Infoblox Trinzic Appliances with NIOS v6.3 (Models: IB ... Trinzic Appliances with NIOS v6.3 (Models: IB-810, IB-820, IB-1400, IB-1410, IB-1420, IB-2200, IB-2210, IB-2220, IB-4000

  • View
    221

  • Download
    1

Embed Size (px)

Text of Infoblox Trinzic Appliances with NIOS v6.3 (Models: IB ... Trinzic Appliances with NIOS v6.3...

  • /

    Infoblox Trinzic Appliances with NIOS v6.3 (Models: IB-810, IB-820, IB-1400, IB-1410, IB-1420, IB-2200, IB-2210,

    IB-2220, IB-4000 and IB-4010)

    Security Target

    Document Version: 1.0

    Prepared For: Prepared By:

    Infoblox

    4750 Patrick Henry Drive

    Santa Clara, CA 95054

    CSC

    7231 Parkway Drive

    Hanover, MD 21076

  • Security Target

    Version 1.0, Revision 20

    Copyright 2012 Infoblox, All Rights Reserved 2

    This page is intentionally blank.

  • Security Target

    Version 1.0, Revision 20

    Copyright 2012 Infoblox, All Rights Reserved 3

    Table of Contents

    1 Security Target Introduction ........................................................................ 6 1.1 ST and TOE Identification ................................................................................................... 6 1.2 TOE Overview ..................................................................................................................... 6 1.2.1 TOE Type ........................................................................................................................ 8 1.2.2 Required Non-TOE Hardware, Software, and Firmware ................................................. 8 1.3 TOE Description .................................................................................................................. 8 1.3.1 Physical Scope of the TOE .............................................................................................. 8 1.3.2 Logical Scope of the TOE ................................................................................................ 9 1.3.3 Evaluated Configuration ................................................................................................ 10

    2 Conformance Claims ................................................................................. 11 2.1 Common Criteria Conformance Claims ............................................................................. 11 2.2 Protection Profile Conformance Claims............................................................................. 11

    3 Security Problem Definition ....................................................................... 12 3.1 Assumptions ...................................................................................................................... 12 3.2 Threats ............................................................................................................................... 12 3.2.1 Threats Addressed by the TOE ..................................................................................... 12 3.2.2 Threats addressed by the IT Environment .................................................................... 13 3.3 Organizational Security Policies ........................................................................................ 13

    4 Security Objectives ................................................................................... 14 4.1 Security Objectives for the TOE ........................................................................................ 14 4.2 Security Objectives for the Operational Environment ........................................................ 14 4.3 Rationale ............................................................................................................................ 15

    5 Extended Components Definition .............................................................. 18 5.1 Extended TOE Security Functional Components .............................................................. 18 5.1.1 Class FCS: Cryptographic Support ............................................................................... 18 5.1.2 Class FIA: Identification and Authentication .................................................................. 21 5.1.3 Class FPT: Protection of the TSF .................................................................................. 24 5.1.4 Class FTA: TOE Access ................................................................................................ 26 5.2 Rationale for Extended Security Functional Requirements ............................................... 27

    6 Security Requirements .............................................................................. 28 6.1 Conventions ....................................................................................................................... 28 6.2 Security Functional Requirements for the TOE ................................................................. 28 6.2.1 Security Audit (FAU) ...................................................................................................... 30 6.2.2 Cryptographic Support (FCS) ........................................................................................ 31 6.2.3 User Data Protection (FDP) ........................................................................................... 38 6.2.4 Identification and Authentication (FIA)........................................................................... 38 6.2.5 Security Management (FMT) ......................................................................................... 41 6.2.6 Protection of the TSF (FPT) .......................................................................................... 42 6.2.7 Resource Utilization (FRU) ............................................................................................ 45 6.2.8 TOE Access (FTA) ......................................................................................................... 45 6.2.9 Trusted Path/Channels (FTP) ........................................................................................ 46 6.3 Security Assurance Requirements for the TOE ................................................................ 49 6.4 Security Requirements for the IT Environment ................................................................. 50 6.5 Rationale for Security Functional Requirements ............................................................... 50 6.6 Rationale for Security Assurance Requirements ............................................................... 54 6.7 Rationale for Dependencies .............................................................................................. 54 6.7.1 Security Functional Requirement Dependencies .......................................................... 54 6.7.2 Security Assurance Requirement Dependencies .......................................................... 56

  • Security Target

    Version 1.0, Revision 20

    Copyright 2012 Infoblox, All Rights Reserved 4

    7 TOE Summary Specification ..................................................................... 58 7.1 TOE Security Functions ..................................................................................................... 58 7.1.1 TSF_TOE_COMM ......................................................................................................... 58 7.1.2 TSF_TRUSTED_UPDATES .......................................................................................... 61 7.1.3 TSF_AUDIT ................................................................................................................... 62 7.1.4 TSF_TOE_ACCESS ...................................................................................................... 62 7.1.5 TSF_RESOURCE_EXHAUSTION ................................................................................ 64 7.1.6 TSF_USER_DATA_DISCLOSURE ............................................................................... 64 7.1.7 TSF_SELF_TEST .......................................................................................................... 65

    8 Glossary .................................................................................................... 67 8.1 Acronyms ........................................................................................................................... 67

    9 References ................................................................................................ 67

  • Security Target

    Version 1.0, Revision 20

    Copyright 2012 Infoblox, All Rights Reserved 5

    List of Table

    Table 1: TOE Models ....................................................................................................................... 8

    Table 2: Assumptions for the TOE ............................................................................................... 12

    Table 3: Threats Addressed by the TOE ...................................................................................... 12

    Table 4: Organizational Security Policies for the TOE ................................................................. 13

    Table 5: Security Objectives for the TOE ..................................................................................... 14

    Table 6: Security Objectives for the Operational Environment .................................................... 14

    Table 7: Completeness of Security Objectives ............................................................................. 15

    Table 8: Sufficiency of Security Objectives .................................................................................. 16

    Table 9: TOE Security Functional Requirements and Auditable Security Events ......................... 28

    Table 10: TOE Security Assurance Requirements ....................................................................... 49

    Table 11: Completeness of Security Functional Requirements .................................................... 50

    Table 12: Sufficiency of Security Functional Requirements .......................................................... 51

    Tab