . . . . . . . . . . . . 38
3.4.71 User sends data violating integrity . . . . . . . . . . . . . . . . . . . . 38
3.4.72 User’s unauthorized actions cause storage overload . . . . . . . . . . . . 39
3.5 Threats addressed by the TOE with support from the environment . . . . . . . . 39
3.5.1 Administrator violates user privacy policy . . . . . . . . . . . . . . . . 39
3.5.2 Malicious code exploitation . . . . . . . . . . . . . . . . . . . . . . . . 40
3.5.3 Legitimate system services are spoofed . . . . . . . . . . . . . . . . . . 40
3.5.4 Hacker attempts resource denial of service . . . . . . . . . . . . . . . . 40
3.5.5 Hacker eavesdrops on user data communications . . . . . . . . . . . . . 41
3.5.6 Hacker masquerading as a legitimate user or as system process . . . . . 41
3.5.7 Exploitation of vulnerabilities in the physical environment of the system 41
3.5.8 Social engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.5.9 A critical system component fails . . . . . . . . . . . . . . . . . . . . . 42
3.5.10 Failure of a distributed system component . . . . . . . . . . . . . . . . 42
3.5.11 Recipient denies receiving information . . . . . . . . . . . . . . . . . . 43
3.5.12 A participant denies performing a transaction . . . . . . . . . . . . . . . 43
3.5.13 User error makes data inaccessible . . . . . . . . . . . . . . . . . . . . 44
3.5.14 User’s misuse causes denial of service . . . . . . . . . . . . . . . . . . 44
3.6 Detailed Attacks countered by the Environment . . . . . . . . . . . . . . . . . . 44
3.6.1 Administrator aggregates privacy information . . . . . . . . . . . . . . 44
3.6.2 Administrator reads collected user privacy information . . . . . . . . . . 45
3.6.3 Administrator reads system generated privacy information . . . . . . . . 45
3.6.4 Malicious code perpetrator dissemination . . . . . . . . . . . . . . . . . 45
3.6.5 Malicious code perpetrator execution . . . . . . . . . . . . . . . . . . . 45
3.6.6 Malicious code accidental IT download . . . . . . . . . . . . . . . . . . 45
3.6.7 Malicious code IT execution . . . . . . . . . . . . . . . . . . . . . . . 46
3.6.8 Malicious code accidental user download . . . . . . . . . . . . . . . . . 46
3.6.9 Malicious code user execution . . . . . . . . . . . . . . . . . . . . . . 46
3.6.10 Login program replicated to capture authentication data . . . . . . . . . 46
3.6.11 Hacker causes system task overload resulting in denial of service . . . . 46
3.6.12 An outsider taps a communications line . . . . . . . . . . . . . . . . . . 46
3.6.13 Masquerading due to weak authentication . . . . . . . . . . . . . . . . 46
3.6.14 Physical attack on cryptographic assets . . . . . . . . . . . . . . . . . . 47
3.6.15 Hacker physically attacks the system . . . . . . . . . . . . . . . . . . . 47
3.6.16 Social engineering to steal password . . . . . . . . . . . . . . . . . . . 47
3.6.17 Hacker uses social engineering to learn system information . . . . . . . 47
3.6.18 System hardware fails during system operation . . . . . . . . . . . . . . 47
3.6.19 System use uncovers an intrinsic software flaw in a critical system com-
ponent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
vi CONTENTS
3.6.20 Communications function failure . . . . . . . . . . . . . . . . . . . . . 47
3.6.21 Denial of having received data from another local user . . . . . . . . . . 48
3.6.22 Denial of having received information from a remote user . . . . . . . . 48
3.6.23 Denial of having received information by a remote user . . . . . . . . . 48
3.6.24 Circumvent non-repudiation in a transaction involving a user and a local
system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.6.25 Circumvent non-repudiation in a transaction involving a local user and a
remote system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.6.26 Circumvent non-repudiation in a transaction involving a remote user and
a local system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.6.27 User error deletes data . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.6.28 User obstructs legitimate use of resources. . . . . . . . . . . . . . . . . 49
3.7 Organizational General Security Policies for the TOE . . . . . . . . . . . . . . . 49
3.7.1 Individual accountability . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.7.2 Notification of threats and vulnerabilities . . . . . . . . . . . . . . . . . 49
3.7.3 Authorized use of information . . . . . . . . . . . . . . . . . . . . . . 49
3.7.4 Installation and usage guidance . . . . . . . . . . . . . . . . . . . . . . 49
3.7.5 System lifecycle phases integrate security . . . . . . . . . . . . . . . . 49
3.7.6 Information marking . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.7.7 Semiformally designed, tested and reviewed . . . . . . . . . . . . . . . 50
3.8 Organizational Detailed Security Policies assigned to the TOE . . . . . . . . . . 50
3.8.1 Changes to security data by authorized personnel . . . . . . . . . . . . . 50
3.8.2 Configuration Management . . . . . . . . . . . . . . . . . . . . . . . . 50
3.8.3 Delivery and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.8.4 Product Development . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.8.5 Guidance documents . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.8.6 Lifecycle support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.8.7 Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.8.8 Vulnerability Assesment . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.8.9 Individual accountability . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.8.10 Audit data generation with identity . . . . . . . . . . . . . . . . . . . . 51
3.8.11 Protected audit data storage . . . . . . . . . . . . . . . . . . . . . . . . 51
3.8.12 Notification of threats and vulnerabilities . . . . . . . . . . . . . . . . . 51
3.8.13 Notification of data content changes . . . . . . . . . . . . . . . . . . . 51
3.8.14 Implement operational configuration management . . . . . . . . . . . . 51
3.8.15 Documented recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.8.16 Labeling data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.8.17 User identification and authentication . . . . . . . . . . . . . . . . . . . 52
3.8.18 Strong integrity mechanisms . . . . . . . . . . . . . . . . . . . . . . . 52
3.8.19 Operational integrity system function testing . . . . . . . . . . . . . . . 52
3.8.20 Security throughout lifecycle . . . . . . . . . . . . . . . . . . . . . . . 52
3.8.21 Privileged user access . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.8.22 Privileged user documentation . . . . . . . . . . . . . . . . . . . . . . 52
3.8.23 User screen locking . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.8.24 Assurance of effective storage integrity . . . . . . . . . . . . . . . . . . 52
3.8.25 System access banners . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.8.26 Validation of security function integrity . . . . . . . . . . . . . . . . . . 52
3.8.27 System backup procedures . . . . . . . . . . . . . . . . . . . . . . . . 53
3.8.28 Restoration with minimal loss . . . . . . . . . . . . . . . . . . . . . . . 53
3.8.29 Effective backup restoration . . . . . . . . . . . . . . . . . . . . . . . . 53
3.8.30 Protection from security function modification . . . . . . . . . . . . . . 53
3.8.31 Trusted system recovery . . . . . . . . . . . . . . . . . . . . . . . . . . 53
3.8.32 Encryption of transmitted user data . . . . . . . . . . . . . . . . . . . . 53
3.8.33 Protection of stored user data . . . . . . . . . . . . . . . . . . . . . . . 53
CONTENTS vii
3.8.34 Protection of transmitted user data . . . . . . . . . . . . . . . . . . . . 53
3.8.35 Discretionary access control . . . . . . . . . . . . . . . . . . . . . . . . 53
3.8.36 General user documentation . . . . . . . . . . . . . . . . . . . . . . . . 53
3.9 Organizational General Security Policies for the TOE and the Environment . . . 54
3.9.1 Information availability . . . . . . . . . . . . . . . . . . . . . . . . . . 54
3.9.2 Information access control . . . . . . . . . . . . . . . . . . . . . . . . 54
3.9.3 Information content integrity . . . . . . . . . . . . . . . . . . . . . . . 54
3.9.4 Physical protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
3.10 Organizational Detailed Security Policies assigned to the Environment . . . . . . 54
3.10.1 Malicious code prevention . . . . . . . . . . . . . . . . . . . . . . . . 54
3.10.2 Backup protection and restoration . . . . . . . . . . . . . . . . . . . . . 54
3.10.3 Enhanced user identification and authentication . . . . . . . . . . . . . 54
3.10.4 Non-repudiation capabilities . . . . . . . . . . . . . . . . . . . . . . . 54
3.10.5 Physical tampering detection and notification . . . . . . . . . . . . . . . 55
4 SECURITY OBJECTIVES 57
4.1 Security Objectives for the TOE . . . . . . . . . . . . . . . . . . . . . . . . . . 57
4.1.1 Limitation of administrative access control . . . . . . . . . . . . . . . . 57
4.1.2 Object security attributes and exportation . . . . . . . . . . . . . . . . . 57
4.1.3 Access history for user session . . . . . . . . . . . . . . . . . . . . . . 57
4.1.4 Limit an administrator’s ability to modify user-subject bindings . . . . . 57
4.1.5 Limit administrator’s modification of user attributes . . . . . . . . . . . 57
4.1.6 Administrative validation of executables . . . . . . . . . . . . . . . . . 58
4.1.7 Software validation for absence of steganography . . . . . . . . . . . . 58
4.1.8 Administrator guidance documentation . . . . . . . . . . . . . . . . . . 58
4.1.9 Apply patches to fix the code . . . . . . . . . . . . . . . . . . . . . . . 58
4.1.10 CM automation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4.1.11 CM capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4.1.12 CM scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4.1.13 Delivery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4.1.14 Installation, generation and start-up . . . . . . . . . . . . . . . . . . . . 58
4.1.15 Functional specification . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.1.16 High-level design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.1.17 Implementation representation . . . . . . . . . . . . . . . . . . . . . . 59
4.1.18 TSF internals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.1.19 Low-level design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.1.20 Representation correspondence . . . . . . . . . . . . . . . . . . . . . . 60
4.1.21 Security policy modeling . . . . . . . . . . . . . . . . . . . . . . . . . 60
4.1.22 Administrator guidance . . . . . . . . . . . . . . . . . . . . . . . . . . 60
4.1.23 User guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
4.1.24 Development security . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
4.1.25 Flaw remediation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
4.1.26 Life cycle definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
4.1.27 Tools and techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.1.28 Coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.1.29 Depth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.1.30 Functional tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.1.31 Independent testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.1.32 Covert channel analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.1.33 Misuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.1.34 Strength of TOE security functions . . . . . . . . . . . . . . . . . . . . 62
4.1.35 Vulnerability analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.1.36 Complete security functions or recover to previous state . . . . . . . . . 62
4.1.37 Audit changes of system entry parameters . . . . . . . . . . . . . . . . 62
viii CONTENTS
4.1.38 Auditing for user accountability . . . . . . . . . . . . . . . . . . . . . . 62
4.1.39 Audit-administration role duties . . . . . . . . . . . . . . . . . . . . . . 63
4.1.40 Audit system access to deter misuse . . . . . . . . . . . . . . . . . . . 63
4.1.41 Individual accountability . . . . . . . . . . . . . . . . . . . . . . . . . 63
4.1.42 Audit records with identity . . . . . . . . . . . . . . . . . . . . . . . . 63
4.1.43 Respond to possible loss of stored audit records . . . . . . . . . . . . . 63
4.1.44 Protect stored audit records . . . . . . . . . . . . . . . . . . . . . . . . 63
4.1.45 User notification of data content changes . . . . . . . . . . . . . . . . . 63
4.1.46 Code signing and verification . . . . . . . . . . . . . . . . . . . . . . . 63
4.1.47 Trusted channel to remote trusted system . . . . . . . . . . . . . . . . . 63
4.1.48 Implement operational configuration management . . . . . . . . . . . . 63
4.1.49 Verify correct operation as designed . . . . . . . . . . . . . . . . . . . 64
4.1.50 Cryptographic access control policy . . . . . . . . . . . . . . . . . . . 64
4.1.51 Encrypted communications channel . . . . . . . . . . . . . . . . . . . . 64
4.1.52 Separation of cryptographic data . . . . . . . . . . . . . . . . . . . . . 64
4.1.53 Cryptographic Design and Implementation . . . . . . . . . . . . . . . . 64
4.1.54 Cryptographic import, export, and inter-TSF transfer . . . . . . . . . . . 64
4.1.55 Cryptographic Key Management . . . . . . . . . . . . . . . . . . . . . 64
4.1.56 Management of cryptographic roles . . . . . . . . . . . . . . . . . . . . 64
4.1.57 Cryptographic Modular Design . . . . . . . . . . . . . . . . . . . . . . 64
4.1.58 Cryptographic function definition . . . . . . . . . . . . . . . . . . . . . 65
4.1.59 Cryptographic self test . . . . . . . . . . . . . . . . . . . . . . . . . . 65
4.1.60 Test cryptographic functionality . . . . . . . . . . . . . . . . . . . . . . 65
4.1.61 Enforce data exchange confidentiality . . . . . . . . . . . . . . . . . . . 65
4.1.62 Control user data exportation . . . . . . . . . . . . . . . . . . . . . . . 65
4.1.63 Data import/export to/from system control . . . . . . . . . . . . . . . . 65
4.1.64 Sanitize data objects containing hidden or unused data . . . . . . . . . . 65
4.1.65 Label or mark information for external systems . . . . . . . . . . . . . . 65
4.1.66 Preservation of secure state for failures in critical components . . . . . . 65
4.1.67 Periodically check integrity . . . . . . . . . . . . . . . . . . . . . . . . 65
4.1.68 Guarantee the availability of audit storage space . . . . . . . . . . . . . 65
4.1.69 Limit sessions to outside users . . . . . . . . . . . . . . . . . . . . . . 66
4.1.70 Control hacker communication traffic . . . . . . . . . . . . . . . . . . . 66
4.1.71 Identify and authenticate a user to support accountability . . . . . . . . . 66
4.1.72 Transaction identification and authentication . . . . . . . . . . . . . . . 66
4.1.73 Identify and authenticate each user . . . . . . . . . . . . . . . . . . . . 66
4.1.74 User-action identification and authentication . . . . . . . . . . . . . . . 66
4.1.75 Identify unusual user activity . . . . . . . . . . . . . . . . . . . . . . . 66
4.1.76 System enforced information flow . . . . . . . . . . . . . . . . . . . . 66
4.1.77 Provide information flow control administration . . . . . . . . . . . . . 66
4.1.78 Require inspection for absence of malicious code. . . . . . . . . . . . . 66
4.1.79 Data marking integrity export . . . . . . . . . . . . . . . . . . . . . . . 66
4.1.80 Integrity of system data transferred externally . . . . . . . . . . . . . . 67
4.1.81 Integrity of system data transferred internally . . . . . . . . . . . . . . . 67
4.1.82 Protect user data during internal transfer . . . . . . . . . . . . . . . . . 67
4.1.83 Correct attribute exchange with another trusted product . . . . . . . . . 67
4.1.84 Integrity protection for user data and software . . . . . . . . . . . . . . 67
4.1.85 Integrity of system data replication . . . . . . . . . . . . . . . . . . . . 67
4.1.86 Operational integrity system function testing . . . . . . . . . . . . . . . 67
4.1.87 Isolate untrusted executables . . . . . . . . . . . . . . . . . . . . . . . 67
4.1.88 Lifecycle security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
4.1.89 Restrict actions before authentication . . . . . . . . . . . . . . . . . . . 67
4.1.90 Limit the number of user initiated communication sessions . . . . . . . . 68
4.1.91 Limit multiple sessions . . . . . . . . . . . . . . . . . . . . . . . . . . 68
CONTENTS ix
4.1.92 Maintain security domain . . . . . . . . . . . . . . . . . . . . . . . . . 68
4.1.93 Controlled access by maintenance personnel . . . . . . . . . . . . . . . 68
4.1.94 Expiration of maintenance privileges . . . . . . . . . . . . . . . . . . . 68
4.1.95 Manage resource security attributes . . . . . . . . . . . . . . . . . . . . 68
4.1.96 Manage security-critical data to avoid storage space being exceeded . . . 68
4.1.97 Eliminate residual information . . . . . . . . . . . . . . . . . . . . . . 68
4.1.98 Non-repudiation support for sent information by the nonlocal receiving
TSF. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
4.1.99 Non-repudiation support for sent information by the sender’s TSF. . . . . 68
4.1.100 Non-repudiation for sent information, local users . . . . . . . . . . . . . 69
4.1.101 Non-repudiation for sent information . . . . . . . . . . . . . . . . . . . 69
4.1.102 Basic object attribute integrity . . . . . . . . . . . . . . . . . . . . . . 69
4.1.103 Object domain protection . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.1.104 Provide priority of service . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.1.105 Privileged-interface status . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.1.106 Identify message modification in messages received . . . . . . . . . . . 69
4.1.107 Recovery from modification of received messages . . . . . . . . . . . . 69
4.1.108 Provide reference monitor . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.1.109 Disable remote execution . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.1.110 Resource quotas for users and services . . . . . . . . . . . . . . . . . . 69
4.1.111 User screen locking . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4.1.112 Security-relevant configuration management . . . . . . . . . . . . . . . 70
4.1.113 Protect and maintain secure system state . . . . . . . . . . . . . . . . . 70
4.1.114 Manage security attributes . . . . . . . . . . . . . . . . . . . . . . . . 70
4.1.115 Manage security-critical data . . . . . . . . . . . . . . . . . . . . . . . 70
4.1.116 Manage behavior of security functions . . . . . . . . . . . . . . . . . . 70
4.1.117 Security roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4.1.118 System terminates session for inactivity . . . . . . . . . . . . . . . . . 70
4.1.119 Identify message modification in messages sent . . . . . . . . . . . . . 70
4.1.120 Support recovery from modification of sent messages . . . . . . . . . . 70
4.1.121 Examine the source code for developer flaws . . . . . . . . . . . . . . . 70
4.1.122 Storage integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
4.1.123 System access banners . . . . . . . . . . . . . . . . . . . . . . . . . . 71
4.1.124 Validation of security function . . . . . . . . . . . . . . . . . . . . . . 71
4.1.125 System backup procedures . . . . . . . . . . . . . . . . . . . . . . . . 71
4.1.126 Frequent backups to prevent minimal loss . . . . . . . . . . . . . . . . 71
4.1.127 Sufficient backup storage and effective restoration . . . . . . . . . . . . 71
4.1.128 Protection of system security function . . . . . . . . . . . . . . . . . . 71
4.1.129 Limit administrator’s modification of security-critical code or data . . . . 71
4.1.130 Local detection of received security-critical data modified in transit . . . 71
4.1.131 Remote detection of received security-critical data modified in transit . . 71
4.1.132 Local detection of sent security-critical data modified in transit . . . . . 72
4.1.133 Remote detection of sent security-critical data modified in transit. . . . . 72
4.1.134 Trusted distributed system recovery . . . . . . . . . . . . . . . . . . . . 72
4.1.135 Provide a trusted path . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
4.1.136 Trusted path and channel . . . . . . . . . . . . . . . . . . . . . . . . . 72
4.1.137 Trusted recovery of security functionality . . . . . . . . . . . . . . . . . 72
4.1.138 Documentation of untrusted data recovery . . . . . . . . . . . . . . . . 72
4.1.139 Maintain user attributes . . . . . . . . . . . . . . . . . . . . . . . . . . 72
4.1.140 User authorization management . . . . . . . . . . . . . . . . . . . . . . 72
4.1.141 Basic confidentiality-breach prevention . . . . . . . . . . . . . . . . . . 73
4.1.142 Protection of user-session data . . . . . . . . . . . . . . . . . . . . . . 73
4.1.143 Integrity protection of stored user data . . . . . . . . . . . . . . . . . . 73
4.1.144 Protection of transmitted user data . . . . . . . . . . . . . . . . . . . . 73
x CONTENTS
4.1.145 User-defined access control . . . . . . . . . . . . . . . . . . . . . . . . 73
4.1.146 User guidance documentation . . . . . . . . . . . . . . . . . . . . . . . 73
4.2 Security Objectives for the Environment . . . . . . . . . . . . . . . . . . . . . 73
4.2.1 Audit unusual user activity . . . . . . . . . . . . . . . . . . . . . . . . 73
4.2.2 Object and data recovery free from malicious code . . . . . . . . . . . . 73
4.2.3 Physical protection of the communications line . . . . . . . . . . . . . . 73
4.2.4 Provide fault tolerant operations for critical components . . . . . . . . . 73
4.2.5 Limit observation of service usage to authorized users . . . . . . . . . . 74
4.2.6 Procedures for preventing malicious code . . . . . . . . . . . . . . . . . 74
4.2.7 Non-repudiation support for received information by a nonlocal sender’s
TSF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
4.2.8 Non-repudiation support for received information by the recipient’s TSF 74
4.2.9 Non-repudiation for received information, local users . . . . . . . . . . 74
4.2.10 Non-repudiation for received information . . . . . . . . . . . . . . . . . 74
4.2.11 Permit users to use services under aliases . . . . . . . . . . . . . . . . . 74
4.2.12 Permit users to use services anonymously . . . . . . . . . . . . . . . . . 74
4.2.13 Prevent system from collecting user privacy information . . . . . . . . . 74
4.2.14 Prevent linking of multiple service use . . . . . . . . . . . . . . . . . . 74
4.2.15 Prevent observation of service use . . . . . . . . . . . . . . . . . . . . 75
4.2.16 React to discovered attacks . . . . . . . . . . . . . . . . . . . . . . . . 75
4.2.17 Rollback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
4.2.18 Detect modifications of backup hardware, firmware, software . . . . . . 75
4.2.19 Tamper detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
4.2.20 Tamper resistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
4.2.21 Enhanced user authentication . . . . . . . . . . . . . . . . . . . . . . . 75
4.2.22 Require multiple authentication mechanisms . . . . . . . . . . . . . . . 75
5 IT SECURITY REQUIREMENTS 77
5.1 TOE Security Functional Requirements . . . . . . . . . . . . . . . . . . . . . . 77
5.1.1 FAU - Security audit . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
5.1.2 FCO - Communication . . . . . . . . . . . . . . . . . . . . . . . . . . 84
5.1.3 FCS - Cryptographic support . . . . . . . . . . . . . . . . . . . . . . . 85
5.1.4 FDP - User data protection . . . . . . . . . . . . . . . . . . . . . . . . 88
5.1.5 FIA - Identification and authentication . . . . . . . . . . . . . . . . . . 95
5.1.6 FMT - Security management . . . . . . . . . . . . . . . . . . . . . . . 97
5.1.7 FPT - Protection of the TSF . . . . . . . . . . . . . . . . . . . . . . . . 103
5.1.8 FRU - Resource utilisation . . . . . . . . . . . . . . . . . . . . . . . . 110
5.1.9 FTA - TOE access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
5.1.10 FTP - Trusted path/channels . . . . . . . . . . . . . . . . . . . . . . . . 113
5.2 TOE Security Assurance Requirements . . . . . . . . . . . . . . . . . . . . . . 114
5.2.1 ACM - Configuration management . . . . . . . . . . . . . . . . . . . . 114
5.2.2 ADO - Delivery and operation . . . . . . . . . . . . . . . . . . . . . . 117
5.2.3 ADV - Development . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
5.2.4 AGD - Guidance documents . . . . . . . . . . . . . . . . . . . . . . . 123
5.2.5 ALC - Life cycle support . . . . . . . . . . . . . . . . . . . . . . . . . 125
5.2.6 ATE - Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
5.2.7 AVA - Vulnerability assessment . . . . . . . . . . . . . . . . . . . . . . 130
6 PP APPLICATION NOTES 133
6.1 Notes on evaluating this PP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
6.1.1 Document construction method . . . . . . . . . . . . . . . . . . . . . . 133
6.1.2 Concepts mapping rationale and deviations from “The Common Criteria
Profiling Knowledge Base”. . . . . . . . . . . . . . . . . . . . . . . . . 133
CONTENTS xi
6.1.3 Inclusion of functional and assurance requirements from “FIPS 140-2
SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES” 134
6.2 Notes on using this PP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
7 RATIONALE 135
7.1 General Threats and Attacks rationale. . . . . . . . . . . . . . . . . . . . . . . 136
7.1.1 Administrative errors of commission . . . . . . . . . . . . . . . . . . . 136
7.1.2 Administrative errors of omission . . . . . . . . . . . . . . . . . . . . . 137
7.1.3 Hostile administrator modification of user or system data . . . . . . . . 137
7.1.4 Software containing security-related flaws . . . . . . . . . . . . . . . . 138
7.1.5 Hacker undetected system access . . . . . . . . . . . . . . . . . . . . . 139
7.1.6 Message content modification . . . . . . . . . . . . . . . . . . . . . . . 139
7.1.7 Unexpected disruption of system or component power . . . . . . . . . . 140
7.1.8 Sender denies sending information . . . . . . . . . . . . . . . . . . . . 140
7.1.9 Hostile user acts cause confidentiality breaches . . . . . . . . . . . . . . 140
7.1.10 User abuses authorization to collect data . . . . . . . . . . . . . . . . . 141
7.1.11 User errors cause confidentiality breaches . . . . . . . . . . . . . . . . 141
7.1.12 User errors cause integrity breaches . . . . . . . . . . . . . . . . . . . . 142
7.1.13 User errors undermine the system’s security features . . . . . . . . . . . 142
7.1.14 User abuses authorization to modify data . . . . . . . . . . . . . . . . . 142
7.1.15 User abuses authorization to send data . . . . . . . . . . . . . . . . . . 143
7.1.16 Administrator violates user privacy policy . . . . . . . . . . . . . . . . 143
7.1.17 Malicious code exploitation . . . . . . . . . . . . . . . . . . . . . . . . 143
7.1.18 Legitimate system services are spoofed . . . . . . . . . . . . . . . . . . 144
7.1.19 Hacker attempts resource denial of service . . . . . . . . . . . . . . . . 144
7.1.20 Hacker eavesdrops on user data communications . . . . . . . . . . . . . 145
7.1.21 Hacker masquerading as a legitimate user or as system process . . . . . 145
7.1.22 Exploitation of vulnerabilities in the physical environment of the system 145
7.1.23 Social engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
7.1.24 A critical system component fails . . . . . . . . . . . . . . . . . . . . . 146
7.1.25 Failure of a distributed system component . . . . . . . . . . . . . . . . 146
7.1.26 Recipient denies receiving information . . . . . . . . . . . . . . . . . . 147
7.1.27 A participant denies performing a transaction . . . . . . . . . . . . . . . 147
7.1.28 User error makes data inaccessible . . . . . . . . . . . . . . . . . . . . 147
7.1.29 User’s misuse causes denial of service . . . . . . . . . . . . . . . . . . 148
7.2 Attacks and Security Objectives correspondence. . . . . . . . . . . . . . . . . . 148
7.2.1 Accidental mismanagement of cryptographic functions . . . . . . . . . . 149
7.2.2 Destruction or modification of audit data . . . . . . . . . . . . . . . . . 149
7.2.3 Administrator modifies or destroys user data or applications . . . . . . . 149
7.2.4 Administrator maliciously modifies or deletes data access control attributes150
7.2.5 The administrator maliciously modifies information flow control. . . . . 150
7.2.6 Administrator maliciously modifies system entry parameters . . . . . . . 151
7.2.7 Administrator maliciously modifies security-critical code . . . . . . . . 151
7.2.8 Administrator maliciously modifies user/subject bindings . . . . . . . . 152
7.2.9 Administrator maliciously modifies user attributes and/or roles . . . . . 152
7.2.10 User privileges and/or authorizations are not updated upon reassignment 152
7.2.11 Administrator error modifies access control or information flow policy . 152
7.2.12 Administrator error changes audit behavior . . . . . . . . . . . . . . . . 153
7.2.13 Administrator error modifies authentication enforcement . . . . . . . . . 153
7.2.14 Administrator error makes information unavailable . . . . . . . . . . . . 154
7.2.15 Back door left open . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
7.2.16 Administrator error makes resource unavailable . . . . . . . . . . . . . 154
7.2.17 Administrator error modifies entry policy . . . . . . . . . . . . . . . . . 155
7.2.18 Administrator fails to update security configuration . . . . . . . . . . . 155
xii CONTENTS
7.2.19 Administrator error modifies user security attributes . . . . . . . . . . . 155
7.2.20 Administrator aggregates privacy information . . . . . . . . . . . . . . 156
7.2.21 Administrator reads collected user privacy information . . . . . . . . . . 156
7.2.22 Administrator reads system generated privacy information . . . . . . . . 156
7.2.23 Inconsistent interpretation of audit data attributes . . . . . . . . . . . . . 156
7.2.24 Buffers not cleared by the system . . . . . . . . . . . . . . . . . . . . . 157
7.2.25 Incorrect modification of control data . . . . . . . . . . . . . . . . . . . 157
7.2.26 System data incorrectly exchanged . . . . . . . . . . . . . . . . . . . . 157
7.2.27 Non-secure recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
7.2.28 Inaccurate system-data replication . . . . . . . . . . . . . . . . . . . . 157
7.2.29 System modification by unauthorized source . . . . . . . . . . . . . . . 158
7.2.30 Malicious developer creates secret trapdoor in system . . . . . . . . . . 158
7.2.31 Communications function failure . . . . . . . . . . . . . . . . . . . . . 158
7.2.32 Hacker gains access through a vulnerability in code . . . . . . . . . . . 159
7.2.33 Weak system access control mechanism or system access control imple-
mentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
7.2.34 The communication mechanism emanates data . . . . . . . . . . . . . . 159
7.2.35 Outsider intercepts user communications . . . . . . . . . . . . . . . . . 160
7.2.36 An outsider taps a communications line . . . . . . . . . . . . . . . . . . 160
7.2.37 Hacker causes overload of communication resources . . . . . . . . . . . 160
7.2.38 Accidental or deliberate mishandling of cryptographic assets external to
the TOE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
7.2.39 A hacker assumes the identity of an authorized user . . . . . . . . . . . 161
7.2.40 A user assumes the identity of an authorized user . . . . . . . . . . . . . 161
7.2.41 Masquerading due to weak authentication . . . . . . . . . . . . . . . . 162
7.2.42 Modification of security-critical data in transit from a remote trusted site 162
7.2.43 Modification of user data in transit from a remote site . . . . . . . . . . 163
7.2.44 Modification of security-critical data in transit to a remote site . . . . . . 163
7.2.45 Modification of user data in transit to a remote site . . . . . . . . . . . . 163
7.2.46 Physical attack on cryptographic assets . . . . . . . . . . . . . . . . . . 163
7.2.47 Hacker physically attacks the system . . . . . . . . . . . . . . . . . . . 164
7.2.48 Hacker causes system task overload resulting in denial of service . . . . 164
7.2.49 Social engineering to steal password . . . . . . . . . . . . . . . . . . . 164
7.2.50 Hacker uses social engineering to learn system information . . . . . . . 165
7.2.51 Login program replicated to capture authentication data . . . . . . . . . 165
7.2.52 Attacker modifies protocol headers . . . . . . . . . . . . . . . . . . . . 166
7.2.53 Hacker activities cause storage overload . . . . . . . . . . . . . . . . . 166
7.2.54 System hardware fails during system operation . . . . . . . . . . . . . . 167
7.2.55 Malicious code perpetrator dissemination . . . . . . . . . . . . . . . . . 167
7.2.56 Malicious code perpetrator execution . . . . . . . . . . . . . . . . . . . 168
7.2.57 Malicious code accidental IT download . . . . . . . . . . . . . . . . . . 169
7.2.58 Malicious code IT execution . . . . . . . . . . . . . . . . . . . . . . . 169
7.2.59 Malicious code accidental user download . . . . . . . . . . . . . . . . . 170
7.2.60 Malicious code user execution . . . . . . . . . . . . . . . . . . . . . . 170
7.2.61 Resource depletion failure . . . . . . . . . . . . . . . . . . . . . . . . . 171
7.2.62 Unexpected power reset . . . . . . . . . . . . . . . . . . . . . . . . . . 171
7.2.63 Denial of having received data from another local user . . . . . . . . . . 171
7.2.64 Denial of having received information from a remote user . . . . . . . . 172
7.2.65 Denial of having received information by a remote user . . . . . . . . . 172
7.2.66 Denial of having sent information to another local user . . . . . . . . . . 172
7.2.67 Denial of having sent information to a remote user . . . . . . . . . . . . 172
7.2.68 Denial of having sent data by a remote user . . . . . . . . . . . . . . . . 173
7.2.69 Circumvent non-repudiation in a transaction involving a user and a local
system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
CONTENTS xiii
7.2.70 Circumvent non-repudiation in a transaction involving a local user and a
remote system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
7.2.71 Circumvent non-repudiation in a transaction involving a remote user and
a local system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
7.2.72 System use uncovers an intrinsic software flaw in a critical system com-
ponent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
7.2.73 Accidental release of cryptographic assets due to TSF flaw or malfunction 175
7.2.74 User smuggles data using removable media . . . . . . . . . . . . . . . . 176
7.2.75 Steganographic data smuggling . . . . . . . . . . . . . . . . . . . . . . 176
7.2.76 User collects data by browsing . . . . . . . . . . . . . . . . . . . . . . 177
7.2.77 User collects authentication data by deception . . . . . . . . . . . . . . 177
7.2.78 User collects data by deduction . . . . . . . . . . . . . . . . . . . . . . 178
7.2.79 User collects data by eavesdropping . . . . . . . . . . . . . . . . . . . 178
7.2.80 User collects residual data . . . . . . . . . . . . . . . . . . . . . . . . . 178
7.2.81 User’s unauthorized use causes overload of communication resources . . 178
7.2.82 Denial of service due to exhausted audit storage . . . . . . . . . . . . . 179
7.2.83 Falsification of information quality in data export . . . . . . . . . . . . 179
7.2.84 Under-classification of data sensitivity on export . . . . . . . . . . . . . 180
7.2.85 Accidental release of cryptographic assets due to user error . . . . . . . 180
7.2.86 Confidentiality violation of export control policy . . . . . . . . . . . . . 180
7.2.87 User error deletes data . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
7.2.88 User error modifying attributes availability . . . . . . . . . . . . . . . . 181
7.2.89 Failure to provide object security attributes in data export . . . . . . . . 181
7.2.90 Incorrectly set object attributes . . . . . . . . . . . . . . . . . . . . . . 181
7.2.91 User error setting attributes availability . . . . . . . . . . . . . . . . . . 181
7.2.92 User modifies audit trail . . . . . . . . . . . . . . . . . . . . . . . . . . 182
7.2.93 User improperly modifies authentication data . . . . . . . . . . . . . . . 182
7.2.94 User improperly modifies user data . . . . . . . . . . . . . . . . . . . . 182
7.2.95 User improperly modifies TSF data . . . . . . . . . . . . . . . . . . . . 183
7.2.96 User obstructs legitimate use of resources. . . . . . . . . . . . . . . . . 184
7.2.97 User’s unauthorized actions over-task the system causing processor over-
load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
7.2.98 User sends data violating confidentiality . . . . . . . . . . . . . . . . . 184
7.2.99 User sends data violating integrity . . . . . . . . . . . . . . . . . . . . 185
7.2.100 User’s unauthorized actions cause storage overload . . . . . . . . . . . . 185
7.3 Detailed Policy Statements - General Policy Statement Mapping . . . . . . . . . 186
7.3.1 Individual accountability . . . . . . . . . . . . . . . . . . . . . . . . . 186
7.3.2 Notification of threats and vulnerabilities . . . . . . . . . . . . . . . . . 186
7.3.3 Authorized use of information . . . . . . . . . . . . . . . . . . . . . . 186
7.3.4 Installation and usage guidance . . . . . . . . . . . . . . . . . . . . . . 187
7.3.5 System lifecycle phases integrate security . . . . . . . . . . . . . . . . 187
7.3.6 Information marking . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
7.3.7 Semiformally designed, tested and reviewed . . . . . . . . . . . . . . . 187
7.3.8 Information availability . . . . . . . . . . . . . . . . . . . . . . . . . . 188
7.3.9 Information access control . . . . . . . . . . . . . . . . . . . . . . . . 189
7.3.10 Information content integrity . . . . . . . . . . . . . . . . . . . . . . . 190
7.3.11 Physical protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
7.4 Detailed Policy Statements - Security Objective Mapping . . . . . . . . . . . . 191
7.4.1 Changes to security data by authorized personnel . . . . . . . . . . . . . 191
7.4.2 Configuration Management . . . . . . . . . . . . . . . . . . . . . . . . 191
7.4.3 Delivery and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . 192
7.4.4 Product Development . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
7.4.5 Guidance documents . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
7.4.6 Lifecycle support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
xiv CONTENTS
7.4.7 Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
7.4.8 Vulnerability Assesment . . . . . . . . . . . . . . . . . . . . . . . . . 193
7.4.9 Individual accountability . . . . . . . . . . . . . . . . . . . . . . . . . 193
7.4.10 Audit data generation with identity . . . . . . . . . . . . . . . . . . . . 193
7.4.11 Protected audit data storage . . . . . . . . . . . . . . . . . . . . . . . . 193
7.4.12 Notification of threats and vulnerabilities . . . . . . . . . . . . . . . . . 194
7.4.13 Notification of data content changes . . . . . . . . . . . . . . . . . . . 194
7.4.14 Implement operational configuration management . . . . . . . . . . . . 194
7.4.15 Documented recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
7.4.16 Labeling data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
7.4.17 User identification and authentication . . . . . . . . . . . . . . . . . . . 194
7.4.18 Strong integrity mechanisms . . . . . . . . . . . . . . . . . . . . . . . 194
7.4.19 Operational integrity system function testing . . . . . . . . . . . . . . . 195
7.4.20 Security throughout lifecycle . . . . . . . . . . . . . . . . . . . . . . . 195
7.4.21 Privileged user access . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
7.4.22 Privileged user documentation . . . . . . . . . . . . . . . . . . . . . . 195
7.4.23 User screen locking . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
7.4.24 Assurance of effective storage integrity . . . . . . . . . . . . . . . . . . 195
7.4.25 System access banners . . . . . . . . . . . . . . . . . . . . . . . . . . 195
7.4.26 Validation of security function integrity . . . . . . . . . . . . . . . . . . 196
7.4.27 System backup procedures . . . . . . . . . . . . . . . . . . . . . . . . 196
7.4.28 Restoration with minimal loss . . . . . . . . . . . . . . . . . . . . . . . 196
7.4.29 Effective backup restoration . . . . . . . . . . . . . . . . . . . . . . . . 196
7.4.30 Protection from security function modification . . . . . . . . . . . . . . 196
7.4.31 Trusted system recovery . . . . . . . . . . . . . . . . . . . . . . . . . . 196
7.4.32 Encryption of transmitted user data . . . . . . . . . . . . . . . . . . . . 196
7.4.33 Protection of stored user data . . . . . . . . . . . . . . . . . . . . . . . 197
7.4.34 Protection of transmitted user data . . . . . . . . . . . . . . . . . . . . 197
7.4.35 Discretionary access control . . . . . . . . . . . . . . . . . . . . . . . . 197
7.4.36 General user documentation . . . . . . . . . . . . . . . . . . . . . . . . 197
7.4.37 Malicious code prevention . . . . . . . . . . . . . . . . . . . . . . . . 197
7.4.38 Backup protection and restoration . . . . . . . . . . . . . . . . . . . . . 197
7.4.39 Enhanced user identification and authentication . . . . . . . . . . . . . 198
7.4.40 Non-repudiation capabilities . . . . . . . . . . . . . . . . . . . . . . . 198
7.4.41 Physical tampering detection and notification . . . . . . . . . . . . . . . 198
7.5 Security Objectives - Security Requirements Rationale . . . . . . . . . . . . . . 198
7.5.1 Limitation of administrative access control . . . . . . . . . . . . . . . . 198
7.5.2 Object security attributes and exportation . . . . . . . . . . . . . . . . . 198
7.5.3 Access history for user session . . . . . . . . . . . . . . . . . . . . . . 199
7.5.4 Limit an administrator’s ability to modify user-subject bindings . . . . . 199
7.5.5 Limit administrator’s modification of user attributes . . . . . . . . . . . 199
7.5.6 Administrative validation of executables . . . . . . . . . . . . . . . . . 199
7.5.7 Software validation for absence of steganography . . . . . . . . . . . . 199
7.5.8 Administrator guidance documentation . . . . . . . . . . . . . . . . . . 200
7.5.9 Apply patches to fix the code . . . . . . . . . . . . . . . . . . . . . . . 200
7.5.10 CM automation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
7.5.11 CM capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
7.5.12 CM scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
7.5.13 Delivery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
7.5.14 Installation, generation and start-up . . . . . . . . . . . . . . . . . . . . 200
7.5.15 Functional specification . . . . . . . . . . . . . . . . . . . . . . . . . . 200
7.5.16 High-level design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
7.5.17 Implementation representation . . . . . . . . . . . . . . . . . . . . . . 201
7.5.18 TSF internals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
CONTENTS xv
7.5.19 Low-level design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
7.5.20 Representation correspondence . . . . . . . . . . . . . . . . . . . . . . 201
7.5.21 Security policy modeling . . . . . . . . . . . . . . . . . . . . . . . . . 201
7.5.22 Administrator guidance . . . . . . . . . . . . . . . . . . . . . . . . . . 201
7.5.23 User guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
7.5.24 Development security . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
7.5.25 Flaw remediation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
7.5.26 Life cycle definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
7.5.27 Tools and techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
7.5.28 Coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
7.5.29 Depth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
7.5.30 Functional tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
7.5.31 Independent testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
7.5.32 Covert channel analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 203
7.5.33 Misuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
7.5.34 Strength of TOE security functions . . . . . . . . . . . . . . . . . . . . 203
7.5.35 Vulnerability analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
7.5.36 Complete security functions or recover to previous state . . . . . . . . . 203
7.5.37 Audit changes of system entry parameters . . . . . . . . . . . . . . . . 203
7.5.38 Auditing for user accountability . . . . . . . . . . . . . . . . . . . . . . 203
7.5.39 Audit-administration role duties . . . . . . . . . . . . . . . . . . . . . . 204
7.5.40 Audit system access to deter misuse . . . . . . . . . . . . . . . . . . . 204
7.5.41 Individual accountability . . . . . . . . . . . . . . . . . . . . . . . . . 204
7.5.42 Audit records with identity . . . . . . . . . . . . . . . . . . . . . . . . 204
7.5.43 Respond to possible loss of stored audit records . . . . . . . . . . . . . 204
7.5.44 Protect stored audit records . . . . . . . . . . . . . . . . . . . . . . . . 204
7.5.45 User notification of data content changes . . . . . . . . . . . . . . . . . 205
7.5.46 Code signing and verification . . . . . . . . . . . . . . . . . . . . . . . 205
7.5.47 Trusted channel to remote trusted system . . . . . . . . . . . . . . . . . 205
7.5.48 Implement operational configuration management . . . . . . . . . . . . 205
7.5.49 Verify correct operation as designed . . . . . . . . . . . . . . . . . . . 205
7.5.50 Cryptographic access control policy . . . . . . . . . . . . . . . . . . . 205
7.5.51 Encrypted communications channel . . . . . . . . . . . . . . . . . . . . 205
7.5.52 Separation of cryptographic data . . . . . . . . . . . . . . . . . . . . . 206
7.5.53 Cryptographic Design and Implementation . . . . . . . . . . . . . . . . 206
7.5.54 Cryptographic import, export, and inter-TSF transfer . . . . . . . . . . . 206
7.5.55 Cryptographic Key Management . . . . . . . . . . . . . . . . . . . . . 206
7.5.56 Management of cryptographic roles . . . . . . . . . . . . . . . . . . . . 207
7.5.57 Cryptographic Modular Design . . . . . . . . . . . . . . . . . . . . . . 207
7.5.58 Cryptographic function definition . . . . . . . . . . . . . . . . . . . . . 207
7.5.59 Cryptographic self test . . . . . . . . . . . . . . . . . . . . . . . . . . 207
7.5.60 Test cryptographic functionality . . . . . . . . . . . . . . . . . . . . . . 208
7.5.61 Enforce data exchange confidentiality . . . . . . . . . . . . . . . . . . . 208
7.5.62 Control user data exportation . . . . . . . . . . . . . . . . . . . . . . . 208
7.5.63 Data import/export to/from system control . . . . . . . . . . . . . . . . 208
7.5.64 Sanitize data objects containing hidden or unused data . . . . . . . . . . 208
7.5.65 Label or mark information for external systems . . . . . . . . . . . . . . 208
7.5.66 Preservation of secure state for failures in critical components . . . . . . 209
7.5.67 Periodically check integrity . . . . . . . . . . . . . . . . . . . . . . . . 209
7.5.68 Guarantee the availability of audit storage space . . . . . . . . . . . . . 209
7.5.69 Limit sessions to outside users . . . . . . . . . . . . . . . . . . . . . . 209
7.5.70 Control hacker communication traffic . . . . . . . . . . . . . . . . . . . 209
7.5.71 Identify and authenticate a user to support accountability . . . . . . . . . 209
7.5.72 Transaction identification and authentication . . . . . . . . . . . . . . . 210
xvi CONTENTS
7.5.73 Identify and authenticate each user . . . . . . . . . . . . . . . . . . . . 210
7.5.74 User-action identification and authentication . . . . . . . . . . . . . . . 210
7.5.75 Identify unusual user activity . . . . . . . . . . . . . . . . . . . . . . . 210
7.5.76 System enforced information flow . . . . . . . . . . . . . . . . . . . . 210
7.5.77 Provide information flow control administration . . . . . . . . . . . . . 211
7.5.78 Require inspection for absence of malicious code. . . . . . . . . . . . . 211
7.5.79 Data marking integrity export . . . . . . . . . . . . . . . . . . . . . . . 211
7.5.80 Integrity of system data transferred externally . . . . . . . . . . . . . . 211
7.5.81 Integrity of system data transferred internally . . . . . . . . . . . . . . . 211
7.5.82 Protect user data during internal transfer . . . . . . . . . . . . . . . . . 211
7.5.83 Correct attribute exchange with another trusted product . . . . . . . . . 211
7.5.84 Integrity protection for user data and software . . . . . . . . . . . . . . 212
7.5.85 Integrity of system data replication . . . . . . . . . . . . . . . . . . . . 212
7.5.86 Operational integrity system function testing . . . . . . . . . . . . . . . 212
7.5.87 Isolate untrusted executables . . . . . . . . . . . . . . . . . . . . . . . 212
7.5.88 Lifecycle security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
7.5.89 Restrict actions before authentication . . . . . . . . . . . . . . . . . . . 212
7.5.90 Limit the number of user initiated communication sessions . . . . . . . . 213
7.5.91 Limit multiple sessions . . . . . . . . . . . . . . . . . . . . . . . . . . 213
7.5.92 Maintain security domain . . . . . . . . . . . . . . . . . . . . . . . . . 213
7.5.93 Controlled access by maintenance personnel . . . . . . . . . . . . . . . 213
7.5.94 Expiration of maintenance privileges . . . . . . . . . . . . . . . . . . . 213
7.5.95 Manage resource security attributes . . . . . . . . . . . . . . . . . . . . 213
7.5.96 Manage security-critical data to avoid storage space being exceeded . . . 213
7.5.97 Eliminate residual information . . . . . . . . . . . . . . . . . . . . . . 214
7.5.98 Non-repudiation support for sent information by the nonlocal receiving
TSF. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
7.5.99 Non-repudiation support for sent information by the sender’s TSF. . . . . 214
7.5.100 Non-repudiation for sent information, local users . . . . . . . . . . . . . 214
7.5.101 Non-repudiation for sent information . . . . . . . . . . . . . . . . . . . 214
7.5.102 Basic object attribute integrity . . . . . . . . . . . . . . . . . . . . . . 215
7.5.103 Object domain protection . . . . . . . . . . . . . . . . . . . . . . . . . 215
7.5.104 Provide priority of service . . . . . . . . . . . . . . . . . . . . . . . . . 215
7.5.105 Privileged-interface status . . . . . . . . . . . . . . . . . . . . . . . . . 215
7.5.106 Identify message modification in messages received . . . . . . . . . . . 215
7.5.107 Recovery from modification of received messages . . . . . . . . . . . . 215
7.5.108 Provide reference monitor . . . . . . . . . . . . . . . . . . . . . . . . . 215
7.5.109 Disable remote execution . . . . . . . . . . . . . . . . . . . . . . . . . 216
7.5.110 Resource quotas for users and services . . . . . . . . . . . . . . . . . . 216
7.5.111 User screen locking . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
7.5.112 Security-relevant configuration management . . . . . . . . . . . . . . . 216
7.5.113 Protect and maintain secure system state . . . . . . . . . . . . . . . . . 216
7.5.114 Manage security attributes . . . . . . . . . . . . . . . . . . . . . . . . 216
7.5.115 Manage security-critical data . . . . . . . . . . . . . . . . . . . . . . . 217
7.5.116 Manage behavior of security functions . . . . . . . . . . . . . . . . . . 217
7.5.117 Security roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
7.5.118 System terminates session for inactivity . . . . . . . . . . . . . . . . . 217
7.5.119 Identify message modification in messages sent . . . . . . . . . . . . . 217
7.5.120 Support recovery from modification of sent messages . . . . . . . . . . 217
7.5.121 Examine the source code for developer flaws . . . . . . . . . . . . . . . 217
7.5.122 Storage integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
7.5.123 System access banners . . . . . . . . . . . . . . . . . . . . . . . . . . 218
7.5.124 Validation of security function . . . . . . . . . . . . . . . . . . . . . . 218
7.5.125 System backup procedures . . . . . . . . . . . . . . . . . . . . . . . . 218
CONTENTS xvii
7.5.126 Frequent backups to prevent minimal loss . . . . . . . . . . . . . . . . 218
7.5.127 Sufficient backup storage and effective restoration . . . . . . . . . . . . 218
7.5.128 Protection of system security function . . . . . . . . . . . . . . . . . . 218
7.5.129 Limit administrator’s modification of security-critical code or data . . . . 219
7.5.130 Local detection of received security-critical data modified in transit . . . 219
7.5.131 Remote detection of received security-critical data modified in transit . . 219
7.5.132 Local detection of sent security-critical data modified in transit . . . . . 219
7.5.133 Remote detection of sent security-critical data modified in transit. . . . . 219
7.5.134 Trusted distributed system recovery . . . . . . . . . . . . . . . . . . . . 219
7.5.135 Provide a trusted path . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
7.5.136 Trusted path and channel . . . . . . . . . . . . . . . . . . . . . . . . . 220
7.5.137 Trusted recovery of security functionality . . . . . . . . . . . . . . . . . 220
7.5.138 Documentation of untrusted data recovery . . . . . . . . . . . . . . . . 220
7.5.139 Maintain user attributes . . . . . . . . . . . . . . . . . . . . . . . . . . 220
7.5.140 User authorization management . . . . . . . . . . . . . . . . . . . . . . 220
7.5.141 Basic confidentiality-breach prevention . . . . . . . . . . . . . . . . . . 220
7.5.142 Protection of user-session data . . . . . . . . . . . . . . . . . . . . . . 221
7.5.143 Integrity protection of stored user data . . . . . . . . . . . . . . . . . . 221
7.5.144 Protection of transmitted user data . . . . . . . . . . . . . . . . . . . . 221
7.5.145 User-defined access control . . . . . . . . . . . . . . . . . . . . . . . . 221
7.5.146 User guidance documentation . . . . . . . . . . . . . . . . . . . . . . . 221
7.6 Security Requirements Dependency Analysis . . . . . . . . . . . . . . . . . . . 221
7.6.1 ACM_AUT.2 - Complete CM automation . . . . . . . . . . . . . . . . 221
7.6.2 ACM_CAP.4 - Generation support and acceptance procedures . . . . . . 222
7.6.3 ACM_SCP.3 - Development tools CM coverage . . . . . . . . . . . . . 222
7.6.4 ADO_DEL.2 - Detection of modification . . . . . . . . . . . . . . . . . 222
7.6.5 ADO_IGS.1 - Installation, generation, and start-up procedures . . . . . . 222
7.6.6 ADV_FSP.3 - Semiformal functional specification . . . . . . . . . . . . 222
7.6.7 ADV_HLD.3 - Semiformal high-level design . . . . . . . . . . . . . . . 222
7.6.8 ADV_IMP.3 - Structured implementation of the TSF . . . . . . . . . . . 222
7.6.9 ADV_INT.3 - Minimisation of complexity . . . . . . . . . . . . . . . . 222
7.6.10 ADV_LLD.1 - Descriptive low-level design . . . . . . . . . . . . . . . 223
7.6.11 ADV_RCR.2 - Semiformal correspondence demonstration . . . . . . . . 223
7.6.12 ADV_SPM.2 - Semiformal TOE security policy model . . . . . . . . . . 223
7.6.13 AGD_ADM.1 - Administrator guidance . . . . . . . . . . . . . . . . . 223
7.6.14 AGD_USR.1 - User guidance . . . . . . . . . . . . . . . . . . . . . . . 223
7.6.15 ALC_DVS.2 - Sufficiency of security measures . . . . . . . . . . . . . 223
7.6.16 ALC_FLR.3 - Systematic flaw remediation . . . . . . . . . . . . . . . . 223
7.6.17 ALC_LCD.3 - Measurable life-cycle model . . . . . . . . . . . . . . . 223
7.6.18 ALC_TAT.2 - Compliance with implementation standards . . . . . . . . 223
7.6.19 ATE_COV.2 - Analysis of coverage . . . . . . . . . . . . . . . . . . . . 223
7.6.20 ATE_DPT.3 - Testing: implementation representation . . . . . . . . . . 224
7.6.21 ATE_FUN.2 - Ordered functional testing . . . . . . . . . . . . . . . . . 224
7.6.22 ATE_IND.2 - Independent testing - sample . . . . . . . . . . . . . . . . 224
7.6.23 AVA_CCA.1 - Covert channel analysis . . . . . . . . . . . . . . . . . . 224
7.6.24 AVA_MSU.2 - Validation of analysis . . . . . . . . . . . . . . . . . . . 224
7.6.25 AVA_SOF.1 - Strength of TOE security function evaluation . . . . . . . 224
7.6.26 AVA_VLA.2 - Independent vulnerability analysis . . . . . . . . . . . . 225
7.6.27 FAU_GEN.1 - Audit data generation . . . . . . . . . . . . . . . . . . . 225
7.6.28 FAU_GEN.2 - User identity association . . . . . . . . . . . . . . . . . . 225
7.6.29 FAU_SAR.1 - Audit review . . . . . . . . . . . . . . . . . . . . . . . . 225
7.6.30 FAU_SAR.3 - Selectable audit review . . . . . . . . . . . . . . . . . . 225
7.6.31 FAU_SEL.1 - Selective audit . . . . . . . . . . . . . . . . . . . . . . . 225
7.6.32 FAU_STG.2 - Guarantees of audit data availability . . . . . . . . . . . . 225
xviii CONTENTS
7.6.33 FAU_STG.4 - Prevention of audit data loss . . . . . . . . . . . . . . . . 225
7.6.34 FCO_NRO.2 - Enforced proof of origin . . . . . . . . . . . . . . . . . . 226
7.6.35 FCS_CKM.1 - Cryptographic key generation . . . . . . . . . . . . . . . 226
7.6.36 FCS_CKM.2 - Cryptographic key distribution . . . . . . . . . . . . . . 226
7.6.37 FCS_CKM.3 - Cryptographic key access . . . . . . . . . . . . . . . . . 226
7.6.38 FCS_CKM.4 - Cryptographic key destruction . . . . . . . . . . . . . . 226
7.6.39 FCS_COP.1 - Cryptographic operation . . . . . . . . . . . . . . . . . . 226
7.6.40 FDP_ACC.2 - Complete access control . . . . . . . . . . . . . . . . . . 226
7.6.41 FDP_ACF.1 - Security attribute based access control . . . . . . . . . . . 227
7.6.42 FDP_DAU.2 - Data authentication with identity of guarantor . . . . . . . 227
7.6.43 FDP_ETC.1 - Export of user data without security attributes . . . . . . . 227
7.6.44 FDP_ETC.2 - Export of user data with security attributes . . . . . . . . 227
7.6.45 FDP_IFC.1 - Subset information flow control . . . . . . . . . . . . . . . 227
7.6.46 FDP_IFF.1 - Simple security attributes . . . . . . . . . . . . . . . . . . 227
7.6.47 FDP_IFF.3 - Limited illicit information flows . . . . . . . . . . . . . . . 227
7.6.48 FDP_ITC.1 - Import of user data without security attributes . . . . . . . 227
7.6.49 FDP_ITC.2 - Import of user data with security attributes . . . . . . . . . 228
7.6.50 FDP_ITT.2 - Transmission separation by attribute . . . . . . . . . . . . 228
7.6.51 FDP_RIP.2 - Full residual information protection . . . . . . . . . . . . . 228
7.6.52 FDP_SDI.2 - Stored data integrity monitoring and action . . . . . . . . . 228
7.6.53 FDP_UIT.1 - Data exchange integrity . . . . . . . . . . . . . . . . . . . 228
7.6.54 FDP_UIT.3 - Destination data exchange recovery . . . . . . . . . . . . 228
7.6.55 FIA_AFL.1 - Authentication failure handling . . . . . . . . . . . . . . . 228
7.6.56 FIA_ATD.1 - User attribute definition . . . . . . . . . . . . . . . . . . 228
7.6.57 FIA_SOS.1 - Verification of secrets . . . . . . . . . . . . . . . . . . . . 228
7.6.58 FIA_SOS.2 - TSF Generation of secrets . . . . . . . . . . . . . . . . . 229
7.6.59 FIA_UAU.2 - User authentication before any action . . . . . . . . . . . 229
7.6.60 FIA_UAU.6 - Re-authenticating . . . . . . . . . . . . . . . . . . . . . 229
7.6.61 FIA_UAU.7 - Protected authentication feedback . . . . . . . . . . . . . 229
7.6.62 FIA_UID.2 - User identification before any action . . . . . . . . . . . . 229
7.6.63 FIA_USB.1 - User-subject binding . . . . . . . . . . . . . . . . . . . . 229
7.6.64 FMT_MOF.1 - Management of security functions behaviour . . . . . . . 229
7.6.65 FMT_MSA.1 - Management of security attributes . . . . . . . . . . . . 229
7.6.66 FMT_MSA.2 - Secure security attributes . . . . . . . . . . . . . . . . . 229
7.6.67 FMT_MSA.3 - Static attribute initialisation . . . . . . . . . . . . . . . . 230
7.6.68 FMT_MTD.1 - Management of TSF data . . . . . . . . . . . . . . . . . 230
7.6.69 FMT_MTD.2 - Management of limits on TSF data . . . . . . . . . . . . 230
7.6.70 FMT_MTD.3 - Secure TSF data . . . . . . . . . . . . . . . . . . . . . 230
7.6.71 FMT_REV.1 - Revocation . . . . . . . . . . . . . . . . . . . . . . . . . 230
7.6.72 FMT_SAE.1 - Time-limited authorisation . . . . . . . . . . . . . . . . 230
7.6.73 FMT_SMR.2 - Restrictions on security roles . . . . . . . . . . . . . . . 230
7.6.74 FPT_AMT.1 - Abstract machine testing . . . . . . . . . . . . . . . . . . 230
7.6.75 FPT_FLS.1 - Failure with preservation of secure state . . . . . . . . . . 230
7.6.76 FPT_ITI.1 - Inter-TSF detection of modification . . . . . . . . . . . . . 230
7.6.77 FPT_ITT.1 - Basic internal TSF data transfer protection . . . . . . . . . 231
7.6.78 FPT_RCV.1 - Manual recovery . . . . . . . . . . . . . . . . . . . . . . 231
7.6.79 FPT_RCV.4 - Function recovery . . . . . . . . . . . . . . . . . . . . . 231
7.6.80 FPT_RVM.1 - Non-bypassability of the TSP . . . . . . . . . . . . . . . 231
7.6.81 FPT_SEP.3 - Complete reference monitor . . . . . . . . . . . . . . . . 231
7.6.82 FPT_SSP.2 - Mutual trusted acknowledgement . . . . . . . . . . . . . . 231
7.6.83 FPT_STM.1 - Reliable time stamps . . . . . . . . . . . . . . . . . . . . 231
7.6.84 FPT_TDC.1 - Inter-TSF basic TSF data consistency . . . . . . . . . . . 231
7.6.85 FPT_TRC.1 - Internal TSF consistency . . . . . . . . . . . . . . . . . . 231
7.6.86 FPT_TST.1 - TSF testing . . . . . . . . . . . . . . . . . . . . . . . . . 231
CONTENTS xix
7.6.87 FRU_PRS.2 - Full priority of service . . . . . . . . . . . . . . . . . . . 231
7.6.88 FRU_RSA.2 - Minimum and maximum quotas . . . . . . . . . . . . . . 232
7.6.89 FTA_MCS.2 - Per user attribute limitation on multiple concurrent sessions232
7.6.90 FTA_SSL.1 - TSF-initiated session locking . . . . . . . . . . . . . . . . 232
7.6.91 FTA_SSL.2 - User-initiated locking . . . . . . . . . . . . . . . . . . . . 232
7.6.92 FTA_SSL.3 - TSF-initiated termination . . . . . . . . . . . . . . . . . . 232
7.6.93 FTA_TAB.1 - Default TOE access banners . . . . . . . . . . . . . . . . 232
7.6.94 FTA_TAH.1 - TOE access history . . . . . . . . . . . . . . . . . . . . . 232
7.6.95 FTA_TSE.1 - TOE session establishment . . . . . . . . . . . . . . . . . 232
7.6.96 FTP_ITC.1 - Inter-TSF trusted channel . . . . . . . . . . . . . . . . . . 232
7.6.97 FTP_TRP.1 - Trusted path . . . . . . . . . . . . . . . . . . . . . . . . . 232
xx CONTENTS
List of Figures
7.1 Concepts and relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
xxi
xxii LIST OF FIGURES
List of Tables
5.1 Required intervals for length of runs test . . . . . . . . . . . . . . . . . . . . . 108
5.2 EAL level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
6.1 FIPS 140-2 mapping to PP requirements. . . . . . . . . . . . . . . . . . . . . . 134
xxiii
xxiv LIST OF TABLES
Bibliography
[Bor44] J.L. Borges. Ficciones, La biblioteca de Babel. 1944.
[DW97] Georgia DARPA Workshop, Savannah, editor. Update: CERT/CC Vulnerability
Knowledgebase, 1997.
[fip] FIPS 140-2 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES.
[How97] J. D. Howard. An Analysis of Security Incidents on the Internet:1989-1995. PhD
thesis, Carnegie Mellon University, 1997.
[Krs98] I.V. Krsul. Software Vulnerability Analysis. PhD thesis, Purdue University, 1998.
[Nat00] National Institute of Standards and Technology. A Proposed Standard for Role-
Based Access Control, December 2000.
[NSA00] NSA, The Mitre Corporation, Mitretek Systems and Sparta, Inc. The Common
Criteria Profiling Knowledge Base, 1.0i edition, March 2000.
[ottNCSC89] Proceedings of the 12th National Computer Security Conference, editor. A Survey
of Computer Abuse Techniques, 1989.
[Pow96] R. Power. Current and future danger: A csi primer of computer crime and infor-
mation warfare. CSI Bulletin, 1996.
[PW84] T. Perry and P. Wallich. Can computer crime be stopped? IEEE Spectrum, 5(21),
1984.
[the99a] the Common Criteria Project Sponsoring Organisations. Common Criteria for
Information Technology Security Evaluation, 2.1 final edition, August 1999.
[the99b] the Common Criteria Project Sponsoring Organisations. Common Criteria for
Information Technology Security Evaluation Part 1: Introduction and general
model, 2.1 final edition, August 1999.
[the99c] the Common Criteria Project Sponsoring Organisations. Common Criteria for
Information Technology Security Evaluation Part 2: Security functional require-
ments, 2.1 final edition, August 1999.
[the99d] the Common Criteria Project Sponsoring Organisations. Common Criteria for
Information Technology Security Evaluation Part 3: Security assurance require-
ments, 2.1 final edition, August 1999.
xxv
xxvi BIBLIOGRAPHY
Revision History
Detailed changes between versions of this document can be analyzed by consulting the RCS file,
http://www.safelayer.com/download/pkipp/9.PPDocuments/PSKPP.tex,v
PSKPP.tex,v
Revision 1.1 2002/04/04 16:44:34 bagnonm
Removed orphan security objective Robust_Encryption
Corrected iff formula
Minor editorial english corrections
xxvii
xxviii REVISION HISTORY
Acronyms and prefixes
The following prefixes are used to mark concept categories:
AT Assumption regarding threats
AP Assumption regarding security policy statements
T Threat
DA Detailed Attack
GP General Security Policy Statement
DP Detailed Security Policy Statement
O Security Objective
The following acronyms are used in the document text:
CSP Critical security parameter
EDC Error Detection Code
IP Internet Protocol
PP Protection Profile
RNG Random Number Generator
ST Security Target
TOE Target of Evaluation
TSC TSF Scope of Control
TSF TOE Security Functions
PKI Public Key Infrastructure
PSK PKI Secure Kernel
xxix
xxx ACRONYMS AND PREFIXES
Chapter 1
INTRODUCTION
1.1 Identification
Title “The PKI Secure Kernel Protection Profile”
Reference PSK PP, Version “1.1 evaluated”
Author The “PKI PP working group”
1.2 Overview
A number of approaches have been taken to provide PP coverage to the PKI concept and ar-
chitecture. This PP is the core specification for a family of PPs that address a complex and
distributed PKI with advanced security needs.
This document is not concerned with elements of a PKI but with an agreed rationale of how
the fundamental PKI assets should be securely handled, in particular the Public Key elements
and their operation. This is defined for the rest of the document as the “PKI Secure Kernel”.
Note that this PP tries not to include any semantic or purpose to the usual Public Key func-
tionality, since that is intended to be defined by the PKI Application Specific PPs that form the
rest of this PP family.
It is expected that new architectural elements will be defined, including uses of Public Key
concepts that are not yet known.
A PP for these new concepts can be easily produced by claiming compliance of this PP
for the core security services and focusing the architectural element PP in its application-level
specifics.
It is expected that STs that claim compliance with this PP family claim compliance, as a
minimum, with this PSK PP, and then with as many application-specific PPs as it may implement.
An effort has been made to cover a wide spectrum of threats and policies in the TOE en-
vironment. As a result, the derived security requirements form a very secure baseline, possibly
applicable to most complex scenarios.
The environmental analysis and derived threat analysis and general policy statements have
been done within the domain of knowledge defined in [NSA00], that also guides the derivation
of allocated detailed attacks, detailed policy statements and security objectives and functional
and assurance security requirements. The original [NSA00] has been refined to correct some
minor details, and a supporting tool has been used to help in the construction of this document.
This Protection Profile fully complies with [the99a], being both [the99c] and [the99d]
compliant. It also collects fundamental requirements from [fip], that have been used to instanti-
ate general requirements whose applicability has been mandated by [NSA00], aiming to comply
with FIPS 140-2 level 4.
1
2 CHAPTER 1. INTRODUCTION
No hardware security requirements are incorporated into this PP. Implementers shall decide,
on designing their TOEs, the actual hardware protection that they require. At least, they must
comply with the stated assumptions, most of them related to hardware issues.
Chapter 2
TOE DESCRIPTION
The TOE, the so called “PKI secure Kernel” is centered around application or purpose indepen-
dent uses of asymmetric cryptography. An initial set of functions is allocated to the PSK:
1. Key generation.
2. Key filing.
3. Key export.
4. Key import, including certificates.
5. Asymmetric cryptography functionality:
(a) Encryption and verification
(b) Decryption and signing
Since this PP is about a protecting layer over this basic usage of cryptographic , the TOE is
completely defined by including under its description all the emanating security requirements in
Chapter 5.
Actual TOEs claiming compliance of this document may have many possible implementa-
tion or design solutions. It may be an integral part of a general application that requires asym-
metric cryptography, or it may be an advanced token. It could also be a general dynamically
loadable library, and any form is fit for compliance as long as all the requirements and assump-
tions contained in this PP are met.
3
4 CHAPTER 2. TOE DESCRIPTION
Chapter 3
TOE SECURITY
ENVIRONMENT
The complete picture at Fig.7.1 shows that to counter with threats and to comply with security
policies, security objectives must be met by the TOE.
In some cases, the TOE is able to meet the whole set of security objectives that are required
to fully mitigate a complete set of detailed attacks, also known as a threat. In other cases, the
TOE, with the set of security functional requirements mandated by this Protection Profile, fails
in fulfilling a security objective, and in turn, its associated detailed attacks or security policies.
This chapter about the TOE Security Environment details those security objectives that must
be fulfilled by the operational environment, either by procedural or organizational measures, or
by additional technical security features.
How this should be done is outside the scope of this document, but it must be clear the set
of security objectives not covered by the TOE and the consequences if these are not fulfilled by
other means.
By meeting these security objectives, those detailed attacks or security policies not covered
by the TOE are fulfilled, and the associated risk can be considered to be mitigated.
Some threats and general security policies are covered by a mixture of TOE and environment
responsibilities. This is the case when the TOE is able to counter some of the detailed attacks that
define a threat, but not all of them. In this case, the threat or policy is included in this chapter,
but only with respect to those unfulfilled security objectives by the TOE.
3.1 Assumptions regarding threats
The following assumptions are considered about the TOE environment and its capability to mit-
igate the following threats.
3.1.1 Assumptions about the administrative users of the TOE
AT.Admin The following threats are countered by the TOE environment:
T.Admin_UserPriv Administrator violates user privacy policy (See 3.5.1).
In particular, the following attacks are considered:
DA.Admin_UserPriv_Agg Administrator aggregates privacy information, (See 3.6.1).
with respect to the following security objective(s):
O.Limit_ObserveRoles Limit observation of service usage to authorized users
(See 4.2.5).
5
6 CHAPTER 3. TOE SECURITY ENVIRONMENT
O.Prevent_Link Prevent linking of multiple service use (See 4.2.14).
O.Prevent_Observe Prevent observation of service use (See 4.2.15).
DA.Admin_UserPriv_Col Administrator reads collected user privacy information, (See
3.6.2). with respect to the following security objective(s):
O.Prevent_AskPrivInfo Prevent system from collecting user privacy information
(See 4.2.13).
DA.Admin_UserPriv_Gen Administrator reads system generated privacy information,
(See 3.6.3). with respect to the following security objective(s):
O.Permit_Aliases Permit users to use services under aliases (See 4.2.11).
O.Permit_Anonymity Permit users to use services anonymously (See 4.2.12).
T.Malicious_Code Malicious code exploitation (See 3.5.2).
In particular, the following attacks are considered:
DA.Mal_Code_Hack_Downld Malicious code perpetrator dissemination, (See 3.6.4).
with respect to the following security objective(s):
O.Clean_Obj_Recovery Object and data recovery free from malicious code (See
4.2.2).
DA.Mal_Code_Hack_Exe Malicious code perpetrator execution, (See 3.6.5). with re-
spect to the following security objective(s):
O.Clean_Obj_Recovery Object and data recovery free from malicious code (See
4.2.2).
DA.Mal_Code_IT_Download Malicious code accidental IT download, (See 3.6.6). with
respect to the following security objective(s):
O.Clean_Obj_Recovery Object and data recovery free from malicious code (See
4.2.2).
DA.Mal_Code_IT_Exe Malicious code IT execution, (See 3.6.7). with respect to the
following security objective(s):
O.Clean_Obj_Recovery Object and data recovery free from malicious code (See
4.2.2).
DA.Mal_Code_Usr_Downld Malicious code accidental user download, (See 3.6.8). with
respect to the following security objective(s):
O.Clean_Obj_Recovery Object and data recovery free from malicious code (See
4.2.2).
DA.Mal_Code_Usr_Exe Malicious code user execution, (See 3.6.9). with respect to the
following security objective(s):
O.Clean_Obj_Recovery Object and data recovery free from malicious code (See
4.2.2).
T.Spoofing Legitimate system services are spoofed (See 3.5.3).
In particular, the following attacks are considered:
DA.Hack_Spoof_Login Login program replicated to capture authentication data, (See
3.6.10). with respect to the following security objective(s):
O.User_Auth_Enhanced Enhanced user authentication (See 4.2.21).
3.1. ASSUMPTIONS REGARDING THREATS 7
3.1.2 Assumptions about the expected hacking threats over the TOE
AT.Hacker The following threats are countered by the TOE environment:
T.Hack_Avl_Resource Hacker attempts resource denial of service (See 3.5.4).
In particular, the following attacks are considered:
DA.Hack_Prcsr_Overload Hacker causes system task overload resulting in denial of
service, (See 3.6.11). with respect to the following security objective(s):
O.React_Discovered_Atk React to discovered attacks (See 4.2.16).
T.Hack_Comm_Eavesdrop Hacker eavesdrops on user data communications (See 3.5.5).
In particular, the following attacks are considered:
DA.Hack_CommEaves_Tap An outsider taps a communications line, (See 3.6.12). with
respect to the following security objective(s):
O.Comm_Line_Protection Physical protection of the communications line (See
4.2.3).
O.Tamper_ID Tamper detection (See 4.2.19).
O.Tamper_Resistance Tamper resistance (See 4.2.20).
T.Hack_Masq Hacker masquerading as a legitimate user or as system process (See 3.5.6).
In particular, the following attacks are considered:
DA.Hack_Masq_Wauth Masquerading due to weak authentication, (See 3.6.13). with
respect to the following security objective(s):
O.User_Auth_Enhanced Enhanced user authentication (See 4.2.21).
O.User_Auth_Multiple Require multiple authentication mechanisms (See 4.2.22).
T.Hack_Phys Exploitation of vulnerabilities in the physical environment of the system (See
3.5.7).
In particular, the following attacks are considered:
DA.Hack_Phys_Crypto Physical attack on cryptographic assets, (See 3.6.14). with re-
spect to the following security objective(s):
O.Tamper_ID Tamper detection (See 4.2.19).
O.Tamper_Resistance Tamper resistance (See 4.2.20).
DA.Hack_Phys_Damage Hacker physically attacks the system, (See 3.6.15). with re-
spect to the following security objective(s):
O.Tamper_ID Tamper detection (See 4.2.19).
O.Tamper_Resistance Tamper resistance (See 4.2.20).
T.Hack_Social_Engineer Social engineering (See 3.5.8).
In particular, the following attacks are considered:
DA.Hack_SocEng_Password Social engineering to steal password, (See 3.6.16). with
respect to the following security objective(s):
O.User_Auth_Enhanced Enhanced user authentication (See 4.2.21).
DA.Hack_SocEng_SysInfo Hacker uses social engineering to learn system information,
(See 3.6.17). with respect to the following security objective(s):
O.Audit_Unusual_User Audit unusual user activity (See 4.2.1).
8 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.1.3 Assumptions about the TOE physical environment
AT.Physical_Environment The following threat is countered by the TOE environment:
T.Component_Failure A critical system component fails (See 3.5.9).
In particular, the following attacks are considered:
DA.Hardware_Flaw System hardware fails during system operation, (See 3.6.18). with
respect to the following security objective(s):
O.Fault_Tolerance Provide fault tolerant operations for critical components (See
4.2.4).
DA.Software_Flaw System use uncovers an intrinsic software flaw in a critical system
component, (See 3.6.19). with respect to the following security objective(s):
O.Fault_Tolerance Provide fault tolerant operations for critical components (See
4.2.4).
3.1.4 Assumptions about the TOE hardware and software
AT.System_HW_SW The following threat is countered by the TOE environment:
T.Failure_DS_Comp Failure of a distributed system component (See 3.5.10).
In particular, the following attacks are considered:
DA.Failure_DS_Comm Communications function failure, (See 3.6.20). with respect to
the following security objective(s):
O.Fault_Tolerance Provide fault tolerant operations for critical components (See
4.2.4).
3.1.5 Assumptions about the TOE user behaviour
AT.User The following threats are countered by the TOE environment:
T.Repudiate_Receive Recipient denies receiving information (See 3.5.11).
In particular, the following attacks are considered:
DA.Repudiate_Rcvr_Int Denial of having received data from another local user, (See
3.6.21). with respect to the following security objective(s):
O.NonRepud_Locals_Rcvd Non-repudiation for received information, local users
(See 4.2.9).
DA.Repudiate_Rcvr_Local Denial of having received information from a remote user,
(See 3.6.22). with respect to the following security objective(s):
O.NonRepud_Assess_Recd Non-repudiation support for received information by
a nonlocal sender’s TSF (See 4.2.7).
O.NonRepud_Gen_Recd Non-repudiation support for received information by
the recipient’s TSF (See 4.2.8).
DA.Repudiate_Rcvr_Rem Denial of having received information by a remote user,
(See 3.6.23). with respect to the following security objective(s):
O.NonRepud_Assess_Recd Non-repudiation support for received information by
a nonlocal sender’s TSF (See 4.2.7).
O.NonRepud_Gen_Recd Non-repudiation support for received information by
the recipient’s TSF (See 4.2.8).
T.Repudiate_Transact A participant denies performing a transaction (See 3.5.12).
In particular, the following attacks are considered:
3.2. ASSUMPTIONS REGARDING POLICIES 9
DA.Repudiate_Trans_Loc Circumvent non-repudiation in a transaction involving a user
and a local system, (See 3.6.24). with respect to the following security objective(s):
O.NonRepud_Locals_Rcvd Non-repudiation for received information, local users
(See 4.2.9).
DA.Repudiate_Trans_Uloc Circumvent non-repudiation in a transaction involving a lo-
cal user and a remote system, (See 3.6.25). with respect to the following security
objective(s):
O.NonRepud_Assess_Recd Non-repudiation support for received information by
a nonlocal sender’s TSF (See 4.2.7).
O.NonRepud_Gen_Recd Non-repudiation support for received information by
the recipient’s TSF (See 4.2.8).
DA.Repudiate_Trans_Urem Circumvent non-repudiation in a transaction involving a
remote user and a local system, (See 3.6.26). with respect to the following security
objective(s):
O.NonRepud_Assess_Recd Non-repudiation support for received information by
a nonlocal sender’s TSF (See 4.2.7).
O.NonRepud_Gen_Recd Non-repudiation support for received information by
the recipient’s TSF (See 4.2.8).
T.User_Err_Inaccess User error makes data inaccessible (See 3.5.13).
In particular, the following attacks are considered:
DA.User_Err_Delete User error deletes data, (See 3.6.27). with respect to the following
security objective(s):
O.Rollback Rollback (See 4.2.17).
T.User_Misuse_Avl_Resc User’s misuse causes denial of service (See 3.5.14).
In particular, the following attacks are considered:
DA.User_Obst_Res_Use User obstructs legitimate use of resources., (See 3.6.28). with
respect to the following security objective(s):
O.Tamper_ID Tamper detection (See 4.2.19).
O.Tamper_Resistance Tamper resistance (See 4.2.20).
3.2 Assumptions regarding policies
The following assumptions are considered about the TOE environment and its capability to com-
ply with the Detailed Policy Statements indicated.
3.2.1 Assumptions about TOE availability
AP.Availability The following Policies are countered by the TOE environment:
DP.Malicious_Code Malicious code prevention (See 3.10.1).
In particular, the following objectives are considered:
O.Malicious_Code Procedures for preventing malicious code (See 4.2.6).
DP.Sys_Backup_Verify Backup protection and restoration (See 3.10.2).
In particular, the following objectives are considered:
O.Sys_Backup_Verify Detect modifications of backup hardware, firmware, software
(See 4.2.18).
10 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.2.2 Assumptions about TOE access control policies
AP.Information_AC The following Policies are countered by the TOE environment:
DP.User_Auth_Enhanced Enhanced user identification and authentication (See 3.10.3).
In particular, the following objectives are considered:
O.User_Auth_Enhanced Enhanced user authentication (See 4.2.21).
3.2.3 Assumptions about TOE integrity policy
AP.Integrity The following Policies are countered by the TOE environment:
DP.Non-Repudiation Non-repudiation capabilities (See 3.10.4).
In particular, the following objectives are considered:
O.NonRepudiate_Recd Non-repudiation for received information (See 4.2.10).
3.2.4 Assumptions about physical control policies
AP.Physical_Control The following Policies are countered by the TOE environment:
DP.Tamper_ID Physical tampering detection and notification (See 3.10.5).
In particular, the following objectives are considered:
O.Tamper_ID Tamper detection (See 4.2.19).
3.3 Threats addressed by the TOE
The TOE shall be able to counter the general threats that have been identified as applicable and
documented herein.
Besides each threat description, most threats and attacks are defined in terms of Threat
Agent, Method and Results, where applicable or feasible. For example, the Result of a partic-
ular Threat may vary as a function of the selected attack, and thus is not defined at Threat level,
but referred to the applicable attacks.
Each of these terms is again defined with the following attributes 1
;
Agents Threat Agents are characterized in terms of Agent Types, Authentication, Attitude, Mo-
tive, Sophistication, Localities, and Forces. The chosen classification approach was in-
fluenced by previous classification efforts due to [DW97] (access required), [PW84]
(perpetrators), and [How97] (attackers).
Agent Types Most threats are carried out, directly or indirectly, by Human threat agents,
but Other agents are possible as well, namely forces of nature. The value Any is
included as an option, meaning both Human and Other agents. Most of the other
Agent Attributes apply only to human agents.
Authentication Four possibilities are considered: None, Identified, Authenticated, and
Privileged. The Privileged value is relevant to administrators who acquire extra
privileges via the authentication mechanism.
Attitude, Motive, Sophistication These traits assess strength of attack by a Human agent.
The knowledge base entertains the possibility that some systems are so insecure
as to contain vulnerabilities that are exploited even by Well Behaved, Constructive
users who bring Zero sophistication to bear on the attacks they mount. Other highly
secure systems are designed to withstand Deliberate attacks by Hostile threat agents
with High sophistication.
1Quoted from [NSA00]
3.3. THREATS ADDRESSED BY THE TOE 11
Localities Some threat agents are physically Local to the system being attacked, while
others are Remote and operate through network connections or other electronic
interfaces. This Attribute makes sense for Any agent Type.
Forces Non-human, "Other" agents may be characterized variously as Communications,
Disaster, Emanations, Power, Unusual Conditions, or Any.
Methods Threat methods are characterized in terms of Life cycle Phases, Human Roles, Actions
performed, and Vulnerabilities and Exposures exploited.
Life cycle Phases Attacks may be mounted at Any Time, i.e., during Development, dur-
ing Operation, or upon Disposal.
Human Role Only users who have been assigned System Duties can mount some at-
tacks. Others are available to any Service User. Still others are available even to
those who have been assigned No Duties at all.
Action This Attribute is unconstrained. Actions performed during an attack tend to be
closely aligned with expected results. For Attacks on Security Protection Mech-
anisms, actions may involve masquerade, subversion, corruption, or trespass. At-
tacks on Information Integrity may involve Falsification and Error Propagation. At-
tacks against confidentiality may involve exposure (deliberate disclosure, scaveng-
ing), aggregation or inference (cryptographic browsing, query analysis, traffic anal-
ysis), interception (eavesdropping, wiretapping, emanations analysis, simple theft),
or intrusion (cryptanalysis, reverse engineering, covert channel usage, trespass).
Attacks on the Availability of information or services may involve incapacitation,
obstruction (interference, exploitation, resource exhaustion), or theft of service. Ac-
tions may also be characterized by degree of interference with the attacked system:
physical attack, logical intervention, or just observation. For additional approaches
to characterizing threat actions, see [Pow96], [Krs98].
Vulnerabilities This Attribute is also unconstrained. It is intended to be fairly broad, in-
cluding vulnerabilities in both the TOE and its environment, including human vul-
nerabilities. Typical IT vulnerabilities might involve one or more of the following:
Input Validation Error (Boundary Condition Error, Buffer Overflow), Access Vali-
dation Error, Exceptional-Condition Handling Error, Environmental Error, Config-
uration Error, Race Condition. Vulnerabilities may also be described in terms of
their location. Approaches to classification of the location of IT vulnerabilities may
be found in Krsul’s categories, aspects of the scheme in Section 6.1 of Krsul’s the-
sis [Krs98], and the first access scheme in [How97]. Previous efforts to classify
human vulnerabilities may be found in [ottNCSC89]. Note that the CC includes
functional requirements specifically designed to compensate for human vulnerabili-
ties (e.g., FAU: Security audit, FCO: Communication, FMT: Security management,
much of FTA: TOE access). In addition, much of the CC’s Part 3 requirements are
intended to counter human vulnerabilities in a system’s pre-deployment environ-
ment.
Results Threat results are characterized in terms of Loss Types, affected IT Capabilities, loss
Locations, and affected Security Functions.
Loss Types Loss may involve the loss of Availability, Confidentiality, Integrity, and/or
Security Protection. For this characterization of loss types to be fully applicable, it
is necessary that these traditional security-classification terms be interpreted quite
broadly - see the Glossary for details. These traditional loss categories are attributed
to Don Parker of SRI and are described in [Pow96]. Note that some variants of this
scheme attempt to omit security-protection threats.
IT Capabilities An attack may involve System capabilities (including security-relevant
code or data). Alternatively it may involve User Data and/or User Processing.
12 CHAPTER 3. TOE SECURITY ENVIRONMENT
Locations Losses resulting from an attack may occur in the system itself (i.e., the TOE)
and/or in the system’s Environment. The latter value is particularly relevant in the
case of network firewalls.
Security Functions If an attack involves loss of security protection, it is relevant to ask
what types of security protection are affected. We have used CC Classes as a con-
venient way to classify the types of security protection that might be lost.
3.3.1 Administrative errors of commission
T.Admin_Err_Commit An administrator commits errors that directly compromise organiza-
tional security objectives or change the technical security policy enforced by the system
or application.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Privileged Accidental Constructive Low
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Error
3.3.2 Administrative errors of omission
T.Admin_Err_Omit The system administrator fails to perform some function essential to se-
curity.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Privileged Accidental Constructive Low
Method
Lifecycle
Phases
Human Role
Operation System Duties
3.3.3 Hostile administrator modification of user or system data
T.Admin_Hostile_Modify An administrator maliciously obstructs organizational security ob-
jectives or modifies the system’s configuration to allow security violations to occur.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Privileged Deliberate Hostile Low
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Modify or de-
stroy TSF code
or data
3.3. THREATS ADDRESSED BY THE TOE 13
3.3.4 Software containing security-related flaws
T.Dev_Flawed_Code A system or applications developer delivers code that does not perform
according to specifications or contains security flaws.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Privileged Accidental Constructive Low
Method
Lifecycle
Phases
Human Role
Development System Duties
3.3.5 Hacker undetected system access
T.Hack_AC A hacker gains undetected access to a system due to missing, weak and/or incor-
rectly implemented access control causing potential violations of integrity, confidentiality,
or availability.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Authenticated Deliberate Hostile Moderate
Method
Lifecycle
Phases
Human Role
Operation Service User
3.3.6 Message content modification
T.Hack_Msg_Data A hacker modifies information intercepted from a communication link be-
tween two unsuspecting entities before passing it on, thereby deceiving the intended re-
cipient.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile Moderate Remote
Method
Lifecycle
Phases
Human Role
Operation No Duties
Result
Loss Types IT Capabili-
ties
Integrity User Data
14 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.3.7 Unexpected disruption of system or component power
T.Power_Disrupt A human or environmental agent disrupts power causing the system to lose
information or security protection.
Agent
Agent Type Forces
Other Power
Method
Lifecycle
Phases
Operation
Result
Loss Types IT Capabili-
ties
Availability System
3.3.8 Sender denies sending information
T.Repudiate_Send The sender of a message denies sending the message to avoid accountabil-
ity for sending the message or to avoid obligations incurred as a result of sending the
message.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Authenticated Deliberate Negligent Low
Method
Lifecycle
Phases
Human Role
Operation Service User
Result
Loss Types IT Capabili-
ties
Integrity User Data
3.3.9 Hostile user acts cause confidentiality breaches
T.User_Abuse_Conf A user collects sensitive or proprietary information and removes it from
the system.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Authenticated Deliberate Hostile Low
Method
Lifecycle
Phases
Human Role
Operation Service User
3.3. THREATS ADDRESSED BY THE TOE 15
Result
Loss Types IT Capabili-
ties
Confidentiality User Data
3.3.10 User abuses authorization to collect data
T.User_Collect User abuses granted authorizations to improperly collect sensitive or security-
critical data.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Authenticated Deliberate Hostile Low
Method
Lifecycle
Phases
Human Role Action
Operation Service User Observe
Result
Loss Types IT Capabili-
ties
Confidentiality User Data
3.3.11 User errors cause confidentiality breaches
T.User_Err_Conf A user commits errors that cause information to be delivered to the wrong
place or wrong person.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Authenticated Accidental Constructive Zero
Method
Lifecycle
Phases
Human Role
Operation Service User
Result
Loss Types IT Capabili-
ties
Confidentiality User Data
3.3.12 User errors cause integrity breaches
T.User_Err_Integrity A user commits errors that induce erroneous actions by the system and/or
erroneous statements its users.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Authenticated Accidental Constructive Zero
16 CHAPTER 3. TOE SECURITY ENVIRONMENT
Method
Lifecycle
Phases
Human Role
Operation Service User
Result
Loss Types IT Capabili-
ties
Integrity User Data
3.3.13 User errors undermine the system’s security features
T.User_Err_Slf_Protect A user commits errors that cause the system or one of its applications
to undermine the system’s security features.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Authenticated Accidental Constructive Zero
Method
Lifecycle
Phases
Human Role
Operation Service User
3.3.14 User abuses authorization to modify data
T.User_Modify A user abuses granted authorizations to improperly change or destroy sensitive
or security-critical data.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Authenticated Accidental Constructive Zero
Method
Lifecycle
Phases
Human Role
Operation Service User
Result
Loss Types IT Capabili-
ties
Integrity User Data
3.3.15 User abuses authorization to send data
T.User_Send A user abuses granted authorizations to improperly send sensitive or security-
critical data.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Authenticated Accidental Constructive Zero
3.4. DETAILED ATTACKS COUNTERED BY THE TOE 17
Method
Lifecycle
Phases
Human Role
Operation Service User
Result
Loss Types IT Capabili-
ties
Confidentiality,
Integrity
User Data
3.4 Detailed Attacks countered by the TOE
The TOE shall be able to counter the detailed attacks that have been identified as applicable and
documented herein.
3.4.1 Accidental mismanagement of cryptographic functions
DA.Adm_Err_Crypto An administrator misconfigures cryptographic functions or stores plain-
text keys in insecure areas.
3.4.2 Destruction or modification of audit data
DA.Adm_Hstl_Audit_Dstr An administrator seeks to cover up misbehavior by destroying and/or
falsifying audit data.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Deliberate Hostile Moderate Any
Method
Lifecycle
Phases
Human Role Action Vulnerabilities
Operation System Duties Destroy or fal-
sify
Inadequate pro-
tection of audit
data
Result
Loss Types IT Capabili-
ties
Locations Security Func-
tions
Security Pro-
tection
System TOE FAU
3.4.3 Administrator modifies or destroys user data or applications
DA.Adm_Hstl_Mod_DataAps The administrator abuses IT or user trust, as being the adminis-
trator and without changing the user imposed data security attributes, by destroying data
or applications for malicious reasons or to cover up misappropriate behavior.
Agent
18 CHAPTER 3. TOE SECURITY ENVIRONMENT
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Deliberate Hostile Low Any
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Modification of
user data or ap-
plications
Result
Loss Types IT Capabili-
ties
Locations
Availability, In-
tegrity
User Data TOE
3.4.4 Administrator maliciously modifies or deletes data access con-
trol attributes
DA.Adm_Hstl_Mod_Data_AC An administrator maliciously modifies access control attributes,
allowing the administrator or other perpetrator to gain access and manipulative capability
to organizational assets, contrary to organizational policy.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Deliberate Hostile Low Any
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Modify ac-
cess control
attributes
Result
Loss Types IT Capabili-
ties
Locations Security Func-
tions
Security Pro-
tection
System, User
Data
TOE FDP
3.4.5 The administrator maliciously modifies information flow con-
trol.
DA.Adm_Hstl_Mod_IFC The administrator maliciously alters information flow control policy
to allow information to flow to inappropriate locations for unauthorized users access or
modification.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Deliberate Hostile Moderate Any
3.4. DETAILED ATTACKS COUNTERED BY THE TOE 19
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Modification
of Information
Flow Control
Result
Loss Types
Any
3.4.6 Administrator maliciously modifies system entry parameters
DA.Adm_Hstl_Mod_SEP An administrator or user masquerading as an administrator mali-
ciously modifies system entry parameters which would allow unauthorized access to an
organization’s protected assets.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Deliberate Hostile Low Any
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Modification of
system entry
parameters
Result
Loss Types
Security Pro-
tection
3.4.7 Administrator maliciously modifies security-critical code
DA.Adm_Hstl_Mod_TSFCode The administrator modifies the security-critical (TSF) code to
weaken the security effectiveness of the TSF or introduce a new security breech.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Deliberate Hostile Moderate Any
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Modify TSF or
system code
Result
Loss Types IT Capabili-
ties
Security Func-
tions
Security Pro-
tection
System FPT
20 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.4.8 Administrator maliciously modifies user/subject bindings
DA.Adm_Hstl_Mod_USB The administrator modifies a user/subject binding which would al-
low a user to act on an object without creating an audit trail.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Deliberate Hostile High Any
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Modification
of user/subject
binding
Result
Loss Types
Security Pro-
tection
3.4.9 Administrator maliciously modifies user attributes and/or roles
DA.Adm_Hstl_Mod_UsrAttr The administrator modifies or mishandles the users attributes
or roles which allows users, unauthorized or authorized, to have the ability to perform
inappropriate actions or could prevent a user from performing an authorized action.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Deliberate Hostile Low Any
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Modification of
user attributes
and/or roles
Result
Loss Types
Any
3.4.10 User privileges and/or authorizations are not updated upon
reassignment
DA.Adm_Misconfig_User A change in the status of users duties do not get reflected in admin-
istratively controlled privileges and/or authorizations.
3.4. DETAILED ATTACKS COUNTERED BY THE TOE 21
3.4.11 Administrator error modifies access control or information
flow policy
DA.Admin_Err_AC_Policy An administrator’s error in data entry changes the access control
or information flow policy enforced by the system in such a way that it no longer serves
its intended purpose.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Accidental Negligent Zero Any
Result
Loss Types IT Capabili-
ties
Locations Security Func-
tions
Security Pro-
tection
System TOE FDP
3.4.12 Administrator error changes audit behavior
DA.Admin_Err_Audit An administrator’s error in data entry changes the audit behavior of the
system in such a way that auditing no longer serves its intended purpose.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Accidental Constructive Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Error
Result
Loss Types Security Func-
tions
Security Pro-
tection
FAU
3.4.13 Administrator error modifies authentication enforcement
DA.Admin_Err_Authentic An administrator’s error in data entry changes the authentication-
enforcement mechanism of the system in such a way that it no longer serves its intended
purpose.
Agent
Agent Type Authentication Attitude Motive Localities
Human Privileged Accidental Constructive Any
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Error
22 CHAPTER 3. TOE SECURITY ENVIRONMENT
Result
Loss Types
Security Pro-
tection
3.4.14 Administrator error makes information unavailable
DA.Admin_Err_Info An administrator’s error in data entry makes system or application infor-
mation unavailable.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Accidental Constructive Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Error
Result
Loss Types
Availability
3.4.15 Back door left open
DA.Admin_Err_Omit_Trap An administrator inadvertently leaves a back door port open after
routine maintenance, allowing continuing unauthorized access by the service organiza-
tion.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Accidental Constructive Zero Any
Method
Lifecycle
Phases
Human Role Action Vulnerabilities
Operation System Duties Inaction administrator
frailty
Result
Loss Types Locations
Security Pro-
tection
TOE
3.4.16 Administrator error makes resource unavailable
DA.Admin_Err_Resource An administrator’s error in data entry makes system or application
resources unavailable.
Agent
3.4. DETAILED ATTACKS COUNTERED BY THE TOE 23
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Accidental Constructive Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Error
Result
Loss Types
Availability
3.4.17 Administrator error modifies entry policy
DA.Admin_Err_Sys_Entry An administrator’s error in data entry changes the intended entry
policy of the system or application.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Accidental Constructive Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Error
Result
Loss Types
Security Pro-
tection
3.4.18 Administrator fails to update security configuration
DA.Admin_Err_Update The organizational security policies changes but these changes are
not reflected in all system configurations, resulting in circumvention and/or incorrect ap-
plication of security policies.
3.4.19 Administrator error modifies user security attributes
DA.Admin_Err_User_Attr An administrator’s error in data entry modifies a user’s security
attributes, which makes the attributes inappropriate under the security policy of the system
or application.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Accidental Constructive Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Error
24 CHAPTER 3. TOE SECURITY ENVIRONMENT
Result
Loss Types
Availability,
Security Pro-
tection
3.4.20 Inconsistent interpretation of audit data attributes
DA.Dev_FC_Attr_Interp The security-critical (TSF) components inconsistently interpret au-
dit data attributes exchanged with another trusted IT product.
3.4.21 Buffers not cleared by the system
DA.Dev_FC_Buff_Not_Clr The system leaves user information in a system buffer for view by
another unauthorized user.
3.4.22 Incorrect modification of control data
DA.Dev_FC_Ctrl_Data A security-critical (TSF) component incorrectly modifies control data
regarding a user process.
3.4.23 System data incorrectly exchanged
DA.Dev_FC_Data_Export The system incorrectly exchanges system data with another trusted
system.
3.4.24 Non-secure recovery
DA.Dev_FC_Recovery A system failure may alter the behavior of the system’s security func-
tions in such a way that, upon recovery, it no longer properly enforces its security policy
(TSP).
3.4.25 Inaccurate system-data replication
DA.Dev_FC_Replication The system does not accurately replicate system data to different
parts of the system where replication is required.
3.4.26 System modification by unauthorized source
DA.Dev_FC_Self_Protect Software developer or hacker modifies system security functions re-
sulting in a loss of security protection.
3.4.27 Malicious developer creates secret trapdoor in system
DA.Dev_FC_Trap_Door The system developer creates a secret back door in the system (TOE)
that allows covert access by the developer. This allows the developer to collect informa-
tion, monitor user actions, modify the operation of the TOE, or just make unauthorized
use of the TOE.
Agent
Agent Type Authentication Attitude Motive Localities
Human Identified Deliberate Negligent Any
3.4. DETAILED ATTACKS COUNTERED BY THE TOE 25
Method
Action
install trap door
3.4.28 Hacker gains access through a vulnerability in code
DA.Hack_AC_Code_Vul The hacker can use vulnerabilities found in system or application
code to break into a system undetected.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile Moderate Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Maliciously
circumvents
access control
through a code
vulnerability
3.4.29 Weak system access control mechanism or system access
control implementation
DA.Hack_AC_Weak The system access control mechanism(s) or user attributes are weak and
can be broken or the implementation methods of the system access control causes the
weakness.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Deliberate Hostile Moderate Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Penetrate weak
access control
Result
Loss Types
Any
3.4.30 The communication mechanism emanates data
DA.Hack_CommEaves_Eman An outsider uses special equipment to capture emanations off
the communications line.
3.4.31 Outsider intercepts user communications
DA.Hack_CommEaves_Intrc An outsider who is not an intended recipient intercepts user data
communications.
26 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.4.32 Hacker causes overload of communication resources
DA.Hack_Comm_Overload The unauthorized use of communication resources by a hacker
causes a denial or delay in service to legitimate operations within the TOE scope of con-
trol. This would include the excess bandwidth utilization, leading to the TOE’s inability
to perform it’s security functions.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile Moderate Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Excessively use
communication
resources
Result
Loss Types
Availability,
Security Pro-
tection
3.4.33 Accidental or deliberate mishandling of cryptographic as-
sets external to the TOE
DA.Hack_Ext_CryptoAsset Cryptographic assets are mishandled after the leave the TOE, ei-
ther in transit or while residing on stored media.
3.4.34 A hacker assumes the identity of an authorized user
DA.Hack_Masq_Hijack A hacker captures the interactive session of an authorized user. The
hacker now appears as a legitimate user and can perform any action allowed to that user,
including reading or modifying sensitive data.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile High Remote
Method
Action
Penetrate a
communica-
tions link
Result
Loss Types Locations
Any Any
3.4. DETAILED ATTACKS COUNTERED BY THE TOE 27
3.4.35 A user assumes the identity of an authorized user
DA.Hack_Masq_Uwkstn An individual takes advantage of an unattended but active worksta-
tion to perform operations in the name of the logged-in user. Such operations may include
some operations that the attacker is not normally allowed to perform.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Negligent Low Local
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Usurp an ac-
tive session on
a workstation
Result
Loss Types
Any
3.4.36 Modification of security-critical data in transit from a re-
mote trusted site
DA.Hack_MsgData_RcvTSF Security-critical (TSF) data is modified in transit from a remote
trusted site, either accidentally by the communications infrastructure or deliberately by a
hostile outsider.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile High Remote
Method
Action Vulnerabilities
Message modi-
fication
Inadequate TSF
data protection
by the remote
site and/or
inadequate data
validation by
the TOE
Result
Loss Types IT Capabili-
ties
Locations
Integrity, Secu-
rity Protection
System TOE
28 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.4.37 Modification of user data in transit from a remote site
DA.Hack_MsgData_RcvUsr A hostile outsider modifies message data in route to the system.
Alternatively, errors in the communications infrastructure modify the message.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile High Remote
Method
Lifecycle
Phases
Human Role Action Vulnerabilities
Operation No Duties Message modi-
fication
Inadequate user
data protection
by the remote
site and/or
inadequate data
validation by
the TOE
Result
Loss Types Locations
Integrity TOE
3.4.38 Modification of security-critical data in transit to a remote
site
DA.Hack_MsgData_SndTSF Security-critical (TSF) data is modified in transit to a remote
site, either accidentally by the communications infrastructure or deliberately by a hostile
outsider.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile High Remote
Method
Lifecycle
Phases
Human Role Action Vulnerabilities
Operation No Duties Message modi-
fication
Inadequate
TSF data pro-
tection by the
TOE and/or
inadequate data
validation by
the remote site
Result
Loss Types IT Capabili-
ties
Locations
Integrity, Secu-
rity Protection
System Environment
3.4. DETAILED ATTACKS COUNTERED BY THE TOE 29
3.4.39 Modification of user data in transit to a remote site
DA.Hack_MsgData_SndUsr A hostile outsider modifies message data in route to a remote
site. Alternatively, errors in the communications infrastructure modify the message.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile High Remote
Method
Lifecycle
Phases
Human Role Action Vulnerabilities
Operation No Duties Message modi-
fication
Inadequate user
data protection
by the TOE
and/or inad-
equate data
validation by
the remote site
Result
Loss Types IT Capabili-
ties
Locations
Integrity User Data Environment
3.4.40 Attacker modifies protocol headers
DA.Hack_Spoof_MsgHdr An attacker may modify protocol headers such that a user believes
the communication is coming from a source that is different from where it was actually
sent.
3.4.41 Hacker activities cause storage overload
DA.Hack_Stg_Overload A hacker initiates processes that tax the amount of storage available
in the system (TOE). Such would be the case when a hacker floods the TOE with e-mails.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile Moderate Any
Method
Lifecycle
Phases
Human Role
Operation No Duties
Result
Loss Types
Availability
3.4.42 Resource depletion failure
DA.Phys_CompFail_Res A system allocates so many resources that not enough are left for a
critical component to function correctly.
30 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.4.43 Unexpected power reset
DA.Power_Disrupt_Reset An unintentional, malicious, or environmentally caused power reset
occurs, resulting in the loss of critical information or the system to enter a non-secure
state.
3.4.44 Denial of having sent information to another local user
DA.Repudiate_Send_Int A local, authorized user sends a message to another local user via the
system, and then denies having done it. This affects the recipient of the message as well
as any resources allocated or modified by the recipient in response to the message.
3.4.45 Denial of having sent information to a remote user
DA.Repudiate_Send_Local A local, authorized user sends a message to another user at a re-
mote trusted product, and then denies having done it. This affects the recipient of the
message as well as any resources allocated or modified by the recipient in response to the
message.
3.4.46 Denial of having sent data by a remote user
DA.Repudiate_Send_Rem A local, authorized user receives a message from another user at a
remote trusted product who then denies having sent it. This affects the recipient of the
message as well as any resources allocated or modified by the recipient in response to the
message.
3.4.47 Accidental release of cryptographic assets due to TSF flaw
or malfunction
DA.TSF_Err_Conf_Crypto The TSF accidentally releases sensitive plaintext data, red keys,
or other cryptographic assets to an inappropriate audience.
3.4.48 User smuggles data using removable media
DA.User_Abuse_Conf_Disk A user collects sensitive or proprietary information and improp-
erly removes it from the system by putting it on removable media.
3.4.49 Steganographic data smuggling
DA.User_Abuse_Conf_Steg An authorized user hides sensitive information in an innocuous-
appearing file, for the purpose of covertly passing it to an unauthorized party. The hidden
data is undetectable to anyone using the file for its intended purpose, but can be recovered
using special techniques.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Negligent Low Any
Method
Lifecycle
Phases
Human Role Action Vulnerabilities
Operation No Duties Data hiding Human frailty,
inadequate data
protection
3.4. DETAILED ATTACKS COUNTERED BY THE TOE 31
Result
Loss Types
Confidentiality
3.4.50 User collects data by browsing
DA.User_Collect_Browse An authorized user abuses granted authorizations by browsing files
in order to collect data.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Deliberate Hostile Low Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Observe
Result
Loss Types
Confidentiality
3.4.51 User collects authentication data by deception
DA.User_Collect_Deceive An authorized user steals authentication data by emulating a login
procedure on an active terminal.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Deliberate Hostile Low Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Deception
Result
Loss Types
Confidentiality,
Security Pro-
tection
3.4.52 User collects data by deduction
DA.User_Collect_Deduce An authorized user abuses granted authorizations by repeatedly ac-
cessing aggregate data in order to deduce specific, sensitive data.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Deliberate Hostile Moderate Any
32 CHAPTER 3. TOE SECURITY ENVIRONMENT
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Read repeat-
edly
Result
Loss Types
Confidentiality
3.4.53 User collects data by eavesdropping
DA.User_Collect_Eaves An authorized user abuses granted authorizations by eavesdropping
on communication lines in order to collect data.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Deliberate Hostile Low Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Observe
Result
Loss Types
Confidentiality
3.4.54 User collects residual data
DA.User_Collect_Residue An authorized user collects residual data from public objects after
prior usage.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Deliberate Hostile Moderate Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Observe resid-
ual data
Result
Loss Types
Confidentiality
3.4. DETAILED ATTACKS COUNTERED BY THE TOE 33
3.4.55 User’s unauthorized use causes overload of communication
resources
DA.User_Comm_Overload An authorized user exceeds the authorized use of communication
resources during the system (TOE) operation. This causes a denial or delay in service to
legitimate operations within the TOE scope of control.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Negligent Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Create ex-
cessive com-
munication
traffic
Result
Loss Types
Availability
3.4.56 Denial of service due to exhausted audit storage
DA.User_ErrAvl_AudExhst An authorized user’s actions generate so many audit records that
audit storage space is exhausted and the system subsequently denies further service until
audit storage becomes available.
3.4.57 Falsification of information quality in data export
DA.User_Err_AttrXpt An authorized user presents incorrect information, indicating to the
recipient that it is correct, thereby encouraging the recipient to make unwarranted use of
the information.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Negligent Zero Any
Method
Lifecycle
Phases
Human Role Action Vulnerabilities
Operation No Duties Misrepresentation
of security at-
tributes
Human ig-
norance or
inattention,
inadequate data
labeling
Result
Loss Types
Integrity, Secu-
rity Protection
34 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.4.58 Under-classification of data sensitivity on export
DA.User_Err_Conf_Class An authorized user presents confidential or classified information
to a recipient, indicating that it is less sensitive than it really is, thereby encouraging the
recipient to pass it along to other potentially inappropriate recipients.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Negligent Zero Any
Method
Lifecycle
Phases
Human Role Action Vulnerabilities
Operation No Duties Falsification
of security
attributes
Human frailty,
inadequate data
protection
Result
Loss Types
Confidentiality
3.4.59 Accidental release of cryptographic assets due to user error
DA.User_Err_Conf_Crypto User error causes release of cryptographic assets to unauthorized
recipients.
3.4.60 Confidentiality violation of export control policy
DA.User_Err_Conf_Exp An authorized user exposes or exports data in violation of export
control policy. The data may be private or classified, the recipient is not authorized to
receive it.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Deliberate Negligent Zero Any
Method
Lifecycle
Phases
Human Role Action Vulnerabilities
Operation No Duties Deliberate ex-
port
Human frailty,
inadequate data
protection
Result
Loss Types
Confidentiality
3.4. DETAILED ATTACKS COUNTERED BY THE TOE 35
3.4.61 User error modifying attributes availability
DA.User_Err_Mod_Attr An authorized user erroneously modifies the initial security attributes
of user data, which makes the data inaccessible.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Constructive Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Error
Result
Loss Types Locations
Availability TOE
3.4.62 Failure to provide object security attributes in data export
DA.User_Err_MsngAttrXpt An authorized user deliberately or accidentally exports data so
that the data is not accompanied by required handling information.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Constructive Zero Any
Method
Lifecycle
Phases
Human Role Action Vulnerabilities
Operation No Duties Withholding
of security-
attribute infor-
mation
Human frailty,
inadequate data
protection
Result
Loss Types
Confidentiality,
Integrity
3.4.63 Incorrectly set object attributes
DA.User_Err_Object_Attr An authorized user sets an object’s security attributes inappropri-
ately, misdirecting its use. The misdirection may allow unauthorized reading or modifi-
cation, or it may prohibit authorized reading or modification.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Constructive Zero Any
Method
36 CHAPTER 3. TOE SECURITY ENVIRONMENT
Lifecycle
Phases
Human Role Action Vulnerabilities
Operation No Duties Setting ob-
ject security
attributes
Human ig-
norance or
inattention,
inadequate
data labeling
mechanism
Result
Loss Types
Security Pro-
tection
3.4.64 User error setting attributes availability
DA.User_Err_Set_Attr An authorized user erroneously sets the initial security attributes of
user data, which makes the data inaccessible.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Constructive Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Error
Result
Loss Types
Availability
3.4.65 User modifies audit trail
DA.User_Modify_Audit An authorized user modifies audit data or audit attributes to avoid
accountability.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Deliberate Hostile Moderate Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Modify TSF
data
Result
Loss Types
Integrity, Secu-
rity Protection
3.4. DETAILED ATTACKS COUNTERED BY THE TOE 37
3.4.66 User improperly modifies authentication data
DA.User_Modify_Auth An authorized user changes the authentication data of another user
without first masquerading as that user, in a manner that is not consistent with organiza-
tional security policy.
Agent
Agent Type Authentication Attitude Motive Localities
Human Authenticated Deliberate Negligent Any
Method
Action
Modify TSF
data
Result
Loss Types
Integrity, Secu-
rity Protection
3.4.67 User improperly modifies user data
DA.User_Modify_Data An authorized user modifies or deletes user data in violation of orga-
nizational policy.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Deliberate Negligent Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Modify
Result
Loss Types IT Capabili-
ties
Locations
Integrity User Data Any
3.4.68 User improperly modifies TSF data
DA.User_Modify_TSFData User modifies or deletes TSF data undermining security protec-
tion.
3.4.69 User’s unauthorized actions over-task the system causing
processor overload
DA.User_Prcsr_Overload The system (TOE) has been over-tasked and can not complete the
assigned tasking at all or in an expected amount of time. The user invokes processing
functions in association with unauthorized activity that leads to overburdening processing
resources on the TOE.
Agent
38 CHAPTER 3. TOE SECURITY ENVIRONMENT
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Negligent Zero Any
Method
Lifecycle
Phases
Human Role Action Vulnerabilities
Operation No Duties Obstruction /
Overload
System / Re-
source Utiliza-
tion
Result
Loss Types IT Capabili-
ties
Locations
Availability System TOE
3.4.70 User sends data violating confidentiality
DA.User_Send_Conf An authorized user abuses granted authorizations and violates export
control policy by sending data to a recipient who is not authorized to receive the data.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Negligent Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Send
Result
Loss Types IT Capabili-
ties
Locations
Confidentiality User Data TOE
3.4.71 User sends data violating integrity
DA.User_Send_Integrity An authorized user deliberately exports data inappropriately, with
the result that there is a lack of required quality control on the exported data.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Negligent Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Send
Result
Loss Types
Integrity
3.5. THREATS ADDRESSED BY THE TOE WITH SUPPORT FROM THE ENVIRONMENT39
3.4.72 User’s unauthorized actions cause storage overload
DA.User_Stg_Overload An authorized user’s unauthorized use of data storage causes a short-
age of disk space for other users.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Negligent Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Prevent Use of
Storage by ex-
ploiting storage
capacity limits
Result
Loss Types
Availability
3.5 Threats addressed by the TOE with support from
the environment
The TOE, with the help of the identified Assumptions, shall be able to counter the general threats
that have been identified as applicable and documented herein.
3.5.1 Administrator violates user privacy policy
T.Admin_UserPriv An administrator learns the identity (or other privacy related information)
of user(s) in violation of user privacy policy. Privacy-related information is sensitive
information associated with the identity of a user.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Privileged Accidental Negligent Low
Method
Lifecycle
Phases
Human Role
Operation System Duties
Result
Loss Types IT Capabili-
ties
Confidentiality User Data
40 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.5.2 Malicious code exploitation
T.Malicious_Code An authorized user, IT system, or hacker downloads and executes malicious
code, which causes abnormal processes that violate the integrity, availability, or confiden-
tiality of system assets.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human None Deliberate Hostile Zero
Method
Lifecycle
Phases
Human Role
Operation No Duties
3.5.3 Legitimate system services are spoofed
T.Spoofing An attacker tricks users into interacting with spurious system services.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile Moderate Remote
Method
Lifecycle
Phases
Human Role
Operation No Duties
3.5.4 Hacker attempts resource denial of service
T.Hack_Avl_Resource A hacker executes commands, sends data, or performs other operations
that make system resources unavailable to system users. Resources that may be denied to
users include bandwidth, processor time, memory, and data storage.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human None Deliberate Hostile Moderate
Method
Lifecycle
Phases
Human Role
Operation No Duties
Result
Loss Types IT Capabili-
ties
Availability System
3.5. THREATS ADDRESSED BY THE TOE WITH SUPPORT FROM THE ENVIRONMENT41
3.5.5 Hacker eavesdrops on user data communications
T.Hack_Comm_Eavesdrop Hacker obtains user data by eavesdropping on communications
lines.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile Low Remote
Method
Lifecycle
Phases
Human Role
Operation No Duties
Result
Loss Types IT Capabili-
ties
Confidentiality User Data
3.5.6 Hacker masquerading as a legitimate user or as system pro-
cess
T.Hack_Masq A hacker masquerades as an authorized user to perform operations that will be
attributed to the authorized user or a system process.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile High Remote
Method
Lifecycle
Phases
Human Role Vulnerabilities
Operation No Duties Inadequate
authentication
mechanisms
and inadequate
protection of
communica-
tions media.
Result
Loss Types IT Capabili-
ties
Availability,
Confidentiality,
Integrity
User Data
3.5.7 Exploitation of vulnerabilities in the physical environment of
the system
T.Hack_Phys A hacker physically interacts with the system to exploit vulnerabilities in the
physical environment, resulting in arbitrary security compromises.
Agent
42 CHAPTER 3. TOE SECURITY ENVIRONMENT
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile Moderate Local
Method
Lifecycle
Phases
Human Role
Operation No Duties
3.5.8 Social engineering
T.Hack_Social_Engineer A hacker uses social engineering techniques to gain information about
system entry, system use, system design, or system operation.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human None Deliberate Hostile Zero
Method
Lifecycle
Phases
Human Role
Operation No Duties
3.5.9 A critical system component fails
T.Component_Failure Failure of one or more system components results in the loss of system-
critical functionality.
Agent
Agent Type Forces
Other Unusual Condi-
tions
Method
Lifecycle
Phases
Operation
Result
Loss Types IT Capabili-
ties
Availability System
3.5.10 Failure of a distributed system component
T.Failure_DS_Comp Failure of a component that is part of a distributed system will cause other
parts of the distributed system to malfunction or provide unreliable results.
Agent
Agent Type Forces
Other Unusual Condi-
tions
3.5. THREATS ADDRESSED BY THE TOE WITH SUPPORT FROM THE ENVIRONMENT43
Method
Lifecycle
Phases
Operation
Result
Loss Types IT Capabili-
ties
Availability System
3.5.11 Recipient denies receiving information
T.Repudiate_Receive The recipient of a message denies receiving the message, to avoid ac-
countability for receiving the message or to avoid obligations incurred as a result of re-
ceiving the message.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Authenticated Deliberate Negligent Low
Method
Lifecycle
Phases
Human Role
Operation Service User
Result
Loss Types IT Capabili-
ties
Integrity User Data
3.5.12 A participant denies performing a transaction
T.Repudiate_Transact A participant in a transaction denies participation in the transaction to
avoid accountability for the transaction or for resulting obligations.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Authenticated Deliberate Negligent Low
Method
Lifecycle
Phases
Human Role
Operation Service User
Result
Loss Types IT Capabili-
ties
Integrity User Data
44 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.5.13 User error makes data inaccessible
T.User_Err_Inaccess A user accidentally deletes user data or changes system data rendering
user data inaccessible.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Authenticated Accidental Constructive Zero
Method
Lifecycle
Phases
Human Role Action
Operation Service User Error
Result
Loss Types IT Capabili-
ties
Availability User Data
3.5.14 User’s misuse causes denial of service
T.User_Misuse_Avl_Resc A user’s unauthorized use of resources causes an undue burden on
an affected resource.
Agent
Agent Type Authentication Attitude Motive Sophistication
Human Authenticated Accidental Constructive Zero
Method
Lifecycle
Phases
Human Role
Operation Service User
Result
Loss Types IT Capabili-
ties
Availability System
3.6 Detailed Attacks countered by the Environment
The environment, in applications of the stated assumptions, shall be able to counter the detailed
attacks that have been identified as applicable and documented herein.
3.6.1 Administrator aggregates privacy information
DA.Admin_UserPriv_Agg An administrator aggregates information that indirectly reveals the
identity (or other privacy related information) of user(s) in violation of user privacy policy.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Deliberate Hostile Moderate Any
3.6. DETAILED ATTACKS COUNTERED BY THE ENVIRONMENT 45
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Aggregate user
data
Result
Loss Types Locations
Confidentiality Any
3.6.2 Administrator reads collected user privacy information
DA.Admin_UserPriv_Col An administrator reads information collected by the IT system or
product that reveals the identity (or other privacy related information) of user(s) in viola-
tion of user privacy policy.
3.6.3 Administrator reads system generated privacy information
DA.Admin_UserPriv_Gen An administrator reads information generated by the IT system or
product that directly reveals the identity (or other privacy related information) of user(s)
in violation of user privacy policy.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Privileged Deliberate Hostile Low Any
Method
Lifecycle
Phases
Human Role Action
Operation System Duties Observe system
data
Result
Loss Types Locations
Confidentiality TOE
3.6.4 Malicious code perpetrator dissemination
DA.Mal_Code_Hack_Downld A perpetrator disseminates malicious code via push or pull mech-
anism.
3.6.5 Malicious code perpetrator execution
DA.Mal_Code_Hack_Exe A perpetrator executes malicious code either remotely or locally.
3.6.6 Malicious code accidental IT download
DA.Mal_Code_IT_Download An IT device accidentally transfers or downloads malicious code
to itself or other device that it can influence.
46 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.6.7 Malicious code IT execution
DA.Mal_Code_IT_Exe An IT device under normal operations enters a state required to execute
the malicious code.
3.6.8 Malicious code accidental user download
DA.Mal_Code_Usr_Downld An authorized user accidentally downloads malicious code.
3.6.9 Malicious code user execution
DA.Mal_Code_Usr_Exe An authorized user executes malicious code accidentally.
3.6.10 Login program replicated to capture authentication data
DA.Hack_Spoof_Login An attacker simulates the system’s login program and runs it at an
open terminal or workstation in order to capture a legitimate user’s authentication data.
3.6.11 Hacker causes system task overload resulting in denial of
service
DA.Hack_Prcsr_Overload Hacker causes system task overload resulting in denial of service.
The system (TOE) has been over-tasked and can not complete the assigned tasking at all
or in an expected amount of time. The hacker invokes processing functions in association
with unauthorized activity that leads to overburdening processing resources on the TOE.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Deliberate Hostile Low Any
Method
Lifecycle
Phases
Human Role Action Vulnerabilities
Operation No Duties Deliberate pro-
cessor overload
System / Re-
source Utiliza-
tion
Result
Loss Types
Availability
3.6.12 An outsider taps a communications line
DA.Hack_CommEaves_Tap An outsider uses a device to physically tap the communications
line.
3.6.13 Masquerading due to weak authentication
DA.Hack_Masq_Wauth Services are provided to a user application without adequate authenti-
cation of the client requesting the service. This would permit someone to receive services
for which they are not authorized. However, the server would see them as a legitimate
user, which is why this is classified as a masquerade attack.
Agent
3.6. DETAILED ATTACKS COUNTERED BY THE ENVIRONMENT 47
Agent Type Authentication Attitude Motive Sophistication Localities
Human None Deliberate Hostile Moderate Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties exploiting
weak au-
thentication
mechanisms
Result
Loss Types
Any
3.6.14 Physical attack on cryptographic assets
DA.Hack_Phys_Crypto Physical attack causes damage to cryptographic functions and/or re-
lease of cryptographic assets
3.6.15 Hacker physically attacks the system
DA.Hack_Phys_Damage Hacker physically attacks the system, causing physical damage and
loss of security protection.
3.6.16 Social engineering to steal password
DA.Hack_SocEng_Password A hacker persuades a user or administrator to reveal his pass-
word, giving the hacker access to the person’s account privileges.
3.6.17 Hacker uses social engineering to learn system information
DA.Hack_SocEng_SysInfo A hacker persuades a user or administrator to reveal information
about system operational procedures, auditing and known flaws.
3.6.18 System hardware fails during system operation
DA.Hardware_Flaw System use uncovers a hardware flaw in a critical system component.
3.6.19 System use uncovers an intrinsic software flaw in a critical
system component
DA.Software_Flaw An authorized user performs an operation or set of operations, exercising a
software flaw in a security-critical component.
3.6.20 Communications function failure
DA.Failure_DS_Comm Failure of a communications function severs communications between
security-critical (TSF) components.
48 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.6.21 Denial of having received data from another local user
DA.Repudiate_Rcvr_Int A local, authorized user receives a message from another local user
via the system, and then denies having received it. This typically affects the sender of the
message who is counting on responsibilities associated with receipt of the message.
3.6.22 Denial of having received information from a remote user
DA.Repudiate_Rcvr_Local A local, authorized user receives a message from another user at a
remote trusted product, and then denies having received it.
3.6.23 Denial of having received information by a remote user
DA.Repudiate_Rcvr_Rem A local, authorized user sends a message to another user at a remote
trusted product who then denies having received it.
3.6.24 Circumvent non-repudiation in a transaction involving a user
and a local system
DA.Repudiate_Trans_Loc An authorized user participates in a transaction by responding to
system/application prompts and then denies that the dialogue took place. The user and
system/application are collocated.
3.6.25 Circumvent non-repudiation in a transaction involving a lo-
cal user and a remote system
DA.Repudiate_Trans_Uloc An authorized user participates in a transaction by responding to
remote system/application prompts and then denies that the dialogue took place.
3.6.26 Circumvent non-repudiation in a transaction involving a re-
mote user and a local system
DA.Repudiate_Trans_Urem An authorized remote user participates in a transaction by re-
sponding to local system/application prompts and then denies that the dialogue took place.
3.6.27 User error deletes data
DA.User_Err_Delete An authorized user accidentally deletes user data.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Constructive Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Error
Result
Loss Types IT Capabili-
ties
Locations
Availability User Data TOE
3.7. ORGANIZATIONAL GENERAL SECURITY POLICIES FOR THE TOE 49
3.6.28 User obstructs legitimate use of resources.
DA.User_Obst_Res_Use An authorized user obstructs the use resources by unauthorized mod-
ification of data file, communication channel, or object security attributes.
Agent
Agent Type Authentication Attitude Motive Sophistication Localities
Human Authenticated Accidental Negligent Zero Any
Method
Lifecycle
Phases
Human Role Action
Operation No Duties Modify
Result
Loss Types Locations
Availability TOE
3.7 Organizational General Security Policies for the TOE
The following General Policy Statements are addressed directly by the TOE:
3.7.1 Individual accountability
GP.Accountability Individuals shall be held accountable for their actions.
3.7.2 Notification of threats and vulnerabilities
GP.Authorities Appropriate authorities shall be immediately notified of any threats or vulnera-
bilities impacting systems that process their data.
3.7.3 Authorized use of information
GP.Authorized_Use Information shall be used only for its authorized purpose(s).
3.7.4 Installation and usage guidance
GP.Guidance Guidance shall be provided for the secure installation and use of the system.
3.7.5 System lifecycle phases integrate security
GP.Lifecycle Information systems security shall be an integral part of all system lifecycle phases.
3.7.6 Information marking
GP.Marking Information shall be appropriately marked and labeled.
50 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.7.7 Semiformally designed, tested and reviewed
GP.Product_Assurance The Developer shall gain maximum assurance from security engineer-
ing based upon rigorous commercial development practices supported by moderate ap-
plication of specialist security engineering techniques. Such a TOE will probably be
designed and developed with the intent of achieving this level of assurance. This is ap-
plicable in those circumstances where developers or users require a high level of inde-
pendently assured security in a planned development and require a rigorous development
approach without incurring unreasonable costs attributable to specialist security engineer-
ing techniques.
3.8 Organizational Detailed Security Policies assigned
to the TOE
Each General Policy Statement, as defined in Sec. 3.7 and Sec. 3.9, refines into a number of
Detailed Policy Statements, that provide fine-graded policies that can be mapped onto Security
Objectives. This section documents the series of Detailed Policy Statements whose compliance
is a TOE responsibility.
3.8.1 Changes to security data by authorized personnel
DP.Admin_Security_Data Provide mechanisms to assure that changes to security related data
are executed only by authorized personnel.
3.8.2 Configuration Management
DP.Assurance_ACM Configuration management (CM) helps to ensure that the integrity of the
TOE is preserved, by requiring discipline and control in the processes of refinement and
modification of the TOE and other related information. CM prevents unauthorised mod-
ifications, additions, or deletions to the TOE, thus providing assurance that the TOE and
documentation used for evaluation are the ones prepared for distribution.
3.8.3 Delivery and Operation
DP.Assurance_ADO This security policy defines requirements for the measures, procedures,
and standards concerned with secure delivery, installation, and operational use of the
TOE, ensuring that the security protection offered by the TOE is not compromised during
transfer, installation, start-up, and operation.
3.8.4 Product Development
DP.Assurance_ADV This security policy defines requirements for the stepwise refinement of
the TSF from the TOE summary specification in the ST down to the actual implementa-
tion. Each of the resulting TSF representations provide information to help the evaluator
determine whether the functional requirements of the TOE have been met.
3.8.5 Guidance documents
DP.Assurance_AGD This security policy defines requirements directed at the understandabil-
ity, coverage and completeness of the operational documentation provided by the devel-
oper. This documentation, which provides two categories of information, for users and
for administrators, is an important factor in the secure operation of the TOE.
3.8. ORGANIZATIONAL DETAILED SECURITY POLICIES ASSIGNED TO THE TOE51
3.8.6 Lifecycle support
DP.Assurance_ALC This security policy defines requirements for assurance through the adop-
tion of a well defined life-cycle model for all the steps of the TOE development, including
flaw remediation procedures and policies, correct use of tools and techniques and the se-
curity measures used to protect the development environment.
3.8.7 Test
DP.Assurance_ATE This security policy states testing requirements that demonstrate that the
TSF satisfies the TOE security functional requirements.
3.8.8 Vulnerability Assesment
DP.Assurance_AVA This security policy defines requirements directed at the identification of
exploitable vulnerabilities. Specifically, it addresses those vulnerabilities introduced in
the construction, operation, misuse, or incorrect configuration of the TOE.
3.8.9 Individual accountability
DP.Audit_Gen_User The system shall provide individual accountability for auditable actions.
3.8.10 Audit data generation with identity
DP.Audit_Generation The system shall provide the capability to ensure that all audit records
include enough information to determine the date and time of action, the system locale of
the action, the system entity that initiated or completed the action, the resources involved,
and the action involved.
3.8.11 Protected audit data storage
DP.Audit_Protect The system shall protect the contents of the audit trails against unauthorized
access, modification, or deletion.
3.8.12 Notification of threats and vulnerabilities
DP.Authority_Notify Notification of threats and vulnerabilities shall be addressed.
3.8.13 Notification of data content changes
DP.Change_Control_Users Notify user of the time and date of the last modification of data.
3.8.14 Implement operational configuration management
DP.Config_Mgt_Plan A configuration management plan shall be implemented by the system.
The system shall implement configuration management to assure storage integrity, iden-
tification of system connectivity (software, hardware, and firmware), and identification
of system components (software, hardware, and firmware). The system shall implement
strong integrity mechanisms (integrity locks, encryption).
3.8.15 Documented recovery
DP.Documented_Recovery The system shall provide procedures and features to assure that
system recovery is done in a trusted and secure manner. Any circumstances that could
result in an untrusted recovery shall be documented.
52 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.8.16 Labeling data
DP.External_Labels The system shall provide security parameters associated with information
exchanged between systems.
3.8.17 User identification and authentication
DP.I&A_User The system shall provide Identification and authentication procedures which
uniquely identify and authenticate users.
3.8.18 Strong integrity mechanisms
DP.Integrity_Data/SW The system shall implement strong integrity mechanisms (integrity locks,
encryption).
3.8.19 Operational integrity system function testing
DP.Integrity_Practice Provide system functional tests to periodically test the integrity of the
hardware and code running system functions.
3.8.20 Security throughout lifecycle
DP.Lifecycle_Security Security shall be addressed throughout the system’s lifecycle.
3.8.21 Privileged user access
DP.Need_To_Know The system shall function so that each user has access to all of the infor-
mation and functions that the user requires to perform duties, but no more.
3.8.22 Privileged user documentation
DP.Privileged_Doc Documentation shall include guides or manuals for the system’s privileged
users.
3.8.23 User screen locking
DP.Screen_Lock The system shall provide a screen lock mechanism.
3.8.24 Assurance of effective storage integrity
DP.Storage_Integrity The system shall provide assurance that storage integrity is effective.
3.8.25 System access banners
DP.Sys_Access_Banners The system shall notify users prior to gaining access that the user’s
actions may be monitored and recorded, that using the system consents to such monitor-
ing, and that unauthorized use may result in criminal or civil penalties.
3.8.26 Validation of security function integrity
DP.Sys_Assur_HW/SW/FW Features and procedures to validate the integrity and the expected
operation of the security-relevant software, hardware, and firmware shall be provided by
the system.
3.8. ORGANIZATIONAL DETAILED SECURITY POLICIES ASSIGNED TO THE TOE53
3.8.27 System backup procedures
DP.Sys_Backup_Procs Provide the capability to restore the system to a secure state after dis-
continuities of system operations.
3.8.28 Restoration with minimal loss
DP.Sys_Backup_Restore The system shall provide backup procedures to allow restoration of
the system with minimal loss of service or data.
3.8.29 Effective backup restoration
DP.Sys_Backup_Storage The system shall provide procedures to ensure both the existence of
sufficient backup storage capability and effective restoration (incremental and complete)
of the backup data.
3.8.30 Protection from security function modification
DP.System_Protection Provide features or procedures for protection of the system from im-
proper changes.
3.8.31 Trusted system recovery
DP.System_Recovery Provide procedures and features to assure that system recovery is done
in a trusted and secure manner.
3.8.32 Encryption of transmitted user data
DP.User_Data_Dial-in The system shall provide data transmission using an encryption mech-
anism appropriate for the sensitivity of the data.
3.8.33 Protection of stored user data
DP.User_Data_Storage The system shall provide appropriate storage, continuous personnel
access control storage, or encrypted storage of data based on the sensitivity of the data.
3.8.34 Protection of transmitted user data
DP.User_Data_Transfer The system shall provide a protected distribution system for data
transmitted.
3.8.35 Discretionary access control
DP.User_Defined_AC The system shall provide a Discretionary Access Control (DAC) func-
tion (i.e., a user can grant access authorization to other users for data they control).
3.8.36 General user documentation
DP.User_Documentation Documentation shall include a user’s guide for the general user.
54 CHAPTER 3. TOE SECURITY ENVIRONMENT
3.9 Organizational General Security Policies for the TOE
and the Environment
The following General Policy Statements are addressed by the TOE and the Environment as
defined in the Assumptions:
3.9.1 Information availability
GP.Availability Information shall be available to satisfy mission requirements.
3.9.2 Information access control
GP.Information_AC Information shall be accessed only by authorized individuals and pro-
cesses.
3.9.3 Information content integrity
GP.Integrity Information shall retain its content integrity.
3.9.4 Physical protection
GP.Physical_Control Information shall be physically protected to prevent unauthorized disclo-
sure, destruction, or modification.
3.10 Organizational Detailed Security Policies assigned
to the Environment
Each General Policy Statement, as defined in Sec. 3.9, refines into a number of Detailed Policy
Statements, that provide fine-graded policies that can be mapped onto Security Objectives. This
section documents the series of Detailed Policy Statements whose compliance is a responsibility
assumed for the environment.
3.10.1 Malicious code prevention
DP.Malicious_Code Procedures and mechanisms to prevent the introduction of malicious code
into the system shall be provided.
3.10.2 Backup protection and restoration
DP.Sys_Backup_Verify The system shall provide appropriate physical and technical protection
of the backup and restoration hardware, firmware, and software.
3.10.3 Enhanced user identification and authentication
DP.User_Auth_Enhanced The system shall require the use of enhanced authentication for priv-
ileged users who either reside outside of the system’s perimeter or whose communications
traverse data lines outside of the system’s perimeter.
3.10.4 Non-repudiation capabilities
DP.Non-Repudiation The system shall provide non-repudiation capabilities.
3.10. ORGANIZATIONAL DETAILED SECURITY POLICIES ASSIGNED TO THE ENVIRONMENT55
3.10.5 Physical tampering detection and notification
DP.Tamper_ID The system shall detect physical tampering and notify the appropriate authority.
56 CHAPTER 3. TOE SECURITY ENVIRONMENT
Chapter 4
SECURITY OBJECTIVES
Security objectives cover two complementary security needs, those oriented to counter the iden-
tified threats and attacks and those aimed to fulfill the organizational policies.
4.1 Security Objectives for the TOE
These are established to counter the identified threats and applicable policies of the defined TOE:
4.1.1 Limitation of administrative access control
O.AC_Admin_Limit Design administrative functions in such a way that administrators do not
automatically have access to user objects, except for necessary exceptions. For an ac-
counts administrator, the necessary exceptions include allocation and de-allocation of
storage. For an audit administrator, the necessary exceptions include observation of au-
dited actions. In general, the exceptions tend to be role specific.
4.1.2 Object security attributes and exportation
O.AC_Label_Export Provide object security attributes in exported data with moderate to high
effectiveness. The attributes are those associated with specific security function policies.
4.1.3 Access history for user session
O.Access_History Display information related to the most recent successful and unsuccessful
attempts to establish a user session, once a user successfully establishes a user session.
4.1.4 Limit an administrator’s ability to modify user-subject bind-
ings
O.Adm_Limits_Bindings Limit the administrator from modification of user-subject bindings
in an effort to deter users acting without accountability.
4.1.5 Limit administrator’s modification of user attributes
O.Adm_User_Att_Mod Deter the administrator from maliciously modifying users’ attributes.
Such modifications could allow unauthorized user actions or denial of service to a legiti-
mate user.
57
58 CHAPTER 4. SECURITY OBJECTIVES
4.1.6 Administrative validation of executables
O.Admin_Code_Val Validate executable objects prior to allowing execution. Validation needs
to be done by someone with an expertise to recognize malicious code and the authority
and means to prevent its execution.
4.1.7 Software validation for absence of steganography
O.Admin_Code_Val_Sten Validate exported objects for absence of steganographic content
prior to allowing exportation. Validation needs to be done by someone with an exper-
tise to recognize hidden content and the authority and means to prevent its export.
4.1.8 Administrator guidance documentation
O.Admin_Guidance Deter administrator errors by providing adequate administrator guidance.
4.1.9 Apply patches to fix the code
O.Apply_Code_Fixes Apply patches to fix the code when vulnerabilities in code allow unau-
thorized and undiscovered access.
4.1.10 CM automation
O.Assurance_ACM_AUT The objective of introducing automated CM tools is to increase the
effectiveness of the CM system. While both automated and manual CM systems can be
bypassed, ignored, or prove insufficient to prevent unauthorised modification, automated
systems are less susceptible to human error or negligence.
4.1.11 CM capabilities
O.Assurance_ACM_CAP The capabilities of the CM system address the likelihood that ac-
cidental or unauthorised modifications of the configuration items will occur. The CM
system should ensure the integrity of the TOE from the early design stages through all
subsequent maintenance efforts.
4.1.12 CM scope
O.Assurance_ACM_SCP The objective of this family is to ensure that all necessary TOE con-
figuration items are tracked by the CM system. This helps to ensure that the integrity of
these configuration items is protected through the capabilities of the CM system.
4.1.13 Delivery
O.Assurance_ADO_DEL The requirements for delivery call for system control and distribu-
tion facilities and procedures that provide assurance that the recipient receives the TOE
that the sender intended to send, without any modifications. For a valid delivery, what is
received must correspond precisely to the TOE master copy, thus avoiding any tampering
with the actual version, or substitution of a false version.
4.1.14 Installation, generation and start-up
O.Assurance_ADO_IGS Installation, generation, and start-up procedures are useful for en-
suring that the TOE has been installed, generated, and started up in a secure manner as
intended by the developer. The requirements for installation, generation and start-up call
4.1. SECURITY OBJECTIVES FOR THE TOE 59
for a secure transition from the TOE’s implementation representation being under config-
uration control to its initial operation in the user environment.
4.1.15 Functional specification
O.Assurance_ADV_FSP The functional specification is a high-level description of the user-
visible interface and behaviour of the TSF. It is an instantiation of the TOE security func-
tional requirements. The functional specification has to show that all the TOE security
functional requirements are addressed.
4.1.16 High-level design
O.Assurance_ADV_HLD The high-level design of a TOE provides a description of the TSF in
terms of major structural units (i.e. subsystems) and relates these units to the functions
that they provide. The high-level design requirements are intended to provide assurance
that the TOE provides an architecture appropriate to implement the TOE security func-
tional requirements.
The high-level design refines the functional specification into subsystems. For each sub-
system of the TSF, the high-level design describes its purpose and function, and identifies
the security functions contained in the subsystem. The interrelationships of all subsystems
are also defined in the high-level design. These interrelationships will be represented as
external interfaces for data flow, control flow, etc., as appropriate.
4.1.17 Implementation representation
O.Assurance_ADV_IMP The description of the implementation representation in the form of
source code, firmware, hardware drawings, etc. captures the detailed internal workings of
the TSF in support of analysis.
4.1.18 TSF internals
O.Assurance_ADV_INT This family addresses the internal structure of the TSF. Requirements
are presented for modularity, layering (to separate levels of abstraction and minimise cir-
cular dependencies), minimisation of the complexity of policy enforcement mechanisms,
and the minimisation of the amount of non-TSP-enforcing functionality within the TSF -
thus resulting in a TSF that is simple enough to be analysed.
Modular design reduces the interdependence between elements of the TSF and thus re-
duces the risk that a change or error in one module will have effects throughout the TOE.
Thus, a modular design provides the basis for determining the scope of interaction with
other elements of the TSF, provides for increased assurance that unexpected effects do
not occur, and also provides the basis for designing and evaluating test suites.
4.1.19 Low-level design
O.Assurance_ADV_LLD The low-level design of a TOE provides a description of the internal
workings of the TSF in terms of modules and their interrelationships and dependencies.
The low-level design provides assurance that the TSF subsystems have been correctly and
effectively refined.
For each module of the TSF, the low-level design describes its purpose, function, inter-
faces, dependencies, and the implementation of any TSP-enforcing functions.
60 CHAPTER 4. SECURITY OBJECTIVES
4.1.20 Representation correspondence
O.Assurance_ADV_RCR The correspondence between the various TSF representations (i.e.
TOE summary specification, functional specification, high-level design, low-level design,
implementation representation) addresses the correct and complete instantiation of the re-
quirements to the least abstract TSF representation provided. This conclusion is achieved
by step-wise refinement and the cumulative results of correspondence determinations be-
tween all adjacent abstractions of representation.
4.1.21 Security policy modeling
O.Assurance_ADV_SPM It is the objective of this family to provide additional assurance that
the security functions in the functional specification enforce the policies in the TSP. This
is accomplished via the development of a security policy model that is based on a sub-
set of the policies of the TSP, and establishing a correspondence between the functional
specification, the security policy model, and these policies of the TSP.
4.1.22 Administrator guidance
O.Assurance_AGD_ADM Administrator guidance refers to written material that is intended
to be used by those persons responsible for configuring, maintaining, and administering
the TOE in a correct manner for maximum security. Because the secure operation of
the TOE is dependent upon the correct performance of the TSF, persons responsible for
performing these functions are trusted by the TSF. Administrator guidance is intended
to help administrators understand the security functions provided by the TOE, including
both those functions that require the administrator to perform security-critical actions and
those functions that provide security-critical information.
4.1.23 User guidance
O.Assurance_AGD_USR User guidance refers to material that is intended to be used by non-
administrative human users of the TOE, and by others (e.g. programmers) using the
TOE’s external interfaces. User guidance describes the security functions provided by the
TSF and provides instructions and guidelines, including warnings, for its secure use.
4.1.24 Development security
O.Assurance_ALC_DVS Development security is concerned with physical, procedural, per-
sonnel, and other security measures that may be used in the development environment to
protect the TOE. It includes the physical security of the development location and any
procedures used to select development staff.
4.1.25 Flaw remediation
O.Assurance_ALC_FLR Flaw remediation requires that discovered security flaws be tracked
and corrected by the developer. Although future compliance with flaw remediation pro-
cedures cannot be determined at the time of the TOE evaluation, it is possible to evaluate
the policies and procedures that a developer has in place to track and correct flaws, and to
distribute the flaw information and corrections.
4.1.26 Life cycle definition
O.Assurance_ALC_LCD Poorly controlled development and maintenance of the TOE can re-
sult in a flawed implementation of a TOE (or a TOE that does not meet all of its security
4.1. SECURITY OBJECTIVES FOR THE TOE 61
requirements). This, in turn, results in security violations. Therefore, it is important that a
model for the development and maintenance of a TOE be established as early as possible
in the TOE’s life-cycle.
Using a model for the development and maintenance of a TOE does not guarantee that
the TOE will be free of flaws, nor does it guarantee that the TOE will meet all of its se-
curity functional requirements. It is possible that the model chosen will be insufficient or
inadequate and therefore no benefits in the quality of the TOE can be observed. Using a
life-cycle model that has been approved by some group of experts (e.g. academic experts,
standards bodies) improves the chances that the development and maintenance models
will contribute to the overall quality of the TOE.
4.1.27 Tools and techniques
O.Assurance_ALC_TAT Tools and techniques is an aspect of selecting tools that are used to
develop, analyse and implement the TOE. It includes requirements to prevent ill-defined,
inconsistent or incorrect development tools from being used to develop the TOE. This
includes, but is not limited to, programming languages, documentation, implementation
standards, and other parts of the TOE such as supporting runtime libraries.
4.1.28 Coverage
O.Assurance_ATE_COV This family addresses those aspects of testing that deal with com-
pleteness of test coverage. That is, it addresses the extent to which the TSF is tested, and
whether or not the testing is sufficiently extensive to demonstrate that the TSF operates as
specified.
4.1.29 Depth
O.Assurance_ATE_DPT The components in this family deal with the level of detail to which
the TSF is tested. Testing of security functions is based upon increasing depth of infor-
mation derived from analysis of the representations.
The objective is to counter the risk of missing an error in the development of the TOE.
Additionally, the components of this family, especially as testing is more concerned with
the internal structure of the TSF, are more likely to discover any malicious code that has
been inserted.
Testing that exercises specific internal interfaces can provide assurance not only that the
TSF exhibits the desired external security behaviour, but also that this behaviour stems
from correctly operating internal mechanisms.
4.1.30 Functional tests
O.Assurance_ATE_FUN Functional testing performed by the developer establishes that the
TSF exhibits the properties necessary to satisfy the functional requirements of its PP/ST.
Such functional testing provides assurance that the TSF satisfies at least the security func-
tional requirements, although it cannot establish that the TSF does no more than what
was specified. The family "Functional tests" is focused on the type and amount of doc-
umentation or support tools required, and what is to be demonstrated through developer
testing. Functional testing is not limited to positive confirmation that the required security
functions are provided, but may also include negative testing to check for the absence of
particular undesired behaviour (often based on the inversion of functional requirements).
62 CHAPTER 4. SECURITY OBJECTIVES
4.1.31 Independent testing
O.Assurance_ATE_IND One objective is to demonstrate that the security functions perform as
specified.
An additional objective is to counter the risk of an incorrect assessment of the test out-
comes on the part of the developer that results in the incorrect implementation of the
specifications, or overlooks code that is non-compliant with the specifications.
4.1.32 Covert channel analysis
O.Assurance_AVA_CCA Covert channel analysis is carried out to determine the existence and
potential capacity of unintended signalling channels (i.e. illicit information flows) that
may be exploited.
The assurance requirements address the threat that unintended and exploitable signalling
paths exist that may be exercised to violate the SFP.
4.1.33 Misuse
O.Assurance_AVA_MSU Misuse investigates whether the TOE can be configured or used in
a manner that is insecure but that an administrator or user of the TOE would reasonably
believe to be secure.
4.1.34 Strength of TOE security functions
O.Assurance_AVA_SOF Even if a TOE security function cannot be bypassed, deactivated, or
corrupted, it may still be possible to defeat it because there is a vulnerability in the concept
of its underlying security mechanisms. For those functions a qualification of their security
behaviour can be made using the results of a quantitative or statistical analysis of the
security behaviour of these mechanisms and the effort required to overcome them. The
qualification is made in the form of a strength of TOE security function claim.
4.1.35 Vulnerability analysis
O.Assurance_AVA_VLA Vulnerability analysis is an assessment to determine whether vulner-
abilities identified, during the evaluation of the construction and anticipated operation of
the TOE or by other methods (e.g. by flaw hypotheses), could allow users to violate the
TSP.
4.1.36 Complete security functions or recover to previous state
O.Atomic_Functions Recover automatically to a consistent, secure state if a security function
does not complete successfully in the presence of certain types of failures.
4.1.37 Audit changes of system entry parameters
O.Aud_Sys_Entry_Parms Deter an administrator from changing system entry parameters to
allow an unauthorized user access to organizational assets to which they are forbidden.
4.1.38 Auditing for user accountability
O.Audit_Account Provide information about past user behavior to an authorized user through
system mechanisms. Specifically, during any specified time interval, the system is able
to report to a user acting in an identified audit role selected auditable actions that a user
has performed, and as a result, what auditable objects were affected and what auditable
information was received by that user.
4.1. SECURITY OBJECTIVES FOR THE TOE 63
4.1.39 Audit-administration role duties
O.Audit_Admin_Role Deter modification or destruction of audit data through the creation of
an audit-administration role.
4.1.40 Audit system access to deter misuse
O.Audit_Deter_Misuse Audit system access to discover system misuse and provide a potential
deterrent by warning the user.
4.1.41 Individual accountability
O.Audit_Gen_User Provide individual accountability for audited events. Uniquely identify
each user so that auditable actions can be traced to a user.
4.1.42 Audit records with identity
O.Audit_Generation Record in audit records: date and time of action, location of the action,
and the entity responsible for the action.
4.1.43 Respond to possible loss of stored audit records
O.Audit_Loss_Respond Respond to possible loss of audit records when audit trail storage is
full or nearly full.
4.1.44 Protect stored audit records
O.Audit_Protect Protect audit records against unauthorized access, modification, or deletion to
ensure accountability of user actions.
4.1.45 User notification of data content changes
O.Change_Control_Users Notify users of changes to data content in order to make any adjust-
ments to their own data.
4.1.46 Code signing and verification
O.Code_Signing Check verification of signed downloaded code prior to execution. A well-
known example is checking digital signatures on signed Java applets.
4.1.47 Trusted channel to remote trusted system
O.Comm_Trusted_Channel Provide a communications channel between the system and a re-
mote trusted system for the performance of security-critical operations.
4.1.48 Implement operational configuration management
O.Config_Management Implement a configuration management plan. Implement configura-
tion management to assure storage integrity, identification of system connectivity (soft-
ware, hardware, and firmware), and identification of system components (software, hard-
ware, and firmware).
64 CHAPTER 4. SECURITY OBJECTIVES
4.1.49 Verify correct operation as designed
O.Correct_Operation Provide the ability for the authorized user to verify that the system op-
erates as designed.
4.1.50 Cryptographic access control policy
O.Crypto_AC Restrict user access to cryptographic IT assets in accordance with a specified
user access control policy.
4.1.51 Encrypted communications channel
O.Crypto_Comm_Channel Provide secure session establishment between the system and re-
mote systems using encryption functions.
4.1.52 Separation of cryptographic data
O.Crypto_Data_Sep Provide complete separation between plaintext and encrypted data and
between data and keys. This requires separate channels and separate storage areas. The
only place any data can pass between the plaintext and encrypted data modules is in the
cryptographic engine. There should be no way for plaintext keys to reach either data
module and no way for data to enter the key handling module. Encrypted keys can be
handled as encrypted data, but with limited user access.
4.1.53 Cryptographic Design and Implementation
O.Crypto_Dsgn_Impl Minimize or even eliminate design and implementation errors in the
cryptographic modules and functions.
4.1.54 Cryptographic import, export, and inter-TSF transfer
O.Crypto_Import_Export Protect cryptographic data assets when they are being transmitted
to and from the TOE, either through intervening untrusted components or directly to/from
human users.
4.1.55 Cryptographic Key Management
O.Crypto_Key_Man Fully define cryptographic components, functions, and interfaces. En-
sure appropriate protection for cryptographic keys throughout their lifecycle, covering
generation, distribution, storage, use, and destruction.
4.1.56 Management of cryptographic roles
O.Crypto_Manage_Roles Provide one or more roles to manage cryptographic assets and at-
tributes.
4.1.57 Cryptographic Modular Design
O.Crypto_Modular_Dsgn Prevent errors in one part of the TOE from influencing other parts,
especially cryptographic parts. To this end, noncryptographic I/O paths must be well
defined and logically independent of circuitry and processes performing key generation,
manual key entry, key zeroising, and similar key-related operations.
4.1. SECURITY OBJECTIVES FOR THE TOE 65
4.1.58 Cryptographic function definition
O.Crypto_Operation Cryptographic components, functions, and interfaces shall be fully de-
fined.
4.1.59 Cryptographic self test
O.Crypto_Self_Test Provide the ability to verify that the cryptographic functions operate as
designed.
4.1.60 Test cryptographic functionality
O.Crypto_Test_Reqs Test cryptographic operation and key management.
4.1.61 Enforce data exchange confidentiality
O.Data_Exchange_Conf Protect user data confidentiality when exchanging data with a remote
system.
4.1.62 Control user data exportation
O.Data_Export_Control Impose information control policies that do not allow export of spec-
ified data and/or export to specified locations.
4.1.63 Data import/export to/from system control
O.Data_Imp_Exp_Control Protect data from being sent to erroneous places and more places
external to the system than allowed by the organization’s security policy. Conversely the
import of data into the system should be protected from illicit information or information
not allowed by the organization’s security policy.
4.1.64 Sanitize data objects containing hidden or unused data
O.Export_Control Sanitize data objects that may contain hidden data when they are exported
from the TOE in order to inhibit steganographic smuggling.
4.1.65 Label or mark information for external systems
O.External_Labels Label or mark information for external systems to prevent the exchange of
inappropriate data between systems.
4.1.66 Preservation of secure state for failures in critical compo-
nents
O.Fail_Secure Preserve the secure state of the system in the event of a secure component fail-
ure.
4.1.67 Periodically check integrity
O.General_Integ_Checks Provide periodic integrity checks on both system and user data.
4.1.68 Guarantee the availability of audit storage space
O.Guarantee_Audit_Stg Maintain audit data and guarantee space for that data.
66 CHAPTER 4. SECURITY OBJECTIVES
4.1.69 Limit sessions to outside users
O.Hack_Limit_Sessions Limit the number of sessions available to outside users. A hacker can
initiate multiple communication sessions that could cause an overload on resources, for
example, half open session starts as is seen in SYN flood attacks.
4.1.70 Control hacker communication traffic
O.Hack_Traffic_Control Control (e.g. reroute or discard) hacker communication traffic to
prevent potential damage.
4.1.71 Identify and authenticate a user to support accountability
O.I&A_Domain Provide the basic I&A functions that will support user accountability.
4.1.72 Transaction identification and authentication
O.I&A_Transaction Associate each transaction between a user and a system/application with
a unique transaction ID, allowing events associated with a given transaction to be distin-
guished from other events involving the user and/or system/application.
4.1.73 Identify and authenticate each user
O.I&A_User Uniquely identify and authenticate each user of the system.
4.1.74 User-action identification and authentication
O.I&A_User_Action Associate each user-requested action with the user who requested the
action.
4.1.75 Identify unusual user activity
O.Identify_Unusual_Act Identify unusual user activity on the system.
4.1.76 System enforced information flow
O.Info_Flow_Control Enforce an information flow policy whereby users are constrained from
allowing access to information they control, regardless of their intent (e.g., mandatory
access control). This lattice property of security attributes is commonly associated with
the U.S. DoD implementations of Mandatory Access Control (MAC).
4.1.77 Provide information flow control administration
O.Info_Flow_Ctrl_Admin Manage information flow control policy and functions to allow only
specified administrators to have the ability to manipulate the information flow control.
4.1.78 Require inspection for absence of malicious code.
O.Input_Inspection Require inspection of downloads/transfers.
4.1.79 Data marking integrity export
O.Integ_Data_Mark_Exp Ensure that data markings are included with data that is exported to
another trusted product.
4.1. SECURITY OBJECTIVES FOR THE TOE 67
4.1.80 Integrity of system data transferred externally
O.Integ_Sys_Data_Ext Ensure the integrity of system data exchanged externally with another
trusted product by using a protocol for data transfer that will permit error detection and
correction. This includes detecting and possibly correcting errors in data received and
encoding outgoing data to make it possible for the receiver to detect and possibly correct
errors. The method for detecting and correcting errors is based on some method (protocol)
that is agreed upon by participating parties.
4.1.81 Integrity of system data transferred internally
O.Integ_Sys_Data_Int Ensure the integrity of system data transferred internally.
4.1.82 Protect user data during internal transfer
O.Integ_User_Data_Int Ensure the integrity of user data transferred internally within the sys-
tem.
4.1.83 Correct attribute exchange with another trusted product
O.Integrity_Attr_Exch Ensure that the system correctly exchanges security-attribute informa-
tion with another trusted IT product.
4.1.84 Integrity protection for user data and software
O.Integrity_Data/SW Provide integrity protection for user data and software.
4.1.85 Integrity of system data replication
O.Integrity_Data_Rep Ensure that when system data replication occurs across the system the
data is consistent for each replication.
4.1.86 Operational integrity system function testing
O.Integrity_Practice Provide system functional tests to periodically test the integrity of the
hardware and code running system functions.
4.1.87 Isolate untrusted executables
O.Isolate_Executables Run executable code in a protected domain where the code’s potential
errors or malicious code will not significantly impact other system functions of other valid
users of the system.
4.1.88 Lifecycle security
O.Lifecycle_Security Provide tools, techniques, and security employed during the develop-
ment phase. Detect and resolve flaws during the operational phase. Provide safe destruc-
tion techniques.
4.1.89 Restrict actions before authentication
O.Limit_Actions_Auth Restrict the actions a user may perform before the TOE verifies the
identity of the user.
68 CHAPTER 4. SECURITY OBJECTIVES
4.1.90 Limit the number of user initiated communication sessions
O.Limit_Comm_Sessions Provide mechanisms to limit the number of sessions that the user
can initiate, if the user initiates multiple sessions that exceed the processors ability to
perform in a reliable and efficient manner. These sessions could ether be communication
(TCP/IP) sessions or user login sessions.
4.1.91 Limit multiple sessions
O.Limit_Mult_Sessions Provide the capability to limit the number of sessions that a user may
have open at one time.
4.1.92 Maintain security domain
O.Maintain_Sec_Domain Maintain at least one security domain for system (TOE) execution
to protect the TOE from interference and tampering.
4.1.93 Controlled access by maintenance personnel
O.Maintenance_Access Control access to the system by maintenance personnel who trou-
bleshoot the system and perform system updates.
4.1.94 Expiration of maintenance privileges
O.Maintenance_Recover Terminate maintenance user system access privilege automatically
after expiration of assigned timed interval.
4.1.95 Manage resource security attributes
O.Manage_Res_Sec_Attr Provide management on resource security attributes.
4.1.96 Manage security-critical data to avoid storage space being
exceeded
O.Manage_TSF_Data Manage security-critical (TSF) data to ensure that the size of the data
does not exceed the space allocated for storage of the data.
4.1.97 Eliminate residual information
O.No_Residual_Info Ensure there is no object reuse; i.e., ensure that there is no residual in-
formation in some information containers or system resources upon their reallocation to
different users.
4.1.98 Non-repudiation support for sent information by the nonlo-
cal receiving TSF.
O.NonRepud_Assess_Sent Support nonrepudiation for sent information by supporting remote
handling of nonrepudiation evidence if needed.
4.1.99 Non-repudiation support for sent information by the sender’s
TSF.
O.NonRepud_Gen_Sent Prevent a user from avoiding accountability for sending a message to
a recipient at a different site by providing evidence that the user sent the message.
4.1. SECURITY OBJECTIVES FOR THE TOE 69
4.1.100 Non-repudiation for sent information, local users
O.NonRepud_Locals_Sent Prevent user from avoiding accountability for sending a message
to another user on the same system by providing evidence that the user sent the message.
4.1.101 Non-repudiation for sent information
O.NonRepudiate_Sent Provide evidence that a user sent information.
4.1.102 Basic object attribute integrity
O.Obj_Attr_Integrity Maintain object security attributes with moderate to high accuracy (un-
der the guidance of qualified users).
4.1.103 Object domain protection
O.Obj_Protection Require domain protection for objects. Specify object classes (domains),
user groups, and operation classes. Use these to specify which operations may be per-
formed on which objects by which users. Basically this controls what users can do in a
given group.
4.1.104 Provide priority of service
O.Priority_Of_Service Control access to resources so that lower-priority activities do not un-
duly interfere with or delay higher-priority activities.
4.1.105 Privileged-interface status
O.Prvlg_IF_Status Provide capability for an administrator to determine the use status of all
privileged interfaces. This would include interfaces used by maintenance personnel.
4.1.106 Identify message modification in messages received
O.Rcv_MsgMod_ID The TSF recognizes changes to messages that occurred in transit, includ-
ing insertion of spurious messages and deletion or replay of legitimate messages.
4.1.107 Recovery from modification of received messages
O.Rcv_MsgMod_Rcvr The TSF detects and corrects changes in messages received from a
remote trusted site.
4.1.108 Provide reference monitor
O.Reference_Monitor Always invoke mechanisms that enforce security policies (i.e., as for a
traditional reference monitor).
4.1.109 Disable remote execution
O.Remote_Execution Disable a remote entity’s ability to execute local code.
4.1.110 Resource quotas for users and services
O.Resource_Quotas Use resource quotas to limit user and service use of system resources to a
level that will prevent degradation or denial of service to other critical users and services.
70 CHAPTER 4. SECURITY OBJECTIVES
4.1.111 User screen locking
O.Screen_Lock Provide a screen lock function to prevent an unauthorized user from using an
unattended computer where a valid user has an active session.
4.1.112 Security-relevant configuration management
O.Secure_Configuration Manage and update system security policy data and enforcement
functions, and other security-relevant configuration data, in accordance with organiza-
tional security policies.
4.1.113 Protect and maintain secure system state
O.Secure_State Maintain and recover to a secure state without security compromise after sys-
tem error or other interruption of system operation.
4.1.114 Manage security attributes
O.Security_Attr_Mgt Manage the initialization of, values for, and allowable operations on
security attributes.
4.1.115 Manage security-critical data
O.Security_Data_Mgt Manage the initialization of, limits on, and allowable operations on
security-critical data.
4.1.116 Manage behavior of security functions
O.Security_Func_Mgt Provide management mechanisms for security mechanisms.
4.1.117 Security roles
O.Security_Roles Maintain security-relevant roles and the association of users with those roles.
4.1.118 System terminates session for inactivity
O.Session_Termination System terminates a session after a given interval of inactivity.
4.1.119 Identify message modification in messages sent
O.Snt_MsgMod_ID The TSF supports recognition of changes to transmitted messages that
occurred in transit, including insertion of spurious messages and deletion or replay of
legitimate messages.
4.1.120 Support recovery from modification of sent messages
O.Snt_MsgMod_Rcvr The TSF supports detection of changes in messages sent to a remote
trusted site.
4.1.121 Examine the source code for developer flaws
O.Source_Code_Exam Examine for accidental or deliberate flaws in code made by the devel-
oper. The accidental flaws could be lack of engineering detail or bad design. Where the
deliberate flaws would include building trapdoors for later entry as an example.
4.1. SECURITY OBJECTIVES FOR THE TOE 71
4.1.122 Storage integrity
O.Storage_Integrity Provide integrity for data.
4.1.123 System access banners
O.Sys_Access_Banners Inform the user of the possibility of the system monitoring his actions,
and that misuse of the system may result in criminal or civil penalties.
4.1.124 Validation of security function
O.Sys_Assur_HW/SW/FW Ensure that security-relevant software, hardware, and firmware are
correctly functioning through features and procedures.
4.1.125 System backup procedures
O.Sys_Backup_Procs Provide backup procedures to ensure that the system can be reconstructed.
4.1.126 Frequent backups to prevent minimal loss
O.Sys_Backup_Restore Provide through frequent backups, restoration of security-relevant changes
to the system between backup and restore, and restoration of the security-relevant system
state (e.g. access control list) without destruction of other system data.
4.1.127 Sufficient backup storage and effective restoration
O.Sys_Backup_Storage Provide sufficient backup storage and effective restoration to ensure
that the system can be recreated.
4.1.128 Protection of system security function
O.Sys_Self_Protection Protect the system security functions through technical features.
4.1.129 Limit administrator’s modification of security-critical code
or data
O.TSF_Mod_Limit Limit the malicious modification of security-critical (TSF) code and data
to include specific system code to prevent the system security protection capabilities from
being diminished or weakened.
4.1.130 Local detection of received security-critical data modified
in transit
O.TSF_Rcv_Err_ID_Loc Identification by the system (TOE) of modification of security-critical
(TSF) data occurring in transit from a remote trusted site must occur.
4.1.131 Remote detection of received security-critical data modi-
fied in transit
O.TSF_Rcv_Err_ID_Rem Identification by the remote site of the modification of security-
critical (TSF) data occurring in transit from the remote site must occur.
72 CHAPTER 4. SECURITY OBJECTIVES
4.1.132 Local detection of sent security-critical data modified in
transit
O.TSF_Snd_Err_ID_Loc Identification of modification of security-critical (TSF) data occur-
ring in transit to a remote site by the TSF must occur.
4.1.133 Remote detection of sent security-critical data modified in
transit.
O.TSF_Snd_Err_ID_Rem Identification of modification of security-critical (TSF) data occur-
ring in transit to a remote site by the remote site must occur.
4.1.134 Trusted distributed system recovery
O.Trusted_DS_Recov Ensure that a replaced failed component when re-integrated into the sys-
tem will recover such that it will not cause errors or security breaches in other parts of the
system.
4.1.135 Provide a trusted path
O.Trusted_Path Provide a trusted path between the user and the system. Execution of a user-
requested action must be made via a trusted path with the following properties:
• The path is logically distinct from, and cannot be confused with other communica-
tion paths (by either the user or the system).
• The path provides assured identification of its end points.
4.1.136 Trusted path and channel
O.Trusted_Path&Channel Provide a trusted path to security-critical (TSF) data in which both
end points have assured identities. For the remote user, there needs to be a trusted channel
as well.
4.1.137 Trusted recovery of security functionality
O.Trusted_Recovery Recovery to a secure state, without security compromise, after a discon-
tinuity of operations.
4.1.138 Documentation of untrusted data recovery
O.Trusted_Recovery_Doc Provide trusted recovery to ensure that data cannot be lost or mis-
placed. Any circumstances which can cause untrusted recovery to be documented with
mitigating procedures established.
4.1.139 Maintain user attributes
O.User_Attributes Maintain a set of security attributes (which may include group membership,
clearance, access rights, etc.) associated with individual users in addition to user identity.
4.1.140 User authorization management
O.User_Auth_Management Manage and update user authorization and privilege data in ac-
cordance with organizational security and personnel policies.
4.2. SECURITY OBJECTIVES FOR THE ENVIRONMENT 73
4.1.141 Basic confidentiality-breach prevention
O.User_Conf_Prevention Prevent unauthorized export of confidential information from the
TOE with moderate effectiveness.
4.1.142 Protection of user-session data
O.User_Data_Dial-in Allow dial-in access through secure mechanisms only.
4.1.143 Integrity protection of stored user data
O.User_Data_Integrity Provide appropriate integrity protection for stored user data.
4.1.144 Protection of transmitted user data
O.User_Data_Transfer Provide the ability to have physically protected communications lines,
intrusion detection for communications lines, and/or need-to-know isolation for commu-
nications lines.
4.1.145 User-defined access control
O.User_Defined_AC Enforce an access control policy whereby users may determine who may
access information they control.
4.1.146 User guidance documentation
O.User_Guidance Provide documentation for the general user.
4.2 Security Objectives for the Environment
These are established to counter the identified threats and applicable policies of the assumed
TOE environment:
4.2.1 Audit unusual user activity
O.Audit_Unusual_User Audit unusual user activity.
4.2.2 Object and data recovery free from malicious code
O.Clean_Obj_Recovery Recover to a viable state after malicious code is introduced and dam-
age occurs, removing the malicious code as part of the process.
4.2.3 Physical protection of the communications line
O.Comm_Line_Protection Protect communications lines from physical tampering.
4.2.4 Provide fault tolerant operations for critical components
O.Fault_Tolerance Provide fault tolerant operations for critical components and continue to
operate in the presence of specific failures in one or more system components.
74 CHAPTER 4. SECURITY OBJECTIVES
4.2.5 Limit observation of service usage to authorized users
O.Limit_ObserveRoles Provide authorized users with the capability to observe the usage of
specified services or resources as necessary to perform their duties.
4.2.6 Procedures for preventing malicious code
O.Malicious_Code Incorporate malicious code prevention procedures and mechanisms.
4.2.7 Non-repudiation support for received information by a non-
local sender’s TSF
O.NonRepud_Assess_Recd Support nonrepudiation for received information by supporting re-
mote handling of nonrepudiation evidence if needed.
4.2.8 Non-repudiation support for received information by the re-
cipient’s TSF
O.NonRepud_Gen_Recd Prevent a receiving user from avoiding accountability for receiving
a message by providing evidence that the user received the message.
4.2.9 Non-repudiation for received information, local users
O.NonRepud_Locals_Rcvd Prevent user from avoiding accountability for receiving a message
from another user on the same system by providing evidence that the user received the
message.
4.2.10 Non-repudiation for received information
O.NonRepudiate_Recd Provide evidence that a user received information.
4.2.11 Permit users to use services under aliases
O.Permit_Aliases Permit some users to maintain partial anonymity when using specified ser-
vices or resources by means of aliases.
4.2.12 Permit users to use services anonymously
O.Permit_Anonymity Permit some users to maintain anonymity when using specified services
or resources.
4.2.13 Prevent system from collecting user privacy information
O.Prevent_AskPrivInfo Provide some services or resources to specified users without solicit-
ing from the user information that is relevant to the user’s privacy.
4.2.14 Prevent linking of multiple service use
O.Prevent_Link Ensure that a user may make multiple uses of a service or resource without
other specified users being able to link these uses together.
4.2. SECURITY OBJECTIVES FOR THE ENVIRONMENT 75
4.2.15 Prevent observation of service use
O.Prevent_Observe Ensure that a user may use a service or resource without other specified
users being able to observe that the service or resource is being used.
4.2.16 React to discovered attacks
O.React_Discovered_Atk Implement automated notification or other reactions to the TSF-
discovered attacks in an effort to identify attacks and to create an attack deterrent.
4.2.17 Rollback
O.Rollback Recover from user operations by undoing some user operations (i.e., rolling back)
to restore a previous known state.
4.2.18 Detect modifications of backup hardware, firmware, soft-
ware
O.Sys_Backup_Verify Detect modifications to backup hardware, firmware, and software.
4.2.19 Tamper detection
O.Tamper_ID Provide system features that detect physical tampering of a system component,
and use those features to limit security breaches.
4.2.20 Tamper resistance
O.Tamper_Resistance Prevent or resist physical tampering with specified system devices and
components.
4.2.21 Enhanced user authentication
O.User_Auth_Enhanced Execute enhanced measures to ensure that either user authentication
data cannot be stolen or when it is stolen, it cannot be used to gain access to the system.
4.2.22 Require multiple authentication mechanisms
O.User_Auth_Multiple Invoke multiple authentication mechanisms, which will provide confi-
dence that the user is who they say they are.
76 CHAPTER 4. SECURITY OBJECTIVES
Chapter 5
IT SECURITY
REQUIREMENTS
5.1 TOE Security Functional Requirements
The required minimum strength of function level is mandated as “SOF-basic”, for the functional
requirements indicated in this section. With this SOF, the TOE shall be resistant to attackers with
low attack potential, and remaining vulnerabilities shall only be exploitable by attacker with
moderate or high attack potential.
Note that in the threat and attack analysis, there are attacks countered by the TOE whose
attack potential is moderate or high, yet the product is claimed to counter them.
This may seem to contradict the previous SOF statement, whereas both claims hold in that
the functionality to counter these attacks is included within the TOE but their assessment shall
be performed with an assurance level of EAL4.
5.1.1 FAU - Security audit
Security auditing involves recognising, recording, storing, and analysing information related to
security relevant activities (i.e. activities controlled by the TSP). The resulting audit records can
be examined to determine which security relevant activities took place and whom (which user)
is responsible for them.
FAU_GEN - Security audit data generation
This family defines requirements for recording the occurrence of security relevant events that
take place under TSF control. This family identifies the level of auditing, enumerates the types
of events that shall be auditable by the TSF, and identifies the minimum set of audit-related
information that should be provided within various audit record types.
FAU_GEN.1 Audit data generation
Audit data generation defines the level of auditable events, and specifies the list of data
that shall be recorded in each record.
FAU_GEN.1.1 The TSF shall be able to generate an audit record of the following au-
ditable events:
• Start-up and shutdown of the audit functions;
• All auditable events for the detailed level of audit, and in particular
1. Audit events for FAU_SAR.1 (See 5.1.1):
77
78 CHAPTER 5. IT SECURITY REQUIREMENTS
– Reading of information from the audit records.
2. Audit events for FAU_SAR.3 (See 5.1.1):
– The parameters used for the viewing.
3. Audit events for FAU_SEL.1 (See 5.1.1):
– All modifications to the audit configuration that occur while the audit
collection functions are operating.
4. Audit events for FAU_STG.4 (See 5.1.1):
– Actions taken due to the audit storage failure.
5. Audit events for FCO_NRO.2 (See 5.1.2):
– The invocation of the non-repudiation service.
– Identification of the information, the destination, and a copy of the
evidence provided.
– The identity of the user who requested a verification of the evidence.
6. Audit events for FCS_CKM.1 (See 5.1.3):
– Success and failure of the activity.
– The object attribute(s), and object value(s) excluding any sensitive in-
formation (e.g. secret or private keys).
7. Audit events for FCS_CKM.2 (See 5.1.3):
– Success and failure of the activity.
– The object attribute(s), and object value(s) excluding any sensitive in-
formation (e.g. secret or private keys).
8. Audit events for FCS_CKM.3 (See 5.1.3):
– Success and failure of the activity.
– The object attribute(s), and object value(s) excluding any sensitive in-
formation (e.g. secret or private keys).
9. Audit events for FCS_CKM.4 (See 5.1.3):
– Success and failure of the activity.
– The object attribute(s), and object value(s) excluding any sensitive in-
formation (e.g. secret or private keys).
10. Audit events for FCS_COP.1 (See 5.1.3):
– Success and failure, and the type of cryptographic operation.
– Any applicable cryptographic mode(s) of operation, subject attributes
and object attributes.
11. Audit events for FDP_ACF.1 (See 5.1.4):
– Successful requests to perform an operation on an object covered by
the SFP.
– All requests to perform an operation on an object covered by the SFP.
– The specific security attributes used in making an access check.
12. Audit events for FDP_DAU.2 (See 5.1.4):
– Successful generation of validity evidence.
– Unsuccessful generation of validity evidence.
– The identity of the subject that requested the evidence.
– The identity of the subject that generated the evidence.
13. Audit events for FDP_ETC.1 (See 5.1.4):
– Successful export of information.
– All attempts to export information.
14. Audit events for FDP_ETC.2 (See 5.1.4):
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 79
– Successful export of information.
– All attempts to export information.
15. Audit events for FDP_IFF.1 (See 5.1.4):
– Decisions to permit requested information flows.
– All decisions on requests for information flow.
– The specific security attributes used in making an information flow
enforcement decision.
– Some specific subsets of the information that has flowed based upon
policy goals (e.g. auditing of downgraded material).
16. Audit events for FDP_IFF.3 (See 5.1.4):
– Decisions to permit requested information flows.
– All decisions on requests for information flow.
– The use of identified illicit information flow channels.
– The specific security attributes used in making an information flow
enforcement decision.
– Some specific subsets of the information that has flowed based upon
policy goals (e.g. auditing of downgraded material).
– The use of identified illicit information flow channels with estimated
maximum capacity exceeding a specified value.
17. Audit events for FDP_ITC.1 (See 5.1.4):
– Successful import of user data, including any security attributes.
– All attempts to import user data, including any security attributes.
– The specification of security attributes for imported user data supplied
by an authorised user.
18. Audit events for FDP_ITC.2 (See 5.1.4):
– Successful import of user data, including any security attributes.
– All attempts to import user data, including any security attributes.
– The specification of security attributes for imported user data supplied
by an authorised user.
19. Audit events for FDP_ITT.2 (See 5.1.4):
– Successful transfers of user data, including identification of the protec-
tion method used.
– All attempts to transfer user data, including the protection method used
and any errors that occurred.
20. Audit events for FDP_SDI.2 (See 5.1.4):
– Successful attempts to check the integrity of user data, including an
indication of the results of the check.
– All attempts to check the integrity of user data, including an indication
of the results of the check, if performed.
– The type of integrity error that occurred.
– The action taken upon detection of an integrity error.
21. Audit events for FDP_UIT.1 (See 5.1.4):
– The identity of any user or subject using the data exchange mecha-
nisms.
– The identity of any user or subject attempting to use the user data ex-
change mechanisms, but who is unauthorised to do so.
– A reference to the names or other indexing information useful in identi-
fying the user data that was transmitted or received. This could include
security attributes associated with the user data.
80 CHAPTER 5. IT SECURITY REQUIREMENTS
– Any identified attempts to block transmission of user data.
– The types and/or effects of any detected modifications of transmitted
user data.
22. Audit events for FDP_UIT.3 (See 5.1.4):
– The identity of any user or subject using the data exchange mecha-
nisms.
– Successful recovery from errors including they type of error that was
detected.
– The identity of any user or subject attempting to use the user data ex-
change mechanisms, but who is unauthorised to do so.
– A reference to the names or other indexing information useful in identi-
fying the user data that was transmitted or received. This could include
security attributes associated with the user data.
– Any identified attempts to block transmission of user data.
– The types and/or effects of any detected modifications of transmitted
user data.
23. Audit events for FIA_AFL.1 (See 5.1.5):
– The reaching of the threshold for the unsuccesful authentication at-
tempts and the actions (e.g. disabling of a terminal) taken and the sub-
sequent, if appropriate, restoration to the normal state (e.g. re-enabling
of a terminal).
24. Audit events for FIA_SOS.1 (See 5.1.5):
– Rejection by the TSF of any tested secret;
– Rejection or acceptance by the TSF of any tested secret;
– Identification of any changes to the defined quality metrics.
25. Audit events for FIA_SOS.2 (See 5.1.5):
– Rejection by the TSF of any tested secret;
– Rejection or acceptance by the TSF of any tested secret;
– Identification of any changes to the defined quality metrics.
26. Audit events for FIA_UAU.2 (See 5.1.5):
– Unsuccessful use of the authentication mechanism;
– All use of the authentication mechanism.
27. Audit events for FIA_UAU.6 (See 5.1.5):
– Failure of reauthentication;
– All reauthentication attempts.
28. Audit events for FIA_UID.2 (See 5.1.5):
– Unsuccessful use of the user identification mechanism, including the
user identity provided;
– All use of the user identification mechanism, including the user iden-
tity provided.
29. Audit events for FIA_USB.1 (See 5.1.5):
– Unsuccessful binding of user security attributes to a subject (e.g. cre-
ation of a subject).
– Success and failure of binding of user security attributes to a subject
(e.g. success and failure to create a subject).
30. Audit events for FMT_MOF.1 (See 5.1.6):
– All modifications in the behaviour of the functions in the TSF.
31. Audit events for FMT_MSA.1 (See 5.1.6):
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 81
– All modifications of the values of security attributes.
32. Audit events for FMT_MSA.2 (See 5.1.6):
– All offered and rejected values for a security attribute;
– All offered and accepted secure values for a security attribute.
33. Audit events for FMT_MSA.3 (See 5.1.6):
– Modifications of the default setting of permissive or restrictive rules.
– All modifications of the initial values of security attributes.
34. Audit events for FMT_MTD.1 (See 5.1.6):
– All modifications to the values of TSF data.
35. Audit events for FMT_MTD.2 (See 5.1.6):
– All modifications to the limits on TSF data;
– All modifications in the actions to be taken in case of violation of the
limits.
36. Audit events for FMT_MTD.3 (See 5.1.6):
– All rejected values of TSF data.
37. Audit events for FMT_REV.1 (See 5.1.6):
– Unsuccessful revocation of security attributes;
– All attempts to revoke security attributes.
38. Audit events for FMT_SAE.1 (See 5.1.6):
– Specification of the expiration time for an attribute;
– Action taken due to attribute expiration.
39. Audit events for FMT_SMR.2 (See 5.1.6):
– Modifications to the group of users that are part of a role;
– unsuccessful attempts to use a role due to the given conditions on the
roles;
– Every use of the rights of a role.
40. Audit events for FPT_AMT.1 (See 5.1.7):
– Execution of the tests of the underlying machine and the results of the
tests.
41. Audit events for FPT_FLS.1 (See 5.1.7):
– Failure of the TSF.
42. Audit events for FPT_ITI.1 (See 5.1.7):
– The detection of modification of transmitted TSF data.
– The action taken upon detection of modification of transmitted TSF
data.
43. Audit events for FPT_RCV.1 (See 5.1.7):
– The fact that a failure or service discontinuity occurred;
– resumption of the regular operation;
– Type of failure or service discontinuity.
44. Audit events for FPT_RCV.4 (See 5.1.7):
– If possible, the impossibility to return to a secure state after failure of
a security function;
– If possible, the detection of a failure of a security function.
45. Audit events for FPT_SSP.2 (See 5.1.7):
– Failure to receive an acknowledgement when expected.
46. Audit events for FPT_STM.1 (See 5.1.7):
– Changes to the time;
82 CHAPTER 5. IT SECURITY REQUIREMENTS
– Providing a timestamp.
47. Audit events for FPT_TDC.1 (See 5.1.7):
– Successful use of TSF data consistency mechanisms.
– Use of the TSF data consistency mechanisms.
– Identification of which TSF data have been interpreted.
– Detection of modified TSF data.
48. Audit events for FPT_TRC.1 (See 5.1.7):
– Restoring consistency upon reconnection.
– Detected inconsistency between TSF data.
49. Audit events for FPT_TST.1 (See 5.1.7):
– Execution of the TSF self tests and the results of the tests.
50. Audit events for FRU_PRS.2 (See 5.1.8):
– Rejection of operation based on the use of priority within an allocation.
– All attempted uses of the allocation function which involves the prior-
ity of the service functions.
51. Audit events for FRU_RSA.2 (See 5.1.8):
– Rejection of allocation operation due to resource limits.
– All attempted uses of the resource allocation functions for resources
that are under control of the TSF.
52. Audit events for FTA_MCS.2 (See 5.1.9):
– Rejection of a new session based on the limitation of multiple concur-
rent sessions.
– Capture of the number of currently concurrent user sessions and the
user security attribute(s).
53. Audit events for FTA_SSL.1 (See 5.1.9):
– Locking of an interactive session by the session locking mechanism.
– Successful unlocking of an interactive session.
– Any attempts at unlocking an interactive session.
54. Audit events for FTA_SSL.2 (See 5.1.9):
– Locking of an interactive session by the session locking mechanism.
– Successful unlocking of an interactive session.
– Any attempts at unlocking an interactive session.
55. Audit events for FTA_SSL.3 (See 5.1.9):
– Termination of an interactive session by the session locking mecha-
nism.
56. Audit events for FTA_TSE.1 (See 5.1.9):
– Denial of a session establishment due to the session establishment
mechanism.
– All attempts at establishment of a user session.
– Capture of the value of the selected access parameters (e.g. location of
access, time of access).
57. Audit events for FTP_ITC.1 (See 5.1.10):
– Failure of the trusted channel functions.
– Identification of the initiator and target of failed trusted channel func-
tions.
– All attempted uses of the trusted channel functions.
– Identification of the initiator and target of all trusted channel functions.
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 83
58. Audit events for FTP_TRP.1 (See 5.1.10):
– Failures of the trusted path functions.
– Identification of the user associated with all trusted path failures, if
available.
– All attempted uses of the trusted path functions.
– Identification of the user associated with all trusted path invocations, if
available.
FAU_GEN.1.2 The TSF shall record within each audit record at least the following in-
formation:
• Date and time of the event, type of event, subject identity, and the outcome
(success or failure) of the event; and
• For each audit event type, based on the auditable event definitions of the func-
tional components included in the PP/ST, [ST ASSIGNMENT: (other audit
relevant information) ]
FAU_GEN.2 User identity association
User identity association, the TSF shall associate auditable events to individual user iden-
tities.
FAU_GEN.2.1 The TSF shall be able to associate each auditable event with the identity
of the user that caused the event.
FAU_SAR - Security audit review
This family defines the requirements for audit tools that should be available to authorised users
to assist in the review of audit data.
FAU_SAR.1 Audit review
Audit review provides the capability to read information from the audit records.
FAU_SAR.1.1 The TSF shall provide [ST ASSIGNMENT: (authorised users) ] with the
capability to read [ST ASSIGNMENT: (list of audit information) ] from the audit
records.
FAU_SAR.1.2 The TSF shall provide the audit records in a manner suitable for the user
to interpret the information.
FAU_SAR.3 Selectable audit review
Selectable audit review requires audit review tools to select the audit data to be reviewed
based on criteria.
FAU_SAR.3.1 The TSF shall provide the ability to perform [ST SELECTION: (searches,
sorting, ordering)] of audit data based on [ST ASSIGNMENT: (criteria with logi-
cal relations) ].
FAU_SEL - Security audit event selection
This family defines requirements to select the events to be audited during TOE operation. It
defines requirements to include or exclude events from the set of auditable events.
FAU_SEL.1 Selective audit
Selective audit, requires the ability to include or exclude events from the set of audited
events based upon attributes to be specified by the PP/ST author.
FAU_SEL.1.1 The TSF shall be able to include or exclude auditable events from the set
of audited events based on the following attributes:
84 CHAPTER 5. IT SECURITY REQUIREMENTS
• - [ST SELECTION: (object identity, user identity, subject identity, host
identity, event type)]
• - [ST ASSIGNMENT: (list of additional attributes that audit selectivity is
based upon) ].
FAU_STG - Security audit event storage
This family defines the requirements for the TSF to be able to create and maintain a secure audit
trail.
FAU_STG.2 Guarantees of audit data availability
Guarantees of audit data availability specifies the guarantees that the TSF maintains over
the audit data given the occurrence of an undesired condition.
FAU_STG.2.1 The TSF shall protect the stored audit records from unauthorised deletion.
FAU_STG.2.2 The TSF shall be able to detect modifications to the audit records.
FAU_STG.2.3 The TSF shall ensure that [ST ASSIGNMENT: (metric for saving audit
records) ] audit records will be maintained when the following conditions occur:
[ST SELECTION: (audit storage exhaustion, failure, attack)].
FAU_STG.4 Prevention of audit data loss
Prevention of audit data loss specifies actions in case the audit trail is full.
FAU_STG.4.1 The TSF shall prevent auditable events, except those taken by the au-
thorized user with special rights and extbfoverwrite the oldest stored audit records
for these users, creating a circular log area if the audit trail is full.
5.1.2 FCO - Communication
This class provides two families specifically concerned with assuring the identity of a party par-
ticipating in a data exchange. These families are related to assuring the identity of the originator
of transmitted information (proof of origin) and assuring the identity of the recipient of transmit-
ted information (proof of receipt). These families ensure that an originator cannot deny having
sent the message, nor can the recipient deny having received it.
FCO_NRO - Non-repudiation of origin
Non-repudiation of origin ensures that the originator of information cannot successfully deny
having sent the information. This family requires that the TSF provide a method to ensure that a
subject that receives information during a data exchange is provided with evidence of the origin
of the information. This evidence can then be verified by either this subject or other subjects.
FCO_NRO.2 Enforced proof of origin
Enforced proof of origin requires that the TSF always generate evidence of origin for
transmitted information.
FCO_NRO.2.1 The TSF shall enforce the generation of evidence of origin for transmit-
ted certificates, root certificates, scripts and configuration files at all times.
FCO_NRO.2.2 The TSF shall be able to relate the [ST ASSIGNMENT: (list of attributes)
] of the originator of the information, and the [ST ASSIGNMENT: (list of informa-
tion fields) ] of the information to which the evidence applies.
FCO_NRO.2.3 The TSF shall provide a capability to verify the evidence of origin of
information to [ST SELECTION: (originator, recipient, [ST ASSIGNMENT: (list
of third parties) ])] given [ST ASSIGNMENT: (limitations on the evidence of
origin) ].
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 85
5.1.3 FCS - Cryptographic support
The TSF may employ cryptographic functionality to help satisfy several high-level security ob-
jectives. These include (but are not limited to): identification and authentication, non-repudiation,
trusted path, trusted channel and data separation. This class is used when the TOE implements
cryptographic functions, the implementation of which could be in hardware, firmware and/or
software.
FCS_CKM - Cryptographic key management
Cryptographic keys must be managed throughout their life cycle. This family is intended to
support that lifecycle and consequently defines requirements for the following activities: cryp-
tographic key generation, cryptographic key distribution, cryptographic key access and crypto-
graphic key destruction. This family should be included whenever there are functional require-
ments for the management of cryptographic keys.
FCS_CKM.1 Cryptographic key generation
Cryptographic key generation requires cryptographic keys to be generated in accordance
with a specified algorithm and key sizes which can be based on an assigned standard.
FCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a spec-
ified cryptographic key generation algorithm [ST ASSIGNMENT: (cryptographic
key generation algorithm) ] and specified cryptographic key sizes [ST ASSIGN-
MENT: (cryptographic key sizes) ] that meet the following: [ST ASSIGNMENT:
(list of standards) ].
These algorithms, key sizes and standards are referred herein as "Approved".
Secret keys, private keys, and CSPs shall be protected within the TSF from unau-
thorized disclosure, modification, and substitution. Public keys shall be protected
within the TSF against unauthorized modification and substitution.
Random Number Generators (RNGs)
A TSF may employ random number generators (RNGs). If a TSF employs Ap-
proved or non-Approved RNGs in an Approved mode of operation, the data output
from the RNG shall pass the continuous random number generator test as specified
in 5.1.7 . The data output from an Approved RNG shall pass all statistical tests for
randomness as specified in 5.1.7. Approved deterministic RNGs shall be subject
to the cryptographic algorithm test in 5.1.7.
An Approved RNG shall be used for the generation of cryptographic keys used by
an Approved security function. The output from a non-Approved RNG may be
used 1) as input (e.g., seed, and seed key) to an Approved deterministic RNG or 2)
to generate initialization vectors (IVs) for Approved security function(s). The seed
and seed key shall not have the same value.
Key Generation
A TSF may generate cryptographic keys internally. Cryptographic keys generated
by the TSF for use by an Approved algorithm or security function shall be gen-
erated using an Approved key generation method. If an Approved key generation
method requires input from a RNG, then an Approved RNG that meets the stated
requirements shall be used.
Compromising the security of the key generation method (e.g., guessing the seed
value to initialize the deterministic RNG) shall require as least as many operations
as determining the value of the generated key.
86 CHAPTER 5. IT SECURITY REQUIREMENTS
If a seed key is entered during the key generation process, entry of the key shall
meet the key entry requirements specified above. If intermediate key generation
values are output from the TSF, the values shall be output either 1) in encrypted
form or 2) under split knowledge procedures.
FCS_CKM.2 Cryptographic key distribution
Cryptographic key distribution requires cryptographic keys to be distributed in accordance
with a specified distribution method which can be based on an assigned standard.
FCS_CKM.2.1 The TSF shall distribute cryptographic keys in accordance with a spec-
ified cryptographic key distribution method [ST ASSIGNMENT: (cryptographic
key distribution method) ] that meets the following: [ST ASSIGNMENT: (list of
standards) ].
These distribution methods and standards are referred herein as "Approved".
Key Establishment
Key establishment may be performed by automated methods (e.g., use of a public
key algorithm), manual methods (use of a manually-transported key loading de-
vice), or a combination of automated and manual methods. If key establishment
methods are employed by a TSF, only Approved key establishment methods shall
be used. If, in lieu of an Approved key establishment method, a radio communica-
tions TSF implements Over-The-Air-Rekeying, it shall be implemented as specified
in the citetia.
Compromising the security of the key establishment method (e.g., compromising
the security of the algorithm used for key establishment) shall require at least as
many operations as determining the value of the cryptographic key being trans-
ported or agreed upon.
If a key transport method is used, the cryptographic key being transported shall
meet the key following entry/output requirements.
If a key agreement method is used (e.g., a cryptographic key is derived from shared
intermediate values), the shared values are not required to meet these key entry/output
requirements.
Key Entry and Output
Cryptographic keys may be entered into or output from a TSF. If cryptographic
keys are entered into or output from a TSF, the entry or output of keys shall be
performed using either manual (e.g., via a keyboard) or electronic methods (e.g.,
smart cards/tokens, PC cards, or other electronic key loading devices).
A seed key, if entered during key generation, shall be entered in the same manner
as cryptographic keys.
All encrypted secret and private keys, entered into or output from a TSF and used in
an Approved mode of operation, shall be encrypted using an Approved algorithm.
Public keys may be entered into or output from a TSF in plaintext form. A TSF shall
associate a key (secret, private, or public) entered into or output from the module
with the correct entity (i.e., person, group, or process) to which the key is assigned.
Manually-entered cryptographic keys (keys entered using manual methods) shall
be verified during entry into a TSF for accuracy using the manual key entry test
specified in 5.1.7 During key entry, the manually entered values may be temporarily
displayed to allow visual verification and to improve accuracy. The plaintext values
of the cryptographic keys or key components shall not be displayed.
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 87
Secret and private keys established using automated methods shall be entered into
and output from a TSF in encrypted form.
Secret and private keys established using manual methods shall be entered into
or output from a TSF either (1) in encrypted form or (2) using split knowledge
procedures (i.e., as two or more plaintext cryptographic key components).
If split knowledge procedures are used:
• the TSF shall separately authenticate the operator entering or outputting each
key component,
• plaintext cryptographic key components shall be directly entered into or output
from the TSF (e.g., via a trusted path or directly attached cable) without trav-
eling through any enclosing or intervening systems where the key components
may inadvertently be stored, combined, or otherwise processed,
• at least two key components shall be required to reconstruct the original cryp-
tographic key.
FCS_CKM.3 Cryptographic key access
Cryptographic key access requires access to cryptographic keys to be performed in accor-
dance with a specified access method which can be based on an assigned standard.
FCS_CKM.3.1 The TSF shall perform [ST ASSIGNMENT: (type of cryptographic key
access) ] in accordance with a specified cryptographic key access method [ST AS-
SIGNMENT: (cryptographic key access method) ] that meets the following: [ST
ASSIGNMENT: (list of standards) ].
Key Storage
Cryptographic keys stored within a TSF shall be stored either in plaintext form
or encrypted form. Plaintext secret and private keys shall not be accessible from
outside the TSF to unauthorized operators.
A TSF shall associate a cryptographic key (secret, private, or public) stored within
the module with the correct entity (e.g., person, group, or process) to which the key
is assigned.
FCS_CKM.4 Cryptographic key destruction
Cryptographic key destruction requires cryptographic keys to be destroyed in accordance
with a specified destruction method which can be based on an assigned standard.
FCS_CKM.4.1 The TSF shall destroy cryptographic keys in accordance with a spec-
ified cryptographic key destruction method [ST ASSIGNMENT: (cryptographic
key destruction method) ] that meets the following: [ST ASSIGNMENT: (list of
standards) ].
Key Zeroization
A TSF shall provide methods to zeroize all plaintext secret and private crypto-
graphic keys and CSPs within the module. Zeroization of encrypted cryptographic
keys and CSPs or keys otherwise physically or logically protected within an addi-
tional embedded module that complies with this PP is not required.
FCS_COP - Cryptographic operation
In order for a cryptographic operation to function correctly, the operation must be performed in
accordance with a specified algorithm and with a cryptographic key of a specified size. This
88 CHAPTER 5. IT SECURITY REQUIREMENTS
family should be included whenever there are requirements for cryptographic operations to be
performed.
Typical cryptographic operations include data encryption and/or decryption, digital signature
generation and/or verification, cryptographic checksum generation for integrity and/or verifica-
tion of checksum, secure hash (message digest), cryptographic key encryption and/or decryption,
and cryptographic key agreement.
FCS_COP.1 Cryptographic operation
Cryptographic operation requires a cryptographic operation to be performed in accor-
dance with a specified algorithm and with a cryptographic key of specified sizes. The
specified algorithm and cryptographic key sizes can be based on an assigned standard.
FCS_COP.1.1 The TSF shall perform [ST ASSIGNMENT: (list of cryptographic op-
erations) ] in accordance with a specified cryptographic algorithm [ST ASSIGN-
MENT: (cryptographic algorithm) ] and cryptographic key sizes [ST ASSIGN-
MENT: (cryptographic key sizes) ] that meet the following: [ST ASSIGNMENT:
(list of standards) ].
5.1.4 FDP - User data protection
This class contains families specifying requirements for TOE security functions and TOE secu-
rity function policies related to protecting user data. FDP is split into four groups of families
(listed below) that address user data within a TOE, during import, export, and storage as well as
security attributes directly related to user data.
FDP_ACC - Access control policy
This family identifies the access control SFPs (by name) and defines the scope of control of
the policies that form the identified access control portion of the TSP. This scope of control is
characterised by three sets: the subjects under control of the policy, the objects under control of
the policy, and the operations among controlled subjects and controlled objects that are covered
by the policy. The criteria allows multiple policies to exist, each having a unique name. This
is accomplished by iterating components from this family once for each named access control
policy. The rules that define the functionality of an access control SFP will be defined by other
families such as FDP_ACF and FDP_SDI. The names of the access control SFPs identified here
in FDP_ACC are meant to be used throughout the remainder of the functional components that
have an operation that calls for an assignment or selection of an "access control SFP."
FDP_ACC.2 Complete access control
Complete access control requires that each identified access control SFP cover all opera-
tions on subjects and objects covered by that SFP. It further requires that all objects and
operations with the TSC are covered by at least one identified access control SFP.
FDP_ACC.2.1 The TSF shall enforce the Role Based Access Control, as defined in
[Nat00] with static separation of duties on all TOE subjects and objects and all
operations among subjects and objects covered by the SFP.
A TSF may permit an authenticated operator to perform all of the services allowed
within an authorized role, or may require separate authentication for each service or
for different sets of services. When a TSF is powered off and subsequently powered
on, the results of previous authentications shall not be retained and the TSF shall
require the operator to be re-authenticated.
Various types of authentication data may be required by a TSF to implement the
supported authentication mechanisms, including (but not limited to) the knowledge
or possession of a password, PIN, cryptographic key, or equivalent; possession of
a physical key, token, or equivalent; or verification of personal characteristics (e.g.,
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 89
biometrics). Authentication data within a TSF shall be protected against unautho-
rized disclosure, modification, and substitution.
The initialization of authentication mechanisms may warrant special treatment. If
a TSF does not contain the authentication data required to authenticate the operator
for the first time the module is accessed, then other authorized methods (e.g., pro-
cedural controls or use of factory-set or default authentication data) shall be used to
control access to the module and initialize the authentication mechanisms.
FDP_ACC.2.2 The TSF shall ensure that all operations between any subject in the TSC
and any object within the TSC are covered by an access control SFP.
FDP_ACF - Access control functions
This family describes the rules for the specific functions that can implement an access control
policy named in FDP_ACC. FDP_ACC specifies the scope of control of the policy.
FDP_ACF.1 Security attribute based access control
Security attribute based access control allows the TSF to enforce access based upon secu-
rity attributes and named groups of attributes. Furthermore, the TSF may have the ability
to explicitly authorise or deny access to an object based upon security attributes.
FDP_ACF.1.1 The TSF shall enforce the [ST ASSIGNMENT: (access control SFP) ]
to objects based on [ST ASSIGNMENT: (security attributes, named groups of
security attributes) ].
FDP_ACF.1.2 The TSF shall enforce the following rules to determine if an operation
among controlled subjects and controlled objects is allowed: [ST ASSIGNMENT:
(rules governing access among controlled subjects and controlled objects using
controlled operations on controlled objects) ].
FDP_ACF.1.3 The TSF shall explicitly authorise access of subjects to objects based on
the following additional rules: [ST ASSIGNMENT: (rules, based on security at-
tributes, that explicitly authorise access of subjects to objects) ].
FDP_ACF.1.4 The TSF shall explicitly deny access of subjects to objects based on the
[ST ASSIGNMENT: (rules, based on security attributes, that explicitly deny ac-
cess of subjects to objects) ].
FDP_DAU - Data authentication
Data authentication permits an entity to accept responsibility for the authenticity of information
(e.g., by digitally signing it). This family provides a method of providing a guarantee of the
validity of a specific unit of data that can be subsequently used to verify that the information
content has not been forged or fraudulently modified. In contrast to Class FAU, this family is
intended to be applied to "static" data rather than data that is being transferred.
FDP_DAU.2 Data authentication with identity of guarantor
Data Authentication with Identity of Guarantor additionally requires that the TSF is capa-
ble of establishing the identity of the subject who provided the guarantee of authenticity.
FDP_DAU.2.1 The TSF shall provide a capability to generate evidence that can be used
as a guarantee of the validity of [ST ASSIGNMENT: (list of objects or information
types) ].
FDP_DAU.2.2 The TSF shall provide [ST ASSIGNMENT: (list of subjects) ] with the
ability to verify evidence of the validity of the indicated information and the identity
of the user that generated the evidence.
90 CHAPTER 5. IT SECURITY REQUIREMENTS
FDP_ETC - Export to outside TSF control
This family defines functions for exporting user data from the TOE such that its security at-
tributes and protection either can be explicitly preserved or can be ignored once it has been ex-
ported. It is concerned with limitations on export and with the association of security attributes
with the exported user data.
FDP_ETC.1 Export of user data without security attributes
Export of user data without security attributes requires that the TSF enforce the appro-
priate SFPs when exporting user data outside the TSF. User data that is exported by this
function is exported without its associated security attributes.
FDP_ETC.1.1 The TSF shall enforce the [ST ASSIGNMENT: (access control SFP(s)
and/or information flow control SFP(s)) ] when exporting user data, controlled
under the SFP(s), outside of the TSC.
FDP_ETC.1.2 The TSF shall export the user data without the user data’s associated
security attributes.
FDP_ETC.2 Export of user data with security attributes
Export of user data with security attributes requires that the TSF enforce the appropriate
SFPs using a function that accurately and unambiguously associates security attributes
with the user data that is exported.
FDP_ETC.2.1 The TSF shall enforce the [ST ASSIGNMENT: (access control SFP(s)
and/or information flow control SFP(s)) ] when exporting user data, controlled
under the SFP(s), outside of the TSC.
FDP_ETC.2.2 The TSF shall export the user data with the user data’s associated security
attributes.
FDP_ETC.2.3 The TSF shall ensure that the security attributes, when exported outside
the TSC, are unambiguously associated with the exported user data.
FDP_ETC.2.4 The TSF shall enforce the following rules when user data is exported
from the TSC: [ST ASSIGNMENT: (additional exportation control rules) ].
FDP_IFC - Information flow control policy
This family identifies the information flow control SFPs (by name) and defines the scope of
control of the policies that form the identified information flow control portion of the TSP. This
scope of control is characterised by three sets: the subjects under control of the policy, the infor-
mation under control of the policy, and operations which cause controlled information to flow to
and from controlled subjects covered by the policy. The criteria allows multiple policies to exist,
each having a unique name. This is accomplished by iterating components from this family once
for each named information flow control policy. The rules that define the functionality of an
information flow control SFP will be defined by other families such as FDP_IFF and FDP_SDI.
The names of the information flow control SFPs identified here in FDP_IFC are meant to be used
throughout the remainder of the functional components that have an operation that calls for an
assignment or selection of an "information flow control SFP."
FDP_IFC.1 Subset information flow control
Subset information flow control requires that each identified information flow control
SFPs be in place for a subset of the possible operations on a subset of information flows
in the TOE.
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 91
FDP_IFC.1.1 The TSF shall enforce the following information control flow model
and policy on all subjects, information, and operations that cause controlled
information to flow to and from controlled subjects covered by the SFP:
Iff model
Two levels of nondisclosure are defined, Lk, secret level, where private keys are
known, and Lp, public level, whose objects are the results of applying crypto-
graphic functions to those keys at Lk.
The system is said to be secure if the contents of Lk are only known to the defined
set of allowed subjects. No restriction is applied to Lp, where universal access is
granted to its content.
Initially, the system is as secure as it will ever be. On using the keys at Lk, Lp is
populated with the results of every usage, and each one is a small leakage of the
secrecy of the applied key. System security degrades over Lk usage, and the speed
of this degradation is proportional to the weakness of the cryptographic function
and used keys.
System insecurity can be modeled as the certainty that any of its secrets at Lk can
be publicly known:
SI = maxn
k=0
Pm
f=0
CARD(Lpf(k)
)
ST RENGT H(f)
where
SI is the system insecurity value.
CARD(Lpf(k)
) is the cardinality of function f applications on key k.
STRENGTH(f) is the current strength of function f to cryptanalysis 1
The bottom line is that Lk and Lp do not follow general iff models where informa-
tion can only flow to upper levels. In a PKI case, the secret is slowly transmitted to
the lower or public level, and this is a tolerated leakage. The above function can be
used to determine the system secure life time.
Iff policy
1. No complete disclosure of the private keys at Lk shall be allowed by the sys-
tem.
2. Lk secrecy leakages shall only be allowed by the application of cryptographic
functions.
This allows to verify the system implementation, in that no system operation or
information flow path violates the first rule, and that the only disclosure channels
are those approved cryptographic functions.
Note that the intended system security level is directly affected by the strength of
the cryptographic algorithms, key sizes and standards that must be instantiated at
the TOE ST as defined at FCS (See 5.1.3).
FDP_IFF - Information flow control functions
This family descibes the rules for the specific functions that can implement the information flow
control SFPs named in FDP_IFC, which also specifies the scope of control of the policy. It
consists of two kinds of requirements: one addressing the common information flow function
1See [Bor44] for a detailed definition of future cryptanalysis techniques and methods.
92 CHAPTER 5. IT SECURITY REQUIREMENTS
issues, and a second addressing illicit information flows (i.e. covert channels). This division
arises because the issues concerning illicit information flows are, in some sense, orthogonal to
the rest of an information flow control SFP. By their nature they circumvent the information flow
control SFP resulting in a violation of the policy. As such, they require special functions to either
limit or prevent their occurrence.
FDP_IFF.1 Simple security attributes
Simple security attributes requires security attributes on information, and on subjects that
cause that information to flow and on subjects that act as recipients of that information.
It specifies the rules that must be enforced by the function, and describes how security
attributes are derived by the function.
FDP_IFF.1.1 The TSF shall enforce the [ST ASSIGNMENT: (information flow control
SFP) ] based on the following types of subject and information security attributes:
[ST ASSIGNMENT: (the minimum number and type of security attributes) ].
FDP_IFF.1.2 The TSF shall permit an information flow between a controlled subject and
controlled information via a controlled operation if the following rules hold: [ST
ASSIGNMENT: (for each operation, the security attribute-based relationship
that must hold between subject and information security attributes) ].
FDP_IFF.1.3 The TSF shall enforce the [ST ASSIGNMENT: (additional information
flow control SFP rules) ].
FDP_IFF.1.4 The TSF shall provide the following [ST ASSIGNMENT: (list of addi-
tional SFP capabilities) ].
FDP_IFF.1.5 The TSF shall explicitly authorise an information flow based on the follow-
ing rules: [ST ASSIGNMENT: (rules, based on security attributes, that explicitly
authorise information flows) ].
FDP_IFF.1.6 The TSF shall explicitly deny an information flow based on the following
rules: [ST ASSIGNMENT: (rules, based on security attributes, that explicitly
deny information flows) ].
FDP_IFF.3 Limited illicit information flows
Limited illicit information flows requires the SFP to cover illicit information flows, but
not necessarily eliminate them.
FDP_IFF.3.1 The TSF shall enforce the [ST ASSIGNMENT: (information flow control
SFP) ] to limit the capacity of [ST ASSIGNMENT: (types of illicit information
flows) ] to a [ST ASSIGNMENT: (maximum capacity) ].
FDP_ITC - Import from outside TSF control
This family defines the mechanisms for introduction of user data into the TOE such that it has
appropriate security attributes and is appropriately protected. It is concerned with limitations on
importation, determination of desired security attributes, and interpretation of security attributes
associated with the user data.
FDP_ITC.1 Import of user data without security attributes
Import of user data without security attributes requires that the security attributes correctly
represent the user data and are supplied separately from the object.
FDP_ITC.1.1 The TSF shall enforce the [ST ASSIGNMENT: (access control SFP and/or
information flow control SFP) ] when importing user data, controlled under the
SFP, from outside of the TSC.
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 93
FDP_ITC.1.2 The TSF shall ignore any security attributes associated with the user data
when imported from outside the TSC.
FDP_ITC.1.3 The TSF shall enforce the following rules when importing user data con-
trolled under the SFP from outside the TSC: [ST ASSIGNMENT: (additional im-
portation control rules) ].
FDP_ITC.2 Import of user data with security attributes
Import of user data with security attributes requires that security attributes correctly rep-
resent the user data and are accurately and unambiguously associated with the user data
imported from outside the TSC.
FDP_ITC.2.1 The TSF shall enforce the [ST ASSIGNMENT: (access control SFP and/or
information flow control SFP) ] when importing user data, controlled under the
SFP, from outside of the TSC.
FDP_ITC.2.2 The TSF shall use the security attributes associated with the imported user
data.
FDP_ITC.2.3 The TSF shall ensure that the protocol used provides for the unambiguous
association between the security attributes and the user data received.
FDP_ITC.2.4 The TSF shall ensure that interpretation of the security attributes of the
imported user data is as intended by the source of the user data.
FDP_ITC.2.5 The TSF shall enforce the following rules when importing user data con-
trolled under the SFP from outside the TSC: [ST ASSIGNMENT: (additional im-
portation control rules) ].
FDP_ITT - Internal TOE transfer
This family provides requirements that address protection of user data when it is transferred
between parts of a TOE across an internal channel. This may be contrasted with the FDP_UCT
and FDP_UIT families, which provide protection for user data when it is transferred between
distinct TSFs across an external channel, and FDP_ETC and FDP_ITC, which address transfer
of data to or from outside the TSF’s control.
FDP_ITT.2 Transmission separation by attribute
Transmission separation by attribute requires separation of data based on the value of
SFP-relevant attributes in addition to the first component.
FDP_ITT.2.1 The TSF shall enforce the [ST ASSIGNMENT: (access control SFP(s)
and/or information flow control SFP(s)) ] to prevent the [ST SELECTION: (dis-
closure, modification, loss of use)] of user data when it is transmitted between
physically-separated parts of the TOE.
FDP_ITT.2.2 The TSF shall separate data controlled by the SFP(s) when transmitted be-
tween physically-separated parts of the TOE, based on the values of the following:
[ST ASSIGNMENT: (security attributes that require separation) ].
FDP_RIP - Residual information protection
This family addresses the need to ensure that deleted information is no longer accessible, and
that newly created objects do not contain information that should not be accessible. This family
requires protection for information that has been logically deleted or released, but may still be
present within the TOE.
94 CHAPTER 5. IT SECURITY REQUIREMENTS
FDP_RIP.2 Full residual information protection
Full residual information protection requires that the TSF ensure that any residual infor-
mation content of any resources is unavailable to all objects upon the resource’s allocation
or deallocation.
FDP_RIP.2.1 The TSF shall ensure that any previous information content of a resource
is made unavailable upon the deallocation of the resource from all objects.
FDP_SDI - Stored data integrity
This family provides requirements that address protection of user data while it is stored within
the TSC. Integrity errors may affect user data stored in memory, or in a storage device. This
family differs from FDP_ITT Internal TOE transfer which protects the user data from integrity
errors while being transferred within the TOE.
FDP_SDI.2 Stored data integrity monitoring and action
Stored data integrity monitoring and action adds the additional capability to the first com-
ponent by allowing for actions to be taken as a result of an error detection.
FDP_SDI.2.1 The TSF shall monitor user data stored within the TSC for [ST ASSIGN-
MENT: (integrity errors) ] on all objects, based on the following attributes: [ST
ASSIGNMENT: (user data attributes) ].
FDP_SDI.2.2 Upon detection of a data integrity error, the TSF shall [ST ASSIGNMENT:
(action to be taken) ].
FDP_UIT - Inter-TSF user data integrity transfer protection
This family defines the requirements for providing integrity for user data in transit between the
TSF and another trusted IT product and recovering from detectable errors. At a minimum, this
family monitors the integrity of user data for modifications. Furthermore, this family supports
different ways of correcting detected integrity errors.
FDP_UIT.1 Data exchange integrity
Data exchange integrity addresses detection of modifications, deletions, insertions, and
replay errors of the user data transmitted.
FDP_UIT.1.1 The TSF shall enforce the [ST ASSIGNMENT: (access control SFP(s)
and/or information flow control SFP(s)) ] to be able to [ST SELECTION: (trans-
mit, receive)] user data in a manner protected from [ST SELECTION: (modifica-
tion, deletion, insertion, replay)] errors.
FDP_UIT.1.2 The TSF shall be able to determine on receipt of user data, whether [ST
SELECTION: (modification, deletion, insertion, replay)] has occurred.
FDP_UIT.3 Destination data exchange recovery
Destination data exchange recovery addresses recovery of the original user data by the
receiving TSF on its own without any help from the source trusted IT product.
FDP_UIT.3.1 The TSF shall enforce the [ST ASSIGNMENT: (access control SFP(s)
and/or information flow control SFP(s)) ] to be able to recover from [ST AS-
SIGNMENT: (list of recoverable errors) ] without any help from the source trusted
IT product.
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 95
5.1.5 FIA - Identification and authentication
Identification and Authentication is required to ensure that users are associated with the proper
security attributes (e.g. identity, groups, roles, security or integrity levels).
The unambiguous identification of authorised users and the correct association of security at-
tributes with users and subjects is critical to the enforcement of the intended security policies.
The families in this class deal with determining and verifying the identity of users, determining
their authority to interact with the TOE, and with the correct association of security attributes for
each authorised user. Other classes of requirements (e.g. User Data Protection, Security Audit)
are dependent upon correct identification and authentication of users in order to be effective.
FIA_AFL - Authentication failures
This family contains requirements for defining values for some number of unsuccessful authen-
tication attempts and TSF actions in cases of authentication attempt failures. Parameters include,
but are not limited to, the number of failed authentication attempts and time thresholds.
FIA_AFL.1 Authentication failure handling
Requires that the TSF be able to terminate the session establishment process after a spec-
ified number of unsuccessful user authentication attempts. It also requires that, after
termination of the session establishment process, the TSF be able to disable the user ac-
count or the point of entry (e.g. workstation) from which the attempts were made until an
administrator-defined condition occurs.
FIA_AFL.1.1 The TSF shall detect when [ST ASSIGNMENT: (number) ] unsuccessful
authentication attempts occur related to [ST ASSIGNMENT: (list of authentication
events) ].
FIA_AFL.1.2 When the defined number of unsuccessful authentication attempts has
been met or surpassed, the TSF shall [ST ASSIGNMENT: (list of actions) ].
FIA_ATD - User attribute definition
All authorised users may have a set of security attributes, other than the user’s identity, that
is used to enforce the TSP. This family defines the requirements for associating user security
attributes with users as needed to support the TSP.
FIA_ATD.1 User attribute definition
User attribute definition, allows user security attributes for each user to be maintained
individually.
FIA_ATD.1.1 The TSF shall maintain the following list of security attributes belonging
to individual users: [ST ASSIGNMENT: (list of security attributes) ].
FIA_SOS - Specification of secrets
This family defines requirements for mechanisms that enforce defined quality metrics on pro-
vided secrets and generate secrets to satisfy the defined metric.
FIA_SOS.1 Verification of secrets
Verification of secrets requires the TSF to verify that secrets meet defined quality metrics.
FIA_SOS.1.1 The TSF shall provide a mechanism to verify that secrets meet the follow-
ing specifications:
• For each attempt to use the authentication mechanism, the probability shall
be less than one in 1,000,000 that a random attempt will succeed or a false
acceptance will occur (e.g., guessing a password or PIN, false acceptance error
rate of a biometric device, or some combination of authentication methods).
96 CHAPTER 5. IT SECURITY REQUIREMENTS
• For multiple attempts to use the authentication mechanism during a one-minute
period, the probability shall be less than one in 100,000 that a random attempt
will succeed or a false acceptance will occur.
• Feedback of authentication data to an operator shall be obscured during au-
thentication (e.g., no visible display of characters when entering a password).
• Feedback provided to an operator during an attempted authentication shall not
weaken the strength of the authentication mechanism.
FIA_SOS.2 TSF Generation of secrets
Generation of secrets requires the TSF to be able to generate secrets that meet defined
quality metrics.
FIA_SOS.2.1 The TSF shall provide a mechanism to generate secrets that meet [ST
ASSIGNMENT: (a defined quality metric) ].
FIA_SOS.2.2 The TSF shall be able to enforce the use of TSF generated secrets for [ST
ASSIGNMENT: (list of TSF functions) ].
FIA_UAU - User authentication
This family defines the types of user authentication mechanisms supported by the TSF. This
family also defines the required attributes on which the user authentication mechanisms must be
based.
FIA_UAU.2 User authentication before any action
User authentication before any action, requires that users authenticate themselves before
any action will be allowed by the TSF.
FIA_UAU.2.1 The TSF shall require each user to be successfully authenticated before
allowing any other TSF-mediated actions on behalf of that user.
FIA_UAU.6 Re-authenticating
Re-authenticating, requires the ability to specify events for which the user needs to be
re-authenticated.
FIA_UAU.6.1 The TSF shall re-authenticate the user under the conditions [ST ASSIGN-
MENT: (list of conditions under which re-authentication is required) ].
FIA_UAU.7 Protected authentication feedback
Protected authentication feedback, require that only limited feedback information is pro-
vided to the user during the authentication.
FIA_UAU.7.1 The TSF shall provide only [ST ASSIGNMENT: (list of feedback) ] to the
user while the authentication is in progress.
FIA_UID - User identification
This family defines the conditions under which users shall be required to identify themselves
before performing any other actions that are to be mediated by the TSF and which require user
identification.
FIA_UID.2 User identification before any action
User identification before any action, require that users identify themselves before any
action will be allowed by the TSF.
FIA_UID.2.1 The TSF shall require each user to identify itself before allowing any other
TSF mediated actions on behalf of that user.
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 97
FIA_USB - User-subject binding
An authenticated user, in order to use the TOE, typically activates a subject. The user’s security
attributes are associated (totally or partially) with this subject. This family defines requirements
to create and maintain the association of the user’s security attributes to a subject acting on the
user’s behalf.
FIA_USB.1 User-subject binding
User-subject binding requires the maintenance of an association between the user’s secu-
rity attributes and a subject acting on the user’s behalf.
FIA_USB.1.1 The TSF shall associate the appropriate user security attributes with sub-
jects acting on behalf of that user.
5.1.6 FMT - Security management
This class is intended to specify the management of several aspects of the TSF: security at-
tributes, TSF data and functions. The different management roles and their interaction, such as
separation of capability, can be specified.
FMT_MOF - Management of functions in TSF
This family allows authorised users control over the management of functions in the TSF. Exam-
ples of functions in the TSF include the audit functions and the multiple authentication functions.
FMT_MOF.1 Management of security functions behaviour
Management of security functions behaviour allows the authorised users (roles) to manage
the behaviour of functions in the TSF that use rules or have specified conditions that may
be manageable.
FMT_MOF.1.1 The TSF shall restrict the ability to [ST SELECTION: (determine the
behavior of, disable, enable, modify the behavior of)] the functions
1. Management actions due to FAU_SAR.1 (See 5.1.1):
• Maintenance (deletion, modification, addition) of the group of users with
read access right to the audit records.
2. Management actions due to FAU_SEL.1 (See 5.1.1):
• Maintenance of the rights to view/modify the audit events.
3. Management actions due to FAU_STG.2 (See 5.1.1):
• Maintenance of the parameters that control the audit storage capability.
4. Management actions due to FAU_STG.4 (See 5.1.1):
• Maintenance (deletion, modification, addition) of actions to be taken in
case of audit storage failure.
5. Management actions due to FCO_NRO.2 (See 5.1.2):
• The management of changes to information types, fields, originator at-
tributes and recipients of evidence.
6. Management actions due to FCS_CKM.1 (See 5.1.3):
• The management of changes to cryptographic key attributes. Examples of
key attributes include user, key type (e.g. public, private, secret), validity
period, and use (e.g. digital signature, key encryption, key agreement,
data encryption).
7. Management actions due to FCS_CKM.2 (See 5.1.3):
• The management of changes to cryptographic key attributes. Examples of
key attributes include user, key type (e.g. public, private, secret), validity
period, and use (e.g. digital signature, key encryption, key agreement,
data encryption).
98 CHAPTER 5. IT SECURITY REQUIREMENTS
8. Management actions due to FCS_CKM.3 (See 5.1.3):
• The management of changes to cryptographic key attributes. Examples of
key attributes include user, key type (e.g. public, private, secret), validity
period, and use (e.g. digital signature, key encryption, key agreement,
data encryption).
9. Management actions due to FCS_CKM.4 (See 5.1.3):
• The management of changes to cryptographic key attributes. Examples of
key attributes include user, key type (e.g. public, private, secret), validity
period, and use (e.g. digital signature, key encryption, key agreement,
data encryption).
10. Management actions due to FDP_ACF.1 (See 5.1.4):
• Managing the attributes used to make explicit access or denial based de-
cisions.
11. Management actions due to FDP_DAU.2 (See 5.1.4):
• The assignment or modification of the objects for which data authentica-
tion may apply could be configurable in the system.
12. Management actions due to FDP_ETC.2 (See 5.1.4):
• The additional exportation control rules could be configurable by a user
in a defined role.
13. Management actions due to FDP_IFF.1 (See 5.1.4):
• Managing the attributes used to make explicit access based decisions.
14. Management actions due to FDP_ITC.1 (See 5.1.4):
• The modification of the additional control rules used for import.
15. Management actions due to FDP_ITC.2 (See 5.1.4):
• The modification of the additional control rules used for import.
16. Management actions due to FDP_ITT.2 (See 5.1.4):
• If the TSF provides multiple methods to protect user data during trans-
mission between physically separated parts of the TOE, the TSF could
provide a pre-defined role with the ability to select the method that will
be used.
17. Management actions due to FDP_RIP.2 (See 5.1.4):
• The choice of when to perform residual information protection (i.e. upon
allocation or deallocation) could be made configurable within the TOE.
18. Management actions due to FDP_SDI.2 (See 5.1.4):
• The actions to be taken upon the detection of an integrity error could be
configurable.
19. Management actions due to FIA_AFL.1 (See 5.1.5):
• Management of the threshold for unsuccessful authentication attempts;
• management of actions to be taken in the event of an authentication fail-
ure.
20. Management actions due to FIA_ATD.1 (See 5.1.5):
• If so indicated in the assignment, the authorised administrator might be
able to define additional security attributes for users.
21. Management actions due to FIA_SOS.1 (See 5.1.5):
• The management of the metric used to verify the secrets.
22. Management actions due to FIA_SOS.2 (See 5.1.5):
• The management of the metric used to generate the secrets.
23. Management actions due to FIA_UAU.2 (See 5.1.5):
• Management of the authentication data by an administrator;
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 99
• management of the authentication data by the user associated with this
data.
24. Management actions due to FIA_UAU.6 (See 5.1.5):
• If an authorised administrator could request re-authentication, the man-
agement includes a re-authentication request.
25. Management actions due to FIA_UID.2 (See 5.1.5):
• The management of the user identities.
26. Management actions due to FIA_USB.1 (See 5.1.5):
• An authorised administrator can define default subject security attributes.
27. Management actions due to FMT_MOF.1 (See 5.1.6):
• Managing the group of roles that can interact with the functions in the
TSF;
28. Management actions due to FMT_MSA.1 (See 5.1.6):
• Managing the group of roles that can interact with the security attributes.
29. Management actions due to FMT_MSA.3 (See 5.1.6):
• Managing the group of roles that can specify initial values;
• managing the permissive or restrictive setting of default values for a given
access control SFP.
30. Management actions due to FMT_MTD.1 (See 5.1.6):
• Managing the group of roles that can interact with the TSF data.
31. Management actions due to FMT_MTD.2 (See 5.1.6):
• Managing the group of roles that can interact with the limits on the TSF
data.
32. Management actions due to FMT_REV.1 (See 5.1.6):
• Managing the group of roles that can invoke revocation of security at-
tributes;
• managing the lists of users, subjects, objects and other resources for
which revocation is possible;
• managing the revocation rules.
33. Management actions due to FMT_SAE.1 (See 5.1.6):
• Managing the list of security attributes for which expiration is to be sup-
ported;
• the actions to be taken if the expiration time has passed.
34. Management actions due to FMT_SMR.2 (See 5.1.6):
• Managing the group of users that are part of a role;
• managing the conditions that the roles must satisfy.
35. Management actions due to FPT_AMT.1 (See 5.1.7):
• Management of the conditions under which abstract machine test occurs,
such as during initial start-up, regular interval, or under specified condi-
tions;
• management of the time interval if appropriate.
36. Management actions due to FPT_ITT.1 (See 5.1.7):
• Management of the types of modification against which the TSF should
protect;
• management of the mechanism used to provide the protection of the data
in transit between different parts of the TSF.
37. Management actions due to FPT_RCV.1 (See 5.1.7):
• Management of who can access the restore capability within the mainte-
nance mode.
100 CHAPTER 5. IT SECURITY REQUIREMENTS
38. Management actions due to FPT_STM.1 (See 5.1.7):
• Management of the time.
39. Management actions due to FPT_TST.1 (See 5.1.7):
• Management of the conditions under which TSF self testing occurs, such
as during initial start-up, regular interval, or under specified conditions;
• management of the time interval if appropriate.
40. Management actions due to FRU_PRS.2 (See 5.1.8):
• Assignment of priorities to each subject in the TSF.
41. Management actions due to FRU_RSA.2 (See 5.1.8):
• Specifying minimum and maximum limits for a resource for groups and/
or individual users and/or subjects by an administrator.
42. Management actions due to FTA_MCS.2 (See 5.1.9):
• Management of the rules that govern the maximum allowed number of
concurrent user sessions by an administrator.
43. Management actions due to FTA_SSL.1 (See 5.1.9):
• Specification of the time of user inactivity after which lock-out occurs for
an individual user;
• specification of the default time of user inactivity after which lock-out
occurs;
• management of the events that should occur prior to unlocking the ses-
sion.
44. Management actions due to FTA_SSL.2 (See 5.1.9):
• Management of the events that should occur prior to unlocking the ses-
sion.
45. Management actions due to FTA_SSL.3 (See 5.1.9):
• Specification of the time of user inactivity after which termination of the
interactive session occurs for an individual user;
• specification of the default time of user inactivity after which termination
of the interactive session occurs.
46. Management actions due to FTA_TAB.1 (See 5.1.9):
• Maintenance of the banner by the authorised administrator.
47. Management actions due to FTA_TSE.1 (See 5.1.9):
• Management of the session establishment conditions by the authorised
administrator.
48. Management actions due to FTP_ITC.1 (See 5.1.10):
• Configuring the actions that require trusted channel, if supported.
49. Management actions due to FTP_TRP.1 (See 5.1.10):
• Configuring the actions that require trusted path, if supported.
to [ST ASSIGNMENT: (the authorized identified roles) ].
FMT_MSA - Management of security attributes
This family allows authorised users control over the management of security attributes. This
management might include capabilities for viewing and modifying of security attributes.
FMT_MSA.1 Management of security attributes
Management of security attributes allows authorised users (roles) to manage the specified
security attributes.
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 101
FMT_MSA.1.1 The TSF shall enforce the [ST ASSIGNMENT: (access control SFP, in-
formation flow control SFP) ] to restrict the ability to [ST SELECTION: (change_default,
query, modify, delete, [ST ASSIGNMENT: (other operations) ])] the security at-
tributes [ST ASSIGNMENT: (list of security attributes) ] to [ST ASSIGNMENT:
(the authorised identified roles) ].
FMT_MSA.2 Secure security attributes
Secure security attributes ensures that values assigned to security attributes are valid with
respect to the secure state.
FMT_MSA.2.1 The TSF shall ensure that only secure values are accepted for security
attributes.
FMT_MSA.3 Static attribute initialisation
Static attribute initialisation ensures that the default values of security attributes are ap-
propriately either permissive or restrictive in nature.
FMT_MSA.3.1 The TSF shall enforce the [ST ASSIGNMENT: (access control SFP, in-
formation flow control SFP) ] to provide [ST SELECTION: (restrictive, permis-
sive, other property)] default values for security attributes that are used to enforce
the SFP.
FMT_MSA.3.2 The TSF shall allow the [ST ASSIGNMENT: (the authorised identified
roles) ] to specify alternative initial values to override the default values when an
object or information is created.
FMT_MTD - Management of TSF data
This family allows authorised users (roles) control over the management of TSF data. Examples
of TSF data include audit information, clock, system configuration and other TSF configuration
parameters.
FMT_MTD.1 Management of TSF data
Management of TSF data allows authorised users to manage TSF data.
FMT_MTD.1.1 The TSF shall restrict the ability to [ST SELECTION: (change_default,
query, modify, delete, clear, [ST ASSIGNMENT: (other operations) ])] the [ST
ASSIGNMENT: (list of TSF data) ] to [ST ASSIGNMENT: (the authorised identi-
fied roles) ].
FMT_MTD.2 Management of limits on TSF data
Management of limits on TSF data specifies the action to be taken if limits on TSF data
are reached or exceeded.
FMT_MTD.2.1 The TSF shall restrict the specification of the limits for [ST ASSIGN-
MENT: (list of TSF data) ] to [ST ASSIGNMENT: (the authorised identified roles)
].
FMT_MTD.2.2 The TSF shall take the following actions, if the TSF data are at, or
exceed, the indicated limits: [ST ASSIGNMENT: (actions to be taken) ].
FMT_MTD.3 Secure TSF data
Secure TSF data ensures that values assigned to TSF data are valid with respect to the
secure state.
FMT_MTD.3.1 The TSF shall ensure that only secure values are accepted for TSF data.
102 CHAPTER 5. IT SECURITY REQUIREMENTS
FMT_REV - Revocation
This family addresses revocation of security attributes for a variety of entities within a TOE.
FMT_REV.1 Revocation
Revocation provides for revocation of security attributes to be enforced at some point in
time.
FMT_REV.1.1 The TSF shall restrict the ability to revoke security attributes associated
with the [ST SELECTION: (users, subjects, objects, other additional resources)]
within the TSC to [ST ASSIGNMENT: (the authorised identified roles) ].
FMT_REV.1.2 The TSF shall enforce the rules [ST ASSIGNMENT: (specification of
revocation rules) ].
FMT_SAE - Security attribute expiration
This family addresses the capability to enforce time limits for the validity of security attributes.
FMT_SAE.1 Time-limited authorisation
Time-limited authorisation provides the capability for an authorised user to specify an
expiration time on specified security attributes.
FMT_SAE.1.1 The TSF shall restrict the capability to specify an expiration time for
[ST ASSIGNMENT: (list of security attributes for which expiration is to be sup-
ported) ] to [ST ASSIGNMENT: (the authorised identified roles) ].
FMT_SAE.1.2 For each of these security attributes, the TSF shall be able to [ST AS-
SIGNMENT: (list of actions to be taken for each security attribute) ] after the
expiration time for the indicated security attribute has passed.
FMT_SMR - Security management roles
This family is intended to control the assignment of different roles to users. The capabilities of
these roles with respect to security management are described in the other families in this class.
FMT_SMR.2 Restrictions on security roles
Restrictions on security roles specifies that in addition to the specification of the roles,
there are rules that control the relationship between the roles.
FMT_SMR.2.1 The TSF shall maintain the following roles:
Administrator In charge of installing, configuring, management of the TSF.
This role is assumed to perform cryptographic initialization or management
functions (e.g., module initialization, input/output of cryptographic keys and
CSPs).
Operator In charge of performing TOE backup and recovery.
User The user operates over the provided cryptographic functionality. Semantics
of these functions is irrelevant to this TOE.
Auditor Review and management of audit log.
The TSF may support other roles or sub-roles in addition to the roles specified
above, under the following premises:
• All plaintext secret and private keys and unprotected CSPs shall be zeroized
when entering or exiting the role.
• The separation of duties defined above is not violated under the new role ca-
pabilities.
FMT_SMR.2.2 The TSF shall be able to associate users with roles.
FMT_SMR.2.3 The TSF shall ensure that the conditions static separation of duties for
defined roles as defined by [Nat00] are satisfied.
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 103
5.1.7 FPT - Protection of the TSF
This class contains families of functional requirements that relate to the integrity and manage-
ment of the mechanisms that provide the TSF (independent of TSPspecifics) and to the integrity
of TSF data (independent of the specific contents of the TSP data). In some sense, families
in this class may appear to duplicate components in the FDP (User data protection) class; they
may even be implemented using the same mechanisms. However, FDP focuses on user data
protection, while FPT focuses on TSF data protection. In fact, components from the FPT class
are necessary to provide requirements that the SFPs in the TOE cannot be tampered with or
bypassed.
FPT_AMT - Underlying abstract machine test
This family defines requirements for the TSF to perform testing to demonstrate the security
assumptions made about the underlying abstract machine upon which the TSF relies. This "ab-
stract" machine could be a hardware/firmware platform, or it could be some known and assessed
hardware/software combination acting as a virtual machine.
FPT_AMT.1 Abstract machine testing
Abstract machine testing, provides for testing of the underlying abstract machine.
FPT_AMT.1.1 The TSF shall run a suite of tests during initial start-up, and every
time a component of the abstract machine is loaded or invoked, for example
when dynamically loading libraries, to demonstrate the correct operation of the
security assumptions provided by the abstract machine that underlies the TSF.
FPT_FLS - Fail secure
The requirements of this family ensure that the TOE will not violate its TSP in the event of
identified categories of failures in the TSF.
FPT_FLS.1 Failure with preservation of secure state
Failure with preservation of secure state, which requires that the TSF preserve a secure
state in the face of the identified failures.
FPT_FLS.1.1 The TSF shall preserve a secure state when the following types of failures
occur: [ST ASSIGNMENT: (list of types of failures in the TSF) ].
FPT_ITI - Integrity of exported TSF data
This family defines the rules for the protection, from unauthorised modification, of TSF data
during transmission between the TSF and a remote trusted IT product. This data could, for
example, be TSF critical data such as passwords, keys, audit data, or TSF executable code.
FPT_ITI.1 Inter-TSF detection of modification
Inter-TSF detection of modification, provides the ability to detect modification of TSF
data during transmission between the TSF and a remote trusted IT product, under the
assumption that the remote trusted IT product is cognisant of the mechanism used.
FPT_ITI.1.1 The TSF shall provide the capability to detect modification of all TSF data
during transmission between the TSF and a remote trusted IT product within the
following metric: [ST ASSIGNMENT: (a defined modification metric) ].
FPT_ITI.1.2 The TSF shall provide the capability to verify the integrity of all TSF data
transmitted between the TSF and a remote trusted IT product and perform [ST
ASSIGNMENT: (action to be taken) ] if modifications are detected.
104 CHAPTER 5. IT SECURITY REQUIREMENTS
FPT_ITT - Internal TOE TSF data transfer
This family provides requirements that address protection of TSF data when it is transferred
between separate parts of a TOE across an internal channel.
FPT_ITT.1 Basic internal TSF data transfer protection
Basic internal TSF data transfer protection, requires that TSF data be protected when
transmitted between separate parts of the TOE.
FPT_ITT.1.1 The TSF shall protect TSF data from [ST SELECTION: (disclosure, mod-
ification)] when it is transmitted between separate parts of the TOE.
FPT_RCV - Trusted recovery
The requirements of this family ensure that the TSF can determine that the TOE is started up
without protection compromise and can recover without protection compromise after disconti-
nuity of operations. This family is important because the start-up state of the TSF determines the
protection of subsequent states.
FPT_RCV.1 Manual recovery
Manual recovery, allows a TOE to only provide mechanisms that involve human interven-
tion to return to a secure state.
FPT_RCV.1.1 After a failure or service discontinuity, the TSF shall enter a maintenance
mode where the ability to return the TOE to a secure state is provided.
FPT_RCV.4 Function recovery
Function recovery, provides for recovery at the level of particular SFs, ensuring either
successful completion or rollback of TSF data to a secure state.
FPT_RCV.4.1 The TSF shall ensure that [ST ASSIGNMENT: (list of SFs and failure
scenarios) ] have the property that the SF either completes successfully, or for the
indicated failure scenarios, recovers to a consistent and secure state.
FPT_RVM - Reference mediation
The requirements of this family address the "always invoked" aspect of a traditional reference
monitor. The goal of this family is to ensure, with respect to a given SFP, that all actions re-
quiring policy enforcement are validated by the TSF against the SFP. If the portion of the TSF
that enforces the SFP also meets the requirements of appropriate components from FPT_SEP
(Domain separation) and ADV_INT (TSF internals), then that portion of the TSF provides a
"reference monitor" for that SFP.
FPT_RVM.1 Non-bypassability of the TSP
Non-bypassability of the TSP, which requires non-bypassability for all SFPs in the TSP.
FPT_RVM.1.1 The TSF shall ensure that TSP enforcement functions are invoked and
succeed before each function within the TSC is allowed to proceed.
FPT_SEP - Domain separation
The components of this family ensure that at least one security domain is available for the TSF’s
own execution and that the TSF is protected from external interference and tampering (e.g. by
modification of TSF code or data structures) by untrusted subjects. Satisfying the requirements
of this family makes the TSF selfprotecting, meaning that an untrusted subject cannot modify or
damage the TSF.
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 105
FPT_SEP.3 Complete reference monitor
Complete reference monitor, requires that there be distinct domain(s) for TSP enforce-
ment, a domain for the remainder of the TSF, as well as domains for the non-TSF portions
of the TOE.
FPT_SEP.3.1 The unisolated portion of the TSF shall maintain a security domain for its
own execution that protects it from interference and tampering by untrusted sub-
jects.
FPT_SEP.3.2 The TSF shall enforce separation between the security domains of subjects
in the TSC.
FPT_SEP.3.3 The TSF shall maintain the part of the TSF that enforces the access control
and/ or information flow control SFPs in a security domain for its own execution
that protects them from interference and tampering by the remainder of the TSF
and by subjects untrusted with respect to the TSP.
FPT_SSP - State synchrony protocol
Distributed systems may give rise to greater complexity than monolithic systems through the po-
tential for differences in state between parts of the system, and through delays in communication.
In most cases synchronisation of state between distributed functions involves an exchange pro-
tocol, not a simple action. When malice exists in the distributed environment of these protocols,
more complex defensive protocols are required.
FPT_SSP.2 Mutual trusted acknowledgement
Mutual trusted acknowledgement requires mutual acknowledgment of the data exchange.
FPT_SSP.2.1 The TSF shall acknowledge, when requested by another part of the TSF,
the receipt of an unmodified TSF data transmission.
FPT_SSP.2.2 The TSF shall ensure that the relevant parts of the TSF know the correct
status of transmitted data among its different parts, using acknowledgements.
FPT_STM - Time stamps
This family addresses requirements for a reliable time stamp function within a TOE.
FPT_STM.1 Reliable time stamps
Reliable time stamps, which requires that the TSF provide reliable time stamps for TSF
functions.
FPT_STM.1.1 The TSF shall be able to provide reliable time stamps for its own use.
FPT_TDC - Inter-TSF TSF data consistency
In a distributed or composite system environment, a TOE may need to exchange TSF data (e.g.
the SFP-attributes associated with data, audit information, identification information) with an-
other trusted IT product. This family defines the requirements for sharing and consistent inter-
pretation of these attributes between the TSF of the TOE and a different trusted IT product.
FPT_TDC.1 Inter-TSF basic TSF data consistency
Inter-TSF basic TSF data consistency requires that the TSF provide the capability to en-
sure consistency of attributes between TSFs.
FPT_TDC.1.1 The TSF shall provide the capability to consistently interpret [ST AS-
SIGNMENT: (list of TSF data types) ] when shared between the TSF and another
trusted IT product.
106 CHAPTER 5. IT SECURITY REQUIREMENTS
FPT_TDC.1.2 The TSF shall use [ST ASSIGNMENT: (list of interpretation rules to
be applied by the TSF) ] when interpreting the TSF data from another trusted IT
product.
FPT_TRC - Internal TOE TSF data replication consistency
The requirements of this family are needed to ensure the consistency of TSF data when such data
is replicated internal to the TOE. Such data may become inconsistent if the internal channel be-
tween parts of the TOE becomes inoperative. If the TOE is internally structured as a network and
parts of the TOE network connections are broken, this may occur when parts become disabled.
FPT_TRC.1 Internal TSF consistency
Internal TSF consistency, which requires that the TSF ensure the consistency of TSF data
that is replicated in multiple locations.
FPT_TRC.1.1 The TSF shall ensure that TSF data is consistent when replicated between
parts of the TOE.
FPT_TRC.1.2 When parts of the TOE containing replicated TSF data are disconnected,
the TSF shall ensure the consistency of the replicated TSF data upon reconnection
before processing any requests for [ST ASSIGNMENT: (list of SFs dependent on
TSF data replication consistency) ].
FPT_TST - TSF self test
The family defines the requirements for the self-testing of the TSF with respect to some expected
correct operation. Examples are interfaces to enforcement functions, and sample arithmetical op-
erations on critical parts of the TOE. These tests can be carried out at start-up, periodically, at
the request of the authorised user, or when other conditions are met. The actions to be taken by
the TOE as the result of self testing are defined in other families.
The requirements of this family are also needed to detect the corruption of TSF executable code
(i.e. TSF software) and TSF data by various failures that do not necessarily stop the TOE’s op-
eration (which would be handled by other families). These checks must be performed because
these failures may not necessarily be prevented. Such failures can occur either because of unfore-
seen failure modes or associated oversights in the design of hardware, firmware, or software, or
because of malicious corruption of the TSF due to inadequate logical and/or physical protection.
FPT_TST.1 TSF testing
TSF testing, provides the ability to test the TSF’s correct operation. These tests may be
performed at start-up, periodically, at the request of the authorised user, or when other
conditions are met. It also provides the ability to verify the integrity of TSF data and
executable code.
FPT_TST.1.1 A TSF shall perform power-up self-tests and conditional self-tests to en-
sure that the module is functioning properly. Power-up self-tests shall be performed
when the TSF is powered up. Conditional self-tests shall be performed when an ap-
plicable security function or operation is invoked (i.e., security functions for which
self-tests are required).
The TSF shall run a suite of additional self tests [ST SELECTION: (during initial
start-up, periodically during normal operation, at the request of the autho-
rized user, at the conditions [ST ASSIGNMENT: (conditions under which self
test should occur) ])] to demonstrate the correct operation of the TSF.
If a TSF fails a self-test, the module shall enter an error state and output an error in-
dicator via the status output interface. The TSF shall not perform any cryptographic
operations while in an error state. All data output via the data output interface shall
be inhibited when an error state exists.
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 107
Power-Up Tests
Power-up tests shall be performed by a TSF when the TOE is powered up (after
being powered off, reset, rebooted, etc.). The power-up tests shall be initiated au-
tomatically and shall not require operator intervention. When the power-up tests
are completed, the results (i.e., indications of success or failure) shall be output via
the status output interface. All data output via the data output interface shall be
inhibited when the power-up tests are performed.
In addition to performing the power-up tests when powered up, a TSF shall permit
operators to initiate the tests on demand for periodic testing of the TSF. Resetting,
rebooting, and power cycling are acceptable means for the on-demand initiation of
power-up tests.
A TSF shall perform the following power-up tests:
• Cryptographic algorithm test.
• Software/firmware integrity test.
• Critical functions test.
• Statistical random number generator tests.
Cryptographic algorithm test. A cryptographic algorithm test using a known an-
swer shall be conducted for all modes (e.g., encryption, decryption, authentication,
and deterministic random number generation) of each Approved cryptographic al-
gorithm implemented by a TSF. A known-answer test involves operating the cryp-
tographic algorithm on data for which the correct output is already known and com-
paring the calculated output with the previously generated output (the known an-
swer). If the calculated output does not equal the known answer, the known-answer
test shall fail.
Cryptographic algorithms whose outputs vary for a given set of inputs shall be
tested using a known-answer test or shall be tested using a pair-wise consistency
test (specified below). Message digest algorithms shall have an independent known-
answer test or the known-answer test shall be included with the associated crypto-
graphic algorithm test.
If a TSF includes two independent implementations of the same cryptographic al-
gorithm, then:
• the known-answer test may be omitted,
• the outputs of two implementations shall be continuously compared, and
• if the outputs of two implementations are not equal, the cryptographic algo-
rithm test shall fail.
Software/firmware integrity test. A software/firmware integrity test using an error
detection code or Approved authentication technique (e.g., an Approved message
authentication code or digital signature algorithm) shall be applied to all validated
software and firmware components within a TSF when the TOE is powered up.
The software/firmware integrity test is not required for any software and firmware
components excluded from the security requirements of this PP. If the calculated
result does not equal the previously generated result, the software/firmware test
shall fail.
If an error detection code is used, it shall be at least 16 bits in length.
Critical functions test. Other security functions critical to the secure operation of
a TSF shall be tested when the TOE is powered up as part of the power-up tests.
Other critical security functions performed under specific conditions shall be tested
as conditional tests.
Statistical random number generator tests. If statistical random number generator
tests are required (i.e., depending on the security level), a TSF employing RNGs
108 CHAPTER 5. IT SECURITY REQUIREMENTS
Length of Run Required Interval
1 2,315 - 2,685
2 1,114 - 1,386
3 527 - 723
4 240 - 384
5 103 - 209
6+ 103 - 209
Table 5.1: Required intervals for length of runs test
shall perform the following statistical tests for randomness. A single bit stream of
20,000 consecutive bits of output from each RNG shall be subjected to the following
four tests: monobit test, poker test, runs test, and long runs test.
The monobit test
1. Count the number of ones in the 20, 000 bit stream. Denote this quantity by
X.
2. The test is passed if 9, 725 < X < 10, 275.
The poker test
1. Divide the 20, 000 bit stream into 5, 000 consecutive 4 bit segments. Count
and store the number of occurrences of the 16 possible 4 bit values. Denote
f(i) as the number of each 4 bit value i, where 0 ≤ i ≤ 15.
2. Evaluate the following:
X = 16
5000
×
P15
i=0
[f(i)]2

− 5000
3. The test is passed if 2.16 < X < 46.17.
The runs test
1. A run is defined as a maximal sequence of consecutive bits of either all ones
or all zeros that is part of the 20, 000 bit sample stream. The incidences of
runs (for both consecutive zeros and consecutive ones) of all lengths (≥ 1) in
the sample stream should be counted and stored.
2. The test is passed if the runs that occur (of lengths 1 through 6) are each within
the corresponding interval specified in table 5.1. This must hold for both the
zeros and ones (i.e., all 12 counts must lie in the specified interval). For the
purposes of this test, runs of greater than 6 are considered to be of length 6.
The long runs test
1. A long run is defined to be a run of length 26 or more (of either zeros or ones).
2. On the sample of 20, 000 bits, the test is passed if there are no long runs.
Conditional Tests
Conditional tests tests shall be performed by a TSF when the conditions specified
for the following tests occur: pair-wise consistency test, software/firmware load
test, manual key entry test, continuous random number generator test, and bypass
test.
Pair-wise consistency test (for public and private keys). If a TSF generates pub-
lic or private keys, then the following pair-wise consistency tests for public and
private keys shall be performed:
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 109
1. If the keys are used to perform key transport or encryption, then the public
key shall encrypt a plaintext value. The resulting ciphertext value shall be
compared to the original plaintext value. If the two values are equal, then
the test shall fail. If the two values differ, then the private key shall be used to
decrypt the ciphertext and the resulting value shall be compared to the original
plaintext value. If the two values are not equal, the test shall fail.
2. If the keys are used to perform key agreement, then the TSF shall create a
second, compatible key pair. The TSF shall perform both sides of the key
agreement algorithm and shall compare the resulting shared values. If the
shared values are not equal, the test shall fail.
3. If the keys are used to perform the calculation and verification of digital sig-
natures, then the consistency of the keys shall be tested by the calculation and
verification of a digital signature. If the digital signature cannot be verified,
the test shall fail.
Software/firmware load test. If software or firmware components can be exter-
nally loaded into a TSF, then the following software/firmware load tests shall be
performed:
1. An Approved authentication technique (e.g., an Approved message authen-
tication code, digital signature algorithm, or HMAC) shall be applied to all
validated software and firmware components when the components are exter-
nally loaded into a TSF. The software/firmware load test is not required for any
software and firmware components excluded from the security requirements
of this PP.
2. The calculated result shall be compared with a previously generated result. If
the calculated result does not equal the previously generated result, the soft-
ware/firmware load test shall fail.
Manual key entry test. If cryptographic keys or key components are manually
entered into a TSF, then the following manual key entry tests shall be performed:
1. The cryptographic key or key components shall have an EDC applied, or shall
be entered using duplicate entries.
2. If an EDC is used, the EDC shall be at least 16 bits in length.
3. If the EDC cannot be verified, or the duplicate entries do not match, the test
shall fail.
Continuous random number generator test. If a TSF employs Approved or non-
Approved RNGs in an Approved mode of operation, the TSF shall perform the
following continuous random number generator test on each RNG that tests for
failure to a constant value.
1. If each call to a RNG produces blocks of n bits (where n > 15), the first n-bit
block generated after power-up, initialization, or reset shall not be used, but
shall be saved for comparison with the next n-bit block to be generated. Each
subsequent generation of an n-bit block shall be compared with the previously
generated block. The test shall fail if any two compared n-bit blocks are equal.
2. If each call to a RNG produces fewer than 16 bits, the first n bits generated
after power-up, initialization, or reset (for some n > 15) shall not be used, but
shall be saved for comparison with the next n generated bits. Each subsequent
generation of n bits shall be compared with the previously generated n bits.
The test fails if any two compared n-bit sequences are equal.
Bypass test. If a TSF implements a bypass capability where the services may be
provided without cryptographic processing (e.g., transferring plaintext through the
TSF), then the following bypass tests shall be performed to ensure that a single
point of failure of TOE components will not result in the unintentional output of
plaintext:
110 CHAPTER 5. IT SECURITY REQUIREMENTS
1. A TSF shall test for the correct operation of the services providing crypto-
graphic processing when a switch takes place between an exclusive bypass
service and an exclusive cryptographic service.
2. If a TSF can automatically alternate between a bypass service and a crypto-
graphic service, providing some services with cryptographic processing and
some services without cryptographic processing, then the TSF shall test for
the correct operation of the services providing cryptographic processing when
the mechanism governing the switching procedure is modified (e.g., an IP ad-
dress source/destination table).
FPT_TST.1.2 The TSF shall provide authorised users with the capability to verify the
integrity of TSF data.
FPT_TST.1.3 The TSF shall provide authorised users with the capability to verify the
integrity of stored TSF executable code.
5.1.8 FRU - Resource utilisation
This class provides three families that support the availability of required resources such as
processing capability and/or storage capacity. The family Fault Tolerance provides protection
against unavailability of capabilities caused by failure of the TOE. The family Priority of Service
ensures that the resources will be allocated to the more important or time-critical tasks and cannot
be monopolised by lower priority tasks. The family Resource Allocation provides limits on the
use of available resources, therefore preventing users from monopolising the resources.
FRU_PRS - Priority of service
The requirements of this family allow the TSF to control the use of resources within the TSC by
users and subjects such that high priority activities within the TSC will always be accomplished
without undue interference or delay caused by low priority activities.
FRU_PRS.2 Full priority of service
Full priority of service provides priorities for a subject’s use of all of the resources within
the TSC.
FRU_PRS.2.1 The TSF shall assign a priority to each subject in the TSF.
FRU_PRS.2.2 The TSF shall ensure that each access to all shareable resources shall be
mediated on the basis of the subjects assigned priority.
FRU_RSA - Resource allocation
The requirements of this family allow the TSF to control the use of resources by users and
subjects such that denial of service will not occur because of unauthorised monopolisation of
resources.
FRU_RSA.2 Minimum and maximum quotas
Minimum and maximum quotas provides requirements for quota mechanisms that ensure
that users and subjects will always have at least a minimum of a specified resource and
that they will not be able to monopolise a controlled resource.
FRU_RSA.2.1 The TSF shall enforce maximum quotas of the following resources [ST
ASSIGNMENT: (controlled resources) ] that [ST SELECTION: (individual user,
defined group of users)] can use [ST SELECTION: (simultaneously, over a spec-
ified period of time)].
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 111
FRU_RSA.2.2 The TSF shall ensure the provision of minimum quantity of each [ST
ASSIGNMENT: (controlled resource) ] that is available for [ST SELECTION: (an
individual user, defined group of users, subjects)] to use [ST SELECTION: (si-
multaneously, over a specified period of time)]
5.1.9 FTA - TOE access
This family specifies functional requirements for controlling the establishment of a user’s ses-
sion.
FTA_MCS - Limitation on multiple concurrent sessions
This family defines requirements to place limits on the number of concurrent sessions that belong
to the same user.
FTA_MCS.2 Per user attribute limitation on multiple concurrent sessions
Per user attribute limitation on multiple concurrent sessions extends FTA_MCS.1 by re-
quiring the ability to specify limitations on the number of concurrent sessions based on
the related security attributes.
FTA_MCS.2.1 The TSF shall restrict the maximum number of concurrent sessions that
belong to the same user according to the rules [ST ASSIGNMENT: (rules for the
number of maximum concurrent sessions) ].
FTA_MCS.2.2 The TSF shall enforce, by default, a limit of [ST ASSIGNMENT: (default
number) ] sessions per user.
FTA_SSL - Session locking
This family defines requirements for the TSF to provide the capability for TSFinitiated and user-
initiated locking and unlocking of interactive sessions.
FTA_SSL.1 TSF-initiated session locking
TSF-initiated session locking includes system initiated locking of an interactive session
after a specified period of user inactivity.
FTA_SSL.1.1 The TSF shall lock an interactive session after [ST ASSIGNMENT: (time
interval of user inactivity) ] by:
• clearing or overwriting display devices, making the current contents unread-
able;
• disabling any activity of the user’s data access/display devices other than un-
locking the session.
FTA_SSL.1.2 The TSF shall require the following events to occur prior to unlocking the
session: [ST ASSIGNMENT: (events to occur) ].
FTA_SSL.2 User-initiated locking
User-initiated locking provides capabilities for the user to lock and unlock the user’s own
interactive sessions.
FTA_SSL.2.1 The TSF shall allow user-initiated locking of the user’s own interactive
session, by:
• clearing or overwriting display devices, making the current contents unread-
able;
• disabling any activity of the user’s data access/display devices other than un-
locking the session.
112 CHAPTER 5. IT SECURITY REQUIREMENTS
FTA_SSL.2.2 The TSF shall require the following events to occur prior to unlocking the
session: [ST ASSIGNMENT: (events to occur) ].
FTA_SSL.3 TSF-initiated termination
TSF-initiated termination provides requirements for the TSF to terminate the session after
a period of user inactivity.
FTA_SSL.3.1 The TSF shall terminate an interactive session after a [ST ASSIGNMENT:
(time interval of user inactivity) ].
FTA_TAB - TOE access banners
This family defines requirements to display a configurable advisory warning message to users
regarding the appropriate use of the TOE.
FTA_TAB.1 Default TOE access banners
Default TOE access banners provides the requirement for a TOE Access Banner. This
banner is displayed prior to the establishment dialogue for a session.
FTA_TAB.1.1 Before establishing a user session, the TSF shall display an advisory
warning message regarding unauthorised use of the TOE.
FTA_TAH - TOE access history
This family defines requirements for the TSF to display to a user, upon successful session estab-
lishment, a history of successful and unsuccessful attempts to access the user’s account.
FTA_TAH.1 TOE access history
TOE access history provides the requirement for a TOE to display information related to
previous attempts to establish a session.
FTA_TAH.1.1 Upon successful session establishment, the TSF shall display the [ST
SELECTION: (date, time, method, location)] of the last successful session estab-
lishment to the user.
FTA_TAH.1.2 Upon successful session establishment, the TSF shall display the [ST
SELECTION: (date, time, method, location)] of the last unsuccessful attempt to
session establishment and the number of unsuccessful attempts since the last suc-
cessful session establishment.
FTA_TAH.1.3 The TSF shall not erase the access history information from the user in-
terface without giving the user an opportunity to review the information.
FTA_TSE - TOE session establishment
This family defines requirements to deny a user permission to establish a session with the TOE.
FTA_TSE.1 TOE session establishment
TOE session establishment provides requirements for denying users access to the TOE
based on attributes.
FTA_TSE.1.1 The TSF shall be able to deny session establishment based on [ST AS-
SIGNMENT: (attributes) ].
5.1. TOE SECURITY FUNCTIONAL REQUIREMENTS 113
5.1.10 FTP - Trusted path/channels
Families in this class provide requirements for a trusted communication path between users and
the TSF, and for a trusted communication channel between the TSF and other trusted IT products.
Trusted paths and channels have the following general characteristics:
• The communications path is constructed using internal and external communications
channels (as appropriate for the component) that isolate an identified subset of TSF data
and commands from the remainder of the TSF and user data.
• Use of the communications path may be initiated by the user and/or the TSF (as appro-
priate for the component)
• The communications path is capable of providing assurance that the user is communi-
cating with the correct TSF, and that the TSF is communicating with the correct user (as
appropriate for the component)
FTP_ITC - Inter-TSF trusted channel
This family defines requirements for the creation of a trusted channel between the TSF and other
trusted IT products for the performance of security critical operations. This family should be
included whenever there are requirements for the secure communication of user or TSF data
between the TOE and other trusted IT products.
FTP_ITC.1 Inter-TSF trusted channel
Inter-TSF trusted channel requires that the TSF provide a trusted communication channel
between itself and another trusted IT product.
FTP_ITC.1.1 The TSF shall provide a communication channel between itself and a re-
mote trusted IT product that is logically distinct from other communication chan-
nels and provides assured identification of its end points and protection of the chan-
nel data from modification or disclosure.
FTP_ITC.1.2 The TSF shall permit [ST SELECTION: (the TSF, the remote trusted IT
product)] to initiate communication via the trusted channel.
FTP_ITC.1.3 The TSF shall initiate communication via the trusted channel for [ST AS-
SIGNMENT: (list of functions for which a trusted channel is required) ].
FTP_TRP - Trusted path
This family defines the requirements to establish and maintain trusted communication to or from
users and the TSF. A trusted path may be required for any security-relevant interaction. Trusted
path exchanges may be initiated by a user during an interaction with the TSF, or the TSF may
establish communication with the user via a trusted path.
FTP_TRP.1 Trusted path
Trusted path requires that a trusted path between the TSF and a user be provided for a
set of events defined by a PP/ST author. The user and/or the TSF may have the ability to
initiate the trusted path.
FTP_TRP.1.1 The TSF shall provide a communication path between itself and [ST SE-
LECTION: (remote, local)] users that is logically distinct from other communica-
tion paths and provides assured identification of its end points and protection of the
communicated data from modification or disclosure.
FTP_TRP.1.2 The TSF shall permit [ST SELECTION: (the TSF, local users, remote
users)] to initiate communication via the trusted path.
FTP_TRP.1.3 The TSF shall require the use of the trusted path for [ST SELECTION:
(initial user authentication, [ST ASSIGNMENT: (other services for which trusted
path is required) ])].
114 CHAPTER 5. IT SECURITY REQUIREMENTS
5.2 TOE Security Assurance Requirements
Actual assurance requirements are dictated by an Organizational General Security Policy, (See
3.7.7) that takes into consideration areas of concern common to any PKI element, while being
consistent with the security policy models provided and requested by this PP.
This Assurance Requirements set meets [the99d] EAL4 augmented. The actual augmenta-
tions are defined at table 5.2.
Component Evaluation Assurance Level Augmentation Degree
ACM_AUT.2 (See 5.2.1) EAL4 augmented EAL6
ACM_CAP.4 (See 5.2.1) EAL4 EAL4
ACM_SCP.3 (See 5.2.1) EAL4 augmented EAL5
ADO_DEL.2 (See 5.2.2) EAL4 EAL4
ADO_IGS.1 (See 5.2.2) EAL4 EAL4
ADV_FSP.3 (See 5.2.3) EAL4 augmented EAL5
ADV_HLD.3 (See 5.2.3) EAL4 augmented EAL5
ADV_IMP.3 (See 5.2.3) EAL4 augmented EAL6
ADV_INT.3 (See 5.2.3) EAL4 augmented EAL7
ADV_LLD.1 (See 5.2.3) EAL4 EAL4
ADV_RCR.2 (See 5.2.3) EAL4 augmented EAL5
ADV_SPM.2 (See 5.2.3) EAL4 augmented EAL4 augmented
AGD_ADM.1 (See 5.2.4) EAL4 EAL4
AGD_USR.1 (See 5.2.4) EAL4 EAL4
ALC_DVS.2 (See 5.2.5) EAL4 augmented EAL6
ALC_FLR.3 (See 5.2.5) EAL4 augmented EAL4 augmented
ALC_LCD.3 (See 5.2.5) EAL4 augmented EAL7
ALC_TAT.2 (See 5.2.5) EAL4 augmented EAL5
ATE_COV.2 (See 5.2.6) EAL4 EAL4
ATE_DPT.3 (See 5.2.6) EAL4 augmented EAL7
ATE_FUN.2 (See 5.2.6) EAL4 augmented EAL6
ATE_IND.2 (See 5.2.6) EAL4 EAL4
AVA_CCA.1 (See 5.2.7) EAL4 augmented EAL5
AVA_MSU.2 (See 5.2.7) EAL4 EAL4
AVA_SOF.1 (See 5.2.7) EAL4 EAL4
AVA_VLA.2 (See 5.2.7) EAL4 EAL4
Table 5.2: EAL level
5.2.1 ACM - Configuration management
Configuration management (CM) is one method or means for establishing that the functional
requirements and specifications are realised in the implementation of the TOE. CM meets these
objectives by requiring discipline and control in the processes of refinement and modification of
the TOE and the related information. CM systems are put in place to ensure the integrity of the
portions of the TOE that they control, by providing a method of tracking any changes, and by
ensuring that all changes are authorised.
ACM_AUT - CM automation
The objective of introducing automated CM tools is to increase the effectiveness of the CM
system. While both automated and manual CM systems can be bypassed, ignored, or prove in-
5.2. TOE SECURITY ASSURANCE REQUIREMENTS 115
sufficient to prevent unauthorised modification, automated systems are less susceptible to human
error or negligence.
ACM_AUT.2 Complete CM automation
In development environments where the configuration items are complex or are being de-
veloped by multiple developers, it is difficult to control changes without the support of
automated tools. In particular, these automated tools need to be able to support the numer-
ous changes that occur during development and ensure that those changes are authorised.
It is the objective of this component to ensure that all configuration items are controlled
through automated means.
Providing an automated means of ascertaining changes between versions of the TOE and
identifying which configuration items are affected by modifications to other configuration
items assists in determining the impact of the changes between successive versions of the
TOE. This in turn can provide valuable information in determining whether changes to
the TOE result in all configuration items being consistent with one another.
ACM_AUT.2.1C The CM system shall provide an automated means by which only au-
thorised changes are made to the TOE implementation representation, and to all
other configuration items.
ACM_AUT.2.1D The developer shall use a CM system.
ACM_AUT.2.2C The CM system shall provide an automated means to support the gen-
eration of the TOE.
ACM_AUT.2.2D The developer shall provide a CM plan.
ACM_AUT.2.3C The CM plan shall describe the automated tools used in the CM sys-
tem.
ACM_AUT.2.4C The CM plan shall describe how the automated tools are used in the
CM system.
ACM_AUT.2.5C The CM system shall provide an automated means to ascertain the
changes between the TOE and its preceding version.
ACM_AUT.2.6C The CM system shall provide an automated means to identify all other
configuration items that are affected by the modification of a given configuration
item.
ACM_CAP - CM capabilities
The capabilities of the CM system address the likelihood that accidental or unauthorised modifi-
cations of the configuration items will occur. The CM system should ensure the integrity of the
TOE from the early design stages through all subsequent maintenance efforts.
ACM_CAP.4 Generation support and acceptance procedures
A unique reference is required to ensure that there is no ambiguity in terms of which
instance of the TOE is being evaluated. Labelling the TOE with its reference ensures that
users of the TOE can be aware of which instance of the TOE they are using.
Unique identification of the configuration items leads to a clearer understanding of the
composition of the TOE, which in turn helps to determine those items which are subject
to the evaluation requirements for the TOE.
Providing controls to ensure that unauthorised modifications are not made to the TOE, and
ensuring proper functionality and use of the CM system, helps to maintain the integrity
of the TOE.
The purpose of acceptance procedures is to confirm that any creation or modification of
configuration items is authorised.
116 CHAPTER 5. IT SECURITY REQUIREMENTS
ACM_CAP.4.10C The CM system shall provide measures such that only authorised
changes are made to the configuration items.
ACM_CAP.4.11C The CM system shall support the generation of the TOE.
ACM_CAP.4.12C The acceptance plan shall describe the procedures used to accept
modified or newly created configuration items as part of the TOE.
ACM_CAP.4.1C The reference for the TOE shall be unique to each version of the TOE.
ACM_CAP.4.1D The developer shall provide a reference for the TOE.
ACM_CAP.4.2C The TOE shall be labelled with its reference.
ACM_CAP.4.2D The developer shall use a CM system.
ACM_CAP.4.3C The CM documentation shall include a configuration list, a CM plan,
and an acceptance plan.
ACM_CAP.4.3D The developer shall provide CM documentation.
ACM_CAP.4.4C The configuration list shall describe the configuration items that com-
prise the TOE.
ACM_CAP.4.5C The CM documentation shall describe the method used to uniquely
identify the configuration items.
ACM_CAP.4.6C The CM system shall uniquely identify all configuration items.
ACM_CAP.4.7C The CM plan shall describe how the CM system is used.
ACM_CAP.4.8C The evidence shall demonstrate that the CM system is operating in
accordance with the CM plan.
ACM_CAP.4.9C The CM documentation shall provide evidence that all configuration
items have been and are being effectively maintained under the CM system.
ACM_SCP - CM scope
The objective of this family is to ensure that all necessary TOE configuration items are tracked
by the CM system. This helps to ensure that the integrity of these configuration items is protected
through the capabilities of the CM system.
ACM_SCP.3 Development tools CM coverage
A CM system can control changes only to those items that have been placed under CM.
Placing the TOE implementation representation, design, tests, user and administrator doc-
umentation, and CM documentation under CM provides assurance that they have been
modified in a controlled manner with proper authorisations.
The ability to track security flaws under CM ensures that security flaw reports are not lost
or forgotten, and allows a developer to track security flaws to their resolution.
Development tools play an important role in ensuring the production of a quality version
of the TOE. Therefore, it is important to control modifications to these tools.
ACM_SCP.3.1C The CM documentation shall show that the CM system, as a minimum,
tracks the following: the TOE implementation representation, design documenta-
tion, test documentation, user documentation, administrator documentation, CM
documentation, security flaws, and development tools and related information.
ACM_SCP.3.1D The developer shall provide CM documentation.
ACM_SCP.3.2C The CM documentation shall describe how configuration items are
tracked by the CM system.
5.2. TOE SECURITY ASSURANCE REQUIREMENTS 117
5.2.2 ADO - Delivery and operation
Delivery and operation provides requirements for correct delivery, installation, generation, and
start-up of the TOE.
ADO_DEL - Delivery
The requirements for delivery call for system control and distribution facilities and procedures
that provide assurance that the recipient receives the TOE that the sender intended to send, with-
out any modifications. For a valid delivery, what is received must correspond precisely to the
TOE master copy, thus avoiding any tampering with the actual version, or substitution of a false
version.
ADO_DEL.2 Detection of modification
ADO_DEL.2.1C The delivery documentation shall describe all procedures that are nec-
essary to maintain security when distributing versions of the TOE to a userÅ s site.
ADO_DEL.2.1D The developer shall document procedures for delivery of the TOE or
parts of it to the user.
ADO_DEL.2.2C The delivery documentation shall describe how the various procedures
and technical measures provide for the detection of modifications, or any discrep-
ancy between the developerÅ s master copy and the version received at the user site.
ADO_DEL.2.2D The developer shall use the delivery procedures.
ADO_DEL.2.3C The delivery documentation shall describe how the various procedures
allow detection of attempts to masquerade as the developer, even in cases in which
the developer has sent nothing to the userÅ s site.
ADO_IGS - Installation, generation and start-up
Installation, generation, and start-up procedures are useful for ensuring that the TOE has been
installed, generated, and started up in a secure manner as intended by the developer. The re-
quirements for installation, generation and start-up call for a secure transition from the TOE’s
implementation representation being under configuration control to its initial operation in the
user environment.
ADO_IGS.1 Installation, generation, and start-up procedures
ADO_IGS.1.1C The documentation shall describe the steps necessary for secure instal-
lation, generation, and start-up of the TOE.
ADO_IGS.1.1D The developer shall document procedures necessary for the secure in-
stallation, generation, and start-up of the TOE.
5.2.3 ADV - Development
The development class encompasses four families of requirements for representing the TSF at
various levels of abstraction from the functional interface to the implementation representation.
The development class also includes a family of requirements for a correspondence mapping be-
tween the various TSF representations, ultimately requiring a demonstration of correspondence
from the least abstract representation through all intervening representations to the TOE sum-
mary specification provided in the ST. In addition, there is a family of requirements for a TSP
model, and for correspondence mappings between the TSP, the TSP model, and the functional
specification. Finally, there is a family of requirements on the internal structure of the TSF,
which covers aspects such as modularity, layering, and minimisation of complexity.
118 CHAPTER 5. IT SECURITY REQUIREMENTS
ADV_FSP - Functional specification
The functional specification is a high-level description of the user-visible interface and behaviour
of the TSF. It is an instantiation of the TOE security functional requirements. The functional
specification has to show that all the TOE security functional requirements are addressed.
ADV_FSP.3 Semiformal functional specification
ADV_FSP.3.1C The functional specification shall describe the TSF and its external in-
terfaces using a semiformal style, supported by informal, explanatory text where
appropriate.
ADV_FSP.3.1D The developer shall provide a functional specification.
ADV_FSP.3.2C The functional specification shall be internally consistent.
ADV_FSP.3.3C The functional specification shall describe the purpose and method of
use of all external TSF interfaces, providing complete details of all effects, excep-
tions and error messages.
ADV_FSP.3.4C The functional specification shall completely represent the TSF.
ADV_FSP.3.5C The functional specification shall include rationale that the TSF is com-
pletely represented.
ADV_FSP.3.6C Finite State Model
The operation of a TSF shall be specified using a finite state model (or equivalent)
represented by a state transition diagram and/or a state transition table.
The state transition diagram and/or state transition table includes:
• all operational and error states of a TSF,
• the corresponding transitions from one state to another,
• the input events that cause transitions from one state to another, and
• the output events resulting from transitions from one state to another.
A TSF shall include the following operational and error states:
Power on/off states. States for primary, secondary, or backup power. These states
may distinguish between power sources being applied to a TSF.
Crypto officer states. States in which the crypto officer services are performed (e.g.,
cryptographic initialization and key management).
Key/CSP entry states. States for entering cryptographic keys and CSPs into the
TSF.
User states. States in which authorized users obtain security services, perform
cryptographic operations, or perform other Approved or non-Approved functions.
Self-test states. States in which the TSF is performing self-tests.
Error states. States when the TSF has encountered an error (e.g., failed a self-test
or attempted to encrypt when missing operational keys or CSPs). Error states may
include "hard" errors that indicate an equipment malfunction and that may require
maintenance, service or repair of the TSF, or recoverable "soft" errors that may
require initialization or resetting of the module. Recovery from error states shall be
possible except for those caused by hard errors that require maintenance, service,
or repair of the TSF.
A TSF may contain other states including, but not limited to, the following:
Bypass states. States in which a bypass capability is activated and services are
provided without cryptographic processing (e.g., transferring plaintext through the
TSF).
5.2. TOE SECURITY ASSURANCE REQUIREMENTS 119
Maintenance states. States for maintaining and servicing a TSF, including physi-
cal and logical maintenance testing. If a TSF contains a maintenance role, then a
maintenance state shall be included.
Documentation shall include a representation of the finite state model (or equiva-
lent) using a state transition diagram and/or state transition table that shall specify:
• all operational and error states of a TSF,
• the corresponding transitions from one state to another,
ADV_FSP.3.7C TSF Ports and Interfaces
A TSF shall restrict all information flow and physical access points to physical ports
and logical interfaces that define all entry and exit points to and from the module.
The TSF interfaces shall be logically distinct from each other although they may
share one physical port (e.g., input data may enter and output data may exit via the
same port) or may be distributed over one or more physical ports (e.g., input data
may enter via both a serial and a parallel port). An Application Program Interface
(API) of a software component of a TSF may be defined as one or more logical
interfaces(s).
A TSF shall have the following four logical interfaces ("input" and "output" are
indicated from the perspective of the module):
Data input interface. All data (except control data entered via the control input
interface) that is input to and processed by a TSF (including plaintext data, cipher-
text data, cryptographic keys and CSPs, authentication data, and status information
from another module) shall enter via the "data input" interface.
Data output interface. All data (except status data output via the status output in-
terface) that is output from a TSF (including plaintext data, ciphertext data, cryp-
tographic keys and CSPs, authentication data, and control information for another
module) shall exit via the "data output" interface. All data output via the data out-
put interface shall be inhibited when an error state exists and during self-tests (see
5.1.7).
Control input interface. All input commands, signals, and control data (including
function calls and manual controls such as switches, buttons, and keyboards) used
to control the operation of a TSF shall enter via the "control input" interface.
Status output interface. All output signals, indicators, and status data (including
return codes and physical indicators such as Light Emitting Diodes and displays)
used to indicate the status of a TSF shall exit via the "status output" interface.
All external electrical power that is input to a TSF (including power from an ex-
ternal power source or batteries) shall enter via a power port. A power port is not
required when all power is provided or maintained internally to the cryptographic
boundary of the TSF (e.g., an internal battery).
The TSF shall distinguish between data and control for input and data and status
for output. All input data entering the TSF via the "data input" interface shall only
pass through the input data path. All output data exiting the TSF via the "data
output" interface shall only pass through the output data path. The output data path
shall be logically disconnected from the circuitry and processes while performing
key generation, manual key entry, or key zeroization. To prevent the inadvertent
output of sensitive information, two independent internal actions shall be required
to output data via any output interface through which plaintext cryptographic keys
or CSPs or sensitive data are output (e.g., two different software flags are set, one
of which may be user initiated; or two hardware gates are set serially from two
separate actions).
Either,
120 CHAPTER 5. IT SECURITY REQUIREMENTS
• the physical port(s) used for the input and output of plaintext cryptographic
key components, authentication data, and CSPs shall be physically separated
from all other ports of the TSF
or
• the logical interfaces used for the input and output of plaintext cryptographic
key components, authentication data, and CSPs shall be logically separated
from all other interfaces using a trusted path,
and
• plaintext cryptographic key components, authentication data, and other CSPs
shall be directly entered into the TSF (e.g., via a trusted path or directly at-
tached cable).
ADV_HLD - High-level design
The high-level design of a TOE provides a description of the TSF in terms of major structural
units (i.e. subsystems) and relates these units to the functions that they provide. The high-level
design requirements are intended to provide assurance that the TOE provides an architecture
appropriate to implement the TOE security functional requirements.
The high-level design refines the functional specification into subsystems. For each subsystem
of the TSF, the high-level design describes its purpose and function, and identifies the security
functions contained in the subsystem. The interrelationships of all subsystems are also defined
in the high-level design. These interrelationships will be represented as external interfaces for
data flow, control flow, etc., as appropriate.
ADV_HLD.3 Semiformal high-level design
ADV_HLD.3.1C The presentation of the high-level design shall be semiformal.
ADV_HLD.3.1D The developer shall provide the high-level design of the TSF. Content
and presentation of evidence elements:
ADV_HLD.3.2C The high-level design shall be internally consistent.
ADV_HLD.3.3C The high-level design shall describe the structure of the TSF in terms
of subsystems.
ADV_HLD.3.4C The high-level design shall describe the security functionality provided
by each subsystem of the TSF.
ADV_HLD.3.5C The high-level design shall identify any underlying hardware, firmware,
and/or software required by the TSF with a presentation of the functions provided
by the supporting protection mechanisms implemented in that hardware, firmware,
or software.
ADV_HLD.3.6C The high-level design shall identify all interfaces to the subsystems of
the TSF.
ADV_HLD.3.7C The high-level design shall identify which of the interfaces to the sub-
systems of the TSF are externally visible.
ADV_HLD.3.8C The high-level design shall describe the purpose and method of use of
all interfaces to the subsystems of the TSF, providing complete details of all effects,
exceptions and error messages.
ADV_HLD.3.9C The high-level design shall describe the separation of the TOE into
TSP-enforcing and other subsystems.
5.2. TOE SECURITY ASSURANCE REQUIREMENTS 121
ADV_IMP - Implementation representation
The description of the implementation representation in the form of source code, firmware, hard-
ware drawings, etc. captures the detailed internal workings of the TSF in support of analysis.
ADV_IMP.3 Structured implementation of the TSF
The ADV_IMP.3.2E element defines a requirement that the evaluator determine that the
implementation representation is an accurate and complete instantiation of the TOE se-
curity functional requirements. This provides a direct correspondence between the TOE
security functional requirements and the implementation representation, in addition to
the pairwise correspondences required by the ADV_RCR family. It is expected that the
evaluator will use the evidence provided in ADV_RCR as an input to making this deter-
mination.
ADV_IMP.3.1C The implementation representation shall unambiguously define the TSF
to a level of detail such that the TSF can be generated without further design deci-
sions.
ADV_IMP.3.1D The developer shall provide the implementation representation for the
entire TSF.
ADV_IMP.3.2C The implementation representation shall be internally consistent.
ADV_IMP.3.3C The implementation representation shall describe the relationships be-
tween all portions of the implementation.
ADV_IMP.3.4C The implementation representation shall be structured into small and
comprehensible sections.
ADV_INT - TSF internals
This family addresses the internal structure of the TSF. Requirements are presented for modular-
ity, layering (to separate levels of abstraction and minimise circular dependencies), minimisation
of the complexity of policy enforcement mechanisms, and the minimisation of the amount of
non-TSP-enforcing functionality within the TSF - thus resulting in a TSF that is simple enough
to be analysed.
Modular design reduces the interdependence between elements of the TSF and thus reduces the
risk that a change or error in one module will have effects throughout the TOE. Thus, a modular
design provides the basis for determining the scope of interaction with other elements of the
TSF, provides for increased assurance that unexpected effects do not occur, and also provides the
basis for designing and evaluating test suites.
ADV_INT.3 Minimisation of complexity
ADV_INT.3.1C The architectural description shall identify the modules of the TSF and
shall specify which portions of the TSF enforce the access control and/or informa-
tion flow control policies.
ADV_INT.3.1D The developer shall design and structure the TSF in a modular fashion
that avoids unnecessary interactions between the modules of the design.
ADV_INT.3.2C The architectural description shall describe the purpose, interface, pa-
rameters, and side-effects of each module of the TSF.
ADV_INT.3.2D The developer shall provide an architectural description.
ADV_INT.3.3C The architectural description shall describe how the TSF design pro-
vides for largely independent modules that avoid unnecessary interactions.
122 CHAPTER 5. IT SECURITY REQUIREMENTS
ADV_INT.3.3D The developer shall design and structure the TSF in a layered fashion
that minimises mutual interactions between the layers of the design.
ADV_INT.3.4C The architectural description shall describe the layering architecture.
ADV_INT.3.4D The developer shall design and structure the TSF in such a way that
minimises the complexity of the entire TSF.
ADV_INT.3.5C The architectural description shall show that mutual interactions have
been minimised, and justify those that remain.
ADV_INT.3.5D The developer shall design and structure the portions of the TSF that
enforce any access control and/or information flow control policies such that they
are simple enough to be analysed.
ADV_INT.3.6C The architectural description shall describe how the entire TSF has been
structured to minimise complexity.
ADV_INT.3.6D The developer shall ensure that functions whose objectives are not rele-
vant for the TSF are excluded from the TSF modules.
ADV_INT.3.7C The architectural description shall justify the inclusion of any non-TSPenforcing
modules in the TSF.
ADV_LLD - Low-level design
The low-level design of a TOE provides a description of the internal workings of the TSF in
terms of modules and their interrelationships and dependencies. The low-level design provides
assurance that the TSF subsystems have been correctly and effectively refined.
For each module of the TSF, the low-level design describes its purpose, function, interfaces,
dependencies, and the implementation of any TSP-enforcing functions.
ADV_LLD.1 Descriptive low-level design
ADV_LLD.1.10C The low-level design shall describe the separation of the TOE into
TSPenforcing and other modules.
ADV_LLD.1.1C The presentation of the low-level design shall be informal.
ADV_LLD.1.1D The developer shall provide the low-level design of the TSF.
ADV_LLD.1.2C The low-level design shall be internally consistent.
ADV_LLD.1.3C The low-level design shall describe the TSF in terms of modules.
ADV_LLD.1.4C The low-level design shall describe the purpose of each module.
ADV_LLD.1.5C The low-level design shall define the interrelationships between the
modules in terms of provided security functionality and dependencies on other
modules.
ADV_LLD.1.6C The low-level design shall describe how each TSP-enforcing function
is provided.
ADV_LLD.1.7C The low-level design shall identify all interfaces to the modules of the
TSF.
ADV_LLD.1.8C The low-level design shall identify which of the interfaces to the mod-
ules of the TSF are externally visible.
ADV_LLD.1.9C The low-level design shall describe the purpose and method of use of
all interfaces to the modules of the TSF, providing details of effects, exceptions and
error messages, as appropriate.
5.2. TOE SECURITY ASSURANCE REQUIREMENTS 123
ADV_RCR - Representation correspondence
The correspondence between the various TSF representations (i.e. TOE summary specification,
functional specification, high-level design, low-level design, implementation representation) ad-
dresses the correct and complete instantiation of the requirements to the least abstract TSF rep-
resentation provided. This conclusion is achieved by step-wise refinement and the cumulative
results of correspondence determinations between all adjacent abstractions of representation.
ADV_RCR.2 Semiformal correspondence demonstration
ADV_RCR.2.1C For each adjacent pair of provided TSF representations, the analysis
shall demonstrate that all relevant security functionality of the more abstract TSF
representation is correctly and completely refined in the less abstract TSF represen-
tation.
ADV_RCR.2.1D The developer shall provide an analysis of correspondence between all
adjacent pairs of TSF representations that are provided.
ADV_RCR.2.2C For each adjacent pair of provided TSF representations, where portions
of both representations are at least semiformally specified, the demonstration of
correspondence between those portions of the representations shall be semiformal.
ADV_SPM - Security policy modeling
It is the objective of this family to provide additional assurance that the security functions in
the functional specification enforce the policies in the TSP. This is accomplished via the de-
velopment of a security policy model that is based on a subset of the policies of the TSP, and
establishing a correspondence between the functional specification, the security policy model,
and these policies of the TSP.
ADV_SPM.2 Semiformal TOE security policy model
ADV_SPM.2.1C The TSP model shall be semiformal.
ADV_SPM.2.1D The developer shall provide a TSP model.
ADV_SPM.2.2C The TSP model shall describe the rules and characteristics of all poli-
cies of the TSP that can be modeled.
ADV_SPM.2.2D The developer shall demonstrate correspondence between the func-
tional specification and the TSP model.
ADV_SPM.2.3C The TSP model shall include a rationale that demonstrates that it is
consistent and complete with respect to all policies of the TSP that can be modeled.
ADV_SPM.2.4C The demonstration of correspondence between the TSP model and the
functional specification shall show that all of the security functions in the functional
specification are consistent and complete with respect to the TSP model.
ADV_SPM.2.5C Where the functional specification is at least semiformal, the demon-
stration of correspondence between the TSP model and the functional specification
shall be semiformal.
5.2.4 AGD - Guidance documents
The guidance documents class provides the requirements for user and administrator guidance
documentation. For the secure administration and use of the TOE it is necessary to describe all
relevant aspects for the secure application of the TOE.
124 CHAPTER 5. IT SECURITY REQUIREMENTS
AGD_ADM - Administrator guidance
Administrator guidance refers to written material that is intended to be used by those persons
responsible for configuring, maintaining, and administering the TOE in a correct manner for
maximum security. Because the secure operation of the TOE is dependent upon the correct
performance of the TSF, persons responsible for performing these functions are trusted by the
TSF. Administrator guidance is intended to help administrators understand the security functions
provided by the TOE, including both those functions that require the administrator to perform
security-critical actions and those functions that provide security-critical information.
AGD_ADM.1 Administrator guidance
AGD_ADM.1.1C The administrator guidance shall describe the administrative functions
and interfaces available to the administrator of the TOE.
AGD_ADM.1.1D The developer shall provide administrator guidance addressed to sys-
tem administrative personnel.
AGD_ADM.1.2C The administrator guidance shall describe how to administer the TOE
in a secure manner.
AGD_ADM.1.3C The administrator guidance shall contain warnings about functions
and privileges that should be controlled in a secure processing environment.
AGD_ADM.1.4C The administrator guidance shall describe all assumptions regarding
user behaviour that are relevant to secure operation of the TOE.
AGD_ADM.1.5C The administrator guidance shall describe all security parameters un-
der the control of the administrator, indicating secure values as appropriate.
AGD_ADM.1.6C The administrator guidance shall describe each type of security-relevant
event relative to the administrative functions that need to be performed, including
changing the security characteristics of entities under the control of the TSF.
AGD_ADM.1.7C The administrator guidance shall be consistent with all other docu-
mentation supplied for evaluation.
AGD_ADM.1.8C The administrator guidance shall describe all security requirements
for the IT environment that are relevant to the administrator.
AGD_USR - User guidance
User guidance refers to material that is intended to be used by non-administrative human users of
the TOE, and by others (e.g. programmers) using the TOE’s external interfaces. User guidance
describes the security functions provided by the TSF and provides instructions and guidelines,
including warnings, for its secure use.
AGD_USR.1 User guidance
AGD_USR.1.1C The user guidance shall describe the functions and interfaces available
to the non-administrative users of the TOE.
AGD_USR.1.1D The developer shall provide user guidance.
AGD_USR.1.2C The user guidance shall describe the use of user-accessible security
functions provided by the TOE.
AGD_USR.1.3C The user guidance shall contain warnings about user-accessible func-
tions and privileges that should be controlled in a secure processing environment.
5.2. TOE SECURITY ASSURANCE REQUIREMENTS 125
AGD_USR.1.4C The user guidance shall clearly present all user responsibilities neces-
sary for secure operation of the TOE, including those related to assumptions regard-
ing user behaviour found in the statement of TOE security environment.
AGD_USR.1.5C The user guidance shall be consistent with all other documentation sup-
plied for evaluation.
AGD_USR.1.6C The user guidance shall describe all security requirements for the IT
environment that are relevant to the user.
5.2.5 ALC - Life cycle support
Life-cycle support is an aspect of establishing discipline and control in the processes of refine-
ment of the TOE during its development and maintenance. Confidence in the correspondence
between the TOE security requirements and the TOE is greater if security analysis and the pro-
duction of the evidence are done on a regular basis as an integral part of the development and
maintenance activities.
ALC_DVS - Development security
Development security is concerned with physical, procedural, personnel, and other security mea-
sures that may be used in the development environment to protect the TOE. It includes the phys-
ical security of the development location and any procedures used to select development staff.
ALC_DVS.2 Sufficiency of security measures
ALC_DVS.2.1C The development security documentation shall describe all the physi-
cal, procedural, personnel, and other security measures that are necessary to protect
the confidentiality and integrity of the TOE design and implementation in its devel-
opment environment.
ALC_DVS.2.1D The developer shall produce development security documentation.
ALC_DVS.2.2C The development security documentation shall provide evidence that
these security measures are followed during the development and maintenance of
the TOE.
ALC_DVS.2.3C The evidence shall justify that the security measures provide the nec-
essary level of protection to maintain the confidentiality and integrity of the TOE.
ALC_FLR - Flaw remediation
Flaw remediation requires that discovered security flaws be tracked and corrected by the devel-
oper. Although future compliance with flaw remediation procedures cannot be determined at the
time of the TOE evaluation, it is possible to evaluate the policies and procedures that a developer
has in place to track and correct flaws, and to distribute the flaw information and corrections.
ALC_FLR.3 Systematic flaw remediation
ALC_FLR.3.1C The flaw remediation procedures documentation shall describe the pro-
cedures used to track all reported security flaws in each release of the TOE.
ALC_FLR.3.1D The developer shall document the flaw remediation procedures.
ALC_FLR.3.2C The flaw remediation procedures shall require that a description of the
nature and effect of each security flaw be provided, as well as the status of finding
a correction to that flaw.
126 CHAPTER 5. IT SECURITY REQUIREMENTS
ALC_FLR.3.2D The developer shall establish a procedure for accepting and acting upon
user reports of security flaws and requests for corrections to those flaws.
ALC_FLR.3.3C The flaw remediation procedures shall require that corrective actions
be identified for each of the security flaws.
ALC_FLR.3.3D The developer shall designate one or more specific points of contact for
user reports and inquiries about security issues involving the TOE.
ALC_FLR.3.4C The flaw remediation procedures documentation shall describe the meth-
ods used to provide flaw information, corrections and guidance on corrective actions
to TOE users.
ALC_FLR.3.5C The procedures for processing reported security flaws shall ensure that
any reported flaws are corrected and the correction issued to TOE users.
ALC_FLR.3.6C The procedures for processing reported security flaws shall provide
safeguards that any corrections to these security flaws do not introduce any new
flaws.
ALC_FLR.3.7C The flaw remediation procedures shall include a procedure requiring
timely responses for the automatic distribution of security flaw reports and the as-
sociated corrections to registered users who might be affected by the security flaw.
ALC_LCD - Life cycle definition
Poorly controlled development and maintenance of the TOE can result in a flawed implemen-
tation of a TOE (or a TOE that does not meet all of its security requirements). This, in turn,
results in security violations. Therefore, it is important that a model for the development and
maintenance of a TOE be established as early as possible in the TOE’s life-cycle.
Using a model for the development and maintenance of a TOE does not guarantee that the TOE
will be free of flaws, nor does it guarantee that the TOE will meet all of its security functional
requirements. It is possible that the model chosen will be insufficient or inadequate and there-
fore no benefits in the quality of the TOE can be observed. Using a life-cycle model that has
been approved by some group of experts (e.g. academic experts, standards bodies) improves the
chances that the development and maintenance models will contribute to the overall quality of
the TOE.
ALC_LCD.3 Measurable life-cycle model
ALC_LCD.3.1C The life-cycle definition documentation shall describe the model used
to develop and maintain the TOE, including the details of its arithmetic parameters
and/or metrics used to measure the TOE development against the model.
ALC_LCD.3.1D The developer shall establish a life-cycle model to be used in the de-
velopment and maintenance of the TOE.
ALC_LCD.3.2C The life-cycle model shall provide for the necessary control over the
development and maintenance of the TOE.
ALC_LCD.3.2D The developer shall provide life-cycle definition documentation.
ALC_LCD.3.3C The life-cycle definition documentation shall explain why the model
was chosen.
ALC_LCD.3.3D The developer shall use a standardised and measurable life-cycle model
to develop and maintain the TOE.
5.2. TOE SECURITY ASSURANCE REQUIREMENTS 127
ALC_LCD.3.4C The life-cycle definition documentation shall explain how the model is
used to develop and maintain the TOE.
ALC_LCD.3.4D The developer shall measure the TOE development using the standard-
ised and measurable life-cycle model.
ALC_LCD.3.5C The life-cycle definition documentation shall demonstrate compliance
with the standardised and measurable life-cycle model.
ALC_LCD.3.6C The life-cycle documentation shall provide the results of the measure-
ments of the TOE development using the standardised and measurable life-cycle
model.
ALC_TAT - Tools and techniques
Tools and techniques is an aspect of selecting tools that are used to develop, analyse and imple-
ment the TOE. It includes requirements to prevent ill-defined, inconsistent or incorrect develop-
ment tools from being used to develop the TOE. This includes, but is not limited to, programming
languages, documentation, implementation standards, and other parts of the TOE such as sup-
porting runtime libraries.
ALC_TAT.2 Compliance with implementation standards
ALC_TAT.2.1C All development tools used for implementation shall be well-defined.
ALC_TAT.2.2C The documentation of the development tools shall unambiguously de-
fine the meaning of all statements used in the implementation.
ALC_TAT.2.3C The documentation of the development tools shall unambiguously de-
fine the meaning of all implementation-dependent options.
ALC_TAT.2.3D The developer shall describe the implementation standards to be ap-
plied.
5.2.6 ATE - Tests
The class "Tests" encompasses four families: coverage (ATE_COV), depth (ATE_DPT), inde-
pendent testing (e.g. functional testing performed by evaluators) (ATE_IND), and functional
tests (ATE_FUN). Testing helps to establish that the TOE security functional requirements are
met. Testing provides assurance that the TOE satisfies at least the TOE security functional re-
quirements, although it cannot establish that the TOE does no more than what was specified.
Testing may also be directed toward the internal structure of the TSF, such as the testing of
subsystems and modules against their specifications.
ATE_COV - Coverage
This family addresses those aspects of testing that deal with completeness of test coverage. That
is, it addresses the extent to which the TSF is tested, and whether or not the testing is sufficiently
extensive to demonstrate that the TSF operates as specified.
ATE_COV.2 Analysis of coverage
In this component, the objective is to establish that the TSF has been tested against its
functional specification in a systematic manner. This is to be achieved through an exami-
nation of developer analysis of correspondence.
The developer is required to demonstrate that the tests which have been identified in-
clude testing of all of the security functions as described in the functional specification.
The analysis should not only show the correspondence between tests and security func-
tions, but should provide also sufficient information for the evaluator to determine how
128 CHAPTER 5. IT SECURITY REQUIREMENTS
the functions have been exercised. This information can be used in planning for addi-
tional evaluator tests. Although at this level the developer has to demonstrate that each of
the functions within the functional specification has been tested, the amount of testing of
each function need not be exhaustive.
ATE_COV.2.1C The analysis of the test coverage shall demonstrate the correspondence
between the tests identified in the test documentation and the TSF as described in
the functional specification.
ATE_COV.2.1D The developer shall provide an analysis of the test coverage.
ATE_COV.2.2C The analysis of the test coverage shall demonstrate that the correspon-
dence between the TSF as described in the functional specification and the tests
identified in the test documentation is complete.
ATE_DPT - Depth
The components in this family deal with the level of detail to which the TSF is tested. Testing
of security functions is based upon increasing depth of information derived from analysis of the
representations.
The objective is to counter the risk of missing an error in the development of the TOE. Addi-
tionally, the components of this family, especially as testing is more concerned with the internal
structure of the TSF, are more likely to discover any malicious code that has been inserted.
Testing that exercises specific internal interfaces can provide assurance not only that the TSF
exhibits the desired external security behaviour, but also that this behaviour stems from correctly
operating internal mechanisms.
ATE_DPT.3 Testing: implementation representation
The subsystems of a TSF provide a high-level description of the internal workings of the
TSF. Testing at the level of the subsystems, in order to demonstrate the presence of any
flaws, provides assurance that the TSF subsystems have been correctly realised.
The modules of a TSF provide a description of the internal workings of the TSF. Testing
at the level of the modules, in order to demonstrate the presence of any flaws, provides
assurance that the TSF modules have been correctly realised.
The implementation representation of a TSF provides a detailed description of the internal
workings of the TSF. Testing at the level of the implementation, in order to demonstrate
the presence of any flaws, provides assurance that the TSF implementation has been cor-
rectly realised.
The developer is expected to describe the testing of the high-level design of the TSF in
terms of "subsystems". The term "subsystem" is used to express the notion of decompos-
ing the TSF into a relatively small number of parts.
The developer is expected to describe the testing of the low-level design of the TSF in
terms of "modules". The term "modules" is used to express the notion of decomposing
each of the "subsystems" of the TSF into a relatively small number of parts.
The implementation representation is the one which is used to generate the TSF itself (e.g.
source code which is then compiled).
ATE_DPT.3.1C The depth analysis shall demonstrate that the tests identified in the test
documentation are sufficient to demonstrate that the TSF operates in accordance
with its high-level design, low-level design and implementation representation.
ATE_DPT.3.1D The developer shall provide the analysis of the depth of testing.
ATE_FUN - Functional tests
Functional testing performed by the developer establishes that the TSF exhibits the properties
necessary to satisfy the functional requirements of its PP/ST. Such functional testing provides
5.2. TOE SECURITY ASSURANCE REQUIREMENTS 129
assurance that the TSF satisfies at least the security functional requirements, although it cannot
establish that the TSF does no more than what was specified. The family "Functional tests" is
focused on the type and amount of documentation or support tools required, and what is to be
demonstrated through developer testing. Functional testing is not limited to positive confirmation
that the required security functions are provided, but may also include negative testing to check
for the absence of particular undesired behaviour (often based on the inversion of functional
requirements).
ATE_FUN.2 Ordered functional testing
The objective is for the developer to demonstrate that all security functions perform as
specified. The developer is required to perform testing and to provide test documentation.
In this component, an additional objective is to ensure that testing is structured such as to
avoid circular arguments about the correctness of the portions of the TSF being tested.
ATE_FUN.2.1C The test documentation shall consist of test plans, test procedure de-
scriptions, expected test results and actual test results.
ATE_FUN.2.1D The developer shall test the TSF and document the results.
ATE_FUN.2.2C The test plans shall identify the security functions to be tested and de-
scribe the goal of the tests to be performed.
ATE_FUN.2.2D The developer shall provide test documentation.
ATE_FUN.2.3C The test procedure descriptions shall identify the tests to be performed
and describe the scenarios for testing each security function. These scenarios shall
include any ordering dependencies on the results of other tests.
ATE_FUN.2.4C The expected test results shall show the anticipated outputs from a suc-
cessful execution of the tests.
ATE_FUN.2.5C The test results from the developer execution of the tests shall demon-
strate that each tested security function behaved as specified.
ATE_FUN.2.6C The test documentation shall include an analysis of the test procedure
ordering dependencies.
ATE_IND - Independent testing
One objective is to demonstrate that the security functions perform as specified.
An additional objective is to counter the risk of an incorrect assessment of the test outcomes
on the part of the developer that results in the incorrect implementation of the specifications, or
overlooks code that is non-compliant with the specifications.
ATE_IND.2 Independent testing - sample
The objective is to demonstrate that the security functions perform as specified. Evaluator
testing includes selecting and repeating a sample of the developer tests.
The intent is that the developer should provide the evaluator with materials necessary for
the efficient reproduction of developer tests. This may include such things as machine-
readable test documentation, test programs, etc.
This component contains a requirement that the evaluator has available test results from
the developer to supplement the programme of testing. The evaluator will repeat a sample
of the developer’s tests to gain confidence in the results obtained. Having established such
confidence the evaluator will build upon the developer’s testing by conducting additional
tests that exercise the TOE in a different manner. By using a platform of validated devel-
oper test results the evaluator is able to gain confidence that the TOE operates correctly
in a wider range of conditions than would be possible purely using the developer’s own
efforts, given a fixed level of resource. Having gained confidence that the developer has
130 CHAPTER 5. IT SECURITY REQUIREMENTS
tested the TOE, the evaluator will also have more freedom, where appropriate, to con-
centrate testing in areas where examination of documentation or specialist knowledge has
raised particular concerns.
ATE_IND.2.1C The TOE shall be suitable for testing.
ATE_IND.2.1D The developer shall provide the TOE for testing.
ATE_IND.2.2C The developer shall provide an equivalent set of resources to those that
were used in the developerÅ s functional testing of the TSF.
5.2.7 AVA - Vulnerability assessment
The class addresses the existence of exploitable covert channels, the possibility of misuse or
incorrect configuration of the TOE, the possibility to defeat probabilistic or permutational mech-
anisms, and the possibility of exploitable vulnerabilities introduced in the development or the
operation of the TOE.
AVA_CCA - Covert channel analysis
Covert channel analysis is carried out to determine the existence and potential capacity of unin-
tended signalling channels (i.e. illicit information flows) that may be exploited.
The assurance requirements address the threat that unintended and exploitable signalling paths
exist that may be exercised to violate the SFP.
AVA_CCA.1 Covert channel analysis
The objective is to identify covert channels that are identifiable, through an informal
search for covert channels.
AVA_CCA.1.1C The analysis documentation shall identify covert channels and estimate
their capacity.
AVA_CCA.1.1D The developer shall conduct a search for covert channels for each in-
formation flow control policy.
AVA_CCA.1.2C The analysis documentation shall describe the procedures used for de-
termining the existence of covert channels, and the information needed to carry out
the covert channel analysis.
AVA_CCA.1.2D The developer shall provide covert channel analysis documentation.
AVA_CCA.1.3C The analysis documentation shall describe all assumptions made during
the covert channel analysis.
AVA_CCA.1.4C The analysis documentation shall describe the method used for estimat-
ing channel capacity, based on worst case scenarios.
AVA_CCA.1.5C The analysis documentation shall describe the worst case exploitation
scenario for each identified covert channel.
AVA_MSU - Misuse
Misuse investigates whether the TOE can be configured or used in a manner that is insecure but
that an administrator or user of the TOE would reasonably believe to be secure.
AVA_MSU.2 Validation of analysis
The objective is to ensure that misleading, unreasonable and conflicting guidance is absent
from the guidance documentation, and that secure procedures for all modes of operation
have been addressed. Insecure states should be easy to detect. In this component, an
analysis of the guidance documentation by the developer is required to provide additional
assurance that the objective has been met.
5.2. TOE SECURITY ASSURANCE REQUIREMENTS 131
AVA_MSU.2.1C The guidance documentation shall identify all possible modes of oper-
ation of the TOE (including operation following failure or operational error), their
consequences and implications for maintaining secure operation.
AVA_MSU.2.1D The developer shall provide guidance documentation.
AVA_MSU.2.2C The guidance documentation shall be complete, clear, consistent and
reasonable.
AVA_MSU.2.2D The developer shall document an analysis of the guidance documenta-
tion.
AVA_MSU.2.3C The guidance documentation shall list all assumptions about the in-
tended environment.
AVA_MSU.2.4C The guidance documentation shall list all requirements for external se-
curity measures (including external procedural, physical and personnel controls).
AVA_MSU.2.5C The analysis documentation shall demonstrate that the guidance docu-
mentation is complete.
AVA_SOF - Strength of TOE security functions
Even if a TOE security function cannot be bypassed, deactivated, or corrupted, it may still be
possible to defeat it because there is a vulnerability in the concept of its underlying security
mechanisms. For those functions a qualification of their security behaviour can be made using
the results of a quantitative or statistical analysis of the security behaviour of these mechanisms
and the effort required to overcome them. The qualification is made in the form of a strength of
TOE security function claim.
AVA_SOF.1 Strength of TOE security function evaluation
Security functions are implemented by security mechanisms. For example, a password
mechanism can be used in the implementation of the identification and authentication
security function.
The strength of TOE security function evaluation is performed at the level of the security
mechanism, but its results provide knowledge about the ability of the related security
function to counter the identified threats.
The strength of TOE security function analysis should consider at least the contents of all
the TOE deliverables, including the ST, for the targeted evaluation assurance level.
AVA_SOF.1.1C For each mechanism with a strength of TOE security function claim the
strength of TOE security function analysis shall show that it meets or exceeds the
minimum strength level defined in the PP/ST.
AVA_SOF.1.1D The developer shall perform a strength of TOE security function anal-
ysis for each mechanism identified in the ST as having a strength of TOE security
function claim.
AVA_SOF.1.2C For each mechanism with a specific strength of TOE security function
claim the strength of TOE security function analysis shall show that it meets or
exceeds the specific strength of function metric defined in the PP/ST.
AVA_VLA - Vulnerability analysis
Vulnerability analysis is an assessment to determine whether vulnerabilities identified, during
the evaluation of the construction and anticipated operation of the TOE or by other methods (e.g.
by flaw hypotheses), could allow users to violate the TSP.
132 CHAPTER 5. IT SECURITY REQUIREMENTS
AVA_VLA.2 Independent vulnerability analysis
A vulnerability analysis is performed by the developer to ascertain the presence of security
vulnerabilities, and to confirm that they cannot be exploited in the intended environment
for the TOE.
The evaluator performs independent penetration testing, supported by the evaluator’s in-
dependent vulnerability analysis, to determine that the TOE is resistant to penetration
attacks performed by attackers possessing a low attack potential.
AVA_VLA.2.1C The documentation shall show, for all identified vulnerabilities, that the
vulnerability cannot be exploited in the intended environment for the TOE.
AVA_VLA.2.1D The developer shall perform and document an analysis of the TOE de-
liverables searching for ways in which a user can violate the TSP.
AVA_VLA.2.2C The documentation shall justify that the TOE, with the identified vul-
nerabilities, is resistant to obvious penetration attacks.
AVA_VLA.2.2D The developer shall document the disposition of identified vulnerabili-
ties.
Chapter 6
PP APPLICATION NOTES
6.1 Notes on evaluating this PP
6.1.1 Document construction method
By construction, this PP can be shown to be structurally correct. See the tool
http://www.safelayer.com/download/pkipp/7.PPhelper
and the knowledge database [NSA00], to gain an idea of its development method.
By supporting the PP writing with a tool, PP revision and definition is centered on conceptual
discussion based in the supporting knowledge database. Validation of this document rationale is
equivalent to validation of [NSA00].
6.1.2 Concepts mapping rationale and deviations from “The Com-
mon Criteria Profiling Knowledge Base”.
Figure 7.1 shows the conceptual diagram used in this document. This diagram is initially de-
rived from “Figure 4.5 - Derivation of requirements and specifications” at [the99b], with some
extensions:
• Threats are decomposed into Detailed Attacks. Whereas Security Objectives are directly
mapped at the [the99a] to Threats, in our model, Security Objectives are directly mapped
to Detailed Attacks, and in turn, to Threats.
• The same decomposition is applied to Security Policies, where in our model there is a
General Security Policy Statements level, and a further Detailed Security Policy State-
ments who are directly mapped to Security Objectives.
These two extensions have been inherited from the [NSA00] model. A further one com-
plements this [NSA00]:
• Assumptions are mapped to Threats and Policies not completely satisfied by the TOE, and
in particular, to those Security Objectives not satisfied solely by the TOE. This mapping is
missing from [NSA00], where assumptions are not directly linked to Security Objectives.
Actual mappings between these concepts are embedded into the PPhelper tools, as imported
from [NSA00]. The source of [NSA00] is by itself an indication of correctness of the map-
pings. These have been further assessed by the PP “PKI PP working group” to gain definitive
confidence in their applicability and correctness with highly positive returns. Some minor details
were detected and corrected directly in the PPhelper Knowledge Base, mostly due to component
leveling that did not affect the validity of the mappings.
Two general items included in [NSA00] have been eliminated in our final PPhelper Knowl-
edge Base.
133
134 CHAPTER 6. PP APPLICATION NOTES
1. Some functional extensions regarding TOE hardware protection have been removed, since
no hardware security claims are intended to be included in this PP. This is to allow both
software and hardware implementations of the functionality mandated herein, so that in
the latter case hardware security requirements can be added in the TOE ST as required.
2. A number of threats and attacks regarding TOE protection against cryptanalysis have
also been removed as considered not applicable. This is justified by the fact that PKIs
precisely produce pairs of plain text and their correspondent ciphered text, in the form of
certificates. The fact that this may put the TOE under risk is assumed, and even quantified
in the Information Flow Model and Policy. ( see 5.1.4).
6.1.3 Inclusion of functional and assurance requirements from “FIPS
140-2 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC
MODULES”
As already stated, requirements emanating from [fip] have been incorporated into this document
where there are requirements in both this PP and [fip] that require similar functionality. This
has been done to align it with a current market recognized authority for cryptographic module
security standard, so that a TOE complying with this PP does not have to define similar but
different functionality to achieve compliance of [fip] for the core PSK cryptographic module.
Table 6.1.3 shows the correspondence between the [fip] original requirement, and the PP
equivalence. Most of these imported requirements have been included in verbatim, whereas
some minor adjustments have been performed in other cases.
FIPS 140 Security Requirement PP requirement
4.2 Cryptographic Module Ports and Interfaces ADV_FSP.3.7C TSF Ports and Interfaces. See 5.2.3
4.3.1 Roles FDP_ACC.2 Complete Access Control . See 5.1.4, and
FMT_SMR.2 Restrictions on security roles. See 5.1.6
4.4 Finite State Model ADV_FSP.3.6C Finite State Model. See 5.2.3
4.7 Cryptographic Key Management FCS Cryptographic support. See 5.1.3.
4.9 Self-Test FPT_TST TSF self test. See 5.1.7
Table 6.1: FIPS 140-2 mapping to PP requirements.
6.2 Notes on using this PP
The PSK concept allows for multiple design solutions, as a stand-alone product, or as a secure
crypto management core, and in all those cases, compliance can be claimed with respect to this
PP.
Software-only solutions may find in this PP a self-contained specification that will drive a
product with a very high security profile.
Solutions incorporating hardware tokens or elements may be tempted to relax the environ-
mental requirements by introducing security requirements regarding hardware. This could be in
the form of emission control, tamper active reaction, etc. If properly selected, all the environ-
mental assumptions can be eliminated.
Since this PP includes most of the non-hardware requirements of [fip], as detailed in Table
6.1.3, TOEs should be validated against this standard without requiring modification of their
functionality. In particular, compliance with respect to non-hardware requirements of [fip] gets
up to level 4, provided that the TOE assurance component ADV_SPM is raised to formal level.
Chapter 7
RATIONALE
This PP is based upon the concepts and relationships shown in Figure 7.1. The Security Envi-
ronment, already defined, states the identified General Threats, General Organizational Policies
and General Assumptions.
Figure 7.1: Concepts and relationships
A General Threat can be considered as grouping a number of different but related Detailed
Attacks. While the General Threat is the abstraction of the threat class, Detailed Attacks are the
members of the class. The TOE must be able to counter the identified Detailed Attacks for it
to state that it counters the General Threat.In this rationale, Detailed Attacks that compose each
General Threat are analyzed, and for each one of these attacks, particular Security Objectives are
determined.
General Policies are again exploded into more practical, less abstract, Detailed Policies,
whose sum is equivalent to the General Policy Statement. The General Policy is not the abstrac-
tion of a policy class, but divided into Detailed Policies. Security Objectives are identified to
implement each of these Detailed Policies, and in sum, the General Policy Statement.
Assumptions reflect both threat assumptions (AT.) and policy assumptions (AP.)
Assumptions regarding General Threats can be read with a double meaning, either as if the
environment where responsible for countering with the threat, with no residual risk, or as if the
135
136 CHAPTER 7. RATIONALE
risk of suffering the threat is accepted. Since General Threats are related to a group of Detailed
Attacks, usually a TOE may address some of these attacks, but not all of them so as to claim
the General Threat countering. In this case, the assumption has been limited to those attacks not
addressed directly by the TOE, but in collaboration with the environment, the General Threat is
countered completely.
Assumptions regarding Policies are stated at Detailed Policy Statements level, in the under-
standing that General Policy Statements must always be applied to the TOE, otherwise being
irrelevant to this PP. Assumptions about policies are read as if the environment is responsible for
fulfilling the particular assigned Detailed Policy Statement, where combined with the TOE, full
General Policy Statement coverage is obtained.
All assumptions are finally analyzed to determine the Security Objectives that should be
mapped to the environment.
Those Security Objectives that are relevant to the TOE are then analyzed to determine the
required TOE Security Requirements, both Functional and Assurance.
7.1 General Threats and Attacks rationale.
As already explained, General Threats identified in Sec. 3.3 and Sec. 3.5 represent categories of
detailed attacks. A mapping of coverage is presented in this section, where the assigned attacks
to each Threat are shown, ensuring that no threat is left void of attacks, and that every threat is
assigned at least to a General Threat class. Note that in some cases, a particular Detailed Attacks
may be considered appropriate to be present in more than one General Threat Category.
7.1.1 Administrative errors of commission
T.Admin_Err_Commit (see 3.3.1).
The following Detailed Attack(s) form this General Threat category:
DA.Adm_Err_Crypto (see 3.4.1). Accidental mismanagement of cryptographic functions
An administrator misconfigures cryptographic functions or stores plaintext keys in inse-
cure areas.
This threat is countered solely by the TOE.
DA.Admin_Err_AC_Policy (see 3.4.11). Administrator error modifies access control or infor-
mation flow policy
An administrator’s error in data entry changes the access control or information flow
policy enforced by the system in such a way that it no longer serves its intended purpose.
This threat is countered solely by the TOE.
DA.Admin_Err_Audit (see 3.4.12). Administrator error changes audit behavior
An administrator’s error in data entry changes the audit behavior of the system in such a
way that auditing no longer serves its intended purpose.
This threat is countered solely by the TOE.
DA.Admin_Err_Authentic (see 3.4.13). Administrator error modifies authentication enforce-
ment
An administrator’s error in data entry changes the authentication-enforcement mechanism
of the system in such a way that it no longer serves its intended purpose.
This threat is countered solely by the TOE.
DA.Admin_Err_Info (see 3.4.14). Administrator error makes information unavailable
An administrator’s error in data entry makes system or application information unavail-
able.
This threat is countered solely by the TOE.
7.1. GENERAL THREATS AND ATTACKS RATIONALE. 137
DA.Admin_Err_Resource (see 3.4.16). Administrator error makes resource unavailable
An administrator’s error in data entry makes system or application resources unavailable.
This threat is countered solely by the TOE.
DA.Admin_Err_Sys_Entry (see 3.4.17). Administrator error modifies entry policy
An administrator’s error in data entry changes the intended entry policy of the system or
application.
This threat is countered solely by the TOE.
DA.Admin_Err_User_Attr (see 3.4.19). Administrator error modifies user security attributes
An administrator’s error in data entry modifies a user’s security attributes, which makes
the attributes inappropriate under the security policy of the system or application.
This threat is countered solely by the TOE.
7.1.2 Administrative errors of omission
T.Admin_Err_Omit (see 3.3.2).
The following Detailed Attack(s) form this General Threat category:
DA.Adm_Err_Crypto (see 3.4.1). Accidental mismanagement of cryptographic functions
An administrator misconfigures cryptographic functions or stores plaintext keys in inse-
cure areas.
This threat is countered solely by the TOE.
DA.Adm_Misconfig_User (see 3.4.10). User privileges and/or authorizations are not updated
upon reassignment
A change in the status of users duties do not get reflected in administratively controlled
privileges and/or authorizations.
This threat is countered solely by the TOE.
DA.Admin_Err_Omit_Trap (see 3.4.15). Back door left open
An administrator inadvertently leaves a back door port open after routine maintenance,
allowing continuing unauthorized access by the service organization.
This threat is countered solely by the TOE.
DA.Admin_Err_Update (see 3.4.18). Administrator fails to update security configuration
The organizational security policies changes but these changes are not reflected in all
system configurations, resulting in circumvention and/or incorrect application of security
policies.
This threat is countered solely by the TOE.
7.1.3 Hostile administrator modification of user or system data
T.Admin_Hostile_Modify (see 3.3.3).
The following Detailed Attack(s) form this General Threat category:
DA.Adm_Hstl_Audit_Dstr (see 3.4.2). Destruction or modification of audit data
An administrator seeks to cover up misbehavior by destroying and/or falsifying audit data.
This threat is countered solely by the TOE.
DA.Adm_Hstl_Mod_Data_AC (see 3.4.4). Administrator maliciously modifies or deletes data
access control attributes
An administrator maliciously modifies access control attributes, allowing the administra-
tor or other perpetrator to gain access and manipulative capability to organizational assets,
contrary to organizational policy.
This threat is countered solely by the TOE.
138 CHAPTER 7. RATIONALE
DA.Adm_Hstl_Mod_DataAps (see 3.4.3). Administrator modifies or destroys user data or ap-
plications
The administrator abuses IT or user trust, as being the administrator and without changing
the user imposed data security attributes, by destroying data or applications for malicious
reasons or to cover up misappropriate behavior.
This threat is countered solely by the TOE.
DA.Adm_Hstl_Mod_IFC (see 3.4.5). The administrator maliciously modifies information flow
control.
The administrator maliciously alters information flow control policy to allow information
to flow to inappropriate locations for unauthorized users access or modification.
This threat is countered solely by the TOE.
DA.Adm_Hstl_Mod_SEP (see 3.4.6). Administrator maliciously modifies system entry param-
eters
An administrator or user masquerading as an administrator maliciously modifies system
entry parameters which would allow unauthorized access to an organization’s protected
assets.
This threat is countered solely by the TOE.
DA.Adm_Hstl_Mod_TSFCode (see 3.4.7). Administrator maliciously modifies security-critical
code
The administrator modifies the security-critical (TSF) code to weaken the security effec-
tiveness of the TSF or introduce a new security breech.
This threat is countered solely by the TOE.
DA.Adm_Hstl_Mod_USB (see 3.4.8). Administrator maliciously modifies user/subject bind-
ings
The administrator modifies a user/subject binding which would allow a user to act on an
object without creating an audit trail.
This threat is countered solely by the TOE.
DA.Adm_Hstl_Mod_UsrAttr (see 3.4.9). Administrator maliciously modifies user attributes
and/or roles
The administrator modifies or mishandles the users attributes or roles which allows users,
unauthorized or authorized, to have the ability to perform inappropriate actions or could
prevent a user from performing an authorized action.
This threat is countered solely by the TOE.
7.1.4 Software containing security-related flaws
T.Dev_Flawed_Code (see 3.3.4).
The following Detailed Attack(s) form this General Threat category:
DA.Dev_FC_Attr_Interp (see 3.4.20). Inconsistent interpretation of audit data attributes
The security-critical (TSF) components inconsistently interpret audit data attributes ex-
changed with another trusted IT product.
This threat is countered solely by the TOE.
DA.Dev_FC_Buff_Not_Clr (see 3.4.21). Buffers not cleared by the system
The system leaves user information in a system buffer for view by another unauthorized
user.
This threat is countered solely by the TOE.
DA.Dev_FC_Ctrl_Data (see 3.4.22). Incorrect modification of control data
A security-critical (TSF) component incorrectly modifies control data regarding a user
process.
This threat is countered solely by the TOE.
7.1. GENERAL THREATS AND ATTACKS RATIONALE. 139
DA.Dev_FC_Data_Export (see 3.4.23). System data incorrectly exchanged
The system incorrectly exchanges system data with another trusted system.
This threat is countered solely by the TOE.
DA.Dev_FC_Recovery (see 3.4.24). Non-secure recovery
A system failure may alter the behavior of the system’s security functions in such a way
that, upon recovery, it no longer properly enforces its security policy (TSP).
This threat is countered solely by the TOE.
DA.Dev_FC_Replication (see 3.4.25). Inaccurate system-data replication
The system does not accurately replicate system data to different parts of the system where
replication is required.
This threat is countered solely by the TOE.
DA.Dev_FC_Self_Protect (see 3.4.26). System modification by unauthorized source
Software developer or hacker modifies system security functions resulting in a loss of
security protection.
This threat is countered solely by the TOE.
DA.Dev_FC_Trap_Door (see 3.4.27). Malicious developer creates secret trapdoor in system
The system developer creates a secret back door in the system (TOE) that allows covert
access by the developer. This allows the developer to collect information, monitor user
actions, modify the operation of the TOE, or just make unauthorized use of the TOE.
This threat is countered solely by the TOE.
7.1.5 Hacker undetected system access
T.Hack_AC (see 3.3.5).
The following Detailed Attack(s) form this General Threat category:
DA.Hack_AC_Code_Vul (see 3.4.28). Hacker gains access through a vulnerability in code
The hacker can use vulnerabilities found in system or application code to break into a
system undetected.
This threat is countered solely by the TOE.
DA.Hack_AC_Weak (see 3.4.29). Weak system access control mechanism or system access
control implementation
The system access control mechanism(s) or user attributes are weak and can be broken or
the implementation methods of the system access control causes the weakness.
This threat is countered solely by the TOE.
7.1.6 Message content modification
T.Hack_Msg_Data (see 3.3.6).
The following Detailed Attack(s) form this General Threat category:
DA.Hack_MsgData_RcvTSF (see 3.4.36). Modification of security-critical data in transit from
a remote trusted site
Security-critical (TSF) data is modified in transit from a remote trusted site, either acci-
dentally by the communications infrastructure or deliberately by a hostile outsider.
This threat is countered solely by the TOE.
DA.Hack_MsgData_RcvUsr (see 3.4.37). Modification of user data in transit from a remote
site
A hostile outsider modifies message data in route to the system. Alternatively, errors in
the communications infrastructure modify the message.
This threat is countered solely by the TOE.
140 CHAPTER 7. RATIONALE
DA.Hack_MsgData_SndTSF (see 3.4.38). Modification of security-critical data in transit to a
remote site
Security-critical (TSF) data is modified in transit to a remote site, either accidentally by
the communications infrastructure or deliberately by a hostile outsider.
This threat is countered solely by the TOE.
DA.Hack_MsgData_SndUsr (see 3.4.39). Modification of user data in transit to a remote site
A hostile outsider modifies message data in route to a remote site. Alternatively, errors in
the communications infrastructure modify the message.
This threat is countered solely by the TOE.
7.1.7 Unexpected disruption of system or component power
T.Power_Disrupt (see 3.3.7).
The following Detailed Attack(s) form this General Threat category:
DA.Power_Disrupt_Reset (see 3.4.43). Unexpected power reset
An unintentional, malicious, or environmentally caused power reset occurs, resulting in
the loss of critical information or the system to enter a non-secure state.
This threat is countered solely by the TOE.
7.1.8 Sender denies sending information
T.Repudiate_Send (see 3.3.8).
The following Detailed Attack(s) form this General Threat category:
DA.Repudiate_Send_Int (see 3.4.44). Denial of having sent information to another local user
A local, authorized user sends a message to another local user via the system, and then
denies having done it. This affects the recipient of the message as well as any resources
allocated or modified by the recipient in response to the message.
This threat is countered solely by the TOE.
DA.Repudiate_Send_Local (see 3.4.45). Denial of having sent information to a remote user
A local, authorized user sends a message to another user at a remote trusted product,
and then denies having done it. This affects the recipient of the message as well as any
resources allocated or modified by the recipient in response to the message.
This threat is countered solely by the TOE.
DA.Repudiate_Send_Rem (see 3.4.46). Denial of having sent data by a remote user
A local, authorized user receives a message from another user at a remote trusted product
who then denies having sent it. This affects the recipient of the message as well as any
resources allocated or modified by the recipient in response to the message.
This threat is countered solely by the TOE.
7.1.9 Hostile user acts cause confidentiality breaches
T.User_Abuse_Conf (see 3.3.9).
The following Detailed Attack(s) form this General Threat category:
DA.User_Abuse_Conf_Disk (see 3.4.48). User smuggles data using removable media
A user collects sensitive or proprietary information and improperly removes it from the
system by putting it on removable media.
This threat is countered solely by the TOE.
7.1. GENERAL THREATS AND ATTACKS RATIONALE. 141
7.1.10 User abuses authorization to collect data
T.User_Collect (see 3.3.10).
The following Detailed Attack(s) form this General Threat category:
DA.User_Collect_Browse (see 3.4.50). User collects data by browsing
An authorized user abuses granted authorizations by browsing files in order to collect
data.
This threat is countered solely by the TOE.
DA.User_Collect_Deceive (see 3.4.51). User collects authentication data by deception
An authorized user steals authentication data by emulating a login procedure on an active
terminal.
This threat is countered solely by the TOE.
DA.User_Collect_Deduce (see 3.4.52). User collects data by deduction
An authorized user abuses granted authorizations by repeatedly accessing aggregate data
in order to deduce specific, sensitive data.
This threat is countered solely by the TOE.
DA.User_Collect_Eaves (see 3.4.53). User collects data by eavesdropping
An authorized user abuses granted authorizations by eavesdropping on communication
lines in order to collect data.
This threat is countered solely by the TOE.
DA.User_Collect_Residue (see 3.4.54). User collects residual data
An authorized user collects residual data from public objects after prior usage.
This threat is countered solely by the TOE.
7.1.11 User errors cause confidentiality breaches
T.User_Err_Conf (see 3.3.11).
The following Detailed Attack(s) form this General Threat category:
DA.Hack_Ext_CryptoAsset (see 3.4.33). Accidental or deliberate mishandling of cryptographic
assets external to the TOE
Cryptographic assets are mishandled after the leave the TOE, either in transit or while
residing on stored media.
This threat is countered solely by the TOE.
DA.User_Err_Conf_Class (see 3.4.58). Under-classification of data sensitivity on export
An authorized user presents confidential or classified information to a recipient, indicating
that it is less sensitive than it really is, thereby encouraging the recipient to pass it along
to other potentially inappropriate recipients.
This threat is countered solely by the TOE.
DA.User_Err_Conf_Crypto (see 3.4.59). Accidental release of cryptographic assets due to user
error
User error causes release of cryptographic assets to unauthorized recipients.
This threat is countered solely by the TOE.
DA.User_Err_Conf_Exp (see 3.4.60). Confidentiality violation of export control policy
An authorized user exposes or exports data in violation of export control policy. The data
may be private or classified, the recipient is not authorized to receive it.
This threat is countered solely by the TOE.
142 CHAPTER 7. RATIONALE
7.1.12 User errors cause integrity breaches
T.User_Err_Integrity (see 3.3.12).
The following Detailed Attack(s) form this General Threat category:
DA.Hack_Ext_CryptoAsset (see 3.4.33). Accidental or deliberate mishandling of cryptographic
assets external to the TOE
Cryptographic assets are mishandled after the leave the TOE, either in transit or while
residing on stored media.
This threat is countered solely by the TOE.
DA.User_Err_AttrXpt (see 3.4.57). Falsification of information quality in data export
An authorized user presents incorrect information, indicating to the recipient that it is
correct, thereby encouraging the recipient to make unwarranted use of the information.
This threat is countered solely by the TOE.
DA.User_Modify_Data (see 3.4.67). User improperly modifies user data
An authorized user modifies or deletes user data in violation of organizational policy.
This threat is countered solely by the TOE.
7.1.13 User errors undermine the system’s security features
T.User_Err_Slf_Protect (see 3.3.13).
The following Detailed Attack(s) form this General Threat category:
DA.User_Err_MsngAttrXpt (see 3.4.62). Failure to provide object security attributes in data
export
An authorized user deliberately or accidentally exports data so that the data is not accom-
panied by required handling information.
This threat is countered solely by the TOE.
DA.User_Err_Object_Attr (see 3.4.63). Incorrectly set object attributes
An authorized user sets an object’s security attributes inappropriately, misdirecting its
use. The misdirection may allow unauthorized reading or modification, or it may prohibit
authorized reading or modification.
This threat is countered solely by the TOE.
7.1.14 User abuses authorization to modify data
T.User_Modify (see 3.3.14).
The following Detailed Attack(s) form this General Threat category:
DA.User_Modify_Audit (see 3.4.65). User modifies audit trail
An authorized user modifies audit data or audit attributes to avoid accountability.
This threat is countered solely by the TOE.
DA.User_Modify_Auth (see 3.4.66). User improperly modifies authentication data
An authorized user changes the authentication data of another user without first mas-
querading as that user, in a manner that is not consistent with organizational security
policy.
This threat is countered solely by the TOE.
DA.User_Modify_Data (see 3.4.67). User improperly modifies user data
An authorized user modifies or deletes user data in violation of organizational policy.
This threat is countered solely by the TOE.
DA.User_Modify_TSFData (see 3.4.68). User improperly modifies TSF data
User modifies or deletes TSF data undermining security protection.
This threat is countered solely by the TOE.
7.1. GENERAL THREATS AND ATTACKS RATIONALE. 143
7.1.15 User abuses authorization to send data
T.User_Send (see 3.3.15).
The following Detailed Attack(s) form this General Threat category:
DA.User_Abuse_Conf_Steg (see 3.4.49). Steganographic data smuggling
An authorized user hides sensitive information in an innocuous-appearing file, for the
purpose of covertly passing it to an unauthorized party. The hidden data is undetectable
to anyone using the file for its intended purpose, but can be recovered using special tech-
niques.
This threat is countered solely by the TOE.
DA.User_Send_Conf (see 3.4.70). User sends data violating confidentiality
An authorized user abuses granted authorizations and violates export control policy by
sending data to a recipient who is not authorized to receive the data.
This threat is countered solely by the TOE.
DA.User_Send_Integrity (see 3.4.71). User sends data violating integrity
An authorized user deliberately exports data inappropriately, with the result that there is
a lack of required quality control on the exported data.
This threat is countered solely by the TOE.
7.1.16 Administrator violates user privacy policy
T.Admin_UserPriv (see 3.5.1).
The following Detailed Attacks form this General Threat category:
DA.Admin_UserPriv_Agg (see 3.6.1). Administrator aggregates privacy information
An administrator aggregates information that indirectly reveals the identity (or other pri-
vacy related information) of user(s) in violation of user privacy policy.
This attack is to be countered with support from the Environment.
DA.Admin_UserPriv_Col (see 3.6.2). Administrator reads collected user privacy information
An administrator reads information collected by the IT system or product that reveals
the identity (or other privacy related information) of user(s) in violation of user privacy
policy.
This attack is to be countered with support from the Environment.
DA.Admin_UserPriv_Gen (see 3.6.3). Administrator reads system generated privacy informa-
tion
An administrator reads information generated by the IT system or product that directly
reveals the identity (or other privacy related information) of user(s) in violation of user
privacy policy.
This attack is to be countered with support from the Environment.
7.1.17 Malicious code exploitation
T.Malicious_Code (see 3.5.2).
The following Detailed Attacks form this General Threat category:
DA.Mal_Code_Hack_Downld (see 3.6.4). Malicious code perpetrator dissemination
A perpetrator disseminates malicious code via push or pull mechanism.
This attack is to be countered with support from the Environment.
DA.Mal_Code_Hack_Exe (see 3.6.5). Malicious code perpetrator execution
A perpetrator executes malicious code either remotely or locally.
This attack is to be countered with support from the Environment.
144 CHAPTER 7. RATIONALE
DA.Mal_Code_IT_Download (see 3.6.6). Malicious code accidental IT download
An IT device accidentally transfers or downloads malicious code to itself or other device
that it can influence.
This attack is to be countered with support from the Environment.
DA.Mal_Code_IT_Exe (see 3.6.7). Malicious code IT execution
An IT device under normal operations enters a state required to execute the malicious
code.
This attack is to be countered with support from the Environment.
DA.Mal_Code_Usr_Downld (see 3.6.8). Malicious code accidental user download
An authorized user accidentally downloads malicious code.
This attack is to be countered with support from the Environment.
DA.Mal_Code_Usr_Exe (see 3.6.9). Malicious code user execution
An authorized user executes malicious code accidentally.
This attack is to be countered with support from the Environment.
7.1.18 Legitimate system services are spoofed
T.Spoofing (see 3.5.3).
The following Detailed Attacks form this General Threat category:
DA.Hack_Spoof_Login (see 3.6.10). Login program replicated to capture authentication data
An attacker simulates the system’s login program and runs it at an open terminal or work-
station in order to capture a legitimate user’s authentication data.
This attack is to be countered with support from the Environment.
DA.Hack_Spoof_MsgHdr (see 3.4.40). Attacker modifies protocol headers
An attacker may modify protocol headers such that a user believes the communication is
coming from a source that is different from where it was actually sent.
This attack is countered solely by the TOE.
7.1.19 Hacker attempts resource denial of service
T.Hack_Avl_Resource (see 3.5.4).
The following Detailed Attacks form this General Threat category:
DA.Hack_Comm_Overload (see 3.4.32). Hacker causes overload of communication resources
The unauthorized use of communication resources by a hacker causes a denial or delay
in service to legitimate operations within the TOE scope of control. This would include
the excess bandwidth utilization, leading to the TOE’s inability to perform it’s security
functions.
This attack is countered solely by the TOE.
DA.Hack_Prcsr_Overload (see 3.6.11). Hacker causes system task overload resulting in denial
of service
Hacker causes system task overload resulting in denial of service. The system (TOE)
has been over-tasked and can not complete the assigned tasking at all or in an expected
amount of time. The hacker invokes processing functions in association with unauthorized
activity that leads to overburdening processing resources on the TOE.
This attack is to be countered with support from the Environment.
DA.Hack_Stg_Overload (see 3.4.41). Hacker activities cause storage overload
A hacker initiates processes that tax the amount of storage available in the system (TOE).
Such would be the case when a hacker floods the TOE with e-mails.
This attack is countered solely by the TOE.
7.1. GENERAL THREATS AND ATTACKS RATIONALE. 145
7.1.20 Hacker eavesdrops on user data communications
T.Hack_Comm_Eavesdrop (see 3.5.5).
The following Detailed Attacks form this General Threat category:
DA.Hack_CommEaves_Eman (see 3.4.30). The communication mechanism emanates data
An outsider uses special equipment to capture emanations off the communications line.
This attack is countered solely by the TOE.
DA.Hack_CommEaves_Intrc (see 3.4.31). Outsider intercepts user communications
An outsider who is not an intended recipient intercepts user data communications.
This attack is countered solely by the TOE.
DA.Hack_CommEaves_Tap (see 3.6.12). An outsider taps a communications line
An outsider uses a device to physically tap the communications line.
This attack is to be countered with support from the Environment.
7.1.21 Hacker masquerading as a legitimate user or as system pro-
cess
T.Hack_Masq (see 3.5.6).
The following Detailed Attacks form this General Threat category:
DA.Hack_Masq_Hijack (see 3.4.34). A hacker assumes the identity of an authorized user
A hacker captures the interactive session of an authorized user. The hacker now appears
as a legitimate user and can perform any action allowed to that user, including reading or
modifying sensitive data.
This attack is countered solely by the TOE.
DA.Hack_Masq_Uwkstn (see 3.4.35). A user assumes the identity of an authorized user
An individual takes advantage of an unattended but active workstation to perform oper-
ations in the name of the logged-in user. Such operations may include some operations
that the attacker is not normally allowed to perform.
This attack is countered solely by the TOE.
DA.Hack_Masq_Wauth (see 3.6.13). Masquerading due to weak authentication
Services are provided to a user application without adequate authentication of the client
requesting the service. This would permit someone to receive services for which they are
not authorized. However, the server would see them as a legitimate user, which is why
this is classified as a masquerade attack.
This attack is to be countered with support from the Environment.
7.1.22 Exploitation of vulnerabilities in the physical environment
of the system
T.Hack_Phys (see 3.5.7).
The following Detailed Attacks form this General Threat category:
DA.Hack_Phys_Crypto (see 3.6.14). Physical attack on cryptographic assets
Physical attack causes damage to cryptographic functions and/or release of cryptographic
assets
This attack is to be countered with support from the Environment.
DA.Hack_Phys_Damage (see 3.6.15). Hacker physically attacks the system
Hacker physically attacks the system, causing physical damage and loss of security pro-
tection.
This attack is to be countered with support from the Environment.
146 CHAPTER 7. RATIONALE
7.1.23 Social engineering
T.Hack_Social_Engineer (see 3.5.8).
The following Detailed Attacks form this General Threat category:
DA.Hack_SocEng_Password (see 3.6.16). Social engineering to steal password
A hacker persuades a user or administrator to reveal his password, giving the hacker
access to the person’s account privileges.
This attack is to be countered with support from the Environment.
DA.Hack_SocEng_SysInfo (see 3.6.17). Hacker uses social engineering to learn system infor-
mation
A hacker persuades a user or administrator to reveal information about system operational
procedures, auditing and known flaws.
This attack is to be countered with support from the Environment.
7.1.24 A critical system component fails
T.Component_Failure (see 3.5.9).
The following Detailed Attacks form this General Threat category:
DA.Hardware_Flaw (see 3.6.18). System hardware fails during system operation
System use uncovers a hardware flaw in a critical system component.
This attack is to be countered with support from the Environment.
DA.Phys_CompFail_Res (see 3.4.42). Resource depletion failure
A system allocates so many resources that not enough are left for a critical component to
function correctly.
This attack is countered solely by the TOE.
DA.Software_Flaw (see 3.6.19). System use uncovers an intrinsic software flaw in a critical
system component
An authorized user performs an operation or set of operations, exercising a software flaw
in a security-critical component.
This attack is to be countered with support from the Environment.
DA.TSF_Err_Conf_Crypto (see 3.4.47). Accidental release of cryptographic assets due to TSF
flaw or malfunction
The TSF accidentally releases sensitive plaintext data, red keys, or other cryptographic
assets to an inappropriate audience.
This attack is countered solely by the TOE.
7.1.25 Failure of a distributed system component
T.Failure_DS_Comp (see 3.5.10).
The following Detailed Attacks form this General Threat category:
DA.Failure_DS_Comm (see 3.6.20). Communications function failure
Failure of a communications function severs communications between security-critical
(TSF) components.
This attack is to be countered with support from the Environment.
7.1. GENERAL THREATS AND ATTACKS RATIONALE. 147
7.1.26 Recipient denies receiving information
T.Repudiate_Receive (see 3.5.11).
The following Detailed Attacks form this General Threat category:
DA.Repudiate_Rcvr_Int (see 3.6.21). Denial of having received data from another local user
A local, authorized user receives a message from another local user via the system, and
then denies having received it. This typically affects the sender of the message who is
counting on responsibilities associated with receipt of the message.
This attack is to be countered with support from the Environment.
DA.Repudiate_Rcvr_Local (see 3.6.22). Denial of having received information from a remote
user
A local, authorized user receives a message from another user at a remote trusted product,
and then denies having received it.
This attack is to be countered with support from the Environment.
DA.Repudiate_Rcvr_Rem (see 3.6.23). Denial of having received information by a remote user
A local, authorized user sends a message to another user at a remote trusted product who
then denies having received it.
This attack is to be countered with support from the Environment.
7.1.27 A participant denies performing a transaction
T.Repudiate_Transact (see 3.5.12).
The following Detailed Attacks form this General Threat category:
DA.Repudiate_Trans_Loc (see 3.6.24). Circumvent non-repudiation in a transaction involving
a user and a local system
An authorized user participates in a transaction by responding to system/application prompts
and then denies that the dialogue took place. The user and system/application are collo-
cated.
This attack is to be countered with support from the Environment.
DA.Repudiate_Trans_Uloc (see 3.6.25). Circumvent non-repudiation in a transaction involving
a local user and a remote system
An authorized user participates in a transaction by responding to remote system/application
prompts and then denies that the dialogue took place.
This attack is to be countered with support from the Environment.
DA.Repudiate_Trans_Urem (see 3.6.26). Circumvent non-repudiation in a transaction involv-
ing a remote user and a local system
An authorized remote user participates in a transaction by responding to local system/application
prompts and then denies that the dialogue took place.
This attack is to be countered with support from the Environment.
7.1.28 User error makes data inaccessible
T.User_Err_Inaccess (see 3.5.13).
The following Detailed Attacks form this General Threat category:
DA.User_Err_Delete (see 3.6.27). User error deletes data
An authorized user accidentally deletes user data.
This attack is to be countered with support from the Environment.
148 CHAPTER 7. RATIONALE
DA.User_Err_Mod_Attr (see 3.4.61). User error modifying attributes availability
An authorized user erroneously modifies the initial security attributes of user data, which
makes the data inaccessible.
This attack is countered solely by the TOE.
DA.User_Err_Set_Attr (see 3.4.64). User error setting attributes availability
An authorized user erroneously sets the initial security attributes of user data, which
makes the data inaccessible.
This attack is countered solely by the TOE.
7.1.29 User’s misuse causes denial of service
T.User_Misuse_Avl_Resc (see 3.5.14).
The following Detailed Attacks form this General Threat category:
DA.User_Comm_Overload (see 3.4.55). User’s unauthorized use causes overload of commu-
nication resources
An authorized user exceeds the authorized use of communication resources during the
system (TOE) operation. This causes a denial or delay in service to legitimate operations
within the TOE scope of control.
This attack is countered solely by the TOE.
DA.User_ErrAvl_AudExhst (see 3.4.56). Denial of service due to exhausted audit storage
An authorized user’s actions generate so many audit records that audit storage space is
exhausted and the system subsequently denies further service until audit storage becomes
available.
This attack is countered solely by the TOE.
DA.User_Obst_Res_Use (see 3.6.28). User obstructs legitimate use of resources.
An authorized user obstructs the use resources by unauthorized modification of data file,
communication channel, or object security attributes.
This attack is to be countered with support from the Environment.
DA.User_Prcsr_Overload (see 3.4.69). User’s unauthorized actions over-task the system caus-
ing processor overload
The system (TOE) has been over-tasked and can not complete the assigned tasking at all
or in an expected amount of time. The user invokes processing functions in association
with unauthorized activity that leads to overburdening processing resources on the TOE.
This attack is countered solely by the TOE.
DA.User_Stg_Overload (see 3.4.72). User’s unauthorized actions cause storage overload
An authorized user’s unauthorized use of data storage causes a shortage of disk space for
other users.
This attack is countered solely by the TOE.
7.2 Attacks and Security Objectives correspondence.
Once General Threats are decomposed into Detailed Attacks, security Objectives are allocated to
counter each one of these relevant Detailed Attacks. This section presents such mapping, where
for each attack, the applicable Security Objectives are shown.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 149
7.2.1 Accidental mismanagement of cryptographic functions
DA.Adm_Err_Crypto (see 3.4.1).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Account (see 4.1.38). Auditing for user accountability
Provide information about past user behavior to an authorized user through system mech-
anisms. Specifically, during any specified time interval, the system is able to report to a
user acting in an identified audit role selected auditable actions that a user has performed,
and as a result, what auditable objects were affected and what auditable information was
received by that user.
This objetive is fullfilled by the TOE.
O.Crypto_Key_Man (see 4.1.55). Cryptographic Key Management
Fully define cryptographic components, functions, and interfaces. Ensure appropriate
protection for cryptographic keys throughout their lifecycle, covering generation, distri-
bution, storage, use, and destruction.
This objetive is fullfilled by the TOE.
O.Crypto_Manage_Roles (see 4.1.56). Management of cryptographic roles
Provide one or more roles to manage cryptographic assets and attributes.
This objetive is fullfilled by the TOE.
O.I&A_User_Action (see 4.1.74). User-action identification and authentication
Associate each user-requested action with the user who requested the action.
This objetive is fullfilled by the TOE.
7.2.2 Destruction or modification of audit data
DA.Adm_Hstl_Audit_Dstr (see 3.4.2).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Admin_Role (see 4.1.39). Audit-administration role duties
Deter modification or destruction of audit data through the creation of an audit-administration
role.
This objetive is fullfilled by the TOE.
O.Audit_Protect (see 4.1.44). Protect stored audit records
Protect audit records against unauthorized access, modification, or deletion to ensure ac-
countability of user actions.
This objetive is fullfilled by the TOE.
O.I&A_User (see 4.1.73). Identify and authenticate each user
Uniquely identify and authenticate each user of the system.
This objetive is fullfilled by the TOE.
7.2.3 Administrator modifies or destroys user data or applications
DA.Adm_Hstl_Mod_DataAps (see 3.4.3).
The following Security Objective(s) are considered sufficient to counter this attack:
O.AC_Admin_Limit (see 4.1.1). Limitation of administrative access control
Design administrative functions in such a way that administrators do not automatically
have access to user objects, except for necessary exceptions. For an accounts adminis-
trator, the necessary exceptions include allocation and de-allocation of storage. For an
audit administrator, the necessary exceptions include observation of audited actions. In
general, the exceptions tend to be role specific.
This objetive is fullfilled by the TOE.
150 CHAPTER 7. RATIONALE
O.Audit_Admin_Role (see 4.1.39). Audit-administration role duties
Deter modification or destruction of audit data through the creation of an audit-administration
role.
This objetive is fullfilled by the TOE.
O.I&A_User (see 4.1.73). Identify and authenticate each user
Uniquely identify and authenticate each user of the system.
This objetive is fullfilled by the TOE.
O.Trusted_Path&Channel (see 4.1.136). Trusted path and channel
Provide a trusted path to security-critical (TSF) data in which both end points have assured
identities. For the remote user, there needs to be a trusted channel as well.
This objetive is fullfilled by the TOE.
7.2.4 Administrator maliciously modifies or deletes data access con-
trol attributes
DA.Adm_Hstl_Mod_Data_AC (see 3.4.4).
The following Security Objective(s) are considered sufficient to counter this attack:
O.AC_Admin_Limit (see 4.1.1). Limitation of administrative access control
Design administrative functions in such a way that administrators do not automatically
have access to user objects, except for necessary exceptions. For an accounts adminis-
trator, the necessary exceptions include allocation and de-allocation of storage. For an
audit administrator, the necessary exceptions include observation of audited actions. In
general, the exceptions tend to be role specific.
This objetive is fullfilled by the TOE.
O.Audit_Account (see 4.1.38). Auditing for user accountability
Provide information about past user behavior to an authorized user through system mech-
anisms. Specifically, during any specified time interval, the system is able to report to a
user acting in an identified audit role selected auditable actions that a user has performed,
and as a result, what auditable objects were affected and what auditable information was
received by that user.
This objetive is fullfilled by the TOE.
O.Audit_Loss_Respond (see 4.1.43). Respond to possible loss of stored audit records
Respond to possible loss of audit records when audit trail storage is full or nearly full.
This objetive is fullfilled by the TOE.
O.Audit_Protect (see 4.1.44). Protect stored audit records
Protect audit records against unauthorized access, modification, or deletion to ensure ac-
countability of user actions.
This objetive is fullfilled by the TOE.
7.2.5 The administrator maliciously modifies information flow con-
trol.
DA.Adm_Hstl_Mod_IFC (see 3.4.5).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Admin_Role (see 4.1.39). Audit-administration role duties
Deter modification or destruction of audit data through the creation of an audit-administration
role.
This objetive is fullfilled by the TOE.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 151
O.Audit_Protect (see 4.1.44). Protect stored audit records
Protect audit records against unauthorized access, modification, or deletion to ensure ac-
countability of user actions.
This objetive is fullfilled by the TOE.
O.I&A_User (see 4.1.73). Identify and authenticate each user
Uniquely identify and authenticate each user of the system.
This objetive is fullfilled by the TOE.
O.Info_Flow_Ctrl_Admin (see 4.1.77). Provide information flow control administration
Manage information flow control policy and functions to allow only specified administra-
tors to have the ability to manipulate the information flow control.
This objetive is fullfilled by the TOE.
7.2.6 Administrator maliciously modifies system entry parameters
DA.Adm_Hstl_Mod_SEP (see 3.4.6).
The following Security Objective(s) are considered sufficient to counter this attack:
O.AC_Admin_Limit (see 4.1.1). Limitation of administrative access control
Design administrative functions in such a way that administrators do not automatically
have access to user objects, except for necessary exceptions. For an accounts adminis-
trator, the necessary exceptions include allocation and de-allocation of storage. For an
audit administrator, the necessary exceptions include observation of audited actions. In
general, the exceptions tend to be role specific.
This objetive is fullfilled by the TOE.
O.Aud_Sys_Entry_Parms (see 4.1.37). Audit changes of system entry parameters
Deter an administrator from changing system entry parameters to allow an unauthorized
user access to organizational assets to which they are forbidden.
This objetive is fullfilled by the TOE.
O.Audit_Admin_Role (see 4.1.39). Audit-administration role duties
Deter modification or destruction of audit data through the creation of an audit-administration
role.
This objetive is fullfilled by the TOE.
O.I&A_User (see 4.1.73). Identify and authenticate each user
Uniquely identify and authenticate each user of the system.
This objetive is fullfilled by the TOE.
7.2.7 Administrator maliciously modifies security-critical code
DA.Adm_Hstl_Mod_TSFCode (see 3.4.7).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Obj_Protection (see 4.1.103). Object domain protection
Require domain protection for objects. Specify object classes (domains), user groups,
and operation classes. Use these to specify which operations may be performed on which
objects by which users. Basically this controls what users can do in a given group.
This objetive is fullfilled by the TOE.
O.Sys_Self_Protection (see 4.1.128). Protection of system security function
Protect the system security functions through technical features.
This objetive is fullfilled by the TOE.
152 CHAPTER 7. RATIONALE
O.TSF_Mod_Limit (see 4.1.129). Limit administrator’s modification of security-critical code
or data
Limit the malicious modification of security-critical (TSF) code and data to include spe-
cific system code to prevent the system security protection capabilities from being dimin-
ished or weakened.
This objetive is fullfilled by the TOE.
7.2.8 Administrator maliciously modifies user/subject bindings
DA.Adm_Hstl_Mod_USB (see 3.4.8).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Adm_Limits_Bindings (see 4.1.4). Limit an administrator’s ability to modify user-subject
bindings
Limit the administrator from modification of user-subject bindings in an effort to deter
users acting without accountability.
This objetive is fullfilled by the TOE.
7.2.9 Administrator maliciously modifies user attributes and/or roles
DA.Adm_Hstl_Mod_UsrAttr (see 3.4.9).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Adm_User_Att_Mod (see 4.1.5). Limit administrator’s modification of user attributes
Deter the administrator from maliciously modifying users’ attributes. Such modifications
could allow unauthorized user actions or denial of service to a legitimate user.
This objetive is fullfilled by the TOE.
7.2.10 User privileges and/or authorizations are not updated upon
reassignment
DA.Adm_Misconfig_User (see 3.4.10).
The following Security Objective(s) are considered sufficient to counter this attack:
O.User_Auth_Management (see 4.1.140). User authorization management
Manage and update user authorization and privilege data in accordance with organiza-
tional security and personnel policies.
This objetive is fullfilled by the TOE.
7.2.11 Administrator error modifies access control or information
flow policy
DA.Admin_Err_AC_Policy (see 3.4.11).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Guidance (see 4.1.8). Administrator guidance documentation
Deter administrator errors by providing adequate administrator guidance.
This objetive is fullfilled by the TOE.
O.Security_Attr_Mgt (see 4.1.114). Manage security attributes
Manage the initialization of, values for, and allowable operations on security attributes.
This objetive is fullfilled by the TOE.
O.Security_Data_Mgt (see 4.1.115). Manage security-critical data
Manage the initialization of, limits on, and allowable operations on security-critical data.
This objetive is fullfilled by the TOE.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 153
O.Security_Func_Mgt (see 4.1.116). Manage behavior of security functions
Provide management mechanisms for security mechanisms.
This objetive is fullfilled by the TOE.
O.Security_Roles (see 4.1.117). Security roles
Maintain security-relevant roles and the association of users with those roles.
This objetive is fullfilled by the TOE.
7.2.12 Administrator error changes audit behavior
DA.Admin_Err_Audit (see 3.4.12).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Guidance (see 4.1.8). Administrator guidance documentation
Deter administrator errors by providing adequate administrator guidance.
This objetive is fullfilled by the TOE.
O.Audit_Admin_Role (see 4.1.39). Audit-administration role duties
Deter modification or destruction of audit data through the creation of an audit-administration
role.
This objetive is fullfilled by the TOE.
O.Audit_Loss_Respond (see 4.1.43). Respond to possible loss of stored audit records
Respond to possible loss of audit records when audit trail storage is full or nearly full.
This objetive is fullfilled by the TOE.
O.Audit_Protect (see 4.1.44). Protect stored audit records
Protect audit records against unauthorized access, modification, or deletion to ensure ac-
countability of user actions.
This objetive is fullfilled by the TOE.
O.I&A_User (see 4.1.73). Identify and authenticate each user
Uniquely identify and authenticate each user of the system.
This objetive is fullfilled by the TOE.
O.Security_Data_Mgt (see 4.1.115). Manage security-critical data
Manage the initialization of, limits on, and allowable operations on security-critical data.
This objetive is fullfilled by the TOE.
O.Security_Roles (see 4.1.117). Security roles
Maintain security-relevant roles and the association of users with those roles.
This objetive is fullfilled by the TOE.
7.2.13 Administrator error modifies authentication enforcement
DA.Admin_Err_Authentic (see 3.4.13).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Guidance (see 4.1.8). Administrator guidance documentation
Deter administrator errors by providing adequate administrator guidance.
This objetive is fullfilled by the TOE.
O.Limit_Actions_Auth (see 4.1.89). Restrict actions before authentication
Restrict the actions a user may perform before the TOE verifies the identity of the user.
This objetive is fullfilled by the TOE.
O.Security_Data_Mgt (see 4.1.115). Manage security-critical data
Manage the initialization of, limits on, and allowable operations on security-critical data.
This objetive is fullfilled by the TOE.
154 CHAPTER 7. RATIONALE
7.2.14 Administrator error makes information unavailable
DA.Admin_Err_Info (see 3.4.14).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Guidance (see 4.1.8). Administrator guidance documentation
Deter administrator errors by providing adequate administrator guidance.
This objetive is fullfilled by the TOE.
O.Priority_Of_Service (see 4.1.104). Provide priority of service
Control access to resources so that lower-priority activities do not unduly interfere with
or delay higher-priority activities.
This objetive is fullfilled by the TOE.
O.Resource_Quotas (see 4.1.110). Resource quotas for users and services
Use resource quotas to limit user and service use of system resources to a level that will
prevent degradation or denial of service to other critical users and services.
This objetive is fullfilled by the TOE.
O.Security_Data_Mgt (see 4.1.115). Manage security-critical data
Manage the initialization of, limits on, and allowable operations on security-critical data.
This objetive is fullfilled by the TOE.
O.Security_Roles (see 4.1.117). Security roles
Maintain security-relevant roles and the association of users with those roles.
This objetive is fullfilled by the TOE.
7.2.15 Back door left open
DA.Admin_Err_Omit_Trap (see 3.4.15).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Maintenance_Access (see 4.1.93). Controlled access by maintenance personnel
Control access to the system by maintenance personnel who troubleshoot the system and
perform system updates.
This objetive is fullfilled by the TOE.
O.Maintenance_Recover (see 4.1.94). Expiration of maintenance privileges
Terminate maintenance user system access privilege automatically after expiration of as-
signed timed interval.
This objetive is fullfilled by the TOE.
O.Prvlg_IF_Status (see 4.1.105). Privileged-interface status
Provide capability for an administrator to determine the use status of all privileged inter-
faces. This would include interfaces used by maintenance personnel.
This objetive is fullfilled by the TOE.
7.2.16 Administrator error makes resource unavailable
DA.Admin_Err_Resource (see 3.4.16).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Guidance (see 4.1.8). Administrator guidance documentation
Deter administrator errors by providing adequate administrator guidance.
This objetive is fullfilled by the TOE.
O.Security_Attr_Mgt (see 4.1.114). Manage security attributes
Manage the initialization of, values for, and allowable operations on security attributes.
This objetive is fullfilled by the TOE.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 155
7.2.17 Administrator error modifies entry policy
DA.Admin_Err_Sys_Entry (see 3.4.17).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Guidance (see 4.1.8). Administrator guidance documentation
Deter administrator errors by providing adequate administrator guidance.
This objetive is fullfilled by the TOE.
O.Security_Data_Mgt (see 4.1.115). Manage security-critical data
Manage the initialization of, limits on, and allowable operations on security-critical data.
This objetive is fullfilled by the TOE.
7.2.18 Administrator fails to update security configuration
DA.Admin_Err_Update (see 3.4.18).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Guidance (see 4.1.8). Administrator guidance documentation
Deter administrator errors by providing adequate administrator guidance.
This objetive is fullfilled by the TOE.
O.Audit_Account (see 4.1.38). Auditing for user accountability
Provide information about past user behavior to an authorized user through system mech-
anisms. Specifically, during any specified time interval, the system is able to report to a
user acting in an identified audit role selected auditable actions that a user has performed,
and as a result, what auditable objects were affected and what auditable information was
received by that user.
This objetive is fullfilled by the TOE.
O.Secure_Configuration (see 4.1.112). Security-relevant configuration management
Manage and update system security policy data and enforcement functions, and other
security-relevant configuration data, in accordance with organizational security policies.
This objetive is fullfilled by the TOE.
7.2.19 Administrator error modifies user security attributes
DA.Admin_Err_User_Attr (see 3.4.19).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Guidance (see 4.1.8). Administrator guidance documentation
Deter administrator errors by providing adequate administrator guidance.
This objetive is fullfilled by the TOE.
O.Security_Attr_Mgt (see 4.1.114). Manage security attributes
Manage the initialization of, values for, and allowable operations on security attributes.
This objetive is fullfilled by the TOE.
O.Security_Data_Mgt (see 4.1.115). Manage security-critical data
Manage the initialization of, limits on, and allowable operations on security-critical data.
This objetive is fullfilled by the TOE.
O.Security_Func_Mgt (see 4.1.116). Manage behavior of security functions
Provide management mechanisms for security mechanisms.
This objetive is fullfilled by the TOE.
O.Security_Roles (see 4.1.117). Security roles
Maintain security-relevant roles and the association of users with those roles.
This objetive is fullfilled by the TOE.
156 CHAPTER 7. RATIONALE
O.User_Attributes (see 4.1.139). Maintain user attributes
Maintain a set of security attributes (which may include group membership, clearance,
access rights, etc.) associated with individual users in addition to user identity.
This objetive is fullfilled by the TOE.
7.2.20 Administrator aggregates privacy information
DA.Admin_UserPriv_Agg (see 3.6.1).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Limit_ObserveRoles (see 4.2.5). Limit observation of service usage to authorized users
Provide authorized users with the capability to observe the usage of specified services or
resources as necessary to perform their duties.
This objetive is assumed to be fulfilled by the environment.
O.Prevent_Link (see 4.2.14). Prevent linking of multiple service use
Ensure that a user may make multiple uses of a service or resource without other specified
users being able to link these uses together.
This objetive is assumed to be fulfilled by the environment.
O.Prevent_Observe (see 4.2.15). Prevent observation of service use
Ensure that a user may use a service or resource without other specified users being able
to observe that the service or resource is being used.
This objetive is assumed to be fulfilled by the environment.
7.2.21 Administrator reads collected user privacy information
DA.Admin_UserPriv_Col (see 3.6.2).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Prevent_AskPrivInfo (see 4.2.13). Prevent system from collecting user privacy information
Provide some services or resources to specified users without soliciting from the user
information that is relevant to the user’s privacy.
This objetive is assumed to be fulfilled by the environment.
7.2.22 Administrator reads system generated privacy information
DA.Admin_UserPriv_Gen (see 3.6.3).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Permit_Aliases (see 4.2.11). Permit users to use services under aliases
Permit some users to maintain partial anonymity when using specified services or re-
sources by means of aliases.
This objetive is assumed to be fulfilled by the environment.
O.Permit_Anonymity (see 4.2.12). Permit users to use services anonymously
Permit some users to maintain anonymity when using specified services or resources.
This objetive is assumed to be fulfilled by the environment.
7.2.23 Inconsistent interpretation of audit data attributes
DA.Dev_FC_Attr_Interp (see 3.4.20).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Integrity_Attr_Exch (see 4.1.83). Correct attribute exchange with another trusted product
Ensure that the system correctly exchanges security-attribute information with another
trusted IT product.
This objetive is fullfilled by the TOE.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 157
7.2.24 Buffers not cleared by the system
DA.Dev_FC_Buff_Not_Clr (see 3.4.21).
The following Security Objective(s) are considered sufficient to counter this attack:
O.No_Residual_Info (see 4.1.97). Eliminate residual information
Ensure there is no object reuse; i.e., ensure that there is no residual information in some
information containers or system resources upon their reallocation to different users.
This objetive is fullfilled by the TOE.
7.2.25 Incorrect modification of control data
DA.Dev_FC_Ctrl_Data (see 3.4.22).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Integ_Sys_Data_Int (see 4.1.81). Integrity of system data transferred internally
Ensure the integrity of system data transferred internally.
This objetive is fullfilled by the TOE.
7.2.26 System data incorrectly exchanged
DA.Dev_FC_Data_Export (see 3.4.23).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Integ_Sys_Data_Ext (see 4.1.80). Integrity of system data transferred externally
Ensure the integrity of system data exchanged externally with another trusted product by
using a protocol for data transfer that will permit error detection and correction. This
includes detecting and possibly correcting errors in data received and encoding outgoing
data to make it possible for the receiver to detect and possibly correct errors. The method
for detecting and correcting errors is based on some method (protocol) that is agreed upon
by participating parties.
This objetive is fullfilled by the TOE.
7.2.27 Non-secure recovery
DA.Dev_FC_Recovery (see 3.4.24).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Secure_State (see 4.1.113). Protect and maintain secure system state
Maintain and recover to a secure state without security compromise after system error or
other interruption of system operation.
This objetive is fullfilled by the TOE.
7.2.28 Inaccurate system-data replication
DA.Dev_FC_Replication (see 3.4.25).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Integrity_Data_Rep (see 4.1.85). Integrity of system data replication
Ensure that when system data replication occurs across the system the data is consistent
for each replication.
This objetive is fullfilled by the TOE.
158 CHAPTER 7. RATIONALE
7.2.29 System modification by unauthorized source
DA.Dev_FC_Self_Protect (see 3.4.26).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Correct_Operation (see 4.1.49). Verify correct operation as designed
Provide the ability for the authorized user to verify that the system operates as designed.
This objetive is fullfilled by the TOE.
O.Sys_Self_Protection (see 4.1.128). Protection of system security function
Protect the system security functions through technical features.
This objetive is fullfilled by the TOE.
7.2.30 Malicious developer creates secret trapdoor in system
DA.Dev_FC_Trap_Door (see 3.4.27).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Account (see 4.1.38). Auditing for user accountability
Provide information about past user behavior to an authorized user through system mech-
anisms. Specifically, during any specified time interval, the system is able to report to a
user acting in an identified audit role selected auditable actions that a user has performed,
and as a result, what auditable objects were affected and what auditable information was
received by that user.
This objetive is fullfilled by the TOE.
O.Audit_Admin_Role (see 4.1.39). Audit-administration role duties
Deter modification or destruction of audit data through the creation of an audit-administration
role.
This objetive is fullfilled by the TOE.
O.Code_Signing (see 4.1.46). Code signing and verification
Check verification of signed downloaded code prior to execution. A well-known example
is checking digital signatures on signed Java applets.
This objetive is fullfilled by the TOE.
O.I&A_User (see 4.1.73). Identify and authenticate each user
Uniquely identify and authenticate each user of the system.
This objetive is fullfilled by the TOE.
O.Source_Code_Exam (see 4.1.121). Examine the source code for developer flaws
Examine for accidental or deliberate flaws in code made by the developer. The accidental
flaws could be lack of engineering detail or bad design. Where the deliberate flaws would
include building trapdoors for later entry as an example.
This objetive is fullfilled by the TOE.
7.2.31 Communications function failure
DA.Failure_DS_Comm (see 3.6.20).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Fault_Tolerance (see 4.2.4). Provide fault tolerant operations for critical components
Provide fault tolerant operations for critical components and continue to operate in the
presence of specific failures in one or more system components.
This objetive is assumed to be fulfilled by the environment.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 159
O.Integrity_Data_Rep (see 4.1.85). Integrity of system data replication
Ensure that when system data replication occurs across the system the data is consistent
for each replication.
This objetive is fullfilled by the TOE.
O.Trusted_DS_Recov (see 4.1.134). Trusted distributed system recovery
Ensure that a replaced failed component when re-integrated into the system will recover
such that it will not cause errors or security breaches in other parts of the system.
This objetive is fullfilled by the TOE.
7.2.32 Hacker gains access through a vulnerability in code
DA.Hack_AC_Code_Vul (see 3.4.28).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Apply_Code_Fixes (see 4.1.9). Apply patches to fix the code
Apply patches to fix the code when vulnerabilities in code allow unauthorized and undis-
covered access.
This objetive is fullfilled by the TOE.
O.Audit_Deter_Misuse (see 4.1.40). Audit system access to deter misuse
Audit system access to discover system misuse and provide a potential deterrent by warn-
ing the user.
This objetive is fullfilled by the TOE.
7.2.33 Weak system access control mechanism or system access
control implementation
DA.Hack_AC_Weak (see 3.4.29).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Hack_Limit_Sessions (see 4.1.69). Limit sessions to outside users
Limit the number of sessions available to outside users. A hacker can initiate multiple
communication sessions that could cause an overload on resources, for example, half
open session starts as is seen in SYN flood attacks.
This objetive is fullfilled by the TOE.
O.Trusted_Path (see 4.1.135). Provide a trusted path
Provide a trusted path between the user and the system. Execution of a user-requested
action must be made via a trusted path with the following properties:
• The path is logically distinct from, and cannot be confused with other communica-
tion paths (by either the user or the system).
• The path provides assured identification of its end points.
This objetive is fullfilled by the TOE.
7.2.34 The communication mechanism emanates data
DA.Hack_CommEaves_Eman (see 3.4.30).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Data_Exchange_Conf (see 4.1.61). Enforce data exchange confidentiality
Protect user data confidentiality when exchanging data with a remote system.
This objetive is fullfilled by the TOE.
160 CHAPTER 7. RATIONALE
7.2.35 Outsider intercepts user communications
DA.Hack_CommEaves_Intrc (see 3.4.31).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Data_Exchange_Conf (see 4.1.61). Enforce data exchange confidentiality
Protect user data confidentiality when exchanging data with a remote system.
This objetive is fullfilled by the TOE.
7.2.36 An outsider taps a communications line
DA.Hack_CommEaves_Tap (see 3.6.12).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Comm_Line_Protection (see 4.2.3). Physical protection of the communications line
Protect communications lines from physical tampering.
This objetive is assumed to be fulfilled by the environment.
O.Tamper_ID (see 4.2.19). Tamper detection
Provide system features that detect physical tampering of a system component, and use
those features to limit security breaches.
This objetive is assumed to be fulfilled by the environment.
O.Tamper_Resistance (see 4.2.20). Tamper resistance
Prevent or resist physical tampering with specified system devices and components.
This objetive is assumed to be fulfilled by the environment.
7.2.37 Hacker causes overload of communication resources
DA.Hack_Comm_Overload (see 3.4.32).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Generation (see 4.1.42). Audit records with identity
Record in audit records: date and time of action, location of the action, and the entity
responsible for the action.
This objetive is fullfilled by the TOE.
O.Data_Imp_Exp_Control (see 4.1.63). Data import/export to/from system control
Protect data from being sent to erroneous places and more places external to the system
than allowed by the organization’s security policy. Conversely the import of data into
the system should be protected from illicit information or information not allowed by the
organization’s security policy.
This objetive is fullfilled by the TOE.
O.Hack_Limit_Sessions (see 4.1.69). Limit sessions to outside users
Limit the number of sessions available to outside users. A hacker can initiate multiple
communication sessions that could cause an overload on resources, for example, half
open session starts as is seen in SYN flood attacks.
This objetive is fullfilled by the TOE.
O.Hack_Traffic_Control (see 4.1.70). Control hacker communication traffic
Control (e.g. reroute or discard) hacker communication traffic to prevent potential dam-
age.
This objetive is fullfilled by the TOE.
O.Priority_Of_Service (see 4.1.104). Provide priority of service
Control access to resources so that lower-priority activities do not unduly interfere with
or delay higher-priority activities.
This objetive is fullfilled by the TOE.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 161
O.Resource_Quotas (see 4.1.110). Resource quotas for users and services
Use resource quotas to limit user and service use of system resources to a level that will
prevent degradation or denial of service to other critical users and services.
This objetive is fullfilled by the TOE.
7.2.38 Accidental or deliberate mishandling of cryptographic as-
sets external to the TOE
DA.Hack_Ext_CryptoAsset (see 3.4.33).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Crypto_Import_Export (see 4.1.54). Cryptographic import, export, and inter-TSF transfer
Protect cryptographic data assets when they are being transmitted to and from the TOE,
either through intervening untrusted components or directly to/from human users.
This objetive is fullfilled by the TOE.
O.Crypto_Manage_Roles (see 4.1.56). Management of cryptographic roles
Provide one or more roles to manage cryptographic assets and attributes.
This objetive is fullfilled by the TOE.
7.2.39 A hacker assumes the identity of an authorized user
DA.Hack_Masq_Hijack (see 3.4.34).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Gen_User (see 4.1.41). Individual accountability
Provide individual accountability for audited events. Uniquely identify each user so that
auditable actions can be traced to a user.
This objetive is fullfilled by the TOE.
O.Trusted_Path (see 4.1.135). Provide a trusted path
Provide a trusted path between the user and the system. Execution of a user-requested
action must be made via a trusted path with the following properties:
• The path is logically distinct from, and cannot be confused with other communica-
tion paths (by either the user or the system).
• The path provides assured identification of its end points.
This objetive is fullfilled by the TOE.
7.2.40 A user assumes the identity of an authorized user
DA.Hack_Masq_Uwkstn (see 3.4.35).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Gen_User (see 4.1.41). Individual accountability
Provide individual accountability for audited events. Uniquely identify each user so that
auditable actions can be traced to a user.
This objetive is fullfilled by the TOE.
O.Screen_Lock (see 4.1.111). User screen locking
Provide a screen lock function to prevent an unauthorized user from using an unattended
computer where a valid user has an active session.
This objetive is fullfilled by the TOE.
162 CHAPTER 7. RATIONALE
O.Session_Termination (see 4.1.118). System terminates session for inactivity
System terminates a session after a given interval of inactivity.
This objetive is fullfilled by the TOE.
O.Trusted_Path (see 4.1.135). Provide a trusted path
Provide a trusted path between the user and the system. Execution of a user-requested
action must be made via a trusted path with the following properties:
• The path is logically distinct from, and cannot be confused with other communica-
tion paths (by either the user or the system).
• The path provides assured identification of its end points.
This objetive is fullfilled by the TOE.
O.User_Guidance (see 4.1.146). User guidance documentation
Provide documentation for the general user.
This objetive is fullfilled by the TOE.
7.2.41 Masquerading due to weak authentication
DA.Hack_Masq_Wauth (see 3.6.13).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Generation (see 4.1.42). Audit records with identity
Record in audit records: date and time of action, location of the action, and the entity
responsible for the action.
This objetive is fullfilled by the TOE.
O.User_Auth_Enhanced (see 4.2.21). Enhanced user authentication
Execute enhanced measures to ensure that either user authentication data cannot be stolen
or when it is stolen, it cannot be used to gain access to the system.
This objetive is assumed to be fulfilled by the environment.
O.User_Auth_Multiple (see 4.2.22). Require multiple authentication mechanisms
Invoke multiple authentication mechanisms, which will provide confidence that the user
is who they say they are.
This objetive is assumed to be fulfilled by the environment.
7.2.42 Modification of security-critical data in transit from a re-
mote trusted site
DA.Hack_MsgData_RcvTSF (see 3.4.36).
The following Security Objective(s) are considered sufficient to counter this attack:
O.TSF_Rcv_Err_ID_Loc (see 4.1.130). Local detection of received security-critical data mod-
ified in transit
Identification by the system (TOE) of modification of security-critical (TSF) data occur-
ring in transit from a remote trusted site must occur.
This objetive is fullfilled by the TOE.
O.TSF_Rcv_Err_ID_Rem (see 4.1.131). Remote detection of received security-critical data
modified in transit
Identification by the remote site of the modification of security-critical (TSF) data occur-
ring in transit from the remote site must occur.
This objetive is fullfilled by the TOE.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 163
7.2.43 Modification of user data in transit from a remote site
DA.Hack_MsgData_RcvUsr (see 3.4.37).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Rcv_MsgMod_ID (see 4.1.106). Identify message modification in messages received
The TSF recognizes changes to messages that occurred in transit, including insertion of
spurious messages and deletion or replay of legitimate messages.
This objetive is fullfilled by the TOE.
O.Rcv_MsgMod_Rcvr (see 4.1.107). Recovery from modification of received messages
The TSF detects and corrects changes in messages received from a remote trusted site.
This objetive is fullfilled by the TOE.
7.2.44 Modification of security-critical data in transit to a remote
site
DA.Hack_MsgData_SndTSF (see 3.4.38).
The following Security Objective(s) are considered sufficient to counter this attack:
O.TSF_Snd_Err_ID_Loc (see 4.1.132). Local detection of sent security-critical data modified
in transit
Identification of modification of security-critical (TSF) data occurring in transit to a re-
mote site by the TSF must occur.
This objetive is fullfilled by the TOE.
O.TSF_Snd_Err_ID_Rem (see 4.1.133). Remote detection of sent security-critical data mod-
ified in transit.
Identification of modification of security-critical (TSF) data occurring in transit to a re-
mote site by the remote site must occur.
This objetive is fullfilled by the TOE.
7.2.45 Modification of user data in transit to a remote site
DA.Hack_MsgData_SndUsr (see 3.4.39).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Snt_MsgMod_ID (see 4.1.119). Identify message modification in messages sent
The TSF supports recognition of changes to transmitted messages that occurred in transit,
including insertion of spurious messages and deletion or replay of legitimate messages.
This objetive is fullfilled by the TOE.
O.Snt_MsgMod_Rcvr (see 4.1.120). Support recovery from modification of sent messages
The TSF supports detection of changes in messages sent to a remote trusted site.
This objetive is fullfilled by the TOE.
7.2.46 Physical attack on cryptographic assets
DA.Hack_Phys_Crypto (see 3.6.14).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Tamper_ID (see 4.2.19). Tamper detection
Provide system features that detect physical tampering of a system component, and use
those features to limit security breaches.
This objetive is assumed to be fulfilled by the environment.
O.Tamper_Resistance (see 4.2.20). Tamper resistance
Prevent or resist physical tampering with specified system devices and components.
This objetive is assumed to be fulfilled by the environment.
164 CHAPTER 7. RATIONALE
7.2.47 Hacker physically attacks the system
DA.Hack_Phys_Damage (see 3.6.15).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Tamper_ID (see 4.2.19). Tamper detection
Provide system features that detect physical tampering of a system component, and use
those features to limit security breaches.
This objetive is assumed to be fulfilled by the environment.
O.Tamper_Resistance (see 4.2.20). Tamper resistance
Prevent or resist physical tampering with specified system devices and components.
This objetive is assumed to be fulfilled by the environment.
7.2.48 Hacker causes system task overload resulting in denial of
service
DA.Hack_Prcsr_Overload (see 3.6.11).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Generation (see 4.1.42). Audit records with identity
Record in audit records: date and time of action, location of the action, and the entity
responsible for the action.
This objetive is fullfilled by the TOE.
O.Hack_Limit_Sessions (see 4.1.69). Limit sessions to outside users
Limit the number of sessions available to outside users. A hacker can initiate multiple
communication sessions that could cause an overload on resources, for example, half
open session starts as is seen in SYN flood attacks.
This objetive is fullfilled by the TOE.
O.Hack_Traffic_Control (see 4.1.70). Control hacker communication traffic
Control (e.g. reroute or discard) hacker communication traffic to prevent potential dam-
age.
This objetive is fullfilled by the TOE.
O.Priority_Of_Service (see 4.1.104). Provide priority of service
Control access to resources so that lower-priority activities do not unduly interfere with
or delay higher-priority activities.
This objetive is fullfilled by the TOE.
O.React_Discovered_Atk (see 4.2.16). React to discovered attacks
Implement automated notification or other reactions to the TSF-discovered attacks in an
effort to identify attacks and to create an attack deterrent.
This objetive is assumed to be fulfilled by the environment.
O.Resource_Quotas (see 4.1.110). Resource quotas for users and services
Use resource quotas to limit user and service use of system resources to a level that will
prevent degradation or denial of service to other critical users and services.
This objetive is fullfilled by the TOE.
7.2.49 Social engineering to steal password
DA.Hack_SocEng_Password (see 3.6.16).
The following Security Objective(s) are considered sufficient to counter this attack:
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 165
O.Limit_Mult_Sessions (see 4.1.91). Limit multiple sessions
Provide the capability to limit the number of sessions that a user may have open at one
time.
This objetive is fullfilled by the TOE.
O.User_Auth_Enhanced (see 4.2.21). Enhanced user authentication
Execute enhanced measures to ensure that either user authentication data cannot be stolen
or when it is stolen, it cannot be used to gain access to the system.
This objetive is assumed to be fulfilled by the environment.
7.2.50 Hacker uses social engineering to learn system information
DA.Hack_SocEng_SysInfo (see 3.6.17).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Guidance (see 4.1.8). Administrator guidance documentation
Deter administrator errors by providing adequate administrator guidance.
This objetive is fullfilled by the TOE.
O.Audit_Unusual_User (see 4.2.1). Audit unusual user activity
Audit unusual user activity.
This objetive is assumed to be fulfilled by the environment.
O.Identify_Unusual_Act (see 4.1.75). Identify unusual user activity
Identify unusual user activity on the system.
This objetive is fullfilled by the TOE.
O.User_Guidance (see 4.1.146). User guidance documentation
Provide documentation for the general user.
This objetive is fullfilled by the TOE.
7.2.51 Login program replicated to capture authentication data
DA.Hack_Spoof_Login (see 3.6.10).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Trusted_Path (see 4.1.135). Provide a trusted path
Provide a trusted path between the user and the system. Execution of a user-requested
action must be made via a trusted path with the following properties:
• The path is logically distinct from, and cannot be confused with other communica-
tion paths (by either the user or the system).
• The path provides assured identification of its end points.
This objetive is fullfilled by the TOE.
O.User_Auth_Enhanced (see 4.2.21). Enhanced user authentication
Execute enhanced measures to ensure that either user authentication data cannot be stolen
or when it is stolen, it cannot be used to gain access to the system.
This objetive is assumed to be fulfilled by the environment.
166 CHAPTER 7. RATIONALE
7.2.52 Attacker modifies protocol headers
DA.Hack_Spoof_MsgHdr (see 3.4.40).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Comm_Trusted_Channel (see 4.1.47). Trusted channel to remote trusted system
Provide a communications channel between the system and a remote trusted system for
the performance of security-critical operations.
This objetive is fullfilled by the TOE.
O.Crypto_Comm_Channel (see 4.1.51). Encrypted communications channel
Provide secure session establishment between the system and remote systems using en-
cryption functions.
This objetive is fullfilled by the TOE.
O.Integrity_Attr_Exch (see 4.1.83). Correct attribute exchange with another trusted product
Ensure that the system correctly exchanges security-attribute information with another
trusted IT product.
This objetive is fullfilled by the TOE.
O.NonRepudiate_Sent (see 4.1.101). Non-repudiation for sent information
Provide evidence that a user sent information.
This objetive is fullfilled by the TOE.
7.2.53 Hacker activities cause storage overload
DA.Hack_Stg_Overload (see 3.4.41).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Generation (see 4.1.42). Audit records with identity
Record in audit records: date and time of action, location of the action, and the entity
responsible for the action.
This objetive is fullfilled by the TOE.
O.Guarantee_Audit_Stg (see 4.1.68). Guarantee the availability of audit storage space
Maintain audit data and guarantee space for that data.
This objetive is fullfilled by the TOE.
O.Hack_Limit_Sessions (see 4.1.69). Limit sessions to outside users
Limit the number of sessions available to outside users. A hacker can initiate multiple
communication sessions that could cause an overload on resources, for example, half
open session starts as is seen in SYN flood attacks.
This objetive is fullfilled by the TOE.
O.Hack_Traffic_Control (see 4.1.70). Control hacker communication traffic
Control (e.g. reroute or discard) hacker communication traffic to prevent potential dam-
age.
This objetive is fullfilled by the TOE.
O.Manage_TSF_Data (see 4.1.96). Manage security-critical data to avoid storage space being
exceeded
Manage security-critical (TSF) data to ensure that the size of the data does not exceed the
space allocated for storage of the data.
This objetive is fullfilled by the TOE.
O.Priority_Of_Service (see 4.1.104). Provide priority of service
Control access to resources so that lower-priority activities do not unduly interfere with
or delay higher-priority activities.
This objetive is fullfilled by the TOE.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 167
O.Resource_Quotas (see 4.1.110). Resource quotas for users and services
Use resource quotas to limit user and service use of system resources to a level that will
prevent degradation or denial of service to other critical users and services.
This objetive is fullfilled by the TOE.
7.2.54 System hardware fails during system operation
DA.Hardware_Flaw (see 3.6.18).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Fail_Secure (see 4.1.66). Preservation of secure state for failures in critical components
Preserve the secure state of the system in the event of a secure component failure.
This objetive is fullfilled by the TOE.
O.Fault_Tolerance (see 4.2.4). Provide fault tolerant operations for critical components
Provide fault tolerant operations for critical components and continue to operate in the
presence of specific failures in one or more system components.
This objetive is assumed to be fulfilled by the environment.
7.2.55 Malicious code perpetrator dissemination
DA.Mal_Code_Hack_Downld (see 3.6.4).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Clean_Obj_Recovery (see 4.2.2). Object and data recovery free from malicious code
Recover to a viable state after malicious code is introduced and damage occurs, removing
the malicious code as part of the process.
This objetive is assumed to be fulfilled by the environment.
O.Code_Signing (see 4.1.46). Code signing and verification
Check verification of signed downloaded code prior to execution. A well-known example
is checking digital signatures on signed Java applets.
This objetive is fullfilled by the TOE.
O.General_Integ_Checks (see 4.1.67). Periodically check integrity
Provide periodic integrity checks on both system and user data.
This objetive is fullfilled by the TOE.
O.Input_Inspection (see 4.1.78). Require inspection for absence of malicious code.
Require inspection of downloads/transfers.
This objetive is fullfilled by the TOE.
O.Obj_Protection (see 4.1.103). Object domain protection
Require domain protection for objects. Specify object classes (domains), user groups,
and operation classes. Use these to specify which operations may be performed on which
objects by which users. Basically this controls what users can do in a given group.
This objetive is fullfilled by the TOE.
O.Remote_Execution (see 4.1.109). Disable remote execution
Disable a remote entity’s ability to execute local code.
This objetive is fullfilled by the TOE.
168 CHAPTER 7. RATIONALE
7.2.56 Malicious code perpetrator execution
DA.Mal_Code_Hack_Exe (see 3.6.5).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Code_Val (see 4.1.6). Administrative validation of executables
Validate executable objects prior to allowing execution. Validation needs to be done by
someone with an expertise to recognize malicious code and the authority and means to
prevent its execution.
This objetive is fullfilled by the TOE.
O.Clean_Obj_Recovery (see 4.2.2). Object and data recovery free from malicious code
Recover to a viable state after malicious code is introduced and damage occurs, removing
the malicious code as part of the process.
This objetive is assumed to be fulfilled by the environment.
O.Code_Signing (see 4.1.46). Code signing and verification
Check verification of signed downloaded code prior to execution. A well-known example
is checking digital signatures on signed Java applets.
This objetive is fullfilled by the TOE.
O.General_Integ_Checks (see 4.1.67). Periodically check integrity
Provide periodic integrity checks on both system and user data.
This objetive is fullfilled by the TOE.
O.I&A_User_Action (see 4.1.74). User-action identification and authentication
Associate each user-requested action with the user who requested the action.
This objetive is fullfilled by the TOE.
O.Isolate_Executables (see 4.1.87). Isolate untrusted executables
Run executable code in a protected domain where the code’s potential errors or mali-
cious code will not significantly impact other system functions of other valid users of the
system.
This objetive is fullfilled by the TOE.
O.Remote_Execution (see 4.1.109). Disable remote execution
Disable a remote entity’s ability to execute local code.
This objetive is fullfilled by the TOE.
O.Trusted_Path (see 4.1.135). Provide a trusted path
Provide a trusted path between the user and the system. Execution of a user-requested
action must be made via a trusted path with the following properties:
• The path is logically distinct from, and cannot be confused with other communica-
tion paths (by either the user or the system).
• The path provides assured identification of its end points.
This objetive is fullfilled by the TOE.
O.Trusted_Path&Channel (see 4.1.136). Trusted path and channel
Provide a trusted path to security-critical (TSF) data in which both end points have assured
identities. For the remote user, there needs to be a trusted channel as well.
This objetive is fullfilled by the TOE.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 169
7.2.57 Malicious code accidental IT download
DA.Mal_Code_IT_Download (see 3.6.6).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Clean_Obj_Recovery (see 4.2.2). Object and data recovery free from malicious code
Recover to a viable state after malicious code is introduced and damage occurs, removing
the malicious code as part of the process.
This objetive is assumed to be fulfilled by the environment.
O.Code_Signing (see 4.1.46). Code signing and verification
Check verification of signed downloaded code prior to execution. A well-known example
is checking digital signatures on signed Java applets.
This objetive is fullfilled by the TOE.
O.General_Integ_Checks (see 4.1.67). Periodically check integrity
Provide periodic integrity checks on both system and user data.
This objetive is fullfilled by the TOE.
O.Input_Inspection (see 4.1.78). Require inspection for absence of malicious code.
Require inspection of downloads/transfers.
This objetive is fullfilled by the TOE.
O.Obj_Protection (see 4.1.103). Object domain protection
Require domain protection for objects. Specify object classes (domains), user groups,
and operation classes. Use these to specify which operations may be performed on which
objects by which users. Basically this controls what users can do in a given group.
This objetive is fullfilled by the TOE.
7.2.58 Malicious code IT execution
DA.Mal_Code_IT_Exe (see 3.6.7).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Code_Val (see 4.1.6). Administrative validation of executables
Validate executable objects prior to allowing execution. Validation needs to be done by
someone with an expertise to recognize malicious code and the authority and means to
prevent its execution.
This objetive is fullfilled by the TOE.
O.Clean_Obj_Recovery (see 4.2.2). Object and data recovery free from malicious code
Recover to a viable state after malicious code is introduced and damage occurs, removing
the malicious code as part of the process.
This objetive is assumed to be fulfilled by the environment.
O.Code_Signing (see 4.1.46). Code signing and verification
Check verification of signed downloaded code prior to execution. A well-known example
is checking digital signatures on signed Java applets.
This objetive is fullfilled by the TOE.
O.General_Integ_Checks (see 4.1.67). Periodically check integrity
Provide periodic integrity checks on both system and user data.
This objetive is fullfilled by the TOE.
O.I&A_User_Action (see 4.1.74). User-action identification and authentication
Associate each user-requested action with the user who requested the action.
This objetive is fullfilled by the TOE.
170 CHAPTER 7. RATIONALE
O.Isolate_Executables (see 4.1.87). Isolate untrusted executables
Run executable code in a protected domain where the code’s potential errors or mali-
cious code will not significantly impact other system functions of other valid users of the
system.
This objetive is fullfilled by the TOE.
7.2.59 Malicious code accidental user download
DA.Mal_Code_Usr_Downld (see 3.6.8).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Clean_Obj_Recovery (see 4.2.2). Object and data recovery free from malicious code
Recover to a viable state after malicious code is introduced and damage occurs, removing
the malicious code as part of the process.
This objetive is assumed to be fulfilled by the environment.
O.Code_Signing (see 4.1.46). Code signing and verification
Check verification of signed downloaded code prior to execution. A well-known example
is checking digital signatures on signed Java applets.
This objetive is fullfilled by the TOE.
O.Input_Inspection (see 4.1.78). Require inspection for absence of malicious code.
Require inspection of downloads/transfers.
This objetive is fullfilled by the TOE.
O.Obj_Protection (see 4.1.103). Object domain protection
Require domain protection for objects. Specify object classes (domains), user groups,
and operation classes. Use these to specify which operations may be performed on which
objects by which users. Basically this controls what users can do in a given group.
This objetive is fullfilled by the TOE.
7.2.60 Malicious code user execution
DA.Mal_Code_Usr_Exe (see 3.6.9).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Code_Val (see 4.1.6). Administrative validation of executables
Validate executable objects prior to allowing execution. Validation needs to be done by
someone with an expertise to recognize malicious code and the authority and means to
prevent its execution.
This objetive is fullfilled by the TOE.
O.Clean_Obj_Recovery (see 4.2.2). Object and data recovery free from malicious code
Recover to a viable state after malicious code is introduced and damage occurs, removing
the malicious code as part of the process.
This objetive is assumed to be fulfilled by the environment.
O.Code_Signing (see 4.1.46). Code signing and verification
Check verification of signed downloaded code prior to execution. A well-known example
is checking digital signatures on signed Java applets.
This objetive is fullfilled by the TOE.
O.General_Integ_Checks (see 4.1.67). Periodically check integrity
Provide periodic integrity checks on both system and user data.
This objetive is fullfilled by the TOE.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 171
O.I&A_User_Action (see 4.1.74). User-action identification and authentication
Associate each user-requested action with the user who requested the action.
This objetive is fullfilled by the TOE.
O.Isolate_Executables (see 4.1.87). Isolate untrusted executables
Run executable code in a protected domain where the code’s potential errors or mali-
cious code will not significantly impact other system functions of other valid users of the
system.
This objetive is fullfilled by the TOE.
7.2.61 Resource depletion failure
DA.Phys_CompFail_Res (see 3.4.42).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Priority_Of_Service (see 4.1.104). Provide priority of service
Control access to resources so that lower-priority activities do not unduly interfere with
or delay higher-priority activities.
This objetive is fullfilled by the TOE.
O.Resource_Quotas (see 4.1.110). Resource quotas for users and services
Use resource quotas to limit user and service use of system resources to a level that will
prevent degradation or denial of service to other critical users and services.
This objetive is fullfilled by the TOE.
7.2.62 Unexpected power reset
DA.Power_Disrupt_Reset (see 3.4.43).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Atomic_Functions (see 4.1.36). Complete security functions or recover to previous state
Recover automatically to a consistent, secure state if a security function does not complete
successfully in the presence of certain types of failures.
This objetive is fullfilled by the TOE.
O.Trusted_Recovery (see 4.1.137). Trusted recovery of security functionality
Recovery to a secure state, without security compromise, after a discontinuity of opera-
tions.
This objetive is fullfilled by the TOE.
7.2.63 Denial of having received data from another local user
DA.Repudiate_Rcvr_Int (see 3.6.21).
The following Security Objective(s) are considered sufficient to counter this attack:
O.NonRepud_Locals_Rcvd (see 4.2.9). Non-repudiation for received information, local users
Prevent user from avoiding accountability for receiving a message from another user on
the same system by providing evidence that the user received the message.
This objetive is assumed to be fulfilled by the environment.
172 CHAPTER 7. RATIONALE
7.2.64 Denial of having received information from a remote user
DA.Repudiate_Rcvr_Local (see 3.6.22).
The following Security Objective(s) are considered sufficient to counter this attack:
O.NonRepud_Assess_Recd (see 4.2.7). Non-repudiation support for received information by
a nonlocal sender’s TSF
Support nonrepudiation for received information by supporting remote handling of non-
repudiation evidence if needed.
This objetive is assumed to be fulfilled by the environment.
O.NonRepud_Gen_Recd (see 4.2.8). Non-repudiation support for received information by the
recipient’s TSF
Prevent a receiving user from avoiding accountability for receiving a message by provid-
ing evidence that the user received the message.
This objetive is assumed to be fulfilled by the environment.
7.2.65 Denial of having received information by a remote user
DA.Repudiate_Rcvr_Rem (see 3.6.23).
The following Security Objective(s) are considered sufficient to counter this attack:
O.NonRepud_Assess_Recd (see 4.2.7). Non-repudiation support for received information by
a nonlocal sender’s TSF
Support nonrepudiation for received information by supporting remote handling of non-
repudiation evidence if needed.
This objetive is assumed to be fulfilled by the environment.
O.NonRepud_Gen_Recd (see 4.2.8). Non-repudiation support for received information by the
recipient’s TSF
Prevent a receiving user from avoiding accountability for receiving a message by provid-
ing evidence that the user received the message.
This objetive is assumed to be fulfilled by the environment.
7.2.66 Denial of having sent information to another local user
DA.Repudiate_Send_Int (see 3.4.44).
The following Security Objective(s) are considered sufficient to counter this attack:
O.NonRepud_Locals_Sent (see 4.1.100). Non-repudiation for sent information, local users
Prevent user from avoiding accountability for sending a message to another user on the
same system by providing evidence that the user sent the message.
This objetive is fullfilled by the TOE.
7.2.67 Denial of having sent information to a remote user
DA.Repudiate_Send_Local (see 3.4.45).
The following Security Objective(s) are considered sufficient to counter this attack:
O.NonRepud_Assess_Sent (see 4.1.98). Non-repudiation support for sent information by the
nonlocal receiving TSF.
Support nonrepudiation for sent information by supporting remote handling of nonrepu-
diation evidence if needed.
This objetive is fullfilled by the TOE.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 173
O.NonRepud_Gen_Sent (see 4.1.99). Non-repudiation support for sent information by the
sender’s TSF.
Prevent a user from avoiding accountability for sending a message to a recipient at a
different site by providing evidence that the user sent the message.
This objetive is fullfilled by the TOE.
7.2.68 Denial of having sent data by a remote user
DA.Repudiate_Send_Rem (see 3.4.46).
The following Security Objective(s) are considered sufficient to counter this attack:
O.NonRepud_Assess_Sent (see 4.1.98). Non-repudiation support for sent information by the
nonlocal receiving TSF.
Support nonrepudiation for sent information by supporting remote handling of nonrepu-
diation evidence if needed.
This objetive is fullfilled by the TOE.
O.NonRepud_Gen_Sent (see 4.1.99). Non-repudiation support for sent information by the
sender’s TSF.
Prevent a user from avoiding accountability for sending a message to a recipient at a
different site by providing evidence that the user sent the message.
This objetive is fullfilled by the TOE.
7.2.69 Circumvent non-repudiation in a transaction involving a user
and a local system
DA.Repudiate_Trans_Loc (see 3.6.24).
The following Security Objective(s) are considered sufficient to counter this attack:
O.I&A_Transaction (see 4.1.72). Transaction identification and authentication
Associate each transaction between a user and a system/application with a unique trans-
action ID, allowing events associated with a given transaction to be distinguished from
other events involving the user and/or system/application.
This objetive is fullfilled by the TOE.
O.NonRepud_Locals_Rcvd (see 4.2.9). Non-repudiation for received information, local users
Prevent user from avoiding accountability for receiving a message from another user on
the same system by providing evidence that the user received the message.
This objetive is assumed to be fulfilled by the environment.
O.NonRepud_Locals_Sent (see 4.1.100). Non-repudiation for sent information, local users
Prevent user from avoiding accountability for sending a message to another user on the
same system by providing evidence that the user sent the message.
This objetive is fullfilled by the TOE.
7.2.70 Circumvent non-repudiation in a transaction involving a lo-
cal user and a remote system
DA.Repudiate_Trans_Uloc (see 3.6.25).
The following Security Objective(s) are considered sufficient to counter this attack:
O.I&A_Transaction (see 4.1.72). Transaction identification and authentication
Associate each transaction between a user and a system/application with a unique trans-
action ID, allowing events associated with a given transaction to be distinguished from
other events involving the user and/or system/application.
This objetive is fullfilled by the TOE.
174 CHAPTER 7. RATIONALE
O.NonRepud_Assess_Recd (see 4.2.7). Non-repudiation support for received information by
a nonlocal sender’s TSF
Support nonrepudiation for received information by supporting remote handling of non-
repudiation evidence if needed.
This objetive is assumed to be fulfilled by the environment.
O.NonRepud_Assess_Sent (see 4.1.98). Non-repudiation support for sent information by the
nonlocal receiving TSF.
Support nonrepudiation for sent information by supporting remote handling of nonrepu-
diation evidence if needed.
This objetive is fullfilled by the TOE.
O.NonRepud_Gen_Recd (see 4.2.8). Non-repudiation support for received information by the
recipient’s TSF
Prevent a receiving user from avoiding accountability for receiving a message by provid-
ing evidence that the user received the message.
This objetive is assumed to be fulfilled by the environment.
O.NonRepud_Gen_Sent (see 4.1.99). Non-repudiation support for sent information by the
sender’s TSF.
Prevent a user from avoiding accountability for sending a message to a recipient at a
different site by providing evidence that the user sent the message.
This objetive is fullfilled by the TOE.
7.2.71 Circumvent non-repudiation in a transaction involving a re-
mote user and a local system
DA.Repudiate_Trans_Urem (see 3.6.26).
The following Security Objective(s) are considered sufficient to counter this attack:
O.I&A_Transaction (see 4.1.72). Transaction identification and authentication
Associate each transaction between a user and a system/application with a unique trans-
action ID, allowing events associated with a given transaction to be distinguished from
other events involving the user and/or system/application.
This objetive is fullfilled by the TOE.
O.NonRepud_Assess_Recd (see 4.2.7). Non-repudiation support for received information by
a nonlocal sender’s TSF
Support nonrepudiation for received information by supporting remote handling of non-
repudiation evidence if needed.
This objetive is assumed to be fulfilled by the environment.
O.NonRepud_Assess_Sent (see 4.1.98). Non-repudiation support for sent information by the
nonlocal receiving TSF.
Support nonrepudiation for sent information by supporting remote handling of nonrepu-
diation evidence if needed.
This objetive is fullfilled by the TOE.
O.NonRepud_Gen_Recd (see 4.2.8). Non-repudiation support for received information by the
recipient’s TSF
Prevent a receiving user from avoiding accountability for receiving a message by provid-
ing evidence that the user received the message.
This objetive is assumed to be fulfilled by the environment.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 175
O.NonRepud_Gen_Sent (see 4.1.99). Non-repudiation support for sent information by the
sender’s TSF.
Prevent a user from avoiding accountability for sending a message to a recipient at a
different site by providing evidence that the user sent the message.
This objetive is fullfilled by the TOE.
7.2.72 System use uncovers an intrinsic software flaw in a critical
system component
DA.Software_Flaw (see 3.6.19).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Fail_Secure (see 4.1.66). Preservation of secure state for failures in critical components
Preserve the secure state of the system in the event of a secure component failure.
This objetive is fullfilled by the TOE.
O.Fault_Tolerance (see 4.2.4). Provide fault tolerant operations for critical components
Provide fault tolerant operations for critical components and continue to operate in the
presence of specific failures in one or more system components.
This objetive is assumed to be fulfilled by the environment.
7.2.73 Accidental release of cryptographic assets due to TSF flaw
or malfunction
DA.TSF_Err_Conf_Crypto (see 3.4.47).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Crypto_Data_Sep (see 4.1.52). Separation of cryptographic data
Provide complete separation between plaintext and encrypted data and between data and
keys. This requires separate channels and separate storage areas. The only place any data
can pass between the plaintext and encrypted data modules is in the cryptographic engine.
There should be no way for plaintext keys to reach either data module and no way for data
to enter the key handling module. Encrypted keys can be handled as encrypted data, but
with limited user access.
This objetive is fullfilled by the TOE.
O.Crypto_Dsgn_Impl (see 4.1.53). Cryptographic Design and Implementation
Minimize or even eliminate design and implementation errors in the cryptographic mod-
ules and functions.
This objetive is fullfilled by the TOE.
O.Crypto_Key_Man (see 4.1.55). Cryptographic Key Management
Fully define cryptographic components, functions, and interfaces. Ensure appropriate
protection for cryptographic keys throughout their lifecycle, covering generation, distri-
bution, storage, use, and destruction.
This objetive is fullfilled by the TOE.
O.Crypto_Modular_Dsgn (see 4.1.57). Cryptographic Modular Design
Prevent errors in one part of the TOE from influencing other parts, especially crypto-
graphic parts. To this end, noncryptographic I/O paths must be well defined and logically
independent of circuitry and processes performing key generation, manual key entry, key
zeroising, and similar key-related operations.
This objetive is fullfilled by the TOE.
176 CHAPTER 7. RATIONALE
O.Crypto_Operation (see 4.1.58). Cryptographic function definition
Cryptographic components, functions, and interfaces shall be fully defined.
This objetive is fullfilled by the TOE.
O.Crypto_Self_Test (see 4.1.59). Cryptographic self test
Provide the ability to verify that the cryptographic functions operate as designed.
This objetive is fullfilled by the TOE.
O.Crypto_Test_Reqs (see 4.1.60). Test cryptographic functionality
Test cryptographic operation and key management.
This objetive is fullfilled by the TOE.
O.Fail_Secure (see 4.1.66). Preservation of secure state for failures in critical components
Preserve the secure state of the system in the event of a secure component failure.
This objetive is fullfilled by the TOE.
O.Secure_State (see 4.1.113). Protect and maintain secure system state
Maintain and recover to a secure state without security compromise after system error or
other interruption of system operation.
This objetive is fullfilled by the TOE.
7.2.74 User smuggles data using removable media
DA.User_Abuse_Conf_Disk (see 3.4.48).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Guidance (see 4.1.8). Administrator guidance documentation
Deter administrator errors by providing adequate administrator guidance.
This objetive is fullfilled by the TOE.
O.Audit_Account (see 4.1.38). Auditing for user accountability
Provide information about past user behavior to an authorized user through system mech-
anisms. Specifically, during any specified time interval, the system is able to report to a
user acting in an identified audit role selected auditable actions that a user has performed,
and as a result, what auditable objects were affected and what auditable information was
received by that user.
This objetive is fullfilled by the TOE.
O.Data_Export_Control (see 4.1.62). Control user data exportation
Impose information control policies that do not allow export of specified data and/or ex-
port to specified locations.
This objetive is fullfilled by the TOE.
7.2.75 Steganographic data smuggling
DA.User_Abuse_Conf_Steg (see 3.4.49).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Admin_Code_Val (see 4.1.6). Administrative validation of executables
Validate executable objects prior to allowing execution. Validation needs to be done by
someone with an expertise to recognize malicious code and the authority and means to
prevent its execution.
This objetive is fullfilled by the TOE.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 177
O.Admin_Code_Val_Sten (see 4.1.7). Software validation for absence of steganography
Validate exported objects for absence of steganographic content prior to allowing expor-
tation. Validation needs to be done by someone with an expertise to recognize hidden
content and the authority and means to prevent its export.
This objetive is fullfilled by the TOE.
O.Export_Control (see 4.1.64). Sanitize data objects containing hidden or unused data
Sanitize data objects that may contain hidden data when they are exported from the TOE
in order to inhibit steganographic smuggling.
This objetive is fullfilled by the TOE.
7.2.76 User collects data by browsing
DA.User_Collect_Browse (see 3.4.50).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Account (see 4.1.38). Auditing for user accountability
Provide information about past user behavior to an authorized user through system mech-
anisms. Specifically, during any specified time interval, the system is able to report to a
user acting in an identified audit role selected auditable actions that a user has performed,
and as a result, what auditable objects were affected and what auditable information was
received by that user.
This objetive is fullfilled by the TOE.
O.Info_Flow_Control (see 4.1.76). System enforced information flow
Enforce an information flow policy whereby users are constrained from allowing access
to information they control, regardless of their intent (e.g., mandatory access control).
This lattice property of security attributes is commonly associated with the U.S. DoD
implementations of Mandatory Access Control (MAC).
This objetive is fullfilled by the TOE.
O.User_Defined_AC (see 4.1.145). User-defined access control
Enforce an access control policy whereby users may determine who may access informa-
tion they control.
This objetive is fullfilled by the TOE.
7.2.77 User collects authentication data by deception
DA.User_Collect_Deceive (see 3.4.51).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Access_History (see 4.1.3). Access history for user session
Display information related to the most recent successful and unsuccessful attempts to
establish a user session, once a user successfully establishes a user session.
This objetive is fullfilled by the TOE.
O.Trusted_Path (see 4.1.135). Provide a trusted path
Provide a trusted path between the user and the system. Execution of a user-requested
action must be made via a trusted path with the following properties:
• The path is logically distinct from, and cannot be confused with other communica-
tion paths (by either the user or the system).
• The path provides assured identification of its end points.
This objetive is fullfilled by the TOE.
178 CHAPTER 7. RATIONALE
7.2.78 User collects data by deduction
DA.User_Collect_Deduce (see 3.4.52).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Generation (see 4.1.42). Audit records with identity
Record in audit records: date and time of action, location of the action, and the entity
responsible for the action.
This objetive is fullfilled by the TOE.
O.Info_Flow_Control (see 4.1.76). System enforced information flow
Enforce an information flow policy whereby users are constrained from allowing access
to information they control, regardless of their intent (e.g., mandatory access control).
This lattice property of security attributes is commonly associated with the U.S. DoD
implementations of Mandatory Access Control (MAC).
This objetive is fullfilled by the TOE.
O.User_Defined_AC (see 4.1.145). User-defined access control
Enforce an access control policy whereby users may determine who may access informa-
tion they control.
This objetive is fullfilled by the TOE.
7.2.79 User collects data by eavesdropping
DA.User_Collect_Eaves (see 3.4.53).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Data_Exchange_Conf (see 4.1.61). Enforce data exchange confidentiality
Protect user data confidentiality when exchanging data with a remote system.
This objetive is fullfilled by the TOE.
O.Integ_User_Data_Int (see 4.1.82). Protect user data during internal transfer
Ensure the integrity of user data transferred internally within the system.
This objetive is fullfilled by the TOE.
O.Security_Roles (see 4.1.117). Security roles
Maintain security-relevant roles and the association of users with those roles.
This objetive is fullfilled by the TOE.
7.2.80 User collects residual data
DA.User_Collect_Residue (see 3.4.54).
The following Security Objective(s) are considered sufficient to counter this attack:
O.No_Residual_Info (see 4.1.97). Eliminate residual information
Ensure there is no object reuse; i.e., ensure that there is no residual information in some
information containers or system resources upon their reallocation to different users.
This objetive is fullfilled by the TOE.
7.2.81 User’s unauthorized use causes overload of communication
resources
DA.User_Comm_Overload (see 3.4.55).
The following Security Objective(s) are considered sufficient to counter this attack:
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 179
O.Audit_Generation (see 4.1.42). Audit records with identity
Record in audit records: date and time of action, location of the action, and the entity
responsible for the action.
This objetive is fullfilled by the TOE.
O.Data_Imp_Exp_Control (see 4.1.63). Data import/export to/from system control
Protect data from being sent to erroneous places and more places external to the system
than allowed by the organization’s security policy. Conversely the import of data into
the system should be protected from illicit information or information not allowed by the
organization’s security policy.
This objetive is fullfilled by the TOE.
O.Limit_Comm_Sessions (see 4.1.90). Limit the number of user initiated communication ses-
sions
Provide mechanisms to limit the number of sessions that the user can initiate, if the user
initiates multiple sessions that exceed the processors ability to perform in a reliable and
efficient manner. These sessions could ether be communication (TCP/IP) sessions or user
login sessions.
This objetive is fullfilled by the TOE.
O.Priority_Of_Service (see 4.1.104). Provide priority of service
Control access to resources so that lower-priority activities do not unduly interfere with
or delay higher-priority activities.
This objetive is fullfilled by the TOE.
O.Resource_Quotas (see 4.1.110). Resource quotas for users and services
Use resource quotas to limit user and service use of system resources to a level that will
prevent degradation or denial of service to other critical users and services.
This objetive is fullfilled by the TOE.
7.2.82 Denial of service due to exhausted audit storage
DA.User_ErrAvl_AudExhst (see 3.4.56).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Loss_Respond (see 4.1.43). Respond to possible loss of stored audit records
Respond to possible loss of audit records when audit trail storage is full or nearly full.
This objetive is fullfilled by the TOE.
O.Guarantee_Audit_Stg (see 4.1.68). Guarantee the availability of audit storage space
Maintain audit data and guarantee space for that data.
This objetive is fullfilled by the TOE.
O.Manage_TSF_Data (see 4.1.96). Manage security-critical data to avoid storage space being
exceeded
Manage security-critical (TSF) data to ensure that the size of the data does not exceed the
space allocated for storage of the data.
This objetive is fullfilled by the TOE.
7.2.83 Falsification of information quality in data export
DA.User_Err_AttrXpt (see 3.4.57).
The following Security Objective(s) are considered sufficient to counter this attack:
O.AC_Label_Export (see 4.1.2). Object security attributes and exportation
Provide object security attributes in exported data with moderate to high effectiveness.
The attributes are those associated with specific security function policies.
This objetive is fullfilled by the TOE.
180 CHAPTER 7. RATIONALE
7.2.84 Under-classification of data sensitivity on export
DA.User_Err_Conf_Class (see 3.4.58).
The following Security Objective(s) are considered sufficient to counter this attack:
O.AC_Label_Export (see 4.1.2). Object security attributes and exportation
Provide object security attributes in exported data with moderate to high effectiveness.
The attributes are those associated with specific security function policies.
This objetive is fullfilled by the TOE.
7.2.85 Accidental release of cryptographic assets due to user error
DA.User_Err_Conf_Crypto (see 3.4.59).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Crypto_AC (see 4.1.50). Cryptographic access control policy
Restrict user access to cryptographic IT assets in accordance with a specified user access
control policy.
This objetive is fullfilled by the TOE.
O.Crypto_Key_Man (see 4.1.55). Cryptographic Key Management
Fully define cryptographic components, functions, and interfaces. Ensure appropriate
protection for cryptographic keys throughout their lifecycle, covering generation, distri-
bution, storage, use, and destruction.
This objetive is fullfilled by the TOE.
O.I&A_Domain (see 4.1.71). Identify and authenticate a user to support accountability
Provide the basic I&A functions that will support user accountability.
This objetive is fullfilled by the TOE.
O.I&A_User_Action (see 4.1.74). User-action identification and authentication
Associate each user-requested action with the user who requested the action.
This objetive is fullfilled by the TOE.
7.2.86 Confidentiality violation of export control policy
DA.User_Err_Conf_Exp (see 3.4.60).
The following Security Objective(s) are considered sufficient to counter this attack:
O.User_Conf_Prevention (see 4.1.141). Basic confidentiality-breach prevention
Prevent unauthorized export of confidential information from the TOE with moderate
effectiveness.
This objetive is fullfilled by the TOE.
7.2.87 User error deletes data
DA.User_Err_Delete (see 3.6.27).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Rollback (see 4.2.17). Rollback
Recover from user operations by undoing some user operations (i.e., rolling back) to
restore a previous known state.
This objetive is assumed to be fulfilled by the environment.
O.User_Guidance (see 4.1.146). User guidance documentation
Provide documentation for the general user.
This objetive is fullfilled by the TOE.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 181
7.2.88 User error modifying attributes availability
DA.User_Err_Mod_Attr (see 3.4.61).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Security_Attr_Mgt (see 4.1.114). Manage security attributes
Manage the initialization of, values for, and allowable operations on security attributes.
This objetive is fullfilled by the TOE.
O.User_Guidance (see 4.1.146). User guidance documentation
Provide documentation for the general user.
This objetive is fullfilled by the TOE.
7.2.89 Failure to provide object security attributes in data export
DA.User_Err_MsngAttrXpt (see 3.4.62).
The following Security Objective(s) are considered sufficient to counter this attack:
O.AC_Label_Export (see 4.1.2). Object security attributes and exportation
Provide object security attributes in exported data with moderate to high effectiveness.
The attributes are those associated with specific security function policies.
This objetive is fullfilled by the TOE.
7.2.90 Incorrectly set object attributes
DA.User_Err_Object_Attr (see 3.4.63).
The following Security Objective(s) are considered sufficient to counter this attack:
O.AC_Label_Export (see 4.1.2). Object security attributes and exportation
Provide object security attributes in exported data with moderate to high effectiveness.
The attributes are those associated with specific security function policies.
This objetive is fullfilled by the TOE.
O.Obj_Attr_Integrity (see 4.1.102). Basic object attribute integrity
Maintain object security attributes with moderate to high accuracy (under the guidance of
qualified users).
This objetive is fullfilled by the TOE.
7.2.91 User error setting attributes availability
DA.User_Err_Set_Attr (see 3.4.64).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Security_Attr_Mgt (see 4.1.114). Manage security attributes
Manage the initialization of, values for, and allowable operations on security attributes.
This objetive is fullfilled by the TOE.
O.User_Guidance (see 4.1.146). User guidance documentation
Provide documentation for the general user.
This objetive is fullfilled by the TOE.
182 CHAPTER 7. RATIONALE
7.2.92 User modifies audit trail
DA.User_Modify_Audit (see 3.4.65).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Gen_User (see 4.1.41). Individual accountability
Provide individual accountability for audited events. Uniquely identify each user so that
auditable actions can be traced to a user.
This objetive is fullfilled by the TOE.
O.Audit_Generation (see 4.1.42). Audit records with identity
Record in audit records: date and time of action, location of the action, and the entity
responsible for the action.
This objetive is fullfilled by the TOE.
O.Audit_Protect (see 4.1.44). Protect stored audit records
Protect audit records against unauthorized access, modification, or deletion to ensure ac-
countability of user actions.
This objetive is fullfilled by the TOE.
O.Security_Roles (see 4.1.117). Security roles
Maintain security-relevant roles and the association of users with those roles.
This objetive is fullfilled by the TOE.
7.2.93 User improperly modifies authentication data
DA.User_Modify_Auth (see 3.4.66).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Account (see 4.1.38). Auditing for user accountability
Provide information about past user behavior to an authorized user through system mech-
anisms. Specifically, during any specified time interval, the system is able to report to a
user acting in an identified audit role selected auditable actions that a user has performed,
and as a result, what auditable objects were affected and what auditable information was
received by that user.
This objetive is fullfilled by the TOE.
O.Security_Data_Mgt (see 4.1.115). Manage security-critical data
Manage the initialization of, limits on, and allowable operations on security-critical data.
This objetive is fullfilled by the TOE.
7.2.94 User improperly modifies user data
DA.User_Modify_Data (see 3.4.67).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Generation (see 4.1.42). Audit records with identity
Record in audit records: date and time of action, location of the action, and the entity
responsible for the action.
This objetive is fullfilled by the TOE.
O.Info_Flow_Control (see 4.1.76). System enforced information flow
Enforce an information flow policy whereby users are constrained from allowing access
to information they control, regardless of their intent (e.g., mandatory access control).
This lattice property of security attributes is commonly associated with the U.S. DoD
implementations of Mandatory Access Control (MAC).
This objetive is fullfilled by the TOE.
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 183
O.User_Defined_AC (see 4.1.145). User-defined access control
Enforce an access control policy whereby users may determine who may access informa-
tion they control.
This objetive is fullfilled by the TOE.
7.2.95 User improperly modifies TSF data
DA.User_Modify_TSFData (see 3.4.68).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Generation (see 4.1.42). Audit records with identity
Record in audit records: date and time of action, location of the action, and the entity
responsible for the action.
This objetive is fullfilled by the TOE.
O.Config_Management (see 4.1.48). Implement operational configuration management
Implement a configuration management plan. Implement configuration management to
assure storage integrity, identification of system connectivity (software, hardware, and
firmware), and identification of system components (software, hardware, and firmware).
This objetive is fullfilled by the TOE.
O.General_Integ_Checks (see 4.1.67). Periodically check integrity
Provide periodic integrity checks on both system and user data.
This objetive is fullfilled by the TOE.
O.Info_Flow_Control (see 4.1.76). System enforced information flow
Enforce an information flow policy whereby users are constrained from allowing access
to information they control, regardless of their intent (e.g., mandatory access control).
This lattice property of security attributes is commonly associated with the U.S. DoD
implementations of Mandatory Access Control (MAC).
This objetive is fullfilled by the TOE.
O.Integ_Sys_Data_Int (see 4.1.81). Integrity of system data transferred internally
Ensure the integrity of system data transferred internally.
This objetive is fullfilled by the TOE.
O.Integrity_Practice (see 4.1.86). Operational integrity system function testing
Provide system functional tests to periodically test the integrity of the hardware and code
running system functions.
This objetive is fullfilled by the TOE.
O.Maintain_Sec_Domain (see 4.1.92). Maintain security domain
Maintain at least one security domain for system (TOE) execution to protect the TOE
from interference and tampering.
This objetive is fullfilled by the TOE.
O.Reference_Monitor (see 4.1.108). Provide reference monitor
Always invoke mechanisms that enforce security policies (i.e., as for a traditional refer-
ence monitor).
This objetive is fullfilled by the TOE.
O.User_Defined_AC (see 4.1.145). User-defined access control
Enforce an access control policy whereby users may determine who may access informa-
tion they control.
This objetive is fullfilled by the TOE.
184 CHAPTER 7. RATIONALE
7.2.96 User obstructs legitimate use of resources.
DA.User_Obst_Res_Use (see 3.6.28).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Manage_Res_Sec_Attr (see 4.1.95). Manage resource security attributes
Provide management on resource security attributes.
This objetive is fullfilled by the TOE.
O.Priority_Of_Service (see 4.1.104). Provide priority of service
Control access to resources so that lower-priority activities do not unduly interfere with
or delay higher-priority activities.
This objetive is fullfilled by the TOE.
O.Tamper_ID (see 4.2.19). Tamper detection
Provide system features that detect physical tampering of a system component, and use
those features to limit security breaches.
This objetive is assumed to be fulfilled by the environment.
O.Tamper_Resistance (see 4.2.20). Tamper resistance
Prevent or resist physical tampering with specified system devices and components.
This objetive is assumed to be fulfilled by the environment.
7.2.97 User’s unauthorized actions over-task the system causing
processor overload
DA.User_Prcsr_Overload (see 3.4.69).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Generation (see 4.1.42). Audit records with identity
Record in audit records: date and time of action, location of the action, and the entity
responsible for the action.
This objetive is fullfilled by the TOE.
O.Limit_Comm_Sessions (see 4.1.90). Limit the number of user initiated communication ses-
sions
Provide mechanisms to limit the number of sessions that the user can initiate, if the user
initiates multiple sessions that exceed the processors ability to perform in a reliable and
efficient manner. These sessions could ether be communication (TCP/IP) sessions or user
login sessions.
This objetive is fullfilled by the TOE.
O.Priority_Of_Service (see 4.1.104). Provide priority of service
Control access to resources so that lower-priority activities do not unduly interfere with
or delay higher-priority activities.
This objetive is fullfilled by the TOE.
O.Resource_Quotas (see 4.1.110). Resource quotas for users and services
Use resource quotas to limit user and service use of system resources to a level that will
prevent degradation or denial of service to other critical users and services.
This objetive is fullfilled by the TOE.
7.2.98 User sends data violating confidentiality
DA.User_Send_Conf (see 3.4.70).
The following Security Objective(s) are considered sufficient to counter this attack:
7.2. ATTACKS AND SECURITY OBJECTIVES CORRESPONDENCE. 185
O.Audit_Generation (see 4.1.42). Audit records with identity
Record in audit records: date and time of action, location of the action, and the entity
responsible for the action.
This objetive is fullfilled by the TOE.
O.Integ_Data_Mark_Exp (see 4.1.79). Data marking integrity export
Ensure that data markings are included with data that is exported to another trusted prod-
uct.
This objetive is fullfilled by the TOE.
7.2.99 User sends data violating integrity
DA.User_Send_Integrity (see 3.4.71).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Generation (see 4.1.42). Audit records with identity
Record in audit records: date and time of action, location of the action, and the entity
responsible for the action.
This objetive is fullfilled by the TOE.
O.Integ_Data_Mark_Exp (see 4.1.79). Data marking integrity export
Ensure that data markings are included with data that is exported to another trusted prod-
uct.
This objetive is fullfilled by the TOE.
7.2.100 User’s unauthorized actions cause storage overload
DA.User_Stg_Overload (see 3.4.72).
The following Security Objective(s) are considered sufficient to counter this attack:
O.Audit_Generation (see 4.1.42). Audit records with identity
Record in audit records: date and time of action, location of the action, and the entity
responsible for the action.
This objetive is fullfilled by the TOE.
O.Limit_Comm_Sessions (see 4.1.90). Limit the number of user initiated communication ses-
sions
Provide mechanisms to limit the number of sessions that the user can initiate, if the user
initiates multiple sessions that exceed the processors ability to perform in a reliable and
efficient manner. These sessions could ether be communication (TCP/IP) sessions or user
login sessions.
This objetive is fullfilled by the TOE.
O.Priority_Of_Service (see 4.1.104). Provide priority of service
Control access to resources so that lower-priority activities do not unduly interfere with
or delay higher-priority activities.
This objetive is fullfilled by the TOE.
O.Resource_Quotas (see 4.1.110). Resource quotas for users and services
Use resource quotas to limit user and service use of system resources to a level that will
prevent degradation or denial of service to other critical users and services.
This objetive is fullfilled by the TOE.
186 CHAPTER 7. RATIONALE
7.3 Detailed Policy Statements - General Policy State-
ment Mapping
To complete the Security Policy Statement analysis, this section presents an overall mapping of
Detailed Policy Statements with respect to their parent General Policy Statements.
This mapping provides a coverage analysis, where for each General Policy Statement, its
components in terms of Detailed Policy Statements are shown, and then it can be proven that all
of them are covered, either by the TOE or by the Environment, by application of the Assump-
tions.
7.3.1 Individual accountability
GP.Accountability (see 3.7.1). This General Policy Statement is divided into the following
Detailed Policy Statement(s):
DP.Audit_Gen_User (see 3.8.9). Individual accountability
The system shall provide individual accountability for auditable actions. This Detailed
Policy Statement is fullfilled solely by the TOE.
DP.Audit_Generation (see 3.8.10). Audit data generation with identity
The system shall provide the capability to ensure that all audit records include enough
information to determine the date and time of action, the system locale of the action, the
system entity that initiated or completed the action, the resources involved, and the action
involved. This Detailed Policy Statement is fullfilled solely by the TOE.
DP.Audit_Protect (see 3.8.11). Protected audit data storage
The system shall protect the contents of the audit trails against unauthorized access, mod-
ification, or deletion. This Detailed Policy Statement is fullfilled solely by the TOE.
DP.I&A_User (see 3.8.17). User identification and authentication
The system shall provide Identification and authentication procedures which uniquely
identify and authenticate users. This Detailed Policy Statement is fullfilled solely by the
TOE.
DP.User_Defined_AC (see 3.8.35). Discretionary access control
The system shall provide a Discretionary Access Control (DAC) function (i.e., a user
can grant access authorization to other users for data they control). This Detailed Policy
Statement is fullfilled solely by the TOE.
7.3.2 Notification of threats and vulnerabilities
GP.Authorities (see 3.7.2). This General Policy Statement is divided into the following Detailed
Policy Statement(s):
DP.Authority_Notify (see 3.8.12). Notification of threats and vulnerabilities
Notification of threats and vulnerabilities shall be addressed. This Detailed Policy State-
ment is fullfilled solely by the TOE.
7.3.3 Authorized use of information
GP.Authorized_Use (see 3.7.3). This General Policy Statement is divided into the following
Detailed Policy Statement(s):
DP.Sys_Access_Banners (see 3.8.25). System access banners
The system shall notify users prior to gaining access that the user’s actions may be mon-
itored and recorded, that using the system consents to such monitoring, and that unau-
thorized use may result in criminal or civil penalties. This Detailed Policy Statement is
fullfilled solely by the TOE.
7.3. DETAILED POLICY STATEMENTS - GENERAL POLICY STATEMENT MAPPING187
7.3.4 Installation and usage guidance
GP.Guidance (see 3.7.4). This General Policy Statement is divided into the following Detailed
Policy Statement(s):
DP.Privileged_Doc (see 3.8.22). Privileged user documentation
Documentation shall include guides or manuals for the system’s privileged users. This
Detailed Policy Statement is fullfilled solely by the TOE.
DP.User_Documentation (see 3.8.36). General user documentation
Documentation shall include a user’s guide for the general user. This Detailed Policy
Statement is fullfilled solely by the TOE.
7.3.5 System lifecycle phases integrate security
GP.Lifecycle (see 3.7.5). This General Policy Statement is divided into the following Detailed
Policy Statement(s):
DP.Lifecycle_Security (see 3.8.20). Security throughout lifecycle
Security shall be addressed throughout the system’s lifecycle. This Detailed Policy State-
ment is fullfilled solely by the TOE.
7.3.6 Information marking
GP.Marking (see 3.7.6). This General Policy Statement is divided into the following Detailed
Policy Statement(s):
DP.Config_Mgt_Plan (see 3.8.14). Implement operational configuration management
A configuration management plan shall be implemented by the system. The system shall
implement configuration management to assure storage integrity, identification of system
connectivity (software, hardware, and firmware), and identification of system components
(software, hardware, and firmware). The system shall implement strong integrity mecha-
nisms (integrity locks, encryption). This Detailed Policy Statement is fullfilled solely by
the TOE.
DP.External_Labels (see 3.8.16). Labeling data
The system shall provide security parameters associated with information exchanged be-
tween systems. This Detailed Policy Statement is fullfilled solely by the TOE.
7.3.7 Semiformally designed, tested and reviewed
GP.Product_Assurance (see 3.7.7). This General Policy Statement is divided into the following
Detailed Policy Statement(s):
DP.Assurance_ACM (see 3.8.2). Configuration Management
Configuration management (CM) helps to ensure that the integrity of the TOE is pre-
served, by requiring discipline and control in the processes of refinement and modification
of the TOE and other related information. CM prevents unauthorised modifications, addi-
tions, or deletions to the TOE, thus providing assurance that the TOE and documentation
used for evaluation are the ones prepared for distribution. This Detailed Policy Statement
is fullfilled solely by the TOE.
DP.Assurance_ADO (see 3.8.3). Delivery and Operation
This security policy defines requirements for the measures, procedures, and standards
concerned with secure delivery, installation, and operational use of the TOE, ensuring
that the security protection offered by the TOE is not compromised during transfer, in-
stallation, start-up, and operation. This Detailed Policy Statement is fullfilled solely by
the TOE.
188 CHAPTER 7. RATIONALE
DP.Assurance_ADV (see 3.8.4). Product Development
This security policy defines requirements for the stepwise refinement of the TSF from
the TOE summary specification in the ST down to the actual implementation. Each of
the resulting TSF representations provide information to help the evaluator determine
whether the functional requirements of the TOE have been met. This Detailed Policy
Statement is fullfilled solely by the TOE.
DP.Assurance_AGD (see 3.8.5). Guidance documents
This security policy defines requirements directed at the understandability, coverage and
completeness of the operational documentation provided by the developer. This documen-
tation, which provides two categories of information, for users and for administrators, is
an important factor in the secure operation of the TOE. This Detailed Policy Statement is
fullfilled solely by the TOE.
DP.Assurance_ALC (see 3.8.6). Lifecycle support
This security policy defines requirements for assurance through the adoption of a well
defined life-cycle model for all the steps of the TOE development, including flaw re-
mediation procedures and policies, correct use of tools and techniques and the security
measures used to protect the development environment. This Detailed Policy Statement
is fullfilled solely by the TOE.
DP.Assurance_ATE (see 3.8.7). Test
This security policy states testing requirements that demonstrate that the TSF satisfies the
TOE security functional requirements. This Detailed Policy Statement is fullfilled solely
by the TOE.
DP.Assurance_AVA (see 3.8.8). Vulnerability Assesment
This security policy defines requirements directed at the identification of exploitable vul-
nerabilities. Specifically, it addresses those vulnerabilities introduced in the construction,
operation, misuse, or incorrect configuration of the TOE. This Detailed Policy Statement
is fullfilled solely by the TOE.
7.3.8 Information availability
GP.Availability (see 3.9.1). This General Policy Statement is divided into the following Detailed
Policy Statement(s):
DP.Config_Mgt_Plan (see 3.8.14). Implement operational configuration management
A configuration management plan shall be implemented by the system. The system shall
implement configuration management to assure storage integrity, identification of system
connectivity (software, hardware, and firmware), and identification of system components
(software, hardware, and firmware). The system shall implement strong integrity mecha-
nisms (integrity locks, encryption). This Detailed Policy Statement is fullfilled solely by
the TOE.
DP.Documented_Recovery (see 3.8.15). Documented recovery
The system shall provide procedures and features to assure that system recovery is done in
a trusted and secure manner. Any circumstances that could result in an untrusted recovery
shall be documented. This Detailed Policy Statement is fullfilled solely by the TOE.
DP.Malicious_Code (see 3.10.1). Malicious code prevention
Procedures and mechanisms to prevent the introduction of malicious code into the system
shall be provided. This Detailed Policy Statement is responsibility of the Environment.
DP.Sys_Assur_HW/SW/FW (see 3.8.26). Validation of security function integrity
Features and procedures to validate the integrity and the expected operation of the security-
relevant software, hardware, and firmware shall be provided by the system. This Detailed
Policy Statement is fullfilled solely by the TOE.
7.3. DETAILED POLICY STATEMENTS - GENERAL POLICY STATEMENT MAPPING189
DP.Sys_Backup_Procs (see 3.8.27). System backup procedures
Provide the capability to restore the system to a secure state after discontinuities of system
operations. This Detailed Policy Statement is fullfilled solely by the TOE.
DP.Sys_Backup_Restore (see 3.8.28). Restoration with minimal loss
The system shall provide backup procedures to allow restoration of the system with min-
imal loss of service or data. This Detailed Policy Statement is fullfilled solely by the
TOE.
DP.Sys_Backup_Storage (see 3.8.29). Effective backup restoration
The system shall provide procedures to ensure both the existence of sufficient backup
storage capability and effective restoration (incremental and complete) of the backup data.
This Detailed Policy Statement is fullfilled solely by the TOE.
DP.Sys_Backup_Verify (see 3.10.2). Backup protection and restoration
The system shall provide appropriate physical and technical protection of the backup and
restoration hardware, firmware, and software. This Detailed Policy Statement is respon-
sibility of the Environment.
DP.System_Recovery (see 3.8.31). Trusted system recovery
Provide procedures and features to assure that system recovery is done in a trusted and
secure manner. This Detailed Policy Statement is fullfilled solely by the TOE.
DP.User_Data_Dial-in (see 3.8.32). Encryption of transmitted user data
The system shall provide data transmission using an encryption mechanism appropriate
for the sensitivity of the data. This Detailed Policy Statement is fullfilled solely by the
TOE.
DP.User_Data_Storage (see 3.8.33). Protection of stored user data
The system shall provide appropriate storage, continuous personnel access control stor-
age, or encrypted storage of data based on the sensitivity of the data. This Detailed Policy
Statement is fullfilled solely by the TOE.
DP.User_Data_Transfer (see 3.8.34). Protection of transmitted user data
The system shall provide a protected distribution system for data transmitted. This De-
tailed Policy Statement is fullfilled solely by the TOE.
7.3.9 Information access control
GP.Information_AC (see 3.9.2). This General Policy Statement is divided into the following
Detailed Policy Statement(s):
DP.Admin_Security_Data (see 3.8.1). Changes to security data by authorized personnel
Provide mechanisms to assure that changes to security related data are executed only by
authorized personnel. This Detailed Policy Statement is fullfilled solely by the TOE.
DP.Need_To_Know (see 3.8.21). Privileged user access
The system shall function so that each user has access to all of the information and func-
tions that the user requires to perform duties, but no more. This Detailed Policy Statement
is fullfilled solely by the TOE.
DP.Screen_Lock (see 3.8.23). User screen locking
The system shall provide a screen lock mechanism. This Detailed Policy Statement is
fullfilled solely by the TOE.
DP.User_Auth_Enhanced (see 3.10.3). Enhanced user identification and authentication
The system shall require the use of enhanced authentication for privileged users who
either reside outside of the system’s perimeter or whose communications traverse data
lines outside of the system’s perimeter. This Detailed Policy Statement is responsibility
of the Environment.
190 CHAPTER 7. RATIONALE
DP.User_Defined_AC (see 3.8.35). Discretionary access control
The system shall provide a Discretionary Access Control (DAC) function (i.e., a user
can grant access authorization to other users for data they control). This Detailed Policy
Statement is fullfilled solely by the TOE.
7.3.10 Information content integrity
GP.Integrity (see 3.9.3). This General Policy Statement is divided into the following Detailed
Policy Statement(s):
DP.Admin_Security_Data (see 3.8.1). Changes to security data by authorized personnel
Provide mechanisms to assure that changes to security related data are executed only by
authorized personnel. This Detailed Policy Statement is fullfilled solely by the TOE.
DP.Change_Control_Users (see 3.8.13). Notification of data content changes
Notify user of the time and date of the last modification of data. This Detailed Policy
Statement is fullfilled solely by the TOE.
DP.Config_Mgt_Plan (see 3.8.14). Implement operational configuration management
A configuration management plan shall be implemented by the system. The system shall
implement configuration management to assure storage integrity, identification of system
connectivity (software, hardware, and firmware), and identification of system components
(software, hardware, and firmware). The system shall implement strong integrity mecha-
nisms (integrity locks, encryption). This Detailed Policy Statement is fullfilled solely by
the TOE.
DP.Documented_Recovery (see 3.8.15). Documented recovery
The system shall provide procedures and features to assure that system recovery is done in
a trusted and secure manner. Any circumstances that could result in an untrusted recovery
shall be documented. This Detailed Policy Statement is fullfilled solely by the TOE.
DP.Integrity_Data/SW (see 3.8.18). Strong integrity mechanisms
The system shall implement strong integrity mechanisms (integrity locks, encryption).
This Detailed Policy Statement is fullfilled solely by the TOE.
DP.Integrity_Practice (see 3.8.19). Operational integrity system function testing
Provide system functional tests to periodically test the integrity of the hardware and code
running system functions. This Detailed Policy Statement is fullfilled solely by the TOE.
DP.Malicious_Code (see 3.10.1). Malicious code prevention
Procedures and mechanisms to prevent the introduction of malicious code into the system
shall be provided. This Detailed Policy Statement is responsibility of the Environment.
DP.Non-Repudiation (see 3.10.4). Non-repudiation capabilities
The system shall provide non-repudiation capabilities. This Detailed Policy Statement is
responsibility of the Environment.
DP.Storage_Integrity (see 3.8.24). Assurance of effective storage integrity
The system shall provide assurance that storage integrity is effective. This Detailed Policy
Statement is fullfilled solely by the TOE.
DP.Sys_Assur_HW/SW/FW (see 3.8.26). Validation of security function integrity
Features and procedures to validate the integrity and the expected operation of the security-
relevant software, hardware, and firmware shall be provided by the system. This Detailed
Policy Statement is fullfilled solely by the TOE.
DP.System_Protection (see 3.8.30). Protection from security function modification
Provide features or procedures for protection of the system from improper changes. This
Detailed Policy Statement is fullfilled solely by the TOE.
7.4. DETAILED POLICY STATEMENTS - SECURITY OBJECTIVE MAPPING191
DP.System_Recovery (see 3.8.31). Trusted system recovery
Provide procedures and features to assure that system recovery is done in a trusted and
secure manner. This Detailed Policy Statement is fullfilled solely by the TOE.
DP.User_Data_Dial-in (see 3.8.32). Encryption of transmitted user data
The system shall provide data transmission using an encryption mechanism appropriate
for the sensitivity of the data. This Detailed Policy Statement is fullfilled solely by the
TOE.
DP.User_Data_Storage (see 3.8.33). Protection of stored user data
The system shall provide appropriate storage, continuous personnel access control stor-
age, or encrypted storage of data based on the sensitivity of the data. This Detailed Policy
Statement is fullfilled solely by the TOE.
DP.User_Data_Transfer (see 3.8.34). Protection of transmitted user data
The system shall provide a protected distribution system for data transmitted. This De-
tailed Policy Statement is fullfilled solely by the TOE.
7.3.11 Physical protection
GP.Physical_Control (see 3.9.4). This General Policy Statement is divided into the following
Detailed Policy Statement(s):
DP.Tamper_ID (see 3.10.5). Physical tampering detection and notification
The system shall detect physical tampering and notify the appropriate authority. This
Detailed Policy Statement is responsibility of the Environment.
7.4 Detailed Policy Statements - Security Objective Map-
ping
Those Detailed Security Objectives identified in Sections 3.8 and 3.8 are herein assigned to
Security Objectives, that are effective and sufficient to comply with the terms of the policy. It
can be shown that every Policy Statement is covered by such Security Requirements.
7.4.1 Changes to security data by authorized personnel
DP.Admin_Security_Data (see 3.8.1). The following Security Objectives are considered suffi-
cient to comply completely with this Detailed Policy Statement:
O.Security_Attr_Mgt (see 4.1.114). Manage security attributes This Security Objective is full-
filled by the TOE.
O.Security_Data_Mgt (see 4.1.115). Manage security-critical data This Security Objective is
fullfilled by the TOE.
O.Security_Func_Mgt (see 4.1.116). Manage behavior of security functions This Security
Objective is fullfilled by the TOE.
7.4.2 Configuration Management
DP.Assurance_ACM (see 3.8.2). The following Security Objectives are considered sufficient to
comply completely with this Detailed Policy Statement:
O.Assurance_ACM_AUT (see 4.1.10). CM automation This Security Objective is fullfilled by
the TOE.
O.Assurance_ACM_CAP (see 4.1.11). CM capabilities This Security Objective is fullfilled by
the TOE.
192 CHAPTER 7. RATIONALE
O.Assurance_ACM_SCP (see 4.1.12). CM scope This Security Objective is fullfilled by the
TOE.
7.4.3 Delivery and Operation
DP.Assurance_ADO (see 3.8.3). The following Security Objectives are considered sufficient to
comply completely with this Detailed Policy Statement:
O.Assurance_ADO_DEL (see 4.1.13). Delivery This Security Objective is fullfilled by the
TOE.
O.Assurance_ADO_IGS (see 4.1.14). Installation, generation and start-up This Security Ob-
jective is fullfilled by the TOE.
7.4.4 Product Development
DP.Assurance_ADV (see 3.8.4). The following Security Objectives are considered sufficient to
comply completely with this Detailed Policy Statement:
O.Assurance_ADV_FSP (see 4.1.15). Functional specification This Security Objective is full-
filled by the TOE.
O.Assurance_ADV_HLD (see 4.1.16). High-level design This Security Objective is fullfilled
by the TOE.
O.Assurance_ADV_IMP (see 4.1.17). Implementation representation This Security Objective
is fullfilled by the TOE.
O.Assurance_ADV_INT (see 4.1.18). TSF internals This Security Objective is fullfilled by the
TOE.
O.Assurance_ADV_LLD (see 4.1.19). Low-level design This Security Objective is fullfilled
by the TOE.
O.Assurance_ADV_RCR (see 4.1.20). Representation correspondence This Security Objec-
tive is fullfilled by the TOE.
O.Assurance_ADV_SPM (see 4.1.21). Security policy modeling This Security Objective is
fullfilled by the TOE.
7.4.5 Guidance documents
DP.Assurance_AGD (see 3.8.5). The following Security Objectives are considered sufficient to
comply completely with this Detailed Policy Statement:
O.Assurance_AGD_ADM (see 4.1.22). Administrator guidance This Security Objective is
fullfilled by the TOE.
O.Assurance_AGD_USR (see 4.1.23). User guidance This Security Objective is fullfilled by
the TOE.
7.4.6 Lifecycle support
DP.Assurance_ALC (see 3.8.6). The following Security Objectives are considered sufficient to
comply completely with this Detailed Policy Statement:
O.Assurance_ALC_DVS (see 4.1.24). Development security This Security Objective is full-
filled by the TOE.
O.Assurance_ALC_FLR (see 4.1.25). Flaw remediation This Security Objective is fullfilled
by the TOE.
O.Assurance_ALC_LCD (see 4.1.26). Life cycle definition This Security Objective is full-
filled by the TOE.
7.4. DETAILED POLICY STATEMENTS - SECURITY OBJECTIVE MAPPING193
O.Assurance_ALC_TAT (see 4.1.27). Tools and techniques This Security Objective is full-
filled by the TOE.
7.4.7 Test
DP.Assurance_ATE (see 3.8.7). The following Security Objectives are considered sufficient to
comply completely with this Detailed Policy Statement:
O.Assurance_ATE_COV (see 4.1.28). Coverage This Security Objective is fullfilled by the
TOE.
O.Assurance_ATE_DPT (see 4.1.29). Depth This Security Objective is fullfilled by the TOE.
O.Assurance_ATE_FUN (see 4.1.30). Functional tests This Security Objective is fullfilled by
the TOE.
O.Assurance_ATE_IND (see 4.1.31). Independent testing This Security Objective is fullfilled
by the TOE.
7.4.8 Vulnerability Assesment
DP.Assurance_AVA (see 3.8.8). The following Security Objectives are considered sufficient to
comply completely with this Detailed Policy Statement:
O.Assurance_AVA_CCA (see 4.1.32). Covert channel analysis This Security Objective is full-
filled by the TOE.
O.Assurance_AVA_MSU (see 4.1.33). Misuse This Security Objective is fullfilled by the TOE.
O.Assurance_AVA_SOF (see 4.1.34). Strength of TOE security functions This Security Ob-
jective is fullfilled by the TOE.
O.Assurance_AVA_VLA (see 4.1.35). Vulnerability analysis This Security Objective is full-
filled by the TOE.
7.4.9 Individual accountability
DP.Audit_Gen_User (see 3.8.9). The following Security Objectives are considered sufficient to
comply completely with this Detailed Policy Statement:
O.Audit_Gen_User (see 4.1.41). Individual accountability This Security Objective is fullfilled
by the TOE.
7.4.10 Audit data generation with identity
DP.Audit_Generation (see 3.8.10). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.Audit_Generation (see 4.1.42). Audit records with identity This Security Objective is full-
filled by the TOE.
7.4.11 Protected audit data storage
DP.Audit_Protect (see 3.8.11). The following Security Objectives are considered sufficient to
comply completely with this Detailed Policy Statement:
O.Audit_Protect (see 4.1.44). Protect stored audit records This Security Objective is fullfilled
by the TOE.
194 CHAPTER 7. RATIONALE
7.4.12 Notification of threats and vulnerabilities
DP.Authority_Notify (see 3.8.12). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.Admin_Guidance (see 4.1.8). Administrator guidance documentation This Security Objec-
tive is fullfilled by the TOE.
O.User_Guidance (see 4.1.146). User guidance documentation This Security Objective is full-
filled by the TOE.
7.4.13 Notification of data content changes
DP.Change_Control_Users (see 3.8.13). The following Security Objectives are considered suf-
ficient to comply completely with this Detailed Policy Statement:
O.Change_Control_Users (see 4.1.45). User notification of data content changes This Security
Objective is fullfilled by the TOE.
7.4.14 Implement operational configuration management
DP.Config_Mgt_Plan (see 3.8.14). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.Config_Management (see 4.1.48). Implement operational configuration management This
Security Objective is fullfilled by the TOE.
7.4.15 Documented recovery
DP.Documented_Recovery (see 3.8.15). The following Security Objectives are considered suf-
ficient to comply completely with this Detailed Policy Statement:
O.Trusted_Recovery_Doc (see 4.1.138). Documentation of untrusted data recovery This Se-
curity Objective is fullfilled by the TOE.
7.4.16 Labeling data
DP.External_Labels (see 3.8.16). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.External_Labels (see 4.1.65). Label or mark information for external systems This Security
Objective is fullfilled by the TOE.
7.4.17 User identification and authentication
DP.I&A_User (see 3.8.17). The following Security Objectives are considered sufficient to com-
ply completely with this Detailed Policy Statement:
O.I&A_Domain (see 4.1.71). Identify and authenticate a user to support accountability This
Security Objective is fullfilled by the TOE.
7.4.18 Strong integrity mechanisms
DP.Integrity_Data/SW (see 3.8.18). The following Security Objectives are considered suffi-
cient to comply completely with this Detailed Policy Statement:
O.Integrity_Data/SW (see 4.1.84). Integrity protection for user data and software This Secu-
rity Objective is fullfilled by the TOE.
7.4. DETAILED POLICY STATEMENTS - SECURITY OBJECTIVE MAPPING195
7.4.19 Operational integrity system function testing
DP.Integrity_Practice (see 3.8.19). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.Integrity_Practice (see 4.1.86). Operational integrity system function testing This Security
Objective is fullfilled by the TOE.
7.4.20 Security throughout lifecycle
DP.Lifecycle_Security (see 3.8.20). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.Lifecycle_Security (see 4.1.88). Lifecycle security This Security Objective is fullfilled by
the TOE.
7.4.21 Privileged user access
DP.Need_To_Know (see 3.8.21). The following Security Objectives are considered sufficient to
comply completely with this Detailed Policy Statement:
O.User_Defined_AC (see 4.1.145). User-defined access control This Security Objective is full-
filled by the TOE.
The SFP gives object owners the ability to restrict direct access to those with a designated
need to know. However, those with a need-to-know (and processes acting on their behalf)
must be trusted to themselves enforce need-to-know constraints.
7.4.22 Privileged user documentation
DP.Privileged_Doc (see 3.8.22). The following Security Objectives are considered sufficient to
comply completely with this Detailed Policy Statement:
O.Admin_Guidance (see 4.1.8). Administrator guidance documentation This Security Objec-
tive is fullfilled by the TOE.
7.4.23 User screen locking
DP.Screen_Lock (see 3.8.23). The following Security Objectives are considered sufficient to
comply completely with this Detailed Policy Statement:
O.Screen_Lock (see 4.1.111). User screen locking This Security Objective is fullfilled by the
TOE.
7.4.24 Assurance of effective storage integrity
DP.Storage_Integrity (see 3.8.24). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.Storage_Integrity (see 4.1.122). Storage integrity This Security Objective is fullfilled by the
TOE.
7.4.25 System access banners
DP.Sys_Access_Banners (see 3.8.25). The following Security Objectives are considered suffi-
cient to comply completely with this Detailed Policy Statement:
O.Sys_Access_Banners (see 4.1.123). System access banners This Security Objective is full-
filled by the TOE.
196 CHAPTER 7. RATIONALE
7.4.26 Validation of security function integrity
DP.Sys_Assur_HW/SW/FW (see 3.8.26). The following Security Objectives are considered
sufficient to comply completely with this Detailed Policy Statement:
O.Sys_Assur_HW/SW/FW (see 4.1.124). Validation of security function This Security Objec-
tive is fullfilled by the TOE.
7.4.27 System backup procedures
DP.Sys_Backup_Procs (see 3.8.27). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.Sys_Backup_Procs (see 4.1.125). System backup procedures This Security Objective is full-
filled by the TOE.
7.4.28 Restoration with minimal loss
DP.Sys_Backup_Restore (see 3.8.28). The following Security Objectives are considered suffi-
cient to comply completely with this Detailed Policy Statement:
O.Sys_Backup_Restore (see 4.1.126). Frequent backups to prevent minimal loss This Security
Objective is fullfilled by the TOE.
7.4.29 Effective backup restoration
DP.Sys_Backup_Storage (see 3.8.29). The following Security Objectives are considered suffi-
cient to comply completely with this Detailed Policy Statement:
O.Sys_Backup_Storage (see 4.1.127). Sufficient backup storage and effective restoration This
Security Objective is fullfilled by the TOE.
7.4.30 Protection from security function modification
DP.System_Protection (see 3.8.30). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.Config_Management (see 4.1.48). Implement operational configuration management This
Security Objective is fullfilled by the TOE.
O.Sys_Assur_HW/SW/FW (see 4.1.124). Validation of security function This Security Objec-
tive is fullfilled by the TOE.
O.Sys_Self_Protection (see 4.1.128). Protection of system security function This Security Ob-
jective is fullfilled by the TOE.
7.4.31 Trusted system recovery
DP.System_Recovery (see 3.8.31). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.Trusted_Recovery_Doc (see 4.1.138). Documentation of untrusted data recovery This Se-
curity Objective is fullfilled by the TOE.
7.4.32 Encryption of transmitted user data
DP.User_Data_Dial-in (see 3.8.32). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.User_Data_Dial-in (see 4.1.142). Protection of user-session data This Security Objective is
fullfilled by the TOE.
7.4. DETAILED POLICY STATEMENTS - SECURITY OBJECTIVE MAPPING197
7.4.33 Protection of stored user data
DP.User_Data_Storage (see 3.8.33). The following Security Objectives are considered suffi-
cient to comply completely with this Detailed Policy Statement:
O.Info_Flow_Control (see 4.1.76). System enforced information flow This Security Objective
is fullfilled by the TOE.
O.User_Data_Integrity (see 4.1.143). Integrity protection of stored user data This Security
Objective is fullfilled by the TOE.
O.User_Defined_AC (see 4.1.145). User-defined access control This Security Objective is full-
filled by the TOE.
7.4.34 Protection of transmitted user data
DP.User_Data_Transfer (see 3.8.34). The following Security Objectives are considered suffi-
cient to comply completely with this Detailed Policy Statement:
O.Identify_Unusual_Act (see 4.1.75). Identify unusual user activity This Security Objective
is fullfilled by the TOE.
O.User_Data_Transfer (see 4.1.144). Protection of transmitted user data This Security Objec-
tive is fullfilled by the TOE.
7.4.35 Discretionary access control
DP.User_Defined_AC (see 3.8.35). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.User_Defined_AC (see 4.1.145). User-defined access control This Security Objective is full-
filled by the TOE.
7.4.36 General user documentation
DP.User_Documentation (see 3.8.36). The following Security Objectives are considered suffi-
cient to comply completely with this Detailed Policy Statement:
O.User_Guidance (see 4.1.146). User guidance documentation This Security Objective is full-
filled by the TOE.
7.4.37 Malicious code prevention
DP.Malicious_Code (see 3.10.1). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.Malicious_Code (see 4.2.6). Procedures for preventing malicious code Compliance of this
Security Objective is assigned to the Environment.
7.4.38 Backup protection and restoration
DP.Sys_Backup_Verify (see 3.10.2). The following Security Objectives are considered suffi-
cient to comply completely with this Detailed Policy Statement:
O.Sys_Backup_Verify (see 4.2.18). Detect modifications of backup hardware, firmware, soft-
ware Compliance of this Security Objective is assigned to the Environment.
198 CHAPTER 7. RATIONALE
7.4.39 Enhanced user identification and authentication
DP.User_Auth_Enhanced (see 3.10.3). The following Security Objectives are considered suf-
ficient to comply completely with this Detailed Policy Statement:
O.User_Auth_Enhanced (see 4.2.21). Enhanced user authentication Compliance of this Secu-
rity Objective is assigned to the Environment.
7.4.40 Non-repudiation capabilities
DP.Non-Repudiation (see 3.10.4). The following Security Objectives are considered sufficient
to comply completely with this Detailed Policy Statement:
O.NonRepudiate_Recd (see 4.2.10). Non-repudiation for received information Compliance of
this Security Objective is assigned to the Environment.
O.NonRepudiate_Sent (see 4.1.101). Non-repudiation for sent information This Security Ob-
jective is fullfilled by the TOE.
7.4.41 Physical tampering detection and notification
DP.Tamper_ID (see 3.10.5). The following Security Objectives are considered sufficient to
comply completely with this Detailed Policy Statement:
O.Tamper_ID (see 4.2.19). Tamper detection Compliance of this Security Objective is as-
signed to the Environment.
7.5 Security Objectives - Security Requirements Ratio-
nale
Up to this point, Security Objectives have been identified, to cover both technical Detailed At-
tacks against the TOE and Detailed Policy Statements. These Security Objectives have also been
assigned both to the TOE and to the Environment, by application of the active Assumptions.
For those Security Objectives assigned to the TOE, Security Requirements already identi-
fied in Sec. 5 are selected to guarantee their satisfaction. This rationale includes coverage and
completeness mappings.
7.5.1 Limitation of administrative access control
O.AC_Admin_Limit (see 4.1.1). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_ACC.1 Subset access control This is actually satisfied by a higher component, (see 5.1.4).
FDP_ACF.1 Security attribute based access control (see 5.1.4).
7.5.2 Object security attributes and exportation
O.AC_Label_Export (see 4.1.2). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_ACC.1 Subset access control This is actually satisfied by a higher component, (see 5.1.4).
FDP_ACF.1 Security attribute based access control (see 5.1.4).
FDP_ETC.2 Export of user data with security attributes (see 5.1.4).
7.5. SECURITY OBJECTIVES - SECURITY REQUIREMENTS RATIONALE 199
7.5.3 Access history for user session
O.Access_History (see 4.1.3). To achieve this Security Objective, the following Security Re-
quirements shall be implemented by the TOE:
FTA_TAH.1 TOE access history (see 5.1.9).
7.5.4 Limit an administrator’s ability to modify user-subject bind-
ings
O.Adm_Limits_Bindings (see 4.1.4). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FIA_UAU.2 User authentication before any action (see 5.1.5).
FIA_UAU.6 Re-authenticating (see 5.1.5).
FIA_USB.1 User-subject binding (see 5.1.5).
FMT_MTD.1 Management of TSF data (see 5.1.6).
7.5.5 Limit administrator’s modification of user attributes
O.Adm_User_Att_Mod (see 4.1.5). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FIA_ATD.1 User attribute definition (see 5.1.5).
FIA_UAU.2 User authentication before any action (see 5.1.5).
FMT_MSA.1 Management of security attributes (see 5.1.6).
7.5.6 Administrative validation of executables
O.Admin_Code_Val (see 4.1.6). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_ACC.1 Subset access control This is actually satisfied by a higher component, (see 5.1.4).
FDP_ACF.1 Security attribute based access control (see 5.1.4).
FDP_SDI.1 Stored data integrity monitoring This is actually satisfied by a higher component,
(see 5.1.4).
FMT_MSA.1 Management of security attributes (see 5.1.6).
FPT_TST.1 TSF testing (see 5.1.7).
7.5.7 Software validation for absence of steganography
O.Admin_Code_Val_Sten (see 4.1.7). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FDP_ACC.1 Subset access control This is actually satisfied by a higher component, (see 5.1.4).
FDP_ACF.1 Security attribute based access control (see 5.1.4).
FMT_MSA.1 Management of security attributes (see 5.1.6).
FMT_MSA.3 Static attribute initialisation (see 5.1.6).
FMT_SMR.1 Security roles This is actually satisfied by a higher component, (see 5.1.6).
200 CHAPTER 7. RATIONALE
7.5.8 Administrator guidance documentation
O.Admin_Guidance (see 4.1.8). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
AGD_ADM.1 Administrator guidance (see 5.2.4).
7.5.9 Apply patches to fix the code
O.Apply_Code_Fixes (see 4.1.9). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
AGD_ADM.1 Administrator guidance (see 5.2.4).
ALC_FLR.3 Systematic flaw remediation (see 5.2.5).
FMT_MOF.1 Management of security functions behaviour (see 5.1.6).
FMT_MSA.1 Management of security attributes (see 5.1.6).
7.5.10 CM automation
O.Assurance_ACM_AUT (see 4.1.10). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ACM_AUT.2 Complete CM automation (see 5.2.1).
7.5.11 CM capabilities
O.Assurance_ACM_CAP (see 4.1.11). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ACM_CAP.4 Generation support and acceptance procedures (see 5.2.1).
7.5.12 CM scope
O.Assurance_ACM_SCP (see 4.1.12). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ACM_SCP.3 Development tools CM coverage (see 5.2.1).
7.5.13 Delivery
O.Assurance_ADO_DEL (see 4.1.13). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ADO_DEL.2 Detection of modification (see 5.2.2).
7.5.14 Installation, generation and start-up
O.Assurance_ADO_IGS (see 4.1.14). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ADO_IGS.1 Installation, generation, and start-up procedures (see 5.2.2).
7.5.15 Functional specification
O.Assurance_ADV_FSP (see 4.1.15). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ADV_FSP.3 Semiformal functional specification (see 5.2.3).
7.5. SECURITY OBJECTIVES - SECURITY REQUIREMENTS RATIONALE 201
7.5.16 High-level design
O.Assurance_ADV_HLD (see 4.1.16). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ADV_HLD.3 Semiformal high-level design (see 5.2.3).
7.5.17 Implementation representation
O.Assurance_ADV_IMP (see 4.1.17). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ADV_IMP.3 Structured implementation of the TSF (see 5.2.3).
7.5.18 TSF internals
O.Assurance_ADV_INT (see 4.1.18). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ADV_INT.3 Minimisation of complexity (see 5.2.3).
7.5.19 Low-level design
O.Assurance_ADV_LLD (see 4.1.19). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ADV_LLD.1 Descriptive low-level design (see 5.2.3).
7.5.20 Representation correspondence
O.Assurance_ADV_RCR (see 4.1.20). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ADV_RCR.2 Semiformal correspondence demonstration (see 5.2.3).
7.5.21 Security policy modeling
O.Assurance_ADV_SPM (see 4.1.21). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ADV_SPM.1 Informal TOE security policy model This is actually satisfied by a higher compo-
nent, (see 5.2.3).
7.5.22 Administrator guidance
O.Assurance_AGD_ADM (see 4.1.22). To achieve this Security Objective, the following Se-
curity Requirements shall be implemented by the TOE:
AGD_ADM.1 Administrator guidance (see 5.2.4).
7.5.23 User guidance
O.Assurance_AGD_USR (see 4.1.23). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
AGD_USR.1 User guidance (see 5.2.4).
202 CHAPTER 7. RATIONALE
7.5.24 Development security
O.Assurance_ALC_DVS (see 4.1.24). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ALC_DVS.2 Sufficiency of security measures (see 5.2.5).
7.5.25 Flaw remediation
O.Assurance_ALC_FLR (see 4.1.25). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ALC_FLR.3 Systematic flaw remediation (see 5.2.5).
7.5.26 Life cycle definition
O.Assurance_ALC_LCD (see 4.1.26). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ALC_LCD.3 Measurable life-cycle model (see 5.2.5).
7.5.27 Tools and techniques
O.Assurance_ALC_TAT (see 4.1.27). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ALC_TAT.2 Compliance with implementation standards (see 5.2.5).
7.5.28 Coverage
O.Assurance_ATE_COV (see 4.1.28). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ATE_COV.2 Analysis of coverage (see 5.2.6).
7.5.29 Depth
O.Assurance_ATE_DPT (see 4.1.29). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ATE_DPT.3 Testing: implementation representation (see 5.2.6).
7.5.30 Functional tests
O.Assurance_ATE_FUN (see 4.1.30). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
ATE_FUN.2 Ordered functional testing (see 5.2.6).
7.5.31 Independent testing
O.Assurance_ATE_IND (see 4.1.31). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
ATE_IND.2 Independent testing - sample (see 5.2.6).
7.5. SECURITY OBJECTIVES - SECURITY REQUIREMENTS RATIONALE 203
7.5.32 Covert channel analysis
O.Assurance_AVA_CCA (see 4.1.32). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
AVA_CCA.1 Covert channel analysis (see 5.2.7).
7.5.33 Misuse
O.Assurance_AVA_MSU (see 4.1.33). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
AVA_MSU.2 Validation of analysis (see 5.2.7).
7.5.34 Strength of TOE security functions
O.Assurance_AVA_SOF (see 4.1.34). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
AVA_SOF.1 Strength of TOE security function evaluation (see 5.2.7).
7.5.35 Vulnerability analysis
O.Assurance_AVA_VLA (see 4.1.35). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
AVA_VLA.2 Independent vulnerability analysis (see 5.2.7).
7.5.36 Complete security functions or recover to previous state
O.Atomic_Functions (see 4.1.36). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FPT_RCV.4 Function recovery (see 5.1.7).
7.5.37 Audit changes of system entry parameters
O.Aud_Sys_Entry_Parms (see 4.1.37). To achieve this Security Objective, the following Se-
curity Requirements shall be implemented by the TOE:
FAU_GEN.1 Audit data generation (see 5.1.1).
FPT_STM.1 Reliable time stamps (see 5.1.7).
FMT_MTD.1 Management of TSF data (see 5.1.6).
FMT_MTD.2 Management of limits on TSF data (see 5.1.6).
FMT_MTD.3 Secure TSF data (see 5.1.6).
7.5.38 Auditing for user accountability
O.Audit_Account (see 4.1.38). To achieve this Security Objective, the following Security Re-
quirements shall be implemented by the TOE:
FAU_GEN.1 Audit data generation (see 5.1.1).
FPT_STM.1 Reliable time stamps (see 5.1.7).
FAU_GEN.2 User identity association (see 5.1.1).
FAU_SAR.1 Audit review (see 5.1.1).
FAU_SAR.3 Selectable audit review (see 5.1.1).
204 CHAPTER 7. RATIONALE
FAU_SEL.1 Selective audit (see 5.1.1).
FMT_MOF.1 Management of security functions behaviour (see 5.1.6).
FMT_SMR.1 Security roles This is actually satisfied by a higher component, (see 5.1.6).
7.5.39 Audit-administration role duties
O.Audit_Admin_Role (see 4.1.39). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
AGD_ADM.1 Administrator guidance (see 5.2.4).
FAU_STG.2 Guarantees of audit data availability (see 5.1.1).
FMT_MTD.1 Management of TSF data (see 5.1.6).
FMT_SMR.2 Restrictions on security roles (see 5.1.6).
7.5.40 Audit system access to deter misuse
O.Audit_Deter_Misuse (see 4.1.40). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FAU_GEN.2 User identity association (see 5.1.1).
FTA_TAB.1 Default TOE access banners (see 5.1.9).
7.5.41 Individual accountability
O.Audit_Gen_User (see 4.1.41). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FAU_GEN.2 User identity association (see 5.1.1).
FIA_UID.1 Timing of identification This is actually satisfied by a higher component, (see
5.1.5).
7.5.42 Audit records with identity
O.Audit_Generation (see 4.1.42). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FAU_GEN.1 Audit data generation (see 5.1.1).
FPT_STM.1 Reliable time stamps (see 5.1.7).
7.5.43 Respond to possible loss of stored audit records
O.Audit_Loss_Respond (see 4.1.43). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FAU_STG.4 Prevention of audit data loss (see 5.1.1).
7.5.44 Protect stored audit records
O.Audit_Protect (see 4.1.44). To achieve this Security Objective, the following Security Re-
quirements shall be implemented by the TOE:
FAU_STG.2 Guarantees of audit data availability (see 5.1.1).
7.5. SECURITY OBJECTIVES - SECURITY REQUIREMENTS RATIONALE 205
7.5.45 User notification of data content changes
O.Change_Control_Users (see 4.1.45). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FDP_DAU.2 Data authentication with identity of guarantor (see 5.1.4).
7.5.46 Code signing and verification
O.Code_Signing (see 4.1.46). To achieve this Security Objective, the following Security Re-
quirements shall be implemented by the TOE:
FDP_ETC.2 Export of user data with security attributes (see 5.1.4).
FDP_ITC.2 Import of user data with security attributes (see 5.1.4).
FDP_UIT.1 Data exchange integrity (see 5.1.4).
FIA_UAU.1 Timing of authentication This is actually satisfied by a higher component, (see
5.1.5).
7.5.47 Trusted channel to remote trusted system
O.Comm_Trusted_Channel (see 4.1.47). To achieve this Security Objective, the following
Security Requirements shall be implemented by the TOE:
FTP_ITC.1 Inter-TSF trusted channel (see 5.1.10).
7.5.48 Implement operational configuration management
O.Config_Management (see 4.1.48). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FMT_MOF.1 Management of security functions behaviour (see 5.1.6).
FMT_MTD.1 Management of TSF data (see 5.1.6).
7.5.49 Verify correct operation as designed
O.Correct_Operation (see 4.1.49). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FPT_TST.1 TSF testing (see 5.1.7).
7.5.50 Cryptographic access control policy
O.Crypto_AC (see 4.1.50). To achieve this Security Objective, the following Security Require-
ments shall be implemented by the TOE:
FDP_ACC.1 Subset access control This is actually satisfied by a higher component, (see 5.1.4).
FDP_ACF.1 Security attribute based access control (see 5.1.4).
7.5.51 Encrypted communications channel
O.Crypto_Comm_Channel (see 4.1.51). To achieve this Security Objective, the following Se-
curity Requirements shall be implemented by the TOE:
FCS_CKM.1 Cryptographic key generation (see 5.1.3).
FCS_CKM.2 Cryptographic key distribution (see 5.1.3).
FCS_CKM.3 Cryptographic key access (see 5.1.3).
FCS_CKM.4 Cryptographic key destruction (see 5.1.3).
FCS_COP.1 Cryptographic operation (see 5.1.3).
206 CHAPTER 7. RATIONALE
7.5.52 Separation of cryptographic data
O.Crypto_Data_Sep (see 4.1.52). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
ADV_INT.1 Modularity This is actually satisfied by a higher component, (see 5.2.3).
FDP_IFF.3 Limited illicit information flows (see 5.1.4).
FPT_SEP.2 SFP domain separation This is actually satisfied by a higher component, (see 5.1.7).
7.5.53 Cryptographic Design and Implementation
O.Crypto_Dsgn_Impl (see 4.1.53). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
ADV_HLD.2 Security enforcing high-level design This is actually satisfied by a higher compo-
nent, (see 5.2.3).
ADV_LLD.1 Descriptive low-level design (see 5.2.3).
ADV_RCR.1 Informal correspondence demonstration This is actually satisfied by a higher
component, (see 5.2.3).
ALC_TAT.2 Compliance with implementation standards (see 5.2.5).
7.5.54 Cryptographic import, export, and inter-TSF transfer
O.Crypto_Import_Export (see 4.1.54). To achieve this Security Objective, the following Se-
curity Requirements shall be implemented by the TOE:
AGD_ADM.1 Administrator guidance (see 5.2.4).
AGD_USR.1 User guidance (see 5.2.4).
FDP_ETC.1 Export of user data without security attributes (see 5.1.4).
FDP_ETC.2 Export of user data with security attributes (see 5.1.4).
FDP_ITC.1 Import of user data without security attributes (see 5.1.4).
FDP_ITC.2 Import of user data with security attributes (see 5.1.4).
FTP_ITC.1 Inter-TSF trusted channel (see 5.1.10).
FTP_TRP.1 Trusted path (see 5.1.10).
7.5.55 Cryptographic Key Management
O.Crypto_Key_Man (see 4.1.55). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
ADV_FSP.1 Informal functional specification This is actually satisfied by a higher component,
(see 5.2.3).
ADV_SPM.1 Informal TOE security policy model This is actually satisfied by a higher compo-
nent, (see 5.2.3).
AVA_VLA.1 Developer vulnerability analysis This is actually satisfied by a higher component,
(see 5.2.7).
FCS_CKM.1 Cryptographic key generation (see 5.1.3).
FCS_CKM.2 Cryptographic key distribution (see 5.1.3).
FCS_CKM.3 Cryptographic key access (see 5.1.3).
FCS_CKM.4 Cryptographic key destruction (see 5.1.3).
7.5. SECURITY OBJECTIVES - SECURITY REQUIREMENTS RATIONALE 207
FDP_ACC.1 Subset access control This is actually satisfied by a higher component, (see 5.1.4).
FDP_ACF.1 Security attribute based access control (see 5.1.4).
FDP_ITC.1 Import of user data without security attributes (see 5.1.4).
FMT_MSA.1 Management of security attributes (see 5.1.6).
FMT_MTD.1 Management of TSF data (see 5.1.6).
FPT_SEP.1 TSF domain separation This is actually satisfied by a higher component, (see 5.1.7).
7.5.56 Management of cryptographic roles
O.Crypto_Manage_Roles (see 4.1.56). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FMT_SMR.1 Security roles This is actually satisfied by a higher component, (see 5.1.6).
7.5.57 Cryptographic Modular Design
O.Crypto_Modular_Dsgn (see 4.1.57). To achieve this Security Objective, the following Se-
curity Requirements shall be implemented by the TOE:
ADV_FSP.1 Informal functional specification This is actually satisfied by a higher component,
(see 5.2.3).
ADV_HLD.1 Descriptive high-level design This is actually satisfied by a higher component,
(see 5.2.3).
ADV_INT.1 Modularity This is actually satisfied by a higher component, (see 5.2.3).
ADV_LLD.1 Descriptive low-level design (see 5.2.3).
7.5.58 Cryptographic function definition
O.Crypto_Operation (see 4.1.58). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
ADV_FSP.1 Informal functional specification This is actually satisfied by a higher component,
(see 5.2.3).
ADV_SPM.1 Informal TOE security policy model This is actually satisfied by a higher compo-
nent, (see 5.2.3).
FCS_COP.1 Cryptographic operation (see 5.1.3).
7.5.59 Cryptographic self test
O.Crypto_Self_Test (see 4.1.59). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_SDI.1 Stored data integrity monitoring This is actually satisfied by a higher component,
(see 5.1.4).
FPT_AMT.1 Abstract machine testing (see 5.1.7).
FPT_TST.1 TSF testing (see 5.1.7).
208 CHAPTER 7. RATIONALE
7.5.60 Test cryptographic functionality
O.Crypto_Test_Reqs (see 4.1.60). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
ATE_COV.1 Evidence of coverage This is actually satisfied by a higher component, (see 5.2.6).
ATE_DPT.2 Testing: low-level design This is actually satisfied by a higher component, (see
5.2.6).
ATE_FUN.1 Functional testing This is actually satisfied by a higher component, (see 5.2.6).
ATE_IND.1 Independent testing - conformance This is actually satisfied by a higher compo-
nent, (see 5.2.6).
AVA_VLA.1 Developer vulnerability analysis This is actually satisfied by a higher component,
(see 5.2.7).
7.5.61 Enforce data exchange confidentiality
O.Data_Exchange_Conf (see 4.1.61). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FCS_COP.1 Cryptographic operation (see 5.1.3).
7.5.62 Control user data exportation
O.Data_Export_Control (see 4.1.62). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FDP_ETC.1 Export of user data without security attributes (see 5.1.4).
FDP_ETC.2 Export of user data with security attributes (see 5.1.4).
7.5.63 Data import/export to/from system control
O.Data_Imp_Exp_Control (see 4.1.63). To achieve this Security Objective, the following Se-
curity Requirements shall be implemented by the TOE:
FDP_ETC.2 Export of user data with security attributes (see 5.1.4).
FDP_IFC.1 Subset information flow control (see 5.1.4).
FDP_IFF.1 Simple security attributes (see 5.1.4).
FDP_ITC.2 Import of user data with security attributes (see 5.1.4).
7.5.64 Sanitize data objects containing hidden or unused data
O.Export_Control (see 4.1.64). To achieve this Security Objective, the following Security Re-
quirements shall be implemented by the TOE:
FDP_ACC.1 Subset access control This is actually satisfied by a higher component, (see 5.1.4).
FDP_ETC.1 Export of user data without security attributes (see 5.1.4).
7.5.65 Label or mark information for external systems
O.External_Labels (see 4.1.65). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_ETC.2 Export of user data with security attributes (see 5.1.4).
FDP_ITC.2 Import of user data with security attributes (see 5.1.4).
7.5. SECURITY OBJECTIVES - SECURITY REQUIREMENTS RATIONALE 209
7.5.66 Preservation of secure state for failures in critical compo-
nents
O.Fail_Secure (see 4.1.66). To achieve this Security Objective, the following Security Require-
ments shall be implemented by the TOE:
FPT_FLS.1 Failure with preservation of secure state (see 5.1.7).
7.5.67 Periodically check integrity
O.General_Integ_Checks (see 4.1.67). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FDP_SDI.1 Stored data integrity monitoring This is actually satisfied by a higher component,
(see 5.1.4).
FPT_TST.1 TSF testing (see 5.1.7).
7.5.68 Guarantee the availability of audit storage space
O.Guarantee_Audit_Stg (see 4.1.68). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FAU_STG.2 Guarantees of audit data availability (see 5.1.1).
FAU_STG.3 Action in case of possible audit data loss This is actually satisfied by a higher
component, (see 5.1.1).
7.5.69 Limit sessions to outside users
O.Hack_Limit_Sessions (see 4.1.69). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
AGD_ADM.1 Administrator guidance (see 5.2.4).
FMT_MSA.1 Management of security attributes (see 5.1.6).
FTA_MCS.2 Per user attribute limitation on multiple concurrent sessions (see 5.1.9).
FTA_TSE.1 TOE session establishment (see 5.1.9).
7.5.70 Control hacker communication traffic
O.Hack_Traffic_Control (see 4.1.70). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FDP_IFC.1 Subset information flow control (see 5.1.4).
FDP_IFF.1 Simple security attributes (see 5.1.4).
7.5.71 Identify and authenticate a user to support accountability
O.I&A_Domain (see 4.1.71). To achieve this Security Objective, the following Security Re-
quirements shall be implemented by the TOE:
FIA_ATD.1 User attribute definition (see 5.1.5).
FIA_AFL.1 Authentication failure handling (see 5.1.5).
FIA_SOS.1 Verification of secrets (see 5.1.5).
FIA_SOS.2 TSF Generation of secrets (see 5.1.5).
FIA_UAU.2 User authentication before any action (see 5.1.5).
210 CHAPTER 7. RATIONALE
FIA_UAU.7 Protected authentication feedback (see 5.1.5).
FIA_UID.1 Timing of identification This is actually satisfied by a higher component, (see
5.1.5).
FIA_USB.1 User-subject binding (see 5.1.5).
FTA_TAB.1 Default TOE access banners (see 5.1.9).
7.5.72 Transaction identification and authentication
O.I&A_Transaction (see 4.1.72). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_DAU.1 Basic data authentication This is actually satisfied by a higher component, (see
5.1.4).
7.5.73 Identify and authenticate each user
O.I&A_User (see 4.1.73). To achieve this Security Objective, the following Security Require-
ments shall be implemented by the TOE:
FIA_UID.1 Timing of identification This is actually satisfied by a higher component, (see
5.1.5).
7.5.74 User-action identification and authentication
O.I&A_User_Action (see 4.1.74). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
AGD_ADM.1 Administrator guidance (see 5.2.4).
AGD_USR.1 User guidance (see 5.2.4).
FIA_UAU.2 User authentication before any action (see 5.1.5).
FIA_UID.2 User identification before any action (see 5.1.5).
FIA_USB.1 User-subject binding (see 5.1.5).
FMT_MOF.1 Management of security functions behaviour (see 5.1.6).
7.5.75 Identify unusual user activity
O.Identify_Unusual_Act (see 4.1.75). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FTA_TSE.1 TOE session establishment (see 5.1.9).
7.5.76 System enforced information flow
O.Info_Flow_Control (see 4.1.76). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_IFC.1 Subset information flow control (see 5.1.4).
FDP_IFF.1 Simple security attributes (see 5.1.4).
7.5. SECURITY OBJECTIVES - SECURITY REQUIREMENTS RATIONALE 211
7.5.77 Provide information flow control administration
O.Info_Flow_Ctrl_Admin (see 4.1.77). To achieve this Security Objective, the following Se-
curity Requirements shall be implemented by the TOE:
FDP_IFC.1 Subset information flow control (see 5.1.4).
FDP_IFF.1 Simple security attributes (see 5.1.4).
FMT_MOF.1 Management of security functions behaviour (see 5.1.6).
FMT_SMR.1 Security roles This is actually satisfied by a higher component, (see 5.1.6).
7.5.78 Require inspection for absence of malicious code.
O.Input_Inspection (see 4.1.78). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_ACC.1 Subset access control This is actually satisfied by a higher component, (see 5.1.4).
FDP_ACF.1 Security attribute based access control (see 5.1.4).
FDP_ITC.1 Import of user data without security attributes (see 5.1.4).
7.5.79 Data marking integrity export
O.Integ_Data_Mark_Exp (see 4.1.79). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FDP_ETC.2 Export of user data with security attributes (see 5.1.4).
7.5.80 Integrity of system data transferred externally
O.Integ_Sys_Data_Ext (see 4.1.80). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FPT_ITI.1 Inter-TSF detection of modification (see 5.1.7).
7.5.81 Integrity of system data transferred internally
O.Integ_Sys_Data_Int (see 4.1.81). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FPT_ITT.1 Basic internal TSF data transfer protection (see 5.1.7).
FPT_SSP.2 Mutual trusted acknowledgement (see 5.1.7).
7.5.82 Protect user data during internal transfer
O.Integ_User_Data_Int (see 4.1.82). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_ITT.2 Transmission separation by attribute (see 5.1.4).
7.5.83 Correct attribute exchange with another trusted product
O.Integrity_Attr_Exch (see 4.1.83). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FPT_TDC.1 Inter-TSF basic TSF data consistency (see 5.1.7).
212 CHAPTER 7. RATIONALE
7.5.84 Integrity protection for user data and software
O.Integrity_Data/SW (see 4.1.84). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_SDI.2 Stored data integrity monitoring and action (see 5.1.4).
7.5.85 Integrity of system data replication
O.Integrity_Data_Rep (see 4.1.85). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FPT_TRC.1 Internal TSF consistency (see 5.1.7).
7.5.86 Operational integrity system function testing
O.Integrity_Practice (see 4.1.86). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FPT_AMT.1 Abstract machine testing (see 5.1.7).
FPT_TST.1 TSF testing (see 5.1.7).
7.5.87 Isolate untrusted executables
O.Isolate_Executables (see 4.1.87). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_ACC.1 Subset access control This is actually satisfied by a higher component, (see 5.1.4).
FDP_ACF.1 Security attribute based access control (see 5.1.4).
FMT_MSA.3 Static attribute initialisation (see 5.1.6).
FPT_SEP.1 TSF domain separation This is actually satisfied by a higher component, (see 5.1.7).
7.5.88 Lifecycle security
O.Lifecycle_Security (see 4.1.88). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
ALC_DVS.1 Identification of security measures This is actually satisfied by a higher compo-
nent, (see 5.2.5).
ALC_FLR.1 Basic flaw remediation This is actually satisfied by a higher component, (see
5.2.5).
ALC_LCD.1 Developer defined life-cycle model This is actually satisfied by a higher compo-
nent, (see 5.2.5).
ALC_TAT.1 Well-defined development tools This is actually satisfied by a higher component,
(see 5.2.5).
7.5.89 Restrict actions before authentication
O.Limit_Actions_Auth (see 4.1.89). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FIA_UAU.2 User authentication before any action (see 5.1.5).
7.5. SECURITY OBJECTIVES - SECURITY REQUIREMENTS RATIONALE 213
7.5.90 Limit the number of user initiated communication sessions
O.Limit_Comm_Sessions (see 4.1.90). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FTA_MCS.2 Per user attribute limitation on multiple concurrent sessions (see 5.1.9).
FTA_TSE.1 TOE session establishment (see 5.1.9).
7.5.91 Limit multiple sessions
O.Limit_Mult_Sessions (see 4.1.91). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FTA_MCS.2 Per user attribute limitation on multiple concurrent sessions (see 5.1.9).
7.5.92 Maintain security domain
O.Maintain_Sec_Domain (see 4.1.92). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FPT_SEP.3 Complete reference monitor (see 5.1.7).
7.5.93 Controlled access by maintenance personnel
O.Maintenance_Access (see 4.1.93). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FMT_MOF.1 Management of security functions behaviour (see 5.1.6).
FMT_SMR.1 Security roles This is actually satisfied by a higher component, (see 5.1.6).
7.5.94 Expiration of maintenance privileges
O.Maintenance_Recover (see 4.1.94). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FMT_SAE.1 Time-limited authorisation (see 5.1.6).
7.5.95 Manage resource security attributes
O.Manage_Res_Sec_Attr (see 4.1.95). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
AGD_USR.1 User guidance (see 5.2.4).
FAU_GEN.1 Audit data generation (see 5.1.1).
FPT_STM.1 Reliable time stamps (see 5.1.7).
FMT_MSA.1 Management of security attributes (see 5.1.6).
7.5.96 Manage security-critical data to avoid storage space being
exceeded
O.Manage_TSF_Data (see 4.1.96). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FMT_MTD.2 Management of limits on TSF data (see 5.1.6).
214 CHAPTER 7. RATIONALE
7.5.97 Eliminate residual information
O.No_Residual_Info (see 4.1.97). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_RIP.2 Full residual information protection (see 5.1.4).
7.5.98 Non-repudiation support for sent information by the nonlo-
cal receiving TSF.
O.NonRepud_Assess_Sent (see 4.1.98). To achieve this Security Objective, the following Se-
curity Requirements shall be implemented by the TOE:
AGD_ADM.1 Administrator guidance (see 5.2.4).
AGD_USR.1 User guidance (see 5.2.4).
FCO_NRO.1 Selective proof of origin This is actually satisfied by a higher component, (see
5.1.2).
FMT_MOF.1 Management of security functions behaviour (see 5.1.6).
7.5.99 Non-repudiation support for sent information by the sender’s
TSF.
O.NonRepud_Gen_Sent (see 4.1.99). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
AGD_ADM.1 Administrator guidance (see 5.2.4).
FCO_NRO.2 Enforced proof of origin (see 5.1.2).
FMT_MOF.1 Management of security functions behaviour (see 5.1.6).
7.5.100 Non-repudiation for sent information, local users
O.NonRepud_Locals_Sent (see 4.1.100). To achieve this Security Objective, the following
Security Requirements shall be implemented by the TOE:
AGD_ADM.1 Administrator guidance (see 5.2.4).
AGD_USR.1 User guidance (see 5.2.4).
FCO_NRO.2 Enforced proof of origin (see 5.1.2).
FDP_ITT.1 Basic internal transfer protection This is actually satisfied by a higher component,
(see 5.1.4).
FMT_MOF.1 Management of security functions behaviour (see 5.1.6).
7.5.101 Non-repudiation for sent information
O.NonRepudiate_Sent (see 4.1.101). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FCO_NRO.2 Enforced proof of origin (see 5.1.2).
7.5. SECURITY OBJECTIVES - SECURITY REQUIREMENTS RATIONALE 215
7.5.102 Basic object attribute integrity
O.Obj_Attr_Integrity (see 4.1.102). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_ACC.1 Subset access control This is actually satisfied by a higher component, (see 5.1.4).
FDP_ACF.1 Security attribute based access control (see 5.1.4).
FMT_MSA.1 Management of security attributes (see 5.1.6).
FMT_MSA.2 Secure security attributes (see 5.1.6).
FMT_MSA.3 Static attribute initialisation (see 5.1.6).
FMT_SMR.1 Security roles This is actually satisfied by a higher component, (see 5.1.6).
7.5.103 Object domain protection
O.Obj_Protection (see 4.1.103). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_ACC.1 Subset access control This is actually satisfied by a higher component, (see 5.1.4).
FDP_ACF.1 Security attribute based access control (see 5.1.4).
FMT_MSA.3 Static attribute initialisation (see 5.1.6).
7.5.104 Provide priority of service
O.Priority_Of_Service (see 4.1.104). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FRU_PRS.2 Full priority of service (see 5.1.8).
7.5.105 Privileged-interface status
O.Prvlg_IF_Status (see 4.1.105). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FMT_MTD.1 Management of TSF data (see 5.1.6).
7.5.106 Identify message modification in messages received
O.Rcv_MsgMod_ID (see 4.1.106). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_UIT.1 Data exchange integrity (see 5.1.4).
7.5.107 Recovery from modification of received messages
O.Rcv_MsgMod_Rcvr (see 4.1.107). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_UIT.1 Data exchange integrity (see 5.1.4).
FDP_UIT.3 Destination data exchange recovery (see 5.1.4).
7.5.108 Provide reference monitor
O.Reference_Monitor (see 4.1.108). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FPT_RVM.1 Non-bypassability of the TSP (see 5.1.7).
216 CHAPTER 7. RATIONALE
7.5.109 Disable remote execution
O.Remote_Execution (see 4.1.109). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_ACC.1 Subset access control This is actually satisfied by a higher component, (see 5.1.4).
FDP_ACF.1 Security attribute based access control (see 5.1.4).
7.5.110 Resource quotas for users and services
O.Resource_Quotas (see 4.1.110). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FRU_RSA.2 Minimum and maximum quotas (see 5.1.8).
7.5.111 User screen locking
O.Screen_Lock (see 4.1.111). To achieve this Security Objective, the following Security Re-
quirements shall be implemented by the TOE:
FTA_SSL.1 TSF-initiated session locking (see 5.1.9).
FTA_SSL.2 User-initiated locking (see 5.1.9).
7.5.112 Security-relevant configuration management
O.Secure_Configuration (see 4.1.112). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
AGD_ADM.1 Administrator guidance (see 5.2.4).
FMT_MOF.1 Management of security functions behaviour (see 5.1.6).
FMT_MTD.1 Management of TSF data (see 5.1.6).
7.5.113 Protect and maintain secure system state
O.Secure_State (see 4.1.113). To achieve this Security Objective, the following Security Re-
quirements shall be implemented by the TOE:
FPT_FLS.1 Failure with preservation of secure state (see 5.1.7).
FPT_RCV.1 Manual recovery (see 5.1.7).
FPT_RCV.4 Function recovery (see 5.1.7).
7.5.114 Manage security attributes
O.Security_Attr_Mgt (see 4.1.114). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FMT_MSA.1 Management of security attributes (see 5.1.6).
FMT_MSA.2 Secure security attributes (see 5.1.6).
FMT_MSA.3 Static attribute initialisation (see 5.1.6).
7.5. SECURITY OBJECTIVES - SECURITY REQUIREMENTS RATIONALE 217
7.5.115 Manage security-critical data
O.Security_Data_Mgt (see 4.1.115). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FMT_MTD.1 Management of TSF data (see 5.1.6).
FMT_MTD.2 Management of limits on TSF data (see 5.1.6).
FMT_MTD.3 Secure TSF data (see 5.1.6).
7.5.116 Manage behavior of security functions
O.Security_Func_Mgt (see 4.1.116). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FMT_MOF.1 Management of security functions behaviour (see 5.1.6).
7.5.117 Security roles
O.Security_Roles (see 4.1.117). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FMT_SMR.2 Restrictions on security roles (see 5.1.6).
7.5.118 System terminates session for inactivity
O.Session_Termination (see 4.1.118). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FTA_SSL.3 TSF-initiated termination (see 5.1.9).
7.5.119 Identify message modification in messages sent
O.Snt_MsgMod_ID (see 4.1.119). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_UIT.1 Data exchange integrity (see 5.1.4).
7.5.120 Support recovery from modification of sent messages
O.Snt_MsgMod_Rcvr (see 4.1.120). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_UIT.1 Data exchange integrity (see 5.1.4).
FDP_UIT.3 Destination data exchange recovery (see 5.1.4).
7.5.121 Examine the source code for developer flaws
O.Source_Code_Exam (see 4.1.121). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
ADV_IMP.1 Subset of the implementation of the TSF This is actually satisfied by a higher
component, (see 5.2.3).
ADV_LLD.1 Descriptive low-level design (see 5.2.3).
ADV_RCR.1 Informal correspondence demonstration This is actually satisfied by a higher
component, (see 5.2.3).
218 CHAPTER 7. RATIONALE
7.5.122 Storage integrity
O.Storage_Integrity (see 4.1.122). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_SDI.1 Stored data integrity monitoring This is actually satisfied by a higher component,
(see 5.1.4).
7.5.123 System access banners
O.Sys_Access_Banners (see 4.1.123). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FTA_TAB.1 Default TOE access banners (see 5.1.9).
7.5.124 Validation of security function
O.Sys_Assur_HW/SW/FW (see 4.1.124). To achieve this Security Objective, the following
Security Requirements shall be implemented by the TOE:
ATE_FUN.1 Functional testing This is actually satisfied by a higher component, (see 5.2.6).
FPT_TST.1 TSF testing (see 5.1.7).
7.5.125 System backup procedures
O.Sys_Backup_Procs (see 4.1.125). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FPT_RCV.1 Manual recovery (see 5.1.7).
7.5.126 Frequent backups to prevent minimal loss
O.Sys_Backup_Restore (see 4.1.126). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FMT_MOF.1 Management of security functions behaviour (see 5.1.6).
FMT_MTD.1 Management of TSF data (see 5.1.6).
7.5.127 Sufficient backup storage and effective restoration
O.Sys_Backup_Storage (see 4.1.127). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FMT_MOF.1 Management of security functions behaviour (see 5.1.6).
FMT_MTD.1 Management of TSF data (see 5.1.6).
7.5.128 Protection of system security function
O.Sys_Self_Protection (see 4.1.128). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FPT_SEP.2 SFP domain separation This is actually satisfied by a higher component, (see 5.1.7).
7.5. SECURITY OBJECTIVES - SECURITY REQUIREMENTS RATIONALE 219
7.5.129 Limit administrator’s modification of security-critical code
or data
O.TSF_Mod_Limit (see 4.1.129). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FMT_MSA.2 Secure security attributes (see 5.1.6).
FMT_MTD.1 Management of TSF data (see 5.1.6).
FMT_MTD.2 Management of limits on TSF data (see 5.1.6).
FMT_MTD.3 Secure TSF data (see 5.1.6).
FMT_SMR.2 Restrictions on security roles (see 5.1.6).
7.5.130 Local detection of received security-critical data modified
in transit
O.TSF_Rcv_Err_ID_Loc (see 4.1.130). To achieve this Security Objective, the following Se-
curity Requirements shall be implemented by the TOE:
FPT_ITI.1 Inter-TSF detection of modification (see 5.1.7).
7.5.131 Remote detection of received security-critical data modi-
fied in transit
O.TSF_Rcv_Err_ID_Rem (see 4.1.131). To achieve this Security Objective, the following
Security Requirements shall be implemented by the TOE:
FPT_ITI.1 Inter-TSF detection of modification (see 5.1.7).
7.5.132 Local detection of sent security-critical data modified in
transit
O.TSF_Snd_Err_ID_Loc (see 4.1.132). To achieve this Security Objective, the following Se-
curity Requirements shall be implemented by the TOE:
FPT_ITI.1 Inter-TSF detection of modification (see 5.1.7).
7.5.133 Remote detection of sent security-critical data modified in
transit.
O.TSF_Snd_Err_ID_Rem (see 4.1.133). To achieve this Security Objective, the following
Security Requirements shall be implemented by the TOE:
FPT_ITI.1 Inter-TSF detection of modification (see 5.1.7).
7.5.134 Trusted distributed system recovery
O.Trusted_DS_Recov (see 4.1.134). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FPT_RCV.1 Manual recovery (see 5.1.7).
FPT_RCV.4 Function recovery (see 5.1.7).
220 CHAPTER 7. RATIONALE
7.5.135 Provide a trusted path
O.Trusted_Path (see 4.1.135). To achieve this Security Objective, the following Security Re-
quirements shall be implemented by the TOE:
FTP_TRP.1 Trusted path (see 5.1.10).
7.5.136 Trusted path and channel
O.Trusted_Path&Channel (see 4.1.136). To achieve this Security Objective, the following
Security Requirements shall be implemented by the TOE:
FTP_ITC.1 Inter-TSF trusted channel (see 5.1.10).
FTP_TRP.1 Trusted path (see 5.1.10).
7.5.137 Trusted recovery of security functionality
O.Trusted_Recovery (see 4.1.137). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FPT_RCV.1 Manual recovery (see 5.1.7).
7.5.138 Documentation of untrusted data recovery
O.Trusted_Recovery_Doc (see 4.1.138). To achieve this Security Objective, the following Se-
curity Requirements shall be implemented by the TOE:
AGD_ADM.1 Administrator guidance (see 5.2.4).
7.5.139 Maintain user attributes
O.User_Attributes (see 4.1.139). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FIA_ATD.1 User attribute definition (see 5.1.5).
FMT_MSA.1 Management of security attributes (see 5.1.6).
7.5.140 User authorization management
O.User_Auth_Management (see 4.1.140). To achieve this Security Objective, the following
Security Requirements shall be implemented by the TOE:
AGD_ADM.1 Administrator guidance (see 5.2.4).
AGD_USR.1 User guidance (see 5.2.4).
FMT_MSA.1 Management of security attributes (see 5.1.6).
FMT_REV.1 Revocation (see 5.1.6).
FMT_SAE.1 Time-limited authorisation (see 5.1.6).
7.5.141 Basic confidentiality-breach prevention
O.User_Conf_Prevention (see 4.1.141). To achieve this Security Objective, the following Se-
curity Requirements shall be implemented by the TOE:
FDP_ACC.1 Subset access control This is actually satisfied by a higher component, (see 5.1.4).
FDP_ACF.1 Security attribute based access control (see 5.1.4).
7.6. SECURITY REQUIREMENTS DEPENDENCY ANALYSIS 221
FDP_ETC.1 Export of user data without security attributes (see 5.1.4).
FDP_IFC.1 Subset information flow control (see 5.1.4).
FDP_IFF.1 Simple security attributes (see 5.1.4).
7.5.142 Protection of user-session data
O.User_Data_Dial-in (see 4.1.142). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_IFC.1 Subset information flow control (see 5.1.4).
FTA_TSE.1 TOE session establishment (see 5.1.9).
7.5.143 Integrity protection of stored user data
O.User_Data_Integrity (see 4.1.143). To achieve this Security Objective, the following Secu-
rity Requirements shall be implemented by the TOE:
FDP_SDI.1 Stored data integrity monitoring This is actually satisfied by a higher component,
(see 5.1.4).
7.5.144 Protection of transmitted user data
O.User_Data_Transfer (see 4.1.144). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_ITT.1 Basic internal transfer protection This is actually satisfied by a higher component,
(see 5.1.4).
7.5.145 User-defined access control
O.User_Defined_AC (see 4.1.145). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
FDP_ACC.2 Complete access control (see 5.1.4).
FDP_ACF.1 Security attribute based access control (see 5.1.4).
7.5.146 User guidance documentation
O.User_Guidance (see 4.1.146). To achieve this Security Objective, the following Security
Requirements shall be implemented by the TOE:
AGD_USR.1 User guidance (see 5.2.4).
7.6 Security Requirements Dependency Analysis
Security Requirements, both of functional and assurance nature, have some implicit dependen-
cies that must be preserved and followed if they are to be used at their full utility. This section
presents an analysis of the selected Security Requirements, and their dependencies as defined in
[CC].
7.6.1 ACM_AUT.2 - Complete CM automation
ACM_AUT.2 depends on:
• ACM_CAP.3 (satisfied by ACM_CAP.4 (see 5.2.1))
222 CHAPTER 7. RATIONALE
7.6.2 ACM_CAP.4 - Generation support and acceptance procedures
ACM_CAP.4 depends on:
• ACM_SCP.1 (satisfied by ACM_SCP.3 (see 5.2.1)) AND
• ALC_DVS.1 (satisfied by ALC_DVS.2 (see 5.2.5))
7.6.3 ACM_SCP.3 - Development tools CM coverage
ACM_SCP.3 depends on:
• ACM_CAP.3 (satisfied by ACM_CAP.4 (see 5.2.1))
7.6.4 ADO_DEL.2 - Detection of modification
ADO_DEL.2 depends on:
• ACM_CAP.3 (satisfied by ACM_CAP.4 (see 5.2.1))
7.6.5 ADO_IGS.1 - Installation, generation, and start-up proce-
dures
ADO_IGS.1 depends on:
• AGD_ADM.1 (satisfied by AGD_ADM.1 (see 5.2.4))
7.6.6 ADV_FSP.3 - Semiformal functional specification
ADV_FSP.3 depends on:
• ADV_RCR.1 (satisfied by ADV_RCR.2 (see 5.2.3))
7.6.7 ADV_HLD.3 - Semiformal high-level design
ADV_HLD.3 depends on:
• ADV_FSP.3 (satisfied by ADV_FSP.3 (see 5.2.3)) AND
• ADV_RCR.2 (satisfied by ADV_RCR.2 (see 5.2.3))
7.6.8 ADV_IMP.3 - Structured implementation of the TSF
ADV_IMP.3 depends on:
• ADV_INT.1 (satisfied by ADV_INT.3 (see 5.2.3)) AND
• ADV_LLD.1 (satisfied by ADV_LLD.1 (see 5.2.3)) AND
• ADV_RCR.1 (satisfied by ADV_RCR.2 (see 5.2.3)) AND
• ALC_TAT.1 (satisfied by ALC_TAT.2 (see 5.2.5))
7.6.9 ADV_INT.3 - Minimisation of complexity
ADV_INT.3 depends on:
• ADV_IMP.2 (satisfied by ADV_IMP.3 (see 5.2.3)) AND
• ADV_LLD.1 (satisfied by ADV_LLD.1 (see 5.2.3))
7.6. SECURITY REQUIREMENTS DEPENDENCY ANALYSIS 223
7.6.10 ADV_LLD.1 - Descriptive low-level design
ADV_LLD.1 depends on:
• ADV_HLD.2 (satisfied by ADV_HLD.3 (see 5.2.3)) AND
• ADV_RCR.1 (satisfied by ADV_RCR.2 (see 5.2.3))
7.6.11 ADV_RCR.2 - Semiformal correspondence demonstration
No dependencies defined.
7.6.12 ADV_SPM.2 - Semiformal TOE security policy model
ADV_SPM.2 depends on:
• ADV_FSP.1 (satisfied by ADV_FSP.3 (see 5.2.3))
7.6.13 AGD_ADM.1 - Administrator guidance
AGD_ADM.1 depends on:
• ADV_FSP.1 (satisfied by ADV_FSP.3 (see 5.2.3))
7.6.14 AGD_USR.1 - User guidance
AGD_USR.1 depends on:
• ADV_FSP.1 (satisfied by ADV_FSP.3 (see 5.2.3))
7.6.15 ALC_DVS.2 - Sufficiency of security measures
No dependencies defined.
7.6.16 ALC_FLR.3 - Systematic flaw remediation
No dependencies defined.
7.6.17 ALC_LCD.3 - Measurable life-cycle model
No dependencies defined.
7.6.18 ALC_TAT.2 - Compliance with implementation standards
ALC_TAT.2 depends on:
• ADV_IMP.1 (satisfied by ADV_IMP.3 (see 5.2.3))
7.6.19 ATE_COV.2 - Analysis of coverage
ATE_COV.2 depends on:
• ADV_FSP.1 (satisfied by ADV_FSP.3 (see 5.2.3)) AND
• ATE_FUN.1 (satisfied by ATE_FUN.2 (see 5.2.6))
224 CHAPTER 7. RATIONALE
7.6.20 ATE_DPT.3 - Testing: implementation representation
ATE_DPT.3 depends on:
• ADV_HLD.2 (satisfied by ADV_HLD.3 (see 5.2.3)) AND
• ADV_IMP.2 (satisfied by ADV_IMP.3 (see 5.2.3)) AND
• ADV_LLD.1 (satisfied by ADV_LLD.1 (see 5.2.3)) AND
• ATE_FUN.1 (satisfied by ATE_FUN.2 (see 5.2.6))
7.6.21 ATE_FUN.2 - Ordered functional testing
No dependencies defined.
7.6.22 ATE_IND.2 - Independent testing - sample
ATE_IND.2 depends on:
• ADV_FSP.1 (satisfied by ADV_FSP.3 (see 5.2.3)) AND
• AGD_ADM.1 (satisfied by AGD_ADM.1 (see 5.2.4)) AND
• AGD_USR.1 (satisfied by AGD_USR.1 (see 5.2.4)) AND
• ATE_FUN.1 (satisfied by ATE_FUN.2 (see 5.2.6))
7.6.23 AVA_CCA.1 - Covert channel analysis
AVA_CCA.1 depends on:
• ADV_FSP.2 (satisfied by ADV_FSP.3 (see 5.2.3)) AND
• ADV_IMP.2 (satisfied by ADV_IMP.3 (see 5.2.3)) AND
• AGD_ADM.1 (satisfied by AGD_ADM.1 (see 5.2.4)) AND
• AGD_USR.1 (satisfied by AGD_USR.1 (see 5.2.4))
7.6.24 AVA_MSU.2 - Validation of analysis
AVA_MSU.2 depends on:
• ADO_IGS.1 (satisfied by ADO_IGS.1 (see 5.2.2)) AND
• ADV_FSP.1 (satisfied by ADV_FSP.3 (see 5.2.3)) AND
• AGD_ADM.1 (satisfied by AGD_ADM.1 (see 5.2.4)) AND
• AGD_USR.1 (satisfied by AGD_USR.1 (see 5.2.4))
7.6.25 AVA_SOF.1 - Strength of TOE security function evaluation
AVA_SOF.1 depends on:
• ADV_FSP.1 (satisfied by ADV_FSP.3 (see 5.2.3)) AND
• ADV_HLD.1 (satisfied by ADV_HLD.3 (see 5.2.3))
7.6. SECURITY REQUIREMENTS DEPENDENCY ANALYSIS 225
7.6.26 AVA_VLA.2 - Independent vulnerability analysis
AVA_VLA.2 depends on:
• ADV_FSP.1 (satisfied by ADV_FSP.3 (see 5.2.3)) AND
• ADV_HLD.2 (satisfied by ADV_HLD.3 (see 5.2.3)) AND
• ADV_IMP.1 (satisfied by ADV_IMP.3 (see 5.2.3)) AND
• ADV_LLD.1 (satisfied by ADV_LLD.1 (see 5.2.3)) AND
• AGD_ADM.1 (satisfied by AGD_ADM.1 (see 5.2.4)) AND
• AGD_USR.1 (satisfied by AGD_USR.1 (see 5.2.4))
7.6.27 FAU_GEN.1 - Audit data generation
FAU_GEN.1 depends on:
• FPT_STM.1 (satisfied by FPT_STM.1 (see 5.1.7))
7.6.28 FAU_GEN.2 - User identity association
FAU_GEN.2 depends on:
• FAU_GEN.1 (satisfied by FAU_GEN.1 (see 5.1.1)) AND
• FIA_UID.1 (satisfied by FIA_UID.2 (see 5.1.5))
7.6.29 FAU_SAR.1 - Audit review
FAU_SAR.1 depends on:
• FAU_GEN.1 (satisfied by FAU_GEN.1 (see 5.1.1))
7.6.30 FAU_SAR.3 - Selectable audit review
FAU_SAR.3 depends on:
• FAU_SAR.1 (satisfied by FAU_SAR.1 (see 5.1.1))
7.6.31 FAU_SEL.1 - Selective audit
FAU_SEL.1 depends on:
• FAU_GEN.1 (satisfied by FAU_GEN.1 (see 5.1.1)) AND
• FMT_MTD.1 (satisfied by FMT_MTD.1 (see 5.1.6))
7.6.32 FAU_STG.2 - Guarantees of audit data availability
FAU_STG.2 depends on:
• FAU_GEN.1 (satisfied by FAU_GEN.1 (see 5.1.1))
7.6.33 FAU_STG.4 - Prevention of audit data loss
FAU_STG.4 depends on:
• FAU_STG.1 (satisfied by FAU_STG.2 (see 5.1.1))
226 CHAPTER 7. RATIONALE
7.6.34 FCO_NRO.2 - Enforced proof of origin
FCO_NRO.2 depends on:
• FIA_UID.1 (satisfied by FIA_UID.2 (see 5.1.5))
7.6.35 FCS_CKM.1 - Cryptographic key generation
FCS_CKM.1 depends on:
• FCS_CKM.2 (satisfied by FCS_CKM.2 (see 5.1.3)) OR FCS_COP.1 (satisfied by FCS_COP.1
(see 5.1.3)) AND
• FCS_CKM.4 (satisfied by FCS_CKM.4 (see 5.1.3)) AND
• FMT_MSA.2 (satisfied by FMT_MSA.2 (see 5.1.6))
7.6.36 FCS_CKM.2 - Cryptographic key distribution
FCS_CKM.2 depends on:
• FDP_ITC.1 (satisfied by FDP_ITC.1 (see 5.1.4)) OR FCS_CKM.1 (satisfied by FCS_CKM.1
(see 5.1.3)) AND
• FCS_CKM.4 (satisfied by FCS_CKM.4 (see 5.1.3)) AND
• FMT_MSA.2 (satisfied by FMT_MSA.2 (see 5.1.6))
7.6.37 FCS_CKM.3 - Cryptographic key access
FCS_CKM.3 depends on:
• FDP_ITC.1 (satisfied by FDP_ITC.1 (see 5.1.4)) OR FCS_CKM.1 (satisfied by FCS_CKM.1
(see 5.1.3)) AND
• FCS_CKM.4 (satisfied by FCS_CKM.4 (see 5.1.3)) AND
• FMT_MSA.2 (satisfied by FMT_MSA.2 (see 5.1.6))
7.6.38 FCS_CKM.4 - Cryptographic key destruction
FCS_CKM.4 depends on:
• FDP_ITC.1 (satisfied by FDP_ITC.1 (see 5.1.4)) OR FCS_CKM.1 (satisfied by FCS_CKM.1
(see 5.1.3)) AND
• FMT_MSA.2 (satisfied by FMT_MSA.2 (see 5.1.6))
7.6.39 FCS_COP.1 - Cryptographic operation
FCS_COP.1 depends on:
• FDP_ITC.1 (satisfied by FDP_ITC.1 (see 5.1.4)) OR FCS_CKM.1 (satisfied by FCS_CKM.1
(see 5.1.3)) AND
• FCS_CKM.4 (satisfied by FCS_CKM.4 (see 5.1.3)) AND
• FMT_MSA.2 (satisfied by FMT_MSA.2 (see 5.1.6))
7.6.40 FDP_ACC.2 - Complete access control
FDP_ACC.2 depends on:
• FDP_ACF.1 (satisfied by FDP_ACF.1 (see 5.1.4))
7.6. SECURITY REQUIREMENTS DEPENDENCY ANALYSIS 227
7.6.41 FDP_ACF.1 - Security attribute based access control
FDP_ACF.1 depends on:
• FDP_ACC.1 (satisfied by FDP_ACC.2 (see 5.1.4)) AND
• FMT_MSA.3 (satisfied by FMT_MSA.3 (see 5.1.6))
7.6.42 FDP_DAU.2 - Data authentication with identity of guaran-
tor
FDP_DAU.2 depends on:
• FIA_UID.1 (satisfied by FIA_UID.2 (see 5.1.5))
7.6.43 FDP_ETC.1 - Export of user data without security attributes
FDP_ETC.1 depends on:
• FDP_ACC.1 (satisfied by FDP_ACC.2 (see 5.1.4)) OR FDP_IFC.1 (satisfied by FDP_IFC.1
(see 5.1.4))
7.6.44 FDP_ETC.2 - Export of user data with security attributes
FDP_ETC.2 depends on:
• FDP_ACC.1 (satisfied by FDP_ACC.2 (see 5.1.4)) OR FDP_IFC.1 (satisfied by FDP_IFC.1
(see 5.1.4))
7.6.45 FDP_IFC.1 - Subset information flow control
FDP_IFC.1 depends on:
• FDP_IFF.1 (satisfied by FDP_IFF.1 (see 5.1.4))
7.6.46 FDP_IFF.1 - Simple security attributes
FDP_IFF.1 depends on:
• FDP_IFC.1 (satisfied by FDP_IFC.1 (see 5.1.4)) AND
• FMT_MSA.3 (satisfied by FMT_MSA.3 (see 5.1.6))
7.6.47 FDP_IFF.3 - Limited illicit information flows
FDP_IFF.3 depends on:
• AVA_CCA.1 (satisfied by AVA_CCA.1 (see 5.2.7)) AND
• FDP_IFC.1 (satisfied by FDP_IFC.1 (see 5.1.4))
7.6.48 FDP_ITC.1 - Import of user data without security attributes
FDP_ITC.1 depends on:
• FDP_ACC.1 (satisfied by FDP_ACC.2 (see 5.1.4)) OR FDP_IFC.1 (satisfied by FDP_IFC.1
(see 5.1.4)) AND
• FMT_MSA.3 (satisfied by FMT_MSA.3 (see 5.1.6))
228 CHAPTER 7. RATIONALE
7.6.49 FDP_ITC.2 - Import of user data with security attributes
FDP_ITC.2 depends on:
• FDP_ACC.1 (satisfied by FDP_ACC.2 (see 5.1.4)) OR FDP_IFC.1 (satisfied by FDP_IFC.1
(see 5.1.4)) AND
• FTP_ITC.1 (satisfied by FTP_ITC.1 (see 5.1.10)) OR FTP_TRP.1 (satisfied by FTP_TRP.1
(see 5.1.10)) AND
• FPT_TDC.1 (satisfied by FPT_TDC.1 (see 5.1.7))
7.6.50 FDP_ITT.2 - Transmission separation by attribute
FDP_ITT.2 depends on:
• FDP_ACC.1 (satisfied by FDP_ACC.2 (see 5.1.4)) OR FDP_IFC.1 (satisfied by FDP_IFC.1
(see 5.1.4))
7.6.51 FDP_RIP.2 - Full residual information protection
No dependencies defined.
7.6.52 FDP_SDI.2 - Stored data integrity monitoring and action
No dependencies defined.
7.6.53 FDP_UIT.1 - Data exchange integrity
FDP_UIT.1 depends on:
• FDP_ACC.1 (satisfied by FDP_ACC.2 (see 5.1.4)) OR FDP_IFC.1 (satisfied by FDP_IFC.1
(see 5.1.4)) AND
• FTP_ITC.1 (satisfied by FTP_ITC.1 (see 5.1.10)) OR FTP_TRP.1 (satisfied by FTP_TRP.1
(see 5.1.10))
7.6.54 FDP_UIT.3 - Destination data exchange recovery
FDP_UIT.3 depends on:
• FDP_ACC.1 (satisfied by FDP_ACC.2 (see 5.1.4)) OR FDP_IFC.1 (satisfied by FDP_IFC.1
(see 5.1.4)) AND
• FDP_UIT.1 (satisfied by FDP_UIT.1 (see 5.1.4)) AND
• FTP_ITC.1 (satisfied by FTP_ITC.1 (see 5.1.10))
7.6.55 FIA_AFL.1 - Authentication failure handling
FIA_AFL.1 depends on:
• FIA_UAU.1 (satisfied by FIA_UAU.2 (see 5.1.5))
7.6.56 FIA_ATD.1 - User attribute definition
No dependencies defined.
7.6.57 FIA_SOS.1 - Verification of secrets
No dependencies defined.
7.6. SECURITY REQUIREMENTS DEPENDENCY ANALYSIS 229
7.6.58 FIA_SOS.2 - TSF Generation of secrets
No dependencies defined.
7.6.59 FIA_UAU.2 - User authentication before any action
FIA_UAU.2 depends on:
• FIA_UID.1 (satisfied by FIA_UID.2 (see 5.1.5))
7.6.60 FIA_UAU.6 - Re-authenticating
No dependencies defined.
7.6.61 FIA_UAU.7 - Protected authentication feedback
FIA_UAU.7 depends on:
• FIA_UID.1 (satisfied by FIA_UID.2 (see 5.1.5))
7.6.62 FIA_UID.2 - User identification before any action
No dependencies defined.
7.6.63 FIA_USB.1 - User-subject binding
FIA_USB.1 depends on:
• FIA_ATD.1 (satisfied by FIA_ATD.1 (see 5.1.5))
7.6.64 FMT_MOF.1 - Management of security functions behaviour
FMT_MOF.1 depends on:
• FMT_SMR.1 (satisfied by FMT_SMR.2 (see 5.1.6))
7.6.65 FMT_MSA.1 - Management of security attributes
FMT_MSA.1 depends on:
• FDP_ACC.1 (satisfied by FDP_ACC.2 (see 5.1.4)) OR FDP_IFC.1 (satisfied by FDP_IFC.1
(see 5.1.4)) AND
• FMT_SMR.1 (satisfied by FMT_SMR.2 (see 5.1.6))
7.6.66 FMT_MSA.2 - Secure security attributes
FMT_MSA.2 depends on:
• ADV_SPM.1 (satisfied by ADV_SPM.2 (see 5.2.3)) AND
• FDP_ACC.1 (satisfied by FDP_ACC.2 (see 5.1.4)) OR FDP_IFC.1 (satisfied by FDP_IFC.1
(see 5.1.4)) AND
• FMT_MSA.1 (satisfied by FMT_MSA.1 (see 5.1.6)) AND
• FMT_SMR.1 (satisfied by FMT_SMR.2 (see 5.1.6))
230 CHAPTER 7. RATIONALE
7.6.67 FMT_MSA.3 - Static attribute initialisation
FMT_MSA.3 depends on:
• FMT_MSA.1 (satisfied by FMT_MSA.1 (see 5.1.6)) AND
• FMT_SMR.1 (satisfied by FMT_SMR.2 (see 5.1.6))
7.6.68 FMT_MTD.1 - Management of TSF data
FMT_MTD.1 depends on:
• FMT_SMR.1 (satisfied by FMT_SMR.2 (see 5.1.6))
7.6.69 FMT_MTD.2 - Management of limits on TSF data
FMT_MTD.2 depends on:
• FMT_MTD.1 (satisfied by FMT_MTD.1 (see 5.1.6)) AND
• FMT_SMR.1 (satisfied by FMT_SMR.2 (see 5.1.6))
7.6.70 FMT_MTD.3 - Secure TSF data
FMT_MTD.3 depends on:
• ADV_SPM.1 (satisfied by ADV_SPM.2 (see 5.2.3)) AND
• FMT_MTD.1 (satisfied by FMT_MTD.1 (see 5.1.6))
7.6.71 FMT_REV.1 - Revocation
FMT_REV.1 depends on:
• FMT_SMR.1 (satisfied by FMT_SMR.2 (see 5.1.6))
7.6.72 FMT_SAE.1 - Time-limited authorisation
FMT_SAE.1 depends on:
• FMT_SMR.1 (satisfied by FMT_SMR.2 (see 5.1.6)) AND
• FPT_STM.1 (satisfied by FPT_STM.1 (see 5.1.7))
7.6.73 FMT_SMR.2 - Restrictions on security roles
FMT_SMR.2 depends on:
• FIA_UID.1 (satisfied by FIA_UID.2 (see 5.1.5))
7.6.74 FPT_AMT.1 - Abstract machine testing
No dependencies defined.
7.6.75 FPT_FLS.1 - Failure with preservation of secure state
FPT_FLS.1 depends on:
• ADV_SPM.1 (satisfied by ADV_SPM.2 (see 5.2.3))
7.6.76 FPT_ITI.1 - Inter-TSF detection of modification
No dependencies defined.
7.6. SECURITY REQUIREMENTS DEPENDENCY ANALYSIS 231
7.6.77 FPT_ITT.1 - Basic internal TSF data transfer protection
No dependencies defined.
7.6.78 FPT_RCV.1 - Manual recovery
FPT_RCV.1 depends on:
• FPT_TST.1 (satisfied by FPT_TST.1 (see 5.1.7)) AND
• AGD_ADM.1 (satisfied by AGD_ADM.1 (see 5.2.4)) AND
• ADV_SPM.1 (satisfied by ADV_SPM.2 (see 5.2.3))
7.6.79 FPT_RCV.4 - Function recovery
FPT_RCV.4 depends on:
• ADV_SPM.1 (satisfied by ADV_SPM.2 (see 5.2.3))
7.6.80 FPT_RVM.1 - Non-bypassability of the TSP
No dependencies defined.
7.6.81 FPT_SEP.3 - Complete reference monitor
No dependencies defined.
7.6.82 FPT_SSP.2 - Mutual trusted acknowledgement
FPT_SSP.2 depends on:
• FPT_ITT.1 (satisfied by FPT_ITT.1 (see 5.1.7))
7.6.83 FPT_STM.1 - Reliable time stamps
No dependencies defined.
7.6.84 FPT_TDC.1 - Inter-TSF basic TSF data consistency
No dependencies defined.
7.6.85 FPT_TRC.1 - Internal TSF consistency
FPT_TRC.1 depends on:
• FPT_ITT.1 (satisfied by FPT_ITT.1 (see 5.1.7))
7.6.86 FPT_TST.1 - TSF testing
FPT_TST.1 depends on:
• FPT_AMT.1 (satisfied by FPT_AMT.1 (see 5.1.7))
7.6.87 FRU_PRS.2 - Full priority of service
No dependencies defined.
232 CHAPTER 7. RATIONALE
7.6.88 FRU_RSA.2 - Minimum and maximum quotas
No dependencies defined.
7.6.89 FTA_MCS.2 - Per user attribute limitation on multiple con-
current sessions
FTA_MCS.2 depends on:
• FIA_UID.1 (satisfied by FIA_UID.2 (see 5.1.5))
7.6.90 FTA_SSL.1 - TSF-initiated session locking
FTA_SSL.1 depends on:
• FIA_UAU.1 (satisfied by FIA_UAU.2 (see 5.1.5))
7.6.91 FTA_SSL.2 - User-initiated locking
FTA_SSL.2 depends on:
• FIA_UAU.1 (satisfied by FIA_UAU.2 (see 5.1.5))
7.6.92 FTA_SSL.3 - TSF-initiated termination
No dependencies defined.
7.6.93 FTA_TAB.1 - Default TOE access banners
No dependencies defined.
7.6.94 FTA_TAH.1 - TOE access history
No dependencies defined.
7.6.95 FTA_TSE.1 - TOE session establishment
No dependencies defined.
7.6.96 FTP_ITC.1 - Inter-TSF trusted channel
No dependencies defined.
7.6.97 FTP_TRP.1 - Trusted path
No dependencies defined.
Index
ACM
security requirement class
definition, 114
ACM_AUT
security requirement family
definition, 114
ACM_AUT.2
security requirement
definition, 115
mapping to security objective, 200
ACM_CAP
security requirement family
definition, 115
ACM_CAP.3
security requirement
referenced in dependency, 221, 222
ACM_CAP.4
security requirement
definition, 115
mapping to security objective, 200
ACM_SCP
security requirement family
definition, 116
ACM_SCP.1
security requirement
referenced in dependency, 222
ACM_SCP.3
security requirement
definition, 116
mapping to security objective, 200
ADO
security requirement class
definition, 117
ADO_DEL
security requirement family
definition, 117
ADO_DEL.2
security requirement
definition, 117
mapping to security objective, 200
ADO_IGS
security requirement family
definition, 117
ADO_IGS.1
security requirement
definition, 117
mapping to security objective, 200
referenced in dependency, 224
ADV
security requirement class
definition, 117
ADV_FSP
security requirement family
definition, 118
ADV_FSP.1
security requirement
mapping to security objective, 206,
207
referenced in dependency, 223–225
ADV_FSP.2
security requirement
referenced in dependency, 224
ADV_FSP.3
security requirement
definition, 118
mapping to security objective, 200
referenced in dependency, 222
ADV_HLD
security requirement family
definition, 120
ADV_HLD.1
security requirement
mapping to security objective, 207
referenced in dependency, 224
ADV_HLD.2
security requirement
mapping to security objective, 206
referenced in dependency, 223–225
ADV_HLD.3
security requirement
definition, 120
mapping to security objective, 201
ADV_IMP
security requirement family
definition, 121
ADV_IMP.1
security requirement
mapping to security objective, 217
233
234 INDEX
referenced in dependency, 223, 225
ADV_IMP.2
security requirement
referenced in dependency, 222, 224
ADV_IMP.3
security requirement
definition, 121
mapping to security objective, 201
ADV_INT
security requirement family
definition, 121
ADV_INT.1
security requirement
mapping to security objective, 206,
207
referenced in dependency, 222
ADV_INT.3
security requirement
definition, 121
mapping to security objective, 201
ADV_LLD
security requirement family
definition, 122
ADV_LLD.1
security requirement
definition, 122
mapping to security objective, 201,
206, 207, 217
referenced in dependency, 222, 224,
225
ADV_RCR
security requirement family
definition, 123
ADV_RCR.1
security requirement
mapping to security objective, 206,
217
referenced in dependency, 222, 223
ADV_RCR.2
security requirement
definition, 123
mapping to security objective, 201
referenced in dependency, 222
ADV_SPM
security requirement family
definition, 123
ADV_SPM.1
security requirement
mapping to security objective, 201,
206, 207
referenced in dependency, 229–231
ADV_SPM.2
security requirement
definition, 123
AGD
security requirement class
definition, 123
AGD_ADM
security requirement family
definition, 124
AGD_ADM.1
security requirement
definition, 124
mapping to security objective, 200,
201, 204, 206, 209, 210, 214,
216, 220
referenced in dependency, 222, 224,
225, 231
AGD_USR
security requirement family
definition, 124
AGD_USR.1
security requirement
definition, 124
mapping to security objective, 201,
206, 210, 213, 214, 220, 221
referenced in dependency, 224, 225
ALC
security requirement class
definition, 125
ALC_DVS
security requirement family
definition, 125
ALC_DVS.1
security requirement
mapping to security objective, 212
referenced in dependency, 222
ALC_DVS.2
security requirement
definition, 125
mapping to security objective, 202
ALC_FLR
security requirement family
definition, 125
ALC_FLR.1
security requirement
mapping to security objective, 212
ALC_FLR.3
security requirement
definition, 125
mapping to security objective, 200,
202
ALC_LCD
security requirement family
definition, 126
ALC_LCD.1
security requirement
mapping to security objective, 212
INDEX 235
ALC_LCD.3
security requirement
definition, 126
mapping to security objective, 202
ALC_TAT
security requirement family
definition, 127
ALC_TAT.1
security requirement
mapping to security objective, 212
referenced in dependency, 222
ALC_TAT.2
security requirement
definition, 127
mapping to security objective, 202,
206
AP.Availability
assumption
definition, 9
AP.Information_AC
assumption
definition, 10
AP.Integrity
assumption
definition, 10
AP.Physical_Control
assumption
definition, 10
AT.Admin
assumption
definition, 5
AT.Hacker
assumption
definition, 7
AT.Physical_Environment
assumption
definition, 8
AT.System_HW_SW
assumption
definition, 8
AT.User
assumption
definition, 8
ATE
security requirement class
definition, 127
ATE_COV
security requirement family
definition, 127
ATE_COV.1
security requirement
mapping to security objective, 208
ATE_COV.2
security requirement
definition, 127
mapping to security objective, 202
ATE_DPT
security requirement family
definition, 128
ATE_DPT.2
security requirement
mapping to security objective, 208
ATE_DPT.3
security requirement
definition, 128
mapping to security objective, 202
ATE_FUN
security requirement family
definition, 128
ATE_FUN.1
security requirement
mapping to security objective, 208,
218
referenced in dependency, 223, 224
ATE_FUN.2
security requirement
definition, 129
mapping to security objective, 202
ATE_IND
security requirement family
definition, 129
ATE_IND.1
security requirement
mapping to security objective, 208
ATE_IND.2
security requirement
definition, 129
mapping to security objective, 202
AVA
security requirement class
definition, 130
AVA_CCA
security requirement family
definition, 130
AVA_CCA.1
security requirement
definition, 130
mapping to security objective, 203
referenced in dependency, 227
AVA_MSU
security requirement family
definition, 130
AVA_MSU.2
security requirement
definition, 130
mapping to security objective, 203
AVA_SOF
security requirement family
236 INDEX
definition, 131
AVA_SOF.1
security requirement
definition, 131
mapping to security objective, 203
AVA_VLA
security requirement family
definition, 131
AVA_VLA.1
security requirement
mapping to security objective, 206,
208
AVA_VLA.2
security requirement
definition, 132
mapping to security objective, 203
DA.Adm_Err_Crypto
detailed attack
definition, 17
mapping to security objectives, 149
mapping to threat, 136, 137
DA.Adm_Hstl_Audit_Dstr
detailed attack
definition, 17
mapping to security objectives, 149
mapping to threat, 137
DA.Adm_Hstl_Mod_Data_AC
detailed attack
definition, 18
mapping to security objectives, 150
mapping to threat, 137
DA.Adm_Hstl_Mod_DataAps
detailed attack
definition, 17
mapping to security objectives, 149
mapping to threat, 138
DA.Adm_Hstl_Mod_IFC
detailed attack
definition, 18
mapping to security objectives, 150
mapping to threat, 138
DA.Adm_Hstl_Mod_SEP
detailed attack
definition, 19
mapping to security objectives, 151
mapping to threat, 138
DA.Adm_Hstl_Mod_TSFCode
detailed attack
definition, 19
mapping to security objectives, 151
mapping to threat, 138
DA.Adm_Hstl_Mod_USB
detailed attack
definition, 20
mapping to security objectives, 152
mapping to threat, 138
DA.Adm_Hstl_Mod_UsrAttr
detailed attack
definition, 20
mapping to security objectives, 152
mapping to threat, 138
DA.Adm_Misconfig_User
detailed attack
definition, 20
mapping to security objectives, 152
mapping to threat, 137
DA.Admin_Err_AC_Policy
detailed attack
definition, 21
mapping to security objectives, 152
mapping to threat, 136
DA.Admin_Err_Audit
detailed attack
definition, 21
mapping to security objectives, 153
mapping to threat, 136
DA.Admin_Err_Authentic
detailed attack
definition, 21
mapping to security objectives, 153
mapping to threat, 136
DA.Admin_Err_Info
detailed attack
definition, 22
mapping to security objectives, 154
mapping to threat, 136
DA.Admin_Err_Omit_Trap
detailed attack
definition, 22
mapping to security objectives, 154
mapping to threat, 137
DA.Admin_Err_Resource
detailed attack
definition, 22
mapping to security objectives, 154
mapping to threat, 137
DA.Admin_Err_Sys_Entry
detailed attack
definition, 23
mapping to security objectives, 155
mapping to threat, 137
DA.Admin_Err_Update
detailed attack
definition, 23
mapping to security objectives, 155
mapping to threat, 137
DA.Admin_Err_User_Attr
INDEX 237
detailed attack
definition, 23
mapping to security objectives, 155
mapping to threat, 137
DA.Admin_UserPriv_Agg
detailed attack
assumption by the environment, 5
definition, 44
mapping to security objectives, 156
mapping to threat, 143
DA.Admin_UserPriv_Col
detailed attack
assumption by the environment, 6
definition, 45
mapping to security objectives, 156
mapping to threat, 143
DA.Admin_UserPriv_Gen
detailed attack
assumption by the environment, 6
definition, 45
mapping to security objectives, 156
mapping to threat, 143
DA.Dev_FC_Attr_Interp
detailed attack
definition, 24
mapping to security objectives, 156
mapping to threat, 138
DA.Dev_FC_Buff_Not_Clr
detailed attack
definition, 24
mapping to security objectives, 157
mapping to threat, 138
DA.Dev_FC_Ctrl_Data
detailed attack
definition, 24
mapping to security objectives, 157
mapping to threat, 138
DA.Dev_FC_Data_Export
detailed attack
definition, 24
mapping to security objectives, 157
mapping to threat, 139
DA.Dev_FC_Recovery
detailed attack
definition, 24
mapping to security objectives, 157
mapping to threat, 139
DA.Dev_FC_Replication
detailed attack
definition, 24
mapping to security objectives, 157
mapping to threat, 139
DA.Dev_FC_Self_Protect
detailed attack
definition, 24
mapping to security objectives, 158
mapping to threat, 139
DA.Dev_FC_Trap_Door
detailed attack
definition, 24
mapping to security objectives, 158
mapping to threat, 139
DA.Failure_DS_Comm
detailed attack
assumption by the environment, 8
definition, 47
mapping to security objectives, 158
mapping to threat, 146
DA.Hack_AC_Code_Vul
detailed attack
definition, 25
mapping to security objectives, 159
mapping to threat, 139
DA.Hack_AC_Weak
detailed attack
definition, 25
mapping to security objectives, 159
mapping to threat, 139
DA.Hack_Comm_Overload
detailed attack
definition, 26
mapping to security objectives, 160
mapping to threat, 144
DA.Hack_CommEaves_Eman
detailed attack
definition, 25
mapping to security objectives, 159
mapping to threat, 145
DA.Hack_CommEaves_Intrc
detailed attack
definition, 25
mapping to security objectives, 160
mapping to threat, 145
DA.Hack_CommEaves_Tap
detailed attack
assumption by the environment, 7
definition, 46
mapping to security objectives, 160
mapping to threat, 145
DA.Hack_Ext_CryptoAsset
detailed attack
definition, 26
mapping to security objectives, 161
mapping to threat, 141, 142
DA.Hack_Masq_Hijack
detailed attack
definition, 26
mapping to security objectives, 161
238 INDEX
mapping to threat, 145
DA.Hack_Masq_Uwkstn
detailed attack
definition, 27
mapping to security objectives, 161
mapping to threat, 145
DA.Hack_Masq_Wauth
detailed attack
assumption by the environment, 7
definition, 46
mapping to security objectives, 162
mapping to threat, 145
DA.Hack_MsgData_RcvTSF
detailed attack
definition, 27
mapping to security objectives, 162
mapping to threat, 139
DA.Hack_MsgData_RcvUsr
detailed attack
definition, 28
mapping to security objectives, 163
mapping to threat, 139
DA.Hack_MsgData_SndTSF
detailed attack
definition, 28
mapping to security objectives, 163
mapping to threat, 140
DA.Hack_MsgData_SndUsr
detailed attack
definition, 29
mapping to security objectives, 163
mapping to threat, 140
DA.Hack_Phys_Crypto
detailed attack
assumption by the environment, 7
definition, 47
mapping to security objectives, 163
mapping to threat, 145
DA.Hack_Phys_Damage
detailed attack
assumption by the environment, 7
definition, 47
mapping to security objectives, 164
mapping to threat, 145
DA.Hack_Prcsr_Overload
detailed attack
assumption by the environment, 7
definition, 46
mapping to security objectives, 164
mapping to threat, 144
DA.Hack_SocEng_Password
detailed attack
assumption by the environment, 7
definition, 47
mapping to security objectives, 164
mapping to threat, 146
DA.Hack_SocEng_SysInfo
detailed attack
assumption by the environment, 7
definition, 47
mapping to security objectives, 165
mapping to threat, 146
DA.Hack_Spoof_Login
detailed attack
assumption by the environment, 6
definition, 46
mapping to security objectives, 165
mapping to threat, 144
DA.Hack_Spoof_MsgHdr
detailed attack
definition, 29
mapping to security objectives, 166
mapping to threat, 144
DA.Hack_Stg_Overload
detailed attack
definition, 29
mapping to security objectives, 166
mapping to threat, 144
DA.Hardware_Flaw
detailed attack
assumption by the environment, 8
definition, 47
mapping to security objectives, 167
mapping to threat, 146
DA.Mal_Code_Hack_Downld
detailed attack
assumption by the environment, 6
definition, 45
mapping to security objectives, 167
mapping to threat, 143
DA.Mal_Code_Hack_Exe
detailed attack
assumption by the environment, 6
definition, 45
mapping to security objectives, 168
mapping to threat, 143
DA.Mal_Code_IT_Download
detailed attack
assumption by the environment, 6
definition, 45
mapping to security objectives, 169
mapping to threat, 144
DA.Mal_Code_IT_Exe
detailed attack
assumption by the environment, 6
definition, 46
mapping to security objectives, 169
mapping to threat, 144
INDEX 239
DA.Mal_Code_Usr_Downld
detailed attack
assumption by the environment, 6
definition, 46
mapping to security objectives, 170
mapping to threat, 144
DA.Mal_Code_Usr_Exe
detailed attack
assumption by the environment, 6
definition, 46
mapping to security objectives, 170
mapping to threat, 144
DA.Phys_CompFail_Res
detailed attack
definition, 29
mapping to security objectives, 171
mapping to threat, 146
DA.Power_Disrupt_Reset
detailed attack
definition, 30
mapping to security objectives, 171
mapping to threat, 140
DA.Repudiate_Rcvr_Int
detailed attack
assumption by the environment, 8
definition, 48
mapping to security objectives, 171
mapping to threat, 147
DA.Repudiate_Rcvr_Local
detailed attack
assumption by the environment, 8
definition, 48
mapping to security objectives, 172
mapping to threat, 147
DA.Repudiate_Rcvr_Rem
detailed attack
assumption by the environment, 8
definition, 48
mapping to security objectives, 172
mapping to threat, 147
DA.Repudiate_Send_Int
detailed attack
definition, 30
mapping to security objectives, 172
mapping to threat, 140
DA.Repudiate_Send_Local
detailed attack
definition, 30
mapping to security objectives, 172
mapping to threat, 140
DA.Repudiate_Send_Rem
detailed attack
definition, 30
mapping to security objectives, 173
mapping to threat, 140
DA.Repudiate_Trans_Loc
detailed attack
assumption by the environment, 9
definition, 48
mapping to security objectives, 173
mapping to threat, 147
DA.Repudiate_Trans_Uloc
detailed attack
assumption by the environment, 9
definition, 48
mapping to security objectives, 173
mapping to threat, 147
DA.Repudiate_Trans_Urem
detailed attack
assumption by the environment, 9
definition, 48
mapping to security objectives, 174
mapping to threat, 147
DA.Software_Flaw
detailed attack
assumption by the environment, 8
definition, 47
mapping to security objectives, 175
mapping to threat, 146
DA.TSF_Err_Conf_Crypto
detailed attack
definition, 30
mapping to security objectives, 175
mapping to threat, 146
DA.User_Abuse_Conf_Disk
detailed attack
definition, 30
mapping to security objectives, 176
mapping to threat, 140
DA.User_Abuse_Conf_Steg
detailed attack
definition, 30
mapping to security objectives, 176
mapping to threat, 143
DA.User_Collect_Browse
detailed attack
definition, 31
mapping to security objectives, 177
mapping to threat, 141
DA.User_Collect_Deceive
detailed attack
definition, 31
mapping to security objectives, 177
mapping to threat, 141
DA.User_Collect_Deduce
detailed attack
definition, 31
mapping to security objectives, 178
240 INDEX
mapping to threat, 141
DA.User_Collect_Eaves
detailed attack
definition, 32
mapping to security objectives, 178
mapping to threat, 141
DA.User_Collect_Residue
detailed attack
definition, 32
mapping to security objectives, 178
mapping to threat, 141
DA.User_Comm_Overload
detailed attack
definition, 33
mapping to security objectives, 178
mapping to threat, 148
DA.User_Err_AttrXpt
detailed attack
definition, 33
mapping to security objectives, 179
mapping to threat, 142
DA.User_Err_Conf_Class
detailed attack
definition, 34
mapping to security objectives, 180
mapping to threat, 141
DA.User_Err_Conf_Crypto
detailed attack
definition, 34
mapping to security objectives, 180
mapping to threat, 141
DA.User_Err_Conf_Exp
detailed attack
definition, 34
mapping to security objectives, 180
mapping to threat, 141
DA.User_Err_Delete
detailed attack
assumption by the environment, 9
definition, 48
mapping to security objectives, 180
mapping to threat, 147
DA.User_Err_Mod_Attr
detailed attack
definition, 35
mapping to security objectives, 181
mapping to threat, 148
DA.User_Err_MsngAttrXpt
detailed attack
definition, 35
mapping to security objectives, 181
mapping to threat, 142
DA.User_Err_Object_Attr
detailed attack
definition, 35
mapping to security objectives, 181
mapping to threat, 142
DA.User_Err_Set_Attr
detailed attack
definition, 36
mapping to security objectives, 181
mapping to threat, 148
DA.User_ErrAvl_AudExhst
detailed attack
definition, 33
mapping to security objectives, 179
mapping to threat, 148
DA.User_Modify_Audit
detailed attack
definition, 36
mapping to security objectives, 182
mapping to threat, 142
DA.User_Modify_Auth
detailed attack
definition, 37
mapping to security objectives, 182
mapping to threat, 142
DA.User_Modify_Data
detailed attack
definition, 37
mapping to security objectives, 182
mapping to threat, 142
DA.User_Modify_TSFData
detailed attack
definition, 37
mapping to security objectives, 183
mapping to threat, 142
DA.User_Obst_Res_Use
detailed attack
assumption by the environment, 9
definition, 49
mapping to security objectives, 184
mapping to threat, 148
DA.User_Prcsr_Overload
detailed attack
definition, 37
mapping to security objectives, 184
mapping to threat, 148
DA.User_Send_Conf
detailed attack
definition, 38
mapping to security objectives, 184
mapping to threat, 143
DA.User_Send_Integrity
detailed attack
definition, 38
mapping to security objectives, 185
mapping to threat, 143
INDEX 241
DA.User_Stg_Overload
detailed attack
definition, 39
mapping to security objectives, 185
mapping to threat, 148
DP.Admin_Security_Data
detailed policy statement
definition, 50
mapping to general policy statement,
189, 190
mapping to security objectives, 191
DP.Assurance_ACM
detailed policy statement
definition, 50
mapping to general policy statement,
187
mapping to security objectives, 191
DP.Assurance_ADO
detailed policy statement
definition, 50
mapping to general policy statement,
187
mapping to security objectives, 192
DP.Assurance_ADV
detailed policy statement
definition, 50
mapping to general policy statement,
188
mapping to security objectives, 192
DP.Assurance_AGD
detailed policy statement
definition, 50
mapping to general policy statement,
188
mapping to security objectives, 192
DP.Assurance_ALC
detailed policy statement
definition, 51
mapping to general policy statement,
188
mapping to security objectives, 192
DP.Assurance_ATE
detailed policy statement
definition, 51
mapping to general policy statement,
188
mapping to security objectives, 193
DP.Assurance_AVA
detailed policy statement
definition, 51
mapping to general policy statement,
188
mapping to security objectives, 193
DP.Audit_Gen_User
detailed policy statement
definition, 51
mapping to general policy statement,
186
mapping to security objectives, 193
DP.Audit_Generation
detailed policy statement
definition, 51
mapping to general policy statement,
186
mapping to security objectives, 193
DP.Audit_Protect
detailed policy statement
definition, 51
mapping to general policy statement,
186
mapping to security objectives, 193
DP.Authority_Notify
detailed policy statement
definition, 51
mapping to general policy statement,
186
mapping to security objectives, 194
DP.Change_Control_Users
detailed policy statement
definition, 51
mapping to general policy statement,
190
mapping to security objectives, 194
DP.Config_Mgt_Plan
detailed policy statement
definition, 51
mapping to general policy statement,
187, 188, 190
mapping to security objectives, 194
DP.Documented_Recovery
detailed policy statement
definition, 51
mapping to general policy statement,
188, 190
mapping to security objectives, 194
DP.External_Labels
detailed policy statement
definition, 52
mapping to general policy statement,
187
mapping to security objectives, 194
DP.I&A_User
detailed policy statement
definition, 52
mapping to general policy statement,
186
mapping to security objectives, 194
DP.Integrity_Data/SW
242 INDEX
detailed policy statement
definition, 52
mapping to general policy statement,
190
mapping to security objectives, 194
DP.Integrity_Practice
detailed policy statement
definition, 52
mapping to general policy statement,
190
mapping to security objectives, 195
DP.Lifecycle_Security
detailed policy statement
definition, 52
mapping to general policy statement,
187
mapping to security objectives, 195
DP.Malicious_Code
detailed policy statement
assumption by the environment, 9
definition, 54
mapping to general policy statement,
188, 190
DP.Need_To_Know
detailed policy statement
definition, 52
mapping to general policy statement,
189
mapping to security objectives, 195
DP.Non-Repudiation
detailed policy statement
assumption by the environment, 10
definition, 54
mapping to general policy statement,
190
DP.Privileged_Doc
detailed policy statement
definition, 52
mapping to general policy statement,
187
mapping to security objectives, 195
DP.Screen_Lock
detailed policy statement
definition, 52
mapping to general policy statement,
189
mapping to security objectives, 195
DP.Storage_Integrity
detailed policy statement
definition, 52
mapping to general policy statement,
190
mapping to security objectives, 195
DP.Sys_Access_Banners
detailed policy statement
definition, 52
mapping to general policy statement,
186
mapping to security objectives, 195
DP.Sys_Assur_HW/SW/FW
detailed policy statement
definition, 52
mapping to general policy statement,
188, 190
mapping to security objectives, 196
DP.Sys_Backup_Procs
detailed policy statement
definition, 53
mapping to general policy statement,
189
mapping to security objectives, 196
DP.Sys_Backup_Restore
detailed policy statement
definition, 53
mapping to general policy statement,
189
mapping to security objectives, 196
DP.Sys_Backup_Storage
detailed policy statement
definition, 53
mapping to general policy statement,
189
mapping to security objectives, 196
DP.Sys_Backup_Verify
detailed policy statement
assumption by the environment, 9
definition, 54
mapping to general policy statement,
189
DP.System_Protection
detailed policy statement
definition, 53
mapping to general policy statement,
190
mapping to security objectives, 196
DP.System_Recovery
detailed policy statement
definition, 53
mapping to general policy statement,
189, 191
mapping to security objectives, 196
DP.Tamper_ID
detailed policy statement
assumption by the environment, 10
definition, 55
mapping to general policy statement,
191
DP.User_Auth_Enhanced
INDEX 243
detailed policy statement
assumption by the environment, 10
definition, 54
mapping to general policy statement,
189
DP.User_Data_Dial-in
detailed policy statement
definition, 53
mapping to general policy statement,
189, 191
mapping to security objectives, 196
DP.User_Data_Storage
detailed policy statement
definition, 53
mapping to general policy statement,
189, 191
mapping to security objectives, 197
DP.User_Data_Transfer
detailed policy statement
definition, 53
mapping to general policy statement,
189, 191
mapping to security objectives, 197
DP.User_Defined_AC
detailed policy statement
definition, 53
mapping to general policy statement,
186, 190
mapping to security objectives, 197
DP.User_Documentation
detailed policy statement
definition, 53
mapping to general policy statement,
187
mapping to security objectives, 197
FAU
security requirement class
definition, 77
FAU_GEN
security requirement family
definition, 77
FAU_GEN.1
security requirement
definition, 77
mapping to security objective, 203,
204, 213
referenced in dependency, 225
FAU_GEN.2
security requirement
definition, 83
mapping to security objective, 203,
204
FAU_SAR
security requirement family
definition, 83
FAU_SAR.1
security requirement
definition, 83
mapping to security objective, 203
referenced in audit action, 77
referenced in dependency, 225
referenced in management action,
97
FAU_SAR.3
security requirement
definition, 83
mapping to security objective, 203
referenced in audit action, 78
FAU_SEL
security requirement family
definition, 83
FAU_SEL.1
security requirement
definition, 83
mapping to security objective, 204
referenced in audit action, 78
referenced in management action,
97
FAU_STG
security requirement family
definition, 84
FAU_STG.1
security requirement
referenced in dependency, 225
FAU_STG.2
security requirement
definition, 84
mapping to security objective, 204,
209
referenced in management action,
97
FAU_STG.3
security requirement
mapping to security objective, 209
FAU_STG.4
security requirement
definition, 84
mapping to security objective, 204
referenced in audit action, 78
referenced in management action,
97
FCO
security requirement class
definition, 84
FCO_NRO
security requirement family
definition, 84
244 INDEX
FCO_NRO.1
security requirement
mapping to security objective, 214
FCO_NRO.2
security requirement
definition, 84
mapping to security objective, 214
referenced in audit action, 78
referenced in management action,
97
FCS
security requirement class
definition, 85
FCS_CKM
security requirement family
definition, 85
FCS_CKM.1
security requirement
definition, 85
mapping to security objective, 205,
206
referenced in audit action, 78
referenced in dependency, 226
referenced in management action,
97
FCS_CKM.2
security requirement
definition, 86
mapping to security objective, 205,
206
referenced in audit action, 78
referenced in dependency, 226
referenced in management action,
97
FCS_CKM.3
security requirement
definition, 87
mapping to security objective, 205,
206
referenced in audit action, 78
referenced in management action,
98
FCS_CKM.4
security requirement
definition, 87
mapping to security objective, 205,
206
referenced in audit action, 78
referenced in dependency, 226
referenced in management action,
98
FCS_COP
security requirement family
definition, 87
FCS_COP.1
security requirement
definition, 88
mapping to security objective, 205,
207, 208
referenced in audit action, 78
referenced in dependency, 226
FDP
security requirement class
definition, 88
FDP_ACC
security requirement family
definition, 88
FDP_ACC.1
security requirement
mapping to security objective, 198,
199, 205, 207, 208, 211, 212,
215, 216, 220
referenced in dependency, 227–229
FDP_ACC.2
security requirement
definition, 88
mapping to security objective, 221
FDP_ACF
security requirement family
definition, 89
FDP_ACF.1
security requirement
definition, 89
mapping to security objective, 198,
199, 205, 207, 211, 212, 215,
216, 220, 221
referenced in audit action, 78
referenced in dependency, 226
referenced in management action,
98
FDP_DAU
security requirement family
definition, 89
FDP_DAU.1
security requirement
mapping to security objective, 210
FDP_DAU.2
security requirement
definition, 89
mapping to security objective, 205
referenced in audit action, 78
referenced in management action,
98
FDP_ETC
security requirement family
definition, 90
FDP_ETC.1
security requirement
INDEX 245
definition, 90
mapping to security objective, 206,
208, 221
referenced in audit action, 78
FDP_ETC.2
security requirement
definition, 90
mapping to security objective, 198,
205, 206, 208, 211
referenced in audit action, 78
referenced in management action,
98
FDP_IFC
security requirement family
definition, 90
FDP_IFC.1
security requirement
definition, 90
mapping to security objective, 208–
211, 221
referenced in dependency, 227–229
FDP_IFF
security requirement family
definition, 91
FDP_IFF.1
security requirement
definition, 92
mapping to security objective, 208–
211, 221
referenced in audit action, 79
referenced in dependency, 227
referenced in management action,
98
FDP_IFF.3
security requirement
definition, 92
mapping to security objective, 206
referenced in audit action, 79
FDP_ITC
security requirement family
definition, 92
FDP_ITC.1
security requirement
definition, 92
mapping to security objective, 206,
207, 211
referenced in audit action, 79
referenced in dependency, 226
referenced in management action,
98
FDP_ITC.2
security requirement
definition, 93
mapping to security objective, 205,
206, 208
referenced in audit action, 79
referenced in management action,
98
FDP_ITT
security requirement family
definition, 93
FDP_ITT.1
security requirement
mapping to security objective, 214,
221
FDP_ITT.2
security requirement
definition, 93
mapping to security objective, 211
referenced in audit action, 79
referenced in management action,
98
FDP_RIP
security requirement family
definition, 93
FDP_RIP.2
security requirement
definition, 94
mapping to security objective, 214
referenced in management action,
98
FDP_SDI
security requirement family
definition, 94
FDP_SDI.1
security requirement
mapping to security objective, 199,
207, 209, 218, 221
FDP_SDI.2
security requirement
definition, 94
mapping to security objective, 212
referenced in audit action, 79
referenced in management action,
98
FDP_UIT
security requirement family
definition, 94
FDP_UIT.1
security requirement
definition, 94
mapping to security objective, 205,
215, 217
referenced in audit action, 79
referenced in dependency, 228
FDP_UIT.3
security requirement
246 INDEX
definition, 94
mapping to security objective, 215,
217
referenced in audit action, 80
FIA
security requirement class
definition, 95
FIA_AFL
security requirement family
definition, 95
FIA_AFL.1
security requirement
definition, 95
mapping to security objective, 209
referenced in audit action, 80
referenced in management action,
98
FIA_ATD
security requirement family
definition, 95
FIA_ATD.1
security requirement
definition, 95
mapping to security objective, 199,
209, 220
referenced in dependency, 229
referenced in management action,
98
FIA_SOS
security requirement family
definition, 95
FIA_SOS.1
security requirement
definition, 95
mapping to security objective, 209
referenced in audit action, 80
referenced in management action,
98
FIA_SOS.2
security requirement
definition, 96
mapping to security objective, 209
referenced in audit action, 80
referenced in management action,
98
FIA_UAU
security requirement family
definition, 96
FIA_UAU.1
security requirement
mapping to security objective, 205
referenced in dependency, 228, 232
FIA_UAU.2
security requirement
definition, 96
mapping to security objective, 199,
209, 210, 212
referenced in audit action, 80
referenced in management action,
98
FIA_UAU.6
security requirement
definition, 96
mapping to security objective, 199
referenced in audit action, 80
referenced in management action,
99
FIA_UAU.7
security requirement
definition, 96
mapping to security objective, 210
FIA_UID
security requirement family
definition, 96
FIA_UID.1
security requirement
mapping to security objective, 204,
210
referenced in dependency, 225–227,
229, 230, 232
FIA_UID.2
security requirement
definition, 96
mapping to security objective, 210
referenced in audit action, 80
referenced in management action,
99
FIA_USB
security requirement family
definition, 97
FIA_USB.1
security requirement
definition, 97
mapping to security objective, 199,
210
referenced in audit action, 80
referenced in management action,
99
FMT
security requirement class
definition, 97
FMT_MOF
security requirement family
definition, 97
FMT_MOF.1
security requirement
definition, 97
mapping to security objective, 200,
INDEX 247
204, 205, 210, 211, 213, 214,
216–218
referenced in audit action, 80
referenced in management action,
99
FMT_MSA
security requirement family
definition, 100
FMT_MSA.1
security requirement
definition, 100
mapping to security objective, 199,
200, 207, 209, 213, 215, 216,
220
referenced in audit action, 80
referenced in dependency, 229, 230
referenced in management action,
99
FMT_MSA.2
security requirement
definition, 101
mapping to security objective, 215,
216, 219
referenced in audit action, 81
referenced in dependency, 226
FMT_MSA.3
security requirement
definition, 101
mapping to security objective, 199,
212, 215, 216
referenced in audit action, 81
referenced in dependency, 227
referenced in management action,
99
FMT_MTD
security requirement family
definition, 101
FMT_MTD.1
security requirement
definition, 101
mapping to security objective, 199,
203–205, 207, 215–219
referenced in audit action, 81
referenced in dependency, 225, 230
referenced in management action,
99
FMT_MTD.2
security requirement
definition, 101
mapping to security objective, 203,
213, 217, 219
referenced in audit action, 81
referenced in management action,
99
FMT_MTD.3
security requirement
definition, 101
mapping to security objective, 203,
217, 219
referenced in audit action, 81
FMT_REV
security requirement family
definition, 102
FMT_REV.1
security requirement
definition, 102
mapping to security objective, 220
referenced in audit action, 81
referenced in management action,
99
FMT_SAE
security requirement family
definition, 102
FMT_SAE.1
security requirement
definition, 102
mapping to security objective, 213,
220
referenced in audit action, 81
referenced in management action,
99
FMT_SMR
security requirement family
definition, 102
FMT_SMR.1
security requirement
mapping to security objective, 199,
204, 207, 211, 213, 215
referenced in dependency, 229, 230
FMT_SMR.2
security requirement
definition, 102
mapping to security objective, 204,
217, 219
referenced in audit action, 81
referenced in management action,
99
FPT
security requirement class
definition, 103
FPT_AMT
security requirement family
definition, 103
FPT_AMT.1
security requirement
definition, 103
mapping to security objective, 207,
212
248 INDEX
referenced in audit action, 81
referenced in dependency, 231
referenced in management action,
99
FPT_FLS
security requirement family
definition, 103
FPT_FLS.1
security requirement
definition, 103
mapping to security objective, 209,
216
referenced in audit action, 81
FPT_ITI
security requirement family
definition, 103
FPT_ITI.1
security requirement
definition, 103
mapping to security objective, 211,
219
referenced in audit action, 81
FPT_ITT
security requirement family
definition, 104
FPT_ITT.1
security requirement
definition, 104
mapping to security objective, 211
referenced in dependency, 231
referenced in management action,
99
FPT_RCV
security requirement family
definition, 104
FPT_RCV.1
security requirement
definition, 104
mapping to security objective, 216,
218–220
referenced in audit action, 81
referenced in management action,
99
FPT_RCV.4
security requirement
definition, 104
mapping to security objective, 203,
216, 219
referenced in audit action, 81
FPT_RVM
security requirement family
definition, 104
FPT_RVM.1
security requirement
definition, 104
mapping to security objective, 215
FPT_SEP
security requirement family
definition, 104
FPT_SEP.1
security requirement
mapping to security objective, 207,
212
FPT_SEP.2
security requirement
mapping to security objective, 206,
218
FPT_SEP.3
security requirement
definition, 105
mapping to security objective, 213
FPT_SSP
security requirement family
definition, 105
FPT_SSP.2
security requirement
definition, 105
mapping to security objective, 211
referenced in audit action, 81
FPT_STM
security requirement family
definition, 105
FPT_STM.1
security requirement
definition, 105
mapping to security objective, 203,
204, 213
referenced in audit action, 81
referenced in dependency, 225, 230
referenced in management action,
100
FPT_TDC
security requirement family
definition, 105
FPT_TDC.1
security requirement
definition, 105
mapping to security objective, 211
referenced in audit action, 82
referenced in dependency, 228
FPT_TRC
security requirement family
definition, 106
FPT_TRC.1
security requirement
definition, 106
mapping to security objective, 212
referenced in audit action, 82
INDEX 249
FPT_TST
security requirement family
definition, 106
FPT_TST.1
security requirement
definition, 106
mapping to security objective, 199,
205, 207, 209, 212, 218
referenced in audit action, 82
referenced in dependency, 231
referenced in management action,
100
FRU
security requirement class
definition, 110
FRU_PRS
security requirement family
definition, 110
FRU_PRS.2
security requirement
definition, 110
mapping to security objective, 215
referenced in audit action, 82
referenced in management action,
100
FRU_RSA
security requirement family
definition, 110
FRU_RSA.2
security requirement
definition, 110
mapping to security objective, 216
referenced in audit action, 82
referenced in management action,
100
FTA
security requirement class
definition, 111
FTA_MCS
security requirement family
definition, 111
FTA_MCS.2
security requirement
definition, 111
mapping to security objective, 209,
213
referenced in audit action, 82
referenced in management action,
100
FTA_SSL
security requirement family
definition, 111
FTA_SSL.1
security requirement
definition, 111
mapping to security objective, 216
referenced in audit action, 82
referenced in management action,
100
FTA_SSL.2
security requirement
definition, 111
mapping to security objective, 216
referenced in audit action, 82
referenced in management action,
100
FTA_SSL.3
security requirement
definition, 112
mapping to security objective, 217
referenced in audit action, 82
referenced in management action,
100
FTA_TAB
security requirement family
definition, 112
FTA_TAB.1
security requirement
definition, 112
mapping to security objective, 204,
210, 218
referenced in management action,
100
FTA_TAH
security requirement family
definition, 112
FTA_TAH.1
security requirement
definition, 112
mapping to security objective, 199
FTA_TSE
security requirement family
definition, 112
FTA_TSE.1
security requirement
definition, 112
mapping to security objective, 209,
210, 213, 221
referenced in audit action, 82
referenced in management action,
100
FTP
security requirement class
definition, 113
FTP_ITC
security requirement family
definition, 113
FTP_ITC.1
250 INDEX
security requirement
definition, 113
mapping to security objective, 205,
206, 220
referenced in audit action, 82
referenced in dependency, 228
referenced in management action,
100
FTP_TRP
security requirement family
definition, 113
FTP_TRP.1
security requirement
definition, 113
mapping to security objective, 206,
220
referenced in audit action, 83
referenced in dependency, 228
referenced in management action,
100
GP.Accountability
general policy statement
definition, 49
mapping of detailed policy state-
ments, 186
GP.Authorities
general policy statement
definition, 49
mapping of detailed policy state-
ments, 186
GP.Authorized_Use
general policy statement
definition, 49
mapping of detailed policy state-
ments, 186
GP.Availability
general policy statement
definition, 54
mapping of detailed policy state-
ments, 188
GP.Guidance
general policy statement
definition, 49
mapping of detailed policy state-
ments, 187
GP.Information_AC
general policy statement
definition, 54
mapping of detailed policy state-
ments, 189
GP.Integrity
general policy statement
definition, 54
mapping of detailed policy state-
ments, 190
GP.Lifecycle
general policy statement
definition, 49
mapping of detailed policy state-
ments, 187
GP.Marking
general policy statement
definition, 49
mapping of detailed policy state-
ments, 187
GP.Physical_Control
general policy statement
definition, 54
mapping of detailed policy state-
ments, 191
GP.Product_Assurance
general policy statement
definition, 50
mapping of detailed policy state-
ments, 187
O.AC_Admin_Limit
security objective
definition, 57
mapping to detailed attack, 149–151
mapping to security requirements,
198
O.AC_Label_Export
security objective
definition, 57
mapping to detailed attack, 179–181
mapping to security requirements,
198
O.Access_History
security objective
definition, 57
mapping to detailed attack, 177
mapping to security requirements,
199
O.Adm_Limits_Bindings
security objective
definition, 57
mapping to detailed attack, 152
mapping to security requirements,
199
O.Adm_User_Att_Mod
security objective
definition, 57
mapping to detailed attack, 152
mapping to security requirements,
199
O.Admin_Code_Val
INDEX 251
security objective
definition, 58
mapping to detailed attack, 168–170,
176
mapping to security requirements,
199
O.Admin_Code_Val_Sten
security objective
definition, 58
mapping to detailed attack, 177
mapping to security requirements,
199
O.Admin_Guidance
security objective
definition, 58
mapping to detailed attack, 152–155,
165, 176
mapping to detailed policy statement,
194, 195
mapping to security requirements,
200
O.Apply_Code_Fixes
security objective
definition, 58
mapping to detailed attack, 159
mapping to security requirements,
200
O.Assurance_ACM_AUT
security objective
definition, 58
mapping to detailed policy statement,
191
mapping to security requirements,
200
O.Assurance_ACM_CAP
security objective
definition, 58
mapping to detailed policy statement,
191
mapping to security requirements,
200
O.Assurance_ACM_SCP
security objective
definition, 58
mapping to detailed policy statement,
192
mapping to security requirements,
200
O.Assurance_ADO_DEL
security objective
definition, 58
mapping to detailed policy statement,
192
mapping to security requirements,
200
O.Assurance_ADO_IGS
security objective
definition, 58
mapping to detailed policy statement,
192
mapping to security requirements,
200
O.Assurance_ADV_FSP
security objective
definition, 59
mapping to detailed policy statement,
192
mapping to security requirements,
200
O.Assurance_ADV_HLD
security objective
definition, 59
mapping to detailed policy statement,
192
mapping to security requirements,
201
O.Assurance_ADV_IMP
security objective
definition, 59
mapping to detailed policy statement,
192
mapping to security requirements,
201
O.Assurance_ADV_INT
security objective
definition, 59
mapping to detailed policy statement,
192
mapping to security requirements,
201
O.Assurance_ADV_LLD
security objective
definition, 59
mapping to detailed policy statement,
192
mapping to security requirements,
201
O.Assurance_ADV_RCR
security objective
definition, 60
mapping to detailed policy statement,
192
mapping to security requirements,
201
O.Assurance_ADV_SPM
security objective
definition, 60
252 INDEX
mapping to detailed policy statement,
192
mapping to security requirements,
201
O.Assurance_AGD_ADM
security objective
definition, 60
mapping to detailed policy statement,
192
mapping to security requirements,
201
O.Assurance_AGD_USR
security objective
definition, 60
mapping to detailed policy statement,
192
mapping to security requirements,
201
O.Assurance_ALC_DVS
security objective
definition, 60
mapping to detailed policy statement,
192
mapping to security requirements,
202
O.Assurance_ALC_FLR
security objective
definition, 60
mapping to detailed policy statement,
192
mapping to security requirements,
202
O.Assurance_ALC_LCD
security objective
definition, 60
mapping to detailed policy statement,
192
mapping to security requirements,
202
O.Assurance_ALC_TAT
security objective
definition, 61
mapping to detailed policy statement,
193
mapping to security requirements,
202
O.Assurance_ATE_COV
security objective
definition, 61
mapping to detailed policy statement,
193
mapping to security requirements,
202
O.Assurance_ATE_DPT
security objective
definition, 61
mapping to detailed policy statement,
193
mapping to security requirements,
202
O.Assurance_ATE_FUN
security objective
definition, 61
mapping to detailed policy statement,
193
mapping to security requirements,
202
O.Assurance_ATE_IND
security objective
definition, 62
mapping to detailed policy statement,
193
mapping to security requirements,
202
O.Assurance_AVA_CCA
security objective
definition, 62
mapping to detailed policy statement,
193
mapping to security requirements,
203
O.Assurance_AVA_MSU
security objective
definition, 62
mapping to detailed policy statement,
193
mapping to security requirements,
203
O.Assurance_AVA_SOF
security objective
definition, 62
mapping to detailed policy statement,
193
mapping to security requirements,
203
O.Assurance_AVA_VLA
security objective
definition, 62
mapping to detailed policy statement,
193
mapping to security requirements,
203
O.Atomic_Functions
security objective
definition, 62
mapping to detailed attack, 171
mapping to security requirements,
203
INDEX 253
O.Aud_Sys_Entry_Parms
security objective
definition, 62
mapping to detailed attack, 151
mapping to security requirements,
203
O.Audit_Account
security objective
definition, 62
mapping to detailed attack, 149, 150,
155, 158, 176, 177, 182
mapping to security requirements,
203
O.Audit_Admin_Role
security objective
definition, 63
mapping to detailed attack, 149–151,
153, 158
mapping to security requirements,
204
O.Audit_Deter_Misuse
security objective
definition, 63
mapping to detailed attack, 159
mapping to security requirements,
204
O.Audit_Gen_User
security objective
definition, 63
mapping to detailed attack, 161, 182
mapping to detailed policy statement,
193
mapping to security requirements,
204
O.Audit_Generation
security objective
definition, 63
mapping to detailed attack, 160, 162,
164, 166, 178, 179, 182–185
mapping to detailed policy statement,
193
mapping to security requirements,
204
O.Audit_Loss_Respond
security objective
definition, 63
mapping to detailed attack, 150, 153,
179
mapping to security requirements,
204
O.Audit_Protect
security objective
definition, 63
mapping to detailed attack, 149–151,
153, 182
mapping to detailed policy statement,
193
mapping to security requirements,
204
O.Audit_Unusual_User
security objective
assumption by the environment, 7
definition, 73
mapping to detailed attack, 165
O.Change_Control_Users
security objective
definition, 63
mapping to detailed policy statement,
194
mapping to security requirements,
205
O.Clean_Obj_Recovery
security objective
assumption by the environment, 6
definition, 73
mapping to detailed attack, 167–170
O.Code_Signing
security objective
definition, 63
mapping to detailed attack, 158, 167–
170
mapping to security requirements,
205
O.Comm_Line_Protection
security objective
assumption by the environment, 7
definition, 73
mapping to detailed attack, 160
O.Comm_Trusted_Channel
security objective
definition, 63
mapping to detailed attack, 166
mapping to security requirements,
205
O.Config_Management
security objective
definition, 63
mapping to detailed attack, 183
mapping to detailed policy statement,
194, 196
mapping to security requirements,
205
O.Correct_Operation
security objective
definition, 64
mapping to detailed attack, 158
254 INDEX
mapping to security requirements,
205
O.Crypto_AC
security objective
definition, 64
mapping to detailed attack, 180
mapping to security requirements,
205
O.Crypto_Comm_Channel
security objective
definition, 64
mapping to detailed attack, 166
mapping to security requirements,
205
O.Crypto_Data_Sep
security objective
definition, 64
mapping to detailed attack, 175
mapping to security requirements,
206
O.Crypto_Dsgn_Impl
security objective
definition, 64
mapping to detailed attack, 175
mapping to security requirements,
206
O.Crypto_Import_Export
security objective
definition, 64
mapping to detailed attack, 161
mapping to security requirements,
206
O.Crypto_Key_Man
security objective
definition, 64
mapping to detailed attack, 149, 175,
180
mapping to security requirements,
206
O.Crypto_Manage_Roles
security objective
definition, 64
mapping to detailed attack, 149, 161
mapping to security requirements,
207
O.Crypto_Modular_Dsgn
security objective
definition, 64
mapping to detailed attack, 175
mapping to security requirements,
207
O.Crypto_Operation
security objective
definition, 65
mapping to detailed attack, 176
mapping to security requirements,
207
O.Crypto_Self_Test
security objective
definition, 65
mapping to detailed attack, 176
mapping to security requirements,
207
O.Crypto_Test_Reqs
security objective
definition, 65
mapping to detailed attack, 176
mapping to security requirements,
208
O.Data_Exchange_Conf
security objective
definition, 65
mapping to detailed attack, 159, 160,
178
mapping to security requirements,
208
O.Data_Export_Control
security objective
definition, 65
mapping to detailed attack, 176
mapping to security requirements,
208
O.Data_Imp_Exp_Control
security objective
definition, 65
mapping to detailed attack, 160, 179
mapping to security requirements,
208
O.Export_Control
security objective
definition, 65
mapping to detailed attack, 177
mapping to security requirements,
208
O.External_Labels
security objective
definition, 65
mapping to detailed policy statement,
194
mapping to security requirements,
208
O.Fail_Secure
security objective
definition, 65
mapping to detailed attack, 167, 175,
176
mapping to security requirements,
209
INDEX 255
O.Fault_Tolerance
security objective
assumption by the environment, 8
definition, 73
mapping to detailed attack, 158, 167,
175
O.General_Integ_Checks
security objective
definition, 65
mapping to detailed attack, 167–170,
183
mapping to security requirements,
209
O.Guarantee_Audit_Stg
security objective
definition, 65
mapping to detailed attack, 166, 179
mapping to security requirements,
209
O.Hack_Limit_Sessions
security objective
definition, 66
mapping to detailed attack, 159, 160,
164, 166
mapping to security requirements,
209
O.Hack_Traffic_Control
security objective
definition, 66
mapping to detailed attack, 160, 164,
166
mapping to security requirements,
209
O.I&A_Domain
security objective
definition, 66
mapping to detailed attack, 180
mapping to detailed policy statement,
194
mapping to security requirements,
209
O.I&A_Transaction
security objective
definition, 66
mapping to detailed attack, 173, 174
mapping to security requirements,
210
O.I&A_User
security objective
definition, 66
mapping to detailed attack, 149–151,
153, 158
mapping to security requirements,
210
O.I&A_User_Action
security objective
definition, 66
mapping to detailed attack, 149, 168,
169, 171, 180
mapping to security requirements,
210
O.Identify_Unusual_Act
security objective
definition, 66
mapping to detailed attack, 165
mapping to detailed policy statement,
197
mapping to security requirements,
210
O.Info_Flow_Control
security objective
definition, 66
mapping to detailed attack, 177, 178,
182, 183
mapping to detailed policy statement,
197
mapping to security requirements,
210
O.Info_Flow_Ctrl_Admin
security objective
definition, 66
mapping to detailed attack, 151
mapping to security requirements,
211
O.Input_Inspection
security objective
definition, 66
mapping to detailed attack, 167, 169,
170
mapping to security requirements,
211
O.Integ_Data_Mark_Exp
security objective
definition, 66
mapping to detailed attack, 185
mapping to security requirements,
211
O.Integ_Sys_Data_Ext
security objective
definition, 67
mapping to detailed attack, 157
mapping to security requirements,
211
O.Integ_Sys_Data_Int
security objective
definition, 67
mapping to detailed attack, 157, 183
256 INDEX
mapping to security requirements,
211
O.Integ_User_Data_Int
security objective
definition, 67
mapping to detailed attack, 178
mapping to security requirements,
211
O.Integrity_Attr_Exch
security objective
definition, 67
mapping to detailed attack, 156, 166
mapping to security requirements,
211
O.Integrity_Data/SW
security objective
definition, 67
mapping to detailed policy statement,
194
mapping to security requirements,
212
O.Integrity_Data_Rep
security objective
definition, 67
mapping to detailed attack, 157, 159
mapping to security requirements,
212
O.Integrity_Practice
security objective
definition, 67
mapping to detailed attack, 183
mapping to detailed policy statement,
195
mapping to security requirements,
212
O.Isolate_Executables
security objective
definition, 67
mapping to detailed attack, 168, 170,
171
mapping to security requirements,
212
O.Lifecycle_Security
security objective
definition, 67
mapping to detailed policy statement,
195
mapping to security requirements,
212
O.Limit_Actions_Auth
security objective
definition, 67
mapping to detailed attack, 153
mapping to security requirements,
212
O.Limit_Comm_Sessions
security objective
definition, 68
mapping to detailed attack, 179, 184,
185
mapping to security requirements,
213
O.Limit_Mult_Sessions
security objective
definition, 68
mapping to detailed attack, 165
mapping to security requirements,
213
O.Limit_ObserveRoles
security objective
assumption by the environment, 5
definition, 74
mapping to detailed attack, 156
O.Maintain_Sec_Domain
security objective
definition, 68
mapping to detailed attack, 183
mapping to security requirements,
213
O.Maintenance_Access
security objective
definition, 68
mapping to detailed attack, 154
mapping to security requirements,
213
O.Maintenance_Recover
security objective
definition, 68
mapping to detailed attack, 154
mapping to security requirements,
213
O.Malicious_Code
security objective
assumption by the environment, 9
definition, 74
mapping to detailed policy statement,
197
O.Manage_Res_Sec_Attr
security objective
definition, 68
mapping to detailed attack, 184
mapping to security requirements,
213
O.Manage_TSF_Data
security objective
definition, 68
mapping to detailed attack, 166, 179
INDEX 257
mapping to security requirements,
213
O.No_Residual_Info
security objective
definition, 68
mapping to detailed attack, 157, 178
mapping to security requirements,
214
O.NonRepud_Assess_Recd
security objective
assumption by the environment, 8,
9
definition, 74
mapping to detailed attack, 172, 174
O.NonRepud_Assess_Sent
security objective
definition, 68
mapping to detailed attack, 172–174
mapping to security requirements,
214
O.NonRepud_Gen_Recd
security objective
assumption by the environment, 8,
9
definition, 74
mapping to detailed attack, 172, 174
O.NonRepud_Gen_Sent
security objective
definition, 68
mapping to detailed attack, 173–175
mapping to security requirements,
214
O.NonRepud_Locals_Rcvd
security objective
assumption by the environment, 8,
9
definition, 74
mapping to detailed attack, 171, 173
O.NonRepud_Locals_Sent
security objective
definition, 69
mapping to detailed attack, 172, 173
mapping to security requirements,
214
O.NonRepudiate_Recd
security objective
assumption by the environment, 10
definition, 74
mapping to detailed policy statement,
198
O.NonRepudiate_Sent
security objective
definition, 69
mapping to detailed attack, 166
mapping to detailed policy statement,
198
mapping to security requirements,
214
O.Obj_Attr_Integrity
security objective
definition, 69
mapping to detailed attack, 181
mapping to security requirements,
215
O.Obj_Protection
security objective
definition, 69
mapping to detailed attack, 151, 167,
169, 170
mapping to security requirements,
215
O.Permit_Aliases
security objective
assumption by the environment, 6
definition, 74
mapping to detailed attack, 156
O.Permit_Anonymity
security objective
assumption by the environment, 6
definition, 74
mapping to detailed attack, 156
O.Prevent_AskPrivInfo
security objective
assumption by the environment, 6
definition, 74
mapping to detailed attack, 156
O.Prevent_Link
security objective
assumption by the environment, 6
definition, 74
mapping to detailed attack, 156
O.Prevent_Observe
security objective
assumption by the environment, 6
definition, 75
mapping to detailed attack, 156
O.Priority_Of_Service
security objective
definition, 69
mapping to detailed attack, 154, 160,
164, 166, 171, 179, 184, 185
mapping to security requirements,
215
O.Prvlg_IF_Status
security objective
definition, 69
mapping to detailed attack, 154
258 INDEX
mapping to security requirements,
215
O.Rcv_MsgMod_ID
security objective
definition, 69
mapping to detailed attack, 163
mapping to security requirements,
215
O.Rcv_MsgMod_Rcvr
security objective
definition, 69
mapping to detailed attack, 163
mapping to security requirements,
215
O.React_Discovered_Atk
security objective
assumption by the environment, 7
definition, 75
mapping to detailed attack, 164
O.Reference_Monitor
security objective
definition, 69
mapping to detailed attack, 183
mapping to security requirements,
215
O.Remote_Execution
security objective
definition, 69
mapping to detailed attack, 167, 168
mapping to security requirements,
216
O.Resource_Quotas
security objective
definition, 69
mapping to detailed attack, 154, 161,
164, 167, 171, 179, 184, 185
mapping to security requirements,
216
O.Rollback
security objective
assumption by the environment, 9
definition, 75
mapping to detailed attack, 180
O.Screen_Lock
security objective
definition, 70
mapping to detailed attack, 161
mapping to detailed policy statement,
195
mapping to security requirements,
216
O.Secure_Configuration
security objective
definition, 70
mapping to detailed attack, 155
mapping to security requirements,
216
O.Secure_State
security objective
definition, 70
mapping to detailed attack, 157, 176
mapping to security requirements,
216
O.Security_Attr_Mgt
security objective
definition, 70
mapping to detailed attack, 152, 154,
155, 181
mapping to detailed policy statement,
191
mapping to security requirements,
216
O.Security_Data_Mgt
security objective
definition, 70
mapping to detailed attack, 152–155,
182
mapping to detailed policy statement,
191
mapping to security requirements,
217
O.Security_Func_Mgt
security objective
definition, 70
mapping to detailed attack, 153, 155
mapping to detailed policy statement,
191
mapping to security requirements,
217
O.Security_Roles
security objective
definition, 70
mapping to detailed attack, 153–155,
178, 182
mapping to security requirements,
217
O.Session_Termination
security objective
definition, 70
mapping to detailed attack, 162
mapping to security requirements,
217
O.Snt_MsgMod_ID
security objective
definition, 70
mapping to detailed attack, 163
mapping to security requirements,
217
INDEX 259
O.Snt_MsgMod_Rcvr
security objective
definition, 70
mapping to detailed attack, 163
mapping to security requirements,
217
O.Source_Code_Exam
security objective
definition, 70
mapping to detailed attack, 158
mapping to security requirements,
217
O.Storage_Integrity
security objective
definition, 71
mapping to detailed policy statement,
195
mapping to security requirements,
218
O.Sys_Access_Banners
security objective
definition, 71
mapping to detailed policy statement,
195
mapping to security requirements,
218
O.Sys_Assur_HW/SW/FW
security objective
definition, 71
mapping to detailed policy statement,
196
mapping to security requirements,
218
O.Sys_Backup_Procs
security objective
definition, 71
mapping to detailed policy statement,
196
mapping to security requirements,
218
O.Sys_Backup_Restore
security objective
definition, 71
mapping to detailed policy statement,
196
mapping to security requirements,
218
O.Sys_Backup_Storage
security objective
definition, 71
mapping to detailed policy statement,
196
mapping to security requirements,
218
O.Sys_Backup_Verify
security objective
assumption by the environment, 9
definition, 75
mapping to detailed policy statement,
197
O.Sys_Self_Protection
security objective
definition, 71
mapping to detailed attack, 151, 158
mapping to detailed policy statement,
196
mapping to security requirements,
218
O.Tamper_ID
security objective
assumption by the environment, 7,
9, 10
definition, 75
mapping to detailed attack, 160, 163,
164, 184
mapping to detailed policy statement,
198
O.Tamper_Resistance
security objective
assumption by the environment, 7,
9
definition, 75
mapping to detailed attack, 160, 163,
164, 184
O.Trusted_DS_Recov
security objective
definition, 72
mapping to detailed attack, 159
mapping to security requirements,
219
O.Trusted_Path
security objective
definition, 72
mapping to detailed attack, 159, 161,
162, 165, 168, 177
mapping to security requirements,
220
O.Trusted_Path&Channel
security objective
definition, 72
mapping to detailed attack, 150, 168
mapping to security requirements,
220
O.Trusted_Recovery
security objective
definition, 72
mapping to detailed attack, 171
260 INDEX
mapping to security requirements,
220
O.Trusted_Recovery_Doc
security objective
definition, 72
mapping to detailed policy statement,
194, 196
mapping to security requirements,
220
O.TSF_Mod_Limit
security objective
definition, 71
mapping to detailed attack, 152
mapping to security requirements,
219
O.TSF_Rcv_Err_ID_Loc
security objective
definition, 71
mapping to detailed attack, 162
mapping to security requirements,
219
O.TSF_Rcv_Err_ID_Rem
security objective
definition, 71
mapping to detailed attack, 162
mapping to security requirements,
219
O.TSF_Snd_Err_ID_Loc
security objective
definition, 72
mapping to detailed attack, 163
mapping to security requirements,
219
O.TSF_Snd_Err_ID_Rem
security objective
definition, 72
mapping to detailed attack, 163
mapping to security requirements,
219
O.User_Attributes
security objective
definition, 72
mapping to detailed attack, 156
mapping to security requirements,
220
O.User_Auth_Enhanced
security objective
assumption by the environment, 6,
7, 10
definition, 75
mapping to detailed attack, 162, 165
mapping to detailed policy statement,
198
O.User_Auth_Management
security objective
definition, 72
mapping to detailed attack, 152
mapping to security requirements,
220
O.User_Auth_Multiple
security objective
assumption by the environment, 7
definition, 75
mapping to detailed attack, 162
O.User_Conf_Prevention
security objective
definition, 73
mapping to detailed attack, 180
mapping to security requirements,
220
O.User_Data_Dial-in
security objective
definition, 73
mapping to detailed policy statement,
196
mapping to security requirements,
221
O.User_Data_Integrity
security objective
definition, 73
mapping to detailed policy statement,
197
mapping to security requirements,
221
O.User_Data_Transfer
security objective
definition, 73
mapping to detailed policy statement,
197
mapping to security requirements,
221
O.User_Defined_AC
security objective
definition, 73
mapping to detailed attack, 177, 178,
183
mapping to detailed policy statement,
195, 197
mapping to security requirements,
221
O.User_Guidance
security objective
definition, 73
mapping to detailed attack, 162, 165,
180, 181
mapping to detailed policy statement,
194, 197
INDEX 261
mapping to security requirements,
221
ST assignment
FAU_GEN.1.2, 83
FAU_SAR.1.1, 83
FAU_SAR.3.1, 83
FAU_SEL.1.1, 84
FAU_STG.2.3, 84
FCO_NRO.2.2, 84
FCO_NRO.2.3, 84
FCS_CKM.1.1, 85
FCS_CKM.2.1, 86
FCS_CKM.3.1, 87
FCS_CKM.4.1, 87
FCS_COP.1.1, 88
FDP_ACF.1.1, 89
FDP_ACF.1.2, 89
FDP_ACF.1.3, 89
FDP_ACF.1.4, 89
FDP_DAU.2.1, 89
FDP_DAU.2.2, 89
FDP_ETC.1.1, 90
FDP_ETC.2.1, 90
FDP_ETC.2.4, 90
FDP_IFF.1.1, 92
FDP_IFF.1.2, 92
FDP_IFF.1.3, 92
FDP_IFF.1.4, 92
FDP_IFF.1.5, 92
FDP_IFF.1.6, 92
FDP_IFF.3.1, 92
FDP_ITC.1.1, 92
FDP_ITC.1.3, 93
FDP_ITC.2.1, 93
FDP_ITC.2.5, 93
FDP_ITT.2.1, 93
FDP_ITT.2.2, 93
FDP_SDI.2.1, 94
FDP_SDI.2.2, 94
FDP_UIT.1.1, 94
FDP_UIT.3.1, 94
FIA_AFL.1.1, 95
FIA_AFL.1.2, 95
FIA_ATD.1.1, 95
FIA_SOS.2.1, 96
FIA_SOS.2.2, 96
FIA_UAU.6.1, 96
FIA_UAU.7.1, 96
FMT_MOF.1.1, 100
FMT_MSA.1.1, 101
FMT_MSA.3.1, 101
FMT_MSA.3.2, 101
FMT_MTD.1.1, 101
FMT_MTD.2.1, 101
FMT_MTD.2.2, 101
FMT_REV.1.1, 102
FMT_REV.1.2, 102
FMT_SAE.1.1, 102
FMT_SAE.1.2, 102
FPT_FLS.1.1, 103
FPT_ITI.1.1, 103
FPT_ITI.1.2, 103
FPT_RCV.4.1, 104
FPT_TDC.1.1, 105
FPT_TDC.1.2, 106
FPT_TRC.1.2, 106
FPT_TST.1.1, 106
FRU_RSA.2.1, 110
FRU_RSA.2.2, 111
FTA_MCS.2.1, 111
FTA_MCS.2.2, 111
FTA_SSL.1.1, 111
FTA_SSL.1.2, 111
FTA_SSL.2.2, 112
FTA_SSL.3.1, 112
FTA_TSE.1.1, 112
FTP_ITC.1.3, 113
FTP_TRP.1.3, 113
ST selection
FAU_SAR.3.1, 83
FAU_SEL.1.1, 84
FAU_STG.2.3, 84
FCO_NRO.2.3, 84
FDP_ITT.2.1, 93
FDP_UIT.1.1, 94
FDP_UIT.1.2, 94
FMT_MOF.1.1, 97
FMT_MSA.1.1, 101
FMT_MSA.3.1, 101
FMT_MTD.1.1, 101
FMT_REV.1.1, 102
FPT_ITT.1.1, 104
FPT_TST.1.1, 106
FRU_RSA.2.1, 110
FRU_RSA.2.2, 111
FTA_TAH.1.1, 112
FTA_TAH.1.2, 112
FTP_ITC.1.2, 113
FTP_TRP.1.1, 113
FTP_TRP.1.2, 113
FTP_TRP.1.3, 113
T.Admin_Err_Commit
threat
definition, 12
mapping of attacks, 136
T.Admin_Err_Omit
262 INDEX
threat
definition, 12
mapping of attacks, 137
T.Admin_Hostile_Modify
threat
definition, 12
mapping of attacks, 137
T.Admin_UserPriv
assumption by the environment, 5
threat
definition, 39
mapping of attacks, 143
T.Component_Failure
assumption by the environment, 8
threat
definition, 42
mapping of attacks, 146
T.Dev_Flawed_Code
threat
definition, 13
mapping of attacks, 138
T.Failure_DS_Comp
assumption by the environment, 8
threat
definition, 42
mapping of attacks, 146
T.Hack_AC
threat
definition, 13
mapping of attacks, 139
T.Hack_Avl_Resource
assumption by the environment, 7
threat
definition, 40
mapping of attacks, 144
T.Hack_Comm_Eavesdrop
assumption by the environment, 7
threat
definition, 41
mapping of attacks, 145
T.Hack_Masq
assumption by the environment, 7
threat
definition, 41
mapping of attacks, 145
T.Hack_Msg_Data
threat
definition, 13
mapping of attacks, 139
T.Hack_Phys
assumption by the environment, 7
threat
definition, 41
mapping of attacks, 145
T.Hack_Social_Engineer
assumption by the environment, 7
threat
definition, 42
mapping of attacks, 146
T.Malicious_Code
assumption by the environment, 6
threat
definition, 40
mapping of attacks, 143
T.Power_Disrupt
threat
definition, 14
mapping of attacks, 140
T.Repudiate_Receive
assumption by the environment, 8
threat
definition, 43
mapping of attacks, 147
T.Repudiate_Send
threat
definition, 14
mapping of attacks, 140
T.Repudiate_Transact
assumption by the environment, 8
threat
definition, 43
mapping of attacks, 147
T.Spoofing
assumption by the environment, 6
threat
definition, 40
mapping of attacks, 144
T.User_Abuse_Conf
threat
definition, 14
mapping of attacks, 140
T.User_Collect
threat
definition, 15
mapping of attacks, 141
T.User_Err_Conf
threat
definition, 15
mapping of attacks, 141
T.User_Err_Inaccess
assumption by the environment, 9
threat
definition, 44
mapping of attacks, 147
T.User_Err_Integrity
threat
definition, 15
mapping of attacks, 142
INDEX 263
T.User_Err_Slf_Protect
threat
definition, 16
mapping of attacks, 142
T.User_Misuse_Avl_Resc
assumption by the environment, 9
threat
definition, 44
mapping of attacks, 148
T.User_Modify
threat
definition, 16
mapping of attacks, 142
T.User_Send
threat
definition, 16
mapping of attacks, 143