Assurance Continuity Maintenance Report

Similar documents
BSI-CC-PP for. FIDO Universal Second Factor (U2F) Authenticator, Version 1.0. developed by. Federal Office for Information Security

BSI-CC-PP for

BSI-CC-PP for. Java Card Protection Profile - Open Configuration, Version December developed by. Oracle Corporation

BSI-CC-PP-0088-V for

BSI-CC-PP for

Assurance Continuity Maintenance Report

Mobile Felica on CX Virgo platform Version 5.0

Assurance Continuity Maintenance Report

BSI-DSZ-CC-S for. Giesecke & Devrient Secure Data Management GmbH, Austraße 101b, Neustadt bei Coburg. Giesecke & Devrient GmbH

BSI-DSZ-CC for

Predictive Assurance

BSI-DSZ-CC for

BSI-PP for. Protection Profile Waste Bin Identification Systems (WBIS-PP) Version developed by. Deutscher Städte- und Gemeindenbund

BSI-CC-PP for. Portable Storage Media Protection Profile (PSMPP), Version 1.0. from. Federal Office for Information Security

Annex No. 1 as of April 30, to the certification report. T-Systems-DSZ-ITSEC as of September 24, 2002

BSI-PP for. Protection Profile Secure Signature-Creation Device Type 3, Version developed by

BSI-DSZ-CC for

IT Security Evaluation and Certification Scheme Document

BSI-DSZ-CC for

BSI-DSZ-CC-0957-V for. TCOS Smart Meter Security Module Version 1.0 Release 2/P60C144PVE. from. T-Systems International GmbH

BSI-DSZ-CC-0963-V for. Infineon smartcard IC (Security Controller) M7791 B12 and G11 with specific IC-dedicated firmware.

BSI-CC-PP for. Common Criteria Protection Profile Digital Tachograph - Smart Card (Tachograph Card), Version from

BSI-DSZ-CC-0973-V for. NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software. from. NXP Semiconductors Germany GmbH

Bundesamt für Sicherheit in der Informationstechnik BSI-PP for. Smartcard IC Platform Protection Profile Version 1.0.

BSI-CC-PP for. Common Criteria Protection Profile Electronic Identity Card (ID_Card PP), Version from

BSI-DSZ-CC for

BSI-CC-PP for. Machine-Readable Electronic Documents based on BSI TR for Official Use (MR.ED-PP), Version 1.01.

BSI-DSZ-CC for. NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software. from. NXP Semiconductors Germany GmbH

BSI-DSZ-CC for. Microsoft SQL Server 2016 Database Engine Enterprise Edition x64 (English) from. Microsoft Corporation

BSI-DSZ-CC for. TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA. from. T-Systems International GmbH

BSI-DSZ-CC for

ASSURANCE CONTINUITY: CCRA REQUIREMENTS

BSI-DSZ-CC-0782-V for

Evaluation Report as part of the Evaluation Technical Report, Part B ETR-Part Deterministic Random Number Generator

BSI-DSZ-CC for STARCOS 3.5 ID GCC C2R. from. Giesecke & Devrient GmbH

BSI-DSZ-CC for. SLS 32TLC100(M) CIPURSE Security Controller v from. Infineon Technologies AG

BSI-DSZ-CC for

BSI-DSZ-CC for. Health Insurance Card G from. Gemalto GmbH

BSI-DSZ-CC for. NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software. from. NXP Semiconductors Germany GmbH

SOMA-c004 e-passport (BAC) Version 1.0

BSI-DSZ-CC for STARCOS 3.5 ID GCC C2. from. Giesecke & Devrient GmbH

Legal Regulations and Vulnerability Analysis

BSI-DSZ-CC for STARCOS 3.5 ID ECC C1R. from. Giesecke & Devrient GmbH

Juniper Networks J2300, J2350, J4300, M7i and M10i Services Routers running JUNOS 8.5R3

BSI-CC-PP for. Remote-Controlled Browsers Systems (ReCoBS) Version 1.0. from. Bundesamt für Sicherheit in der Informationstechnik

BSI-CC-PP for. Biometric Verification Mechanisms Protection Profile Version 1.3. from. Bundesamt für Sicherheit in der Informationstechnik

Certification Report. EAL 4+ (ALC_DVS.2) Evaluation of TÜBİTAK BİLGEM UEKAE. AKİS v1.4i PASAPORT

BSI-DSZ-CC for. SLB96xx. from. Infineon Technologies AG

BSI ADV Transition Guide. from CC V2.3 to CC V3.1. Miriam Serowy. Bundesamt für Sicherheit in der Informationstechnik /

Certification Report

Germany and The Netherlands Certification of cryptographic modules

BSI-DSZ-CC for. IBM DB2 Version 11 for z/os Version 1 Release 13. from. IBM Corporation

BSI-DSZ-CC for. F5 Networks BIG-IP Application Delivery Controller (ADC-AP) version HF10 (build ) from. F5 Networks, Inc.

BSI-DSZ-CC-0946-V for

BSI-DSZ-CC for. TCOS Passport Version 2.1 Release 1/P60D144. from. T-Systems International GmbH

BSI-DSZ-CC for. SUSE Linux Enterprise Server Version 12. from SUSE LLC

BSI-DSZ-CC for. TCOS Identity Card Version 1.0 Release 2/SLE78. from. T-Systems International GmbH

BSI-DSZ-CC for STARCOS 3.5 ID SAC+EAC+AA C1. from. Giesecke & Devrient GmbH

Site Certification another step to improve the CC process and to reduce costs

BSI-DSZ-CC-0891-V for

epass ICAO essential configuration BAC and EAC RSA or configuration BAC and EAC ECC, Version 1.0 running on SLE77CLFX2400P & SLE77CLFX2407P

BSI-CC-PP-0053-V for. Security Module Card Type B (PP-SMC-B), Version 1.2. developed on behalf of the. Federal Ministry of Health, Germany

BSI-CC-PP for

Juniper Networks EX3200 and EX4200 Switches running JUNOS 9.3R2

BSI-DSZ-CC for. Tivoli Security Policy Manager, Version 7.1. from. IBM Corporation

BSI-DSZ-CC for. IBM Tivoli Directory Server, Version 6.3. from. IBM Corporation

BSI-DSZ-CC for. S3CC9LC 16-Bit RISC Microcontroller for Smart Card Version 2. from. Samsung Electronics Co., Ltd.

BSI-DSZ-CC for. NXP J3D081_M59_DF and J3D081_M61_DF Secure Smart Card Controller Revision 2 of JCOP V2.4.2 R2. from

ASSURANCE MAINTENANCE REPORT MR3 (supplementing Certification Report No. CRP248) Version 9.3R1. Issue 1.0 April 2011

BSI-DSZ-CC for

BSI-DSZ-CC For. Oracle Database 11g Release 2 Standard Edition and Standard Edition 1. from. Oracle Corporation

BSI-DSZ-CC for

Juniper Networks EX3200 and EX4200 Switches running JUNOS 9.3R2

BSI-DSZ-CC for. MICARDO V4.0 R1.0 ehc v1.2. from. Morpho Cards GmbH

BSI-DSZ-CC for. SafeGuard Enterprise Device Encryption Version from. Utimaco Safeware AG

M008 Maintenance Report

FeliCa Approval for Security and Trust (FAST) Overview. Copyright 2018 FeliCa Networks, Inc.

The German IT Security Certification Scheme. Joachim Weber

BSI-CC-PP Common Criteria Protection Profile electronic Health Card Terminal (ehct) Version from the

Certification Report BSI-DSZ-CC for. Infineon Smart Card IC (Security Controller) SLE66C82P/m1474a15 and SLE66C42P/m1495a15.

BSI-DSZ-CC for. TCOS Passport Version 2.1 Release 1/ P60D144/FSV02. from. T-Systems International GmbH

BSI-DSZ-CC for. Digital Tachograph DTCO 1381, Release 3.0. from. Continental Automotive GmbH

Athena IDProtect Duo (in BAC configuration) Version 10 running on Inside Secure AT90SC28880RCFV2

Certification Report BSI-DSZ-CC for. SafeGuard Easy, Version 3.20 SR1 for Microsoft Windows from. Utimaco Safeware AG

BSI-DSZ-CC for

SERTIT-014 CR Certification Report

Certification Report BSI-DSZ-CC for. S3CC9GW 16-Bit RISC Microcontroller for Smart Card, Version 5. from. Samsung Electronics Co., Ltd.

Module 6: Network and Information Security and Privacy. Session 3: Information Security Methodology. Presenter: Freddy Tan

BSI-DSZ-CC for. TCOS Passport Version 2.0 Release 2-ID1/ SLE66CLX800PE. from. T-Systems Enterprise Services GmbH

RNGs for Resource-Constrained Devices

BSI-DSZ-CC for. gateprotect Firewall Packet-Filtering-Core Version from. gateprotect AG Germany

BSI-DSZ-CC for. MN67S140, RV3, FV12 EAST JAPAN RAILWAY COMPANY SuicaII Contactless Smart Card IC Chip. from

Korean National Protection Profile for Single Sign On V1.0 Certification Report

BSI-DSZ-CC for. NXP J3A080 v2.4.1 Secure Smart Card Controller (JCOP v2.4.1) from. NXP Semiconductors Germany GmbH

Certification Report BSI-DSZ-CC for. Philips Smart Card Controller P8WE5033V0F. from

Confirmation concerning Products for Qualified Electronic Signatures

BSI-DSZ-CC for. Smart card reader SPR332 firmware version from. SCM Microsystems GmbH

BSI-DSZ-CC for

BSI-DSZ-CC for. JBoss Enterprise Application Platform Version 4.3 CP03. from. Red Hat

ASSURANCE CONTINUITY MAINTENANCE REPORT FOR IAS Router

Transcription:

IFX_CCI_000003h, IFX_CCI_000005h, IFX_CCI_000008h, IFX_CCI_00000Ch, IFX_CCI_000013h, IFX_CCI_000014h, IFX_CCI_000015h, IFX_CCI_00001Ch and IFX_CCI_00001Dh design step H13 including optional software libraries and dedicated firmware from Infineon Technologies AG The IT product identified in this report was assessed according to the Assurance Continuity: CCRA Requirements, version 2.1, June 2012 and the developers Impact Analysis Report (IAR). The baseline for this assessment was the Certification Report, the Security Target and the Evaluation Technical Report of the product certified by the Federal Office for Information Security (BSI) under BSI-DSZ-CC-0945-2017. The change to the certified product is at the level of production test changes and documentation updates. The change has no effect on assurance. The identification of the maintained product is indicated by an additional firmware version number compared to the certified product. Consideration of the nature of the change leads to the conclusion that it is classified as a minor change and that certificate maintenance is the correct path to continuity of assurance. The resistance to attacks has not been re-assessed in the course of this maintenance process. Therefore, the assurance statement as outlined in the Certification Report BSI-DSZ-CC-0945-2017 dated 10 th July 2017 is of relevance and has to be considered when using the product. Details can be found on the following pages. This report is an addendum to the Certification Report BSI-DSZ-CC-0945-2017. SOGIS Recognition Agreement Common Criteria Recognition Arrangement for components up to EAL 4 Bonn, 24 August 2017 The Federal Office for Information Security Bundesamt für Sicherheit in der Informationstechnik Godesberger Allee 185-189 - D-53175 Bonn - Postfach 20 03 63 - D-53133 Bonn Phone +49 228 99 9582-0 - Fax +49 228 9582-5477 - Infoline +49 228 99 9582-111

Assessment The IT product identified in this report was assessed according to the Assurance Continuity: CCRA Requirements [1] and the Impact Analysis Report (IAR) [2]. The baseline for this assessment was the Certification Report of the certified product (Target of Evaluation, TOE) [3], its Security Target and the Evaluation Technical Report as outlined in [3]. The vendor for the IFX_CCI_000003h, IFX_CCI_000005h, IFX_CCI_000008h, IFX_CCI_00000Ch, IFX_CCI_000013h, IFX_CCI_000014h, IFX_CCI_000015h, IFX_CCI_00001Ch and IFX_CCI_00001Dh design step H13 including optional software libraries and dedicated firmware Infineon Technologies AG, submitted an IAR [2] to the BSI for approval. The IAR is intended to satisfy the requirements outlined in the document Assurance Continuity: CCRA Requirements [1]. In accordance with those requirements, the IAR describes (i) the changes made to the certified TOE, (ii) the evidence updated as a result of the changes and (iii) the security impact of the changes. The IFX_CCI_000003h, IFX_CCI_000005h, IFX_CCI_000008h, IFX_CCI_00000Ch, IFX_CCI_000013h, IFX_CCI_000014h, IFX_CCI_000015h, IFX_CCI_00001Ch and IFX_CCI_00001Dh design step H13 including optional software libraries and dedicated firmware was changed due to changes in production tests and editorial updates of the Security Target. Configuration Management procedures thus lead to a change in the product identifier. Due to the nature of said tests, an additional firmware identifier was introduced, adding the identifier 80.100.17.1 to the already available 80.100.17.0. The firmware code itself was not changed. The Security Target was updated accordingly (from the old version [4] to the new version [5]) to incorporate the additional identifier and editorial changes. Likewise, the documents [6] [8] now reflect said change. Conclusion The change to the TOE is at the level of The change to the certified product is at the level of production test changes and documentation updates. The change has no effect on assurance. The Security Target was editorially updated as well, see [5], as well as other documents (see [6] [8]). Consideration of the nature of the change leads to the conclusion that it is classified as a minor change and that certificate maintenance is the correct path to continuity of assurance. Therefore, BSI agrees that the assurance as outlined in the Certification Report [3] is maintained for this version of the product. The resistance to attacks has not been re-assessed in the course of this maintenance process. Therefore, the assurance statement as outlined in the Certification Report BSI- DSZ-CC-0945-2017 dated 10 th July 2017 is of relevance and has to be considered when using the product. CC-MA-502_V3.0 Page 2 of 5

Additional obligations and notes for the usage of the product: All aspects of assumptions, threats and policies as outlined in the Security Target not covered by the TOE itself need to be fulfilled by the operational environment of the TOE. The customer or user of the product shall consider the results of the certification within his system risk management process. In order for the evolution of attack methods and techniques to be covered, he should define the period of time until a re-assessment for the TOE is required and thus requested from the sponsor of the certificate. Some security measures are partly implemented in the hardware and require additional configuration or control or measures to be implemented by the IC Dedicated Support Software or Embedded Software. For this reason the TOE includes guidance documentation which contains guidelines for the developer of the IC Dedicated Support Software and Embedded Software on how to securely use the microcontroller chip and which measures have to be implemented in the software in order to fulfil the security requirements of the Security Target of the TOE. In the course of the evaluation of the composite product or system it must be examined if the required measures have been correct and effectively implemented by the software. Additionally, the evaluation of the composite product or system must also consider the evaluation results as outlined in the document ETR for composite evaluation [9]. According to the scheme rules, evaluation results outlined in the document ETR for composite evaluation as listed above can usually be used for composite evaluations building on top, as long as the document ETR for composite evaluation is not older than eighteen months and an attack assumed to be not feasible within the scope of these evaluations has not been performed successfully. Additional Note: The strength of the cryptographic algorithms was not rated in the course of the product certification and this maintenance procedure (see BSIG 1 Section 9, Para. 4, Clause 2). In addition to the baseline certificate BSI notes that cryptographic functionalities with a security level of 80 bits or lower can no longer be regarded as secure against attacks with high attack potential without considering the application context. Therefore for this functionality it shall be checked whether the related crypto operations are appropriate for the intended system. Some further hints and guidelines can be derived from the 'Technische Richtlinie BSI TR-02102' (https://www.bsi.bund.de). This report is an addendum to the Certification Report [3]. 1 Act on the Federal Office for Information Security (BSI-Gesetz - BSIG) of 14 August 2009, Bundesgesetzblatt I p. 2821 CC-MA-502_V3.0 Page 3 of 5

References [1] Common Criteria document Assurance Continuity: CCRA Requirements, version 2.1, June 2012 [2] Impact Analysis Report, Impact Analysis Report Common Criteria with Evaluation Assurance Level EAL6 augmented (EAL6+), IFX_CCI_3h - 5h - 8h - Ch - 13h - 14h - 15h - 1Ch and 1Dh - H13, Version 0.2 ACM, 2017-08-22 (confidential document) [3] Certification Report BSI-DSZ-CC-0945-2017 for IFX_CCI_000003h, IFX_CCI_000005h, IFX_CCI_000008h, IFX_CCI_00000Ch, IFX_CCI_000013h, IFX_CCI_000014h, IFX_CCI_000015h, IFX_CCI_00001Ch and IFX_CCI_00001Dh design step H13 including optional software libraries and dedicated firmware, Bundesamt für Sicherheit in der Informationstechnik, 2017-07-10 [4] Previous Security Targets (public and confidential): Public Security Target BSI-DSZ-CC-0945-2017, Version 0.5, 22.05.2017, Public Security Target IFX_CCI_000003h, IFX_CCI_000005h, IFX_CCI_000008h, IFX_CCI_00000Ch, IFX_CCI_000013h, IFX_CCI_000014h, IFX_CCI_000015h, IFX_CCI_00001Ch, IFX_CCI_00001Dh, design step H13, Infineon Technologies AG (sanitised public document) Confidential Security Target BSI-DSZ-CC-0945-2017, Version 1.2, 22.05.2017, Confidential Security Target IFX_CCI_000003h, IFX_CCI_000005h, Infineon Technologies AG (confidential document) [5] Updated Security Targets (public and confidential): Public Security Target, Version 0.6 ACM, 2017-08- 22, Public Security Target IFX_CCI_000003h, IFX_CCI_000005h, Infineon Technologies AG (sanitised public document) Confidential Security Target, Version 1.3 ACM, 2017-08-22, "Confidential Security Target, IFX_CCI_000003h, IFX_CCI_000005h, Infineon Technologies AG (confidential document) [6] "16-bit Security Controller 65-nm Technology, Programmer's Reference Manual", Rev. 9.6, 2017-07-04, Infineon Technologies AG (confidential document) [7] "16-bit Security Controller V01 Errata sheet", Rev. 5.0, 2017-08-17, Infineon Technologies AG (confidential document) [8] 16-bit Security Controller Family -V01, Hardware Reference Manual (HRM), Rev.5.1, 2017-04-13, Infineon Technologies AG (confidential document) CC-MA-502_V3.0 Page 4 of 5

[9] ETR for composite evaluation according to AIS 36 for the Product BSI-DSZ-CC- 0945-2017, Version 1.24, 27.06.2017, ETR for composite evaluation (EFC), T- Systems International GmbH (confidential document) CC-MA-502_V3.0 Page 5 of 5