Home

Security Target - Common Criteria

image

Contents

1. 8 3 2 The dependency of TOE assurance requirements The dependency of TOE assurance requirements is satisfied with the CC therefore in this section that was omitted Table 8 8 depicts the dependency of assurance requirements to EAL 3 added The ST is satisfied with the dependency of all assurance requirements Table 8 8 The dependencies of the additional assurance components Assurance components Dependencies Reference No ADV IMP 2 ADV LLD 1 ADV RCR I TAT 1 ADV LLD 1 ADV HLD 2 ADV RCR I TAT 1 ADV IMP 1 ATE DPT 2 ADV HLD 2 ADV LLD 1 ATE FUN 1 AVA VLA 2 ADV FSP 1 ADV HLD 2 ADV IMP 1 ADV LLD 1 AGD ADM I AGD USR 1 TSonNer seas REDOWL SecuOS V4 0 for RHEL4 ST 83 pug 8 4 TOE Summary Specification Rationale This section in conjunction with Section 6 the TOE Summary Specification provides evidence that the security functions are suitable to meet the TOE security requirements and the assurance measures address the assurance measures The collection of assurance measures work together to address all of the security assurance requirements as indicated in Table 8 9 The collection of security functions work together to provide all of the security requirements as indicated in Table 8 10 Table 8 11 depicts the rationale of TS
2. 64 6 2 TOE Security Assurance 65 6 3 Strength of Security 1 1 eme nennen nne 66 7 PROTECTION PROFILE CLAIMS 2 10 0 0 000000000000000 ener nen n nnne nennt 67 7 1 Protection Profile Reference reete etri 67 7 2 Protection Profile 5 nemen 67 7 3 Protection Profile 70 BRATIONAIE 71 8 1 Security Objectives 71 8 1 1 The rationale of security objectives for T3 8 1 2 The rationale of security objectives for 74 8 1 3 The rationale of security objectives for security 75 8 2 Security Requirements Rationale 76 8 2 1 TOE security function requirements rationale 76 8 2 2 TOE assurance requirements rationale 0 0000 e 79 8 2 8 IT environment requirements 6 0 00 0 0 02000272222 80 8 3 Dependency rationale gt 81 8 3 1 The dependency of TOE security requirements 81 8 3 2 The d
3. T Disguise amp bypassing T Rest information TE Infirmity of management TE Distribution amp installation P Audit Record P Allowance of Security labels P Identification amp Authentication P Secure management P Cryptographic P DAC PA SSL certificate management TSonNer Trusted Systems on the Net REDOWL SecuOS V4 0 for RHEL4 ST N i 8 1 1 The rationale of security objectives for threats Table 8 2 The rationale of security objectives for threats Threats Security Objectives Rationale T Deficient coded Inspection of Deficient coded This security objectives inspects that the TOE has been some deficient codes and those codes reflexes to the each subsystems of TOE T Recording failure O Audit Record The TOE provides the functions of storing and searching security events and alternative actions when the function is failed T Data violation Data protection Identification and authentication Self protection of functions The TOE shall protect the TSF data being stored in TOE from the unauthorized accesses or users and provide the self protection against to threats T Authentication attempts by unauthorized Identification and authentication The TOE shall control the unauthorized accesses and use the process of
4. 33 SSMO ice RTL 35 5 1 7 Trusted Path Channels emm eem nee 35 5 2 TOE Security Assurance 0 1 36 5 21 Configuration 27 5 2 22 Delivery ANG ecco oo stro ter Ir EE tbt o DRE e 38 5 2 9 38 5 2 4 Guldarice doculTIelils 41 5 2 Ze 42 REDOWL SecuOS V4 0 for RHEL4 ST 5 EE 43 44 5 3 IT Security Requirements to eee 47 6 TOE SUMMARY SPECIFICATION 2 2 0 000000 000000000000000 ener nene nn einen 48 Rss ed gae 48 mE 49 62125 User Dala PIOIGCHODIS dece IG 52 6 1 3 Identification and Authentication sess 55 6 1 4 Security 02 0002 00 0 000000 0000 000010000 nnne nnns 58 6 155 Protecllon OF TNE eiae die nube cals uve tengan tta eiat eeu eT ed 62 5 1 6 TO ACO Pe 64 6 1 7 Trusted Path Channels
5. 2 2 2 4 0 00 0 00 020 2 2 12576165840 REESE 2 2 8 ZO 8 2 2 OE o Santee tb opi Per Dee 8 2 3 TOE Environment and eene e hehe se eren ene 8 3 TOE SECURITY 2 02 eere nene 14 OA ASSUMIU S 14 2 2 a ve iei ence EMEN 15 3 3 Security policy of the 201 meme 16 4 SECURITY OBJECTIVES 17 4 Security objective OT OE ie 17 4 2 Security objectives to TOE 2 0 HH meme 18 5 IT SECURITY REQUIREMENTS 2 eme he hene hee eene rhe eren ee enne 19 5 1 TOE Security Function Requirements 1 1 19 SUN MESI TUE LUI 20 5 2 USEF Data 25 5 1 3 Identification sus esie rette RI Re 28 5 1 4 Security a rre nennen nena 30 54155 Protection Of the
6. Security Audit User Data Protection Identification And Authentication Security Management Security alarms Audit data generation User identity association Potential violation analysis Audit review Restricted audit review Selectable audit review Selective audit Protected audit trail storage Action in case of possible audit data loss FDP 1 FDP_ACF 1 Prevention of audit data loss Subset access control Security attribute based access control FDP_IFC 1 Subset information flow control FDP_IFF 2 Hierarchical security attributes FDP ITC 1 Import of user data without security attributes FDP FIA_AFL 1 Subset residual information protection Authentication failure handling FIA _ATD 1 User attribute definition FIA_SOS 1 Verification of secrets FIA_UAU 1 Timing of authentication FIA UAUA Single use authentication mechanisms Protection authentication feedback User identification before any action User subject binding Management of security functions behavior Management of security attributes Static attribute initialization Management of TSF data Revocation Security roles Specification of management functions TSonNer REDOWL SecuO
7. based on security attributes that explicitly deny access off subjects to objects Dependencies FDP ACC 1 Subset access control FMT_MSA 3 Static attribute initialization FDP_IFC 1 Subset information flow control Hierarchical to No other components IFC 1 1 The TSF shall enforce the Mandatory Access Control subjects processes files directories and subjects to subjects subjects to objects user and file user and directory process and file process and directory operation handling by security policies Dependencies FDP IFF 1 Simple security attributes FDP IFF 2 Hierarchical security attributes Hierarchical to FDP IFF 1 _ 2 1 The TSF shall enforce Mandatory Access Control policy based on the types of subjects security attributes and objects security attributes like the followings subject s security label b object s security label the coverage of clearance and category label mixed the clearance is consisted from 0 to 15 the category is consisted of the 6 of numeric from 1 to 9 and English alphabet from A FDP IFF 2 2 The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules based on the ordering relationships between security attributes hold 3 ifthe subject s label is higher than or same the object s the subject can re
8. security attributes that are used to enforce MAC Policy FMT 5 3 2 The TSF shall allow the authorized user to specify alternative initial values to override the default values when an object or information is created Dependencies FMT MSA 1 Management of security attributes FMT SMR 1 Security roles FMT MTD 1 1 Management of TSF data Hierarchical to No other components TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 32 pum FMT MTD 1 1 The TSF shall restrict the ability to change defualt query delete clear the audit data to the authorized user Dependencies FMT SMR 1 Security roles FMT SMF 1 Specification of management functions FMT MTD 1 2 Management of TSF data Hierarchical to No other components _ 1 The TSF shall restrict the ability to delete initiate the identification and authentication data to the authorized user Dependencies FMT SMR 1 Security roles FMT SMF 1 Specification of management functions FMT MTD 1 3 Management of TSF data Hierarchical to No other components FMT MTD 1 1 The TSF shall restrict the ability to change authentication data the authorized user and the granted user who changes the authentication data by himself Dependencies FMT SMR 1 Security roles FMT SMF 1 Specification of management functions FMT MTD 1 4 Management of TSF data Hierarchical to No other compone
9. OS user password management SM 3 TSF Data management TSF data management is divided into backup restoration of security attributes user management security password management and file security information management Backup and restoration of security attributes is to store security information of certain directories of an agent server and to restore security information to the agent server This function can be operated only by the console management as follows Store a certain directory s security information of an agent server to the integrated management server Restore the back up file of security attributes User management is to inquire or configure the general information or security attributes assigned to an user The information handled by this function is user ID username the highest clearance the lowest category the default clearance category the date of security attribute generated the password information This function can be operated by the security administrator and the integrated management and following three types of CUI based commands are provided Inquire user information registered to a remote or local server Inquire every users information registered to agent servers which are managed by the integrated management server TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 62 Sa Add modify delete users security attributes to agent servers through the integrated
10. STM1 The TOE gets trusted time stamps from OS based on time information established by the security administrator The TOE shall provide trusted channel by revoking SSL protocol FTP ITC 1 supported by IT TSonNer tems on the Net as REDOWL SecuOS V4 0 for RHEL4 ST 71 pu 8 RATIONALE This section describes the security requirements rationale satisfied with security objectives based on security environment threats assumptions organization policies The rationale shows TOE provides efficient IT security response in TOE security environment 8 1 Security Objectives Rationale Security objectives rationale shows that meets the specific security objectives does not excess them Security objectives rationale proofs the followings Each assumption threat organization policy is handled by at least one security objective Each security objective is handled by at least one assumption threat and organization policy Table 8 1 depicts security environment to security objective mappings Table 8 2 depicts the rationale of security objectives for threats TSonNer res REDOWL SecuOS V4 0 for RHEL4 ST 72 pum Table 8 1 Security objectives to security environment mappings A Physical security A Trusted administrator A Hardened OS AA SSL certificate of TOE AA TIME T Deficient coded T Recording failure T Data violation T Authentication attempts by unauthorized
11. Security Audit Protection of user data Identification and authentication J l Audit record generating FAU_GEN 1 FAU_GEN 2 J 2 Audit record inquiry SAA Il FAU SAR I FAU SAR2 FAU SAR 3 FAU SEL 1 J 3 Audit record protection FAU_ARP 1 FAU_STG 1 FAU_STG 3 576 4 AU A Limitation of audit investigation privilege FAU SAR2 AU 5 Analysis of potential violations MAC Mandatory Access Control FAU ARP l SAA 1 FAU_SAR 2 FAU_STG 1 FDP_IFC 1 FDP_IFF 2 FDP_ITC 1 FIA_USB 1 FMT_MSA 1 2 FMT_MSA 3 2 FMT 1 1 FMT REV 1 2 DAC Discretionary Access Control FAU_SAR 2 FAU_STG 1 FDP_ACC 1 FDP_ACF 1 FIA_USB 1 FMT_MSA 1 1 F MT_MSA 3 1 FMT_REV 1 1 FMT_REV 1 2 ACL Access Control List FAU_SAR 2 FAU_STG 1 FDP_ACC 1 FDP_ACF 1 FIA_USB 1 FMT_MSA 1 1 F MT_MSA 3 1 FMT_REV 1 1 FMT_REV 1 2 RDP Residual Data Protection IA l Authentication failure disposal FDP FIA AFL 1 IA 2 Definition of user identity FIA_ATD 1 USB 1 IA 3 Verification of confidential information IA A Identification and authentication FIA SOS 1 FIA UAU FIA UAUA UID 2 5 1 IA 5 Authentication feedback protection FIA UAU 7 TSonNer REDOWL SecuOS V4 0 for RHEL4 ST Class of security function Security functions Requirements for security functions
12. configuration list shall describe the configuration items that comprise the TOE CAP 3 6C CM documentation shall describe the method used to uniquely identify the configuration items that comprise the TOE CAP 3 7C CM system shall uniquely identify all configuration items that comprise the TOE CAP 3 8C plan shall describe how the CM system is used CAP 3 9C evidence shall demonstrate that the CM system 15 operating in accordance with the CM plan CAP 3 10C The CM documentation shall provide evidence that all configuration items have been and are being effectively maintained under the CM system ACM CAP 3 11C The CM system shall provide measures such that only authorized changes are made to the configuration items SCP 1 TOE CM coverage Dependencies ACM_CAP 3 Authorization controls Developer action elements ACM_SCP 1 1D The developer shall provide a list of configuration items for the TOE Evidence elements ACM_SCP 1 1C The list of configuration items shall include the following implementation TSonNer Sy REDOWL SecuOS V4 0 for RHEL4 ST 38 pul representation and the evaluation evidence required by the assurance components in the ST 9 2 2 Delivery and operation ADO_DEL 1 Delivery procedures Dependencies No dependencies Developer action elements ADO_DEL 1 1D developer
13. TSonNer REDOWL SecuOS V4 0 for RHEL4 ST FDP ACC 1 jou 911996 FIA_AFL 1 Table 8 11 The rationale of TSS AU 1 Audit record generating FAU GEN 2 AU 1 identifies the various audit events from TOE and performs the important work that associated the user making audit events with the audit events AU 2 Audit record inquiry FAU 1 SAR 1 FAU SAR 2 FAU 5 3 FAU SEL AU 2 provides the security function that the authorized user only searches and sorts the audit data collected AU 3 Audit record protection FAU_ARP 1 FAU_STG 1 FAU_STG 3 FAU_STG 4 The audit data generated and collected shall be protected from unauthorized removal and the TOE shall protect the audit data before the storage is full and sends email to the authorized user AU 4 Limitation of audit investigation privilege FAU SAR2 The audit data shall be permitted to the authorized user AU 5 Analysis of potential violations _ARP 1 FAU SAA I The TSF shall analysis the potential violations through mixing various rules when inspects violations and then report the violations to the authorized user MAC Mandatory Access Control FAU_SAR 2 FAU_STG 1 FDP_IFC 1 FDP_IFF 2 FDP_ITC 1 FIA_USB 1 FMT_MSA 1 2 FMT_MSA 3 2 FMT_REV 1 1 2 The
14. ATE 2 1 The developer shall provide an analysis of the test coverage Evidence elements ATE COV 2 1C The analysis of the test coverage shall demonstrate the correspondence between the tests identified in the test documentation and the TSF as described in the functional specification ATE 2 2 The analysis of the test coverage shall demonstrate that the correspondence between the TSF as described in the functional specification and the tests identified in the test documentation is complete ATE DPT 2 Testing low level design Dependencies ADV HLD 2 Security enforcing high level design ADV LLD 1 Descriptive low level design ATE FUN 1 Functional testing Developer action elements ATE DPT 2 1D The developer shall provide the analysis of the depth of testing Evidence elements ATE DPT 2 1C The depth analysis shall demonstrate that the tests identified in the test documentation are sufficient to demonstrate that the TSF operates in accordance with its high level design and low level design TSonNer REDOWL SecuOS V4 0 for RHEL4 ST A ATE FUN 1 Functional testing iDependencies No dependencies Developer action elements ATE FUN 1 1D The developer shall test the TSF and document the results ATE FUN 1 2D The developer shall provide test documentation Evidence elements ATE FUN 1 1C The test documentation shall consist of test plans t
15. Abstract machine testing is to confirm the performance of Abstract machine which is supposed to perform Mandatory Access Control of REDOWL SecuOS and executed aperiodically as follows by the security administrator s requests Execute the command to confirm the status of the Abstract machine of security kernel aperiodically by the security administrator s console management After the transmission of metaphysical test command the security kernel output the configuring status of security policies which is setup on the memory s connecting list Thesecurity kernel output an ASCII text file of the test result TSonNer ay REDOWL SecuOS V4 0 for RHEL4 ST 63 pul W PT 2 Impossibility of TSP bypassing Impossibility of TSP bypassing is divided into three functions Three functions are Agent server Management User management and Security Policy Management The security policies can be configured compulsorily to users by these three functions Agent server management is to register or inquire the information of agent servers which are managed by the integrated management server The information includes the IP address of agent server DNS name the OS version the performance status of REDOWL SecuOS This function can be operated by the authorized security administrator and the integrated management and following 3 CUI based commands are provided for this function CUI based command that inquire information of a server of onesel
16. Audit Trail An audit trail or audit log is a chronological sequence of audit records each of which TSonNer rac REDOWL SecuOS V4 0 for RHEL4 ST 7 gum contains evidence directly pertaining to and resulting from the execution of a business process or system function Audit records typically result from activities such as transactions or communications by individual people systems accounts or other entities The Webopedia defines an audit trail as a record showing who has accessed a computer system and what operations he or she has performed during a given period of time TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 2 TOE DESCRIPTION 2 1 TOE Overview This TOE 15 a secure OS solution Without any loss of response time performance and compatibility it provides information security at OS platform level which are usually presented by security applications This TOE is a security product which performs Mandatory Access Control Multi Level Security by labeling policy Access Control audit tracing detections of hacking and integrated security managements 2 2 TOE Introduction This TOE 1 a secure OS which was developed by integrating security functions to the existing OS kernel to protect system from various hacking attacks due to the OS vulnerabilities For the efficient usage of this TOE it is able to install many agent TOE to many systems and manage those agent servers by one integrated enterprise server For more c
17. Security labels Reference O Identification and Authentication Reference O DAC Reference O Self protection of Functions O Removal of the rest Information Reference Reference Security objectives to TOE environment OE Physical security Reference OE Trusted administrator Reference OE Secure management Reference OE Hardened OS Reference SSL protocol Add TIME Add TSonNer REDOWL SecuOS V4 0 for RHEL4 ST ay 69 z Classification Components Status IT Security Security audit FAU_ARP 1 Refinement Functional FAU_GEN 1 Refinement Requirements FAU_GEN 2 Reference FAU SAA 1 Refinement FAU SAR 1 Reference FAU SAR 2 Reference FAU SAR 3 Refinement FAU SEL 1 Refinement FAU STG 1 Reference FAU STG3 Refinement FAU_STG4 Refinement User data protection FDP ACC 1 Refinement FDP 1 Refinement FDP IFC 1 Refinement FDP IFF 2 Refinement FDP_ITC 1 Refinement FDP_RIP 1 Refinement Identification FIA_AFL 1 Refinement and FIA_ATD 1 Refinement Authentication FIA SOS 1 Refinement UAU Refinement UAU A Refinement UAU 7 Refinement FIA DID 2 Reference FIA USB 1 Reference Security management FMT MOF 1 Refinement FMT MSA I 1 Refinem
18. i ADV_FSP 1 Informal functional specification AGD ADM 1 Administrator guidance AGD USR 1 User guidance Developer action elements MSU 1 1D The developer shall provide guidance documentation Evidence elements MSU 1 1C The guidance documentation shall identify all possible modes of operation of the TOE including operation following failure or operational error their consequences and implications for maintaining secure operation MSU 1 2C The guidance documentation shall be complete clear consistent and reasonable AVA MSU 1 3C The guidance documentation shall list all assumptions about the intended environment AVA MSU 1 4C The guidance documentation shall list all requirements for external security measures including external procedural physical and personnel controls SOF 1 Strength of TOE security function evaluation Dependencies ADV_FSP 1 Informal functional specification ADV_HLD 1 Descriptive high level design Developer action elements AVA_SOF 1 1D The developer shall perform a strength of TOE security function analysis for each mechanism identified in the ST as having a strength of TOE security function claim Evidence elements SOF 1 1C For each mechanism with a strength of TOE security function claim the strength of TOE security function analysis shall show that it meets or exceeds the minimum strength level define
19. management server Security password management is to add or modify security passwords of the security administrator or users of REDOWL SecuOS system for REDOWL SecuOS security authentication This function can be operated by the security administrator and security users and the console management provides following CUI based commands for this function Security users and the security administrator modify the security password of oneself Add or modify the security password of an user registered to an agent server through the integrated management server File security information management is to inquire or configure the general information and the security attributes of a file or directory This function can be operated by the security administrator a user and the integrated management And one can inquire or configure files or directories of an agent in accordance with the parameter input The console management provide following CUI based commands for this function Inquire the general information and the security attributes of files of a designated agent server Add modify delete clearance and category of a certain file or directory in a designated agent server 6 15 Protection of the TSF TSF protection is divided into 4 security functions 4 security functions are PT l Abstract machine testing PT 2 Impossibility of TSP bypassing PT 3 TSF testing and PT 4 TSF protection PT l Abstract machine testing
20. 2 RedHat 3 RedHat 4 Middle or Large scale Network Figure 2 1 Installation and operational environment of TOE TOE is divided to REDOWL Enterprise Enterprise in the following server REDOWL Agent Agent in the following server and REDOWL Manager Manager in the following Each system needs different systematic environments Enterprise servers integrate Agent servers and presents console based user interface Manager presents Windows based graphical user interface GUI which enables to manage Enterprise servers remotely TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 10 Table 2 1 System Installation Environment Division REDOWL Enterprise REDOWLAgent REDOWL Manager Operation werd 26 RHEL4 Kernel 2 6 ee eee er System Professional SP4 CPU Intel Xeon64 Nocona Intel Xeon64 Nocona Pentium III AMD64 Opteron AMD64 Opteron More than 500MHz IA64 IA64 Memory More than 2Gbytes More than 512Mbyte 256Mbyte Hard Disk More than 36Gbyte More than 18Gbyte More than 10Gbyte NIC 10 100base Ethernet card 10 100base Ethernet card 10 100base Ethernet card Enterprise servers are running on RHEL4 loadable platforms and need at least 2Gbytes of RAM and 36Gbytes of hard disk space for the operation In the partitions of a hard disk usr partition needs to be larger than 100Mbytes and var partition needs to be larger than 10Mbytes In some cases specif
21. ADV LLD 1 4C The low level design shall describe the purpose of each module ADV LLD 1 5C The low level design shall define the interrelationships between the modules in terms of provided security functionality and dependencies on other modules ADV LLD 1 6C The low level design shall describe how each TSP enforcing function is provided ADV LLD 1 7C The low level design shall identify all interfaces to the modules of the TSF ADV LLD 1 8C The low level design shall identify which of the interfaces to the modules of the TSF are externally visible ADV LLD 1 9C The low level design shall describe the purpose and method of use of all interfaces to the modules of the TSF providing details of effects exceptions and error messages as appropriate ADV LLD 1 10C The low level design shall describe the separation of the TOE into TSP enforcing and other modules ADV RCR 1 Informal correspondence demonstration iDependencies No dependencies Developer action elements TSonNer remm REDOWL SecuOS V4 0 for RHEL4 ST 41 pu ADV RCRI ID The developer shall provide an analysis of correspondence between all adjacent pairs of TSF representations that are provided Evidence elements ADV 1 1 For each adjacent pair of provided TSF representations the analysis shall demonstrate that all relevant security functionality of the more abstract TSF representation is correctly and completely refined in the less abstract TSF
22. USB 1 2 The TSF shall enforce the following rules on the initial association of user security attributes with subjects acting on the behalf of users the user identification the group identification belonging user security label access coverage limited as user s security label Dependencies ATD 1 User attribute definition USB 1 3 The TSF shall enforce the following rules governing changes to the user security attributes associated with subjects acting on the behalf of users changing order by the user identification the group identification belonging user user s security label Dependencies ATD 1 User attribute definition 9 1 4 Security Management FMT MOF 1 Management of security functions behavior Hierarchical to No other components FMT 1 1 The TSF shall restrict the ability to determine the behavior of disable enable enable modify the behavior of all security function to the authorized identified roles Dependencies FMT SMR 1 Security roles FMT SMF 1 Specification of management functions FMT MSA 1 1 Management of security attributes DAC Discretionary Access Control Hierarchical to No other components TSonNer Sse REDOWL SecuOS V4 0 for RHEL4 ST 31 prm MSA 1 The TSF shall enforce the DAC Policy to restrict the ability to change default query modify the security attributes of DAC associated with objects to t
23. cc dd i process ID number Intrusion detection by setuid program Intrusion detection by setgid program External intrusion detection by daemon Login time User ID being input Shell program execution detection Present process name Parents process name The original process parents name of process File type root directory present directory security level present security category security category present message type message IP address Serviced port number Same data counts Dependencies FAU_GEN 1 Audit data generation FAU_STG 1 FMT MTD 1 Management of TSF data Protected audit trail storage Hierarchical to No other components FAU STG 1 1 The TSF shall protect the stored audit records from unauthorized deletion FAU 5 6 1 2 The TSF shall be able to prevent modifications to the audit records Dependencies FAU_GEN 1 Audit data generation FAU STG 3 Action in Case of Possible audit data loss Hierarchical to No other components FAU STG 3 1 The TSF shall take sending email to authorized user and writing the information as records stopping whole of TOE functions if audit trail exceeds the limitation by authorized user 80 90 99 of storage Dependencies FAU_STG 1 Protected audit trail storage FAU STG 4 Prevention of audit data loss TSonNer Ee REDOWL SecuOS V4 0 for RHEL4 ST 25 pum Hierarchical to FAU_STG 3 FAU STG 4 1 The TSF shall ig
24. failed security code input Session management is to monitor the number of sessions which each user can access at the same time and determine whether or not of login to the system succeeded This functions operates as follows Collect the information which an external user uses such as service name user ID client s IP address Investigate 1f the number of sessions which security administrator configure exceeds Loginifthe number of sessions at the same time exceeds Authentication success function 1 to handle the success process lastly after a login session satisfies authentication account management and session management This function operates as follows Record audit log of login success Record audit log of user login time 5 Authentication feedback protection This TOE provides password input window and clearance input window when authentication performs for protecting authentication feedback When a user input password print out an error message automatically and record the event if the specified number of failures occur User management and password management function 1 used to protect authentication feedback User management function is to inquire or configure general information assigned to users and security attributes The information managed in this function are user ID username the highest clearance the lowest clearance default clearance category the date of security attribute
25. file format Statistics of audit data function can be only operated by security administrator Statistics of audit data function is to print out statistics data of audit records collected from the whole Agent server by server by process by user or by message Security administrator can choose the output cycle of statistics data from once a day a week or a month Statistics output graph is can be stored as a figurative file W Analysis of potential violations Analysis of potential violations is related to analysis of audit log audit log statistics and intrusion alarm function Audit data analysis function is to investigate the existence of hacking attacks internally or externally by process by user and conditional search is also practicable Security administrator can modify the field information of audit data to print out And security data can also be converted to MS Office s Excel file format Statistics of audit data function is to print out statistics data of audit records collected from the whole Agent server by server by process by user or by message Security administrator can TSonNer ae REDOWL SecuOS V4 0 for RHEL4 ST 52 pr choose the output cycle of statistics data from once a day a week or a month Statistics output graph is can be stored as a figurative file Intrusion alarm function 15 to alert when audit data related to an intrusion generates Security administrator can enable or disable the alarm
26. function using integrated management 6 1 2 User Data Protection There are 4 security functions for user data protection 3 of them are MAC Mandatory Access Control ACL Access Control List and RDP Residual Data Protection MAC Mandatory Access Control Mandatory Access Control provides mandatory controls over accesses in accordance with security labels configured to subjects and objects Mandatory access control provides a multi level access control using mathematically verified BLP model It operates as follows to perform Mandatory Access Control functions When users access to the system from local console or remote hosts a security level is set up to the user through security password authentication by security administrator as well as the existing authentication of ID and password By hooking every system calls which user processes call out in security kernel it access controls user processes attempts to access files For Discretionary Access Controls identities of subjects and objects are investigated and access denied in case of no access privilege When an access permitted through DAC investigate if the user s process has a privilege In case of a privilege assigned by security administrator the access to file is approved If not a privileged process investigate if the files security clearance is 0 If clearance is 0 permit the access to the file If clearance is
27. generated and password information With password management function general users of OS system security administrators of REDOWL SecuOS system can change or modify their password When a user intends to change the security password gt At client module of console management deny execution of password modifying if the user who executes password modifying command has no executive privilege gt command executed at console management is investigated for the efficiency of its parameter and an error message is printed out if there is no ID input TSonNer ss REDOWL SecuOS V4 0 for RHEL4 ST 58 pu gt Ifa valid command and parameter is input the command is transmitted to server module of console management After the command is transmitted to server module the previous password and a new password are input If passwords are input correctly after calculation using SHA 1 hash algorism the result 1s stored to the security password storing data of REDOWL SecuOS system as ASCII format 6 1 4 Security Management Security management is divided to 3 security functions 3 security functions are SM 1 security functions management SM 2 security attributes management and SM 3 TSF data management SM l Security functions management Security functions management is divided into agent server management system user inquiry remote command execution and text file inquiry Agent server management function is to regis
28. management For TSonNer aes REDOWL SecuOS V4 0 for RHEL4 ST 59 pull this function console management provide following console based command After executing a remote command from an agent server which is designated by a parameter get a returned result Text file inquiry function 1 to read in contents of text files placed in designated agent servers By this function reading in the whole text file parts of the text file or the lines of specific pattern 15 available This function can be only operated by security administrator and integrated management and provides six CUI based commands as follows Reading in the whole text file placed in a designated agent server Reading in only specific lines of a text file placed in a agent server Reading in lines of a text file which is consistent with the pattern suggested by parameter placed in a agent server Reading in the whole text file by connecting to the agent servers which are registered to the integrated management server Reading in only specific lines of a text file by connecting to the agent servers which are registered to the integrated management server Reading in lines of a text file which are consistent with the pattern suggested by parameter by connecting to the agent servers which are registered to the integrated management server SM 2 attributes management Security attributes management is divided into user privilege management s
29. not 0 compare the category of file with the subject To compare the security level of process with file compare the security level clearance category information set in information table of user process with the security level clearance category information set in file s i node TSonNer ay REDOWL SecuOS V4 0 for RHEL4 ST 53 Sa gt Ifthe security levels of both subject and object are equal the subject can read write to the object gt If the security level of subject is higher than the object s the object can read the object gt Ifthe security level of subject is lower than the object s the access of subject to the object is denied All security events related to the operations of Mandatory Access Control are recorded to audit data and stored as a file at console management Security administrator can assign a clearance from 1 to 15 Clearance 1 is higher than clearance 15 Security administrator can assign a category from 1 to 15 Category 1 15 higher than category 15 Category can be assigned in compliance with the hierarchical structure of quarters Higher quarters are supposed to have higher clearance than lower quarters higher category involves lower category Namely access availability 1s decided by the hierarchical relations of clearances and the inclusive relations of categories DAC Discretionary Access Control Discretionary Access Control is performed using access c
30. on the user s security label and assures that information or users get proper security labels or remove them according to the security policy and process of organization P Identification and authentication O Identification and authentication The TOE shall control the unauthorized accesses and use the process of identification and authentication to block the unauthorized user to access the TSF data P Secure management P Cryptographic O Management OE Secure management O Management The authorized user of TOE is reliable and assures maintaining the TOE securely The TOE shall ensure that he or she distributes installs and uses TOE securely The security objective provides the measure that the administrator accesses the TOE from the remote system To support the security policy the TOE controls the resources of accesses based on the user s identification PA SSL certificate management OEA SSL protocol The TOE assures the reliability and security to SSL certificate TSonNer as REDOWL SecuOS V4 0 for RHEL4 ST 76 8 2 Security Requirements Rationale Security requirements rationale shows that IT security requirements are satisfied with specific security objectives 8 2 1 TOE security function requirements rationale TOE security function requirements rationale shows the followings Each security objectives is handled by at least one TOE security function re
31. oneself Add Modify a user security password who is registered to an agent server through the integrated management server File security information management function is to inquire configure the information or security attribute of a file or directory This function can be used by security administrator user and integrated management and CUI based commands are provided Also inquiry configuring of a remote agent server s files or directories in accordance with parameter inputs is possible Console management provides following commands for this function The command that inquire general information and security information of a file which is belonged to a specific directory of a designated agent server Managing command that add modify delete clearance and category of a specific file or directory of a designated agent server Process security attribute management function is to inquire general information and security attribute of a process and to configure the security privilege to a specific process This function can be operated by security administrator user and integrated management Following three types of CUI based commands are provided for this function Command that inquire the general information and security information of all processes in a agent server Command used when a security administrator or a user modify clearance and category of a shell process of oneself Command used when a sec
32. policy configuration Commands which are used to transmit security policy files from the integrated management server to the registered agent servers selectively Commands configuring security policy files to the security kernel TSonNer as REDOWL SecuOS V4 0 for RHEL4 ST 64 PT 3 TSF testing TSF should implement a series of tests comparing hash values of the whole files the file size and the time value for showing the accurate performance of supposed cases of security concern Before TSC functions being approved to operate TSF executes each security function after comparing setting points of MAC and ACL for forcing TSP In case of detecting errors in data integrity TSF let the authorized administrator know the fact by email and generates audit data for the corresponding event PT A TSF protection TSF operates the most important part of TOE This TOE controls accesses of unauthorized users by installing to separated domains as general user system domain and TOE s domain No user can access to the directory where TOE installed except the system administrator and the security administrator and followings are contents which protected area is separated directory and file territory where TOE is installed ID and password of the security administrator cannot be found in the general password management file and are managed as the specific file of TOE security territory TOE security conf
33. provides Mandatory Access Control between the subjects to subjects the subjects to objects and controls the information flow through providing the security label to the subjects and objects Because the MAC controls all of subjects and objects the security administrator only changes or removes the specific subjects and objects DAC Discretionary Access Control FAU 5 2 STG 1 FDP_ACC 1 FDP FIA_USB 1 FMT_MSA 1 1 F MT_MSA 3 1 FMT_REV 1 1 FMT 2 TSF controls the accesses that users are classified by the user identification of subjects and the group identification of user and then the TSF controls the access coverage and the information flow at discretion The TSF applies the operation of between controlled subjects and controlled objects to OS access control list RDP Residual data protection FDP RIP 1 When the TSF gets back the resource from the file with security labels it protects the residual data of resource from the unauthorized subjects TSonNer Systems on the Net REDOWL SecuOS V4 0 for RHEL4 ST Security functions Security requirements Rationale IA 1 Authentication failure adjustment FIA AFL 1 When users authentication are failed the TSF shall detect them and create the audit data and then send e mails to the security administrator IA 2 Definition of user identity FIA ATD 1 FIA USB 1 The
34. representation 5 2 4 Guidance documents AGD ADM 1 Administrator guidance Dependencies ADV 1 Informal functional specification Developer action elements AGD_ADM 1 1D The developer shall provide administrator guidance addressed to system administrative personnel AGD_ADM 1 1C The administrator guidance shall describe the administrative functions and interfaces available to the administrator of the TOE AGD ADM 1 2C The administrator guidance shall describe how to administer the TOE in a secure manner ADM 1 3C administrator guidance shall contain warnings about functions and privileges that should be controlled in a secure processing environment AGD ADM 1 4C The administrator guidance shall describe all assumptions regarding user behavior that are relevant to secure operation of the TOE AGD ADM I 5C administrator guidance shall describe all security parameters under the control of the administrator indicating secure values as appropriate AGD ADM 1 6C The administrator guidance shall describe each type of security relevant event relative to the administrative functions that need to be performed including changing the security characteristics of entities under the control of the TSF AGD_ADM 1 7C The administrator guidance shall be consistent with all other documentation supplied for evaluation AGD_ADM 1 8C The administrator guidance shall describe all security requirements for the IT environme
35. require each user to be successfully authenticated before allowing any other TSF mediated actions on behalf of that user doing actions Except explicit actions in FIA_UAU 1 1 Dependencies FIA_UID 1 Identification FIA_UAU 4 Single use authentication mechanisms Hierarchical to No other components 4 11 The TSF shall prevent reuse of authentication data related to the console and the GUI authentication mechanism Dependencies No dependencies FIA_UAU 7 Protection authentication feedback Hierarchical to No other components TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 30 FIA UAU 7 1 The TSF shall provide only password input screen security label list screen to the user while the authentication 1s in progress Dependencies UAU 1 Timing of authentication UID 2 User identification before any action Hierarchical to UID 1 Identification FIA 01 2 1 The TSF shall require each user to identify itself before allowing any other TSF mediated actions on behalf of that user Dependencies No dependencies USB 1 User subject binding Hierarchical to No other components USB 1 1 The TSF shall associate the appropriate user security attributes with subjects acting on behalf of that user the user identification the group identification belonging user security label Dependencies ATD 1 User attribute definition FIA
36. separate logically other communication channels provide secure channel between TSFs to prevent them from unauthorized changes or exposures AT Session lock by TSF TR Secure channels between FTP ITC 1 TSFs 85 Protection Profile Claims Rationale The ST refers to the following PP made by the Korea Information Security Agency KISA Also the PP is based on the CC The ST is same with the PP in the security objectives and security requirements Label based Access Control System Protection Profile for Government V1 1 17 May 2006 8 6 Strength of Function Rationale The TOE minimum strength of function of SOF medium was chosen to be consistent with the LACSPP The assets of TOE are middle level and the threat agent has low level of professional knowledge resources and motivations The SOF medium strength level is sufficient to meet the objectives of the TOE given the security environment described in the ST tems on the Net
37. varying operations Security Target ST A set of security requirements and specifications to be used as the basis for evaluation of an identified TOE TSonNer erem REDOWL SecuOS V4 0 for RHEL4 ST 4 Sa Protection Profile PP An implementation independent set of security requirements for a category of TOEs that meet specific consumer needs Human User Any person who interacts with the TOE User Any entity human user or external IT entity outside the TOE that interacts with the TOE Selection The specification of one or more items from a list in a component Identity A representation e g a string uniquely identifying an authorized user which can either be the full or abbreviated name of that user or a pseudonym Element An indivisible security requirement Role A predefined set of rules establishing the allowed interactions between a user and the TOE External IT Entity Any IT product or system untrusted or trusted outside of the TOE that interacts with the TOE Authorized Administrator An authorized user being granted TOE management privilege Authorized User A user who may in accordance with the TSP perform an operation Authentication Data Information used to verity the claimed identity of a user Assets TSonNer as REDOWL SecuOS V4 0 for RHEL4 ST 5 Information or resources to be protected by the countermeasures of a Ref
38. 1 1 by Security Target writers Table 7 1 shows PP requirement in this ST TSonNer REDOWL SecuOS V4 0 for RHEL4 ST Table 7 1 PP requirements in ST Classification Security environment objectives policies O Status TOE Security Environment Security Objectives Assumption A Physical security Reference A Trusted administrator Reference A Hardened OS Reference AA SSL certificate of TOE Add AA TIME Add Threats Threats to TOE T Deficient codes Reference T Recording failure Reference T Data violation Reference T Authentication attempts By unauthorized Reference T Disguise and bypassing Reference T Rest information Reference Threats to TOE environment TE Infirmity of management Reference TE Distribution installation Reference Security policy of the organization TOE Security objectives P Audit Record Reference P MAC Reference P Allowance of Security labels Reference P Identification and Authentication Reference P Secure management Reference P Cryptographic Reference P DAC Reference PA SSL certificate Management O Audit Record Add Reference O MAC Reference O Inspection of Deficient codes Reference O Management Reference O Data protection Reference O Allowance of
39. 1 2 24 4 SAA I FAU_GEN 1 2 5 FAU SAR 1 FAU_GEN 1 2 6 FAU_SAR 2 FAU SAR I 5 7 FAU SAR 3 FAU SAR I 5 8 SEL 1 FAU_GEN 1 FMT MTD 1 2 31 32 33 34 9 FAU_STG1 FAU_GEN 1 2 10 FAU_STG3 FAU_STG 1 9 11 FAU_STG4 FAU_STG 1 9 12 FDP ACC 1 FDP_ACF 1 13 13 FDP_ACF 1 FDP ACC 1 FMT_MSA 3 12 29 14 FDP IFC 1 FDP IFF 1 15 15 FDP IFF 2 FDP IFC 1 FMT MSA 3 14 30 16 FDP ITC 1 FDP_ACC 1 FDP_IFC 1 FMT MSA 12 14 30 17 FDP RIP 1 18 AFL 1 FIA UAU 1 21 19 ATD I 20 805 1 21 UAU 1 UID 1 24 22 UAU A 23 UAU 7 UAU 1 21 24 UID 2 25 FIA_USB 1 FIA_ATD 1 19 26 1 1 SMR 1 FMT SMF 1 37 38 27 FMT_MSA 1 1 FDP_ACC 1 FDP_IFC 1 FMT SMR 1 12 14 37 38 FMT_SMF 1 28 FMT_MSA 1 2 FDP_ACC 1 FDP_IFC 1 FMT SMR 1 12 14 37 38 29 FMT_MSA 3 1 FMT_MSA 1 FMT_SMR 1 28 37 30 FMT_MSA 3 2 FMT_MSA 1 FMT_SMR 1 29 37 TSonNer REDOWL SecuOS V4 0 for RHEL4 ST Function i Reference Dependencies components No 31 FMT_MTD 1 1 32 FMT_MTD 1 2 33 FMT_MTD 1 3 34 FMT_MTD 1 4 35 FMT_REV 1 1 36 FMT_REV 1 2 37 FMT SMR 1 38 FMT_SMF 1 40 RVM I 2 41 SEP 1 42 STM 1 4 TST 1 _ 1 38 3 44 FTA SSL 1 FIA UAU 1 2 45 FTP ITC 1 FMT SMR 1 FMT SMF 1 FMT SMR 1 FMT 1 FMT SMR 1 SMF 1 FMT SMR 1 FMT 1 FMT SMR 1 FMT SMR 1 FMT UID 1
40. 1 2 The TSF shall permit TSF to initiate communication via the trusted channel FTP ITC 1 3 The TSF shall initiate communication via the trusted channel for the remote management function Dependencies No dependencies Attention when apply The TOE provides a trusted channel using SSL protocol provided by the IT environment TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 9 2 TOE Security Assurance Requirements mca 36 pu This section is consisted of the security assurance requirements of CC Part3 the assurance level is EAL3 Table 5 3 shows the assurance components to the security assurance requirements The additional assurance components in the Security Target are the following ADV IMP 2 Implementation of the TSF ADV LLD 1 Descriptive low level design Well defined development tools ATE DPT 2 Testing low level design AVA VLA 2 Independent vulnerability analysis e e ALC TAT 1 e e Table 5 3 TOE assurance requirements Assurance Class Assurance Component Configuration Management Delivery and Operation Development Guidance Documents Life cycle support Vulnerability Assessment ACM CAP 3 Authorization controls SCP 1 ADO DEL I TOE CM coverage Delivery procedures ADO IGS 1 ADV Installation generation and start up procedures Informal functional specification ADV HLD 2 Security enforcing high
41. Label based Access Control System By TSonNet REDOWL SecuOS V4 0 for RedHat Enterprise Linux 4 Security Target Version 1 1 Trust System On The Net TSonNet Co Ltd Seoul Branch Office 12 Floors West Build IT venture tower 78 Garak Dong Songpa Gu Seoul Republic of Korea TEL 02 2142 1380 FAX 02 2142 1387 DaeJeon Head Office 5 Floor IT Plex 59 2 Jang Dong Yuseong Gu DaeJeon Republic of Korea TEL 042 360 5000 FAX 042 360 5050 URL www tsonnet co kr E mail tsonnet tsonnet co kr REDOWL SecuOS V4 0 for RHEL4 ST Version History 1 0 2005 12 30 First Release Kim Eui Tak 1 1 2006 05 20 First Update Kim Eui Tak Proprietary Notice This document is the property of TSonNet Ltd All information herein is confidential to TSonNet and must not be copied or disclosed to any third party without the prior written consent of TSonNet Copyright 6 Trust System On The Net TSonNet Co Ltd TSonNer Trusted Systems on the Net REDOWL SecuOS V4 0 for RHEL4 ST iii Contents References 1e INTRODUCTION 1 1 1 Security Target Identification 1 1 2 Security Target Overview 1 1 3 CC Conformance 2 a a 1 1 4 Organization of the Security
42. OE and the TOE is located in secure place being separated physically A OE Trusted The authorized user of TOE is reliable and assures maintaining the TOE securely Trusted administrator administrator A Hardened OS OE Hardened OS The TOE assures the security and reliability by that the security objectives removes the unnecessary services or functions of the OS and reinforces the vulnerabilities of the OS AA SSL certificate OEA SSL protocol The TOE assures the reliability and security to Of TOE SSL certificate AA TIME OEA TIME The TOE assures the accurate time stamp from OS providing TSonNer REDOWL SecuOS V4 0 for RHEL4 ST N 8 1 8 The rationale of security objectives for security policies Table 8 4 The rationale of security objectives for security policies Security Policy Security Objectives Rationale P Audit Record O Audit Record To support the security policy the TOE provides the measures that writes and investigates security events O MAC O Allowance of Security labels The TOE assures the access control to the information flow based on the user s security label and assures that information or users get proper security labels or remove them according to the security policy and process of organization P Allowance of Security labels O MAC O Allowance of Security labels The TOE assures the access control to the information flow based
43. P OE Physical security TOE should be placed in a physically secured environment which only authorized administrators can access into Authorized administrators of TOE should not have ill wills and have been SE 2 educated with TOE management functions and perform their duties administrator zh UK appropriately according to administrator s guidelines OE Secure TOE should be distributed and installed in secure way and also organized management managed and used by authorized administrators securely OE Hardened OS By removing OS services or tools not needed by TOE Hardened OS vulnerabilities and reliability stability OS should be guaranteed 4 22 Security objectives to environment OEA SSL protocol OEA TIME TOE stores the certificate which is to be used in case of SSL authentication when it is installed TOE s SSL certificate is securely generated and managed To make Trusted channels or paths between TOEs SSL functions are called in IT environment IT environment should provide reliable time stamps from OS or NTP servers following RFC1305 TSonNer Trusted Systems on the Net REDOWL SecuOS V4 0 for RHEL4 ST 9 IT SECURITY REQUIREMENTS 9 1 TOE Security Function Requirements 19 This section specifies the security functional requirements SFRs for the TOE This section organizes the SFRs by CC class Table 5 1 Security Function Requirements Component
44. S The strength of security requirements 1s described in the vulnerability assessment report Table 8 9 TOE assurance requirements to the assurance measures mappings ACM CAP3 SCP 1 ADV 1 ADV HLD 2 ADV IMP 2 AGD ADM I AGD USR I DVS 1 ALC 1 ATE 2 ATE DPT2 ATE FUN ATE IND2 AVA MSU I SOF I VLA 2 TSonNer Trusted Systems on the Net REDOWL SecuOS V4 0 for RHEL4 ST Table 8 10 security requirements to the security functions mappings Security Security function Components FAU_ARP 1 FAU_GEN 1 FAU_GEN 2 FAU_SAA 1 FAU_SAR 1 FAU_SAR 2 FAU_SAR 3 FAU_SEL 1 FAU _STG 1 FAU STG3 FAU STGA FDP_ACC 1 FDP_ACF 1 FDP_IFC 1 FDP IFF2 FDP ITC 1 FDP FIA_AFL 1 FIA_ATD 1 FIA_SOS 1 FIA_UAU 1 uonoojo1d sN 2 e 5 pue MT MSA 1 1 MT _MSA 1 2 MT MSA 3 1 MT MSA3 MT MTD 1 1 MT MTD 1 3 MTD 1 4 MT REV I 1 MT 12 SMR I 5 1 _ 1 FPT_RVM 1 SEP 1 STM I 8 1 ASL 901993024
45. S V4 0 for RHEL4 ST Protection of the TSF TOE Access Trusted Path Channels _ 1 Abstract machine testing FPT RVM I Non bypassability of the TSP FPT SEP 1 TSF domain separation 5 1 Reliable time stamps 5 1 TSF testing 9 1 1 Security Audit ARP 1 Security alarms Hierarchical to No other components ARP 1 1 SSL 1 TSF initiated session locking FTP ITC 1 Inter TSF trusted channel The TSF shall take the list of follows upon detection of a potential security violation immediately a Generating and writing the events about disruptive actions b Sending an specific email to security administrator Dependencies FAU_SAA 1 Potential violation analysis FAU_GEN 1 Audit data generation Hierarchical to No other components GEN 1 1 events The TSF shall be able to generate an audit record of the following auditable a Start up and shut down of the audit functions b auditable events for the minimum level of audit and c Auditable events in Table 5 2 and events when the security administrator gets the security administrator privileges events when users gets the system privileges events when the security functions detect intrusions events when the security handles security functions and logs about users commands history Table 5 2 A
46. SM_1 Security function management FMT MOF 1 SMR 1 FMT SMF 1 Security management SM 2 Security attributes management FMT MSA 1 1 FMT MSA 1 2 FMT MSA 3 1 FMT MSA 3 2 FMT 1 1 FMT REV 1 2 FMT SMF 1 SM 3 TSF data management PT l Abstract machine testing FMT MTD 1 2 FMT MTD 1 3 FMT MTD 1 4 STM l 1 FPT AMT 1 TSF protection PT 2 Impossibility of TSP bypassing 1 PT 3 TSF testing FPT TST 1 TOE access Trusted paths channels PT 4 protection AT Session lock by TSF TR Trusted channels between TSFs 6 1 1 Security Audit Security Audit is classified into 5 security functions 5 security functions are AU_1 Audit record FPT SEP 1 FTA SSL 1 FTP ITC 1 generating AU 2 Audit record inquiry AU 3 Audit record protection AU 4 Limitation of audit investigation privilege and AU 5 Analysis of potential violations W AU l Audit record generating Various security events occurring in security module are recorded to audit data Audit information related to security policy violating events such as calling out of security system calls Mandatory Access Control and Discretionary Access Control are generated and collected To generate and manage security kernel originated audit date TOE operates as follows Each module of security kernel requests audit data collecting module
47. The rationale of security requirements for IT environment bjectives Security requireme OEA TIME This component assures that the IT environment provides reliable time STM 1 stamp that TSF is able to use Therefore this component is satisfied with OEA TIME which shall provide the reliable NTP server or OS OEA SSL protocol This component 18 satisfied with OEA SSL protocol by providing the FTP_ITC 1 trusted IT identification and authentication and the trusted coded communication ms on the Net TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 8 3 Dependency rationale Es 81 pum This section provides the dependency of TOE security requirements and assurance requirements 8 3 1 The dependency of TOE security requirements Table 8 7 depicts the satisfaction of all functional requirement dependencies For each functional requirement included in the ST FMT 1 is dependent on FIA UID 1 That means it is satisfied with UID 1 and UID 2 FDP IFC 1 is dependent on FDP IFF 1 So it is satisfied with IFF 1 and FDP_IFF 2 Table 8 7 The dependencies of the function components Function Bee Reference No Dependencies components No 1 FAU_ARP 1 FAU SAA 1 4 2 FAU_GEN 1 FPT_STM 1 42 3 FAU_GEN 2 FAU_GEN 1 FIA_UID
48. ad the object TSonNer ae REDOWL SecuOS V4 0 for RHEL4 ST 27 prm b ifthe object s label is same with the subject s label the subject can get written permission to the object ifthe label of a subject is higher than or same with the label of subject B information can flow from subject A to subject B FDP IFF 2 3 The TSF shall enforce the following list of additional information flow control a If directories or files P privilege represents the status of an execute file the clearance 1s 0 authorized by security administrator X privilege represents the locked status of special files and directories Y privilege represents that the read permission of the present file is granted b If processes P privilege the super privilege of TOE If an user get the privilege he can do everything in the system and the privilege can be inherited to subjects I privilege the install privilege of TOE It can not apply security policy that security administrator makes The privilege is for package install authorized execute file generation and kill process privilege A privilege the authorized privilege of TOE The process inherited A privilege can make execute files and execute them without the security administrator authorization FDP IFF 2 4 The TSF shall provide the following P privilege X privilege Y privilege for files information flow control P p
49. ate a potential violation of the TSP SAA 1 2 The TSF shall enforce the following rules for monitoring audited events a the accumulations or combinations events for the failure of authentication in the auditable events of FIA_UAU 1 events for access control violations in the auditable events of FDP ACF 1 and FDP IEF events for integrity violations in the auditable events of FPT TST 1 known by potential violation b the violations of identification and authentication security rules the accumulation or combination for the violations of access control rules Dependencies FAU GEN 1 Audit data generation SAR 1 Audit review Hierarchical to No other components SAR 1 1 The TSF shall provide authorized user security administrator with the capability to read all of audit information from the audit records 1 2 The TSF shall provide the audit records in a manner suitable for the user to interpret the information Dependencies FAU GEN 1 Audit data generation SARA Restricted audit review Hierarchical to No other components FAU SAR 2 1 The TSF shall prohibit all users read access to the audit records except those users that have been granted explicit read access Dependencies FAU SAR 1 Audit review FAU SAR 3 Selectable audit review Hierarchical to No other components FAU SAR 3 1 The TSF shall provide the ability to pe
50. cle of statistics data from once a day a week or a month Statistics output graph is can be stored as a figurative file W AU 3 Audit record protection TSF reports security administrator a message by mail when the storage scale of audit data exceeds the limit which security administrator established firstly and reports security administrator a warning message by mail when the storage scale of audit data exceeds the limit secondly By this TSF performs protection over audit data If the storage scale of audit data is filled up files are deleted from the oldest ones automatically and security administrator is informed about the file deletions AU 4 Limitation of audit investigation privilege TSF should protect audit data from modifications and removals by unauthorized users TOE doesn t allow any user to access audit data except authorized users by setting up access privileges or security labels on audit data The privilege of audit investigation is limited to security administrator when audit log analysis and audit log statistics functions are operated Audit log analysis can only be performed by security administrator This function is to investigate the existence of hacking attacks internally or externally by process by user and conditional search is also practicable Security administrator can modify the field information of audit data to print out And security data can also be converted to MS Office s Excel
51. controlled subjects and controlled objects 15 allowed the list of Discretionary Access Control security attributes connected with the followings the operation is permitted if the user s identification of subject is same with the user s identification of object access control attributes to each operation ii the operation is permitted if the user group s identification of subject is same with the user group s identification of object access control attributes to each operation TSonNer Say REDOWL SecuOS V4 0 for RHEL4 ST 26 Sa lii ifthe user s identification of subject is not same with the user s identification of object access control attributes 10 each operation and if the subject identification is higher than or same the operation is permitted but if lower than the operation is not permitted iv if the user group s identification of subject is not same with the user group s identification of object access control attributes to each operation and if the user group s identification of subject is higher than or same the operation is permitted but if lower than the operation is not permitted FDP ACF 1 3 The TSF shall explicitly authorize access of subjects to objects based on the following additional rules rules based on security attributes that explicitly authorize access of subjects to objects 1 4 The TSF shall explicitly deny access of subjects to objects based on the rules
52. curity attribute generated and password information IA 3 Verification of confidential information For the verification of confidential information password management function is provided With password management function general users of OS system security administrators of REDOWL SecuOS system and security users can change their password and the rules applied to password modifications are as follows TSonNer Bass REDOWL SecuOS V4 0 for RHEL4 ST 56 pu New password which user input to change should be different from the old one Length of password e g the minimum is 6 characters and the maximum is 8 characters confirmation Rule of combination e g a password should contain letters from more than 2 characters of the below gt Alphabets 26 letters of each capitals and lowercase letters A Z a z gt Special characters 32 letters 2 amp lt gt _ gt Numerals 0 9 New password containing more than 3 identical characters to the previous one is not acceptable New password with the sequence of more than 3 same characters or continuous character are not acceptable User can create or modify a password when above rules are satisfied JA Z4 Identification and authentication Identification and authentication is divided to 3 functions 3 functions are user authentication session management and authentication success function User authentication is to id
53. d in the PP ST SOF 1 2C For each mechanism with a specific strength of TOE security function claim the strength of TOE security function analysis shall show that it meets or exceeds the specific strength of function metric defined in the PP ST VLA Independent vulnerability analysis Dependencies ADV FSP 1 Informal functional specification ADV HLD 2 Security enforcing high level design ADV IMP 1 Subset of the implementation of TSF ADV LLD 1 Descriptive low level design TSonNer REDOWL SecuOS V4 0 for RHEL4 ST ADM 1 Administrator guidance AGD USR 1 User guidance Developer action elements VLA 2 1D The developer shall perform a vulnerability analysis VLA 2 2D The developer shall provide vulnerability analysis documentation Evidence elements VLA 1C The vulnerability analysis documentation shall describe the analysis of the TOE deliverables performed to search for ways in which a user can violate the TSP VLA 2 2C The vulnerability analysis documentation shall describe the disposition of identified vulnerabilities 2 3 The vulnerability analysis documentation shall show for all identified vulnerabilities that the vulnerability cannot be exploited in the intended environment for the TOE VLA 2 4C The vulnerability analysis documentation shall justify that the TOE with the identified vulnerabilities i
54. eat sources can access to essential information illegally due to the incomplete removal of object data 3 2 2 Threats to TOE Environment TE Infirmity of TOE can be organized managed and used by authorized administrators in management insecure ways Distribution TOE s security can be damaged during distributions and installations Installation TSonNer Trusted Systems on the Net REDOWL SecuOS V4 0 for RHEL4 ST 16 3 3 Security policy of the organization The regulations procedures customs and guidelines forced by an organization that TOE should fulfill are distinguished into security policies of an organization same as LACSPP and additional organization s security policies 3 3 1 Same assumptions which are identical to LACSPP Security events should be recorded and maintained and recorded data P Audit Record should be investigated for clearing up the responsibilities of security activities P Mandatory Access TOE should have capability of controlling accesses toward objects by the Control basis of subject s security labeling P Allowance of TOE should have capability of allowing or canceling of security labels in security labels accordance with the organization s access control policies and procedures P Identification and Identification and authentication process should be executed before authentication information access is authorized P Secure management Autho
55. ects exceptions and error messages as appropriate ADV HLD 2 9C high level design shall describe the separation of the TOE into TSP enforcing and other subsystems ADV 2 Implementation of the TSF Dependencies ADV LLD 1 Descriptive low level design ADV RCR I Informal correspondence demonstration ALC TAT 1 Well defined development tools Developer action elements ADV 2 10 developer shall provide the implementation representation for the entire TSF TSonNer e REDOWL SecuOS V4 0 for RHEL4 ST 40 7 Evidence elements ADV_IMP 2 1C implementation representation shall unambiguously define the TSF to a level of detail such that the TSF can be generated without further design decisions ADV_IMP 2 2C The implementation representation shall be internally consistent ADV_IMP 2 3C The implementation representation shall describe the relationships between all portions of the implementation ADV_LLD 1 Descriptive low level design Dependencies ADV LLD 1 Descriptive low level design ADV RCR I Informal correspondence demonstration Developer action elements ADV LLD 1 1D The developer shall provide the low level design of the TSF ADV LLD 1 1C The presentation of the low level design shall be informal ADV LLD 1 2C The low level design shall be internally consistent ADV LLD 1 3C The low level design shall describe the TSF in terms of modules
56. ecurity password management file security information management process security attributes management security policy management OS user account management and password management User management function is to inquire or configure the information or security attribute assigned to users Information managed through this function is user ID username the highest clearance the lowest clearance the default clearance category the date of security attribute generated and password information This function can be operated by security administrator and the integrated management and followings are CUI based commands provided by console management for this function Inquire user information registered to the remote server or the local server Inquire all user s information registered to each agent server by connecting to the agent server which are registered to the integrated management servers Add Modify Delete user s security attribute from the agent server through the integrated management server TSonNer oe REDOWL SecuOS V4 0 for RHEL4 ST 60 pun Security password management function 15 to add modify security password by REDOWL SecuOS system s security administrator or user This function can be operated by user security administrator or integrated management and following CUI based commands are provided by console management for this function User and security administrator modifies the password of
57. ent FMT MSA 1 2 Refinement FMT_MSA 3 1 Reference FMT MSA 3 2 Reference FMT MTD 1 1 Reference FMT MTD 1 2 Reference FMT MTD 1 3 Reference FMT MTD 1 4 Reference FMT_REV 1 Refinement FMT_REV 1 2 Refinement FMT_SMR 1 Refinement FMT_SMR 1 Refinement Protection of the TSF _ 1 Refinement _ 1 Reference FPT SEP 1 Reference 5 1 Reference 5 1 Refinement TOE access SSL 1 Refinement Trusted path channels _ 1 Refinement TSonNer Ss REDOWL SecuOS V4 0 for RHEL4 ST 70 gol 1 33 Protection Profile Additions In this ST assumptions organization policies security objectives and security objectives to TOE environment are added to LACSPP V1 1 Table 7 2 The assumptions security policies security objectives and security requirement for TOE environment added in LACSPP AA SSL certificate TOE shall generate and restore the certificate for SSL authentication in of TOE advance The SSL certificate of TOE maintains in secure TIME The IT environment provides trusted Time Stamp from or NTP server that follows 1305 The TOE shall generate restore and manage the SSL certificate in secure management OEA SSL protocol To provide trusted channels and paths between TOE the TOE revokes the SSL functions The IT environment provides trusted time stamps from OS or NTP Oe server that follows RFC1305
58. entify user to perform authentication and to prevent the reuse of user password information Session management is to monitor sessions attempting to access the system Authentication success function is to handle the success of identification and authentication User authentication function is to distinguish whether an external user is a normal system user or not The main function of user authentication is identification and authentication and to prevent the reuse of user password information When a user attempts to login to the system user authentication module operates as follows At the early stage of authentication module it collects the service information terminal information and IP address of client which the external user uses Investigate whether the effective account or not by getting input of user ID and password for user authentication gt Lock out the user account for 5 minutes after 3 times of failed attempts of user authentication Perform security code authentication printing the index number of security code when user ID and password are successfully authenticated gt Telnet users are to input security code corresponding to the index number of security code table which is distributed by security administrator TSonNer cmm REDOWL SecuOS V4 0 for RHEL4 ST 57 puo gt Ifa security code input fails authentication of user ID and password is restarted gt Lock out the user account after 3 times of
59. ependency of TOE assurance 82 8 4 TOE Summary Specification Rationale cesses 83 8 5 Protection Profile Claims Rationale nenne 87 8 6 Strength of Function ene nennen 87 TSonNer pem REDOWL SecuOS V4 0 for RHEL4 ST pcm References CC Common Criteria for Information Technology Security Evaluation Version 2 3 August 2006 LACSPP Label based Access Control System Protection Profile for Government V1 1 TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 1 INTRODUCTION 1 1 Security Target Identification This section contains the document management and identification of TOE The developer and the evaluator can identify and verify this document with the follows Evaluation standard Common Criteria V2 3 Evaluation level EAL 3 Evaluation Body Korea Information Security Agency PP Claim Label based Access Control System Protection Profile for Government V1 1 REDOWL SecuOS V4 0 for RHEL4 Document title Security Target V1 1 Document identification D ST 1 1 Document writer TSonNet Co Ltd 1 2 Security Target Overview The ST is for REDOWL SecuOS V4 0 for RHELA RedHat Enterprise Linux 4 that has followed closely the specification contained in LACSPP Label based Access Control System Protection Profile for Government V1 1 Republic of K
60. est procedure descriptions expected test results and actual test results ATE FUN 1 2C The test plans shall identify the security functions to be tested and describe the goal of the tests to be performed ATE FUN 1 3C The test procedure descriptions shall identify the tests to be performed and describe the scenarios for testing each security function These scenarios shall include any ordering dependencies on the results of other tests ATE FUN 1 4C The expected test results shall show the anticipated outputs from a successful execution of the tests ATE FUN 1 5C The test results from the developer execution of the tests shall demonstrate that each tested security function behaved as specified ATE IND 2 Dependent testing sample Dependencies ADV_FSP 1 Informal functional specification AGD ADM 1 Administrator guidance USR 1 User guidance ATE FUN 1 Functional testing Developer action elements ATE IND 2 1D The developer shall provide the TOE for testing Evidence elements ATE IND 2 1C The TOE shall be suitable for testing ATE IND 2 2C The developer shall provide an equivalent set of resources to those that were used in the developer s functional testing of the TSF 5 2 7 Vulnerability assessment MSU 1 Examination of guidance Dependencies ADO IGS 1 Installation generation and start up procedures TSonNer REDOWL SecuOS V4 0 for RHEL4 ST
61. f CUI based command that inquire information of a remote server CUI based command that add modify delete information of a new agent server to the integrated management server User management is to inquire or configure the general information and security attributes assigned to users Information managed through this function are user ID username the highest clearance the lowest clearance the default clearance category the date when security attribute was first generated and the password information This function can be operated by the authorized security administrator and the integrated management and following 3 CUI based commands are provided for this function Command that inquire the user information registered to a local server of oneself or a remote server Command that inquire every users information registered to agent servers which are managed by the integrated management server Command that add modify delete users security attributes to agent servers through the integrated management server Security policy management is to transmit the security policy data of the integrated management server to remote agent servers or to configure agent servers security policies to the security kernel Security policy management is operated by the security administrator or the integrated management and following 2 types of CUI based commands are provided for the security policy transmission and the security
62. f subjects and or groups to which they belong The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission perhaps indirectly on to any other subject unless restrained by mandatory access control Security level The combination of a hierarchical classification and a set of non hierarchical categories that represents the sensitivity of information Object An entity within the TSC that contains or receives information and upon which subjects perform operation Attack potential The perceived potential for success of an attack should an attack be launched expressed in terms of an attacker s expertise resources and motivation Strength of Function SOF A qualification of a TOE security function expressing the minimum efforts assumed necessary to defeat its expected security behavior by directly attacking its its underlying security mechanisms SOF basic A level of the TOE strength of function where analysis shows that the function provides adequate protection against casual breach of TOE security by attackers possessing a low attack potential SOF medium A level of the TOE strength of function where analysis shows that the function provides adequate protection against straightforward or intentional breach of TOE security by attackers possessing moderate attack potential Iteration The use of a component more than once with
63. f all external TSF interfaces providing details of effects exceptions and error messages as appropriate ADV FSP 1 4C functional specification shall completely represent the TSF ADV HLD 2 Security enforcing high level design Dependencies ADV 1 Informal functional specification ADV RCR I Informal correspondence demonstration Developer action elements ADV HLD 2 1D The developer shall provide the high level design of the TSF ADV 2 1 The presentation of the high level design shall be informal ADV HLD 2 2C The high level design shall be internally consistent ADV HLD 2 3C The high level design shall describe the structure of the TSF in terms of subsystems ADV HLD 2 4C The high level design shall describe the security functionality provided by each subsystem of the TSF ADV HLD 2 5C high level design shall identify any underlying hardware firmware and or software required by the TSF with a presentation of the functions provided by the supporting protection mechanisms implemented in that hardware firmware or software ADV HLD 2 6C high level design shall identify all interfaces to the subsystems of the TSF ADV HLD 2 7C The high level design shall identify which of the interfaces to the subsystems of the TSF are externally visible ADV HLD 2 8C The high level design shall describe the purpose and method of use of all interfaces to the subsystems of the TSF providing details of eff
64. fillments of assurance requirements and assurance measures Table 6 2 Fulfillments of assurance requirements and assurance measures Assurance class Assurance components Assurance measures and its theoretical basis Document names Configuration management ACM CAP 3 Configuration management is to identify and manage configuration items automatically using CVS ACM SCP 1 Configuration trail is possible controlling development user documents and source codes Document of configuration management Distribution and conduct ADO_DEL 1 Providing users with procedures for secure TOE distribution Distribution and operation notes ADO IGS 1 Providing secure procedures for installation generation and initiation of TOE Administrator s manual Development ADV 1 ADV HLD 2 By describing every TSF and TSF s external interfaces in an atypical way substantialize security function requirements of TOE clearly and entirely Describe TSF structure as a subsystem and security functionality which each subsystem provides Functional specifications Primary specifications ADV_IMP 2 Represent that concrete descriptions for TSF satisfy security functions requirement Verification statement ADV_LLD 1 Provide detailed specifications of TSF Detailed specifications ADV_RCR 1 Provide conformity of stateme
65. for the generation of audit data Audit data generating module stores audit data requested by each module after filtering phase Audit data is copied to audit data structure after filtering phase and examination of comparison is operated to find identical data from the prior audit record If there is identical data in it TOE counts the number of identical data in audit data TSonNer as REDOWL SecuOS V4 0 for RHEL4 ST 50 Sa structure and terminates the process If there is no identical data in it TOE inspects if the number of data is more than 1024 stored in a linked list Ifthe number of data is more than 1024 TOE allocates a new kernel memory and store audit data If the memory allocation is denied TOE terminates the process without storing audit data Ifthe number of data is less than 1024 TOE stores audit data in a linked list Audit data stored in a linked list is copied to user memory area in periodical calling order of console management and delivered to console management In console management periodically collected audit data are stored to files AU 2 Audit record inquiry Security audit data management function is to inquiry each Agent server s security audit data existing as ASCII text file format through integrated management GUI interface It presents the function of observing security audit data generated on multiple Agent servers in real time And it can also co
66. hall maintain the following roles the authorized user b The authorized user who gets privilege changing user authentication data System administrator c the user obtained security privilege SMR 1 2 TSF shall be able to associate users with roles Dependencies UID 1 Identification FMT SMF 1 Specification of management functions Hierarchical to No other components 5 1 1 The TSF shall be capable of performing the following security management function security policy configuration and broadcasting integrity inspection user management backup amp recovery Dependencies No dependencies 5 1 5 Protection of the TSF AMT 1 Abstract machine testing Hierarchical to No other components AMT 1 1 The TSF shall run a suite of tests for the OS file systems network processes necessary processes when OS initiates during initial start up during normal operation by period at the request of an authorized user to demonstrate the correct operation of the security assumptions provided by the abstract machine that underlies the TSF Dependencies No dependencies FPT RVM 1 Non bypassability of the TSP TSonNer ae REDOWL SecuOS V4 0 for RHEL4 ST 34 pul Hierarchical to No other components FPT RVM 1 1 The TSF shall ensure that TSP enforcement functions are invoked and succeed before each function wit
67. he authorized user the owner of object Dependencies ACC 1 Subset access control FDP IFC 1 Subset information flow control FMT SMF 1 Specification of management functions FMT SMR 1 Security roles FMT MSA 1 2 Management of security attributes MAC Mandatory Access Control Hierarchical to No other components MSA 1 1 The TSF shall enforce the MAC Policy to restrict the ability to change the security label of MAC associated with objects or subjects to the authorized user Dependencies ACC 1 Subset access control FDP IFC 1 Subset information flow control FMT SMF 1 Specification of management functions FMT SMR 1 Security roles FMT MSA 3 1 Static attribute initialization DAC Discretionary Access Control Hierarchical to No other components FMT MSA 3 1 The TSF shall enforce the DAC Policy to provide restrictive default value for security attributes that are used to enforce DAC Policy FMT 5 3 2 The TSF shall allow the authorized user to specify alternative initial values to override the default values when an object or information is created Dependencies FMT MSA 1 Management of security attributes FMT SMR 1 Security roles MSA 3 2 Static attribute initialization MAC Mandatory Access Control Hierarchical to No other components FMT 5 3 1 The TSF shall enforce the MAC Policy to provide restrictive default value for
68. he security attributes of DAC related with object And also it can restrict the authorized user not to remove the MAC related with subjects or objects so can restrict removal ability from the specific subject can not remove the security attributes The authorized user manages the TSF data management function like the audit information identification and authentication data the operation of security data including time stamp delete change initiate The abstract machine test performs a series on testing the status of security options the status of access control lists and daemon process with super privileges whenever the authorized user asks _2 Impossibility of TSP bypassing 1 The TSF provides the mandatory function to control TSP in TSC so it can provide the impossibility of TSP bypassing PT 3 TFS testing FPT TST 1 The TSF compares the modify time with the creative time hash value of the whole files and file size to proof correct operation of TSF If the error is happen it creates the audit data TSonNer REDOWL SecuOS V4 0 for RHEL4 ST NX equirements The TSF daemon and security data PT 4 1 storage shall be separate physically to TSF protection protect TSF oneself from the unauthorized intrusion The TOE shall provide function that locks FTA_SSL 1 the session during the authorized user being non activity The TSF shall
69. hin the TSC is allowed to proceed Dependencies No dependencies FPT SEP 1 TSF domain separation Hierarchical to No other components SEP 1 1 The TSF shall maintain a security domain for its own execution that protects it from interference and tampering by untrusted subjects SEP 1 2 The TSF shall enforce separation between the security domains of subjects in the TSC Dependencies No dependencies FPT STM 1 Reliable time stamps Hierarchical to No other components 5 1 1 The TSF shall be able to provide reliable time stamps for its own use Dependencies No dependencies Attention to apply The TOE can maintain the reliable time stamps by 2 methods The firstly it can use the NTP server and the secondly it can use the Operating System installed the TOE Now the TOE gets the reliable time from the Operating System The administrator can decide which one selects FPT TST 1 TSF testing Hierarchical to No other components TST 1 1 The TSF shall run a suite of self tests according to the hash value of whole files the file size and the comparing condition between Modify time and Creative time during initial start up during normal operation by period at the request of an authorized user to demonstrate the correct operation of the TSF TST 1 2 The TSF shall provide authorized users with the capability to verify the
70. ic patches of OS kernel needs to be installed to the system before the installation of secure os Agent servers are also running on RHEL4 loadable platforms and need at least 512Mbytes of RAM and 18Gbytes of hard disk space In the partitions of a hard disk usr partition needs to be larger than 10Mbytes and var partition needs to be larger than 10Mbytes In some cases specific patches of OS kernel needs to be installed to the system before the installation of secure OS GUI Managers are running on MS Windows 2000 Professional loadable platforms and need at least 256Mbytes of RAM and 10Gbytes of hard disk space MS patch of Windows should be the one which is SP Service Pack 4 or released later than SP4 TOE is physically divided to Enterprise Agent and Manager systems Enterprise and Agent systems are installed to RHEL4 operating systems When a TOE is installed we can select whether the TOE will be used as an Enterprise server or an Agent server After the installation a TOE will be running as an Enterprise or Agent server Manager system operated on Windows 2000 systems presents GUI instead of Enterprise servers CUI for more useful management of networked systems TOE s system requirements are shown in Figure 2 1 Followings are hardware devices which could be added to Enterprise or Agent servers systems gt Monitors VGA or LCD monitors compatible to IBM PCs or Linux systems gt Hard disk SCSI hard disks compatible to IBM PCs
71. identification and authentication to block the unauthorized user to access the TSF data T Disguise and Bypassing Identification and authentication Self protection of function The security objectives for the identification amp authentication and the self protection can remove the threats that unauthorized users disguise themselves as authorized users and the attack the TOE by bypassing T Rest information TE Infirmity of Management Removal of the rest information OE Trusted administrator OE Secure management The security objective removes properly some data from the TOE objects so it protects some from unauthorized accesses The authorized user of TOE is reliable and assures maintaining the TOE securely The TOE shall ensure that he or she distributes installs and uses TOE securely TE Distribution and Installation OE Trusted administrator OE Secure management The authorized user of TOE is reliable and assures maintaining the TOE securely The TOE shall ensure that he or she distributes installs and uses TOE securely TSonNer REDOWL SecuOS V4 0 for RHEL4 ST N i 8 1 2 The rationale of security objectives for assumptions Table 8 3 The rationale of security objectives for assumptions Assumptions Security Objectives Rationale A OE Physical security The TOE assures that the only authorized user Physical security can access the T
72. iew PP claims and glossary Chapter 2 TOE Description Provides and overview of the TOE security functions and boundary Chapter 3 TOE Security Environment Describes the threats organizational security policies and assumptions that pertain to the TOE Chapter 4 Security Objectives Identifies the security objectives that are satisfied by the TOE and the TOE environment Chapter 5 IT Security Requirements Presents the security functional and assurance requirements met by the TOE Chapter 6 TOE Summary Specification Describes the security functions provided by the TOE to satisfy the security requirements and objectives Chapter 7 Protection Profile Claims Presets the rationale concerning compliance of the ST with the LACSPP Chapter 8 Rationale Presents the rationale for the security objectives requirements and TOE summary specifications as to their consistency completeness and suitability 15 Glossary Mandatory Access Control MAC A kind of access control as a means of restricting access to objects based on the sensitivity as represented by a label of the information contained in the objects and the formal authorization 1 e clearance of subjects to access information of such sensitivity Discretionary Access Control Discretionary Access Control TSonNer Sas REDOWL SecuOS V4 0 for RHEL4 ST 3 pr A kind of access control as a means of restricting access to objects based on the identity o
73. iguration files are existing the directories of TOE territory 6 1 6 TOE Access A T Session lock by TSF security function inside TOE access AT Session lock by TSF TSF should provide the corresponding function when a user intends to close a log on session and control accesses of unauthorized users by locking out log on session when the user doesn t use the system for a period of time For locking out of session following methods are used Turn off the display unit or overwrite the screen to make current contents unreadable Annul every operations of the authorized users data access and displaying process rather than 6 1 7 Trusted Path Channels TR Trusted channels between TSFs security function guarantees secure courses channels TR Trusted channels between TSFs TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 65 Sa TSF should offer a communication channel which is distinguished logically from other communicative channels and provide assured identification of a terminal and protect channel data from modifications or exposures This TOE provides secure channel using SSL security protocol TSF uses SSL security protocol for the sake of remote management function integrated management and configuration of secure paths channel between console management 6 2 TOE Security Assurance Measures This TOE fulfills assurance requirements of EAL3 evaluation assurance grade Table 6 2 shows the ful
74. inement The addition of details to a component Organizational Security Policies Security rules processes habitual guidance and etc by enforcement in an organization Dependency A relationship between requirements such that the requirement that is depended upon must normally be satisfied for the other requirements to be able to meet their objectives Subject An entity within the TSC that causes operations to be performed Sensitivity Label Security attributes represents a subject or an object Augmentation The addition of one or more assurance component s from Part3 to an EAL or assurance package Component The smallest selectable set of elements that may be included in a PP an ST or a package Class A grouping of families that share common focus Target of Evaluation TOE An IT product or system and its associated administrator and user guidance documentation that 1 the subject of an evaluation Evaluation Assurance Level EAL A package consisting of assurance components form Part 3 that represents a point on the CC predefined assurance scale Family A grouping of components that share security objectives but may differ in emphasis TSonNer REDOWL SecuOS V4 0 for RHEL4 ST rl Assignment The specification of an identified parameter in a component Extension The addition to an ST or PP of functional requirements not contained in Part 2 and or assu
75. integrity of TSF data TST 1 3 The TSF shall provide authorized users with the capability to verify the integrity of stored TSF executable code Dependencies AMT 1 Abstract machine testing TSonNer as REDOWL SecuOS V4 0 for RHEL4 ST 35 guo 9 1 6 TOE Access FTA SSL 1 TSF initiated session locking Hierarchical to No other components FTA SSL 1 1 The TSF shall lock an interactive session after time interval of authorized users inactivity by a clearing or overwriting display devices making the current contents unreadable b disabling any activity of the user data access display devices other than unlocking the session if the time interval of authorized users is occurred locking display devices for GUI locking terminal session for CUI SSL 1 2 The TSF shall require the authentication of the security administrator for GUI re login for CUI to occur prior to unlocking the session Dependencies UAU 1 Timing of authentication 5 1 7 Trusted Path Channels FTP ITC 1 Inter TSF trusted channel Hierarchical to No other components FTP 1 1 The TSF shall provide a communication channel between itself and a remote trusted IT product that is logically distinct from other communication channels and provides assured identification of its end points and protection of the channel data from modification or disclosure _
76. lements ALC_DVS 1 1C development security documentation shall describe all the physical procedural personnel and other security measures that are necessary to protect the confidentiality and integrity of the TOE design and implementation in its development environment DVS 1 2C development security documentation shall provide evidence that these security measures are followed during the development and maintenance of the TOE ALC TAT 1 Well defined development tools iDependencies ADV IMP 1 Subset of the implementation of the TSF Developer action elements 1 10 The developer shall identify the development tools being used for the TOE TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 43 Sa ALC_TAT 1 2D The developer shall document the selected implementation dependent options of the development tools Evidence elements TAT 1 1C development tools used for implementation shall be well defined TAT 1 2C documentation of the development tools shall unambiguously define the meaning of all statements used in the implementation TAT 1 3C documentation of the development tools shall unambiguously define the meaning of all implementation dependent options 0 2 6 Tests ATE COV 2 Analysis of coverage Dependencies ADV_FSP 1 Informal functional specification ATE FUN 1 Functional testing Developer action elements
77. level design ADV IMP 2 Implementation of the TSF ADV LLD 1 Descriptive low level design ADV RCR I AGD_ADM 1 Informal correspondence demonstration Administrator guidance AGD USR 1 DVS 1 User guidance Identification of security measures ALC TATA ATE_COV 2 Well defined development tools Analysis of coverage ATE_DPT 2 Testing low level design ATE FUN 1 Functional testing ATE IND2 MSU I Dependent testing sample Examination of guidance SOF I Strength of TOE security function evaluation VLA Independent vulnerability analysis TSonNer REDOWL SecuOS V4 0 for RHEL4 ST N 5 2 1 Configuration management CAP3 Authorization controls Dependencies DVS I1 Identification of security measures Developer action elements CAP 3 1D The developer shall provide a reference for TOE ACM_CAP 3 2D The developer shall use a CM system ACM CAP 3 3D The developer shall provide CM documentation Evidence elements CAP 3 1C The reference for the TOE shall be unique to each version of the TOE CAP 3 2C TOE shall be labeled with its reference ACM CAP 3 3C The CM documentation shall include a configuration list and a CM plan ACM CAP 3 4C The configuration list shall describe the configuration items that comprise the TOE CAP 3 5C
78. lity stability of OS is guaranteed 3 1 2 Additional assumptions certificate stores the certificate which is to be used in case of SSL authentication when it is installed TOE s SSL certificate is securely of TOE generated and managed IT environment provides reliable time stamps from OS or NTP servers UE following RFC1305 TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 15 3 2 Threats Threat sources are those IT substances or users who are trying to access illegally or commit violence to the resources to be protected by TOE Threat sources toward TOE have low level of professional knowledge resources and motivations 3 2 1 Threats to TOE T Deficient codes Threat source can effect TOE s security functions by making use of deficient codes included in development process T Recording failure Possibility of not being able to record security events due to the vanishment of storage space T Data violation Threat sources can effect TOE s security functions by violating TOE composition data and trusted data T Authentication attempts by unauthorized Threat sources can attempt to unauthorized authentications toward TOE T Disguise and bypassing Threat sources can access to TOE by gaining unauthorized access control of reliable accounts or bypassing security functions T Rest information In case of TOE reusing resources thr
79. ly with time stamps on them Stored audit records are only classified or searched by authorized administrators B Protection of user data TOE performs strong security policies and confront intrusions by providing multi label based kernel level access control to the subjects and objects of the system C Firm identification and authentication TOE controls connections by identification and authentication algorithm of itself other than that of OS Additionally TOE limits system accessing effectively by regulating accesses to specific IP addresses or ports TSonNer ay REDOWL SecuOS V4 0 for RHEL4 ST 13 pum D Security management TOE permits only authorized administrators to manage and operate security policies over informational flow When authorized administrators access to TOE it forms secure communicative sessions by using OpenSSL Only authorized administrators can setup and manage or inquire for TOE related data security attributes and identification or authentication data Protections of TSF TOE confirms periodically if its security functions are regularly operated and if there is an irregular performance informs the results to authorized administrators It performs protections over TOE data and functions through perfection verification test to its principal data or executive files periodically or when it is demanded by authorized administrators And also it is possible to set up modify back up or restore securit
80. lysis of security function intensity over authentication mechanisms identified in ST LACSPP TOE s security function intensity is in which declared Analyze TOE presentation and make documents of identified specifics of vulnerabilities to find methods of user violating TSP 6 3 Strength of Security Functions Vulnerability assessments note Among IT security functions realized in this TOE password section which is related to the mechanism of console and GUI is the only section which can be strength analyzed using permutation Security function intensity of the relevant mechanism satisfies security function requirements of FIA_UAU 1 Authentication and FIA_UAU 4 reuse prevention mechanism and defined as function intensity medium TSonNer Ss REDOWL SecuOS V4 0 for RHEL4 ST 67 gum 7 PROTECTION PROFILE CLAIMS This section provides the PP conformance claim statements and supporting justification 71 Protection Profile Reference The TOE conforms to the following PP which made by Korea Information Security Agency The PP has made out using Criteria for Information Technology Security system the Ministry of Information and Communication Notice No 2005 25 Table 7 1 shows PP requirement in this ST Label based Access Control System Protection Profile for Government V1 1 17 May 2006 1 2 Protection Profile Refinements This ST refers and updates the part of LACSPP V
81. nd shows graphical statistics data collect ed from the integrated servers 2 3 TOE Environment and Boundary The operational environments of TOE are small sized network systems or medium sized network systems and also includes logical and physical limits TSonNer Se REDOWL SecuOS V4 0 for RHEL4 ST 9 pu 2 3 1 Environment This TOE can be used two different way when operated Firstly it can be installed to only one specific server and operate in case of small network system And secondly in case of a large scale network system which includes many servers it can be installed to many agent servers then integrated to a enterprise server and managed through it As this TOE comprises both of enterprise and agent functions there is no agent alone module When this TOE is installed to a system you should select whether this machine must be operated as an enterprise server or an agent server By setting up a REDOWL manager to the third Windows 2000 Professional system we can search for audit data collected from enterprise servers or confirm statistics information REDOWLManager MS Windows2000 Professional Integrated Manageme Router 1 REDOWL Agent RedHat 1 RedHat
82. nore auditable events except those taken by the authorized user with special rights and secure space and backup auditable events by hands if audit trail is full Dependencies STG 1 Protected audit trail storage 0 1 2 User Data Protection FDP_ACC 1 Subset access control Hierarchical to No other components FDP 1 1 The TSF shall enforce the Discretionary Access Control on subjects files users and files handling by Discretionary Access Control policy users and directories processes and files processes and directories Dependencies FDP_ACF 1 Security attribute based access control FDP ACF 1 Security attribute based access control Hierarchical to No other components _ 1 1 The TSF shall enforce Discretionary Access Control policy to objects based on the followings a the user s identification of subject b the user group s identification of subject b the list of Discretionary Access Control security attributes connected with the followings ifthe user s identification is higher than or same the object s security level the operation is permitted ii if the user group s identification is higher than or same the object s level the operation is permitted the operation permit value is decided by the subject identification FDP ACF 1 2 The TSF shall enforce the followings rules to determine if an operation among
83. nt of functions primary specifications and detailed specifications for the conformity analysis Statement functions Primary specifications Detailed specifications Verification statement TSonNer REDOWL SecuOS V4 0 for RHEL4 ST Assurance class Assurance components Assurance methods Assurance measures User document AGD ADM Provide administrator s manual for the system administrator Administrator s manual AGD USR 1 Provide user manual of security functions for general users TOE utilizations User manual Life cycle support ALC _DVS 1 Describe physical procedural human and security concerning counterplans needed for protecting the confidentiality and the integrity of TOE designing and implementing processes Document identifications for developing tools of TOE implementations of developing tools and selection specifics of accessory options Life cycle application ATE_COV 2 Offer of test scope analysis ATE DPT2 Offer of test detailed analysis ATE_FUN 1 Documentation of TSF test results Test note ATE_IND 2 Offer of security function specifics TOE Vulnerability assessment AVA MSU 1 The manuals should be well defined consistent complete and reasonable about every operations of TOE Administrator s manual User s manual SOF I AVA VLA 2 Perform ana
84. nt that are relevant to the administrator AGD USR 1 User guidance Dependencies ADV_FSP 1 Informal functional specification TSonNer Es REDOWL SecuOS V4 0 for RHEL4 ST 42 guru Developer action elements AGD_USR 1 1D The developer shall provide user guidance Evidence elements AGD_USR 1 1C The user guidance shall describe the functions and interfaces available to the non administrative users of the TOE AGD USR 1 2C The user guidance shall describe the use of user accessible security functions provided by the TOE AGD USR 1 3C The user guidance shall contain warnings about user accessible functions and privileges that should be controlled in a secure processing environment USR 1 4C The user guidance shall clearly present all user responsibilities necessary for secure operation of the TOE including those related to assumptions regarding user behavior found in the statement of TOE security environment AGD USR 1 5C The user guidance shall be consistent with all other documentation supplied for evaluation AGD USR 1 6C The user guidance shall describe all security requirements for the IT environment that are relevant to the user 9 2 5 life cycle support ALC DVS 1 Identification of security measures Dependencies No dependencies Developer action elements DVS I 1D The developer shall produce development security documentation Evidence e
85. nts MTD 1 1 The TSF shall restrict the ability to change defualt query modify delete clear create TSF data associated with security except the TSF data mentioned above to the authorized user Dependencies FMT SMR 1 Security roles SMF 1 Specification of management functions FMT REV 1 1 Revocation User Hierarchical to No other components FMT REV 1 1 The TSF shall restrict the ability to revoke security attributes associated with the users within the TSC to the authorized user FMT REV 1 2 The TSF shall enforce the following rules 3 TSF shall revoke immediately the authentication associated with security b The authorized user can revoke the processes created by users Dependencies FMT SMR 1 Security roles FMT REV 1 2 Revocation Object TSonNer mee REDOWL SecuOS V4 0 for RHEL4 ST 33 pu Hierarchical to No other components The TSF shall restrict the ability to revoke the security attributes associated with the objects within the TSC to the authorized user The TSF shall enforce the following rules revoke access control associated with objects the TSF shall do when checks the access permission of objects b The authorized user can revoke by force of the files created by users Dependencies FMT SMR 1 Security roles FMT SMR 1 Security roles Hierarchical to No other components FMT SMR 1 1 The TSF s
86. nvert security audit data into MS Office s Excel file format The inquiry function of each Agent server operates as follows Security administrator performs the inquiry function using the integrated management The integrated management delivers commands to the console management to inquire contents of security audit log then read in ASCII text files of security audit data from the console management then transmits them to the integrated management It can trail real time audit log data from every Agent servers which are registered to the integrated management server and operates as follows Security administrator can trail real time security audit by executing real time tracing function of the integrated management It can performs real time auditing on a single Agent server of a number of servers using security management Audit data analysis function is to investigate the existence of hacking attacks internally or externally by process by user and conditional search is also practicable Security administrator can modify the field information of audit data to print out And security data can also be converted TSonNer Bes UE REDOWL SecuOS V4 0 for RHEL4 ST 51 pu to MS Office s Excel file format Statistics of audit data function 15 to print out statistics data of audit records collected from the whole Agent server by server by process by user or by message Security administrator can choose the output cy
87. omponents FDP ITC 1 1 The TSF shall enforce Mandatory Access Control policy when importing user data controlled under Mandatory Access Control policy from outside of the TSC FDP 1 2 The TSF shall ignore any security attributes associated with the user data when imported from outside the TSC FDP ITC 1 3 The TSF shall enforce the following rules when importing user data controlled under the Mandatory Access Control policy from outside the TSC when an authorized user imports an user data from outside the TSC he must give the security label to the data b control by Mandatory Access Control policy Dependencies FDP_ACC 1 Subset access control FDP IFC 1 Subset information flow control FMT_MSA 3 Static attribute initialization FDP_RIP 1 Subset residual information protection Hierarchical to No other components IFDP_RIP 1 1 The TSF shall ensure that any previous information content of a resource is made unavailable upon de allocation of the resource from the following objects files or directories labeled Dependencies No dependencies 9 1 3 Identification and Authentication FIA AFL 1 Authentication failure handling Hierarchical to No other components FIA AFL 1 1 The TSF shall detect when 3 unsuccessful authentication attempts occur related to every authentication FIA AFL 1 2 When the defined number of unsuccessful authen
88. ontrol regulations provided from RHEL4 OS to which this TOE is installed This TOE supports Mandatory Access Control Discretionary Access Control and Access Control list Firstly applied access control is Discretionary Access Control and the next one 1s Mandatory Access Control Lastly Access Control List is applied Although ACL 15 the last applicable access control ACL has the highest authority If rules of DAC or MAC are conflicting with ones of ACL those rules of DAC or MAC are ignored while ACL s rules are applied DAC is implemented as follows Perform access control based on identities of subjects and objects which OS manages ACL Access Control List REDOWL SecuOS access controls using MAC making use of security attributes DAC and ACL Access control list is configured by security administrator every events which violated the security policy are recorded to the security audit data ACL has the lower priority than MAC TSonNer as REDOWL SecuOS V4 0 for RHEL4 ST 54 pu provided by this TOE and has the higher priority than DAC provided from OS If rules of MAC are conflicting with rules of ACL rules of ACL come before rules of MAC ACL is implemented in six ways as follows Providing list to limit executive files only to registered IP addresses or users to execute them Providing list to restrict files and directories of the system only to registered IP addresses or users to access them Providing list of e
89. onvenient use of TOE installed in RHEL4 system the security administrator can install GUI Graphic User Interface in MS Windows system and control RHEL4 system s TOE on remote access TOE security kernel provides following security functions Firstly it allows security labels to subjects and objects of the system to prevent violation attempts on the resources By this labeling it provides MAC Mandatory Access Control and Multi label based access control functions Secondly TOE provides also Discretional Access Control DAC which provided by common operating systems Thirdly TOE performs firm access controls by providing access control lists toward system resources of an organization This TOE can serve as an integrated server and an agent server as well So it is possible to install this TOE to a server to manage from an integrated server and collect log or valuable data to the integrated server and control them The integrated server can distribute security policies to connected agent servers and also can collect main information of agent servers Also it provides Trusted channels between TOEs by using OpenSSL and trusted timestamps of system are provided by controlling the time change of the system This TOE has integrated management function to provide more easy to use interface to the se curity administrators The integrated management function has all the options used in integrated se rver system to control the connected servers to it a
90. or Linux systems gt SCSI adaptor SCSI adaptors compatible to IBM PCs or Linux systems gt CD ROM drive CD ROM drives compatible to IBM PCs or Linux systems 2 3 3 TOE Logical Boundary and Functions The evaluation extent of this TOE limits to 4 main components The encryption algorithm used TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 11 between main components is SHA 1 and the security protocol of socket communication between internal and external interface is SSL The encryption algorithm and security protocol used in this TOE 15 not included for this evaluation Figure 2 2 shows the range of TOE and grayed section represents the evaluation target The main components of TOE include LKM PAM CUI and GUI As the core component LKM performs MAC Mandatory Access Control detecting hacking attacks by tracing root privileged daemon processes prevention mechanism of resource reuse and controls executions of system commands by users or IP addresses by managing extra access control lists And LKM also collects and generates audit data for every security events PAM which provides user authentication function is loadable authentication module presented by OS PAM presents the capability and flexibility of various authentication services for system administrator to choose and perform them By using PAM various functions such as user password combination rule password expiration period set up prohibition of identical password re
91. orea REDOWL SecuOS V4 0 for RHELA is OS based secure OS solution prevents unlawful behaviors and events from attackers and handles them well This ST identifies threats assumptions and organization s security policies Label based Access Control System and includes the system s security goals and requirements The PP is intended to provide moderate level of protection The assurance requirements EAL3 and the minimum strength of function were chosen to be consistent with that level of risk 1 3 CC Conformance Claims This ST has followed the bellows LACSPP Label based Access Control System Protection Profile for Government V1 1 TSonNer Sas REDOWL SecuOS V4 0 for RHEL4 ST 2 pomum Common Criteria for Information Technology security system Ministry of Information Communication Notification No 2005 25 V2 3 Part 2 Conformant Common Criteria for Information Technology security system Ministry of Information Communication Notification No 2005 25 V2 3 Part 3 conformant Y This ST is the CC Part3 EAL3 assurance requirements conformant and additional assurance requirement ADV IMP 2 LLD ALC TAT l ATE DPT 2 AVA VLA 2 for government conformant Consequently assurance requirement 15 following the EAL3 This ST has followed the function strength of PP 14 Organization of the Security Target This document is organized by the follow Chapter 1 Introduction Introduces TOE document identify overv
92. quirement Exceptionally O Inspection of deficient codes is handled by assurance requirements Each TOE security requirements is handled by at least one TOE security objective Table 8 5 Security objectives to the security requirements mappings _ 1 FDP_ACF 1 FDP_IFC 1 FDP_IFF 2 TSonNer Trusted Systems on the Net S REDOWL SecuOS V4 0 for RHEL4 ST 77 mmm FDP ITC 1 FDP FIA_AFL 1 FIA_ATD 1 FIA_SOS 1 FIA_UAU 1 UAUA FIA UAU 7 UID 2 FIA_USB 1 FMT MOF 1 FMT_MSA 1 1 FMT_MSA 1 2 FMT_MSA 3 1 FMT_MSA 3 2 FMT_MTD 1 1 FMT_MTD 1 2 FMT_MTD 1 3 FMT_MTD 1 4 FMT_REV 1 1 FMT_REV 1 2 FMT_SMR 1 FMT_SMF 1 FPT_AMT 1 RVM I SEP STM 1 TST I SSL 1 FTP TSonNer Trusted Systems on the Net REDOWL SecuOS V4 0 for RHEL4 ST Sa 78 pu Table 8 6 Security objectives to TOE security function requirements mappings Security objectives Security requirements Rationale O Audit Record _ 1 FAU GEN 1 _ 2 FAU_SAA 1 _SAR 1 FAU_SAR 2 _SAR 3 FAU_SEL 1 _STG 1 FAU_STG 3 _STG 4 FPT_STM 1 This security objective satisfies security requirements with the detection for the disclosure o
93. r loss of whole audit data At the moment FTP _STM 1 provides the reliable time stamps to audit information Also the security objective assures the integrity and confidentiality to the important audit data by TSF through the prevention function and access control function of audit information If some problems occurs in the audit information the alarm is sounded by FAU_ARP 1 FDP_IFC 1 FDP_IFF 2 FMT_MSA 1 2 FMT_MSA 3 2 FDP_IFC 1 FDP_IFF 2 provide the policy of Mandatory Access Control and assure that the authorized user controls MAC policy through the FMT MSA 1 1 FMT 5 3 1 O Management FMT MOF 1 FMT MSA 1 2 FMT_MSA 3 2 FMT MTD 1 2 F F F MT MTD 1 4 REV 1 2 MT _ 1 FIA UAU 1 UID 2 FMT_MSA 1 1 FMT_MSA 3 1 FMT_MTD 1 1 FMT_MTD 1 3 FMT_REV 1 1 FMT_SMR 1 FPT_ITC 1 FPT_ITC 1 supports the trusted channels to TOE The user who is identified by FIA_UAU 1 FIA_UID 2 manages the security functions thorough the FMT MOF 1 and FMT 5 1 components The authorized user or the owner of objects use FMT MSA 1 to manage DAC and MAC polices FMT MTD is used for managing the audit data the identification authentication TSF data FMT REV 1 2 is used for the security attributes of revocation O Data protection SSL 1 FIA UAU 1 UID 2 AMT 1 1 The user who is identified by FIA_UAU 1 FIA_UID 2 executes
94. rance requirements not contained in Part 3 of the CC TOE Security Function TSF A set consisting of all hardware software and firmware of the TOE that must be relied upon for the correct enforcement of the TSP TOE Security Policy TSP A set of rules that regulate how assets are managed protected and distributed within a TOE TSF Data Data created by and for the TOE that might affect the operation of the TOE TSF Scope of Control TSC The interactions that can occur with or within a TOE and are subject to the rules of the TSP Multi Level Security MLS The application of a computer system to process information with different sensitivities i e classified information at different security levels permit simultaneous access by users with different security clearances and needs to know and prevent users from obtaining access to information for which they lack authorization Bell amp Lapadula Model BLP Model This model is a formal state transition model of computer security policy that describes a set of access control rules which use security labels on objects and clearances for subjects Security labels range from the most sensitive e g Top Secret down to the least sensitive e g Unclassified or Public The Bell LaPadula model focuses on data confidentiality and access to classified information in contrast to the Biba Integrity Model which describes rules for the protection of data integrity
95. results changed during infracting integrity Locks session by session locking mechanism releases the lock The troubles of secure channel and the identification of subject or user to the secure channel The TSF shall record within each audit record at least the following a Date of time of the event type of event subject identity and the outcome success or failure of the event and b For each audit event type based on the auditable event definitions of the functional components included in the PP ST referring Table 5 2 Auditable events relevant information on events when the security administrator gets the security administrator privileges events when users gets the system privileges events when the security functions detect intrusions events when the security handles security functions and logs about users commands history Dependencies FPT STM 1 Reliable time stamps FAU GEN 2 User identity association Hierarchical to No other components GEN 2 1 The TSF shall be able to associate each auditable event with the identify of the user that caused the event Dependencies FAU GEN 1 Audit data generation FAU SAA 1 Potential violation analysis Hierarchical to No other components TSonNer Sa REDOWL SecuOS V4 0 for RHEL4 ST 22 prom 11 The TSF shall be able to apply a set of rules in monitoring the audited events and based upon these rules indic
96. rform searches sorting of audit data based on the followings a user identification b object identification subject s label d Object s label e The time of data collecting f Validity user ID g Saved user ID h fsuid TSonNer REDOWL SecuOS V4 0 for RHEL4 ST aa bb cc dd Co device number 1 number process ID number Intrusion detection by setuid program Intrusion detection by setgid program External intrusion detection by daemon Login time User ID being input Shell program execution detection Present process name Parents process name The original process parents name of process File type root directory present directory security level present security category security category present message type message IP address Serviced port number Same data counts Dependencies FAU SAR 1 Audit review FAU SEL 1 Selective audit Hierarchical to No other components SEL 1 1 TSF shall be able to include or exclude auditable events from the set of audited events based on the followings attributes a b c d e f g h i j user identification object identification subject s label Object s label The time of data collecting Validity user ID Saved user ID fsuid device number inode number TSonNer REDOWL SecuOS V4 0 for RHEL4 ST k D m n q 5 t u v w x y 2 bb
97. rivilege I privilege and A privilege for processes information flow control IFF 2 5 The TSF shall explicitly authorize an information flow based on the following rules permitted explicitly an information flow based on security attributes FDP IFF 2 6 the TSF shall explicitly deny an information flow based on the following rules denied explicitly an information flow based on security attributes IFDP_IFF 2 7 The TSF shall enforce the following relationships for any two valid security labels a There exists an ordering function that given two valid security labels determines the following security labels are equal one security label is greater than the other security labels are incomparable and b There exists a LUB least upper bound in the set of security label such that given any two valid security labels there is a valid security label that is greater than or equal to the two valid security labels and c There exists a GLB greatest upper bound in the set of security labels such that given any two valid security labels there is a valid security label that is not greater than the two valid security labels Dependencies FDP_IFC 1 Subset information flow control TSonNer pom REDOWL SecuOS V4 0 for RHEL4 ST 28 guum FMT_MSA 3 Static attribute initialization FDP ITC 1 Import of user data without security attributes Hierarchical to No other c
98. rized administrators to manage TOE efficiently O Data protection O Allowance of security labels TOE should protect TSF data or secured data which is stored in TOE from unauthorized exposure modification and removal TOE should have capability of allowing or canceling of security labels in accordance with the organization s access control policies and procedures information O Identification and Users should be identified only by TOE and only authenticated users authentication should be able to access to TOE by authentications of user identities O Discretionary TOE should have capability of controlling accesses toward resources by Access Control identities of users or user belonged groups O Self protection of When TOE starts it should protect TOE itself from modification functions inactivation and by passing attempts of security functions O Removal of the rest To prevent the reuse of objects resources TOE should remove information in case of resource reuse TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 18 4 2 Security objectives to TOE environment System s security administrator should guarantee the efficient usage and management of auditing function Security purpose for the environment is divided into the security purpose for the identical environment to LACSPP and security purpose for the additional environment 42 1 Same security objectives to TOE environment with LACSP
99. rized administrators should manage TOE in secure way Encryption algorithm and modules to be used in TOE should be approved by the head of National Intelligence Service P Discretionary TOE should have capability of controlling accesses toward information by Access Control identities of users or user belonged groups 891 Added security policy of the organization PA SSL Certificate TOE should generate and manage SSL certificates in secure way management TSonNer Trusted Systems on the Net REDOWL SecuOS V4 0 for RHEL4 ST 17 4 SECURITY OBJECTIVES 4 1 Security objective of TOE Security information of a user is generated added modified and removed by security administrator and security information contains security attributes as follows TOE should record and maintain security events and provide measures to O Audit Record investigate recorded data for clearing up the responsibilities of security activities O Mandatory Access TOE should have capability of controlling accesses toward objects by the Control basis of subject s security labeling Investigations on developed codes should be operated to confirm if there O Inspection of deficient codes is a fault on it Inspections on deficient codes should be executed to figure out the possibility of influences on TOE s compositions DU Managerment TOE should present management measures in a secure way for autho
100. s resistant to obvious penetration attacks TSonNer REDOWL SecuOS V4 0 for RHEL4 ST N 5 3 IT Security Requirements to Environment The IT security requirements to environment in the TOE is the following STM 1 Reliable time stamp Hierarchical to No other components STM 1 1 The TSF shall be able to provide reliable time stamps for its own use Dependencies No dependencies FTP ITC 1 Inter TSF trusted channel Hierarchical to No other components FTP ITC 1 1 The TSF shall provide a communication channel between itself and a remote trusted IT product that is logically distinct from other communication channels and provides assured identification of its end points and protection of the channel data from modification or disclosure ITC 1 2 The TSF shall permit TSF to initiate communication via the trusted channel FTP ITC 1 3 The TSF shall initiate communication via the trusted channel for the remote management function Dependencies No dependencies TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 6 TOE SUMMARY SPECIFICATION 6 1 IT Security Functions Co TOE s security functions are consisted of 23 functions Table 6 1 shows requirements of security functions Table 6 1 TOE security functions and requirements for security functions Class of security function Security functions Requirements for security functions
101. security function shall associate activated subjects with users since it maintains the lists of user s identification user s group security label authentication data to users IA 3 Verification of confidential information IA 4 Identification and authentication SOS 1 FIA_UAU 1 UID 2 FMT SMR 1 FIA UAUA The security function provides the verification mechanism to the secrets that the changing cycle and setting rule of authentication data user who accesses to TOE gets permission throughout the process of authentication and identification IA 5 Authentication feedback protection FIA UAU 7 The security function limits and encrypts the feedback of authentication to the input window with display view for the security label to prevent using authentication data by stealth during user authentication SM 1 Security functions management FMT MOF 1 FMT SMR 1 FMT SMF 1 The authorized user has abilities that he decides stops initiates changes various functions for security management SM 2 Security attributes management SM 3 TSF Data management PT 1 Abstract machine testing FMT_MSA 1 1 FMT MSA 1 2 FMT_MSA 3 1 FMT_MSA 3 2 F F F MT_REV 1 1 MT_REV 1 2 MT_SMF 1 MT_MTD 1 2 MT_MTD 1 3 MT_MTD 1 4 FPT_STM 1 MT_SMF 1 F F F F FPT AMT 1 The security function can restrict owner or authorized user not to change and query t
102. shall document procedures for delivery of the TOE or parts of it to the user ADO DEL 1 2D developer shall use the delivery procedures Evidence elements ADO DEL I 1C The delivery documentation shall describe all procedures that are necessary to maintain security when distributing versions of the TOE to a user s site ADO_IGS 1 Installation generation and start up procedures Dependencies AGD ADM 1 Administrator guidance Developer action elements ADO IGS 1 1D The developer shall document procedures necessary for the secure installation generation and start up of the TOE Evidence elements ADO IGS 1 1C The installation generation and start up documentation shall describe all the steps necessary for secure installation generation and start up of the TOE 5 2 8 Development ADV FSP 1 Informal functional specification Dependencies ADV RCR I Informal correspondence demonstration Developer action elements ADV_FSP 1 1D The developer shall provide a functional specification Evidence elements ADV_FSP 1 1C functional specification shall describe the TSF and its external interfaces using an informal style ADV FSP 1 2C functional specification shall be internally consistent TSonNer SS REDOWL SecuOS V4 0 for RHEL4 ST 39 pul ADV FSP 1 3C The functional specification shall describe the purpose and method of use o
103. ter or inquire agent server information which is controlled by the integrated management server This functions 15 to manage information such as IP address of agent server DNS name OS version whether or not REDOWL SecuOS is being performed Agent server management can be implemented by authorized security administrators and through integrated management and following three console management commands are provided for the implementation Inquire server information of itself Inquire server information of a remote server Add Modify Delete server information of agent server from integrated management server System user inquiry function is to inquire the information of users who are using the OS system By this function information such as user ID who connected to the system terminal IP address and access time can be inquired The next two CUI based commands are provided at console management and these commands are available to security management and integrated management Inquire user information which 1 connected to the corresponding agent server Inquire user information by connecting to the agent server which are registered to the integrated management server Remote command execution function is to execute discretionary OS commands from the designated agent server remotely and to bring in the result of execution Remote command execution function can be operated by security administrator and the integrated
104. the abstract machine testing using _ 1 takes actions to the errors for the TSF testing and the TSF data integrity O Allowance of FMT_MSA 1 2 Security labels FMT_MSA 3 2 FMT_REV 1 1 FMT_REV 1 2 The authorized user manages MAC policies through FMT MSA 1 2 and FMT_MSA 3 2 and removes the security attributes through the FMT REV 1 O Identification and Authentication AFL 1 FIA_ATD 1 FIA SOS 1 UAU 1 FIA_UAU 4 FIA_UAU 7 FIA_UID 2 FIA_USB 1 The TOE shall identify whole users and objects through FIA UID 2 FIA_USB 1 and assures the trusted identification and authentication through FIA UAU 1 FIA_UAU 4 and FIA _UAU 7 not to authentication data reuse TSonNer REDOWL SecuOS V4 0 for RHEL4 ST Security objectives Security requirements Rationale O DAC FDP_ACC 1 ACF 1 FDP 1 configures the coverage of DAC security policy The DAC security policy identified by FDP_ACF 1 is performed O Self protection Of functions FPT_AMT 1 FPT_RVM 1 The TOE can check the accuracy SEP 1 TST 1 operation of abstract machine through to protect Oneself 1 prevents the bypassing attack 1 prevents the fundamental attack through the FPT SEP 1 which separates the security domain non security domain FPT TST 1 2 provides the integrity to the securi
105. tication attempts has been met or surpassed the TSF shall display warning message stop the function of user authentication for 5minutes and generate audit data to the event Dependencies UAU 1 Timing of authentication FIA ATD 1 User attribute definition Hierarchical to No other components TSonNer Se REDOWL SecuOS V4 0 for RHEL4 ST 29 puce ATD 1 The TSF shall maintain the following list of security attributes belonging to individual users a user identification b group identification belonging the user security label d authentication data Dependencies No dependencies FIA SOS 1 Verification of secrets Hierarchical to No other components SOS 1 1 The TSF shall provide mechanism to verify that secret meet the 6 8 of combined numeric English alphabet and wild key such as and the changing secrets by period Dependencies No dependencies Attention when apply The minimum password length the rule of combining and the changing period can be changed in password authentication mechanism FIA UAU 1 Timing of authentication Hierarchical to No other components UAU 1 1 The TSF shall allow the list of following Jon behalf of the user to be performed before the user 15 authenticated a Verification of user s clearance and category b Change of user s security label FIA UAU 1 2 The TSF shall
106. ty information and TSF function FTA_SSL 1 provides the self protection function through the locking user s non activity period O Rest information FDP RIP 1 When the object is allocated to resources the TOE assures that the objects does not use prior information 8 2 2 TOE assurance requirements rationale The assurance level of ST 15 for EAL3 based on considering the assets threat level and SOF level to TOE The following components are added to EAL3 assurance requirements IMP2 Implementation of the TSF ADV LLD 1 Descriptive low level design TAT 1 Well defined development tools ATE DPT 2 Testing low level design AVA VLA 2 Independent vulnerability analysis The O Inspection of deficient codes in security objectives checks program codes made by developers whether them have deficient codes or not ADV IMP 2 and ATE DPT 2 components are added because of inspecting that the deficient codes are effected to the TOE internal subsystems By The dependency of ADV IMP 2 ADV LLD 1 and ALC TAT 1 are added AVA VLA 2 is added because the TOE needs vulnerability testing by developer and evaluator TSonNer ences REDOWL SecuOS V4 0 for RHEL4 ST 80 Sa 8 2 3 IT environment requirements rationale The ST has two security objectives Time Stamp SSL Protocol for IT environment Table 8 6 1 depicts the rationale of security requirements for IT environment Table 8 6 1
107. uditable events FAU SAA 1 FAU SEL 1 FDP ACF 1 Start up and shout down analysis audit functions and reactions automatically Audit environment configurations changed during activating audit collection functions Successful requirements of operations About objects TSonNer Trusted Systems on the Net REDOWL SecuOS V4 0 for RHEL4 ST FDP 2 FDP ITC 1 FIA AFL 1 FIA SOS 1 FIA UAU I FIA UAUA FIA UID2 FIA USB 1 FMT MOF 1 FMT MSA 1 FMT MTD 1 FMT REV 1 FMT SMF 1 FPT STM 1 FPT_TST 1 FTA_SSL 1 FTP ITC 1 FAU GEN 1 2 controlled by SFP information Subjects labels Decisions about permitting information flow P Objects names and labels Successful inputs to user data Including security attributes TSF detects when meets maximum unsuccessful authentication attempts number and recovers normal state Denial secrets information testing by TSF The failure of authentication mechanism Attempts reusing authentication data The failure of user identification mechanism including user Users identifications identity provided to TOE Linking between user security attributes and subject All changes for TSF function All changes for security attributes Changed Security attributed All changes for TSF data values Changed TSF data value Revocation attempts about security attributes Using management function Change for time TSF data or execution code Execution of TSF self test and test
108. urity administrator inquire or configure the information of clearance and category of all processes executed in an agent server Security policy management function is used to transmit security policy data of the integrated management server to a remote agent server or to configure security policy to the security kernel Security policy management can be operated by a security administrator or the integrated management and the console management provides following 2 types of CUI based commands for the security policy transmission and the security policy configuration TSonNer rene REDOWL SecuOS V4 0 for RHEL4 ST 61 pol Transmit security policy files from the integrated management server to agent server registered to the management server selectively X Configure security policies of the security policy file to security kernel User account of the OS management function is to manage the minimum usage period the maximum usage period the inactivated period the expiration date and the warning date of an user account This function can be used by the security administrator and the integrated management and following CUI based command is provided OS user account management Password management for OS accounts is to lock out release and modify delete user passwords This function can only be operated by the authorized security administrator Following CUlI based management commands are provided for this function
109. use user log in time zone set up and log gathering of various authentications are provided CUl Character User Interface is the interface between security administrator GUI Graphic User Interface and LKM By using CUI it is able to operate the activation and termination of REDOWL system setting up and inquiry of security information or audit data For the secure channel formation CUI use security protocol of SSL GUI Graphic User Interface provides graphical interface to REDOWL administrator GUI performs the same functions as CUI component and those commands called by GUI are conducted through CUI subsystem And separately from CUI GUI presents statistics and analysis for audit data For the secure channel formation GUI use security protocol of SSL TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 12 Integrated Management User Application Security User Admin login 2 Console Management logi xS 2 o 2 System Call Interface gt EKM Anii Audit c Hacking x Process Memory Device Management Management File Systems Control Networking Hardware Resource Figure 2 2 Scale of TOE The followings are main security functions of TOE A Security Audit Successes and failures of security events on TOE are recorded to the strictly separated storing space sequential
110. xecutable commands through web server processes when web services are provided by OS Providing list of communication ports to control communication ports connected to external users Providing list of privileged processes to make the processes executed without being controlled by MAC Providing list of access control based on the user s role Providing list of demon processes executed with super user privilege RDP Residual Data Protection This TOE should provide functions of not allowing the reuse of information allocated to subjects or objects TSF of TOE hooks unlink system call of OS to make resource information unusable when withdrawing security level setup files from memory It calls out original system call if there is access privilege for the object directory And also it operates the functions of object reuse prevention by initializing unlinked file fields TSonNer as REDOWL SecuOS V4 0 for RHEL4 ST 55 6 1 3 Identification and Authentication Identification and authentication is divided into 5 security functions 5 security functions are IA l Authentication failure adjustment IA 2 User property definition IA 3 Verification of confidential information 4 Identification and authentication and 5 Protection of authentication feedback Authentication data used in identification and authentication is provided in form which 1s suitable to EAL 3 and assured in the vulnerabilit
111. y analysis note through the analysis method of probability and permutation Identification and authentication are divided to telnet user s authentication and security administrator s authentication Both authentications use probability and permutation mechanism JA l Authentication failure adjustment Authentication failures are adjusted through user authentication functions User authentication function is to distinguish if external users are normal users for the system or not and identification and authentication is the major roles When a user attempts to log in user authentication module should perform as follows At the early stage of authentication module it collects the service information terminal information and IP address of client which the external user uses Investigate whether the effective account or not by getting input of user ID and password for user authentication Certify whether the right user or not by comparing the input password with the OS shadow file s content Lock out the user account for 5 minutes after the number of failed attempts which security administrator configured in advance A 2 Definition of user identity User control function is to inquire general information and security attributes assigned to users or to configure them The information managed in this function are user ID username the highest clearance the lowest clearance default clearance category the date of se
112. y policies of secure OS Offer of secure paths and channels for TOE TOE activates its own screen saver when authorized administrators don t perform any function for the set up time and the password is needed on resume By doing this it 1s possible to control unauthorized users illegal accesses TSonNer REDOWL SecuOS V4 0 for RHEL4 ST 14 3 TOE SECURITY ENVIRONMENT Security environment of TOE consists of supposed cases to which describes security of TOE environment possible threats to TOE resources of environment and an organization s security policies such as regulations procedures customs or guidelines which TOE should consider for the security reasons 3 1 Assumptions Supposed cases are descriptions about the security environment that TOE is implemented or should be implemented in the future Supposed cases are classified into cases identical to LACSPP and additional cases 3 1 1 Same assumptions which are identical to LACSPP A Physical security TOE is placed in a physically secured environment and protected from unauthorized physical modification A Trusted administrator Authorized administrators of TOE are not ill willed users and educated with TOE management functions and perform their duties appropriately according to administrator s guidelines A Hardened OS By removing OS services or tools not need by TOE it is possible to reinforce vulnerabilities of OS and reliabi

Download Pdf Manuals

image

Related Search

Related Contents

STD-406 STEP Motor driver User manual  Standard Power Pack P25 Manual  A Taste of ESPRESSO or How to Use The San Pedro Martir REOSC  Turnitin Moodle® Integration Instructor User Manual  User Manual Villa type  Institut Régional «A. Gervasone».  InLine Mountable Double-Head Ties    DVR ED2916 - Advanced Technology Video  取扱・取付  

Copyright © All rights reserved.
Failed to retrieve file