💾 Archived View for spam.works › mirrors › textfiles › hacking › fcscvol2.hac captured on 2023-06-14 at 16:48:59.
-=-=-=-=-=-=-
FEDERAL CRITERIA for INFORMATION TECHNOLOGY SECURITY VOLUME II Registry of Protection Profiles Version 1.0 December 1992 This document is undergoing review and is subject to modification or withdrawal. The contents of this document should not be referenced in other publications. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY & NATIONAL SECURITY AGENCY NOTES TO REVIEWERS This is the first public draft of work in progress by the joint National Institute of Standards and Technology (NIST) and National Security Agency (NSA) Federal Criteria (FC) Project. This draft Federal Criteria for Information Technology Security is provided for preliminary review and comment by members of the national and international computer security community. The document will evolve into a new Federal Information Processing Standard (FIPS) intended principally for use by the United States Federal Government, and also by others as desired and appropriate. The FIPS is intended to replace the Trusted Computer System Evaluation Criteria (TCSEC) or "Orange Book." Our objectives in presenting this draft material are threefold: first, to give the community a clear view of the FC Project's direction in moving beyond the TCSEC method of expressing requirements in order to meet new IT security challenges; second, to obtain feedback on the innovative approaches taken, the method of presentation, and granularity; and third, to make a substantial contribution to the dialogue among nations leading to the harmonization of IT security requirements and evaluations. It is important to note a few things about this preliminary FC draft. First, it is a new and unpolished document and not intended for any purpose except review and comment. Organizations should not adopt any contents of this draft document for their use. It is anticipated that the document will undergo extensive revision as it works its way through the public FIPS approval process over the next year or two. Second, the FC is being distributed in two volumes. Volume I addresses the criteria development process and is intended principally for use by developers of protection profiles. The information in Volume I may also be of use to IT product manufacturers and product evaluators. Volume II presents completed IT product security criteria in the form of accepted protection profiles. The protection profiles associated with the final FIPS will help consumers identify types of products that meet the protection requirements within their particular organizations and environments. However, the FIPS will be supplemented by a series of implementing guidance documents, many of which will be designed to help consumers make cost-effective decisions about obtaining and appropriately using security-capable IT products. As a preliminary draft of the new FC-FIPS, this document is not intended for general distribution or compliance. The document should not be considered a complete or finished product. Your comments will be used by the Federal Criteria Working Group to help raise the maturity level of this material prior to being circulated for further public comment in the FIPS development process. ADDITIONAL NOTES TO REVIEWERS Reviewers who provide substantive comments on the enclosed draft FC by March 31, 1993 will be invited to attend an Invitational Workshop on the Federal Criteria. This two-day workshop will be held in the last week of April 1993 in the Washington-Baltimore area at a location to be announced. All comments received by the cut-off date will be correlated into major themes for discussion by break-out groups at the workshop. The results will be used as input into the process of re-drafting the FC for a second round of comment prior to its being formalized as a FIPS. Please send your comments (electronic format preferred) to Nickilyn Lynch at the U.S. National Institute of Standards and Technology (NIST), Computer Systems Laboratory (CSL). Phone: (301) 975-4267 FAX: (301) 926-2733. (Internet) Electronic Mail: lynch@csmes.ncsl.nist.gov Postal or Express Mail (Hardcopy or 3.5", 1.44M diskette in MSDOS, Macintosh, or Sun format): Federal Criteria Comments Attn: Nickilyn Lynch NIST/CSL, Bldg 224/A241 Gaithersburg, MD 20899 NIST National Institute of Standards and Technology Gaithersburg, MD 20899 COMMERCIAL SECURITY REQUIREMENTS FOR MULTI-USER OPERATING SYSTEMS A family of Protection Profiles for the Federal Criteria for Information Technology Security Issue 1.1 January 1993 Supersedes Minimum Security Requirements for Multi-User Operating Systems Computer Security Division Computer Systems Laboratory National Institute of Standards and Technology Chapter 1. Commercial Security Requirements (CSR) 1.1 Introduction 1.1.1 CS Description 1.1.2 Background 1.1.2.1 Trusted Computer System Evaluation Criteria (TCSEC) 1.1.2.2 Commercial Security Efforts 1.1.2.3 System Security Study Committee 1.1.2.4 Minimum Security Functionality Requirements (MSFR) 1.1.2.5 Commercial Security (CS) requirements 1.1.3 Document Organization COMMERCIAL SECURITY 1 (CS1) CS1 Rationale 2.2 Introduction 2.2.1 Protection Philosophy 2.2.1.1 Access Authorization 2.2.1.2 Accountability 2.2.1.2.1 Identification and Authentication 2.2.1.2.2 Audit 2.2.1.3 Assurance 2.2.2 Intended Method of Use 2.2.3 Environmental Assumptions 2.2.4 Expected Threats CS1 Functionality 3. Introduction 3.1 Identification & Authentication 3.2 Audit 3.3 Access Control 3.4 Reference Mediation 3.5 TCB Protection 3.6 TCB Self-Checking CS1 Assurance 4. Introduction 4.1 TCB Property Definition 4.2 TCB Element Identification 4.3 TCB Interface Definition 4.4 Developer Functional Testing 4.5 User's Guidance 4.6 Administrative Guidance 4.7 Evidence of TCB Protection Properties 4.8 Evidence of Product Development 4.9 Evidence of Functional Testing 4.10 Test Analysis 4.11 Independent Testing COMMERCIAL SECURITY 2 (CS2) CS2 Rationale 2.12 Introduction 2.12.1 Protection Philosophy 2.12.1.1 Access Authorization 2.12.1.1.1 System Entry 2.12.1.1.2 Subject and Object Access Mediation 2.12.1.1.3 Privileges 2.12.1.2 Accountability 2.12.1.2.1 Identification and Authentication 2.12.1.2.2 Audit 2.12.1.3 Assurance 2.12.1.4 Intended Method of Use 2.12.2 Environmental Assumptions 2.12.3 Expected Threats CS2 Functionality 3. Introduction 3.1 Identification & Authentication 3.2 System Entry 3.3 Trusted Path 3.4 Audit 3.5 Access Control 3.6 Security Management 3.7 Reference Mediation 3.8 Logical TCB Protection 3.9 TCB Self-Checking 3.10 TCB Initialization and Recovery 3.11 Privileged Operation 3.12 Ease-of-TCB-Use CS2 Assurance 4. Introduction 4.1 TCB Property Definition 4.2 TCB Element Identification 4.3 TCB Interface Definition 4.4 TCB Structuring Support 4.5 Developer Functional Testing 4.6 User's Guidance 4.7 Administrative Guidance 4.8 Flaw Remediation Procedures 4.9 Trusted Generation 4.10 Evidence of TCB Protection Properties 4.11 Evidence of Product Development 4.12 Evidence of Functional Testing 4.13 Evidence of Product Support 4.14 Test Analysis 4.15 Independent Testing 4.16 Operational Support Review COMMERCIAL SECURITY 3 (CS3) CS3 Rationale 2.17 Introduction 2.17.1 Protection Philosophy 2.17.1.1 Access Authorization 2.17.1.1.1 System Entry 2.17.1.1.2 Subject and Object Access Mediation 2.17.1.1.3 Privileges 2.17.1.2 Accountability 2.17.1.2.1 Identification and Authentication 2.17.1.2.2 Audit 2.17.1.3 Availability of Service 2.17.1.4 Assurance 2.17.1.5 Intended Method of Use 2.17.2 Environmental Assumptions 2.17.3 Expected Threats CS3 Functionality 3. Introduction 3.1 Identification & Authentication 3.2 System Entry 3.3 Trusted Path 3.4 Audit 3.5 Access Control 3.6 Security Management 3.7 Reference Mediation 3.8 Resource-Allocation Requirements 3.9 TCB Protection 3.10 Physical TCB Protection 3.11 TCB Self-Checking 3.12 TCB Initialization and Recovery 3.13 Privileged Operation 3.14 Ease-of-TCB-Use CS3 Assurance 4. Introduction 4.1 TCB Property Definition 4.2 TCB Element Identification 4.3 TCB Interface Definition 4.4 Developer Functional Testing 4.5 Penetration Analysis 4.6 User's Guidance 4.7 Administrative Guidance 4.8 Flaw Remediation Procedures 4.9 Trusted Generation 4.10 Life Cycle Definition 4.11 Configuration Management 4.12 Evidence of TCB Protection Properties 4.13 Evidence of Product Development 4.14 Evidence of Functional Testing 4.15 Evidence of Penetration Analysis 4.16 Evidence of Product Support 4.17 Test Analysis 4.18 Independent Testing 4.19 Development Environment Review 4.20 Operational Support Review 4.21 Design Analysis GLOSSARY CSR References Chapter 1. Commercial Security Requirements (CSR) 1.1 Introduction Government and commercial institutions rely heavily on information technology (IT) products to meet their operational, financial, and information requirements. The corruption, unauthorized disclosure, or theft of electronically-maintained resources can have a disruptive effect on an organization's operations as well as serious and immediate financial, legal, and public confidence impact. Products conforming to the Commercial Security (CS) requirements contained in this document are intended to be useful to a broad base of users in the private, civil government, and defense sectors. This includes application developers, end users, and system administrators. The Protection Profiles specified in this document provide organizations with three set of security requirements, defined as CS1, CS2, and CS3, with CS3 offering the highest degree of trust. The Protection Profiles as a whole specify "baseline" requirements that meet generally accepted security expectations for a class of products colloquially called "general purpose, multi-user operating systems." These requirements apply to multi-user workstations, minicomputers, and mainframes. Most required mechanisms are configurable so that customers can satisfy their unique security policies and objectives. The intent of the Protection Profiles is to promote the wide availability of products possessing security enforcing functions that are of such broad applicability and effectiveness that they become part of the "normal" mode of operation. It is anticipated that vendors will respond to user expectations by increasing the availability of operating systems that meet these general security requirements. These requirements represent the integration of a number of security requirement specifications from various sources into a single set that is expected to have wide acceptance. 1.1.1 CS Description The Protection Profiles address the security features and their development. The Protection Profiles were written to meet several objectives: to serve as a "metric" for the amount of security present in a computer system processing sensitive information; to provide guidance to the developers as to what security features to build into their planned products; and to provide a method for uniformly specifying security requirements in acquisition specifications. The CS requirements are divided into three hierarchical Protection Profiles. The profiles are CS1, CS2, and CS3, with C3 providing the greatest degree of security. Each profile represents a level of trust that can be placed in a product and specifies a collection of requirements in the form of features and assurances. Each profile includes most of the features and assurances of the previous profile along with additional, more stringent features and assurances. The reasoning for requirements leveling for each Protection Profile can be found in the rationale in Chapter 2. This reasoning is based on the overall effectiveness of each Protection Profile in addressing the threats identified in that chapter. The Protection Profiles specify computer-based protection mechanisms for the design, use, and management of information systems. The Protection Profiles include technical measures that can be incorporated into multi-user, remote-access, resource-sharing, and information sharing computer systems. CS-conformant computer products provide system administrators with tools to control the sharing of information and resources based primarily on the identity of users, or, in the case of CS3, the role associated with the user, as well as the time of day, terminal location, or type of access requested. The technical measures also provide tools to protect against both common user actions that may compromise security and against deliberate penetration attempts by "hackers." In addition, there are requirements to log events that may impact the security of either the product or the information that it is processing. All functionality requirements are based on existing and well understood security practices. 1.1.2 Background These Protection Profiles have been developed by the CS Working Group of the Federal Criteria Project under NIST leadership with a high level of private sector participation. They are based on the Trusted Computer System Evaluation Criteria (TCSEC) [1] C2 criteria class, with additions from current computer industry practice, from commercial security requirements specifications, and from the on-going work of the Federal Criteria Project. Their development has also been guided by international security standards efforts and by the recommendations of the System Security Study Committee. The following sub-sections provide descriptions of each of these sources, and gives further background on the motivation for and development of the Protection Profiles. 1.1.2.1 Trusted Computer System Evaluation Criteria (TCSEC) The TCSEC [1], originally published in 1983 and revised in 1985, was the first publicly available document that expressed general security requirements that could apply to a specific class of technology (e.g., operating systems). It represents the culmination of many years of effort to address Information Technolgy (IT) security issues within the Department of Defense (DoD) classified world. The TCSEC is made up of IT security features and assurances that have been derived and engineered to support a very specific DoD security policy - the prevention of unauthorized disclosure of classified information (i.e., confidentiality). During the past few years, commercial enterprises and government organizations processing sensitive information have begun to pay increasing attention to IT security needs. Although the TCSEC-motivated security features have proven valuable in addressing their security problems, often these features have been viewed as less than perfect and incomplete and only to have been specified because a more appropriate set of security functions has not been available. The Protection Profiles are intended to be the first step in "filling this gap" by providing a set of security requirements appropriate for commercial enterprises and government organizations concerned with protecting sensitive information. 1.1.2.2 Commercial Security Efforts Recognizing that the TCSEC was a valuable starting point, but not sufficient for their security needs, two commercial companies - Bellcore and American Express Travel Related Services (TRS) - independently initiated efforts to develop security requirements for their environments. At Bellcore, these efforts resulted in a Bellcore Standard Operating Environment Security Requirements [3] document and at TRS the efforts resulted in the internal C2-Plus company security standard. The Bellcore document was developed to meet the security needs of Bellcore and its client companies, the Regional Bell Operating Companies (RBOCs). The requirements specified in the Bellcore document were derived both from commonly recurring security requirements for RBOC computer applications and from experiences of Bellcore's computer security assessment group. In developing the C2-Plus document, TRS found that, while the TCSEC met many requirements of the commercial sector, the prescribed features at the C2-level (and its F2-level counterpart in the ITSEC [2]) fell short in several areas that were either introduced at higher TCSEC levels or were not addressed at all in the respective standards. Consequently, the TRS document was developed as an enhanced, commercialized version of the C2-level security requirements of the TCSEC. Using the TRS document as input, the International Information Integrity Institute (I-4), a consortium of large international corporations, developed the Commercial International Security Requirements (CISR) [4]. The rationale for the development of the CISR include the following: "Military-oriented information security requirements (i. e., TCSEC) are not suitable in many respects for the needs of international businesses." [4] The final version of the CISR was published in April 1992. 1.1.2.3 System Security Study Committee The System Security Study Committee was formed in 1988 in response to a request from the Defense Advance Research Projects Agency (DARPA) to address the security and trustworthiness of U.S. computing and communications systems. The Committee, which was composed of 16 individuals from industry and academia, including computer and communications security researchers, practitioners, and software engineers, was charged with developing a national research, engineering, and policy agenda to help the United States achieve a more trustworthy computing technology base by the end of the century. In 1991, the Committee published the Computers at Risk [5] report, which presents the Committee's assessment of key computer and communications security issues and its recommendations for enhancing the security and trustworthiness of the U.S. computing and communications infrastructure. The development of the Protection Profiles was guided by one of the recommendations from this report that: "...a basic set of security-related principles for the design, use, and management of systems that are of such broad applicability and effectiveness that they ought to be a part of any system with significant operational requirements" [5] should be developed. 1.1.2.4 Minimum Security Functionality Requirements (MSFR) The second draft of the Minimum Security Functionality Requirements for Multi-User Operating Systems (MSFR) [10] was published in January of 1992. The MSFR was developed as part of a project to stimulate the development of IT products broadly useful to the diverse security needs of the US Government (civilian and military) and the private sector. The MSFR specified the minimum level of security that NIST and NSA felt should be available in any commercially available multi-user operating system. The MSFR represents an extension of the TCSEC controlled access protection class, level C2, with additions based on current industry practice and security requirements specifications developed in the commercial environment. Much of the MSFR is derived from the TCSEC, the Bellcore Standard Operating Environment Security Requirements, and the CISR with overall guidance from the Computers at Risk report [5]. 1.1.2.5 Commercial Security (CS) requirements To help support the Federal Criteria, the CS Working Group was tasked with developing a family of Protection Profiles, based on an updated version of the MSFR. The three Protection Profiles included in this document have been developed in compliance with the prescribed approach and format of the Federal Criteria [11]. Components of the Federal Criteria were selected for each Protection Profile and were enhanced with refinements and assignments that were taken from the November 1992 version of the MSFR. The Protection Profiles are intended to satisfy the most common security needs of computer system users. 1.1.3 Document Organization Chapter 1 (this chapter) provides introductory and background information. The rest of this document is divided into three Protection Profiles, CS1, CS2, and CS3. The development of these Protection Profiles are in accordance with the Protection Profile format specified by the Federal Criteria. Chapter 2 provides the rationale for the selection of the security features and assurance evidence. This rationale also includes descriptions of the intended use of the product, the environmental assumptions that were made for a CS-compliant system, and the expected threats. Chapter 3 specifies the security functionality that a CS-compliant system is required to provide, and Chapter 4 specifies the assurance requirements. At the end of the CS requirements, there is a Glossary and a list of references. COMMERCIAL SECURITY 1 (CS1) Products that comply with this Protection Profile provide access control capabilities to separate users and data based on finely grained access con- trols. It incorporates credible controls capable of enforcing access limitations on an individual basis, i.e., ostensibly suitable for allowing users to be able to protect sensitive information and to keep other users from reading or destroying their data. Users are individually accountable for their actions through login procedures, auditing of secu- rity relevant events, and resource isolation. This CS1 Protection Profile is equivalent to a Class C2 - Controlled Access Protection from the TCSEC [1]. It consists of TCSEC requirements plus those eval- uation interpretations that a product must meet before it can be evaluated at the C2 level. COMPONENT SUMMARY: CS1 Functional Component Summary .------------------------------------------------------. | | Component | | | Component Name | Code | Level | |======================================================| | Security Policy Support: | |----------------------------------+-----------+-------| | Identification & Authentication | I&A | 1 | |----------------------------------+-----------+-------| | Audit | AD | 1 | |----------------------------------+-----------+-------| | Access Control | AC | 1 | |----------------------------------+-----------+-------| | Reference Mediation | RM | 1 | |----------------------------------+-----------+-------| | TCB Protection | P | 1 | |----------------------------------+-----------+-------| | Self Checking | SC | 1 | `------------------------------------------------------' CS1 Assurance Package Summary .---------------------------------------. | Assurance Components | T1 | |================================|======| | Development Assurance Components | |=======================================| | Development Process | |--------------------------------+------| | TCB Property Definition | PD-1 | |--------------------------------+------| | TCB Design | |--------------------------------+------| | TCB Element Identification | ID-1 | |--------------------------------+------| | TCB Interface Definition | IF-1 | |--------------------------------+------| | TCB Modular Decomposition | ---- | |--------------------------------+------| | TCB Structuring Support | ---- | |--------------------------------+------| | TCB Design Disciplines | ---- | |--------------------------------+------| | TCB Implementation Support | ---- | |--------------------------------+------| | TCB Testing and Analysis | |--------------------------------+------| | Functional Testing | FT-1 | |--------------------------------+------| | Penetration Analysis | ---- | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Operational Support | |--------------------------------+------| | User Security Guidance | UG-1 | |--------------------------------+------| | Administrative Guidance | AG-1 | |--------------------------------+------| | Trusted Generation | ---- | |--------------------------------+------| | Development Environment | |--------------------------------+------| | Life Cycle Definition | ---- | |--------------------------------+------| | Configuration Management | ---- | |--------------------------------+------| | Trusted Distribution | ---- | |--------------------------------+------| | Development Evidence | |--------------------------------+------| | TCB Protection Properties | EPP1 | |--------------------------------+------| | Product Development | EPD1 | |--------------------------------+------| | Product Testing & Analysis | |--------------------------------+------| | Functional Testing | EFT1 | |--------------------------------+------| | Penetration Analysis | ---- | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Product Support | ---- | `---------------------------------------' |=======================================| | Evaluation Assurance Components | |=======================================| | Testing | |--------------------------------+------| | Test Analysis | TA-1 | |--------------------------------+------| | Independent Testing | IT-1 | |--------------------------------+------| | Review | |--------------------------------+------| | Development Environment | ---- | |--------------------------------+------| | Operational Support | ---- | |--------------------------------+------| | Analysis | |--------------------------------+------| | Protection Properties | ---- | |--------------------------------+------| | Design | ---- | |--------------------------------+------| | Implementation | ---- | `---------------------------------------' CS1 Rationale 2.2 Introduction As outlined in the Federal Criteria, this rationale de- scribes the protection philosophy, how the security features are intended to be used, the assumptions about the environment in which a compliant product is intended to operate, the threats within that environment, and the security features and assurances that counter these threats. The level of components that were chosen for the CS1 Pro- tection Profile are equivalent to Class C2 of the TCSEC [1]. They consist of TCSEC requirements plus those evaluation in- terpretations that a product must meet before it can be eval- uated at the C2 level. 2.2.1 Protection Philosophy Any discussion of protection necessarily starts from a pro- tection philosophy, i.e., what it really means to call the product "secure." In general, products will control access to information and other resources through the use of specific security features so that only properly authorized individu- als or processes acting on their behalf will be granted ac- cess. For CS1, three fundamental requirements are derived for this statement of protection: o Access authorization o Accountability o Assurance The totality of the functionality that enforces the access authorization and accountability protection philosophy is comprised of the hardware, software, and firmware of the Trusted Computing Base (TCB). CS1 requires the TCB to be pro- tected from external interference and tampering so that it is effective at countering identified threats. The assurance protection philosophy is comprised of the development pro- cess, operational support, development evidence, and evalua- tion process assurances. Each of these are explained below. 2.2.1.1 Access Authorization The access authorization portion of the philosophy of pro- tection for this profile addresses subject and object access mediation. CS1 provides protected access to resources and ob- jects. As defined in the TCSEC and specified in this profile, access control permits system users and the processes that represent them to allow or disallow to other users access to objects under their control: Access control is "a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are dis- cretionary in the sense that a subject with a cer- tain access permission is capable of passing that permission (perhaps indirectly) on to any other subject." [1] These controls permit the granting and revoking of access privileges to be left to the discretion of the individual us- ers. 2.2.1.2 Accountability The accountability portion of the philosophy of protection for this profile addresses user Identification and Authenti- cation (I&A) and requirements for security auditing. Each of these are explained below. 2.2.1.2.1 Identification and Authentication User identification is required to support access control and security auditing. This includes the capability to estab- lish, maintain, and protect a unique identifier for each au- thorized user. User identification is functionally dependent on authentication. Authentication is a method of validating a person as a legitimate user. 2.2.1.2.2 Audit For most secure products, a capability must exist to audit the security relevant events. As each user performs security relevant tasks, the product must record the user identifier, the action performed, and the result in a security log. For CS1 compliant products, a capability is specified to allow a system administrator to access and evaluate audit informa- tion. This capability provides a method of protection in the sense that security relevant events that occur within a com- puter system can be logged and the responsible user held ac- countable for his/her actions. Audit trails are used to detect and deter penetration of a computer system and to reveal ac- tivity that identifies misuse. CS1 provides for an effective audit mechanism by supporting the following basic security characteristics. It provides the ability to: o review the use of I&A mechanisms; o discover the introduction of objects into a user's address space; o discover the deletion of objects; and o discover actions taken by computer operators and sys- tem administrators. 2.2.1.3 Assurance Assurance addresses threats and vulnerabilities that can affect the product during its development and it addresses evaluation assurance. Assurance Package T1 was selected for the CS1 level. This minimal assurance level is intended to include most commercial computer products that incorporate protection components today. Minimal assurance refers to the fact that this package includes the lowest levels of develop- ment and evaluation assurance components and only those com- ponents deemed important to provide the necessary minimal understanding of the product. The intent of the product development assurance for this package is to establish that the external behavior of the product conforms to its user level and administrative docu- mentation without any analysis of the internal structure of the product's TCB. For this reason, only the claimed TCB pro- tection properties, TCB interface description, and TCB ele- ment list are required to enable security functional testing. The intent of the operational support assurance for this package is to establish a minimal level of user and adminis- trative guidance and product information that enables the cor- rect product installation, use of product security features, and remediation of flaws. The development evidence is commensurate with the assuranc- es required. The intent is to require the type of assurance evidence that is generated during the normal commercial de- velopment process. Evaluation support assurance establishes that the product, and the context in which it is developed and supported, is commensurate with the development assurance requirements. At the T1 level, testing analysis and the requirement for inde- pendent testing determines whether the product minimally meets the functional protection requirements. Operational support evaluation assurance determines whether the product documentation correctly describes the security relevant oper- ations. 2.2.2 Intended Method of Use All individual users (both administrative and non-adminis- trative) are assigned a unique user identifier. This user identifier supports individual accountability and access con- trol. The operating system authenticates the claimed identity of the user before allowing the user to perform any further actions. A CS1 compliant product imposes controls on authorized us- ers and on processes acting on their behalf to prevent users from gaining access to information and other resources for which they are not authorized. The product provides the capa- bility for users to allow or disallow to other users access to objects under their control. The objects are files that may be read or written to or programs which may be executed. The granularity of control is to the level of individual users (although groups made up of individual users may be specified) and individual objects. CS1 access controls permit the grant- ing and revoking of access to be left to the discretion of the individual users. Products that comply with CS1 specifications are intended to be used within the following operational constraints: o The information system is designed to be administered as a unique entity by a single organization. o The information system is designed to manage comput- ing, storage, input/output, and to control the sharing of resources among multiple users and computer pro- cesses. o The administrative and non-administrative users are identified as distinct individuals. o The granting and revoking of access control permis- sions are left to the discretion of individual users. o The information system provides facilities for real- time interaction with users that have access to input/ output devices. 2.2.3 Environmental Assumptions A product designed to meet the CS1 Protection Profile is intended to be a general purpose, multi-user operating system that runs on either a workstation, minicomputer, or mainframe. CS1 compliant products are expected to be used in commercial and government environments. For government environments, CS1 conforms to the TCSEC C2 class of trust [1].The information being processed may be unclassified, sensitive-but-unclassi- fied, or single-level classified, but not multi-level classi- fied information. The following specific environmental conditions have been assumed in specifying CS1: o The product hardware base (e.g., CPU, printers, ter- minals, etc.), firmware, and software will be pro- tected from unauthorized physical access. o There will be one or more personnel assigned to manage the product including the security of the information it contains. o The operational environment will be managed according to the operational environment documentation that is required in the assurance chapter of the Protection Profile. o The IT product provides a cooperative environment for users to accomplish some task or group of tasks. o The processing resources of the IT product, including all terminals, are assumed to be located within user spaces that have physical access controls established. 2.2.4 Expected Threats In general, the choice of which Protection Profile to choose depends upon the level of security that is required for that particular organizational environment. The lowest level, the CS1 level, is intended for those commercial and government environments where all the system personnel are trusted and all the data on the system is at the same classification lev- el. For example, a government agency where all personnel has a government clearance, all data is unclassified, and there is no outside network connections would be an ideal candidate for CS1, i.e., the threats to be countered are such that only a minimal level of trust is needed. However, most commercial and government environments are more complex and require a higher degree of trust. CS2 addresses the security needs for the mainstream commercial and government environments. It provides a higher level of trust for those organizations that need to enforce a security policy where there is no need for different classifications of data. CS3 is intended to provide the highest level of trust for commercial and government en- vironments. It is intended to be used in those environments where a great deal of trust is required, such as in law en- forcement agencies, nuclear facilities, or commercial air- ports. It provides the strongest features, mechanisms, and assurances to counter these threats. A product that is designed to meet the CS1 Protection Pro- file and operate within its assumed environment will provide capabilities to counter threats. It should be noted, however, that although a product may faithfully implement all the fea- tures and assurances specified in this Protection Profile, the complete elimination of any one threat should not be assumed. The following threats have been assumed in specifying this CS1 Protection Profile: 1. AN UNAUTHORIZED USER MAY ATTEMPT TO GAIN ACCESS TO THE SYSTEM For CS1 compliant products, the threat of an unauthorized user gaining access to the system is primarily addressed by I&A. I&A features allow the TCB to verify the identity of in- dividuals attempting to gain access to the system. This is accomplished through the use of passwords. Although not a direct countermeasure, auditing requirements are specified at the CS1 level to provide the capability to perform an after-the-fact analysis of unauthorized system en- try and login attempts. This provides an opportunity for the system administrators to take corrective actions, such as strengthening existing user authentication methods or requir- ing users to change their passwords. 2. AN AUTHORIZED USER MAY ATTEMPT TO GAIN ACCESS TO RESOURCES WHEN THE USER IS NOT ALLOWED ACCESS An authorized user can try to gain access to unauthorized resources by assuming the user identifier of another user and thus gaining their associated access rights. This is addressed through the use of passwords. Once an authorized user has gained access to the system, the threat still remains for a user to gain access to resourc- es when the user is not authorized. At the resource level, CS1 specifies access control features to mediate (i.e., distrib- ute, review, and revoke) user access to a subset of resources. The object reuse feature has been specified to ensure that resource contents are cleared before they are reused. This re- duces the vulnerability that the resource contents can be read before it is overwritten. 3. SECURITY RELEVANT ACTIONS MAY NOT BE TRACEABLE TO THE USER ASSOCIATED WITH THE EVENT CS1 accountability and audit requirements are specified to provide the capability to track security relevant actions per- formed by users and link such actions, if possible, to the responsible identifier. Audit mechanisms are responsible for the monitoring and detecting of real or potential security vi- olations or events. These audit events can include successful or unsuccessful: I&A events, the introduction of objects into a user's address space, the deletion of objects, and actions taken by system administrators. Each audit record includes the date, time, location, type of event, identity of the user and object involved, and the success or failure of the event. 4. SECURITY BREACHES MAY OCCUR BECAUSE OF TCB PENETRATION TCB protection is a fundamental capability of CS compliant products. The security components and mechanisms described in this Protection Profile depend upon the integrity of the TCB and on the TCB being isolated and non-circumventable. CS1 specifies requirements for a common and basic set of security features to protect the TCB from outside penetration. This threat is also countered through product assurance. TCB interface definition establishes the boundary between the TCB and its internal users. Security functional testing es- tablishes that these TCB definitions and properties satisfy the requirements of this Protection Profile. 5. USERS MAY BE ABLE TO BYPASS THE SECURITY FEATURES OF THE SYSTEM This threat is countered by authentication, access control, audit, TCB isolation, TCB non-circumventability, and refer- ence mediation requirements. Authentication requirements pro- tect authentication data from unauthorized users. Resource access control requirements protect access control data. Audit requirements provide for the logging of successful and unsuccessful accesses to resources as well as for changes made to the system security configuration and system software in the event that the system security features have been by- passed. The CS1 specification for reference mediation protects the integrity of the access control mechanism and the TCB's func- tionality. Starting at CS1, requirements exist for TCB medi- ation of user references to objects and to security relevant services. CS1-compliant products maintain a domain for its own exe- cution to protect it from external interference and tampering. Such requirements address TCB isolation and non-circumvent- ability of TCB isolation functions. This threat is also countered through product assurance. The definition of TCB properties assures the consistency of the TCB's behavior. The identification of TCB elements pro- vides the set of elements that determine the protection char- acteristics of a product. The TCB interface definition establishes the boundary between the TCB and its internal us- ers. Security functional testing establishes that these TCB definitions and properties satisfy the requirements of this Protection Profile, and provide evidence against users being able to bypass the security features of the system. CS1 Functionality 3. Introduction This section provides detailed functionality requirements that must be satisfied by an Commercial Security 1 (CS1) compliant product. Note that all plain text are words taken directly from the Federal Criteria [11]. Any assignments or refinements made to the text in the Federal Criteria for this Protection Profile are indicated by the use of bold italics. A Protection Profile requirement is an assignment when it is directly taken as stated from the Federal Criteria component without change or when a binding is made to a Federal Criteria threshold definition. A Protection Profile requirement is a refinement when a Federal Criteria requirement is taken to a lower level of abstraction. The characterization of Protection Profile requirements as being either assignments or refinements can be found at each component level. This Protection Profile for CS1 utilizes the following levels from the Federal Criteria. Note that not all the components from the Federal Criteria are reflected in this Protection Profile; there are no specific requirements for those components that are not listed. CS1 Functional Component Summary .------------------------------------------------------. | | Component | | | Component Name | Code | Level | |======================================================| | Security Policy Support: | |----------------------------------+-----------+-------| | Identification & Authentication | I&A | 1 | |----------------------------------+-----------+-------| | Audit | AD | 1 | |----------------------------------+-----------+-------| | Access Control | AC | 1 | |----------------------------------+-----------+-------| | Reference Mediation | RM | 1 | |----------------------------------+-----------+-------| | TCB Protection | P | 1 | |----------------------------------+-----------+-------| | Self Checking | SC | 1 | `------------------------------------------------------' 3.1 Identification & Authentication All users of the product must be identified and authenticated. A login process is established that the user interacts with in order to provide the information necessary for identification and authentication. The identification and authentication process begins the user's interaction with the target product. First, the user supplies a unique user identifier to the TCB. Then, the user is asked by the TCB to authenticate that claimed identity. The user identifier is used for both access control and also for accountability. Therefore, the proper maintenance and control of the identification mechanism and the identification databases are vital to product security. Once a user has supplied an identifier to the TCB, the TCB must verify that the user really corresponds to the claimed identifier. This is done by the authentication mechanism as described by the following requirements. For the CS1 level, I&A-1 was assigned from the Federal Criteria. This I&A component level has not been refined from the Federal Criteria. I&A-1 Minimal Identification and Authentication 1. The TCB shall require users to identify themselves to it before beginning to perform any other actions that the TCB is expected to mediate. The TCB shall be able to enforce individual accountability by providing the capability to uniquely identify each individual user. The TCB shall also provide the capability of associating this identity with all auditable actions taken by that individual. 2. The TCB shall use a protected mechanism (e.g., passwords) to authenticate the user's identity. 3. The TCB shall protect authentication data so that it cannot be used by any unauthorized user. 3.2 Audit Audit supports accountability by providing a trail of user actions. Actions are associated with individual users for security relevant events and are stored in an audit trail. This audit trail can be examined to determine what happened and what user was responsible for a security relevant event. The audit trail data must be protected from unauthorized access, modification, or destruction. In addition, the audit trail data must be available in a useful and timely manner for analysis. Audit data is recorded from several sources (such as from the TCB or a privileged application) to produce a complete picture of a user's security relevant actions. Therefore, audit data must be correlated across audit collection systems. The mechanisms providing audit data recording must be tailorable to each product's needs. Both the audit data itself and the mechanisms to determine what audit data is recorded are protected by privileges. Once the audit data is recorded, it is analyzed and reported. At the CS1 level, reports are generated on request. For the CS1 level, AD-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. AD-1 - Minimal Audit 1. The TCB shall be able to create, maintain, and protect from modification or unauthorized access or destruction an audit trail of accesses to the objects it protects. The audit data shall be protected by the TCB so that read access to it is limited to those who are authorized for audit data. 2. The TCB shall be able to record the following types of events: - use of the identification and authentication mechanisms; - introduction of objects into a user's address space (e.g., file open, program initiation), and deletion of objects; - actions taken by computer operators and system administrators and/or system security officers. 3. For each recorded event, the audit record shall identify: date and time of the event, user, type of event, and success or failure of the event. For identification/authentication events the origin of request (e.g., terminal ID) shall be included in the audit record. For events that introduce an object into a user's address space and for object deletion events the audit record shall include the name and policy attributes of the object (e.g., object security level). 4. The system administrator shall be able to selectively audit the actions of one or more users based on individual identity and/or object policy attributes (e.g., object security level). 3.3 Access Control Once the user has been granted access, the question of which objects that authenticated user may access still remains. The requirements below describe these subject accesses to objects. For the CS1 level, AC-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. AC-1 Minimal Access Control 1. Definition of Access Control Attributes The TCB shall define and protect access control attributes for subjects and objects. Subject attributes shall include named individuals or defined groups or both. Object attributes shall include defined access rights (e.g., read, write, execute) that can be assigned to subject attributes. 2. Administration of Access Control Attributes. The TCB shall define and enforce rules for assignment and modification of access control attributes for subjects and objects. The effect of these rules shall be that access permission to an object by users not already possessing access permission is assigned only by authorized users. These rules shall allow authorized users to specify and control sharing of objects by named individuals or defined groups of individuals, or by both, and shall provide controls to limit propagation of access rights. These controls shall be capable of including or excluding access to the granularity of a single user. If different rules of assignment and modification of access control attributes apply to different subjects and/or objects, the totality of these rules shall be shown to support the defined policy. 3. Authorization of Subject References to Objects The TCB shall define and enforce authorization rules for the mediation of subject references to objects. These rules shall be based on the access control attributes of subjects and objects. These rules shall, either by explicit user action or by default, provide that objects are protected from unauthorized access. The scope of the authorization rules shall include a defined subset of the product's subjects and objects and associated access control attributes. The coverage of authorization rules shall specify the types of objects and subjects to which these rules apply. If different rules apply to different subjects and objects, the totality of these rules shall be shown to support the defined policy. 4. Subject and Object Creation and Destruction The TCB shall control the creation and destruction of subjects and objects. These controls shall include object reuse. That is, all authorizations to the information contained within a storage object shall be revoked prior to initial assignment, allocation or reallocation to a subject from the TCB's pool of unused storage objects; information, including encrypted representations of information, produced by a prior subjects' actions shall be unavailable to any subject that obtains access to an object that has been released back to the system. 3.4 Reference Mediation Reference mediation, that is, the control by the TCB of subject accesses to objects, must be ensured so that the users can have faith in the TCB's access control decisions. Also, users must be ensured that all access to security services are mediated by the TCB. For the CS1 level, RM-1 was assigned from the Federal Criteria. No further refinements were made from the Federal Criteria. RM-1 Mediation of References to a Defined Subject/Object Subset 1. The TCB shall mediate all references to subjects, objects, resources, and services (e.g., TCB functions) described in the TCB specifications. The mediation shall ensure that all references are directed to the appropriate security-policy functions. 2. Reference mediation shall include references to the defined subset of subjects, objects, and resources protected under the TCB security policy, and to their policy attributes (e.g., access rights, security and/or integrity levels, role identifiers). 3. References issued by privileged subjects shall be mediated in accordance with the policy attributes defined for those subjects. 3.5 TCB Protection TCB protection is a fundamental requirement for a secure product. All of the security components and mechanisms that have been described depend upon the integrity of the TCB and on the TCB being isolated and non-circumventable. The TCB must be resistant to outside penetration. For the CS1 level, P-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. P-1 Basic TCB Isolation The TCB shall maintain a domain for its own execution that protects it from external interference and tampering (e.g., by reading or modification of its code and data structures). The protection of the TCB shall provide TCB isolation and noncircumventability of TCB isolation functions as follows: 1. TCB Isolation requires that (1) the address spaces of the TCB and those of unprivileged subjects are separated such that users, or unprivileged subjects operating on their behalf, cannot read or modify TCB data structures or code, (2) the transfers between TCB and non-TCB domains are controlled such that arbitrary entry to or return from the TCB are not possible; and (3) the user or application parameters passed to the TCB by addresses are validated with respect to the TCB address space, and those passed by value are validated with respect to the values expected by the TCB. 2. Noncircumventability of TCB isolation functions requires that the permission to objects (and/or to non-TCB data) passed as parameters to the TCB are validated with respect to the permissions required by the TCB, and references to TCB objects implementing TCB isolation functions are mediated by the TCB. 3.6 TCB Self-Checking Validating the correct operation of the TCB firmware and hardware is an important aspect of guaranteeing the integrity of the product. Hardware and software features that validate the correct operation of the product will be delivered with the product to ensure that the hardware and firmware are installed properly and are in working order. For the CS1 level, SC-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. SC-1 Minimal Self Checking Hardware and/or software features shall be provided that can be used to periodically validate the correct operation of the on-site hardware and firmware elements of the TCB. CS1 Assurance 4. Introduction This chapter provides the CS1 development and evaluation assurance requirements package using the development and evaluation assurance components defined in Volume I and the package contained in Volume I, Appendix G of the Federal Criteria. The structure of each assurance package follows that of the assurance components (i.e., each package consists of development process, operational support, development environment, development evidence, and evaluation process components). Assurance Package T1 This minimal assurance level is intended to include most commercial computer products that incorporate protection components. Minimal assurance refers to the fact that this package includes the lowest levels of development and evaluation assurance components and only those components deemed important to provide the necessary minimal understanding of the product. The intent of product development assurance for this package is to establish that the external behavior of the product conforms to its user level and administrative documentation without any analysis of the internal structure of the product's TCB. For this reason, only the claimed TCB protection properties, TCB interface description, and TCB element list are required to enable functional testing. The intent of the operational support assurance for this package is to establish a minimal level of user and administrative guidance and product information that enables the correct product installation, use of product security features, and remediation of flaws. The development evidence required for this package is commensurate with the assurances required. The intent of this package is to require the type of assurance evidence that is generated during the normal commercial development process. The intent of evaluation support assurance is to establish that the product, and the context in which it is developed and supported, is commensurate with the development assurance requirements. At the T1 level, testing analysis and the requirement for independent testing determines whether the product minimally meets the functional protection requirements. Operational support evaluation assurance determines whether the product documentation correctly describes the security relevant operations. The following table summarizes the generic assurance components that comprise the minimal development assurance package (T1): . CS1 Assurance Package Summary .---------------------------------------. | Assurance Components | T1 | |================================|======| | Development Assurance Components | |=======================================| | Development Process | |--------------------------------+------| | TCB Property Definition | PD-1 | |--------------------------------+------| | TCB Design | |--------------------------------+------| | TCB Element Identification | ID-1 | |--------------------------------+------| | TCB Interface Definition | IF-1 | |--------------------------------+------| | TCB Modular Decomposition | ---- | |--------------------------------+------| | TCB Structuring Support | ---- | |--------------------------------+------| | TCB Design Disciplines | ---- | |--------------------------------+------| | TCB Implementation Support | ---- | |--------------------------------+------| | TCB Testing and Analysis | |--------------------------------+------| | Functional Testing | FT-1 | |--------------------------------+------| | Penetration Analysis | ---- | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Operational Support | |--------------------------------+------| | User Security Guidance | UG-1 | |--------------------------------+------| | Administrative Guidance | AG-1 | |--------------------------------+------| | Trusted Generation | ---- | |--------------------------------+------| | Development Environment | |--------------------------------+------| | Life Cycle Definition | ---- | |--------------------------------+------| | Configuration Management | ---- | |--------------------------------+------| | Trusted Distribution | ---- | |--------------------------------+------| | Development Evidence | |--------------------------------+------| | TCB Protection Properties | EPP1 | |--------------------------------+------| | Product Development | EPD1 | |--------------------------------+------| | Product Testing & Analysis | |--------------------------------+------| | Functional Testing | EFT1 | |--------------------------------+------| | Penetration Analysis | ---- | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Product Support | ---- | `---------------------------------------' |=======================================| | Evaluation Assurance Components | |=======================================| | Testing | |--------------------------------+------| | Test Analysis | TA-1 | |--------------------------------+------| | Independent Testing | IT-1 | |--------------------------------+------| | Review | |--------------------------------+------| | Development Environment | ---- | |--------------------------------+------| | Operational Support | ---- | |--------------------------------+------| | Analysis | |--------------------------------+------| | Protection Properties | ---- | |--------------------------------+------| | Design | ---- | |--------------------------------+------| | Implementation | ---- | `---------------------------------------' 4.1 TCB Property Definition The definition of TCB properties assures the consistency of the TCB's behavior. It determines a baseline set of properties that can be used by system developers and evaluators to assure that the TCB satisfies the defined functional requirements. For CS1, PD-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. PD-1 Property Description The developer shall interpret the functional requirements of the protection profile within the product TCB. For each functional requirement, the developer shall: (1) identify the TCB elements and their TCB interfaces (if any) that implement that requirement; (2) describe the operation of these TCB elements, and (3) explain why the operation of these elements is consistent with the functional requirement. 4.2 TCB Element Identification The identification of TCB elements (hardware, firmware, software, code, and data structures) provides the set of elements that determine the protection characteristics of a product. All assurance methods rely on the correct identification of TCB elements either directly or indirectly. For CS1, ID-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. ID-1: TCB Element Identification The developer shall identify the TCB elements (i.e., software, hardware/firmware code and data structures). Each element must be unambiguously identified by its name, type, release, and version number (if any). 4.3 TCB Interface Definition The TCB interface establishes the boundary between the TCB and its external users and application programs. It consists of several components, such as command interfaces (i.e., user oriented devices such as the keyboard and mouse), application program interfaces (system calls), and machine/processor interfaces (processor instructions). For CS1, IF-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. IF-1: Interface Description The developer shall describe all external (e.g., command, software, and I/O) administrative (i.e., privileged) and non-administrative interfaces to the TCB. The description shall include those components of the TCB that are implemented as hardware and/or firmware if their properties are visible at the TCB interface. The developer shall identify all call conventions (e.g., parameter order, call sequence requirements) and exceptions signaled at the TCB interface. 4.4 Developer Functional Testing Functional testing establishes that the TCB interface exhibits the properties necessary to satisfy the requirements of the protection profile. It provides assurance that the TCB satisfies at least its functional protection requirements. For CS1, FT-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. FT-1: Conformance Testing The developer shall test the TCB interface to show that all claimed protection functions work as stated in the TCB interface description. The developer shall correct all flaws discovered by testing and shall retest the TCB until the protection functions are shown to work as claimed. 4.5 User's Guidance User's guidance is an operational support assurance component that ensures that usage constraints assumed by the protection profile are understood by the users of the product. It is the primary means available for providing product users with the necessary background and specific information on how to correctly use the product's protection functionality. For CS1, UG-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. UG-1: Users' Guide The developer shall provide a User Guide which describes all protection services provided and enforced by the TCB. The User Guide shall describe the interaction between these services and provide examples of their use. The User Guide may be in the form of a summary, chapter or manual. The User Guide shall specifically describe user responsibilities. These shall encompass any user responsibilities identified in the protection profile. 4.6 Administrative Guidance Administrative guidance is an operation support assurance component that ensures that the environmental constraints assumed by the protection profile are understood by administrative users and operators of the IT product. It is the primary means available to the developer for providing to administrators and operators detailed, accurate information on how to configure and install the product, operate the IT product is a secure manner, make effective use of the product's privileges and protection mechanisms to control access to administrative functions and data bases, and to avoid pitfalls and improper use of the administrative functions that would compromise the TCB and user security. For CS1, AG-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. AG-1: Basic Administrative Guidance The developer shall provide a Trusted Facility Manual intended for the product administrators that describes how to use the TCB security services (e.g., Access Control, System Entry, or Audit) to enforce a system security policy. The Trusted Facility Manual shall include the procedures for securely configuring, starting, maintaining, and halting the TCB. The Trusted Facility Manual shall explain how to analyze audit data generated by the TCB to identify and document user and administrator violations of this policy. The Trusted Facility Manual shall explain the privileges and functions of administrators. The Trusted Facility Manual shall describe the administrative interaction between security services. The Trusted Facility Manual shall be distinct from User Guidance, and encompass any administrative responsibilities identified in security management. 4.7 Evidence of TCB Protection Properties The documentation of the TCB protection properties includes the definition of the functional component requirements, their modeling (if any), and their interpretation within a product's TCB. For each requirement of a protection profile, a description, definition (an informal, descriptive specification), or a formal specification of the TCB components and their operation corresponding to the requirement must be provided. For CS1, EPP-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. EPP-1 Evidence of TCB Correspondence to the Functional Requirements The developer shall provide documentation which describes the correspondence between the functional component requirements and the TCB elements and interfaces. The TCB properties, which are defined by this correspondence, shall be explained in this documentation. 4.8 Evidence of Product Development Product development evidence consists of the TCB design evidence including the documentation of the TCB interface, TCB elements, TCB structure, TCB structuring support, and TCB design disciplines. The TCB implementation evidence includes TCB source code, and the processor hardware and firmware specifications. For CS1, EPD-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. EPD-1: Description Of The TCB External Interface The developer shall provide an accurate description of the functions, effects, exceptions and error messages visible at the TCB interface. The developer shall provide a list of the TCB elements (hardware, software, and firmware). 4.9 Evidence of Functional Testing Functional testing evidence includes the testing itself, the test plans, and test documentation results. Test plans consist of: the description definition or specification of the test conditions; the test data, which consists of the test environment set-up; the test parameters and expected outcomes; and a description of the test coverage. For CS1, EFT-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. EFT-1: Evidence of Conformance Testing The developer shall provide evidence of the functional testing that includes the test plan, the test procedures, and the results of the functional testing. 4.10 Test Analysis Test analysis determines whether the product meets the functional protection requirements defined in the protection profile. Functional testing is based on operational product, the TCB's functional properties, the product's operational support guidance, and other producer's documentation as defined by the development evidence requirements. Functional test analysis is based on the achieved test results as compared to the expected results derived from the development evidence. For CS1, TA-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. TA-1: Elementary Test Analysis The evaluator shall assess whether the producer has performed the activities defined in the development assurance requirements of the protection profile for functional testing and whether the producer has documented these activities as defined in the development evidence requirements of the protection profile. The evaluator shall analyze the results of the producer's testing activities for completeness of coverage and consistency of results. The evaluator shall determine whether the product's protection properties, as described in the product documentation have been tested. The evaluator shall assess testing results to determine whether the product's TCB works as claimed. 4.11 Independent Testing Independent testing determines whether the product's TCB meets the functional protection requirements as defined in the functionality chapter of this Protection Profile. Testing is based on the operational product, the TCB's functional properties, the product's operational support guidance, and other producer's documentation as defined by the Development Evidence requirements. For CS1, IT-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. IT-1: Elementary Independent Testing A tester, independent of the producer or evaluator, shall perform functional and elementary penetration testing. This testing shall be based on the product's user and administrative documentation, and on relevant known penetration flaws. Satisfactory completion consists of demonstrating that all user-visible security enforcing functions and security-relevant functions work as described in the product's user and administrative documentation and that no discrepancies exist between the documentation and the product. Test results of the producer shall be confirmed by the results of independent testing. The evaluator may selectively reconfirm any test result. If the independent testing is performed at beta- test sites, the producer shall supply the beta- test plan and the test results. The evaluator shall review the scope and depth of beta testing with respect to the required protection functionality, and shall verify independence of both the test sites and the producer's and beta- test user's test results. The evaluator shall confirm that the test environment of the beta-test site(s) adequately represents the environment specified in the protection profile. COMMERCIAL SECURITY 2 (CS2) CS2 compliant products provide protection beyond those of the CS1 Protection Profile by providing for the separation of administrative functions and access controls based on groups and access control lists (ACLs). Identification and authentication mechanisms include support for a rigorous password management program (if desired). System entry and availability and recovery requirements are also specified. Secure administrative tools are included, audit mechanisms are expanded, and data reduction tools are listed. CS2 Functional Component Summary .------------------------------------------------------. | | Component | | | Component Name | Code | Level | |======================================================| | Security Policy Support: | |----------------------------------+-----------+-------| | Identification & Authentication | I&A | 3 | |----------------------------------+-----------+-------| | System Entry | SE | 2 | |----------------------------------+-----------+-------| | Trusted Path | TP | 1 | |----------------------------------+-----------+-------| | Audit | AD | 3 | |----------------------------------+-----------+-------| | Access Control | AC | 2+ | |----------------------------------+-----------+-------| | Security Management | SM | 2 | |----------------------------------+-----------+-------| | Reference Mediation | RM | 1 | |----------------------------------+-----------+-------| | TCB Protection | P | 1 | |----------------------------------+-----------+-------| | Self Checking | SC | 2 | |----------------------------------+-----------+-------| | TCB Initialization & Recovery | TR | 2 | |----------------------------------+-----------+-------| | Privileged Operations | PO | 1 | |----------------------------------+-----------+-------| | Ease-of-Use | EU | 2 | `------------------------------------------------------' CS2 Assurance Package Summary .---------------------------------------. | Assurance Components | T2+ | |================================|======| | Development Assurance Components | |=======================================| | Development Process | |--------------------------------+------| | TCB Property Definition | PD-2 | |--------------------------------+------| | TCB Design | |--------------------------------+------| | TCB Element Identification | ID-2 | |--------------------------------+------| | TCB Interface Definition | IF-1 | |--------------------------------+------| | TCB Modular Decomposition | ---- | |--------------------------------+------| | TCB Structuring Support | SP-1 | |--------------------------------+------| | TCB Design Disciplines | ---- | |--------------------------------+------| | TCB Implementation Support | ---- | |--------------------------------+------| | TCB Testing and Analysis | |--------------------------------+------| | Functional Testing | FT-1 | |--------------------------------+------| | Penetration Analysis | ---- | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Operational Support | |--------------------------------+------| | User Security Guidance | UG-1 | |--------------------------------+------| | Administrative Guidance | AG-1 | |--------------------------------+------| | Flaw Remediation | FR-1 | |--------------------------------+------| | Trusted Generation | TG-2 | |--------------------------------+------| | Development Environment | |--------------------------------+------| | Life Cycle Definition | ---- | |--------------------------------+------| | Configuration Management | ---- | |--------------------------------+------| | Trusted Distribution | ---- | |--------------------------------+------| | Development Evidence | |--------------------------------+------| | TCB Protection Properties | EPP2 | |--------------------------------+------| | Product Development | EPD1 | |--------------------------------+------| | Product Testing & Analysis | |--------------------------------+------| | Functional Testing | EFT1 | |--------------------------------+------| | Penetration Analysis | ---- | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Product Support | EPS1 | `---------------------------------------' |=======================================| | Evaluation Assurance Components | |=======================================| | Testing | |--------------------------------+------| | Test Analysis | TA-1 | |--------------------------------+------| | Independent Testing | IT-1 | |--------------------------------+------| | Review | |--------------------------------+------| | Development Environment | ---- | |--------------------------------+------| | Operational Support | OSR1 | |--------------------------------+------| | Analysis | |--------------------------------+------| | Protection Properties | ---- | |--------------------------------+------| | Design | ---- | |--------------------------------+------| | Implementation | ---- | `---------------------------------------' CS2 Rationale 2.12 Introduction As outlined in the Federal Criteria, this rationale describes the protection philosophy, how the security features are intended to be used, the assumptions about the environment in which a compliant product is intended to operate, the threats within that environment, and the security features and assurances that counter these threats. At the CS2 level, the features used to counter threats and the strength of the assurance evidence is enhanced over CS1 and is indicated in the text through bold italics. 2.12.1 Protection Philosophy Any discussion of protection necessarily starts from a protection philosophy, i.e., what it really means to call the product "secure." In general, products will control access to information and other resources through the use of specific security features so that only properly authorized individuals or processes acting on their behalf will be granted access. For CS1, three fundamental requirements are derived for this statement of protection: o Access authorization o Accountability o Assurance The totality of the functionality that enforces the access authorization and accountability protection philosophy is comprised of the hardware, software, and firmware of the Trusted Computing Base (TCB). CS2 requires the TCB to be self- protecting and resistant to bypass so that it is effective at countering identified threats. CS2 also requires effective management of security attributes and configuration parameters. The assurance protection philosophy is comprised of the development process, operational support, development evidence, and evaluation process assurances. Each of these are explained below. 2.12.1.1 Access Authorization The access authorization portion of the philosophy of protection for this profile addresses subject and object access mediation. For CS2 compliant products, access authorization has been further refined to include system entry, subject and object mediation based on Access Control Lists (ACLs), and privileged operations. 2.12.1.1.1 System Entry CS2 provides the capability for a system administrator to establish, maintain, and protect information from unauthorized access, and defines the identities of and conditions under which users may gain entry into the system. These system entry controls are based on user identification, time, location, and method of entry. 2.12.1.1.2 Subject and Object Access Mediation CS2 provides protected access to resources and objects. As defined in the TCSEC and specified in this profile, access control permits system users and the processes that represent them to allow or disallow to other users access to objects under their control: Access control is "a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject." [1] These controls permit the granting and revoking of access privileges to be left to the discretion of the individual users. The creator of the object becomes, by default, the owner of the object. The owner can grant access as well as specify the mode of access (read, write, execute) to the object. ACLs are defined that can effectively specify, for each named object, a list of user identifiers with their respective modes of access (read, write, and execute) to that object. ACLs allow for control of: o objects o access modes that protect these objects o specific access permissions to be passed onto identified authorized subjects. CS2 also allows for the specification and maintenance of groups. Groups are a convenient means of logically associating user identifiers. Groups can be referenced when specifying ACLs. 2.12.1.1.3 Privileges CS2 supports and promotes the separation and use of privileges. A privilege enables a subject to perform a security relevant operation that, by default, is denied. Privileges cover all security aspects of a product. CS2 compliant products have tightly controlled privilege definitions as well as control over subjects that hold privileges. 2.12.1.2 Accountability The accountability portion of the philosophy of protection for this profile addresses user Identification and Authentication (I&A), requirements for security auditing, and a Trusted Path between a user and the operating system. Each of these are explained below. 2.12.1.2.1 Identification and Authentication User identification is required to support access control and security auditing. This includes the capability to establish, maintain, and protect a unique identifier for each authorized user. User identification is functionally dependent on authentication. Authentication is a method of validating a person as a legitimate user. User authentication in most computer systems has been provided primarily through the use of passwords. CS2 supports a variety of password features that give the product a great amount of flexibility in the generation of passwords, in password security, password features, and password administration. For most products, a great deal of confidence is placed on maintaining the privacy of passwords belonging to individuals. I&A prevents unauthorized individuals from logging into the product, therefore, password management is essential to secure product operations. The risk of losing a password is addressed within CS2 through promoting the use of stringent password management practices. In addition, CS2 allows for stronger authentication approaches. CS2 specifies that a unique identifier be associated with each trusted subject such as print spoolers and database management system services. It also requires the TCB to maintain, protect, and display status information for all active users and all enabled or disabled user identities or accounts. 2.12.1.2.2 Audit For most secure products, a capability must exist to audit the security relevant events. As each user performs security relevant tasks, the product must record the user identifier, the action performed, and the result in a security log. For CS2 compliant products, a capability is specified to allow an system administrator to access and evaluate audit information. This capability provides a method of protection in the sense that security relevant events that occur within a computer system can be logged and the responsible user held accountable for his/her actions. Audit trails are used to detect and deter penetration of a computer system and to reveal activity that identifies misuse. CS2 provides for an effective audit mechanism by supporting the following basic security characteristics. It provides the ability to: o review the use of I&A mechanisms; o discover the introduction of objects into a user's address space; o discover the deletion of objects; o discover actions taken by computer operators and system administrators; o audit attempts to violate resource allocation limits; o protect the audit data so that access to it is limited to system administrators that are authorized to examine audit information; o discover the use of privileges, such as changing the ownership of an object; o have the audit mechanism act as a deterrent against penetrators or hackers; and o use audit reduction tools for assessing the damage that may result in the event of a violation of the implemented security policy. These tools have the capability of selectively reviewing the actions of one or more users or groups, actions performed on a specific object or system resource, and actions associated with specific access control attributes. 2.12.1.3 Assurance Assurance addresses all areas of product development assurance and evaluation assurance. Development assurance addresses the development process, operational support, the development environment, and the development evidence. Development process assurance defines the additional efforts that a developer must undertake to satisfy the assurance objectives while creating the product. It specifies how the TCB should be designed and supported by the implementation as well as how it should be tested. Operational support assurance defines the documentation of the security features for both administrative and non-administrative users as well as requirements for TCB flaw remediation and TCB generation. Development environment assurance includes requirements for defining the product's life cycle and specific features for configuration management. Development evidence assurance defines the TCB's protection properties, details the requirements for product testing and analysis, and defines the requirements for product support. Evaluation assurance establishes that the product, and the context in which it is developed and supported, is commensurate with the development assurance requirements. The T2+ Assurance Package was chosen for CS2. This package is indicated as being TS2+ since an additional component was included for flaw remediation and for a higher level for trusted generation. This level is intended to include most commercial computer products that are designed to satisfy functional requirements. Although most development assurance components are required at their lowest levels, the requirements of several product development components are extended to capture (1) specific TCB properties, and (2) a rudimentary notion of support for product structure. The operational support component is also extended to enable systematic flaw discovery, tracking, and repair. The intent of the product development assurance for this package is to establish that the external behavior of the product conforms to its user level and administrative documentation without analysis of the internal structure of the product TCB. For this reason, only the claimed TCB protection properties and their informal models, TCB interface description, and TCB element list are required to enable functional and penetration testing. Support for TCB structuring is limited to process isolation and separation of the protection critical TCB elements from the protection non- critical ones. The intent of the operational support assurance for this package is to establish a minimal level of user and administrative guidance and product information that enables the correct product installation, use of product security features, and remediation of flaws. Similarly, the development environment assurances are intended to provide a minimal level of control over the product configuration and production. This level of development environment assurance is similar to that already present in most established commercial development organizations.The development evidence required for this package is commensurate with the assurances required. The intent of this package is to require the type of assurance evidence that is generated during the normal commercial development process. At the T2+ level, evaluation support assurance determines whether the product meets the functional protection requirements for testing analysis and independent testing. Operational support evaluation assurance determines whether the product documentation correctly describes the security relevant operations. Also for CS2, flaw remediation was included in this assurance package. Flaw remediation is important for commercial environments since it ensures that flaws (i.e, deficiencies in a product that enables a user external to the TCB to violate the functional requirements of a protection profile) that are discovered by the product consumers will be tracked, corrected, and disseminated to the affected customers. 2.12.1.4 Intended Method of Use All individual users (both administrative and non- administrative users) are assigned a unique user identifier.This user identifier supports individual accountability and access control. The operating system authenticates the claimed identity of the user before allowing the user to perform any further actions. Products that comply with the CS2 Protection Profile are provided with the capability of assigning privileges to secure functions. These privileges are used to control access to user, password files, and audit trails. This capability is particularly important to prevent a "privileged user" or "superuser" from having a wide set of privileges when only a subset is needed. A CS1 compliant product imposes controls on authorized users and on processes acting on their behalf to prevent users from gaining access to information and other resources for which they are not authorized. The product provides the capability for users to allow or disallow to other users access to objects under their control. The objects are files that may be read or written to or programs which may be executed. The granularity of control is to the level of individual users (although groups made up of individual users may be specified) and individual objects. CS1 access controls permit the granting and revoking of access to be left to the discretion of the individual users. Products that comply with CS2 specifications are intended to be used within the following operational constraints: o The information system is designed to be administered as a unique entity by a single organization. o The information system is designed to manage computing, storage, input/output, and to control the sharing of resources among multiple users and computer processes. o The administrative and non-administrative users are identified as distinct individuals. o The granting and revoking of access control permissions (read, write, execute, and deny) are left to the discretion of individual users. o The information system provides facilities for real- time interaction with users that have access to input/ output devices. 2.12.2 Environmental Assumptions A product designed to meet the CS2 Protection Profile is intended to be a general purpose, multi-user operating system that runs on either a workstation, minicomputer, or mainframe. CS2 compliant products are expected to be used in both commercial and government environments. The information being processed may be unclassified, sensitive-but-unclassified, or single-level classified, but not multi-level classified information. The following specific environmental conditions have been assumed in specifying CS2: o The product hardware base (e.g., CPU, printers, terminals, etc.), firmware, and software will be protected from unauthorized physical access. o There will be one or more personnel assigned to manage the product including the security of the information it contains. o The operational environment will be managed according to the operational environment documentation that is required in the assurance chapter of the Protection Profile. o The IT product provides a cooperative environment for users to accomplish some task or group of tasks. o The processing resources of the IT product, including all terminals, are assumed to be located within user spaces that have physical access controls established. o The IT product provides facilities for some or all of the authorized users to create programs that use an Application Programming Interface (API) to enable them to protect themselves and their objects from unauthorized use. o Fail-safe defaults are included for the access control attributes for the defined subjects and objects for the product. 2.12.3 Expected Threats In general, the choice of which Protection Profile to choose depends upon the level of security that is required for that particular organizational environment. The lowest level, the CS1 level, is intended for those commercial and government environments where all the system personnel are trusted and all the data on the system is at the same classification level. For example, a government agency where all personnel has a government clearance, all data is unclassified, and there is no outside network connections would be an ideal candidate for CS1, i.e., the threats to be countered are such that only a minimal level of trust is needed. However, most commercial and government environments are more complex and require a higher degree of trust. CS2 addresses the security needs for the main stream commercial and government environments. It provides a higher level of trust for those organizations that need to enforce a security policy where there is no need for different classifications of data. CS3 is intended to provide the highest level of trust for commercial and government environments. It is intended to be used in those environments where a great deal of trust is required, such as in law enforcement agencies, nuclear facilities, or commercial airports. It provides the strongest features, mechanisms, and assurances to counter these threats. A product that is designed to meet the CS2 Protection Profile and operate within its assumed environment will provide capabilities to counter these threats. It should be noted, however, that although a product may faithfully implement all the features and assurances specified in this Protection Profile, the complete elimination of any one threat should not be assumed. A product that is designed to meet the CS2 Protection Profile is generally known to be more effective at countering the threats than products that meet the CS1 Protection Profile. CS2 products counter all the CS1 threats, and contain stronger features and more assurance evidence than CS1 products. In addition to countering CS1 threats, CS2 compliant products provide protection capabilities to counter four additional threats: 1. AN UNAUTHORIZED USER MAY ATTEMPT TO GAIN ACCESS TO THE SYSTEM For CS1 compliant products, the threat of an unauthorized user gaining access to the system is primarily addressed by I&A. I&A features allow the TCB to verify the identity of individuals attempting to gain access to the system. This is accomplished through the use of passwords. Although not a direct countermeasure, auditing requirements are specified at the CS1 level to provide the capability to perform an after-the-fact analysis of unauthorized system entry and login attempts. This provides an opportunity for the system administrators to take corrective actions, such as strengthening existing user authentication methods or requiring users to change their passwords. For CS2 compliant systems, the threat of an unauthorized user gaining access to the system is primarily addressed by stronger I&A features and system entry requirements. CS2 specifies password requirements that promote a strong organizational password management program. These requirements specify that: null passwords cannot be used during normal operations; passwords be stored in a one-way encrypted form; the clear text representation of a password be automatically suppressed; passwords have a minimum-length; and that the system utilize a password complexity-checking algorithm. An advisory capability is also provided to exclude a list of customer-specified passwords. Such requirements support the use of passwords that are effective against password guessing. To further reduce the probability of a password being guessed, requirements limit the number of attempted login attempts that can be made by a user associated with a specific user identifier. The probability of a single password being guessed is further reduced by requirements for password aging, by having limitations on password reuse, and by allowing users to choose a password that is already associated with another user identifier. CS2 also allows for a password generating capability. Because random passwords can be difficult to remember and users are tempted to write them down, requirements are specified for the generation of passwords that are easy to remember (i.e., pronounceable). Additionally, an advisory requirement is specified to allow users to choose from a list of alternative passwords. To minimize the threat that a password has been compromised, a requirement exists to allow a user to change the password. Because a password can be compromised by observing the characters on a terminal screen as it is being typed, there is a requirement to blot out the clear-text representation of the password on the display device. In addition, requirements are specified to display an advisory warning message to all users prior to system logon to discourage a would-be system penetrator from attempting an unauthorized system entry. Such a message can also provide a basis for subsequent prosecution. System entry requirements also specify additional controls on identified and authenticated users entering the system. Once a user is authenticated, a check is made to determine if the user is allowed further entry. System entry is granted only in accordance with the authenticated user's access control attributes. These conditions are in terms of a user's identity and his/her membership in groups (if they exist). In addition, CS2 specifies system entry requirements to display to an authorized user, upon successful system entry, the date and time, method of access or port of entry, and the number of failed logon attempts since the last successful system entry by that user identifier. These requirements provide a user with the capability to detect attempted or successful system penetrations. In addition, requirements are specified to lock and terminate an interactive session after an administrator- specified period of user inactivity, and also for the TCB to appear to perform the entire user authentication procedure even if the user identification entered is invalid. The TCB also provides a protected mechanism to allow or deny system entry based on specified ranges of time. Also, conditions for system entry via dial-up lines are required to be specified. I&A requirements are also enhanced over those of CS1 by specifying requirements for the identification for each trusted user, and by specifying requirements for system administrators to disable a user's identity or account when the number of unsuccessful logon attempts exceeds an administrator specified threshold. This is intended to mitigate the effectiveness of successive attacks of system penetration. 2. AN AUTHORIZED USER MAY ATTEMPT TO GAIN ACCESS TO RESOURCES WHEN THE USER IS NOT ALLOWED ACCESS An authorized user can try to gain access to unauthorized resources by assuming the user identifier of another user and thus gaining their associated access rights. This is addressed through the use of passwords. Once an authorized user has gained access to the system, the threat still remains for a user to gain access to resources when the user is not authorized. At the resource level, CS2 specifies access control features to mediate (i.e., distribute, review, and revoke) user access to a subset of resources. The object reuse feature has been specified to ensure that resource contents are cleared before they are reused. This reduces the vulnerability that the resource contents can be read before it is overwritten. To address the vulnerability associated with passwords, CS2 specifies password requirements that promote a strong organizational password management program. Besides those password requirements that address penetration threats from unauthorized users, other password requirements have been specified to counter the threat of an insider (authorized user) attack. There are password requirements that specify that passwords must always be stored in encrypted format and that passwords can never be included in audit trail data. Also, in the event that a user selects a password that is already in use by another user, requirements disallow the system from acknowledging the dual association. In addition, CS2 specifies access control features to limit the user identifiers that may change to another user identifier that provides any additional privileges to that user. These controls are based on the user identifier and the mode of access (i.e., read, write, and execute). Also, administrators are provided with capabilities through the use of protected mechanisms to set and control security related parameters, defaults, thresholds, attributes, and other security related data. This provides the ability to effectively specify and control access to resources based on site specific protection policies. CS2 also specifies that privileges must be associated with TCB functions, TCB calls, and accesses to privileged TCB objects (e.g., user and group registration files. password files, audit log files). CS2 specifies requirements for a direct communication channel, i.e., a trusted path, between the user and the operating system to counter spoofing threats. This security feature provides confidence that a user at a terminal will communicate directly with the TCB rather than to malicious code. In particular, to counter the threat of an authorized user creating a spoof of legitimate user identifier authorization prompts, CS2 specifies requirements for a direct communication path between the user and the authentication system. Requirements are also specified to display an advisory warning message to all users prior to system logon to discourage unauthorized system entry. Such a message can also provide a basis for subsequent prosecution. Once an authorized user has been identified and authenticated, system entry control can help counter threats of inadvertent, deliberate, and coerced entry performed in an unauthorized manner by an authorized user. At the end of system entry control, the user bears the access-control attributes determined during the I&A process, provided that the system entry conditions are satisfied. These conditions can be specified in terms of a user's identity, group membership, or mode of access. CS2 also provides other security features. Application programming interfaces are provided so that applications can protect themselves and their objects from unauthorized use. CS2 specifies lists of user identities authorized to enter the system via dial-up lines. CS2 also specifies general authentication facilities for use by application developers, system administrators, and users for the protection of resources. 3. SECURITY RELEVANT ACTIONS MAY NOT BE TRACEABLE TO THE USER ASSOCIATED WITH THE EVENT CS2 accountability and audit requirements are specified to provide the capability to track security relevant actions performed by users, and link such actions, if possible, to the responsible identifier. Audit mechanisms are responsible for the monitoring and detecting of real or potential security violations or events. These audit events can include successful or unsuccessful: I&A events, the introduction of objects into a user's address space, the deletion of objects, and actions taken by system administrators. Each audit record includes the date, time, location, type of event, identity of the user and object involved, and the success or failure of the event. Requirements are specified to protect audit trail data and the audit control mechanism from unauthorized access, modification, or destruction. Audit features are specified to provide post-collection audit analysis on specific data items, users, and privileged operations. Also, a capability is provided for trusted application programs to append data to the security audit trail. System entry control helps to enhance accountability by providing a time, space, and mode-of-entry context to each action for which the user is held accountable. These added constraints help to give additional assurance that the proper user is held responsible for a set of authorized actions. At the CS2 level, tools are specified to enhance the effectiveness of user accountability. CS3 specifies requirements to provide tools to verify the consistency of the audit trial data and the selection of audit events. Tools are also specified for post-collection analysis to selectively review various actions. 4. THE PRODUCT MAY BE DELIVERED, INSTALLED, AND THEN USED IN AN UNSECURED MANNER This threat is countered by explicitly requiring that the product be delivered with all security features turned on. This ensures that the product is secure by default rather than insecure by default. This is complemented by allowing many security features to be configurable so that, as a specific organization gains experience with the actual threats in its environment, the organization can adjust the degree of security in their system. There are several requirements that reinforce the "security by default" perspective during initial installation. Requirements for security administrative documentation are specified to increase the likelihood that the administrator will install and start the system in a secure manner. 5. SECURITY BREACHES MAY OCCUR BECAUSE AVAILABLE SECURITY FEATURES ARE NOT USED OR ARE USED IMPROPERLY Requirements for authentication, system and access control, security management, and product documentation provide a basis for countering this threat. Authentication requirements provide for password management procedures to reduce the possibility of easy to guess passwords and to initialize passwords for users. Password generation algorithms are provided that generate easy to remember passwords and that give the user a choice of passwords. In addition, CS2 provides for a capability to import and export objects and subjects with defined access control attributes. This ensures that access control attributes are maintained with the subject or object during import and export operations. Security management requirements are specified for listing, setting, and updating all of the system security parameters and attributes. These parameters and attributes pertain to identification, authentication, system entry, access control, audit trail analysis and availability features for the system and for individual users. This allows a system administrator to confirm that the system is properly configured and, if necessary, to modify the existing configuration and attributes. In addition, security management requirements provide for routine control and maintenance of system resources. Product documentation requirements for users and administrators describe how to perform security relevant functions in a secure manner. 6. SECURITY BREACHES MAY OCCUR BECAUSE OF TCB PENETRATION TCB protection is a fundamental capability of CS compliant products. The security components and mechanisms described in this Protection Profile depend upon the integrity of the TCB and on the TCB being isolated and non-circumventable. CS1 specifies requirements for a common and basic set of security features to protect the TCB from outside penetration. This threat is also countered through product assurance. The TCB interface definition establishes the boundary between the TCB and its internal users. Security functional testing establishes that these TCB definitions and properties satisfy the requirements of the Protection Profile. 7. USERS MAY BE ABLE TO BYPASS THE SECURITY FEATURES OF THE SYSTEM This threat is countered by authentication, access control, audit, TCB isolation, TCB non-circumventability, and reference mediation requirements. Authentication requirements protect authentication data from unauthorized users. Resource access control requirements protect access control data. Audit requirements provide for the logging of successful and unsuccessful accesses to resources as well as for changes made to the system security configuration and system software in the event that the system security features have been bypassed. CS1 specifications for reference mediation protects the integrity of the access control mechanism and the TCB's functionality. Starting at CS1, requirements exist for TCB mediation of user references to objects and to security relevant services. CS1-compliant products maintain a domain for its own execution to protect it from external interference and tampering. Such requirements address TCB isolation and non- circumventability of TCB isolation functions. This threat is also countered through product assurance. The definition of TCB properties assures the consistency of the TCB's behavior. The identification of TCB elements provides the set of elements that determine the protection characteristics of a product. The TCB interface definition establishes the boundary between the TCB and its internal users. Security functional testing establishes that these TCB definitions and properties satisfy the requirements of this Protection Profile, and provide evidence against users being able to bypass the security features of the system. At the CS2 level, procedures also have to be established for developers to accept customer reports of protection problems and requests for corrections to those problems. Also, when the product is delivered, all security related parameters must be set to its fail-safe defaults. 8. SUBJECTS MAY BE DENIED CONTINUED ACCESSIBILITY TO THE RESOURCES OF THE SYSTEM (I.E., DENIAL OF SERVICE) Reliability of service requirements promote the continued accessibility of system resources by authorized subjects. These requirements principally counter threats related to intentional or unintentional denial of service attacks. The requirements include detecting and reporting facilities, controls to limit systematically the disabling of user identifiers, mechanisms for recovery in the event of a system crash, resource quotas, and data backup and restoration. In particular, mechanisms are specified for recovery and system start-up, and for a maintenance mode of operation. CS2 compliant systems provide the capability to detect and recover from discontinuity of service using some combination of automatic and procedural techniques. This capability is intended to counter the threat that subjects may be denied continued accessibility to the resources of the system (i.e., denial of service). Also, users are notified in advance to change their password, so that access to the system is not denied without warning. An advisory capability exists to allow an system administrator to use null passwords during system start-up. This allows a system administrator to access the system even if the password mechanism has been compromised. In addition, audit trails are compressed to avoid excessive consumption of disk space. 9. THE INTEGRITY OF THE SYSTEM MAY BE COMPROMISED At the CS2 level, requirements are specified for TCB recovery and start-up to promote the secure state of the system in the event of a system failure or discontinuity of service. These features are intended to minimize the likelihood of the loss of user objects during system recovery. To protect audit trail data, a mechanism is specified to automatically copy the audit trail file to an alternative storage area. CS2 compliant products also provide the capability to validate the correct operation of the TCB software, firmware, and hardware. Such features are important to ensure that the software, hardware, and firmware are in working order. CS2 Functionality 3. Introduction This section provides detailed functionality requirements that must be satisfied by a Commercial Security 2 (CS2) compliant product. Note that all plain text are words taken directly from the Federal Criteria. Any assignments or refinements made to the text in the Federal Criteria's are indicated by bold italics. A Protection Profile requirement is an assignment when it is directly taken as stated from the Federal Criteria component without change or when a binding is made to a Federal Criteria threshold definition. A Protection Profile requirement is a refinement when the Federal Criteria requirement is taken to a lower level of abstraction. The characterization of Protection Profile requirements as being either assignments or refinements can be found at each component level. Also, note that, unlike the Federal Criteria, there are some items that are considered to be "advisory," i.e., an item marked advisory is a desirable feature but is not required for that component. Each advisory item is marked with an "(A)". This Protection Profile for CS2 utilizes the following levels from the Federal Criteria. Note that not all the components from the Federal Criteria are reflected in this Protection Profile; there are no specific requirements for those components that are not listed. Also note that a "+" after the component level number indicates that a requirement was included from a higher level of that component. CS2 Functional Component Summary .------------------------------------------------------. | | Component | | | Component Name | Code | Level | |======================================================| | Security Policy Support: | |----------------------------------+-----------+-------| | Identification & Authentication | I&A | 3 | |----------------------------------+-----------+-------| | System Entry | SE | 2 | |----------------------------------+-----------+-------| | Trusted Path | TP | 1 | |----------------------------------+-----------+-------| | Audit | AD | 3 | |----------------------------------+-----------+-------| | Access Control | AC | 2+ | |----------------------------------+-----------+-------| | Security Management | SM | 2 | |----------------------------------+-----------+-------| | Reference Mediation | RM | 1 | |----------------------------------+-----------+-------| | TCB Protection | P | 1 | |----------------------------------+-----------+-------| | Self Checking | SC | 2 | |----------------------------------+-----------+-------| | TCB Initialization & Recovery | TR | 2 | |----------------------------------+-----------+-------| | Privileged Operations | PO | 1 | |----------------------------------+-----------+-------| | Ease-of-Use | EU | 2 | `------------------------------------------------------' 3.1 Identification & Authentication All users of the product must be identified and authenticated. A login process is established that interacts with the user in order to provide the information necessary for identification and authentication. The identification and authentication process begins the user's interaction with the target product. First, the user supplies a unique user identifier to the TCB. Then, the user is asked to authenticate that claimed identity by the TCB. The user identifier is used for both access control and also for accountability. Therefore, the proper maintenance and control of the identification mechanism and the identification databases are vital to TCB security. Once a user has supplied an identifier to the TCB, the TCB must verify that the user really corresponds to the claimed identifier. This is done by the authentication mechanism as described by the following requirements. For the CS2 level, I&A-3 was assigned from the Federal Criteria. This I&A component level has been refined from the Federal Criteria by requiring that only system administrators perform certain actions. Password requirements have also been refined to reflect the importance of this protected mechanism to commercial products. An additional refinement was made regarding invalid user identification on error feedback. Assignments were made for default thresholds for the number of login attempts and login time intervals. I&A-3 Exception-Controlled Identification and Authentication 1. The TCB shall require users to identify themselves to it before beginning to perform any other actions that the TCB is expected to mediate. The TCB shall be able to enforce individual accountability by providing the capability to uniquely identify each individual user. The TCB shall also provide the capability of associating this identity with all auditable actions taken by that individual. 2. The TCB shall maintain authentication data that includes information for verifying the identity of individual users (e.g., passwords) as well as information for determining the product policy attributes of individual users, i.e. groups. These data shall be used by the TCB to authenticate the user's identity and to ensure that the attributes of subjects external to the TCB that may be created to act on behalf of the individual user satisfy the product policy. The control of user identification data shall be limited to system administrators, except that a user shall be allowed to modify his/her own authentication data within prescribed limits (e.g., changing his/her own password). 3. The TCB shall protect authentication data so that it cannot be used by any unauthorized user. The TCB shall appear to perform the entire user authentication procedure even if the user identification entered is invalid. Error feedback shall contain no information regarding which part of the authentication information is incorrect. The TCB shall end the attempted login session if the user performs the authentication procedure incorrectly for a number of successive times (i.e., a threshold) specified by an authorized system administrator. The default threshold shall be three times. When the threshold is exceeded, the TCB shall send an alarm message to the system console and/or to the administrator's terminal, log this event in the audit trail, and delay the next login by an interval of time specified by the authorized system administrator. The default time interval shall be 60 seconds. The TCB shall provide a protected mechanism to disable the user identity or account when the threshold of successive, unsuccessful login attempts is violated more than a number of times specified by the administrator. By default, this mechanism shall be disabled (as it may cause unauthorized denial of service). 4. The TCB shall have the capability to maintain, protect, and display status information for all active users (e.g., users currently logged on, current policy attributes) and of all user accounts (i.e., enabled or disabled user identity or account). 5. Whenever passwords are used as a protection mechanism, then, at a minimum: a. The TCB shall not indicate to the user if he/she has chosen a password already associated with another user. b. The TCB shall store passwords in a one-way encrypted form. (1) The TCB shall require privilege to access encrypted passwords. c. The TCB shall automatically suppress or fully blot out the clear-text representation of the password on the data entry/display device. d. The TCB shall, by default, prohibit the use of null passwords during normal operation. (1) A capability, accessible only to an system administrator, to allow null passwords during non-normal operations, such as system start- up, manual recovery, or maintenance mode, on a per-user identifier or per-port basis may be provided. (A) e. The TCB shall provide a protected mechanism to allow a user to change his or her password. This mechanism shall require re-authentication of the user identity. (1) The TCB shall provide a protected mechanism to set or initialize passwords for users. The use of this mechanism shall be limited to system administrators. f. The TCB shall enforce password aging on a per- user identifier or per-group basis (i.e., a user shall be required to change his or her password after a system-specifiable minimum time). The default for all non-system administrators shall be sixty days. (1) The default for system administrator identifiers shall be thirty days. (2) After the password aging threshold has been reached, the password shall no longer be valid, except as provided in 5 g below. The control of password aging shall be limited to system administrators. g. The TCB shall provide a protected mechanism to notify users in advance of requiring them to change their passwords. This can be done by either: (1) Notifying users a system-specifiable period of time prior to their password expiring. The default shall be seven days. - or - (2) Upon password expiration, notifying the user but allowing a system-specifiable subsequent number of additional logons prior to requiring a new password. The default shall be two additional logons. The control of user password expiration defaults shall be limited to system administrators. h. Passwords shall not be reusable by the same user identifier for a system-specifiable period of time. The default shall be six months. The control of password re-use shall be limited to system administrators. i. The TCB shall provide an algorithm for ensuring the complexity of user-entered passwords that meets the following requirements: (1) Passwords shall meet a system-specifiable minimum length requirement. The default minimum length shall be eight characters. (2) The password complexity-checking algorithm shall be modifiable by the TCB. The default algorithm shall require passwords to include at least one alphabetic character, one numeric character, and one special character. (3) The TCB should provide a protected mechanism that allows systems to specify a list of excluded passwords (e.g., company acronyms, common surnames). (A) (a) The TCB should prevent users from selecting a password that matches any of those on the list of excluded passwords. (A) The control of password complexity shall be limited to system administrators. j. If password generation algorithms are present, they shall meet the following requirements: (1) The password generation algorithm shall generate passwords that are easy to remember (i.e., pronounceable). (2) The TCB should give the user a choice of alternative passwords from which to choose. (A) (3) Passwords shall be reasonably resistant to brute-force password guessing attacks. (4) If the "alphabet" used by the password generation algorithm consists of syllables rather than characters, the security of the password shall not depend on the secrecy of the alphabet. (5) The generated sequence of passwords shall have the property of randomness (i.e., consecutive instances shall be uncorrelated and the sequences shall not display periodicity). 3.2 System Entry Once a user is authenticated, a check is made to see if the user is allowed to enter the product. The qualifying checks for system entry at the SE-2 level can include time-of-day, day-of-week, date, location of terminal, or means of access (e.g., dial-up port). For the CS2 level, SE-2 was assigned from the Federal Criteria. This component has been refined from the Federal Criteria by specifying a default advisory warning to be displayed before user logon, by limiting the control of system entry requirements to system administrators, and by further limiting the use of protected mechanisms to system administrators. Also, default values for terminal locking and session termination and for user policy attributes were assigned. SE-2 Time and Location Based Entry Control 1. Prior to initiating the system login procedure, the TCB shall display an advisory warning message to the user regarding unauthorized use of the system and the possible consequences of failure to heed this warning. a. The message shall be system-specifiable. b. The TCB shall be able to display a message of up to twenty lines in length. c. The following message shall be displayed by default: "NOTICE: This is a private computer system. All users of this system are subject to having their activities audited. Anyone using this system consents to such auditing. All unauthorized entries or activities revealed by this auditing can be used as evidence and may lead to criminal prosecution." The control of system entry messages shall be limited to system administrators. 2. Before system entry is granted to a user, the identity of that user shall be authenticated by the TCB. If the TCB is designed to support multiple login sessions per user identity, the TCB shall provide a protected mechanism to enable limiting the number of login sessions per user identity or account with a default of a single login session. The control of this mechanism to limit the number of login sessions shall be limited to system administrators. 3. The TCB shall grant system entry only in accordance with the authenticated user's policy attributes. The system entry conditions shall be expressed in terms of users' policy attributes, i.e., user identity and membership to groups. If no explicit system-entry conditions are defined, the system-entry default shall be used (e.g., the correct user authentication). The TCB shall provide a protected mechanism to allow or deny system entry based on specified ranges of time. Entry conditions using these ranges shall be specified using time-of-day, day-of-week, and calendar dates. The control of system entry conditions shall be limited to system administrators. The TCB shall provide a protected mechanism to allow or deny system entry based on location or port of entry. Conditions for system entry via dial-up lines (e.g., lists of user identities authorized to enter the system via dial-up lines), if any, shall be specified.The control of these mechanisms shall be limited to system administrators. 4. The TCB shall provide a protected mechanism that enables authorized administrators to display and modify the policy attributes used in system-entry control for each user. The conditions under which an unprivileged user may display these attributes shall be specified. 5. Upon a user's successful entry to the system, the TCB shall display the following data to the user and shall not remove them without user intervention: (1) the date, time, means of access and port of entry of the last successful entry to the system; and (2) the number of successive, unsuccessful attempts to access the system since the last successful entry by the identified user. 6. The TCB shall either lock or terminate an interactive session after an administrator- specified interval of user inactivity. The default value for the lock interval shall be five minutes. The default value for session termination shall be fifteen minutes. 3.3 Trusted Path A Trusted Path ensures that users have direct, unencumbered communication with the TCB. A Trusted Path may be required at various times during a subject session and also may be initiated by a user during a TCB interaction. For the CS2 level, TP-1 was assigned from the Federal Criteria. This level was refined by requiring that there be a direct Trusted Path connection to the authentication mechanism. TP-1 Login Trusted Path The TCB shall support a trusted communication path between itself and the user for initial identification and authentication. Communications via this path shall be initiated exclusively by a user. a. The TCB shall provide a protected mechanism by which a display device may force a direct connection between the port to which it is connected and the authentication mechanism. 3.4 Audit Audit supports accountability by providing a trail of user actions. Actions are associated with individual users for security-relevant events and are stored in an audit trail. This audit trail can be examined to determine what happened and what user was responsible for a security relevant event. The audit trail data must be protected from unauthorized access, modification, or destruction. In addition, the audit trail data must be available in a useful and timely manner for analysis. Audit data is recorded from several sources (such as the TCB or privileged applications) to produce a complete picture of a user's security relevant actions. Therefore, audit data must be correlated across audit collection systems. The mechanisms providing audit data recording must be tailorable to each product's needs. Both the audit data itself and the mechanisms to determine what audit data is recorded are protected by privileges. Once the audit data is recorded, it is analyzed and reported. At the CS2 level, reporting can be generated on request. For the CS2 level, AD-4 was assigned from the Federal Criteria. This level was refined from the Federal Criteria by specifying that: password character strings not be recorded in the audit trail; privileged applications be allowed to append data to the audit trail; audit trail files be copied to an alternative storage area after a system-specifiable period of time; the TCB provide a protected mechanism for the automatic deletion of security audit trail files. Assignments were made to subject to object access control rules so that they include user access to disk files, tape volumes, and tape files. AD-3 Audit Tools 1. The TCB shall be able to create, maintain, and protect from modification or unauthorized access or destruction an audit trail of accesses to the objects it protects. The audit data shall be protected by the TCB so that read access to it is limited to those who are authorized for audit data. The TCB shall support an application program interface that allows a privileged application to append data to the security audit trail or to an applications-specified alternative security audit trail. The TCB should support an option to maintain the security audit trail data in encrypted format. (A) 2. The TCB shall be able to record the following types of events: - use of the identification and authentication mechanisms, and system entry events; - access control events selectable on a per user, per subject, per object, per group, and/or per policy attribute basis; i.e., introduction of objects into a user's address space (e.g., file open, program initiation), creation and deletion of subjects and objects; distribution and revocation of access rights; changes of subject and object policy attributes; acquisition and deletion of system privileges. -actions taken by computer operators and system administrators and/or system security officers; i.e., privileged operations such as the modification of TCB elements; accesses to TCB objects (at a minimum, access to an object shall include disk file access, tape volume, or tape file access); changes of policy attributes of users, TCB configuration and security characteristics, and system privileges; selection and modification of audited events. The events that are auditable by default, and those that are required for successful auditing of other events, which may not be disabled, shall be defined. The TCB shall provide a protected mechanism that displays the currently selected events and their defaults. The use of this mechanism shall be restricted to authorized system administrators. 3. For each recorded event, the audit record shall identify: date and time of the event, user, type of event, and success or failure of the event. For identification/authentication events the origin of request (e.g., terminal ID) shall be included in the audit record. For events that introduce an object into a user's address space and for object deletion events the audit record shall include the name and policy attributes of the object. The character strings input as a response to a password prompt shall not be recorded in the security audit trail. 4. The TCB shall provide a protected mechanism to turn auditing on and off, and to select and change the events to be audited and their defaults, during the system operation. The use of this mechanism shall be restricted to authorized system administrators. The system administrator shall be able to selectively audit the actions of one or more users based on individual identity and/or object policy attributes. Audit review tools shall be available to authorized system administrators to assist in the inspection and review of audit data, and shall be protected from unauthorized use, modification, or destruction. The TCB shall provide tools for audit data processing. These shall include specifically designed tools: for verifying the consistency of the audit data; for verifying the selection of audit events; for audit trail management. The audit trail management tools shall enable: - creation, destruction, and emptying of audit trails; use of warning points regarding the size of the audit data, and modification of the audit trail size; -formatting and compressing of event records; -displaying of formatted audit trail data; and -maintaining the consistency of the audit trail data after system failures and discontinuity of operation. The TCB shall provide a protected mechanism for the automatic copying of security audit trail files to an alternative storage area after a system-specifiable period of time. The TCB shall provide a protected mechanism for the automatic deletion of security audit trail files after a system-specifiable period of time. The default shall be thirty days. (a) It shall not be possible to delete the security audit trail before it gets copied to an alternate storage area. (b) It shall be possible to disable this mechanism. The use of audit trail management functions shall be limited to system administrators. 5. Audit review tools shall be available to authorized users to assist in the inspection and review of audit data, and shall be protected from unauthorized modification or destruction. The TCB shall also provide tools for post-collection audit analysis (e.g., intrusion detection) that shall be able to selectively review (1) the actions of one or more users (e.g., identification, authentication, system-entry, and access control actions); (2) the actions performed on a specific object or system resource; and (3) all, or a specified set of, audited exceptions; and (4) actions associated with a specific policy attributes. The review tools shall be able to operate concurrently with the system operation. 3.5 Access Control Once the user has been granted access, the question of which objects that authenticated user may access still remains. An owner, or an authorized user, allows or denies to other users access to that object. The requirements below describe subject accesses to objects. For the CS2 level, AC-2+ was assigned from the Federal Criteria. This level is indicated as being AC-2+ because a requirement was included from level AC-4 (the distribution, revocation, and review of access control attributes rules). This is indicated in the text by an "[AC-4]" in front of the requirement.This component level was refined from the Federal Criteria by specifying: a protected mechanism for groups; a limitation on the changes an active subject can make to a privileged user identifier; a definition of an access control list; and minimum authorization rules. AC-2+ Basic Access Control 1. Definition of Access Control Attributes The TCB shall define and protect access control attributes for subjects and objects. Subject attributes shall include named individuals or defined groups or both. Object attributes shall include defined access rights (i.e., read, write, execute) that can be assigned to subject attributes. The TCB shall be able to assign access rights to group identities. If multiple access control policies are supported, the access control attributes corresponding to each individual policy shall be identified. The subject and/or object attributes shall accurately reflect the sensitivity and integrity of the subject or object. 2. Administration of Access Control Attributes The TCB shall define and enforce rules for assignment and modification of access control attributes for subjects and objects. The TCB shall provide a protected mechanism for groups as follows: a. A user identifier shall be able to be associated with one or more groups. b. The TCB shall provide a protected mechanism to list the names of all groups. c. The TCB shall provide a protected mechanism to list the membership of any group. Rules for maintaining group membership shall be provided. These rules shall include those for displaying and modifying the list of users belonging to a group and the group attributes of those users. The effect of these rules shall be that access permission to an object by users not already possessing access permission is assigned only by authorized users. Only the current owner or system administrators shall modify access control attributes on objects. (a) There should be a distinct access right to modify the contents of an object's access control list (e.g., an "ownership" or "control" access right). (A) The TCB shall provide a protected mechanism to modify group membership. The use of this mechanism shall be under the control of system administrators. Authority to modify specific group membership may be delegated. The TCB shall provide a protected mechanism by which the user identifier associated with a subject attribute can be changed while the subject is active. It shall also provide a protected mechanism for limiting the user identifiers that may change to a user identifier that would provide any additional access rights. The control of these mechanisms shall be limited to system administrators. [AC-4]: These rules shall allow authorized users to specify and control sharing of objects by named individuals or defined groups of individuals, or by both, and shall provide controls to limit propagation of access rights, (i.e., these rules shall define the distribution, revocation, and review of access control attributes). The controls defined by these rules shall be capable of specifying for each named object, a list of individuals and a list of groups of named individuals, with their respective access rights to that object. Furthermore, for each named object, it shall be possible to specify a list of named individuals and a list of groups of named individuals for which no access to the object is given. These controls shall be capable of including or excluding access to the granularity of a single user. The rules for assignment and modification of access control attributes shall include those for attribute assignment to objects during import and export operations. If different rules of assignment and modification of access control attributes apply to different subjects and/or objects, the totality of these rules shall be shown to support the defined policy. 3. Authorization of Subject References to Objects The TCB shall define and enforce authorization rules for the mediation of subject references to objects. These rules shall be based on the access control attributes of subjects and objects. These rules shall, either by explicit user action or by default, provide that objects are protected from unauthorized access. For each object, the authorization rules of the TCB shall be based on a protected mechanism to specify a list of user identifiers or groups with their specific access rights to that object (i.e., an access control list). At a minimum, the authorization rules shall be defined as follows: a. The access rights associated with a user identifier shall take precedence over the access rights associated with any groups of which that user identifier is a member. b. When a user identifier can be an active member of multiple groups simultaneously, or if the access rights associated with the user identifier conflict with the access rights associated with any group in which the user is a member, it shall be possible for an system administrator to configure rules that combine the access rights to make a final access control decision. c. The TCB shall provide a protected mechanism to specify default access rights for user identifiers not otherwise specified either explicitly by a user identifier or implicitly by group membership. The scope of the authorization rules shall include a defined subset of the product's subjects and objects and associated access control attributes. The coverage of authorization rules shall specify the types of objects and subjects to which these rules apply. If different rules apply to different subjects and objects, the totality of these rules shall be shown to support the defined policy. If multiple policies are supported, the authorization rules for each policy shall be defined separately. The TCB shall define and enforce the composition of policies, including the enforcement of the authorization rules (e.g., subject and object type coverage, enforcement precedence). 4. Subject and Object Creation and Destruction The TCB shall control the creation and destruction of subjects and objects. These controls shall include object reuse. That is, all authorizations to the information contained within a storage object shall be revoked prior to initial assignment, allocation or reallocation to a subject from the TCB's pool of unused storage objects; information, including encrypted representations of information, produced by a prior subjects' actions shall be unavailable to any subject that obtains access to an object that has been released back to the system. 3.6 Security Management The management of security attributes and configuration parameters is an important aspect of a secure product. Mechanisms have to be provided to easily maintain the product, and they must be protected so that only system administrators can manage the security aspects of the product. For the CS2 level, SM-2 was assigned from the Federal Criteria. This level was refined from the Federal Criteria by specifying that sessions be terminated rather than locked. An assignment was made for the definition and maintenance of groups as a security policy attribute. SM-2 Basic Security Management 1. The TCB shall provide an installation mechanism for the setting and updating of its configuration parameters, and for the initialization of its protection-relevant data structures before any user or administrator policy attributes are defined. It shall allow the configuration of TCB internal databases and tables. The TCB shall distinguish between normal mode of operation and maintenance mode, and shall provide a maintenance-mode mechanism for recovery and system start-up. 2. The TCB shall provide protected mechanisms for displaying and modifying the security policy parameters. These parameters shall include identification, authentication, system entry and access control parameters for the entire system and for individual users. The TCB shall have a capability to define the identification and authentication policy on a system-wide basis (e.g., password minimum and maximum lifetime, password length and complexity parameters). The TCB mechanisms shall have the capability to limit: (1) maximum period of interactive session inactivity, (2) maximum login or session time, and (3) successive unsuccessful attempts to log in to the system. In particular, the TCB shall provide a protected mechanism to specify that sessions be terminated rather than locked after a period of inactivity. The control of these mechanisms shall be limited to system administrators. 3. The TCB shall provide protected mechanisms for manually displaying, modifying, or deleting user registration and account parameters. These parameters shall include unique user identifiers, their account, and their associated user name and affiliation. The TCB shall allow the manual enabling and disabling of user identities and/or accounts. The TCB shall provide a means to uniquely identify security policy attributes. It shall also provide a means of listing all these attributes for a user, and all the users associated with an attribute. It shall be capable of defining and maintaining the security policy attributes for subjects including: defining and maintaining privileges for privileged subjects, discretionary (i.e., definition and maintenance of groups) and non-discretionary attributes and centralized distribution, review and revocation of policy attributes. 4. The TCB shall provide protected mechanisms for routine control and maintenance of system resources. It shall allow the enabling and disabling of peripheral devices, mounting of removable storage media, backing-up and recovering user objects; maintaining the TCB hardware and software elements (e.g., on site testing); and starting and shutting down the system. 5. The use of the protected mechanisms for system administration shall be limited to authorized administrative users. The control of access- control attributes shall be limited to the object owner and to system administrators. 3.7 Reference Mediation Reference mediation, that is, the control by the TCB of subject accesses to objects, must be ensured so that the users can have faith in the TCB's access control decisions. Also, users must be ensured that all access to security services are mediated by the TCB. For the CS2 level, RM-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. RM-1 Mediation of References to a Defined Subject/Object Subset 1. The TCB shall mediate all references to subjects, objects, resources, and services (e.g., TCB functions) described in the TCB specifications. The mediation shall ensure that all references are directed to the appropriate security-policy functions. 2. Reference mediation shall include references to the defined subset of subjects, objects, and resources protected under the TCB security policy, and to their policy attributes (e.g., access rights, security and/or integrity levels, role identifiers). 3. References issued by privileged subjects shall be mediated in accordance with the policy attributes defined for those subjects. 3.8 Logical TCB Protection TCB protection is a fundamental requirement for a secure product. All of the security components and mechanisms that have been described depend upon the integrity of the TCB and on the TCB being isolated and non-circumventable. The TCB must be resistant to outside penetration. For the CS2 level, P-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. P-1 Basic TCB Isolation The TCB shall maintain a domain for its own execution that protects it from external interference and tampering (e.g., by reading or modification of its code and data structures). The protection of the TCB shall provide TCB isolation and noncircumventability of TCB isolation functions as follows: 1. TCB Isolation requires that (1) the address spaces of the TCB and those of unprivileged subjects are separated such that users, or unprivileged subjects operating on their behalf, cannot read or modify TCB data structures or code, (2) the transfers between TCB and non-TCB domains are controlled such that arbitrary entry to or return from the TCB are not possible; and (3) the user or application parameters passed to the TCB by addresses are validated with respect to the TCB address space, and those passed by value are validated with respect to the values expected by the TCB. 2. Noncircumventability of TCB isolation functions requires that the permission to objects (and/or to non-TCB data) passed as parameters to the TCB are validated with respect to the permissions required by the TCB, and references to TCB objects implementing TCB isolation functions are mediated by the TCB. 3.9 TCB Self-Checking Validating the correct operation of the TCB firmware and hardware is an important aspect of guaranteeing the integrity of the product. Hardware and software features that validate the correct operation of the product will be delivered with the product to ensure that the hardware and firmware are installed properly and are in working order. For the CS2 level, SC-2 was assigned from the Federal Criteria.The Federal Criteria was refined to limit the execution of operator-controlled tests to system administrators. SC-2 Basic Self Checking Hardware and/or software features shall be provided that can be used to periodically validate the correct operation of the on-site hardware and firmware elements of the TCB. These features shall include: power-on tests, loadable tests, and operator-controlled tests. The power-on tests shall test all basic components of the TCB hardware and firmware elements including memory boards and memory interconnections; data paths; busses; control logic and processor registers; disk adapters; communication ports; system consoles, and the keyboard speaker. These tests shall cover all components that are necessary to run the loadable tests and the operator-controlled tests. The loadable tests shall cover: processor components (e.g., arithmetic and logic unit, floating point unit, instruction decode buffers, interrupt controllers, register transfer bus, address translation buffer, cache, and processor- to-memory bus controller); backplane busses; memory controllers; and writable control memory for operator-controlled and remote system- integrity testing. Operator-controlled tests shall be able to initiate a series of one-time or repeated tests, to log the results of these tests and, if any fault is detected, to direct the integrity-test programs to identify and isolate the failure. The execution of operator-controlled tests shall be limited to system administrators. 3.10 TCB Initialization and Recovery The recovery and start-up of the TCB must be ensured so that the product always remains in a secure state, whether the recovery is performed manually or automatically. For the CS2 level, TR-1 was assigned from the Federal Criteria. No further refinements were made from the Federal Criteria. TR-2 Basic for Recovery or Start-up 1. Procedures and/or mechanisms shall be provided to assure that, after a TCB failure or other discontinuity, recovery without protection compromise is obtained. 2. If automated recovery and start-up is not possible, the TCB shall enter a state where the only system access method is via administrative interfaces, terminals, or procedures. Administrative procedures shall exist to restore the system to a secure state (i.e., a state in which all the security-policy properties hold). 3.11 Privileged Operation Privileges are associated with functional components so that at any given time only those operations that are associated with the privilege can be performed. The privileges that a product needs must be identified and must cover all the security aspects of the product, including the secure administration of the product, and should be defined so that there is not a single privileged mode for all of the TCB's operations. For the CS2 level, PO-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. PO-1 Privilege Association with TCB Modules 1. TCB privileges needed by individual functions, or groups of functions, shall be identified. Privileged TCB calls or access to privileged TCB objects, such as user and group registration files, password files, security and integrity- level definition file, role definition file, or audit-log file shall also be identified. 2. The identified privileged functions of a TCB functional component shall be associated only with the privileges necessary to complete their task. 3.12 Ease-of-TCB-Use If security mechanisms are not easy to use and maintain, then administrative and non-system administrators may be tempted to disable the security mechanisms. Therefore, ease of use becomes an important element in the administration of a secure product and in the creation of privileged applications. It also minimizes errors on the part of both the administrative and non-system administrators, and can serve to minimize the consequences of these errors. For the CS2 level, EU-2 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. EU-2 Ease of Application Programming 1. The TCB shall provide well-defined actions to undertake administrative functions. Default options shall be provided for security parameters of administrative functions. The TCB shall include fail-safe defaults for the policy attributes of the defined subjects and objects, as well as user-setable defaults for the defined subjects and objects. 2. The TCB shall provide well-defined application programming interfaces and programming functions (e.g., libraries) for all its policies to support the development of applications that can define and enforce security policies on application- controlled subjects and objects. The TCB shall enable user-controlled reduction of access rights available to applications. CS2 Assurance 4. Introduction This chapter provides the CS2 development and evaluation assurance requirements package using the development and evaluation assurance components defined in Volume I and the package contained in Volume I, Appendix G of the Federal Criteria. The structure of each assurance package follows that of the assurance components (i.e., each package consists of development process, operational support, development environment, development evidence, and evaluation process components). Assurance Package T2+ Assurance package T2+ was chosen for CS2. This package is indicated as being TS2+ since an additional component was included for flaw remediation and a higher level was chosen for trusted generation. This basic assurance level is intended to include most commercial computer products that are designed to satisfy functional requirements. Although most development assurance components are required at their lowest levels, the requirements of several product-development components are extended to capture (1) specific TCB properties, and (2) a rudimentary notion of support for product structure. The operational support component is also extended to enable systematic flaw discovery, tracking, and repair. The intent of the product development assurance for this package is to establish that the external behavior of the product conforms to its user level and administrative documentation without analysis of the internal structure of the product TCB. For this reason, only the claimed TCB protection properties and their informal models, TCB interface description, and TCB element list are required to enable functional testing. Support for TCB structuring is limited to process isolation and separation of the protection critical TCB elements from the protection non-critical ones. The intent of the operational support assurance for this package is to establish a minimal level of user and administrative guidance and product information that enables the correct product installation and use of product security features. Similarly, the development environment assurances are intended to provide the a minimal level of control over the product configuration and production. This level of development environment assurance is similar to that already present in most established commercial development organizations. The development evidence required for this package is commensurate with the assurances required. The intent of this package is to require the type of assurance evidence that is generated during the normal commercial development process. The intent of evaluation support assurance is to establish that the product, and the context in which it is developed and supported, is commensurate with the development assurance requirements. At the T2+ level, testing analysis and the requirement for independent testing determines whether the product meets the functional protection requirements. Operational support evaluation assurance determines whether the product documentation correctly describes the security relevant operations. Also for CS2, flaw remediation was included in this package. Flaw remediation is important for commercial environments since it ensures that flaws (i.e, deficiencies in a product that enables a user external to the TCB to violate the functional requirements of a protection profile) that are discovered by the product consumers will be tracked, corrected, and disseminated to the affected customers. The following table summarizes the generic assurance components that comprise the Basic Development Assurance Package (T2+). CS2 Assurance Package Summary .---------------------------------------. | Assurance Components | T2+ | |================================|======| | Development Assurance Components | |=======================================| | Development Process | |--------------------------------+------| | TCB Property Definition | PD-2 | |--------------------------------+------| | TCB Design | |--------------------------------+------| | TCB Element Identification | ID-2 | |--------------------------------+------| | TCB Interface Definition | IF-1 | |--------------------------------+------| | TCB Modular Decomposition | ---- | |--------------------------------+------| | TCB Structuring Support | SP-1 | |--------------------------------+------| | TCB Design Disciplines | ---- | |--------------------------------+------| | TCB Implementation Support | ---- | |--------------------------------+------| | TCB Testing and Analysis | |--------------------------------+------| | Functional Testing | FT-1 | |--------------------------------+------| | Penetration Analysis | ---- | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Operational Support | |--------------------------------+------| | User Security Guidance | UG-1 | |--------------------------------+------| | Administrative Guidance | AG-1 | |--------------------------------+------| | Flaw Remediation | FR-1 | |--------------------------------+------| | Trusted Generation | TG-2 | |--------------------------------+------| | Development Environment | |--------------------------------+------| | Life Cycle Definition | ---- | |--------------------------------+------| | Configuration Management | ---- | |--------------------------------+------| | Trusted Distribution | ---- | |--------------------------------+------| | Development Evidence | |--------------------------------+------| | TCB Protection Properties | EPP2 | |--------------------------------+------| | Product Development | EPD1 | |--------------------------------+------| | Product Testing & Analysis | |--------------------------------+------| | Functional Testing | EFT1 | |--------------------------------+------| | Penetration Analysis | ---- | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Product Support | EPS1 | `---------------------------------------' |=======================================| | Evaluation Assurance Components | |=======================================| | Testing | |--------------------------------+------| | Test Analysis | TA-1 | |--------------------------------+------| | Independent Testing | IT-1 | |--------------------------------+------| | Review | |--------------------------------+------| | Development Environment | ---- | |--------------------------------+------| | Operational Support | OSR1 | |--------------------------------+------| | Analysis | |--------------------------------+------| | Protection Properties | ---- | |--------------------------------+------| | Design | ---- | |--------------------------------+------| | Implementation | ---- | `---------------------------------------' 4.1 TCB Property Definition The definition of TCB properties assures the consistency of the TCB's behavior. It determines a baseline set of properties that can be used by system developers and evaluators to assure that the TCB satisfies the defined functional requirements. For CS2, PD-2 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. PD-2 Informal Property Identification The developer shall provide informal models for the functional components and sub-components of the profile. At a minimum, an informal model of the access control components shall be provided. Each informal model shall include (abstract) data structures and operations defining each functional component or sub-component, and a description of the model properties. The developer shall interpret (e.g., trace) the informal models within the product TCB. For each model entity, the developer shall: (1) identify the TCB elements and their TCB interfaces (if any) that implement that entity; (2) define the operation of these TCB elements, and (3) explain why the operation of these elements is consistent with the model properties. The developer's interpretation of each informal model, which defines the TCB properties, shall identify all TCB elements that do not correspond to any model entity and shall explain why these elements do not render the TCB properties invalid. For the components that are not informally modeled, the developer shall interpret the functional requirements of the protection profile within the product TCB. For each functional requirement, the developer shall: (1) identify the TCB elements and their TCB interfaces (if any) that implement that requirement; (2) describe the operation of these TCB elements, and (3) explain why the operation of these elements is consistent with the functional requirement. The developer's interpretation of each functional requirement, which describes the TCB properties, shall identify all TCB elements that do not correspond to any functional requirement and shall explain why these elements do not render the TCB properties invalid. 4.2 TCB Element Identification The identification of TCB elements (hardware, firmware, software, code, and data structures) provides the set of elements that determine the protection characteristics of a product. All assurance methods rely on the correct identification of TCB elements either directly or indirectly. For CS2, ID-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. ID-1: TCB Element Identification The developer shall identify the TCB elements (i.e., software, hardware/firmware code and data structures). Each element must be unambiguously identified by its name, type, release, and version number (if any). 4.3 TCB Interface Definition The TCB interface establishes the boundary between the TCB and its external users and application programs. It consists of several components, such as command interfaces (i.e., user oriented devices such as the keyboard and mouse), application program interfaces (system calls), and machine/processor interfaces (processor instructions). For CS2, IF-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. IF-1: Interface Description The developer shall describe all external (e.g., command, software, and I/O) administrative (i.e., privileged) and non-administrative interfaces to the TCB. The description shall include those components of the TCB that are implemented as hardware and/or firmware if their properties are visible at the TCB interface. The developer shall identify all call conventions (e.g., parameter order, call sequence requirements) and exceptions signaled at the TCB interface. 4.4 TCB Structuring Support Structuring the TCB into modules is necessary. However, the modular decomposition does not necessarily reflect the run- time enforcement of the TCB structuring since the separation of modules may not necessarily be supported by run-time mechanisms. The run-time enforcement of internal TCB structuring adds a measure of assurance that the TCB elements that are critical to the enforcement of the protection functions are separate from the non-critical elements. Also, the use of run-time enforcement of TCB structuring helps separate protection-critical TCB elements from each other, thereby helping to enforce the separation of protection concerns and minimizing the common mechanisms shared between protection critical elements. For CS3, SP-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. SP-1: Process Isolation The TCB shall maintain process isolation. 4.5 Developer Functional Testing Functional testing establishes that the TCB interface exhibits the properties necessary to satisfy the requirements of the protection profile. It provides assurance that the TCB satisfies at least its functional protection requirements. For CS2, FT-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. FT-1: Conformance Testing The developer shall test the TCB interface to show that all claimed protection functions work as stated in the TCB interface description. The developer shall correct all flaws discovered by testing and shall retest the TCB until the protection functions are shown to work as claimed. 4.6 User's Guidance User's guidance is an operational support assurance component that ensures that usage constraints assumed by the protection profile are understood by the users of the product. It is the primary means available for providing product users with the necessary background and specific information on how to correctly use the product's protection functionality. For CS2, UG-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. UG-1: Users' Guide The developer shall provide a Users' Guide which describes all protection services provided and enforced by the TCB. The User's Guide shall describe the interaction between these services and provide examples of their use. The User's Guide may be in the form of a summary, chapter or manual. The User's Guide shall specifically describe user responsibilities. These shall encompass any user responsibilities identified in the protection profile. 4.7 Administrative Guidance Administrative guidance is an operation support assurance component that ensures that the environmental constraints assumed by the protection profile are understood by administrative users and operators of the IT product. It is the primary means available to the developer for providing to administrators and operators detailed, accurate information on how to configure and install the product, operate the IT product is a secure manner, make effective use of the product's privileges and protection mechanisms to control access to administrative functions and data bases, and to avoid pitfalls and improper use of the administrative functions that would compromise the TCB and user security. For CS2, AG-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. AG-1: Basic Administrative Guidance The developer shall provide a Trusted Facility Manual intended for the product administrators that describes how to use the TCB security services (e.g., Access Control, System Entry, or Audit) to enforce a system security policy. The Trusted Facility Manual shall include the procedures for securely configuring, starting, maintaining, and halting the TCB. The Trusted Facility Manual shall explain how to analyze audit data generated by the TCB to identify and document user and administrator violations of this policy. The Trusted Facility Manual shall explain the privileges and functions of administrators. The Trusted Facility Manual shall describe the administrative interaction between security services. The Trusted Facility Manual shall be distinct from User Guidance, and encompass any administrative responsibilities identified in security management. 4.8 Flaw Remediation Procedures Flaw remediation is an operational support assurance component that ensures that flaws (i.e, deficiencies in a product that enables a user external to the TCB to violate the functional requirements of a protection profile) that are discovered by the product consumers will be tracked, corrected, and disseminated to the affected customers. For CS2, FR-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. FR-1: Basic Flaw Remediation Flaw Tracking Procedures: The developer shall establish a procedure to track all reported protection flaws in each release of the product. The tracking system shall include a description of the nature and effect of each flaw and the status of finding a correction to the flaw. Flaw Repair Procedures: The developer shall establish a procedure to identify corrective actions for protection flaws. Customer Interaction Procedures: The developer shall provide flaw information and corrections to registered customers. 4.9 Trusted Generation Trusted generation is an operational support assurance component that ensures that the copy of the product's TCB that is configured and activated by the consumer exhibits the same protection properties as the master copy of the product's TCB that was evaluated for compliance with the protection profile. The trusted generation procedures must provide some confidence that the consumer will be aware of what product configuration parameters can affect the protection properties of the TCB. The procedures must encourage the consumer to choose parameter settings that are within the bounds assumed during the product evaluation. For CS2, TG-2 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. TG-2: Trusted Generation With Fail-Safe Defaults The developer shall establish and document the procedures that a customer must perform to generate an operational TCB from the delivered copy of the master TCB. The customer documentation shall identify any system parameters, which are initialized or set during system generation, that affect the TCB's conformance to the protection profile and state the acceptable ranges of values for those parameters. The product shall be delivered with each of these parameters set to its fail-safe defaults. 4.10 Evidence of TCB Protection Properties The documentation of the TCB protection properties includes the definition of the functional component requirements, their modeling (if any), and their interpretation within a product's TCB. For each requirement of a protection profile, a description, definition (an informal, descriptive specification), or a formal specification of the TCB components and their operation corresponding to the requirement must be provided. For CS2, EPP-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. EPP-1 Evidence of TCB Correspondence to the Functional Requirements The developer shall provide documentation which describes the correspondence between the functional component requirements and the TCB elements and interfaces. The TCB properties, which are defined by this correspondence, shall be explained in this documentation. 4.11 Evidence of Product Development Product development evidence consists of the TCB design evidence including the documentation of the TCB interface, TCB elements, TCB structure, TCB structuring support, and TCB design disciplines. The TCB implementation evidence includes TCB source code, and the processor hardware and firmware specifications. For CS2, EPD-2 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. EPD-2: Description Of The TCB External Interface The developer shall provide documentation which describes the correspondence between the functional component requirements and the TCB elements and interfaces. The developer shall also provide an informal access control model and its interpretation within the TCB. The TCB properties, which are defined by this correspondence, shall be explained in this documentation. 4.12 Evidence of Functional Testing Functional testing evidence includes the testing itself, the test plans, and test documentation results. Test plans consist of: the description definition or specification of the test conditions; the test data, which consists of the test environment set-up; the test parameters and expected outcomes; and a description of the test coverage. For CS2, EFT-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. EFT-1: Evidence of Conformance Testing The developer shall provide evidence of the functional testing that includes the test plan, the test procedures and the results of the functional testing. 4.13 Evidence of Product Support Product support evidence consists of the development environment and operational support documentation and tools. The development environment evidence includes the documentation of the product life-cycle process, configuration management procedures enforced, and the trusted distribution mechanisms and procedures used. It also includes: the identification of the tools used in the product development, configuration management, and trusted distribution; and the characteristics that make those tools suitable for the development of product protection. For CS2, EPS-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. EPS-1: Evidence of Basic Product Support The developer shall provide evidence that describes the policies, procedures, and plans established by the developer to satisfy the Operational Support and Development Environment requirements of the protection profile. 4.14 Test Analysis Test analysis determines whether the product meets the functional protection requirements defined in the protection profile. Functional testing is based on operational product, the TCB's functional properties, the product's operational support guidance, and other producer's documentation as defined by the development evidence requirements. Functional test analysis is based on the achieved test results as compared to the expected results derived from the development evidence. For CS2, TA-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. TA-1: Elementary Test Analysis The evaluator shall assess whether the producer has performed the activities defined in the development assurance requirements of the protection profile for functional testing and whether the producer has documented these activities as defined in the development evidence requirements of the protection profile. The evaluator shall analyze the results of the producer's testing activities for completeness of coverage and consistency of results. The evaluator shall determine whether the product's protection properties, as described in the product documentation have been tested. The evaluator shall assess testing results to determine whether the product's TCB works as claimed. 4.15 Independent Testing Independent testing determines whether the product's TCB meets the functional protection requirements as defined in the functionality chapter of this Protection Profile. Testing is based on the operational product, the TCB's functional properties, the product's operational support guidance, and other producer's documentation as defined by the Development Evidence requirements. For CS2, IT-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. IT-1: Elementary Independent Testing A tester, independent of the producer or evaluator, shall perform functional and elementary penetration testing. This testing shall be based on the product's user and administrative documentation, and on relevant known penetration flaws. Satisfactory completion consists of demonstrating that all user-visible security enforcing functions and security-relevant functions work as described in the product's user and administrative documentation and that no discrepancies exist between the documentation and the product. Test results of the producer shall be confirmed by the results of independent testing. The evaluator may selectively reconfirm any test result. If the independent testing is performed at beta- test sites, the producer shall supply the beta- test plan and the test results. The evaluator shall review the scope and depth of beta testing with respect to the required protection functionality, and shall verify independence of both the test sites and the producer's and beta- test user's test results. The evaluator shall confirm that the test environment of the beta-test site(s) adequately represents the environment specified in the protection profile. 4.16 Operational Support Review Operation support review establishes the level of review required to determine whether the product meets the requirements as defined in the protection profile's Development Assurance subsections for Operational Support including, at the CS2 level, the User and Administrative Guidance documents. For CS2, OSR-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. OSR-1 Elementary Operational Support Review The evaluator shall review all documentation focused on the activities of product use (e.g., Users Manuals) and product administration including installation, operation, maintenance, and trusted recovery (e.g., Trusted Facility Management Manuals). This review shall assess the clarity of presentation, difficulty in locating topics of interest, ease of understanding, and completeness of coverage. The need for separate manuals dedicated to protection-relevant aspects of the product should be assessed for effectiveness. COMMERCIAL SECURITY 3 (CS3) CS3 compliant products provide enhanced protection beyond those of the CS1 and CS2 Protection Profiles by providing administrative and access control features to centrally control access to information and other resources based on roles. Through the use of role based access controls, a variety of organization specific non-discretionary integrity and confidentiality policies can be specified and enforced. In addition, CS3 provides stronger authentication measures, more administrative tools, and requires a greater degree of assurance evidence. CS3 Functional Component Summary .------------------------------------------------------. | | Component | | | Component Name | Code | Level | |======================================================| | Security Policy Support: | |----------------------------------+-----------+-------| | Identification & Authentication | I&A | 4 | |----------------------------------+-----------+-------| | System Entry | SE | 3 | |----------------------------------+-----------+-------| | Trusted Path | TP | 1 | |----------------------------------+-----------+-------| | Audit | AD | 3 | |----------------------------------+-----------+-------| | Access Control | AC | 2+ | |----------------------------------+-----------+-------| | Availability: | |----------------------------------+-----------+-------| | Resource Allocation | AR | 1 | |----------------------------------+-----------+-------| | Security Management | SM | 3 | |----------------------------------+-----------+-------| | Reference Mediation | RM | 1 | |----------------------------------+-----------+-------| | TCB Protection | P | 1 | |----------------------------------+-----------+-------| | Physical Protection | PP | 1 | |----------------------------------+-----------+-------| | Self Checking | SC | 3 | |----------------------------------+-----------+-------| | TCB Initialization & Recovery | TR | 3 | |----------------------------------+-----------+-------| | Privileged Operations | PO | 2 | |----------------------------------+-----------+-------| | Ease-of-Use | EU | 3 | `------------------------------------------------------' CS3 Assurance Package Summary .---------------------------------------. | Assurance Components | T3+ | |================================|======| | Development Assurance Components | |=======================================| | Development Process | |--------------------------------+------| | TCB Property Definition | PD-2 | |--------------------------------+------| | TCB Design | |--------------------------------+------| | TCB Element Identification | ID-2 | |--------------------------------+------| | TCB Interface Definition | IF-1 | |--------------------------------+------| | TCB Modular Decomposition | ---- | |--------------------------------+------| | TCB Structuring Support | SP-1 | |--------------------------------+------| | TCB Design Disciplines | ---- | |--------------------------------+------| | TCB Implementation Support | ---- | |--------------------------------+------| | TCB Testing and Analysis | |--------------------------------+------| | Functional Testing | FT-1 | |--------------------------------+------| | Penetration Analysis | PA-1 | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Operational Support | |--------------------------------+------| | User Security Guidance | UG-1 | |--------------------------------+------| | Administrative Guidance | AG-2+| |--------------------------------+------| | Flaw Remediation | FR-2 | |--------------------------------+------| | Trusted Generation | TG-2 | |--------------------------------+------| | Development Environment | |--------------------------------+------| | Life Cycle Definition | LC-1 | |--------------------------------+------| | Configuration Management | CM-1 | |--------------------------------+------| | Trusted Distribution | ---- | |--------------------------------+------| | Development Evidence | |--------------------------------+------| | TCB Protection Properties | EPP2 | |--------------------------------+------| | Product Development | EPD1 | |--------------------------------+------| | Product Testing & Analysis | |--------------------------------+------| | Functional Testing | EFT1 | |--------------------------------+------| | Penetration Analysis | EPA1 | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Product Support | EPS1 | `---------------------------------------' |=======================================| | Evaluation Assurance Components | |=======================================| | Testing | |--------------------------------+------| | Test Analysis | TA-2 | |--------------------------------+------| | Independent Testing | IT-1 | |--------------------------------+------| | Review | |--------------------------------+------| | Development Environment | DER1 | |--------------------------------+------| | Operational Support | OSR1 | |--------------------------------+------| | Analysis | |--------------------------------+------| | Protection Properties | ---- | |--------------------------------+------| | Design | DA-1 | |--------------------------------+------| | Implementation | ---- | `---------------------------------------' CS3 Rationale 2.17 Introduction As outlined in the Federal Criteria, this rationale describes the protection philosophy, how the security features are intended to be used, the assumptions about the environment in which a compliant product is intended to operate, the threats within that environment, and the security features and assurances that counter these threats. At the CS3 level, the features used to counter threats and the strength of the assurance evidence is enhanced over CS1 and CS2 and is indicated in the text through bold italics. 2.17.1 Protection Philosophy Any discussion of protection necessarily starts from a protection philosophy, i.e., what it really means to call the product "secure." In general, products will control access to information and other resources through the use of specific security features so that only properly authorized individuals or processes acting on their behalf will be granted access. For CS1, four fundamental requirements are derived for this statement of protection: o Access authorization o Accountability o Assurance o Availability of Service The totality of the functionality that enforces the access authorization and accountability protection philosophy is comprised of the hardware, software, and firmware of the Trusted Computing Base (TCB). CS3 requires the TCB to be self- protecting and resistant to bypass so that it is effective at countering identified threats. CS3 also requires effective management of security attributes and configuration parameters. The assurance protection philosophy is comprised of the development process, operational support, development environment, development evidence, and evaluation process assurances. Each of these are explained below. 2.17.1.1 Access Authorization The access authorization portion of the philosophy of protection for this profile addresses subject and object access mediation. For CS3 compliant products, access authorization has been further refined to include system entry, subject and object mediation based on system entry, subject and object mediation based on role identifiers, and privileged operations. 2.17.1.1.1 System Entry CS3 provides the capability for an system administrator to establish, maintain, and protect information from unauthorized access, and defines the identities of and conditions under which users may gain entry into the system. These system entry controls are based on user identification, role membership, time, location, and method of entry. CS3 strengthens the requirement for locking interactive sessions by requiring the display device to be cleared or overwritten to make the current contents of the screen unreadable. 2.17.1.1.2 Subject and Object Access Mediation CS1 and CS2 provide protected access to resources and objects. CS3 compliant products also provide the capability of specifying and enforcing access control decisions based on roles [12][13]. In many organizations, the end users do not "own" the information and the programs for which they are allowed access. For these organizations, the corporation or agency is the actual "owner" of the system objects as well as the programs that process them. Control is often based on employee functions rather than on ownership. Access control decisions are often determined by the roles individual users take on as part of an organization. The definition of a role includes the specification of duties, responsibilities, and qualifications. For example, the roles an individual associated with a hospital can assume include doctor, nurse, clinician, and pharmacist. Roles in a bank include teller, loan officer, and accountant. Roles can also apply to military systems; for example, target analyst, situation analyst, and traffic analyst are common roles in tactical systems. A Role Based Access Control (RBAC) policy bases access control decisions on the functions a user is allowed to perform within an organization. Under this policy, the users cannot pass access permissions to other users at their discretion. For each role, a set of transactions associated with the role is maintained. A transaction can be thought of as a transformation procedure [12] (a program or a portion of a program) plus a set of associated data items. In addition, each role has an associated set of individual members. The determination of membership and the allocation of transactions to a role is in compliance with organization specific non-discretionary policies. These policies can be derived from existing laws, ethics, regulations, or generally accepted practices. These policies are non-discretionary in the sense that they are unavoidably imposed on all users. For subject and object access mediation, CS3 also provides for additional time and location access control attributes. At a minimum, these attributes include the user's port of entry. 2.17.1.1.3 Privileges CS3 supports and promotes the separation and use of privileges for TCB modules. A privilege enables a subject to perform a security relevant operation that, by default, is denied. Privileges cover all security aspects of a product, including TCB operations performed by system administrators. CS3 compliant products have tightly controlled privilege definitions as well as control over subjects that hold privileges. 2.17.1.2 Accountability The accountability portion of the philosophy of protection for this profile addresses user identification and authentication (I&A), requirements for security auditing, and a Trusted Path between a user and the operating system. Each of these are explained below. 2.17.1.2.1 Identification and Authentication User identification is required to support access control and security auditing. This includes the capability to establish, maintain, and protect a unique identifier for each authorized user. User identification is functionally dependent on authentication. Authentication is a method of validating a person as a legitimate user. User authentication in most computer systems has been provided primarily through the use of passwords. CS2 supports a variety of password features that give the product a great amount of flexibility in the generation of passwords, in password security, password features, and password administration. For most products, a great deal of confidence is placed on maintaining the privacy of passwords belonging to individuals. I&A prevents unauthorized individuals from logging into the product, therefore, password management is essential to secure product operations. The risk of losing a password is addressed within CS2 through promoting the use of stringent password management practices. In addition, CS2 allows for stronger authentication approaches. CS2 specifies that a unique identifier be associated with each trusted subject such as print spoolers, database management system services, and transaction processing monitors. It also requires the TCB to maintain, protect, and display status information for all active users and all enabled or disabled user identities or accounts. CS3 also provides for stronger authentication mechanisms for those commercial and government environments that need such assurance, such as law enforcement agencies, nuclear facilities, and commercial airports. These other approaches can be categorized as "something a user is," which can be indicated through the use of a unique characteristic that a person possesses, or "something a user has," such as a smart card. For example, biometrics is a "something you are" approach for identifying individuals through the use of a unique physical characteristic associated with a person such as a fingerprint or a retina pattern. In many respects, the biometrics approach to user identification is a cleaner and more secure approach than a password mechanism. This method eliminates the concern over the compromise of a password. However, while biometric devices are currently available, their expense makes them impractical for most applications. "Something a user has" requires a physical device that users must have in their possession at authentication time. Usually, these devices require the user to enter a Personal Identification Number (PIN) in case the device is lost or stolen. 2.17.1.2.2 Audit For most secure products, a capability must exist to audit the security relevant events. As each user performs security relevant tasks, the product must record the user identifier, the action performed, and the result in a security log. For CS31compliant products, a capability is specified to allow a system administrator to access and evaluate audit information. This capability provides a method of protection in the sense that all security relevant events that occur within a computer system can be logged and the responsible user held accountable for his/her actions. Audit trails are used to detect and deter penetration of a computer system and to reveal activity that identifies misuse. CS3 provides for an effective audit mechanism by supporting the following basic security characteristics. It provides the ability to: o review the use of I&A mechanisms; o discover the introduction of objects into a user's address space; o discover the deletion of objects; o discover actions taken by computer operators and system administrators; o audit attempts to violate resource allocation limits; o protect the audit data so that access to it is limited to system administrators that are authorized to examine audit information; o discover the use of privileges, such as changing the ownership of an object; o have the audit mechanism act as a deterrent against penetrators or hackers; and o to use audit reduction tools for assessing the damage that may result in the event of a violation of the implemented security policy. These tools have the capability of selectively reviewing the actions of one or more users or roles, actions performed on a specific object or system resource, and actions associated with specific access control attributes. 2.17.1.3 Availability of Service CS3 promotes the continuous accessibility and usability of resources. The TCB provides the capability to detect and recover from discontinuity of service using some combination of automatic and procedural techniques. Also, resource allocation requirements replace restrictions on the number of subjects and objects a user may have allocated at any given time. This prevents one individual user from denying access to another user's subject and object space. 2.17.1.4 Assurance Assurance addresses all areas of product development assurance and evaluation assurance. The Development assurance addresses the development process, operational support, the development environment, and the development evidence. Development process assurance defines the additional efforts that a developer must undertake to satisfy the assurance objectives while creating the product. It specifies how the TCB should be designed and supported by the implementation as well as how it should be tested. Operational support assurance defines the documentation of the security features for both administrative and non-administrative users as well as requirements for TCB flaw remediation and TCB generation. Development environment assurance includes requirements for defining the product's life cycle and specific features for configuration management. Development evidence assurance defines the TCB's protection properties, details the requirements for product testing and analysis, and defines the requirements for product support. Evaluation assurance establishes that the product, and the context in which it is developed and supported, is commensurate with the development assurance requirements. The T3+ Assurance Package was chosen for CS3. This package is indicated as being TS3+ since an additional component was included for flaw remediation. This enhanced assurance level is intended to include the best of the commercial computer products designed to satisfy functional requirements. As such, this package includes several extensions to the assurance components of the previous two packages. The intent of product development assurance for this package is both to establish that the external behavior of the product conforms to its user level and administrative documentation and to provide visibility into the internal structure of the product's TCB. For this reason, requirements for Descriptive Interface Specifications (DIS) and modular decomposition have been added. TCB element identification and security functional testing have also been extended and penetration testing requirements have been provided to support the added assurances of external behavior. The intent of the operational support assurance for this package is to establish a level of user and administrative guidance and product information that enables the correct product installation and the use of product security features. The developer is required to establish and document a policy for responding to customer inquiries and flaw remediation. Similarly, the development environment assurances are intended to provide a level of control over the product configuration and production, including well-defined coding standards and strict configuration management processes. This level of development environment assurance is similar to that used in the most advanced commercial development organizations. The development evidence required for this package is commensurate with the assurances required. The intent of this package is to require the type of assurance evidence that is generated during commercial development oriented towards of high-quality products. At the T3+ level, evaluation support assurance determines whether the product meets the functional requirements for testing analysis and for independent testing. Operational support evaluation assurance determines whether the product documentation correctly describes the security relevant operations. Development environment assurance determines whether the product meets the requirements as defined in the Protection Profile's development assurance subsections. Design assurance determines whether the product meets the design requirements as defined in the Development Process Assurance section of this Protection Profile. Also for CS3, flaw remediation was included in this package. Flaw remediation is important for commercial environments since it ensures that flaws (i.e, deficiencies in a product that enables a user external to the TCB to violate the functional requirements of a protection profile) that are discovered by the product consumers will be tracked, corrected, and disseminated to the affected customers. Vendors are required to separate protection-relevant fixes from those that are not protection-relevant and must document points of contact for customer error reports. 2.17.1.5 Intended Method of Use All individual users (both administrative and non- administrative users) are assigned a unique user identifier. This user identifier supports individual accountability. The operating system authenticates the claimed identity of the user before allowing the user to perform any further actions. Upon successful authentication, users are restricted to accessing programs, transactions, and information in a manner that is consistent with their assigned role(s). Products that comply with the CS3 Protection Profile are provided with the capability of assigning privileges to TCB modules. These privileges are used to control access to user and role registration files, password files, and audit trails. Privileges are associated with functional components so that only the privileges necessary to complete a security relevant task can be assigned at a given time. Also, privileges are associated with TCB operations performed by system administrators. This capability is particularly important to prevent a "privileged user" or "superuser" from having a wide set of privileges when only a subset is needed. In addition, CS3 provides administrative and access control capabilities that allow for the central administration of a non-discretionary access control policy based on roles. A role specifies a user's set of transactions that allow the user to access resources through specific functions. Transactions can only be allocated to roles by system administrators. Membership to a role can only be granted and revoked by system administrators. Products that comply with CS3 specifications are intended to be used within the following operational constraints: o The information system is designed to be administered as a unique entity by a single organization. o The information system is designed to manage computing, storage, input/output, and to control the sharing of resources among multiple users and computer processes. o The administrative and non-administrative users are identified as distinct individuals. o For role based access control, administrators are responsible for interpreting and enforcing organizational policies and protection guidelines that are derived from existing laws, ethics, regulations, or generally accepted practices. o The information system provides facilities for real- time interaction with users that have access to input/ output devices. o System administrators are selectively assigned privileges that are minimally necessary to perform their security related task. 2.17.2 Environmental Assumptions A product designed to meet the CS3 Protection Profile is intended to be a general purpose, multi-user operating system that runs on either a workstation, minicomputer, or mainframe. CS3 compliant products are expected to be used for both commercial and government environments. The information being processed for both commercial and government environments may be unclassified, sensitive-but-unclassified, or single-level classified, but not multi-level classified information. The following specific environmental conditions have been assumed in specifying CS3: o The product hardware base (e.g., CPU, printers, terminals, etc.), firmware, and software will be protected from unauthorized physical access. o There will be one or more personnel assigned to manage the product including the security of the information it contains. o The operational environment will be managed according to the operational environment documentation that is required in the assurance chapter of the Protection Profile. o Access control to information and other resources is determined by the roles that individual users have. o The IT product provides a cooperative environment for users to accomplish some task or group of tasks. o The processing resources of the IT product, including all terminals, are assumed to be located within user spaces that have physical access controls established. o The IT product provides facilities for some or all of the authorized users to create programs that use an Application Programming Interface (API) to enable them to protect themselves and their objects from unauthorized use. o Fail-safe defaults are included for the access control attributes for the defined subjects and objects for the product. 2.17.3 Expected Threats In general, the choice of which Protection Profile to choose depends upon the level of security that is required for that particular organizational environment. The lowest level, the CS1 level, is intended for those commercial and government environments where all the system personnel are trusted and all the data on the system is at the same classification level. For example, a government agency where all personnel has a government clearance, all data is unclassified, and there is no outside network connections would be an ideal candidate for CS1, i.e., the threats to be countered are such that only a minimal level of trust is needed. However, most commercial and government environments are more complex and require a higher degree of trust. CS2 addresses the security needs for the mainstream commercial and government environments. It provides a higher level of trust for those organizations that need to enforce a security policy where there is no need for different classifications of data. CS3 is intended to provide the highest level of trust for commercial and government environments. It is intended to be used in those environments where a great deal of trust is required, such as in law enforcement agencies, nuclear facilities, or commercial airports. It provides the strongest features, mechanisms, and assurances to counter these threats. A product that is designed to meet the CS3 Protection Profile and operate within its assumed environment will provide capabilities to counter these threats. It should be noted, however, that although a product may faithfully implement all the features and assurances specified in this Protection Profile, the complete elimination of any one threat should not be assumed. A product that is designed to meet the CS3 Protection Profile is generally known to be more effective at countering the threats than products that meet the CS1 and CS2 Protection Profiles. CS3 products counter all the CS1 and CS2 threats, and contain stronger features and more assurance evidence than CS1 and CS2 products. In addition to countering CS1 and CS2 threats, CS3 compliant products provide protection capabilities to counter one additional threat as follows: 1. AN UNAUTHORIZED USER MAY ATTEMPT TO GAIN ACCESS TO THE SYSTEM For CS1 compliant products, the threat of an unauthorized user gaining access to the system is primarily addressed by I&A features that allow the TCB to verify the identity of individuals attempting to gain access to the system. This is accomplished through the use of passwords. Although not a direct countermeasure, auditing requirements are specified at the CS1 level to provide the capability to perform an after-the-fact analysis of unauthorized system entry and login attempts. This provides an opportunity for the system administrators to take corrective actions, such as strengthening existing user authentication methods or requiring users to change their passwords. For CS2 compliant systems, the threat of an unauthorized user gaining access to the system is primarily addressed by stronger I&A features and system entry requirements. CS2 specifies password requirements that promote a strong organizational password management program. These requirements specify that: null passwords cannot be used during normal operations; passwords be stored in a one-way encrypted form; the clear text representation of a password be automatically suppressed; passwords have a minimum-length; and that the system utilize a password complexity-checking algorithm. An advisory capability is also provided to exclude a list of customer-specified passwords. Such requirements support the use of passwords that are effective against password guessing. To further reduce the probability of a password being guessed, requirements limit the number of attempted login attempts that can be made by a user associated with a specific user identifier. The probability of a single password being guessed is further reduced by requirements for password aging, by having limitations on password reuse, and by allowing users to choose a password that is already associated with another user identifier. CS2 also allows for a password generating capability. Because random passwords can be difficult to remember and users are tempted to write them down, requirements are specified for the generation of passwords that are easy to remember (i.e., pronounceable). Additionally, an advisory requirement is specified to allow users to choose from a list of alternative passwords. To minimize the threat that a password has been compromised, a requirement exists to allow a user to change the password. Because a password can be compromised by observing the characters on a terminal screen as it is being typed, there is a requirement to blot out the clear-text representation of the password on the display device. In addition, requirements are specified to display an advisory warning message to all users prior to system logon to discourage a would-be system penetrator from attempting an unauthorized system entry. Such a message can also provide a basis for subsequent prosecution. System entry requirements also specify additional controls on identified and authenticated users entering the system. Once a user is authenticated, a check is made to determine if the user is allowed further entry. System entry is granted only in accordance with the authenticated user's access control attributes. These conditions are in terms of a user's identity and his/her membership in roles. In addition, CS2 specifies system entry requirements to display to an authorized user, upon successful system entry, the date and time, method of access or port of entry, and the number of failed logon attempts since the last successful system entry by that user identifier. These requirements provide a user with the capability to detect attempted or successful system penetrations. In addition, requirements are specified to lock and terminate an interactive session after an administrator- specified period of user inactivity, and also for the TCB to appear to perform the entire user authentication procedure even if the user identification entered is invalid. The TCB also provides a protected mechanism to allow or deny system entry based on specified ranges of time. Also, conditions for system entry via dial-up lines are required to be specified. I&A requirements are also enhanced over those of CS1 by specifying requirements for the identification for each trusted user, and by specifying requirements for system administrators to disable a user's identity or account when the number of unsuccessful logon attempts exceeds an administrator specified threshold. This is intended to mitigate the effectiveness of successive attacks of system penetration. Although passwords are currently the most common method for authenticating users, CS3 supports the inclusion of a variety of additional authentication mechanisms, such as smart-cards, cryptographic-based authentication, and biometrics. Also, access control attributes have been enhanced to include time and location capabilities. This allows an organization to acquire and integrate stronger user authentication capabilities when penetration threats warrant such capabilities. Also, during system entry, users are granted entry based on their role. In addition, CS3 extends the system entry requirements of CS2 by specifying features for user-initiated locking of the user's interactive sessions (e.g., keyboard locking). 2. AN AUTHORIZED USER MAY ATTEMPT TO GAIN ACCESS TO RESOURCES WHEN THE USER IS NOT ALLOWED ACCESS An authorized user can gain access to unauthorized resources by assuming the user identifier of another user and thus gaining their associated access rights. This is addressed through the use of passwords. Once an authorized user has gained access to the system, the threat still remains for a user to gain access to resources when the uer is not authorized. At the resource level, CS2 specifies access control features to mediate (i.e., distribute, review, and revoke) user access to a subset of resources. The object reuse feature has been specified to ensure that resource contents are cleared before they are reused. This reduces the vulnerability that the resource contents can be read before it is overwritten. To address the vulnerability associated with passwords, CS2 specifies password requirements that promote a strong organizational password management program. Besides those password requirements that address penetration threats from unauthorized users, other password requirements have been specified to counter the threat of an insider (authorized user) attack. There are password requirements that specify that passwords must always be stored in encrypted format and that passwords can never be included in audit trail data. Also, in the event that a user selects a password that is already in use by another user, requirements disallow the system from acknowledging the dual association. In addition, CS3 specifies access control features to limit the roles that may change to another role that provides any additional privileges to that user. These controls are based on the role identifier. Also, administrators are provided with capabilities through the use of protected mechanisms to set and control security related parameters, defaults, thresholds, attributes, and other security related data. This provides the ability to effectively specify and control access to resources based on site specific protection policies. CS3 also specifies that privileges must be associated with TCB modules, TCB calls, and accesses to privileged TCB objects (e.g., user and role registration files. password files, audit log files), and with TCB operations performed by administrative users. CS2 specifies requirements for a direct communication channel, i.e., a trusted path, between the user and the operating system to counter spoofing threats. This security feature provides confidence that a user at a terminal will communicate directly with the TCB rather than to malicious code. In particular, to counter the threat of an authorized user creating a spoof of legitimate user identifier authorization prompts, CS2 specifies requirements for a direct communication path between the user and the authentication system. Requirements are also specified to display an advisory warning message to all users prior to system logon to discourage unauthorized system entry. Such a message can also provide a basis for subsequent prosecution. Once an authorized user has been identified and authenticated, system entry control can help counter threats of inadvertent, deliberate, and coerced entry performed in an unauthorized manner by an authorized user. At the end of system entry control, the user bears the access-control attributes determined during the I&A process, provided that the system entry conditions are satisfied. These conditions can be specified in terms of a user's identity, role identity, or mode of access. CS2 also provides other security features. Application programming interfaces are provided so that applications can protect themselves and their objects from unauthorized use. CS2 specifies lists of user identities authorized to enter the system via dial-up lines. CS2 also specifies general authentication facilities for use by application developers, system administrators, and users for the protection of resources. To guard against unauthorized user access, CS3 specifies that TCB privileges can be associated with TCB operations performed by system administrators. Roles are also used as an access control attribute in that access to a particular object may be granted or denied based on a specific role. CS3 also specifies general authentication facilities for use by application developers, system administrators, and users for the enhanced protection of resources. CS3 specifies requirements to provide users with the ability to clear the content of their screens and lock their interactive session without having to logoff the system. This reduces the likelihood that a user will leave his or her terminal while engaged in an active session. Also at the CS3 level, privileges are associated with TCB operations performed by system administrators. To further strengthen TCB mediation, CS3 expands the scope of authorization rules to include all subject and object contents and all access control attributes. 3. AN AUTHORIZED USER MAY ATTEMPT TO GAIN ACCESS TO A ROLE WHEN THE USER IS NOT ALLOWED ACCESS This threat is countered by having a protected mechanism in the TCB that allows only authorized users to access a particular role. Users are prompted for the role they wish to assume for that login session during system entry, and entry will be denied if the user tries to assume a role for which he/she is not authorized. This is assured through security functional testing and through penetration testing. Also, only system administrators are allowed to set role characteristics and to include or delete users from a particular role. Attempts to access and use a particular role can be audited, and the use and definition of roles are explained in security documentation. 4. SECURITY RELEVANT ACTIONS MAY NOT BE TRACEABLE TO THE USER ASSOCIATED WITH THE EVENT CS3 accountability and audit requirements are specified to provide the capability to track security relevant actions performed by users and link such actions, if possible, to the responsible identifier. Audit mechanisms are responsible for the monitoring and detecting of real or potential security violations or events. These audit events can include successful or unsuccessful: I&A events, the introduction of objects into a user's address space, the deletion of objects, and actions taken by computer operators and system administrators. Each audit record includes the date, time, location, type of event, identity of the user and object involved, and the success or failure of the event. Requirements are specified to protect audit trail data and the audit control mechanism from unauthorized access, modification, or destruction. Audit features are specified to provide post-collection audit analysis on specific data items, users, and privileged operations. Also, a capability is provided for trusted application programs to append data to the security audit trail. System entry control helps to enhance accountability by providing a time, space, and mode-of-entry context to each action for which the user is held accountable. These added constraints help to give additional assurance that the proper user is held responsible for a set of authorized actions. At the CS2 level, tools are specified to enhance the effectiveness of user accountability. CS3 specifies requirements to provide tools to verify the consistency of the audit trial data and the selection of audit events. Tools are also specified for post-collection analysis to selectively review various actions. Authentication capabilities are extended to provide for additional authentication methods, for example, tokens or biometrics. 5. THE PRODUCT MAY BE DELIVERED, INSTALLED, AND THEN USED IN AN UNSECURED MANNER This threat is countered by explicitly requiring that the product be delivered with all security features turned on. This ensures that the product is secure by default rather than insecure by default. This is complemented by allowing many security features to be configurable so that, as a specific organization gains experience with the actual threats in its environment, the organization can adjust the degree of security in their system. There are several requirements that reinforce the "security by default" perspective during initial installation. Requirements for security administrative documentation are specified to increase the likelihood that the administrator will install and start the system in a secure manner. 6. SECURITY BREACHES MAY OCCUR BECAUSE AVAILABLE SECURITY FEATURES ARE NOT USED OR ARE USED IMPROPERLY Requirements for authentication, system and access control, security management, and product documentation provide a basis for countering this threat. Authentication requirements provide for password management procedures to reduce the possibility of easy to guess passwords and to initialize passwords for users. Password generation algorithms are provided that generate easy to remember passwords and that give the user a choice of passwords. In addition, CS3 provides for a capability to import and export objects and subjects with defined access control attributes. This ensures that access control attributes are maintained with the subject or object during import and export operations. Security management requirements are specified for listing, setting, and updating all of the system security parameters and attributes. These parameters and attributes pertain to identification, authentication, system entry, access control, audit trail analysis and availability features for the system and for individual users. This allows a system administrator to confirm that the system is properly configured and, if necessary, to modify the existing configuration and attributes. In addition, security management requirements provide for routine control and maintenance of system resources. Product documentation requirements for users, administrators, and operators describe how to perform security relevant functions in a secure manner. CS3 also extends security management requirements with respect to policy-oriented security issues. This includes a means to initialize administrative privileges and administrative identification, authentication, and system entry attributes. Because CS3 compliant systems support multiple I&A methods, the administrator is provided with a capability to specify an authentication method on a per access control attribute basis. CS3 further extends security management requirements by specifying tools for system administration. These tools include tools for verifying consistency and proper system installation, and for verifying that the TCB does not contain extraneous programs or data. 7. SECURITY BREACHES MAY OCCUR BECAUSE OF TCB PENETRATION TCB protection is a fundamental capability of CS compliant products. The security components and mechanisms described in this Protection Profile depend upon the integrity of the TCB and on the TCB being isolated and non-circumventable. CS1 specifies requirements for a common and basic set of security features to protect the TCB from outside penetration. This threat is also countered through product assurance. The TCB interface definition establishes the boundary between the TCB and its internal users. Security functional testing establishes that these TCB definitions and properties satisfy the requirements of this Protection Profile and provides evidence against TCB penetration. This threat is also countered through penetration testing. The penetration analysis evidence includes, in addition to penetration test plans and results configured in the same manner as the security functional testing evidence, the documentation of the penetration-resistance testing methods and tools, conditions that were verified, the outcomes of the verification and, when appropriate, the scenario of the discovered penetration flaws. Also, the developer must show that all discovered flaws have been eliminated and that no new flaws have been introduced. The cause of every discovered penetration flaw, or class of penetration flaws, must also be documented. At the CS3 level of trust, the system developer also must illustrate how, in addition to system reference manuals and TCB interface descriptions, the DIS, source code, and hardware and firmware specifications are used to define penetration test conditions. Also, for each test, the system developer must document all test conditions, data, and coverage. 8. USERS MAY BE ABLE TO BYPASS THE SECURITY FEATURES OF THE SYSTEM This threat is countered by authentication, access control, audit, TCB isolation, TCB non-circumventability, and reference mediation requirements. Authentication requirements protect authentication data from unauthorized users. Resource access control requirements protect access control data. Audit requirements provide for the logging of successful and unsuccessful accesses to resources as well as for changes made to the system security configuration and system software in the event that the system security features have been bypassed. CS1 specifications for reference mediation protects the integrity of the access control mechanism and the TCB's functionality. Starting at CS1, requirements exist for TCB mediation of user references to objects and to security relevant services. CS1-compliant products maintain a domain for its own execution to protect it from external interference and tampering. Such requirements address TCB isolation and non- circumventability of TCB isolation functions. This threat is also countered through product assurance. The definition of TCB properties assures the consistency of the TCB's behavior. The identification of TCB elements provides the set of elements that determine the protection characteristics of a product. The TCB interface definition establishes the boundary between the TCB and its internal users. Security functional testing establishes that these TCB definitions and properties satisfy the requirements of the Protection Profile, and provide evidence against subjects being able to bypass the security features of the system. At the CS2 level, procedures also have to be established for developers to accept customer reports of protection problems and requests for corrections to those problems. Also, when the product is delivered, all security related parameters must be set to its fail-safe defaults. 9. SUBJECTS MAY BE DENIED CONTINUED ACCESSIBILITY TO THE RESOURCES OF THE SYSTEM (I.E., DENIAL OF SERVICE) Reliability of service requirements promote the continued accessibility of system resources by authorized subjects. These requirements principally counter threats related to intentional or unintentional denial of service attacks. The requirements include detecting and reporting facilities, features to monitor and control the consumption of disk space and CPU usage, controls to limit systematically the disabling of user identifiers, mechanisms for recovery in the event of a system crash, resource quotas, destruction of errant processes and facilities for software, and data backup and restoration. In particular, mechanisms are specified for recovery and system start-up, and for a maintenance mode of operation. CS3 compliant systems provide the capability to detect and recover from discontinuity of service using some combination of automatic and procedural techniques. This capability is intended to counter the threat that subjects may be denied continued accessibility to the resources of the system (i.e., denial of service). Also, users are notified in advance to change their password, so that access to the system is not denied without warning. An advisory capability exists to allow a system administrator to use null passwords during system start-up. This allows a system administrator to access the system even if the password mechanism has been compromised. In addition, audit trails are compressed to avoid excessive consumption of disk space. CS3 provides the capability to place restrictions on the number of subjects and objects a user may have allocated at any given time. Such capabilities provide protection against a single user denying access to another user's subject and object space. Resource quota requirements are extended to require auditing when attempts are made to violate resource allocation limits. At the CS3 level, an optional capability can be provided to detect and report conditions that degrade service below a system-specifiable minimum. Also, CS3 provides enhanced TCB checking capabilities by extending TCB checks to not only hardware and firmware but also to software elements (i.e., code and data structures). 10. THE INTEGRITY OF THE SYSTEM MAY BE COMPROMISED At the CS3 level, requirements are specified for TCB recovery and start-up to promote the secure state of the system in the event of a system failure or discontinuity of service. These features are intended to minimize the likelihood of the loss of user objects during system recovery. To protect audit trail data, a mechanism is specified to automatically copy the audit trail file to an alternative storage area. Also, mechanisms that guarantee the consistency of the audit trail data after system failures and discontinuity of operation is provided. CS2 compliant products provide the capability to validate the correct operation of the TCB software, firmware, and hardware. Such features are important to ensure that the software, hardware, and firmware are in working order. Requirements for the physical security of the TCB and of functions and devices that establish physical control over the TCB are identified and provided. In addition, power-on tests, loadable tests and operator-controlled tests are specified to validate the correct operation of the TCB hardware and firmware. CS3 also extends the TCB initialization and recovery capabilities by specifying requirements for automatic procedures to protect the secure state of the system in the event of a system failure or discontinuity of service. Also, automated procedures are provided to assure that after system failure or discontinuity of operations a secure state is obtained without undue loss of system or user objects. CS3 extends the TCB initialization and recovery capabilities by specifying automated procedures to assure that after system failure, other discontinuity, or start-up, a secure state is obtained without undue loss of system or user objects. At the CS3 level, tools are specified to verify the consistency of audit data and also to check for storage medium and file system integrity. An optional capability is provided to allow for the encryption of data to preserve the integrity of data in an object. In addition, fail-safe defaults are specified for the access control attributes of subjects, objects, and services used in common system configurations. CS3 Functionality 3. Introduction This section provides detailed functionality requirements that must be satisfied by an Commercial Security 3 (CS3) compliant product. Note that all plain text are words taken directly from CS2 `s functionality chapter for the components or, for those components not included in CS2, directly from the Federal Criteria. Any assignments or refinements that were made at CS2 are indicated by italics. Any assignments or refinements made to the text in CS2 or the Federal Criteria are indicated by bold italics. A Protection Profile requirement is an assignment when it is directly taken as stated from the component without change or when a binding is made to a Federal Criteria threshold definition. A Protection Profile requirement is a refinement when the requirement is taken to a lower level of abstraction.The characterization of Protection Profile requirements as being either assignments or refinements can be found at each component level. Also, note that, unlike the Federal Criteria, there are some items that are considered to be "advisory," i.e.,an item marked advisory is a desirable feature but is not required for that component. Each advisory item is marked with an "(A)". This Protection Profile for CS3 utilizes the following levels from the Federal Criteria. Note that not all the components from the Federal Criteria are reflected in this Protection Profile; there are no specific requirements for those components that are not listed. Also note that a "+" after the component level number indicates that a requirement was included from a higher level of that component. CS3 Functional Component Summary .------------------------------------------------------. | | Component | | | Component Name | Code | Level | |======================================================| | Security Policy Support: | |----------------------------------+-----------+-------| | Identification & Authentication | I&A | 4 | |----------------------------------+-----------+-------| | System Entry | SE | 3 | |----------------------------------+-----------+-------| | Trusted Path | TP | 1 | |----------------------------------+-----------+-------| | Audit | AD | 3 | |----------------------------------+-----------+-------| | Access Control | AC | 2+ | |----------------------------------+-----------+-------| | Availability: | |----------------------------------+-----------+-------| | Resource Allocation | AR | 1 | |----------------------------------+-----------+-------| | Security Management | SM | 3 | |----------------------------------+-----------+-------| | Reference Mediation | RM | 1 | |----------------------------------+-----------+-------| | TCB Protection | P | 1 | |----------------------------------+-----------+-------| | Physical Protection | PP | 1 | |----------------------------------+-----------+-------| | Self Checking | SC | 3 | |----------------------------------+-----------+-------| | TCB Initialization & Recovery | TR | 3 | |----------------------------------+-----------+-------| | Privileged Operations | PO | 2 | |----------------------------------+-----------+-------| | Ease-of-Use | EU | 3 | `------------------------------------------------------' 3.1 Identification & Authentication All users of the product must be identified and authenticated. A login process is established that interacts with the user in order to provide the information necessary for identification and authentication. The identification and authentication process begins the user's interaction with the target product. First, the user supplies a unique user identifier to the TCB. Then, the user is asked to authenticate that claimed identity by the TCB. The user identifier is used for accountability. Therefore, the proper maintenance and control of the identification mechanism and the identification databases are vital to TCB security. Once a user has supplied an identifier to the TCB, the TCB must verify that the user really corresponds to the claimed identifier. This is done by the authentication mechanism as described by the following requirements. For the CS3 level, I&A-4 was assigned from the Federal Criteria. Refinements were made from CS2 and the Federal Criteria to limit the enforcement of separate user authentication procedures to system administrators. I&A-4 Exception-Controlled Identification and Authentication 1. The TCB shall require users to identify themselves to it before beginning to perform any other actions that the TCB is expected to mediate. The TCB shall be able to enforce individual accountability by providing the capability to uniquely identify each individual user. The TCB shall also provide the capability of associating this identity with all auditable actions taken by that individual. Furthermore, the TCB shall have the capability of associating a unique identity with each privileged subject, i.e. transaction processing monitors. 2. The TCB shall maintain authentication data that includes information for verifying the identity of individual users (e.g., passwords), as well as information for determining the product policy attributes of individual users, i.e. roles. These data shall be used by the TCB to authenticate the user's identity and to ensure that the attributes of subjects external to the TCB that may be created to act on behalf of the individual user satisfy the product policy. The control of user identification data shall be limited to system administrators, except that a user shall be allowed to modify his/her own authentication data within prescribed limits (e.g., changing his/her own password). The TCB shall be able to incorporate and use installable authentication mechanisms, such as token-based cards, biometrics, or trusted third- party mechanisms, in the place of or in addition to the default authentication (e.g., password- based) mechanism, to authenticate the user. The TCB shall be able to enforce separate user authentication procedures based on specific policy attributes. The enforcement of separate user authentication procedures shall be limited to system administrators. 3. The TCB shall protect authentication data so that it cannot be used by any unauthorized user. The TCB shall appear to perform the entire user authentication procedure even if the user identification entered is invalid. Error feedback shall contain no information regarding which part of the authentication information is incorrect. The TCB shall end the attempted login session if the user performs the authentication procedure incorrectly for a number of successive times (i.e., a threshold) specified by an authorized system administrator. The default threshold shall be three times. When the threshold is exceeded, the TCB shall send an alarm message to the system console and/or to the administrator's terminal, log this event in the audit trail, and delay the next login by an interval of time specified by the authorized system administrator. The default time interval shall be 60 seconds. The TCB shall provide a protected mechanism to disable the user identity or account when the threshold of successive, unsuccessful login attempts is violated more than a number of times specified by the administrator. By default, this mechanism shall be disabled (as it may cause unauthorized denial of service). 4. The TCB shall have the capability to maintain, protect, and display status information for all active users (e.g., users currently logged on, current policy attributes) and of all user accounts (i.e., enabled or disabled user identity or account). 5. Whenever passwords are used as a protection mechanism, then, at a minimum: a. The TCB shall not indicate to the user if he/she has chosen a password already associated with another user. b. The TCB shall store passwords in a one-way encrypted form. (1) The TCB shall require privilege to access encrypted passwords. c. The TCB shall automatically suppress or fully blot out the clear-text representation of the password on the data entry/display device. d. The TCB shall, by default, prohibit the use of null passwords during normal operation. (1) A capability, accessible only to an system administrator, to allow null passwords during non-normal operations, such as system start- up, manual recovery, or maintenance mode, on a per-user identifier or per-port basis may be provided. (A) e. The TCB shall provide a protected mechanism to allow a user to change his or her password. This mechanism shall require re-authentication of the user identity. (1) The TCB shall provide a protected mechanism to set or initialize passwords for users. The use of this mechanism shall be limited to system administrators. f. The TCB shall enforce password aging on a per- user identifier or per-group basis (i.e., a user shall be required to change his or her password after a system-specifiable minimum time). The default for all non-system administrators shall be sixty days. (1) The default for system administrator identifiers shall be thirty days. (2) After the password aging threshold has been reached, the password shall no longer be valid, except as provided in 5 g below. The control of password aging shall be limited to system administrators. g. The TCB shall provide a protected mechanism to notify users in advance of requiring them to change their passwords. This can be done by either: (1) Notifying users a system-specifiable period of time prior to their password expiring. The default shall be seven days. - or - (2) Upon password expiration, notifying the user but allowing a system-specifiable subsequent number of additional logons prior to requiring a new password. The default shall be two additional logons. The control of user password expiration defaults shall be limited to system administrators. h. Passwords shall not be reusable by the same user identifier for a system-specifiable period of time. The default shall be six months. The control of password re-use shall be limited to system administrators. i. The TCB shall provide an algorithm for ensuring the complexity of user-entered passwords that meets the following requirements: (1) Passwords shall meet a system-specifiable minimum length requirement. The default minimum length shall be eight characters. (2) The password complexity-checking algorithm shall be modifiable by the TCB. The default algorithm shall require passwords to include at least one alphabetic character, one numeric character, and one special character. (3) The TCB should provide a protected mechanism that allows systems to specify a list of excluded passwords (e.g., company acronyms, common surnames). (A) (a) The TCB should prevent users from selecting a password that matches any of those on the list of excluded passwords. (A) The control of password complexity shall be limited to system administrators. j. If password generation algorithms are present, they shall meet the following requirements: (1) The password generation algorithm shall generate passwords that are easy to remember (i.e., pronounceable). (2) The TCB should give the user a choice of alternative passwords from which to choose. (A) (3) Passwords shall be reasonably resistant to brute-force password guessing attacks. (4) If the "alphabet" used by the password generation algorithm consists of syllables rather than characters, the security of the password shall not depend on the secrecy of the alphabet. (5) The generated sequence of passwords shall have the property of randomness (i.e., consecutive instances shall be uncorrelated and the sequences shall not display periodicity). 3.2 System Entry Once a user is authenticated, a check is made to see if the user is allowed to access the product. The qualifying checks for system entry can include time-of-day, day-of-week, date, location of terminal, or means of access (e.g., dial-up port), and membership in roles. For the CS3 level, SE-3 was assigned from the Federal Criteria. An assignment was made from CS2 or the Federal Criteria for specifying a role as a user policy attribute. SE-3 Session Locking and Unlocking 1. Prior to initiating the system login procedure, the TCB shall display an advisory warning message to the user regarding unauthorized use of the system and the possible consequences of failure to heed this warning. a. The message shall be system-specifiable. b. The TCB shall be able to display a message of up to twenty lines in length. c. The following message shall be displayed by default: "NOTICE: This is a private computer system. All users of this system are subject to having their activities audited. Anyone using this system consents to such auditing. All unauthorized entries or activities revealed by this auditing can be used as evidence and may lead to criminal prosecution." The control of system entry messages shall be limited to system administrators. 2. Before system entry is granted to a user, the identity of that user shall be authenticated by the TCB. If the TCB is designed to support multiple login sessions per user identity, the TCB shall provide a protected mechanism to enable limiting the number of login sessions per user identity or account with a default of a single login session. The control of this mechanism to limit the number of login sessions shall be limited to system administrators. 3. The TCB shall grant system entry only in accordance with the authenticated user's policy attributes. The system entry conditions shall be expressed in terms of users' policy attributes, i.e., user identity and membership to roles. If no explicit system-entry conditions are defined, the system-entry default shall be used (e.g., the correct user authentication). The TCB shall provide a protected mechanism to allow or deny system entry based on specified ranges of time. Entry conditions using these ranges shall be specified using time-of-day, day-of-week, and calendar dates. The control of system entry conditions shall be limited to system administrators. The TCB shall provide a protected mechanism to allow or deny system entry based on location or port of entry. Conditions for system entry via dial-up lines (e.g., lists of user identities authorized to enter the system via dial-up lines), if any, shall be specified.The control of these mechanisms shall be limited to system administrators. 4. The TCB shall provide a protected mechanism that enables authorized administrators to display and modify the policy attributes used in system-entry control for each user. The conditions under which an unprivileged user may display these attributes shall be specified. 5. Upon a user's successful entry to the system, the TCB shall display the following data to the user and shall not remove them without user intervention: (1) the date, time, means of access and port of entry of the last successful entry to the system; and (2) the number of successive, unsuccessful attempts to access the system since the last successful entry by the identified user. 6. The TCB shall either lock or terminate an interactive session after an administrator- specified interval of user inactivity. The default value for the lock interval shall be five minutes. The default value for session termination shall be fifteen minutes. The TCB shall also provide a mechanism for user-initiated locking of the user's own interactive sessions (e.g., keyboard locking) that includes: (1) clearing or over-writing display devices to make the current contents unreadable; (2) requiring user authentication prior to unlocking the session; and (3) disabling any activity of the user's data entry/display devices other than unlocking the session. 3.3 Trusted Path A Trusted Path ensures that users have direct, unencumbered communication with the TCB. A Trusted Path may be required at various times during a subject session and also may be initiated by a user during a TCB interaction. For the CS3 level, TP-1 was assigned from the Federal Criteria. There are no refinements from CS2 or the Federal Criteria. TP-1 Login Trusted Path The TCB shall support a trusted communication path between itself and the user for initial identification and authentication. Communications via this path shall be initiated exclusively by a user. a. The TCB shall provide a protected mechanism by which a display device may force a direct connection between the port to which it is connected and the authentication mechanism. 3.4 Audit Audit supports accountability by providing a trail of user actions. Actions are associated with individual users for security-relevant events and are stored in an audit trail. This audit trail can be examined to determine what happened and what user was responsible for a security relevant event. The audit trail data must be protected from unauthorized access, modification, or destruction. In addition, the audit trail data must be available in a useful and timely manner for analysis. Audit data is recorded from several sources (such as the TCB or privileged applications) to produce a complete picture of a user's security relevant actions. Therefore, audit data must be correlated across audit collection systems. The mechanisms providing audit data recording must be tailorable to each product's needs. Both the audit data itself and the mechanisms to determine what audit data is recorded are protected by privileges. Once the audit data is recorded, it is analyzed and reported. Reporting can be by reports generated on request. For the CS3 level, AD-3 was assigned from the Federal Criteria. A refinement was made to audit attempts to circumvent or gain unauthorized access to resource allocation limits. AD-3 Audit Tools 1. The TCB shall be able to create, maintain, and protect from modification or unauthorized access or destruction an audit trail of accesses to the objects it protects. The audit data shall be protected by the TCB so that read access to it is limited to those who are authorized for audit data. The TCB shall support an application program interface that allows a privileged application to append data to the security audit trail or to an applications-specified alternative security audit trail. The TCB should support an option to maintain the security audit trail data in encrypted format. (A) 2. The TCB shall be able to record the following types of events: - use of the identification and authentication mechanisms, and system entry events; - access control events selectable on a per user, per subject, per object, per role, and/or per policy attribute basis; i.e., introduction of objects into a user's address space (e.g., file open, program initiation), creation and deletion of subjects and objects; distribution and revocation of access rights; changes of subject and object policy attributes; acquisition and deletion of system privileges. -actions taken by computer operators and system administrators and/or system security officers; i.e., privileged operations such as the modification of TCB elements; accesses to TCB objects (at a minimum, access to an object shall include disk file access, tape volume, or tape file access); changes of policy attributes of users, TCB configuration and security characteristics, and system privileges; selection and modification of audited events. - attempts to circumvent or otherwise gain unauthorized access to resource allocation limits. The events that are auditable by default, and those that are required for successful auditing of other events, which may not be disabled, shall be defined. The TCB shall provide a protected mechanism that displays the currently selected events and their defaults. The use of this mechanism shall be restricted to authorized system administrators. 3. For each recorded event, the audit record shall identify: date and time of the event, user, type of event, and success or failure of the event. For identification/authentication events the origin of request (e.g., terminal ID) shall be included in the audit record. For events that introduce an object into a user's address space and for object deletion events the audit record shall include the name and policy attributes of the object. The character strings input as a response to a password prompt shall not be recorded in the security audit trail. 4. The TCB shall provide a protected mechanism to turn auditing on and off, and to select and change the events to be audited and their defaults, during the system operation. The use of this mechanism shall be restricted to authorized system administrators. The system administrator shall be able to selectively audit the actions of one or more users based on individual identity and/or object policy attributes. Audit review tools shall be available to authorized system administrators to assist in the inspection and review of audit data, and shall be protected from unauthorized use, modification, or destruction. The TCB shall provide tools for audit data processing. These shall include specifically designed tools: for verifying the consistency of the audit data; for verifying the selection of audit events; for audit trail management. The audit trail management tools shall enable: - creation, destruction, and emptying of audit trails; use of warning points regarding the size of the audit data, and modification of the audit trail size; -formatting and compressing of event records; -displaying of formatted audit trail data; and -maintaining the consistency of the audit trail data after system failures and discontinuity of operation. The TCB shall provide a protected mechanism for the automatic copying of security audit trail files to an alternative storage area after a system-specifiable period of time. The TCB shall provide a protected mechanism for the automatic deletion of security audit trail files after a system-specifiable period of time. The default shall be thirty days. (a) It shall not be possible to delete the security audit trail before it gets copied to an alternate storage area. (b) It shall be possible to disable this mechanism. The use of audit trail management functions shall be limited to system administrators. 5. Audit review tools shall be available to authorized users to assist in the inspection and review of audit data, and shall be protected from unauthorized modification or destruction. The TCB shall also provide tools for post-collection audit analysis (e.g., intrusion detection) that shall be able to selectively review (1) the actions of one or more users (e.g., identification, authentication, system-entry, and access control actions); (2) the actions performed on a specific object or system resource; and (3) all, or a specified set of, audited exceptions; and (4) actions associated with a specific policyattributes.The review tools shall be able to operate concurrently with the system operation. 3.5 Access Control Once the user has been granted access, the question of which objects the authenticated user may access still remains. An owner, or an authorized user, allows or denies to other users access to that object. The requirements below describe subject accesses to objects. For the CS3 level, AC-2+ was assigned from the Federal Criteria.his level is indicated as being AC-2+ because requirements were included from level AC-4 (to include the requirements for time and location dependency conditions). These are indicated in the text by an "[AC-4]" in front of the requirement. This component level was refined from CS2 and the Federal Criteria by specifying access control decisions based on roles. AC-2+ Basic Access Control 1. Definition of Access Control Attributes The TCB shall define and protect access control attributes for subjects and objects. Subject attributes shall include named individuals or defined roles or both. Object attributes shall include defined access rights (i.e., read, write, execute) that can be assigned to subject attributes. The TCB shall be able to assign access rights to role identities. If multiple access control policies are supported, the access control attributes corresponding to each individual policy shall be identified. [AC-4]: The subject and object attributes shall accurately reflect the sensitivity and/or integrity of the subject or object.The subject's access control attributes also shall include time and location attributes that can be assigned to authenticated user identities. 2. Administration of Access Control Attributes The TCB shall define and enforce rules for assignment and modification of access control attributes for subjects and objects. The TCB shall provide a protected mechanism for roles as follows: a. A user identifier shall be able to be associated with one or more roles. b. The TCB shall provide a protected mechanism to list the names of all roles. c. The TCB shall provide a protected mechanism to list the membership of any role. Rules for maintaining role membership shall be provided. These rules shall include those for displaying and modifying the list of users belonging to a role and the role attributes of those users. The effect of these rules shall be that access permission to an object by users not already possessing access permission is assigned only by authorized users. Only the current owner or system administrators shall modify access control attributes on objects. The TCB shall provide a protected mechanism to modify role membership. The use of this mechanism shall be under the control of system administrators. Authority to modify specific role membership may be delegated. The TCB shall provide a protected mechanism by which the user identifier associated with a subject attribute can be changed while the subject is active. It shall also provide a protected mechanism for limiting the user identifiers that may change to a user identifier that would provide any additional access rights. The control of these mechanisms shall be limited to system administrators. [AC-4]: These rules shall allow authorized users to specify and control sharing of objects by named individuals or defined roles of individuals, or by both, and shall provide controls to limit propagation of access rights, (i.e., these rules shall define the distribution, revocation, and review of access control attributes). The controls defined by these rules shall be capable of specifying for each named object, a list of individuals and a list of roles of named individuals, with their respective access rights to that object. Furthermore, for each named object, it shall be possible to specify a list of named individuals and a list of roles of named individuals for which no access to the object is given. These controls shall be capable of including or excluding access to the granularity of a single user.These controls shall also be capable of specifying access-time dependency (i.e., the effect of the distribution and revocation of access control attributes take place at a certain time and shall last for a specified period of time), and/or access-location dependency (i.e., shall specify the locations from which the distribution and revocation of access rights shall take place). The rules for assignment and modification of access control attributes shall include those for attribute assignment to objects during import and export operations. If different rules of assignment and modification of access control attributes apply to different subjects and/or objects, the totality of these rules shall be shown to support the defined policy. 3. Authorization of Subject References to Objects [AC-4]: The TCB shall define and enforce authorization rules for the mediation of subject references to objects. These rules shall be based on the access control attributes of subjects and objects. These rules shall, either by explicit user action or by default, provide that objects are protected from unauthorized access. These rules shall include time-of-access and location- of-access controls defined for subjects and objects. For each object, the authorization rules of the TCB shall be based on a protected mechanism to specify roles with their specific access rights to that object. The authorization rules shall be defined in terms of subject authorization conditions for accessing the object (i.e., on <subject, action, object> tuples. At a minimum, the authorization rules shall be defined as follows: a. The access rights associated with a user identifier shall take precedence over the access rights associated with any roles of which that user identifier is a member. b. When a user identifier can be an active member of multiple roles simultaneously, or if the access rights associated with the user identifier conflict with the access rights associated with any role in which the user is a member, it shall be possible for an system administrator to configure rules that combine the access rights to make a final access control decision. c. The TCB shall provide a protected mechanism to specify default access rights for user identifiers not otherwise specified either explicitly by a user identifier or implicitly by role membership. The scope of the authorization rules shall include a defined subset of the product's subjects and objects and associated access control attributes. The coverage of authorization rules shall specify the types of objects and subjects to which these rules apply. If different rules apply to different subjects and objects, the totality of these rules shall be shown to support the defined policy. If multiple policies are supported, the authorization rules for each policy shall be defined separately. The TCB shall define and enforce the composition of policies, including the enforcement of the authorization rules (e.g., subject and object type coverage, enforcement precedence). 4. Subject and Object Creation and Destruction The TCB shall control the creation and destruction of subjects and objects. These controls shall include object reuse. That is, all authorizations to the information contained within a storage object shall be revoked prior to initial assignment, allocation or reallocation to a subject from the TCB's pool of unused storage objects; information, including encrypted representations of information, produced by a prior subjects' actions shall be unavailable to any subject that obtains access to an object that has been released back to the system. 3.6 Security Management The management of security attributes and configuration parameters is an important aspect of a secure product. Mechanisms have to be provided to easily maintain the product, and they must be protected so that only system administrators can manage the security aspects of the product. For the CS3 level, SM-2 was assigned from the Federal Criteria. An assignment was made to this component from the Federal Criteria to limit the number of login sessions and for controlling the availability of system resources. A refinement was made to provide system administrators with a protected mechanism for grating and revoking role membership. SM-3 Policy-Oriented Security Management 1. The TCB shall provide an installation mechanism for the setting and updating of its configuration parameters, and for the initialization of its protection-relevant data structures before any user or administrator policy attributes are defined. It shall allow the configuration of TCB internal databases and tables. The TCB shall distinguish between normal mode of operation and maintenance mode, and shall provide a maintenance-mode mechanism for recovery and system start-up.This mechanism shall include a means to initialize administrative privileges and administrative identification, authentication, and system-entry attributes. 2. The TCB shall provide protected mechanisms for displaying and modifying the security policy parameters. These parameters shall include identification, authentication, system entry and access control parameters for the entire system and for individual users. The TCB shall have a capability to define the identification and authentication policy on a system-wide basis (e.g., password minimum and maximum lifetime, password length and complexity parameters). The TCB mechanisms shall have the capability to limit: (1) maximum period of interactive session inactivity, (2) maximum login or session time, and (3) successive unsuccessful attempts to log in to the system. In particular, the TCB shall provide a protected mechanism to specify that sessions be terminated rather than locked after a period of inactivity. The control of these mechanisms shall be limited to system administrators.The TCB shall provide an administrative capability to specify the authentication method on a per policy-attribute basis whenever multiple identification and authentication methods are used; e.g., via user passwords, tokens, or biometrics. If the TCB is designed to support multiple login sessions per user identity, the administrators shall be able to limit the number of simultaneous login sessions on an authorization-attribute basis. The system-supplied default shall limit each user identifier to one simultaneous logon session. The TCB shall also have a capability to limit the successive unsuccessful attempts to login from a specific port of entry, and/or with a specific user identity or account. The TCB shall provide a mechanism to control the availability of system resources via resource quotas and quantity-of-resources limits. 3. The TCB shall provide protected mechanisms for manually displaying, modifying, or deleting user registration and account parameters. These parameters shall include unique user identifiers, their account, and their associated user name and affiliation. The TCB shall allow the automatic disabling of user identities and/ or accounts, after a period during which the identity and/or account have not been used. The time period shall be administrator specified, with a specified default provided. The TCB shall allow the automatic re-enabling of disabled user identities and/or accounts after an administrator-specified period of time. The TCB shall provide a means to uniquely identify security policy attributes. It shall also provide a means of listing all these attributes for a user, and all the users associated with an attribute. It shall be capable of defining and maintaining the security policy attributes for subjects including: defining and maintaining privileges for privileged subjects, discretionary and non-discretionary attributes, i.e., definition and maintenance of roles, and centralized distribution, review and revocation of policy attributes. System administrators shall be provided with a protected mechanism for the purposes of granting and revoking user membership to specific roles. Administrative users shall also be provided with tools for the creation of roles and for the definition of role attributes. 4. The TCB shall support separate operator and administrator functions. The operator functions shall be restricted to those necessary for performing routine operations. The operator functions allow the enabling and disabling of peripheral devices, mounting of removable storage media, backing-up and recovering user objects; maintaining the TCB hardware and software elements (e.g., on site testing); and starting and shutting down the system. 5. The use of the protected mechanisms for system administration shall be limited to authorized administrative users. The control of access- control attributes shall be limited to the object owner and to system administrators. 3.7 Reference Mediation Reference mediation, that is, the control by the TCB of subject accesses to objects, must be ensured so that the users can have faith in the TCB's access control decisions. Also, users must be ensured that all access to security services are mediated by the TCB. For the CS3 level, RM-1 was assigned from the Federal Criteria. No refinements were made from CS2 or the Federal Criteria. RM-1 Mediation of References to a Defined Subject/Object Subset 1. The TCB shall mediate all references to subjects, objects, resources, and services (e.g., TCB functions) described in the TCB specifications. The mediation shall ensure that all references are directed to the appropriate security-policy functions. 2. Reference mediation shall include references to the defined subset of subjects, objects, and resources protected under the TCB security policy, and to their policy attributes, i.e., role identifiers. 3. References issued by privileged subjects shall be mediated in accordance with the policy attributes defined for those subjects. 3.8 Resource-Allocation Requirements This component restricts the allocation of subjects and objects so that no one user through the exhaustion of resource can deny service to other users. It further enables the TCB to prioritize subject access to resources so that the highest priority subject is given preferential treatment in its access to objects. For CS3l, AR-1 was assigned from the Federal Criteria. This component was refined from the Federal Criteria by limiting the control of the capability to place restrictions on the number of subjects and objects to system administrators. LEVEL - AR-1 Resource Restrictions The TCB shall provide the capability to place restrictions on the number of subjects and objects a user may have allocated at any given time. The control of this capability shall be limited to system administrators. The TCB shall control a defined set of system resources (e.g., memory, disk space) such that no one individual user can deny access to another user's subject and object space. All subjects, objects, and resources shall be defined with default space or time quota and number-of- resources attributes. 3.9 TCB Protection TCB protection is a fundamental requirement for a secure product. All of the security components and mechanisms that have been described depend upon the integrity of the TCB and on the TCB being isolated and non-circumventable. The TCB must be resistant to outside penetration. For the CS3 level, P-1 was assigned from the Federal Criteria. No refinements were made from CS2 or the Federal Criteria. P-1 Basic TCB Isolation The TCB shall maintain a domain for its own execution that protects it from external interference and tampering (e.g., by reading or modification of its code and data structures). The protection of the TCB shall provide TCB isolation and noncircumventability of TCB isolation functions as follows: 1. TCB Isolation requires that (1) the address spaces of the TCB and those of unprivileged subjects are separated such that users, or unprivileged subjects operating on their behalf, cannot read or modify TCB data structures or code, (2) the transfers between TCB and non-TCB domains are controlled such that arbitrary entry to or return from the TCB are not possible; and (3) the user or application parameters passed to the TCB by addresses are validated with respect to the TCB address space, and those passed by value are validated with respect to the values expected by the TCB. 2. Noncircumventability of TCB isolation functions requires that the permission to objects (and/or to non-TCB data) passed as parameters to the TCB are validated with respect to the permissions required by the TCB, and references to TCB objects implementing TCB isolation functions are mediated by the TCB. 3.10 Physical TCB Protection Whenever the physical security of a product cannot be established, then all of the software controls that have been put into place are of no consequence. Therefore, physical TCB protection is just as important as software protection. Physical protection is based on a product's ability to prevent, deter, detect, and counter physical attacks against the product. Devices used to counter physical attacks must be shown to be tamper-resistant and non-circumventable. For the CS3 level, PP-1 was assigned from the Federal Criteria. No further refinements were made from the Federal Criteria. PP-1 Administrative and Environment Protection 1. Administrative procedures and environmental features necessary for establishing the physical security of a product's TCB shall be defined. 2. Product functions and devices necessary to establish physical control over the product's TCB shall be identified and provided. 3.11 TCB Self-Checking Validating the correct operation of the TCB firmware and hardware is an important aspect of guaranteeing the integrity of the product. Hardware and software features that validate the correct operation of the product will be delivered with the product to ensure that the hardware and firmware are installed properly and are in working order. For the CS3 level, SC-2 was assigned from the Federal Criteria. The refinements from CS2 and the Federal Criteria include providing for an encryption mechanism to preserve the integrity of object data and providing for a tool to check for storage medium and file system integrity, and for having system operators perform operator-controlled tests. An assignment was made to the configurable software features to monitor system services and the corruption of access control information. SC-3 Software-Test Support Hardware and/or software features shall be provided that can be used to periodically validate the correct operation of the on-site hardware and firmware elements of the TCB. These features shall include: power-on tests, loadable tests, and operator-controlled tests. The power-on tests shall test all basic components of the TCB hardware and firmware elements including memory boards and memory interconnections; data paths; busses; control logic and processor registers; disk adapters; communication ports; system consoles, and the keyboard speaker. These tests shall cover all components that are necessary to run the loadable tests and the operator-controlled tests. The loadable tests shall cover: processor components (e.g., arithmetic and logic unit, floating point unit, instruction decode buffers, interrupt controllers, register transfer bus, address translation buffer, cache, and processor- to-memory bus controller); backplane busses; memory controllers; writable control memory for operator-controlled and remote system-integrity testing. Operator-controlled tests shall be able to initiate a series of one-time or repeated tests, to log the results of these tests and, if any fault is detected, to direct the integrity-test programs to identify and isolate the failure.The execution of operator-controlled tests shall be limited to system operators. Configurable software or firmware features shall be provided that can be used to validate the correct operation of the on-site software elements (i.e., code and data structures) of the TCB. These features may include, but are not limited to, checksums and consistency checks for TCB elements stored on storage media (e.g., disk-block consistency invariants). a. At a minimum, these features shall also address: (1) Monitoring of system services (2) Corruption of access control information. The TCB should provide an encryption mechanism that can be used to preserve the integrity of data in an object. (A) The TCB shall provide tools for checking storage medium and file system integrity. a. The TCB shall execute these tools periodically. 3.12 TCB Initialization and Recovery The recovery and start-up of the TCB must be ensured so that the product always remains in a secure state, whether the recovery is performed manually or automatically. For the CS3 level, TR-2 was assigned from the Federal Criteria. An assignment was made at this component level to specify that audit control data shall survive system restarts. TR-3 Automated Recovery or Start-up 1. Procedures and/or mechanisms shall be provided to assure that, after a TCB failure or other discontinuity, recovery without protection compromise is obtained. At a minimum, audit control data (e.g., audit event masks) shall survive system restarts. 2. Automated procedures, under the control of the TCB, shall be provided to assure that after a system failure, other discontinuity, or start-up, a secure state is obtained without undue loss of system or user objects. The security policy properties, or requirements, used to determine that a secure state is obtained shall be defined. 3.13 Privileged Operation Privileges are associated with functional components so that at any given time only those operations that are associated with the privilege can be performed. The privileges that a product needs must be identified and must cover all the security aspects of the product, including the secure administration of the product, and should be defined so that there is not a single privileged mode for all of the TCB's operations. For the CS3 level, PO-2 was assigned from the Federal Criteria. A refinement was made from CS2 and the Federal Criteria by specifying that privileges be associated with administrative roles and for controlling access to role registration files. PO-2 Privilege Association with TCB Modules 1. TCB privileges needed by individual functions, or groups of functions, of a functional component shall be identified. Privileged TCB calls or access to privileged TCB objects, such as user and group and role registration files, password files, security and integrity-level definition file, role definition file, audit-log file shall also be identified. It shall be possible to associate TCB privileges with TCB operations performed by administrative users (i.e., administrative roles). 2.The modules of a TCB function shall be associated only with the privileges necessary to complete their task. 3. Support for product privilege implementation and association with TCB modules provided by lower-level mechanisms or procedures (e.g., operating system, processors, language) shall be provided. 3.14 Ease-of-TCB-Use If security mechanisms are not easy to use and maintain, then administrative and non-system administrators may be tempted to disable the security mechanisms. Therefore, ease of use becomes an important element in the administration of a secure product and in the creation of privileged applications. It also minimizes errors on the part of both the administrative and non-system administrators, and can serve to minimize the consequences of these errors. For the CS3 level, EU-3 was assigned from the Federal Criteria. No refinements were made from CS2 or the Federal Criteria. EU-3 Common Configuration Coverage 1. The TCB shall provide well-defined actions to undertake administrative functions. Fail-safe default options shall be provided for security parameters of administrative functions. The TCB shall include fail-safe defaults for the policy attributes of subjects, objects (e.g., devices) and services used in common system configurations, as well as user-setable defaults for these subjects and objects. 2. The TCB shall provide well-defined application programming interfaces and programming functions (e.g., libraries) for all its policies to support the development of applications that can define and enforce security policies on application- controlled subjects and objects. The TCB shall enable user-controlled reduction of permissions available to applications. CS3 Assurance 4. Introduction This chapter provides the CS3 development and evaluation assurance requirements package using the development and evaluation assurance components defined in Volume I and the package contained in Volume I, Appendix G of the Federal Criteria. The structure of each assurance package follows that of the assurance components (i.e., each package consists of development process, operational support, development environment, development evidence, and evaluation process components). Assurance Package T3+ The enhanced assurance level is intended to include the best of the commercial computer products designed to satisfy functional requirements. As such this package includes several extensions to the assurance components of the previous two packages. The intent of product development assurance for this package is both to establish that the external behavior of the product conforms to its user level and administrative documentation and to provide visibility into the internal structure of the product TCB. For this reason, requirements for Descriptive Interface Specifications (DIS) and modular decomposition have been added. The TCB element identification and functional testing, have also been extended and penetration testing requirements added to support the added assurances of external behavior. The intent of the operational support assurance for this package is to establish a level of user and administrative guidance and product information that enables the correct product installation and use of product security features. The developer is required to establish and document a policy for responding to customer inquiries and flaw remediation. Similarly, the development environment assurances are intended to provide the a level of control over the product configuration and production, including well-defined coding standards and strict configuration management processes. This level of development environment assurance is similar to that used in the most advanced commercial development organizations. The development evidence required for this package is commensurate with the assurances required. The intent of this package is to require the type of assurance evidence that is generated during commercial development oriented towards of high-quality products. The intent of evaluation support assurance is to establish that the product, and the context in which it is developed and supported, is commensurate with the development assurance requirements. At the T3+ level, testing analysis and the requirement for independent testing determines whether the product meets the functional protection requirements. Operational support evaluation assurance determines whether the product documentation correctly describes the security relevant operations. Development environment assurance determines whether the product meets the requirements as defined in the protection profile's development assurance subsections. Design assurance determines whether the product meets the design requirements as defined in the Development Process Assurance section of this Protection Profile. Also for CS3, flaw remediation was included in this package. Flaw remediation is important for commercial environments since it ensures that flaws (i.e, deficiencies in a product that enables a user external to the TCB to violate the functional requirements of a protection profile) that are discovered by the product consumers will be tracked, corrected, and disseminated to the affected customers. The following table summarizes the assurance components that comprise T3+. Note that this package is indicated as being T3+ since an additional component was included for flaw remediation. Also note that the requirement for role based administrative guidance was included from level AG-3 and is indicated in the table below as "AG-2+" and in the component text by the insertion of "[AG-3]"at the beginning of the paragraph. CS3 Assurance Package Summary .---------------------------------------. | Assurance Components | T3+ | |================================|======| | Development Assurance Components | |=======================================| | Development Process | |--------------------------------+------| | TCB Property Definition | PD-2 | |--------------------------------+------| | TCB Design | |--------------------------------+------| | TCB Element Identification | ID-2 | |--------------------------------+------| | TCB Interface Definition | IF-1 | |--------------------------------+------| | TCB Modular Decomposition | ---- | |--------------------------------+------| | TCB Structuring Support | SP-1 | |--------------------------------+------| | TCB Design Disciplines | ---- | |--------------------------------+------| | TCB Implementation Support | ---- | |--------------------------------+------| | TCB Testing and Analysis | |--------------------------------+------| | Functional Testing | FT-1 | |--------------------------------+------| | Penetration Analysis | PA-1 | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Operational Support | |--------------------------------+------| | User Security Guidance | UG-1 | |--------------------------------+------| | Administrative Guidance | AG-2+| |--------------------------------+------| | Flaw Remediation | FR-2 | |--------------------------------+------| | Trusted Generation | TG-2 | |--------------------------------+------| | Development Environment | |--------------------------------+------| | Life Cycle Definition | LC-1 | |--------------------------------+------| | Configuration Management | CM-1 | |--------------------------------+------| | Trusted Distribution | ---- | |--------------------------------+------| | Development Evidence | |--------------------------------+------| | TCB Protection Properties | EPP2 | |--------------------------------+------| | Product Development | EPD1 | |--------------------------------+------| | Product Testing & Analysis | |--------------------------------+------| | Functional Testing | EFT1 | |--------------------------------+------| | Penetration Analysis | EPA1 | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Product Support | EPS1 | `---------------------------------------' |=======================================| | Evaluation Assurance Components | |=======================================| | Testing | |--------------------------------+------| | Test Analysis | TA-2 | |--------------------------------+------| | Independent Testing | IT-1 | |--------------------------------+------| | Review | |--------------------------------+------| | Development Environment | DER1 | |--------------------------------+------| | Operational Support | OSR1 | |--------------------------------+------| | Analysis | |--------------------------------+------| | Protection Properties | ---- | |--------------------------------+------| | Design | DA-1 | |--------------------------------+------| | Implementation | ---- | `---------------------------------------' 4.1 TCB Property Definition The definition of TCB properties assures the consistency of the TCB's behavior. It determines a baseline set of properties that can be used by system developers and evaluators to assure that the TCB satisfies the defined functional requirements. For CS3, PD-2 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. PD-2 Informal Property Definition The developer shall provide informal models for the functional components and sub-components of the profile. At a minimum, an informal model of the access control components shall be provided. Each informal model shall include (abstract) data structures and operations defining each functional component or sub-component, and a description of the model properties. The developer shall interpret (e.g., trace) the informal models within the product TCB. For each model entity, the developer shall: (1) identify the TCB elements and their TCB interfaces (if any) that implement that entity; (2) define the operation of these TCB elements, and (3) explain why the operation of these elements is consistent with the model properties. The developer's interpretation of each informal model, which defines the TCB properties, shall identify all TCB elements that do not correspond to any model entity and shall explain why these elements do not render the TCB properties invalid. For the components that are not informally modeled, the developer shall interpret the functional requirements of the protection profile within the product TCB. For each functional requirement, the developer shall: (1) identify the TCB elements and their TCB interfaces (if any) that implement that requirement; (2) describe the operation of these TCB elements, and (3) explain why the operation of these elements is consistent with the functional requirement. The developer's interpretation of each functional requirement, which describes the TCB properties, shall identify all TCB elements that do not correspond to any functional requirement and shall explain why these elements do not render the TCB properties invalid. 4.2 TCB Element Identification The identification of TCB elements (hardware, firmware, software, code, and data structures) provides the set of elements that determine the protection characteristics of a product. All assurance methods rely on the correct identification of TCB elements either directly or indirectly. For CS3, ID-2 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. ID-2: TCB Element Justification The developer shall identify the TCB elements (i.e., software, hardware/firmware code and data structures). Each element must be unambiguously identified by its name, type, release, and version number (if any). The developer shall justify the protection relevance of the identified elements (i.e., only elements that can affect the correct operation of the protection functions shall be included in the TCB). If protection-irrelevant elements are included in the TCB, the developer shall provide a rationale for such inclusion. 4.3 TCB Interface Definition The TCB interface establishes the boundary between the TCB and its external users and application programs. It consists of several components, such as command interfaces (i.e., user oriented devices such as the keyboard and mouse), application program interfaces (system calls), and machine/processor interfaces (processor instructions). For CS3, IF-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. IF-1: Interface Description The developer shall describe all external (e.g., command, software, and I/O) administrative (i.e., privileged) and non-administrative interfaces to the TCB. The description shall include those components of the TCB that are implemented as hardware and/or firmware if their properties are visible at the TCB interface. The developer shall identify all call conventions (e.g., parameter order, call sequence requirements) and exceptions signaled at the TCB interface. TCB Structuring Support Structuring the TCB into modules is necessary. However, the modular decomposition does not necessarily reflect the run- time enforcement of the TCB structuring since the separation of modules may not necessarily be supported by run-time mechanisms. The run-time enforcement of internal TCB structuring adds a measure of assurance that the TCB elements that are critical to the enforcement of the protection functions are separate from the non-critical elements. Also, the use of run-time enforcement of TCB structuring helps separate protection-critical TCB elements from each other, thereby helping to enforce the separation of protection concerns and minimizing the common mechanisms shared between protection critical elements. For CS3, SP-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. SP-1: Process Isolation The TCB shall maintain process isolation. 4.4 Developer Functional Testing Functional testing establishes that the TCB interface exhibits the properties necessary to satisfy the requirements of the protection profile. It provides assurance that the TCB satisfies at least its functional protection requirements. For CS3, FT-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. FT-1: Conformance Testing The developer shall test the TCB interface to show that all claimed protection functions work as stated in the TCB interface description. The developer shall correct all flaws discovered by testing and shall retest the TCB until the protection functions are shown to work as claimed. 4.5 Penetration Analysis Penetration analysis is an important assurance component since the effectiveness of all security policies rely on the penetration resistance of the TCB. TCB penetration analysis consists of the identification and confirmation of flaws in the design and implementation of protection functions that can be exploited by unprivileged users or untrusted application programs. For CS3, PA-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. PA-1 Basic Penetration Testing The developer shall define the TCB configuration, interface, and protection functions that are subject to penetration testing. For each test, the developer shall identify the goal of the test and the criteria for successful penetration. The developer shall identify all product documentation (e.g., system reference manuals) used to define penetration-test conditions, and shall document all test conditions, data (e.g., test set-up, function call parameters, and test outcomes), and coverage. The penetration testing shall include, at a minimum, known classes of penetration flaws found in other TCBs (e.g., generic penetration flaws). For each uncovered flaw, the developer shall define and document scenarios of flaw exploitation, and shall identify all penetration outcomes resulting from that scenario. 4.6 User's Guidance User's guidance is an operational support assurance component that ensures that usage constraints assumed by the protection profile are understood by the users of the product. It is the primary means available for providing product users with the necessary background and specific information on how to correctly use the product's protection functionality. For CS3, UG-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. UG-1: Users' Guide The developer shall provide a Users' Guide which describes all protection services provided and enforced by the TCB. The User's Guide shall describe the interaction between these services and provide examples of their use. The User's Guide may be in the form of a summary, chapter or manual. The User's Guide shall specifically describe user responsibilities. These shall encompass any user responsibilities identified in the protection profile. 4.7 Administrative Guidance Administrative guidance is an operation support assurance component that ensures that the environmental constraints assumed by the protection profile are understood by administrative users and operators of the IT product. It is the primary means available to the developer for providing to administrators and operators detailed, accurate information on how to configure and install the product, operate the IT product is a secure manner, make effective use of the product's privileges and protection mechanisms to control access to administrative functions and data bases, and to avoid pitfalls and improper use of the administrative functions that would compromise the TCB and user security. For CS3, AG-2+ was assigned from the Federal Criteria. This level is indicated as being "AG-2+" because requirements were included from AG-3 for role based administrative guidance. This is indicated in the text by an "[AG-3]" in front of the paragraph and through the use of bold italics. AG-2+: Detailed Administrative Guidance [AG-3]: The developer shall provide a Trusted Facility Manual intended for the product administrators and operators that describes how to use the TCB security services (e.g., Access Control, System Entry, or Audit) to enforce a system security policy. The Trusted Facility Manual shall include the procedures for securely configuring, starting, maintaining, and halting the TCB. The Trusted Facility Manual shall explain how to analyze audit data generated by the TCB to identify and document user and administrator violations of this policy. The Trusted Facility Manual shall explain the unique security-relevant privileges and functions of administrators and operators. The Trusted Facility Manual shall also explain the distinct security-relevant privileges and functions of the TCB and how they can be selectively granted to provide fine-grained, multi-role system and application administration policies. The Trusted Facility Manual shall describe the administrative interaction between security services. The Trusted Facility Manual shall identify all hardware, firmware, software, and data structures comprising the TCB. The detailed audit record structure for each type of audit event shall be described. If covert channel handling is required, the Trusted Facility Manual shall explain how configure the product to mitigate, eliminate, or audit covert channel exploitation.The Trusted Facility Manual shall describe the cautions about and procedures for using the TCB as a base for site-specific secure applications. The Trusted Facility Manual shall describe procedures for securely regenerating the TCB after any part is changed (e.g., due to adding devices or installing flaw corrections to the TCB software). The Trusted Facility Manual shall be distinct from User Guidance, and encompass any administrative responsibilities identified in security management. 4.8 Flaw Remediation Procedures Flaw remediation is an operational support assurance component that ensures that flaws (i.e, deficiencies in the product that enable a user external to the TCB to violate the functional requirements of a protection profile) that are discovered by the product consumers will be tracked and corrected while the product is supported by the developer. For CS3, FR-2 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. FR-2: Flaw Reporting Procedures Flaw Tracking Procedures: The developer shall establish a procedure to track all reported protection flaws with each release of the product. The tracking system shall include a description of the nature and effect of each flaw and the status of finding a correction to the flaw. Flaw Repair Procedures: The developer shall establish a procedure to identify corrective actions for protection flaws. This procedure shall include a policy to separate protection-relevant from non-protection relevant corrections, changes, or upgrades to the product. Consumer Interaction Procedures: The developer shall establish a procedure for accepting consumer reports of protection problems and requests for corrections to those problems. The developer shall designate one or more specific points of contact for consumer reports and inquiries about protection issues involving the product. This procedure and the designated points of contact shall be provided in the consumer documentation (e.g., the TFM or the SFUG). 4.9 Trusted Generation Trusted generation is an operational support assurance component that ensures that the copy of the product's TCB that is configured and activated by the consumer exhibits the same protection properties as the master copy of the product's TCB that was evaluated for compliance with the protection profile. The trusted generation procedures must provide some confidence that the consumer will be aware of what product configuration parameters can affect the protection properties of the TCB. The procedures must encourage the consumer to choose parameter settings that are within the bounds assumed during the product evaluation. For CS3, TG-2 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. TG-2: Trusted Generation With Fail-Safe Defaults The developer shall establish and document the procedures that a customer must perform to generate an operational TCB from the delivered copy of the master TCB. The customer documentation shall identify any system parameters, which are initialized or set during system generation, that affect the TCB's conformance to the protection profile and state the acceptable ranges of values for those parameters. The product shall be delivered with each of these parameters set to its fail-safe defaults. 4.10 Life Cycle Definition Life cycle definition is an assurance component for establishing that the business practices used by a developer to produce the product's TCB include the considerations and activities identified by the development process and operational support requirements of the protection profile. Consumer confidence in the correspondence between the protection profile requirements and the product's TCB is greater when security analysis and the production of evidence are done on a regular basis as a integral part of the development process and operational support activities. For CS3, LC-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. LC-1: Developer-Defined Life Cycle Process The developer shall describe the process used to develop and maintain the product. The process shall incorporate a security policy that states the technical, physical, procedural, personnel, and other measures used by the developer to protect the product and its documentation. The developer shall trace each development process and support process requirement of the protection profile to the part, or parts, of the developer's process where the requirement is satisfied. The developer shall identify the programming languages used to develop the TCB software. 4.11 Configuration Management Configuration management is an assurance component that ensures that the product's TCB configuration remains consistent and complete, and that changes to the TCB do not adversely affect the protection properties of the TCB. Configuration management must ensure that additions, deletions, or changes to the TCB do not compromise the correspondence between the TCB's implementation and the requirements of the protection profile. This is accomplished by requiring the developer to have procedures or tools that ensure that the TCB and its documents are updated properly with the TCB changes. For CS3, CM-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. CM-1: Procedural Control and Generation The developer shall establish configuration control and generation procedures for developing and maintaining the TCB. The procedures shall be employed to ensure that changes to the TCB are consistent with the product's protection properties and security policy. The developer shall employ these procedures to track changes to development evidence, implementation data (e.g., source code and hardware diagrams), executable versions of the TCB, test documentation and procedures, identified flaws, and consumer documentation. The configuration control procedures shall permit the regeneration of any supported version of the TCB. 4.12 Evidence of TCB Protection Properties The documentation of the TCB protection properties includes the definition of the functional component requirements, their modeling (if any), and their interpretation within a product's TCB. For each requirement of a protection profile, a description, definition (an informal, descriptive specification), or a formal specification of the TCB components and their operation corresponding to the requirement must be provided. For CS3, EPP-2 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. EPP-2 Evidence of Informal Model Interpretation in the TCB The developer shall provide documentation which describes the correspondence between the functional component requirements and the TCB elements and interfaces. The developer shall also provide an informal access control model and its interpretation within the TCB. The TCB properties, which are defined by this correspondence, shall be explained in this documentation. 4.13 Evidence of Product Development Product development evidence consists of the TCB design evidence including the documentation of the TCB interface, TCB elements, TCB structure, TCB structuring support, and TCB design disciplines. The TCB implementation evidence includes TCB source code, and the processor hardware and firmware specifications. For CS3, EPD-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. EPD-1: Description Of The TCB External Interface The developer shall provide an accurate description of the functions, effects, exceptions and error messages visible at the TCB interface. The developer shall provide a list of the TCB elements (hardware, software, and firmware). 4.14 Evidence of Functional Testing Functional testing evidence includes the testing itself, the test plans, and test documentation results. Test plans consist of: the description definition or specification of the test conditions; the test data, which consists of the test environment set-up; the test parameters and expected outcomes; and a description of the test coverage. For CS3, EFT-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. EFT-1: Evidence of Conformance Testing The developer shall provide evidence of the functional testing that includes the test plan, the test procedures and the results of the functional testing. 4.15 Evidence of Penetration Analysis The penetration analysis evidence includes, in addition to penetration test plans and results configured in the same manner as the functional testing evidence, the documentation of the penetration-resistance testing methods and tools, conditions that were verified, the outcomes of the verification and, when appropriate, the scenario of the discovered penetration flaws. The cause of every discovered penetration flaw, or class of penetration flaws, must also be documented. For CS3, EPA-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. EPA-1: Evidence of Penetration Testing The developer shall provide evidence of penetration testing. The evidence shall identify all product documentation on which the search for flaws was based. The penetration evidence shall describe the scenarios for exploiting each potential flaw in the system and the penetration test conditions, data (e.g., test set-up, function call parameters, and test outcomes), coverage, and conclusions derived from each scenario. 4.16 Evidence of Product Support Product support evidence consists of the development environment and operational support documentation and tools. The development environment evidence includes the documentation of the product life-cycle process, configuration management procedures enforced, and the trusted distribution mechanisms and procedures used. It also includes: the identification of the tools used in the product development, configuration management, and trusted distribution; and the characteristics that make those tools suitable for the development of product protection. For CS3, EPS-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. EPS-1: Evidence of Basic Product Support The developer shall provide evidence that describes the policies, procedures, and plans established by the developer to satisfy the Operational Support and Development Environment requirements of the protection profile. 4.17 Test Analysis Test analysis determines whether the product meets the functional protection requirements defined in the protection profile. Functional testing is based on operational product, the TCB's functional properties, the product's operational support guidance, and other producer's documentation as defined by the development evidence requirements. Functional test analysis is based on the achieved test results as compared to the expected results derived from the development evidence. For CS3, TA-2 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. TA-2: Enhanced Test Analysis The evaluator shall assess whether the producer has performed the activities defined in the development assurance requirements of the protection profile for functional testing and penetration analysis, and whether the producer has documented these activities as defined in the development evidence requirements of the protection profile. The evaluator shall analyze the results of the producer's testing activities for completeness of coverage and consistency of results, and general correctness (e.g., defect trend from regression testing). This analysis shall examine the testability of requirements, the adequacy of the tests to measure the required properties, the deviation of the actual results obtained from the expected results, and a general interpretation of what the testing results mean. The evaluator shall determine whether the product's protection properties, as described in the product documentation, and all relevant known penetration flaws have been tested. The evaluator shall assess testing results to determine whether the product's TCB works as claimed, and whether there are any remaining obvious ways (i.e., ways that are known, or that are readily apparent or easily discovered in product documentation) for an unauthorized user to bypass the policy implemented by the TCB or otherwise defeat the product's TCB. 4.18 Independent Testing Independent testing determines whether the product's TCB meets the functional protection requirements as defined in the functionality chapter of this Protection Profile. Testing is based on operational product, the TCB's functional properties, the product's operational support guidance, and other producer's documentation as defined by the Development Evidence requirements. For CS3, IT-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. IT-1: Elementary Independent Testing A tester, independent of the producer or evaluator, shall perform functional and elementary penetration testing. This testing shall be based on the product's user and administrative documentation, and on relevant known penetration flaws. Satisfactory completion consists of demonstrating that all user-visible security enforcing functions and security-relevant functions work as described in the product's user and administrative documentation and that no discrepancies exist between the documentation and the product. Test results of the producer shall be confirmed by the results of independent testing. The evaluator may selectively reconfirm any test result. If the independent testing is performed at beta- test sites, the producer shall supply the beta- test plan and the test results. The evaluator shall review the scope and depth of beta testing with respect to the required protection functionality, and shall verify independence of both the test sites and the producer's and beta- test user's test results. The evaluator shall confirm that the test environment of the beta-test site(s) adequately represents the environment specified in the protection profile. 4.19 Development Environment Review Development environment review determines whether the product meets the requirements as defined in the protection profile's Development Assurance subsections for Development Environment including Life-Cycle Definition and Configuration Management. For CS3, DER-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. DER-1: Elementary Development Environment Review The evaluator shall review the producer's development and maintenance process description documentation to determine the degree of discipline enforced upon and within the process, and to determine the protection characteristics associated with the product's development and maintenance. The results of this review shall establish, for the evaluator, the producer's development environment, its policies, and the degree of enforcement maintained during development execution. 4.20 Operational Support Review Operation support review establishes the level of review required to determine whether the product meets the requirements as defined in the protection profile's Development Assurance subsections for Operational Support including, at the CS3 level, the User and Administrative Guidance documents. For CS3, OSR-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. OSR-1 Elementary Operational Support Review The evaluator shall review all documentation focused on the activities of product use (e.g., Users Manuals) and product administration including installation, operation, maintenance, and trusted recovery (e.g., Trusted Facility Management Manuals). This review shall assess the clarity of presentation, difficulty in locating topics of interest, ease of understanding, and completeness of coverage. The need for separate manuals dedicated to protection-relevant aspects of the product should be assessed for effectiveness. This component should also address flaw remediation and trusted generation. [[TBD.]] 4.21 Design Analysis Design analysis determines whether the product meets the design requirements as defined in the Development Process Assurance section of the protection profile, including the TCB Property Definition and TCB Design requirements. The analysis is based on the producer's documentation, as defined by the Development Evidence requirements. For CS3, DA-1 was assigned from the Federal Criteria. No refinements were made from the Federal Criteria. DA-1: Elementary Design Analysis The evaluator shall determine whether the producer has performed the activities defined in the development process assurance requirements of the protection profile for TCB property definition and TCB design. The evaluator shall determine whether the producer has documented these activities as defined in the development evidence requirements of the protection profile. The evaluator shall analyze the results of the producer's activities for completeness and consistency of design with respect to requirements. CSR References 1. U.S. Department of Defense Trusted Computer System Evaluation Criteria (TCSEC), DoD 5200.28-STD, December 1985. 2. Information Technology Security Evaluation Criteria (ITSEC) - Provisional Harmonized Criteria, Version 1.2, June 1991. 3. Bellcore Standard Operating Environment Security Requirements, TA-STS-001080, Issue 2, June, 1991. 4. Commercial International Security Requirements (CISR), Cutler, K. and Jones, F., Final Draft, September 9, 1991. 5. Computers at Risk - Safe Computing in the Information Age, National Research Council, National Academy Press, 1991. 6. Information Technology - Open Systems Interconnection - Security Frameworks in Open Systems - Part 2: Authentication Framework, Draft International Standard DIS 10181-2, International Organization for Standardization, 13 May 1991 7. Assessing Federal and Commercial Information Security Needs, Ferraiolo, D., Gilbert, D., and Lynch, N., NIST Draft Internal Report, September 1992. 8. Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security, Willis Ware, Editor, R-609-1, 1970, Reissued October 1979. 9. Information Processing Systems - Open Systems Interconnection Reference Model - Part 2: Security Architecture, International Standard ISO 7498-2, International Organization for Standardization, 1988 10. Minimum Security Requirements for Multi-User Operating Systems: A Protection Profile for the U.S. Information Security Standard, National Institute of Standards and Technology, 1992 draft. 11. U.S. Information Technology Security Standard. 12. Role-Based Access Controls, Ferraiolo, D. and Kuhn, R., 15th National Computer Security Conference, October 1992. 13. A Comparison of Commercial and Military Computer Security Policies, IEEE Symposium on Computer Security and Privacy, April 1987. DRAFT LABEL BASED PROTECTION FOR MULTI-USER INFORMATION SYSTEMS LEVEL 1 (LP-1) A Protection Profile Derived from the Federal Criteria for IT Security Version 1.0 December 1992 This document is undergoing review and is subject to modification or withdrawal. The contents of this document should not be referenced in other publications. Supersedes the Trusted Computer System Evaluation Criteria Class B1 DRAFT LABEL-BASED PROTECTION - 1 (LP-1) This Protection Profile has been developed to define a set of technical measures that can be incorporated into remote- access, resource- and information-sharing Information Technology (IT) products that will be used to protect two or more compartments of National Security Information classified according to US Executive Order 12356 (EO 12356). This profile can also be used to protect any information that has been designated as sensitive information for which information separation and access are based on sensitivity markings applied to the information. Compliant IT products will provide protection for a compartmented information processing environment with which an organization can construct an automated information system to enhance or optimize the organization's ability to perform its mission. In LP-1 conformant systems, the TCB is based on a multi-level security policy model for confidentiality that requires both discretionary and non-discretionary access controls. In relation to lower levels of protection functionality, LP-1 conformat systems have the following additional features. a. Access control enforcement includes a defined subset of subjects and objects in the ADP system. b. An informal statement of the security policy model, data labeling, and mandatory access control over named subjects and objects is included. c. The supported labels accurately represent the sensitivity of objects and subjects, and are maintained on exported objects. d. Any flaws identified by testing are removed or neutralized. Cross References: o Existing Criteria: (1) TCSEC: B1 (2) ITSEC (3) CTCPEC o Other Protection Profiles (1) TBD COMPONENT SUMMARY: LP-1 Functional Component Summary .--------------------------------------------. | | Code & | | Functional Component | Level | |============================================| | Security Policy Support | |----------------------------------+---------| | Accountability | | |----------------------------------+---------| | Identification&Authentication | I&A-2 | |----------------------------------+---------| | System Entry | ---- | |----------------------------------+---------| | Trusted Path | ---- | |----------------------------------+---------| | Audit | AD-1 | |----------------------------------+---------| | Access Control | AC-2 | |----------------------------------+---------| | Discretionary | AC-2 | |----------------------------------+---------| | Non-Discretionary | AC-2 | |----------------------------------+---------| | Covert Channel Handling | ----- | |----------------------------------+---------| | Availability | ---- | |----------------------------------+---------| | Resource Allocation | ---- | |----------------------------------+---------| | Fault Tolerance | ---- | |----------------------------------+---------| | Security Mgmt. | ---- | |----------------------------------+---------| | Reference Mediation | RM-1 | |----------------------------------+---------| | TCB Logical Protection | P-1 | |----------------------------------+---------| | TCB Physical Protection | ---- | |----------------------------------+---------| | TCB Self-checking | SC-1 | |----------------------------------+---------| | TCB Start-Up and Recovery | ---- | |----------------------------------+---------| | TCB Privileged Operation | ---- | |----------------------------------+---------| | TCB Ease-of-Use | ---- | `--------------------------------------------' LP-1 Assurance Component Summary .---------------------------------------. | Assurance Components | T2 | |================================|======| | Development Assurance Components | |=======================================| | Development Process | |--------------------------------+------| | TCB Property Definition | PD-2 | |--------------------------------+------| | TCB Design | |--------------------------------+------| | TCB Element Identification | ID-2 | |--------------------------------+------| | TCB Interface Definition | IF-1 | |--------------------------------+------| | TCB Modular Decomposition | ---- | |--------------------------------+------| | TCB Structuring Support | SP-1 | |--------------------------------+------| | TCB Design Disciplines | ---- | |--------------------------------+------| | TCB Implementation Support | ---- | |--------------------------------+------| | TCB Testing and Analysis | |--------------------------------+------| | Functional Testing | FT-1 | |--------------------------------+------| | Penetration Analysis | ---- | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Operational Support | |--------------------------------+------| | User Security Guidance | UG-1 | |--------------------------------+------| | Administrative Guidance | AG-1 | |--------------------------------+------| | Trusted Generation | TG-1 | |--------------------------------+------| | Development Environment | |--------------------------------+------| | Life Cycle Definition | ---- | |--------------------------------+------| | Configuration Management | ---- | |--------------------------------+------| | Trusted Distribution | ---- | |--------------------------------+------| | Development Evidence | |--------------------------------+------| | TCB Protection Properties | EPP2 | |--------------------------------+------| | Product Development | EPD1 | |--------------------------------+------| | Product Testing & Analysis | |--------------------------------+------| | Functional Testing | EFT1 | |--------------------------------+------| | Penetration Analysis | ---- | |--------------------------------+------| | Covert Channel Analysis | ---- | |--------------------------------+------| | Product Support | EPS1 | `---------------------------------------' |=======================================| | Evaluation Assurance Components | |=======================================| | Testing | |--------------------------------+------| | Test Analysis | TA-1 | |--------------------------------+------| | Independent Testing | IT-1 | |--------------------------------+------| | Review | |--------------------------------+------| | Development Environment | ---- | |--------------------------------+------| | Operational Support | OSR1 | |--------------------------------+------| | Analysis | |--------------------------------+------| | Protection Properties | ---- | |--------------------------------+------| | Design | ---- | |--------------------------------+------| | Implementation | ---- | `---------------------------------------' RATIONALE 1. Information Protection Policy It is anticipated that organizations wishing to process compartmented-mode classified information will want to use IT products that are compliant with this profile in their automated information processing systems. These organizations should be able to trust the profile-compliant IT product to contribute to the protection of the compartmented information at least as much as they trust the properly cleared personnel who are using and managing the system. 2. Protection Philosophy This profile presumes an environment providing control of access to shared resources both (1) on the basis of attributes that are controlled by the ordinary users of the system and (2) on the basis of attributes that are controlled only by the system administrators. Profile compliant IT products will minimally meet the following objectives: a. Enforce an informally defined security policy that describes the rules for accessing and administering access controls. b. Associate explicit sensitivity labels with a defined subset of the system entities. Associate explicit sensitivity labels with each port through which information may be exported from or imported to the system. Maintain the accuracy of the access control labels as information moves within the system and through the ports. c. Authenticate the claimed identity of each external human user of the IT product prior to establishing any internal entity to act on behalf of that user and firmly bind the authenticated user identity to the internal entity. d. Selectively keep and protect a log of all actions or events that could affect system security so that they can be accurately attributed to the known user or system entity responsible for causing the action or event. 3. Expected Threats The requirements for profile conforming IT products assume that these products are being used in an environment where there are multiple categories of classified data and users. A conforming IT product can be expected to protect the confidentiality of information in an environment where there are two or more levels of classified data and two or more levels of cleared users, but where malicious applications programs (e.g., Trojan Horses) and users are not present. 4. Assumed Environment 4.1 Characteristics IT products complying with the requirements set forth in this profile are expected to be used in an environment with the following characteristics: a. Multiple users will be accessing the operating system at the same time. b. The IT product hardware base (e.g., CPU, printers, terminals, etc.) is protected from unauthorized physical access. c. One or more administrators are assigned to manage the system in which the IT product is incorporated, including the security of the information it contains. d. A need to control user access to objects exists and is based on an explicit sensitivity marking associated with the information (e.g, Confidential, Secret or Top Secret) and on that user's identity and membership in organizations or groups. e. The IT product provides facilities for some or all of the authorized users to create programs that use the applications programming interface (API) and make those programs available to other users. f. The IT product is used to provide a cooperative environment for the users to accomplish some task or group of tasks. 4.2 Environment Dependencies Secure installation and operation of a product satisfying these profile requirements depends on provision of a number of elements in the installation environment. These include: a. Physical security must be provided. b. Cabling to other devices must be shown to be consistent with policy implemented by the product. For example, a "port" in the product is required to have an assigned label. No device can be connected to the port unless it has been established externally that the device is allowed to receive data with the same label. c. Personnel allowed to access data processed by the installed product must already be authorized for such access. 5. Intended Use Conforming IT products are useful in both general-purpose office automation environments with multiple data sensitivities and in specialized computing, network and mission environments. Examples of the office automation environment might include military headquarters and highly competitive procurement offices. An example of the specialized mission environment might be as a platform for a portable battlefield map and mission management application. FUNCTIONAL REQUIREMENTS I&A-2 Identification, Authentication, and Authorization 1. The TCB shall require users to identify themselves to it before beginning to perform any other actions that the TCB is expected to mediate. The TCB shall be able to enforce individual accountability by providing the capability to uniquely identify each individual user. The TCB shall also provide the capability of associating this identity with all auditable actions taken by that individual. 2. The TCB shall maintain authentication data that includes information for verifying the identity of individual users (e.g., passwords) as well as information for determining the clearance and authorization of individual users. These data shall be used by the TCB to authenticate the user's identity and to ensure that the subject security level and authorizations of subjects external to the TCB that may be created to act on behalf of the individual user are dominated by the clearance and authorization of that user). 3. The TCB shall protect authentication data so that it cannot be used by any unauthorized user. AD-1 - Minimal Audit 1. The TCB shall be able to create, maintain, and protect from modification or unauthorized access or destruction an audit trail of accesses to the objects it protects. The audit data shall be protected by the TCB so that read access to it is limited to those who are authorized for audit data. 2. The TCB shall be able to record the following types of events: - use of the identification and authentication mechanisms; - introduction of objects into a user's address space (e.g., file open, program initiation), and deletion of objects; - actions taken by computer operators and system administrators and/or system security officers. The TCB shall be able to record any override of human-readable output markings. 3. For each recorded event, the audit record shall identify: date and time of the event, user, type of event, and success or failure of the event. For identification/authentication events the origin of request (e.g., terminal ID) shall be included in the audit record. For events that introduce an object into a user's address space and for object deletion events the audit record shall include the name and the object security level. 4. The system administrator shall be able to selectively audit the actions of one or more users based on individual identity and/or object security level. AC-2 Basic Access Control 1. Definition of Access Control Attributes The TCB shall define and protect access control attributes for subjects and objects. Subject attributes shall include named individuals or defined groups or both. Object attributes shall include defined access rights (e.g., read, write, execute) that can be assigned to subject attributes. Access control attributes corresponding to each individual policy shall be identified. Sensitivity labels associated with each subject and object shall be maintained by the TCB. The sensitivity labels shall be used as the basis for mandatory access control decisions. The subjects and objects shall be assigned sensitivity labels that are a combination of hierarchical classification levels and non- hierarchical categories, and the labels shall be used as the basis for mandatory access control decisions. The TCB shall be able to support two or more such security levels. The subject and object attributes shall accurately reflect the sensitivity and integrity of the subject or object. When exported by the TCB, sensitivity labels shall accurately and unambiguously represent the internal labels and shall be associated with the information being exported. 2. Administration of Access Control Attributes The TCB shall define and enforce rules for assignment and modification of access control attributes for subjects and objects. The effect of these rules shall be that access permission to an object by users not already possessing access permission is assigned only by authorized users. These rules shall allow authorized users to specify and control sharing of objects by named individuals or defined groups of individuals, or by both, and shall provide controls to limit propagation of access rights. These controls shall be capable of including or excluding access to the granularity of a single user. The rules for assignment and modification of access control attributes shall include those for attribute assignment to objects during import and export operations. Export of Labeled Information The TCB shall designate each communication channel and I/O device as either single-level or multilevel. Any change in this designation shall be done manually and shall be auditable by the TCB. The TCB shall maintain and be able to audit any change in the security level or levels associated with a communication channel or I/O device. 1. Exportation to Multilevel Devices When the TCB exports an object to a multilevel I/O device, the sensitivity label associated with that object shall also be exported and shall reside on the same physical medium as the exported information and shall be in the same form (i.e., machine-readable or human-readable form). When the TCB exports or imports an object over a multilevel communication channel, the protocol used on that channel shall provide for the unambiguous pairing between the sensitivity labels and the associated information that is sent or received. 2. Exportation to Single-Level Devices Single-level I/O devices and single-level communication channels are not required to maintain the sensitivity labels of the information they process. However, the TCB shall include a mechanism by which the TCB and an authorized user reliably communicate to designate the single security level of information imported or exported via single-level communication channels or I/O devices. 3. Labeling Human-Readable Output The system administrator shall be able to specify the printable label names associated with exported sensitivity labels. The TCB shall mark the beginning and end of all human-readable, paged, hardcopy output (e.g., line printer output) with human-readable sensitivity labels that properly represent the sensitivity of the output. The TCB shall, by default, mark the top and bottom of each page of human-readable, paged, hardcopy output (e.g., line printer output) with human- readable sensitivity labels that properly represent the overall sensitivity of the output or that properly represent the sensitivity of the information on the page. The TCB shall, by default and in an appropriate manner, mark other forms of human-readable output (e.g., maps, graphics) with human-readable sensitivity labels that properly represent the sensitivity of the output. Any override of these marking defaults shall be auditable by the TCB. Import of Non-labeled Data In order to import non-labeled data, the TCB shall request and receive from an authorized user the security level of the data, and all such actions shall be auditable by the TCB. If different rules of assignment and modification of access control attributes apply to different subjects and/or objects, the totality of these rules shall be shown to support the defined policy. 3. Authorization of Subject References to Objects The TCB shall define and enforce authorization rules for the mediation of subject references to objects. These rules shall be based on the access control attributes of subjects and objects. These rules shall, either by explicit user action or by default, provide that objects are protected from unauthorized access. The authorization rules for the mandatory access control policy shall include: The TCB shall enforce a mandatory access control policy over all subjects and storage objects under its control (e.g., processes, files, segments, devices). The following requirements shall hold for all accesses between all subjects and objects controlled by the TCB: A subject can read an object only if the hierarchical classification in the subject's security level is greater than or equal to the hierarchical classification in the object's security level and the non- hierarchical categories in the subject's security level include all the non-hierarchical categories in the object's security level. A subject can write an object only if the hierarchical classification in the subject's security level is less than or equal to the hierarchical classification in the object's security level and all the non-hierarchical categories in the subject's security level are included in the non-hierarchical categories in the object's security level. The scope of the authorization rules shall include a defined subset of the product's subjects and objects and associated access control attributes. The coverage of authorization rules shall specify the types of objects and subjects to which these rules apply. If different rules apply to different subjects and objects, the totality of these rules shall be shown to support the defined policy. The authorization rules for each policy shall be defined separately. The TCB shall define and enforce the composition of policies, including the enforcement of the authorization rules (e.g., subject and object type coverage, enforcement precedence). 4. Subject and Object Creation and Destruction The TCB shall control the creation and destruction of subjects and objects. These controls shall include object reuse. That is, all authorizations to the information contained within a storage object shall be revoked prior to initial assignment, allocation or reallocation to a subject from the TCB's pool of unused storage objects; information, including encrypted representations of information, produced by a prior subjects' actions shall be unavailable to any subject that obtains access to an object that has been released back to the system. RM-1 Mediation of References to a Defined Subject/Object Subset 1. The TCB shall mediate all references to subjects, objects, resources, and services (e.g., TCB functions) described in the TCB specifications. The mediation shall ensure that all references are directed to the appropriate security-policy functions. 2. Reference mediation shall include references to the defined subset of subjects, objects, and resources protected under the TCB security policy, and to their policy attributes (i.e., access rights, security levels). 3. References issued by privileged subjects shall be mediated in accordance with the policy attributes defined for those subjects. P-1 Basic TCB Isolation The TCB shall maintain a domain for its own execution that protects it from external interference and tampering (e.g., by reading or modification of its code and data structures). The protection of the TCB shall provide TCB isolation and noncircumventability of TCB isolation functions as follows: 1. TCB Isolation requires that (1) the address spaces of the TCB and those of unprivileged subjects are separated such that users, or unprivileged subjects operating on their behalf, cannot read or modify TCB data structures or code, (2) the transfers between TCB and non-TCB domains are controlled such that arbitrary entry to or return from the TCB are not possible; and (3) the user or application parameters passed to the TCB by addresses are validated with respect to the TCB address space, and those passed by value are validated with respect to the values expected by the TCB. 2. Noncircumventability of TCB isolation functions requires that the permission to objects (and/or to non-TCB data) passed as parameters to the TCB are validated with respect to the permissions required by the TCB, and references to TCB objects implementing TCB isolation functions are mediated by the TCB. SC-1 Minimal Self Checking Hardware and/or software features shall be provided that can be used to periodically validate the correct operation of the on-site hardware and firmware elements of the TCB. ASSURANCES Requirements for TCB Property Definition PD-2 Informal Property Identification The developer shall provide informal models for the functional components and sub-components of the profile. At a minimum, an informal model of the access control components shall be provided. Each informal model shall include (abstract) data structures and operations defining each functional component or sub-component, and a description of the model properties. The developer shall interpret (e.g., trace) the informal models within the product TCB. For each model entity, the developer shall: (1) identify the TCB elements and their TCB interfaces (if any) that implement that entity; (2) define the operation of these TCB elements, and (3) explain why the operation of these elements is consistent with the model properties. The developer's interpretation of each informal model, which defines the TCB properties, shall identify all TCB elements that do not correspond to any model entity and shall explain why these elements do not render the TCB properties invalid. For the components that are not informally modeled, the developer shall interpret the functional requirements of the protection profile within the product TCB. For each functional requirement, the developer shall: (1) identify the TCB elements and their TCB interfaces (if any) that implement that requirement; (2) describe the operation of these TCB elements, and (3) explain why the operation of these elements is consistent with the functional requirement. The developer's interpretation of each functional requirement, which describes the TCB properties, shall identify all TCB elements that do not correspond to any functional requirement and shall explain why these elements do not render the TCB properties invalid. Requirements for TCB Element Identification ID-2: TCB Element Justification The developer shall identify the TCB elements (i.e., software, hardware/firmware code and data structures). Each element must be unambiguously identified by its name, type, release, and version number (if any). The developer shall justify the protection relevance of the identified elements (i.e., only elements that can affect the correct operation of the protection functions shall be included in the TCB). Requirements for TCB Interface Definition IF-1: Interface Description The developer shall describe all external (e.g., command, software, and I/O) administrative (i.e., privileged) and non-administrative interfaces to the TCB. The description shall include those components of the TCB that are implemented as hardware and/or firmware if their properties are visible at the TCB interface. The developer shall identify all call conventions (e.g., parameter order, call sequence requirements) and exceptions signaled at the TCB interface. Requirements for TCB Structuring Support SP-1: Process Isolation The TCB shall maintain process isolation. Requirements for Developer Functional Testing FT-1: Conformance Testing The developer shall test the TCB interface to show that all claimed protection functions work as stated in the TCB interface description. The developer shall correct all flaws discovered by testing and shall retest the TCB until the protection functions are shown to work as claimed. Requirements for User Guidance UG-1: Users' Guide The developer shall provide a User Guide which describes all protection services provided and enforced by the TCB. The User Guide shall describe the interaction between these services and provide examples of their use. The User Guide may be in the form of a summary, chapter or manual. The User Guide shall specifically describe user responsibilities. These shall encompass any user responsibilities identified in the protection profile. Requirements for Administrative Guidance AG-1: Basic Administrative Guidance The developer shall provide a Trusted Facility Manual intended for the product administrators that describes how to use the TCB security services (e.g., Access Control, System Entry, or Audit) to enforce a system security policy. The Trusted Facility Manual shall include the procedures for securely configuring, starting, maintaining, and halting the TCB. The Trusted Facility Manual shall explain how to analyze audit data generated by the TCB to identify and document user and administrator violations of this policy. The Trusted Facility Manual shall explain the privileges and functions of administrators. The Trusted Facility Manual shall describe the administrative interaction between security services. The Trusted Facility Manual shall be distinct from User Guidance, and encompass any administrative responsibilities identified in security management. Requirements for Trusted Generation TG-1: Basic Trusted Generation The developer shall establish and document the procedures that a consumer must perform to generate an operational TCB from the delivered copy of the master TCB. The consumer documentation shall identify any system parameters, which are initialized or set during system generation, that affect the TCB's conformance to the protection profile and state the acceptable ranges of values for those parameters. Requirements for Evidence of TCB Protection Properties EPP-2 Evidence of Informal Model Interpretation in the TCB The developer shall provide documentation which describes the correspondence between the functional component requirements and the TCB elements and interfaces. The developer shall also provide an informal access control model and its interpretation within the TCB. The TCB properties, which are defined by this correspondence, shall be explained in this documentation. Requirements for Evidence of Product Development EPD-1: Description Of The TCB External Interface The developer shall provide an accurate description of the functions, effects, exceptions and error messages visible at the TCB interface. The developer shall provide a list of the TCB elements (hardware, software, and firmware). Requirements for Evidence of Functional Testing EFT-1: Evidence of Conformance Testing The developer shall provide evidence of the functional testing that includes the test plan, the test procedures and the results of the functional testing. Requirements for Evidence of Product Support EPS-1: Evidence of Basic Product Support The developer shall provide evidence that describes the policies, procedures, and plans established by the developer to satisfy the Operational Support and Development Environment requirements of the protection profile. Requirements for Test Analysis TA-1: ElementaryTest Analysis The evaluator shall assess whether the producer has performed the activities defined in the development assurance requirements of the protection profile for functional testing and whether the producer has documented these activities as defined in the development evidence requirements of the protection profile. The evaluator shall analyze the results of the producer's testing activities for completeness of coverage and consistency of results. The evaluator shall determine whether the product's protection properties, as described in the product documentation have been tested. The evaluator shall assess testing results to determine whether the product's TCB works as claimed. Requirements for Independent Testing T-1: Elementary Independent Testing A tester, independent of the producer or evaluator, shall perform functional and elementary penetration testing. This testing shall be based on the product's user and administrative documentation, and on relevant known penetration flaws. Satisfactory completion consists of demonstrating that all user-visible security enforcing functions and security-relevant functions work as described in the product's user and administrative documentation and that no discrepancies exist between the documentation and the product. Test results of the producer shall be confirmed by the results of independent testing. The evaluator may selectively reconfirm any test result. If the independent testing is performed at beta- test sites, the producer shall supply the beta- test plan and the test results. The evaluator shall review the scope and depth of beta testing with respect to the required protection functionality, and shall verify independence of both the test sites and the producer's and beta- test user's test results. The evaluator shall confirm that the test environment of the beta-test site(s) adequately represents the environment specified in the protection profile. Requirements for Operational Support Review OSR-1 Elementary Operational Support Review The evaluator shall review all documentation focused on the activities of product use (e.g., Users Manuals) and product administration including installation, operation, maintenance, and trusted recovery (e.g., Trusted Facility Management Manuals). This review shall assess the clarity of presentation, difficulty in locating topics of interest, ease of understanding, and completeness of coverage. The need for separate manuals dedicated to protection-relevant aspects of the product should be assessed for effectiveness. DRAFT LABEL BASED PROTECTION FOR MULTI-USER INFORMATION SYSTEMS LEVEL 2 (LP-2) A Protection Profile Derived from the Federal Criteria for IT Security Version 1.0 December 1992 This document is undergoing review and is subject to modification or withdrawal. The contents of this document should not be referenced in other publications. Supersedes the Trusted Computer System Evaluation Criteria Class B2 DRAFT LABEL-BASED PROTECTION - 2 (LP-2) This Protection Profile has been developed to define a set of technical measures that can be incorporated into remote- access, resource- and information-sharing Information Technology (IT) products that will be used to protect up to three levels or more than two categories of National Security Information classified according to US Executive Order 12356 (EO 12356). This profile can also be used to protect any information that has been designated as sensitive information for which information separation and access are based on sensitivity markings applied to the information. Compliant IT products will provide structured protection for a multi-level information processing environment with which an organization can construct an automated information system to enhance or optimize the organization's ability to perform its mission. In LP-2 conformant systems, the TCB is based on a clearly defined and documented formal security policy model for confidentiality that requires both discretionary and non- discretionary access controls. Also, The TCB is relatively resistant to penetration. In relation to lower levels of protection functionality, LP-2 conformat systems have the following additional features. a. Access control enforcement is extended to all subjects and objects in the ADP system. b. Covert storage channels are identified and handled. c. The TCB is modularized and carefully structured into protection-critical and non-protection-critical. d. The TCB interface is well-defined and the TCB design and implementation enables it to be subjected to thorough testing and review. Penetration testing is also performed, and the TCB must be found relatively resistant to penetration. e. Authentication mechanisms cover all policy attributes of a user (e.g., groups, secrecy and/or integrity levels, roles), not just the individual identity. f. Security management is enhanced by the separation of system administrator and operator functions. g. Configuration management controls are imposed. Cross References: o Existing Criteria: (1) TCSEC: B2 (2) ITSEC (3) CTCPEC o Other Protection Profiles (1) TBD COMPONENT SUMMARY: LP-2 Functional Component Summary .--------------------------------------------. | | Code & | | Functional Component | Level | |============================================| | Security Policy Support | |----------------------------------+---------| | Accountability | | |----------------------------------+---------| | Identification uthentication | I&A-2 | |----------------------------------+---------| | System Entry | ---- | |----------------------------------+---------| | Trusted Path | TP-1 | |----------------------------------+---------| | Audit | AD-1 | |----------------------------------+---------| | Access Control | AC-3 | |----------------------------------+---------| | Discretionary | AC-3 | |----------------------------------+---------| | Non-Discretionary | AC-3 | |----------------------------------+---------| | Covert Channel Handling | CCH-2 | |----------------------------------+---------| | Availability | ---- | |----------------------------------+---------| | Resource Allocation | ---- | |----------------------------------+---------| | Fault Tolerance | ---- | |----------------------------------+---------| | Security Mgmt. | SM-1+ | |----------------------------------+---------| | Reference Mediation | RM-3 | |----------------------------------+---------| | TCB Logical Protection | P-2 | |----------------------------------+---------| | TCB Physical Protection | ---- | |----------------------------------+---------| | TCB Self-checking | SC-1 | |----------------------------------+---------| | TCB Start-Up and Recovery | ---- | |----------------------------------+---------| | TCB Privileged Operation | PO-2 | |----------------------------------+---------| | TCB Ease-of-Use | ---- | `--------------------------------------------' LP-2 Assurance Component Summary .---------------------------------------. | Assurance Components | T5 | |================================|======| | Development Assurance Components | |=======================================| | Development Process | |--------------------------------+------| | TCB Property Definition | PD-3 | |--------------------------------+------| | TCB Design | |--------------------------------+------| | TCB Element Identification | ID-2 | |--------------------------------+------| | TCB Interface Definition | IF-2 | |--------------------------------+------| | TCB Modular Decomposition | MD-2 | |--------------------------------+------| | TCB Structuring Support | SP-2 | |--------------------------------+------| | TCB Design Disciplines | ---- | |--------------------------------+------| | TCB Implementation Support | IM-3 | |--------------------------------+------| | TCB Testing and Analysis | |--------------------------------+------| | Functional Testing | FT-3 | |--------------------------------+------| | Penetration Analysis | PA-2 | |--------------------------------+------| | Covert Channel Analysis | CCA1 | |--------------------------------+------| | Operational Support | |--------------------------------+------| | User Security Guidance | UG-1 | |--------------------------------+------| | Administrative Guidance | AG-2 | |--------------------------------+------| | Trusted Generation | TG-2 | |--------------------------------+------| | Development Environment | |--------------------------------+------| | Life Cycle Definition | LC-2 | |--------------------------------+------| | Configuration Management | CM-2 | |--------------------------------+------| | Trusted Distribution | ---- | |--------------------------------+------| | Development Evidence | |--------------------------------+------| | TCB Protection Properties | EPP3 | |--------------------------------+------| | Product Development | EPD3 | |--------------------------------+------| | Product Testing & Analysis | |--------------------------------+------| | Functional Testing | EFT3 | |--------------------------------+------| | Penetration Analysis | EPA2 | |--------------------------------+------| | Covert Channel Analysis | ECC1 | |--------------------------------+------| | Product Support | EPS2 | `---------------------------------------' |=======================================| | Evaluation Assurance Components | |=======================================| | Testing | |--------------------------------+------| | Test Analysis | TA-4 | |--------------------------------+------| | Independent Testing | IT-3 | |--------------------------------+------| | Review | |--------------------------------+------| | Development Environment | DER2 | |--------------------------------+------| | Operational Support | OSR2 | |--------------------------------+------| | Analysis | |--------------------------------+------| | Protection Properties | ---- | |--------------------------------+------| | Design | DA-2 | |--------------------------------+------| | Implementation | CI-1 | `---------------------------------------' RATIONALE 6. Information Protection Policy It is anticipated that organizations wishing to process either one level with three or more categories or one to three levels with one category of classified information will want to use IT products that are compliant with this profile in their automated information processing systems. These organizations should be able to trust the profile-compliant IT product to contribute to the protection of the classified information at least as much as they trust the properly cleared personnel who are using and managing the system. 7. Protection Philosophy This profile presumes a hostile environment with divided, aggressive users. It provides control of access to shared resources both (1) on the basis of attributes that are controlled by the ordinary users of the system and (2) on the basis of attributes that are controlled only by the system administrators. Profile compliant IT products will minimally meet the following objectives: a. Enforce a formally defined security policy that describes the rules for controlling access to system subjects and objects. Use the access control rules to enforce an information flow policy that aims to control the use of covert storage channels. b. Associate explicit sensitivity labels with each subject and object in the system. Associate explicit sensitivity labels with each port through which information may be exported from or imported to the system. Maintain the accuracy of the sensitivity labels as information moves within the system and through the ports. c. Authenticate the claimed identity of each external human user of the IT product prior to establishing any internal entity to act on behalf of that user and firmly bind the authenticated user identity to the internal entity. d. Selectively keep and protect a log of all actions or events (including use of covert storage channels) that could affect system security so that they can be accurately attributed to the known user or system entity responsible for causing the action or event. e. Contains hardware and software mechanisms that can be independently evaluated to provide sufficient assurance that the system satisfies the previous four objectives. f. Implements the enforcement of objectives in such a fashion that the enforcing mechanisms are protected from tampering and unauthorized changes by the entities these mechanisms are supposed to control. 8. Expected Threats The requirements for profile conforming IT products assume that these products are being used in an environment where there are different levels or categories of classified data and users of differing clearance levels. A conforming IT product can be expected to protect the confidentiality of information in an environment where there are two levels or categories of classified data and two or more levels of cleared users and where there are collaborating, malicious users and software at each clearance level. 9. Assumed Environment 9.1 Characteristics IT products complying with the requirements set forth in this profile are expected to be used in an environment with the following characteristics: a. Multiple users will be accessing the operating system at the same time. b. The IT product hardware base (e.g., CPU, printers, terminals, etc.) is protected from unauthorized physical access. c. One or more administrators are assigned to manage the system in which the IT product is incorporated, including the security of the information it contains. d. A need to control user access to information exists and is based on an explicit sensitivity marking associated with the information (e.g, Secret or Top Secret). e. A need to control user access to all subjects and objects exists and is based on that user's identity and membership in organizations or groups. f. The IT product provides facilities for some or all of the authorized users to create programs that use the applications programming interface (API) and make those programs available to other users. g. The IT product is used to provide a cooperative environment for the users to accomplish some task or group of tasks. 9.2 Environment Dependencies Secure installation and operation of a product satisfying these profile requirements depends on provision of a number of elements in the installation environment. These include: a. Physical security must be provided. b. Cabling to other devices must be shown to be consistent with policy implemented by the product. For example, a "port" in the product is required to have an assigned label. No device can be connected to the port unless it has been established externally that the device is allowed to receive data with the same label. c. Personnel allowed to access data processed by the installed product must already be authorized for such access. 10. Intended Use Conforming IT products are useful in both general-purpose office automation environments with multiple data sensitivities (or "classifications") and multiple levels of user authorizations (or "clearances") and in specialized computing, network and mission environments. Examples of the office automation environment might include military headquarters and highly competitive procurement offices. Examples of the network environments include use as the basis for a multilevel secure network management center or a trusted guard gateway operating between two networks processing different levels of information. An example of the specialized mission environment might be as a platform for a portable battlefield map and mission management application. FUNCTIONAL REQUIREMENTS I&A-2 Identification, Authentication, and Authorization 1. The TCB shall require users to identify themselves to it before beginning to perform any other actions that the TCB is expected to mediate. The TCB shall be able to enforce individual accountability by providing the capability to uniquely identify each individual user. The TCB shall also provide the capability of associating this identity with all auditable actions taken by that individual. 2. The TCB shall maintain authentication data that includes information for verifying the identity of individual users (e.g., passwords) as well as information for determining the clearance and authorization of individual users. These data shall be used by the TCB to authenticate the user's identity and to ensure that the subject security level and authorizations of subjects external to the TCB that may be created to act on behalf of the individual user are dominated by the clearance and authorization of that user). 3. The TCB shall protect authentication data so that it cannot be used by any unauthorized user. TP-1 Login Trusted Path The TCB shall support a trusted communication path between itself and the user for initial identification and authentication. Communications via this path shall be initiated exclusively by a user. AD-1 - Minimal Audit 1. The TCB shall be able to create, maintain, and protect from modification or unauthorized access or destruction an audit trail of accesses to the objects it protects. The audit data shall be protected by the TCB so that read access to it is limited to those who are authorized for audit data. 2. The TCB shall be able to record the following types of events: - use of the identification and authentication mechanisms; - introduction of objects into a user's address space (e.g., file open, program initiation), and deletion of objects; - actions taken by computer operators and system administrators and/or system security officers. The TCB shall be able to record any override of human-readable output markings. The TCB shall also be able to audit the identified event that may be used in the exploitation of covert channels. 3. For each recorded event, the audit record shall identify: date and time of the event, user, type of event, and success or failure of the event. For identification/authentication events the origin of request (e.g., terminal ID) shall be included in the audit record. For events that introduce an object into a user's address space and for object deletion events the audit record shall include the name and the object security level. 4. The system administrator shall be able to selectively audit the actions of one or more users based on individual identity and/or object security level. AC-3 Extended Access Control 1. Definition of Access Control Attributes The TCB shall define and protect access control attributes for subjects and objects. Subject attributes shall include named individuals or defined groups or both. Object attributes shall include defined access rights (e.g., read, write, execute) that can be assigned to subject attributes. Access control attributes corresponding to each individual policy shall be identified. Sensitivity labels associated with each subject and storage object that is directly or indirectly accessible by subjects external to the TCB shall be maintained by the TCB. The sensitivity labels shall be used as the basis for mandatory access control decisions. The subjects and objects shall be assigned sensitivity labels that are a combination of hierarchical classification levels and non- hierarchical categories, and the labels shall be used as the basis for mandatory access control decisions. The TCB shall be able to support two or more such security levels. The subject and object attributes shall accurately reflect the sensitivity and integrity of the subject or object. When exported by the TCB, sensitivity labels shall accurately and unambiguously represent the internal labels and shall be associated with the information being exported. The TCB shall immediately notify a terminal user of each change in the security level associated with that user during an interactive session. A terminal user shall be able to query the TCB as desired for a display of the subject's complete sensitivity label. The TCB shall support the assignment of minimum and maximum security levels to all attached physical devices. These security levels shall be used by the TCB to enforce constraints imposed by the physical environments in which the devices are located. 2. Administration of Access Control Attributes The TCB shall define and enforce rules for assignment and modification of access control attributes for subjects and objects. The effect of these rules shall be that access permission to an object by users not already possessing access permission is assigned only by authorized users. These rules shall allow authorized users to specify and control sharing of objects by named individuals or defined groups of individuals, or by both, and shall provide controls to limit propagation of access rights. These controls shall be capable of including or excluding access to the granularity of a single user. The rules for assignment and modification of access control attributes shall include those for attribute assignment to objects during import and export operations. Export of Labeled Information The TCB shall designate each communication channel and I/O device as either single-level or multilevel. Any change in this designation shall be done manually and shall be auditable by the TCB. The TCB shall maintain and be able to audit any change in the security level or levels associated with a communication channel or I/O device. 1. Exportation to Multilevel Devices When the TCB exports an object to a multilevel I/O device, the sensitivity label associated with that object shall also be exported and shall reside on the same physical medium as the exported information and shall be in the same form (i.e., machine-readable or human-readable form). When the TCB exports or imports an object over a multilevel communication channel, the protocol used on that channel shall provide for the unambiguous pairing between the sensitivity labels and the associated information that is sent or received. 2. Exportation to Single-Level Devices Single-level I/O devices and single-level communication channels are not required to maintain the sensitivity labels of the information they process. However, the TCB shall include a mechanism by which the TCB and an authorized user reliably communicate to designate the single security level of information imported or exported via single-level communication channels or I/O devices. 3. Labeling Human-Readable Output The system administrator shall be able to specify the printable label names associated with exported sensitivity labels. The TCB shall mark the beginning and end of all human-readable, paged, hardcopy output (e.g., line printer output) with human-readable sensitivity labels that properly represent the sensitivity of the output. The TCB shall, by default, mark the top and bottom of each page of human-readable, paged, hardcopy output (e.g., line printer output) with human- readable sensitivity labels that properly represent the overall sensitivity of the output or that properly represent the sensitivity of the information on the page. The TCB shall, by default and in an appropriate manner, mark other forms of human-readable output (e.g., maps, graphics) with human-readable sensitivity labels that properly represent the sensitivity of the output. Any override of these marking defaults shall be auditable by the TCB. Import of Non-labeled Data In order to import non-labeled data, the TCB shall request and receive from an authorized user the security level of the data, and all such actions shall be auditable by the TCB. If different rules of assignment and modification of access control attributes apply to different subjects and/or objects, the totality of these rules shall be shown to support the defined policy. 3. Authorization of Subject References to Objects The TCB shall define and enforce authorization rules for the mediation of subject references to objects. These rules shall be based on the access control attributes of subjects and objects. These rules shall, either by explicit user action or by default, provide that objects are protected from unauthorized access. The scope of the authorization rules shall include all subjects, storage objects (e.g., processes, segments, devices) and associated access control attributes that are directly or indirectly accessible to subjects external to the TCB. The scope of the authorization rules shall also include all policy and status attributes of subjects and storage objects (e.g., quotas, object existence, size, access time, creation and modification time, locked/unlocked). If different rules apply to different subjects and objects, the totality of these rules shall be shown to support the defined policy. The authorization rules for the mandatory access control policy shall include: The TCB shall enforce a mandatory access control policy over all resources (i.e., subjects, storage objects, and I/O devices that are directly or indirectly accessible by subjects external to the TCB. The following requirements shall hold for all accesses between all subjects external to the TCB and all objects directly or indirectly accessible by these subjects: A subject can read an object only if the hierarchical classification in the subject's security level is greater than or equal to the hierarchical classification in the object's security level and the non- hierarchical categories in the subject's security level include all the non-hierarchical categories in the object's security level. A subject can write an object only if the hierarchical classification in the subject's security level is less than or equal to the hierarchical classification in the object's security level and all the non-hierarchical categories in the subject's security level are included in the non-hierarchical categories in the object's security level. The authorization rules for each policy shall be defined separately. The TCB shall define and enforce the composition of policies, including the enforcement of the authorization rules (e.g., subject and object type coverage, enforcement precedence). 4. Subject and Object Creation and Destruction The TCB shall control the creation and destruction of subjects and objects. These controls shall include object reuse. That is, all authorizations to the information contained within a storage object shall be revoked prior to initial assignment, allocation or reallocation to a subject from the TCB's pool of unused storage objects; information, including encrypted representations of information, produced by a prior subjects' actions shall be unavailable to any subject that obtains access to an object that has been released back to the system. CCH-2 Storage Channel Audit and Bandwidth Limitation 1. The TCB and privileged applications shall include functions that help audit the use of covert storage channels. These functions shall enable the identification of the transmitter, receiver, and specific covert channels used (e.g., TCB and privileged application element used to transmit information). TCB functions that help limit the bandwidth and/or eliminate covert storage channels shall also be provided. The bandwidth limits for each channel shall be settable by system administrators. 2. The functions added to the TCB and privileged applications for storage channel auditing shall be identified for each channel and shall be available in common product configurations. If audit functions are not added to certain storage channels (e.g., hardware storage channels), evidence must be provided to justify why these channels do not represent a security threat for the intended use of the product. TCB and privileged application functions that help limit the bandwidth and/or eliminate covert storage channels shall also be available in common product configurations. If channel bandwidth limitation and channel elimination functions are not added to certain storage channels (e.g., hardware storage channels), evidence must be provided to justify why these channels do not represent a security threat for the intended use of the product. SM-1 Minimal Security Management 1. The TCB shall provide an installation mechanism for the setting and updating of its configuration parameters, and for the initialization of its protection-relevant data structures before any user or administrator policy attributes are defined. It shall allow the configuration of TCB internal databases and tables. 2. The TCB shall provide protected mechanisms for displaying and modifying the security policy parameters. 3. The TCB shall provide protected mechanisms for manually displaying, modifying, or deleting user registration and account parameters. These parameters shall include unique user identifiers, their account, and their associated user name and affiliation. The TCB shall allow the manual enabling and disabling of user identities and/or accounts. 4. The TCB shall support separate operator and administrator functions. The operator functions shall be restricted to those necessary for performing routine operations. The operator functions shall allow the enabling and disabling of peripheral devices, mounting removable storage media, backing-up and recovering user objects; maintaining the TCB hardware and software elements (e.g., on-site testing); and starting and shutting down the system. [SM-3] 5. The use of the protected mechanisms for system administration shall be limited to authorized administrative users. RM-3 Mediation of References to Subject and Object Attributes 1. The TCB shall mediate all references to subjects, objects, resources, and services (e.g., TCB functions) described in the TCB specifications. The mediation shall ensure that all references are directed to the appropriate security-policy functions. 2. Reference mediation shall include control of references to all subjects, objects, and resources protected under the TCB security policy, to their policy (i.e., access rights, security levels) and status attributes (e.g., existence, length, locking state). 3. References issued by privileged subjects shall be mediated in accordance with the policy attributes defined for those subjects. P-2 TCB Isolation and Consistency The TCB shall maintain a domain for its own execution that protects it from external interference and tampering (e.g., by reading or modification of its code and data structures). The protection of the TCB shall provide TCB isolation and noncircumventability of TCB isolation functions as follows: 1. TCB Isolation requires that (1) the address spaces of the TCB and those of unprivileged subjects are separated such that users, or unprivileged subjects operating on their behalf, cannot read or modify TCB data structures or code, (2) the transfers between TCB and non-TCB domains are controlled such that arbitrary entry to or return from the TCB are not possible; and (3) the user or application parameters passed to the TCB by addresses are validated with respect to the TCB address space, and those passed by value are validated with respect to the values expected by the TCB. 2. Non-circumventability of TCB isolation functions requires that the permission to objects (and/or to non-TCB data) passed as parameters to the TCB are validated with respect to the permissions required by the TCB, and references to TCB objects implementing TCB isolation functions are mediated by the TCB. TCB protection shall also maintain the consistency of TCB global variables and eliminate undesirable dependencies of the TCB on unprivileged subject or user actions. 3. Consistency of TCB global variables requires that consistency conditions defined over TCB internal variables, objects, and functions hold before and after any TCB invocation. 4. Elimination of undesirable dependencies of the TCB on unprivileged subject actions requires that any TCB invocation by an unprivileged subject (or user) input to a TCB call may not place the TCB in a state such that it is unable to respond to communication initiated by other users. SC-1 Minimal Self Checking Hardware and/or software features shall be provided that can be used to periodically validate the correct operation of the on-site hardware and firmware elements of the TCB. PO-2 Privilege Association with TCB Modules 1. TCB privileges needed by individual functions, or groups of functions, of a functional component shall be identified. Privileged TCB calls or access to privileged TCB objects, such as user and group registration files, password files, security and integrity-level definition file, role definition file, audit-log file shall also be identified. It shall be possible to associate TCB privileges with TCB operations performed by administrative users. 2.The modules of a TCB function shall be associated only with the privileges necessary to complete their task. 3. Support for product privilege implementation and association with TCB modules provided by lower-level mechanisms or procedures (e.g., operating system, processors, language) shall be provided. ASSURANCES Requirements for TCB Property Definition PD-3 Property Specification by Model Interpretation The developer shall provide formal models for the functional components and sub-components of the profile. At a minimum, a formal model of the access control components shall be provided. The properties of the formal models shall be clearly stated. The developer shall provide an interpretation of the models in the DIS of the product's TCB. For each model entity, the developer shall: (1) identify the TCB elements and their DIS (if any) that implement that entity; (2) define the operation of these TCB elements, and (3) demonstrate, by coherent arguments, that the DIS of these elements is consistent with the model properties. The developer's interpretation of each formal model, which specifies the TCB properties, shall identify all TCB and DIS elements (if any) that do not correspond to any model entity and shall explain why these elements do not render the TCB properties invalid. An informal model of reference mediation and TCB protection shall be provided. For the components that are not modeled, the developer shall interpret the functional requirements of the protection profile within the product TCB. For each functional requirement, the developer shall: (1) identify the TCB elements and their TCB interfaces (if any) that implement that requirement; (2) describe the operation of these TCB elements, and (3) explain why the operation of these elements is consistent with the functional requirement. The developer's interpretation of each functional requirement, which describes the TCB properties, shall include all the TCB elements. Requirements for TCB Element Identification ID-2: TCB Element Justification The vendor shall identify the TCB elements (i.e., software, hardware/firmware code and data structures). Each element must be unambiguously identified by its name, type, release, and version number (if any). The developer shall justify the protection relevance of the identified elements (i.e., only elements that can affect the correct operation of the protection functions shall be included in the TCB). If protection-irrelevant elements are included in the TCB, the developer shall provide a rationale for such inclusion. Requirements for TCB Interface Definition IF-2: Interface Descriptive Specification The developer shall define all external (e.g., command, software, and I/O) administrative (i.e., privileged) and non-administrative interfaces to the TCB. The developer shall provide and maintain a descriptive interface specification (DIS) of the TCB that completely and accurately describes the TCB in terms of exceptions, error messages, and effects. The DIS shall identify the TCB call conventions (e.g., parameter order, call sequence requirements), and exceptions signaled. The DIS shall also include the TCB call identifier, parameter types (e.g., input, output), the effect of the call, TCB call conventions (e.g., parameter order, call sequence requirements), and exceptions handled and signaled. It shall be shown to be an accurate description of the TCB interface. The DIS shall include those components of the TCB that are implemented as hardware and/or firmware if their properties are visible at the TCB interface. If the TCB consists of a kernel and privileged processes, the developer shall separately identify and define the interfaces for the kernel and each privileged process. The TCB interface definition must also include all effects of a call including the direct visibility and alterability of internal TCB variables and functions. Requirements for Modular Decomposition MD-2: Module-level Decomposition The developer shall design the TCB as a small number (e.g., 10 to 100) of design and implementation subsystems that have well-defined functional relationships and shared-data dependencies. The developer shall identify the specific TCB protection functions (if any) associated with each subsystem and the TCB interfaces (if any) implemented by each subsystem. The developer shall design each subsystem as a set of modules. For each module, the developer shall describe: the role or purpose of the module, the set of related functions performed by the module, and the module interface (i.e., the set of invocable functions, calling conventions, parameters, global variables, and results). The developer shall identify the protection functions of, and describe the interfaces between, these modules. The developer shall choose the modules so that the set of functions implemented by the module, the module's contribution to the TCB protection properties, and the interface(s) to the module can be described concisely (e.g., the module shall have a single purpose). The TCB structuring into modules shall be based on well- defined module relationships; for example, the contains relation (e.g., A is part of B) or the "uses" relation (e.g., A is correct only if B is correct). Requirements for TCB Structuring Support SP-2: Support for Storage Objects The TCB shall maintain process isolation. The TCB shall separate those elements that are protection- critical from those that are not. Features in hardware, such as segmentation, shall be used to support logically distinct storage objects with separate access-control attributes (e.g., readable, writable). Requirements for Implementation Support IM-3: Module Correspondence Support The developer shall maintain engineering diagrams and source code (as applicable) for all TCB elements. The diagrams and source code for each module of the TCB shall be identified and provided as configuration items. Requirements for Developer Functional Testing FT-3: Specification-Driven TCB Interface Testing The developer shall test the TCB interface to show that all claimed protection functions work as stated in the TCB interface description or specification. The tests shall exercise the boundary conditions of the protection functions. The developer shall generate the test conditions and data from the Descriptive Interface Specification(s). The developer test procedures shall include the tests used to demonstrate the absence of all flaws discovered in previous versions of the TCB. The developer shall correct all flaws discovered by testing and shall retest the TCB to show that all discovered flaws have been eliminated, no new flaws have been introduced, and the protection functions work as claimed. Requirements for Penetration Analysis PA-2 Flaw-Hypothesis Testing The developer shall define the TCB configuration, interface, and protection functions that are subject to penetration testing. For each test, the developer shall identify the goal of the test and the criteria for successful penetration. The developer shall illustrate how, in addition to system reference manuals and TCB interface description, the DIS, source code, and hardware and firmware specifications are used to define penetration-test conditions. For each test, the developer shall document all test conditions, data (e.g., test set-up, function call parameters, and test outcomes), and coverage. The developer shall generate the test conditions from flaw-hypotheses derived by negating assertions of TCB design capabilities and by providing counter examples that show that these assertions are false. The developer shall confirm the flaw hypotheses by checking design and implementation documentation, by defining the test data and running test programs, or by referring to known classes of penetration flaws found in other TCBs. The refutation of any hypothesis shall be documented. For each uncovered flaw, the developer shall define and document scenarios of flaw exploitation and shall identify all penetration outcomes resulting from that scenario. The cause of the flaw shall be identified and documented. Requirements for Covert-Channel Analysis CCA-1 Analysis of Covert Storage Channels 1. Identification: The developer shall identify all sources of information used in covert-storage- channel analysis. These sources shall include TCB reference manuals and DIS. The developer shall define the identification method used. The developer shall demonstrate that the chosen identification method is sound (e.g., it leads to the discovery of all covert storage channels in the DIS or source documentation) and repeatable (i.e., independent evaluators can use the method on the same sources of covert-storage-channel information and can obtain the same results.) The developer shall define scenarios of use for each covert storage channel. 2. Bandwidth Measurement or Engineering Estimation: The developer shall define the method used for covert-storage-channel bandwidth estimation. In measuring TCB performance for covert-channel-bandwidth estimation, the developer shall satisfy the following assumptions. The maximum bandwidth estimation shall be based on the assumptions that the storage channel is noiseless, that the senders and receivers are not delayed by the presence of other processes in the product, and that the sender-receiver synchronization time is negligible. The choice of informal estimation methods shall define and justify the coding method and, therefore, the distribution of "0s" and "1s" in all transmissions. The developer shall select TCB primitives to be measured for bandwidth determination from real scenarios of covert-storage-channel use. The developer shall specify TCB measurement environment for the bandwidth measurements. This specification shall include: (1) the speed of the product functions, (2) the product configuration, (3) the sizes of the memory and cache components, and (4) the product initialization. The sensitivity of the measurement results to configuration changes shall be documented. The covert-storage-channel measurements shall include the fastest TCB function calls for altering, viewing, and setting up the transmission environment; the demonstrably fastest process (context) switch time shall also be included in the bandwidth measurements. All measurements shall be repeatable. 3. Covert Channel Testing: The developer shall test all the use of all identified covert storage channels to determine whether the handling functions work as intended. Requirements for User Guidance UG-1: Users' Guide The developer shall provide a User Guide which describes all protection services provided and enforced by the TCB. The User Guide shall describe the interaction between these services and provide examples of their use. The User Guide may be in the form of a summary, chapter or manual. The User Guide shall specifically describe user responsibilities. These shall encompass any user responsibilities identified in the protection profile. Requirements for Administrative Guidance AG-2: Detailed Administrative Guidance The developer shall provide a Trusted Facility Manual intended for the product administrators and operators that describes how to use the TCB security services (e.g., Access Control, System Entry, or Audit) to enforce a system security policy. The Trusted Facility Manual shall include the procedures for securely configuring, starting, maintaining, and halting the TCB. The Trusted Facility Manual shall explain how to analyze audit data generated by the TCB to identify and document user and administrator violations of this policy. The Trusted Facility Manual shall explain the unique security-relevant privileges and functions of administrators and operators. The Trusted Facility Manual shall describe the administrative interaction between security services. The Trusted Facility Manual shall identify all hardware, firmware, software, and data structures comprising the TCB. The detailed audit record structure for each type of audit event shall be described. The Trusted Facility Manual shall explain how configure the product to mitigate, eliminate, or audit covert channel exploitation.The Trusted Facility Manual shall describe the cautions about and procedures for using the TCB as a base for site-specific secure applications. The Trusted Facility Manual shall describe procedures for securely regenerating the TCB after any part is changed (e.g., due to adding devices or installing flaw corrections to the TCB software). The Trusted Facility Manual shall be distinct from User Guidance, and encompass any administrative responsibilities identified in security management. Requirements for Trusted Generation TG-2: Trusted Generation With Fail-Safe Defaults The developer shall establish and document the procedures that a consumer must perform to generate an operational TCB from the delivered copy of the master TCB. The consumer documentation shall identify any system parameters, which are initialized or set during system generation, that affect the TCB's conformance to the protection profile and state the acceptable ranges of values for those parameters. The product shall be delivered with each of these parameters set to its fail-safe defaults. Requirements for Life Cycle Process LC-2: Standardized Life Cycle Process The developer shall develop and maintain the product using a well defined, standardized engineering process. The developer shall explain why the process was chosen and how the developer uses it to develop and maintain the product. The process shall incorporate a security policy that states the technical, physical, procedural, personnel, and other measures used by the developer to protect the product and its documentation. The developer shall demonstrate that each development process and support process requirement of the protection profile is satisfied by some part, or parts, of the developer's process. The developer shall identify the programming languages used to develop the TCB software and reference the definitions of those languages. The developer shall identify any implementation dependent options of the programming language compiler(s) used to implement the TCB software. Requirements for Configuration Management CM-2: Automated Source Code Control The developer shall establish configuration control and generation procedures for developing and maintaining the TCB. The procedures shall be employed to ensure that changes to the TCB are consistent with the product's protection properties and security policy. The developer shall employ these procedures to track changes to development evidence, implementation data (e.g., source code and hardware diagrams), executable versions of the TCB, test documentation and procedures, identified flaws, and consumer documentation. The procedures shall include automated tools to control the software source code that comprises the TCB. The configuration control procedures shall assure a consistent mapping among documentation and code associated with the current version of the TCB and permit the regeneration of any supported version of the TCB. Requirements for Evidence of TCB Protection Properties EPP-3 Evidence of Formal Model Interpretation in the DIS The developer shall provide documentation which describes the correspondence between the functional component requirements and the TCB elements and interfaces. This documentation shall describe how the TCB implements the reference monitor concept. The developer shall also provide a formal access-control model and an informal reference mediation and TCB protection model. The TCB properties, which are defined by this correspondence and the interpretation of these models within the DIS of the TCB shall be documented by the product developer. Requirements for Evidence of Product Development EPD-3: Analysis Of The TCB External Interface The developer shall provide TCB Design Specifications that include: a list of the TCB elements (hardware, software, and firmware configuration items); a list of protection services provided to the TCB by hardware, software, and firmware that is not part of the TCB; an explanation of the techniques and criteria used during the modular decomposition of the TCB; a description of the policy allocations, functions, and interactions among the major TCB subsystems; and module level descriptions of all software and hardware in the TCB. The developer shall provide a Descriptive Interface Specification (DIS) that describes the functions, effects, exceptions and error messages visible at the TCB interface. The developer shall show that the DIS is an accurate representation of the TCB's external interfaces. The developer shall provide TCB Implementation Data consisting of the engineering diagrams for all hardware included in the TCB and the source code used to generate the TCB software and firmware. Requirements for Evidence of Functional Testing EFT-3: Evidence of Specification-Driven Testing The developer shall provide evidence of the functional testing that includes the test plan, the test procedures, and the results of the functional testing. The test, plans, procedures, and results shall be maintained under the same configuration control as the TCB software. The test plans shall identify the TCB specification used in the derivation of the test conditions, data, and coverage analysis. Requirements for Evidence of Penetration Analysis EPA-2: Evidence of Flaw-Hypothesis Generation and Testing The developer shall provide evidence of penetration testing. The penetration evidence shall identify all product documentation and development evidence on which the search for flaws was based. The penetration evidence shall describe the scenarios for exploiting each potential flaw in the system and the penetration test conditions, data (e.g., test set-up, function call parameters, and test outcomes), coverage, and conclusions derived from each scenario. The penetration evidence shall summarize both refuted and confirmed flaws hypothesis. Requirements for Evidence of Covert Channel Analysis ECC-1: Evidence of Covert Storage Channel Analysis and Handling The developer's documentation shall present the results of the covert-storage-channel analysis and the trade-offs involved in restricting these channels. All auditable events that may be used in the exploitation of known covert storage channels shall be identified. The developer shall provide the bandwidths of known covert-storage-channels whose use is not detectable by the auditing mechanism. The documentation of each identified storage channel shall consist of the variable that can be viewed/altered by the channel and the TCB interface functions that can alter or view that variable. The measurements of each TCB function call used by covert-storage channels must be documented and the bandwidth computation shall be included for each channel. The measurement environment should be documented as specified. Test documentation shall include results of testing the effectiveness of the methods used to reduce covert-storage-channel bandwidths. Requirements for Evidence of Product Support EPS-2: Evidence of Defined Product Support The developer shall provide documentation that defines the policies, procedures, plans, and tools established by the developer to satisfy the Operational Support and Development Environment requirements of the protection profile. Requirements for Test Analysis TA-4: Comprehensive Test Analysis The evaluator shall assess whether the producer has performed the activities defined in the development assurance requirements of the protection profile for functional testing and penetration analysis, and whether the producer has documented these activities as defined in the development evidence requirements of the protection profile. The evaluator shall analyze the results of the producer's testing activities for completeness of coverage and consistency of results, and general correctness (e.g., defect trend from regression testing). This analysis shall examine the testability of requirements, the adequacy of the tests to measure the required properties, the deviation of the actual results obtained from the expected results. The analysis shall extend to trace all defects identified, corrected, and retested. The analysis shall include an assessment of test coverage and completeness, and defect frequency. The results of testing shall be interpreted in terms that express product performance and protection adequacy. The evaluator shall determine whether the product's protection properties, as defined for all protection-relevant modules of the TCB, and all relevant known penetration flaws have been tested. The evaluator shall independently develop, test, and document additional flaw hypotheses. The evaluator shall assess testing results to determine whether the product's TCB works as claimed, that the TCB's implementation is consistent with the DIS, and whether there are any obvious ways (i.e., ways that are known, or that are readily apparent or easily discovered in product documentation) for an unauthorized user to bypass the policy implemented by the TCB or otherwise defeat the product's TCB, and whether all discovered TCB flaws have been corrected and no new TCB flaws introduced. No design flaws and no more than a few correctable implementation flaws may be found during testing and there shall be reasonable confidence that few remain. The testing results shall show that the methods used to reduce covert channel bandwidths have been effective for all evaluated configurations. The evaluator shall determine whether the product is relatively resistant to penetrations. Requirements for Independent Testing IT-3: Comprehensive Independent Testing. The evaluator shall independently perform functional and elementary penetration testing to confirm test results. This testing may be selective and shall be based on (1) the results of other independent and/or producer testing, (2) the TCB's DIS, (3) other product design and implementation documentation, (4) the product's user and administrative documentation, (5) relevant known penetration flaws, and (6) evaluator-developed TCB penetration flaw hypotheses and corresponding tests that attempt to exploit the hypothesized flaws. Satisfactory completion consists of demonstrating that all TCB functions work as described in the product's relevant documentation, that test results are consistent, and that no discrepancies exist between the documentation and the product. Satisfactory penetration test completion shall be determined by the subjective judgement (which may be supported algorithmically) of the evaluator. Test duration agreements may further constrain this judgement. Categorization of an actual penetration flaw shall be based on the reproducibility of that flaw. Flaws that are discovered, but are not reproducible shall remain categorized as potential penetration flaws. All actual penetration flaws must be corrected and retested. The evaluator shall provide a penetration test plan document that describes the additional evaluator-developed flaw hypotheses and associated tests. The evaluator shall execute these tests and shall report any discovered flaws to the producer as part of the testing results. At the conclusion of penetration testing, the evaluator shall provide copies of this penetration test plan and its test results to the producer. The producer shall ensure that this test plan and its test results are incorporated into the rest of the product's testing documentation and that such documentation is available for further analysis throughout the life of the product. The evaluator shall test for covert channel bandwidth reductions to determine the effectiveness of handling method(s) in reducing the bandwidths of identified covert channels for all evaluated configurations. If the independent testing is performed at beta- test sites, the producer shall supply the beta- test plan and the test results. The evaluator shall review the scope and depth of beta testing with respect to the required protection functionality, and shall verify independence of both the test sites and the producer's and beta- test user's test results. The evaluator shall also confirm that the test environment of the beta-test site(s) adequately represents the environment specified in the protection profile. Requirements for Development Environment DER-2: Enhanced Development Environment Review The evaluator shall review the producer's development and maintenance process description documentation and shall conduct a random audit of the producer's processes using the evidence generated by each process to determine the degree of discipline enforced upon and within the process, and to determine the protection characteristics associated with the product's development and maintenance. The results of this review shall establish, for the evaluator, the producer's development environment, its policies, and the degree of enforcement maintained during development execution. The results of this review shall also confirm the producer's general conformance with relevant development environment requirements. Requirements for Operational Support OSR-2 Enhanced Operational Support Review The evaluator shall review all documentation focused on the activities of product use (e.g., Users Manuals) and product administration including installation, operation, maintenance, and trusted recovery (e.g., Trusted Facility Management Manuals). This review shall assess the clarity of presentation, difficulty in locating topics of interest, ease of understanding, and completeness of coverage. The need for separate manuals dedicated to protection-relevant aspects of the product should be assessed for effectiveness. The evaluator shall randomly select a sample of the documented protection-relevant features and procedures and execute them to determine if their descriptions are accurate and correct. Requirements for Design Analysis DA-2: Enhanced Design Analysis The evaluator shall determine whether the producer has performed the activities defined in the development process assurance requirements of the protection profile for TCB property definition and TCB design. The evaluator shall determine whether the producer has documented these activities as defined in the development evidence requirements of the protection profile. The evaluator shall analyze the results of the producer's activities for completeness, consistency, and correctness of design with respect to requirements. Requirements for Implementation Analysis CI-1: Elementary Implementation Analysis The evaluator shall conduct a code inspection on a small sample of randomly selected product code. The assessment shall focus on clarity of the coding style, adherence to coding standards, coding documentation, and on possible software defects that may be present with respect to the product's informal design. The inspection shall be performed to obtain only a sample of possible software defects, not to capture all such possible defects. The evaluator shall report all discovered defects to the producer; the assessment shall report the number of defects found per line of code inspected from the random sample size. Use of producer-provided code inspection results can supplement this sample inspection. All trapdoors built into the product for maintenance purposes shall be identified by the producer and shown to be protected by the product. DRAFT LABEL BASED PROTECTION FOR MULTI-USER INFORMATION SYSTEMS LEVEL 3 (LP-3) A Protection Profile Derived from the Federal Criteria for IT Security Version 1.0 December 1992 This document is undergoing review and is subject to modification or withdrawal. The contents of this document should not be referenced in other publications. Supersedes the Trusted Computer System Evaluation Criteria Class B3 DRAFT LABEL-BASED PROTECTION - 3 (LP-3) This Protection Profile has been developed to define a set of technical measures that can be incorporated into remote- access, resource- and information-sharing Information Technology (IT) products that will be used to protect up to three levels and multiple categories of National Security Information classified according to US Executive Order 12356 (EO 12356). This profile can also be used to protect any information that has been designated as sensitive information for which information separation and access are based on sensitivity markings applied to the information. This profile is intended for use in environments where the presence potentially malicious application software (e.g., Trojan Horses) mandate the use of high-assurance products. Compliant IT products will provide highly-structured, conceptually simple protection mechanisms for a multi-level information processing environment with which an organization can construct an automated information system to enhance or optimize the organization's ability to perform its mission. In LP-3 conformant systems, the TCB is demonstrably based on a clearly defined and documented formal security policy model (i.e., the interpretation of the policy model within the TCB is shown to be valid). The TCB is resistant to penetration. In relation to lower levels of protection functionality, LP-3 conformat systems have the following additional features. a. The TCB must satisfy all requirements of the reference monitor concept (i.e., TCB protection, reference mediation, and TCB structuring and complexity minimization to enhance TCB verification; viz., Appendix B). b. Covert storage and timing channels are analyzed and handled. c. The TCB includes trusted recovery functions and a trusted path mechanism that includes general user commands, not just login commands. d. The audit mechanisms include alarms that signal accumulation of events representing potential security violations. e. Security management is enhanced by the fine-grain separation of system administrator and operator functions and by the minimization of security irrelevant functions of security roles. f. Stringent configuration management controls are imposed. g. The TCB must be found resistant to penetration. Cross References: o Existing Criteria: (1) TCSEC: B3 (2) ITSEC (3) CTCPEC o Other Protection Profiles (1) TBD COMPONENT SUMMARY: LP-3 Functional Component Summary .--------------------------------------------. | | Code & | | Functional Component | Level | |============================================| | Security Policy Support | |----------------------------------+---------| | Accountability | | |----------------------------------+---------| | Identification uthentication | I&A-2 | |----------------------------------+---------| | System Entry | ---- | |----------------------------------+---------| | Trusted Path | TP-2 | |----------------------------------+---------| | Audit | AD-1+ | |----------------------------------+---------| | Access Control | AC-3+ | |----------------------------------+---------| | Discretionary | AC-3+ | |----------------------------------+---------| | Non-Discretionary | AC-3 | |----------------------------------+---------| | Covert Channel Handling | CCH-3 | |----------------------------------+---------| | Availability | ---- | |----------------------------------+---------| | Resource Allocation | ---- | |----------------------------------+---------| | Fault Tolerance | ---- | |----------------------------------+---------| | Security Mgmt. | SM-1++ | |----------------------------------+---------| | Reference Mediation | RM-3 | |----------------------------------+---------| | TCB Logical Protection | P-3 | |----------------------------------+---------| | TCB Physical Protection | ---- | |----------------------------------+---------| | TCB Self-checking | SC-1 | |----------------------------------+---------| | TCB Start-Up and Recovery | TR-1 | |----------------------------------+---------| | TCB Privileged Operation | PO-2 | |----------------------------------+---------| | TCB Ease-of-Use | ---- | `--------------------------------------------' LP-3 Assurance Component Summary .---------------------------------------. | Assurance Components | T6 | |================================|======| | Development Assurance Components | |=======================================| | Development Process | |--------------------------------+------| | TCB Property Definition | PD-3 | |--------------------------------+------| | TCB Design | |--------------------------------+------| | TCB Element Identification | ID-2 | |--------------------------------+------| | TCB Interface Definition | IF-2 | |--------------------------------+------| | TCB Modular Decomposition | MD-3 | |--------------------------------+------| | TCB Structuring Support | SP-3 | |--------------------------------+------| | TCB Design Disciplines | DD-2 | |--------------------------------+------| | TCB Implementation Support | IM-3 | |--------------------------------+------| | TCB Testing and Analysis | |--------------------------------+------| | Functional Testing | FT-3 | |--------------------------------+------| | Penetration Analysis | PA-2 | |--------------------------------+------| | Covert Channel Analysis | CCA2 | |--------------------------------+------| | Operational Support | |--------------------------------+------| | User Security Guidance | UG-1 | |--------------------------------+------| | Administrative Guidance | AG-3 | |--------------------------------+------| | Trusted Generation | TG-3 | |--------------------------------+------| | Development Environment | |--------------------------------+------| | Life Cycle Definition | LC-3 | |--------------------------------+------| | Configuration Management | CM-3 | |--------------------------------+------| | Trusted Distribution | ---- | |--------------------------------+------| | Development Evidence | |--------------------------------+------| | TCB Protection Properties | EPP3 | |--------------------------------+------| | Product Development | EPD4 | |--------------------------------+------| | Product Testing & Analysis | |--------------------------------+------| | Functional Testing | EFT3 | |--------------------------------+------| | Penetration Analysis | EPA2 | |--------------------------------+------| | Covert Channel Analysis | ECC2 | |--------------------------------+------| | Product Support | EPS3 | `---------------------------------------' |=======================================| | Evaluation Assurance Components | |=======================================| | Testing | |--------------------------------+------| | Test Analysis | TA-4 | |--------------------------------+------| | Independent Testing | IT-3 | |--------------------------------+------| | Review | |--------------------------------+------| | Development Environment | DER3 | |--------------------------------+------| | Operational Support | OSR3 | |--------------------------------+------| | Analysis | |--------------------------------+------| | Protection Properties | ---- | |--------------------------------+------| | Design | DA-3 | |--------------------------------+------| | Implementation | CI-3 | `---------------------------------------' RATIONALE 11. Information Protection Policy It is anticipated that organizations wishing to process two to three levels of classified information with multiple categories will want to use IT products that are compliant with this profile in their automated information processing systems. These organizations should be able to trust the profile-compliant IT product to contribute to the protection of the classified information at least as much as they trust the properly cleared personnel who are using and managing the system. 12. Protection Philosophy This profile presumes a hostile environment with divided, aggressive users. It provides control of access to shared resources both (1) on the basis of attributes that are controlled by the ordinary users of the system and (2) on the basis of attributes that are controlled only by the system administrators. Profile compliant IT products will minimally meet the following objectives: a. Employ a reference validation mechanism to enforce a formally defined security policy that describes the rules for controlling access to system subjects and objects and use the access control rules to enforce an information flow policy that aims to control the use of covert storage and timing channels. b. Associate explicit sensitivity labels with each subject and object in the system and each port through which information may be exported from or imported to the system. Maintain the accuracy of the sensitivity labels as information moves within the system and through the ports. c. Authenticate the claimed identity of each external human user of the IT product prior to establishing any internal entity to act on behalf of that user and firmly bind the authenticated user identity to the internal entity. d. Selectively keep and protect a log of all actions or events (including use of covert storage channels) that could affect system security so that they can be accurately attributed to the known user or system entity responsible for causing the action or event. Also, alert the system administrator when a series of events indicates an imminent violation of the security policy. e. Contains hardware and software mechanisms that can be independently evaluated to provide sufficient assurance that the system satisfies the previous four objectives. f. Implements the enforcement of objectives a through d in such a fashion that the enforcing mechanisms are protected from tampering and unauthorized changes by the information moving entities that the mechanisms are supposed to control. 13. Expected Threats The requirements for profile conforming IT products assume that these products are being used in an environment where there are different levels and categories of classified data and users of differing clearance levels. A conforming IT product can be reasonably expected to protect the confidentiality of information in an environment where there are three levels and multiple categories of classified data, and two or more levels of cleared users and where there are collaborating, malicious users and software at each clearance level. 14. Assumed Environment 14.1 Characteristics IT products complying with the requirements set forth in this profile are expected to be used in an environment with the following characteristics: a. Multiple users will be accessing the operating system at the same time. b. The IT product hardware base (e.g., CPU, printers, terminals, etc.) is protected from unauthorized physical access. c. One or more personnel are assigned to manage the system in which the IT product is incorporated, including the security of the information it contains. d. A need to control user access to information exists and is based on an explicit sensitivity marking associated with the information (e.g, Secret or Top Secret). e. There is a need to control user access to information exists and is based on that user's identity and membership in organizations or groups. f. The IT product provides facilities for some or all of the authorized users to create programs that use the applications programming interface (API) and make those programs available to other users. g. The IT product is used to provide a cooperative environment for the users to accomplish some task or group of tasks. 14.2 Environment Dependencies Secure installation and operation of a product satisfying these profile requirements depends on provision of a number of elements in the installation environment. These include: a. Physical security must be provided. For US Government classified operation, physical security equivalent to PP-2 would be required. b. Cabling to other devices must be shown to be consistent with policy implemented by the product. For example, a "port" in the product is required to have an assigned label. No device can be connected to the port unless it has been established externally that the device is allowed to receive data with the same label. c. Personnel allowed to access data processed by the installed product must already be authorized for such access. 15. Intended Use Conforming IT products are useful in both general-purpose office automation environments with multiple data sensitivities (or "classifications") and multiple levels of user authorizations (or "clearances") and in specialized computing, network and mission environments. Examples of the office automation environment might include military headquarters and highly competitive procurement offices. Examples of the network environments include use as the basis for a multilevel secure network management center or a trusted guard gateway operating between two networks processing different levels of information. An example of the specialized mission environment might be as a platform for a portable battlefield map and mission management application. FUNCTIONAL REQUIREMENTS Requirements for Identification and Authentication I&A-2 Identification, Authentication, and Authorization 1. The TCB shall require users to identify themselves to it before beginning to perform any other actions that the TCB is expected to mediate. The TCB shall be able to enforce individual accountability by providing the capability to uniquely identify each individual user. The TCB shall also provide the capability of associating this identity with all auditable actions taken by that individual. 2. The TCB shall maintain authentication data that includes information for verifying the identity of individual users (e.g., passwords) as well as information for determining the clearance and authorization of individual users. These data shall be used by the TCB to authenticate the user's identity and to ensure that the subject security level and authorizations of subjects external to the TCB that may be created to act on behalf of the individual user are dominated by the clearance and authorization of that user). 3. The TCB shall protect authentication data so that it cannot be used by any unauthorized user. Requirements for Trusted Path TP-2 Trusted User-to-TCB Communication The TCB shall support a trusted communication path between itself and users for use whenever a positive user-to-TCB connection is required (e.g., login, change of policy attributes). Communications via this trusted path shall be activated exclusively by a user or the TCB and shall be logically isolated and unmistakably distinguishable from other communication paths. Requirements for Audit AD-1+ Minimal Audit 1. The TCB shall be able to create, maintain, and protect from modification or unauthorized access or destruction an audit trail of accesses to the objects it protects. The audit data shall be protected by the TCB so that read access to it is limited to those who are authorized for audit data. 2. The TCB shall be able to record the following types of events: - use of the identification and authentication mechanisms; - introduction of objects into a user's address space (e.g., file open, program initiation), and deletion of objects; - actions taken by computer operators and system administrators and/or system security officers. The TCB shall be able to record any override of human-readable output markings. The TCB shall also be able to audit the identified event that may be used in the exploitation of covert channels. The TCB shall contain a mechanism that is able to monitor the occurrence or accumulation of auditable events that may indicate an imminent violation of the product's security policy. This mechanism shall be able to immediately notify the security administrator when thresholds are exceeded, and, if the occurrence or accumulation of these security relevant events continues, the system shall take the least disruptive action to terminate the event. [AD-3] 3. For each recorded event, the audit record shall identify: date and time of the event, user, type of event, and success or failure of the event. For identification/authentication events the origin of request (e.g., terminal ID) shall be included in the audit record. For events that introduce an object into a user's address space and for object deletion events the audit record shall include the name and the object security level. 4. The system administrator shall be able to selectively audit the actions of one or more users based on individual identity and/or object security level. Requirements for Access Control AC-3 + Extended Access Control 1. Definition of Access Control Attributes The TCB shall define and protect access control attributes for subjects and objects. Subject attributes shall include named individuals or defined groups or both. Object attributes shall include defined access rights (e.g., read, write, execute) that can be assigned to subject attributes. Access control attributes corresponding to each individual policy shall be identified. Sensitivity labels associated with each subject and storage object that is directly or indirectly accessible by subjects external to the TCB shall be maintained by the TCB. The sensitivity labels shall be used as the basis for mandatory access control decisions. The subjects and objects shall be assigned sensitivity labels that are a combination of hierarchical classification levels and non- hierarchical categories, and the labels shall be used as the basis for mandatory access control decisions. The TCB shall be able to support two or more such security levels. The subject and object attributes shall accurately reflect the sensitivity and integrity of the subject or object. When exported by the TCB, sensitivity labels shall accurately and unambiguously represent the internal labels and shall be associated with the information being exported. The TCB shall immediately notify a terminal user of each change in the security level associated with that user during an interactive session. A terminal user shall be able to query the TCB as desired for a display of the subject's complete sensitivity label. The TCB shall support the assignment of minimum and maximum security levels to all attached physical devices. These security levels shall be used by the TCB to enforce constraints imposed by the physical environments in which the devices are located. 2. Administration of Access Control Attributes The TCB shall define and enforce rules for assignment and modification of access control attributes for subjects and objects. The effect of these rules shall be that access permission to an object by users not already possessing access permission is assigned only by authorized users. These rules shall allow authorized users to specify and control sharing of objects by named individuals or defined groups of individuals, or by both, and shall provide controls to limit propagation of access rights. (i.e., these rules shall define the distribution, revocation, and review of access control attributes). The controls defined by these rules shall be capable of specifying for each named object, a list of individuals and a list of groups of named individuals, with their respective access rights to that object. Furthermore, for each named object, it shall be possible to specify a list of named individuals and a list of groups of named individuals for which no access to the object is given [AC-4}. These controls shall be capable of including or excluding access to the granularity of a single user. The rules for assignment and modification of access control attributes shall include those for attribute assignment to objects during import and export operations. Export of Labeled Information The TCB shall designate each communication channel and I/O device as either single-level or multilevel. Any change in this designation shall be done manually and shall be auditable by the TCB. The TCB shall maintain and be able to audit any change in the security level or levels associated with a communication channel or I/O device. 1. Exportation to Multilevel Devices When the TCB exports an object to a multilevel I/O device, the sensitivity label associated with that object shall also be exported and shall reside on the same physical medium as the exported information and shall be in the same form (i.e., machine-readable or human-readable form). When the TCB exports or imports an object over a multilevel communication channel, the protocol used on that channel shall provide for the unambiguous pairing between the sensitivity labels and the associated information that is sent or received. 2. Exportation to Single-Level Devices Single-level I/O devices and single-level communication channels are not required to maintain the sensitivity labels of the information they process. However, the TCB shall include a mechanism by which the TCB and an authorized user reliably communicate to designate the single security level of information imported or exported via single-level communication channels or I/O devices. 3. Labeling Human-Readable Output The system administrator shall be able to specify the printable label names associated with exported sensitivity labels. The TCB shall mark the beginning and end of all human-readable, paged, hardcopy output (e.g., line printer output) with human-readable sensitivity labels that properly represent the sensitivity of the output. The TCB shall, by default, mark the top and bottom of each page of human-readable, paged, hardcopy output (e.g., line printer output) with human- readable sensitivity labels that properly represent the overall sensitivity of the output or that properly represent the sensitivity of the information on the page. The TCB shall, by default and in an appropriate manner, mark other forms of human-readable output (e.g., maps, graphics) with human-readable sensitivity labels that properly represent the sensitivity of the output. Any override of these marking defaults shall be auditable by the TCB. Import of Non-labeled Data In order to import non-labeled data, the TCB shall request and receive from an authorized user the security level of the data, and all such actions shall be auditable by the TCB. If different rules of assignment and modification of access control attributes apply to different subjects and/or objects, the totality of these rules shall be shown to support the defined policy. 3. Authorization of Subject References to Objects The TCB shall define and enforce authorization rules for the mediation of subject references to objects. These rules shall be based on the access control attributes of subjects and objects. These rules shall, either by explicit user action or by default, provide that objects are protected from unauthorized access. The scope of the authorization rules shall include all subjects, storage objects (e.g., processes, segments, devices) and associated access control attributes that are directly or indirectly accessible to subjects external to the TCB. The scope of the authorization rules shall also include all policy and status attributes of subjects and storage objects (e.g., quotas, object existence, size, access time, creation and modification time, locked/unlocked). If different rules apply to different subjects and objects, the totality of these rules shall be shown to support the defined policy. The authorization rules for the mandatory access control policy shall include: The TCB shall enforce a mandatory access control policy over all resources (i.e., subjects, storage objects, and I/O devices that are directly or indirectly accessible by subjects external to the TCB. The following requirements shall hold for all accesses between all subjects external to the TCB and all objects directly or indirectly accessible by these subjects: A subject can read an object only if the hierarchical classification in the subject's security level is greater than or equal to the hierarchical classification in the object's security level and the non- hierarchical categories in the subject's security level include all the non-hierarchical categories in the object's security level. A subject can write an object only if the hierarchical classification in the subject's security level is less than or equal to the hierarchical classification in the object's security level and all the non-hierarchical categories in the subject's security level are included in the non-hierarchical categories in the object's security level. The authorization rules for each policy shall be defined separately. The TCB shall define and enforce the composition of policies, including the enforcement of the authorization rules (e.g., subject and object type coverage, enforcement precedence). 4. Subject and Object Creation and Destruction The TCB shall control the creation and destruction of subjects and objects. These controls shall include object reuse. That is, all authorizations to the information contained within a storage object shall be revoked prior to initial assignment, allocation or reallocation to a subject from the TCB's pool of unused storage objects; information, including encrypted representations of information, produced by a prior subjects' actions shall be unavailable to any subject that obtains access to an object that has been released back to the system. Requirements for Covert Channel Handling CCH-3 Timing Channel Audit and Bandwidth Limitation 1. The TCB and privileged applications shall include functions that help audit the use of covert storage channels. These functions shall enable the identification of the transmitter, receiver, and specific covert channels used (e.g., TCB and privileged application element used to transmit information). TCB functions that help limit the bandwidth and/or eliminate covert storage channels shall also be provided. The bandwidth limits for each channel shall be settable by system administrators. 2. The functions added to the TCB and privileged applications for storage channel auditing shall be identified for each channel and shall be available in common product configurations. If audit functions are not added to certain storage channels (e.g., hardware storage channels), evidence must be provided to justify why these channels do not represent a security threat for the intended use of the product. TCB and privileged application functions that help limit the bandwidth and/or eliminate covert storage or timing channels shall also be available in common product configurations. If channel bandwidth limitation and channel elimination functions are not added to certain storage or timing channels (e.g., hardware channels), evidence must be provided to justify why these channels do not represent a security threat for the intended use of the product. Requirements for Security Management SM-1++ Minimal Security Management 1. The TCB shall provide an installation mechanism for the setting and updating of its configuration parameters, and for the initialization of its protection-relevant data structures before any user or administrator policy attributes are defined. It shall allow the configuration of TCB internal databases and tables. 2. The TCB shall provide protected mechanisms for displaying and modifying the security policy parameters. 3. The TCB shall provide protected mechanisms for manually displaying, modifying, or deleting user registration and account parameters. These parameters shall include unique user identifiers, their account, and their associated user name and affiliation. The TCB shall allow the manual enabling and disabling of user identities and/or accounts. 4. The TCB shall support separate operator and administrator functions. The operator functions shall be restricted to those necessary for performing routine operations. The operator functions shall allow the enabling and disabling of peripheral devices, mounting of removable storage media, backing-up and recovering user objects; maintaining the TCB hardware and software elements (e.g., on-site testing); and starting and shutting down the system. The administrative functions shall support separate security administrator and auditor roles. The TCB shall enable the administrators to perform their functions only after taking distinct auditable action to assume an administrator role. Non- security functions that can be performed in the security administrative role shall be limited strictly to those essential to performing the security role effectively.[SM-4] 5. The use of the protected mechanisms for system administration shall be limited to authorized administrative users. Requirements for Reference Mediation RM-3 Mediation of References to Subject and Object Attributes 1. The TCB shall mediate all references to subjects, objects, resources, and services (e.g., TCB functions) described in the TCB specifications. The mediation shall ensure that all references are directed to the appropriate security-policy functions. 2. Reference mediation shall include control of references to all subjects, objects, and resources protected under the TCB security policy, to their policy (i.e., access rights, security levels) and status attributes (e.g., existence, length, locking state). 3. References issued by privileged subjects shall be mediated in accordance with the policy attributes defined for those subjects. Requirements for Logical TCB Protection P-3 TCB Isolation and Timing Consistency The TCB shall maintain a domain for its own execution that protects it from external interference and tampering (e.g., by reading or modification of its code and data structures). The protection of the TCB shall provide TCB isolation and noncircumventability of TCB isolation functions as follows: 1. TCB Isolation requires that (1) the address spaces of the TCB and those of unprivileged subjects are separated such that users, or unprivileged subjects operating on their behalf, cannot read or modify TCB data structures or code, (2) the transfers between TCB and non-TCB domains are controlled such that arbitrary entry to or return from the TCB are not possible; and (3) the user or application parameters passed to the TCB by addresses are validated with respect to the TCB address space, and those passed by value are validated with respect to the values expected by the TCB. 2. Non-circumventability of TCB isolation functions requires that the permission to objects (and/or to non-TCB data) passed as parameters to the TCB are validated with respect to the permissions required by the TCB, and references to TCB objects implementing TCB isolation functions are mediated by the TCB. TCB protection shall also maintain the consistency of TCB global variables and eliminate undesirable dependencies of the TCB on unprivileged subject or user actions. 3. Consistency of TCB global variables requires that consistency conditions defined over TCB internal variables, objects, and functions hold before and after any TCB invocation. 4. Elimination of undesirable dependencies of the TCB on unprivileged subject actions requires that any TCB invocation by an unprivileged subject (or user) input to a TCB call may not place the TCB in a state such that it is unable to respond to communication initiated by other users. Furthermore, TCB protection shall maintain the timing consistency of condition checks. 5. Timing consistency of condition checks requires that a validation check holds at the instant when the TCB action depending on that check is performed. Requirements for TCB Self Checking SC-1 Minimal Self Checking Hardware and/or software features shall be provided that can be used to periodically validate the correct operation of the on-site hardware and firmware elements of the TCB. Requirements for TCB Start-Up and Recovery TR-1 Minimal Requirements for Recovery or Start-up Procedures and/or mechanisms shall be provided to assure that, after a TCB failure or other discontinuity, recovery without protection compromise is obtained. Requirements for TCB Privileged Operation PO-2 Privilege Association with TCB Modules 1. TCB privileges needed by individual functions, or groups of functions, of a functional component shall be identified. Privileged TCB calls or access to privileged TCB objects, such as user and group registration files, password files, security and integrity-level definition file, role definition file, audit-log file shall also be identified. It shall be possible to associate TCB privileges with TCB operations performed by administrative users. 2.The modules of a TCB function shall be associated only with the privileges necessary to complete their task. 3. Support for product privilege implementation and association with TCB modules provided by lower-level mechanisms or procedures (e.g., operating system, processors, language) shall be provided. ASSURANCES Requirements for TCB Property Definition PD-3 Property Specification by Model Interpretation The developer shall provide formal models for the functional components and sub-components of the profile. At a minimum, a formal model of the access control components shall be provided. The properties of the formal models shall be clearly stated. The developer shall provide an interpretation of the models in the DIS of the product's TCB. For each model entity, the developer shall: (1) identify the TCB elements and their DIS (if any) that implement that entity; (2) define the operation of these TCB elements, and (3) demonstrate, by coherent arguments, that the DIS of these elements is consistent with the model properties. The developer's interpretation of each formal model, which specifies the TCB properties, shall identify all TCB and DIS elements (if any) that do not correspond to any model entity and shall explain why these elements do not render the TCB properties invalid. An informal model of reference mediation and TCB protection shall be provided. For the components that are not modeled, the developer shall interpret the functional requirements of the protection profile within the product TCB. For each functional requirement, the developer shall: (1) identify the TCB elements and their TCB interfaces (if any) that implement that requirement; (2) describe the operation of these TCB elements, and (3) explain why the operation of these elements is consistent with the functional requirement. The developer's interpretation of each functional requirement, which describes the TCB properties, shall include all the TCB elements. Requirements for TCB Element Identification ID-2: TCB Element Justification The vendor shall identify the TCB elements (i.e., software, hardware/firmware code and data structures). Each element must be unambiguously identified by its name, type, release, and version number (if any). The developer shall justify the protection relevance of the identified elements (i.e., only elements that can affect the correct operation of the protection functions shall be included in the TCB). If protection-irrelevant elements are included in the TCB, the developer shall provide a rationale for such inclusion. Requirements for TCB Interface Definition IF-2: Interface Descriptive Specification The developer shall define all external (e.g., command, software, and I/O) administrative (i.e., privileged) and non-administrative interfaces to the TCB. The developer shall provide and maintain a descriptive interface specification (DIS) of the TCB that completely and accurately describes the TCB in terms of exceptions, error messages, and effects. The DIS shall identify the TCB call conventions (e.g., parameter order, call sequence requirements), and exceptions signaled. The DIS shall also include the TCB call identifier, parameter types (e.g., input, output), the effect of the call, TCB call conventions (e.g., parameter order, call sequence requirements), and exceptions handled and signaled. It shall be shown to be an accurate description of the TCB interface. The DIS shall include those components of the TCB that are implemented as hardware and/or firmware if their properties are visible at the TCB interface. If the TCB consists of a kernel and privileged processes, the developer shall separately identify and define the interfaces for the kernel and each privileged process. The TCB interface definition must also include all effects of a call including the direct visibility and alterability of internal TCB variables and functions. Requirements for TCB Modular Decomposition MD-3: Module Relationship Analysis The developer shall design the TCB as a small number (e.g., 10 to 100) of design and implementation subsystems that have well-defined functional relationships and shared-data dependencies. The developer shall identify the specific TCB protection properties and functions associated with each subsystem and the TCB interfaces (if any) implemented by each subsystem. The developer shall design each subsystem as a set of modules. For each module, the developer shall describe: the role or purpose of the module, the set of related functions performed by the module, and the module interface (i.e., the set of invocable functions, calling conventions, parameters, global variables, and results). The developer shall identify the protection functions of, and describe the interfaces between, these modules. The developer shall choose the modules so that the set of functions implemented by the module, the module's contribution to the TCB protection properties, and the interface(s) to the module can be described concisely (e.g., the module shall have a single purpose). The TCB structuring into modules shall be based on well- defined module relationships; for example, the contains relation (e.g., A is part of B), the "uses" relation (e.g., A is correct only if B is correct). The developer shall analyze the correctness dependencies among these modules. This analysis may include, but is not restricted to, service and environmental dependencies. Requirements for TCB Structuring Support SP-3: Structured Protection Mechanisms The TCB shall maintain process isolation. The TCB shall separate those elements that are protection- critical from those that are not. Features in hardware, such as segmentation, shall be used to support logically distinct storage objects with separate access-control attributes (e.g., readable, writable). The TCB shall employ a complete, conceptually simple, protection mechanism with precisely defined semantics. This mechanism shall play a central role in enforcing the internal structuring of the TCB and the product. Requirements for Design Disciplines DD-2: Extended Disciplines for TCB Structuring The developer shall design the product to minimize the complexity of the TCB. System engineering shall be directed towards excluding from the TCB modules that are not protection critical. The TCB design shall reflect use of modern software engineering techniques), such as data hiding and abstraction (i.e., data, functional, and control abstractions) and well-defined exception-handling. The TCB design shall also include use of layering (including a rationale for each layering violation), high-level synchronization constructs, and multi-tasking/ multi-threading. Requirements for TCB Implementation Support IM-3: Module Correspondence Support The developer shall maintain engineering diagrams and source code (as applicable) for all TCB elements. The diagrams and source code for each module of the TCB shall be identified and provided as configuration items. Requirements for Developer Functional Testing FT-3: Specification-Driven TCB Interface Testing The developer shall test the TCB interface to show that all claimed protection functions work as stated in the TCB interface description or specification. The tests shall exercise the boundary conditions of the protection functions. The developer shall generate the test conditions and data from the Descriptive Interface Specification(s). The developer test procedures shall include the tests used to demonstrate the absence of all flaws discovered in previous versions of the TCB. The developer shall correct all flaws discovered by testing and shall retest the TCB to show that all discovered flaws have been eliminated, no new flaws have been introduced, and the protection functions work as claimed. Requirements for Penetration Analysis PA-2 Flaw-Hypothesis Testing The developer shall define the TCB configuration, interface, and protection functions that are subject to penetration testing. For each test, the developer shall identify the goal of the test and the criteria for successful penetration. The developer shall illustrate how, in addition to system reference manuals and TCB interface description, the DIS, source code, and hardware and firmware specifications are used to define penetration-test conditions. For each test, the developer shall document all test conditions, data (e.g., test set-up, function call parameters, and test outcomes), and coverage. The developer shall generate the test conditions from flaw-hypotheses derived by negating assertions of TCB design capabilities and by providing counter examples that show that these assertions are false. The developer shall confirm the flaw hypotheses by checking design and implementation documentation, by defining the test data and running test programs, or by referring to known classes of penetration flaws found in other TCBs. The refutation of any hypothesis shall be documented. For each uncovered flaw, the developer shall define and document scenarios of flaw exploitation and shall identify all penetration outcomes resulting from that scenario. The cause of the flaw shall be identified and documented. Requirements for Covert-Channel Analysis CCA-2 Timing Channel Analysis 1. Identification: The developer shall identify all sources of information used in covert-channel analysis. These sources shall include TCB reference manuals and DIS. The sources of information and methods of identification shall include processor specifications whenever the identification method includes source code and hardware analysis. The developer shall define the identification method used. The developer shall demonstrate that the chosen identification method is sound (e.g., it leads to the discovery of all covert channels in the DIS or source documentation) and repeatable (i.e., independent evaluators can use the method on the same sources of covert-channel information and can obtain the same results.) The developer shall define scenarios of use for each covert channel. The developer shall also define timing channel scenarios, and shall identify all functions that provide independent sources of timing (e.g., CPUs, I/O processors). 2. Bandwidth Measurement or Engineering Estimation: The developer shall define the method used for covert-channel bandwidth estimation. In measuring TCB performance for covert-channel- bandwidth estimation, the developer shall satisfy the following assumptions. The maximum bandwidth estimation shall be based on the assumptions that the covert channel is noiseless, that the senders and receivers are not delayed by the presence of other processes in the product, and that the sender-receiver synchronization time is negligible. The choice of informal estimation methods shall define and justify the coding method and, therefore, the distribution of "0s" and "1s" in all transmissions. The developer shall select TCB primitives to be measured for bandwidth determination from real scenarios of covert-channel use. The developer shall specify TCB measurement environment for the bandwidth measurements. This specification shall include: (1) the speed of the product functions, (2) the product configuration, (3) the sizes of the memory and cache components, and (4) the product initialization. The sensitivity of the measurement results to configuration changes shall be documented. The covert-channel measurements shall include the fastest TCB function calls for altering, viewing, and setting up the transmission environment; the demonstrably fastest process (context) switch time shall also be included in the bandwidth measurements. All measurements shall be repeatable. 3. Covert Channel Testing: The developer shall test all the use of all identified covert channels to determine whether the handling functions work as intended. Requirements for User Guidance UG-1: Users' Guide The developer shall provide a User Guide which describes all protection services provided and enforced by the TCB. The User Guide shall describe the interaction between these services and provide examples of their use. The User Guide may be in the form of a summary, chapter or manual. The User Guide shall specifically describe user responsibilities. These shall encompass any user responsibilities identified in the protection profile. Requirements for Administrative Guidance AG-3: Role-Based Administrative Guidance The developer shall provide a Trusted Facility Manual intended for the product administrators and operators that describes how to use the TCB security services (e.g., Access Control, System Entry, or Audit) to enforce a system security policy. The Trusted Facility Manual shall include the procedures for securely configuring, starting, maintaining, and halting the TCB. The Trusted Facility Manual shall explain how to analyze audit data generated by the TCB to identify and document user and administrator violations of this policy. The Trusted Facility Manual shall explain the unique security-relevant privileges and functions of administrators and operators. The Trusted Facility Manual shall also explain the distinct security-relevant privileges and functions of the TCB and how they can be selectively granted to provide fine-grained, multi-person or multi-role system and application administration policies. The Trusted Facility Manual shall describe the administrative interaction between security services. The Trusted Facility Manual shall identify all hardware, firmware, software, and data structures comprising the TCB. The detailed audit record structure for each type of audit event shall be described. The Trusted Facility Manual shall explain how to configure the product to mitigate, eliminate, or audit covert channel exploitation. The Trusted Facility Manual shall describe the cautions about and procedures for using the TCB as a base for site-specific secure applications. The Trusted Facility Manual shall describe procedures for securely regenerating the TCB after any part is changed (e.g., due to adding devices or installing flaw corrections to the TCB software). The Trusted Facility Manual shall be distinct from User Guidance, and encompass any administrative responsibilities identified in security management. Requirements for Trusted Generation TG-3: Trusted Generation With Secure State Review The developer shall establish and document the procedures that a consumer must perform to generate an operational TCB from the delivered copy of the master TCB. The consumer documentation shall identify any system parameters, which are initialized or set during system generation, that affect the TCB's conformance to the protection profile and state the acceptable ranges of values for those parameters. The product shall be delivered with each of these parameters set to its fail-safe defaults. The developer shall provide the consumer with a capability to review the product security state (e.g., by providing a program, which could be executed after generating and starting the TCB, that determines the consistency of the protection-relevant parameters). Requirements for Life Cycle Definition LC-3: Measurable Life Cycle Process The developer shall develop and maintain the product using a well defined, standardized, and measurable engineering process. The developer shall explain why the process was chosen and how the developer uses it to develop and maintain the product. The developer shall comply with the engineering process standard. The process shall incorporate a security policy that states the technical, physical, procedural, personnel, and other measures used by the developer to protect the product and its documentation. The developer shall demonstrate that each development process and support process requirement of the protection profile is satisfied by some part, or parts, of the developer's process. The developer shall identify the programming languages used to develop the TCB software and reference the definitions of those languages. The developer shall identify any implementation dependent options of the programming language compiler(s) used to implement the TCB software and reference the definitions of those languages.The developer shall describe coding standards followed during the implementation of the product and shall ensure that all source code complies with these standards. Requirements for Configuration Management CM-3: Comprehensive Automated Control The developer shall establish configuration control and generation procedures employing automated tools for developing and maintaining the TCB. The procedures shall be employed to ensure that changes to the TCB are consistent with the product's protection properties and security policy. The developer shall employ these tools to track and control changes to development evidence, implementation data (e.g., source code and hardware diagrams), executable versions of the TCB, test documentation and procedures, identified flaws, and consumer documentation. The procedures shall include a formal acceptance process for protection-relevant changes. The configuration control procedures shall assure a consistent mapping among documentation and code associated with the current version of the TCB and permit the regeneration of any supported version of the TCB. The developer shall provide tools for the generation of a new version of the TCB from source code. Also, tools shall be available for comparing a newly generated version with the previous TCB version to ascertain that only the intended changes have been made in the code that will actually be used as the new version of the TCB. Requirements for Evidence of TCB Protection Properties EPP-3 Evidence of Formal Model Interpretation in the DIS The developer shall provide documentation which describes the correspondence between the functional component requirements and the TCB elements and interfaces. This documentation shall describe how the TCB implements the reference monitor concept. The developer shall also provide a formal access-control model and an informal reference mediation and TCB protection model. The TCB properties, which are defined by this correspondence and the interpretation of these models within the DIS of the TCB shall be documented by the product developer. Requirements for Evidence of Product Development EPD-4: Policy Consistency Of The DIS The developer shall provide TCB Design Specifications that include: a list of the TCB elements (hardware, software, and firmware configuration items); a list of protection services provided to the TCB by hardware, software, and firmware that is not part of the TCB; an explanation of the techniques and criteria used during the modular decomposition of the TCB; a description of the policy allocations, functions, and interactions among the major TCB subsystems; and module level descriptions of all software and hardware in the TCB. The developer shall provide a Descriptive Interface Specification (DIS) that describes the functions, effects, exceptions and error messages visible at the TCB interface and includes a convincing argument that the DIS is consistent with the formal model of the policy. The developer shall show that the DIS is an accurate representation of the TCB's external interfaces. The developer shall provide TCB Implementation Data consisting of the engineering diagrams for all hardware included in the TCB and the source code used to generate the TCB software and firmware. The developer shall show that the TCB software, firmware, and hardware implement the documented TCB design. Requirements for Evidence of Functional Testing EFT-3: Evidence of Specification-Driven Testing The developer shall provide evidence of the functional testing that includes the test plan, the test procedures, and the results of the functional testing. The test, plans, procedures, and results shall be maintained under the same configuration control as the TCB software. The test plans shall identify the TCB specification used in the derivation of the test conditions, data, and coverage analysis. Requirements for Evidence of Penetration Analysis EPA-2: Evidence of Flaw-Hypothesis Generation and Testing The developer shall provide evidence of penetration testing. The penetration evidence shall identify all product documentation and development evidence on which the search for flaws was based. The penetration evidence shall describe the scenarios for exploiting each potential flaw in the system and the penetration test conditions, data (e.g., test set-up, function call parameters, and test outcomes), coverage, and conclusions derived from each scenario. The penetration evidence shall summarize both refuted and confirmed flaws hypothesis. Requirements for Evidence of Covert Channel Analysis ECC-2: Evidence of Covert Channel Analysis and Handling The developer's documentation shall present the results of the covert channel analysis and the trade-offs involved in restricting these channels. All auditable events that may be used in the exploitation of known covert channels shall be identified. The developer shall provide the bandwidths of known covert channels whose use is not detectable by the auditing mechanism. The documentation of each identified covert channel shall consist of the variables, timing sources, and the TCB interface functions that can be used to transmit information. The measurements of each TCB function call used by covert channels must be documented and the bandwidth computation shall be included for each channel. The measurement environment should be documented as specified. Test documentation shall include results of testing the effectiveness of the methods used to reduce covert-channel bandwidths. Requirements for Evidence of Product Support EPS-3: Evidence of Measured Product Support The developer shall provide documentation that defines, explains, and justifies the policies, procedures, plans, and tools established by the developer to satisfy the Operational Support and Development Environment requirements of the protection profile. The documentation shall also explain how the developer periodically evaluates compliance with the established procedures, policies, and plans. Requirements for Test Analysis TA-4: Comprehensive Test Analysis The evaluator shall assess whether the producer has performed the activities defined in the development assurance requirements of the protection profile for functional testing and penetration analysis, and whether the producer has documented these activities as defined in the development evidence requirements of the protection profile. The evaluator shall analyze the results of the producer's testing activities for completeness of coverage and consistency of results, and general correctness (e.g., defect trend from regression testing). This analysis shall examine the testability of requirements, the adequacy of the tests to measure the required properties, the deviation of the actual results obtained from the expected results. The analysis shall extend to trace all defects identified, corrected, and retested. The analysis shall include an assessment of test coverage and completeness, and defect frequency. The results of testing shall be interpreted in terms that express product performance and protection adequacy. The evaluator shall determine whether the product's protection properties, as defined for all protection-relevant modules of the TCB, and all relevant known penetration flaws have been tested. The evaluator shall independently develop, test, and document additional flaw hypotheses. The evaluator shall assess testing results to determine whether the product's TCB works as claimed, that the TCB's implementation is consistent with the DIS, and whether there are any obvious ways (i.e., ways that are known, or that are readily apparent or easily discovered in product documentation) for an unauthorized user to bypass the policy implemented by the TCB or otherwise defeat the product's TCB, and whether all discovered TCB flaws have been corrected and no new TCB flaws introduced. No design flaws and no more than a few correctable implementation flaws may be found during testing and there shall be reasonable confidence that few remain. The testing results shall show that the methods used to reduce covert channel bandwidths have been effective for all evaluated configurations. The evaluator shall determine whether the product is relatively resistant to penetrations. Requirements for Independent Testing IT-3: Comprehensive Independent Testing. The evaluator shall independently perform functional and elementary penetration testing to confirm test results. This testing may be selective and shall be based on (1) the results of other independent and/or producer testing, (2) the TCB's DIS, (3) other product design and implementation documentation, (4) the product's user and administrative documentation, (5) relevant known penetration flaws, and (6) evaluator-developed TCB penetration flaw hypotheses and corresponding tests that attempt to exploit the hypothesized flaws. Satisfactory completion consists of demonstrating that all TCB functions work as described in the product's relevant documentation, that test results are consistent, and that no discrepancies exist between the documentation and the product. Satisfactory penetration test completion shall be determined by the subjective judgement (which may be supported algorithmically) of the evaluator. Test duration agreements may further constrain this judgement. Categorization of an actual penetration flaw shall be based on the reproducibility of that flaw. Flaws that are discovered, but are not reproducible shall remain categorized as potential penetration flaws. All actual penetration flaws must be corrected and retested. The evaluator shall provide a penetration test plan document that describes the additional evaluator-developed flaw hypotheses and associated tests. The evaluator shall execute these tests and shall report any discovered flaws to the producer as part of the testing results. At the conclusion of penetration testing, the evaluator shall provide copies of this penetration test plan and its test results to the producer. The producer shall ensure that this test plan and its test results are incorporated into the rest of the product's testing documentation and that such documentation is available for further analysis throughout the life of the product. The evaluator shall test for covert channel bandwidth reductions to determine the effectiveness of handling method(s) in reducing the bandwidths of identified covert channels for all evaluated configurations. If the independent testing is performed at beta- test sites, the producer shall supply the beta- test plan and the test results. The evaluator shall review the scope and depth of beta testing with respect to the required protection functionality, and shall verify independence of both the test sites and the producer's and beta- test user's test results. The evaluator shall also confirm that the test environment of the beta-test site(s) adequately represents the environment specified in the protection profile. Requirements for Development Environment DER-3: Comprehensive Development Environment Review The evaluator shall review the producer's development and maintenance process description documentation and shall conduct a complete audit of the producer's processes using the evidence generated by each process to determine the degree of discipline enforced upon and within the process, and to determine the protection characteristics associated with the product's development and maintenance. The results of this review shall establish, for the evaluator, the producer's development environment, its policies, and the degree of enforcement maintained during development execution. The review shall also confirm the producer's complete conformance with all relevant development environment requirements. Requirements for Operational Support OSR-3 Comprehensive Operational Support Review The evaluator shall review all documentation focused on the activities of product use (e.g., Users Manuals) and product administration including installation, operation, maintenance, and trusted recovery (e.g., Trusted Facility Management manuals. This review shall assess the clarity of presentation, difficulty in locating topics of interest, ease of understanding, and completeness of coverage. The need for separate manuals dedicated to protection-relevant aspects of the product should be assessed for effectiveness. The evaluator shall execute all documented protection-relevant features and procedures to determine if their descriptions are accurate and correct. Requirements for Design Analysis DA-3: Comprehensive Design Analysis The evaluator shall determine whether the producer has performed the activities defined in the development process assurance requirements of the protection profile for TCB property definition and TCB design. The evaluator shall determine whether the producer has documented these activities as defined in the development evidence requirements of the protection profile. The evaluator shall analyze, with the help of formal methods and appropriate automated tools, the results of the producer's activities for completeness, consistency, and correctness of design with respect to requirements (e.g., validating the formal verification of the design). Requirements for Implementation CI-3: Comprehensive Implementation Analysis The evaluator shall conduct an inspection on a moderate sample of randomly selected product code. The assessment shall focus on the clarity of the coding style, adherence to coding standards, coding documentation, and on possible software defects that may be present with respect to the product's formal design and model. The inspection shall be performed to obtain only a sample of possible software defects, not to capture all such possible defects. The evaluator shall report all discovered defects to the producer; the assessment shall report the number of defects found per line of code inspected from the random sample size. Use of producer-provided code inspection results can supplement this inspection. All trapdoors built into the product for maintenance purposes shall be identified by the producer and shown to be protected by the product. The producer shall correct all discovered defects and the corrected software reinspected. A rigorous analysis of the implementation's correspondence to the verified design shall be performed by the evaluator to validate correctness. Such analysis may be supported by appropriate automated tools. DRAFT LABEL BASED PROTECTION FOR MULTI-USER INFORMATION SYSTEMS LEVEL 4 (LP-4) A Protection Profile Derived from the Federal Criteria for IT Security Version 1.0 December 1992 This document is undergoing review and is subject to modification or withdrawal. The contents of this document should not be referenced in other publications. Supersedes the Trusted Computer System Evaluation Criteria Class A1 DRAFT LABEL-BASED PROTECTION - 4 (LP-4) This Protection Profile has been developed to define a set of technical measures that can be incorporated into remote- access, resource- and information-sharing Information Technology (IT) products that will be used to protect two or more levels of National Security Information classified according to US Executive Order 12356 (EO 12356). This profile can also be used to protect any information that has been designated as sensitive information for which information separation and access are based on sensitivity markings applied to the information. This profile is intended for use in environments where the presence potentially malicious application software (e.g., Trojan Horses) mandate the use of high-assurance products. Compliant IT products will provide highly-structured, conceptually simple protection mechanisms for a multi-level information processing environment with which an organization can construct an automated information system to enhance or optimize the organization's ability to perform its mission. Formal assurance of security policy support and covert channel analysis must be available. Compliant IT products are maintained under very strict configuration management facilities and can only be distributed via a trusted distribution channel. LP-4 compliant products are functionally equivalent to those satisfying profile LP3 in that no additional architectural features or policy requirements are added. The distinguishing feature of systems in this class is the analysis derived from formal design specifications and verification techniques and the resulting high degree of assurance that the TCB is correctly implemented. This assurance is developmental in nature, starting with a formal model of the security policy and a formal interface specification (FIS) of the design. Independent of the particular specification language or verification system used, there are five important criteria for profile LP-4 design verification: a. A formal model of the security policy must be clearly identified and documented, including a mathematical proof that the model interpretation in the TCB is valid (i.e., the model interpretation is consistent with the model axioms) and is sufficient to support the security policy. b. A FIS must be produced that includes abstract definitions of the functions the TCB performs and of the hardware and/or firmware mechanisms that are used to support separate execution domains. c. The FIS of the TCB must be shown to be consistent with the model by formal techniques where possible (i.e., where verification tools exist) and informal ones otherwise. d. The TCB implementation (i.e., in hardware, firmware, and software) must be informally shown to be consistent with the FIS. The elements of the FIS must be shown, using informal techniques, to correspond to the elements of the TCB. The FIS must express the unified protection mechanism required to satisfy the security policy, and it is the elements of this protection mechanism that are mapped to the elements of the TCB. e. Formal analysis techniques must be used to identify and analyze covert channels. Informal techniques may be used to identify covert timing channels. the continued existence of identified covert channels in the system must be justified. In keeping with the extensive design and development analysis of the TCB required of LP4 compliant systems, stringent configuration management is required and procedures are established for securely distributing the system to sites. A system security administrator is supported. Cross References: o Existing Criteria: (1) TCSEC: A1 (2) ITSEC (3) CTCPEC o Other Protection Profiles (1) TBD COMPONENT SUMMARY: LP-4 Functional Component Summary .--------------------------------------------. | | Code & | | Functional Component | Level | |============================================| | Security Policy Support | |----------------------------------+---------| | Accountability | |----------------------------------+---------| | Identification&Authentication | I&A-2 | |----------------------------------+---------| | System Entry | ---- | |----------------------------------+---------| | Trusted Path | TP-2 | |----------------------------------+---------| | Audit | AD-1+ | |----------------------------------+---------| | Access Control | AC-3+ | |----------------------------------+---------| | Discretionary | AC-3+ | |----------------------------------+---------| | Non-Discretionary | AC-3 | |----------------------------------+---------| | Covert Channel Handling | CCH-3 | |----------------------------------+---------| | Availability | ---- | |----------------------------------+---------| | Resource Allocation | ---- | |----------------------------------+---------| | Fault Tolerance | ---- | |----------------------------------+---------| | Security Mgmt. | SM-1++ | |----------------------------------+---------| | Reference Mediation | RM-3 | |----------------------------------+---------| | TCB Logical Protection | P-3 | |----------------------------------+---------| | TCB Physical Protection | ---- | |----------------------------------+---------| | TCB Self-checking | SC-1 | |----------------------------------+---------| | TCB Start-Up and Recovery | TR-1 | |----------------------------------+---------| | TCB Privileged Operation | PO-2 | |----------------------------------+---------| | TCB Ease-of-Use | ---- | `--------------------------------------------' LP-4 Assurance Component Summary .---------------------------------------. | Assurance Components | T7 | |================================|======| | Development Assurance Components | |=======================================| | Development Process | |--------------------------------+------| | TCB Property Definition | PD-4 | |--------------------------------+------| | TCB Design | |--------------------------------+------| | TCB Element Identification | ID-2 | |--------------------------------+------| | TCB Interface Definition | IF-3 | |--------------------------------+------| | TCB Modular Decomposition | MD-3 | |--------------------------------+------| | TCB Structuring Support | SP-3 | |--------------------------------+------| | TCB Design Disciplines | DD-2 | |--------------------------------+------| | TCB Implementation Support | IM-4 | |--------------------------------+------| | TCB Testing and Analysis | |--------------------------------+------| | Functional Testing | FT-3 | |--------------------------------+------| | Penetration Analysis | PA-2 | |--------------------------------+------| | Covert Channel Analysis | CCA3 | |--------------------------------+------| | Operational Support | |--------------------------------+------| | User Security Guidance | UG-1 | |--------------------------------+------| | Administrative Guidance | AG-3 | |--------------------------------+------| | Trusted Generation | TG-3 | |--------------------------------+------| | Development Environment | |--------------------------------+------| | Life Cycle Definition | LC-3 | |--------------------------------+------| | Configuration Management | CM-4 | |--------------------------------+------| | Trusted Distribution | TD-1 | |--------------------------------+------| | Development Evidence | |--------------------------------+------| | TCB Protection Properties | EPP4 | |--------------------------------+------| | Product Development | EPD5 | |--------------------------------+------| | Product Testing & Analysis | |--------------------------------+------| | Functional Testing | EFT3 | |--------------------------------+------| | Penetration Analysis | EPA2 | |--------------------------------+------| | Covert Channel Analysis | ECC2 | |--------------------------------+------| | Product Support | EPS3 | `---------------------------------------' |=======================================| | Evaluation Assurance Components | |=======================================| | Testing | |--------------------------------+------| | Test Analysis | TA-5 | |--------------------------------+------| | Independent Testing | IT-4 | |--------------------------------+------| | Review | |--------------------------------+------| | Development Environment | DER3 | |--------------------------------+------| | Operational Support | OSR3 | |--------------------------------+------| | Analysis | |--------------------------------+------| | Protection Properties | ---- | |--------------------------------+------| | Design | DA-3 | |--------------------------------+------| | Implementation | CI-3 | `---------------------------------------' RATIONALE 16. Information Protection Policy It is anticipated that organizations wishing to process two to three levels of classified information with multiple categories will want to use IT products that are compliant with this profile in their automated information processing systems. These organizations should be able to trust the profile-compliant IT product to contribute to the protection of the classified information at least as much as they trust the properly cleared personnel who are using and managing the system. 17. Protection Philosophy This profile presumes a hostile environment with divided, aggressive users. It provides control of access to shared resources both (1) on the basis of attributes that are controlled by the ordinary users of the system and (2) on the basis of attributes that are controlled only by the system administrators. Profile compliant IT products will minimally meet the following objectives: a. Employ a reference validation mechanism to enforce a formally defined security policy that describes the rules for controlling access to system subjects and objects and use the access control rules to enforce an information flow policy that aims to control the use of covert storage and timing channels. b. Associate explicit sensitivity labels with each subject and object in the system and each port through which information may be exported from or imported to the system. Maintain the accuracy of the sensitivity labels as information moves within the system and through the ports. c. Authenticate the claimed identity of each external human user of the IT product prior to establishing any internal entity to act on behalf of that user and firmly bind the authenticated user identity to the internal entity. d. Selectively keep and protect a log of all actions or events (including use of covert storage channels) that could affect system security so that they can be accurately attributed to the known user or system entity responsible for causing the action or event. Also, alert the system administrator when a series of events indicates an imminent violation of the security policy. e. Contains hardware and software mechanisms that can be independently evaluated to provide sufficient assurance that the system satisfies the previous four objectives. f. Implements the enforcement of objectives a through d in such a fashion that the enforcing mechanisms are protected from tampering and unauthorized changes by the information moving entities that the mechanisms are supposed to control. 18. Expected Threats The requirements for profile conforming IT products assume that these products are being used in an environment where there are different levels and categories of classified data and users of differing clearance levels. A conforming IT product can be reasonably expected to protect the confidentiality of information in an environment where there are three levels and multiple categories of classified data, and two or more levels of cleared users and where there are collaborating, malicious users and software at each clearance level. 19. Assumed Environment 19.1 Characteristics IT products complying with the requirements set forth in this profile are expected to be used in an environment with the following characteristics: a. Multiple users will be accessing the operating system at the same time. b. The IT product hardware base (e.g., CPU, printers, terminals, etc.) is protected from unauthorized physical access. c. One or more personnel are assigned to manage the system in which the IT product is incorporated, including the security of the information it contains. d. A need to control user access to information exists and is based on an explicit sensitivity marking associated with the information (e.g, Secret or Top Secret). e. There is a need to control user access to information exists and is based on that user's identity and membership in organizations or groups. f. The IT product provides facilities for some or all of the authorized users to create programs that use the applications programming interface (API) and make those programs available to other users. g. The IT product is used to provide a cooperative environment for the users to accomplish some task or group of tasks. 19.2 Environment Dependencies Secure installation and operation of a product satisfying these profile requirements depends on provision of a number of elements in the installation environment. These include: a. Physical security must be provided. For US Government classified operation, physical security equivalent to PP-2 would be required. b. Cabling to other devices must be shown to be consistent with policy implemented by the product. For example, a "port" in the product is required to have an assigned label. No device can be connected to the port unless it has been established externally that the device is allowed to receive data with the same label. c. Personnel allowed to access data processed by the installed product must already be authorized for such access. 20. Intended Use Conforming IT products are useful in both general-purpose office automation environments with multiple data sensitivities (or "classifications") and multiple levels of user authorizations (or "clearances") and in specialized computing, network and mission environments. Examples of the office automation environment might include military headquarters and highly competitive procurement offices. Examples of the network environments include use as the basis for a multilevel secure network management center or a trusted guard gateway operating between two networks processing different levels of information. An example of the specialized mission environment might be as a platform for a portable battlefield map and mission management application. FUNCTIONAL REQUIREMENTS Requirements for Identification and Authentication I&A-2 Identification, Authentication, and Authorization 1. The TCB shall require users to identify themselves to it before beginning to perform any other actions that the TCB is expected to mediate. The TCB shall be able to enforce individual accountability by providing the capability to uniquely identify each individual user. The TCB shall also provide the capability of associating this identity with all auditable actions taken by that individual. 2. The TCB shall maintain authentication data that includes information for verifying the identity of individual users (e.g., passwords) as well as information for determining the clearance and authorization of individual users. These data shall be used by the TCB to authenticate the user's identity and to ensure that the subject security level and authorizations of subjects external to the TCB that may be created to act on behalf of the individual user are dominated by the clearance and authorization of that user). 3. The TCB shall protect authentication data so that it cannot be used by any unauthorized user. Requirements for Trusted Path TP-2 Trusted User-to-TCB Communication The TCB shall support a trusted communication path between itself and users for use whenever a positive user-to-TCB connection is required (e.g., login, change of policy attributes). Communications via this trusted path shall be activated exclusively by a user or the TCB and shall be logically isolated and unmistakably distinguishable from other communication paths. Requirements for Audit AD-1+ Minimal Audit 1. The TCB shall be able to create, maintain, and protect from modification or unauthorized access or destruction an audit trail of accesses to the objects it protects. The audit data shall be protected by the TCB so that read access to it is limited to those who are authorized for audit data. 2. The TCB shall be able to record the following types of events: - use of the identification and authentication mechanisms; - introduction of objects into a user's address space (e.g., file open, program initiation), and deletion of objects; - actions taken by computer operators and system administrators and/or system security officers. The TCB shall be able to record any override of human-readable output markings. The TCB shall also be able to audit the identified event that may be used in the exploitation of covert channels. The TCB shall contain a mechanism that is able to monitor the occurrence or accumulation of auditable events that may indicate an imminent violation of the product's security policy. This mechanism shall be able to immediately notify the security administrator when thresholds are exceeded, and, if the occurrence or accumulation of these security relevant events continues, the system shall take the least disruptive action to terminate the event. [AD-3] 3. For each recorded event, the audit record shall identify: date and time of the event, user, type of event, and success or failure of the event. For identification/authentication events the origin of request (e.g., terminal ID) shall be included in the audit record. For events that introduce an object into a user's address space and for object deletion events the audit record shall include the name and the object security level. 4. The system administrator shall be able to selectively audit the actions of one or more users based on individual identity and/or object security level. Requirements for Access Control AC-3 + Extended Access Control 1. Definition of Access Control Attributes The TCB shall define and protect access control attributes for subjects and objects. Subject attributes shall include named individuals or defined groups or both. Object attributes shall include defined access rights (e.g., read, write, execute) that can be assigned to subject attributes. Access control attributes corresponding to each individual policy shall be identified. Sensitivity labels associated with each subject and storage object that is directly or indirectly accessible by subjects external to the TCB shall be maintained by the TCB. The sensitivity labels shall be used as the basis for mandatory access control decisions. The subjects and objects shall be assigned sensitivity labels that are a combination of hierarchical classification levels and non- hierarchical categories, and the labels shall be used as the basis for mandatory access control decisions. The TCB shall be able to support two or more such security levels. The subject and object attributes shall accurately reflect the sensitivity and integrity of the subject or object. When exported by the TCB, sensitivity labels shall accurately and unambiguously represent the internal labels and shall be associated with the information being exported. The TCB shall immediately notify a terminal user of each change in the security level associated with that user during an interactive session. A terminal user shall be able to query the TCB as desired for a display of the subject's complete sensitivity label. The TCB shall support the assignment of minimum and maximum security levels to all attached physical devices. These security levels shall be used by the TCB to enforce constraints imposed by the physical environments in which the devices are located. 2. Administration of Access Control Attributes The TCB shall define and enforce rules for assignment and modification of access control attributes for subjects and objects. The effect of these rules shall be that access permission to an object by users not already possessing access permission is assigned only by authorized users. These rules shall allow authorized users to specify and control sharing of objects by named individuals or defined groups of individuals, or by both, and shall provide controls to limit propagation of access rights. (i.e., these rules shall define the distribution, revocation, and review of access control attributes). The controls defined by these rules shall be capable of specifying for each named object, a list of individuals and a list of groups of named individuals, with their respective access rights to that object. Furthermore, for each named object, it shall be possible to specify a list of named individuals and a list of groups of named individuals for which no access to the object is given [AC-4}. These controls shall be capable of including or excluding access to the granularity of a single user. The rules for assignment and modification of access control attributes shall include those for attribute assignment to objects during import and export operations. Export of Labeled Information The TCB shall designate each communication channel and I/O device as either single-level or multilevel. Any change in this designation shall be done manually and shall be auditable by the TCB. The TCB shall maintain and be able to audit any change in the security level or levels associated with a communication channel or I/O device. 1. Exportation to Multilevel Devices When the TCB exports an object to a multilevel I/O device, the sensitivity label associated with that object shall also be exported and shall reside on the same physical medium as the exported information and shall be in the same form (i.e., machine-readable or human-readable form). When the TCB exports or imports an object over a multilevel communication channel, the protocol used on that channel shall provide for the unambiguous pairing between the sensitivity labels and the associated information that is sent or received. 2. Exportation to Single-Level Devices Single-level I/O devices and single-level communication channels are not required to maintain the sensitivity labels of the information they process. However, the TCB shall include a mechanism by which the TCB and an authorized user reliably communicate to designate the single security level of information imported or exported via single-level communication channels or I/O devices. 3. Labeling Human-Readable Output The system administrator shall be able to specify the printable label names associated with exported sensitivity labels. The TCB shall mark the beginning and end of all human-readable, paged, hardcopy output (e.g., line printer output) with human-readable sensitivity labels that properly represent the sensitivity of the output. The TCB shall, by default, mark the top and bottom of each page of human-readable, paged, hardcopy output (e.g., line printer output) with human- readable sensitivity labels that properly represent the overall sensitivity of the output or that properly represent the sensitivity of the information on the page. The TCB shall, by default and in an appropriate manner, mark other forms of human-readable output (e.g., maps, graphics) with human-readable sensitivity labels that properly represent the sensitivity of the output. Any override of these marking defaults shall be auditable by the TCB. Import of Non-labeled Data In order to import non-labeled data, the TCB shall request and receive from an authorized user the security level of the data, and all such actions shall be auditable by the TCB. If different rules of assignment and modification of access control attributes apply to different subjects and/or objects, the totality of these rules shall be shown to support the defined policy. 3. Authorization of Subject References to Objects The TCB shall define and enforce authorization rules for the mediation of subject references to objects. These rules shall be based on the access control attributes of subjects and objects. These rules shall, either by explicit user action or by default, provide that objects are protected from unauthorized access. The scope of the authorization rules shall include all subjects, storage objects (e.g., processes, segments, devices) and associated access control attributes that are directly or indirectly accessible to subjects external to the TCB. The scope of the authorization rules shall also include all policy and status attributes of subjects and storage objects (e.g., quotas, object existence, size, access time, creation and modification time, locked/unlocked). If different rules apply to different subjects and objects, the totality of these rules shall be shown to support the defined policy. The authorization rules for the mandatory access control policy shall include: The TCB shall enforce a mandatory access control policy over all resources (i.e., subjects, storage objects, and I/O devices that are directly or indirectly accessible by subjects external to the TCB. The following requirements shall hold for all accesses between all subjects external to the TCB and all objects directly or indirectly accessible by these subjects: A subject can read an object only if the hierarchical classification in the subject's security level is greater than or equal to the hierarchical classification in the object's security level and the non- hierarchical categories in the subject's security level include all the non-hierarchical categories in the object's security level. A subject can write an object only if the hierarchical classification in the subject's security level is less than or equal to the hierarchical classification in the object's security level and all the non-hierarchical categories in the subject's security level are included in the non-hierarchical categories in the object's security level. The authorization rules for each policy shall be defined separately. The TCB shall define and enforce the composition of policies, including the enforcement of the authorization rules (e.g., subject and object type coverage, enforcement precedence). 4. Subject and Object Creation and Destruction The TCB shall control the creation and destruction of subjects and objects. These controls shall include object reuse. That is, all authorizations to the information contained within a storage object shall be revoked prior to initial assignment, allocation or reallocation to a subject from the TCB's pool of unused storage objects; information, including encrypted representations of information, produced by a prior subjects' actions shall be unavailable to any subject that obtains access to an object that has been released back to the system. Requirements for Covert Channel Handling CCH-3 Timing Channel Audit and Bandwidth Limitation 1. The TCB and privileged applications shall include functions that help audit the use of covert storage channels. These functions shall enable the identification of the transmitter, receiver, and specific covert channels used (e.g., TCB and privileged application element used to transmit information). TCB functions that help limit the bandwidth and/or eliminate covert storage channels shall also be provided. The bandwidth limits for each channel shall be settable by system administrators. 2. The functions added to the TCB and privileged applications for storage channel auditing shall be identified for each channel and shall be available in common product configurations. If audit functions are not added to certain storage channels (e.g., hardware storage channels), evidence must be provided to justify why these channels do not represent a security threat for the intended use of the product. TCB and privileged application functions that help limit the bandwidth and/or eliminate covert storage or timing channels shall also be available in common product configurations. If channel bandwidth limitation and channel elimination functions are not added to certain storage or timing channels (e.g., hardware channels), evidence must be provided to justify why these channels do not represent a security threat for the intended use of the product. Requirements for Security Management SM-1++ Minimal Security Management 1. The TCB shall provide an installation mechanism for the setting and updating of its configuration parameters, and for the initialization of its protection-relevant data structures before any user or administrator policy attributes are defined. It shall allow the configuration of TCB internal databases and tables. 2. The TCB shall provide protected mechanisms for displaying and modifying the security policy parameters. 3. The TCB shall provide protected mechanisms for manually displaying, modifying, or deleting user registration and account parameters. These parameters shall include unique user identifiers, their account, and their associated user name and affiliation. The TCB shall allow the manual enabling and disabling of user identities and/or accounts. 4. The TCB shall support separate operator and administrator functions. The operator functions shall be restricted to those necessary for performing routine operations. The operator functions shall allow the enabling and disabling of peripheral devices, mounting of removable storage media, backing-up and recovering user objects; maintaining the TCB hardware and software elements (e.g., on-site testing); and starting and shutting down the system. The administrative functions shall support separate security administrator and auditor roles. The TCB shall enable the administrators to perform their functions only after taking distinct auditable action to assume an administrator role. Non- security functions that can be performed in the security administrative role shall be limited strictly to those essential to performing the security role effectively.[SM-4] 5. The use of the protected mechanisms for system administration shall be limited to authorized administrative users. Requirements for Reference Mediation RM-3 Mediation of References to Subject and Object Attributes 1. The TCB shall mediate all references to subjects, objects, resources, and services (e.g., TCB functions) described in the TCB specifications. The mediation shall ensure that all references are directed to the appropriate security-policy functions. 2. Reference mediation shall include control of references to all subjects, objects, and resources protected under the TCB security policy, to their policy (i.e., access rights, security levels) and status attributes (e.g., existence, length, locking state). 3. References issued by privileged subjects shall be mediated in accordance with the policy attributes defined for those subjects. Requirements for Logical TCB Protection P-3 TCB Isolation and Timing Consistency The TCB shall maintain a domain for its own execution that protects it from external interference and tampering (e.g., by reading or modification of its code and data structures). The protection of the TCB shall provide TCB isolation and noncircumventability of TCB isolation functions as follows: 1. TCB Isolation requires that (1) the address spaces of the TCB and those of unprivileged subjects are separated such that users, or unprivileged subjects operating on their behalf, cannot read or modify TCB data structures or code, (2) the transfers between TCB and non-TCB domains are controlled such that arbitrary entry to or return from the TCB are not possible; and (3) the user or application parameters passed to the TCB by addresses are validated with respect to the TCB address space, and those passed by value are validated with respect to the values expected by the TCB. 2. Non-circumventability of TCB isolation functions requires that the permission to objects (and/or to non-TCB data) passed as parameters to the TCB are validated with respect to the permissions required by the TCB, and references to TCB objects implementing TCB isolation functions are mediated by the TCB. TCB protection shall also maintain the consistency of TCB global variables and eliminate undesirable dependencies of the TCB on unprivileged subject or user actions. 3. Consistency of TCB global variables requires that consistency conditions defined over TCB internal variables, objects, and functions hold before and after any TCB invocation. 4. Elimination of undesirable dependencies of the TCB on unprivileged subject actions requires that any TCB invocation by an unprivileged subject (or user) input to a TCB call may not place the TCB in a state such that it is unable to respond to communication initiated by other users. Furthermore, TCB protection shall maintain the timing consistency of condition checks. 5. Timing consistency of condition checks requires that a validation check holds at the instant when the TCB action depending on that check is performed. Requirements for TCB Self Checking SC-1 Minimal Self Checking Hardware and/or software features shall be provided that can be used to periodically validate the correct operation of the on-site hardware and firmware elements of the TCB. Requirements for TCB Start-Up and Recovery TR-1 Minimal Requirements for Recovery or Start-up Procedures and/or mechanisms shall be provided to assure that, after a TCB failure or other discontinuity, recovery without protection compromise is obtained. Requirements for TCB Privileged Operation PO-2 Privilege Association with TCB Modules 1. TCB privileges needed by individual functions, or groups of functions, of a functional component shall be identified. Privileged TCB calls or access to privileged TCB objects, such as user and group registration files, password files, security and integrity-level definition file, role definition file, audit-log file shall also be identified. It shall be possible to associate TCB privileges with TCB operations performed by administrative users. 2.The modules of a TCB function shall be associated only with the privileges necessary to complete their task. 3. Support for product privilege implementation and association with TCB modules provided by lower-level mechanisms or procedures (e.g., operating system, processors, language) shall be provided. ASSURANCES Requirements for TCB Property Definition PD-4 Formal Specification of TCB Properties The developer shall provide formal models for the functional components and sub-components of the profile. At a minimum, a formal model of the access control components shall be provided. The properties of the formal models shall be clearly stated. The developer shall provide a formal interpretation of the models in the FIS of the product's TCB. For each model entity, the developer shall: (1) identify the TCB elements and their FIS (if any) that implement that entity; (2) specify the operation of these TCB elements, and (3) prove that the FIS of these elements is consistent with the model properties. The developer's interpretation of each formal model, which specifies the TCB properties, shall identify all TCB and FIS elements (if any) that do not correspond to any model entity and shall explain why these elements do not render the TCB properties invalid. An informal model of reference mediation and TCB protection shall be provided. For the components that are not modeled, the developer shall interpret the functional requirements of the protection profile within the product TCB. For each functional requirement, the developer shall: (1) identify the TCB elements and their TCB interfaces (if any) that implement that requirement; (2) describe the operation of these TCB elements, and (3) explain why the operation of these elements is consistent with the functional requirement. The developer's interpretation of each functional requirement, which describes the TCB properties, shall include all the TCB elements. Requirements for TCB Element Identification ID-2: TCB Element Justification The vendor shall identify the TCB elements (i.e., software, hardware/firmware code and data structures). Each element must be unambiguously identified by its name, type, release, and version number (if any). The developer shall justify the protection relevance of the identified elements (i.e., only elements that can affect the correct operation of the protection functions shall be included in the TCB). If protection-irrelevant elements are included in the TCB, the developer shall provide a rationale for such inclusion. Requirements for TCB Interface Definition IF-3: Formal Interface Specification The developer shall define all external (e.g., command, software, and I/O) administrative (i.e., privileged) and non-administrative interfaces to the TCB. The developer shall provide and maintain a descriptive interface specification (DIS) of the TCB that completely and accurately describes the TCB in terms of exceptions, error messages, and effects. The DIS shall identify the TCB call conventions (e.g., parameter order, call sequence requirements), and exceptions signaled. The DIS shall also include the TCB call identifier, parameter types (e.g., input, output), the effect of the call, TCB call conventions (e.g., parameter order, call sequence requirements), and exceptions handled and signaled. It shall be shown to be an accurate description of the TCB interface. A Formal Interface Specification (FIS) of the TCB shall be maintained that accurately describes the TCB in terms of the call identifier, parameter types (e.g., input, output), the effect of the call, TCB call conventions (e.g., parameter order, call sequence requirements), and exceptions signaled. The DIS and FIS shall include those components of the TCB that are implemented as hardware and/or firmware if their properties are visible at the TCB interface. If the TCB consists of a kernel and privileged processes, the developer shall separately identify and define the interfaces for the kernel and each privileged process. The TCB interface definition must also include all effects of a call including the direct visibility and alterability of internal TCB variables and functions. Requirements for TCB Modular Decomposition MD-3: Module Relationship Analysis The developer shall design the TCB as a small number (e.g., 10 to 100) of design and implementation subsystems that have well-defined functional relationships and shared-data dependencies. The developer shall identify the specific TCB protection properties and functions associated with each subsystem and the TCB interfaces (if any) implemented by each subsystem. The developer shall design each subsystem as a set of modules. For each module, the developer shall describe: the role or purpose of the module, the set of related functions performed by the module, and the module interface (i.e., the set of invocable functions, calling conventions, parameters, global variables, and results). The developer shall identify the protection functions of, and describe the interfaces between, these modules. The developer shall choose the modules so that the set of functions implemented by the module, the module's contribution to the TCB protection properties, and the interface(s) to the module can be described concisely (e.g., the module shall have a single purpose). The TCB structuring into modules shall be based on well- defined module relationships; for example, the contains relation (e.g., A is part of B), the "uses" relation (e.g., A is correct only if B is correct). The developer shall analyze the correctness dependencies among these modules. This analysis may include, but is not restricted to, service and environmental dependencies. Requirements for TCB Structuring Support SP-3: Structured Protection Mechanisms The TCB shall maintain process isolation. The TCB shall separate those elements that are protection- critical from those that are not. Features in hardware, such as segmentation, shall be used to support logically distinct storage objects with separate access-control attributes (e.g., readable, writable). The TCB shall employ a complete, conceptually simple, protection mechanism with precisely defined semantics. This mechanism shall play a central role in enforcing the internal structuring of the TCB and the product. Requirements for Design Disciplines DD-2: Extended Disciplines for TCB Structuring The developer shall design the product to minimize the complexity of the TCB. System engineering shall be directed towards excluding from the TCB modules that are not protection critical. The TCB design shall reflect use of modern software engineering techniques), such as data hiding and abstraction (i.e., data, functional, and control abstractions) and well-defined exception-handling. The TCB design shall also include use of layering (including a rationale for each layering violation), high-level synchronization constructs, and multi-tasking/ multi-threading. Requirements for TCB Implementation Support IM-4: Naming Support For Design Correspondence The developer shall maintain engineering diagrams and source code (as applicable) for all TCB elements. The developer shall identify the programming languages used to develop the TCB software and reference the definitions of those languages. The developer shall identify any implementation dependent options of the programming language compiler(s) used in the TCB source code. The developer shall describe coding standards followed during the implementation of the product and shall ensure that all source code complies with these standards. The diagrams and source code for each module of the TCB shall be identified and provided as configuration items. The diagrams and source code shall be named using the same conventions as those used in the TCB design. The developer shall explain how the programming languages used help establish the correspondence between the TCB implementation and design. Requirements for Developer Functional Testing FT-3: Specification-Driven TCB Interface Testing The developer shall test the TCB interface to show that all claimed protection functions work as stated in the TCB interface description or specification. The tests shall exercise the boundary conditions of the protection functions. The developer shall generate the test conditions and data from the Descriptive Interface Specification(s). The developer test procedures shall include the tests used to demonstrate the absence of all flaws discovered in previous versions of the TCB. The developer shall correct all flaws discovered by testing and shall retest the TCB to show that all discovered flaws have been eliminated, no new flaws have been introduced, and the protection functions work as claimed. Requirements for Penetration Analysis PA-2 Flaw-Hypothesis Testing The developer shall define the TCB configuration, interface, and protection functions that are subject to penetration testing. For each test, the developer shall identify the goal of the test and the criteria for successful penetration. The developer shall illustrate how, in addition to system reference manuals and TCB interface description, the DIS, source code, and hardware and firmware specifications are used to define penetration-test conditions. For each test, the developer shall document all test conditions, data (e.g., test set-up, function call parameters, and test outcomes), and coverage. The developer shall generate the test conditions from flaw-hypotheses derived by negating assertions of TCB design capabilities and by providing counter examples that show that these assertions are false. The developer shall confirm the flaw hypotheses by checking design and implementation documentation, by defining the test data and running test programs, or by referring to known classes of penetration flaws found in other TCBs. The refutation of any hypothesis shall be documented. For each uncovered flaw, the developer shall define and document scenarios of flaw exploitation and shall identify all penetration outcomes resulting from that scenario. The cause of the flaw shall be identified and documented. Requirements for Covert-Channel Analysis CCA-3 Formal Covert Channel Analysis 1. Identification: The developer shall identify all sources of information used in covert-channel analysis. These sources shall include TCB reference manuals, DIS, and FIS. The sources of information and methods of identification shall include processor specifications whenever the identification method includes source code and hardware analysis. The developer shall define the identification method used. The developer shall define the identification method used. The developer shall demonstrate that the chosen identification method is sound (e.g., it leads to the discovery of all covert channels in the FIS or source documentation) and repeatable (i.e., independent evaluators can use the method on the same sources of covert-channel information and can obtain the same results.) The method shall be applied on the FIS of the TCB, and shall include syntactic information-flow analysis (with or without the use of semantic analysis) or noninterference analysis. The identification of covert channels shall include specification-to- code correspondence. The developer shall define scenarios of use for each cover channel. The developer shall also define timing channel scenarios, and shall identify all functions that provide independent sources of timing (e.g., CPUs, I/O processors). 2. Bandwidth Measurement or Engineering Estimation: The developer shall define the method used for covert-channel bandwidth estimation. The method shall be based on information theory methods. In measuring TCB performance for covert- channel-bandwidth estimation, the developer shall satisfy the following assumptions. The maximum bandwidth estimation shall be based on the assumptions that the covert channel is noiseless, that the senders and receivers are not delayed by the presence of other processes in the product, and that the sender-receiver synchronization time is negligible. The developer shall select TCB primitives to be measured for bandwidth determination from real scenarios of covert channel use. The developer shall specify TCB measurement environment for the bandwidth measurements. This specification shall include: (1) the speed of the product functions, (2) the product configuration, (3) the sizes of the memory and cache components, and (4) the product initialization. The sensitivity of the measurement results to configuration changes shall be documented. The covert-channel measurements shall include the fastest TCB function calls for altering, viewing, and setting up the transmission environment; the demonstrably fastest process (context) switch time shall also be included in the bandwidth measurements. All measurements shall be repeatable. 3. Covert Channel Testing: The developer shall test all the use of all identified covert channels to determine whether the handling functions work as intended. Requirements for User Guidance UG-1: Users' Guide The developer shall provide a User Guide which describes all protection services provided and enforced by the TCB. The User Guide shall describe the interaction between these services and provide examples of their use. The User Guide may be in the form of a summary, chapter or manual. The User Guide shall specifically describe user responsibilities. These shall encompass any user responsibilities identified in the protection profile. Requirements for Administrative Guidance AG-3: Role-Based Administrative Guidance The developer shall provide a Trusted Facility Manual intended for the product administrators and operators that describes how to use the TCB security services (e.g., Access Control, System Entry, or Audit) to enforce a system security policy. The Trusted Facility Manual shall include the procedures for securely configuring, starting, maintaining, and halting the TCB. The Trusted Facility Manual shall explain how to analyze audit data generated by the TCB to identify and document user and administrator violations of this policy. The Trusted Facility Manual shall explain the unique security-relevant privileges and functions of administrators and operators. The Trusted Facility Manual shall also explain the distinct security-relevant privileges and functions of the TCB and how they can be selectively granted to provide fine-grained, multi-person or multi-role system and application administration policies. The Trusted Facility Manual shall describe the administrative interaction between security services. The Trusted Facility Manual shall identify all hardware, firmware, software, and data structures comprising the TCB. The detailed audit record structure for each type of audit event shall be described. The Trusted Facility Manual shall explain how configure the product to mitigate, eliminate, or audit their exploitation. The Trusted Facility Manual shall describe the cautions about and procedures for using the TCB as a base for site-specific secure applications. The Trusted Facility Manual shall describe procedures for securely regenerating the TCB after any part is changed (e.g., due to adding devices or installing flaw corrections to the TCB software). The Trusted Facility Manual shall be distinct from User Guidance, and encompass any administrative responsibilities identified in security management. Requirements for Trusted Generation TG-3: Trusted Generation With Secure State Review The developer shall establish and document the procedures that a consumer must perform to generate an operational TCB from the delivered copy of the master TCB. The consumer documentation shall identify any system parameters, which are initialized or set during system generation, that affect the TCB's conformance to the protection profile and state the acceptable ranges of values for those parameters. The product shall be delivered with each of these parameters set to its fail-safe defaults. The developer shall provide the consumer with a capability to review the product security state (e.g., by providing a program, which could be executed after generating and starting the TCB, that determines the consistency of the protection-relevant parameters). Requirements for Life Cycle Definition LC-3: Measurable Life Cycle Process The developer shall develop and maintain the product using a well defined, standardized, and measurable engineering process. The developer shall explain why the process was chosen and how the developer uses it to develop and maintain the product. The developer shall comply with the engineering process standard. The process shall incorporate a security policy that states the technical, physical, procedural, personnel, and other measures used by the developer to protect the product and its documentation. The developer shall demonstrate that each development process and support process requirement of the protection profile is satisfied by some part, or parts, of the developer's process. The developer shall identify the programming languages used to develop the TCB software and reference the definitions of those languages. The developer shall identify any implementation dependent options of the programming language compiler(s) used to implement the TCB software and reference the definitions of those languages.The developer shall describe coding standards followed during the implementation of the product and shall ensure that all source code complies with these standards. Requirements for Configuration Management CM-4: Extended Configuration Management The developer shall establish configuration control and generation procedures employing automated tools for developing and maintaining the TCB. The procedures shall be employed to ensure that all changes to the TCB are consistent with the product's protection properties and security policy. The developer shall employ these tools to track and control changes to development evidence, implementation data (e.g., source code and hardware diagrams), executable versions of the TCB, test documentation and procedures, identified flaws, and consumer documentation. The procedures shall include a formal acceptance process for protection-relevant changes. The configuration control procedures shall assure a consistent mapping among documentation and code associated with the current version of the TCB and permit the regeneration of any supported version of the TCB. The developer shall provide tools for the generation of a new version of the TCB from source code. Also, tools shall be available for comparing a newly generated version with the previous TCB version to ascertain that only the intended changes have been made in the code that will actually be used as the new version of the TCB. The developer shall use a combination of technical, physical, and procedural safeguards to protect the master copy or copies of all material used to generate the TCB from unauthorized modification or destruction. Requirements for Trusted Distribution TD-1: TCB Modification Detection During Distribution The developer shall establish procedures and employ appropriate technical measures to detect modifications to any TCB-related software, firmware, and hardware, including updates, that is transferred from the development environment to a consumer's site. Requirements for Evidence of TCB Protection Properties EPP-4 Evidence of Formal Model Interpretation in the FIS The developer shall provide documentation which describes the correspondence between the functional component requirements and the TCB elements and interfaces. This documentation shall describe how the TCB implements the reference monitor concept. The developer shall also provide a formal access-control model and an informal reference mediation and TCB protection model. The TCB properties, which are defined by this correspondence and the interpretation of these models within the DIS and FIS of the TCB shall be documented by the product developer. Requirements for Evidence of Product Development EPD-5: Policy Consistency Of The FIS The developer shall provide a Descriptive Interface Specification (DIS) that describes the functions, effects, exceptions and error messages visible at the TCB interface and includes a convincing argument that the DIS is consistent with the formal model of the policy. The developer shall show that the DIS is an accurate representation of the TCB's external interfaces. The developer shall provide a Formal Interface Specification (FIS) that rigorously defines the protection functions available at the TCB interface in terms of: the protection properties implemented by each function, the precise semantics for invoking each function, the effects of each function (i.e., returned values and effect on the TCB state), and the possible exceptions and error messages returned by each function. The FIS shall be accompanied by a convincing argument that it is consistent with the formal model of the product protection policy. This argument shall be constructed using both manual and machine-assisted specification and verification methods. Machine- assisted specification and verification methods shall be approved by the product evaluation authority. The developer shall provide TCB Design Specifications that include: a list of the TCB elements (hardware, software, and firmware configuration items); a list of protection services provided to the TCB by hardware, software, and firmware that is not part of the TCB; an explanation of the techniques and criteria used during the modular decomposition of the TCB; a description of the policy allocations, functions, and interactions among the major TCB subsystems; module level descriptions of all software and hardware in the TCB; and an argument that the design implements exactly the functions specified in the FIS. The developer shall provide TCB Implementation Data consisting of the engineering diagrams for all hardware included in the TCB and the source code used to generate the TCB software and firmware. The developer shall show, through either manual or machine-assisted correspondence methods, that the TCB software, firmware, and hardware implement the documented TCB design. Requirements for Evidence of Functional Testing EFT-3: Evidence of Specification-Driven Testing The developer shall provide evidence of the functional testing that includes the test plan, the test procedures, and the results of the functional testing. The test, plans, procedures, and results shall be maintained under the same configuration control as the TCB software. The test plans shall identify the TCB specification used in the derivation of the test conditions, data, and coverage analysis. Requirements for Evidence of Penetration Analysis EPA-2: Evidence of Flaw-Hypothesis Generation and Testing The developer shall provide evidence of penetration testing. The penetration evidence shall identify all product documentation and development evidence on which the search for flaws was based. The penetration evidence shall describe the scenarios for exploiting each potential flaw in the system and the penetration test conditions, data (e.g., test set-up, function call parameters, and test outcomes), coverage, and conclusions derived from each scenario. The penetration evidence shall summarize both refuted and confirmed flaws hypothesis. Requirements for Evidence of Covert Channel Analysis ECC-2: Evidence of Covert Channel Analysis and Handling The developer's documentation shall present the results of the covert channel analysis and the trade-offs involved in restricting these channels. All auditable events that may be used in the exploitation of known covert channels shall be identified. The developer shall provide the bandwidths of known covert channels whose use is not detectable by the auditing mechanism. The documentation of each identified covert channel shall consist of the variables, timing sources, and the TCB interface functions that can be used to transmit information. The measurements of each TCB function call used by covert channels must be documented and the bandwidth computation shall be included for each channel. The measurement environment should be documented as specified. Test documentation shall include results of testing the effectiveness of the methods used to reduce covert-channel bandwidths. Requirements for Evidence of Product Support EPS-3: Evidence of Measured Product Support The developer shall provide documentation that defines, explains, and justifies the policies, procedures, plans, and tools established by the developer to satisfy the Operational Support and Development Environment requirements of the protection profile. The documentation shall also explain how the developer periodically evaluates compliance with the established procedures, policies, and plans. Requirements for Test Analysis TA-5: Formal Test Analysis The evaluator shall assess whether the producer has performed the activities defined in the development assurance requirements of the protection profile for functional testing and penetration analysis, and whether the producer has documented these activities as defined in the development evidence requirements of the protection profile. The evaluator shall analyze the results of the producer's testing activities for completeness of coverage and consistency of results, and general correctness (e.g., defect trend from regression testing). This analysis shall examine the testability of requirements, use of the FIS for test derivation, the adequacy of the tests to measure the required properties, the deviation of the actual results obtained from the expected results. The analysis shall extend to trace all defects identified, corrected, and retested. The analysis shall include an assessment of test coverage and completeness, and defect frequency. The results of testing shall be interpreted in terms that express product performance and protection adequacy. The evaluator shall determine whether the product's protection properties, as defined for the entire TCB, and all relevant known penetration flaws have been tested. The evaluator shall independently develop, test, and document additional flaw hypotheses. The evaluator shall assess testing results to determine whether the product's TCB works as claimed, that the TCB's implementation is consistent with the FIS, and whether there are any obvious ways (i.e., ways that are known, or that are readily apparent or easily discovered in product documentation) for an unauthorized user to bypass the policy implemented by the TCB or otherwise defeat the product's TCB, and whether all discovered TCB flaws have been corrected and no new TCB flaws introduced. No design flaws and no more than a few correctable implementation flaws may be found during testing and there shall be reasonable confidence that few remain. If covert channel handling methods have been implemented, the testing results shall show that the methods used to reduce covert channel bandwidths have been effective for all evaluated configurations. The evaluator shall determine whether the product is completely resistant to penetrations. IT-4: Formal Independent Testing. The evaluator shall independently perform functional and elementary penetration testing to confirm test results. This testing shall be based on (1) the results of producer or other independent testing, (2) the TCB's FIS, (3) the product's design and implementation documentation, (4) the product's user and administrative documentation, (5) relevant known penetration flaws, and (6) evaluator-developed TCB penetration flaw hypotheses and corresponding tests that attempt to exploit the hypothesized flaws. Satisfactory completion consists of demonstrating that all TCB functions work as described in the product's relevant documentation, that the TCB functions are consistent with the FIS, that test results are consistent, and that no discrepancies exist between the documentation and the product. Satisfactory penetration test completion shall be determined by the subjective judgement of the evaluator (which may be supported algorithmically). Test duration agreements may further constrain this judgement. Categorization of an actual penetration flaw shall be based on the reproducibility of that flaw. Flaws that are discovered, but are not reproducible shall remain categorized as potential penetration flaws. All actual penetration flaws must be corrected and retested. The evaluator shall provide a penetration test plan document that describes the additional evaluator-developed flaw hypotheses and associated tests. The evaluator shall execute these tests and shall report any discovered flaws to the producer as part of the testing results. At the conclusion of penetration testing, the evaluator shall provide copies of this penetration test plan and its test results to the producer. The producer shall ensure that this test plan and its test results are incorporated into the rest of the product's testing documentation and that such documentation is available for further analysis throughout the life of the product. The evaluator shall test for covert channel bandwidth reductions to determine the effectiveness of handling method(s) in reducing the bandwidths of identified covert channels. Requirements for Development Environment DER-3: Comprehensive Development Environment Review The evaluator shall review the producer's development and maintenance process description documentation and shall conduct a complete audit of the producer's processes using the evidence generated by each process to determine the degree of discipline enforced upon and within the process, and to determine the protection characteristics associated with the product's development and maintenance. The results of this review shall establish, for the evaluator, the producer's development environment, its policies, and the degree of enforcement maintained during development execution. The review shall also confirm the producer's complete conformance with all relevant development environment requirements. Requirements for Operational Support OSR-3 Comprehensive Operational Support Review The evaluator shall review all documentation focused on the activities of product use (e.g., Users Manuals) and product administration including installation, operation, maintenance, and trusted recovery (e.g., Trusted Facility Management manuals. This review shall assess the clarity of presentation, difficulty in locating topics of interest, ease of understanding, and completeness of coverage. The need for separate manuals dedicated to protection-relevant aspects of the product should be assessed for effectiveness. The evaluator shall execute all documented protection-relevant features and procedures to determine if their descriptions are accurate and correct. Requirements for Design Analysis DA-3: Comprehensive Design Analysis The evaluator shall determine whether the producer has performed the activities defined in the development process assurance requirements of the protection profile for TCB property definition and TCB design. The evaluator shall determine whether the producer has documented these activities as defined in the development evidence requirements of the protection profile. The evaluator shall analyze, with the help of formal methods and appropriate automated tools, the results of the producer's activities for completeness, consistency, and correctness of design with respect to requirements (e.g., validating the formal verification of the design). Requirements for Implementation CI-3: Comprehensive Implementation Analysis The evaluator shall conduct an inspection on a moderate sample of randomly selected product code. The assessment shall focus on the clarity of the coding style, adherence to coding standards, coding documentation, and on possible software defects that may be present with respect to the product's formal design and model. The inspection shall be performed to obtain only a sample of possible software defects, not to capture all such possible defects. The evaluator shall report all discovered defects to the producer; the assessment shall report the number of defects found per line of code inspected from the random sample size. Use of producer-provided code inspection results can supplement this inspection. All trapdoors built into the product for maintenance purposes shall be identified by the producer and shown to be protected by the product. The producer shall correct all discovered defects and the corrected software reinspected. A rigorous analysis of the implementation's correspondence to the verified design shall be performed by the evaluator to validate correctness. Such analysis may be supported by appropriate automated tools. Downloaded From P-80 International Information Systems 304-744-2253