Skip to content

Commit b76b4a1

Browse files
author
Jenn Honkofsky
committed
Building for CC:2022
1 parent 91fd0b7 commit b76b4a1

File tree

1 file changed

+33
-40
lines changed

1 file changed

+33
-40
lines changed

input/PSD-UA.xml

Lines changed: 33 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -484,7 +484,7 @@
484484
USB devices (recognized or not recognized).<h:br/><h:br/>
485485
Perform this test for an unauthorized device presenting itself as a composite device, a USB camera, a USB
486486
audio headset, a USB printer, a USB keyboard, a USB wireless dongle, and any device listed on the PSD UA
487-
blacklist.<h:br/><h:br/>
487+
denylist.<h:br/><h:br/>
488488
Repeat this for each user authentication TOE peripheral interface.<h:ol>
489489
<h:li>Ensure the TOE is powered off and connected to a computer. Run USB analyzer software and open
490490
the real‐time hardware console on the connected computer, and connect a USB sniffer to the
@@ -504,7 +504,7 @@
504504
This test verifies that the TOE ports do not reject authorized devices and devices with authorized protocols
505505
as per the Peripheral Device Connection Policy.<h:br/><h:br/>
506506
Perform this test for a USB device identified as User Authentication and any device listed on the PSD UA
507-
whitelist:
507+
allowlist:
508508
<h:ol>
509509
<h:li>Ensure the TOE is powered off.</h:li>
510510
<h:li>Connect the authorized device to the TOE peripheral interface.</h:li>
@@ -637,10 +637,10 @@
637637
</consistecny-rationale>
638638

639639
<comp-lev>requires the TSF to specify the method of device filtering used for
640-
peripheral interfaces and defines requirements for handling whitelists and blacklists.</comp-lev>
640+
peripheral interfaces and defines requirements for handling allowlists and denylists.</comp-lev>
641641
<management>The following actions could be considered for the management functions in
642642
FMT:<h:ul>
643-
<h:li>Ability to configure whitelist/blacklist members</h:li>
643+
<h:li>Ability to configure allowlist and denylist members</h:li>
644644
</h:ul>
645645
</management>
646646
<audit>The following actions should be auditable if FAU_GEN Security audit data generation
@@ -715,13 +715,13 @@
715715
The evaluator shall examine the TSS and verify that it describes whether the PSD has configurable or fixed
716716
device filtering.<h:br/><h:br/>
717717
[Conditional – If “configurable” is selected in FDP_FIL_EXT.1.1/UA, then:] The evaluator shall examine the
718-
TSS and verify that it describes the process of configuring the TOE for whitelisting and blacklisting UA
718+
TSS and verify that it describes the process of configuring the TOE for allowlisting and denylisting UA
719719
peripheral devices, including information on how this function is restricted to administrators.
720720
</TSS>
721721
<Guidance>
722722
[Conditional – If “configurable” is selected in FDP_FIL_EXT.1.1/UA, then:] the evaluator shall examine the
723-
guidance documentation and verify that it describes the process of configuring the TOE for whitelisting
724-
and blacklisting UA peripheral devices and the administrative privileges required to do this.
723+
guidance documentation and verify that it describes the process of configuring the TOE for allowlisting
724+
and denylisting UA peripheral devices and the administrative privileges required to do this.
725725
</Guidance>
726726
<Tests>
727727
<testlist>
@@ -734,12 +734,12 @@
734734
[Conditional: Perform this only if “configurable” is selected in FDP_FIL_EXT.1.1/UA]<h:br/><h:br/>
735735
In the following steps the evaluator shall verify that allowlisted and denylisted devices are treated
736736
correctly.<h:ol>
737-
<h:li>Configure the TOE UA CDF to whitelist an authorized user authentication device, connect it to the
737+
<h:li>Configure the TOE UA CDF to allowlist an authorized user authentication device, connect it to the
738738
TOE UA peripheral device interface, and verify that the device is accepted through real‐time device
739739
console and USB sniffer capture.</h:li>
740-
<h:li>Configure the TOE UA CDF to blacklist the device and verify that the device is rejected through
740+
<h:li>Configure the TOE UA CDF to denylist the device and verify that the device is rejected through
741741
real‐time device console and USB sniffer capture.</h:li>
742-
<h:li>Attempt to configure the TOE UA CDF to both whitelist and blacklist the device and verify that the
742+
<h:li>Attempt to configure the TOE UA CDF to both allowlist and denylist the device and verify that the
743743
device is rejected through real‐time device console and USB sniffer capture.</h:li>
744744
</h:ol>
745745
</test>
@@ -1163,16 +1163,17 @@
11631163
</section>
11641164

11651165
<section title="Unauthorized Peripheral Devices">
1166-
The following are unauthorized devices and device classes:<h:ul>
1167-
<h:li>USB audio input device connected to a KM peripheral interface</h:li>
1168-
<h:li>USB audio output device connected to a KM peripheral interface</h:li>
1166+
The following are unauthorized devices:<h:ul>
1167+
<h:li>USB device that is denylisted</h:li>
1168+
<h:li>USB audio input device connected to a user authentication peripheral interface</h:li>
1169+
<h:li>USB audio output device connected to a user authentication peripheral interface</h:li>
11691170
<h:li>USB camera</h:li>
1171+
<h:li>USB keyboard connected to a user authentication peripheral interface</h:li>
11701172
<h:li>USB printer</h:li>
1171-
<h:li>USB user authentication device connected to a TOE keyboard/mouse peripheral interface</h:li>
11721173
<h:li>USB wireless LAN dongle</h:li>
1173-
<h:li>Non‐HID device classes of a composite device connected to a TOE KM peripheral interface</h:li>
1174-
<h:li>Any other device not specifically authorized</h:li>
1175-
<h:li>Any other device class not specifically authorized</h:li>
1174+
<h:li>Any unauthorized device that presents itself to the PSD as a composite device and is
1175+
connected to a user authentication peripheral interface</h:li>
1176+
<h:li>Any device not specifically authorized</h:li>
11761177
</h:ul>
11771178
</section>
11781179

@@ -1183,13 +1184,9 @@
11831184
</section>
11841185
<section title="Authorized Peripheral Devices">
11851186
The following are authorized devices and functions:<h:ul>
1186-
<h:li>Barcode reader</h:li>
1187-
<h:li>Keyboard or keypad</h:li>
1188-
<h:li>Mouse, touchscreen, trackball, or trackpad</h:li>
1189-
<h:li>PS/2 to USB adapter</h:li>
1190-
<h:li>USB device identified as HID class</h:li>
1191-
<h:li>USB hub</h:li>
1192-
<h:li>HID functions of a composite device connected to a TOE KM peripheral interface</h:li>
1187+
<h:li>USB device identified as User Authentication</h:li>
1188+
<h:li>USB device that is allowlisted</h:li>
1189+
<h:li>Internal authentication device</h:li>
11931190
</h:ul>
11941191
</section>
11951192

@@ -1208,38 +1205,34 @@
12081205
per FDP_PDC_EXT.1.<h:br/><h:br/>
12091206
Authorized devices identified in both PP‐Modules are considered authorized devices for the TOE as per
12101207
the claimed iterations of FDP_PDC_EXT.2.<h:br/><h:br/>
1211-
Power events at a KM interface for one connected computer cannot impact power events at an analog
1212-
audio output interface for another connected computer and vice versa, as per FDP_APC_EXT.1. This
1213-
evaluation activity is tested in Test 3‐AO in the Supporting Document for Audio Output.<h:br/><h:br/>
1208+
Power events at a user authentication interface for one connected computer cannot impact power events
1209+
at an analog audio output interface for another connected computer and vice versa, as per
1210+
FDP_APC_EXT.1. This evaluation activity is tested in Test 3‐AO in the Supporting Document for Audio
1211+
Output.<h:br/><h:br/>
12141212
Both PP‐Modules modify the Base‐PP SFR FDP_APC_EXT.1 in ways that are specific to their respective
1215-
peripheral types. The ST author should make two iterations of this SFR, FDP_APC_EXT.1/KM and
1213+
peripheral types. The ST author should make two iterations of this SFR, FDP_APC_EXT.1/UA and
12161214
FDP_APC_EXT.1/AO, to show the different modifications made for each specific peripheral type.
12171215
</section>
1218-
<section title="PP-Module for User Authentication Devices">
1216+
<section title="PP-Module for Keyboard/Mouse Devices">
12191217
Unauthorized devices identified in both PP‐Modules are considered unauthorized devices for the TOE as
12201218
per FDP_PDC_EXT.1.<h:br/><h:br/>
12211219
Authorized devices identified in both PP‐Modules are considered authorized devices for the TOE as per
12221220
the claimed iterations of FDP_PDC_EXT.2.<h:br/><h:br/>
1223-
KM functionality must be isolated from user authentication functionality and vice versa as per
1221+
User authentication functionality must be isolated from KM functionality and vice versa as per
12241222
FDP_UAI_EXT.1.<h:br/><h:br/>
12251223
Both PP‐Modules modify the Base‐PP SFR FDP_APC_EXT.1 in ways that are specific to their respective
1226-
peripheral types. The ST author should make two iterations of this SFR, FDP_APC_EXT.1/KM and
1227-
FDP_APC_EXT.1/UA, to show the different modifications made for each specific peripheral type.
1224+
peripheral types. The ST author should make two iterations of this SFR, FDP_APC_EXT.1/UA and
1225+
FDP_APC_EXT.1/KM, to show the different modifications made for each specific peripheral type.
12281226
</section>
12291227
<section title="PP-Module for Video/Display Devices">
12301228
Unauthorized devices identified in both PP‐Modules are considered unauthorized devices for the TOE as
12311229
per FDP_PDC_EXT.1.<h:br/><h:br/>
12321230
Authorized devices identified in both PP‐Modules are considered authorized devices for the TOE as per
12331231
the claimed iterations of FDP_PDC_EXT.2.<h:br/><h:br/>
1234-
Video devices with an interface for USB Type‐C with DisplayPort as alternate function may not be
1235-
connected to a KM interface, and KM devices may not be connected to a video interface for USB Type‐C
1236-
with DisplayPort as alternate function, even though both devices are authorized devices.<h:br/><h:br/>
1237-
Video devices with an interface for USB Type‐C with DisplayPort as alternate function may not be used in
1238-
conjunction with a touchscreen peripheral device, as per FDP_PDC_EXT.2/KM and FDP_PDC_EXT.3.1/Vid.<h:br/><h:br/>
1239-
KM devices may be used with a guard in conjunction with multiple video devices, as per FDP_CDS_EXT.1
1240-
and FDP_SWI_EXT.2.<h:br/><h:br/>
1232+
Any USB‐C functionality that is supported by the TOE must be isolated from user authentication
1233+
functionality and vice versa as per FDP_UAI_EXT.1.<h:br/><h:br/>
12411234
Both PP‐Modules modify the Base‐PP SFR FDP_APC_EXT.1 in ways that are specific to their respective
1242-
peripheral types. The ST author should make two iterations of this SFR, FDP_APC_EXT.1/KM and
1235+
peripheral types. The ST author should make two iterations of this SFR, FDP_APC_EXT.1/UA and
12431236
FDP_APC_EXT.1/VI, to show the different modifications made for each specific peripheral type.
12441237
</section>
12451238
</appendix>

0 commit comments

Comments
 (0)