Home
        Security Target - Common Criteria
         Contents
1.                                                                19  3 1 DEFINITION OF SUBJECTS  OBJECTS AND OPERATIONS ui 19  3 2 ORGANISATIONAL SECURITY POLICIES  P                    ees es se ee ee ee ee ee ee ee ee ee ee ee ee 24  3 3 ASSUMPTIONS       ee ente tete ie pU ee Ee e t eeu ide e Pee rte 25  3 4 THREATS        EE nee etu                   T LE 26  4  TOE SECURITY OBJECTIVES                                                                              28  4 1 SECURITY OBJECTIVES FOR THE TOE  SOT  essere 28  4 2 SECURITY OBJECTIVES FOR THE ENVIRONMENT  SOB                                        30  5  IT SECURITY REQUIREMENITS                                                                          32  5 1 TOE SECURITY FUNCTIONAL REQUIREMENTS ee ese ee ee ee ee se ee ee ee ee ee ee ee ee ee ee ee ee ee 33  2 STRENGTH OF FUNCTION                              47  5 3 TOE SECURITY ASSURANCE REQUIREMENTS                                            48  5 4 SECURITY REQUIREMENTS FOR THE IT ENVIRONMENT    49  6  TOE SUMMARY SPECIFICATION                                                                       50  6 1 TOE SECURITY FUNCTIONS ua ee ese esse se oreo gee ee ee eee eee eee eee ee 50  6 2 ASSURANCE MEASURES    aa Reg ee GE REN Ge ao esa ed N Ee OTi 65  Ts SPP  CLAIMS EE EE ER EEE 68  Bi URA TIONAL ORE 69  8 1 SECURITY OBJECTIVES                      69  8 2 SECURITY REQUIREMENTS RATIONALE uses 73  8 3 TOE SUMMARY SPECIFICATION RATIONALE             eee se se see ee 
2.          FLS 1 to preserve the secure state of the Secure IT  Platform   FPT SEP 1  to separate the logical execution of the TOE from any other  programs running on the Secure IT Platform    e        STM 1 to provide a reliable time stamp for correct audit file records     SOE MODE SYNC   The objective SOE  MODE  SYNC is implemented by a series of SFRs that are   provided by the Secure IT  Platform    e FDP ACF 1 and        ACC 1 to restrict access to the Secure IT Platform and  the TOE to S SysOper   e      UAU 2 and      UID 2 to authenticate and identify S SysOper    e FMT SMR 1 to maintain S SysOper as a role for the Secure IT  Platform    Note that SOE  MODE  SYNC is realized by IT  but also by non IT     SOE SECURE COMMUNICATION   The objective SOE SECURE COMMUNICATION is implemented by a series of  SFRs that are provided by the Secure IT Platform    e FDP ACF 1 and        ACC 1 to restrict access to the Secure IT Platform   e FIA UAU 2 and FIA UID 2 to authenticate and identify S SysAdmin    e FMT SMR 1 to maintain S SysAdmin as a role for the Secure      Platform    Note that SOE SECURE COMMUNICATION is realized by IT  but also by non   IT     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    79 of 92    8 2 3 The security objectives for the non IT environment needs not to be  met by the TOE or its IT environment   The following security objectives for the environment are met by non IT measures    and therefore not elaborated in this Security Target    SOE 
3.        Audit management  Generation and preserving of audit logs for pre defined  security relevant events     TOE integrity check   This supporting security service assures that the integrity of the TOE is not   violated  The integrity check relates to the following    e Downgraded data  The TOE defines and verifies the checksum over a Link 1  Message before this message is sent out    e TOE program  The TOE performs a test to check whether its code or the rule  set has been changed     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 13 of 92    2 3 Underlying IT Platform    A trusted IT Platform will host the TOE  The TOE runs on a secure evaluated IT  Platform  This IT Platform contains an operating system    certified at EALA  The  operating system will be used with the underlying hardware as described in the  Security Target of the operating system  ST Solaris      The operating system is conformant with the following registered Protection  Profiles     e Controlled Access Protection Profile  Issue 1 d  8 October 1999    e Labelled Security Protection Profile  Issue 1 b  8 October 1999    e Role Based Access Control Protection Profile  Issue 1 0  30 July1998     2 4 Physical Boundaries of the TOE and Scope of Delivery  The TOE consists only of software  Therefore the TOE itself has no physical  boundaries  Nevertheless  the following  physical  components build up the scope    of delivery and therefore the physical boundaries     The scope of delivery including the TOE is 
4.      TSF shall explicitly authorise an information flow based on the  following rules  none 22    FDP IFF 1 6 The TSF shall explicitly deny an information flow based on the  following rules  none 2     Dependencies  FDP IFC 1 Subset information flow control   hierarchical component        IFC 2  3  included   FMT_MSA 3  3  Static attribute initialisation  included        20 FDP IFF 1 3 does not add information relevant for the TSF   The wording was adapted to this meaning     21 FDP IFF 1 4 does not add information relevant for the TSF   The wording was adapted to this meaning    22 FDP IFF 1 5 does not add information relevant for the TSF   The wording was adapted to this meaning     23 FDP IFF 1 6 does not add information relevant for the TSF   The wording was adapted to this meaning     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    40 of 92    5 128             2 Import of user data with security attributes    Hierarchical to  No other components     FDP        2 1 The TSF shall enforce the P DECLASSIFICATION POLICY  when importing user data O Data Class  controlled under the SFP  from outside of  the TSC     FDP ITC 2 2 The TSF shall use the security attributes associated with the  imported user data     FDP ITC 2 3 The TSF shall ensure that the protocol used provides for the  unambiguous association between the security attributes and the user data received     FDP ITC 2 4 The TSF shall ensure that interpretation of the security attributes of  the imported
5.     SA Oper Mode    SA OS MAC  Level    SA OS Priv  Level    SA Subject  Identity    This security attribute defines the four possible  operational modes of the L1 Provider and the TOE   e Peace Operational Mode   e Exercise Operational Mode   e Crisis Response Operational Mode   e Article 5 Operational Mode    This security attribute defines the four mandatory access   control operational levels of the Secure IT Platform  0    These levels are  from highest to lowest classification     e Admin high  Classified  i e  CLASSIFIED        Unclassified  i e  NATO UNCLASSIFIED PN  RELEASABLE     e Software    e Admin Low     This security attribute defines the privileges  privileged  or unprivileged  to determine if a subject may execute a  trusted system call  or a general system call of the  Secure IT Platform in a trusted manner  i e   file write  with MAC override   SA OS Priv  Level is independent  of SA OS MAC Level     Associated security attribute for a subject that equals the  name of the subject  i e  L1 Provider and LIFOS        10 All authorized human subjects have a SA OS MAC Level defining in which operation  level they are allowed to operate     S SysOper  S Audit  S ISSO operate at SA OS MAC Level    Admin high  Classified       S SysAdmin operates at SA OS MAC Level    Admin Low        UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    3 1 3 Objects    22 of 92    For all objects the following security attribute holds     SA Security Label    This security attribute 
6.     ST Public doc    06 02 07    49 of 92    5 4 Security Requirements for the IT Environment    All security functional requirements for the IT environment are implemented by  Secure IT Platform  see  ST Solaris   This includes the following SFRs     FAU STG 2         STG 4  FDP ACC 1  FDP ACF 1  FDP IFC 1  FDP IFF 2  FDP ITC 1  FDP ITC 2  FDP RIP 1  FIA UAU2  FIA UID 2  FMT SMR 1  FPT FLS 1  FPT SEP 1  FPT STM 1    Guarantees of audit data availability  Prevention of audit data loss   Subset access control   Security attribute based access control  Subset information flow control  Hierarchical security attributes   Import of user data without security attributes  Import of user data with security attributes  Subset residual information protection  User authentication before any action  User identification before any action  Security roles   Failure with preservation of secure state  TSF domain separation   Reliable time stamps    UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    50 of 92    6  TOE Summary Specification    6 1 TOE Security Functions    The security functions that implements the TOE are divided into primary and  supporting security functions     The primary Security Function is   e SF Downgrade    The supporting Security Functions regarding the filter functionality are   SF Audit Export  SF Check Integrity  SF Check Sanitization  SF Disregard   SF Pack   SF Sanitize   SF Set Mode  SF StartStop   SF Test   SF Verify Outbound    The supporting Securi
7.     e    Sun Microsystems Sparc machine  SunBlade 150   Hardware   e 2 SATURN AURORA PCI cards  Hardware   e 2 AURORA breakout boxes  Hardware   e 1 SCSI interface card  Hardware   e j4mmDAT recorder  Hardware   e 119    Monitor  Hardware   e 1 LIFOS with power supply  Hardware   e 1 Female Female DB25 gender changer  Hardware   e   Padlock for LIFOS  Hardware   e 1 LIFF LIFOS connector cable  Hardware   e Tags for the LIFOS and AURORA breakout box interfaces  Hardware   e Sun Microsystems Trusted Solaris 8 12 02  Operating System   e  Testframe part of the Outbound Downgrade Filter of ASDE Link 1  Forward Filter version 1 5 including the configuration file  Software        7 The secure operating system is Sun Microsystems Trusted Solaris 8 4 01  The underlying  hardware is the Sun Microsystems Blade 100 150 computer or a Sparc II  Sun Blade 100  systems are no longer available on the market  Sun  s replacement is the Sun Blade 150   The operating system  Trusted Solaris is not yet accredited for the Sun Blade 150  Until  this accreditation is obtained the development will proceed using the Sun Blade 100 as the  target platform for the TOE        These Protection Profiles can be found via www commoncriteriaportal org    06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    14 of 92      Operator Console of the Outbound Downgrade Filter of ASDE Link 1  Forward Filter version 1 5 including the configuration file  Software   e Libraries  Software   o libaullser a
8.    After the operation R Sanitize SF Check Sanitization generates             Audit   Date  Time  the rule numbers applied and the frame content  including the  sequence number  after the sanitization will be recorded     Security Attribute Value   SA Oper Mode All  different mode equals different rule set  SA OS MAC Level Admin high  Classified   SA OS Priv Level Unprivileged    SA Security Label of the processed data CLASSIFIED       35 Basically  this function is identical to SF Sanitize but acts as control function  In this  security function the implementation of the R Sanitize is based on a rule based  mechanism and this is a different mechanism than the implementation of the R Sanitize in  SF Sanitize     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    57 of 92    6 1 2 4 SF Disregard    This function aims at disregarding and deleting invalid outcomes of other security  functions in a controlled manner to prevent unelaborated distribution of  O Data  Class or O Data  Unclass     The security function SF Disregard implements the R Disregard operation    This operation is used to remove the data of all main memory objects passed to this  security function  The function assures that this information is deleted and that no  residual information of this data is stored or reused in the main memory of the TOE  or the underlying Operating System     This security function does not generate O Data  Audit     Security Attribute Value   SA Oper Mode Not applicable fo
9.   Version 1 0  o libgnarl 5 03 so  Version 5 03a  o libgnat 5 03 so  Version 5 03a  o libgcc  5 50 1  Version 3 4 4    e System Installation Manual  Guidance   e  System specific Security Requirements Statement  Guidance   e Security Operation Procedures  Guidance   e System User Manual  Guidance     2 5 Logical Boundaries of the TOE    The logical boundary of the TOE is defined by the interfaces in its series of  cooperating software applications  The TOE processes data received through these  interfaces and modifies it according to various processing rules before forwarding  the data to another component via another interface     The TOE has the following external interfaces    e  Link 1 Providing System to the testframe part of the TOE    e User interface to the Operator Console    e Two external interfaces between each part of the TOE and the loopback device  of the operating system  These interfaces build up a logical interface between  the two parts of the TOE which is shown in Figure 2 as arrow between the  TOE parts    e  Testframe part of the TOE to the LIFOS information diode    e Trusted Operating System to the both parts of the TOE  File System  handles  both  classified and unclassified data      UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    15 of 92    Link1 ASDE  1  providing Forward Filter  System    User    TOE  Operator            ASDE   1  Forward   outbound       Trusted  System    Data treated as CLASSIFIED  Data treated as UNCLASSIFIED    
10.   lt    gt    gt     gt  lt           SOE TOE LOCATION                         X X X                                     Table 2  Environment to Objectives     06 02 07    UNCLASSIFIED    BSI DSZ CC 0342       ST Public doc 70 of 92    A E INSIDE  The assumption is directly met by the objective SOE TOE LOCATION indicating  that the inner side of the TOE is connected to a L1 Provider     A E NATO SECURITY POLICY   The assumption is met by the following objectives    e SOE SECURE ENVIRONMENT directly implements the mandated policy for  a secure facility in which the TOE is located    e SOE SECURE USAGE defines the procedures to install  use and maintain the  TOE     A E OUTSIDE  The assumption is directly met by the objective SOE TOE LOCATION indicating  that the outer side of the TOE is only connected appropriately to a LIFOS     A E RECORDING   The assumption is directly met by the objective SOE SECURE IT PLATFORM  indicating that all security events will be recorded  logged  on the level of the  operating system     A E TOE ACCESS POLICY   The assumption is directly met by SOE SECURE IT PLATFORM  which enables  the operating system to restrict the access to the TOE  and   SOE SECURE ENVIRONMENT which directly implements the mandated policy  and restricts the access to the TOE    A E INTER TOE COMMUNICATION   The assumption is directly met by SOE SECURE  USAGE which ensures that the  operating system is configured properly  SOE SECURE ENVIRONMENT  supports this by restricting
11.  ALIVE is directly implemented by FDP_IFC 2  2  and  FDP IFF 1  2  which enables that the operator console sends O Commands to  testframe  FDP  IFF 1  1  ensures that the testframe does not filter O Data Class  after 3 minutes without O Command communication  FRU  FLT 1 enables the  testframe part of the TOE to run without an operator console  FMT MSA 3  2  sets  the default values    10 seconds    and    180 seconds  and         MSA 1  2  denies the  modification of these values      UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 76 of 92    SOT NO BYPASS   The objective SOT NO BYPASS is directly implemented by        RVM 1  assuring that security functions are not invoked and succeed before this is allowed   The objective is supported by FDP  IFF 1  1         FDP_IFC 2  1  to define which  policy shall not be bypassed when this policy applies  In addition FMT MSA 1  1   restricts the possibilities available to change the mode of operation to authorized  users only     SOT NO REPROGRAM   The objective SOT NO REPROGRAM is implemented by        TST 1 that checks  the integrity of the TSF and TSF data on start up  In addition  FPT_AMT 1 checks  the security assumptions on the underlying virtual machine  which is here the  trusted operating system  In all cases        GEN 1 ensures that the result of the  tests will be recorded in the audit trail  In case of an error  FPT  FLS 1  1  ensures  that the TOE fails into a secure state and does not forward unsanitized frames     SOT NO
12.  FDP_IFF 1  2  Simple security attributes  included     13 This requirement is rephrased to list explicitly all operations that cause the information to  flow to and from subjects covered by the P DECLASSIFICATION POLICY     The appropriate information flow control policy will be defined in the context of the  Security Policy Model as part of the requirements of ADV_SPM 1  Figure 4 on page 52  shows the principles  The rule set described in     Rules     defines the sanitization rules and  their sequence  Due to the fact that this rule set has no rule for    downgrading    or a  premature exit  the complete sanitization process must be finished before a message can  be downgraded     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    36 of 92    5 1 2 4 FDP IFC 2  3  Complete information flow control  Hierarchical to  FDP_IFC 1    FDP IFC 2 1 The TSF shall enforce the P INTER TOE COMMUNICATION  on O Command  O Output Message and the two parts of the TOE and all  operations that cause that information to flow to and from subjects covered by the  SFP     FDP IFC 2 2 The TSF shall ensure that all operations that cause any information in  the TSC to flow to and from any subject in the TSC are covered by an information    flow control SFP     Dependencies  FDP IFF 1  3  Simple security attributes  included     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 37 of 92    5 1 2 5 FDP IFF 1  1  Simple security attributes    Hierarchical to  No other components     FDP IFF 1 1 
13.  Interrupt Recording  The user can interrupt the recording with the keystroke     i    or    I     In this case the current Journal file which contains the audit trail of  the filter action is closed and a new Journal file is started        e Serial port statistics  The user can display the serial port statistics  i e  the  number of messages and errors transmitted and received on each serial port by  means of the keystroke    1    or    L     This command resets the statistic of these  two serial ports        Input Output display  The user can toggle the display of input and output  message frames by toggling the keystroke    v            V     If this function is  enabled  the operator sees all input and all output message frames on the  screen  Otherwise  no messages will be displayed on the screen     e Help  The user may display a help page on the console screen which lists and  explains all available commands  This        be reached by pressing    h              or  co    e Configuration  The user may display the configuration of the TOE on the  screen  This configuration includes the content of the configuration file as well  as the name of the current audit file and the current mode of operation  This  information can be displayed by pressing          or    C          Operator Exit  The user can exit from the operator console by pressing    x      This will only terminate the operator console but not the testframe part of the  TOE  This means that messages will be fil
14.  RESIDUAL   The objective SOT NO RESIDUAL is directly implemented by FDP_RIP 1  by  ensuring that neither any O Data  Class nor any rejected parts of O Data  Class  remain available  even the TOE does not run     SOT SANITIZE   The objective SOT  SANITIZE is directly enforced by FDP_IFC 2  1  defining the  rules for filtering and the sequence of operations as defined by  P DECLASSIFICATION POLICY  FDP_ITC 2 assures a dependable import of  classified information from outside the TOE  FPT  TDC 1 requires the correct  interpretation of the received messages  FPT ITT 1 ensures that the  O Data_Unclass will not be modified after R Downgrade is performed     SOT SECURE COMMUNICATION   The objective SOT SECURE COMMUNICATION is directly implemented by  FDP IFC 2  3  and FDP IFF 1  3  which enforces that the communication  between the two parts of the TOE does not run across an external network and that  exactly these two programs communicate    Furthermore  the objective is enforced by FMT MSA 3  3  defining secure default  values for the connection and FMT MSA 1  3  which ensures that only  S SysAdmin has the ability to change the values of some of the communication  parameters but nobody may chose a physical network interface for the connection     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    77 of 92    8 2 2 The SFR for the IT environment meet the security objectives for the  IT environment    In this section it is shown how all IT security objectives for
15.  SER TO TSB uic dee d eoe de E eem 82    UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    6 of 92    1  Security Target Introduction    1 1 ST Identification    Name of the TOE  Outbound Downgrade Filter of ASDE Link 1  Forward Filter version 1 5    ST Version  1 13  Keywords  Trusted guard    This Security Target is produced by the NATO Consultation  Command and  Control Agency  NC3A  in response to security requirements of the NATO Office  of Security  NOS   The production  registration and certification of a valid Security  Target is a mandatory pre requisite to NC3A achieving approval by NOS to permit  operation of a computer based system that will act as an automated and trusted  guard between classified and unclassified IT enclaves to prevent the accidental  leakage of classified information     Comments on the current Security Target should be sent to either the NATO C3  Agency  P O  Box 174  2501 CD The Hague  The Netherlands  or to NATO Office  of Security  NATO HQ  Brussels  Belgium     1 2 ST Overview    The Outbound Downgrade Filter of ASDE Link 1 Forward Filter version 1 5   L1FF is a software application of an Air Situation Data Exchange  ASDE  that  will permit one way Link 1 message streams to be securely and automatically  screened for the contents considered to be classified within a trusted and secure  environment  typically a transmitting NATO facility such as a Control and  Reporting Centre  CRC   see  SRS    The screening rules applied depend
16.  Security Evaluation  Version  2 3  part 1  General model    e Common Criteria for Information Technology Security Evaluation  Version  2 3  part 2  Security functional requirements    e Common Criteria for Information Technology Security Evaluation  Version  2 3  part 3  Security assurance requirements    e Common Methodology for Information Technology Security Evaluation   Version 2 3  Evaluation Methodology     The chosen level of assurance is   EALA  Evaluation Assurance Level 4     This Security Target claims the following conformances for the TOE   e CC Part 2 conformant   e CC Part 3 conformant   e         conformance to any PP    UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 8 of 92    2  TOE Description    2 1 Overview    NATO peacetime and crisis response operations could result in an operational  requirement to use the airspace of Partner Nations  Exchange of air situation data  between a Partner Nation  PN  and NATO is only allowed when no sensitive data  are exchanged  Sufficient measures shall be implemented to ensure sensitive  NATO information is safeguarded at the required level of security     Part of the safeguarding is the IT system called Air Situation Data Exchange   ASDE   ASDE is a program that allows sharing of portions of the NATO  Recognized Air Picture  RAP  with approved PNs  MCM140   The other part of  the safeguard measures is mandated by the regulations of NATO for IT boundary  devices or cryptographic devices  NATO SP   These regulations consi
17.  a security enhancing limited functionality product that  aims to implement a multi level secure mode of processing  There is therefore a  reguirement  under NATO Security Policy   CM  55  15  Final   for an  independent security evaluation of the filtering software by one of the National  Evaluation and Certification Authorities  prior to its operational use     UNCLASSIFIED BSI DSZ CC 0342    
18.  communicate with each other   e The configuration of the two parts of the TOE shall ensure that the TOE  does not try to build up or accept connections across a network     4 2 Security Objectives for the Environment  SOE     The security objectives for the environment are divided into security objectives for  the IT environment and the non IT environment  One security objective is relevant  for the IT and the non IT environment     4 2 1 Security Objectives for the IT Environment    SOE SECURE IT PLATFORM   The TOE environment shall mandate that the TOE runs on the   Secure IT Platform  having the following characteristics    e Secure storage of O Data Audit    e Restricted access to the TOE to S SysOper    e Enabling that operations are performed on the right 5     5        Level and  SA OS_Priv_Level    e Prevent the existence of residual information after a stop of the TOE   e Preserve the secure state of Secure IT Platform    e Separate the logical execution of the TOE from any other program running on  Secure IT Platform    e Recording of all security relevant events on the level of the operating system    4 2 2 Security Objectives for the non IT Environment    SOE AUDIT REVIEW   The TOE environment shall provide S Audit with means to access and regularly  review O Data  Audit generated by the TOE as made available by   SOE DATA AUDIT     SOE DATA AUDIT   The TOE environment shall implement procedures to store O Data  Audit  generated by the TOE compliant with the acco
19.  consisting of   TOE security functional requirements  SFR   All SFRs in this ST were drawn    from Part 2 of the CC     TOE security assurance requirements  SAR   All SARs in this ST were drawn    from Part 3 of the CC     Security requirements for the IT environment were drawn from  CC  Part 2     Operations applied on requirements are identified by the following means     06 02 07    Assignment   Selection   Refinement   Component Iteration     written bold   written underlined   written italic   The complete component is repeated  All repeated  components are identified by an ongoing number in  brackets after their unique component identification  number in the head line of this component  The element  identifiers do not contain this additional attribute   Example    FDP IFF 1  1  Simple security attributes   FDP IFF 1 1 The TSF shall       FDP IFF 1  2  Simple security attributes   FDP IFF 1 1 The TSF shall        Simplified Component Iteration     According to  CC  part 1 section 171 it is not necessary  to repeat all identical parts of a component in case of  iteration  Only the respective element of the component  is repeated  All repeated elements are identified by an  ongoing number in brackets after their unique element  identification number    Example    FMT MSA 1 1  1  The TSF shall         FMT MSA 1 1  2  The TSF shall          Due to the fact that dependencies between components  must be on the level of single iterations of single  components  the following wi
20.  e ASDE Buffer or other Link 1 Providing System  This part of      ASDE system  executes the normal procedures as required for exchange of RAP information  with any other Link 1 site and also implements the mandatory rules as defined  by SHAPE  for the exchange of information with non NATO Link 1 sites  The  buffer is the primary source of Link 1 data for the ASDE Link 1 Forward  Filter     e ASDE Link 1 Forward Filter  This part of the ASDE system consists of the  filter functionality between two environments with a different classification   The outbound downgrade part of the L1FF gets its input from the ASDE  Buffer  but another Link 1 input source is not excluded   The inbound integrity  filter part receives Link 1 messages from Partner Nations  The filter is a  hardware and software system that allows the filtering of Link 1 data and  consists of     o Outbound Downgrade Filter   This filter is a software application that  allows the filtering of Link 1 data messages to prevent that unauthorized  data is sent out  The filter is a trusted guard  i e  an automated NATO  program that allows one way passage of automatically screened   unclassified and non sensitive Link 1 data over serial communication lines  from an inner  protected and sensitive enclave of NATO IT systems to an  external non NATO enclave where uncleared and untrusted users  IT  systems and networks operate  This filter is mandated for outbound  messages     Here  the providing organisations are in mind  no
21.  functions that realize  P INTER TOE COMMUNICATION  SF Sec Com Testframe and  SF Sec Com Op establish a one to one communication between the operator  console and the testframe  The    one to one    property is realized by a very basic  kind of authentication based on the network interface and the ports used  The  S SysAdmin has to ensure that no other applications on this system will use the  respective ports on this network interface  This very simple authentication is  considered as sufficient due to the fact that security baseline of the system is very  high  organisational  personnel  physical and network security as well as the usage  of a high secure operating system    This connection between the two parts of the TOE ensures that the testframe  and  only the testframe  receives all O Command from the operator console  Also  the  operator console  and only the operator console  receives O Output Messages from  the testframe    Naturally  a part of the TOE does not receive a message if this part does not run   This behaviour is not considered as error     FDP ITC 2  The SFR FDP_ITC 2 is implemented by the SF Verify Outbound by importing  O Data  Class received from a L1 provider     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    85 of 92    FDP RIP 1  The SFR FDP RIP 1 is directly implemented by SF Disregard  deleting all data  that have not passed the other security functions     FMT MSA I  1   The SFR FMT MSA 1  1  is implemented by SF Set Mode  providin
22.  messages from  the Operator Console  The Operator Console receives the echo messages of the  testframe part     2 5 4 LIFOS information diode     Testframe part of the TOE   This interface ensures that Link 1 messages travel in one direction only  from the  TOE to the LIFOS  All messages passing from the TOE to the LIFOS information  diode are sanitized Link 1 messages conforming to  STANAG5501  and these  messages shall be classified as NATO UNCLASSIFIED PN RELEASABLE    The TOE sends the messages by using a hardware driver  not part of the TOE  to  access the network hardware  Therefore  the external interface of the TOE is  actually a pure software interface     2 5 5 Trusted Operating System  TOE  There are several points of contact between the parts of the parts of the TOE and  the operating system  This section describes all these interfaces at once         9 The logical internal interface between the two parts of the TOE is described in chapter  2 5 3 and is not covered here     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 18 of 92    The TOE runs on a trusted operating system The TOE uses the following security   objectives of this secure operating system  ST Solaris     1  Authorisation  Only authorized users can gain access to the TOE and its  resources    2  Mandatory Access Control  The TOE and its users are provided with the means  of controlling and limiting access to objects and resources  based on sensitivity  labels and categories of the information being a
23.  of 92    3 3 Assumptions  A     Assumptions may be assumptions of the intended usage of the TOE  A U  or  assumptions regarding the environment of use  A E      A U ONLY WAY  The TOE assumes that it is the only path for the O Data Class to be downgraded to  O Data_Unclass so it can be passed on from an L1 Provider to LIFOS     A E OUTSIDE   From the outside  attacks can only be performed via a data stream from the Partner  Nation  It is assumed that this data stream has to pass a LIFOS and can therefore  not reach the TOE    Therefore  it exist no possibility that incoming messages from the outside interfere  with the sanitization and downgrading process     A E INSIDE  It is assumed that from the inside  Link 1 messages are received from a Link 1  Provider  which is assumed to be a NATO certified system     A E RECORDING  The Trusted Operating System keeps a record of all actions on the system on the  level of the operating system     A E NATO_SECURITY_POLICY   The NATO security policy concerning security principles  personnel security   physical security  security of information and information security  INFOSEC  is  mandated for the TOE and its IT environment  NATO SP   The IT environment  operates within a CLASSIFIED accredited facility for boundary protection devices  and crypto devices  Application of the policy includes the following    1  Logical   a  Only authorized personnel can have access to the Secure_IT_Platform    b  Remote access to the Secure_IT_Platform is 
24.  other process can read  manipulate  deny  replay or   spoof the communication between the two parts of the TOE    SOT SECURE COMMUNICATION ensures that the two parts of the TOE are   configured correctly so that a communication is possible  Together with the four   objectives for the environment listed above  it ensures that each part of the TOE   will receive all commands messages intended for it        P KEEP ALIVE POLICY   e SOT KEEP ALIVE ensures that the testframe part is able to work without a  running operator console and that the testframe recognises nearly immediately  that the operator console does not run  After three  3  minutes without an  O Ping message from the operator console  the testframe part stops    e SOT CONSIDER LOGOUT ensures that the operator console exits even in  the case of an  unexpected  user logout or equivalent event  This enables the  testframe in all cases to recognise that the operator console does not run     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    72 of 92    P TOE DATA INPUT   The policy P TOE DATA INPUT is met by the SOT SANITIZE providing that   the TOE is able to   e Outbound  handle different types of outbound bit streams  received from the  Link 1 provider  installed in accordance with  A E NATO SECURITY POLICY requirements and resulting in a sanitized   STANAG5501  Link 1 Message     P TOE FAIL INSECURE   The policy                   INSECURE is met by the objective   SOT FAIL SECURE countering a failure in th
25.  parameters due to  access restriction to this file  The access restrictions will be enforced by the  environment  the operating system     The operator console will receive all O Output Messages from the testframe  when  the operator console is running     This security function does not generate O Data  Audit        37 Please remark that  incoming  and  outgoing  is from the operator console s point of view     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    65 of 92    6 1 3 6 SF Sec Com Testframe    This function aims at building up a secure network connection to the operator  console in order to be able to exchange O  Command and O Output Message in a  secure way     This security function implements the network interface of the testframe part of the  TOE  This interface is able to build up a connection to the operator console by  using the loopback interface of the operating system  The connection consists of  two separate IP connections  sockets   one for incoming and one for outgoing  traffic  Each IP connection will be handled by a specified port number on the  loopback interface    The port number for the incoming IP connection must be between 8182 and 8188   The port number for the outgoing IP connection must be between 8181 and 8187  and must be the number of the incoming port decreased by one  1     The testframe connects to the outgoing port and provides the incoming port for the  operator console 38   During start up of the testframe this security 
26.  the IT environment are  addressed by security requirements for the IT environment  The security objectives  that are purely non IT are not addressed                                                                    2                lt    6   9          lt      A  gt    SS e   EE     BE   5 A 2        Qo zo   LLI LLI LLI        O     121  FAU STG 2   X  FAU STG 4   X   FDP ACC 1 X   X   X  FDP_ACF 1   X  FDP IFC 1 X  FDP IFF 2 X  FDP ITC 1 X  FDP ITC 2 X  FDP RIP 1 X   FIA UAU 2 X XX   FIA UID 2 X XX   FMT SMR 1 X   X   X  FPT FLS 1 X  FPT SEP 1 X  FPT STM 1   X       Table 4  Objectives for the IT Environment to SFR for the IT Environment     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    78 of 92    SOE SECURE IT PLATFORM   The objective SOE SECURE IT PLATFORM is implemented by a series of   SFRs  see for a precise description  ST Solaris               STG2 and        STG  to make storage of audit event generated by the  TOE possible    e FDP ACF 1 and FDP ACC  to restrict access to the Secure IT Platform and  the TOE to authorised users only    e FDP IFC 1 and FDP IFF 2 to define the operation levels of the  Secure IT Platform   e FDP ITC 1 and FDP_ITC 2 to import data from the TOE   e FDP          to prevent the existence of residual information after termination of  the TOE operating system process    e      UAU2 and FIA_UID 2 to authenticate and identify users in the IT  environment          SMR 1 to maintain security roles for the Secure IT Platform     
27.  the access to the system and the configuration     A U ONLY WAY  The assumption is directly met by the objective SOE TOE LOCATION indicating  that the TOE is the only communication path between the L1 Provider and LIFOS     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    71 of 92    P DECLASSIFICATION POLICY   The policy P DECLASSIFICATION POLICY is met by a series of objectives       SOT DOWNGRADE providing that only sanitized data are downgraded   e SOT SANITIZE providing the rules for sanitization   e SOT FILTER  RULE and SOE  MODE SYNC providing that the appropriate  O Filter Rule Set is used according to SA Oper Mode set by S SysOper    e SOT DATA AUDIT that generates O Data Audit  This enables the subject  S Audit to check whether O Data Class has been transmitted     P INTERNAL TOE COMMUNICATION   The policy P INTERNAL TOE COMMUNICATION is met by a series of   objectives    e SOT SECURE COMMUNICATION ensures that the TOE accepts and builds  up connections from to the local machine only    e SOE SECURE COMMUNICATION ensures that the local system and the  processes running on it do not interfere with the inter TOE communication    e SOE SECURE USAGE ensures that the system and the TOE are configured  properly         SOE SECURE ENVIRONMENT ensures that only authorized personnel has  access to the system    e   SOE SECURE IT PLATFORM ensures that the system configuration will be  enforced and cannot be circumvented    These objectives ensure that no
28.  the capability to verify  the integrity of SA Oper Mode and O Filter Rule Set     FPT TST 1 3 The TSF shall provide authorized users with the capability to verify  the integrity of stored TSF executable code     Dependencies  FPT AMT 1 Abstract machine testing  included     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 47 of 92    5 1 5 Fault tolerance    5 1 5 1 FRU FLT 1 Degraded fault tolerance    Hierarchical to  No other components     FRU FLT 1 1 The TSF shall ensure the operation of all functions of the  testframe part of the TOE when the following failures occur  the operator  console does not run     Dependencies  FPT FLS 1  2  Failure with preservation of secure state   included     5 1 6 FTP Trusted path channels    5 1 6 1 FTP ITC 1 Inter TSF trusted channel  Hierarchical to  No other components     FTP ITC 1 1 The TSF shall provide a communication channel between itself and a  remote trusted IT product that is logically distinct from other communication  channels and provides assured identification of its end points and protection of the  channel data from modification or disclosure     FTP ITC 1 2 The TSF shall permit the TSF to initiate communication via the  trusted channel     FTP ITC 1 3 The TSF shall initiate communication via the trusted channel for    R Downgrade  Dependencies  No dependencies  5 2 Strength of function claim    No strength of function claim     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    5 3 TOE Security Assurance Requireme
29.  the means to change SA Oper Mode of the TOE by  S SysOper     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    73 of 92    T NEGLIGENCE   The threat is countered by the following objectives   e SOT DATA  AUDIT assuring that      TOE generates O Data Audit    e SOT DATA EXPORT assuring that      TOE provides O Data Audit to  S Audit    e SOE DATA  AUDIT assuring that O Data Audit are available on the short and  long term for S Audit    e SOE AUDIT REVIEW assuring that S  Audit reviews O Data  Audit    e SOESECURE USAGE assures that all authorized users are trained     T OPERATOR DOES NOT EXIT   This threat is directly countered by SOT CONSIDER  LOGOUT  The operator  console recognises its termination and exits the normal way    SOE SECURE USAGE also counters the threat because all users are educated that  they must not log out without exit the operator console     T TOE REPROGRAM   T TOE_REPROGRAM is countered by the SOT NO REPROGRAM providing  that changes of the integrity of the TOE  the SA Oper Mode and the  O Filter Rule Set are detected at start up of the TOE  Furthermore   SOE SECURE IT PLATFORM prevents the files of the TOE  including  configuration files  from modification by unauthorized user     8 2 Security Requirements Rationale  The purpose of the Security Requirements Rationale is to demonstrate that the    security requirements are suitable to meet the Security Objectives     8 2 1 The SFRs for the TOE meet the Security Objectives for the TOE  For e
30.  unintentionally            ITC 1   The SFR FTP ITC 1 is implemented by SF Downgrade by initiating the transport  of O Data  Class from the classified into the unclassified environment  as  O Data_Unclass  and exporting O Data_Unclass the by calling SF Check Integrity   which is the end point of the trusted channel      8 32 The assurance measures meets the SARs   The statement of assurance measures has been presented in the form of a reference  to the actions or documents that show that the assurance measures have been met   The documents implement the requirements of EAL4  This statement can be found  in section 6 2     8 4 PP Claims Rationale    This Security Target TOE does not claim conformance to any Protection Profile   see section 7   This section is therefore empty     UNCLASSIFIED BSI DSZ CC 0342    UNCLASSIFIED    ST Public doc  Appendix  88 of 92    9  Appendix A   Abbreviations    A Assumption   ASOM Article 5 Operational Mode  ASDE Air Situation Data Exchange  ASOC Air Sovereignty Operation Centre  BSI Bundesamt f  r Sicherheit in der Informationstechnik  CC Common Criteria   CEM Common Evaluation Methodology  CRC Control and Reporting Centre  CROM Crisis Response Operational Mode  EAL Evaluation Assurance Level   EOM Exercise Operational Mode   F Functional   IT Information Technology   ITSEF IT Security Evaluation Facility  LIEF Link 1 Forward Filter   LIFOS Link 1 Fibre Optic Secure System  MAC Mandatory Access Control   MLS Multi Level Secure   NC3A NATO Con
31.  upon a  mode of operation related to times of either peace or differing levels of crisis     The Link 1 Forward Filter aims at downgrading sanitized outbound CLASSIFIED  Link 1 Messages into NATO UNCLASSIFIED Partner Nations RELEASABLE  Link 1 Messages  When classified messages are encountered  the content of these  messages will not be transmitted  When Link 1 message fields containing  information considered to be classified are encountered  the bits in those fields will  be set to zero before the message itself will be transmitted  The Link 1 Forward       1 The connotation CLASSIFIED is used here and throughout this document to cover all  classification levels compliant with the EAL 4 accreditation sought     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    7 of 92    Filter sends the downgraded and sanitized messages out over unencrypted and  unprotected serial communications lines     The Link 1 Forward Filter can also be used to verify that the Link 1 data received  from the Partner Nations equals the Link 1 format but this is not a function under  evaluation     The Link 1 Forward Filter runs mandated on a secure and certified operating  system  that is served by an accompanying hardware platform  which is located in a  secured location  that can only be accessed by authorised personnel who have been   screened  as a condition of their employment by NATO     1 3 CC Conformance    The evaluation is based upon    e Common Criteria for Information Technology
32.  user data is as intended by the source of the user data     FDP ITC 2 5 The TSF shall enforce the following rules when importing user data  controlled under the SFP from outside the TSC    e SA OS MAC Level      Admin high  Classified      e   SA OS Priv Level      Unprivileged        SA Security Label      CLASSIFIED       Dependencies   FDP_ACC 1 Subset access control  or  FDP_IFC 1 Subset information flow control    hierarchical component FDP_IFC 2  1  included     FTP_ITC 1 Inter TSF trusted channel  or  FTP_TRP 1 Trusted path    FTP_ITC 1 included    FPT_TDC 1 Inter TSF basic TSF data consistency  included     5 1 2 9      RIP 1 Subset residual information protection    Hierarchical to  No other components     FDP_RIP 1 1 The TSF shall ensure that any previous information content of a  resource is made unavailable upon the deallocation  of the resource from the  following objects  O Data_Class and O Data_Unclass        Dependencies  No dependencies       24    Deallocation    includes releasing of the main memory upon stop of the TOE     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    41 of 92    5 1 3 FMT Security management    5 1 3 1 FMT MSA 1  1  Management of security attributes    Hierarchical to  No other components     FMT  MSA 1 1 The TSF shall enforce the P DECLASSIFICATION POLICY  to restrict the ability to change the security attribute  SA Oper Mode to  S SysOper     Dependencies   FDP  ACC 1 Subset access control or  FDP IFC 1 Subset informatio
33. 16 FDP_IFF 1 3 does not add information relevant for the TSF   The wording was adapted to this meaning     17 The wording was adapted to this meaning     18 FDP IFF 1 5 does not add information relevant for the TSF   The wording was adapted to this meaning     19 FDP IFF 1 6 does not add information relevant for the TSF   The wording was adapted to this meaning     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    39 of 92    5 1 2 7 FDP IFF 1  3  Simple security attributes    Hierarchical to  No other components     FDP IFF 1 1 The TSF shall enforce the P INTER TOE COMMUNICATION  policy based on the following types of subject and information security attributes   the two parts of the TOE  the network interface  the O Command port and the  O Output Message port     FDP IFF 1 2 The TSF shall permit an information flow between a controlled  subject and controlled information via a controlled operation if the following rules  hold   e The network interface is the loopback interface      The O Output Message port is   o from the range of 8181 to 8187   o not used by any other application than the TOE     The O Command port is   o thenumber of the O Output Message port increased by 1   o from the range of 8182 to 8188   o not used by any other application than the TOE    FDP IFF 1 3 The TSF shall enforce the additional information flow control SFP  rules  none20    FDP IFF 1 4 The TSF shall provide the following additional SFP capabilities           2     FDP IFF 1 5   
34. 6 1 3 5 SF Sec Com Op    This function aims at building up a secure network connection to the testframe part  in order to be able to exchange O Command and O Output Message in a secure  way     This security function implements the network interface of the operator console   This interface is able to build up a connection to the testframe part by using the  loopback interface of the operating system  The connection consists of two separate  IP connections  sockets   one for outgoing and one for incoming traffic  Each IP  connection will be handled by a specified port number on the loopback interface   The port number for the outgoing IP connection must be between 8182 and 8188   The port number for the incoming IP connection must be between 8181 and 8187  and must be the number of the outgoing port decreased by one  1     The operator console connects to the outgoing port and provides the incoming port  for the testframe process 37   During start up of the operator console this security function checks whether the  loopback interface and valid port numbers are configured  Otherwise  the operator  console starts up with the default values for this port configured erroneously  8181   8182      The operating system assures that no other process can use these ports  Therefore   the information sent received over these ports is protected    The parameters of the two IP connections are stored in the configuration file of the  TOE  This means  only S SysAdmin is able to maintain the
35. AUDIT REVIEW   SOE DATA AUDIT   SOE MODE SYNC   SOE SECURE COMMUNICATION   SOE SECURE ENVIRONMENT   SOE SECURE USAGE   SOE TOE LOCATION    e Note that SOEMODE SYNC and SOE SECURE COMMUNICATION are  realized by IT  but also by non IT     8 24 Justification for the Assurance level   Adequate protection of CLASSIFIED information is the driver for this evaluation    The protection is merely transformed to assurance in    good security design       because    1  Due to NATO policies  the location and environmental personnel  physical and  organisation security measures are on the level of CLASSIFIED and thus the  TOE is constantly under control of physical and personal security measures  and the persons that deal with the TOE are familiar with this kind of security  measures    2  The capabilities required by potential threat agents are considered to be high   However due to the security measures mentioned under point 1 and limited  possibilities for untrusted interaction with the TOE an attack profile    low    is  sufficient     EALA provides the requirements to provide good commercial practice in security  design and aids the evaluators at all design abstraction layers  In addition EAL4  provides additional assurance with the development of the TOE  the testing and the  deployment     8 2 5 Strength of Function Claim is appropriate   The TOE does not use any probabilistic or permutational mechanisms  and thus a  Strength of Function claim is not appropriate  Therefore  no Stren
36. Downgrade only    The operation confirms or denies the check done on the data in the   O Data Unclass     When the check is confirmed O Data Unclass is ready for transmission  This will  take place with SA OS MAC Level   Unclassified  SA OS Priv Level    Unprivileged and SA Security Label of the processed data   NATO  UNCLASSIFIED PN RELEASABLE    When the verification is denied O Data Unclass is passed on to the security  function SF Disregard     After the operation R CRC Check SF Check Integrity generates              Audit   Date  Time and the frame content  including the sequence number  be sent out will  be recorded     Security Attribute Value   SA Oper Mode Not applicable for this function  SA OS MAC Level Unclassified   SA OS Priv Level Unprivileged    SA Security Label of the processed data          UNCLASSIFIED PN RELEASABLE    UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    56 of 92    6 1 2 3 SF Check Sanitization    This function aims at verification and sanitization of O Data Class mandated by  the O Filter Rule Set appropriate for the current SA  Oper  Mode     The security function SF Check Sanitization performs the operation R Sanitize on  the sanitized O Data  Class  provided by SF Pack only    The SF Check  Sanitization passes the sanitized O Data Class on to  SF Downgrade  when there is no data in the object that is rejected by R Sanitize   When sanitized O Data Class contains rejected data  this O Data Class is passed  on to SF Disregard  5 
37. F will be used in the intended sequence and  therefore prevents bypassing of single or several TSF    FDP RIP 1 and FPT_FLS 1  1  assure that all confidential information will be  made unavailable  This prevents bypassing of not sanitized data and therefore  bypassing of the TSF    FDP IFF 1  1  and FDP ITC 2 prevent bypassing of classified information to  unauthorized person by enforcing the correct labelling and therefore the correct  handling of these information  FDP  ETC 2 supports this by enforcing the  correct labelling even by exporting data outside the TOE  Furthermore    FDP IFF 1  1  and FDP_ITC 2 enforce a stop of the information flow when  obviously no O SysOper monitors the TOE  FDP IFF 1  2  ensures that a  running operator console will be recognised by the testframe    FPT  SEP 1 as part of the environment requirements prevents tampering of the  TOE by other software components running on the same hardware   FDP_IFC 2  2   FDP IFC 2  3   FDP IFF 1  2   FDP IFF 1  3   FDP_ITC 2   FMT MSA 1  2   FMT MSA 1  3   FRU FLT 1 and        FLS 1  2  ensure  that a modification of the communication settings is not possible and that the  testframe part is able to work properly even in the case of a not running  operator console    The requirements FMT MSA 1  1   FMT MSA 1  2   FMT MSA 1  3    FMT_MSA  1          MSA 3  2          MSA 3  3  and FMT SMF 1 define  the default settings for the mode of operation  the communication parameter  and restrict the access to modify th
38. Figure 2  Logical boundaries of the TOE of classified and unclassified data        2 5 1 Link 1 Providing System   Testframe part of the TOE   The TOE has one interface with the Link 1 Providing System    This interface provides a bit stream from the Link 1 Providing System to the TOE   Normally  this stream contains Link 1 Messages conforming to  STANAG5501    However  due to many causes this need not be the case  i e  the incoming bit stream  may contain Link 1 Messages that are not conform to  STANAG5501  or the  incoming bit stream does not consist of Link 1 Messages  All input from the Link     Providing System is considered to be CLASSIFIED    The TOE receives the bit stream by using a hardware driver  not part of the TOE   to access the network hardware  Therefore  the external interface of the TOE is  actually a pure software interface     2 5 2 Operator Console   Human User   The Operator console provides an interface to the users of the TOE  Usually  this  interface is represented by keyboard and monitor  In normal operation  the  Operator Console provides only warnings to the user  Warnings are displayed  between two red lines and accompanied by an audible signal  Furthermore  the user  is able to manage the TOE by entering special commands    The Operator Console is implemented as window on the screen  not as hardware  terminal  Therefore  this external interface of the TOE is actually a pure software  interface     The only user allowed to interact with the TOE i
39. Furthermore  the following documents will be  created  the configuration management plan  the acceptance plan and the  configuration list which lists all configuration items    The TOE will be uniquely identified and labelled by a version number which is  also used in all other documents     Delivery and Operation  ADO  assurance measures   All delivery procedures for the TOE will be described and documented  The  developer will use these procedures    All steps necessary for the secure installation  generation and start up of the TOE  will be described and documented     Development  ADV  assurance measures   For each the Functional Specification  the High Level Design  the Low Level  Design  the Information TOE Security Policies and the Analysis of the  Correspondence  a document will be created which contains all necessary  information and covers all requirements to content and style    The complete implementation of the TSF will be provided as source code files     Guidance  AGD  assurance measures   An user guidance for S SysOper will be provided    An administrator guidance will not be provided because the TOE does not differ  between user and administrator  All roles defined in chapter 3 1 2 are implemented  by the underlying operating system but not by the TOE     Life Cycle  ALC  assurance measures   The physical  procedural  personnel and other security measures applied by the  developer are implemented in accordance with  MILA98   The developer produces  evidence t
40. NATO Consultation  Command and Control Agency    Agence de Consultation  de Commandement et de Conduite des Op  rations de l OTAN       AGENCY    LINK1 FORWARD FILTER  L1FF   SECURITY TARGET  Public Version     Wim Hoekstra   Peter RehauBer        7    A    06 02 07  The Hague    ST Public doc    Document information    Date of issue  Author s     Version number report    Certification ID  Scheme  Sponsor    Sponsor address    Evaluation Lab    Evaluation Lab address    Target of Evaluation  TOE     TOE reference name  CC EAL number  File Name    Document history    Version Date    1 0  1 1  1 2  1 3  1 4  1 5    28 08 03  23 11 04  28 06 05  08 08 05  02 09 05  05 10 05  10 11 05  09 01 06  16 03 06  31 03 06  12 04 06  29 05 06  06 11 06  06 02 07    1 6  1 7  1 8  1 9  1 10  1 11  1 12  1 13    06 02 07    UNCLASSIFIED    06 02 07   Wim Hoekstra   Peter Reh  uDer  1 13   BSI DSZ CC 0342   BSI  Germany    NATO C3 Agency   Oude Waalsdorperweg 61   2597 AK  The Hague   The Netherlands   CSC Ploenzke AG   CoE IT Security and Technology  Sandstr  7 9   80335 Munich   Germany    Link 1 Forward Filter version 1 5  ASDE LIFF   4   ST_Public doc    Comment    Formal release to NC3A  Reviewed by NC3A NOS   pdate to cover comments from the evaluator   pdate to fulfil the CC requirements   pdate to cover comments from the evaluator   pdate due to some errors in the narrative description  pdate due to comments from the certification body  pdate to cover comments from the evaluator   pd
41. North Atlantic Treaty Organisation   NATO   NATO C M 2002 49  17 June 2002  NATO  UNCLASSIFIED     NC3A  System Requirements Specification  Link 1 Forward  Filter  L1FF  for Air Situation Data Exchange  ASDE  with  Non NATO Nations  Draft version 0 3  January 2003   NATO MAS  Standardization Agreement Tactical Data  Exchange   Link 1  point to point   edition 4  NATO  UNCLASSIFIED    SUN Microsystems  Trusted Solaris 8 4 01 Security Target   version 2 0  14 June 2002   ASDE Link1 Forward Filter and Integrity Filter Rules  NC3A   February 2007   NATO RESTRICTED        39 This policy is the successor of CM 55 15      UNCLASSIFIED BSI DSZ CC 0342    UNCLASSIFIED    ST Public doc  Appendix  90 of 92    11  Appendix C   Glossary of Terms    Security Accreditation Authority  A designated group or section within a  NATO headquarters that advise alliance staff as to the  conformance and permissibility of the security provisions  implemented in their IT systems and network  For NATO C3  Agency  NC3A   the NATO Office of Security  NOS  is the  designated SAA  For NATO Programming Centre  NPC    Assistant Chief of Staff on SHAPE Intelligence Division   ACOS VSHAPE  is the designated SAA     Mandatory Access Control  The means whereby unprivileged access to an IT  object  e g  file  process  device  etc  by a subject  e g  user   process  etc  is protected in such a way that does not require the  cooperation of the subject  Subject cannot access MAC  protected objects because of the perc
42. Sec Com Testframe    SF Keep alive check    Filter functionality       Unclassified         Trusted Operating System    Figure 3  Overview of the Security Functions of the communication functionality  and their relation     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 52 of 92    Operator Console    SF StartStop    SF Test    SF Verify Outbound    SF Set Mode    SF Sanitize       SF Pack   SF Check Integrity    SF Check Sanitization         SF Downgrade    SF Disregard    Unclassified    Trusted Operating System    Figure 4  Overview of the Security Functions of the filter functionality and their  relation     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    53 of 92    6 1 1 Primary Security Functions    6 1 1 1 SF Downgrade    This function aims at downgrading sanitized O Data Class from the classified to  unclassified partition on the Secure Operating System     SF Downgrade performs the operation R Downgrade on sanitized O Data Class   provided by SF Check Sanitization only  The SF Downgrade passes the sanitized  O Data Class as a    new    O Data  Unclass on to SF Check Integrity     After the operation R Downgrade SF Downgrade generates O Data  Audit  Date   Time and the frame content  including the sequence number  will be recorded  Due  to the fact that SF Downgrade does not modify the content of a frame  a blank  frame will be recorded if the originally received frame must not be send out   Otherwise  the frame content of the sanitized 
43. T Public doc 44 of 92    5 1 3 7        SMF  Specification of Management Functions    Hierarchical to  No other components     FMT SMF 1 1 The TSF shall be capable of performing the following security  management functions    e Set SA Oper Mode   e Monitor SA Oper Mode    Dependencies  No Dependencies    5 1 4 FPT Protection of the TSF    5 1 4 1        AMT 1 Abstract machine testing    Hierarchical to  No other components            AMT 1 1 The TSF shall run a suite of tests during initial start up to  demonstrate the correct operation of the security assumptions provided by the  abstract machine that underlies the TSF        Dependencies  No dependencies    5 1 4 2 FPT FLS 1  1  Failure with preservation of secure state  Hierarchical to  No other components           FLS 1 1 The TSF shall preserve that the operation R  Downgrade is not  performed when the following types of failures occur    e a failure of R Sanitize     e a failure of R Test     Dependencies  ADV_SPM 1 Informal TOE security policy model  included     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    45 of 92    5 1 4 3 FPT FLS 1  2  Failure with preservation of secure state    Hierarchical to  No other components     FPT FLS 1 1 The operator console shall automatically exit when the following   types of failures occur       unexpected log out of the user without exit the operator console       unexpected close of the window the operator console runs within without  exiting the operator 
44. TO  policy dictates that a balanced set of security measures  physical  personnel   procedural  computer and communication  shall be identified and implemented to  create the secure environment in which an ADP system operates  The system  security accreditation process will include the formulation of a System Specific  Security Requirement Statement  SSRS  and Security Operating Procedures   SecOPs  or national equivalents  These documents will be produced by the  national ADP System Operational Authority  ADPSOA  or appropriate project  staff  approved by the national Accreditation Authority and are subject to NOS  review     The NATO C3 Agency is located in The Hague  The Netherlands  It is a non   profit making element of the North Atlantic Treaty  Staff from this headquarters  provides expertise  advice and prototype solutions for the NATO community of  users in areas such as command  amp  control  communication  operational research  and information technology  This agency will be responsible for designing and  implementing the L1FF     NATO Office of Security is located in Brussels  BE  In the specific context of the  NATO C3 Agency  it is responsible to monitor  advise and recommend approval   or otherwise  regarding security measures proposed for or  in the case of prototype  equipment  actually deployed on NATO funded computer based equipment  NOS  will be responsible to provide security accreditation and or approval to operate the  LIEF     The filtering software is
45. The TSF shall enforce the P DECLASSIFICATION POLICY  based on the following types of subject and information security attributes  L1   Provider  LIFOS  O Data Class and SA Oper Mode  SA Security Label  time  since last O Command     FDP IFF 1 2 The TSF shall permit an information flow between a controlled   subject and controlled information via a controlled operation if the following rules   hold    e O Data Class flows from L1 Provider to LIFOS    e   SA OS MAC Level      Admin high  Classified    for all operations until and  including R Downgrade    e SA OS MAC Level      Unclassified    for all operations after R Downgrade    e   SA OS Priv Level      Privileged    for the operation R Downgrade    FDP IFF 1 3 The TSF shall enforce the      removal of all data that does not pass R  Verify Output  R Sanitize   R CRC Pack and R CRC Check while flowing from L1 Provider to  LIFOS     FDP IFF 1 4 The TSF shall provide the following additional SFP capabilities   none 4    FDP IFF 1 5 The TSF shall explicitly authorise an information flow based on the  following rules  none       FDP IFF 1 6 The TSF shall explicitly deny an information flow based on the  following rules  The testframe part of the TOE did not receive any  O Command from the operator console since 3 minutes     Dependencies  FDP IFC 1 Subset information flow control   hierarchical component FDP  IFC 2  1  included   FMT_MSA 3  1  Static attribute initialisation  included        14 FDP IFF 1 4 does not add informat
46. Unclass  o SA OS MAC Level      Unclassified     o  SA OS Priv Level   Unprivileged     o SA Security Label      NATO UNCLASSIFIED   PN RELEASEABLE    Dependencies   FDP_ACC 1 Subset access control  or    FDP IFC 1 Subset information flow control    hierarchical component        IFC 2  1  included     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    35 of 92    5 1 2 2 FDP IFC 2  1  Complete information flow control  Hierarchical to  FDP_IFC 1    FDP_IFC 2 1 The TSF shall enforce the P DECLASSIFICATION POLICY on  O Data Class  O Data Unclass  L1 Provider and LIFOS and all operations   these are the operations R Sanitize  R Downgrade and their sequence  that cause  that information to flow to and from subjects covered by the SFP       FDP IFC 2 2 The TSF shall ensure that all operations that cause any information in  the TSC to flow to and from any subject in the TSC are covered by an information  flow control SFP     Dependencies  FDP IFF 1  1  Simple security attributes  included     5 1 2 3 FDP IFC 2  2  Complete information flow control  Hierarchical to  FDP_IFC 1    FDP_IFC 2 1 The TSF shall enforce the P KEEP ALIVE POLICY on  O Command and the two parts of the TOE and all operations that cause that  information to flow to and from subjects covered by the SFP     FDP_IFC 2 2 The TSF shall ensure that all operations that cause any information in  the TSC to flow to and from any subject in the TSC are covered by an information  flow control SFP     Dependencies 
47. ach Security Objective for the TOE we demonstrate that it is met by the SFRs   The tracings are provided implicitly by the rationales and explicitly by this table     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    74 of 92       SOT CONSIDER LOGOUT    SOT DATA EXPORT  SOT DOWNGRADE  SOT FAIL SECURE    SOT FILTER  RULE    SOT KEEP ALIVE    SOT NO BYPASS    SOT NO RESIDUAL    SOT SANITIZE    SOT SECURE COMMUNICATION       FAU  GEN 1     gt  lt  SOT DATA  AUDIT    X SOT NO REPROGRAM       FDP ETC 2     gt    gt        FDP_IFC 2  1      gt      gt      gt      gt        FDP_IFC 2  2        FDP_IFC 2  3        FDP IFF 1  1        FDP IFF 1  2             IFF 1  3        FDP ITC 2       FDP RIP 1              MSA 1  1        FMT_MSA 1  2        FMT_MSA 1  3        FMT_MSA 3  1        FMT_MSA 3  2        FMT_MSA 3  3        FMT_SMF 1       FPT_AMT 1       FPT_FLS 1  1        FPT_FLS 1  2        FPT_ITT 1       FPT_RVM 1       FPT_TDC 1       FPT_TST 1       FRU_FLT 1          FTP_ITC 1                                              Table 3  Objectives to SFR     UNCLASSIFIED    BSI DSZ CC 0342    ST Public doc    06 02 07    75 of 92    SOT CONSIDER LOGOUT   The objective SOT CONSIDER  LOGOUT is directly implemented by FPT FLS 1   2   An unexpected termination of the operator console will be determined and the  operator console exits the normal way     SOT DATA AUDIT  The objective SOT DATA AUDIT is directly implemented by FAU_GEN 1 for  the generation of             Aud
48. ate to cover comments from the certification body  pdate due to changes in the software   pdate to cover comments from the evaluator   pdate to cover comments from the evaluator   pdate to due changes on the software   Final Version    Ci Ci C C C s            Ci d d    Public Version    2 of 92    Outbound Downgrade Filter of ASDE       BSI DSZ CC 0342    ST Public doc    06 02 07    3 of 92   Contents  DOCUMENT INFORMATION                                                                                           2  DOCUMENT HISTORY    so Gees a e eee es voe ves se See e eg ees Ge de Gegee u Seve VE CN RENE EE CN EER ede 2  1  SECURITY TARGET INTRODUCTION                                                                  6  1 1 ST IDENTIFICATION S  eed ete de ee st eie eret cet e oe Peto e oret a ee den e dites 6  1 2 ST OVER VIEW  SESSE ne ne ip ere e eee er ec c Ea rere LEE ERR CE 6  1 3 CE CONFORMANCE bea   s      e ee de upah buna                     7  2     TOE DESCRIPTION    k ul a Sulu amu Te se se vee ee PY Te Gee SV RE ees          8  2 1 BRA 2  EE EE OE eve 8  2 2 DEFINITION OF THE TOE AND ITS SECURITY SERVICES                                        11  2 3 UNDERLYING IT PLATFORM                         e e nene nennen nnne      W E oa sua 13  2 4 PHYSICAL BOUNDARIES OF THE TOE AND SCOPE OF DELIVERY                          13  2 5 LOGICAL BOUNDARIES OF THE TOE                                                                  14  3  TOE SECURITY ENVIRONMENII I        
49. ccessed and the clearance of the  subject attempting to access that information in accordance with the NATO  policy for declassification of information  see  P DECLASSIFICATION POLICY in section 3 2     3  Audit  The TOE uses the means of recording any security relevant events to    a  assist an administrator in the detection of potential attacks or miss   configuration of the TOE security features that would leave the TOE  susceptible to attack  and   b  hold users accountable for any actions they perform that are relevant to  security    4  Residual Information  Any information contained in a protected resource is not  accessible when the resource is recycled    5  Management  Support is provided to aid users in managing the TOE and its  security functions  and it must ensure that only authorized users are able to  access such functionality    6  Duty  The TOE uses the capability of enforcing separation of duties so that no  single user  program or human  performs all administrative functions    7  Hierarchical  The TOE uses the hierarchical definitions of profile rights  defined by the OS    8  Role  The TOE uses the measures to prevent users  programs and humans   from gaining access to and performing operations on its resources and objects  unless they have been granted access by the resource or object s owner or have  been assigned a rights profile or role  which permits those operations     TOE stores the audit records  journal file  on the hard disk of the computer us
50. console    e receiving a SIGTERM signal from the operating system due to a manual  kill of the process     Dependencies  ADV SPM 1 Informal TOE security policy model  included     5 144        ITT 1 Basic internal TSF data transfer protection    Hierarchical to  No other components     FPT ITT 1 1 The TSF shall protect TSF data from modification when it is  transmitted between separate parts of the TOE     Dependencies  No dependencies    5 1 4 5               1 Non bypassability of the TSP    Hierarchical to  No other components     FPT_RVM 1 1 The TSF shall ensure that TSP enforcement functions are invoked  and succeed before each function within the TSC is allowed to proceed     Dependencies  No dependencies    5 1 4 6        TDC 1 Inter TSF basic TSF data consistency    Hierarchical to  No other components     FPT_TDC 1 1 The TSF shall provide the capability to consistently interpret  e O Data Class  when shared between the TSF and another trusted IT product            TDC 1 2 The TSF shall use  SSTANAGS501  message decoding when  interpreting the TSF data from another trusted IT product     Dependencies  No dependencies    UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    46 of 92    5 1 47        TST 1 TSF testing    Hierarchical to  No other components     FPT TST 1 1 The TSF shall run a suite of self tests during initial start up to  demonstrate the correct operation of the sanitization function        FPT TST 1 2 The TSF shall provide authorized users with
51. ction only  LIFOS is connected to the TOE and to a  non NATO system  which is expected to follow similar  rules as within the NATO establishment  be is not under  NATO control  LIFOS is located in an IT environment  that is authorised to contain NATO crypto equipment     Secure_IT_Platform Certified secure IT Platform on which the TOE runs   consisting of a secure operating system and  accompanying hardware  The secure software is the SUN  Trusted Solaris 8 12 02 operating system  The hardware  comprises the SUN Blade SPARC 100 150 and serial  communication cards  see footnote 7      3 1 2 Authorized human subjects   The only user that interacts with the TOE is    S SysOper User role defined by Secure_IT_Platform  This role is the  operator of the TOE and is allowed to start and stop the  TOE  both parts  via the Console  In addition  the role  may start and stop the system  allocate system resources  such as disks  start and stop queues  etc     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    20 of 92    The users that are present within the TOE environment are     S Audit    S ISSO    S SysAdmin    User role defined by Secure_IT_Platform  This role is the  Auditor of the audit output of the TOE and of audits in  the TOE IT environment  Only the S Audit role can  analyse  back up and restore system audit logs when the  testframe part of the TOE is not running  The audit logs  are regularly reviewed     User role defined by Secure_IT_Platform  This role is the  Info
52. ctive values are stated here for all security functions     Security Attribute Value   SA Oper Mode Not applicable for these functions  SA OS MAC Level Admin high  Classified   SA OS Priv Level Unprivileged    SA Security Label of the processed data CLASSIFIED    6 1 3 1 SF Consider Logout    This function aims at recognition of an  unexpected  end of the operator console  process     The security function SF Consider Logout implements the Unix standard    behaviour to handle and consider signals send from the operating system to  processes  If this function receives an SIGTERM from the operating system  the    UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    62 of 92    process will be ended like the user initiated exit  This signal will usually be sent in  case of a user logout  close of the window the application runs within or when the  user explicitly sends this signal in order to Kill the application    Furthermore  the security function handles user input which exits the application   the operator inputs              This means especially that the network connected to the testframe will be  terminated correctly and the process can be removed from the main memory     This security function generates O Data Audit  type of the event  for  SF Operator Input and a special command will be sent to the testframe part which  records the exit of the operator console  too     6 1 3 2   SF Keep Alive    This function aims at sending O Ping to the testframe every 10 sec
53. defines the two classification  levels that data processed by the TOE and its  environment can have  The classification levels are  CLASSIFIED and NATO UNCLASSIFIED PN  RELEASABLE     The  data  objects for the TOE that the TOE will operate upon are     O Data  Audit    O Data Class    O Data Unclass    O Filter Rule Set    O Command    O Ping    O Output Message    06 02 07    Audit data log record produced by the TOE  The data has  SA Security  Label    CLASSIFIED     A packet of data having a seguence number and  SA Security  Label    CLASSIFIED     The packet can take  the following forms     1  Bit stream  Series of bits that are probably a Link 1  message     2  Link 1 Message  Link 1 Message as defined by   STANAGS5501      3  Sanitized Link 1 Message  Link 1 Message sanitized  by the operation R Sanitize  see section operations      A sanitized O Data Class having SA Security Label     NATO UNCLASSIFIED PN RELEASABLE      The set of rules that define which  parts of  O Data  Class  need to be sanitized given by the SA Oper Mode of the  L1 Provider  The set of rules is listed in Appendix D    Link 1 Forward Filter Sanitization Rules of this ST  The  set has SA Security Label    CLASSIFIED        Messages send from the operator console to the testframe  part of the TOE  These messages contain commands for  the testframe entered by the user at the operator console     A special O Command the operator console sends  regularly to the testframe  This informs the testframe t
54. ds when the time out threshold is reached and  testframe exits itself   e SF Operator Input records all keys the operator presses  Furthermore  start  and stop of the operator console will be recorded   e SF Sanitize performs R Sanitize and records the respective result   e SE Set Mode performs R Set Mode and records this   e SF StartStop records the start up and the controlled shutdown of the TOE   In case of a crash  the TOE is not able to record  but this is not possible in  any way   e  SF Test performs R Test and records the results  e SF Verify Outbound performs R Verify Outbound and records this     FDP ETC 2   The SFR FDP_ETC 2 is implemented by the SF Check Integrity  SF  Audit Export  and SF Operator Input by exporting O Data Unclass respectively O Data Audit  outside the TSF to the Secure      Platform conform the defined security attributes   After this  O Data Audit can be further processed by S Audit     FDP IFC 2  1    The SFR FDP IFC 2  1  is implemented directly by the sequence of   SF Verify Outbound  SF Sanitize  SF Check Sanitization  SF Pack   SF Downgrade and SF Check Integrity enforcing  P DECLASSIFICATION POLICY and all other supporting checks  The  requirement        RVM 1 ensures  that these sequence will be called in all cases   In addition  SF Set Mode realizes that all modes of  P DECLASSIFICATION POLICY can be used     FDP IFC 2  2    FDP IFC 2  2  is implemented directly by SF Keep Alive and   SF Keep Alive check  When running  the operator cons
55. e  The new sanitized  O Data Class is passed on to the SF Pack and the O Data Class provided by the  SF Verify Outbound is passed on to the SF Disregard    In this security function the implementation of the R Sanitize is based on a case  based mechanism  which is a different mechanism than the implementation of the  R Sanitize in SF Check Sanitization     After the operation R Sanitize SF Sanitize generates O Data  Audit  Date  Time  the  rule numbers applied and the frame content  including the sequence number  after  the sanitization will be recorded     Security Attribute Value   SA Oper Mode All  different mode equals different rule set  SA OS MAC Level Admin high  Classified   SA OS Priv Level Unprivileged    SA Security Label of the processed data CLASSIFIED    UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 59 of 92    6 1 2 7 SF Set Mode    This function will set the appropriate set of filter rules that will be enforced by the  operation R Sanitize     The security function SF Set Mode implements the R Set Mode operation   The R Set Mode operation sets the O Filter Rule Set to one of the   SA  Oper  Mode  The operation is allowed to be performed by the S SysOper   Default value for SA Oper Mode      Peace Operational Mode      After the operation R Set Mode SF Set Mode generates O Data  Audit  Date time   the old mode and the new mode of operation will be recorded  If the old and the  new mode of operation are identical  it will be recorded that the mode remains    unc
56. e operation R Sanitize before  operation R Downgrade is performed  This means that a not sanitized message will  not be downgraded  and sent out   regardless of errors or failures of the hardware   the operating system or the TOE software    In addition  this policy is met by SOT NO RESIDUAL ensuring that no classified  information may remain in memory after disregarding of messages or stop of the  TOE  This means  the operating system or another software is not able to access  these information    The assigned objective SOE SECURE IT PLATFORM ensures that the TOE runs  on Secure IT Platform  which is a dependable platform regarding the hardware  and the operating system     T BYPASS   The objective is met by SOE TOE LOCATION which ensures that the TOE is not  physically bypassed    The objective SOT NO BYPASS assures that all incoming data will be filtered and  cannot bypass the TOE    SOT NO RESIDUAL assures that no O Data Class can be accessed from memory  or other resources after the TOE is stopped    SOE SECURE IT PLATFORM assures that all permanently stored classified  information in the audit trail cannot be accessed by unauthorized people   SOE SECURE USAGE ensures that no misconfiguration may lead to a bypass of  classified information     T MODE SYNC   The threat is countered by SOE  MODE SYNC and SOT FILTER  RULE   SOE MODE SYNC provides the procedures to keep SA Oper Mode of the TOE  synchronised with the SA Oper Mode of the L1 Provider    SOT FILTER RULE provides
57. ee ee ee ee ee ee ge ge ee ee ee 82  8 4 PP CLAIMS RATIONALE                           n n n nenne nnne nnn nn nnn nnn        87  UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 4 of 92       9  APPENDIX A   ABBREVIATIONS                                                                         88  10  APPENDIX B   REFERENCES                                                                           89  11  APPENDIX      GLOSSARY OF TERMS                                                           90  12  APPENDIX D   LINK 1 FORWARD FILTER SANITIZATION RULES     91  13  APPENDIX E   THE NEED OF AN EVALUATION                                         92    06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    5 of 92   List of figures  Figure 1  ASDE system consisting of a Buffer  Forward Filter and diodes                8  Figure 2  Logical boundaries of the TOE of classified and unclassified data           15  Figure 3  Overview of the Security Functions of the communication functionality   and their relation                                     oett ege 51  Figure 4  Overview of the Security Functions of the filter functionality and their   JEN 52  List of tables  Table 1  Assurance requirements for the TOE  iese see see se se ee es ee ee ee Ge 48  Table 2  Environment to Objectives               eese 69     Table 3  Objectives to SPR  viet  cect ett ee nite ie eret ins 74  Table 4  Objectives for the IT Environment to SFR for the IT Environment           77  Table 5 
58. eived value of the object  and not because the subject agrees not to access it     Multi Level Secure  A description applied to an IT system that is itself able to  securely store and indelibly label items in terms of the true  sensitivity of the information  An MLS system is characterized  by the use of MAC labels and software that implements a policy  of no read up  e g  an uncleared user cannot read a classified  item  and no write down  e g  a classified process cannot create  an unclassified item without using privileges     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    UNCLASSIFIED    ST Public doc  Appendix  91 of 92    12  Appendix D   Link 1 Forward Filter Sanitization  Rules    The filter rules are removed due to classification issues  Details are provided in   Rules     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    UNCLASSIFIED     Appendix  92 of 92    13  Appendix E   The Need of an Evaluation    Security approval by the Military Committee is required prior to the release of Air  Situation Data  or the associated Link 1 documentation  to any PfP nation   Thereafter  each PfP system receiving the Air Situation Data must be approved or  accredited by the National Security Authority  as identified in the Security  Agreement  and is subject to periodic NATO Office of Security  NOS  inspections  under the bi lateral security agreements  The accreditation must identify the  maximum classification to be processed  i e  during Article 5 operations   NA
59. frame  which is O Data_Unclass after  SF Downgrade  will be recorded     Security Attribute Value   SA Oper Mode Not applicable for this function  SA OS MAC Level Admin high  Classified   SA OS Priv Level Privileged    Starting with CLASSIFIED   SA Security Label of the processed data     Resulting in NATO UNCLASSIFIED PN  RELEASABLE    UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    54 of 92    6 1 2 Supporting Security Functions for the actual filter    6 4 2 1     SF Audit Export    This function aims at recording audit logs of all operations done by the security  functions in order to trace all changes made on the Link 1 data     The security function SF Audit Export implements the operation R  Audit  Trail   SF Audit Export receives             Audit from other security functions  The    security function writes an audit trail on the Secure TT  Platform     This security function does not generate O Data  Audit     Security Attribute Value   SA Oper Mode Not applicable for this function  SA OS MAC Level Admin high  Classified   SA OS Priv Level Unprivileged    SA Security Label of the processed data CLASSIFIED    UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    55 of 92    6 1 2 2 SF Check Integrity    This function aims at checking the integrity of the downgraded O Data  Unclass by  recalculating its cyclic redundancy check     The security function SF Check Integrity performs the R CRC  Check operation on  the O Data_Unclass provided by the SF 
60. function checks whether the loopback  interface and valid port numbers are configured  Otherwise  the testframe starts up  with the default values for this port configured erroneously  8181  8182      The operating system assures that no other process can use these ports  Therefore   the information sent received over these ports is protected    The parameters of the two IP connections are stored in the configuration file of the  TOE  This means  only S SysAdmin is able to maintain the parameters due to  access restriction to this file  The access restrictions will be enforced by the  environment  the operating system     The testframe will receive all O Command from the operator console  when the  testframe is running     This security function does not generate O Data  Audit     6 1 4 Probabilistic and permutational functions and mechanisms  None     6 2 Assurance Measures    Appropriate assurance measures are employed to satisfy the security assurance  requirements  The following list gives a mapping between the assurance  requirements and the documents containing the information needed for the  fulfilment of the respective requirement        38 Please remark that  incoming  and    outgoing    is from the testframe point of view     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    66 of 92    Configuration Management  ACM  assurance measures   It will be described and documented which configuration management system is in  use  how it works and how it is used  
61. g only  S SysOper the possibility to change SA Oper Mode     FMT MSA 1  2   The SFR        MSA 1  2  is implemented by SF Keep Alive and  SF Keep Alive check which do not permit the modification of these values     FMT MSA 1  3    The SFR        MSA 1  3  is implemented by SF Sec Com Op and  SF Sec Com Testframe  These two security functions read and check the port  numbers for the inter  TOE connection given in the configuration file  Only  S SysAdmin is able to modify the communication parameter due to access  restrictions to the configuration file  The IP address for the communication is not  configurable     FMT MSA 3  1   The SFR FMT MSA 3  1  is implemented by SF Set Mode providing the initial  setting for SA Oper Mode     FMT MSA 3  2   The SFR FMT MSA 3  2  is implemented by SF Keep Alive and  SF Keep Alive check which uses the two default values only     FMT MSA 3  3   The SFR FMT MSA 3  3  is implemented by SF Sec Com Op and  SF Sec Com Testframe which provide the three default values     FMT SMF 1   The SFR         SMF 1 is implemented by SF Set Mode  which enables  SA SysOper to change SA Oper Mode  This event generates audit information   FAU  GEN 1  which enables to monitor SA Oper Mode                   1  The SFR        AMT  is directly implemented by SF Test running a suite of tests  during the initial start up     FPT FLS 1  1    The SFR FPT FLS 1  1  is implemented by the SF Sanitize and   SF Check Sanitization  Both functions filter all classified data fro
62. gth of Function  Claim is defined  see section 5 2     8 2 6 All dependencies have been met  The dependencies of the SFRs are not completely fulfilled     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    80 of 92    FMT MSA 3  all iterations  has a dependency to FMT SMR 1 which is not  applied  because the set of security roles is always restricted to    nobody      Therefore  no rules have to be managed by FMT  SMR 1  This means  all  dependencies of the SFRs are implicitly fulfilled     For every dependency chapter 5 indicates whether this is fulfilled by SFRs for the  TOE or for the IT environment  The dependencies of the two        FLS 1 iterations  to ADV  SPM are fulfilled by the EAL level chosen     The dependencies of the SAR are fulfilled per definition because an EAL level  without any augmentations was selected     8 2 7 The requirements are internally consistent  The SARs are internally consistent  because they are an EAL and therefore cannot  cause inconsistencies     The two         FLS 1 have dependencies on ADV  SPM 1  These dependencies are  already covered by EALA and will therefore not introduce an inconsistency  All  other SARs and SFRs are completely independent of each other  so there are no  inconsistencies between them     The SFRs are internally consistent because   a  The Security Objectives do not conflict each other  see section 8 1    b  The justifications in sections 8 2 1 show that each Security Objective for the  TOE is met by the a
63. hanged   Security Attribute Value  SA Oper Mode Peace Operational Mode  SA OS MAC Level Admin high  Classified  SA OS Priv Level Unprivileged    SA Security Label of the processed data CLASSIFIED    6 12 8 SF StartStop    This function records the date and time of the testframe start up and shutdown     The security function SF StartStop generates an audit record at start up and at  controlled shutdown of the TOE     SF StartStop generates O Data Audit  Date time and the event will be recorded     Security Attribute Value   SA Oper Mode Not applicable for this function  SA OS MAC Level Admin high  Classified   SA OS Priv Level Unprivileged    SA Security Label of the processed data CLASSIFIED    06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 60 of 92    6 1 2 9 SF Test    This function will test the correct operation of the filter and the  Secure IT  Platform     The security function SF Test implements a suite of tests during the start of the  TOE  This suite tests at least    e Correct operation of the TSF    e Integrity verification of the TSF and TSF data for the S SysOper    e Check whether Secure IT Platform is running     SF Test is executed before any other function of the TOE  If SF Test detects an  error  this will be recorded and the TOE stops     After each test SF Test generates O Data Audit  Date time and the operator input  will be recorded  If the operator approves the test results by entering    Y     this is a  record the successful self tests  All o
64. hat  the operator console is running     Messages send from the testframe part of the TOE to the  operator console  These messages contain information the  operator console has to display     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    3 1 4 Operations  R Audit Trail    R CRC Check    R CRC Pack    R Disregard    R Downgrade    R Sanitize    R Set Mode    R Test    R Verify Outbound    23 of 92    This operation writes O Data  Audit to an audit trail of  the Secure IT Platform     This operation confirms or denies whether the cyclic  redundancy check of O Data Unclass equals the cyclic  redundancy check calculated by R CRC  Pack for the  corresponding sanitized O Data Class     This operation calculates a cyclic redundancy check over  a sanitized O Data  Class and the cyclic redundancy  check is added to this sanitized O Data Class     This operation disregards all data in O Data Class or  O Data Unclass     This operation generates a new O Data Unclass with the  data of a sanitized O Data Class     This operation applies O Filter Rule Set on   O Data Class  This means this operation generates a new  O Data Class that contains a  5          5501  compliant  Link 1 Message which fulfils O Filter Rule Set  some  bits are zeroed or a blank message      This operation sets the O Filter Rule Set to one of the  SA  Oper  Mode values     This operation checks the integrity of the TOE and the  presence of the Secure IT Platform     This operation confirms or denies w
65. hat these procedures are followed    The development and maintenance life cycle model is implemented in accordance  with  MIL498   All tools used for development will be listed and shortly described  in a document  All documentation about the tools will be provided  Only such  tools  programming languages  code generators  compilers  etc  will be used which  are well defined and work according an accepted standard     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    67 of 92    Test  ATE  assurance measures   The test documentation will contain a coverage analysis which shows the complete  coverage of all TSF by the tests  A depth of test analysis in this document will  show that the TSF operates in accordance with the High Level Design   Furthermore  all tests will be defined  test plan   described  test procedure  description  and the actual results of the test performance be documented  Some of  these tests will be performed by using scripts  which will be provided as part of the  test documentation    For the independent evaluator tests  the security target  all design and development  documents and the source code as well as a working TOE in an appropriate  environment will be provided to the evaluator     Vulnerability Assessment  AVA  assurance measures   The user guidance provided for fulfilling AGD will be analysed for completeness  regarding the AVA MSU  misuse  requirements  This analysis will be  documented    A SOF analysis will not be performed becau
66. he TOE shall generate O Data Audit after performing one of these individual  operations R Verify Outbound  R CRC Check  R Downgrade  R Sanitize   R Set Mode  R Test as well as start and stop of the TOEs audit function     SOT DATA EXPORT  The TOE shall perform the operation R Audit  Trail to enable S Audit to read  O Data  Audit generated by the TOE        1l When the operator console runs in an X window  closing this window is equivalent to a  log out of the user  from the programs point of view      UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    29 of 92    SOT FAIL SECURE  A failure in the operation R Sanitize shall not cause the TOE to pass through  O Data Class to the operation R Downgrade     SOT FILTER RULE  The TOE shall ensure that the operation R Sanitize uses the O Filter Rule Set  according to SA Oper Mode set by S SysOper     SOT KEEP ALIVE   The two parts of the TOE shall establish a communication in such a way that the  testframe part of the TOE stops if a communication with the operator console is not  possible for 3 minutes or longer  This means  after that period of time without  communication  keep alive messages  all messages from the Link 1 providing  system will be blocked until the user enables the filter again    The testframe part must have the ability to work without a communication with the  operator console    The testframe part must recognise nearly immediately when the operator console  does not run  For this purpose  the operator c
67. he user and controls the filter     LIFOS information diodes are an already evaluated product and the Link 1  Providing System will not be subject to accreditation  This Security Target defines  the claim for the accreditation     TOE primary security service  Downgrade  The TOE offers one primary security service     Downgrade CLASSIFIED Link 1 Messages into NATO  UNCLASSIFIED PN RELEASABLE Link 1 Messages     This security service shall assure that Link 1 messages that are downgraded do not  contain any other information than NATO UNCLASSIFIED   PN RELEASABLE   Any message  where it is not certain that itis NATO UNCLASSIFIED     PN RELEASEABLE shall not be sent out  transmitted  by the TOE        TOE supporting security services   To support the primary security service of the TOE  the TOE offers three security  services       Filtering    2  Filter management    3  TOE integrity check     Filtering   This supporting security service aims to assure that a message does not contain any  other information than NATO UNCLASSIFIED PN RELEASABLE  Therefore   this service consists of two functions to assure that messages only contain NATO  UNCLASSIFIED PN RELEASABLE information       Completely blocking the content of certain messages    e Zeroizing certain bit fields in messages that are not blocked        6 For these types of messages  the classified message will completely be replaced by a  blank message  The classified information is blocked  A blank message will be send to  al
68. hether O Data Class  coming from L1 Provider conforms syntactically to   STANAGS501      3 1 5 Non Authorized subjects  Threat Agents   The following subjects are capable to effectuate threats for the TOE  i e  Threat    Agents    TA Erroneous User    TA Unclass Receiver    UNCLASSIFIED    S SysOper  S Audit  5 155   or S SysAdmin capable of  making mistakes with organizational security policies or  accidentally modifying the Secure_IT_Platform or the  TOE configuration  thereby allowing security violations  to occur     Entity  human person or IT system not authorised to  receive O Data_Class  This entity is capable of receiving  an outgoing Link 1 data stream from the TOE outside the  TOE environment     BSI DSZ CC 0342    ST Public doc    06 02 07    24 of 92    3 2 Organisational Security Policies  P     The main purpose of the TOE is to implement the NATO policy for  declassification in an automated way  This is defined by  P DECLASSIFICATION POLICY     P DECLASSIFICATION POLICY   The TOE shall implement and comply with the NATO declassification policy   appropriate for downgrading classified information  SRS   This policy defines the   e Filter rules  the set of rules for the circumstances under which information will  be allowed for declassification  In  Rules  this policy is fully defined    e Condition  the condition for an automated system under which the filter rules  are allowed to be applied  The condition is  It shall be retrievable when an  O Data Class has bee
69. ing  the usual operating system interfaces  These log files will be created  filled  stored  and closed by the TOE    Therefore  the external interface of the TOE is actually a pure software interface   The TOE creates the audit records and adds the current date and time to each of  them before the records are stored in the journal file  The date and time will be  provided by the underlying operating system    The access to the journal file will be restricted and controlled by the operating  system and managed by the system administrator     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 19 of 92    3  TOE Security Environment    In this Chapter the security characteristics of the environment in which the TOE is  deployed are defined     3 1 Definition of subjects  objects and operations    To facilitate easy definition of threats  organisational security policies   assumptions  security objectives and security requirements  the subjects  objects  and operations to be used in the ST are defined first     3 1 1 Non human Subjects  The systems  equipment  that interact with the TOE are     L1 Provider Link 1 Providing System  or equivalent system such as  an ASDE Buffer  that supplies a Link 1 Stream to the  TOE  The L1 Provider is located in an IT environment  with the same regime as the TOE  which is authorised to  process CLASSIFIED information     LIFOS Accredited hardware system consisting of information  diodes that ensure the flow of serial line data in one  dire
70. ion relevant for the TSF   The wording was adapted to this meaning     15 FDP IFF 1 5 does not add information relevant for the TSF   The wording was adapted to this meaning     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    38 of 92    5 1 2 6 FDP IFF 1  2  Simple security attributes    Hierarchical to  No other components     FDP IFF 1 1 The TSF shall enforce the P KEEP ALIVE POLICY based on the  following types of subject and information security attributes  Operator Console   Testframe  time since the last O Command was sent     FDP IFF 1 2 The TSF shall permit an information flow between a controlled  subject and controlled information via a controlled operation if the following rules  hold    e  O Commands flows from the Operator Console to the Testframe    FDP IFF 1 3 The TSF shall enforce the additional information flow control SFP  rules  none 6    FDP IFF 1 4 The TSF shall provide the following additional SFP capabilities  Yf  there is no other O Command communication  the operator console sends  every 10 seconds an O Ping to the testframe part of             17    FDP IFF 1 5 The TSF shall explicitly authorise an information flow based on the  following rules  none  9    FDP IFF 1 6 The TSF shall explicitly deny an information flow based on the  following rules  none       Dependencies  FDP IFC 1 Subset information flow control   hierarchical component        IFC 2  2  included   FMT_MSA 3  2  Static attribute initialisation  included        
71. is mode and values  Therefore  these  requirements prevent de activation or unauthorized modification of TSF as  well as spoofing  tampering and information disclosure of O Command and  O Output Message due to an illegal network connection    FAU_GEN 1 enables the TOE to generate audit information and        ETC 2  enables the TOE to export  store  these information persistently on the system          STM 1  environment  assures that the audit log information contain  always the correct time and date    FPT AMT 1 and FPT TST 1 test the TSF and the underlying operating system  and will therefore detect modifications    FPT TDC 1 ensures that only  STANAG5501  compliant messages will be  processed         ITT 1 and FTP ITC 2 require a TSF internal integrity check  which detects unintended modifications on sanitized O Data Class and  enforces this integrity check by using a trusted channel     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    8 3    8 3 1    The functions meet the SFRs  For each SFR we demonstrate that it is met by the Security Functions  The tracings    TOE Summary Specification Rationale    are provided implicitly by the rationales and explicitly by this table     82 of 92       port    SF Audit Ex    grity    gout    SF Disregard    SF Keep Alive    SF Pack      Op  SF Sec        Testframe    SF Sec Com O       FAU GEN 1    x SF Check Sanitization    x SF Consider Lo     gt  SF Downgrade                     Alive check       SF Sanitize       SF Se
72. ision depends from the precision of the hardware system  clock  The timer check per 10 seconds of the testframe depends from whether the  testframe actually has to filter messages or not     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 63 of 92    all messages received from the L1 providing system   In order to avoid undefined states  message processing must not be  performed when the timer is validated     All O Commands received from the operator console will be considered by this  security function  This security function does not interpret or modify  O Commands  All O Command except O Ping will be forwarded to the filter  functionality     This security function does generate O Data Audit  Date time of the stop of the  filter and the event itself will be recorded     6 134 SF Operator Input    This security function records start and stop of the operator console as well as all  user input     This security function maintains separate audit files for the operator console  These  files will contain a complete protocol of all actions an operator has initialised by  entering commands  All key presses will be recorded  Furthermore  start and stop  of the operator console will be recorded in these files  All the records include the  date time and the Unix user ID of the operator     This security function does generate O Data Audit but does not forward these  information to SF  Audit  Export     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    64 of 92    
73. it     SOT DATA EXPORT  The objective SOT DATA EXPORT is directly implemented by FDP  ETC 2  preserving that userdata O Data_ Audit is exported outside the TOE     SOT DOWNGRADE   The secure handling of labelled information will be assured by FDP_IFF 1  1     FDP IFC 2  1  enforces an information flow control according the  P DECLASSIFICATION POLICY inside the TOE  which defines among others  the sequence of operations  FTP  ITC 1 enables the TOE to transfer unclassified  information from a privileged and classified in an unprivileged and unclassified  part of      TOE         ITT 1 assures that O Data Unclass will not be modified after  R Downgrade and is therefore integer regarding the respective O Data  Class    FDP ETC 2 assures that the generated O Data_Unclass can be exported outside the  TOE     SOT FAIL SECURE  The objective SOT FAIL SECURE is directly implemented by        FLS 1  1  that  indicates that R Downgrade is not performed when R Sanitize fails     SOT FILTER RULE   The objective SOT FILTER RULE is directly implemented by FDP_IFC 2  1   assuring that the appropriate O Filter Rule Set is used according to the current  SA Oper Mode  In addition the default values for the  P DECLASSIFICATION POLICY are restricted by FMT MSA 3  1     FMT SMF 1 enables the TOE to change the filter rules by changing the mode of  operation  The roles that are allowed to change the SA Oper Mode are restricted  by FMT MSA 1  1  to S SysOper     SOT KEEP ALIVE   The objective SOT KEEP
74. l  mode in the TOE  e g  Exercise instead of Peace  that possibly violates  P DECLASSIFICATION POLICY causing that TA Unclass  Receiver is able to  read O Data  Class and S Audit does not notice  This threat may occur when  TA Erroneous User performs a change of SA Oper Mode  Due to the fact that  TA Erroneous User is allowed to change SA Oper Mode  only human failures  could be the reason     T OPERATOR DOES NOT EXIT   A TA  Erroneous  User logs out of the operating system but does not exit the  operator console before  This may happen because the user starts the operator  console as independent process in the background or the operating system puts the  process in the background during log off of the user  Therefore  this threat may  occur at any time  The operator console keeps running and the time out mechanism  of the TOE testframe part does not work  Therefore  there is no human operator to  monitor the warning messages the TOE generates  This may result in O Data Class  sent out without appropriate sanitization to TA Unclass  Receiver     T TOE REPROGRAM      TA  Erroneous  User may reprogram or modify the TOE binary stored on the  hard disk  causing it to pass through O Data Class either immediately or in some  point in the future  For this purpose TA Erroneous User can use the tools usually  installed with the underlying operating system  This threat is possible because  TA Erroneous User must have access to the TOE binary for his normal work and  the appropriate too
75. ll be defined    If the simplified component iteration will be applied  all  dependencies references to this component and all the  dependencies references from this component must be  valid for all iterations  This is also valid for security  objectives and security functions related to the  component be iterated     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    33 of 92    5 1 TOE Security Functional Requirements    5 1 1 FAU Security audit    5 1 1 1 FAU GEN 1 Audit data generation    Hierarchical to  No other components            GEN 1 1 The TSF shall be able to generate an audit record of the following   auditable events    a  Start up and shutdown of the audit functions    b  All auditable events for the not specified level of audit  and   c  after the operations R Verify Outbound  R CRC Check  R Downgrade   R Sanitize  R Set Mode  R Test  everytime an operator enters an input  and terminates the operator console            GEN 1 2 The TSF shall record within each audit record     Data Audit which  contains at least the following information   a  Date and time of the event  type of event  subject identity  and the outcome   success or failure  of the event  and  b  For each audit event type  based on the auditable event definitions of the  functional components included in the ST 2   e In case of message filtering  the input data O Data Class  e Incase of message filtering  the sequence number O Data Class  e In case of message filtering  the filter rule
76. low full traceability of the sanitization process    The blank message is considered as classified until the message is downgraded according  to the standard procedure     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    12 of 92    These two functions are known as    Sanitization      Details about which messages are blocked and what message fields are zeroized are  provided in  Rules     The filtering functions are executed by applying a fixed rule set that is mandated by  NATO regulations  The rules that define which  or parts of  Link 1 messages are  authorized to be downgraded depend on the mode of operation of the Link 1  Providing System  The contents of the rule set differ for each mode of operation   There are four distinct operational modes    1  Peace Operational Mode    2  Exercise Operational Mode    3  Crisis Response Operational Mode    4  Article 5 Operational Mode     Rules  lists all rules for all the operational modes     The rule set of the filtering function to be applied on Link 1 messages conforms to   STANAGS5501      Filter management   This supporting security service is concerned with a number of activities that   require management       Operational mode change  When the operational mode  see downgrade  function  on the Link 1 Providing System is changed  the mode on the TOE  must be changed accordingly  A time to switch from the current operational  mode to another operational mode must be agreed upon with the receiving  party
77. ls are installed on the system  Due to the fact that the access to  the TOE is not restricted for TA Erroneous User  this attack or mistake may occur  every time TA Erroneous User works on the system     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    28 of 92    4  TOE Security Objectives    This section defines the Security Objectives of the TOE and its environment  The  Security Objectives reflect the stated intent to counter all identified threats  They  comply with all organizational security policies identified and uphold all  assumptions     4 1 Security Objectives for the TOE  SOT     The Security Objectives for the TOE are divided into the primary Security  Objective and supporting Security Objectives     Primary Security Objective  Downgrade    SOT DOWNGRADE   The TOE shall implement the operation R Downgrade on sanitized O Data Class   In order to verify the downgrade operation  the R CRC Pack is performed before  and the R CRC Check after the operation  After R Downgrade and the CRC check  are performed the TOE can send the data to LIFOS     Supporting Security Objectives    SOT CONSIDER LOGOUT   The operator console shall be able to recognise user logout or equivalent events    in order to exit in a controlled way  The operator console process must not be kept  in memory  running or not  when the user is logged out  Furthermore  the operator  console process must not be able to block the log out process of the operating  system     SOT DATA AUDIT   T
78. m the data  received by the L1 Provider  The way these functions perform the filtering is    UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    86 of 92    implemented differently  SF Sanitize uses a case based mechanism and  SF Check Sanitization uses a rule based mechanism   Furthermore  the double check of O Data Class ensures that an error in one of  these functions does not result in downgrading unsanitized data   e If SF Sanitize fails  SF Check Sanitization will disregard the message   e  f SF Check Sanitization fails  the message is already sanitized   Furthermore  the requirement is implemented by SF Test  The TOE performs a  self test during start up and does not filter any messages in case of an not  successful test     FPT FLS 1  2           FLS 1  2  is implemented by SF Consider  Logout  This security function  checks whether the operator console receives SIGTERM signals from the operating  system  If this signal has been received  the security function exits the operator  console in a controlled manner     FPT ITT 1   The transfer protection shall cover the protection of O Data_Unclass after the  operation R Downgrade  This will be enforced by SF Pack  CRC calculation right  before R Downgrade  and SF Check Integrity  CRC verification after  R Downgrade and right before sending the data out                    1   The SFR        RVM 1 is implemented by enforcing the execution sequence of the  security functions in all cases the TOE receives data  This 
79. means  the respective  security functions will be called every time a message is received  regardless which  form and content this message has    This requirement is not implemented in a separate security function because the  security functionality is that the sequence will be called every time and there are no  premature exit points within the called security functions    The sequence is defined in the requirement        IFC 2  1  and implemented in the  security functions SF Verify Outbound  SF Sanitize  SF Pack    SF Check Sanitization  SF Downgrade and SF Check Integrity    The requirement FDP_IFC 2  1  ensures that this sequence will be performed  correctly  this means especially without premature exit points     FPT TDC 1   The SFR FPT TDC 1 is implemented by SF Verify Outbound  This security  function checks the received data package according to defined rules  see  Appendix D  whether it is a  STANAG5501  conformant frame     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    87 of 92    FPT TST 1  The SFR FMT TST 1 is directly implemented by SF Test running a suite of tests  during the initial start up     FRU FLT 1   The SFR FRU FLT 1 is directly implemented by SF Keep Alive check  This  security function ensures that the testframe is able to work without the operator  console for three minutes  SF Consider Logout supports this security function by  ensuring that the inter TOE connection will be terminated when the operator  console exits intentionally or
80. mpanying manuals  including   e Short term storage on the Secure IT Platform    e Long term storage on a long term storage medium     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    31 of 92    SOE SECURE ENVIRONMENT  The TOE environment shall implement  e   A E NATO SECURITY POLICY  e            ACCESS POLICY    SOE SECURE USAGE   The TOE environment shall establish and implement procedures to ensure that the  TOE is installed  used and maintained compliant with the accompanying manuals   S SysOper has to be trained to maintain the TOE in an appropriate way     SOE TOE LOCATION   The TOE environment shall ensure that the TOE is the only communication path  between the L1 Provider and LIFOS  No other devices than LIFOS are connected  between an unclassified environment and the TOE  outer side   Only NATO  certified L1 Provider shall be connected to the inner side of the TOE     4 2 3 Security Objectives for the IT and the non IT Environment    SOE MODE SYNC  The TOE environment shall have a procedure in order to keep SA Oper Mode of  the TOE synchronised with SA Oper Mode of the L1 Provider     SOE SECURE COMMUNICATION   The configuration of all other programs on the system and the configuration of the  system itself shall ensure that no other process tries to communicate with one of the  TOE applications     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    5     32 of 92    IT Security Requirements    This section defines the IT security requirements of the TOE 
81. n flow control    FDP IFC 2  1  included          SMF 1 Specification of management functions  included          SMR 1 Security roles  included  environment     5 1 32 FMT MSA I  2  Management of security attributes    Hierarchical to  No other components     FMT MSA 1 1 The TSF shall enforce the P KEEP ALIVE POLICY to restrict  the ability to change default the security attributes maximum time between two  O Commands and time out threshold to nobody     Dependencies   FDP  ACC 1 Subset access control or  FDP IFC 1 Subset information flow control    FDP IFC 2  2  included          SMF 1 Specification of management functions  included          SMR 1 Security roles  included  environment        25 The original text was changed to improve grammar as there is only a single security  attribute     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    42 of 92    5 1 3 3 FMT MSA   3  Management of security attributes    Hierarchical to  No other components     FMT MSA 1 1  1  The TSF shall enforce the P INTER TOE   COMMUNICATION policy to restrict the ability to change default the security  attributes O Command port and O Output Message port to S SysAdmin     FMT MSA 1 1  2  The TSF shall enforce the P INTER TOE   COMMUNICATION policy to restrict the ability to change default the security  attributes network interface to nobody     Dependencies   FDP_ACC 1 Subset access control or  FDP IFC 1 Subset information flow control    FDP IFC 2  3  included          SMF 1 Specificati
82. n sent out     P INTER TOE COMMUNICATION  The two parts of the TOE shall establish a communication in such a way that  e the testframe receives all O Command s from the operator console     only the testframe receives the O Command s  e the operator console receives all O Output_Message   s from the testframe     only the operator console receives the O Output_Message   s    P KEEP ALIVE POLICY  e If there is no other O Command communication the operator console must  send an O Ping message to the testframe every 10 seconds   e The testframe must be able to work without a running operator console but  for three  3  minutes maximum   e After this period of time the testframe has to stop working  This means   O Data Class from L1 Provider must be blocked     P TOE DATA INPUT   Outbound is defined as coming from the L1 Provider to the TOE    The TOE shall be able to handle input streams with the following characteristics   A bit stream coming from an L1 Provider can have any form and can possibly  conform to  STANAG5501      P TOE FAIL INSECURE   If the testframe part of      TOE software fails  a TA Unclass Receiver is able to  read O Data  Class either immediately or in some point in the future because the  failure results in a forwarding of unsanitized messages    The TOE shall be able to handle failures in the hardware  in the operating system  or the TOE itself in such a way that unsanitized messages will not be forwarded     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 25
83. native initial values  to override the default values when an object or information is created     Dependencies  FMT MSA 1  2  Management of security attributes  included   FMT SMR 1 Security roles  not included       5 1 3 6 FMT MSA3  3  Static attribute initialization    Hierarchical to  No other components     FMT MSA 3 1 The TSF shall enforce the P INTER TOE COMMUNICATION  policy to provide restrictive default values for security attributes        IP address of the network interface   127 0 0 1   e O Output Message port   8181   e O Command port   8182   that are used to enforce the SFP     FMT_MSA 3 2 The TSF shall allow nobody     to specify alternative initial values  to override the default values when an object or information is created     Dependencies  FMT MSA 1  3  Management of security attributes  included   FMT SMR 1 Security roles  not included  4       29  30    The original text has been changed to accommodate a list of default values     The original text was modified to make the sentence grammatically correct after defining  the assignment   3l    32  33    This dependency is not applied  because the only security role involved is    nobody      The original text has been changed to accommodate a list of default values     The original text was modified to make the sentence grammatically correct after defining  the assignment     34 This dependency is not applied  because the only security role involved is    nobody        UNCLASSIFIED BSI DSZ CC 0342    S
84. not allowed    c  All users of the Secure IT Platform are appropriately identified and  authenticated  and have the appropriate access rights and are held  accountable for their actions    d  No user  program or human  of the Secure      Platform can  unintentionally delete  overwrite or manipulate any system programs  logs   or data    2  Organisational   a  S Audit shall immediately notify S ISSO in case of any threats or  vulnerability that impacts P DECLASSIFICATION POLICY    b  Information shall be used only for its authorized purpose s      06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 26 of 92    3  Personnel  a  The personnel who need access to the TOE or the environment running the  TOE must be screened according to site accreditation requirements   b  S SysOper  S Audit  S ISSO and S SysAdmin shall be held accountable for  their actions   c  Only S SysOper  S Audit  S ISSO and S SysAdmin shall be able to access  O Data Class   4  Physical  a  The TOE shall be located in a physically secured room within a NATO  facility accredited for the site level of accreditation   b  Access to this room is restricted to authorized persons listed in access lists     A E TOE ACCESS POLICY  S SysOper is the only user role that is allowed to interact with the TOE     A E INTER TOE COMMUNICATION  It is assumed that the operating system does not deny a communication between  the two parts of the TOE     3 4 Threats  T     T BYPASS   O Data  Class are passed from the Link 1 Pro
85. nts    The assurance level of the TOE is EALA     Components for Configuration management  Class ACM     ACM AUT 1 Partial CM automation  ACM CAP 4 Generation support and acceptance procedures  ACM SCP 2 Problem tracking CM coverage    Components for Delivery and operation  Class ADO     ADO DEL 2 Detection of modification  ADO_IGS 1 Installation  generation  and start up procedures    Components for Development  Class ADV     ADV FSP 2 Fully defined external interfaces   ADV HLD 2 Security enforcing high level design  ADV LLD 1 Descriptive low level design   ADV IMP 1 Subset of the implementation of the TSF  ADV RCR 1 Informal correspondence demonstration  ADV SPM 1 Informal TOE security policy model    Components for Guidance documents  Class AGD     AGD ADM 1 Administrator guidance  AGD USR 1 User guidance    Components for Life cycle support  Class ALC     ALC DVS 1 Identification of security measures         LCD 1 Developer defined life cycle model         TAT 1 Well defined development tools    Components for Tests  Class ATE     ATE COV 2 Analysis of coverage   ATE DPT 1 Testing  high level design  ATE FUN 1 Functional testing   ATE IND 2 Independent testing     sample    Components for Vulnerability assessment  Class AVA     AVA MSU 2 Validation of analysis         SOF 1 Strength of TOE security function evaluation         VLA 2 Independent vulnerability analysis    Table 1  Assurance requirements for the TOE     06 02 07 UNCLASSIFIED    48 of 92       BSI DSZ CC 0342
86. ole sends an O Command  to the testframe every 10 seconds   FDP  IFF 1  2   The testframe verifies whether    UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    84 of 92    an O Command was received during the last three minutes  If no O Command was  received  all O Data Class from the L1 Provider will be blocked  FDP_IFF 1  1       FDP IFC 2  3    FDP IFC 2  3  is implemented directly by SF Sec Com Testframe and  SF Sec Com Op  These two security functions ensure that on both sides the  network connection is configured properly  Especially the loopback interface and  appropriate ports are used  Together with SOE SECURE COMMUNICATION  satisfied by the environment requirements FDP_ACC 1 and FDP  ACF 1  the  network interface and the port numbers can be considered as basic authentication     FDP IFF 1  1    The SFR FDP IFF 1  1  is implemented by the security functions that realize  P DECLASSIFICATION POLICY  see FDP IFC 2  1      Furthermore  the SFR is implemented by SF Keep Alive check  If the testframe  did not receive any O Command from the operator console within the last 3  minutes  all messages from the L1 Provider will be blocked     FDP IFF 1  2    The SFR FDP IFF 1  2  is implemented by SF Keep Alive  The operator console  ensures that every 10 seconds an O Command will be sent to the testframe  If no  regular O Command needs to be send  an O Ping will be sent as keep alive  message     FDP        1  3    The SFR FDP IFF 1  3  is implemented by the security
87. on of management functions  included          SMR 1 Security roles  included  environment     5 1 3 4 FMT MSA 3  1  Static attribute initialization    Hierarchical to  No other components     FMT MSA 3 1 The TSF shall enforce the P DECLASSIFICATION POLICY  to provide restrictive default values for security attributes26   e SA Oper Mode   Peace Operational Mode   e SA Security Label   up to and including CLASSIFIED   that are used to enforce the SFP     FMT  MSA 3 2 The TSF shall allow nobody  to specify alternative initial values  to override the default values when an object or information is created     Dependencies  FMT MSA 1  1  Management of security attributes  included   FMT SMR 1 Security roles  not included 28    26 The original text has been changed to accommodate a list of default values     27 The original text was modified to make the sentence grammatically correct after defining  the assignment     28 This dependency is not applied  because the only security role involved is    nobody        UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    43 of 92    5 1 3 5 FMT MSA3  2  Static attribute initialization    Hierarchical to  No other components     FMT MSA 3 1 The TSF shall enforce the P KEEP ALIVE POLICY to provide  restrictive default values for security attributes2    e Maximum time between two     Commands  10 seconds   e Time out threshold 21850 seconds   that are used to enforce the SFP     FMT MSA 3 2 The TSF shall allow nobody  to specify alter
88. onds when no  other O  Command will be sent     This security function implements the first part of the keep alive system of the  TOE  The operator console verifies every 10 seconds whether an O Command was  send to the testframe  If no O Command was sent  an O Ping will be sent in order  to signal the testframe that the operator console is still running     This security function does not generate O Data  Audit     6 1 3 3 SF Keep Alive Check    This function aims at receiving O  Command  including O Ping  from the operator  console and controlling the information flow between the L1 providing System and  LIFOS     This security function implements the second part of the keep alive system of the  TOE   Every time an O Command was received  a timer will be initialised with the  current time  The precision of this timer is at least the second   Every time a frame is received testframe verifies the value of this timer and  compares it with the current system time  J6  e Ifthe difference is lower than 3 minutes  the testframe and especially the  filter part of the testframe work within normal parameters   e If the difference is greater than or equal to 3 minutes  the testframe will be  stopped  recorded by SF StartStop   This result in a complete blocking of       36 Tt should be noted that the TOE  the underlying operating system and the hardware do not  have and do not need real time properties  Therefore  the time frame    10 seconds    is only  an approximate value  The prec
89. onsole has to send an O Ping every 10  seconds to the testframe     SOT NO BYPASS  The TOE shall enforce P DECLASSIFICATION POLICY on all data that passes  through the TOE from a L1 Provider to LIFOS     SOT NO REPROGRAM   Changes to the integrity of the TOE shall be detected at start up of the TOE  This  includes the binary of the TOE as well as SA Oper Mode and O Filter Rule Set   The TOE shall record this event and fail into a secure state     SOT NO RESIDUAL   The TOE shall perform the operation R Disregard to ensure that no O Data Class     O Data_Unclass is available in the main memory of the underlying platform when   e one of the operations R  Verify Outboud  R Sanitize or R CRC  Check has  decided to reject  parts of  this data    e the TOE is stopped     SOT SANITIZE  The TOE shall implement the following policy     e The TOE shall perform the operations R Verify Outbound and R Sanitize on  all O Data_Class transferred from the L1 Provider to LIFOS     e The TOE shall have completed the operation R Sanitize on O Data_Class  before operation R Downgrade is performed     e The TOE shall not change O Data_Unclass after operation R Downgrade is  performed     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    30 of 92    SOT SECURE COMMUNICATION  In order to protect the authenticity  integrity and confidentiality of the  communication between the two parts of the TOE  e The configuration of the two parts of the TOE shall ensure that exactly  these two programs
90. r this function  SA OS MAC Level Admin high  Classified   SA OS Priv Level Unprivileged    SA Security Label of the processed data CLASSIFIED    6 1 2 5 SF Pack    This function shall add a cyclic redundancy check to the sanitized O Data  Class   The added cyclic redundancy check is used to verify after the downgrade the  resulting O Data_Unclass is not altered     The security function SF Pack performs the operation R CRC  Pack on the  sanitized O Data Class  provided by SF Sanitize only    The SF Pack passes the sanitized O Data Class on to the SF Check Sanitization  after the operation R CRC Pack has been performed     This security function does not generate O Data  Audit     Security Attribute Value   SA Oper Mode Not applicable for this function  SA OS MAC Level Admin high  Classified   SA OS Priv Level Unprivileged    SA Security Label of the processed data CLASSIFIED    UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    58 of 92    6 1 2 6 SF Sanitize    This function aims at the sanitization of O Data  Class as mandated by the  O Filter Rule Set appropriate for the current SA Oper  Mode     The security function SF Sanitize performs the R Sanitize operation on the   O Data Class provided by SF Verify Outbound only  The SF Sanitize completely  blocks O Data Class by generating a    sanitized    blank message  also considered as  O Data Class  or the function generates a new sanitized O Data Class with the  data that is not rejected by the operation R Sanitiz
91. rmation System Security Officer of the TOE IT  environment  Only the S ISSO role can create new user  accounts and establish or change security related settings  like contents of the label encoding file  user clearance  limits  etc  At least two on site named persons shall  always be allocated to this role     User role defined by Secure_IT_Platform  This role is the  system administrator of the TOE IT environment   S SysAdmin shall undertake normal UNIX  administration duties such as maintaining user passwords   etc  S SysAdmin is the only role able to modify user  accounts  but cannot create new accounts  No user able to  operate in the S SysAdmin role shall also have the  possibility to operate in the S ISSO or S Audit role  At  least two on site named persons shall always be allocated  to this role     S SysOper  S Audit  S ISSO and S SysAdmin are all authorised to access the IT  environment of the TOE  Authorisation is settled conform to NATO regulations   These persons are characterized as follows     06 02 07    Competent to perform their duties    Able to perform the appropriate security procedures    Have an appropriate screening of at least the site level of accreditation   Are trusted not to abuse his authority    Are trusted not to compromise security measures    Are not considered to be hostile    Are capable of making mistakes  although not intentionally      UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    21 of 92    Security Attributes of Subjects
92. s from O Filter Rule Set  that are applied  e Incase R Downgrade is performed and this operation is successfully  completed  the resulting O Data Unclass   e Incase R Downgrade is performed and this operation is not  successfully completed  a blank message  e In case of operator input  the specific character input by the operator   e In case of operator input  the user ID of the user who started the  operator console    Dependencies         STM 1 Reliable time stamps  included  environment         12 pP was omitted     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    34 of 92    5 1 2 FDP User data protection    51 21 FDP ETC  Export of user data with security attributes    Hierarchical to  No other components     FDP ETC 2 1 The TSF shall enforce the P DECLASSIFICATION POLICY  when exporting user data O Data  Audit and O Data Unclass  controlled under the  SFP s   outside of the TSC     FDP ETC 2 2 The TSF shall export the user data with the user data   s associated  security attributes     FDP ETC 2 3 The TSF shall ensure that the security attributes  when exported  outside the TSC  are unambiguously associated with the exported user data     FDP ETC 2 4 The TSF shall enforce the following rules when user data is  exported from the TSC   e Incase of O Data Audit  o Data is only exported to Secure IT Platform     SA OS MAC Level      Admin high  Classified     o 8        Priv Level      Unprivileged     o SA Security Label      CLASSIFIED     e In case of O Data 
93. s the operator  Other users have    only a supporting role in the environment of the TOE  for example the system  administrator  security officer or auditor     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 16 of 92    2 5 2 1 Commands    The user can only provide the following single keystroke commands from console   keyboard to the operator console    e Operational Mode  The current operational mode is continuously displayed in  the header of the Operator Console window  Mode change is performed by  entering the digit 1  Peace Operational Mode   2  Exercise Operational Mode    3  Crisis Response Operational Mode  or 4  Article 5 Operational Mode   A  time to switch from the current operational mode to another operational mode  must be agreed upon with the receiving party     e Status display  The keystroke    m    or          enables the operator to monitor the  status of the TOE  This includes the current mode of operation  the number of  warnings received since the last mode change  the amount of disk space used  for the auditing record        Audit display  Via the keystroke    r    or    R     the user obtains information on the  Journal files which are currently stored  This means a list of file names and  their sizes will be displayed     e   Stop Restart Filter  The user can stop the transmission of message in case of an  emergency by entering the keystroke    s    or    S    The user can restart the  application manually once the emergency situation is cleared     e
94. se the security target does not contain  a SOF statement nor contains the TOE a probabilistic or permutational function   A vulnerability analysis will be performed  documented and provided for  evaluation     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 68 of 92    7  PP Claims    This Security Target TOE does not claim any conformance to a Protection Profile     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    8     8 1    Rationale    Security Objectives Rationale    69 of 92    For each assumption  threat and OSP it will be demonstrated that it is met by the    security objectives  The tracings are provided in the following table        A E INTER TOE COMMUNICATION    IA E INSIDE   A E NATO SECURITY POLICY  A E OUTSIDE  A E RECORDING   A E TOE ACCESS POLICY  A U ONLY WAY    P DECLASSIFICATION POLICY    P INTER TOE COMMUNICATION    P TOE DATA INPUT              FAIL INSECURE    T BYPASS  T MODE SYNC  T NEGLIGENCE    T TOE REPROGRAM       SOT CONSIDER LOGOUT    x P KEEP ALIVE POLICY      T OPERATOR DOES NOT EXIT       SOT DATA AUDIT     gt        SOT DATA EXPORT     gt x    gt  lt        SOT DOWNGRADE     gt        SOT FAIL_SECURE       SOT FILTER RULE       SOT KEEP ALIVE       SOT NO BYPASS       SOT NO REPROGRAM       SOT NO RESIDUAL       SOT SANITIZE       SOT SECURE COMMUNICATION       SOE AUDIT REVIEW       SOE DATA AUDIT       SOE MODE SYNC       SOE SECURE ENVIRONMENT       SOE SECURE IT PLATFORM       SOE SECURE USAGE       SOE SECURE COMMUNICATION     gt
95. ssigned SFR and these SFR do not conflict each other   c  The justifications in sections 8 2 2 show that each Security Objective for the  environment is met by the assigned SFR and these SFR do not conflict each  other   Therefore  the requirements assigned to one objective will not conflict with   requirements assigned to another objective because   a  the requirements do not affect the same events  operations  data or test  or   b  the requirements are assigned to both security objectives    The security requirements for the IT environment are all derived from the  Secure IT Platform  which is a Common Criteria certified platform  The security  requirements for the IT environment are independent of the other requirements and  are internally consistent  All dependencies are resolved and no conflicting  requirements are included     8 2 8 The requirements are mutually supportive  As stated and explained in chapter 8 2 1 the tracing from SFR to security objectives  is complete and the SFR are suitable to meet the security objectives     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    81 of 92    Chapter 5 1 lists the SFR and their dependencies  All dependencies are resolved   partly by SFR to the environment  respectively the dependency needs not to be  resolved for this TOE    Furthermore  the SFR support each other    a     b     c     d            RVM 1 prevents bypassing of the TOE and therefore bypassing of the  TSP and TSF   FDP IFC 2  1  assures that the TS
96. st of  physical  personnel  organisational and procedural measures     Link 1 ASDE Link1 Forward   Link 1 Fibre   ASOC  Providing Filter System Optic Secure Machine for  System  e g  System Partner  ASDE Buffer  Nations or    other  unclassified    systems  NATO public    information  diodes        gt  Data treated as CLASSIFIED data  Data treated as Unclassified data    Figure 1  ASDE system consisting of a Buffer  Forward Filter and diodes     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    9 of 92    The data to be shared with partner nations will come from the NATO Air  Command and Control Centre  CRC  or another Link 1 provider  and will take the  form of short data messages in Link 1 format that will be transmitted from a CRC  to the designated non NATO air operations centre   Link 1 messages are bit strings  that are generated within many NATO and national IT systems from real time air  asset related data  The messages have a fixed format  which is defined in   STANAG5501   and contain a variety of information of which only a very small  percentage is classified  The majority of the data within Link 1 messages is  unclassified and is suitable for dissemination to persons who do not have clearance   The elements considered classified may never be transmitted beyond the limits of  the protected NATO enclave     The ASDE is located in a CRC or equivalent secure facility and consists of the  following four physically separated parts  see Figure 1     
97. sultation  Command and Control Agency  OSP Organisational Security Policy   P Policy   PfP Partnership for Peace   PN Partner Nation   POM Peace Operational Mode   PP Protection Profile   RAP Recognized Air Picture   SAR Security Assurance Reguirements  SF Security Function   SFP Security Function Policy   SFR Security Functional Requirements  SOE Security Objective for the Environment  SOF Strength of Function   SOT Security Objective for the TOE  SPM Security Policy Model   ST Security Target   T Threat   TOE Target of Evaluation   TSC TSF Scope of Control   TSF TOE Security Functions   TSP TOE Security Policy    06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    UNCLASSIFIED     Appendix  89 of 92    10  Appendix B   References     CC    CEM    MCM140      MILA98      NATO CIS      NATO SP        SRS      STANAGS5501      ST Solaris      Rules     Common Criteria for Information Technology Security  Evaluation  Parts 1  2 and 3  version 2 3   Common Methodology for Information Technology Security  Evaluation  version 2 3   MCM 140 00  N R  MC Concept for the Air Situation Data  Exchange with Partner Nations  13 September 2000    Military Standard     Software Development and Documentation   MIL STD 498  Department of Defence  DoD   USA    5 December 1994   AC 322 D 0030 REV2  Infosec Technical and Implementation  Directive for the interconnection of communications and  information systems  CIS   25 October 2002  NATO  UNCLASSIFIED    Security Within The 
98. t IT systems   Here  the facilities sites respectively the organizations are in mind  not IT systems     SHAPE z Supreme Headquarters Allied Powers Europe     Q   LW ND    If the Link 1 Forward Filter is not working in connection with the ASDE Buffer  it will  not be able to support exchange of Link 1 messages  it merely passes sanitized Link 1  output to a Link 1 recipient     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    10 of 92    o Inbound Integrity Filter  This filter is a software application concerned  with track data sent by non NATO nations from their own system to be  included in the NATO RAP  These messages will be in Link 1 format  The  track data must pass an integrity check to ensure that the NATO RAP is  not corrupted accidentally or maliciously with data of non NATO origin   This filter is optional for inbound messages     Link 1 Fibre Optic Secure System  LIFOS   This part of the ASDE system  consists of information diodes that ensure the flow of serial line data in one  direction only  Using this device  covert backdoor entry to the L1FF via the  serial line used for Link 1 message output is securely denied     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 11 of 92    2 2 Definition of the TOE and its security services    The TOE is the Outbound Downgrade Filter of ASDE Link 1  Forward Filter version 1 5     The TOE consists of two software applications  The testframe part is the actual       filter  The operator console is the interface to t
99. t Mode     gt  SF StartStop     gt  SF Test     gt  SF Verify_Outbound       FDP_ETC 2     gt      gt    gt  SF Operator Input       FDP_IFC 2  1      gt x   gt    gt                               gt      gt      gt      gt      gt      gt        FDP_IFC 2  2      gt        FDP_IFC 2  3           FDP_IFF 1  2              FDP_IFF 1  1     2         FDP IFF 1  3           FDP ITC 2  FDP RIP 1       FMT  MSA 1  1              MSA 1  2       FMT  MSA 1  3              MSA 3  1       t  E de bk    FMT_MSA 3  2                                  MSA 3  3       FMT_SMF 1       FPT_AMT 1       FPT_FLS 1  1        FPT_FLS 1  2        FPT_ITT 1              RVM 1       FPT TDC 1       FPT TST 1       FRU FLT 1          FTP ITC 1                                                          Table 5  SFR to TSF     UNCLASSIFIED    BSI DSZ CC 0342       ST Public doc    06 02 07    83 of 92           GEN   FAU_GEN 1 is implemented by SF Check Integrity   SF Check Sanitization   SF Consider Logout  SF Downgrade  SF Keep Alive check  SF Operator Input   SF Sanitize  SF Set Mode  SF StartStop  SF Test and SF Verify Outbound by  generating O Data  Audit   e SF Check Integrity performs R CRC Check and records this   e SF Check Sanitization performs R Sanitize and records the respective  result   e SF Consider Logout recognises the unintentional stop of the operator  console and generates respective audit information   e SF Downgrade performs R Downgrade and records this   e SF Keep Alive check recor
100. tered  The journal file handling is not  affected by end of the operator console     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    17 of 92    Additionally  the operator may enter    Y    or    N    as valid command during start up  of testframe or the operator console in order to approve the CRC checksum of the  respective part of the TOE    Beside that  the operator may enter any other input but this will not affect the  operator console or the testframe application     2 5 2 2   Response to warnings    A warning informs the operator of an unexpected situation  Generally  a user  response is not required  In case of a warning the operator has to respond in line  with standing operating procedures  This varies between    do nothing    and    switch  off the Link 1 Forward Filter or the Link 1 Providing System      2 5 3 Operator Console   Testframe part of the TOE   From a logical point of view  this is a TOE internal interface  Physically  two  separate applications talk together using a defined protocol and a defined  communication media    The communication media is a network interface  Due to the fact that a remote  administration of the filter software is not allowed and must not be able  this is  always the loopback interface provided by the operating system    The communication protocol is proprietary to the TOE    This means  both external interfaces are pure software interfaces    The testframe part of the TOE receives commands and keep alive
101. ther input  record content  states unsuccessful    self tests   Security Attribute Value  SA Oper Mode Not applicable for this function  SA OS MAC Level Admin high  Classified  SA OS Priv Level Unprivileged    SA Security Label of the processed data CLASSIFIED    06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    61 of 92    6 1 2 10  SF Verify Outbound    This function aims at verification of syntactical  STANAG5501   compliance of the  O Data Class received from the L1 Provider     The security function SF Verify Outbound performs the operation   R Verify Outbound on the O Data Class provided by the L1 Provider only    This operation confirms or denies the verification performed on O Data  Class    e When the verification is confirmed O Data Class is passed on to SF Sanitize   e When the verification is denied O Data Class is passed on to SF Disregard     After the operation R  Verify_Outbound SF Verify_Outbound generates  O Data_Audit  Date  Time  the rule numbers applied and the frame content   including the sequence number  after the sanitization will be recorded     Security Attribute Value   SA Oper_Mode Not applicable for this function  SA OS_MAC Level Admin high  Classified  SA OS_Priv_Level Unprivileged    SA Security Label of the processed data CLASSIFIED  6 1 3 Supporting Security Functions regarding the Operator Console      Testframe communication    All these security functions do have the same security attribute values  Therefore   the respe
102. ty Functions regarding the Operator Console     Testframe  communication are    SF Consider Logout   SF Operator Input   SF Keep Alive   SF Sec  Com Op   SF Sec Com Testframe   SF Keep Alive Check    These functions are described below    Along with the function description the security attributes are indicated  A number  of the functions shall be performed sequentially and the sub sequential function is  mentioned in the function description     For some security functions the security attribute SA Security Label defines the  classification of the processed data and the process itself  The TOE shall be able to  work in a CLASSIFIED environment  Therefore  the security attribute has the  value CLASSIFIED for the appropriate security functions     UNCLASSIFIED BSI DSZ CC 0342    ST Public doc 51 of 92    The actual function of the TOE will not be affected by the value of this security  attribute because this security attribute is part of  or considered by  the underlying  operating system only     In Figure 3 an overview of the intended solution is provided  This picture shows  especially the security functions responsible for the communication between  operator console and testframe     Figure 4 shows the security functions of the actual filter part of the TOE in detail     All security functions relevant for the communication only are not included in this  picture     Trusted Operating System    SF Consider Logout    SF Operator Input    SF Keep alive    SF Sec Com Op    SF 
103. viding System to the TOE  In the  TOE these data are processed and recorded  After the processing these data become  NATO UNCLASSIFIED PN RELEASABLE  The O Data Class are only  available on the interface with the Link 1 Providing System  within the TOE or  from the recording  Audit Trail     A TA Unclass  Receiver is able to read O Data Class either immediately  or in  some point in the future  because TA Erroneous User has logically or physically  bypassed the protection functions of the TOE  This may be possible due to errors in  or an erroneous configuration of the underlying operating system or failures of the  physical access controls to the hardware  This threat may occur at each time a  TA Erroneous User has logical or physical access to the hardware  operating  system or the TOE or when an already existing bug within the operating system  becomes effect     06 02 07 UNCLASSIFIED BSI DSZ CC 0342    ST Public doc    06 02 07    27 of 92    T MODE SYNC   A TA Unclass  Receiver is able to read O Data Class because TA Erroneous User  has not synchronized SA Oper Mode of the TOE with SA Oper Mode of the L1   Provider  This threat occurs when TA Erroneous User does not perform a required  change of SA Oper Mode  Due to the fact that TA Erroneous User is allowed to  change SA Oper Mode  only communication problems with the other L1 Provider  or human failure could be the reason     T NEGLIGENCE   A TA  Erroneous  User makes a mistake  for instance inserting a wrong operationa
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
Manual de instrucciones Temperaturregler Regulador de  User`s Manual    HDR-1000S - Richer Sounds  Progetto Elettrico  Java CoG Kit 2.0 Manual, pre-alpha  Pelton Crane Delta XL Sterilizer    Copyright © All rights reserved. 
   Failed to retrieve file