Transition guide for ALC, ACM, ADO and AGD. Version 2.0,

Size: px
Start display at page:

Download "Transition guide for ALC, ACM, ADO and AGD. Version 2.0,"

Transcription

1 Transition guide for ALC, ACM, ADO and AGD Version 2.0,

2 Transition guide for ALC, ACM, ADO and AGD Version 2.0, Bundesamt für Sicherheit in der Informationstechnik Postfach Bonn Tel.: Internet: Bundesamt für Sicherheit in der Informationstechnik Bundesamt für Sicherheit in der Informationstechnik

3 Transition guide for ALC, ACM, ADO and AGD Contents Version 2.0, Contents Contents 3 List of Tables 7 List of Figures 9 List of Abbreviations Introduction Overview of the restructuring Graphical representation of the restructuring Effects on evaluation assurance levels New aspects Integration (RI #183) Production Handling of standards in ALC_TAT (RI #71) Refinement of CM access control Delivery (RI #128, RI #210) Developer IGS Discussion on terminology in ACM-ALC-ADO-AGD Overview Configuration Management Life-cycle Life-cycle model Acceptance ALC_DVS ALC_DVS.1 (Identification of security measures) ALC_DVS.2 (Sufficiency of security measures) Overview of element and work unit coverage ALC_FLR ALC_FLR.1 (Identification of security measures) ALC_FLR.2 (Flaw reporting procedures) ALC_FLR.3 (Systematic flaw remediation) ALC_LCD ALC_LCD.1 (Developer defined life-cycle model) ALC_LCD.2 (Standardised life-cycle model) 27 Bundesamt für Sicherheit in der Informationstechnik 3

4 Contents Transition guide for ALC, ACM, ADO and AGD Version 2.0, ALC_LCD.3 (Measurable life-cycle model) Comments on CC 3.0 Revision 2 (July 2005) Discussion Proposed specific changes in CC and CEM Documents ALC_TAT ALC_TAT.1 (Well-defined development tools) ALC_TAT.2/3 (Compliance with implementation standards/ all parts) ACM_SCP Strict separation of CM capability and scope Components Elements Overview Wording and numbering of the new ALC_CMS elements Verification that the ACM_SCP elements are covered in the new structure Work units ACM_CAP Basic considerations Components Elements Preliminary remarks Overview Wording and numbering of the new ALC_CMC elements Verification that the ACM_CAP elements are covered in the new structure Work units ACM_AUT Merging of CM capability and automation Components Elements Overview Verification that the ACM_AUT elements are covered in the new structure Work units AGD Basic considerations Components 53 4 Bundesamt für Sicherheit in der Informationstechnik

5 Transition guide for ALC, ACM, ADO and AGDContents Version 2.0, Contents 11.3 Elements Work units AVA_MSU Basic considerations Components Elements Work units ADO_DEL / developer s procedures Basic considerations Components Elements Work units ADO_DEL / user s procedures Basic considerations Components Elements Work units ADO_IGS / user s procedures Basic considerations Components Elements Work units ADO_IGS / developer s procedures Basic considerations Components Elements Work units Interactions with ADV_IMP Elements The element ADV_IMP.1.3C The element ADV_IMP.2.2E Concept for a Guideline on Site Visits Motivation Reasons for the Need for a Guidance on Site Visits 73 Bundesamt für Sicherheit in der Informationstechnik 5

6 Contents Transition guide for ALC, ACM, ADO and AGD Version 2.0, Proposal for Annex A.4 in CC 3.x (was Annex B.5 in CC 2.x) Introduction General Approach Orientation Guide for the Preparation of the Check List Example of a checklist Further ideas EAL 1 evaluation Redundancy between ALC_FLR and ACM_SCP Redundancy between the ALC families DVS and LCD Processing of RIs Overview Draft interpretation for RI # Draft interpretation for RI # Draft interpretation for RI # Draft interpretation for RI # Draft interpretation for RI # Draft interpretation for RI # Draft interpretation for RI # Bundesamt für Sicherheit in der Informationstechnik

7 Transition guide for ALC, ACM, ADO and AGDList of Tables Version 2.0, List of Tables List of Tables Table 1: Cross reference of EALs and AGD/ALC components Table 2: Development Security: Correspondence of elements and work units Table 3: Comment on ALC_LCD Table 4: Comment 1 on ALC_LCD Table 5: Comment 2 on ALC_LCD Table 6: Comment 3 on ALC_LCD Table 7: CM Scope: Correspondence of components Table 8: CM Scope: Correspondence of elements Table 9: CM Scope: The new elements Table 10: CM Scope: Coverage of elements Table 11: CM Scope: Correspondence of elements and work units Table 12: CM Capability: Correspondence of components Table 13: CM Capability: Correspondence of elements (levels 1 to 4) Table 14: CM Capability: Correspondence of elements (level 5) Table 15: CM Capability: The new elements Table 16: CM Capability: Coverage of elements Table 17: CM Capability: Correspondence of elements and work units Table 18: CM Automation: Mapping of components Table 19: CM Automation: Mapping of elements Table 20: CM Automation: Coverage of elements Table 21: CM Automation: Mapping of work units Table 22: Guidance Documents: Mapping of components Table 23: Guidance Documents: Coverage of elements Table 24: Guidance Documents: Coverage of work units Table 25: Misuse: Mapping of components Table 26: Misuse: Coverage of elements Table 27: Misuse: Coverage of work units Table 28: Delivery (developer s procedures): Mapping of components Table 29: Delivery (developer s procedures): Mapping of elements Table 30: Delivery (user s procedures): Mapping of components Table 31: Delivery (user s procedures): Mapping of elements Table 32: IGS (user s procedures): Mapping of components Table 33: IGS (user s procedures): Coverage of elements Table 34: IGS (developer s procedures): Mapping of components Table 35: IGS (developer s procedures): Coverage of elements Table 36: IGS (developer s procedures): Coverage of work units Table 37: Checklist part A: Examination of the CM system Table 38: Checklist part B: Examination of the delivery procedures Table 39: Checklist part C: Examination of the developer security Table 40: Consideration of RIs Table 41: RI #26: Identifying (and controlling) CIs for ACM_CAP Bundesamt für Sicherheit in der Informationstechnik 7

8 List of Tables Transition guide for ALC, ACM, ADO and AGD Version 2.0, Table 42: RI #71: No quality measures for development tools and implementation standards Table 43: RI #99: Configuration Items in the Absence of Explicit Scope Table 44: RI #179: When to meet ALC_DVS and ALC_LCD Table 45: RI #183: Life-cycle Specification Table 46: RI #196: Splitting CM into separate parts Table 47: RI #210: Security and "Confidentiality" Bundesamt für Sicherheit in der Informationstechnik

9 Transition guide for ALC, ACM, ADO and AGD Version 2.0, List of Figures List of Figures Figure 1: Mapping of the CC 2.3 classes and families considered here to CC 3.1 classes and families 13 Figure 2: Graphical overview of the terminology in CM and in the Product Life Cycle 19 Figure 3: Guidance Documents: Mapping of elements 54 Figure 4: Misuse: Mapping of elements 59 Bundesamt für Sicherheit in der Informationstechnik 9

10 List of Abbreviations Transition guide for ALC, ACM, ADO and AGD Version 2.0, List of Abbreviations Apart from the abbreviations commonly used in the CC and CEM, the following abbreviations are used throughout this document: AIS BSI CCMB CCIMB CI CM ISO ITSEC QM RI URL v WU Application Notes and Interpretation of the Scheme (used in the German Certification Scheme) Bundesamt für Sicherheit in der Informationstechnik (German Certification Overseer) Common Criteria Maintenance Board Common Criteria International Maintenance Board (former denotation of the CCMB) Configuration item Configuration management International Organization for Standardization Information Technology Security Evaluation Criteria Quality management Request for Interpretation Uniform Resource Locator Version Work unit 10 Bundesamt für Sicherheit in der Informationstechnik

11 Transition guide for ALC, ACM, ADO and AGD Version 2.0, Introduction Overview of the restructuring 1. Introduction 1.1 Overview of the restructuring This document describes and justifies the modifications made in the new structure (i.e. version 3.1 of the Common Criteria and CEM) relative to the last official version 2.3 ( previous criteria ) insofar the classes ALC, ACM, ADO, AGD and the component AVA_MSU.1 are concerned. Changes suggested by the version 2.4 and by open RIs are not treated as previous criteria here, though they have also been taken into account and, if incorporated into the new structure, are treated as modifications of the previous criteria. The processing of RIs in the new concept is described in detail in chapter 20. The objectives of the reorganisation have primarily been to eliminate redundancies and to enhance clarification of the evaluation work, not to modify the contents of the concerned classes. (However, minor changes of the contents have been made here and there if sensible and helpful for the objectives.) A graphical representation of the restructuring is given in section 1.2. In order to clarify the structure, we have tried to set up the minimal life-cycle model that is implicitly assumed by the CC (see chapter 3.3.1), and to bring the CC classes and families in line with the life-cycle phases. The main part of this document (chapters 4 to 16) explains how the considered parts of the previous criteria are embedded into the new structure. Most assurance families are treated in one chapter, some families are split up, the two AGD families are treated conjointly in one chapter. The families DVS, FLR, LCD, and TAT of the present ALC class are taken over in the new ALC class retaining their denotations. Their modifications in the new structure are described in the chapters 4 to 7. Configuration management is an essential part of those measures implemented in order to guarantee a welldefined life-cycle process for a product. So it seems reasonable (and is done in the new structure) to deal with the overlapping between ACM and ALC by consolidating these two classes into one new class. Since ALC ( Life-cycle support ) is the more general term, this one is chosen as name of the new class. The ACM families SCP and CAP are transferred into the new ALC class. Since they are reorganised (strict separation of capability and scope), they get the new denotations CMS resp. CMC (cf. chapters 8.1 and 9.1). The ACM family AUT is integrated into CMC (cf. chapter 10.1). The present AGD class deals with the operational phase of the TOE (cf. chapter 11.1). The two families USR and ADM have many similar requirements and belong to the same life-cycle phase, so they are combined to a single new family denoted by AGD_OPE ( Operational user guidance ). The distinction of user types is managed by the introduction of a role concept. The family AVA_MSU overlaps strongly with AGD and is dissolved in the new structure. The nonredundant MSU requirements are moved to AGD and to AVA_VAN (cf. chapter 0; the description of AVA_VAN, which replaces the previous AVA_VLA, is outside of the scope of this document). The ADO class is dissolved in the new structure. Presently it consists of the two families DEL ( Delivery ) and IGS ( Installation, generation and start-up ) which are treated as follows: DEL concerns mainly the developer. The developer delivery activities are shifted into ALC as a new family ALC_DEL (cf. chapter 13). The user delivery activities (i.e. acceptance procedures of the delivered TOE) are merged into the new family AGD_PRE mentioned below (cf. chapter 14), IGS concerns mainly the user. The user IGS activities are shifted into AGD as a new family AGD_PRE ( Preparative procedures ) (cf. chapter 15). The developer IGS activities are essentially covered by CMC requirements (cf. chapter 16). Bundesamt für Sicherheit in der Informationstechnik 11

12 Introduction Transition guide for ALC, ACM, ADO and AGD Overview of the restructuring Version 2.0, Thus the AGD class in the new structure consists of the two families OPE and PRE and assembles all the user procedures. The two AGD families might even be merged into a single one, but because of the correspondence to life-cycle phases, we have preferred the separate treatment. Chapter 17 discusses some interdependencies with ADV_IMP. Chapter 18 contains a concept for a guideline on site visits. A guideline on delivery procedures is in preparation. There are not necessarily impacts on elements and work units. Some new aspects and their consideration in the new criteria are discussed in chapter 2, some further ideas in chapter 19. Note: When the old and new denotation of a family/component/element/work unit differ, they are sometimes indicated both consecutively, the old one crossed out, for instance AVA_VLAVAN or ALC_LCD Bundesamt für Sicherheit in der Informationstechnik

13 Transition guide for ALC, ACM, ADO and AGD Introduction Version 2.0, Graphical representation of the restructuring 1.2 Graphical representation of the restructuring CC 3.1 structure ALC AGD AVA Configuration Management Infrastructural Management Quality & Project Management CMS Scope CMC Capability DVS Developer Security FLR Flaw remediation LCD Life Cycle Def. TAT Tools &Techniques DEL Delivery PRE Preparation OPE Operation VAN Vuln. Analysis Developer Developer User User SCP Scope CAP Capability AUT Automation DVS Developer Security FLR Flaw remediation LCD Life Cycle Def. TAT Tools &Techniques DEL Delivery IGS Install. Gener. Startup ADM Admin. Guidance USR User Guidance MSU.1 Misuse Exam. Guid. MSU.2/3 Misuse Analys. Testing VLA Vuln. Analysis ACM ALC ADO AGD AVA CC 2.3 structure Figure 1: Mapping of the CC 2.3 classes and families considered here to CC 3.1 classes and families Bundesamt für Sicherheit in der Informationstechnik 13

14 Introduction Transition guide for ALC, ACM, ADO and AGD Effects on evaluation assurance levels Version 2.0, Effects on evaluation assurance levels The following table describes the relationship between the evaluation assurance levels and the assurance families and components in the new assurance classes considered here: Assurance Class Assurance Family Assurance Components by Evaluation Assurance Level EAL1 EAL2 EAL3 EAL4 EAL5 EAL6 EAL7 Guidance AGD_OPE documents AGD_PRE Life-cycle support ALC_CMC ALC_CMS ALC_DEL ALC_DVS ALC_FLR ALC_LCD ALC_TAT Table 1: Cross reference of EALs and AGD/ALC components 14 Bundesamt für Sicherheit in der Informationstechnik

15 Transition guide for ALC, ACM, ADO and AGD New aspects Version 2.0, Integration (RI #183) 2. New aspects 2.1 Integration (RI #183) Here integration means the inclusion of parts into the TOE which have been produced by other manufacturers. (The instance joining the parts together is called the integrator.) The question is how these parts have to be taken into account by the evaluation. Two subcases can be distinguished: 1. If all of the integrated parts have already been certified on at least the assurance level of the actual evaluation, this is the situation of a composition evaluation (in the sense of the CC supporting document ETR-lite for composition ). Then the evaluation of the integration procedure consists of verifying the composition requirements. An issue arises when the ETR of an integrated certified part contains proprietary information that cannot be made available to the integrator. For this case it has been suggested to compile the needed information in an additional document, the so-called ETR-lite for composition. This should be a subset of the ETR and must be usable for the specific needs of the composition evaluation. ETR-lite issue : Is it possible to substitute the ETR of a certified integrated part of the TOE by a document that contains less information on the integrated product? The treatment of this issue is left to the UK working group on composition evaluation. 2. If parts are integrated in the TOE which have not yet been evaluated, or have only been evaluated on a lower level, then it arises the Integration issue : Is it possible to substitute lacking or unknown adherence of ALC requirements at subcontractors sites by acceptance procedures? The previous criteria didn t make an explicit statement on this. That meant implicitly, the ALC requirements had to be adhered from the beginning of the life-cycle, in particular at subcontractors sites. So the answer to the issue was No. (However, no additional requirements were imposed for integrated parts that were not securityrelevant.) In order to reduce evaluation work, one might consider two levels to relax this strict requirement: 1. It is sufficient that the integrator gives a statement that ALC has been adhered by the subcontractors. 2. The lowest possible requirement is that the evidence needed for the further evaluation (e.g. the identifiers and the low level design of the integrated parts) has to be present at the integrator s site. However, it should be taken into consideration, that each form of attenuation would influence the competition, since it advantages developers who outsource parts of the production to subcontractors. The ETR-lite issue (see the preceding section) suggests a comparatively marginal weakening (the integrated parts are actually certified, only it is not possible to give the complete ETR to the evaluator of the integrator product), and even that is not generally accepted. So we suggest to continue adhering rigidly to the general validity of the ALC requirements also in the integration situation. 2.2 Production The previous criteria dealt quite extensively with the term development of the TOE, whereas production appeared only marginally. In our understanding develop and derived terms were meant to comprise development and production. The new criteria shall generally keep this practice. Bundesamt für Sicherheit in der Informationstechnik 15

16 New aspects Transition guide for ALC, ACM, ADO and AGD Handling of standards in ALC_TAT (RI #71) Version 2.0, There are some terms in the configuration management requirements ( manufacturing, generation, integration ) specifically related to production. We see it the way that these terms all mean production under a certain aspect. In the new structure, they are all replaced by production, since the particular aspect becomes clear from the context. Thereby we think to enhance comprehensibility of the criteria. This is discussed in more detail in chapter Handling of standards in ALC_TAT (RI #71) ALC_TAT.2 requires the developer to describe the implementation standards to be applied, and the evaluator to confirm that these standards have been applied. However, the component includes no measures of quality or coverage for the implementation standards. This issue is discussed in chapter Refinement of CM access control The present criteria at CAP.3 require the CM system to provide measures such that only authorised changes are made to the configuration items (ACM_CAP.3.10C). It has been annotated that this requirement leaves a wide scope of interpretation and implementation. For instance, user authentication might open access to the complete server, or the other way round only grants access to files that are needed to fulfil a concrete task assigned to a concrete member of the development staff. So minimum preconditions for the granting of access might be required subject to the chosen CAP component, for instance: ACM_CAP.3 Ownership ACM_CAP.4 Ownership and need to change Alternatively this could be managed by security policies defined in the ST. 2.5 Delivery (RI #128, RI #210) The ADO class is dissolved in the new structure. Since the family DEL describes developer procedures, it is located within ALC in the new concept (cf. chapter 13). Indeed, delivery includes also activities to be performed by the user (acceptance of the received TOE on the basis of the identifiers and procedures defined by the developer). These user acceptance procedures were not explicitly articulated in the previous CC version, and are placed within AGD in the new structure. This is presented in more detail in chapter 14. By RI #128, the evaluation methodology shall state explicitly, that the delivery documentation should cover the entire TOE, but may contain different procedures for different parts of the TOE. The indicated change in the guidance text belonging to the first work unit of DEL is adopted in the new structure. From version 2.1 to version 2.2 of the criteria, the scope of ADO_DEL has been broadened beyond integrity to all aspects of security (confidentiality, availability). However (as RI #210 annotates, cf. chapter 20.8), only ADO_DEL.1 actually takes into account all aspects of security, whereas ADO_DEL.2 and ADO_DEL.3 only deal with integrity. Should the higher DEL components 2 and 3 be expanded to confidentiality and availability as well? And should confidentiality be concerned with the act of the delivery and/or with the contents of the delivery? But these security aspects are only to be considered if required by the PP/ST for the actual TOE (whereas integrity is relevant for all kinds of TOEs). Further, the reasonability of the DEL.3 requirement prevention of modification has recently been put into question. To avoid unnecessary regulations in these areas, in the new concept the three DEL components are merged into a single one which requires the developer to take into account all those security aspects required by the PP/ST for the actual TOE, and to commensurate the level of protection with the chosen level of AVA_VLAVAN. 16 Bundesamt für Sicherheit in der Informationstechnik

17 Transition guide for ALC, ACM, ADO and AGD Version 2.0, New aspects Developer IGS 2.6 Developer IGS Whereas IGS mainly deals with user activities, procedures at the development site have also to be taken into account as is pointed out in the CEM. Since developer and user activities belong to different life-cycle phases, they are assigned to different CC families. User IGS procedures, as all user activities, are assembled in families of the AGD class in the new structure (cf. chapter 15). Developer IGS activities are covered by CM capability requirements, cf. the discussion in chapter 16. Bundesamt für Sicherheit in der Informationstechnik 17

18 Discussion on terminology in ACM-ALC-ADO-AGD Transition guide for ALC, ACM, ADO and AGD Overview Version 2.0, Discussion on terminology in ACM-ALC-ADO-AGD 3.1 Overview This chapter discusses definitions for the terms identified as needing a common understanding in CCMB discussions on the ACM, ALC, ADO, AGD classes. These definitions are compiled in a glossary in Part 1 of the new criteria, and are resumed in Part 3 where they are needed. Meanwhile, a general point arises: Many terms and passages of the CC reveal their origin from the software world and are often not suitable when evaluating hardware TOEs or TOEs with hardware components. (For instance: The production phase is dealt with only marginally.) So it would be a useful long-term objective to free the CC from the software specific terms (or to convert these passages into examples) and to find generally applicable formulations. As a first step, some examples relating to hardware TOEs have been introduced into the CEM. On the following page, we present a graphical description of many of the terms used in configuration management and in the product life-cycle with their relations, that is also contained in Part 1 of the new criteria. 18 Bundesamt für Sicherheit in der Informationstechnik

19 Transition guide for ALC, ACM, ADO and AGD Discussion on terminology in ACM-ALC-ADO-AGD Version 2.0, Overview CM System CM Tools CM Output CM Output Doc. CM Plan Product specific CM System Tool-Doc. CM Usage Doc. produce CM System Records produce Config. List cont ains CM items Proc.-Doc. defines CM Procedures Actions manual CM control measures use enforces controls use Developer s Responsibility Development Environment Development Testing Production (e.g. Manufacturing, Integration, Generation, Storage, Labelling) Product Life Cycle Delivery Process Dispatch send Acceptance User s Responsibility Preparation Installation Operational Environment Operation *CM Documentation = CM Usage Doc. + CM Output Doc. Figure 2: Graphical overview of the terminology in CM and in the Product Life Cycle Bundesamt für Sicherheit in der Informationstechnik 19

20 Discussion on terminology in ACM-ALC-ADO-AGD Transition guide for ALC, ACM, ADO and AGD Configuration Management Version 2.0, Configuration Management The following definitions for all CM related terms seem to make most sense (and are compatible to the CC and CEM requirements). These definitions can be found by interpreting a CM system as a specific management system. According to ISO Guide 72 (2001) Guidelines for the justification and development of management system standards the following definition holds: Management system: system to establish policy and objectives and to achieve those objectives. The policy and objectives for a configuration management system are not explicitly stated, but the following is probably consensus: The task of a CM system is to manage certain objects, called configuration items, typically source code files, hardware drawings, documents, hardware parts and so on. The main objective is to manage the configuration items in such a way, that it can be determined, which configuration items belong together in order to contribute to a specific product (e. g. a software built from certain source files or a hardware built from certain parts). One objective (from the security point of view) is to prevent unauthorised modification of configuration items or more generally to prevent unauthorised access. Using these considerations, the following definitions can be given. Note: This interpretation for the CM terms can also be found by replacing the CM with QM in the terms and looking, what the terms would mean in the QM context. CM system is the overall term for the set of all procedures and tools (including their documentation) used by a developer to maintain configurations of his products during their life-cycles. [This fits to the meaning of QM system.] All following objects can be considered to be a part of the system. From this definition, terms like CM procedures are also clear. The CM usage documentation is a part of the CM system, which consists of the documents describing, how the CM system is defined and used (this encloses handbooks, regulations, documentation of tools used for CM, if tools are used, and so on). The CM output are CM related results produced or enforced by the CM system. These CM related results occur as documents (e.g. filled paper forms, CM system records, logging data, hardcopies and electronic output data) as well as actions (e.g. manual measures to fulfil CM instructions). Examples of such CM outputs are configuration lists, CM plans and/or behaviours during the product life-cycle. The CM documentation consists of the CM usage documentation and the CM output documentation. ( Documentation of the CM system is the same as CM documentation.) [ CM documentation corresponds to the meaning of QM documentation.] The CM plan is a part of the CM documentation. It gives the description, how the CM system is used for a specific project or product. [This fits to the meaning of QM plan.] From the point of view of the overall CM system this can be seen as an output document (because it may be produced as part of the application of the CM system). From the point of view of the concrete project it is a usage document because members of the project team use it in order to understand, which steps they have to do during the project. 20 Bundesamt für Sicherheit in der Informationstechnik

21 Transition guide for ALC, ACM, ADO and AGD Version 2.0, Discussion on terminology in ACM-ALC-ADO-AGD Life-cycle For example the CM plan defines the scope of the system for the specific product, because the same system may be used with different scope for different products. A CM item or configuration item is an object managed by the CM system, i.e. which is stored in the CM system directly (e. g. for files) or by reference (e. g. by hardware parts) together with its version. The CM list or configuration list is a CM output document listing all configuration items for a specific product together with the exact version of each CM item relevant for a specific version of the complete product (in the CC context this will be the evaluated version). [Here the comparison to QM systems doesn t work as it does for the other terms, because QM list is not a term used for QM systems with a comparable meaning]. This list allows distinguishing the items belonging to the evaluated version of the product from other versions of these items belonging to other versions of the product. The final CM list is a specific document for a specific version of a specific product. (Of course the list can be an electronic document inside of a CM tool. In that case it can be seen as a specific view into the system or a part of the system rather than an output of the system. However, for the practical use in an evaluation the configuration list will probably be delivered as a part of the evaluation documentation.) Some further terms are clear from this: CM access control is the set of mechanisms and procedures guaranteeing that only authorised access is granted to configuration items. CM system records are those output documents, which are produced during the operation of the CM documenting important activities. (E.g. the list of modifications of a configuration item together with the ID of the person, who made the changes may be a typical part of these data.) CM tools : If a CM system is realised or supported by a tool, this tool will be a CM tool (e. g. the standard UNIX tool CVS or Perforce" as a commercial tool). CM evidence is everything that may be used to establish confidence in the correct operation of the CM system, e.g. CM output, demonstrations provided by the developer, observations, experiments or interviews made by the evaluator during a site visit. 3.3 Life-cycle Life-cycle management can be seen as the highest level of management for a product or system, since quality management, configuration management, project management and so on can all be seen as part of the life-cycle management. However, this depends on the point of view. A quality manager may see QM as the highest level, because all other management activities contribute to quality. As CM systems, also life-cycle management systems can be discussed. Though the CC doesn t require such a system, some of the terms used in the CC can be discussed in this context. The life-cycle of a certain object (e. g. a product or a system) is a sequence of stages of existence of this object in time. Which stages one uses depends on the object, but usual stages for IT products are development, testing, operation and so on Life-cycle model The life-cycle model defines, which stages are used in the management of the life-cycle of a certain object, how the sequence of stages looks like and which high level characteristics the stages have. The definition of the Life-Cycle Model is the Life-Cycle Definition. A measurable life-cycle model (as required in ALC_LCD.32) is a life-cycle model using some quantitative valuation of the managed product (a metric ) in order to measure some quality aspects of the object. Typi- Bundesamt für Sicherheit in der Informationstechnik 21

22 Discussion on terminology in ACM-ALC-ADO-AGD Transition guide for ALC, ACM, ADO and AGD Life-cycle Version 2.0, cal metrics are software complexity metrics. The use of such metrics may add assurance in the overall quality of the development process. More details are given in section 6.3. As indicated in the introduction (1.1), we will try to set up the life-cycle model which is implicitly assumed by the CC. At least four life-cycle phases were clearly distinguishable in the previous criteria that had to be taken into account by the evaluation: 1. Development 2. Delivery 3. IGS (Installation, generation and start-up) 4. Operation (end-usage) Production did not explicitly appear in the previous criteria; development was meant to comprise development and production. In the life-cycle model below, production is displayed as a separate life-cycle phase, but in the new requirements the practice is kept to use development and related terms ( developer, develop ) in the more general sense to comprise development and production. In the requirements of the family ACM_CAP there were used several terms with a meaning similar to production: Manufacturing, generation, integration. These seem to be closely related to each other: ACM_CAP.5.13C: The integration procedures shall describe how the CM system is applied in the TOE manufacturing process. ACM_CAP.5.19C:... the use of the integration procedures ensures that the generation of the TOE is correctly performed.... We see it the way that the aforementioned terms all meant production under a certain aspect. Since the aspect becomes clear from the context, we think to enhance comprehensibility of the criteria by replacing them all with production. In the case of a software-only TOE, the production phase may be trivial; other phases may be trivial too, for instance IGS in the case of a smart card. IGS: The CC does not explicitly define the difference between installation and generation. For instance, it is not really clear if running a setup routine for the TOE has to be regarded as generation or installation. On an abstract level, the ambiguity is even greater. Also, there may be a division of responsibility for the IGS procedures between the user and the developer. In the new structure, a pragmatic approach as follows is taken: The IGS activities at the development site are dealt with in the context of the production, and the IGS activities at the user s site (referred to as installation of the TOE) in the guidance documentation. Preparation comprises user s acceptance and installation procedures of the received TOE. So the new structure orientates itself to a life-cycle model consisting of the following five phases: 1. Development 2. Production 3. Delivery 4. Preparation (acceptance and installation) 5. Operation (end-usage) In the following, we will discuss the boundaries between the subsequent life-cycle phases. 22 Bundesamt für Sicherheit in der Informationstechnik

23 Transition guide for ALC, ACM, ADO and AGD Version 2.0, Discussion on terminology in ACM-ALC-ADO-AGD Life-cycle Development Production: The development phase consists of creating the implementation representation (the least abstract representation) of the TOE. Based on the implementation representation, no further design decisions have to be made to produce the TOE. Production Delivery: The production phase consists of transforming the implementation representation into the implementation of the TOE. The following examples show the type of questions that arise here: Transports of parts of the TOE or the unfinished TOE between different development sites is classified here definitely as production, not as delivery. Storage of the TOE after its completion might be assigned to either phase. (The CEM supports the view to see it as part of the delivery, cf. paragraph 1263.) Production of personalised smart cards, the classification of the developer s personalisation process being the question. Delivery Preparation: The delivery phase consists of the transfer of the finished TOE into the responsibility of the user. This does not necessarily coincide with the arrival of the TOE at the user s location. How should user s acceptance of the delivered TOE be classified? Since this is a user activity, it has to be described in the user guidance anyway. In order to accommodate CC families and life-cycle phases, in the new structure user s acceptance procedures are classified as preparation. Preparation Operation: Preparation comprises all the processes that have to be performed (normally) only once after receipt of the TOE at the user s site to progress the TOE and its environment into the evaluated configuration as described in the ST (this may include such things as booting, initialisation, start-up), whereas operation covers those processes which have to be carried out during the continuous end-usage of the TOE. Hereby all processes at the user s site are covered. Thus an explicit start-up phase is dispensable, its processes might be assigned either to preparation or to operation, as the case may be. The preparation phase ends, when the TOE is in its evaluated configuration Acceptance A specific part of the life-cycle management is the decision, when managed objects move on to the next step of the life-cycle. This is called Acceptance, if it is an explicit decision, which for example depends on a certain quality or maturity of the object. For example the release of an IT product for production or for operation after sufficient testing is a typical acceptance step. Acceptance procedures are the procedures followed in order to make such an acceptance step (e. g. it may be defined, that a project manager documents the acceptance of a newly developed product for production by signing a certain paper form). In the new structure, acceptance procedures during development and production in order to accept a configuration item as part of the TOE are described in the CM plan. Acceptance procedures followed by the recipient of the delivered TOE in order to verify its integrity should be described in the user guidance. Bundesamt für Sicherheit in der Informationstechnik 23

24 ALC_DVS Transition guide for ALC, ACM, ADO and AGD ALC_DVS.1 (Identification of security measures) Version 2.0, ALC_DVS The two components of ALC_DVS and their denotations have been retained, modifications have been performed only within the components. 4.1 ALC_DVS.1 (Identification of security measures) In this component the following redundancy in version 2.3 has been identified: ALC_DVS.1.2C: The development security documentation shall provide evidence that these security measures are followed during the development and maintenance of the TOE. with belonging work unit ALC_DVS.1-3: The evaluator shall check the development security documentation to determine that documentary evidence that would be produced as a result of application of the procedures has been generated. are covered by ALC_DVS.1.2E: The evaluator shall confirm that the security measures are being applied. with belonging work unit ALC_DVS.1-4: The evaluator shall examine the development security documentation and associated evidence to determine that the security measures are being applied. Therefore the element ALC_DVS.1.2C with belonging work unit ALC_DVS.1-3 are deleted in version 3.1. The only effect on numbering regards work unit 1-4, which becomes work unit ALC_DVS.2 (Sufficiency of security measures) First this component contains the same redundancy as ALC_DVS.1 Accordingly the element ALC_DVS.2.2C with belonging work unit ALC_DVS.2-3 are deleted in version 3.1. (To keep the explanations in this section traceable, the numbers of the elements and work units are those from version 2.3; the mapping to the new numbers is given in the following section 4.3.) The title of ALC_DVS.2 is at first glance puzzling since already in ALC_DVS.1 the evaluator is required to determine the sufficiency of the security measures employed, namely by the work unit ALC_DVS.1-2: The evaluator shall examine the development confidentiality and integrity policies in order to determine the sufficiency of the security measures employed. belonging to the element ALC_DVS.1.1C: The development security documentation shall describe all the physical, procedural, personnel, and other security measures that are necessary to protect the confidentiality and integrity of the TOE design and implementation in its development environment. The new feature in ALC_DVS.2 is that now the developer has to justify the sufficiency by the requirement 24 Bundesamt für Sicherheit in der Informationstechnik

25 Transition guide for ALC, ACM, ADO and AGD Version 2.0, ALC_DVS Overview of element and work unit coverage ALC_DVS.2.3C: The evidence development security documentation shall justify that the security measures provide the necessary level of protection to maintain the confidentiality and integrity of the TOE. (In version 3.1, evidence is specified as development security documentation since there is no developer action element for evidence.) A work unit for this element has been taken from the German national interpretation AIS 34, version 1.00, : ALC_DVS.2-4: The evaluator shall examine the development security documentation to determine that an appropriate justification is given why the security measures provide the necessary level of protection to maintain the confidentiality and integrity of the TOE. The evaluator s determination of the sufficiency of the security measures required by work unit ALC_DVS.2-2 (belonging to ALC_DVS.2.1C) is more naturally placed behind all the other work units of ALC_DVS.2, thus in version 3.1 is shifted to the end of ALC_DVS.2 as the second work unit belonging to ALC_DVS.2.3C 4.3 Overview of element and work unit coverage CC/CEM version 2.3 AIS 34 CC/CEM version 3.1 DVS.1 DVS.2 DVS.1 DVS.2 Elem. WU Elem. WU Elem. WU Elem. WU 1C -1 1C -1 1C -1 1C C -4 2C -2 2C -3 2C -3 2E -4 2E -5 2E -3 2E -4 Table 2: Development Security: Correspondence of elements and work units Examples for reading the table: Element DVS.2.3C from CC version 2.3 corresponds to element DVS.2.2C from CC version 3.1. They have no correspondence in DVS.1 in either version. The corresponding work unit DVS.2-4 comes from the German AIS 34 and is adopted in CEM version 3.1 as work unit DVS.2-2. Element DVS.*.2C and work unit DVS.*-3 from version 2.3 have no direct correspondence in version 3.1, but are covered by element DVS.*.2E with corresponding work units DVS.1-3 and DVS.2-4 respectively. In CC version 2.3, work units DVS.1-2 and DVS.2-2 are identical and belong to identical elements DVS.1.1C and DVS.2.1C respectively. These elements and work unit DVS.1-2 are unchanged in version 3.1, but work unit DVS.2-2 becomes work unit DVS.2-3 which belongs to element DVS.2.2C and not to DVS.2.1C in version 3.1. Bundesamt für Sicherheit in der Informationstechnik 25

26 ALC_FLR Transition guide for ALC, ACM, ADO and AGD ALC_FLR.1 (Identification of security measures) Version 2.0, ALC_FLR The three components of ALC_FLR and their denotations have been retained, modifications have been performed only within the components. The elements have been grouped by subject, hence the sequence of some elements and work units has changed. Work units for all ALC_FLR components have basically been taken from CEM version 2.4 of March 2004, and adapted to the performed modifications. 5.1 ALC_FLR.1 (Identification of security measures) The first developer action element is modified as follows: ALC_FLR.1.1D: The developer shall provide document flaw remediation procedures addressed to TOE developers. in order to ensure the existence of the flaw remediation procedures documentation referenced in 1C and 4C. 5.2 ALC_FLR.2 (Flaw reporting procedures) Beyond the change in ALC_FLR.1, there is one further modification: ALC_FLR.2.6C: The procedures for processing reported security flaws shall ensure that any reported flaws are corrected and the corrections remediated, and the remediation procedures issued to TOE users. Fixes cannot be legislated. Some problems may have no solution and can be remedied only by workarounds wherein the user is instructed as to how to avoid executing code containing the problem. The work units 7 and 8 belonging to ALC_FLR.2.6C are modified accordingly. 5.3 ALC_FLR.3 (Systematic flaw remediation) There are no changes in ALC_FLR.3 beyond the changes in ALC_FLR.1 and.2 described in the previous sections. 26 Bundesamt für Sicherheit in der Informationstechnik

27 Transition guide for ALC, ACM, ADO and AGD Version 2.0, ALC_LCD ALC_LCD.1 (Developer defined life-cycle model) 6. ALC_LCD The first and last component of ALC_LCD and their denotations have been retained, the second component dealing with standardised life-cycle models has been deleted from the criteria. For the evaluation of the development environment (to choose the right sites and to ensure that they and also the different life-cycle phases work together correctly), the evaluator has to get an understanding of the lifecycle model used by the developer. Then it is reasonable that the developer provides his life-cycle model to the evaluator. Since evaluation of the development environment starts at EAL 3, the first component of the life-cycle definition family ALC_LCD.1 is shifted from EAL 4 to EAL 3. This is in line with the previous criteria since although no explicit analysis of LCD was required at the "old" EAL3 both the developer and the evaluator must have an understanding of the TOE s life-cycle in order to understand all other ALC requirements. In a regular TOE evaluation both get that understanding at EAL3 implicitly since the entire development environment is subject to analysis. That means LCD.1 for EAL3 provide assurance that the life-cycle phases (e.g. represented by different sites) fit together. 6.1 ALC_LCD.1 (Developer defined life-cycle model) The requirements and work units of this component have been left unchanged. The guidance text to work unit 1 has been structured more clearly and supplemented regarding information about subcontractors. 6.2 ALC_LCD.2 (Standardised life-cycle model) From the commenting phase for CC 3.0 (which ended ), the following comment related to ALC_LCD.2 has been received: Comment on ALC_LCD ALC_LCD.2.1D (p170) Standardized Life-Cycle Model There is nothing in using a standardized model that guarantees good results. Applies to 2.4C as well. Substitute well-defined for standardized. Table 3: Comment on ALC_LCD.2 It is agreed that standardised models do not guarantee good results (particularly since developer defined models may also qualify as standardised). The dim increase in assurance does not justify a separate component. Consequently the component Standardised life-cycle models is deleted in the new criteria; ALC_LCD.3 ( Measurable life-cycle model ) becomes ALC.LCD ALC_LCD.3 (Measurable life-cycle model) Comments on CC 3.0 Revision 2 (July 2005) This section contains the comments related to ALC_LCD.3 from the commenting phase for CC 3.0 (which ended ). Comment 1 on ALC_LCD ALC_LCD.3.1E (p172) Measurements The whole idea of having measurements is good but nowhere do we describe their usefulness. What is lacking is the idea of standards against which the measurements are compared. The success or failure of the comparison then determines what actions the developer is to take. Bundesamt für Sicherheit in der Informationstechnik 27

28 ALC_LCD Transition guide for ALC, ACM, ADO and AGD ALC_LCD.3 (Measurable life-cycle model) Version 2.0, Comment 2 on ALC_LCD.3 Part 3, 17.6, ALC_LCD.3 te Table 4: Comment 1 on ALC_LCD.3 There is no definition of what a measurable life cycle actually is. There is no information about what is supposed to be measured, except for the mention of source code complexity in paragraph 540. Requests for clarification of this requirement in CC v2 were never answered by the NSA. BSI proposed an interpretation based on software development costs (COCO- MO), but could not explain what that had to do with security. Table 5: Comment 2 on ALC_LCD.3 Add some details on what is supposed to be measured and how measuring it would enhance the security of the TOE. If this can t be done, then consider removing the requirement entirely. Note: Source code complexity metrics is a good idea, but the CC needs to say a lot more about them. COCOMO is clearly NOT relevant here. (Not that COCOMO is a bad thing it just isn t relevant to security ) it just isn t relevant to security.) Note: The following was no official comment, but a question by . However, it is also a good example of the comments addressed here and therefore included. Comment 3 on ALC_LCD.3 In looking over the new ALC, I am unable to find a clear difference between LCD.2 and LCD.3. The text in the element changes, but there is no explanation of what those changes mean, nor is there any change in the methodology. The biggest question that needs to be answered is: what is a *measurable* standardised development model? [CC v2 para 398 says A measurable lifecycle model is a model with arithmetic parameters and/or metrics that measure TOE development properties (e.g. source code complexity metrics) but this isn t helpful: source code complexity is measured with tools, which makes such things more appropriate for TAT, not LCD.]1 Do any of the popular development models (rapid-prototyping, spiral, waterfall -- none of which is given as examples for LCD.2, which also needs to be corrected) qualify as "measurable"? If so, which ones? If not, why not? Discussion Table 6: Comment 3 on ALC_LCD.3 As a preparation for a disposition of the comments and suggested changes to the CC, we first discuss the nature of the problem and possible approaches to the solution Nature of the problem The component ALC_LCD.3 requires the use of measurable life cycle models. As example source code complexity metrics are mentioned. According to the comments this information is not sufficient to tell developers and evaluators, what to do Discussion of the goals First observation The title measurable Life Cycle model used in LCD.3 is a little bit misleading, because one might think of a measure for life cycle models. Of course, what is meant is a Life Cycle model, which includes the use of metrics for properties of the product or of the development processes. So a more correct term would be 1 We do not think, that this side remark on ALC_TAT really is an argument against tool-based measurement in the context of ALC_LCD.3. The following parallel situation shows this: A configuration management system can also be tool based, which doesn t have the effect that the work from ALC_CMC or ALC_CMS shifts to ALC_TAT. 28 Bundesamt für Sicherheit in der Informationstechnik

Application Notes and Interpretation of the Scheme (AIS)

Application Notes and Interpretation of the Scheme (AIS) Application Notes and Interpretation of the Scheme (AIS) AIS 34, Version 3 Date: 03.09.2009 Status: Subject: Publisher: Effective Evaluation Methodology for CC Assurance Classes for EAL5+ (CC v2.3 & v3.1)

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Methodology for IT security evaluation

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Methodology for IT security evaluation INTERNATIONAL STANDARD ISO/IEC 18045 First edition 2005-10-01 Information technology Security techniques Methodology for IT security evaluation Technologies de l'information Techniques de sécurité Méthodologie

More information

ASSURANCE CONTINUITY: CCRA REQUIREMENTS

ASSURANCE CONTINUITY: CCRA REQUIREMENTS ASSURANCE CONTINUITY: CCRA REQUIREMENTS VERSION 2.1 JUNE 2012 1 INTRODUCTION...3 1.1 SCOPE...3 1.2 APPROACH...3 1.3 CONTENTS...3 2 TECHNICAL CONCEPTS...4 2.1 ASSURANCE CONTINUITY PURPOSE...4 2.2 TERMINOLOGY...4

More information

Joint Interpretation Library. Certification of "open" smart card products

Joint Interpretation Library. Certification of open smart card products Joint Interpretation Library Certification of "open" smart card products Version 1.1 (for trial use) 4 February 2013 Certification of "open" smart card products Joint Interpretation Library Acknowledgments:

More information

Evaluation Report as part of the Evaluation Technical Report, Part B ETR-Part Deterministic Random Number Generator

Evaluation Report as part of the Evaluation Technical Report, Part B ETR-Part Deterministic Random Number Generator ##Classification Evaluation Report as part of the Evaluation Technical Report, Part B ETR-Part Deterministic Random Number Generator Evaluation Assurance Level ##EAL 1-7 Version: Version 0.10 Date: 28.02.13

More information

Common Criteria for Information Technology Security Evaluation. Part 3: Security Assurance Requirements. March Version 2.

Common Criteria for Information Technology Security Evaluation. Part 3: Security Assurance Requirements. March Version 2. Common Criteria for Information Technology Security Evaluation Part 3: Security Assurance Requirements March 2004 Version 2.4 Revision 256 ASE/APE Trial Use version CCIMB-2004-03-003 Foreword This version

More information

Trust Technology Assessment Program. Validation Report. Peripheral Sharing Switch (PSS) for Human Interface Devices Protection Profile Version 1.

Trust Technology Assessment Program. Validation Report. Peripheral Sharing Switch (PSS) for Human Interface Devices Protection Profile Version 1. Trust Technology Assessment Program Validation Report Peripheral Sharing Switch (PSS) for Human Interface Devices Protection Profile Version 1.0 TTAP Report Number: TTAP-VR-0012 Version 1.0 August 2000

More information

Common Methodology for Information Technology Security Evaluation CEM-99/045. Part 2: Evaluation Methodology

Common Methodology for Information Technology Security Evaluation CEM-99/045. Part 2: Evaluation Methodology Common Methodology for Information Technology Security Evaluation CEM-99/045 Part 2: Evaluation Methodology August 1999 Foreword This document, version 1.0 of the Common Methodology for Information Technology

More information

CC and CEM addenda. Exact Conformance, Selection-Based SFRs, Optional SFRs. May Version 0.5. CCDB xxx

CC and CEM addenda. Exact Conformance, Selection-Based SFRs, Optional SFRs. May Version 0.5. CCDB xxx CC and CEM addenda Exact Conformance, Selection-Based SFRs, Optional SFRs May 2017 Version 0.5 CCDB-2017-05-xxx Foreword This is a DRAFT addenda to the Common Criteria version 3.1 and the associated Common

More information

CERTIFICATION REPORT

CERTIFICATION REPORT REF: 2015-32-INF-1640 v1 Target: Expediente Date: 26.05.2016 Created by: CERT10 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2015-32 CCN-TP-PP Applicant: Centro Criptológico Nacional

More information

Joint Interpretation Library

Joint Interpretation Library Object: Define concept and methodology applicable to composite product evaluation. Version 1.5 October 2017 October 2017 Version1.5 Page 1/55 This page is intentionally left blank Page 2/55 Version 1.5

More information

Site Certification another step to improve the CC process and to reduce costs

Site Certification another step to improve the CC process and to reduce costs another step to improve the CC process and to reduce costs Hans-Gerd Albertsen, NXP Semiconductors Germany GmbH Jürgen Noller, Infineon Technologies AG 9th ICCC, Sep 23-25, Jeju, Korea 1 Agenda Motivation

More information

CC Part 3 and the CEM Security Assurance and Evaluation Methodology. Su-en Yek Australasian CC Scheme

CC Part 3 and the CEM Security Assurance and Evaluation Methodology. Su-en Yek Australasian CC Scheme CC Part 3 and the CEM Security Assurance and Evaluation Methodology Su-en Yek Australasian CC Scheme What This Tutorial Is An explanation of where Security Assurance Requirements fit in the CC evaluation

More information

BSI-CC-PP for. FIDO Universal Second Factor (U2F) Authenticator, Version 1.0. developed by. Federal Office for Information Security

BSI-CC-PP for. FIDO Universal Second Factor (U2F) Authenticator, Version 1.0. developed by. Federal Office for Information Security for FIDO Universal Second Factor (U2F) Authenticator, Version 1.0 developed by Federal Office for Information Security Federal Office for Information Security (BSI), Postfach 20 03 63, 53133 Bonn, Germany

More information

BSI ADV Transition Guide. from CC V2.3 to CC V3.1. Miriam Serowy. Bundesamt für Sicherheit in der Informationstechnik /

BSI ADV Transition Guide. from CC V2.3 to CC V3.1. Miriam Serowy. Bundesamt für Sicherheit in der Informationstechnik / BSI ADV Transition Guide from CC V2.3 to CC V3.1 Miriam Serowy Bundesamt für Sicherheit in der Informationstechnik / Federal Office for Information Security 8 th ICCC Rome / September 2007 Agenda General

More information

Common Criteria for Information Technology Security Evaluation. Part 3: Security assurance requirements. August Version 2.

Common Criteria for Information Technology Security Evaluation. Part 3: Security assurance requirements. August Version 2. Common Criteria for Information Technology Security Evaluation Part 3: Security assurance requirements August 1999 Version 2.1 CCIMB-99-033 Part 3: Security assurance requirements Foreword This version

More information

BSI-CC-PP for

BSI-CC-PP for for Protection Profile for the Security Module of a Smart Meter Mini-HSM (Mini-HSM Security Module PP) - Schutzprofil für das Sicherheitsmodul des Smart Meter Mini-HSM, V1.0 developed by Federal Office

More information

BSI-CC-PP for. Java Card Protection Profile - Open Configuration, Version December developed by. Oracle Corporation

BSI-CC-PP for. Java Card Protection Profile - Open Configuration, Version December developed by. Oracle Corporation BSI-CC-PP-0099-2017 for Java Card Protection Profile - Open Configuration, Version 3.0.5 December 2017 developed by Oracle Corporation Federal Office for Information Security (BSI), Postfach 20 03 63,

More information

Predictive Assurance

Predictive Assurance Predictive Assurance Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) 9 ICCC Jeju, Korea September 2008 Irmela Ruhrmann Head of Division Certification,

More information

BSI-CC-PP-0088-V for

BSI-CC-PP-0088-V for BSI-CC-PP-0088-V2-2017 for Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12 and DBMS PP Extended Package - Access History (DBMS PP_EP_AH) Version 1.02 developed by DBMS Working

More information

BSI-CC-PP for. Biometric Verification Mechanisms Protection Profile Version 1.3. from. Bundesamt für Sicherheit in der Informationstechnik

BSI-CC-PP for. Biometric Verification Mechanisms Protection Profile Version 1.3. from. Bundesamt für Sicherheit in der Informationstechnik for Biometric Verification Mechanisms Protection Profile Version 1.3 from Bundesamt für Sicherheit in der Informationstechnik BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63,

More information

Assurance Continuity Maintenance Report

Assurance Continuity Maintenance Report IFX_CCI_000003h, IFX_CCI_000005h, IFX_CCI_000008h, IFX_CCI_00000Ch, IFX_CCI_000013h, IFX_CCI_000014h, IFX_CCI_000015h, IFX_CCI_00001Ch and IFX_CCI_00001Dh design step H13 including optional software libraries

More information

BSI-CC-PP for. Remote-Controlled Browsers Systems (ReCoBS) Version 1.0. from. Bundesamt für Sicherheit in der Informationstechnik

BSI-CC-PP for. Remote-Controlled Browsers Systems (ReCoBS) Version 1.0. from. Bundesamt für Sicherheit in der Informationstechnik BSI-CC-PP-0040-2008 for Remote-Controlled Browsers Systems (ReCoBS) Version 1.0 from Bundesamt für Sicherheit in der Informationstechnik BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach

More information

Assurance Continuity Maintenance Report

Assurance Continuity Maintenance Report Assurance Continuity Maintenance Report Kazumasa Fujie, Chairman Information-technology Promotion Agency, Japan Changed TOE Application date/id 2015-06-16 (ITM-5100) Certification No. C0447 Sponsor Canon

More information

Joint Interpretation Library. The Application of CC to Integrated Circuits

Joint Interpretation Library. The Application of CC to Integrated Circuits Joint Interpretation Library The Application of CC to Integrated Circuits Version 1.0 January 2000 Table of contents 1 Introduction.......................................................... 1 1.1 Objective...........................................................

More information

BSI-CC-PP for. Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version from

BSI-CC-PP for. Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version from BSI-CC-PP-0061-2009 for Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version 1.03 from Bundesamt für Sicherheit in der Informationstechnik BSI - Bundesamt für Sicherheit in

More information

Certification Report Arbit Data Diode 2.0

Certification Report Arbit Data Diode 2.0 Ärendetyp: 6 Diarienummer: 15FMV10190-35:1 Dokument ID CSEC-37-1072 HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2016-10-13 Country of origin: Sweden Försvarets materielverk Swedish Certification

More information

BSI-CC-PP for. Portable Storage Media Protection Profile (PSMPP), Version 1.0. from. Federal Office for Information Security

BSI-CC-PP for. Portable Storage Media Protection Profile (PSMPP), Version 1.0. from. Federal Office for Information Security BSI-CC-PP-0081-2012 for Portable Storage Media Protection Profile (PSMPP), Version 1.0 from Federal Office for Information Security Federal Office for Information Security (BSI), Postfach 20 03 63, 53133

More information

BSI-CC-PP for. Common Criteria Protection Profile Digital Tachograph - Smart Card (Tachograph Card), Version from

BSI-CC-PP for. Common Criteria Protection Profile Digital Tachograph - Smart Card (Tachograph Card), Version from BSI-CC-PP-0070-2011 for Common Criteria Protection Profile Digital Tachograph - Smart Card (Tachograph Card), Version 1.02 from Bundesamt für Sicherheit in der Informationstechnik Federal Office for Information

More information

PV a. Site Security Target Lite NXP Caen

PV a. Site Security Target Lite NXP Caen BU S&C Page 1 Site Security Target Lite NXP Caen Publication Summary Reference Number (OMS-ID) Reference Title Site Security Target Lite NXP Caen Publisher Business Unit Identification Classification Author

More information

Security Target. packet filter 3.0.3

Security Target. packet filter 3.0.3 Version 1.0 packet filter 3.0.3 Authors: Christian Koob, Jörg Marx, secunet Security Networks AG Certification-ID: BSI-DSZ-CC-0595 HISTORY Version Date Change(s) Author(s) 1.0 16/08/2010 Version for evaluation

More information

BU Security and Connectivity Page 1 of 43. Table of content

BU Security and Connectivity Page 1 of 43. Table of content BU Security and Connectivity Page 1 of 43 Table of content 1. Document Introduction... 6 1.1 Reference... 6 2. SST Introduction... 7 2.1 SST Reference... 7 2.2 Site Reference... 7 2.3 Site Description...

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6

More information

Protection Profile for Connected Diabetes Devices (CDD PP) Extended Package: Moderate

Protection Profile for Connected Diabetes Devices (CDD PP) Extended Package: Moderate 1 2 3 Protection Profile for Connected Diabetes Devices (CDD PP) Extended Package: Moderate 4 5 6 DTSec CDD PP EP Moderate 1.0 - May 22, 2018 Page 1 of 14 7 8 9 10 11 12 13 Acknowledgements This EP was

More information

Developer evidence for the evaluation of a deterministic random number generator

Developer evidence for the evaluation of a deterministic random number generator Developer evidence for the evaluation of a deterministic random number generator Version: Date: Evaluation Procedure: [Version] [Datum] [BSI-DSZ-CC-xxxx] Author: Qualitätssicherung: [Name(n)] [Name(n)]

More information

Certification Report

Certification Report Certification Report Symantec Security Information Manager 4.8.1 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government

More information

CC and CEM addenda. Modular PP. March Version 1.0 CCDB

CC and CEM addenda. Modular PP. March Version 1.0 CCDB CC and CEM addenda Modular PP March 2014 Version 1.0 CCDB-2014-03-001 Foreword This is addenda to the the Common Criteria version 3 and the associated Common Evaluation Methodology for Information Technology

More information

TÜBİTAK BİLGEM UEKAE UKİS

TÜBİTAK BİLGEM UEKAE UKİS Certification Report EAL 4+ (AVA_VAN.5) Evaluation of TÜBİTAK BİLGEM UEKAE UKİS v2.2.8h issued by Turkish Standards Institution Common Criteria Certification Scheme Certificate Number: 21.0.03/TSE-CCCS-34

More information

BSI-CC-PP for. Machine-Readable Electronic Documents based on BSI TR for Official Use (MR.ED-PP), Version 1.01.

BSI-CC-PP for. Machine-Readable Electronic Documents based on BSI TR for Official Use (MR.ED-PP), Version 1.01. BSI-CC-PP-0087-2015 for Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use (MR.ED-PP), Version 1.01 from Federal Office for Information Security (BSI) Federal Office for Information

More information

BSI-CC-PP-0053-V for. Security Module Card Type B (PP-SMC-B), Version 1.2. developed on behalf of the. Federal Ministry of Health, Germany

BSI-CC-PP-0053-V for. Security Module Card Type B (PP-SMC-B), Version 1.2. developed on behalf of the. Federal Ministry of Health, Germany BSI-CC-PP-0053-V2-2009 for Security Module Card Type B (PP-SMC-B), Version 1.2 developed on behalf of the Federal Ministry of Health, Germany BSI - Bundesamt für Sicherheit in der Informationstechnik,

More information

FED 5. Certification Report

FED 5. Certification Report KECS-CR-18-09 FED 5 Certification Report Certification No.: KECS-CISS-0858-2018 2018. 3. 27. IT Security Certification Center Certification Report Page 1 No. Date History of Creation and Revision Revised

More information

SERTIT-014 CR Certification Report

SERTIT-014 CR Certification Report Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-014 CR Certification Report Issue 1.0 Fort Fox Hardware Data Diode FFHDD2 CERTIFICATION REPORT - SERTIT

More information

Mobile Felica on CX Virgo platform Version 5.0

Mobile Felica on CX Virgo platform Version 5.0 122 MAINTENANCE REPORT MR1 (supplementing Certification Report No. CRP298) Mobile Felica on Sm@rtSIM CX Virgo platform Version 5.0 Issue 1.0 September 2017 Crown Copyright 2017 All Rights Reserved Reproduction

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of McAfee Enterprise Mobility Management 9.7 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Courtesy Translation

Courtesy Translation PREMIER MINISTRE Secretariat General for National Defence Central Directorate for Information Systems Security Certification Report DCSSI-2008/17 Paris, 23 rd of June 2008 Courtesy Translation Certification

More information

Digital Tachograph Smart Card (Tachograph Card)

Digital Tachograph Smart Card (Tachograph Card) Digital Tachograph Smart Card (Tachograph Card) Compliant to EU Commission Regulation 1360/2002, Annex I(B), Appendix 10 BSI-CC-PP-0070 Version 1.02, 15 th of November 2011 Tachograph Smart Card Version

More information

Certification Report

Certification Report Certification Report McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 Issued by: Communications

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of EMC Celerra Network Server Version 5.5 running on EMC Celerra NSX and EMC Celerra NS series Issued by: Communications Security Establishment Certification Body

More information

Mobiledesk VPN v1.0 Certification Report

Mobiledesk VPN v1.0 Certification Report KECS-CR-11-64 Mobiledesk VPN v1.0 Certification Report Certification No.: KECS-NISS-0356-2011 2011. 12. 29 IT Security Certification Center History of Creation and Revision No. Date Revised Pages 00 2011.12.29

More information

Certification Report

Certification Report Certification Report Standard Edition v2.8.2 RELEASE Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of

More information

IT Security Evaluation and Certification Scheme Document

IT Security Evaluation and Certification Scheme Document IT Security Evaluation and Certification Scheme Document June 2015 CCS-01 Information-technology Promotion Agency, Japan (IPA) IT Security Evaluation and Certification Scheme (CCS-01) i / ii Table of Contents

More information

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed

More information

ETSI EG V1.1.1 ( )

ETSI EG V1.1.1 ( ) EG 202 387 V1.1.1 (2005-04) Guide Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Security Design Guide; Method for application of Common Criteria to

More information

BSI-DSZ-CC-S for. Giesecke & Devrient Secure Data Management GmbH, Austraße 101b, Neustadt bei Coburg. Giesecke & Devrient GmbH

BSI-DSZ-CC-S for. Giesecke & Devrient Secure Data Management GmbH, Austraße 101b, Neustadt bei Coburg. Giesecke & Devrient GmbH BSI-DSZ-CC-S-0058-2016 for Giesecke & Devrient Secure Data Management GmbH, Austraße 101b, 96465 Neustadt bei Coburg of Giesecke & Devrient GmbH BSI - Bundesamt für Sicherheit in der Informationstechnik,

More information

TNO CERTIFICATION. NSCIB-CC Certification Report. Fort Fox Hardware Data Diode, version FFHDD2

TNO CERTIFICATION. NSCIB-CC Certification Report. Fort Fox Hardware Data Diode, version FFHDD2 TNO CERTIFICATION Laan van Westenenk 501 P.O. Box 541 7300 AM Apeldoorn The Netherlands Phone +31 55 5493468 Fax +31 55 5493288 E-mail: Certification@certi.tno.nl BTW/VAT NR NL8003.32.167.B01 Bank ING

More information

Document Administration

Document Administration ZKA SECCOS Sig v1.5.3 1 / 132 Document Administration Document Administration Recipient Department Name For the attention of Department Name Summary The following document comprises the Security Target

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Innovation Data Processing FDRERASE Version 5.4, Level 50 Report Number: CCEVS-VR-05-0109

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of High Security Labs Secure DVI KVM Switch, Secure KM Switch and Secure KVM Combiner Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

BSI-CC-PP Common Criteria Protection Profile electronic Health Card Terminal (ehct) Version from the

BSI-CC-PP Common Criteria Protection Profile electronic Health Card Terminal (ehct) Version from the BSI-CC-PP-0032-2007 Common Criteria Protection Profile electronic Health Card Terminal (ehct) Version 1.73 from the Federal Office for Information Security on behalf of the Federal Ministry of Health BSI

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 20000 Lead Auditor www.pecb.com The objective of the Certified ISO/IEC 20000 Lead Auditor examination is to ensure that the candidate

More information

BSI-CC-PP for

BSI-CC-PP for BSI-CC-PP-0072-2012 for Protection profiles for secure signature creation device Part 5: Extension for device with key generation and trusted communication with signature creation application, Version

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report US Government Family of Protection Profiles for Public Key Enabled Applications for Basic

More information

Courtesy Translation

Courtesy Translation PREMIER MINISTRE General Secretariat for Defence and National Security French Network and Information Security Agency Certification Report ANSSI-CC-PP-2010/02 (reference SFPMEI-CC-PP-SAM, version 1.5 dated

More information

Market Central SecureSwitch Security Target, V October, 2001 Document No. F CCEVS-VID102-ST.doc

Market Central SecureSwitch Security Target, V October, 2001 Document No. F CCEVS-VID102-ST.doc Market Central SecureSwitch Security Target, V1.3 29 October, 2001 Document No. F4-1001-002 CCEVS-VID102-ST.doc COACT, Inc. Rivers Ninety Five 9140 Guilford Road, Suite L Columbia, MD 21046-2587 Phone:

More information

Juniper Networks EX3200 and EX4200 Switches running JUNOS 9.3R2

Juniper Networks EX3200 and EX4200 Switches running JUNOS 9.3R2 122-B ASSURANCE MAINTENANCE REPORT MR1 (supplementing Certification Report No. CRP248) Juniper Networks EX3200 and EX4200 Switches running JUNOS 9.3R2 Version 9.3R2 Issue 1.0 February 2009 Crown Copyright

More information

Courtesy Translation

Courtesy Translation PREMIER MINISTRE General Secretariat for Defence and National Security French Network and Information Security Agency Certification Report ANSSI-CC-PP-2010/01 (reference SFPMEI-CC-PP-EP, version 1.5 dated

More information

BSI-CC-PP for

BSI-CC-PP for for Common Criteria PP Configuration Machine Readable Electronic Documents - Optionales Nachladen (Optional Post-Emission Updates) [MR.ED-ON-PP] developed by Federal Office for Information Security Federal

More information

Security Target FORT FOX HARDWARE DATA DIODE. Common Criteria FFHDD EAL7+ Classification PUBLIC

Security Target FORT FOX HARDWARE DATA DIODE. Common Criteria FFHDD EAL7+ Classification PUBLIC FORT FOX HARDWARE DATA DIODE Security Target Common Criteria FFHDD EAL7+ Classification PUBLIC Component: ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2 Project no./ref. no.

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Auditor www.pecb.com The objective of the Certified ISO 22000 Lead Auditor examination is to ensure that the candidate has

More information

SITE SECURITY TARGET LITE Olivia Point

SITE SECURITY TARGET LITE Olivia Point SITE SECURITY TARGET LITE Olivia Point Sii Sp. z o. o. / Branch in Gdańsk Grunwaldzka 472A 80 309 Gdańsk The certification ID: Date approved: Managing Director Gdańsk 2017 SITE SECURITY TARGET LITE Page

More information

Composite Evaluation for Smart Cards and Similar Devices

Composite Evaluation for Smart Cards and Similar Devices Composite Evaluation for Smart Cards and Similar Devices ISCI-WG1 and T-Systems GEI GmbH Composite EAL Certificate 25th-27th September, 2007, page 1. What are we speaking about? Motivation Terminology

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Tactical Network-layer Gateway (2E2 IA): a GD Canada MESHnet G2 Gateway product Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 9001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 9001 Lead Auditor examination is to ensure that the candidate possesses

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,

More information

Validation Report. Belkin Corporation

Validation Report. Belkin Corporation Validation Report Belkin Corporation Belkin OmniView Secure DVI Dual-Link KVM Switch (F1DN102D, F1DN104D) Document ID: 08-1602-R-0084 V1.1 February 11, 2009 Table of Contents 1 Executive Summary... 3 2

More information

Certification Report

Certification Report Certification Report McAfee File and Removable Media Protection 4.3.1 and epolicy Orchestrator 5.1.2 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation

More information

Certification Report Färist 4

Certification Report Färist 4 Ärendetyp: 6 Diarienummer: 13FMV5047-44:1 Dokument ID FMVID-297-738 Öppen enligt Offentlighets- och sekretesslagen (2009:400) 2015-06-17 Country of origin: Sweden Försvarets materielverk Issue: 1.0, 2015-jun-17

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 50001 Lead Auditor The objective of the PECB Certified ISO 50001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan

More information

- Table of Contents -

- Table of Contents - - Table of Contents - 1 INTRODUCTION... 1 1.1 OBJECTIVES OF THIS GUIDE... 1 1.2 ORGANIZATION OF THIS GUIDE... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 5 2 BASIC KNOWLEDGE

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Blue Ridge Networks BorderGuard Centrally Managed Embedded PKI Virtual Private Network (VPN)

More information

Assurance Continuity Maintenance Report

Assurance Continuity Maintenance Report Infineon Smart Card IC (Security Controller) SLE88CFX4001P/m8835b18 SLE88CFX4003P/m8837b18 SLE88CFX3521P/m8857b18 SLE88CFX2921P/m8859b18 each with PSL V2.00.07 and specific IC Dedicated Software from Common

More information

Certification Report BSI-DSZ-CC for. Philips Smart Card Controller P8WE5033V0F. from

Certification Report BSI-DSZ-CC for. Philips Smart Card Controller P8WE5033V0F. from Certification Report Bundesamt für Sicherheit in der Informationstechnik BSI-DSZ-CC-0177-2002 for Philips Smart Card Controller P8WE5033V0F from Philips Semiconductors GmbH Business Unit Identification

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Data ONTAP Version 7.2.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme

More information

Owl Computing Technologies Data Diode Network Interface Card Security Target

Owl Computing Technologies Data Diode Network Interface Card Security Target 1. Owl Computing Technologies Data Diode Network Interface Card Security Target Version 1.0 07/20/05 Prepared for: Owl Computing Technologies, Inc. 19 North Salem Road (2nd Floor) P.O. Box 313 Cross River,

More information

Chapter 2 Overview of the Design Methodology

Chapter 2 Overview of the Design Methodology Chapter 2 Overview of the Design Methodology This chapter presents an overview of the design methodology which is developed in this thesis, by identifying global abstraction levels at which a distributed

More information

Assurance Continuity Maintenance Report

Assurance Continuity Maintenance Report Infineon Smart Card IC (Security Controller) SLE88CFX4000P/M8830-b17, SLE88CFX4002P/M8834-b17, SLE88CFX3520P/M8847-b17, SLE88CFX2920P/M8849-b17, SLE88CF4000P/M8845-b17, SLE88CF4002P/M8846-b17, SLE88CF3520P/M8848-b17,

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of JUNOS-FIPS for SRX Series version 10.4R4 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Smart TV Security Solution V3.0 for Samsung Knox. Certification Report

Smart TV Security Solution V3.0 for Samsung Knox. Certification Report KECS-CR-18-54 Smart TV Security Solution V3.0 for Samsung Knox Certification Report Certification No.: KECS-CISS-0903-2018 2018. 11. 8 IT Security Certification Center History of Creation and Revision

More information

Smart TV Security Solution V2.0 for Samsung Knox. Certification Report

Smart TV Security Solution V2.0 for Samsung Knox. Certification Report KECS-CR-17-82 Smart TV Security Solution V2.0 for Samsung Knox Certification Report Certification No.: KECS-CISS-0846-2017 2017. 12. 27 IT Security Certification Center History of Creation and Revision

More information

APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION. PT. TÜV NORD Indonesia PS - TNI 001 Rev.05

APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION. PT. TÜV NORD Indonesia PS - TNI 001 Rev.05 APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION PT. TÜV NORD Indonesia PS - TNI 001 Rev.05 Created : 20-06-2016 Checked: 20-06-2016 Approved : 20-06-2016 Indah Lestari Karlina

More information

BMC Software, PATROL Perform/Predict, Version Security Target

BMC Software, PATROL Perform/Predict, Version Security Target , PATROL Perform/Predict, Version 6.5.30 Security Target Version 1.0 March 15, 2002 Prepared for:, Inc. 2101 City West Boulevard Houston, TX 77042 Prepared by: Computer Sciences Corporation 132 National

More information

Legal Regulations and Vulnerability Analysis

Legal Regulations and Vulnerability Analysis Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information

More information

SPass NX V1.0 on S3CT9KW/S3CT9KC/S3CT9K9 Certification Report

SPass NX V1.0 on S3CT9KW/S3CT9KC/S3CT9K9 Certification Report KECS-CR-12-38 SPass NX V1.0 on S3CT9KW/S3CT9KC/S3CT9K9 Certification Report Certification No.: KECS-ISIS-0394-2012 2012. 6. 15 IT Security Certification Center History of Creation and Revision No. Date

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of Chrysalis-ITS, Inc. Luna CA³ Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme 2002

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Dell EMC Unity OE 4.2 383-4-421 22 September 2017 Version 1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be altered,

More information

Assurance Continuity Maintenance Report

Assurance Continuity Maintenance Report Assurance Continuity Maintenance Report Buheita Fujiwara, Chairman Information-Technology Promotion Agency, Japan Changed TOE Application date/id Certification No. Sponsor Name of TOE / Version of TOE

More information

Managing IT security using Common Criteria. ISACA CETIC Meeting 23 May 2007

Managing IT security using Common Criteria. ISACA CETIC Meeting 23 May 2007 Managing IT security using Common Criteria ISACA CETIC Meeting 23 May 2007 1 Objectives Explain what are the Common Criteria Explain how to use them effectively Illustrate on examples Focus: Security Requirements

More information