Skip to content

Commit 3b9bfb4

Browse files
authored
ESMEDR Builder Test 0112
1 parent d5a4ca7 commit 3b9bfb4

File tree

1 file changed

+57
-43
lines changed

1 file changed

+57
-43
lines changed

input/esm-edr.xml

Lines changed: 57 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,15 @@
134134
PP-Module.
135135
<figure entity="images/edr_overview.png" title="EDR and Host Agent Communications" id="toe_overview"/>
136136
</sec:TOE_Boundary>
137+
<sec:TOE_Platform>
138+
The TOE platform, which consists of the OS or
139+
Cloud platform on which the EDR software executes, is outside the scope of evaluation.
140+
However, the security of the EDR relies upon it.
141+
<h:p/>
142+
Any
143+
communications with trusted remote file reputation or threat intelligence services is
144+
relevant to overall EDR system security but is also outside the scope of evaluation.
145+
</sec:TOE_Platform>
137146
</section>
138147
<sec:Use_Cases>
139148
Requirements in this PP-Module are designed to address
@@ -218,6 +227,8 @@
218227
<rationale>The PP-Module includes FMT_SMR.1 to define the management roles that the TSF supports so that its management functions can be separated by role.</rationale>
219228
<addressed-by>FMT_SRF_EXT.1</addressed-by>
220229
<rationale>The PP-Module includes FMT_SRF_EXT.1 to define the remediation functions that are available to authorized users to issue corrective actions on a system that has a connected Host Agent.</rationale>
230+
<addressed-by>FMT_TRM_EXT.1 (objective)</addressed-by>
231+
<rationale>The PP-Module includes FMT_TRM_EXT.1 to provide an optional capability to ensure the integrity of management commands and policies issued to external Host Agents through use of a digital signature.</rationale>
221232
</threat>
222233
</threats>
223234
</sec:Threats>
@@ -229,6 +240,8 @@
229240
management activities. The OE will provide reliable network connectivity for the EDR to operate.
230241
The EDR will robustly handle occasional instances when
231242
connectivity is unavailable or unreliable.</description>
243+
<consistency-rationale>This assumption is consistent with the Base-PP because assuming network availability is consistent with the A.PLATFORM
244+
assumption defined by the Base-PP, which expects the TOE to have a trustworthy computing platform.</consistency-rationale>
232245
<objective-refer ref="OE.RELIABLE_TRANSIT">
233246
<rationale>The OE objective OE.RELIABLE_TRANSIT is realized through
234247
A.CONNECTIVITY.</rationale>
@@ -251,6 +264,8 @@
251264
<SOE name="OE.RELIABLE_TRANSIT">
252265
<description>Wired or wireless network traffic between the EDR and
253266
host agents will provide reasonably reliable connectivity.</description>
267+
<consistency-rationale>This objective relates to an external interface that does not exist in the Base-PP
268+
and does not affect Base-PP functionality.</consistency-rationale>
254269
</SOE>
255270
</SOEs>
256271
</section>
@@ -288,6 +303,9 @@ This section describes any modifications that the ST author must make to the Bas
288303
</base-pp>
289304
<!-- 5.2 TOE Security Functional Requirements -->
290305
<man-sfrs>
306+
<section id="sec-sel-audit-table" title="Auditable Events for Mandatory SFRs">
307+
<audit-table id="at-Man" table="mandatory"/>
308+
</section>
291309
<!-- 5.2.1 Security Audit (FAU) -->
292310
<section title="Security Audit (FAU)" id="fau-mandatory">
293311
<ext-comp-def title="Server Alerts" fam-id="FAU_ALT_EXT">
@@ -390,25 +408,10 @@ This section describes any modifications that the ST author must make to the Bas
390408
<h:p/>
391409
</Guidance>
392410
<Tests>
393-
<h:p>The evaluator shall perform the following tests:</h:p>
394-
<h:p>
395-
<h:b>For Windows,</h:b>
396-
the evaluator shall test the EDR's ability to detect
397-
anomalous activity by performing the following subtests based on the platform of
398-
the enrolled Host Agent's system, verifying for each that, corresponding alerts
399-
were generated in the management dashboard:
400-
</h:p>
401-
<h:p>
402-
<h:b>For Linux,</h:b>
403-
the evaluator shall test the EDR's ability to detect
404-
anomalous activity by performing the following subtests based on the platform of
405-
the enrolled Host Agent's system, verifying for each that, corresponding alerts
406-
were generated in the management dashboard:
407-
</h:p>
408-
<h:p>
409-
<h:b>For all platforms:</h:b>
410-
</h:p>
411+
The evaluator shall perform the following tests:
411412
<testlist>
413+
<h:b>For Windows,</h:b>
414+
the evaluator shall test the EDR's ability to detect anomalous activity by performing the following subtests based on the platform of the enrolled Host Agent's system, verifying for each that, corresponding alerts were generated in the management dashboard:
412415
<test>The evaluator shall open a Windows command prompt as a user and run the command <h:code>cmd /c certutil -urlcache -split -f &lt;remote file>
413416
&lt;download directory></h:code>, where the remote file is a valid file path to an accessible, remotely stored executable, and the download directory is a valid directory path writable by the current local user.</test>
414417
<test>The evaluator shall open a Windows command prompt as a user and run the command <h:code>reg.exe add hkcu\software\classes\mscfile\shell\open\command
@@ -417,6 +420,8 @@ This section describes any modifications that the ST author must make to the Bas
417420
executable>" /ST &lt;time></h:code>, where the local executable is a valid file path to a readable, local executable, and time is a start time that occurs within minutes of the task being created.</test>
418421
</testlist>
419422
<testlist>
423+
<h:b>For Linux,</h:b>
424+
the evaluator shall test the EDR's ability to detect anomalous activity by performing the following subtests based on the platform of the enrolled Host Agent's system, verifying for each that, corresponding alerts were generated in the management dashboard:
420425
<test>The evaluator shall open a terminal and run the command <h:code>scp
421426
&lt;remote user>@&lt;remote host>:&lt;remote path>
422427
&lt;download directory></h:code>, where the remote user is a valid user on remote host, remote path is a valid path to a remotely stored executable, and the download directory is a valid directory path writable by the current local user. The remote user's password shall be provided when prompted.</test>
@@ -425,6 +430,7 @@ This section describes any modifications that the ST author must make to the Bas
425430
/etc/cron.hourly/persist</h:code>, where the outside IP is a valid external address.</test>
426431
</testlist>
427432
<testlist>
433+
<h:b>For all platforms:</h:b>
428434
<test>The evaluator shall review an alert on the management dashboard and verify that the alert contains a severity field and the fields specified in the ST. The evaluator will open or view the alert and verify that a timeline of events is available for review. The timeline shall show a progression of events over time.</test>
429435
<test>The evaluator shall pick an alert on the management dashboard and export the alert in every format specified in the ST. The evaluator shall review the operational guidance and the selection from the requirement and verify that export options exist for all the declared formats in the selection. After exporting one alert for each possible format the evaluator shall review the file contents of the exported alert and verify it is the correct format for the selected export option (for example, an export of the IODEF type must contain 'IODEF-Document' in the first element of the exported file).</test>
430436
</testlist>
@@ -455,7 +461,7 @@ This section describes any modifications that the ST author must make to the Bas
455461
<h:li>Process creation,</h:li>
456462
<h:li>Libraries and modules loaded by processes,</h:li>
457463
<h:li>Filenames and <selectables><selectable id="fau_col_ext.1.1_2"><assignable>other metadata</assignable></selectable><selectable id="fau_col_ext.1.1_3">no other metadata</selectable></selectables> of files created and <selectables><selectable id="fau_col_ext.1.1_5"><assignable>other activities performed to files</assignable></selectable><selectable id="fau_col_ext.1.1_6">no other activities</selectable></selectables> on persistent storage,</h:li>
458-
<h:li><selectables><selectable id="fau_col_ext.1.1_8"><assignable>other host data</assignable></selectable><selectable id="fau_col_ext.1.1_9">no other host data</selectable></selectables>.</h:li>
464+
<h:li> <selectables><selectable id="fau_col_ext.1.1_8"><assignable>other host data</assignable></selectable><selectable id="fau_col_ext.1.1_9">no other host data</selectable></selectables>.</h:li>
459465
</h:ol>
460466
</title>
461467
<note role="application">The intent of this requirement is to specify the minimum set
@@ -700,19 +706,21 @@ This section describes any modifications that the ST author must make to the Bas
700706
<f-element id="fmt_smf-1-1_ENDPOINT">
701707
<title>
702708
The TSF shall be capable of performing the following management functions:
709+
<h:br/>
710+
<h:br/>
703711
<h:b>
704712
<ctr id="fmt_smf" ctr-type="Table">: Management Functions</ctr>
705713
</h:b>
706-
[Status Markers: M - Mandatory O - Optional or Objective - -
707-
Not Applicable]
708-
Status Markers:
709714
<h:br/>
710-
O - Indicates that this function is optional for this role
711715
<h:br/>
712-
M - Indicates that this function is mandatory for this role.
716+
[Status Markers:
717+
<h:br/>
718+
M - Mandatory
713719
<h:br/>
714-
NA - Indicates that this function is not applicable for this role
720+
O - Optional or Objective
715721
<h:br/>
722+
- -
723+
Not Applicable
716724
<h:br/>
717725
<management-function-set default="O">
718726
<manager cid="A">Administrator</manager>
@@ -782,20 +790,22 @@ This section describes any modifications that the ST author must make to the Bas
782790
<title>
783791
The TSF shall be capable of performing the following management functions
784792
<h:b>that control
785-
behavior of the Host Agent</h:b>
786-
:[<h:b>
793+
behavior of the Host Agent</h:b>:
794+
<h:br/>
795+
<h:br/>
796+
<h:b>
787797
<ctr id="fmt_smf" ctr-type="Table">: Management Functions</ctr>
788798
</h:b>
789-
[Status Markers: M - Mandatory O - Optional or Objective - -
790-
Not Applicable]
791-
Status Markers:
792799
<h:br/>
793-
O - Indicates that this function is optional for this role
794800
<h:br/>
795-
M - Indicates that this function is mandatory for this role.
801+
[Status Markers:
796802
<h:br/>
797-
NA - Indicates that this function is not applicable for this role
803+
M - Mandatory
798804
<h:br/>
805+
O - Optional or Objective
806+
<h:br/>
807+
- -
808+
Not Applicable
799809
<h:br/>
800810
<management-function-set default="O">
801811
<manager cid="A">Administrator</manager>
@@ -918,15 +928,16 @@ This section describes any modifications that the ST author must make to the Bas
918928
<ctr id="fmt_srf_ext" ctr-type="Table">: Management
919929
Functions</ctr>
920930
</h:b>
921-
[Status Markers: M - Mandatory O - Optional or Objective - -
922-
Not Applicable]
923-
Status Markers:
924931
<h:br/>
925-
O - Indicates that this function is optional for this role
926932
<h:br/>
927-
M - Indicates that this function is mandatory for this role.
933+
[Status Markers:
934+
<h:br/>
935+
M - Mandatory
928936
<h:br/>
929-
NA - Indicates that this function is not applicable for this role
937+
O - Optional or Objective
938+
<h:br/>
939+
- -
940+
Not Applicable
930941
<h:br/>
931942
<h:br/>
932943
<management-function-set default="O">
@@ -996,7 +1007,7 @@ This section describes any modifications that the ST author must make to the Bas
9961007
functionality.
9971008
</consistency-rationale>
9981009
<f-element id="fpt_itt-1-1">
999-
<title>The <h:b>EDR</h:b> shall<h:b><selectables><selectable id="fpt_itt.1.1_1">implement <selectables><selectable id="itt_tls_from_package">TLS as defined in the TLS Package</selectable><selectable id="https_from_package">HTTPS as defined in the Base-PP</selectable></selectables> </selectable><selectable id="fpt_itt.1.1_2">invoke platform-provided functionality for <selectables><selectable id="itt_invoke_platform_tls">TLS</selectable><selectable id="fpt_itt.1.1_3">HTTPS</selectable></selectables> </selectable></selectables>
1010+
<title>The <h:b>EDR</h:b> shall<h:b> <selectables><selectable id="fpt_itt.1.1_1">implement <selectables><selectable id="itt_tls_from_package">TLS as defined in the TLS Package</selectable><selectable id="https_from_package">HTTPS as defined in the Base-PP</selectable></selectables> </selectable><selectable id="fpt_itt.1.1_2">invoke platform-provided functionality for <selectables><selectable id="itt_invoke_platform_tls">TLS</selectable><selectable id="fpt_itt.1.1_3">HTTPS</selectable></selectables> </selectable></selectables>
10001011
to</h:b> protect TSF data from [<h:i>modification, disclosure</h:i>] when it is transmitted between separate parts of the TOE. </title>
10011012
<note role="application">
10021013
The intent of the above requirement is to use the
@@ -1064,7 +1075,7 @@ This section describes any modifications that the ST author must make to the Bas
10641075
<f-element id="ftp_trp-1-1">
10651076
<title>
10661077
The TSF shall
1067-
<h:b><selectables><selectable id="ftp_trp.1.1_1">implement <selectables><selectable id="trp_tls_from_package">TLS as defined in the TLS Package</selectable><selectable id="ITC_HTTPS_2">HTTPS as defined in the Base-PP</selectable></selectables> </selectable><selectable id="ftp_trp.1.1_2">invoke platform-provided functionality for <selectables><selectable id="ftp_invoke_platform_tls">TLS</selectable><selectable id="ftp_trp.1.1_3">HTTPS</selectable></selectables> </selectable></selectables> to</h:b>
1078+
<h:b> <selectables><selectable id="ftp_trp.1.1_1">implement <selectables><selectable id="trp_tls_from_package">TLS as defined in the TLS Package</selectable><selectable id="ITC_HTTPS_2">HTTPS as defined in the Base-PP</selectable></selectables> </selectable><selectable id="ftp_trp.1.1_2">invoke platform-provided functionality for <selectables><selectable id="ftp_invoke_platform_tls">TLS</selectable><selectable id="ftp_trp.1.1_3">HTTPS</selectable></selectables> </selectable></selectables> to</h:b>
10681079
provide a communication path between itself and [<h:i>remote</h:i>]
10691080
<h:b>administrators</h:b>
10701081
that is logically distinct from other communication paths and
@@ -1075,13 +1086,13 @@ This section describes any modifications that the ST author must make to the Bas
10751086
<f-element id="ftp_trp-1-2">
10761087
<title>
10771088
The TSF shall
1078-
<h:b><selectables><selectable id="ftp_trp.1.2_1">implement functionality</selectable><selectable id="ftp_trp.1.2_2">invoke platform-provided functionality</selectable></selectables> to</h:b>
1089+
<h:b> <selectables><selectable id="ftp_trp.1.2_1">implement functionality</selectable><selectable id="ftp_trp.1.2_2">invoke platform-provided functionality</selectable></selectables> to</h:b>
10791090
permit [<h:i>remote <h:b>administrators</h:b></h:i>] to initiate communication via the
10801091
trusted path.
10811092
</title>
10821093
</f-element>
10831094
<f-element id="ftp_trp-1-3">
1084-
<title>The TSF shall<h:b><selectables><selectable id="ftp_trp.1.3_1">implement functionality</selectable><selectable id="ftp_trp.1.3_2">invoke platform-provided functionality</selectable></selectables> to </h:b>require the use of the trusted path for [<h:i>all remote
1095+
<title>The TSF shall<h:b> <selectables><selectable id="ftp_trp.1.3_1">implement functionality</selectable><selectable id="ftp_trp.1.3_2">invoke platform-provided functionality</selectable></selectables> to </h:b>require the use of the trusted path for [<h:i>all remote
10851096
administration actions</h:i>].</title>
10861097
<note role="application">This requirement ensures that authorized remote
10871098
administrators initiate all communication with the EDR via a
@@ -1126,6 +1137,9 @@ This section describes any modifications that the ST author must make to the Bas
11261137
<opt-sfrs/>
11271138
<sel-sfrs/>
11281139
<obj-sfrs>
1140+
<section id="sec-obj-audit-table" title="Auditable Events for Objective SFRs">
1141+
<audit-table id="at-objective" table="objective"/>
1142+
</section>
11291143
<!-- 5.2.6 Security Management (FMT) -->
11301144
<section title="Security Management (FMT)" id="fmt-objective">
11311145
<ext-comp-def title="Trusted Remediation Functions" fam-id="FMT_TRM_EXT">

0 commit comments

Comments
 (0)