KECS-CR-17-56 Korean National Protection Profile for Database Encryption V1.0 Certification Report Certification No.: KECS-PP-0820-2017 2017. 8. 18 IT Security Certification Center Certification Report Page 2 History of Creation and Revision No. Date Revised Pages Description 00 2017.08.18 - Certification report for Korean National Protection Profile for Database Encryption V1.0 - First documentation Certification Report Page 3 This document is the certification report for Korean National Protection Profile for Database Encryption V1.0 of National Security Research Institute (NSR) and Telecommunications Technology Association (TTA). The Certification Body IT Security Certification Center (ITSCC) The Evaluation Facility Telecommunications Technology Association (TTA) Certification Report Page 4 Table of Contents Certification Report ....................................................................................................1 1. Executive Summary.............................................................................................5 2. Identification.........................................................................................................8 3. Security Policy .....................................................................................................9 4. Assumptions and Clarification of Scope............................................................9 5. Results of the Evaluation ....................................................................................9 5.1 Protection Profile Evaluation (APE) ..........................................................9 5.2 Evaluation Result Summary ...................................................................10 6. Recommendations.............................................................................................10 7. Acronyms and Glossary....................................................................................10 8. Bibliography....................................................................................................... 11 Certification Report Page 5 1. Executive Summary This report describes the certification result drawn by the certification body on the results of the APE evaluation of Korean National Protection Profile for Database Encryption V1.0 (“PP†hereinafter) [1] with reference to the Common Criteria for Information Technology Security Evaluation (“CC†hereinafter) [2]. It describes the evaluation result and its soundness and conformity. The authors of the PP [1] are National Security Research Institute (NSR) and Telecommunications Technology Association (TTA). The Target of Evaluation (TOE) in the PP [1] is Database Encryption designed to prevent the unauthorized disclosure of confidential information by encrypting the database. Also, the TOE shall provide a variety of security features: security audit, the identification and authentication including mutual authentication between TOE components, security management, the TOE access session management, and the TSF protection function, etc.. These TOE Security Functional Requirements (SFRs) are outlined in the PP [1]. The evaluation of the PP [1] has been carried out by Telecommunications Technology Association (TTA) and completed on 22 May 2017. This report grounds on the evaluation technical report (ETR) TTA had submitted [6]. The evaluation of the PP [1] was performed in accordance with the APE (Protection Profile Evaluation) requirements in CC Part 3 and the Common Methodology for Information Technology Security Evaluation (“CEM†hereinafter) [3]. The PP [1] does not claim conformance to any other Protection Profile. All Security Assurance Requirements (SARs) in the PP [1] are based only upon assurance component in CC Part 3, and the assurance package is EAL1 augmented by ATE_FUN.1. Therefore the PP [1] is CC Part 3 conformant. The Security Functional Requirements (SFRs) are based upon both functional components in CC Part 2 and newly defined components in the Extended component definition chapter of the PP [1]. Therefore the PP [1] is CC Part 2 extended. The PP [1] requires strict conformance. The operational environment of the Database Encryption is as shown in [Figure 1], [Figure 2], [Figure 3], and [Figure 4]. Certification Report Page 6 [Figure 1] Operational environment of Database Encryption (1) [Figure 2] Operational environment of Database Encryption (2) Certification Report Page 7 [Figure 3] Operational environment of Database Encryption (3) [Figure 4] Operational environment of Database Encryption (4) Certification Report Page 8 Certification Validity: The certificate is not an endorsement of the Protection Profile by ITSCC or by any other organization that recognizes or gives effect to this certificate, and no warranty of the Protection Profile by ITSCC or by any other organization recognizes or gives effect to the certificate, is either expressed or implied. 2. Identification [Table 1] summarizes identification information for scheme, developer, sponsor, evaluation facility, certification body, etc.. Scheme Korea Evaluation and Certification Guidelines for IT Security (27 June 2016) Korea Evaluation and Certification Scheme for IT Security (26 June 2017) Name and Version of the Certified Protection Profile Korean National Protection Profile for Database Encryption V1.0 Common Criteria Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 5, CCMB-2017-04-001 ~ CCMB-2017-04-003, April 2017 Common Methodology Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 5, CCMB-2017-04-004, April 2017 EAL EAL1+ (augmented by ATE_FUN.1) Developer National Security Research Institute (NSR) Telecommunications Technology Association (TTA) Sponsor National Security Research Institute (NSR) Evaluation Facility Telecommunications Technology Association (TTA) Completion Date of Evaluation 22 May 2017 Certification No. KECS-PP-0820-2017 Certification Body IT Security Certification Center (ITSCC) [Table 1] Identification information Certification Report Page 9 3. Security Policy The PP [1] has reduced content of a low assurance PP, thus the PP [1] does not have any explicit security problem definition (i.e., threats, organisational security policies, and/or assumptions) and security objectives for the TOE. The TOE defined in the PP [1] provides security features in accordance with the SFRs. Refer to the PP [1] chapter 5 for details. 4. Assumptions and Clarification of Scope The PP [1] has reduced content of a low assurance PP, thus the PP [1] does not have any explicit assumptions. The TOE defined in the PP [1] is the Database Encryption. 5. Results of the Evaluation The PP [1] claims EAL1+ (ATE_FUN.1), thus has reduced content of a low assurance PP. The evaluation facility provided the evaluation result in the ETR [6] which references a Single Evaluation Report for APE requirements and Observation Reports. The evaluation result was based on the CC [2] and CEM [3]. As a result of the evaluation, the verdict PASS is assigned to all assurance components of APE. 5.1 Protection Profile Evaluation (APE) The PP Introduction correctly identifies the PP, and the PP reference and the TOE overview are consistent with each other. Therefore the verdict PASS is assigned to APE_INT.1. The Conformance Claim properly describes how the PP conforms to the CC and packages. Therefore the verdict PASS is assigned to APE_CCL.1. The Security Objectives for the operational environment from the PP is clearly defined. Therefore the verdict PASS is assigned to APE_OBJ.1. The Extended Components Definition has been clearly and unambiguously defined, Certification Report Page 10 and it is necessary. Therefore the verdict PASS is assigned to APE_ECD.1. The Security Requirements is defined clearly and unambiguously, and it is internally consistent. Therefore the verdict PASS is assigned to APE_REQ.1. Thus, the PP is sound and internally consistent, and suitable to be used as the basis for writing a low-assurance ST or another low-assurance PP. The verdict PASS is assigned to the assurance class APE. 5.2 Evaluation Result Summary Assurance Class Assurance Component Evaluator Action Elements Verdict Evaluator Action Elements Assurance Component Assurance Class APE APE_INT.1 APE_INT.1.1E PASS PASS PASS APE_CCL.1 APE_CCL.1.1E PASS PASS APE_OBJ.1 APE_OBJ.1.1E PASS PASS APE_ECD.1 APE_ECD.1.1E PASS PASS APE_ECD.1.2E PASS APE_REQ.1 APE_REQ.1.1E PASS PASS [Table 2] Evaluation Result Summary 6. Recommendations The PP [1] defines the minimum security requirements for Database Encryption, and requires an ST or another PP claiming this PP [1] to fulfill the CC requirements for strict conformance, but only a low-assurance ST is allowed to make a conformance to the PP [1]. If the TOE defined in the ST which claims conformance to the PP [1] implements additional security features, then it is strongly recommended the ST author to define additional security functional requirements in accordance with the TOE implementation. 7. Acronyms and Glossary CC Common Criteria Certification Report Page 11 EAL Evaluation Assurance Level ETR Evaluation Technical Report PP Protection Profile SAR Security Assurance Requirement SFR Security Functional Requirement ST Security Target TOE Target of Evaluation TSF TOE Security Functionality 8. Bibliography The certification body has used following documents to produce this report. [1] Korean National Protection Profile for Database Encryption V1.0 [2] Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 5, CCMB-2017-04-001 ~ CCMB-2017-04-003, April 2017 - Part 1: Introduction and general model - Part 2: Security functional components - Part 3: Security assurance components [3] Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 5, CCMB-2017-04-004, April 2017 [4] Korea Evaluation and Certification Guidelines for IT Security (27 June 2016) [5] Korea Evaluation and Certification Scheme for IT Security (26 June 2017) [6] TTA-CCE-16-033 Korean National Protection Profile for Database Encryption V1.0 Evaluation Technical Report V1.3, 22 May 2017