Skip to content

Commit a7e5a3f

Browse files
authored
Update gpcp.xml
Collapsed FPT_JTA_EXT.1 and .2 into FMT_LIM.1 and .2 as discussed on 8/14/2025. This relates to Issue 72.
1 parent 34b464d commit a7e5a3f

File tree

1 file changed

+39
-11
lines changed

1 file changed

+39
-11
lines changed

input/gpcp.xml

Lines changed: 39 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7146,17 +7146,17 @@
71467146
<!-- FMT_LIM.1: Limited Capabilities -->
71477147
<f-component id="sfr-fmt-lim-1" cc-id="fmt_lim.1" name="Limited Capabilities">
71487148
<f-element id="fmt-lim-1e1">
7149-
<title><h:mark>The TSF shall limit its capabilities so that in conjunction with “Limited availability
7149+
<title>The TSF shall limit its capabilities so that in conjunction with “Limited availability
71507150
(FMT_LIM.2)” the following policy is enforced [<h:i>Deploying test and debug features
71517151
after TOE delivery does not allow user data of the TOE to be disclosed or
71527152
manipulated, TSF data to be disclosed or manipulated, firmware to be
71537153
reconstructed such that information about construction of TSF may enable other
7154-
attacks.</h:i>] (Issue 72)</h:mark>
7154+
attacks.</h:i>]
71557155
</title>
71567156
<note role="application">
7157-
The GPCP may implement debug and test functions to
7157+
The GPCP may implement debug and test functions/ports to
71587158
support debug and testing after production. The TOE shall prevent abuse
7159-
of such functionality after the production test phase. The protection can be
7159+
of such abilities after the production test phase. The protection can be
71607160
achieved either by limiting the capability of the implemented functions or
71617161
by limiting their availability. Limited capability prevents misuse or
71627162
compromise of TSF data or user data, or the characterization of security
@@ -7183,7 +7183,7 @@
71837183
manipulated, or firmware to be reconstructed such that information about the
71847184
construction of TSF may enable other attacks.<h:p/>
71857185
<testlist>
7186-
For JTAG interfaces, the evaluator shall perform the following tests:
7186+
For test and debug ports and interfaces, the evaluator shall perform the following tests:
71877187
<test>The evaluator shall attempt to access the debug port without authenticating as
71887188
an Administrator. The attempt should fail.</test>
71897189
<test>The evaluator shall authenticate as an Administrator and then attempt to access the
@@ -7198,16 +7198,43 @@
71987198
<!-- FMT_LIM.2: Limited Availability -->
71997199
<f-component id="sfr-fmt-lim-2" cc-id="fmt_lim.2" name="Limited Availability">
72007200
<f-element id="fmt-lim-2e1">
7201-
<title><h:mark>The TSF shall be designed in a manner that limits its availability so that in
7201+
<title>The TSF shall be designed in a manner that limits its availability so that in
72027202
conjunction with “Limited capabilities (FMT_LIM.1)” the following policy is
72037203
enforced [<h:i>Deploying test and debug features
72047204
after TOE delivery does not allow user data of the TOE to be disclosed or
72057205
manipulated, TSF data to be disclosed or manipulated, firmware to be
72067206
reconstructed such that information about construction of TSF may enable other
7207-
attacks.</h:i>] (Issue 72)</h:mark>
7207+
attacks.</h:i>]<h:p/>
7208+
7209+
The TSF shall <selectables onlyone="yes">
7210+
<selectable>disable access through hardware</selectable>
7211+
<selectable>control access by a signing key</selectable>
7212+
</selectables> to testing and debug interfaces.
72087213
</title>
7214+
<note role="application">
7215+
This requirement means that test and debug ports, such as JTAG, may not be
7216+
accessible to tennant software. This requirement should be included in the
7217+
ST for use cases that include the threat T.PHYSICAL.
7218+
</note>
72097219
<aactivity>
7210-
<no-tests>Evaluation activities for FMT_LIM.2 are encompassed within those for FMT_LIM.2.</no-tests>
7220+
<TSS>
7221+
If "<h:i>disable access through hardware</h:i>" is selected:<h:br/>
7222+
The evaluator shall examine the TSS to determine the location of the test and ports on the TSF, to
7223+
include the order of the ports (i.e. Data In, Data Out, Clock, etc.).<h:p/>
7224+
7225+
If "<h:i>control access by a signing key</h:i>" is selected:<h:br/>
7226+
The evaluator shall examine the TSS to determine how access to the test and debug ports are controlled by a
7227+
signing key. The evaluator shall examine the TSS to determine when the test and debug ports can be accessed,
7228+
i.e. what has the access to the signing key.
7229+
</TSS>
7230+
<Guidance/>
7231+
<Tests>
7232+
The following test requires the developer to provide access to a test platform that provides
7233+
the evaluator with chip level access.<h:p/>
7234+
[conditional] If "<h:i>disable access through hardware</h:i>" is selected:<h:br/>
7235+
The evaluator shall connect a packet analyzer to the test and debug ports. The evaluator shall query
7236+
the test and debug ports for its device ID and confirm that the device ID cannot be retrieved.
7237+
</Tests>
72117238
</aactivity>
72127239
</f-element>
72137240
<audit-event/>
@@ -7661,7 +7688,8 @@
76617688
<audit-event-info>None.</audit-event-info>
76627689
</audit-event>
76637690
</f-component>
7664-
7691+
7692+
<h:strike>
76657693
<!-- FPT_JTA_EXT.1 JTAG/Debug Port Access -->
76667694
<f-component id="sfr-fpt-jta-ext-1" cc-id="fpt_jta_ext.1" name="JTAG/Debug Port Access">
76677695
<consistency-rationale/>
@@ -7705,7 +7733,7 @@
77057733
<audit-event/>
77067734
</f-component>
77077735

7708-
7736+
77097737
<!-- FPT_JTA_EXT.2 JTAG/Debug Port Disablement -->
77107738
<!-- Should be included for use cases where physical protections are required. -->
77117739
<f-component id="sfr-fpt-jta-ext-2" cc-id="fpt_jta_ext.2" name="JTAG/Debug Port Disablement" status="sel-based">
@@ -7750,7 +7778,7 @@
77507778
</f-element>
77517779
<audit-event/>
77527780
</f-component>
7753-
7781+
</h:strike>
77547782

77557783
<!-- FPT_PHP.1: Passive Detection of Physical Attack. -->
77567784
<f-component id="sfr-fpt-php-1" cc-id="fpt_php.1" name="Passive detection of physical attack" status="sel-based">

0 commit comments

Comments
 (0)