|
7146 | 7146 | <!-- FMT_LIM.1: Limited Capabilities --> |
7147 | 7147 | <f-component id="sfr-fmt-lim-1" cc-id="fmt_lim.1" name="Limited Capabilities"> |
7148 | 7148 | <f-element id="fmt-lim-1e1"> |
7149 | | - <title><h:mark>The TSF shall limit its capabilities so that in conjunction with “Limited availability |
| 7149 | + <title>The TSF shall limit its capabilities so that in conjunction with “Limited availability |
7150 | 7150 | (FMT_LIM.2)” the following policy is enforced [<h:i>Deploying test and debug features |
7151 | 7151 | after TOE delivery does not allow user data of the TOE to be disclosed or |
7152 | 7152 | manipulated, TSF data to be disclosed or manipulated, firmware to be |
7153 | 7153 | reconstructed such that information about construction of TSF may enable other |
7154 | | - attacks.</h:i>] (Issue 72)</h:mark> |
| 7154 | + attacks.</h:i>] |
7155 | 7155 | </title> |
7156 | 7156 | <note role="application"> |
7157 | | - The GPCP may implement debug and test functions to |
| 7157 | + The GPCP may implement debug and test functions/ports to |
7158 | 7158 | support debug and testing after production. The TOE shall prevent abuse |
7159 | | - of such functionality after the production test phase. The protection can be |
| 7159 | + of such abilities after the production test phase. The protection can be |
7160 | 7160 | achieved either by limiting the capability of the implemented functions or |
7161 | 7161 | by limiting their availability. Limited capability prevents misuse or |
7162 | 7162 | compromise of TSF data or user data, or the characterization of security |
|
7183 | 7183 | manipulated, or firmware to be reconstructed such that information about the |
7184 | 7184 | construction of TSF may enable other attacks.<h:p/> |
7185 | 7185 | <testlist> |
7186 | | - For JTAG interfaces, the evaluator shall perform the following tests: |
| 7186 | + For test and debug ports and interfaces, the evaluator shall perform the following tests: |
7187 | 7187 | <test>The evaluator shall attempt to access the debug port without authenticating as |
7188 | 7188 | an Administrator. The attempt should fail.</test> |
7189 | 7189 | <test>The evaluator shall authenticate as an Administrator and then attempt to access the |
|
7198 | 7198 | <!-- FMT_LIM.2: Limited Availability --> |
7199 | 7199 | <f-component id="sfr-fmt-lim-2" cc-id="fmt_lim.2" name="Limited Availability"> |
7200 | 7200 | <f-element id="fmt-lim-2e1"> |
7201 | | - <title><h:mark>The TSF shall be designed in a manner that limits its availability so that in |
| 7201 | + <title>The TSF shall be designed in a manner that limits its availability so that in |
7202 | 7202 | conjunction with “Limited capabilities (FMT_LIM.1)” the following policy is |
7203 | 7203 | enforced [<h:i>Deploying test and debug features |
7204 | 7204 | after TOE delivery does not allow user data of the TOE to be disclosed or |
7205 | 7205 | manipulated, TSF data to be disclosed or manipulated, firmware to be |
7206 | 7206 | reconstructed such that information about construction of TSF may enable other |
7207 | | - attacks.</h:i>] (Issue 72)</h:mark> |
| 7207 | + attacks.</h:i>]<h:p/> |
| 7208 | + |
| 7209 | + The TSF shall <selectables onlyone="yes"> |
| 7210 | + <selectable>disable access through hardware</selectable> |
| 7211 | + <selectable>control access by a signing key</selectable> |
| 7212 | + </selectables> to testing and debug interfaces. |
7208 | 7213 | </title> |
| 7214 | + <note role="application"> |
| 7215 | + This requirement means that test and debug ports, such as JTAG, may not be |
| 7216 | + accessible to tennant software. This requirement should be included in the |
| 7217 | + ST for use cases that include the threat T.PHYSICAL. |
| 7218 | + </note> |
7209 | 7219 | <aactivity> |
7210 | | - <no-tests>Evaluation activities for FMT_LIM.2 are encompassed within those for FMT_LIM.2.</no-tests> |
| 7220 | + <TSS> |
| 7221 | + If "<h:i>disable access through hardware</h:i>" is selected:<h:br/> |
| 7222 | + The evaluator shall examine the TSS to determine the location of the test and ports on the TSF, to |
| 7223 | + include the order of the ports (i.e. Data In, Data Out, Clock, etc.).<h:p/> |
| 7224 | + |
| 7225 | + If "<h:i>control access by a signing key</h:i>" is selected:<h:br/> |
| 7226 | + The evaluator shall examine the TSS to determine how access to the test and debug ports are controlled by a |
| 7227 | + signing key. The evaluator shall examine the TSS to determine when the test and debug ports can be accessed, |
| 7228 | + i.e. what has the access to the signing key. |
| 7229 | + </TSS> |
| 7230 | + <Guidance/> |
| 7231 | + <Tests> |
| 7232 | + The following test requires the developer to provide access to a test platform that provides |
| 7233 | + the evaluator with chip level access.<h:p/> |
| 7234 | + [conditional] If "<h:i>disable access through hardware</h:i>" is selected:<h:br/> |
| 7235 | + The evaluator shall connect a packet analyzer to the test and debug ports. The evaluator shall query |
| 7236 | + the test and debug ports for its device ID and confirm that the device ID cannot be retrieved. |
| 7237 | + </Tests> |
7211 | 7238 | </aactivity> |
7212 | 7239 | </f-element> |
7213 | 7240 | <audit-event/> |
|
7661 | 7688 | <audit-event-info>None.</audit-event-info> |
7662 | 7689 | </audit-event> |
7663 | 7690 | </f-component> |
7664 | | - |
| 7691 | + |
| 7692 | + <h:strike> |
7665 | 7693 | <!-- FPT_JTA_EXT.1 JTAG/Debug Port Access --> |
7666 | 7694 | <f-component id="sfr-fpt-jta-ext-1" cc-id="fpt_jta_ext.1" name="JTAG/Debug Port Access"> |
7667 | 7695 | <consistency-rationale/> |
|
7705 | 7733 | <audit-event/> |
7706 | 7734 | </f-component> |
7707 | 7735 |
|
7708 | | - |
| 7736 | + |
7709 | 7737 | <!-- FPT_JTA_EXT.2 JTAG/Debug Port Disablement --> |
7710 | 7738 | <!-- Should be included for use cases where physical protections are required. --> |
7711 | 7739 | <f-component id="sfr-fpt-jta-ext-2" cc-id="fpt_jta_ext.2" name="JTAG/Debug Port Disablement" status="sel-based"> |
|
7750 | 7778 | </f-element> |
7751 | 7779 | <audit-event/> |
7752 | 7780 | </f-component> |
7753 | | - |
| 7781 | + </h:strike> |
7754 | 7782 |
|
7755 | 7783 | <!-- FPT_PHP.1: Passive Detection of Physical Attack. --> |
7756 | 7784 | <f-component id="sfr-fpt-php-1" cc-id="fpt_php.1" name="Passive detection of physical attack" status="sel-based"> |
|
0 commit comments