National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients Version 1.3 21 March 2022 Report Number: CCEVS-VR-PP-0076 Dated: 14 October 2022 Version: 1.0 National Institute of Standards and Technology National Security Agency Information Assurance Directorate 9800 Savage Road STE 6940 Fort George G. Meade, MD 20755-6940 Information Technology Laboratory 100 Bureau Drive Gaithersburg, MD 20899 ® TM ACKNOWLEDGEMENTS Common Criteria Testing Laboratory Base and Additional Requirements DEKRA Testing and Certification S.A.U. Avda. Pirineos, 7 Nave 9A 28703, San Sebastián de los Reyes Madrid, Spain Table of Contents 1 Executive Summary................................................................................................................. 1 2 Identification............................................................................................................................ 2 3 CFG_GPOS-VPNC_V1.3 Description.................................................................................... 4 4 Security Problem Description and Objectives......................................................................... 5 4.1 Assumptions..................................................................................................................... 5 4.2 Threats.............................................................................................................................. 5 4.3 Organizational Security Policies...................................................................................... 7 4.4 Security Objectives .......................................................................................................... 7 5 Functional Requirements....................................................................................................... 10 6 Assurance Requirements ....................................................................................................... 13 7 Results of the Evaluation....................................................................................................... 14 8 Glossary................................................................................................................................. 15 9 Bibliography.......................................................................................................................... 16 PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 1 1 Executive Summary This report documents the assessment of the National Information Assurance Partnership (NIAP) validation team of the evaluation of the PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3 (CFG_GPOS-VPNC_V1.3). This PP- Configuration defines how to evaluate a TOE that claims conformance to the Protection Profile for General Purpose Operating Systems (PP_GPOS_V4.2.1) Base-PP and the PP-Module for Virtual Private Network (VPN) Clients, Version 2.4 (MOD_VPNC_V2.4). It presents a summary of the CFG_GPOS-VPNC_V1.3 and the evaluation results. DEKRA Testing and Certification S.A.U. (DEKRA), located in Madrid, Spain, performed the evaluation of the CFG_GPOS-VPNC_V1.3 and MOD_VPNC_V2.4 contained within the PP- Configuration, concurrent with the first product evaluation against the PP-Configuration’s requirements. The evaluated product was Microsoft Windows (Windows 21H2 et al), specifically including the following product versions: • Microsoft Windows 11 • Microsoft Windows 10 (versions 20H2, 21H1, 21H2) • Microsoft Windows Server • Microsoft Windows Server 2022 • Microsoft Azure Stack HCIv2 version 21H2 • Microsoft Azure Stack Hub • Microsoft Azure Stack Edge This evaluation addressed the base security functional requirements of MOD_VPNC_V2.4 as part of CFG_GPOS-VPNC_V1.3. The Module defines additional requirements, some of which the Microsoft Windows evaluation claimed. As part of conducting an evaluation of the Microsoft Windows product, the test laboratory performed an additional review of the PP-Configuration and Module as part of the completion of this VR, to confirm they meet the claimed ACE requirements. The evaluation determined the CFG_GPOS-VPNC_V1.3 is both Common Criteria Part 2 Extended and Part 3 Extended. An accredited Information Technology Security Evaluation Facility (ITSEF) evaluated the PP-Configuration and Module identified in this VR using the Common Methodology for IT Security Evaluation (Version 3.1, Release 5) for conformance to the Common Criteria for IT Security Evaluation (Version 3.1, Release 5). The Security Target (ST) includes material from both PP_GPOS_V4.2.1 and MOD_VPNC_V2.4; completion of the ASE work units satisfied the ACE work units for this Module, but only for the materials defined in this Module, and only when the Module is in the defined PP-Configuration. The evaluation laboratory conducted this evaluation in accordance with the provisions of the NIAP Common Criteria Evaluation and Validation Scheme (CCEVS). The conclusions of the testing laboratory in the evaluation technical report are consistent with the evidence given. PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 2 2 Identification The CCEVS is a joint National Security Agency (NSA) and National Institute of Standards and Technology (NIST) effort to establish commercial facilities to perform trusted product evaluations. Under this program, security evaluations are conducted by commercial testing laboratories called CCTLs. CCTLs evaluate products against Protection Profiles (PPs) and Modules that have Evaluation Activities, which are interpretations of the Common Methodology for Information Technology Security Evaluation (CEM) v3.1 workunits specific to the technology described by the PP or Module. Products may only be evaluated against Modules when a PP-Configuration is defined to include the Module with at least one corresponding Base-PP. In order to promote thoroughness and efficiency, the evaluation of the CFG_GPOS-VPNC_V1.3 and MOD_VPNC_V2.4 was performed concurrent with the first product evaluation to claim conformance to the PP-Configuration. In this case, the Target of Evaluation (TOE) was Microsoft Windows (Windows 21H2 et al), specifically including the following product versions: • Microsoft Windows 11 • Microsoft Windows 10 (versions 20H2, 21H1, 21H2) • Microsoft Windows Server • Microsoft Windows Server 2022 • Microsoft Azure Stack HCIv2 version 21H2 • Microsoft Azure Stack Hub • Microsoft Azure Stack Edge The evaluation was performed by DEKRA Testing and Certification S.A.U in Madrid, Spain. This evaluation addressed the base security functional requirements of MOD_VPNC_V2.4 as part of CFG_GPOS-VPNC_V1.3. The Module defines additional requirements, some of which the Microsoft Windows evaluation claimed. MOD_VPNC_V2.4 contains a set of base requirements that all conformant STs must include, and additionally contains optional and selection-based requirements. Optional requirements are separated into three categories: • Strictly optional, which may be claimed or omitted at the product vendor’s discretion • Objective, which are not currently prescribed but are expected to be included in future versions • Implementation-dependent, which must be claimed if the TOE implements some functionality that is not mandatory for the product type Selection-based requirements are those that must be included based upon the selections made in other requirements and the capabilities of the TOE. The evaluation laboratory evaluated all discretionary requirements not claimed in the initial TOE evaluation as part of the evaluation of the ACE_REQ work units performed against the Module. When an evaluation laboratory evaluates a TOE against any additional requirements not already referenced in this VR through an existing TOE evaluation, the VR may be amended to include PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 3 reference to this as additional evidence that the corresponding portions of the CFG_GPOS- VPNC_V1.3 were evaluated. The following identifies the Module in the PP-Configuration evaluated by this VR. It also includes supporting information from the initial product evaluation performed against this Module. PP-Configuration PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, 21 March 2022 Module(s) in PP- Configuration PP-Module for Virtual Private Network (VPN) Clients, Version 2.4, 31 March 2022 ST (Base) Microsoft Windows Common Criteria Evaluation Microsoft Windows 11 Microsoft Windows 10 (versions 20H2, 21H1, 21H2) Microsoft Windows Server Microsoft Windows Server 2022 Microsoft Azure Stack HCIv2 version 21H2 Microsoft Azure Stack Hub Microsoft Azure Stack Edge Security Target Version 0.03, July 29, 2022 CC Version Common Criteria for Information Technology Security Evaluation, Version 3.1, Release 5 Conformance Result CC Part 2 Extended, CC Part 3 Extended CCTL DEKRA Testing and Certification S.A.U. Avda. Pirineos, 7 Nav 9A 28703 San Sebastián de los Reyes Madrid, Spain PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 4 3 CFG_GPOS-VPNC_V1.3 Description CFG_GPOS-VPNC_V1.3 is a PP-Configuration that combines the following: • Protection Profile for General Purpose Operating Systems (PP_GPOS_V4.2.1) • Protection Profile Module for Virtual Private Network (VPN) Clients, Version 2.1 (MOD_VPNC_V2.4) The PP-Configuration defines a baseline set of security functional requirements (SFRs) for general-purpose operating systems (defined in PP_GPOS_V4.2.1) that include native VPN client functionality for IPsec communications (defined in MOD_VPNC_V2.4). A VPN client is a piece of software that allows a computer to establish a VPN with a remote peer or gateway. The VPN allows for confidentiality and integrity of the network traffic that passes over it. Specifically, MOD_VPNC_V2.4 defines IPsec as the mechanism used to implement a VPN. In the context of CFG_GPOS-VPNC_V1.3, the VPN client is a software component of a general-purpose operating system that is integrated with that operating system. PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 5 4 Security Problem Description and Objectives 4.1 Assumptions Table 1 shows the assumptions defined in the individual components of CFG_GPOS-VPNC_V1.3. Table 1: Assumptions Assumption Name Assumption Definition From PP_GPOS_V4.2.1 A.PLATFORM The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_ADMIN The administrator of the OS is not careless, willfully negligent or hostile, and administers the OS within compliance of the applied enterprise security policy. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the software in compliance with the applied enterprise security policy. At the same time, malicious software could act as the user, so requirements which confine malicious subjects are still in scope. From MOD_VPNC_V2.4 A.NO_TOE_BYPASS Information cannot flow onto the network to which the VPN client's host is connected without passing through the TOE. A.PHYSICAL Physical security, commensurate with the value of the TOE and the data it contains, is assumed to be provided by the environment. A.TRUSTED_CONFIG Personnel configuring the TOE and its operational environment will follow the applicable security configuration guidance. 4.2 Threats Table 2 shows the threats defined in the individual components of CFG_GPOS-VPNC_V1.3. Table 2: Threats Threat Name Threat Definition From PP_GPOS_V4.2.1 T.LIMITED_PHYSICAL_ACCESS An attacker may attempt to access data on the OS while having a limited amount of time with the physical device. T.LOCAL_ATTACK An attacker may compromise applications running on the OS. The compromised application may provide maliciously formatted input to the OS through a variety of channels including unprivileged system calls and messaging via the file system. T.NETWORK_ATTACK An attacker is positioned on a communications channel or elsewhere on the network infrastructure. Attackers may engage in communications with applications and services running on or part of the OS with the intent of compromise. Engagement may consist of altering existing legitimate communications. T.NETWORK_EAVESDROP An attacker is positioned on a communications channel or elsewhere on the network infrastructure. Attackers may monitor and gain access to data exchanged between applications and services that are running on or part of the OS. From MOD_VPNC_V2.1 PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 6 Threat Name Threat Definition T.TSF_CONFIGURATION Configuring VPN tunnels is a complex and time-consuming process, and prone to errors if the interface for doing so is not well-specified or well-behaved. The inability to configure certain aspects of the interface may also lead to the mis-specification of the desired communications policy or use of cryptography that may be desired or required for a particular site. This may result in unintended weak or plaintext communications while the user thinks that their data are being protected. Other aspects of configuring the TOE or using its security mechanisms (for example, the update process) may also result in a reduction in the trustworthiness of the VPN client. T.UNAUTHORIZED_ACCESS This PP-Module does not include requirements that can protect against an insider threat. Authorized users are not considered hostile or malicious and are trusted to follow appropriate guidance. Only authorized personnel should have access to the system or device that contains the IPsec VPN client. Therefore, the primary threat agents are the unauthorized entities that try to gain access to the protected network (in cases where tunnel mode is used) or to plaintext data that traverses the public network (regardless of whether transport mode or tunnel mode is used). The endpoint of the network communication can be both geographically and logically distant from the TOE, and can pass through a variety of other systems. These intermediate systems may be under the control of the adversary, and offer an opportunity for communications over the network to be compromised. Plaintext communication over the network may allow critical data (such as passwords, configuration settings, and user data) to be read and/or manipulated directly by intermediate systems, leading to a compromise of the TOE or to the secured environmental system(s) that the TOE is being used to facilitate communications with. IPsec can be used to provide protection for this communication; however, there are myriad options that can be implemented for the protocol to be compliant to the protocol specification listed in the RFC. Some of these options can have negative impacts on the security of the connection. For instance, using a weak encryption algorithm (even one that is allowed by the RFC, such as DES) can allow an adversary to read and even manipulate the data on the encrypted channel, thus circumventing countermeasures in place to prevent such attacks. Further, if the protocol is implemented with little-used or non-standard options, it may be compliant with the protocol specification but will not be able to interact with other, diverse equipment that is typically found in large enterprises. Even though the communication path is protected, there is a possibility that the IPsec peer could be duped into thinking that a malicious third- party user or system is the TOE. For instance, a middleman could intercept a connection request to the TOE, and respond to the request as if it were the TOE. In a similar manner, the TOE could also be duped into thinking that it is establishing communications with a legitimate IPsec peer when in fact it is not. An attacker could also mount a malicious man-in-the-middle-type of attack, in which an intermediate system is compromised, and the traffic is proxied, examined, and PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 7 Threat Name Threat Definition modified by this system. This attack can even be mounted via encrypted communication channels if appropriate countermeasures are not applied. These attacks are, in part, enabled by a malicious attacker capturing network traffic (for instance, an authentication session) and “playing back” that traffic in order to fool an endpoint into thinking it was communicating with a legitimate remote entity. T.USER_DATA_REUSE Data traversing the TOE could inadvertently be sent to a different user; since these data may be sensitive, this may cause a compromise that is unacceptable. The specific threat that must be addressed concerns user data that is retained by the TOE in the course of processing network traffic that could be inadvertently re-used in sending network traffic to a user other than that intended by the sender of the original network traffic. T.TSF_FAILURE Security mechanisms of the TOE generally build up from a primitive set of mechanisms (e.g., memory management, privileged modes of process execution) to more complex sets of mechanisms. Failure of the primitive mechanisms could lead to a compromise in more complex mechanisms, resulting in a compromise of the TSF. 4.3 Organizational Security Policies Table 3 shows the organizational security policies defined in the individual components of CFG_GPOS-VPNC_V1.3. Table 3: Organizational Security Policies OSP Name OSP Definition From PP_GPOS_V4.2.1 No OSPs defined in PP_GPOS_V4.2.1. From MOD_VPNC_V2.4 No OSPs defined in MOD_VPNC_V2.4. 4.4 Security Objectives Table 4 shows the security objectives for the TOE defined in the individual components of CFG_GPOS-VPNC_V1.3. Table 4: Security Objectives for the TOE TOE Security Objective TOE Security Objective Definition From PP_GPOS_V4.2.1 O.ACCOUNTABILITY Conformant OSes ensure that information exists that allows administrators to discover unintentional issues with the configuration and operation of the operating system and discover its cause. Gathering event information and immediately transmitting it to another system can also enable incident response in the event of system compromise. O.INTEGRITY Conformant OSes ensure the integrity of their update packages. OSes are seldom if ever shipped without errors, and the ability to deploy patches and updates with integrity is critical to enterprise network PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 8 TOE Security Objective TOE Security Objective Definition security. Conformant OSes provide execution environment-based mitigations that increase the cost to attackers by adding complexity to the task of compromising systems. O.MANAGEMENT To facilitate management by users and the enterprise, conformant OSes provide consistent and supported interfaces for their security- relevant configuration and maintenance. This includes the deployment of applications and application updates through the use of platform- supported deployment mechanisms and formats, as well as providing mechanisms for configuration and application execution control. O.PROTECTED_COMMS To address both passive (eavesdropping) and active (packet modification) network attack threats, conformant OSes provide mechanisms to create trusted channels for CSP and sensitive data. Both CSP and sensitive data should not be exposed outside of the platform. O.PROTECTED_STORAGE To address the issue of loss of confidentiality of credentials in the event of loss of physical control of the storage medium, conformant OSes provide data-at-rest protection for credentials. Conformant OSes also provide access controls which allow users to keep their files private from other users of the same system. From MOD_VPNC_V2.4 O.AUTHENTICATION To address the issues associated with unauthorized disclosure of information in transit, a compliant TOE’s authentication ability (IPsec) will allow the TSF to establish VPN connectivity with a remote VPN gateway or peer and ensure that any such connection attempt is both authenticated and authorized. O.CRYPTOGRAPHIC_FUNCTIONS To address the issues associated with unauthorized disclosure of information in transit, a compliant TOE will implement cryptographic capabilities. These capabilities are intended to maintain confidentiality and allow for detection and modification of data that is transmitted outside of the TOE. O.KNOWN_STATE The TOE will provide sufficient measures to ensure it is operating in a known state. At minimum this includes management functionality to allow the security functionality to be configured and self-test functionality that allows it to assert its own integrity. It may also include auditing functionality that can be used to determine the operational behavior of the TOE. O.NONDISCLOSURE To address the issues associated with unauthorized disclosure of information at rest, a compliant TOE will ensure that non-persistent data is purged when no longer needed. The TSF may also implement measures to protect against the disclosure of stored cryptographic keys and data through implementation of protected storage and secure erasure methods. The TOE may optionally also enforce split-tunneling prevention to ensure that data in transit cannot be disclosed inadvertently outside of the IPsec tunnel and prohibit transmission of packets through a connection until certain conditions are met. PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 9 Table 5 shows the security objectives for the Operational Environment defined in the individual components of CFG_GPOS-VPNC_V1.3. Table 5: Security Objectives for the Operational Environment Environmental Security Objective Environmental Security Objective Definition From PP_GPOS_V4.2.1 OE.PLATFORM The OS relies on being installed on trusted hardware. OE.PROPER_ADMIN The administrator of the OS is not careless, willfully negligent or hostile, and administers the OS within compliance of the applied enterprise security policy. OE.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the software within compliance of the applied enterprise security policy. Standard user accounts are provisioned in accordance with the least privilege model. Users requiring higher levels of access should have a separate account dedicated for that use. From MOD_VPNC_V2.4 OE.NO_TOE_BYPASS Information cannot flow onto the network to which the VPN client's host is connected without passing through the TOE. OE.PHYSICAL Physical security, commensurate with the value of the TOE and the data it contains, is assumed to be provided by the environment. OE.TRUSTED_CONFIG Personnel configuring the TOE and its operational environment will follow the applicable security configuration guidance. PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 10 5 Functional Requirements As indicated above, CFG_GPOS-VPNC_V1.3 includes both PP_GPOS_V4.2.1 and MOD_VPNC_V2.4. The functional requirements from PP_GPOS_V4.2.1 were evaluated separately so this section applies only to requirements of MOD_VPNC_V2.4. As indicated above, requirements in the MOD_VPNC_V2.4 are comprised of the “base” requirements and additional requirements that are optional (whether strictly optional, objective, or implementation-dependent) or selection-based. MOD_VPNC_V2.4 also modifies Base-PP requirements and defines additional requirements based on the Base-PP that is claimed. The following table defines the modified and additional requirements that apply to the TOE when PP_GPOS_V4.2.1 is the claimed Base-PP. Table 6: Base-PP Security Functional Requirements Requirement Class Requirement Component Verified By Modified when PP_GPOS_V4.2.1 is the Base-PP FCS: Cryptographic Support FCS_CKM.1: Cryptographic Key Generation Windows 21H2 et al FCS_CKM.2: Cryptographic Key Establishment Windows 21H2 et al FCS_COP.1/1: Cryptographic Operation (Encryption and Decryption) (identified in the Base- PP as FCS_COP.1(1) and in the ST as FCS_COP.1(SYM)) Windows 21H2 et al Additional when PP_GPOS_V4.2.1 is the Base-PP FCS: Cryptographic Support FCS_CKM_EXT.2: Cryptographic Key Storage Windows 21H2 et al FIA: Identification and Authentication FIA_X509_EXT.3: X.509 Certificate Use and Management Windows 21H2 et al FTP: Trusted Path/Channels FTP_ITC.1: Inter-TSF Trusted Channel Windows 21H2 et al Table 7 contains the “base” requirements defined in MOD_VPNC_V2.4 for all conformant TOEs regardless of Base-PP claims. Table 7: TOE Security Functional Requirements Requirement Class Requirement Component Verified By FCS: Cryptographic Support FCS_CKM.1/VPN: Cryptographic Key Generation (IKE) (identified in the ST as FCS_CKM.1(VPN)) Windows 21H2 et al FCS_IPSEC_EXT.1: IPsec Windows 21H2 et al FDP: User Data Protection FDP_RIP.2: Full Residual Information Protection Windows 21H2 et al FMT: Security Management FMT_SMF.1/VPN: Specification of Management Functions (VPN) (identified in the ST as FMT_SMF.1(VPN)) Windows 21H2 et al PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 11 Requirement Class Requirement Component Verified By FPT: Protection of the TSF FPT_TST_EXT.1/VPN: TSF Self-Test (identified in the ST as FPT_TST_EXT.1(IPSEC)) Windows 21H2 et al The following table contains the “Strictly Optional” requirements contained in Appendix A.1 of MOD_VPNC_V2.4, and an indication of how those requirements were evaluated (from the list in the Identification section above). If no completed evaluations have claimed a given optional requirement, the test laboratory has evaluated it through the completion of the relevant ACE work units and this VR indicates its verification through “Module Evaluation.” Table 8: Strictly Optional Requirements Requirement Class Requirement Component Verified By FIA: Identification and Authentication FIA_BMA_EXT.1: Biometric Activation Module evaluation FPF: Packet Filtering FPF_MFA_EXT.1: Multifactor Authentication Filtering Module evaluation The following table contains the “Objective” requirements contained in Appendix A.2 of MOD_VPNC_V2.4, and an indication of how those requirements were evaluated (from the list in the Identification section above). If no completed evaluations have claimed a given optional requirement, the test laboratory has evaluated it through the completion of the relevant ACE work units and this VR indicates its verification through “Module Evaluation.” Table 9: Objective Requirements Requirement Class Requirement Component Verified By FAU: Security Audit FAU_GEN.1/VPN: Audit Data Generation (identified in the ST as FAU_GEN.1(IPSEC)) Windows 21H2 et al FAU_SEL.1/VPN: Selective Audit (identified in the ST as FAU_SEL.1) Windows 21H2 et al The following table contains the “Implementation-Dependent” requirements contained in Appendix A.3 of MOD_VPNC_V2.4, and an indication of how those requirements were evaluated (from the list in the Identification section above). If no completed evaluations have claimed a given optional requirement, the test laboratory has evaluated it through the completion of the relevant ACE work units and this VR indicates its verification through “Module Evaluation.” Table 10: Implementation-Dependent Requirements Requirement Class Requirement Component Verified By FDP: User Data Protection FDP_VPN_EXT.1: Split Tunnel Protection Windows 21H2 et al The following table contains the “Selection-Based” requirements contained in Appendix B of MOD_VPNC_V2.4, and an indication of what evaluation those requirements were verified in (from the list in the Identification section above). If no completed evaluations have claimed a given selection-based requirement, the VR author has evaluated it through the completion of the relevant ACE work units and has indicated its verification through “Module Evaluation.” Table 11: Selection-Based Requirements PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 12 Requirement Class Requirement Component Verified By FCS: Cryptographic Support FCS_EAP_EXT.1: EAP-TLS Windows 21H2 et al FIA: Identification and Authentication FIA_HOTP_EXT.1: HMAC-Based One-Time Password Pre-Shared Keys Module evaluation FIA_PSK_EXT.1: Pre-Shared Key Composition Windows 21H2 et al FIA_PSK_EXT.2: Generated Pre-Shared Keys Windows 21H2 et al FIA_PSK_EXT.3: Password-Based Pre-Shared Keys Module evaluation FIA_PSK_EXT.4: HMAC-Based One-Time Password Pre-Shared Keys Support Module evaluation FIA_PSK_EXT.5: Time-Based One-Time Password Pre-Shared Keys Support Module evaluation FIA_TOTP_EXT.1: Time-Based One-Time Password Pre-Shared Keys Module evaluation PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 13 6 Assurance Requirements The PP-Configuration defines its security assurance requirements as those required by PP_GPOS_V4.2.1. The SARs defined in that PP are applicable to MOD_ VPNC_V2.4 as well as CFG_ GPOS-VPNC_V1.3 as a whole. PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 14 7 Results of the Evaluation The following is a summary of the evaluation results documented by the test laboratory in MS- W11-ACE Microsoft Windows 11, Microsoft Windows 10 (versions 20H2, 21H1, 21H2), Microsoft Windows Server, Microsoft Windows Server 2022, Microsoft Azure Stack HCIv2 version 21H2, Microsoft Azure Stack Hub and Microsoft Azure Stack Edge ACE Partial Report, Version 1.1, 29 July 2022. Table 12: Evaluation Results: MOD_VPNC_V2.4 ACE Requirement Evaluation Verdict Verified By ACE_INT.1 Pass Module Evaluation ACE_CCL.1 Pass Module Evaluation ACE_SPD.1 Pass Module Evaluation ACE_OBJ.1 Pass Module Evaluation ACE_ECD.1 Pass Module Evaluation ACE_REQ.1 Pass Module Evaluation Table 13: Evaluation Results: CFG_GPOS-VPNC_V1.3 ACE Requirement Evaluation Verdict Verified By ACE_MCO.1 Pass PP-Config Evaluation ACE_CCO.1 Pass PP-Config Evaluation PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 15 8 Glossary The following definitions are used throughout this document: • Common Criteria Testing Laboratory (CCTL). An IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the CCEVS Validation Body to conduct Common Criteria-based evaluations. • Conformance. The ability to demonstrate unambiguously that a given implementation is correct with respect to the formal model. • Evaluation. An IT product’s assessment against the Common Criteria using the Common Criteria Evaluation Methodology as the supplemental guidance, interprets it in the PP or PP- Module Evaluation Activities to determine whether the claims made are justified. • Evaluation Evidence. Any tangible resource (information) required from the sponsor or developer by the evaluator to perform one or more evaluation activities. • Target of Evaluation (TOE). A group of IT products configured as an IT system, or an IT product, and associated documentation that is the subject of a security evaluation under the CC. • Validation. The process the CCEVS Validation Body uses that leads to the issuance of a Common Criteria certificate. • Validation Body. A governmental organization responsible for carrying out validation and for overseeing the day-to-day operation of the NIAP Common Criteria Evaluation and Validation Scheme. PP-Configuration for General Purpose Operating Systems and Virtual Private Network (VPN) Clients, Version 1.3, Validation Report 14 October 2022 16 9 Bibliography The validation team used the following documents to produce this VR: [1] Common Criteria Project Sponsoring Organizations. Common Criteria for Information Technology Security Evaluation: Part 1: Introduction and General Model, Version 3.1, Revision 5, dated: April 2017. [2] Common Criteria Project Sponsoring Organizations. Common Criteria for Information Technology Security Evaluation: Part 2: Security Functional Requirements, Version 3.1, Revision 5, dated: April 2017. [3] Common Criteria Project Sponsoring Organizations. Common Criteria for Information Technology Security Evaluation: Part 3: Security Assurance Requirements, Version 3.1, Revision 5, dated: April 2017. [4] Common Criteria Project Sponsoring Organizations. Common Evaluation Methodology for Information Technology Security, Version 3.1, Revision 5, dated: April 2017. [5] CC and CEM addenda – Exact Conformance, Selection-Based SFRs, Optional SFRs, Version 0.5, dated: May 2017. [6] PP-Module for Virtual Private Network (VPN) Clients, Version 2.4, 31 March 2022. [7] Protection Profile for General Purpose Operating Systems, Version 4.2.1, 22 April 2019. [8] PP-Configuration for General Purpose Operating Systems and Virtual Private Network Clients, Version 1.3, 21 March 2022. [9] Microsoft Windows Common Criteria Evaluation, (Microsoft Windows 11, Microsoft Windows 10 (versions 20H2, 21H1, 21H2, Microsoft Windows Server, Microsoft Windows Server 2022, Microsoft Azure Stack HCIv2 version 21H2, Microsoft Azure Stack Hub, Microsoft Azure Stack Edge) Security Target, Version 0.03, 29 July 2022. [10] MS-W11-ACE Microsoft Windows 11, Microsoft Windows 10 (versions 20H2, 21H1, 21H2), Microsoft Windows Server, Microsoft Windows Server 2022, Microsoft Azure Stack HCIv2 version 21H2, Microsoft Azure Stack Hub and Microsoft Azure Stack Edge ACE Partial Report, Version 1.1, 29 July 2022.