You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: input/esm-edr.xml
+57-43Lines changed: 57 additions & 43 deletions
Original file line number
Diff line number
Diff line change
@@ -134,6 +134,15 @@
134
134
PP-Module.
135
135
<figureentity="images/edr_overview.png"title="EDR and Host Agent Communications"id="toe_overview"/>
136
136
</sec:TOE_Boundary>
137
+
<sec:TOE_Platform>
138
+
The TOE platform, which consists of the OS or
139
+
Cloud platform on which the EDR software executes, is outside the scope of evaluation.
140
+
However, the security of the EDR relies upon it.
141
+
<h:p/>
142
+
Any
143
+
communications with trusted remote file reputation or threat intelligence services is
144
+
relevant to overall EDR system security but is also outside the scope of evaluation.
145
+
</sec:TOE_Platform>
137
146
</section>
138
147
<sec:Use_Cases>
139
148
Requirements in this PP-Module are designed to address
@@ -218,6 +227,8 @@
218
227
<rationale>The PP-Module includes FMT_SMR.1 to define the management roles that the TSF supports so that its management functions can be separated by role.</rationale>
219
228
<addressed-by>FMT_SRF_EXT.1</addressed-by>
220
229
<rationale>The PP-Module includes FMT_SRF_EXT.1 to define the remediation functions that are available to authorized users to issue corrective actions on a system that has a connected Host Agent.</rationale>
<rationale>The PP-Module includes FMT_TRM_EXT.1 to provide an optional capability to ensure the integrity of management commands and policies issued to external Host Agents through use of a digital signature.</rationale>
221
232
</threat>
222
233
</threats>
223
234
</sec:Threats>
@@ -229,6 +240,8 @@
229
240
management activities. The OE will provide reliable network connectivity for the EDR to operate.
230
241
The EDR will robustly handle occasional instances when
231
242
connectivity is unavailable or unreliable.</description>
243
+
<consistency-rationale>This assumption is consistent with the Base-PP because assuming network availability is consistent with the A.PLATFORM
244
+
assumption defined by the Base-PP, which expects the TOE to have a trustworthy computing platform.</consistency-rationale>
232
245
<objective-referref="OE.RELIABLE_TRANSIT">
233
246
<rationale>The OE objective OE.RELIABLE_TRANSIT is realized through
234
247
A.CONNECTIVITY.</rationale>
@@ -251,6 +264,8 @@
251
264
<SOEname="OE.RELIABLE_TRANSIT">
252
265
<description>Wired or wireless network traffic between the EDR and
253
266
host agents will provide reasonably reliable connectivity.</description>
267
+
<consistency-rationale>This objective relates to an external interface that does not exist in the Base-PP
268
+
and does not affect Base-PP functionality.</consistency-rationale>
254
269
</SOE>
255
270
</SOEs>
256
271
</section>
@@ -288,6 +303,9 @@ This section describes any modifications that the ST author must make to the Bas
288
303
</base-pp>
289
304
<!-- 5.2 TOE Security Functional Requirements -->
290
305
<man-sfrs>
306
+
<sectionid="sec-sel-audit-table"title="Auditable Events for Mandatory SFRs">
@@ -390,25 +408,10 @@ This section describes any modifications that the ST author must make to the Bas
390
408
<h:p/>
391
409
</Guidance>
392
410
<Tests>
393
-
<h:p>The evaluator shall perform the following tests:</h:p>
394
-
<h:p>
395
-
<h:b>For Windows,</h:b>
396
-
the evaluator shall test the EDR's ability to detect
397
-
anomalous activity by performing the following subtests based on the platform of
398
-
the enrolled Host Agent's system, verifying for each that, corresponding alerts
399
-
were generated in the management dashboard:
400
-
</h:p>
401
-
<h:p>
402
-
<h:b>For Linux,</h:b>
403
-
the evaluator shall test the EDR's ability to detect
404
-
anomalous activity by performing the following subtests based on the platform of
405
-
the enrolled Host Agent's system, verifying for each that, corresponding alerts
406
-
were generated in the management dashboard:
407
-
</h:p>
408
-
<h:p>
409
-
<h:b>For all platforms:</h:b>
410
-
</h:p>
411
+
The evaluator shall perform the following tests:
411
412
<testlist>
413
+
<h:b>For Windows,</h:b>
414
+
the evaluator shall test the EDR's ability to detect anomalous activity by performing the following subtests based on the platform of the enrolled Host Agent's system, verifying for each that, corresponding alerts were generated in the management dashboard:
412
415
<test>The evaluator shall open a Windows command prompt as a user and run the command <h:code>cmd /c certutil -urlcache -split -f <remote file>
413
416
<download directory></h:code>, where the remote file is a valid file path to an accessible, remotely stored executable, and the download directory is a valid directory path writable by the current local user.</test>
414
417
<test>The evaluator shall open a Windows command prompt as a user and run the command <h:code>reg.exe add hkcu\software\classes\mscfile\shell\open\command
@@ -417,6 +420,8 @@ This section describes any modifications that the ST author must make to the Bas
417
420
executable>" /ST <time></h:code>, where the local executable is a valid file path to a readable, local executable, and time is a start time that occurs within minutes of the task being created.</test>
418
421
</testlist>
419
422
<testlist>
423
+
<h:b>For Linux,</h:b>
424
+
the evaluator shall test the EDR's ability to detect anomalous activity by performing the following subtests based on the platform of the enrolled Host Agent's system, verifying for each that, corresponding alerts were generated in the management dashboard:
420
425
<test>The evaluator shall open a terminal and run the command <h:code>scp
<download directory></h:code>, where the remote user is a valid user on remote host, remote path is a valid path to a remotely stored executable, and the download directory is a valid directory path writable by the current local user. The remote user's password shall be provided when prompted.</test>
@@ -425,6 +430,7 @@ This section describes any modifications that the ST author must make to the Bas
425
430
/etc/cron.hourly/persist</h:code>, where the outside IP is a valid external address.</test>
426
431
</testlist>
427
432
<testlist>
433
+
<h:b>For all platforms:</h:b>
428
434
<test>The evaluator shall review an alert on the management dashboard and verify that the alert contains a severity field and the fields specified in the ST. The evaluator will open or view the alert and verify that a timeline of events is available for review. The timeline shall show a progression of events over time.</test>
429
435
<test>The evaluator shall pick an alert on the management dashboard and export the alert in every format specified in the ST. The evaluator shall review the operational guidance and the selection from the requirement and verify that export options exist for all the declared formats in the selection. After exporting one alert for each possible format the evaluator shall review the file contents of the exported alert and verify it is the correct format for the selected export option (for example, an export of the IODEF type must contain 'IODEF-Document' in the first element of the exported file).</test>
430
436
</testlist>
@@ -455,7 +461,7 @@ This section describes any modifications that the ST author must make to the Bas
455
461
<h:li>Process creation,</h:li>
456
462
<h:li>Libraries and modules loaded by processes,</h:li>
457
463
<h:li>Filenames and <selectables><selectableid="fau_col_ext.1.1_2"><assignable>other metadata</assignable></selectable><selectableid="fau_col_ext.1.1_3">no other metadata</selectable></selectables> of files created and <selectables><selectableid="fau_col_ext.1.1_5"><assignable>other activities performed to files</assignable></selectable><selectableid="fau_col_ext.1.1_6">no other activities</selectable></selectables> on persistent storage,</h:li>
458
-
<h:li><selectables><selectableid="fau_col_ext.1.1_8"><assignable>other host data</assignable></selectable><selectableid="fau_col_ext.1.1_9">no other host data</selectable></selectables>.</h:li>
464
+
<h:li><selectables><selectableid="fau_col_ext.1.1_8"><assignable>other host data</assignable></selectable><selectableid="fau_col_ext.1.1_9">no other host data</selectable></selectables>.</h:li>
459
465
</h:ol>
460
466
</title>
461
467
<noterole="application">The intent of this requirement is to specify the minimum set
@@ -700,19 +706,21 @@ This section describes any modifications that the ST author must make to the Bas
700
706
<f-elementid="fmt_smf-1-1_ENDPOINT">
701
707
<title>
702
708
The TSF shall be capable of performing the following management functions:
[Status Markers: M - Mandatory O - Optional or Objective - -
790
-
Not Applicable]
791
-
Status Markers:
792
799
<h:br/>
793
-
O - Indicates that this function is optional for this role
794
800
<h:br/>
795
-
M - Indicates that this function is mandatory for this role.
801
+
[Status Markers:
796
802
<h:br/>
797
-
NA - Indicates that this function is not applicable for this role
803
+
M - Mandatory
798
804
<h:br/>
805
+
O - Optional or Objective
806
+
<h:br/>
807
+
- -
808
+
Not Applicable
799
809
<h:br/>
800
810
<management-function-setdefault="O">
801
811
<managercid="A">Administrator</manager>
@@ -918,15 +928,16 @@ This section describes any modifications that the ST author must make to the Bas
918
928
<ctrid="fmt_srf_ext"ctr-type="Table">: Management
919
929
Functions</ctr>
920
930
</h:b>
921
-
[Status Markers: M - Mandatory O - Optional or Objective - -
922
-
Not Applicable]
923
-
Status Markers:
924
931
<h:br/>
925
-
O - Indicates that this function is optional for this role
926
932
<h:br/>
927
-
M - Indicates that this function is mandatory for this role.
933
+
[Status Markers:
934
+
<h:br/>
935
+
M - Mandatory
928
936
<h:br/>
929
-
NA - Indicates that this function is not applicable for this role
937
+
O - Optional or Objective
938
+
<h:br/>
939
+
- -
940
+
Not Applicable
930
941
<h:br/>
931
942
<h:br/>
932
943
<management-function-setdefault="O">
@@ -996,7 +1007,7 @@ This section describes any modifications that the ST author must make to the Bas
996
1007
functionality.
997
1008
</consistency-rationale>
998
1009
<f-elementid="fpt_itt-1-1">
999
-
<title>The <h:b>EDR</h:b> shall<h:b><selectables><selectableid="fpt_itt.1.1_1">implement <selectables><selectableid="itt_tls_from_package">TLS as defined in the TLS Package</selectable><selectableid="https_from_package">HTTPS as defined in the Base-PP</selectable></selectables> </selectable><selectableid="fpt_itt.1.1_2">invoke platform-provided functionality for <selectables><selectableid="itt_invoke_platform_tls">TLS</selectable><selectableid="fpt_itt.1.1_3">HTTPS</selectable></selectables> </selectable></selectables>
1010
+
<title>The <h:b>EDR</h:b> shall<h:b><selectables><selectableid="fpt_itt.1.1_1">implement <selectables><selectableid="itt_tls_from_package">TLS as defined in the TLS Package</selectable><selectableid="https_from_package">HTTPS as defined in the Base-PP</selectable></selectables> </selectable><selectableid="fpt_itt.1.1_2">invoke platform-provided functionality for <selectables><selectableid="itt_invoke_platform_tls">TLS</selectable><selectableid="fpt_itt.1.1_3">HTTPS</selectable></selectables> </selectable></selectables>
1000
1011
to</h:b> protect TSF data from [<h:i>modification, disclosure</h:i>] when it is transmitted between separate parts of the TOE. </title>
1001
1012
<noterole="application">
1002
1013
The intent of the above requirement is to use the
@@ -1064,7 +1075,7 @@ This section describes any modifications that the ST author must make to the Bas
1064
1075
<f-elementid="ftp_trp-1-1">
1065
1076
<title>
1066
1077
The TSF shall
1067
-
<h:b><selectables><selectableid="ftp_trp.1.1_1">implement <selectables><selectableid="trp_tls_from_package">TLS as defined in the TLS Package</selectable><selectableid="ITC_HTTPS_2">HTTPS as defined in the Base-PP</selectable></selectables> </selectable><selectableid="ftp_trp.1.1_2">invoke platform-provided functionality for <selectables><selectableid="ftp_invoke_platform_tls">TLS</selectable><selectableid="ftp_trp.1.1_3">HTTPS</selectable></selectables> </selectable></selectables> to</h:b>
1078
+
<h:b><selectables><selectableid="ftp_trp.1.1_1">implement <selectables><selectableid="trp_tls_from_package">TLS as defined in the TLS Package</selectable><selectableid="ITC_HTTPS_2">HTTPS as defined in the Base-PP</selectable></selectables> </selectable><selectableid="ftp_trp.1.1_2">invoke platform-provided functionality for <selectables><selectableid="ftp_invoke_platform_tls">TLS</selectable><selectableid="ftp_trp.1.1_3">HTTPS</selectable></selectables> </selectable></selectables> to</h:b>
1068
1079
provide a communication path between itself and [<h:i>remote</h:i>]
1069
1080
<h:b>administrators</h:b>
1070
1081
that is logically distinct from other communication paths and
@@ -1075,13 +1086,13 @@ This section describes any modifications that the ST author must make to the Bas
permit [<h:i>remote <h:b>administrators</h:b></h:i>] to initiate communication via the
1080
1091
trusted path.
1081
1092
</title>
1082
1093
</f-element>
1083
1094
<f-elementid="ftp_trp-1-3">
1084
-
<title>The TSF shall<h:b><selectables><selectableid="ftp_trp.1.3_1">implement functionality</selectable><selectableid="ftp_trp.1.3_2">invoke platform-provided functionality</selectable></selectables> to </h:b>require the use of the trusted path for [<h:i>all remote
1095
+
<title>The TSF shall<h:b><selectables><selectableid="ftp_trp.1.3_1">implement functionality</selectable><selectableid="ftp_trp.1.3_2">invoke platform-provided functionality</selectable></selectables> to </h:b>require the use of the trusted path for [<h:i>all remote
1085
1096
administration actions</h:i>].</title>
1086
1097
<noterole="application">This requirement ensures that authorized remote
1087
1098
administrators initiate all communication with the EDR via a
@@ -1126,6 +1137,9 @@ This section describes any modifications that the ST author must make to the Bas
1126
1137
<opt-sfrs/>
1127
1138
<sel-sfrs/>
1128
1139
<obj-sfrs>
1140
+
<sectionid="sec-obj-audit-table"title="Auditable Events for Objective SFRs">
0 commit comments