You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<rationale>Mitigates the threat by defining a mechanism for the secure storage of audit data in the OE.</rationale>
417
+
<addressed-by>FAU_GCR_EXT.1</addressed-by>
416
418
<rationale>Mitigates the threat by defining the mechanism the TOE uses to store certificate data.</rationale>
417
419
<addressed-by>FAU_GEN.1/STIP</addressed-by>
418
420
<rationale>Mitigates the threat by defining the auditable events specific to STIP functionality that the TSF must generate.</rationale>
419
421
<addressed-by>FAU_SAR.1</addressed-by><rationale>Mitigates the threat by defining administrative review of audit records for any potential issues in TOE configuration or functionality.</rationale>
<rationale>Mitigates the threat because mutually-authenticated TLS is a mechanism by which its own certificate data may be obtained from an external CA. </rationale>
<rationale>Mitigates the threat by defining the mechanism by which the TOE generates certificate signing requests, which includes validation of the certificate provided in response. </rationale>
485
+
<addressed-by>FCS_STG_EXT.1</addressed-by>
486
+
<rationale>Mitigates the threat by requiring the TOE to implement hardware-based protection for stored keys.</rationale>
483
487
<addressed-by>FDP_CER_EXT.1</addressed-by>
484
488
<rationale>Mitigates the threat by defining the rules the TOE must use to generate and issue proxy TLS server certificates from its internal CA. </rationale>
485
489
<addressed-by>FDP_CER_EXT.2</addressed-by>
@@ -492,10 +496,6 @@ expected to enforce.<h:p/>
492
496
<rationale>Mitigates the threat by defining the mechanism used to protect public key data from unauthorized modification.</rationale>
493
497
<addressed-by>FIA_ENR_EXT.1</addressed-by>
494
498
<rationale>Mitigates the threat by defining the mechanism by which the TOE requests a certificate for its own embedded CA's signing key. </rationale>
<rationale>Mitigates the threat by defining the mechanism by which the TOE generates certificate signing requests, which includes validation of the certificate provided in response. </rationale>
499
499
<addressed-by>FIA_X509_EXT.1/STIP</addressed-by>
500
500
<rationale>Mitigates the threat by defining the certificate validation rules that must be followed for certificates that are used for proxy TLS connections. </rationale>
501
501
<addressed-by>FIA_X509_EXT.2/STIP</addressed-by>
@@ -718,6 +718,12 @@ expected to enforce.<h:p/>
718
718
<rationale>Mitigates the threat by defining the TOE's ability to establish proxy TLS sessions between a monitored client and a requested server and to apply appropriate rules to the handling of the decrypted traffic.</rationale>
719
719
<addressed-by>FDP_TEP_EXT.1</addressed-by>
720
720
<rationale>Mitigates the threat by defining the TOE's ability to enforce filtering rules on TLS traffic passing through the TOE.</rationale>
721
+
<addressed-by>FMT_MOF.1/STIP</addressed-by>
722
+
<rationale>Mitigates the threat by defining the authorized use of the TOE by association between the supported management functions and the roles that are authorized to perform them.</rationale>
723
+
<addressed-by>FMT_SMF.1/STIP</addressed-by>
724
+
<rationale>Mitigates the threat by defining the TOE's management functions that are specific to STIP functionality.</rationale>
725
+
<addressed-by>FMT_SMR.2/STIP</addressed-by>
726
+
<rationale>Mitigates the threat by defining additional management roles that the TOE may support that are specific to STIP functionality.</rationale>
<rationale>Mitigates the threat by defining optional support for TLS mutual authentication that is applied to the TOE's proxy TLS client interface.</rationale>
<rationale>Mitigates the threat by defining optional support for TLS session renegotiation that is applied to the TOE's proxy TLS server interface.</rationale>
<rationale>Mitigates the threat by defining the optional capability of the TOE to establish a proxy TLS session in the case where mutual authentication is supported.</rationale>
731
-
<addressed-by>FMT_MOF.1/STIP</addressed-by>
732
-
<rationale>Mitigates the threat by defining the authorized use of the TOE by association between the supported management functions and the roles that are authorized to perform them.</rationale>
733
-
<addressed-by>FMT_SMF.1/STIP</addressed-by>
734
-
<rationale>Mitigates the threat by defining the TOE's management functions that are specific to STIP functionality.</rationale>
735
-
<addressed-by>FMT_SMR.2/STIP</addressed-by>
736
-
<rationale>Mitigates the threat by defining additional management roles that the TOE may support that are specific to STIP functionality.</rationale>
737
+
737
738
</threat>
738
739
739
740
<threat name="T.INAPPROPRIATE_ACCESS">
@@ -1360,7 +1361,7 @@ expected to enforce.<h:p/>
1360
1361
the through-traffic processing of the TOE.</consistency-rationale>
1361
1362
<f-element id="fcs-cop-1e1-stip">
1362
1363
<title>
1363
-
The TSF shall perform encryption/decryption in accordance with specified
1364
+
The TSF shall perform [<h:i>encryption/decryption</h:i>] in accordance with specified
1364
1365
cryptographic algorithms [<h:i>AES in CCM and CCM-8 mode and <selectables>
1365
1366
<selectable>TDES used
1366
1367
in CBC mode with 3 distinct keys in its key set</selectable>
@@ -2414,12 +2415,12 @@ legacy cipher suites. -->
2414
2415
</f-element>
2415
2416
<f-element id="fcs-ttts-ext-1e2">
2416
2417
<title>
2417
-
The TSF shall deny connections from clients requesting [SSL 2.0, SSL 3.0, and
2418
+
The TSF shall deny connections from clients requesting [<h:i>SSL 2.0, SSL 3.0, and
2418
2419
<selectables>
2419
2420
<selectable>TLS 1.1</selectable>
2420
2421
<!-- Note: is it ok that we changed this selection to make the SFR parse better when it's chosen -->
2421
2422
<selectable>no other SSL or TLS versions</selectable>
0 commit comments