School Work

AhnLab TrusGuard V2.2 Security Target V1.8

Description
AhnLab TrusGuard V2.2 Security Target V1.8
Categories
Published
of 165
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Transcript
    AhnLab Inc.   CC Part3 V3.1r4 Type   Version   Date   CC certification  1.8 2013-07-30 AhnLab TrusGuard V2.2 1 AhnLab TrusGuard V2.2 Security Target 673, Sampyeong-dong, Bundang-gu, Seongnam-si, Gyeonggi-do, 463-400, South Korea www.ahnlab.com     AhnLab Inc.   CC Part3 V3.1r4 Type   Version   Date   CC certification  1.8 2013-07-30 AhnLab TrusGuard V2.2 2 Revision History Version Date Author Description 1.0 2012-10-04 Jae-Hoon Hwang Initial Version 1.1 2013-01-23 Jae-Hoon Hwang Updated with additional scopes - VPN, Contets Filtering, IPv6, Anti-Virus 1.2 2013-03-31 Jae-Hoon Hwang Updated with modification requests - Review comments: Chapters 1 ~ 4 1.3 2013-04-30 Jae-Hoon Hwang Updated with EOR-01 and EOR-04 1.4 2013-05-09 Jae-Hoon Hwang Updated with modification requests - Review comments: 6. Security requirements 1.5 2013-05-27 Jae-Hoon Hwang Updated with modification requests - Review comments: 7. TOE summary specifications 1.6 2013-06-13 Jae-Hoon Hwang Updated with modification requests - Additional review comments 1.7 2013-07-05 Jae-Hoon Hwang Updated interoperable server - Removed LDAP server interoperation 1.8 2013-07-30 Jae-Hoon Hwang Updated with function name changes (IPS > DPI)    AhnLab Inc.   CC Part3 V3.1r4 Type   Version   Date   CC certification  1.8 2013-07-30 AhnLab TrusGuard V2.2 3 Table of Contents 1. Security Target Introduction ......................................................................................... 7   1.1.   ST Reference ..................................................................................................... 7   1.2.   TOE Reference................................................................................................... 8   1.3.   TOE Overview.................................................................................................... 9   1.4.   TOE descriptions .............................................................................................. 25   1.5.   Conventions .................................................................................................... 35   1.6.   Terms and Definitions ...................................................................................... 36  2. Conformance Claims .................................................................................................. 41   2.1.   Common Criteria Conformance ......................................................................... 41   2.2.   Protection Profile Conformance ......................................................................... 41   2.3.   Package Conformance ...................................................................................... 41   2.4.   Supporting rationale for conformance claim ....................................................... 42  3. Security Problem Definitions ....................................................................................... 43   3.1.   Threats ........................................................................................................... 43   3.2.   Organizational Security Policies ......................................................................... 45   3.3.    Assumptions .................................................................................................... 46  4. Security objectives .................................................................................................... 48   4.1.   TOE Security objectives .................................................................................... 48   4.2.   Security Objectives for the Operational Environment .......................................... 50  5. Extended component definition .................................................................................. 58  6. Security requirements ................................................................................................ 59   6.1.   Security functional requirements ....................................................................... 59   6.2.   TOE Security Assurance Requirements ............................................................ 105   6.3.   Rationale for Security Requirements ................................................................ 123  7. TOE summary specification ...................................................................................... 136   7.1.   TOE Security Functionality .............................................................................. 136      AhnLab Inc.   CC Part3 V3.1r4 Type   Version   Date   CC certification  1.8 2013-07-30 AhnLab TrusGuard V2.2 4 List of Tables [Table 1-1]   TOE hardware models ................................................................................. 20 [Table 1-2]   Specifications for administrator systems ....................................................... 20   [Table 1-3]   Installation specifications for SSL VPN Client and Authentication Client ........... 21   [Table 4-1]   Security issue definitions and security objective countermeasures .................. 51   [Table 6-1]   Security functional requirements for Security Target ...................................... 59   [Table 6-2]   Countermeasures upon detection of a potential security violation. .................. 61   [Table 6-3]    Auditable events ......................................................................................... 62   [Table 6-4]    Audit data type and searching/sorting criteria by audit data type - TrusGuard Gateway 64   [Table 6-5]    Audit data Type and searching/sorting criteria by audit data type  –  TrusAnalyzer 66   [Table 6-6]   User security attributes list .......................................................................... 85   [Table 6-7]    VPN User security attributes list ................................................................... 85   [Table 6-8]   Secret acceptance criteria ............................................................................ 86   [Table 6-9]   Security functions and allowed capabilities - TrusGuard Gateway ................... 88   [Table 6-10]   Security functions and allowed capabilities - TrusAnalyzer .............................. 89   [Table 6-11]   Security attributes list and allowed capabilities for authorized administrators .. 93   [Table 6-12]   TSF data created in the TOE(TrusGuard Gateway) and management capabilities for authorized TG top-level administrators and TG general administrators .............................. 95   [Table 6-13]   TSF data list created in the TOEs (TrusGuard Auth and SSL VPN client) and management capabilities for authorized general users .......................................................... 96   [Table 6-14]   TSF data created in the TOE (TrusAnalyzer) and management capabilities ...... 97   [Table 6-15]   Security role types for authorized users ...................................................... 100   [Table 6-16]   User inactive periods for user session termination ....................................... 102   [Table 6-17]   Security Assurance Requirements ............................................................... 105   [Table 6-18]   TOE Security objectives and a map between security objects and corresponding security functional requirements ........................................................................................ 123   [Table 6-19]   Dependencies of the functional components ............................................... 133   [Table 7-1]   Functional components to trigger security alerts, auditable events and countermeasures .............................................................................................................. 137   [Table 7-2]   Cryptographic algorithms used by the TOE ................................................. 139   [Table 7-3]   Information flow control methods for Access control at Network Level policies
Search
Tags
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks
SAVE OUR EARTH

We need your sign to support Project to invent "SMART AND CONTROLLABLE REFLECTIVE BALLOONS" to cover the Sun and Save Our Earth.

More details...

Sign Now!

We are very appreciated for your Prompt Action!

x