Click here to load reader

Configurable Security Guard

  • View
    228

  • Download
    0

Embed Size (px)

Text of Configurable Security Guard

  • CONFIGURABLE SECURITY GUARD(CSG)

    PROTECTION PROFILE

    Version 3.3

    99/03/04

    Registered by the French Certification Body under the reference PP/9906

    ecfecfEvalua tion et Cer tif i ca tion Frana

    ise

  • March 1999 i

    z

    CELAR

    CASSIConfigurable Security Guard Protection Profile - V3.3

    Table of Contents

    1. INTRODUCTION .............................................................................................................................................. 1

    1.1. PP IDENTIFICATION ....................................................................................................................................... 11.2. PP OVERVIEW ............................................................................................................................................... 11.3. RELATED PP.................................................................................................................................................. 21.4. REFERENCES.................................................................................................................................................. 2

    2. TOE DESCRIPTION ......................................................................................................................................... 2

    3. SECURITY ENVIRONMENT.......................................................................................................................... 5

    3.1. METHODOLOGY APPROACH........................................................................................................................... 53.2. SUMMARY ..................................................................................................................................................... 53.3. SECURE USAGE ASSUMPTIONS...................................................................................................................... 6

    3.3.1. Physical Assumptions ........................................................................................................................... 63.3.2. Organisational Assumptions................................................................................................................. 63.3.3. Staff Assumptions.................................................................................................................................. 6

    3.4. THREATS....................................................................................................................................................... 73.4.1. Threats addressed by the TOE.............................................................................................................. 73.4.2. Threats addressed by the operating environment ................................................................................. 8

    3.5. ORGANISATIONAL SECURITY POLICIES.......................................................................................................... 9

    4. SECURITY OBJECTIVES.............................................................................................................................. 10

    4.1. SECURITY OBJECTIVES FOR THE TOE.......................................................................................................... 104.2. SECURITY OBJECTIVES FOR THE ENVIRONMENT.......................................................................................... 11

    5. IT SECURITY REQUIREMENTS................................................................................................................. 12

    5.1. TOE IT SECURITY REQUIREMENTS............................................................................................................. 125.1.1. Functional Requirements.................................................................................................................... 12

    5.1.1.1. Synthesis of functional requirements .......................................................................................................... 125.1.1.2. Security Audit (FAU).................................................................................................................................. 135.1.1.3. User Data Protection (FDP) ........................................................................................................................ 175.1.1.4. Identification and Authentication (FIA)...................................................................................................... 205.1.1.5. Security Management (FMT) ...................................................................................................................... 225.1.1.6. Protection of the TOE Security Functions (FPT) ........................................................................................ 255.1.1.7. TOE Access (FTA)...................................................................................................................................... 265.1.1.8. Trusted Path / Channel (FTP) ..................................................................................................................... 26

    5.1.2. Assurance Requirements..................................................................................................................... 27

    6. APPLICATION NOTES.................................................................................................................................. 27

    7. RATIONALE.................................................................................................................................................... 28

    7.1. SECURITY OBJECTIVES RATIONALE ............................................................................................................. 287.1.1. Secure Usage Assumptions ................................................................................................................. 287.1.2. Threats to be addressed by the TOE................................................................................................... 287.1.3. Threats to be addressed by the operating environment ...................................................................... 307.1.4. Policies to be addressed by the TOE .................................................................................................. 317.1.5. Completeness of the objectives ........................................................................................................... 32

    7.1.5.1. Objectives for the TOE................................................................................................................................ 327.1.5.2. Objectives for the environment ................................................................................................................... 34

    7.1.6. Synthesis ............................................................................................................................................. 36

  • March 1999 i

    z

    CELAR

    CASSIConfigurable Security Guard Protection Profile - V3.3

    7.2. SECURITY REQUIREMENTS RATIONALE ....................................................................................................... 377.2.1. Security Audit ..................................................................................................................................... 377.2.2. User Data Protection.......................................................................................................................... 387.2.3. Identification and Authentication ....................................................................................................... 397.2.4. Security Management ......................................................................................................................... 417.2.5. Protection of the TOE Security Functions .......................................................................................... 427.2.6. TOE Access......................................................................................................................................... 437.2.7. Trusted Path / Channel....................................................................................................................... 44

    7.3. SYNTHESIS OF SECURITY REQUIREMENTS RATIONALE ................................................................................ 447.4. RATIONALE FOR ASSURANCE REQUIREMENTS............................................................................................. 467.5. CONSISTENCY OF THE SECURITY REQUIREMENTS........................................................................................ 46

    7.5.1. Functional Security Requirements Dependencies............................................................................... 467.5.2. Assurance Security Requirements Dependencies ............................................................................... 487.5.3. Satisfaction of the Mutual Support ..................................................................................................... 487.5.4. Satisfaction of the Internal Consistency ............................................................................................. 51

    7.5.4.1. FAU FAU ............................................................................................................................................ 517.5.4.2. FAU FDP............................................................................................................................................ 527.5.4.3. FAU FIA.............................................................................................................................................. 537.5.4.4. FAU FMT.........................................................................................................