ST Version Date January 24, 2011 Version 1-12

Size: px
Start display at page:

Download "ST Version Date January 24, 2011 Version 1-12"

Transcription

1 ST Version Date January 24, 2011 Version 1-12 SCAN S3 Security Manager Console Version 1.0 Release integrated with SCAN S3 Identity Services Infrastructure Version 1.0 and SCAN S3 Multi Authentication Version 1.0 Security Target Prepared for SCAN Associates Berhad Level 7, Menara Naluri, 161-B, Jalan Ampang, Kuala Lumpur By Teknimuda (M) Sdn Bhd Reference Number : S3-SMC-ST-V1-12

2 Table of Contents 1 SECURITY TARGET INTRODUCTION ST REFERENCE TOE REFERENCE TOE OVERVIEW Usage and Major Security Features of TOE TOE Type Non-TOE hardware/software/firmware TOE DESCRIPTION GENERAL OVERVIEW User Access Levels Scope and Boundaries of the TOE Acronyms CONFORMANCE CLAIM CC CONFORMANCE CLAIM PP CLAIM PACKAGE CLAIM CONFORMANCE RATIONALE SECURITY OBJECTIVES SECURITY OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT EXTENDED COMPONENTS DEFINITION SECURITY REQUIREMENTS SECURITY FUNCTIONAL REQUIREMENTS Class FAU: Security Audit Class FDP: User Data Protection Class FIA: Identification and Authentication Class FMT: Security Management Class FTA: TOE Access SECURITY ASSURANCE REQUIREMENTS TOE SUMMARY SPECIFICATION SUMMARY SPECIFICATION RATIONALE TOE SUMMARY SPECIFICATION Security Audit User Data Protection Identification and Authentication Security Management TOE Access S3-SMC-ST January 2011 PAGE 1 of 3 SCAN Associates Bhd, 2011

3 FIGURES FIGURE 1 : SCAN S3 OVERVIEW 4 FIGURE 2 : TOE FOR 8 TABLES TABLE 1: SERVERS USED WITH SCAN S3SMC-ISI-MA APPLICATION 7 TABLE 2: REQUIREMENTS ON CLIENT MACHINE 7 TABLE 3 : SECURITY OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT 15 TABLE 4 : TOE SECURITY FUNCTIONAL REQUIREMENTS 17 TABLE 5 : ADMINISTRATOR POLICY 21 TABLE 6 : TOE SECURITY ASSURANCE REQUIREMENTS: EAL1 25 TABLE 7 : MAPPING SECURITY FUNCTIONAL REQUIREMENTS TO SECURITY FUNCTIONS 26 S3-SMC-ST January 2011 PAGE 2 of 3 SCAN Associates Bhd, 2011

4 ST Version Change History Version Pages Affected Date Comments July 2010 First Issue August 2010 Second Issue Incorporate comments and feedback from clarification discussions and corrections of text as follows: a. Addition of TOE diagram b. Correction of attributes in SFRs c. Removed Security Objectives for TOE. d. Removed Security Problem Definition September September October October November November November 2010 Third Issue Incorporated alignment and corrections based on Evaluation Observation Report dated 8 September Fourth Issue Incorporated alignment and corrections based on Evaluation Observation Reports dated 17 September Further clarity provided that the SOFTCERT management is not part of the TOE. Only the assigned SOFTCERT certificate is used as-is for registration of new user ID and for user to login. Logs details listed in the TOE updated to confine to only those generatable or related to the TOE. TOE Type changed to Access Control Management. Fifth Issue Included ISI as part of TOE. Incorporated minor corrections raised in EOR3 dated 5 October Sixth Issue Incorporated minor corrections raised in EOR3 dated 20 October Seventh Issue Rephrased the TOE to include S3 SMC and S3 ISI and S3 MA. Eighth Issue Rephrased SFR statement for FMT_MSA.1 Ninth Issue Rephrased OE.AUTH & OE.TRAIN statements SCAN S3-SMC-ISI-MA ST January 2011 PAGE 1 of 30

5 November January January 2011 Tenth Issue Rename the TOE Title Eleventh Issue Fixed System and Software versioning Twelfth Issue Remove refinement for FTA_SSL and update document versioning Add note at table 4 to justify FPT_STM not included in the requirement. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 2 of 30

6 1 SECURITY TARGET INTRODUCTION 1.1 ST Reference This section provides ST control and identification information. ST Title: SCAN S3 Security Manager Console V1.0 Release integrated with SCAN S3 Identity Service Infrastructure V1.0 and SCAN S3 Multi Authentication V1.0 Security Target ST Version: 1-12 ST Date: January 24, 2011 ST Authors: CC Identification: Assurance Level: 1.2 TOE Reference A Fattah Yatim, Mohd Zahari Zakaria Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 3, July 2009 Evaluation Assurance Level 1 (EAL1) This section provides TOE control and identification information. TOE Identification: Development Tools: Java Java Servlet Java Applet JSP Eclipse Tortoise SVN SCAN S3 Security Manager Console Version 1.0 Release integrated with SCAN S3 Identity Service Infrastructure Version 1.0 and SCAN S3 Multi Authentication Version 1.0 Developer: SCAN Associates Bhd Level 7, Menara Naluri, 161-B Jalan Ampang Kuala Lumpur Malaysia SCAN S3-SMC-ISI-MA ST January 2011 PAGE 3 of 30

7 1.3 TOE Overview SCAN S3 Security Manager Console integrated with SCAN S3 Identity Service Infrastructure V1.0 and SCAN S3 Multi Authentication or for short, is the product developed by SCAN Associates Bhd to assist in designing, implementing and maintaining a coherent suite of processes and systems for effectively managing information accessibility. The simplified SCAN S3 setup is shown in the following figure: Figure 1 : SCAN S3 Overview The TOE is the SCAN S3 SMC, SCAN S3 ISI and SCAN S3 MA enclosed in the green boxes and in combination is referred to as. The SCAN S3 or SCAN Shared Security Services design principles are as follows: It is positioned as a platform and not designed to be stand alone; Completely Web Services implementation; Compliance to Malaysian Government s classified information handling handbook BlackBook ; Risk based authentication; Supports multiple authentication mechanisms; SCAN S3-SMC-ISI-MA ST January 2011 PAGE 4 of 30

8 PKI key is able to roam from system to system. The SCAN S3 or SCAN Shared Security Services comprises three components or services: a. SCAN S3 Identity Service Infrastructure or SCAN S3 ISI, b. SCAN S3 Multi Authentication or SCAN S3 MA and c. SCAN S3 Security Manager Console or SCAN S3 SMC The features of these are as follows: SCAN S3 Identity Service Infrastructure (ISI) Allows the PKI key (soft token) to roam from system to system Note that generation of PKI key is OUTSIDE of the SCAN S3. Also due to general requirement for PKI system, preferred implementation is to tie to a licensed CA for Digital Signature Act 1997 enforcement SCAN S3 Multi Authentication (MA) Supports multiple authentication mechanisms in a single system E.g. SMS token, PKI token, soft token, security question etc SCAN S3 Security Manager Console (SMC) Centralized administration of logon IDs Centralized policy configuration Centralized collection of logging of events. The SCAN S3 SMC V1.0 Release 14556, which is the first element of the TOE, is the security administration console to set up the user authorisation parameters, defining the users authentication mode as well as the workstation and risk policy. The SCAN S3 ISI V1.0 is used for roaming and will only be implemented if the client organisation requires roaming facility. Hence it is an optional implementation item. However for this ST, the SCAN S3 ISI is included. The authentication mode for a particular user will be obtained during login by the user where the SCAN S3 MA V1.0, the last element of the TOE, will obtain the necessary parameters from the SCAN S3 SMC server database. See figure 1 above. In this document the name SCAN S3 used on its own refers to the overall S3 application covering the three services mentioned above, whereas the name specifically refers to the SCAN S3 Security Manager Console, integrated with the SCAN S3 Identity Services Infrastructure and the SCAN S3 Multi Authentication, which is the TOE. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 5 of 30

9 1.3.1 Usage and Major Security Features of TOE SCAN S3 is a platform that consolidates various security services into a single enterprise-wide architecture. SCAN S3 helps to mitigate the security risks when implementing an Enterprise Application and e-services. In traditional implementations, clients or customers will need to have different accesses to different products or systems and the management of these separate application accesses can be an administrative burden. This also can lead to unnecessary exposure to security leakages if accesses to different systems that are linked or integrated are not implemented according to a consistent policy. With the multiple options or permutations available in the above implementation, the SCAN S3 SMC-ISI-MA enables the organization to manage the overall security through a single framework that enables the defining and assignment or implementation of the following security functions in one system: 1. Security Audit 2. User Data Protection 3. Identification, authentication and authorization 4. Security Management 5. TOE Access TOE Type The TOE type is Web Based Application for Access Control Management. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 6 of 30

10 1.3.3 Non-TOE hardware/software/firmware Server System Requirements Table 1: Servers Used with Application Type of Server Description Database server Application Server Preferred OS Hardware Requirements MySQL 5.0 Database Tomcat6.0 - Tomcat Application Server Enterprise Java Beans (EJB) Application server that hosts all the software and Application for the system component Centos5.0 or Windows 2003 Server SP2 Intel (R) Pentium (R) M Processor 1.60 GHz 220 MHz, 2.00 GB of RAM System and Software Requirements Table 2: Requirements on Client machine Item Minimum Requirements Operating Systems Windows XP Service Pack 2 Hardware Requirements Intel (R) Pentium (R) M Processor 1.60 GHz 220 MHz, 2.00 GB of RAM Web Browsers Mozilla Firefox [v 3.5], Internet Explorer [v 8.0], Google Chrome [v 8.0] Monitor Mouse/Pointing Device Dual Boot Systems Archive Utility Application Documentation SVGA - compatible display (256 or more colors recommended) with resolution of at least 1024 X 768 pixels Any pointing device with at least two buttons Installation of SMC application on dual-boot systems is not supported WinZip or equivalent Adobe Acrobat Reader 4 to read online PDF files. Java Requirement JRE Firmware None. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 7 of 30

11 Security Target Version TOE Description This section and subsections provide TOE description, starting with an overview of the SCAN S3 SMC-ISI-MA application features overall with further details in the subsequent sections. The SCAN S3 SMC-ISI-MA system is depicted in the following diagram with the TOE in the green dasheddashed lined box. Figure 2 : TOE For As identification, authorization and authentication are three important processes during user use login in the TOE, the he following is the description of the login process for the TOE which is only for the Staff functions with reference to Figure 2 (see also Section 1.5). Staff will login through an interface presented by an applet (Step ( 1B) which will facilitate the Identity Confirmation (Step 2A), Authorisation (Step ( 3) and Authentication (Step 4A) before confirming the Role (Step 5) and allowing the Staff to use the system according to his role (Step 6). The details of the steps are as follows: a. The login screen will be presented by the applet in the SCAN S3 SMC-ISI ISI-MA system (Path 1B). b. Upon entering the User ID, with roaming as the default option, the applet will Load the P12 certificate from the SOFTCERT database (steps 2A and 2B) (Third party CA system) which is located in the ISI server. REFERENCE ST VERSION DATE PAGE SCAN S3-SMC-ISI-MA ST January 2011 PAGE 8 of 30

12 c. The user is prompted to key in a PIN. When the correct PIN is entered, the Key Label field in the Login screen will be filled from the SOFTCERT that was decrypted by the correct PIN. This process verifies the identity of the user (Step 2A) as the correct owner of the P12 private key and certificates. d. The user will click the Submit button, following which the applet will get confirmation from the SCAN S3 SMC Database that the user is indeed registered in the SCAN S3 SMC database (Step 3) and get the authorization on what the user is allowed to do for authentication. Note the SCAN S3 SMC database is specifically for the SCAN S3 SMC environment. e. For Staff functions, the Staff is to be authenticated via the Multi Authentication service (Step 4A). This will present the digital signature (decrypted from SOFTCERT) to be verified with the certificate in the Certificate Storage (Step 4B). f. Upon successful authentication, the Staff s role will be verified through the SCAN S3 SMC database (Step 5). g. When the Staff role is obtained the Staff is able to carry out his functions in the SCAN S3 SMC environment in the red dotted box in Figure 2 (Path 6). Details on the screen buttons, i.e. Load, Submit and the fields i.e. User ID, PIN, Key Label, are illustrated in the User Manual. SOFTCERT P12 private key and certificate has been prepared and stored with the SCAN S3 ISI. Likewise the certificate for authentication in the SCAN S3 MA is also provided and stored with the SCAN S3 MA. Management and generation of P12 for identification and the certificate for authentication is not part of the TOE. 1.5 General overview is a system that provides centralized authentication and audit services for users to securely access different applications. It also provides centralized policy management services for administrators to manage policy of components. The roles which manage the functionalities within the TOE are: o o System Administrator Role that provides the administration of confined (in this TOE) to the management i.e. creation, update, delete of System Administrator ID and Log Administrator ID. Log Administrator Role which will allow the authorized administrators (Log Administrator) to view and generate audit reports User Access Levels In the documentation and system, the term Users are all registered users which includes actual end users of the SCAN S3 System as well as those with Staff or Administrator roles. Staff or Administrator is used to refer to the people registered in the system that perform the System Administrator role and the Log Administrator role in SCAN S3 SMC-ISI- MA. Hence the System Administrator role and the Log Administrator role are generally referred as Staff roles. This section describes the different users and / or user groups and the restrictions placed on the application accessibility. Users allowed to access the SCAN S3 SMC functions (in red dotted box in Figure 2) are limited to Log Administrator, System Administrator and Policy Manager. However, Policy Manager is not part of TOE scope. For the purpose of authorisation, all Users will be SCAN S3-SMC-ISI-MA ST January 2011 PAGE 9 of 30

13 compared with the SCAN S3 SMC database records to determine that the user is registered and hence authorised in the system. The use of User ID and PIN to access the soft token ensure that only identified and authorized users can access the. The term user used in the Security Functional Requirements Section 5.1 and TOE Summary Specifications Section 6 of this document therefore refers only to the System Administrator and Log Administrator roles System Administrator System administrator is one of the roles that use the application. The roles of system administrator include: Manage staff, Manage staff role, Manage user, Search user, Manage authentication method for users other than Staff roles Policy Manager (Not part of TOE scope) Log Administrator Policy manager is the second role that uses the application. The roles of policy manager include: Manage trusted configuration policy, Manage workstation policy, Manage bind workstation, Manage risk policy. Log Administrator is the last role that uses the application. The roles of log administrator include: Manage log covering o o o Manage transaction log, Manage security log, Manage error log. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 10 of 30

14 1.5.2 Scope and Boundaries of the TOE This section describes both physical and logical boundaries of the TOE Physical Boundaries The physical boundary of the Application is the physical location of the servers. The SCAN S3 SMC is a software that sits on a physical server with a database that will be central to the whole security enforcement. The database will contain registered users information and their profile, policy information and the logs. Table 1 in Section lists the base hardware and software on which the SCAN S3 SMC-ISI- MA application is implemented. The application which is the TOE comes in the form of two files to be installed or deployed: a. ISI-SecurityManagerConsole.war b. mfa.sql. There is no TOE hardware. Applications like or document management system (not part of ) will be connected to interface with the Multi Authentication (MA) server and/or the Identity Service Infrastructure (ISI) server. Application users will need to login through their application which will force the user to be authenticated through the SCAN S3 SMC database that would contain the user profile and that would generate the necessary signals to prompt the user to login with one of three authentication methods, depending on the risk level during login. After successful authentication, a set of risk policy will be enforced on the user activity (what he can do and must do and what he cannot do) depending on workstation ID (location or IP address) and workstation configuration. This is beyond the scope of the TOE but is indicated briefly here for completeness and perspective Logical scope The logical scope of the TOE are all those functions in the covering the management of the security which involves registering users and staff, defining and assigning access privileges, the functions of which are covered in the System Administrator role. The activities of the System Administrator are logged and the Log Administrator will be able to review the logged events. The security functions covered in the logical scope of the TOE are defined as follows: 1. Security Audit The security audit function ensures that all System Administrator activity pertaining to creation/update/delete of Administrator or Staff logon IDs as well as the assignment of Administrator or Staff roles is logged. This activitiy is captured in the Security Log. The Transaction Log and Error Log are also produced when the appropriate activity that trigger transaction records and error records respectively take place. The Transaction Log, Security Log and Error Log described in more detail in Section User Data Protection User data is protected by ensuring that specific Administrator roles assigned by the administrator can only access specific screens and hence the data associated with the screens. Roles not authorized to access certain screens not within their role will therefore will not even be able to see those screens. The access is governed by the Administrator SCAN S3-SMC-ISI-MA ST January 2011 PAGE 11 of 30

15 Policy. The Administrator Policy allows the Administrator with System Administrator role to create logon IDs with System Administrator or Log Administrator. 3. Identification, authentication and authorization All administrators and users must have a valid logon ID and administrator role to access the. Administrators and users must logon on to identify themselves to the application together with the prompted (one of up to three) authentication means in order for them to gain access. However, this ST and evaluated configuration only covers SOFTCERT authentication mean. 4. Security Management All administrators must have a valid logon ID and Staff role to access the SCAN S3 SMC- ISI-MA. Administrators must logon on to identify themselves to the application together with the SOFTCERT in order for them to gain access. The System Administrator can create logon IDs for both Staff role and users. For the assignment of Staff roles, the System Administrator can assign an ID with only one Staff role. The System Administrator can also set a default password for the Staff role or to reset the password for the Staff role. The Log Administrator is able to manage the three types of transaction logs listed in Section TOE Access If a login session has remained idle for 18 minutes, the application will prompt the user a reminder whether to continue or to logoff. The system will automatically log out after 20 minutes of idle and the user will have to re-login to access the application again Audit Trails As audit trails form a key part of the security function, the types of logs and details are provided here. The logging can be enabled or disabled by the Log Administrator. The Log Administrator will also be able to do housekeeping of the logs by purging or archiving records beyond a specified time window. provides 3 types of logging which captures the time, date and associated initiator of the record, i.e. user or system: 1. Transaction Log, 2. Security Log, 3. Error Log, All SCAN S3 components access logs interface to record the activities of the components. Logs management Console page will enable view and generation of logs reports. All logs are stored in the SCAN S3 SMC database. The three logs are generated by SCAN S3 events as a whole, which includes SCAN S3 SMC-ISI-MA, where applicable, Transaction Log Transaction logs records all the transaction performed by SCAN S3 services or object which are: SCAN S3-SMC-ISI-MA ST January 2011 PAGE 12 of 30

16 o Execute SCAN S3 Services ie SCAN S3 ISI Service Security Log Application would generate logs for security related events which are : o o o o All Login failures, Use of administrator accounts ie System Administrator, Log Administrator, Changes to administrator permissions or privileges, Creation/deletion/disabling/enabling of all (administration) accounts Error Log SCAN S3 uses an error log to record error information when an unexpected condition or failure is detected within the SCAN S3 code. Such unexpected conditions are: o SCAN S3 Service communication error, o Programming defects in SCAN S3 code, o SCAN S3 error log contains failure information eg exception. From the information administrator may detect or identify the cause of problems. SCAN S3 log entries contain the following details: o Id user Id/ workstation Id, o Date date and time of activities, o IP Address IP Address of the workstation/ server, o Level Client or server, o Authentication Method restricted to SOFTCERT, o Status Failure or success or error message Acronyms The following abbreviations from the Common Criteria are used in this Security Target: CC Common Criteria for Information Technology Security Evaluation EAL Evaluation Assurance Level IT Information Technology PP Protection Profile SF Security Function SFR Security Functional Requirement SFP Security Function Policy ST Security Target TOE Target of Evaluation TSF TOE Security Functions SCAN S3-SMC-ISI-MA ST January 2011 PAGE 13 of 30

17 2 CONFORMANCE CLAIM 2.1 CC Conformance Claim This TOE conforms to the following CC specifications: Common Criteria for Information Technology Security Evaluation Part 1: Introduction and General Model, Version 3.1 Revision 3, July Conform to Common Criteria for Information Technology Security Evaluation Part 2: Security Functional Requirements, Version 3.1 Revision 3, July 2009 and no extended claims. Conform to Common Criteria for Information Technology Security Evaluation Part 3: Security Assurance Requirements, Version 3.1 Revision 3, July 2009 and no extended claims. Evaluation Assurance Level 1 (EAL1) 2.2 PP Claim There is no PP Claim related to this ST. 2.3 Package Claim There ST claims a package for EAL Conformance Rationale As there is no PP Claim, the Conformance Rationale is not applicable. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 14 of 30

18 3 SECURITY OBJECTIVES 3.1 Security Objectives for the Operational Environment The security objectives countering security threats using the security policies enforced and the assumptions for the operational environment is described in Table 3. Table 3 : Security Objectives for The Operational Environment Name Description OE.AUTH OE.TRAIN OE.ENV Trusted users must be authorized by management before an ID and user role is being assigned for them to access and use the application in a secure manner. The operational environment shall ensure that all trusted TOE users receive appropriate training before allowing them to work with the TOE and follow the available guidance strictly; The operational environment will be secure and only logical access is allowed to the server. The application server is to be located in a secure area that is free from physical access to unauthorised parties. OE.INS The delivery and installation of the system will be made by authorized and trained personnel and the acceptance of the system will be made by the client based on predefined acceptance procedures. OE.TIME The operating system will provide reliable timestamp to the TOE. Note : This satisfies the reliable time stamp (FPT_STM.1) dependency required for FAU_GEN.1. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 15 of 30

19 4 EXTENDED COMPONENTS DEFINITION There is no extended component in this ST. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 16 of 30

20 5 SECURITY REQUIREMENTS 5.1 Security Functional Requirements The SFRs for the TOE are listed in Table 4. These requirements were derived from the CC Part 2 Security Functional Requirements. Table 4 : TOE Security Functional Requirements Security Functional Class Security Functional Components Dependency and Hierarchical Relationship Security Audit FAU User Data Protection FDP Identification and Authentication FIA Security Management FMT Note 1: TOE Access FTA FAU_GEN.1 Audit Data Generation. Dependent on FPT_STM.1 FAU_GEN.2 User Identity Association FAU_SAR.1 Audit review FAU_SAR.2 Restricted audit review FAU_SAR.3 Selectable audit review FDP_ACF.1 Security attribute based access control Dependent on FAU_GEN.1 and FIA_UID.1 Dependent on FAU_GEN.1 Dependent on FAU_SAR.1 Dependent on FAU_SAR.1 Dependent on FDP_ACC.1 and FMT_MSA.3 FDP_ACC.1 Subset access control Dependent on FDP_ACF.1 FIA_UAU.1 Timing of authentication Dependent on FIA_UID.1 FIA_UID.2 User identification before Hierarchical to FIA_UID.1 any action Timing of identification FMT_MSA.1 Management of Dependent on FDP_ACC.1 or security attributes FDP_IFC.1. FMT_MSA.3 Static attribute initialization FMT_SMF.1 Specification of Management Functions FMT_SMR.1 Security roles FTA_SSL.1 TSF-initiated session locking Dependent on FMT_SMR.1 and FMT_SMF.1 Dependent on FMT_MSA.1 and FMT_SMR.1 No dependency Dependency on FIA_UID.1 is covered by FIA_UID.2 Dependency on FIA_UAU.1 FIA_UID.2 is hierarchical to FIA_UID.1. FIA_UID.2 requires that a user be successfully authenticated via a valid logon ID and PIN before being able to do anything else. Hence FIA_UID.2 supersedes the need and covers the functions of FIA_UID.1. FPT_STM.1 is a dependency of FAU_GEN.1 that has not been included. Reliable time stamps are provided by the environment (OE.TIME). Time Stamps captured in TOE is derived from the operating system. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 17 of 30

21 Note 2 : The following conventions have been applied in this document: Security Functional Requirements Part 2 of the CC defines the approved set of operations that may be applied to functional requirements: assignment, selection, and iteration. 1. The refinement operation is used to add detail to a requirement, and thus further restricts a requirement. Refinement of security requirements is denoted by bold underline text in red color font for addition and strikethrough for deletion text in red color. 2. The selection operation is used to select one or more options provided by the CC in stating a requirement. Selections are denoted by italicized text in square brackets, [selection value] in red color font. 3. The assignment operation is used to assign a specific value to an unspecified parameter, such as the length of a password. Assignment is indicated by showing the value in square brackets, [assignment value] in red color font. 4. The iteration operation is used when a component is repeated with varying operations. Iteration is denoted by showing the iteration number in parenthesis following the component identifier, (iteration number) in red color font. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 18 of 30

22 5.1.1 Class FAU: Security Audit FAU_GEN.1 Audit data generation Hierarchical to: Dependencies: No other components. FPT_STM.1 Reliable time stamps FAU_GEN.1.1 FAU_GEN.1.2 The TSF shall be able to generate an audit record of the following auditable events: a) Start-up and shutdown of the audit functions; b) All auditable events for the [not specified] level of audit; and c) [events listed in audit trails section for Transaction Log, section for Security Log and section for Error Log ]. The TSF shall record within each audit record at least the following information: a) Date and time of the event, type of event, subject identity (if applicable), and the outcome (success or failure) of the event; and b) For each audit event type, based on the auditable event definitions of the functional components included in the PP/ST, [events listed in audit trails section for Transaction Log, section for Security Log and section for Error Log]. FAU_GEN.2 User identity association Hierarchical to: No other components. Dependencies: FAU_GEN.1 Audit data generation FIA_UID.1 Timing of identification FAU_GEN.2.1 For audit events resulting from actions of identified users, the TSF shall be able to associate each auditable event with the identity of the user that caused the event. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 19 of 30

23 FAU_SAR.1 Audit review FAU_SAR.1.1 FAU_SAR.1.2 Hierarchical to: No other components. Dependencies: FAU_GEN.1 Audit data generation This component will provide authorised users the capability to obtain and interpret the information. In case of human users this information needs to be in a human understandable presentation. In case of external IT entities the information needs to be unambiguously represented in an electronic fashion. The TSF shall provide [Log Administrator] with the capability to read [transaction log, security log and error log] from the audit records. The TSF shall provide the audit records in a manner suitable for the user to interpret the information. FAU_SAR.2 Restricted audit review FAU_SAR.2.1 Hierarchical to: Dependencies: No other components. FAU_SAR.1 Audit review The TSF shall prohibit all users read access to the audit records, except those users that have been granted explicit read-access. FAU_SAR.3 Selectable audit review FAU_SAR.3.1 Hierarchical to: No other components. Dependencies: FAU_SAR.1 Audit review The TSF shall provide the ability to apply [selection and ordering] of audit data based on [date range of event captured and/or ID specified]. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 20 of 30

24 5.1.2 Class FDP: User Data Protection FDP_ACF.1 Security attribute based access control FDP_ACF.1.1 FDP_ACF.1.2 FDP_ACF.1.3 FDP_ACF.1.4 Hierarchical to: Dependencies: No other components. FDP_ACC.1 Subset access control FMT_MSA.3 Static attribute initialisation The TSF shall enforce the [Administrator Policy] to objects based on the following: [System Administrator role and Log Administrator role]. The TSF shall enforce the following rules to determine if an operation among controlled subjects and controlled objects is allowed: [user must have a valid ID and role assigned and PIN to confirm the soft certificate ]. The TSF shall explicitly authorise access of subjects to objects based on the following additional rules: [none ]. The TSF shall explicitly deny access of subjects to objects based on the following additional rules: [none]. FDP_ACC.1 Subset access control Hierarchical to: No other components. Dependencies: FDP_ACF.1 Security attribute based access control FDP_ACC.1.1 The TSF shall enforce the [Administrator Policy shown in the table below] on [System Administrator role and Log Administrator role ]. Table 5 : Administrator Policy Subjects/Role System Administrator Log Administrator Operation Enabled to create, delete and update user particulars in user account and assign a user role. Enabled to view logs of all activities performed by users. The logs will have details on all activities including error and debug information. Enable to search of logs by date range. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 21 of 30

25 5.1.3 Class FIA: Identification and Authentication FIA_UAU.1 Timing of authentication FIA_UAU.1.1 FIA_UAU.1.2 Hierarchical to: Dependencies: No other components. FIA_UID.1 Timing of identification The TSF shall allow [ Soft certificate login authentication] on behalf of the user to be performed before the user is authenticated. The TSF shall require each user to be successfully authenticated before allowing any other TSF-mediated actions on behalf of that user. FIA_UID.2 User identification before any action FIA_UID.2.1 Hierarchical to: Dependencies: FIA_UID.1 Timing of identification No dependencies. The TSF shall require each user to be successfully identified before allowing any other TSF-mediated actions on behalf of that user. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 22 of 30

26 5.1.4 Class FMT: Security Management FMT_MSA.1 Management of security attributes Hierarchical to: Dependencies: No other components. FDP_ACC.1 Subset access control FMT_SMR.1 Security roles FMT_SMF.1 Specification of Management Functions FMT_MSA.1.1 The TSF shall enforce the [Administrator Policy] to restrict the ability to [create, modify, delete] the security attributes [user ID, password, role] to [System Administrator role]. FMT_MSA.3 Static attribute initialisation Hierarchical to: Dependencies: No other components. FMT_MSA.1 Management of security attributes FMT_SMR.1 Security roles FMT_MSA.3.1 The TSF shall enforce the [Administrator Policy] to provide [ restrictive] default values for security attributes that are used to enforce the SFP. FMT_MSA.3.2 The TSF shall allow the [System Administrator role] to specify alternative initial values to override the default values when an object or information is created. FMT_SMF.1 Specification of Management Functions Hierarchical to: Dependencies: No other components. No dependencies. FMT_SMF.1.1 The TSF shall be capable of performing the following management functions: [creation of user Ids, assigning administrator roles]. FMT_SMR.1 Security roles Hierarchical to: Dependencies: No other components. FIA_UID.1 Timing of identification FMT_SMR.1.1 The TSF shall maintain the roles [System Administrator role and Log Administrator role ]. FMT_SMR.1.2 The TSF shall be able to associate users with roles. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 23 of 30

27 5.1.5 Class FTA: TOE Access FTA_SSL.1 TSF-initiated session locking FTA_SSL.1.1 Hierarchical to: Dependencies: No other components. FIA_UAU.1 Timing of authentication The TSF shall lock an interactive session after [20 mins of user inactivity] by: a) clearing or overwriting display devices, making the current contents unreadable; b) disabling any activity of the user's data access/display devices other than unlocking the session. FTA_SSL.1.2 The TSF shall require the following events to occur prior to unlocking the session: [Re-login]. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 24 of 30

28 5.2 Security Assurance Requirements The security assurance components drawn from CC Part 3 Security Assurance Requirements EAL 1 are identified in Table 6. Table 6 : TOE Security Assurance Requirements: EAL1 Assurance Class ADV: Development AGD: Guidance documents ALC: Life-cycle support ASE: Security Target evaluation ATE: Tests AVA: Vulnerability assessment Assurance components ADV_FSP.1 Basic functional specification AGD_OPE.1 Operational user guidance AGD_PRE.1 Preparative procedures ALC_CMC.1 Labelling of the TOE ALC_CMS.1 TOE CM coverage ASE_CCL.1 Conformance claims ASE_ECD.1 Extended components definition ASE_INT.1 ST introduction ASE_OBJ.1 Security objectives for the operational environment ASE_REQ.1 Stated security requirements ASE_TSS.1 TOE summary specification ATE_IND.1 Independent testing conformance AVA_VAN.1 Vulnerability survey SCAN S3-SMC-ISI-MA ST January 2011 PAGE 25 of 30

29 6 TOE SUMMARY SPECIFICATION This Chapter presents a functional overview of the TOE; the security functions implemented by the TOE; and the Assurance Measures applied to ensure their correct implementation. 6.1 Summary Specification Rationale The TOE Summary Specification chapter describes every Security Function (SF) of the TOE, meeting the requirements of every SFR. Within the description of the SF, a rationale is provided. All the SFs are presented in Table 7; this table maps SFRs to SFs. This demonstrates that the Security Functions fulfil every SFR. Table 7 : Mapping Security Functional Requirements to Security Functions SFR SECURITY FUNCTIONS SECURITY AUDIT USER DATA PROTECTION IDENTIFICATION AND AUTHENTICATION SECURITY MANAGEMENT TOE ACCESS FAU_GEN.1 FAU_GEN.2 FAU_SAR.1 FAU_SAR.2 FAU_SAR.3 FDP_ACF.1 FDP_ACC.1 FIA_UAU.1 FIA_UID.2 FMT_MSA.1 FMT_MSA.3 FMT_SMF.1 FMT_SMR.1 FTA_SSL.1 X X X X X X X X X X X X X X SCAN S3-SMC-ISI-MA ST January 2011 PAGE 26 of 30

30 6.2 TOE Summary Specification This Section presents the security functions performed by the TOE to satisfy the identified SFRs in Section Security Audit FAU_GEN.1 Audit data generation Audit trail data as listed in section is generated for the Transaction Log, Error Log and Security Log. These would be sufficient for the Log Administrator to review and generate reports. The logging can be enabled or disabled by the Log Administrator. The Log Administrator will also be able to do housekeeping of the logs by purging or archiving records beyond a specified time window. The audit data generation function addresses this requirement. FAU_GEN.2 User Identity Association Audit trail data pertaining to Administrator activity and user login and logout are logged and associated with the respective user Ids. The audit data generation function addresses this requirement. FAU_SAR.1 Audit review Log Administrator is able to review audit records generated and follow up on any action to be taken. The audit review function addresses this requirement. FAU_SAR.2 Restricted audit review Review of audit records is restricted to Log Administrator only. The restricted audit review function addresses this requirement. FAU_SAR.3 Selectable audit review Log Administrator can select or filter audit records by date range to enable quick focus on records that may warrant attention. The selectable audit review function addresses this requirement. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 27 of 30

31 6.2.2 User Data Protection FDP_ACF.1 Security Attribute Based Access Control Access to the application functions is controlled by the user role assigned to the user. The user role must be assigned by the System Administrator upon approval through procedures outside of the application. This is controlled by the Administrator Policy. The user data protection function addresses this requirement. FDP_ACC.1 Subset Access Control Access to the application functions is controlled by the user role assigned to the user. The user role must be assigned by the System Administrator upon approval through procedures outside of the application. The user data protection function addresses this requirement Identification and Authentication FIA_UAU.1 Timing of Authentication To prevent unauthorized access to the TOE functions as well as reliable accountability for authorized administrator use of security functions, the require authorized administrators to perform authentication before they may access any of the TOE functions or data. Before authentication, the administrator will only see the login screen where he can key in his login ID, followed by the PIN to be entered to access the soft certificate. The security identification and authentication function addresses this requirement. FIA_UID.2 User Identification before any Action To prevent unauthorized access to the TOE functions as well as reliable accountability for authorized administrator (System Administrator and Log Administrator ) use of security functions, an authorized administrator has to identify and authenticate through a login interface before any action on the. When accessing the, the authorised administrator will be prompted for his/her login ID and soft certificate PIN for authentication purposes before any other action on the console. The security identification and authentication function addresses this requirement. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 28 of 30

32 6.2.4 Security Management FMT_MSA.1 Management of security attributes The administrator s assignment to a role has to be unique whereby different administrator are required for each role. Through the assignment of administrator roles by the System Administrator, the administrator is authorised and restricted to perform the appropriate functions of creation, update and delete of information within the appropriate role boundary. The functions for each role are as follows: a. System Administrator is also able to create, modify and delete Staff and User ID and Staff and User information. b. The Log Administrator is able to view and generate audit reports. The security management function addresses this requirement. FMT_MSA.3 Static attribute initialisation For initialization of, a default Login Id and soft certificate is provided to perform the creation of initial System Administrator. The System Administrator is responsible to create other administrator IDs. The default login needs to be deleted by the new System Administrator. The functions for each role are as follows: a. System Administrator is also able to create, modify and delete Staff and User ID and Staff and User information. b. The Log Administrator is able to view and generate audit reports. The security management function addresses this requirement. FMT_SMF.1 Specification of Management Functions The System Administrator is able to create and delete administrator Ids, modify administrator information and assign administrator roles as appropriate. An administrator can have only one role at a time. The functions are as follows: a. System Administrator is also able to create, modify and delete Staff and User ID and Staff and User information. b. The Log Administrator is able to view and generate audit reports. The security management function addresses this requirement. FMT_SMR.1 Security roles The System Administrator is able to assign administrator roles (System Administrator or Log Administrator as appropriate. An administrator can have only one role at a time. The security management function addresses this requirement. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 29 of 30

33 6.2.5 TOE Access FTA_SSL.1 Session locking When there is inactivity of a user session for up to 20 mins, the system will automatically prompt a reminder indicating session is almost expiring. User selects whether to end or proceed with the session. Upon ending the session, the user needs to re-login to access again. The TOE Access function addresses this requirement. SCAN S3-SMC-ISI-MA ST January 2011 PAGE 30 of 30

Dell EMC NetWorker 9.1

Dell EMC NetWorker 9.1 Dell EMC NetWorker 9.1 Evaluation Assurance Level (EAL): EAL2+ Doc No: 1986-000-D102 Version: 1.2 10 July 2017 EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada 1223 Michael

More information

MQAssure TM NetSignOn Secure Desktop Login

MQAssure TM NetSignOn Secure Desktop Login MQAssure TM NetSignOn Secure Desktop Login EAL 1 Security Target Version 1.7 Date: 08 February 2012 MAGNAQUEST SOLUTIONS SDN. BHD. Document History Version No. Date Revision Description 1.0 31 July 2010

More information

MecWise HR 3.1 (R1) (MecWise ehuman Resource) Security Target

MecWise HR 3.1 (R1) (MecWise ehuman Resource) Security Target MecWise HR 3.1 (R1) (MecWise ehuman Resource) Security Target Version 1.11 Date: 4 th September, 2010 Document Information This section describes the Security Target document history, briefly describes

More information

Security Target. Version 1.21

Security Target. Version 1.21 MQAssure /AppShield v1.2 integrated with MQAssure /IAM v1.0 Security Target 03 January, 2011 Prepared for MagnaQuest Solutions Sdn Bhd A-2-07 & A-2-09 SME Technopreneur Centre Cyberjaya 2270, Jalan Usahawan

More information

EMC VNXe1600 OE v3.1.3

EMC VNXe1600 OE v3.1.3 EMC VNXe1600 OE v3.1.3 Evaluation Assurance Level (EAL): EAL2+ Doc No: 1950-000-D102 Version: 0.7 18 March 2016 EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada 1223 Michael

More information

Dell EMC Unity OE v4.2

Dell EMC Unity OE v4.2 Dell EMC Unity OE v4.2 Evaluation Assurance Level (EAL): EAL2+ Doc No: 2009-000-D102 Version: 1.4 20 July 2017 EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada 1223 Michael

More information

Remote Communication Gate A

Remote Communication Gate A Page 1 of 41 Remote Communication Gate A Security Target Author: RICOH COMPANY, LTD. Date: 2010-09-27 Version: 1.00. This document is a translation of the evaluated and certified security target written

More information

Employee Express Security Module (EmplX Security Module) Security Target

Employee Express Security Module (EmplX Security Module) Security Target Employee Express Security Module (EmplX Security Module) Security Target Common Criteria: EAL2 Version 1.0 09 AUG 11 Document management Document identification Document ID Document title Document date/version

More information

Security Target. EMC ScaleIO v Evaluation Assurance Level (EAL): EAL2+ Doc No: D102 Version: February 2016.

Security Target. EMC ScaleIO v Evaluation Assurance Level (EAL): EAL2+ Doc No: D102 Version: February 2016. EMC ScaleIO v1.32.3 Security Target Evaluation Assurance Level (EAL): EAL2+ Doc No: 1903-000-D102 8 February 2016 Prepared For: EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada

More information

FED 5. Certification Report

FED 5. Certification Report KECS-CR-18-09 FED 5 Certification Report Certification No.: KECS-CISS-0858-2018 2018. 3. 27. IT Security Certification Center Certification Report Page 1 No. Date History of Creation and Revision Revised

More information

Market Central, Inc. Security Target

Market Central, Inc. Security Target SecureSwitch Fiber Optic Switch Models: 1:1, 2:1, 3:1, 4:1, 5:1, 6:1, 7:1 and 8:1 July 2016 Document prepared by Ark Infosec Labs Inc. www.arkinfosec.net Document History Version Date Author Description

More information

Security Target. EMC XtremIO v Evaluation Assurance Level (EAL): EAL2+ Doc No: D102 Version: March 2016.

Security Target. EMC XtremIO v Evaluation Assurance Level (EAL): EAL2+ Doc No: D102 Version: March 2016. EMC XtremIO v4.0.2 Security Target Evaluation Assurance Level (EAL): EAL2+ Doc No: 1906-000-D102 21 March 2016 Prepared For: EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada

More information

Secure MFP Protection Profile - Lite

Secure MFP Protection Profile - Lite Page 1 of 22 Secure MFP Protection Profile - Lite Author: Yusuke OHTA, Ricoh Company, Ltd. Date: 2004/04/13 Version: 1.0e Page 2 of 22 Revision History Version Date Author Description 1.0 2002/11/29 Yusuke

More information

Security Target. Document Version November 2015

Security Target. Document Version November 2015 Security Target McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.5 Document Version 1.2

More information

Security Target. packet filter 3.0.3

Security Target. packet filter 3.0.3 Version 1.0 packet filter 3.0.3 Authors: Christian Koob, Jörg Marx, secunet Security Networks AG Certification-ID: BSI-DSZ-CC-0595 HISTORY Version Date Change(s) Author(s) 1.0 16/08/2010 Version for evaluation

More information

IOGEAR Secure KVM Switch Series. Security Target

IOGEAR Secure KVM Switch Series. Security Target IOGEAR Secure KVM Switch Series Security Target Version 1.0 January 19, 2018 Prepared for: 15365 Barranca Pkwy, Irvine, CA 92618 Prepared by: Common Criteria Testing Laboratory 6841 Benjamin Franklin Drive,

More information

EMC Corporation ViPR Controller v Security Target. Evaluation Assurance Level (EAL): EAL 2+ Document Version: 0.10

EMC Corporation ViPR Controller v Security Target. Evaluation Assurance Level (EAL): EAL 2+ Document Version: 0.10 EMC Corporation ViPR Controller v2.1.0.3 Security Target Evaluation Assurance Level (EAL): EAL 2+ Document Version: 0.10 Prepared for: Prepared by: EMC Corporation 176 South Street Hopkinton, MA 01748

More information

PP INTRODUCTION (APE_INT)...

PP INTRODUCTION (APE_INT)... DT-T-MEP24-10002 Edic./Issue B PAG. 3 TABLE OF CONTENTS Título/Title Página/Page 0. PREFACE... 6 0.1 RELATED DOCUMENTS... 6 0.2 ACRONYMS AND DEFINITIONS... 6 0.2.1 Acronyms... 6 0.2.2 Definitions... 7

More information

Security Target. NetIQ Sentinel TM Version Document Version 1.4. November 6, Security Target: NetIQ Sentinel TM Version 7.0.

Security Target. NetIQ Sentinel TM Version Document Version 1.4. November 6, Security Target: NetIQ Sentinel TM Version 7.0. Security Target NetIQ Sentinel TM Version 7.0.1 Document Version 1.4 November 6, 2012 Document Version 1.4 NetIQ Corporation Page 1 of 41 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite

More information

NetIQ Sentinel 8.1 Security Target

NetIQ Sentinel 8.1 Security Target NetIQ Sentinel 8.1 Security Target Date: August 8, 2018 Version: 2.0 Prepared By: NetIQ Corporation Prepared For: NetIQ Corporation Suite 1200 515 Post Oak Blvd Houston, Texas 77027 Abstract This document

More information

Security Target. Juniper Networks vgw Series Version 5.5. Document Version 0.5. March 22, 2013

Security Target. Juniper Networks vgw Series Version 5.5. Document Version 0.5. March 22, 2013 Security Target Juniper Networks vgw Series Version 5.5 Document Version 0.5 March 22, 2013 Document Version 0.5 Juniper Networks Page 1 of 42 Prepared For: Prepared By: Juniper Networks, Inc. 1194 North

More information

NetIQ Sentinel Security Target. Abstract

NetIQ Sentinel Security Target. Abstract NetIQ Sentinel 7.2.1 Security Target Date: November 14 th, 2014 Version: 0.3 Prepared By: NetIQ Corporation Prepared For: NetIQ Corporation 515 Post Oak Blvd Suite 1200 Houston, Texas 77027 Abstract This

More information

Smart TV Security Solution V2.0. for Samsung Knox. Security Target V1.4

Smart TV Security Solution V2.0. for Samsung Knox. Security Target V1.4 Smart TV Security Solution V2.0 for Samsung Knox Security Target V1.4 SAMSUNG ELECTRONICS CO., Ltd. Document History VERSION DESCRIPTION OF CHANGE DATE 1.0 Initial version 2017. 08. 31 1.1 Change TOE Title

More information

SmartData v Security Target

SmartData v Security Target COMMERCIAL-IN-CONFIDENCE SmartData v1.4.0.0 Security Target Common Criteria: EAL2 Version 1.1 24-NOV-2014 Document management Document identification Document title SmartData v1.4.0.0 Security Target Document

More information

XPORTALNET HS SECURITY TARGET VERSION FEB-18

XPORTALNET HS SECURITY TARGET VERSION FEB-18 XPORTALNET HS SECURITY TARGET VERSION 1.0 10-FEB-18 Document management Document identification Document ID Document title Document Version/Date MicroEngine_EAL2_ST xportalnet HS Security Target Version

More information

Symantec Data Loss Prevention 14.5

Symantec Data Loss Prevention 14.5 Symantec Data Loss Prevention 14.5 Evaluation Assurance Level (EAL): EAL2+ Doc No: 1943-000-D102 Version: 1.2 15 November 2016 Symantec Corporation 303 2 nd Street 1000N San Francisco, CA 94107 United

More information

BMC Software, PATROL Perform/Predict, Version Security Target

BMC Software, PATROL Perform/Predict, Version Security Target , PATROL Perform/Predict, Version 6.5.30 Security Target Version 1.0 March 15, 2002 Prepared for:, Inc. 2101 City West Boulevard Houston, TX 77042 Prepared by: Computer Sciences Corporation 132 National

More information

Samsung Smart TV Security. Solution GAIA V1.0. Security Target V1.5

Samsung Smart TV Security. Solution GAIA V1.0. Security Target V1.5 Samsung Smart TV Security Solution GAIA V1.0 Security Target V1.5 SAMSUNG ELECTRONICS CO., Ltd. Document History VERSION DESCRIPTION OF CHANGE DATE 1.0 Initial version 2015. 09. 04 1.1 TOE Scope Change

More information

McAfee Web Gateway Version EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.4.2.5 EAL 2 + ALC_FLR.2 Release Date: 19 November 2014 Version: 1.4 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document

More information

Security Target. Symantec Brightmail Gateway Document Version 1.4. December 23, Security Target: Symantec Brightmail Gateway 9.0.

Security Target. Symantec Brightmail Gateway Document Version 1.4. December 23, Security Target: Symantec Brightmail Gateway 9.0. Security Target Symantec Brightmail Gateway 9.0.1 Document Version 1.4 December 23, 2010 Document Version 1.4 Symantec Page 1 of 36 Prepared For: Prepared By: Symantec Corporation 350 Ellis Street Mountain

More information

CERTIFICATION REPORT

CERTIFICATION REPORT REF: 2015-32-INF-1640 v1 Target: Expediente Date: 26.05.2016 Created by: CERT10 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2015-32 CCN-TP-PP Applicant: Centro Criptológico Nacional

More information

Smart TV Security Solution V2.0 for Samsung Knox. Certification Report

Smart TV Security Solution V2.0 for Samsung Knox. Certification Report KECS-CR-17-82 Smart TV Security Solution V2.0 for Samsung Knox Certification Report Certification No.: KECS-CISS-0846-2017 2017. 12. 27 IT Security Certification Center History of Creation and Revision

More information

LOCKSWITCH BLUETOOTH ACCESS CONTROL SYSTEM SECURITY TARGET VERSION JULY-17

LOCKSWITCH BLUETOOTH ACCESS CONTROL SYSTEM SECURITY TARGET VERSION JULY-17 LOCKSWITCH BLUETOOTH ACCESS CONTROL SYSTEM SECURITY TARGET VERSION 1.0 10-JULY-17 Document management Document identification Document ID Document title Document Version/Date Lockswitch_EAL2_ST Lockswitch

More information

FED 5 Security Target Lite 1.5

FED 5 Security Target Lite 1.5 FED 5 Security Target Lite 1.5 1 Revision history Document subject FED 5 Security Target Configuration document no. Version Details Created by Date revised Reviewed by FED5_ST_1.0 1.0 Initial version Yang

More information

Smart TV Security Solution V3.0 for Samsung Knox. Certification Report

Smart TV Security Solution V3.0 for Samsung Knox. Certification Report KECS-CR-18-54 Smart TV Security Solution V3.0 for Samsung Knox Certification Report Certification No.: KECS-CISS-0903-2018 2018. 11. 8 IT Security Certification Center History of Creation and Revision

More information

Mobiledesk VPN v1.0 Certification Report

Mobiledesk VPN v1.0 Certification Report KECS-CR-11-64 Mobiledesk VPN v1.0 Certification Report Certification No.: KECS-NISS-0356-2011 2011. 12. 29 IT Security Certification Center History of Creation and Revision No. Date Revised Pages 00 2011.12.29

More information

RICOH Remote Communication Gate A2 Security Target

RICOH Remote Communication Gate A2 Security Target RICOH Remote Communication Gate A2 Security Target Author : RICOH Date : 2016-11-10 Version : 0.42 This document is a translation of the evaluated and certified security target written in Japanese. Page

More information

ideras Security Target

ideras Security Target ideras Security Target Document Version: v1.3 Document Date:18 October 2013 Company Infosys Gateway SdnBhd Unit 808, 8 th Floor, Block E, PusatDaganganPhileo, Damansara 1, No. 9, Jalan 16/11, Off JalanDamansara

More information

Valari Security Target

Valari Security Target Web Application Firewall Valari Security Target Document Version: 0.5 Document Date: 25-Sep-17 Company Kaapagam Technologies Sdn. Bhd. (1015448-T) A-5-10 Empire Tower SS16/1, Subang Jaya 47500, Selangor,

More information

NWAS Java 7.02 Security Target

NWAS Java 7.02 Security Target NWAS Java 7.02 Security Target Version 1.16 2010-12-20 Table of Content: 2010-12-20... 1 1 ST Introduction... 4 1.1 ST and TOE Identification... 4 1.2 TOE Overview... 5 1.3 TOE Description... 5 1.3.1 Product

More information

EMC Corporation EMC ControlCenter 5.2 Service Pack 5. Security Target

EMC Corporation EMC ControlCenter 5.2 Service Pack 5. Security Target EMC Corporation EMC ControlCenter 5.2 Service Pack 5 Security Target Evaluation Assurance Level: EAL2+ Document Version: 1.01 Prepared for: Prepared by: EMC Corporation Corsec Security, Inc. 176 South

More information

Security Target for Huawei OceanStor T&SX900 Series Storage System Software

Security Target for Huawei OceanStor T&SX900 Series Storage System Software Security Target for Huawei OceanStor T&SX900 Series Storage System Software Version 3.5 Date 2015-08-13 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced

More information

imanager U2000 Security Target Version: 1.6 Last Update: Author: Huawei Technologies Co., Ltd.

imanager U2000 Security Target Version: 1.6 Last Update: Author: Huawei Technologies Co., Ltd. imanager U2000 Security Target Version: 1.6 Last Update: 2014-12-04 Author: Huawei Technologies Co., Ltd. Table of contents Table of Contents IMANAGER U2000 SECURITY TARGET... 1 Author... 5 1 INTRODUCTION...

More information

CC Part 3 and the CEM Security Assurance and Evaluation Methodology. Su-en Yek Australasian CC Scheme

CC Part 3 and the CEM Security Assurance and Evaluation Methodology. Su-en Yek Australasian CC Scheme CC Part 3 and the CEM Security Assurance and Evaluation Methodology Su-en Yek Australasian CC Scheme What This Tutorial Is An explanation of where Security Assurance Requirements fit in the CC evaluation

More information

Computer Associates. Security Target V2.0

Computer Associates. Security Target V2.0 Computer Associates etrust Single Sign-On V7.0 Security Target V2.0 October 20, 2005 Suite 5200 West 7925 Jones Branch Drive McLean, VA 22102-3321 703 848-0883 Fax 703 848-0985 SECTION TABLE OF CONTENTS

More information

webmethods Fabric 6.5 EAL2 Common Criteria Evaluation Security Target V December 2005

webmethods Fabric 6.5 EAL2 Common Criteria Evaluation Security Target V December 2005 webmethods Fabric 6.5 EAL2 Common Criteria Evaluation Security Target V1.0 12 December 2005 Prepared for: webmethods, Inc. 3877 Fairfax Ridge Road, Fairfax, VA 22030 http://www.webmethods.com/ Unclassified

More information

Version Symantec. Page 1 of 33

Version Symantec. Page 1 of 33 Security Target: Symantec Risk Automation Suite Version 4.0..5 Security Target Symantec Risk Automation Suite Version 4.0.5 Document Version 1.2 February 9, 2011 Document Version 1.2 Symantec Page 1 of

More information

EMC Corporation EMC VNXe OE v3.1.1 with Unisphere and VNXe3200 Hardware

EMC Corporation EMC VNXe OE v3.1.1 with Unisphere and VNXe3200 Hardware EMC Corporation EMC VNXe OE v3.1.1 with Unisphere and VNXe3200 Hardware Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 1.2 Prepared for: Prepared by: EMC Corporation 176 South

More information

ATEN/IOGear Secure KVM Switch Series Security Target

ATEN/IOGear Secure KVM Switch Series Security Target ATEN/IOGear Secure KVM Switch Series Security Target File Name: ATEN&IOGear Secure KVM Switch Series Security Target.DOC Version: 1.5.1 Date: 2011/06/28 Author: ATEN Contents 1 ST Introduction... 2 1.1

More information

PSTfile. Security Target Lite. Revision 3.1

PSTfile. Security Target Lite. Revision 3.1 PSTfile Security Target Lite Revision 3.1 Copyright 2013 Autek Ingeniería. All rights reserved. No part of this document may be reproduced, even for personal use, by any means and in any form, whether

More information

Protection Profile for Server Virtualization

Protection Profile for Server Virtualization Protection Profile for Server Virtualization 14 September 2015 Version 1.1 i 0 Preface 0.1 Objectives of Document This document presents the Common Criteria (CC) Protection Profile (PP) to express the

More information

EMC Corporation EMC Smarts Service Assurance Management (SAM) Suite and Internet Protocol (IP) Management Suite

EMC Corporation EMC Smarts Service Assurance Management (SAM) Suite and Internet Protocol (IP) Management Suite EMC Corporation EMC Smarts Service Assurance Management (SAM) Suite and Internet Protocol (IP) Management Suite 6.5.1 Security Target Evaluation Assurance Level: EAL2 Document Version: 0.6 Prepared for:

More information

CA Siteminder Web Access Manager R12 SP1-CR3 Security Target

CA Siteminder Web Access Manager R12 SP1-CR3 Security Target CA Siteminder Web Access Manager R12 SP1-CR3 Security Target Version 0.8 May 29, 2009 Prepared for: CA 100 Staples Drive Framingham, MA 01702 Prepared by: Booz Allen Hamilton Common Criteria Testing Laboratory

More information

Security Target FORT FOX HARDWARE DATA DIODE. Common Criteria FFHDD EAL7+ Classification PUBLIC

Security Target FORT FOX HARDWARE DATA DIODE. Common Criteria FFHDD EAL7+ Classification PUBLIC FORT FOX HARDWARE DATA DIODE Security Target Common Criteria FFHDD EAL7+ Classification PUBLIC Component: ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2 Project no./ref. no.

More information

Security Target for Juniper Networks M Series Multiservice Edge Routers, MX Series Ethernet Services Routers, T Series

Security Target for Juniper Networks M Series Multiservice Edge Routers, MX Series Ethernet Services Routers, T Series Security Target for Juniper Networks M Series Multiservice Edge Routers, MX Series Ethernet Services Routers, T Series Core Routers and EX Series Ethernet Switches running JUNOS 10.0R3.10 Version 1.3 October

More information

Blancco File Eraser Security Target. For the Common Criteria Certification of Blancco File Eraser Version

Blancco File Eraser Security Target. For the Common Criteria Certification of Blancco File Eraser Version Blancco File Eraser Security Target For the Common Criteria Certification of Blancco File Eraser Version 2.0 www.blancco.com Table of Content 1 Security Target Introduction... 3 1.1 ST Reference... 3 1.2

More information

Tivoli Provisioning Manager Security Target. Version:

Tivoli Provisioning Manager Security Target. Version: Version: Status: Last Update: Classification: 1.7 Released 2008-12-18 public Trademarks IBM and the IBM logo are trademarks or registered trademarks of International Business Machines Corporation in the

More information

Microsoft SQL Server TM 2005 SP1 Database Engine Common Criteria Evaluation Security Target SQL Server 2005 Team

Microsoft SQL Server TM 2005 SP1 Database Engine Common Criteria Evaluation Security Target SQL Server 2005 Team Microsoft SQL Server TM 2005 SP1 Database Engine Common Criteria Evaluation Security Target SQL Server 2005 Team Author: Roger French Status: Final Version: 1.4 Last Saved: 2007-01-23 File Name: MS_SQL_ST_EAL1_1.4

More information

HP StorageWorks P9000 Command View Advanced Edition Software Common Component

HP StorageWorks P9000 Command View Advanced Edition Software Common Component HP StorageWorks P9000 Command View Advanced Edition Software Common Component Security Target April 8, 2011 Version 1.03 Hewlett-Packard Company This document is a translation of the evaluated and certified

More information

Riverbed Technology. Security Target

Riverbed Technology. Security Target Riverbed Technology Riverbed SteelHead C with RiOS 9.1.4 December 2016 199 Fremont Street San Francisco, CA 94105 Phone: (415) 247-8801 http://www.riverbed.com Document prepared by: Document prepared for:

More information

Taiwan Name Plate Co., Ltd. (TNP).

Taiwan Name Plate Co., Ltd. (TNP). Taiwan Name Plate Co., Ltd.- Design Document Taiwan Name Plate Co., Ltd. (TNP). TNP ECC2 CPU Card Security Target Version 1.0.1 Revision History Revision Author Date Modification V0.7 Ingram Chang 20/08/2013

More information

Firewall Protection Profile V2.0 Certification Report

Firewall Protection Profile V2.0 Certification Report KECS-CR-08-10 Firewall Protection Profile V2.0 Certification Report Certification No. : KECS-PP-0093-2008 Apr, 2008 National Intelligence Service IT Security Certification Center This document is the certification

More information

Certification Report

Certification Report Certification Report Symantec Security Information Manager 4.8.1 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government

More information

THALES COMMUNICATIONS S. A. INTERNAL COMMUNICATIONS MANAGEMENT SYSTEM

THALES COMMUNICATIONS S. A. INTERNAL COMMUNICATIONS MANAGEMENT SYSTEM THALES COMMUNICATIONS S. A. SECURITY TARGET INTERNAL COMMUNICATIONS MANAGEMENT SYSTEM Prepared by: IBM Global Services CLEF IBM UK Ltd Meudon House Meudon Avenue Farnborough Hampshire GU14 7NB Date: 23

More information

etrust Admin V8.0 Security Target V2.3 Computer Associates 6150 Oak Tree Blvd, Suite 100 Park Center Plaza II Independence, OH 44131

etrust Admin V8.0 Security Target V2.3 Computer Associates 6150 Oak Tree Blvd, Suite 100 Park Center Plaza II Independence, OH 44131 etrust Admin V8.0 Security Target V2.3 February 2, 2006 Prepared for: Computer Associates 6150 Oak Tree Blvd, Suite 100 Park Center Plaza II Independence, OH 44131 Suite 5200 7925 Jones Branch Drive McLean,

More information

EpsonNet ID Print Authentication Print Module Security Target Ver1.11

EpsonNet ID Print Authentication Print Module Security Target Ver1.11 EpsonNet ID Print Print Module Security Target Version 1.11 2008-06-24 SEIKO EPSON CORPORATION This document is a translation of the evaluated and certified security target written in Japanese. SEIKO EPSON

More information

Apple Computer Mac OS X v and Mac OS X Server v Security Target

Apple Computer Mac OS X v and Mac OS X Server v Security Target 1. Apple Computer Mac OS v10.3.6 and Mac OS Server v10.3.6 Security Target Prepared for: Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014 Prepared By: Science Applications International Corporation

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Protection Profile for IPsec Virtual Private Network (VPN) Clients, Version 1.1 Report Number:

More information

Certification Report

Certification Report Certification Report Security Intelligence Platform 4.0.5 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of

More information

AhnLab TrusGuard V2.2 Certification Report

AhnLab TrusGuard V2.2 Certification Report KECS-CR-13-28 AhnLab TrusGuard V2.2 Certification Report Certification No.: KECS-NISS-0459-2013 2013. 8. 12 IT Security Certification Center History of Creation and Revision No. Date Revised Pages 00 2013.8.12

More information

DBMS PP Extended Package Access History (DBMS PP_EP_AH) Version 1.02

DBMS PP Extended Package Access History (DBMS PP_EP_AH) Version 1.02 DBMS Working Group Technical Community March 23 rd, 2017 DBMS PP Extended Package Access History (DBMS PP_EP_AH) Version 1.02 BSI Revision History Version Date Description 1.0 November xx, 2016 Instantiation

More information

Sterling Commerce, Inc. Connect:Direct with Secure+ Option. v4.5 on IBM OS/390 and z/os

Sterling Commerce, Inc. Connect:Direct with Secure+ Option. v4.5 on IBM OS/390 and z/os Connect:Direct with Secure+ Option v4.5 on IBM OS/390 and z/os Document Version 0.1 Prepared for: 750 W. John Carpenter Freeway Irving, TX 75039 Prepared by: Corsec Security, Inc. 10340 Democracy Lane,

More information

THALES COMMUNICATIONS S. A. EXTERNAL COMMUNICATIONS MANAGEMENT SYSTEM

THALES COMMUNICATIONS S. A. EXTERNAL COMMUNICATIONS MANAGEMENT SYSTEM THALES COMMUNICATIONS S. A. SECURITY TARGET ETERNAL COMMUNICATIONS MANAGEMENT SYSTEM Prepared by: IBM Global Services CLEF IBM UK Ltd Meudon House Meudon Avenue Farnborough Hampshire GU14 7NB Date: 15

More information

StillSecure VAM V5.5. Security Target V1.6

StillSecure VAM V5.5. Security Target V1.6 StillSecure VAM V5.5 Security Target V1.6 December 13, 2006 Developed by Suite 5200 West 7925 Jones Branch Drive McLean, VA 22102-3321 703 848-0883 Fax 703 848-0960 SECTION TABLE OF CONTENTS PAGE 1 SECURITY

More information

Kaseya International Limited Virtual System Administrator v Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1.

Kaseya International Limited Virtual System Administrator v Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1. Kaseya International Limited Virtual System Administrator v6.2.1.0 Security Target Evaluation Assurance Level: EAL2+ Document Version: 1.1 Prepared for: Prepared by: Kaseya International Limited Avenue

More information

Hewlett-Packard. Network Node Manager Advanced Edition Software v7.51 with patch PHSS_ Security Target V 1.13

Hewlett-Packard. Network Node Manager Advanced Edition Software v7.51 with patch PHSS_ Security Target V 1.13 Hewlett-Packard Network Node Manager Advanced Edition Software v7.51 with patch PHSS_35278. Security Target V 1.13 Prepared for Hewlett-Packard January 11, 2007 By Suite 5200 7925 Jones Branch Drive McLean,

More information

Juniper Networks J-Series Family of Service Routers running JUNOS 7.3R2.14 Security Target

Juniper Networks J-Series Family of Service Routers running JUNOS 7.3R2.14 Security Target Juniper Networks J-Series Family of Service Routers running JUNOS 7.3R2.14 Security Target Version 1.0 April 3, 2006 Prepared for: Juniper Networks 1194 North Mathilda Avenue Sunnyvale, California 94089

More information

Protection Profile for Virtualization Extended Package Server Virtualization. Version: National Information Assurance Partnership

Protection Profile for Virtualization Extended Package Server Virtualization. Version: National Information Assurance Partnership Protection Profile for Virtualization Extended Package Server Virtualization Version: 1.0 2016-11-17 National Information Assurance Partnership 1 Revision History Version Date Comment v1.0 2016-11-17 Initial

More information

qcrypt-xstream R1.1 Security Target Common Criteria: EAL2

qcrypt-xstream R1.1 Security Target Common Criteria: EAL2 COMMERCIAL-IN-CONFIDENCE qcrypt-xstream R1.1 Security Target Common Criteria: EAL2 Document Revision: 1.0 Document ID: 0001363 Document Date: 16-Mar-15 Document Information Document identification Document

More information

Protection Profile for Virtualization Extended Package Client Virtualization. Version: National Information Assurance Partnership

Protection Profile for Virtualization Extended Package Client Virtualization. Version: National Information Assurance Partnership Protection Profile for Virtualization Extended Package Client Virtualization Version: 1.0 2016-11-17 National Information Assurance Partnership 1 Revision History Version Date Comment v1.0 2016-11-17 Initial

More information

Tarantella Enterprise 3 Security Target

Tarantella Enterprise 3 Security Target Tarantella Enterprise 3 Security Target Issue : 2.4 Date : Status : Definitive Release Document reference : Distribution : Prepared by : Robert Allison & Hugh Griffin... Reviewed by : Steve Hill... Authorised

More information

Electronic Health Card Terminal (ehct)

Electronic Health Card Terminal (ehct) Common Criteria Protection Profile Electronic Health Card Terminal (ehct) BSI-CC-PP-0032 Approved by the Federal Ministry of Health Foreword This Protection Profile - Protection Profile electronic Health

More information

BMC CONTROL-SA Security Target

BMC CONTROL-SA Security Target BMC CONTROL-SA Security Target Version 1.0 8 July 2005 Prepared for: BMC Software, Inc. 2101 City West Boulevard Houston, T 77042 Prepared By: Science Applications International Corporation Common Criteria

More information

Brocade Communications Systems, Inc. Brocade FastIron ICX Series Switch/Router Security Target

Brocade Communications Systems, Inc. Brocade FastIron ICX Series Switch/Router Security Target Brocade Communications Systems, Inc. Brocade FastIron ICX Series Switch/Router 08.0.40 Security Target Version 0.6 January 15, 2016 Prepared for: Brocade Communications Systems, Inc. 130 Holger Way San

More information

Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific. Security Target

Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific. Security Target あ Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific Security Target Version 1.0.9 This document is a translation of the evaluated and certified security target written in Japanese

More information

Certification Report

Certification Report Certification Report McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 Issued by: Communications

More information

Version 1.0 January 13, Prepared for: Juniper Networks 1194 North Mathilda Avenue Sunnyvale California USA. Prepared by: IconSecurity Ltd

Version 1.0 January 13, Prepared for: Juniper Networks 1194 North Mathilda Avenue Sunnyvale California USA. Prepared by: IconSecurity Ltd Security Target for Juniper Networks M7i, M10i, M40e, M120, M320, T320, T640, T1600, MX240, MX480 and MX960 Services Routers and EX3200, EX4200 Switches running JUNOS 9.3R1 Version 1.0 January 13, 2009

More information

Avocent Cybex SwitchView SC Series Switches Security Target

Avocent Cybex SwitchView SC Series Switches Security Target Avocent Cybex SwitchView SC Series Switches Security Target Document Version 7.0 Revision 1.1 July 5, 2011 Prepared by: Avocent Corporation 4991 Corporate Drive Huntsville, Alabama, 35805-6201 Computer

More information

Security Target lite. for Mobile FeliCa Applet. on SkySIM CX Virgo platform

Security Target lite. for Mobile FeliCa Applet. on SkySIM CX Virgo platform Security Target lite for Mobile FeliCa Applet on SkySIM CX Virgo platform Version 1.31 Public No. MAP01-ASEP01-E01-31 FeliCa Networks, Inc i Introduction This document is the Security Target for CC evaluation

More information

ForeScout ActiveScout / CounterACT Security Target

ForeScout ActiveScout / CounterACT Security Target ForeScout ActiveScout / CounterACT Security Target Version 2.4 26 June 2005 REF: ST PREPARED FOR: ForeScout Technologies, Inc. 10001 N. De Anza Blvd. Cupertino, CA 95014 DOCUMENT CONTROL DOCUMENT HISTORY

More information

Network Intrusion Prevention System Protection Profile V1.1 Certification Report

Network Intrusion Prevention System Protection Profile V1.1 Certification Report KECS-CR-2005-04 Network Intrusion Prevention System Protection Profile V1.1 Certification Report Certification No. : CC-20-2005.12 12, 2005 National Intelligence Service This document is the certification

More information

Xerox WorkCentre 5030/5050 Multifunction Systems. Security Target

Xerox WorkCentre 5030/5050 Multifunction Systems. Security Target Multifunction Systems Security Target Version 1.0 Prepared by: Xerox Corporation Computer Sciences Corporation (US) 1350 Jefferson Road 7231 Parkway Drive Rochester, New York 14623 Hanover, Maryland 21076

More information

CREDANT Mobile Guardian (CMG) Enterprise Edition Version SP4 Security Target

CREDANT Mobile Guardian (CMG) Enterprise Edition Version SP4 Security Target CREDANT Mobile Guardian (CMG) Enterprise Edition Version 5.2.1 SP4 Security Target Version 1.7 March 24, 2008 CREDANT Technologies, Inc. 15303 Dallas Parkway Suite 1420 Addison, Texas 75001 CREDANT, CREDANT

More information

Voltage SecureData Appliance and SecureData Simple API Security Target

Voltage SecureData Appliance and SecureData Simple API Security Target Voltage SecureData Appliance and SecureData Simple API Security Target Version 1.0 1 November 2017 Prepared for: 1140 Enterprise Way Sunnyvale, CA 94089 Prepared By: Accredited Testing and Evaluation Labs

More information

RedCastle v3.0 for Asianux Server 3 Certification Report

RedCastle v3.0 for Asianux Server 3 Certification Report KECS-CR-08-21 RedCastle v3.0 for Asianux Server 3 Certification Report Certification No.: KECS-CISS-0104-2008 April 2008 IT Security Certification Center National Intelligence Service This document is

More information

SERTIT-014 CR Certification Report

SERTIT-014 CR Certification Report Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-014 CR Certification Report Issue 1.0 Fort Fox Hardware Data Diode FFHDD2 CERTIFICATION REPORT - SERTIT

More information

WatchGuard Technologies WatchGuard LiveSecurity System with Firebox II 4.1 Security Target

WatchGuard Technologies WatchGuard LiveSecurity System with Firebox II 4.1 Security Target WatchGuard Technologies WatchGuard LiveSecurity System with Firebox II 4.1 Security Target Version 1.0 Final August 3, 2000 Prepared for: WatchGuard Technologies 316 Occidental Ave S, Suite 200 Seattle,

More information

Multi-Functional Printer (Digital Copier) 7145 Series Security Target Version 13

Multi-Functional Printer (Digital Copier) 7145 Series Security Target Version 13 Multi-Functional Printer (Digital Copier) 7145 Series Security Target Version 13 This document is a translation of the security target written in Japanese which has been evaluated and certified. The Japan

More information

SecureWave Sanctuary Application Control Desktop Security Target

SecureWave Sanctuary Application Control Desktop Security Target SecureWave Sanctuary Application Control Desktop Security Target ST Version 1.0 08 November 2006 Prepared For: SecureWave 43869 Cowgill Court Ashburn, VA 20147 Prepared By: Science Applications International

More information

Avocent Cybex SwitchView SC Series Switches Security Target

Avocent Cybex SwitchView SC Series Switches Security Target Avocent Cybex SwitchView SC Series Switches Security Target Document Version 6.0 Revision 2.6 August 12, 2014 Prepared by: Avocent Corporation 4991 Corporate Drive Huntsville, AL 35805-6201 Table of Contents

More information