Q1 Labs. QRadar V5.1.2 Security Target V 2.0.4

Size: px
Start display at page:

Download "Q1 Labs. QRadar V5.1.2 Security Target V 2.0.4"

Transcription

1 Q1 Labs QRadar V5.1.2 Security Target V Prepared By: Suite 5200 West 7925 Jones Branch Drive McLean, VA Fax

2 SECTION TABLE OF CONTENTS Security Target Version ii PAGE 1 Security Target Introduction Security Target Identification Security Target Overview Common Criteria Conformance Document Organization TOE Description Product Type Product Description TSF Physical Boundary and Scope of the Evaluation The TOE Components The TOE IT Environment Components Logical Boundary Security Audit Identification and Authentication Security Management Partial TSF Self-Protection Intrusion Detection TOE Security Environment TOE Security Environment Assumptions Threats Organizational Security Policies Security Objectives Security Objectives for the TOE Security Objectives for the Environment Security Objectives for the IT Environment IT Security Requirements TOE Security Functional Requirements Class FAU: Security Audit Class FIA: Identification and Authentication Class FMT: Security Management (FMT) Class FPT: Protection of the TOE Security Functions IDS Component Requirements (IDS) Strength of Function Security requirements for the IT Environment Class FAU: Security Audit Class FPT: Protection of the TOE Security Functions Class FTP: Trusted path/channels...23

3 5.2.4 IDS Component Requirements (IDS) TOE Security Assurance Requirements TOE Summary Specification IT Security Functions Overview Security Audit Identification and Authentication Security Management Partial TSF Self-Protection Intrusion Detection System Functions SOF Claims Assurance Measures PP Claims Rationale Security Objectives Rationale Threats to Security Organizational Security Policies Assumptions Security Requirements Rationale Functional Requirements Dependencies Strength of Function Assurance Requirements Rationale that IT Security Requirements are Internally Consistent Explicitly Stated Requirements Rationale Requirements for the IT Environment TOE Summary Specification Rationale IT Security Functions Assurance Measures PP Claims Rationale Appendix Acronyms References Glossary...63 Security Target Version iii

4 Table of Tables and Figures Table or Figure Page Figure 2-1 QRadar Architecture Diagram and Physical TOE Boundary...5 Table 3-1 Assumptions...9 Table 3-2 TOE Threats...9 Table 3-3 IT System Threats...10 Table 3-4 Organizational Security Policies...10 Table 4-1 Security Objectives for TOE...12 Table 4-2 Security Objectives for the IT Environment...12 Table 4-3 Security Objectives for the Non-IT Environment...13 Table 5-1 Functional Components...14 Table 5-2 Administrator Management of TSF data...17 Table 5-3 Users Management of TSF data...18 Table 5-4 Management of Passwords...19 Table 5-5 Defense perspective data...20 Table 5-6 Functional Components for the IT environment...22 Table 5-7 EAL2 Assurance Components...24 Table 6-1 Security Functional Requirements mapped to Security Functions...25 Table 6-2 Assurance Measures...35 Table 8-1 All Threats to Security Countered...38 Table 8-2 All Organizational Security Policies are addressed...43 Table 8-3 All Assumptions Addressed...45 Table 8-4 Reverse Mapping of Security Objectives of the TOE map to Threat/Policies...47 Table 8-5 Reverse Mapping of Security Objectives of the IT Environment to Threat/Policies/Assumptions...48 Table 8-6 Reverse Mapping of Security Objectives of the Non-IT Environment to Threat/Policies/Assumptions...48 Table 8-7 All Objectives Met by Functional Components...49 Table 8-8 Reverse Mapping of SFRs to Objectives...52 Table 8-9 TOE Dependencies Satisfied...53 Table 8-10 IT Environment Dependencies are Satisfied...53 Table 8-11 All Objectives for the IT Environment map to Requirements in the IT environment...56 Table 8-12 Reverse Mapping of Security Requirements for the Environment to IT Security Objectives of the Environment...57 Table 8-13 Mapping of Functional Requirements to TOE Summary Specification...57 Table 8-14 Assurance Measures Rationale...60 Table 9-1 Acronyms...62 Table 9-2 References...63 Table 9-3 Customer Specific Terms...63 Table 9-4 CC Specific Terms...64 Security Target Version iv

5 1 Security Target Introduction 1.1 Security Target Identification TOE Identification: QRadar V5.1.2, with modules Offence Resolution v1.0 and Offence Manager ST Title: ST Version: Version ST Date: Assurance Level: Registration: Keywords: Q1 Labs QRadar v5.1.2 Security Target EAL2 VID10050 Intrusion Detection, Intrusion Detection System, Sensor, Scanner, and Analyzer 1.2 Security Target Overview This Security Target (ST) defines the Information Technology (IT) security requirements for Q1 Labs QRadar v5.1.2 network security monitoring system, with modules Offence Resolution v1.0 and Offence Manager. The Q1 Labs QRadar v5.1.2 product is an administrator configurable network intrusion detection and response system. Note that the product is also referred to as QRadar in this ST. QRadar collects and process data both from network taps and from event collectors installed on network devices. The product produces security events by real-time event matching and by comparing the collected data to historical flow-based behaviour patterns. The security events are then correlated by the product to produce weighted alerts which are sent to the product users. Note that all QRadar users are trusted and are granted privileges to manage an Enterprise s network or subnet. QRadar also can be configured to return a security response to configured network devices, either automatically, or in response to an action taken by an authorized user. By this means, a network device may be reconfigured to isolate a detected network security threat. QRadar supports the user in manually isolating threats to specific hosts or groups of hosts through customizable views and reports representing network devices, groups of network devices, and collections of data, security events, and alerts. QRadar includes its own auditing, user identification and authentication, security management, and TSF self protection mechanisms. The security management mechanism specifically supports limiting a user s access to the data collected from the network. QRadar s Offence Resolution v1.0 and Offence Manager modules are product packages that bundle specific user interfaces and product functionality. The Offence Manager module includes the product s functional and user interface components that support the correlation of security alerts to reduce false positives and association of alerts to security events. The Offence Resolution module includes the product s functionality and user interface components needed to associate a security event to a network device (or group of network devices) and return a security response to that network device (or devices). The Target of Evaluation (TOE) is a distributed, software-only TOE. The TOE includes all product components, except those that are installed directly on third party devices. However, product components that are installed directly on third party devices were included in the test configuration as interfaces to the TOE. The product components that are installed on third party network devices are the Device Support Module and the External Event Collector. Security Target Version

6 In summary, the product components included in the TOE are the QRadar v5.1.2 server software and user interface components, the product modules Offence Resolution v1.0 and Offence Manager software and user interface components, the product s collectors that access network taps, and the interface to the External Event Collector and the Device Support Module. The TOE is available installed in all-in-one Appliance products, or may be installed by the end-user on a suitable hardware platform. 1.3 Common Criteria Conformance The TOE is Part 2 extended, Part 3 conformant, and meets the requirements of Evaluation Assurance Level (EAL) 2 from the Common Criteria Version 2.3, ISO/IEC Document Organization The main sections of an ST are the ST Introduction, Target of Evaluation (TOE) Description, TOE Security Environment, Security Objectives, IT Security Requirements, TOE Summary Specification, and Rationale. Section 2, TOE Description, describes the product type and the scope and boundaries of the TOE. Section 3, TOE Security Environment, identifies assumptions about the TOE s intended usage and environment and threats relevant to secure TOE operation. Section 4, Security Objectives, defines the security objectives for the TOE and its environment. Section 5, IT Security Requirements, specifies the TOE Security Functional Requirements (SFR), Security Requirements for the IT Environment, and the Security Assurance Requirements. Section 6, TOE Summary Specification, describes the IT Security Functions and Assurance Measures. Section 7, Protection Profile (PP) Claims, is not applicable, as this product does not claim conformance to any PP. Section 8, Rationale, presents evidence that the ST is a complete and cohesive set of requirements and that a conformant TOE would provide an effective set of IT security countermeasures within the security environment. The Rationale has three main parts: Security Objectives Rationale, Security Requirements Rationale, and TOE Summary Specification Rationale. Sections 9 and 10 provide acronym definitions and references. Security Target Version

7 2 TOE Description The TOE is defined as all Q1 Labs QRadar v5.1.2 product components except the Device Support Module and the External Event Collector, which were included in the test configuration as interfaces to the TOE. The QRadar Engine and Console TOE component is enhanced by the inclusion of the product s Offence Resolution v1.0 and Offence Manager modules. As shown in Figure 2-1, the product components included in the TOE are the QRadar Engine and Console and the QFlow Collector. Each of these is described as follows: The QFlow Collector passively collects traffic flows from a network tap and forwards the collected network traffic to the QRadar Engine. The QRadar Engine is the core of the product and supports: o the collection, analyses and storage of data gathered by the QFlow Collector and the external event collectors, o the generation and correlation of alerts to security events, filtering of false positive security alerts, population of user interface views, and generation of reports to support the Administrator in identifying and countering network security threats and vulnerabilities, o the automatic return of a security response to configured network devices upon detection of specific security events, and o the auditing of user actions, user identification and authentication, security management, and TSF self protection mechanisms. The subcomponents of the QRadar Engine are presented in Section The QRadar Console utilizes pre-analyzed data derived by the QRadar Engine to populate the user interface. The QRadar Console GUI screen includes the Dashboard view, the Offence Manager view, the Offence Resolution view, the Network Surveillance view, and the Reports view. o The Dashboard is a customizable view that appears immediately upon user authentication. It allows the user to monitor the overall network behavior, security and vulnerability posture, top targeted assets, top attackers, and worst and most recent security Offences from one window. o The Offence Manager view supports the user in correlating security alerts to reduce false positives and in associating alerts with security events.. o The Offence Resolution view supports the user in associating a security event to a network device (or group of network devices) and returning a security response to that network device (or devices). o The Network Surveillance view supports the user in monitoring the behavioral profiles of network traffic associated with systems and applications. This is useful to trace the source of alerts and events to specific systems and applications. o The Reports view provides out of the box Executive and Operations level reporting capability. Additional customized reports may be defined by the user. 2.1 Product Type The Q1 Labs QRadar v5.1.2 product is an administrator configurable network intrusion detection and response system. 2.2 Product Description The product collects and processes data from network taps through the QFlow Collector and from QRadar External Event Collectors installed on network devices. The QRadar External Event Collector was included in the test configuration only as an interface to the TOE. The product produces security Security Target Version

8 events from the data collected by the QFlow Collector by comparing the data with historical behaviour patterns and by performing real-time event matching through Sentries. The security events generated in this way are then correlated by the product with the event data collected from QRadar Event Collectors and refined so that similar events are grouped into a single weighted alert which is sent to the product users. QRadar provides alerts based on behaviors, anomalies, policies and thresholds. Upon receiving the weighted alert, the user can selectively decompose it, exposing the associated security events and collected data for further investigation. The product can be configured to return a security response to configured network devices, either automatically, or in response to an action taken by a user. The built-in security responses are: TCP Resets, ARP Redirection, and the ability to issue commands to network devices such as switches routers and firewalls, but a general interface for passing data and commands to configured network devices is also included. By these means, a network device may be configured to isolate detected network security threats. The product includes its own auditing, user identification and authentication, security management, and TSF self protection mechanisms. The security management mechanism specifically supports limiting a user s access to the data collected from the network. No cryptographic functionality is included in the product or the TOE. The QRadar software included in the TOE is modular and components and subcomponents as identified below in Section The software can support product configurations where product components are installed on independent platforms. However, in the evaluated configuration the QFlow Collector was installed on one platform, and all other TOE components are installed on a single server. In addition, the TOE software components are incorporated into the following QRadar Appliance products, which provide the identified QRadar security services on pre-installed and configured servers: Appliance # 2101 (Entry-Level All in 1 Appliance) This is an all in-one box that enables the user to collect flows (QFlow) and events. Appliance # 2102 (Entry-Level All in 1 Appliance) This is an all in-one box that includes the same features as #2101 but also includes an Endace copper NIC for greater performance Appliance # 3101 (Mid-Level Server Appliance) This includes the same features as Appliance # 2101 except that there is a larger Storage array and QFlow capability is not configured upon delivery. Event Collecting/Processing is included. Appliance # 4101 (High-End Server Appliance) This includes the same features as Appliance # 3101 except that it has a quad CPU and there is no.qflow or Event Collecting/Processing capability included. Appliance # 2101 was tested in the evaluated configuration. Security Target Version

9 Figure 2-1 QRadar Architecture Diagram and Physical TOE Boundary Note: In Figure 2-1 the Flow Processor, Classification Engine, Internal Event Collector, External Event Processor, QRadar Console and Magistrate Processing Core TOE subcomponents are shown as the QRadar Engine and Console. 2.3 TSF Physical Boundary and Scope of the Evaluation The TOE Components The TOE is defined as Q1 Lab s QRadar v5.1.2 software components QRadar Engine and Console and the QFlow Collector. The exact version of the software components is version All product components of the TOE are software. QRadar v5.1.2 includes the following product components and subcomponents: QFlow Collector(s) QRadar Engine and Console o Flow Processor o Classification Engine o Internal Event Collector o External Event Processor o QRadar Console o Magistrate Processing Core Security Target Version

10 The subcomponents of the QRadar Engine and Console are the Flow Processor, the Classification Engine, Internal Event Collector, Event Processor, QRadar Console, and the Magistrate Processing Core. These subcomponents are referenced in this document in order to add clarity to the description of the operation and function of the product. A brief description of each of these subcomponents follows: The QRadar Flow Processor collects and consolidates data from one or more QFlow Collector(s) and passes the consolidated data to the Classification Engine. The Classification engine receives consolidated data from the Flow Processor, and determines if an event should be generated. The Internal Event Collector of the Event process receives policy and security data emitted internally from the QRadar Classification engine. The External Event Processor receives the normalized data from the External Event Collector. The External Event Collector is included in the TOE as an interface only. The QRadar Console includes User access functionality that corresponds with the necessary Security Functionality Requirements. The Magistrate Processing Core (MPC) is responsible for collecting the events generated internally from the Internal Event Collector and externally from the External Event Processor. It correlates these events and takes actions such as issuing alerts and/or executing automated actions triggered by detected events. It also supports the functionality required to enable the user to investigate alerts and events The TOE IT Environment Components The following are the IT Environment components required for operation of the TOE and to support the TOE s security functions: o o o o o Hardware platform(s): Intel PC Platforms, one for each QFlow Collector, and one for all other TOE components. Operating System platform(s): Trustix 2.2 for all product components. The product is also certified to run on Linux Red Hat Enterprise v.4. Supporting S/W on the customer network: o QRadar External Event Collector and its associated Device Support Modules (DSMs) compatible with the network devices being monitored; o 3 rd party vulnerability scanning modules such as Nessus o QFlow Vulnerability Assessment (VA) Integration Server module providing an interface for the vulnerability scanners. Protection of data in transit between the QFlow Collectors and the QRadar server, and between the QRadar Server and the External Event Collector. This can be implemented by physical protection of the network connection between the collectors and the Server, or a virtual LAN such as that supported by cryptographic module(s) such as Open SSL. Network or other connectivity: o Ethernet network to connect the TOE. Note that the TOE can also be installed on a single platform. o Based on customer requirements, connectivity between Network Elements that support a tap for the QFlow Collectors. Security Target Version

11 2.4 Logical Boundary The TOE provides the following security features: Security Audit Identification and Authentication Security Management Partial TSF Self-Protection Intrusion Detection Security Audit QRadar provides the ability to audit blocks generated by the TOE and the addition, modification, and deletion of configuration information that specifies the blocks. QRadar is able to associate the auditable events with identified users Identification and Authentication QRadar provides user identification and authentication independent of that provided by the operating system through the use of user identifiers and passwords Security Management QRadar supports the following administrative roles: Administrator, User, and Customer and limits the management of TSF Data to users with the appropriate privileges and network access. QRadar provides the following security management functionality: Management of security management data Management of collected event data and collected network data Management of CIDR ranges assigned to users Management of blocks Management of passwords Partial TSF Self-Protection QRadar provides for non-bypassability and for protection of the audit data and defense perspective data in conjunction with the operating system platform, Intrusion Detection QRadar provides for customer network data collection and processing to create the set of surveillance information. This includes a database of flow information, a set of analysis data, and a database of external event information. The intrusion detection function provides the following capabilities: Reads network data in real-time including data from Gigabyte networks Allows for amount of payload information to be configured by bytes per Collector. Analyzes vulnerability data by correlating the event with the various types of raw data, normalized data, and Offences. As a result, weighted Offence alerts can be generated. Provides behavioral and event correlation analysis on surveillance information Records results by date, time, and type Generates internal events and their associated violations Sends alerts based on analysis of defense perspective data Security Target Version

12 Provides security responses to block network security threats based on analysis of defense perspective data. Generates automatic reports on defense perspective data. Provide Administrators and Users the ability to review the defense perspective data they are authorized to view. 2.5 TOE Security Environment It is assumed that there will be no untrusted users or software on the QRadar server(s). The TOE environment is one where the potential attacker is unsophisticated, with access to only standard equipment and public information about the product. The Security Functions provided by the TOE security environment can be categorized as follows: Event and vulnerability data collection on the customer network - The TOE relies on QRadar IT Environment components on the customer network to collect event data from network devices that produce Netflow, Jflow, and Sflow events through the External Event Collector. Cryptographic Support - The TOE relies on the IT environment to provide cryptographic support and the cryptographic module which includes OpenSSL for secure data communication over a trusted channel. The TOE does not include any cryptographic functionality, nor does include an interface to any cryptographic functionality. Partial Protection of TSF - QRadar relies on the underlying platform, OS and hardware, to provide security capabilities for the TOE s protection. These include SFP domain separation, Non-bypassability of the TSP, and a reliable time-stamp. The TOE also relies on the platform to support the protection of the audit and defense perspective data. Security Target Version

13 3 TOE Security Environment This section identifies secure usage assumptions and threats to security. 3.1 Assumptions This section contains assumptions regarding the security environment and the intended usage of the TOE. Table 3-1 Assumptions Item Assumption Assumption Description 1. A.ACCESS The TOE has access to all the IT security management data and defense perspective data it needs to perform its functions. 2. A.DYNAMIC The TOE will be managed in a manner that allows it to appropriately address changes in the IT System the TOE monitors. 3. A.MANAGE There will be one or more competent individuals assigned to manage the TOE and the security of the information it contains. 4. A.NOEVIL The authorized administrators are not careless, willfully negligent, or hostile, and will follow and abide by the instructions provided by the TOE documentation. 5. A.PASSWD Authorized users will follow the guidance provided by the TOE documentation for choosing good passwords. 6. A.PROTCT The TOE hardware and software critical to security policy enforcement will be protected from unauthorized physical modification. 7. A.PROTCTCOMM Those responsible for the TOE will ensure the communications between the TOE components are secure via a SSL secure channel. 8. A.SCOPE The TOE is appropriately scalable to the IT System the TOE monitors. 9. A.TRUSTED There will be no untrusted users of the TOE and no untrusted software loaded on the TOE host platforms. Application Note: A.PROTCTCOMM provides for a secure communications between the User Web interface and QRadar Server Console, and among the TOE components when operating in a distributed environment (see Figure 2-2). 3.2 Threats The following are threats identified for the TOE and the IT System the TOE monitors. The TOE itself has threats and the TOE is also responsible for addressing threats to the environment in which it resides. The assumed level of expertise of the attacker is unsophisticated, with access to only standard equipment and public information about the product. The TOE must counter the following threats to security: Table 3-2 TOE Threats Item TOE Threat TOE Threat Description 1. T.COMINT An unauthorized user may attempt to compromise the integrity of the data collected and produced by the TOE by bypassing a security mechanism. 2. T.COMDIS An unauthorized user may attempt to disclose the data collected and produced by the TOE by bypassing a security mechanism. 3. T.NOHALT An unauthorized user may attempt to compromise the continuity of the System s collection and analysis functions by halting execution of the TOE. Security Target Version

14 Item TOE Threat TOE Threat Description 4. T.PRIVIL An unauthorized user may gain access to the TOE and exploit system privileges to gain access to TOE security functions and data. 5. T.IMPCON An unauthorized user may inappropriately change the configuration of the TOE causing potential intrusions to go undetected. 6. T.INFLUX An unauthorized user may cause malfunction of the TOE by creating an influx of data that the TOE cannot handle. 7. T.FACCNT Unauthorized attempts to access TOE data or security functions may go undetected. Table 3-3 IT System Threats The following identifies threats to the IT System that may be indicative of vulnerabilities in or misuse of IT resources. Item IT Threat IT Threat Description 8. T.SCNCFG Improper security configuration settings may exist in the IT System the TOE monitors. 9. T.SCNMLC Users could execute malicious code on an IT System that the TOE monitors which causes modification of the IT System protected data or undermines the IT System security functions. 10. T.SCNVUL Vulnerabilities may exist in the IT System the TOE monitors. 11. T.FALASC The TOE may fail to identify vulnerabilities or inappropriate activity based on association of IDS data received from all data sources. 12. T.MISUSE Unauthorized accesses and activity indicative of misuse may occur on an IT System the TOE monitors. 13. T.TRANSMIT TSF data may be disclosed or modified by an attacker while being transmitted between the TOE and its users. 3.3 Organizational Security Policies Table 3-4 Organizational Security Policies An organizational security policy is a set of rules, practices, and procedures imposed by an organization to address its security needs. This section identifies the organizational security policies applicable to this TOE. Item Organization Organization Security Policy Description Security Policy 1. P.DETECT Static configuration information that might be indicative of the potential for a future intrusion or the occurrence of a past intrusion of an IT System or events that are indicative of inappropriate activity that may have resulted from misuse, access, or malicious activity of IT System assets must be collected. 2. P.ANALYZ Analytical processes and information to derive conclusions about intrusions (past, present, or future) must be applied to Defense Perspective data and appropriate response actions taken. 3. P.MANAGE The TOE shall only be managed by authorized users. 4. P.ACCESS All data collected and produced by the TOE shall only be used for authorized purposes. 5. P.ACCACT Users of the TOE shall be accountable for their actions when configuring and initiating blocks within the IDS. Security Target Version

15 6. P.INTGTY Data collected and produced by the TOE shall be protected from modification. 7. P.PROTCT The TOE shall be protected from unauthorized accesses and disruptions of TOE data and functions. Security Target Version

16 4 Security Objectives This section identifies the security objectives of the TOE and its supporting environment. The security objectives identify the responsibilities of the TOE and its environment in meeting the security needs. 4.1 Security Objectives for the TOE The security objectives for the TOE are as follows: Table 4-1 Security Objectives for TOE Item TOE Objective TOE Objective Description 1. O.PARTPROTCT The TOE when invoked by the underlying host OS must protect itself from unauthorized modifications and access to its functions and data within the TOE, through its own interfaces. 2. O.IDBLOCK The TOE must block network security threats or out-of-policy applications. 3. O.IDSCAN The TOE must collect and store static configuration information that might be indicative of the potential for a future intrusion or the occurrence of a past intrusion of an IT System. 4. O.IDSENS The TOE must collect and store information about all events that are indicative of inappropriate activity that may have resulted from misuse, access, or malicious activity of IT System assets and the IDS. 5. O.IDANLZ The TOE must accept data from IDS Sensors or IDS Scanners and then apply analytical processes and information to derive conclusions about intrusions (past, present, or future). 6. O.EADMIN The TOE must include a set of functions that allow effective management of its functions and data. 7. O.ACCESS The TOE must allow authorized users to access only appropriate TOE functions and data. 8. O.IDAUTH The TOE must be able to identify and authenticate users prior to allowing access to TOE functions and data. 9. O.OFLOWS The TOE must appropriately handle potential audit and defense perspective data storage overflows, through its own interfaces. 10. O.AUDITS The TOE must record audit records for accesses and use of the System blocking function. 11. O.PARTINTEGR The TOE with the support of the underlying host OS must ensure the integrity of all audit and defense perspective data, through its own interfaces. 4.2 Security Objectives for the Environment The TOEs operating environment must satisfy the following objectives. Most of these objectives do not levy any IT requirements but are satisfied by procedural or administrative measures Security Objectives for the IT Environment The security objectives for the IT environment are as follows: Table 4-2 Security Objectives for the IT Environment Item IT Environment Objective IT Environment Objective Description 12. OE.COLLECTEVENTVULN The IT Environment must collect event and vulnerability data of an IT System. 13. OE.OFLOWS The IT Environment must appropriately handle potential audit and defense perspective data storage overflows, through the IT Environment s interfaces Security Target Version

17 Item IT Environment Objective IT Environment Objective Description 14. OE.PARTINTEGR The IT Environment must ensure the integrity of all audit and defense perspective data, through the IT Environment s interfaces within its scope of control. 15. OE.PARTPROTCT The IT Environment must protect itself from unauthorized modifications and access to its functions and data within the TOE, through the IT Environment s interfaces within its scope of control. 16. OE.PROTCTCOMM The IT environment must protect communications between the TOE and its components. 17. OE.TIME The underlying operating system will provide reliable time stamps. Table 4-3 Security Objectives for the Non-IT Environment Item Non-IT Environment Objective Non-IT Environment Description Objective 18. ON.INSTALL Those responsible for the TOE must ensure that the TOE is delivered, installed, managed, and operated in a manner which is consistent with IT security. 19. ON.PHYCAL Those responsible for the TOE must ensure that those parts of the TOE critical to security policy are protected from any physical attack. 20. ON.CREDEN Those responsible for the TOE must ensure that all access credentials are protected by the users in a manner which is consistent with IT security. 21. ON.PERSON Personnel working as authorized administrators shall be carefully selected and trained for proper operation of the System. 22. ON.INTROP The TOE is interoperable with the IT System it monitors. 23. ON.EXPORT When any IDS component makes its data available to other IDS components, the IT Environment will ensure the confidentiality of the defense perspective data. 24. ON.PASSWD Personnel working as authorized users must follow the password policy parameters in the TOE guidance about choosing good passwords such as minimum length requirements. 25. ON.PRTCTCOMM Those responsible for the TOE will ensure the communications between the TOE components are secure via a SSL secure channel. Security Target Version

18 5 IT Security Requirements This section provides the TOE security functional and assurance requirements. In addition, the IT environment security functional requirements on which the TOE relies are described. Formatting Conventions The notation, formatting, and conventions used in this security target (ST) are consistent with version 2.3 of the Common Criteria for Information Technology Security Evaluation. Font style and clarifying information conventions were developed to aid the reader. The CC permits four functional component operations: assignment, iteration, refinement, and selection to be performed on functional requirements. These operations are defined in Common Criteria, Part 2 and paragraph as: assignment: allows the specification of an identified parameter; refinement: allows the addition of details or the narrowing of requirements; selection: allows the specification of one or more elements from a list; and iteration: allows a component to be used more than once with varying operations. This ST indicates which text is affected by each of these operations in the following manner: Assignments and Selections specified by the ST author are in [italicized bold text]. Refinements are identified with "Refinement:" right after the short name. Additions to the CC text are specified in italicized bold and underlined text. Iterations are identified with a dash number "-#". These follow the short family name and allow components to be used more than once with varying operations. * refers to all iterations of a component. Explicitly stated requirements are named _EXP to denote that the requirement has been explicitly stated. For example IDS_ANL_EXP.1. Application notes provide additional information for the reader, but do not specify requirements. Application notes are denoted by italicized text. Comments are provided as an aid to the ST author and evaluation team. These items will be deleted in the final version of the ST. 5.1 TOE Security Functional Requirements The functional security requirements for the TOE consist of the following components derived from Part 2 of the CC and explicit components, summarized in the Table 5-1 below. Table 5-1 Functional Components No. Component Component Name 1. FAU_LOG_EXP.1 Audit log generation 2. FAU_GEN.2 User identity association 3. FAU_SAR.1 Audit review 4. FAU_SAR.2 Restricted audit review 5. FIA_ATD.1* User attribute definition 6. FIA_SOS.1 Verification of secrets 7. FIA_UAU.2 User authentication before any action 8. FIA_UID.2 User identification before any action Security Target Version

19 No. Component Component Name 9. FMT_MTD.1* Management of TSF data 10. FMT_SMF.1 Specification of management functions 11. FMT_SMR.1 Security roles 12. FPT_RVM_EXP.1-1 Non-bypassability of the TSP 13. IDS_DPD_EXP.1 Defense perspective data collection 14. IDS_ANL_EXP.1 Analyzer analysis 15. IDS_SA_EXP.1 Security alarms 16. IDS_SR_EXP.1 Security response 17. IDS_RDR_EXP.1 Restricted data review 18. IDS_STG_EXP.1-1 Guarantee of defense perspective data availability 19. IDS_DRS_EXP.1 Data reporting Class FAU: Security Audit FAU_LOG_EXP.1 Audit log generation Hierarchical to: No other components. FAU_LOG_EXP.1.1 The TSF shall be able to generate an audit record of the following auditable events: a) All auditable events for the [not specified] level of audit; and b) [the following auditable events: QRadar Response Module (Offence Resolution) Audit: o Blocks generated by the TOE, both automatically based on the alert rules and by an authorized User; o the addition, modification, and deletion of the configuration information that specifies the blocks. FAU_LOG_EXP.1.2 The TSF shall record within each audit record at least the following information: a) Date and time of the event, type of event, subject identity, and the outcome (success or failure) of the event; and b) For each audit event type, based on the auditable event definitions of the functional components included in the PP/ST: [no additional audit information]. Dependencies: FPT_STM.1 Reliable time stamps FAU_GEN.2 User identity association Hierarchical to: No other components. FAU_GEN.2.1 The TSF shall be able to associate each auditable event with the identity of the user that caused the event. Dependencies: FAU_GEN.1 Audit data generation FIA_UID.1 Timing of identification FAU_SAR.1 Audit review Hierarchical to: No other components. FAU_SAR.1.1 The TSF shall provide [Administrator and Users with Offence Resolution privileges] with the capability to read [all audit information and audit information for the User, respectively] from the audit records. Security Target Version

20 FAU_SAR.1.2 The TSF shall provide the audit records in a manner suitable for the user to interpret the information. Dependencies: FAU_GEN.1 Audit data generation FAU_SAR.2 Restricted audit review Hierarchical to: No other components. FAU_SAR.2.1 The TSF shall prohibit all users read access to the audit records, except those users that have been granted explicit read-access. Dependencies: FAU_SAR.1 Audit review Class FIA: Identification and Authentication FIA_ATD.1-1 User attribute definition Hierarchical to: No other components. FIA_ATD Refinement: The TSF shall maintain the following list of security attributes belonging to administrators and Customer Support users: [User Name ; Authentication data ; Assigned Role, either Administrator or Customer Support.] Dependencies: No dependencies. Application note: The access privileges held by a user acting in the Customer Support Role is defined in FMT_MTD.1-4, while the privileges held by a user acting in the Administrator Role are defined in FMT_MTD.1-1. FIA_ATD.1-2 User attribute definition Hierarchical to: No other components. FIA_ATD Refinement: The TSF shall maintain the following list of security attributes belonging to users: [User Name; Authentication data; CIDR Address Ranges; Assigned Privileges ( Reports, Offence Resolution, Offense Manager, Network Surveillance )] Dependencies: No dependencies. FIA_SOS.1 Verification of secrets Hierarchical to: No other components. FIA_SOS.1.1 The TSF shall provide a mechanism to verify that secrets meet [a length greater than or equal to 5, and may contain numeric, underscore, hyphen, lower case and upper case characters]. Dependencies: No dependencies FIA_UAU.2 User authentication before any action Hierarchical to: FIA_UAU.1 Security Target Version

21 FIA_UAU.2.1 The TSF shall require each user to be successfully authenticated before allowing any other TSF-mediated actions on behalf of that user. Dependencies: FIA_UID.1 Timing of identification FIA_UID.2 User identification before any action Hierarchical to: FIA_UID.1 FIA_UID.2.1 The TSF shall require each user to identify itself before allowing any other TSF-mediated actions on behalf of that user. Dependencies: No dependencies Class FMT: Security Management (FMT) FMT_MTD.1-1 Management of TSF data Application Note: FMT_MTD.1-1 describes the management of TSF data in regards to the Administration of Security Functions FMT_MTD The TSF shall restrict the ability to [Operations listed below] the [TSF data listed below] to [Administrator]: Table 5-2 Administrator Management of TSF data Operations selection and assignment query, modify, delete Query TSF Data Assignment Security Management Data: TSF data required to manage users Identification and Authentication, see the attributes defined in FIA_ATD.1* except password. IDS Data: Configure collection of data from IDS_DPD_EXP.1. Configure and initiate blocks based on all the Defense Perspective Data. Configure the Global Exclusions, the addresses protected from blocks. Reporting interface to all the Defense Perspective Data Rules and Sentries applied to Offense Manager data and flow data, respectively, from which alerts (IDS_SA_EXP.1) and blocks (IDS_SR_EXP.1) are generated, includes notification and logging. Threshold level and notice location for Defense Perspective data storage required for IDS_STG_EXP.1-1. Define the data to be collected by the QFlow Collectors, as specified in IDS_DPD_EXP.1, Security Management Data: Audit log data IDS Data: All Defense Perspective Data Alerts generated by the TSF Blocks generated by the TSF Dependencies: FMT_SMF.1 Specification of management functions FMT_SMR.1 Security roles Security Target Version

22 FMT_MTD.1-2 Management of TSF data Application Note: FMT_MTD.1-2 describes the management of TSF data in regards to the Users with Privileges. FMT_MTD Refinement: The TSF shall restrict the ability to [Operations listed below] the [TSF data listed below for the data related to the CIDR ranges specified by the Administrator for each User] to [Role Assignment listed below]. Table 5-3 Users Management of TSF data Operations selection and assignment TSF Data Assignment Role Assignment Query Pre-defined Dashboard Report Users Query, modify, delete, create Query Query Query, modify, delete, create Query, modify, delete, create Query, modify, delete, create Query Configure and initiate blocks based on the Defense Perspective Data Blocks generated by the TSF Audit log data Reporting interface to the Defense Perspective Data Configuration for rules applied to the Offense Manager data from which Alerts (IDS_SA_EXP.1) and blocks (IDS_SR_EXP.1) are generated, includes notification and logging. Configuration for the Sentries applied to the flow data from which alerts (IDS_SA_EXP.1) and blocks (IDS_SR_EXP.1) are generated, includes notification and logging. Flow data Users with Offence Resolution privileges Users with Reports privileges Users with Offense Manager with Customized Rule privileges Users with Network Surveillance and Users with Offense Manager privileges Query Rules and Sentries applied to Offense Manager data and flow data, respectively, from which alerts (IDS_SA_EXP.1) and blocks (IDS_SR_EXP.1) are generated Dependencies: FMT_SMF.1 Specification of management functions FMT_SMR.1 Security roles FMT_MTD.1-3 Management of TSF data Users with Offense Manager privileges Application Note: FMT_MTD.1-3 describes the management of TSF data in regards to Users with sharing privileges. FMT_MTD Refinement: The TSF shall restrict the ability to [query] the [ Reporting interface to the Defense Perspective Data for User-specified CIDR ranges within the (granting) Users domain, and Alerts on Defense Perspective Data for User-specified CIDR ranges within the (granting) Users domain] to [Users] with User-specified report sharing privileges and Offense Manager sharing privileges, respectively. Security Target Version

23 Dependencies: FMT_SMF.1 Specification of management functions FMT_SMR.1 Security roles FMT_MTD.1-4 Management of TSF data Application Note: FMT_MTD.1-4 describes the management of TSF data in regards to Customer Support Users. FMT_MTD The TSF shall restrict the ability to [query] the [ blocks based on the Defense Perspective Data] to [Customer Support]. Dependencies: FMT_SMF.1 Specification of management functions FMT_SMR.1 Security roles FMT_MTD.1-5 Management of TSF data Application Note: FMT_MTD.1-5 describes the management of TSF data in regards to the management of passwords. FMT_MTD The TSF shall restrict the ability to [see table below] the [see table below] to [see table below]. Table 5-4 Management of Passwords Operations selection and assignment TSF Data Assignment Role Assignment modify, delete, create All passwords Administrator modify Own password User Application Note: User passwords in their original state must be created by the Administrator, Customer Support Users do not manage their own passwords, they are created and maintained by the Administrator. Dependencies: FMT_SMF.1 Specification of management functions FMT_SMR.1 Security roles FMT_SMF.1 Specification of Management Functions Hierarchical to: No other components. FMT_SMF.1.1 The TSF shall be capable of performing the following security management functions: [Security Management: Audit (as described in Sections and 6.1.6) and I&A(as described in Sections 6.1.3); IDS Management: Access Control over Defense Perspective data, control over reports, blocks and alerts, as specified in FMT_MTD.1*]. Dependencies: No Dependencies FMT_SMR.1 Security roles Hierarchical to: No other components. FMT_SMR.1.1 The TSF shall maintain the roles [Administrator, Customer Support, and User]. FMT_SMR.1.2 The TSF shall be able to associate users with roles. Dependencies: FIA_UID.1 Timing of identification Security Target Version

24 5.1.4 Class FPT: Protection of the TOE Security Functions FPT_RVM_EXP.1-1 Non-bypassability of the TSP Hierarchical to: No other components. FPT_RVM_EXP The TSF, when invoked by the underlying host OS, shall ensure that TSP enforcement functions are invoked and succeed before each function within the TSC is allowed to proceed. Dependencies: No dependencies IDS Component Requirements (IDS) IDS_DPD_EXP.1 Defense perspective data collection Hierarchical to: No other components IDS_DPD_EXP.1.1 The TOE shall be able to collect the following information from the targeted IT System resource(s): see column 1 of Table 5-5. IDS_DPD_EXP.1.2 At a minimum, the TOE shall collect and record the following information: a) Date and time of the event, type of event, subject identity, and the outcome (success or failure) of the event; and b) The additional information specified in the Details column of Table 5-5 defense perspective data. Table 5-5 Defense perspective data Events Details Network traffic Host Profiles Protocol, Application, Content, Source Port, Destination Port, source address, destination address, TCP Flags Open Ports, Services, IP address Dependencies: No dependencies. IDS_ANL_EXP.1 Analyzer analysis Hierarchical to: No other components IDS_ANL_EXP.1.1 The TOE shall perform the following analysis function(s) on all defense perspective data received: a) behavioral and event correlation b) No other analytical functions. IDS_ANL_EXP.1.2 The TOE shall record within each analytical result at least the following information: a) Date and time of the result, type of result, identification of data source; and b) Analysis results. Dependencies: IDS_DPD_EXP.1 Defense perspective data collection IDS_EVD_EXP.1 Event and vulnerability data collection FPT_STM.1 Reliable time stamps Security Target Version

25 IDS_SA_EXP.1 Security alarms Hierarchical to: No other components. IDS_SA_EXP.1.1 The TSF shall take action to send an alert to the Offense Manager console, send the alert to the QRadar system log, or send a notification via upon detection of a potential security violation. Dependencies: IDS_ANL_EXP.1 Analyzer analysis IDS_SR_EXP.1 Security response Hierarchical to: No other components IDS_SR_EXP.1.1 The TSF shall take the following actions: Block - Prevent network traffic from moving through the network. The QRadar Response Module (Offence Resolution) provides several blocking mechanisms. o TCP Resets: TCP Resets have the capability to block an individual host and layer 4 sessions. o ARP Redirection: ARP Redirection (Poisoning) blocks the host from any and all communications to other subnets/cidrs and VLANs. ARP Redirector can redirect the quarantined host to a customizable website that informs the host that they have been quarantined. o Network Devices: The QRadar Response Module can issue commands to 3 rd party devices which support ACLs and blocking rules (such as switches, routers, and firewalls) Application Note: The block can be enabled manually or automatically. Dependencies: IDS_ANL_EXP.1 Analyzer analysis IDS_RDR_EXP.1 Restricted data review Hierarchical to: No other components IDS_RDR_EXP.1.1 The TOE shall provide the Administrator with the capability to read all data from the Defense Perspective data. IDS_RDR_EXP.1.2 The TOE shall provide the TOE data in a manner suitable for the user to interpret the information. IDS_RDR_EXP.1.3 The TOE shall prohibit all users read access to the Defense Perspective data, except those users that have been granted explicit read-access. Dependencies: IDS_DPD_EXP.1 Defense perspective data collection IDS_EVD_EXP.1 Event data collection IDS_STG_EXP.1-1 Guarantee of defense perspective data availability Hierarchical to: No other components IDS_STG_EXP The TOE shall protect the stored Defense Perspective data from unauthorized deletion through its own TSFI. IDS_STG_EXP The TOE shall protect the stored Defense Perspective data from modification through its own TSFI. IDS_STG_EXP The TOE shall ensure that the most recent, limited by available storage space defense perspective data will be maintained when defense perspective data storage exhaustion occurs. Security Target Version

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM QRadar V5.1.2 Report Number: Dated: January 26, 2007 Version: 1.1 National Institute of

More information

IBM Proventia G 1.3 and SiteProtector 2.0 Service Pack 6.1 with Reporting Module Security Target. Security Target. Version 1.19.

IBM Proventia G 1.3 and SiteProtector 2.0 Service Pack 6.1 with Reporting Module Security Target. Security Target. Version 1.19. IBM Proventia G 1.3 and SiteProtector 2.0 Service Pack 6.1 with Reporting Module Security Target Version 1.19 May 10, 2010 Internet Security Systems, Inc. 6303 Barfield Road Atlanta, GA 30328 Table of

More information

etrust Admin V8.0 Security Target V2.3 Computer Associates 6150 Oak Tree Blvd, Suite 100 Park Center Plaza II Independence, OH 44131

etrust Admin V8.0 Security Target V2.3 Computer Associates 6150 Oak Tree Blvd, Suite 100 Park Center Plaza II Independence, OH 44131 etrust Admin V8.0 Security Target V2.3 February 2, 2006 Prepared for: Computer Associates 6150 Oak Tree Blvd, Suite 100 Park Center Plaza II Independence, OH 44131 Suite 5200 7925 Jones Branch Drive McLean,

More information

webmethods Fabric 6.5 EAL2 Common Criteria Evaluation Security Target V December 2005

webmethods Fabric 6.5 EAL2 Common Criteria Evaluation Security Target V December 2005 webmethods Fabric 6.5 EAL2 Common Criteria Evaluation Security Target V1.0 12 December 2005 Prepared for: webmethods, Inc. 3877 Fairfax Ridge Road, Fairfax, VA 22030 http://www.webmethods.com/ Unclassified

More information

StillSecure VAM V5.5. Security Target V1.6

StillSecure VAM V5.5. Security Target V1.6 StillSecure VAM V5.5 Security Target V1.6 December 13, 2006 Developed by Suite 5200 West 7925 Jones Branch Drive McLean, VA 22102-3321 703 848-0883 Fax 703 848-0960 SECTION TABLE OF CONTENTS PAGE 1 SECURITY

More information

Network Chemistry, Inc. Security Target

Network Chemistry, Inc. Security Target Network Chemistry RFprotect TM Distributed v6.1.2, RFprotect TM Sensor v6.1.22, and RFprotect TM Mobile v6.1.2 Security Target Evaluation Assurance Level: EAL 2 Document Version: 1.0 Prepared for: Prepared

More information

Security Target. McAfee Host Data Loss Prevention 9.2 and epolicy Orchestrator 4.6. Document Version 1.0. February 21, 2012

Security Target. McAfee Host Data Loss Prevention 9.2 and epolicy Orchestrator 4.6. Document Version 1.0. February 21, 2012 Security Target McAfee Host Data Loss Prevention 9.2 and epolicy Orchestrator 4.6 Document Version 1.0 February 21, 2012 Document Version 1.0 McAfee Page 1 of 50 Prepared For: Prepared By: McAfee, Inc.

More information

Computer Associates. Security Target V2.0

Computer Associates. Security Target V2.0 Computer Associates etrust Single Sign-On V7.0 Security Target V2.0 October 20, 2005 Suite 5200 West 7925 Jones Branch Drive McLean, VA 22102-3321 703 848-0883 Fax 703 848-0985 SECTION TABLE OF CONTENTS

More information

Symantec Data Loss Prevention 14.5

Symantec Data Loss Prevention 14.5 Symantec Data Loss Prevention 14.5 Evaluation Assurance Level (EAL): EAL2+ Doc No: 1943-000-D102 Version: 1.2 15 November 2016 Symantec Corporation 303 2 nd Street 1000N San Francisco, CA 94107 United

More information

IBM Proventia Network Enterprise Scanner and SiteProtector Security Target

IBM Proventia Network Enterprise Scanner and SiteProtector Security Target IBM Proventia Network Enterprise Scanner 1.3 with PU 1.28 and SiteProtector 2.0 SP6.1 with Reporting Module and with Catalog 2.61 (Version 2.684/1/24/008) Security Target Version 1.6 November 25, 2008

More information

Host Intrusion Prevention and. epolicy Orchestrator (Patch 1)

Host Intrusion Prevention and. epolicy Orchestrator (Patch 1) Security Target Host Intrusion Prevention 6.0.2 and epolicy Orchestrator 3.6.1 (Patch 1) McAfee System Protection Industry-leading intrusion prevention solutions TABLE OF CONTENTS 1. SECURITY TARGET INTRODUCTION...

More information

Security Target. EMC ScaleIO v Evaluation Assurance Level (EAL): EAL2+ Doc No: D102 Version: February 2016.

Security Target. EMC ScaleIO v Evaluation Assurance Level (EAL): EAL2+ Doc No: D102 Version: February 2016. EMC ScaleIO v1.32.3 Security Target Evaluation Assurance Level (EAL): EAL2+ Doc No: 1903-000-D102 8 February 2016 Prepared For: EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada

More information

Security Target. EMC XtremIO v Evaluation Assurance Level (EAL): EAL2+ Doc No: D102 Version: March 2016.

Security Target. EMC XtremIO v Evaluation Assurance Level (EAL): EAL2+ Doc No: D102 Version: March 2016. EMC XtremIO v4.0.2 Security Target Evaluation Assurance Level (EAL): EAL2+ Doc No: 1906-000-D102 21 March 2016 Prepared For: EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada

More information

Intrusion Detection System Sensor Protection Profile

Intrusion Detection System Sensor Protection Profile Intrusion Detection System Sensor Protection Profile Prepared for National Security Agency 9800 Savage Road Fort Meade MD, 20755 Prepared by Science Applications International Corporation 7125 Gateway

More information

EMC Corporation EMC Smarts Service Assurance Management (SAM) Suite and Internet Protocol (IP) Management Suite

EMC Corporation EMC Smarts Service Assurance Management (SAM) Suite and Internet Protocol (IP) Management Suite EMC Corporation EMC Smarts Service Assurance Management (SAM) Suite and Internet Protocol (IP) Management Suite 6.5.1 Security Target Evaluation Assurance Level: EAL2 Document Version: 0.6 Prepared for:

More information

Prism Microsystems EventTracker Version 6.3 Build 93 Security Target

Prism Microsystems EventTracker Version 6.3 Build 93 Security Target Prism Microsystems EventTracker Version 6.3 Build 93 Security Target Version 1.6 June 22, 2010 Prism Microsystems, Inc. 8815 Centre Park Drive Columbia, MD 21045 DOCUMENT INTRODUCTION This document provides

More information

Security Target. Document Version November 2015

Security Target. Document Version November 2015 Security Target McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.5 Document Version 1.2

More information

AirTight Networks SpectraGuard Enterprise [v 5.0] and SpectraGuard SAFE Enterprise Edition [v 2.0] Security Target Version [1.

AirTight Networks SpectraGuard Enterprise [v 5.0] and SpectraGuard SAFE Enterprise Edition [v 2.0] Security Target Version [1. AirTight Networks SpectraGuard Enterprise [v 5.0] and SpectraGuard SAFE Enterprise Edition [v 2.0] Security Target Version [1.1] May 10, 2007 Suite 5200 7925 Jones Branch Drive McLean, VA 22102-3305 703

More information

ArcSight 3.0. Security Target

ArcSight 3.0. Security Target ArcSight 3.0 Security Target Version 1.0 29 September 2006 Prepared for: ArcSight 1309 South Mary Avenue Sunnyvale, CA 94087 Prepared By: Science Applications International Corporation Common Criteria

More information

Deep Discovery Inspector 3.2 Security Target (EAL2+)

Deep Discovery Inspector 3.2 Security Target (EAL2+) Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Deep Discovery Inspector 3.2 Security Target (EAL2+) Revision History Rev. # Description

More information

LANDesk Management Suite 8, V Security Target

LANDesk Management Suite 8, V Security Target LANDesk Management Suite 8, V8.6.1 Security Target Version 1.0 October 24, 2006 Prepared for LANDesk Software, Ltd Prepared by: CygnaCom Suite 5200 7925 Jones Branch Drive McLean, VA 22102-3305 703 848-0883

More information

NetIQ Sentinel 8.1 Security Target

NetIQ Sentinel 8.1 Security Target NetIQ Sentinel 8.1 Security Target Date: August 8, 2018 Version: 2.0 Prepared By: NetIQ Corporation Prepared For: NetIQ Corporation Suite 1200 515 Post Oak Blvd Houston, Texas 77027 Abstract This document

More information

Trustwave DbProtect Version Security Target

Trustwave DbProtect Version Security Target Trustwave DbProtect Version 6.4.9 Security Target Version 1.9 February 17, 2017 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin

More information

McAfee Endpoint Security with epolicy Orchestrator 5.3.1

McAfee Endpoint Security with epolicy Orchestrator 5.3.1 Security Target McAfee Endpoint Security 10.1.0 with epolicy Orchestrator 5.3.1 Document Version 1.6 May 4, 2016 Document Version 1.6 McAfee Page 1 of 71 Prepared For: Prepared By: McAfee, Inc. 2821 Mission

More information

NetIQ Sentinel Security Target. Abstract

NetIQ Sentinel Security Target. Abstract NetIQ Sentinel 7.2.1 Security Target Date: November 14 th, 2014 Version: 0.3 Prepared By: NetIQ Corporation Prepared For: NetIQ Corporation 515 Post Oak Blvd Suite 1200 Houston, Texas 77027 Abstract This

More information

Security Target. NetIQ Sentinel TM Version Document Version 1.4. November 6, Security Target: NetIQ Sentinel TM Version 7.0.

Security Target. NetIQ Sentinel TM Version Document Version 1.4. November 6, Security Target: NetIQ Sentinel TM Version 7.0. Security Target NetIQ Sentinel TM Version 7.0.1 Document Version 1.4 November 6, 2012 Document Version 1.4 NetIQ Corporation Page 1 of 41 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite

More information

Deep Security 9.5 Security Target (EAL2+) Revision: 21.0

Deep Security 9.5 Security Target (EAL2+) Revision: 21.0 Deep Security 9.5 Security Target (EAL2+) Revision: 21.0 Issued: 13 Mar 2015. Trend Micro, Inc. 40 Hines Road Suite 200 Ottawa, Ontario, Canada K2K 2M5 +1-866-684-7332 Revision History Rev. # Description

More information

Hewlett-Packard. Network Node Manager Advanced Edition Software v7.51 with patch PHSS_ Security Target V 1.13

Hewlett-Packard. Network Node Manager Advanced Edition Software v7.51 with patch PHSS_ Security Target V 1.13 Hewlett-Packard Network Node Manager Advanced Edition Software v7.51 with patch PHSS_35278. Security Target V 1.13 Prepared for Hewlett-Packard January 11, 2007 By Suite 5200 7925 Jones Branch Drive McLean,

More information

McAfee Endpoint Security with epolicy Orchestrator 5.3.2

McAfee Endpoint Security with epolicy Orchestrator 5.3.2 Security Target McAfee Endpoint Security 10.5.0 with epolicy Orchestrator 5.3.2 Document Version 1.8 April 17, 2017 Document Version 1.8 McAfee Page 1 of 72 Prepared For: Prepared By: McAfee, Inc. 2821

More information

Cisco Network Admission Control Security Target. Table of Contents

Cisco Network Admission Control Security Target. Table of Contents This document provides the basis for an evaluation of a specific Target of Evaluation (TOE), the Cisco Network Admission Control solutions. This Security Target (ST) defines a set of assumptions about

More information

NWAS Java 7.02 Security Target

NWAS Java 7.02 Security Target NWAS Java 7.02 Security Target Version 1.16 2010-12-20 Table of Content: 2010-12-20... 1 1 ST Introduction... 4 1.1 ST and TOE Identification... 4 1.2 TOE Overview... 5 1.3 TOE Description... 5 1.3.1 Product

More information

BMC Software, PATROL Perform/Predict, Version Security Target

BMC Software, PATROL Perform/Predict, Version Security Target , PATROL Perform/Predict, Version 6.5.30 Security Target Version 1.0 March 15, 2002 Prepared for:, Inc. 2101 City West Boulevard Houston, TX 77042 Prepared by: Computer Sciences Corporation 132 National

More information

EMC Corporation EMC ControlCenter 5.2 Service Pack 5. Security Target

EMC Corporation EMC ControlCenter 5.2 Service Pack 5. Security Target EMC Corporation EMC ControlCenter 5.2 Service Pack 5 Security Target Evaluation Assurance Level: EAL2+ Document Version: 1.01 Prepared for: Prepared by: EMC Corporation Corsec Security, Inc. 176 South

More information

Trustwave SIEM Enterprise Security Target

Trustwave SIEM Enterprise Security Target Trustwave SIEM Enterprise Security Target Version 2.7 April 11, 2016 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin Lane Silver

More information

Security Target. Symantec Brightmail Gateway Document Version 1.4. December 23, Security Target: Symantec Brightmail Gateway 9.0.

Security Target. Symantec Brightmail Gateway Document Version 1.4. December 23, Security Target: Symantec Brightmail Gateway 9.0. Security Target Symantec Brightmail Gateway 9.0.1 Document Version 1.4 December 23, 2010 Document Version 1.4 Symantec Page 1 of 36 Prepared For: Prepared By: Symantec Corporation 350 Ellis Street Mountain

More information

Security Target for Symantec Enterprise Firewall Version 7.0 For Windows NT

Security Target for Symantec Enterprise Firewall Version 7.0 For Windows NT . Security Target for Symantec Enterprise Firewall Version 7.0 For Windows NT Reference: T349\ST Version: 2.0 Europe: USA: Symantec (UK) Ltd Symantec Corporation Apex House 266 Second Avenue 4A-10 West

More information

Secure MFP Protection Profile - Lite

Secure MFP Protection Profile - Lite Page 1 of 22 Secure MFP Protection Profile - Lite Author: Yusuke OHTA, Ricoh Company, Ltd. Date: 2004/04/13 Version: 1.0e Page 2 of 22 Revision History Version Date Author Description 1.0 2002/11/29 Yusuke

More information

Firewall Protection Profile V2.0 Certification Report

Firewall Protection Profile V2.0 Certification Report KECS-CR-08-10 Firewall Protection Profile V2.0 Certification Report Certification No. : KECS-PP-0093-2008 Apr, 2008 National Intelligence Service IT Security Certification Center This document is the certification

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. For. Imperva SecureSphere 9.

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. For. Imperva SecureSphere 9. National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report For Report Number: CCEVS-VR-10466-2012 Dated: 28 December 2012 Version: 0.2 National Institute

More information

EMC VNXe1600 OE v3.1.3

EMC VNXe1600 OE v3.1.3 EMC VNXe1600 OE v3.1.3 Evaluation Assurance Level (EAL): EAL2+ Doc No: 1950-000-D102 Version: 0.7 18 March 2016 EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada 1223 Michael

More information

Network Intrusion Prevention System Protection Profile V1.1 Certification Report

Network Intrusion Prevention System Protection Profile V1.1 Certification Report KECS-CR-2005-04 Network Intrusion Prevention System Protection Profile V1.1 Certification Report Certification No. : CC-20-2005.12 12, 2005 National Intelligence Service This document is the certification

More information

Security Target. Juniper Networks vgw Series Version 5.5. Document Version 0.5. March 22, 2013

Security Target. Juniper Networks vgw Series Version 5.5. Document Version 0.5. March 22, 2013 Security Target Juniper Networks vgw Series Version 5.5 Document Version 0.5 March 22, 2013 Document Version 0.5 Juniper Networks Page 1 of 42 Prepared For: Prepared By: Juniper Networks, Inc. 1194 North

More information

Dell EMC NetWorker 9.1

Dell EMC NetWorker 9.1 Dell EMC NetWorker 9.1 Evaluation Assurance Level (EAL): EAL2+ Doc No: 1986-000-D102 Version: 1.2 10 July 2017 EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada 1223 Michael

More information

RICOH Remote Communication Gate A2 Security Target

RICOH Remote Communication Gate A2 Security Target RICOH Remote Communication Gate A2 Security Target Author : RICOH Date : 2016-11-10 Version : 0.42 This document is a translation of the evaluated and certified security target written in Japanese. Page

More information

Fidelis XPS Security Target

Fidelis XPS Security Target Fidelis PS Security Target Version 1.0 29 October 2008 Prepared for: Fidelis Security Systems, Inc 4416 East West Highway, Suite 310 Bethesda, Maryland 20814 Prepared By: Science Applications International

More information

Arbor Peakflow X Security Target

Arbor Peakflow X Security Target Arbor Peakflow Security Target Version 1.0 07/08/05 Prepared for: Arbor Networks, Inc. 430 Bedford Street, Suite 160 Lexington, MA 02420 Prepared By: Science Applications International Corporation Common

More information

Hewlett Packard Enterprise ArcSight ESM Security Target

Hewlett Packard Enterprise ArcSight ESM Security Target Hewlett Packard Enterprise ArcSight ESM Security Target Version 1.3 13 June 2017 Prepared for: 1160 Enterprise Way Sunnyvale CA, 94089 Prepared By: Accredited Testing and Evaluation Labs 6841 Benjamin

More information

Juniper Networks J-Series Family of Service Routers running JUNOS 7.3R2.14 Security Target

Juniper Networks J-Series Family of Service Routers running JUNOS 7.3R2.14 Security Target Juniper Networks J-Series Family of Service Routers running JUNOS 7.3R2.14 Security Target Version 1.0 April 3, 2006 Prepared for: Juniper Networks 1194 North Mathilda Avenue Sunnyvale, California 94089

More information

Juniper Networks JUNOS-FIPS 10.4R4 for SRX Series

Juniper Networks JUNOS-FIPS 10.4R4 for SRX Series Security Target Juniper Networks JUNOS-FIPS 10.4R4 for SRX Series Document Version 1.5 Rev A December 22, 2011 Document Version 1.5 2011 Juniper Networks Page 1 of 81 Prepared For: Prepared By: Juniper

More information

SECURITY TARGET FOR THE INTELLITACTICS INCORPORATED NETWORK SECURITY MANAGER (NSM ) VERSION 4.1

SECURITY TARGET FOR THE INTELLITACTICS INCORPORATED NETWORK SECURITY MANAGER (NSM ) VERSION 4.1 SECURITY TARGET FOR THE INTELLITACTICS INCORPORATED NETWORK SECURITY MANAGER (NSM ) VERSION 4.1 EWA-Canada Document No. 1447-011-D001 Version 1.13, 18 November 2004 Prepared for: Intellitactics Incorporated

More information

Dell EMC Unity OE v4.2

Dell EMC Unity OE v4.2 Dell EMC Unity OE v4.2 Evaluation Assurance Level (EAL): EAL2+ Doc No: 2009-000-D102 Version: 1.4 20 July 2017 EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada 1223 Michael

More information

December 17, Revision Document Number: E2-ST

December 17, Revision Document Number: E2-ST Security Target For Blue Ridge Networks BorderGuard Centrally Managed Embedded PKI Virtual Private Network (VPN) Firmware Release 6.2 and VPN Manager Application Software Release 2.2 Revision 1.10 December

More information

Sourcefire 3D System Security Target

Sourcefire 3D System Security Target Sourcefire 3D System (Sourcefire Defense Center: models DC500, DC1000, and DC3000; and Sourcefire 3D Sensor licensed for IPS: models 3D500, 3D1000, 3D2000, 3D2100, 3D2500, 3D3500, 3D3800, 3D4500, 3D5800,

More information

Data Security Kit DA-SC04 Security Target

Data Security Kit DA-SC04 Security Target Data Security Kit DA-SC04 Security Target Version 1.01 May 16, 2008 This document is a translation of the evaluated and certified security target written in Japanese. Panasonic Communications Co., Ltd.

More information

Version Symantec. Page 1 of 33

Version Symantec. Page 1 of 33 Security Target: Symantec Risk Automation Suite Version 4.0..5 Security Target Symantec Risk Automation Suite Version 4.0.5 Document Version 1.2 February 9, 2011 Document Version 1.2 Symantec Page 1 of

More information

McAfee Web Gateway Version EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.4.2.5 EAL 2 + ALC_FLR.2 Release Date: 19 November 2014 Version: 1.4 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document

More information

Sterling Commerce, Inc. Connect:Direct with Secure+ Option. v4.5 on IBM OS/390 and z/os

Sterling Commerce, Inc. Connect:Direct with Secure+ Option. v4.5 on IBM OS/390 and z/os Connect:Direct with Secure+ Option v4.5 on IBM OS/390 and z/os Document Version 0.1 Prepared for: 750 W. John Carpenter Freeway Irving, TX 75039 Prepared by: Corsec Security, Inc. 10340 Democracy Lane,

More information

MecWise HR 3.1 (R1) (MecWise ehuman Resource) Security Target

MecWise HR 3.1 (R1) (MecWise ehuman Resource) Security Target MecWise HR 3.1 (R1) (MecWise ehuman Resource) Security Target Version 1.11 Date: 4 th September, 2010 Document Information This section describes the Security Target document history, briefly describes

More information

Multi-Functional Printer (Digital Copier) 7145 Series Security Target Version 13

Multi-Functional Printer (Digital Copier) 7145 Series Security Target Version 13 Multi-Functional Printer (Digital Copier) 7145 Series Security Target Version 13 This document is a translation of the security target written in Japanese which has been evaluated and certified. The Japan

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report TippingPoint Intrusion Protection System (IPS) E-Series (5000E, 2400E, 1200E, 600E, 210E),

More information

WatchGuard Technologies WatchGuard LiveSecurity System with Firebox II 4.1 Security Target

WatchGuard Technologies WatchGuard LiveSecurity System with Firebox II 4.1 Security Target WatchGuard Technologies WatchGuard LiveSecurity System with Firebox II 4.1 Security Target Version 1.0 Final August 3, 2000 Prepared for: WatchGuard Technologies 316 Occidental Ave S, Suite 200 Seattle,

More information

Security Target. Version 1.21

Security Target. Version 1.21 MQAssure /AppShield v1.2 integrated with MQAssure /IAM v1.0 Security Target 03 January, 2011 Prepared for MagnaQuest Solutions Sdn Bhd A-2-07 & A-2-09 SME Technopreneur Centre Cyberjaya 2270, Jalan Usahawan

More information

Imperva SecureSphere 6 Security Target

Imperva SecureSphere 6 Security Target Imperva SecureSphere 6 Security Target Version 1.6 February 5, 2009 Prepared for: Imperva Inc. 950 Tower Lane, Suite 1550 Foster City, CA 94404 Prepared by: Metatron Security Services Metatron Security

More information

Sidewinder G2 Security Appliance Model 2150D and Sidewinder G2 Software v SECURITY TARGET

Sidewinder G2 Security Appliance Model 2150D and Sidewinder G2 Software v SECURITY TARGET Part Number 00-0946372-D Version Date 29 March 2007 Sidewinder G2 Security Appliance Model 2150D and Sidewinder G2 Software v 6.1.2 SECURITY TARGET Prepared by: Secure Computing Corporation 2340 Energy

More information

Security Target for Symantec Gateway Security Version Series (Firewall Engine Only)

Security Target for Symantec Gateway Security Version Series (Firewall Engine Only) . Security Target for Symantec Gateway Security Version 2.0 5400 Series (Firewall Engine Only) Reference: T423\ST April 2004 Issue: 3.3 Symantec Corporation 266 Second Avenue Waltham, MA 02451 USA Copyright

More information

Protection Profile for Virtualization Extended Package Server Virtualization. Version: National Information Assurance Partnership

Protection Profile for Virtualization Extended Package Server Virtualization. Version: National Information Assurance Partnership Protection Profile for Virtualization Extended Package Server Virtualization Version: 1.0 2016-11-17 National Information Assurance Partnership 1 Revision History Version Date Comment v1.0 2016-11-17 Initial

More information

Security Target IBM Tivoli Directory Server Version 5.2. Version: 1.5 Status: Final version Last update:

Security Target IBM Tivoli Directory Server Version 5.2. Version: 1.5 Status: Final version Last update: Security Target IBM Tivoli Directory Server Version 5.2 Version: 1.5 Status: Final version Last update: 2003-11-10 Copyright IBM 2003 PAGE 1 Document History Version Date Changes Summary Author 1.0 2003-07-09

More information

McAfee Change Control and Application Control 7.0.0

McAfee Change Control and Application Control 7.0.0 McAfee Change Control and Application Control 7.0.0 with epolicy Orchestrator 5.3.2 Document Version: 0.7 July 2, 2016 Intel Corporation. 2821 Mission College Blvd. Santa Clara, CA 95054 Abstract This

More information

Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific. Security Target

Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific. Security Target あ Fuji Xerox ApeosPort-II 7000/6000 Series Controller Software for Asia Pacific Security Target Version 1.0.9 This document is a translation of the evaluated and certified security target written in Japanese

More information

Tivoli Provisioning Manager Security Target. Version:

Tivoli Provisioning Manager Security Target. Version: Version: Status: Last Update: Classification: 1.7 Released 2008-12-18 public Trademarks IBM and the IBM logo are trademarks or registered trademarks of International Business Machines Corporation in the

More information

Protection Profile for Virtualization Extended Package Client Virtualization. Version: National Information Assurance Partnership

Protection Profile for Virtualization Extended Package Client Virtualization. Version: National Information Assurance Partnership Protection Profile for Virtualization Extended Package Client Virtualization Version: 1.0 2016-11-17 National Information Assurance Partnership 1 Revision History Version Date Comment v1.0 2016-11-17 Initial

More information

Sterling Commerce, Inc. Connect:Direct with Secure+ Option. v3.7 running on UNIX and v4.2 on Windows

Sterling Commerce, Inc. Connect:Direct with Secure+ Option. v3.7 running on UNIX and v4.2 on Windows Connect:Direct with Secure+ Option v3.7 running on UNIX and v4.2 on Windows Document Version 0.6 Prepared for: 750 W. John Carpenter Freeway Irving, TX 75039 Prepared by: Corsec Security, Inc. 10340 Democracy

More information

Micro Focus ArcSight Data Platform Security Target

Micro Focus ArcSight Data Platform Security Target Micro Focus ArcSight Data Platform Security Target Version 1.0 29 September 2017 Prepared for: Micro Focus 1160 Enterprise Way Sunnyvale CA, 94089 Prepared By: Accredited Testing and Evaluation Labs 6841

More information

EpsonNet ID Print Authentication Print Module Security Target Ver1.11

EpsonNet ID Print Authentication Print Module Security Target Ver1.11 EpsonNet ID Print Print Module Security Target Version 1.11 2008-06-24 SEIKO EPSON CORPORATION This document is a translation of the evaluated and certified security target written in Japanese. SEIKO EPSON

More information

NetApp Data ONTAP Version Security Target

NetApp Data ONTAP Version Security Target NetApp ONTAP 7.2.5.1 ST Version 37 NetApp Data ONTAP Version 7.2.5.1 Security Target NetApp, Inc. 8405 Greensboro Drive Suite 1000 McLean, VA 22102 Phone: 703-918-7200 Fax: 703-918-7301 May 14, 2007 revised

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Xceedium Gatekeeper Version 3.6 Report Number: CCEVS-VR-06-0048 Dated: 31 October 2006 Version:

More information

HP-UX 11i v2 Security Target

HP-UX 11i v2 Security Target HP-UX 11i v2 Security Target Against the Controlled Access Protection Profile (CAPP) And the Role Based Access Control (RBAC) Protection Profile Version 2.0 May 15, 2006 Sponsored by: Hewlett-Packard Prepared

More information

Kaseya International Limited Virtual System Administrator v Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1.

Kaseya International Limited Virtual System Administrator v Security Target. Evaluation Assurance Level: EAL2+ Document Version: 1. Kaseya International Limited Virtual System Administrator v6.2.1.0 Security Target Evaluation Assurance Level: EAL2+ Document Version: 1.1 Prepared for: Prepared by: Kaseya International Limited Avenue

More information

CA Inc. Integrated Threat Management r Security Target V1.8

CA Inc. Integrated Threat Management r Security Target V1.8 CA Inc. Integrated Threat Management r8.0.445 Security Target V1.8 May 1, 2007 Prepared By: Suite 5200 7925 Jones Branch Drive McLean, VA 22102-3321 703 848-0883 Fax 703 848-0960 SECTION TABLE OF CONTENTS

More information

CREDANT Mobile Guardian (CMG) Enterprise Edition Version SP4 Security Target

CREDANT Mobile Guardian (CMG) Enterprise Edition Version SP4 Security Target CREDANT Mobile Guardian (CMG) Enterprise Edition Version 5.2.1 SP4 Security Target Version 1.7 March 24, 2008 CREDANT Technologies, Inc. 15303 Dallas Parkway Suite 1420 Addison, Texas 75001 CREDANT, CREDANT

More information

Tarantella Enterprise 3 Security Target

Tarantella Enterprise 3 Security Target Tarantella Enterprise 3 Security Target Issue : 2.4 Date : Status : Definitive Release Document reference : Distribution : Prepared by : Robert Allison & Hugh Griffin... Reviewed by : Steve Hill... Authorised

More information

BMC CONTROL-SA Security Target

BMC CONTROL-SA Security Target BMC CONTROL-SA Security Target Version 1.0 8 July 2005 Prepared for: BMC Software, Inc. 2101 City West Boulevard Houston, T 77042 Prepared By: Science Applications International Corporation Common Criteria

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report 2012/78 2 May 2012 Version 1.0 Commonwealth of Australia 2012. Reproduction is authorised provided that the report is copied in

More information

Fuji Xerox ApeosPort-II 5010/4000/3000 Series Controller Software for Asia Pacific. Security Target

Fuji Xerox ApeosPort-II 5010/4000/3000 Series Controller Software for Asia Pacific. Security Target Fuji Xerox ApeosPort-II 5010/4000/3000 Series Controller Software for Asia Pacific Security Target Version 1.0.5 This document is a translation of the evaluated and certified security target written in

More information

Security Target. packet filter 3.0.3

Security Target. packet filter 3.0.3 Version 1.0 packet filter 3.0.3 Authors: Christian Koob, Jörg Marx, secunet Security Networks AG Certification-ID: BSI-DSZ-CC-0595 HISTORY Version Date Change(s) Author(s) 1.0 16/08/2010 Version for evaluation

More information

3Com Embedded Firewall Version Security Target

3Com Embedded Firewall Version Security Target 1 of 1 Part Number: 00-0937467-B Version Date: 5 March 2003 3Com Embedded Firewall Version 1.5.1 Security Target Secure Computing Corporation 2675 Long Lake Road Saint Paul, Minnesota 55113 Prepared by:

More information

Apple Computer Mac OS X v and Mac OS X Server v Security Target

Apple Computer Mac OS X v and Mac OS X Server v Security Target 1. Apple Computer Mac OS v10.3.6 and Mac OS Server v10.3.6 Security Target Prepared for: Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014 Prepared By: Science Applications International Corporation

More information

Blue Coat Systems, Inc. 650 Almanor Ave. Sunnyvale, CA Phone: Fax:

Blue Coat Systems, Inc. 650 Almanor Ave. Sunnyvale, CA Phone: Fax: Blue Coat ProxySG Operating System, v3.2.4.8 Security Target September 1, 2005 BCS-0290-(1) Blue Coat ProxySG v3-2-4-8 Security Target Blue Coat Systems, Inc. 650 Almanor Ave. Sunnyvale, CA 94085 Phone:

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Fidelis XPS 5.0.3 Report Number: CCEVS-VR-VID10223-2008 Dated: Version: 1.6 National Institute

More information

Security Target for Juniper Networks M/T/J Series Families of Service Routers running JUNOS 8.1R1

Security Target for Juniper Networks M/T/J Series Families of Service Routers running JUNOS 8.1R1 Security Target for Juniper Networks M/T/J Series Families of Service Routers running JUNOS 8.1R1 Version 1.0 April 2007 Prepared for: Juniper Networks 1194 North Mathilda Avenue Sunnyvale California 94089

More information

MQAssure TM NetSignOn Secure Desktop Login

MQAssure TM NetSignOn Secure Desktop Login MQAssure TM NetSignOn Secure Desktop Login EAL 1 Security Target Version 1.7 Date: 08 February 2012 MAGNAQUEST SOLUTIONS SDN. BHD. Document History Version No. Date Revision Description 1.0 31 July 2010

More information

Security Target for Juniper Networks M Series Multiservice Edge Routers, MX Series Ethernet Services Routers, T Series

Security Target for Juniper Networks M Series Multiservice Edge Routers, MX Series Ethernet Services Routers, T Series Security Target for Juniper Networks M Series Multiservice Edge Routers, MX Series Ethernet Services Routers, T Series Core Routers and EX Series Ethernet Switches running JUNOS 10.0R3.10 Version 1.3 October

More information

THALES COMMUNICATIONS S. A. INTERNAL COMMUNICATIONS MANAGEMENT SYSTEM

THALES COMMUNICATIONS S. A. INTERNAL COMMUNICATIONS MANAGEMENT SYSTEM THALES COMMUNICATIONS S. A. SECURITY TARGET INTERNAL COMMUNICATIONS MANAGEMENT SYSTEM Prepared by: IBM Global Services CLEF IBM UK Ltd Meudon House Meudon Avenue Farnborough Hampshire GU14 7NB Date: 23

More information

DBMS PP Extended Package Access History (DBMS PP_EP_AH) Version 1.02

DBMS PP Extended Package Access History (DBMS PP_EP_AH) Version 1.02 DBMS Working Group Technical Community March 23 rd, 2017 DBMS PP Extended Package Access History (DBMS PP_EP_AH) Version 1.02 BSI Revision History Version Date Description 1.0 November xx, 2016 Instantiation

More information

Remote Communication Gate A

Remote Communication Gate A Page 1 of 41 Remote Communication Gate A Security Target Author: RICOH COMPANY, LTD. Date: 2010-09-27 Version: 1.00. This document is a translation of the evaluated and certified security target written

More information

Riverbed Technology Cascade Profiler v9.6 Security Target

Riverbed Technology Cascade Profiler v9.6 Security Target Riverbed Technology Cascade Profiler v9.6 Security Target Evaluation Assurance Level (EAL): EAL3+ Document Version: 0.26 Prepared for: Prepared by: Riverbed Technology 199 Fremont Street San Francisco,

More information

CRUNCHY DATA SOLUTIONS, INC. CRUNCHY CERTIFIED POSTGRESQL 9.5 SECURITY TARGET VERSION 1.6

CRUNCHY DATA SOLUTIONS, INC. CRUNCHY CERTIFIED POSTGRESQL 9.5 SECURITY TARGET VERSION 1.6 CRUNCHY DATA SOLUTIONS, INC. CRUNCHY CERTIFIED POSTGRESQL 9.5 SECURITY TARGET VERSION 1.6 May 9, 2016 Prepared By: Table of Contents 1. SECURITY TARGET INTRODUCTION... 5 1.1. SECURITY TARGET REFERENCE...

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report ForeScout ActiveScout v3.0.5 / CounterACT v4.1.0 Report Number: CCEVS-VR-05-0108 Dated:

More information

Canon MFP Security Chip Security Target

Canon MFP Security Chip Security Target Canon MFP Security Chip Security Target Version 1.06 April 7, 2008 Canon Inc. This document is a translation of the evaluated and certified security target written in Japanese Revision History Version

More information

ForeScout ActiveScout / CounterACT Security Target

ForeScout ActiveScout / CounterACT Security Target ForeScout ActiveScout / CounterACT Security Target Version 2.4 26 June 2005 REF: ST PREPARED FOR: ForeScout Technologies, Inc. 10001 N. De Anza Blvd. Cupertino, CA 95014 DOCUMENT CONTROL DOCUMENT HISTORY

More information