Skip to content

Commit 1c13004

Browse files
committed
cc:2022 updates
1 parent d92831f commit 1c13004

File tree

1 file changed

+56
-50
lines changed

1 file changed

+56
-50
lines changed

input/stip.xml

Lines changed: 56 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,21 @@
4141
</entry>
4242
</RevisionHistory>
4343

44+
<include-pkg id="pkgX509">
45+
<git>
46+
<url>https://github.com/commoncriteria/X509</url>
47+
<branch>release-1.0</branch>
48+
</git>
49+
<url>https://www.niap-ccevs.org/protectionprofiles/511</url>
50+
</include-pkg>
51+
<include-pkg id="pkgTLS">
52+
<git>
53+
<url>https://github.com/commoncriteria/tls</url>
54+
<branch>release-2.0</branch>
55+
</git>
56+
<url>https://www.niap-ccevs.org/protectionprofiles/465</url>
57+
</include-pkg>
58+
4459
<!-- 1.0 Introduction -->
4560
<sec:Introduction>
4661

@@ -308,7 +323,10 @@
308323
<cc-pp-config-with>
309324
<Mod-cc-ref>collaborative PP-Module for Stateful Traffic Filter Firewalls, v1.4 + Errata, 20200625</Mod-cc-ref>
310325
</cc-pp-config-with>
311-
<cc-pkg-claim/>
326+
<cc-pkg-claim>
327+
<FP-cc-ref conf="conformant">Functional Package for TLS, version 2.0</FP-cc-ref>
328+
<FP-cc-ref conf="conformant">Functional Package for X.509, version 1.0</FP-cc-ref>
329+
</cc-pkg-claim>
312330
</CClaimsInfo>
313331
</section>
314332

@@ -751,11 +769,11 @@ expected to enforce.<h:p/>
751769
<SO name="O.INTEGRITY_PROTECTION">
752770
<description>The TOE will provide appropriate integrity protection for TSF data and software and any user data
753771
stored by the TOE.<h:p/>
754-
Addressed by: FPT_FLS.1
772+
Addressed by: FPT_FLS.1/STIP
755773
</description>
756774

757775

758-
<addressed-by>FPT_FLS.1</addressed-by>
776+
<addressed-by>FPT_FLS.1/STIP</addressed-by>
759777
<rationale>This SFR supports the objective by requiring the TSF to take some action to preserve a
760778
secure state in the response to a loss of integrity or other potential failure.</rationale>
761779
</SO>
@@ -787,12 +805,12 @@ expected to enforce.<h:p/>
787805
distributed TOE, and authorized IT entities. The TOE will protect data assets when they are being
788806
transmitted to and from the TOE, including through intervening untrusted components.
789807
<h:p/>
790-
Addressed by: FCS_CKM.4 (from Base-PP), FCS_TLSC_EXT.1 (from Base-PP), FCS_TLSC_EXT.2 (from Base-PP), FTP_ITC.1 (refined from Base-PP),
808+
Addressed by: FCS_CKM.6 (from Base-PP), FCS_TLSC_EXT.1 (from Base-PP), FCS_TLSC_EXT.2 (from Base-PP), FTP_ITC.1 (refined from Base-PP),
791809
FCS_COP.1/STIP, FCS_TTTC_EXT.1, FCS_TTTC_EXT.5, FCS_TTTS_EXT.1, FDP_PRC_EXT.1, FDP_STIP_EXT.1, FDP_TEP_EXT.1,
792810
FCS_TTTC_EXT.3 (selection-based), FCS_TTTC_EXT.4 (selection-based), FCS_TTTS_EXT.3
793811
(selection-based), FCS_TTTS_EXT.4 (selection-based), FDP_STIP_EXT.2 (selection-based)
794812
</description>
795-
<addressed-by>FCS_CKM.4 (from Base-PP)</addressed-by>
813+
<addressed-by>FCS_CKM.6 (from Base-PP)</addressed-by>
796814
<rationale>This SFR supports the objective by ensuring secret and private key data is disposed of immediately after use to prevent unauthorized disclosure of keys.</rationale>
797815
<addressed-by>FCS_TLSC_EXT.1 (from Base-PP)</addressed-by>
798816
<rationale>This SFR supports the objective by defining the TLS trusted channel used for EST if the TOE supports that functionality.</rationale>
@@ -835,9 +853,9 @@ expected to enforce.<h:p/>
835853
The TOE will have the ability to store and recover to a previous state at the direction of the
836854
administrator (e.g., provide support for archival and recovery capabilities).
837855
<h:p/>
838-
Addressed by: FPT_FLS.1, FPT_RCV.1
856+
Addressed by: FPT_FLS.1/STIP, FPT_RCV.1
839857
</description>
840-
<addressed-by>FPT_FLS.1</addressed-by>
858+
<addressed-by>FPT_FLS.1/STIP</addressed-by>
841859
<rationale>This SFR supports the objective by requiring the TSF to preserve a secure state when certain failures occur.</rationale>
842860
<addressed-by>FPT_RCV.1</addressed-by>
843861
<rationale>This SFR supports the objective by requiring the TSF to support a maintenance mode of operation that is entered when certain failures occur.</rationale>
@@ -860,10 +878,10 @@ expected to enforce.<h:p/>
860878
TOE will record in audit records: date and time of action and the entity responsible for the action. The
861879
TOE will provide the ability to store and review certificate information.
862880
<h:p/>
863-
Addressed by: FAU_SAR.1 (optional), FAU_STG_EXT.1 (from Base-PP), FAU_GEN.1/STIP, FAU_GCR_EXT.1, FAU_SAR.3
881+
Addressed by: FAU_SAR.1 (optional), FAU_STG.1 (from Base-PP), FAU_GEN.1/STIP, FAU_GCR_EXT.1, FAU_SAR.3
864882
(optional), FAU_SCR_EXT.1 (selection-based)
865883
</description>
866-
<addressed-by>FAU_STG_EXT.1 (from Base-PP)</addressed-by>
884+
<addressed-by>FAU_STG.1 (from Base-PP)</addressed-by>
867885
<rationale>This SFR supports the objective by defining a mechanism for the secure storage of audit data in the OE.</rationale>
868886
<addressed-by>FAU_GEN.1/STIP</addressed-by>
869887
<rationale>This SFR supports the objective by defining the auditable events specific to STIP functionality that the TSF must generate.</rationale>
@@ -1228,7 +1246,7 @@ expected to enforce.<h:p/>
12281246

12291247
<!-- Note: modified some of these to make the consistency more obvious, is that ok -->
12301248
<con-mod ref="OE.AUDIT">This objective intends for the TOE’s OE to have adequate storage to retain
1231-
the TOE's audit records. This objective is not defined in the Base-PP but can be assumed to be consistent with the Base-PP because FAU_STG_EXT.1 requires transmission of audit data to an
1249+
the TOE's audit records. This objective is not defined in the Base-PP but can be assumed to be consistent with the Base-PP because FAU_STG.1 requires transmission of audit data to an
12321250
environmental audit server, which means that there should be some assurance of the security of that server.</con-mod>
12331251
<con-mod ref="OE.CERT_REPOSITORY">This objective intends for the TOE’s OE to provide a certificate repository. This is not defined in the Base-PP because not all network devices will necessarily need to interface with a certificate repository.</con-mod>
12341252
<con-mod ref="OE.CERT_REPOSITORY_SEARCH">This objective intends for the TOE’s OE which will provide a certificate
@@ -1447,19 +1465,15 @@ expected to enforce.<h:p/>
14471465
</f-component>
14481466

14491467

1450-
<f-component name="Prevention of Audit Data Loss" cc-id="fau_stg.4" id="fau-stg-4">
1468+
<f-component name="Prevention of Audit Data Loss" cc-id="fau_stg.5" id="fau-stg-5">
14511469
<consistency-rationale>This SFR applies to the prevention of audit data loss by the inclusion of the
14521470
auditor role which is not listed in the Base-PP.</consistency-rationale>
1453-
<comp-lev></comp-lev>
1454-
<management></management>
1455-
<audit></audit>
1456-
<dependencies></dependencies>
1457-
<f-element id="fau-stg-4e1">
1471+
<f-element id="fau-stg-5e1">
14581472
<title>
14591473
The TSF shall [<h:i>prevent audited events, except those taken by the <h:b><selectables>
14601474
<selectable>Security Administrator</selectable>
1461-
<selectable>Auditor</selectable></selectables></h:b></h:i>] and <assignable>other actions to be taken in
1462-
case of audit storage failure</assignable> if the audit trail <h:b>cannot be written to</h:b>.
1475+
<selectable>Auditor</selectable></selectables></h:b>, <assignable>other actions to be taken in
1476+
case of audit storage failure</assignable></h:i>]if the audit <h:b>trail cannot be written to</h:b>.
14631477
</title>
14641478
<note role="application">
14651479
This requirement applies to the TOE regardless of whether the audit trail is stored
@@ -1781,7 +1795,7 @@ expected to enforce.<h:p/>
17811795
FCS_CKM.1 Cryptographic Key Generation<h:p/>
17821796
FCS_CKM.2 Cryptographic Key Distribution<h:p/>
17831797
FCS_COP.1 Cryptographic Operation<h:p/>
1784-
FCS_RBG_EXT.1 Random Bit Generation<h:p/>
1798+
FCS_RBG.1 Random Bit Generation<h:p/>
17851799
FCS_TTTS_EXT.1 Thru-Traffic TLS Inspection Server Protocol<h:p/>
17861800
FIA_X509_EXT.1 X.509 Certificate Validation<h:p/>
17871801
FIA_X509_EXT.2 X.509 Certificate Authentication<h:p/>
@@ -2420,7 +2434,7 @@ legacy cipher suites. -->
24202434
FCS_CKM.1 Cryptographic Key Generation<h:p/>
24212435
FCS_CKM.2 Cryptographic Key Distribution<h:p/>
24222436
FCS_COP.1 Cryptographic Operation<h:p/>
2423-
FCS_RBG_EXT.1 Random Bit Generation<h:p/>
2437+
FCS_RBG.1 Random Bit Generation<h:p/>
24242438
FCS_TTTC_EXT.1 Thru-Traffic TLS Inspection Client Protocol<h:p/>
24252439
FIA_X509_EXT.1 X.509 Certificate Validation<h:p/>
24262440
FIA_X509_EXT.2 X.509 Certificate Authentication
@@ -5214,10 +5228,10 @@ legacy cipher suites. -->
52145228
<!-- Protection of the TSF (FPT) -->
52155229
<section title="Protection of the TSF (FPT)" id="m-fpt">
52165230

5217-
<f-component name="Failure with Preservation of Secure State" cc-id="fpt_fls.1" id="fpt-fls-1">
5231+
<f-component name="Failure with Preservation of Secure State" cc-id="fpt_fls.1" iteration="STIP" id="fpt-fls-1">
52185232
<consistency-rationale>This SFR applies to preserving a secure state when different failures occur
52195233
which is not defined in the Base-PP.</consistency-rationale>
5220-
<f-element id="fpt-fls-1e1">
5234+
<f-element id="fpt-fls-1e1-stip">
52215235
<title>The TSF shall preserve a secure state when the following types of failures occur: <h:b>
52225236
DRBG failure, integrity test failure, external audit server is unavailable, <selectables>
52235237
<selectable>local audit storage is full</selectable>
@@ -5250,7 +5264,7 @@ legacy cipher suites. -->
52505264
<Guidance>The evaluator shall examine the operational guidance to ensure it describes the actions that might occur in response to any detected failures
52515265
and provides remedial instructions for the administrator.<h:p/></Guidance>
52525266
<Tests>The evaluator shall attempt to cause each documented failure to occur and shall verify that the
5253-
actions taken by the TSF are those specified in FPT_FLS.1.1. For those failures that the evaluator cannot
5267+
actions taken by the TSF are those specified in FPT_FLS.1.1/STIP. For those failures that the evaluator cannot
52545268
cause, the evaluator shall provide a justification to explain why the failure could not be induced.
52555269
</Tests>
52565270
</aactivity>
@@ -5370,7 +5384,7 @@ legacy cipher suites. -->
53705384
<Tests>The evaluator shall attempt to cause each documented failure to occur and shall verify that the
53715385
result of this failure is that the TSF enters a maintenance mode. The evaluator shall also verify that the
53725386
maintenance mode can be exited and the TSF can be restored to a secure state. This testing may be
5373-
performed in conjunction with FPT_FLS.1.</Tests>
5387+
performed in conjunction with FPT_FLS.1/STIP.</Tests>
53745388
</aactivity>
53755389
</f-element>
53765390
<audit-event>
@@ -5571,12 +5585,10 @@ legacy cipher suites. -->
55715585
<selectable>certificate</selectable>
55725586
<selectable>certificate issuer</selectable>
55735587
</selectables> used by requested servers according to
5574-
<h:b>
55755588
<selectables>
55765589
<selectable>a Security Administrator configurable number of the most common requested servers</selectable>
55775590
<selectable>a Security Administrator specified list of servers</selectable>
55785591
<selectable><assignable>a Security Administrator configurable rules based on attributes of the certificates used by the server</assignable></selectable></selectables>.
5579-
</h:b>
55805592
</title>
55815593
<ext-comp-def-title>
55825594
<title>
@@ -6070,10 +6082,10 @@ legacy cipher suites. -->
60706082
<title>
60716083
The TSF shall be able to obtain EST server and CA certificates for authorized EST
60726084
services via <selectables>
6073-
<selectable>implicit Trust Anchor/Trust Store (TA) configured by <h:b>
6085+
<selectable>implicit Trust Anchor/Trust Store (TA) configured by
60746086
<selectables>
60756087
<selectable>Security Administrator</selectable>
6076-
<selectable>CA Operations Staff</selectable></selectables></h:b></selectable>
6088+
<selectable>CA Operations Staff</selectable></selectables></selectable>
60776089
<selectable>an explicit TA populated
60786090
via a TLS-authenticated EST CA certificate request in accordance with RFC 7030
60796091
section 4.1.2 and FCS_TLSC_EXT.1</selectable>
@@ -6098,7 +6110,7 @@ legacy cipher suites. -->
60986110
store elements from the <selectables>
60996111
<selectable>implicit Trust Anchor database</selectable>
61006112
<selectable>explicit Trust Anchor/Trust Store</selectable>
6101-
</selectables> in accordance with FIA_X509_EXT.1<h:b>/Rev</h:b> for all EST requests.
6113+
</selectables> in accordance with FIA_X509_EXT.1 <h:b>(from <xref to="pkgX509"/>)</h:b> for all EST requests.
61026114
</title>
61036115
<ext-comp-def-title>
61046116
<title>
@@ -6519,11 +6531,11 @@ legacy cipher suites. -->
65196531
<h:li>The validity field shall specify a notBefore value that does not precede
65206532
the current time and a notAfter value that does not precede the value
65216533
specified in notBefore.</h:li>
6522-
<h:li>The issuer field is not empty and is populated with the <h:b>
6534+
<h:li>The issuer field is not empty and is populated with the
65236535
<selectables>
65246536
<selectable>Security Administrator</selectable>
65256537
<selectable>CA Operations Staff</selectable>
6526-
</selectables></h:b>-configured CA name.</h:li>
6538+
</selectables>-configured CA name.</h:li>
65276539
<h:li>The signature field and the algorithm in the subjectPublicKeyInfo field
65286540
shall contain the OID for a signature algorithm specified in
65296541
FCS_COP.1<h:b>/SigGen in the NDcPP</h:b>.</h:li>
@@ -6654,11 +6666,11 @@ legacy cipher suites. -->
66546666
notAfter time of the CA’s signing certificate.</h:li>
66556667
<h:li>The issuer field identifies the <selectables>
66566668
<selectable>subject</selectable>
6657-
<selectable><h:b>
6669+
<selectable>
66586670
<selectables>
66596671
<selectable>Security Administrator</selectable>
66606672
<selectable>CA Operations Staff</selectable>
6661-
</selectables></h:b>-assigned identifying information</selectable>
6673+
</selectables>-assigned identifying information</selectable>
66626674
</selectables> of the CA's signing certificate.</h:li>
66636675
<h:li><selectables linebreak="yes">
66646676
<selectable>The subject name is limited by name constraints specified in the CA’s
@@ -6704,12 +6716,12 @@ legacy cipher suites. -->
67046716
<h:li>The notAfter field shall not exceed the notAfter field of the validated
67056717
client certificate.</h:li>
67066718
<h:li>The notAfter field shall not exceed the current time by more than a
6707-
maximum validity duration value as configured by a <h:b>
6719+
maximum validity duration value as configured by a
67086720
<selectables>
67096721
<selectable>Security Administrator</selectable>
67106722
<selectable>CA Operations Staff</selectable>
67116723
</selectables>
6712-
</h:b> user.</h:li>
6724+
user.</h:li>
67136725
<h:li>If the basicConstraints field is configured to be present, it shall be
67146726
populated with the value cA=False.</h:li>
67156727
<h:li>If configured to be present, th epolicy OID and policy mapping fields shall be populated according to
@@ -6890,7 +6902,8 @@ legacy cipher suites. -->
68906902
</f-element>
68916903
<audit-event>
68926904
<audit-event-descr>Certificate generation</audit-event-descr>
6893-
<audit-event-info>Success: <selectables>
6905+
<audit-event-info><comment>There is an auditable event designated "Success" here but nothing listed for "Failure". Should an additional event be included for a failure case?</comment>
6906+
Success: <selectables>
68946907
<selectable>certificate value</selectable>
68956908
<selectable>certificate object identifier</selectable>
68966909
</selectables></audit-event-info>
@@ -6932,10 +6945,10 @@ legacy cipher suites. -->
69326945
<f-element id="fdp-csi-ext-2e2">
69336946
<title>
69346947
The TSF shall support changes to the status of a certificate in accordance with the following rules: <h:ul>
6935-
<h:li>as directed by <h:b><selectables>
6948+
<h:li>as directed by <selectables>
69366949
<selectable>Security Administrator</selectable>
69376950
<selectable>CA Operations Staff</selectable>
6938-
</selectables></h:b> and</h:li>
6951+
</selectables> and</h:li>
69396952
<h:li>
69406953
<selectables linebreak="yes">
69416954
<selectable>a certificate in cache is revoked when a certificate representing the same subject is received for client authentication and either <h:ul>
@@ -7192,7 +7205,7 @@ legacy cipher suites. -->
71927205
<selectable>invoke the Operational Environment to provide</selectable>
71937206
</selectables>
71947207
the ability to search certificates containing specified values of the following
7195-
certificate fields: <h:b><selectables linebreak="yes">
7208+
certificate fields: <selectables linebreak="yes">
71967209
<selectable>subject name</selectable>
71977210
<selectable>individual components of Subject Alternative Name</selectable>
71987211
<selectable>subject ID</selectable>
@@ -7203,7 +7216,7 @@ legacy cipher suites. -->
72037216
<selectable>extended key usage</selectable>
72047217
<selectable>serial number</selectable>
72057218
<selectable><assignable>list of other certificate fields</assignable></selectable>
7206-
</selectables></h:b>
7219+
</selectables>
72077220
returning all matching certificates and <assignable>object identifier(s)</assignable> of
72087221
matching certificate.
72097222
</title>
@@ -7495,6 +7508,7 @@ legacy cipher suites. -->
74957508
</section>
74967509

74977510
<section title="Identification and Authentication (FIA)" id="obj-fia">
7511+
<comment>All objective SFRs need a review to determine if they should change status in the next release of this PP-Module.</comment>
74987512

74997513
<f-component name="Client Use of TLS-Unique Value" cc-id="fia_estc_ext.2" id="fia-estc-ext-2">
75007514
<consistency-rationale>This SFR applies to the implementation of EST, which is a method of acquiring certificates that is not defined in the Base-PP.</consistency-rationale>
@@ -7585,16 +7599,8 @@ This appendix lists requirements that should be considered satisfied by products
75857599
<entry id="bibNDcPP">
75867600
<tag>NDcPP</tag>
75877601
<description>
7588-
<h:a href="https://www.niap-ccevs.org/Profile/Info.cfm?PPID=447&amp;id=447/">
7589-
collaborative Protection Profile for Network Devices</h:a>, Version 2.2E, March 2020
7590-
</description>
7591-
</entry>
7592-
7593-
<entry id="bibNDSD">
7594-
<tag>ND-SD</tag>
7595-
<description>
7596-
<h:a href="https://www.niap-ccevs.org/Profile/Info.cfm?PPID=447&amp;id=447/">
7597-
Supporting Document - Mandatory Technical Document - Evaluation Activities for Network Device cPP</h:a>, Version 2.2, December 2019
7602+
<h:a href="https://www.niap-ccevs.org/protectionprofiles/482">
7603+
collaborative Protection Profile for Network Devices</h:a>, Version 3.0E, 06 December 2023
75987604
</description>
75997605
</entry>
76007606

0 commit comments

Comments
 (0)