Skip to content

Commit d7e0269

Browse files
committed
CC:2022 updates
1 parent a429f2a commit d7e0269

File tree

1 file changed

+25
-24
lines changed

1 file changed

+25
-24
lines changed

input/stip.xml

Lines changed: 25 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -412,13 +412,13 @@ expected to enforce.<h:p/>
412412
or via the TOE, especially if the device fails before the incident can be understood. Unknown activity
413413
associated to routing configurations, communications with the TOE, as well as the decision to bypass
414414
inspection of traffic can allow an adversary to mask attempts to access monitored clients. </description>
415-
<addressed-by>FAU_GCR_EXT.1</addressed-by>
415+
<addressed-by>FAU_STG.1 (from Base-PP)</addressed-by>
416+
<rationale>Mitigates the threat by defining a mechanism for the secure storage of audit data in the OE.</rationale>
417+
<addressed-by>FAU_GCR_EXT.1</addressed-by>
416418
<rationale>Mitigates the threat by defining the mechanism the TOE uses to store certificate data.</rationale>
417419
<addressed-by>FAU_GEN.1/STIP</addressed-by>
418420
<rationale>Mitigates the threat by defining the auditable events specific to STIP functionality that the TSF must generate.</rationale>
419421
<addressed-by>FAU_SAR.1</addressed-by><rationale>Mitigates the threat by defining administrative review of audit records for any potential issues in TOE configuration or functionality.</rationale>
420-
<addressed-by>FAU_STG.1 (from Base-PP)</addressed-by>
421-
<rationale>Mitigates the threat by defining a mechanism for the secure storage of audit data in the OE.</rationale>
422422
<addressed-by>FAU_STG.5</addressed-by>
423423
<rationale>Mitigates the threat by requiring the TSF to disable the execution of auditable events if the audit trail cannot be written to.</rationale>
424424
<addressed-by>FAU_SAR.3 (optional)</addressed-by>
@@ -473,13 +473,17 @@ expected to enforce.<h:p/>
473473
or signed data that would be trusted by monitored clients.
474474
Any modification of the signing key can result in denial of service to inspection capabilities, or to the monitored clients.
475475
</description>
476-
<addressed-by>FCS_STG_EXT.1</addressed-by>
477-
<rationale>Mitigates the threat by requiring the TOE to implement hardware-based protection for stored keys.</rationale>
478-
<addressed-by>FCS_TLSC_EXT.1 (from <xref to="pkgTLS"/>)</addressed-by>
479-
<rationale>Mitigates the threat because TLS is a mechanism by which its own certificate data may be obtained from an external CA. </rationale>
480-
<addressed-by>FCS_TLSC_EXT.2 (from <xref to="pkgTLS"/>)</addressed-by>
481-
<rationale>Mitigates the threat because mutually-authenticated TLS is a mechanism by which its own certificate
482-
data may be obtained from an external CA. </rationale>
476+
477+
<addressed-by>FCS_TLSC_EXT.1 (from <xref to="pkgTLS"/>)</addressed-by>
478+
<rationale>Mitigates the threat because TLS is a mechanism by which its own certificate data may be obtained from an external CA. </rationale>
479+
<addressed-by>FCS_TLSC_EXT.2 (from <xref to="pkgTLS"/>)</addressed-by>
480+
<rationale>Mitigates the threat because mutually-authenticated TLS is a mechanism by which its own certificate data may be obtained from an external CA. </rationale>
481+
<addressed-by>FIA_X509_EXT.1 (from <xref to="pkgX509"/>)</addressed-by>
482+
<rationale>Mitigates the threat by defining the TOE functionality for certificate validation. </rationale>
483+
<addressed-by>FIA_X509_EXT.3 (from <xref to="pkgX509"/>)</addressed-by>
484+
<rationale>Mitigates the threat by defining the mechanism by which the TOE generates certificate signing requests, which includes validation of the certificate provided in response. </rationale>
485+
<addressed-by>FCS_STG_EXT.1</addressed-by>
486+
<rationale>Mitigates the threat by requiring the TOE to implement hardware-based protection for stored keys.</rationale>
483487
<addressed-by>FDP_CER_EXT.1</addressed-by>
484488
<rationale>Mitigates the threat by defining the rules the TOE must use to generate and issue proxy TLS server certificates from its internal CA. </rationale>
485489
<addressed-by>FDP_CER_EXT.2</addressed-by>
@@ -492,10 +496,6 @@ expected to enforce.<h:p/>
492496
<rationale>Mitigates the threat by defining the mechanism used to protect public key data from unauthorized modification.</rationale>
493497
<addressed-by>FIA_ENR_EXT.1</addressed-by>
494498
<rationale>Mitigates the threat by defining the mechanism by which the TOE requests a certificate for its own embedded CA's signing key. </rationale>
495-
<addressed-by>FIA_X509_EXT.1 (from <xref to="pkgX509"/>)</addressed-by>
496-
<rationale>Mitigates the threat by defining the TOE functionality for certificate validation. </rationale>
497-
<addressed-by>FIA_X509_EXT.3 (from <xref to="pkgX509"/>)</addressed-by>
498-
<rationale>Mitigates the threat by defining the mechanism by which the TOE generates certificate signing requests, which includes validation of the certificate provided in response. </rationale>
499499
<addressed-by>FIA_X509_EXT.1/STIP</addressed-by>
500500
<rationale>Mitigates the threat by defining the certificate validation rules that must be followed for certificates that are used for proxy TLS connections. </rationale>
501501
<addressed-by>FIA_X509_EXT.2/STIP</addressed-by>
@@ -718,6 +718,12 @@ expected to enforce.<h:p/>
718718
<rationale>Mitigates the threat by defining the TOE's ability to establish proxy TLS sessions between a monitored client and a requested server and to apply appropriate rules to the handling of the decrypted traffic.</rationale>
719719
<addressed-by>FDP_TEP_EXT.1</addressed-by>
720720
<rationale>Mitigates the threat by defining the TOE's ability to enforce filtering rules on TLS traffic passing through the TOE.</rationale>
721+
<addressed-by>FMT_MOF.1/STIP</addressed-by>
722+
<rationale>Mitigates the threat by defining the authorized use of the TOE by association between the supported management functions and the roles that are authorized to perform them.</rationale>
723+
<addressed-by>FMT_SMF.1/STIP</addressed-by>
724+
<rationale>Mitigates the threat by defining the TOE's management functions that are specific to STIP functionality.</rationale>
725+
<addressed-by>FMT_SMR.2/STIP</addressed-by>
726+
<rationale>Mitigates the threat by defining additional management roles that the TOE may support that are specific to STIP functionality.</rationale>
721727
<addressed-by>FCS_TTTC_EXT.3 (selection-based)</addressed-by>
722728
<rationale>Mitigates the threat by defining optional support for TLS mutual authentication that is applied to the TOE's proxy TLS client interface.</rationale>
723729
<addressed-by>FCS_TTTC_EXT.4 (selection-based)</addressed-by>
@@ -728,12 +734,7 @@ expected to enforce.<h:p/>
728734
<rationale>Mitigates the threat by defining optional support for TLS session renegotiation that is applied to the TOE's proxy TLS server interface.</rationale>
729735
<addressed-by>FDP_STIP_EXT.2 (selection-based)</addressed-by>
730736
<rationale>Mitigates the threat by defining the optional capability of the TOE to establish a proxy TLS session in the case where mutual authentication is supported.</rationale>
731-
<addressed-by>FMT_MOF.1/STIP</addressed-by>
732-
<rationale>Mitigates the threat by defining the authorized use of the TOE by association between the supported management functions and the roles that are authorized to perform them.</rationale>
733-
<addressed-by>FMT_SMF.1/STIP</addressed-by>
734-
<rationale>Mitigates the threat by defining the TOE's management functions that are specific to STIP functionality.</rationale>
735-
<addressed-by>FMT_SMR.2/STIP</addressed-by>
736-
<rationale>Mitigates the threat by defining additional management roles that the TOE may support that are specific to STIP functionality.</rationale>
737+
737738
</threat>
738739

739740
<threat name="T.INAPPROPRIATE_ACCESS">
@@ -1360,7 +1361,7 @@ expected to enforce.<h:p/>
13601361
the through-traffic processing of the TOE.</consistency-rationale>
13611362
<f-element id="fcs-cop-1e1-stip">
13621363
<title>
1363-
The TSF shall perform encryption/decryption in accordance with specified
1364+
The TSF shall perform [<h:i>encryption/decryption</h:i>] in accordance with specified
13641365
cryptographic algorithms [<h:i>AES in CCM and CCM-8 mode and <selectables>
13651366
<selectable>TDES used
13661367
in CBC mode with 3 distinct keys in its key set</selectable>
@@ -2414,12 +2415,12 @@ legacy cipher suites. -->
24142415
</f-element>
24152416
<f-element id="fcs-ttts-ext-1e2">
24162417
<title>
2417-
The TSF shall deny connections from clients requesting [SSL 2.0, SSL 3.0, and
2418+
The TSF shall deny connections from clients requesting [<h:i>SSL 2.0, SSL 3.0, and
24182419
<selectables>
24192420
<selectable>TLS 1.1</selectable>
24202421
<!-- Note: is it ok that we changed this selection to make the SFR parse better when it's chosen -->
24212422
<selectable>no other SSL or TLS versions</selectable>
2422-
</selectables>
2423+
</selectables></h:i>]
24232424
for thru-traffic processing.
24242425
</title>
24252426
<ext-comp-def-title>
@@ -2483,7 +2484,7 @@ legacy cipher suites. -->
24832484
<selectable><assignable>other curves</assignable></selectable>
24842485
</selectables> and no other curves.</h:li>
24852486
</h:ul>
2486-
</h:i>
2487+
</h:i>].
24872488
</title>
24882489
<ext-comp-def-title>
24892490
<title>The TSF shall perform key establishment for TLS with a monitored client using

0 commit comments

Comments
 (0)