Security Target Juniper Networks Junos Pulse SA 7.2R4 EAL3... ST Title Security Target: Juniper Networks

  • View
    0

  • Download
    0

Embed Size (px)

Text of Security Target Juniper Networks Junos Pulse SA 7.2R4 EAL3... ST Title Security Target: Juniper...

  • Security Target: Juniper Networks Junos Pulse Secure Access Service 7.2 R4

    Document Version 1.4 © Juniper Networks Page 1 of 46 This document may be freely reproduced and distributed whole and intact including this copyright notice.

    Security Target

    Juniper Networks Junos Pulse Secure Access Service 7.2 R4

    Document Version 1.4

    05/15/2013 (Updated)

  • Security Target: Juniper Networks Junos Pulse Secure Access Service 7.2 R4

    Document Version 1.4 © Juniper Networks Page 2 of 46 This document may be freely reproduced and distributed whole and intact including this copyright notice.

    Prepared For:

    Prepared By:

    Juniper Networks, Inc.

    1194 North Mathilda Avenue

    Sunnyvale, CA 94089

    www.juniper.net

    Apex Assurance Group, LLC

    530 Lytton Ave, Ste. 200

    Palo Alto, CA 94301

    www.apexassurance.com

    Abstract

    This document provides the basis for an evaluation of a specific Target of Evaluation (TOE), the Juniper

    Networks Junos Pulse Secure Access Service 7.2 R4. This Security Target (ST) defines a set of

    assumptions about the aspects of the environment, a list of threats that the product intends to counter,

    a set of security objectives, a set of security requirements and the IT security functions provided by the

    TOE which meet the set of requirements.

    http://www.juniper.net/ http://www.apexassurance.com/

  • Security Target: Juniper Networks Junos Pulse Secure Access Service 7.2 R4

    Document Version 1.4 © Juniper Networks Page 3 of 46 This document may be freely reproduced and distributed whole and intact including this copyright notice.

    Table of Contents

    1 Introduction .................................................................................................................................................... 6 1.1 ST Reference .................................................................................................................................................... 6 1.2 TOE Reference ................................................................................................................................................. 6 1.3 Document Organization .................................................................................................................................. 6 1.4 Document Conventions .................................................................................................................................... 7 1.5 Document Terminology ................................................................................................................................... 7 1.6 TOE Overview .................................................................................................................................................. 8 1.7 TOE Description ............................................................................................................................................... 9

    1.7.1 Physical Boundary .................................................................................................................................... 9 1.7.2 Logical Boundary .................................................................................................................................... 12

    2 Conformance Claims ..................................................................................................................................... 13 2.1 CC Conformance Claim .................................................................................................................................. 13 2.2 PP Claim ......................................................................................................................................................... 13 2.3 Package Claim ............................................................................................................................................... 13 2.4 Conformance Rationale ................................................................................................................................. 13

    3 Security Problem Definition .......................................................................................................................... 14 3.1 Threats ........................................................................................................................................................... 14 3.2 Organizational Security Policies .................................................................................................................... 15 3.3 Assumptions .................................................................................................................................................. 15

    4 Security Objectives ........................................................................................................................................ 16 4.1 Security Objectives for the TOE...................................................................................................................... 16 4.2 Security Objectives for the Operational Environment ................................................................................... 16 4.3 Security Objectives Rationale ........................................................................................................................ 17

    5 Extended Components Definition .................................................................................................................. 21 5.1 Definition of Extended Components .............................................................................................................. 21

    6 Security Requirements .................................................................................................................................. 22 6.1 Security Functional Requirements ................................................................................................................. 22

    6.1.1 Security Audit (FAU) ............................................................................................................................... 23 6.1.2 Cryptographic Support (FCS) .................................................................................................................. 24 6.1.3 Information Flow Control (FDP) ............................................................................................................. 25 6.1.4 Identification and Authentication (FIA).................................................................................................. 27

    6.2 Security Management (FMT) ......................................................................................................................... 27 6.2.2 Protection of the TSF (FPT) .................................................................................................................... 29 6.2.3 TOE Access (FTA) .................................................................................................................................... 30 6.2.4 Trusted Path/Channels (FTP) ................................................................................................................. 30

    6.3 Security Functional Requirements for the IT Environment ............................................................................ 30 6.4 Security Assurance Requirements .................................................................................................................. 30 6.5 Security Requirements Rationale ................................................................................................................... 30

    6.5.1 Security Functional Requirements ......................................................................................................... 30 6.5.2 Sufficiency of Security Requirements .................................................................................................... 31 6.5.3 Security Assurance Requirements ......................................................................................................... 38

  • Security Target: Juniper Networks Junos Pulse Secure Access Service 7.2 R4

    Document Version 1.4 © Juniper Networks Page 4 of 46 This document may be freely reproduced and distributed whole and intact including this copyright notice.

    6.5.4 Security Assurance Requirements Rationale ......................................................................................... 39 6.5.5 Security Assurance Requirements Evidence .......................................................................................... 39

    7 TOE Summary Specification ........................................................................................................................... 41 7.1 TOE Security Functions .................................................................................................................................. 41 7.2 Security Audit................................................................................................................................................. 41 7.3 Cryptographic Operations ............................................................................................................................. 43 7.4 User Data Protection ..................................................................................................................................... 43 7.5 Identification and Authentication .................................................................................................................. 44 7.6