Home

Citadel Hercules® Automated Vulnerability

image

Contents

1. Schedule Remediations The TOE provides the capability to schedule remediation activity for single client machines or groups of client machines 6 2 ASSURANCE MEASURES A description of each of the TOE assurance measures follows M AUTH M CONFIG M DELIVER M DESIGN M DEVELOP M DOCS M ID M SETUP The TOE includes documentation which describes the authorization controls used by the developer to ensure that only authorized modifications may be made to the TOE The TOE includes a configuration item list which identifies those items of the TOE which are subject to configuration control by the developer The TOE includes documentation describing the secure delivery of the TOE The TOE includes design documentation which at a minimum consists of an informal functional specification an informal high level design and an informal correspondence demonstration between the TOE Summary Specification the Functional Specification and the High Level Design The TOE includes documentation which describes the development security measures The TOE includes user and administrator guidance documentation in the form of a User s Guide and an Installation Guide as well as an on line help file accessible from the TOE HMI The TOE incorporates a unique version identifier that can be displayed to the user The TOE includes an automated installation and set up program compatible with the TOE operating system The installation
2. Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 23 of 68 WEVA Hercules AVR Security Target FPT ITT 1 1 Dependencies FPT_RVM 1 Hierarchical to FPT_RVM 1 1 Dependencies FPT_SEP 1 Hierarchical to FPT_SEP 1 1 FPT_SEP 1 2 Dependencies FPT_STM 1 Hierarchical to FPT_STM 1 1 Dependencies The TSF shall protect TSF data from selection disclosure modification when it is transmitted between separate parts of the TOE No dependencies Non bypassability of the TSP No other components The TSF shall ensure that TSP enforcement functions are invoked and succeed before each function within the TSC is allowed to proceed No dependencies TSF domain separation No other components The TSF shall maintain a security domain for its own execution that protects it from interference and tampering by untrusted subjects The TSF shall enforce separation between the security domains of subjects in the TSC No dependencies Reliable time stamps No other components The TSF shall be able to provide reliable time stamps for its own use No dependencies 5 3 SECURITY FUNCTIONAL REQUIREMENTS PROVIDED BY THE OPERATING SYSTEM The Hercules AVR product relies upon the underlying operating system to provide some of the security features of the product Of the security functional requirements listed in the previous paragraph the operating systems provides all or part of the fun
3. The TOE will only respond to requests for remediations which are received from identified and authorized client machines FIA_UAU 2 FIA_UID 2 The TOE also enforces the SERVER SFP information flow control security functional policy to limit its exposure to attacks by client machines and to ensure that only the correct remediation profiles are provided to client machines FDP_IFC 1 FDP_IFF 1 The TOE also maintains an audit trail of remediation requests which may help to identify an attack from a client machine FAU_GEN 1 The TOE must provide effective remediation of known and reported vulnerabilities for client systems The TOE obtains its vulnerability and remediation data from trusted external sources using the IMPORT_SFP information flow control security function policy to govern the data import process FDP_IFC 1 FDP_IFF 1 The TOE protects its data from unauthorized modifications or corruption both internally FMT MSA 1 FMT MSA 3 FPT RVM 1 FPT SEP 1 and during transmission to the client systems FDP_ITT 1 The TOE enforces the SERVER_ SFP information flow control security functional policy when providing specific remediation data to authorized client systems FDP IFC 1 FDP_IFF 1 The TOE permits authorized users to configure the list of client systems and vulnerabilities which will be remediated FMT SMF 1 Under specific circumstances the TOE is capable of rolling back remediations FDP_ROL 1 Finally the TOE maintain
4. WEVA Hercules AVR Security Target FMT_MTD 1 Hierarchical to FMT_MTD 1 1 Dependencies FMT_SMF 1 Hierarchical to FMT SMF 1 1 Dependencies FMT_SMR 1 Hierarchical to FMT SMR 1 1 FMT SMR 1 2 Dependencies FPT_ITT 1 Hierarchical to Management of TSF data No other components The TSF shall restrict the ability to selection modify delete assignment aggregate display the assignment vulnerability data remediation data and client system vulnerability and remediation status to assignment authorised Hercules AVR users FMT SMF 1 Specification of management functions FMT SMR 1 Security roles Specification of Management Functions No other components The TSF shall be capable of performing the following security management functions assignment a specifying a list of client systems which are to be subject to automatic vulnerability remediation b specifying which vulnerabilities are to be remediated c scheduling automatic vulnerability remediations and d rolling back previously completed remediations No dependencies Security roles No other components The TSF shall maintain the roles assignment Hercules AVR User and any other installation specific roles created by authorised Hercules AVR Users The TSF shall be able to associate users with roles FIA_UID 1 Timing of identification Basic internal TSF data transfer protection No other components
5. as Hi D lt Z O i fee O CLIENTREM bel P oxen EN Baa O SCANDATA ANNER O CLIENTPROT Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 54 of 68 E WA Hercules AVR Security Target FDP _IFF 1 FDP_ITC 1 FDP_ITT 1 FDP ROL FIA_AFL 1 FIA_SOS 1 FIA_UAU 2 FIA UID2 FMT MSA 1 FMT MSA3 FMT MTD 1 FMT SME 1 FMT SMR 1 FPT_ITT 1 x eer Rym xt ff Eer sera Tx fT EE Per smi ixi Table 4 Mapping of Security Functional Requirements to TOE Security Objectives R A a a Re EEE E BEES SS ERR A BLE E o N A A aae o eej oeoa AONA CAAA E O CLIENTAUTH The TOE must provide a mechanism for a two way authentication between client systems and the Remediation Server The SERVER SFP information flow control security functional policy and associated management functions FDP_IFC 1 FDP_IFF 1 FMT_MSA 1 FMT_MSA 3 FMT SMF 1 control the flow of information between the Hercules AVR Server and the client systems In addition the identification and authentication functional requirements FIA_UAU 2 and FIA_UID 2 ensure that the identification and authentication activities complete successfully before information is transferred O CLIENTPROT The TOE must protect itself against attacks initiated by client Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 55 of 68 EMMA Hercules AVR Security Target O CLIENTREM O HMI O NETATK Systems
6. Integrity IT Product Network Information or resources to be protected by the countermeasures of a TOE An attempt to bypass security controls on an IT System The attack may alter release or deny data Whether an attack will succeed depends on the vulnerability of the IT System and the effectiveness of existing countermeasures The independent examination of records and activities to ensure compliance with established controls policy and operational procedures and to recommend indicated changes in controls policy or procedures In an IT System a chronological record of system resource usage this includes user login file access or other activities and whether any actual or attempted security violations occurred legitimate and unauthorised To establish the validity of a claimed user or object Assuring information and communications services will be ready for use when expected An intrusion into an IT System where unauthorised disclosure modification or destruction of sensitive information may have occurred Assuring information will be kept secret with access limited to appropriate persons Assessment of a PP a ST or a TOE against defined criteria May range from a computer system to a computer network Assuring information will not be accidentally or maliciously altered or destroyed A package of IT software firmware and or hardware providing functionality designed for use or incorporation within a mul
7. 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 50 of 68 E WA Hercules AVR Security Target 8 RATIONALE 8 1 SECURITY OBJECTIVES RATIONALE Table 3 provides a bi directional mapping of Security Objectives to Threats and Assumptions It is followed by a discussion of how each Threat or Assumption is addressed by the corresponding Security Objective s nm lol lt oe DE Elalalalals lt a vlElSIEBIElAISIE HIE eleaialmivsjalsala 5 AE AE VIE EIE SIE SEE BIBElaElslElaldlIsleleleEle AAA 2 BIS gis 4 8 eo ele DIDO TE EA Al RA Id ad O OOOIOOIOJOIOIO OIO JO IA BACKUP X A CMS X A CONFIG X A GOODOS X IA KNOWLEDGE X IA NOEVIL X IA PHYSICAL X IA TOEUSER x T BADDATA X T CLIENT XIX T CONSOLE xX X T EXPLOIT X T NETEXPLOIT X T REMSERVER X T SNIFF X T SNIFFSCAN X T SPOOF X T SPOOFCLIENT X T SPOOFSCAN X Table 3 Mapping of Security Objectives to Threats and Assumptions A BACKUP The organization operating the TOE has good backup and recovery procedures which are followed allowing the TOE to be recovered to Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 51 of 68 EMMA Hercules AVR Security Target A CMS A CONFIG A GOODOS A KNOWLEDGE A NOEVIL A PHYSICAL a secure configuration after a hardware failure The OE BACKUP objective details the need
8. The O NETATK objective ensures that the information passing between the distributed parts of the TOE is secure T SNIFFSCAN A network attacker may monitor communications between the Remediation Server and a vulnerability scanner to learn vulnerabilities of client systems The O SCANDATA objective ensures that the scanner data used by the TOE is accurate and secure T SPOOF A network attacker may attempt to imitate the Remediation Server and provide erroneous remediation information to a client system in order to compromise the client The O CLIENTAUTH objective ensures that it is not possible to imitate the Remediation server T SPOOFCLIENT 4A network attacker may attempt to imitate a client system in order to gain information about the vulnerabilities of the client system The O CLIENTAUTH objective ensures that it is not possible for an attacker to imitate a client system T SPOOFSCAN A network attacker may attempt to provide the Remediation Server with erroneous vulnerability assessment information in an attempt to prevent the remediation of vulnerable network systems The O SCANDATA objective ensures that the scanner data used by the TOE is accurate and secure 8 2 SECURITY REQUIREMENTS RATIONALE Table 4 provides a bi directional mapping of Security Functional Requirements to Security Objectives and is followed by a discussion of how each Security Objective is addressed by the corresponding Security Functional Requirements
9. expected test results and actual test results ATE FUN 12C The test plans shall identify the security functions to be tested and describe the goal of the tests to be performed ATE FUN 1 3C The test procedure descriptions shall identify the tests to be performed and describe the scenarios for testing each security function These scenarios shall include any ordering dependencies on the results of other tests ATE_FUN 1 4C The expected test results shall show the anticipated outputs from a successful execution of the tests ATE_FUN 1 5C The test results from the developer execution of the tests shall demonstrate that each tested security function behaved as specified Evaluator action elements ATE FUN LIE The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence ATE IND 2 Independent testing sample Objectives The objective is to demonstrate that the security functions perform as specified Evaluator testing includes selecting and repeating a sample of the developer tests Application notes The intent is that the developer should provide the evaluator with materials necessary for the efficient reproduction of developer tests This may include such things as machine readable test documentation test programs etc This component contains a requirement that the evaluator has available test results from the developer to supplement the program of testing The evaluator
10. features satisfy the requirements of ADV_HLD 2 ADV_RCR 1 Informal Correspondence Demonstration Assurance Measure M DESIGN ensures that the TOE design documentation includes an informal correspondence demonstration between the TOE Summary Specification the Functional Specification and the High Level Design This measure satisfies the requirements of ADV_RCR 1 Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 66 of 68 E WA Hercules AVR Security Target AGD_ADM 1 Administrator Guidance Assurance Measure M DOCS ensures that the TOE documentation includes a user manual and online help system Since all users of the TOE are also administrators refer to assumption A TOEUSER this documentation acts as both User and Administrator guidance This measure satisfies the requirements of AGD_ADM 1 AGD_USR 1 User Guidance Assurance Measure M DOCS ensures that the TOE documentation includes a user manual and online help system This measure satisfies the requirements of AGD_USR 1 ALC_DVS 1 Identification of Security Measures Assurance Measure M DEVELOP ensures that the TOE documentation includes a description of the security measures for the TOE development environment This measure satisfies the requirements of ALC_DVS 1 ATE COV 2 Analysis of Coverage Assurance Measure M TEST ensures that the TOE test documentation includes sufficient evidence to confirm that the developer has systematically tested the TOE against its
11. Standard Server with service pack 6 Windows NT 4 0 Terminal Server with service pack 6 Windows 2000 Professional with any service pack Windows 2000 Server with any service pack Windows 2000 Advanced Server with any service pack Windows XP Professional with any SP Windows Server 2003 Standard Edition and Windows Server 2003 Enterprise Edition For Windows NT 4 0 Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 8 of 68 E WA Hercules AVR Security Target platforms Internet Explorer 5 5 with service pack 2 or above is also required The minimum system requirements for Windows Clients are specified in the Citadel Hercules AVR Automated Vulnerability Remediation Installation Guide d One or more network devices with Hercules AVR Client Version 2 2 0 installed on a supported version of the UNIX operating system The supported versions of the UNIX operating system are Solaris SPARC 2 6 7 8 9 and Red Hat Intel 6 0 6 1 6 2 7 0 7 1 7 2 7 3 8 9 The minimum system requirements for UNIX Clients are specified in the Citadel Hercules AVR Automated Vulnerability Remediation Installation Guide 2 2 TOE BOUNDARY The Hercules AVR product consists of the following major components e The Hercules AVR Administrator Console provides the HMI for the product It uses SSL based communications with the Hercules AVR Server s and has the ability to interact with Windows user accounts d
12. client systems O CLIENTREM The TOE must provide effective remediation of known and reported vulnerabilities for client systems O HMI The TOE must provide a controlled interface to its functionality such that only authorized TOE users are able to access the interface O NETATK The TOE must protect itself against network attackers O REMDATA The TOE must ensure that its remediation data is obtained from trusted sources and must provide a mechanism to ensure the integrity of this data O SCANDATA The TOE must ensure that its scanner data is obtained from trusted sources and must provide a mechanism to ensure the confidentiality and integrity of this data 42 ENVIRONMENT SECURITY OBJECTIVES The list below details the security objectives for the environment in which the TOE resides These objectives are to be met through the application of procedural and or administrative measures They do not impose any additional security requirements upon the TOE OE AUTHUSER Only authorized personnel are permitted physical access to the TOE OE BACKUP Good backup and recovery procedures for the TOE must be in place OE GOODOS Those portions of the client operating system required for the correct operation of the TOE must function correctly OE GOODUSER Knowledgeable non malicious users with system administrator privileges must be assigned to install configure administer operate and maintain the TOE OE GUIDANCE The administrator s resp
13. for external security measures including external procedural physical and personnel controls Evaluator action elements AVA_MSU 1 1E The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence AVA_MSU 1 2E The evaluator shall repeat all configuration and installation procedures to confirm that the TOE can be configured and used securely using only the supplied guidance documentation AVA_MSU 1 3E The evaluator shall determine that the use of the guidance documentation allows all insecure states to be detected AVA_SOF 1 Strength of TOE security function evaluation Dependencies Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 40 of 68 E WA Hercules AVR Security Target ADV_FSP 1 Informal functional specification ADV_HLD 1 Descriptive high level design Developer action elements AVA_SOF 1 1D The developer shall perform a strength of TOE security function analysis for each mechanism identified in the ST as having a strength of TOE security function claim Content and presentation of evidence elements AVA _SOF 1 1C For each mechanism with a strength of TOE security function claim the strength of TOE security function analysis shall show that it meets or exceeds the minimum strength level defined in the PP ST AVA SOF 1 2C For each mechanism with a specific strength of TOE security function claim the strength of TOE security function analys
14. functional specification and high level design This measure satisfies the requirements of ATE COV 2 ATE DPT 1 Testing High Level Design Assurance Measure M TEST ensures that the TOE test documentation includes sufficient evidence to demonstrate that the TSF operates in accordance with its high level design This measure satisfies the requirements of ATE_DPT 1 ATE_FUN 1 Functional Testing Assurance Measure M TEST ensures that the TOE test documentation is sufficient to determine that the developer has functionally tested all TOE security functions This measure satisfies the requirements of ATE _FUN 1 ATE IND 2 Independent Testing Sample Assurance Measure M TEST ensures that the TOE test documentation is sufficient for the evaluator to repeat a sample of the developers functional testing in order to confirm the test results as well as develop independent tests of the TOE security functions This measure satisfies the requirements of ATE_IND 2 AVA_MSU 1 Examination of Guidance Assurance Measure M DOCS ensures that the TOE documentation includes guidance documentation This documentation may be examined for misleading unreasonable and conflicting guidance This measure satisfies the requirements for AVA_MSU 1 Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 67 of 68 E WA Hercules AVR Security Target AVA_SOF 1 Strength of TOE Security Function Evaluation Assurance Measure M VULNER ensures that the TOE vu
15. process includes sufficient instructions to clearly document the installation process The default installation results in the secure installation and start Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 48 of 68 E WA Hercules AVR Security Target up of the TOE M TEST A suitably configured TOE has been evaluated in a controlled networked environment to confirm that TOE functionality operates as specified and that the product can remediate a representative set of well known vulnerabilities from each of the vulnerability classes claimed by the developer TOE functionality has also been evaluated in a real world environment using a representative set of network systems configured with known vulnerabilities The TOE includes developer test documentation which consists of test plans test procedure descriptions expected test results and actual test results The test documentation is sufficient to determine that the developer has systematically tested the TOE against both the functional specification and the high level design M VULNER The TOE includes vulnerability documentation which describes the strength of function analysis along with an analysis of obvious vulnerabilities in the TOE Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 49 of 68 E WA Hercules AVR Security Target 7 PROTECTION PROFILE CLAIMS This ST does not make compliance claims with respect to any Protection Profiles Doc No
16. to TOE Security Objectives 55 Table 5 Security Functional Requirement DependencieS i sees se ee ee ee RA Ge Re 59 Table 6 Security Assurance Requirement Dependencies iese se ee ee ee AR ee 60 Table 7 Mapping of Security Functions to Security Functional Requirements 61 Table 8 Mapping of Assurance Measures to Assurance Reguirements esse sesse see see 66 Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page ii of ii WEVA Hercules AVR Security Target 1 INTRODUCTION 1 1 GENERAL This introductory section presents security target ST identification information an overview of the product and an overview of the ST structure A brief discussion of the ST development methodology is also provided An ST document provides the basis for the evaluation of an information technology IT product or system under the Common Criteria for Information Technology Security Evaluation CC Within the ST the product or system which is being evaluated is referred to as the Target of Evaluation TOE An ST principally defines e A set of assumptions about the security aspects of the environment a list of threats which the product is intended to counter and any known rules with which the product must comply see Section 3 Security Environment e A set of security objectives and a set of security requirements are presented in Sections 4 and 5 Security Objectives and IT Security Requirements resp
17. will repeat a sample of the developer s tests to gain confidence in the results obtained Having established such confidence the evaluator will build upon the developer s testing by conducting additional tests that exercise the TOE in a different manner By using a platform of validated developer test results the evaluator is able to gain confidence that the TOE operates correctly in a wider range of conditions than would be possible purely using the developer s own efforts given a fixed level of resource Having gained confidence that the developer has tested the TOE the evaluator will also have more freedom where appropriate to concentrate testing in areas where examination of documentation or specialist knowledge has raised particular concerns Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 38 of 68 E WA Hercules AVR Security Target Dependencies ADV_FSP 1 Informal functional specification AGD_USR 1 User guidance ATE FUN Functional testing Developer action elements ATE_IND 2 1D The developer shall provide the TOE for testing Content and presentation of evidence elements ATE_IND 2 1C The TOE shall be suitable for testing ATE_IND 2 2C The developer shall provide an equivalent set of resources to those that were used in the developer s functional testing of the TSF Evaluator action elements ATE_IND 2 1E The evaluator shall confirm that the information provided meets all requirements for content a
18. 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 43 of 68 WEVA Hercules AVR Security Target F DISPCLIENT F DISPCLIENTSTATUS F DISPPROF F DISPREMSTATUS F DISPSIG F DISPVADATA F DISPVULN F DOMAINSEP security and system categories Display Network Client Systems The TOE has the capability of displaying via a graphical user interface a list of devices connected to a Hercules AVR Server Display Network Client Status The TOE has the capability of displaying via a graphical user interface the operational status of each client machine Display Profiles The TOE has the capability of displaying via a graphical user interface the list of vulnerabilities which will be remediated by the Hercules AVR Server for a client machine or a group of client machines Display Remediation Status The TOE has the capability of displaying via a graphical user interface the remediation status of each client machine of each Hercules AVR Server Display Remediation Signatures The TOE has the capability of displaying via a graphical user interface the steps required to remediate a specific vulnerability on a client machine Display Scanner Data The TOE has the capability of displaying imported scanner information Display Vulnerabilities The TOE has the capability of displaying graphically the vulnerabilities of machines on a network It shall be possible to list all of the vulnerabilities reported for each
19. 8 E WA Hercules AVR Security Target Assurance Components Assurance Class Identifier Name ACM SCP 1 TOE CM coverage Delivery and Operation ADO_DEL 1 Delivery procedures ADO _IGS 1 Installation generation and start up procedures Development ADV_FSP 1 Informal functional specification ADV RCR 1 Informal correspondence demonstration Independent testing sample Vulnerability Assessment AVA SOF 1 Strength of TOE security function evaluation AVA VLA 1 Developer vulnerability analysis Table 2 EAL 3 Assurance Requirements ACM CAP 3 Authorization controls Objectives A unique reference is required to ensure that there is no ambiguity in terms of which instance of the TOE is being evaluated Labeling the TOE with its reference ensures that users of the TOE can be aware of which instance of the TOE they are using Unique identification of the configuration items leads to a clearer understanding of the composition of the TOE which in turn helps to determine those items which are subject to the evaluation requirements for the TOE Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 26 of 68 E WA Hercules AVR Security Target Providing controls to ensure that unauthorized modifications are not made to the TOE and ensuring proper functionality and use of the CM system helps to maintain the integrity of the TOE Dependencies ALC _DVS 1 Identification of security measures Developer acti
20. FMT MSA 1 Management of Security Attributes Only authorized Hercules AVR users have access to the functions of the TOE F IAUSER These users are subject to the IMPORT SFP information flow control security functional policy for the import of vulnerability scan data F IMPV ADATA and vulnerability remediation data F IMPREMDATA Authorized users may also display the imported vulnerability data F DISPVADATA and aggregate vulnerability information from multiple scans into a unified vulnerability picture for client systems F AGGVADATA Authorized TOE users have the ability to manipulate all of the vulnerability and remediation data held by the TOE F MANAGEDATA FMT MSA 3 Static attribute initialization Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 63 of 68 E WA Hercules AVR Security Target Only authorized Hercules AVR users have access to the TOE for the purposes of initializing security attributes F AUSER The security attributes are used for mutual identification and authentication between the Hercules AVR Server and the client machines F IACLIENT The Hercules AVR users are subject to the IMPORT_SFP information flow control security function policy for the import of vulnerability scan data F IMPV ADATA and vulnerability remediation data F IMPREMDATA Authorized TOE users may specify alternative initial values to override default values when data is imported F MANAGEDATA FMT MTD 1 Management of T
21. L 1 FIA_SOS 1 2 FIA_UID 2 FPT_SEP 1 FDP ROL FIA_SOS 1 FIA _UAU 2 FMT MSA FMT MSA FMT MTD FMT SMF FMT SMR FPT ITT 1 FPT RVM 1 FPT_STM 1 EJ Cnn pt ttt tt EN EN EIEN GN EEN EN ptt TTT te EN EN N EN EN EN EN EN el ad ad es Me Ed ME tT P Pt tT EN EN EN e NN EN EN EN EN aa ME EIE N N Ni dial ME Hi EIE Ed Sa el EN IE EE pt feet ENE Te fe E1EINNEIEINN NN NN NN NN N EN EN EN EE pt EIN e tT EN EN EN MEIN TT d NN EN EN ptt TTT tT EN EN EN EN EN EN EN EN EE ER EE N Lr ad HE AA OR HI ER oF Ged a Al ET eer c E iz E W E Frj gt H gt Z m E eal ia feu imi E im no Pee eee eee eee ENE eee eee ee a Eee Table 7 Mapping of Security Functions to Security Functional Requirements FRVM FAU_GEN 1 Audit data generation The audit function of the TOE collects F AUDIT and stores audit data for actions which are specific to the TOE scanner data import remediation data import client remediations In addition the operating system audit trail retains audit records related to the identification and authorization of users the start up and shut down of the TOE and the start up and shut down of the OS audit mechanism FAU_SAR 1 Audit review The TOE includes a comprehensive HMI Hercules AVR Administrator Console with extensive display and reporting features F REPREMSTATUS which permit all authorized users with the ability to rev
22. ONFIG ensures that the TOE includes a configuration item list Assurance Measure M AUTH ensures that only authorised changes are permitted to the TOE These measures combine to satisfy the requirements of ACM CAP 3 ACM SCP 1 TOE CM Coverage Assurance Measure M CONFIG ensures that the TOE includes a configuration item list The contents of this list ensure that the requirements of ACM SCP 1 are met ADO_DEL 1 Delivery Procedures Assurance Measure M DELIVER ensures that the TOE includes documentation describing the delivery procedures for the TOE This measure satisfies the requirements of ADO_DEL 1 ADO _IGS 1 Installation Generation and Startup Procedures Assurance Measure M SETUP ensures that the TOE includes documentation describing its secure installation generation and startup This measure satisfies the requirements of ADO _IGS 1 ADV_FSP 1 Informal Functional Specification Assurance Measure M DESIGN ensures that the TOE design documentation includes an informal function specification This measure satisfies the requirements of ADV_FSP 1 ADV_HLD 2 Security Enforcing High Level Design Assurance Measure M DESIGN ensures that the TOE design documentation includes an informal high level design which includes a description of the TSF in terms of subsystems a description of the purpose and method of use of all interfaces to the subsystems and a description of the separation of the TOE into TSP enforcing and other subsystems These
23. SF Data Only authorized Hercules AVR users have access to the TOE F IAUSER Only these users have the ability to manipulate display modify delete aggregate vulnerability data F AGGVADATA F DISPVADATA F DISPSIG remediation data F DISPPROF F MANAGEPROF F APPPROF and client system vulnerability and remediation data F DISPVULN F DISPCLIENT F DISPCLIENTSTATUS F DISPREMSTATUS F SCHEDREM FMT_SMF 1 Specification of Management Functions The TOE allows authorized users complete control of the vulnerability and remediation data for all client systems F MANAGEDATA Users may create edit and approve remediation profiles for client systems or groups of client systems F MANAGEPROF F APPPROF Users may also schedule automatic remediation activity for client systems F SCHEDREM F PUSHREM This allows users to remove specific vulnerabilities from specific client systems F REMCLIENT If desired it is also possible is specific circumstances to roll back a previously applied remediation F ROLLBACK FMT_SMR 1 Security Roles By default the TOE uses only one role the Hercules AVR user role Members of this role have access to all of the functionality of the TOE Additionally only individuals authorized as administrators by the underlying operating system are recognized as members of the Hercules AVR user role F IAUSER The TOE provides the capability to create custom roles to which individual users and groups of users may be
24. VALUATED CONFIGURATION siese sees ei dd eN Ga ee eg ee ee ve bk 8 TOE BOUNDARY set EG ves eie Se Ge ee E Ge Re ke Die Ga 9 TOE SECURITY ENVIRONMENT ass oseisses sesde ese sedes ese eed ek Gesie seke ese AN GN Nee eg did 12 ASSUMPTIONS ie ees es ie ee N ae Re ee ie ek N 12 died di ON 13 ORGANIZATIONAL SECURITY POLICIES ccccssssscsscctscesetsorsoncessceseessceaees 14 SECURITY OBJECT UY WS ia see ees ees iden eed san see se ev ke N ese ES dee ee eds dok 15 SECURITY OBJECTIVES FOR THE TOE sessies se See geseen ie EG iek ie 15 ENVIRONMENT SECURITY OBJECTIVES 0 0 ee sesse ese ese se ee se sees se ee se ee se ee ee 15 IT SECURITY REQUIREMENTS ssseseseseseesesorsesesecceeesorseseeesoroeseserossesosonseseeeseesosse 16 TOE SECURITY REODIREMENTS sees se ei ee ke es od a a 16 TOE SECURITY FUNCTIONAL REOUIREMENTS use see sees see ese ee se es se es ee ese 16 SECURITY FUNCTIONAL REQUIREMENTS PROVIDED BY THE OPERATING SYSTEM sesse oe EG N Ge Ge ee GE Oe bo oe ee ede 24 INFORMATION FLOW CONTROL SECURITY FUNCTIONAL POLICIES 25 Hercules AVR Server to Client Information Flow Control Security Functional Policy SERVER SEP verirse E RE ike ee eek dee 25 Vulnerability Scanner Import Information Flow Control Security Functional Policy IMPORT SFP NE RE OE OE N EE 23 TOE SECURITY ASSURANCE REOUIREMENTS issues sedes sieke ie sede de sede ese 25 TOE SUMMARY SPECIFICATION sseesesesoeseseserceeesosceseseccseesosoesesecoeeesosorseseeeeee
25. VA_SOF 1 calculations is LOW Any residual vulnerabilities may only be exploited by an attacker of moderate or high attack potential The strength of function claim is therefore SOF BASIC This claim applies to the security function F JAUSER F IACONSOLE F JACLIENT and F AREMSRV 6 1 TOE SECURITY FUNCTIONS A description of each of the TOE security functions follows F AGGVADATA Aggregate Scanner Data The TOE has the capability of merging vulnerability scanner information from the third party vulnerability scanners for a client machine into a single consistent vulnerability assessment for that machine F APPPROF Approve Profile The TOE provides the capability for a suitably authorized user to approve a remediation profile Once approved the remediation profile shall be automatically invoked by each client machine in the group to which the profile applies at the next scheduled remediation interval F AUDIT Audit Remediation Activity The TOE maintains an audit trail of remediation activity performed by each Hercules AVR server The Hercules AVR server components and windows client systems create events in the Windows event logs which include stop start successful actions and failed actions These events are created on the Hercules AVR server and the target windows machine which is being remediated The Hercules AVR server is capable of generating audit events associated with the Windows Event Viewer application Doc No
26. WEVA SECURITY TARGET CITADEL HERCULES AUTOMATED VULNERABILITY REMEDIATION VERSION 2 2 0 Document No 1451 011 D001 Version 1 13 27 February 2004 Prepared for Citadel Security Software Inc 8750 N Central Expressway Suite 100 Dallas Texas 75231 Prepared by Electronic Warfare Associates Canada Ltd 55 Metcalfe St Suite 1600 Ottawa Ontario KIP 6L5 WEVA Security Target Citadel Hercules Automated Vulnerability Remediation Version 2 2 0 Document No 1451 011 D001 Version 1 13 27 February 2004 lt Original gt Approved by Project Engineer G Gibbs Project Manager E Connor Program Director P Zatychec Signature Date E WA Hercules AVR Security Target 1 1 1 2 1 3 1 4 1 4 1 1 4 2 1 4 3 2 1 2 2 3 1 3 2 3 3 4 1 4 2 5 1 5 2 5 3 5 4 5 4 1 5 4 2 5 5 6 6 1 6 2 7 TABLE OF CONTENTS INTRODUETION sis ees dese dek Ses Ee SG Rd ie ee ge GR dd ee Gee ee GR EN 1 GENERA Leesen oreore iaer ee eg de ee ee De Ge Ge ee eg De terrier 1 IDENTIFICATION oes se ee a RE Ee GE GE N ee eo 1 POT VAD YER VIE Wa oe ee ei Re ee aaa Re ee Ne GE ee ae ee ed ay 2 CONVENTIONS TERMINOLOGY AND ACRONYMS ees see ee ee se ee se ese ese 4 RI MAELO S cap ceeo mincing ecestan tenon esta ciea Geaeagey ean lashes EES 4 I CIA e E E A E E 5 Pie AA scan NE OE AE N EE 7 TARGET OF EVALUATION DESCRIPTION scsssssssssssssssesssssssssssesssessesseees 8 E
27. _MSA 3 2 Dependencies The TSF shall require each user to identify itself before allowing any other TSF mediated actions on behalf of that user No dependencies Management of security attributes No other components a The TSF shall enforce the assignment SERVER SFP to restrict the ability to selection create modify delete assignment nonel the security attributes assignment identification and authentication of client machine to assignment authorised Hercules AVR Users b The TSF shall enforce the assignment IMPORT SFP to restrict the ability to selection create modify delete assignment nonel the security attributes assignment identification and authentication of client machine and Vflash server to assignment authorised Hercules AVR Users FDP_IFC 1 Subset information flow control FMT_SMF 1 Specification of management functions FMT SMR 1 Security roles Static attribute initialisation No other components The TSF shall enforce the assignment SERVER SFP and IMPORT SFP to provide selection permissive default values for security attributes that are used to enforce the SFP The TSF shall allow the assignment authorised TOE users to specify alternative initial values to override the default values when an object or information is created FMT MSA 1 Management of security attributes FMT SMR 1 Security roles Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 22 of 68
28. a generation Hierarchical to No other components FAU_GEN 1 1 The TSF shall be able to generate an audit record of the following auditable events a Start up and shutdown of the audit functions b All auditable events for the selection not specified level of audit and c assignment use of the Hercules AVR Client Management Service Patch Download Service or Vflash Service events in addition to the audit capabilities of the underlying operating system FAU_GEN 1 2 The TSF shall record within each audit record at least the following information a Date and time of the event type of event subject identity and the outcome success or failure of the event and b For each audit event type based on the auditable event definitions of the functional components included in the ST assignment no other audit relevant information Dependencies FPT STM 1 Reliable time stamps FAU_SAR 1 Audit review This component will provide authorised users the capability to obtain and interpret the information In case of human users this information needs to be in a human understandable presentation In case of external IT entities the information needs to be unambiguously represented in an electronic fashion Hierarchical to No other components FAU_SAR 1 1 The TSF shall provide assignment all TOE users with the capability to read assignment all audit information from the audit records FAU_SAR 1 2 The TSF shall provide the audit
29. ables performed to search for obvious ways in which a user can violate the TSP The vulnerability analysis documentation shall describe the disposition of obvious vulnerabilities The vulnerability analysis documentation shall show for all identified vulnerabilities that the vulnerability cannot be exploited in the intended environment for the TOE The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence The evaluator shall conduct penetration testing building on the developer vulnerability analysis to ensure obvious vulnerabilities have been addressed Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 42 of 68 E WA Hercules AVR Security Target 6 TOE SUMMARY SPECIFICATION This section provides a description of the security functions and assurance measures of the TOE that meet the TOE security requirements A typical attacker in the intended environment for the TOE is assumed to have a low level of sophistication but may have knowledge of vulnerabilities and access to attack methods that are in the public domain The purpose of the attacks could be 1 to gain access to the resources of the TOE 2 to gain access to the resources of the client systems protected by the TOE and or 3 to prevent the successful remediation of client systems and thus leave these systems in a vulnerable state Therefore the attack potential which is applicable for A
30. and all machines on the network or to display a list of machines which are susceptible to a specific vulnerability Domain Separation The TOE maintains a security domain for its own execution which protects the TOE from interference and tampering by Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 44 of 68 EMMA Hercules AVR Security Target F ENCRYPT F IACLIENT F IAREMSVR untrusted subjects The TOE enforces the separation of the security domains of the client systems which are being remediated The operating systems Windows and Unix provide this security domain in order to protect the TOE and provide process isolation The TSF ensures that TSP enforcement functions are invoked and succeed before each function within the TSC is allowed to proceed The TSF enforces separation between the security domains of subjects in the TSC Encrypt Data The TOE has the capability of encrypting data which is transferred between the physically separate elements of the TOE The user can configure the Hercules AVR Administrator Console to use HTTPS communication to the Hercules AVR Remediation Server The user can configure the Hercules AVR clients to use HTTPS communication to the Hercules AVR Remediation Server All Hercules AVR Remediation Server to Unix client communications for client management actions will be via SSH All communication between a Hercules AVR Remediation Server and the Cita
31. apabilities Unix clients require a root account to install configure and execute Unix daemons use of Unix file system access control and the use of ssh for installation Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 9 of 68 E WA Hercules AVR Security Target Hercules Administrator Console Vulnerability Scan Data Hercules Server b Vflash Remediation Data Vulnerability Data Download Service Hercules Windows TOE Boundary Hercules Figure 1 TOE Boundary Diagram The Hercules AVR Administrator Console and all of the Hercules AVR Servers fall within the TOE Boundary as do the data stores associated with the Remediation and Vulnerability data used by the Hercules AVR Server Figure 1 shows that client machines are partially inside the TOE Boundary and partially outside the boundary The parts of the client machines which fall within the TOE Boundary consist of the Hercules AVR Client software and those Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 10 of 68 E WA Hercules AVR Security Target portions of the operating system necessary to provide authentication and secure communications with the Hercules AVR Server The Hercules AVR product is designed for the use of network administrators and it is assumed that these users are appro
32. are necessary to protect the confidentiality and integrity of the TOE design and implementation in its development environment ALC DVS 1 2C The development security documentation shall provide evidence that these security measures are followed during the development and maintenance of the TOE Evaluator action elements ALC_DVS 1 1E The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence ALC_DVS 1 2E The evaluator shall confirm that the security measures are being applied ATE COV 2 Analysis of coverage Objectives In this component the objective is to establish that the TSF has been tested against its functional specification in a systematic manner This is to be achieved through an examination of developer analysis of correspondence Application notes The developer is required to demonstrate that the tests which have been identified include testing of all of the security functions as described in the functional specification The analysis should not only show the correspondence between tests and security functions but should provide also sufficient information for the evaluator to determine how the functions have been exercised This information can be used in planning for additional evaluator tests Although at this level the developer has to demonstrate that each of the functions within the functional specification has been tested the amount of testing of each func
33. arge scale enterprise level Windows and Unix Solaris Linux based networks Hercules AVR provides network security administrators with the ability to prioritize and remediate vulnerabilities using automated fixes that have been developed tested verified as being correct and validated as being appropriate by trusted and dedicated IT security professionals New vulnerabilities are being discovered on a daily basis It has been estimated that it takes approximately one manhour of labour to manually correct one vulnerability on one client machine For all but the smallest networks manually correcting vulnerabilities imposes an unacceptable workload and cost for valuable and often scarce network and security administration resources The Hercules AVR product overcomes this problem with Automated Vulnerability Remediation AVR Hercules AVR offers the following significant features e Interoperability Hercules AVR supports many industry leading vulnerability assessment scanners e Multi tiered Architecture The Hercules AVR Administrator Console can be configured to manage multiple Hercules AVR Servers e Administrator Control Administrators maintain complete control over the selection of which vulnerabilities are to be remediated e Multiple O S Support In addition to Windows platforms Hercules AVR supports UNIX Sun Solaris and Linux Red Hat e Reporting Detailed reports organize the vulnerabi
34. arget 2 TARGET OF EVALUATION DESCRIPTION 2 1 EVALUATED CONFIGURATION The Hercules AVR product is designed to facilitate the automatic vulnerability remediation of devices on a network The product imports vulnerability information from a number of third party commercial vulnerability scanner products and consolidates this information into a single view of the vulnerabilities of each device in the network The product provides a sequence of automatically executable remediation steps known as a remediation signature which will correct each recognized vulnerability Users of the product may download new signatures from the V flash server operated by Citadel Security Software The Hercules AVR product provides an interface which allows users to view the listed vulnerabilities of devices on the network Logical groupings of devices may be defined An automatic remediation schedule may be defined for a group In addition a specific list of vulnerabilities to be remediated known as a remediation profile may be defined for the group The evaluated configuration of the Hercules AVR Version 2 2 0 product build 1792 with software update V flash Version 202000501 dated 2 Feb 2004 consists of a The Hercules AVR Administrator Console executing on an Intel Pentium based PC running Windows 2000 Server with all service packs Windows 2000 Advanced Server with all service packs Windows XP Professional with all service pac
35. assigned F MANAGEROLES The ability to use specific features of the TOE such as the creation of user defined vulnerabilities may be assigned to custom roles FPT ITT 1 Basic Internal TSF Data Transfer Protection The TOE uses SSL to secure data transfers between the Administrator Console and the Remediation Server s F ENCRYPT F LACONSOLE F IAREMSVR The TOE uses SSL for Windows clients and OpenSSH for Unix clients to secure data transfers between a Remediation Server and client systems F ENCRYPT F IACLIENT F PUSHREM These functions prevent the unauthorized disclosure and or modification of TSF data FPT RVM 1 Non bypassability of the TSP Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 64 of 68 E WA Hercules AVR Security Target The TOE ensures that the TSP enforcement functions are invoked and successful before any function within the TSC is activated F RVM FPT_SEP 1 TSF Domain Separation The TOE maintains a separate security domain for its own execution F DOMAINSEP This protects the TOE from interference and tampering by untrusted subjects The TOE also enforces separate security domains for each of the client systems being remediated F DOMAINSEP FPT STM 1 Reliable time stamps The audit functions of the TOE F AUDIT use the reliable time stamp provided by the underlying operating system when recording audit records 8 6 TOE ASSURANCE MEASURES RATIONALE The Hercules AVR product is desi
36. atic attribute initialisation Basic internal transfer protection No other components The TSF shall enforce the assignment SERVER_SFP to prevent the selection disclosure modification of user data when it is transmitted between physically separated parts of the TOE FDP_IFC 1 Subset information flow control Basic rollback No other components The TSF shall enforce assignment SERVER_SFP to permit the rollback of the assignment automatic vulnerability remediations on the assignment client machines The TSF shall permit operations to be rolled back within the assignment time period between the completion of the remediation that is to be rolled back and the start of the next remediation FDP_IFC 1 Subset information flow control Authentication failure handling No other components Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 20 of 68 WEVA Hercules AVR Security Target FIA_AFL 1 1 FIA_AFL 1 2 Dependencies FIA_SOS 1 Hierarchical to FIA SOS LI Dependencies FIA_UAU 2 Hierarchical to The TSF shall detect when assignment a user configurable number with an unlimited default value of unsuccessful authentication attempts occur related to assignment consecutive unsuccessful authentication attempts since the last successful authentication to the Hercules AVR Administrator Console or Hercules AVR Server When the defined number of unsuccessful authentication
37. ation Data The TOE has the capability to import specific remediation information for reported vulnerabilities F IMPVADATA Import Scanner Data The TOE has the capability of importing vulnerability scanner information from the following third party vulnerability scanners 1 Foundstone FoundScan Engine 2 Harris STAT Scanner 3 ISS Internet Scanner 4 ISS System Scanner 5 Microsoft MBSA 6 Nessus Scanner 7 Qualys QualysGuard Scanner 8 Retina Digital Security Scanner 9 VIGILANTe SecureScan Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 46 of 68 WEVA Hercules AVR Security Target F MANAGEDATA F MANAGEPROF F MANAGEROLES F PUSHREM F REMCLIENT F REPREMSTATUS F ROLLBACK Manage Scanner and Remediation Data The TOE provides the user with an interface from which it is possible to manage the vulnerability scanner information and the vulnerability remediation information A user may view a remediation profile for a device in order to determine which vulnerabilities and associated remedies will be applied to a device when it is remediated Manage Profiles The TOE provides the capability for a suitably authorized user to manage remediation profiles Machines may be added to or removed from the group to which the profile applies Specific vulnerabilities may be added to or removed from the remediation profile Manage Roles The TOE provides the capability for a su
38. ation profiles or rollback instructions sent from the Server to the client 5 4 2 Vulnerability Scanner Import Information Flow Control Security Functional Policy TMPORT_SFP The TOE relies upon data generated by one or more third party vulnerability scanner products in order to identify the vulnerabilities which exist on client machines These scanner products fall outside the boundary of the TOE The data generated by the scanners is also initially outside the TOE boundary However authorised TOE users may import data from one of the recognised scanner products across the TOE boundary If the vulnerability data is selected by an authorised TOE user and conforms to the expected format of data from one of the supported third party scanner products then the TOE accepts that data as valid vulnerability information During the operation of the TOE the update of vulnerability remediation data must be performed on a regular basis These updates are obtained from the trusted Hercules AVR V Flash server which falls outside the TOE boundary The TOE uses SSL to ensure the fidelity of the data downloaded from the V Flash server 5 5 TOE SECURITY ASSURANCE REQUIREMENTS The security assurance requirements for the TOE comprise the requirements corresponding to the EAL 3 level of assurance as defined in the CC Part 3 The assurance components are summarized in the following table Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 25 of 6
39. attempts has been met or surpassed the TSF shall assignment lock the account attempting to log in and generate an audit record The account shall remain locked until unlocked by an authorised Hercules AVR User FIA UAU 1 Timing of authentication Verification of Secrets No other components 1 The TSF shall provide a mechanism to verify that secrets meet assignment the requirements that user passwords are a minimum of 8 characters in length include a combination of alphanumeric special upper and lower case character and are changed at least once every 42 days 2 The TSF shall provide a mechanism to verify that secrets meet assignment the requirements that the Internal Hercules CMS Domain Administrator Password is a minimum of 8 characters in length a maximum of 15 characters in length with each character generated randomly No dependencies User authentication before any action FIA_UAU 1 FIA UAU 2 1 The TSF shall require each user to be successfully authenticated before allowing any other TSF mediated actions on behalf of that user Dependencies FIA_UID 1 Timing of identification FIA UID 2 User identification before any action Hierarchical to FIA_UID 1 Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 21 of 68 MEWA Hercules AVR Security Target FIA_UID 2 1 Dependencies FMT _MSA 1 Hierarchical to FMT MSA LI Dependencies FMT MSA 3 Hierarchical to FMT MSA 3 1 FMT
40. cedures Content and presentation of evidence elements ADO_DEL 1 1C The delivery documentation shall describe all procedures that are necessary to maintain security when distributing versions of the TOE to a user s site Evaluator action elements ADO_DEL 1 1E The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence ADO IGS 1 Installation generation and start up procedures Dependencies No dependencies Developer action elements ADO_IGS 1 1D The developer shall document procedures necessary for the secure installation generation and start up of the TOE Content and presentation of evidence elements ADO_IGS 1 1C The installation generation and start up documentation shall describe all the steps necessary for secure installation generation and start up of the TOE Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 29 of 68 E WA Hercules AVR Security Target Evaluator action elements ADO_IGS 1 1E The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence ADO_IGS 1 2E The evaluator shall determine that the installation generation and start up procedures result in a secure configuration ADV_FSP 1 Informal functional specification Dependencies ADV_RCR 1 Informal correspondence demonstration Developer action elements ADV_FSP 1 1D The developer shall provide a
41. ctionality for these Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 24 of 68 E WA Hercules AVR Security Target functional requirements FAU_GEN 1 FAU SAR 1 FAU SEL 1 FDP_ITT 1 FIA_AFL 1 FIA_SOS 1 FIA UAU 2 FIA UID 2 FMT MSA 1 FMT_MSA 3 FMT SMR 1 FPT_ITT 1 FPT RVM 1 FPT SEP 1 and FPT STM 1 5 4 INFORMATION FLOW CONTROL SECURITY FUNCTIONAL POLICIES 5 4 1 Hercules AVR Server to Client Information Flow Control Security Functional Policy SERVER_SFP The operating environment for the TOE consists of a Hercules AVR Administrator Console and one or more Hercules AVR Servers connected in a network with a number of client machines It is expected that the client machines will contain vulnerabilities which will be automatically remediated by the Hercules AVR Server on a scheduled basis In an environment where the client machines are assumed to contain vulnerabilities the possibility always exists that one or more of the client machines have been compromised and may act maliciously towards the TOE For this reason the only information that a Hercules AVR Server will accept from any client machine is a the identification of the client machine for authentication purposes when requesting a scheduled remediation and b remediation status information during the course of a remediation session All other information flow between the Hercules AVR Server and a Hercules AVR Client will consist of remedi
42. del Vflash server will be via HTTPS If a patch vendor s site supports HTTPS the downloading of patches will use HTTPS Identify and Authenticate Clients Each Hercules AVR Remediation Server has the capability to identify and authenticate each client machine for which it will issue a remediation profile The client machines can be configured for HTTPS authentication with the Hercules AVR server using a server certificate In the evaluated configuration the clients machines shall be configured with a client certificate for mutual authentication with the Hercules AVR server Identify and Authenticate Remediation Server The Hercules AVR Administrator Console has the capability to identify and authenticate each Hercules AVR Remediation Server through the use of a certificate installed on the server The Hercules AVR Server has the ability to authenticate to the Windows Domain Controller using a Domain Administrator account with an internally generated Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 45 of 68 E WA Hercules AVR Security Target random password F IAUSER Identify and Authenticate Users The Hercules AVR Administrator Console has the capability to identify and authenticate users of the console The Hercules AVR Administrator Console executes using a Windows administrator account which is recognized by the machine hosting the Hercules AVR server F IMPREMDATA Import Remedi
43. e TOE in a secure manner The administrator guidance shall contain warnings about functions and privileges that should be controlled in a secure processing environment The administrator guidance shall describe all assumptions regarding user behaviour that are relevant to secure operation of the TOE The administrator guidance shall describe all security parameters under the control of the administrator indicating secure values as appropriate The administrator guidance shall describe each type of security relevant event relative to the administrative functions that need to be performed including changing the security characteristics of entities under the control of the TSF The administrator guidance shall be consistent with all other documentation supplied for evaluation The administrator guidance shall describe all security requirements for the IT environment that are relevant to the administrator The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence AGD_USR 1 User guidance Dependencies Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 33 of 68 E WA Hercules AVR Security Target ADV_FSP 1 Informal functional specification Developer action elements AGD_USR 1 1D The developer shall provide user guidance Content and presentation of evidence elements AGD USR 1 1C The user guidance shall describe the functions and interface
44. e 43 TOE SECURITY PUNC TIOMS sissies ien gees sd oek eie ese ede oes ve es ie Se eie Ned 43 ASSURANCE MEASURES sessies eed sessie sees leed See kerke geen geed Si Gees ken ees 48 PROTECTION PROFILE CLAIM ses essss sessies ee dees sees ese seed ee ee es eed ee ge dee kie 50 Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page i of ii E WA Hercules AVR Security Target 8 RATIONALE eis sdei sesde es ese kens e sd ede ee seke egg ewe dd geed ed ede ged se ee ky eek Ge we gede 51 8 1 SECURITY OBJECTIVES RATIONALE ses ee Ene sees Se ee GER ie Ge Dee ees eed 51 82 SECURITY REQUIREMENTS RATIONALE esse se esse ss esse ese ese es ese ese ee ge se ee ese se 54 83 SECURITY FUNCTIONAL REQUIREMENT DEPENDENCIES c cceeeeee 57 8 4 SECURITY ASSURANCE REQUIREMENT DEPENDENCIES 0c eceeeeeees 59 8 5 TOE SUMMARY SPECIFICATION RATIONALE ee ees se esse se ee se ee ee se ee se ese ee 60 8 6 TOE ASSURANCE MEASURES RATIONALE ese se esse see ee ee se esse se ese ee esse ee ese 65 LIST OF FIGURES Fig re Ii TOE Boundary Diagram ass ins Sie es seed iese na en isai GE eN 10 LIST OF TABLES Table 1 Summary of CC Part 2 Security Functional Requirements sesse esse see ee ee 17 Table 2 EAL 3 Assurance Reguireimente sessies ss eva Se kee ses dees ge ed Ged ese se eke DER Re idee 26 Table 3 Mapping of Security Objectives to Threats and Assumptions ees see see se ee ee 51 Table 4 Mapping of Security Functional Requirements
45. e evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence ACM_SCP 1 TOE CM coverage Objectives A CM system can control changes only to those items that have been placed under CM i e the configuration items identified in the configuration item list Placing the TOE implementation and the evaluation evidence required by the other assurance components in the ST under CM provides assurance that they have been modified in a controlled manner with proper authorizations Dependencies ACM_CAP 3 Authorization controls Developer action elements ACM SCP 1 ID The developer shall provide a list of configuration items for the TOE Content and presentation of evidence elements ACM SCP 1 1C The list of configuration items shall include the following implementation representation and the evaluation evidence required by the assurance components in the ST Evaluator action elements ACM SCP 1IE The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 28 of 68 E WA Hercules AVR Security Target ADO DEL 1 Delivery procedures Dependencies No dependencies Developer action elements ADO_DEL 1 1D The developer shall document procedures for delivery of the TOE or parts of it to the user ADO_DEL 1 2D The developer shall use the delivery pro
46. ectively e The IT security functions provided by the TOE which meet that set of requirements see Section 6 TOE Summary Specification The structure and contents of this ST comply with the requirements specified in the CC Part 1 Annex C and Part 3 Chapter 5 1 2 IDENTIFICATION Title Registration Common Criteria Conformance Claim Evaluation Assurance Level EAL Protection Profile Conformance Common Criteria Identification International Standard Citadel Hercules Automated Vulnerability Remediation Version 2 2 0 Security Target 383 4 18 The TOE is CC Part 2 conformant and CC Part 3 conformant The TOE is EAL 3 conformant The TOE does not claim conformance with any Protection Profile PP Common Criteria for Information Technology Security Evaluation Version 2 1 August 1999 with all current approved interpretations ISO IEC 15408 1999 Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page of 68 E WA Hercules AVR Security Target Authors This document has been written by EWA Canada on behalf of Citadel Security Software Inc 1 3 PRODUCT OVERVIEW The Hercules AVR is a network security administration tool that is intended to be used in conjunction with advanced network vulnerability assessments The purpose of the product is to enable the deliberate and controlled remote automated vulnerability remediation AVR of all classes of identified network vulnerabilities on l
47. ed within a TOE Data created by and for the TOE that might affect the operation of the TOE The set of interactions that can occur with or within a TOE and are subject to the rules of the TSP An entity human user or external IT entity outside of the TOE that interacts with the TOE Hardware firmware or software flaw that leaves an IT System open for potential exploitation A weakness in automated system security procedures administrative controls physical layout internal controls and so forth that could be exploited by a threat to gain unauthorised access to information unauthorised privileges or disrupt critical processing Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 6 of 68 WEVA Hercules AVR Security Target 1 4 3 Acronyms AVR CC CERT CM CVE EAL HMI IT O S SSH SSL ST TCP IP TOE TSC TSF TSP Automatic Vulnerability Remediation Common Criteria for Information Technology Security Evaluation Computer Emergency Response Team Configuration Management Common Vulnerabilities and Exposures Evaluation Assurance Level Human Machine Interface Information Technology Operating System Secure Shell Secure Sockets Layer Security Target Transmission Control Protocol Internet Protocol Target of Evaluation TOE Scope of Control TOE Security Functions TOE Security Policy Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 7 of 68 E WA Hercules AVR Security T
48. ently by misconfiguring network systems from a security perspective Threat agents are assumed to have a low level of sophistication but may have knowledge of vulnerabilities and access to attack methods which are in the public domain The TOE is not designed to withstand attack by sophisticated highly motivated or well funded threat agents The assets that are subject to attack are the components of the TOE itself and or the resources of the client systems protected by the TOE T BADDATA A network attacker may attempt to provide the Remediation Server with erroneous remediation information in an attempt to compromise the Client systems T CLIENT An unauthorized person may have administrator root control of one of the client systems and may use that control to attempt to compromise the Remediation Server T CONSOLE A network attacker may attempt to gain control of the TOE through the Hercules AVR Administration Console T EXPLOIT A network attacker may attempt to exploit vulnerabilities on a client system protected by the TOE in order to gain unauthorized access to the resources of the client system T NETEXPLOIT A network attacker may attempt to exploit vulnerabilities on a client system protected by the TOE in an attempt to compromise other network resources T REMSERVER A network attacker may attempt to gain control of the Hercules AVR Remediation Server T SNIFF A network attacker may intercept and monitor communications be
49. ether the TOE explicitly addresses each dependency Notes are provided for those cases where the dependencies are satisfied by components which are hierarchical to the specified dependency Security Dependencies Dependency Functional Satisfied Requirement FPT_STM 1 Yes FAU_GEN 1 Yes Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 57 of 68 E WA Hercules AVR Security Target Security Dependencies Dependency Functional Satisfied Requirement EE BEE BEE mwa We MOSSEL BERE RI FDP_IFC 1 FIA AFLI FIA_UAU 1 Yes FIA UAU 2 is specified as a security functional requirement and FIA UAU 2 is hierarchical to FIA_UAU 1 FIA_UAU 2 FIA_UID 1 FIA UID 2 is specified as a security functional requirement and FIA_UID 2 is hierarchical to FIA_UID 1 SEE WE RE LYN MEN EE Er breer e mm WEI FMT_ FMT_SMF 1 1 None FMT_ aS 1 E _UID 1 a EE is specified as a security functional requirement and FIA_UID 2 is hierarchical to FIA_UID 1 Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 58 of 68 E WA Hercules AVR Security Target Security Dependencies Dependency Functional Satisfied Requirement Table 5 Security Functional Requirement Dependencies 8 4 SECURITY ASSURANCE REQUIREMENT DEPENDENCIES Dependencies Dependency Satisfied ADV_RCR 1 ADV FSP 1 ADV FSP 1 ADV FSP 1 ATE_FUN 1 ADV HLD 2 is specified as a security assurance requirement and ADV HLD 2 is hierarch
50. for good backup and recovery procedures Windows client machines which will be remediated using Client Management Services CMS are assumed to reside on a protected network The OE SECURECOM objective ensures that communications between the Hercules Server and Windows client machines using CMS are protected The servers running the Remediation Server and the Administrator Console have been configured securely as described in the Guidance documents and are maintained in that secure configuration In particular a They are configured with the minimal operating system features installed and or enabled to permit operation of the TOE b They are configured with minimal system privileges c They are configured with user accounts for authorized system administrators only and do not provide any end user accounts The OE GUIDANCE objective ensures that the TOE will be configured securely The Operating System of the client machines has been configured in accordance with the Hercules AVR Security Configuration Guide and therefore may be trusted to function correctly for those OS Junctions required by the TOE component that is installed on the client machine The OE GOODOS objective ensures that those functions of the operating system required by the TOE function correctly TOE Users have knowledge of the Windows 2000 XP 2003 operating system networking technology and general IT security practices The OE GOODUSER objective note
51. functional specification Content and presentation of evidence elements ADV_FSP 1 1C The functional specification shall describe the TSF and its external interfaces using an informal style ADV FSP 1 2C The functional specification shall be internally consistent ADV FSP 1 3C The functional specification shall describe the purpose and method of use of all external TSF interfaces providing details of effects exceptions and error messages as appropriate ADV FSP 1 4C The functional specification shall completely represent the TSF Evaluator action elements ADV_FSP 1 1E The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence ADV FSP 12E The evaluator shall determine that the functional specification is an accurate and complete instantiation of the TOE security functional Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 30 of 68 E WA Hercules AVR Security Target requirements ADV HLD 2 Security enforcing high level design Dependencies ADV_FSP 1 Informal functional specification ADV_RCR 1 Informal correspondence demonstration Developer action elements ADV_HLD 2 1D The developer shall provide the high level design of the TSF Content and presentation of evidence elements ADV HLD 2 1C The presentation of the high level design shall be informal ADV_HLD 2 2C The high level design shall be internally consistent ADV HLD 2 3C The high
52. gned to protect the TOE and its data from network attacks to limit the system s use of network interfaces to those specified by the user and to be simple enough for a knowledgeable system administrator to use An assurance level of EAL 3 Methodically Tested and Checked was selected as the threat to security is considered to be unsophisticated network attackers and the data to be protected consists primarily of user private data and system resources An evaluation at this level provides a moderate level of independently assured security via a thorough investigation of the TOE and its development Table 8 provides a bi directional mapping of Assurance Measures to Assurance Requirements and is followed by a short discussion of how the Assurance Requirements are addressed by the corresponding Assurance Measures ACM SCP 1 ADO_DEL 1 ADO IGS 1 ADV FSP I ADV HLD2 ADV RCR 1 AGC_ADM 1 AGD USR 1 ALC DVS 1 ATE COV 2 ATE DPT 1 ATE_FUN 1 ATE_IND 2 AVA MSA 1 laa a lt O gt O lt See Ss a esi mserup ix EN EN EN EN EN Ed mrest ET ON EN EN EN EN ENE TE TESTES ON NN N Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 65 of 68 E WA Hercules AVR Security Target Table 8 Mapping of Assurance Measures to Assurance Requirements ACM CAP 3 Authorisation Controls Assurance Measure M ID ensures that the TOE is uniquely identified and labelled with its identity Assurance Measure M C
53. ical to ADV_HLD 1 Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 59 of 68 E WA Hercules AVR Security Target Dependencies Dependency Notes Satisfied ADV_FSP 1 FSP 1 Yes AVA SOF 1 ADV FSP 1 oer ref ADV_HLD 1 ADV HLD 2 is specified as a security assurance requirement and ADV HLD 2 is hierarchical to ADV_HLD 1 AVA_VLA 1 ADV_FSP 1 FSP 1 aa HLD 1 os HLD 2 is EE as a security assurance requirement and ADV HLD 2 is hierarchical to ADV_HLD 1 Table 6 Security Assurance Requirement Dependencies 8 5 TOE SUMMARY SPECIFICATION RATIONALE Table 7 provides a bi directional mapping of Security Functions to Security Functional Requirements and is followed by a discussion of how each Security Functional Requirement is addressed by the corresponding Security Function OD 2 FAU SEL 1 FDP IFC 1 FDP _IFF 1 FDP ITC 1 FDP ITT 1 FIA_AFL 1 FPT_SEP 1 FAU_SAR 1 FDP ROL FIA SOS 1 FIA_SOS 1 FIA _UAU 2 FIA_UID 2 FMT MSA FMT MTD FMT SMF FMT SMR FPT ITT 1 FPT RYM FPT STM 1 x e Sex A ty yy lx AATE SETETE PTT TTT TT TT Ty x Ty TT ENE EI Ge IE pL ET ETP eT ET xt EE i E x Fi E E x E a a al Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 60 of 68 WEVA Hercules AVR Security Target TC 1 FDP IF DISPSIG F DISPVADATA F DISPVULN F DOMAINSEP F ENCRYPT F IACLIENT IF IAREMSVR IF IAUSER IF PUSHREM F REMCLIENT a FIA_AF
54. iew scan analyze and interpret the audit trail recorded by the TOE F AUDIT Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 61 of 68 E WA Hercules AVR Security Target FAU_SEL 1 Selective Audit The TOE HMI Hercules AVR Administrator Console provides authorized users with the ability to view audit information based both upon specific vulnerabilities or upon specific client machines or group of machines F AUDIT FDP IFC 1 Subset information flow control Each Hercules AVR Server enforces the SERVER_SFP information flow control security functional policy which dictates that the server must identify and authenticate a client machine F ACLIENT before accepting a request for remediation data from that client and providing the remediation profile F PUSHREM which is used to remediate the client F REMCLIENT Each Hercules AVR Server also enforces the IMPORT_SFP information flow control security functional policy when importing both vulnerability scan data F IMPVADATA and vulnerability remediation data F IMPREMDATA FDP_IFF 1 Simple security attributes The TOE uses the SERVER_SFP information flow control security functional policy to govern the exchange of data between a Hercules AVR Server and one of its client systems This policy states that the server must identify and authenticate the client F ACLIENT before providing the client with the remediation information F PUSHREM necessary to re
55. is shall show that it meets or exceeds the specific strength of function metric defined in the PP ST Evaluator action elements AVA_SOF 1 1E The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence AVA_SOF 1 2E The evaluator shall confirm that the strength claims are correct AVA VLA 1 Developer vulnerability analysis Objectives A vulnerability analysis is performed by the developer to ascertain the presence of obvious security vulnerabilities and to confirm that they cannot be exploited in the intended environment for the TOE Application notes The evaluator should consider performing additional tests as a result of potential exploitable vulnerabilities identified during other parts of the evaluation Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 41 of 68 EMMA Hercules AVR Security Target Dependencies ADV FSP 1 ADV_HLD 1 AGD_USR 1 Developer action elements AVA_VLA 1 1D AVA VLA 12D Informal functional specification Descriptive high level design User guidance The developer shall perform a vulnerability analysis The developer shall provide vulnerability analysis documentation Content and presentation of evidence elements AVA_VLA 1 1C AVA_VLA 1 2C AVA VLA 13C Evaluator action elements AVA_VLA 1 1E AVA_VLA 1 2E The vulnerability analysis documentation shall describe the analysis of the TOE deliver
56. itably authorized user to create and manage custom roles for the TOE Once created individual users and groups of users may be assigned to the role Privileges to use specific functions of the TOE such as creating custom remediation remedies and user defined vulnerabilities may also be assigned to the role Push Remediation Data The Hercules AVR Server provides remediation data in the form of a remediation profile to client machines Remediate Client System The TOE provides the capability to automatically remediate specific vulnerabilities on client machines Report Remediation Status The TOE has the capability of producing reports describing the remediation status of each client machine of each Hercules AVR Server The user can select reports which show the details and summaries of remediation sessions import sessions devices groups vulnerabilities policies and remedies Rollback Remediations The TOE has the capability to systematically rollback the Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 47 of 68 WEVA Hercules AVR Security Target F RVM F SCHEDREM last remediation session performed on a Windows client machine Reference Monitor This TOE security function is supported by the operating systems Windows and Unix to provide reference mediation e g when a user process requires access to a resource its requests a handle token for the resource from the operating system
57. ither certificates or in the absence of certificates the IP Address Domain Name or NETBIOS name The TSF shall enforce the assignment no additional information flow control SFP rules The TSF shall provide the following assignment no additional SFP capabilities The TSF shall explicitly authorise an information flow based on the following rules assignment none The TSF shall explicitly deny an information flow based on the following rules assignment none FDP_IFC 1 Subset information flow control FMT MSA 3 Static attribute initialisation Import of user data without security attributes No other components Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 19 of 68 WEVA Hercules AVR Security Target FDP _ITC 1 1 FDP ITC 12 FDP ITC 13 Dependencies FDP _ITT 1 Hierarchical to FDP ITT LI Dependencies FDP ROL Hierarchical to FDP ROL LI FDP ROL 12 Dependencies FIA_AFL 1 Hierarchical to The TSF shall enforce the assignment IMPORT SFP when importing user data controlled under the SFP from outside of the TSC The TSF shall ignore any security attributes associated with the user data when imported from outside the TSC The TSF shall enforce the following rules when importing user data controlled under the SFP from outside the TSC assignment no additional importation control rules FDP_IFC 1 Subset information flow control FMT MSA 3 St
58. ks Windows 2003 Standard Edition or Windows 2003 Enterprise Edition as the operating system Internet Explorer 5 5 or above is also required The minimum hardware requirements for the Hercules AVR Administrator Console are specified in the Citadel Hercules AVR Automated Vulnerability Remediation Installation Guide The required setup of the Hercules AVR Administrator Console is described in the Hercules AVR Security Configuration Guide b One or more Hercules AVR Server s executing on an Intel Pentium based PC running Windows 2000 Server with Service Pack 4 Windows 2000 Advanced Server with Service Pack 4 Windows 2003 Standard Edition or Windows 2003 Enterprise Edition as the operating system For the Windows 2000 server family IIS 5 0 is also required For the Windows Server 2003 family HS 6 0 is also required Internet Explorer 6 0 with service pack 1 is required for all installations The minimum hardware requirements for a Hercules AVR Server are specified in the Citadel Hercules AVR Automated Vulnerability Remediation Installation Guide The required setup of a Hercules AVR Server is described in the Hercules AVR Security Configuration Guide C One or more network devices with Hercules AVR Client Version 2 2 0 installed on a supported Windows operating system The supported versions of the Windows operating system are Windows NT 4 0 Workstation with service pack 6 Windows NT 4 0
59. level design shall describe the structure of the TSF in terms of subsystems ADV_HLD 2 4C The high level design shall describe the security functionality provided by each subsystem of the TSF ADV HLD 2 5C The high level design shall identify any underlying hardware firmware and or software required by the TSF with a presentation of the functions provided by the supporting protection mechanisms implemented in that hardware firmware or software ADV_HLD 2 6C The high level design shall identify all interfaces to the subsystems of the TSF ADV_HLD 2 7C The high level design shall identify which of the interfaces to the subsystems of the TSF are externally visible ADV_HLD 2 8C The high level design shall describe the purpose and method of use of all interfaces to the subsystems of the TSF providing details of effects exceptions and error messages as appropriate ADV_HLD 2 9C The high level design shall describe the separation of the TOE into TSPenforcing and other subsystems Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 31 of 68 E WA Hercules AVR Security Target Evaluator action elements ADV_HLD 2 1E The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence ADV_HLD 2 2E The evaluator shall determine that the high level design is an accurate and complete instantiation of the TOE security functional requirements ADV_RCR 1 Informal corre
60. lity remediation data and can be used to measure the ongoing success of frequent vulnerability remediation cycles e Consistent Remediation Hercules AVR provides a consistent method of remediation across an entire network it does not depend on the skill level of individual technicians when resolving vulnerabilities e Device Grouping Administrators can place devices into logical groups and schedule remediation by groups Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 2 of 68 E WA Hercules AVR Security Target e Roll back Capabilities Administrators have the ability to roll back system changes and patch installations when necessary e V Flash Administrators can stay current on the latest vulnerability remediation signatures through the Hercules AVR V Flash update service e Remediation Policies Users can define remediation policies for a single device or group of devices e Best Practices Hercules AVR offers complete support for the best practices of vulnerability remediation Ata high level Hercules AVR is designed to e Aggregate vulnerability and remediation information from leading sources including SecurityFocus BugTraq CERTs and other internet sources e Import scan information from vulnerability scanners and combine this information to perform remediation from a single source e Create profiles and remediation signatures that match scanner independent vulnerabilit
61. lnerability analysis documentation includes a strength of TOE security function analysis for each mechanism identified in the ST as having a strength of TOE security function claim This measure satisfies the requirements of AVA_SOF 1 AVA_VLA 1 Developer Vulnerability Analysis Assurance Measure M VULNER ensures that the TOE vulnerability analysis documentation includes an analysis of obvious ways in which a user can violate the TOE security policies along with the disposition of these obvious vulnerabilities This measure satisfies the requirements of AVA_VLA 1 Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 68 of 68
62. machine and 2 format of client machine remediation status information b The TSF shall enforce the assignment MPORT SFP based on the following types of subject and information security attributes Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 18 of 68 WEVA Hercules AVR Security Target FDP_IFF 1 2 FDP_IFF 1 3 FDP_IFF 1 4 FDP_IFF 1 5 FDP_IFF 1 6 Dependencies FDP ITC 1 Hierarchical to assignment 1 The identification and authentication of the TOE user and Vflash server and 2 the format of the source data The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules hold assignment 1 For the transfer of a remediation signature from the Hercules AVR Server to a client machine a the requesting client machine has been identified as authorised by the server using either certificates or in the absence of certificates the IP Address Domain Name or NETBIOS name and b the format of the client machine remediation status information is recognized 2 For the import of Vulnerability Scan data to the server a the file to be imported has been specified by the authorized TOE User and b the file meets the format expected by the TOE for the file purpose 3 For the import of remediation data the Hercules Vflash server is successfully authenticated by the Hercules AVR Server using e
63. mediate the vulnerabilities on the client system F REMCLIENT The TOE uses the IMPORT_SFP information flow control security functional policy to govern the import of vulnerability scan information F IMPVADATA and vulnerability remediation data F IMPREMDATA from trusted external sources FDP_ITC 1 Import of user data without security attribute When importing vulnerability scan data F IMPVADATA or vulnerability remediation data F IMPREMDATA from trusted external sources the TOE ignores any security attributes associated with the external data and instead applies the properties specified by the authorized TOE user F MANAGEDATA to the imported data FDP_ITT 1 Basic internal transfer protection The Hercules AVR Server enforces the SERVER_ SFP information flow control security functional policy F IACLIENT F PUSHREM F REMCLIENT to protect its remediation data from disclosure or modification while being transmitted from the server to a client system The Hercules AVR server has the ability to encrypt data transferred to a client system F ENCRYPT using SSL for Windows clients and OpenSSH for Unix clients Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 62 of 68 E WA Hercules AVR Security Target FDP_ROL 1 Basic Rollback The TOE allows the rollback F ROLLBACK of specific automatic vulnerability remediations under specified circumstances FIA_AFL 1 Authentication failure handling The TOE relies up
64. n of decomposing the TSF into a relatively small number of parts Dependencies Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 36 of 68 E WA Hercules AVR Security Target ADV_HLD 1 Descriptive high level design ATE_FUN 1 Functional testing Developer action elements ATE_DPT 1 1D The developer shall provide the analysis of the depth of testing Content and presentation of evidence elements ATE_DPT 1 1C The depth analysis shall demonstrate that the tests identified in the test documentation are sufficient to demonstrate that the TSF operates in accordance with its high level design Evaluator action elements ATE_DPT 1 1E The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence ATE_FUN 1 Functional testing Objectives The objective is for the developer to demonstrate that all security functions perform as specified The developer is required to perform testing and to provide test documentation Dependencies No dependencies Developer action elements ATE FUN 1ID The developer shall test the TSF and document the results ATE FUN 12D The developer shall provide test documentation Content and presentation of evidence elements ATE_FUN 1 1C The test documentation shall consist of test plans test procedure Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 37 of 68 E WA Hercules AVR Security Target descriptions
65. nd presentation of evidence ATE IND 2 2E The evaluator shall test a subset of the TSF as appropriate to confirm that the TOE operates as specified ATE_IND 2 3E The evaluator shall execute a sample of tests in the test documentation to verify the developer test results AVA MSU 1 Examination of guidance Objectives The objective is to ensure that misleading unreasonable and conflicting guidance is absent from the guidance documentation and that secure procedures for all modes of operation have been addressed Insecure states should be easy to detect Dependencies ADO_IGS 1 Installation generation and start up procedures Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 39 of 68 E WA Hercules AVR Security Target ADV_FSP 1 Informal functional specification AGD_USR 1 User guidance Developer action elements AVA MSU 1 ID The developer shall provide guidance documentation Content and presentation of evidence elements AVA_MSU 1 1C The guidance documentation shall identify all possible modes of operation of the TOE including operation following failure or operational error their consequences and implications for maintaining secure operation AVA MSU 1 2C The guidance documentation shall be complete clear consistent and reasonable AVA MSU 1 3C The guidance documentation shall list all assumptions about the intended environment AVA_MSU 1 4C The guidance documentation shall list all requirements
66. omain privileges and NTFS privileges It authenticates using Windows integrated authentication to Internet Information Server on the Hercules AVR server The Hercules AVR Administrator Console is designed to be installed and used on a trusted and appropriately configured and controlled Windows machine that is used for network administration Users of the Hercules AVR Administrator Console require full administrative privileges on the machine running the console as well as the Hercules AVR Server and all client machines The Hercules AVR Administrator Console provides the HMI for the product and includes the display and input devices through which the user interacts with the Hercules AVR application e The Hercules AVR Server is a Windows service that communicates with the Hercules AVR Client to distribute remediation profiles and gather remediation progress data Multiple Hercules AVR Servers may be deployed within a network and administered from a single Hercules AVR Administrator Console The Hercules AVR Server is designed to be installed and used on a trusted and appropriately configured and controlled Windows server e The Hercules AVR Windows Clients are services that perform remediation activities on client machines The clients establish HTTPS SSL based communication to the Hercules AVR Server e The Hercules AVR Unix Clients provide functionality which is equivalent to Windows client c
67. ompromise the Remediation Server The O CLIENTAUTH and O CLIENTPROT objectives ensure that the TOE is protected against attacks by the client systems A network attacker may attempt to gain control of the TOE through the Hercules AVR Administration Console The O HMI and O NETATK objectives ensure that the Administration Console is secure A network attacker may attempt to exploit vulnerabilities on a Client system protected by the TOE in order to gain unauthorized access to the resources of the client system The O CLIENTREM objective ensures that the TOE provides effective remediation to client systems in order to remove or mitigate identified vulnerabilities A network attacker may attempt to exploit vulnerabilities on a Client system protected by the TOE in an attempt to compromise other network resources The O CLIENTREM objective ensures that the TOE provides effective remediation to client systems in order to remove or mitigate identified vulnerabilities A network attacker may attempt to gain control of the Hercules AVR Remediation Server The O NETATK objective ensures that the Remediation Server is secure A network attacker may monitor communications between the Remediation Server and the Client systems and use the information gained to compromise the Remediation Server and or a Client Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 53 of 68 E WA Hercules AVR Security Target system
68. on elements ACM _ CAP 3 1D The developer shall provide a reference for the TOE ACM CAP 32D The developer shall use a CM system ACM CAP 3 3D The developer shall provide CM documentation Content and presentation of evidence elements ACM CAP 3 1C The reference for the TOE shall be unique to each version of the TOE ACM CAP 3 2C The TOE shall be labeled with its reference ACM CAP 3 3C The CM documentation shall include a configuration list and a CM plan The configuration list shall uniquely identify all configuration items that comprise the TOE ACM CAP 3 4C The configuration list shall describe the configuration items that comprise the TOE ACM CAP 3 5C The CM documentation shall describe the method used to uniquely identify the configuration items ACM CAP 3 6C The CM system shall uniquely identify all configuration items ACM CAP 3 7C The CM plan shall describe how the CM system is used ACM CAP 3 8C The evidence shall demonstrate that the CM system is operating in accordance with the CM plan ACM_CAP 3 9C The CM documentation shall provide evidence that all configuration items have been and are being effectively maintained under the CM system Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 27 of 68 E WA Hercules AVR Security Target ACM_CAP 3 10C The CM system shall provide measures such that only authorized changes are made to the configuration items Evaluator action elements ACM CAP 3 1E Th
69. on the identification and authentication mechanisms of the underlying operating system in order to identify and authenticate individual users of the TOE HMI F IAUSER In addition the Hercules AVR Administrator Console and Hercules AVR Server perform mutual identification and authentication before exchanging information FIAREMSVR and a Hercules AVR server identifies and authenticates each client system F IACLIENT before providing any remediation data to that client FIA SOS 1 Verification of Secrets The TOE relies upon the underlying operating system for the entry and management of passwords for authorized users The TOE guidance documents provide instructions concerning the minimum standards required for secure passwords F AUSER Additionally the TOE uses functions available in the operating system to randomly generate a password which is used to authenticate to the Windows domain controller FIA UAU 2 User authentication before any action All of the identification and authentication mechanisms used by the TOE F IAUSER F JACLIENT F IAREMSVR require complete and successful authentication before allowing any action to be performed FIA UID 2 User identification before any action All of the identification and authentication mechanisms used by the TOE F I AUSER F IACLIENT F IAREMSVR require successful identification either of the individual user or the requesting system before allowing any action to be performed
70. onsible for the TOE must ensure that the TOE is installed configured administered and operated in accordance with the guidance documents OE SECURECOM The network on which the TOE resides must protect the confidentiality and integrity of information exchanged between the distributed elements of the TOE when client machines are initially installed remotely using the Hercules AVR Client Management Service CMS Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 15 of 68 E WA Hercules AVR Security Target 5 IT SECURITY REQUIREMENTS 5 1 TOE SECURITY REQUIREMENTS Section 5 provides security functional and assurance requirements that must be satisfied by a compliant TOE These requirements consist of functional components from Part 2 of the CC and an Evaluation Assurance Level EAL containing assurance components from Part 3 of the CC 5 2 TOE SECURITY FUNCTIONAL REQUIREMENTS The security functional requirements for this ST consist of the following components from Part 2 of the CC summarized in Table 1 Identifier FAU_SEL 1 Selective Audit FIA_UAU 2 User Authentication Before Any Action EA FMT_SMF 1 Specification of Management Functions Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 16 of 68 E WA Hercules AVR Security Target CC Part 2 Security Functional Components FPT_STM 1 Reliable Time Stamps Table 1 Summary of CC Part 2 Security Functional Requirements FAU_GEN 1 Audit dat
71. ows several operations to be performed on functional requirements assignment iteration refinement and selection are defined in paragraph 148 of Part 1 of the CC e The assignment operation is used to assign a specific value to an unspecified parameter such as the length of a password An assignment is indicated by showing the value in italicised text within square brackets assignment values e The refinement operation is used to add detail to a requirement and thus further restricts a requirement Refinement of security requirements is denoted by bold text There are no refinements within this ST e The selection operation is used to select one or more options provided by the CC in stating a requirement Selections are denoted by italicised text within square brackets selection value s e The iteration operation is used to apply a security functional requirement to more than one aspect of the TOE Iterations are denoted by repeating the text of the security functional requirement for each of the applicable aspects of the TOE Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 4 of 68 WEVA Hercules AVR Security Target 1 4 2 Terms This section describes the terms that are used throughout this ST When possible terms are defined as the exist in the CC Assets Attack Audit Audit Trail Authentication Availability Compromise Confidentiality Evaluation Information Technology IT System
72. priately trained and experienced Further it is assumed that the user does not have malicious intent and configures the product and its host platforms in accordance with the guidance documentation The product will not prevent a user from carelessly configuring or using the Hercules AVR such that network protection is compromised Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 11 of 68 WEVA Hercules AVR Security Target 3 TOE SECURITY ENVIRONMENT 3 1 ASSUMPTIONS The following conditions are assumed to exist in the operational environment A BACKUP A CMS A CONFIG A GOODOS A KNOWLEDGE A NOEVIL A PHYSICAL A TOEUSER The organization operating the TOE has good backup and recovery procedures which are followed allowing the TOE to be recovered to a secure configuration after a hardware failure In an environment where the Hercules AVR client software is installed by remote means on Windows client using the Hercules AVR Client Management Services CMS the server and clients are assumed to reside on a protected network The servers running the Remediation Server and the Administrator Console have been configured securely as described in the Guidance documents and are maintained in that secure configuration In particular a They are configured with the minimal operating system features installed and or enabled to permit operation of the TOE b They are configured with minimal system pri
73. records in a manner suitable for the user to interpret the information Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 17 of 68 EMMA Hercules AVR Security Target Dependencies FAU SEL Hierarchical to FAU_SEL 1 1 Dependencies FDP _IFC 1 Hierarchical to FDP IFC LI Dependencies FDP _IFF 1 Hierarchical to FDP IFF LI FAU GEN 1 Audit data generation Selective audit No other components The TSF shall be able to include or exclude auditable events from the set of audited events based on the following attributes a selection event type b assignment client machine identification FAU_GEN 1 Audit data generation FMT_MTD 1 Management of TSF data Subset information flow control No other components a The TSF shall enforce the assignment SERVER SFP on assignment Hercules AVR Servers and client machines when the client machine requests a remediation profile from a Hercules AVR Server b The TSF shall enforce the assignment JMPORT_SFP on assignment Hercules AVR Servers when importing vulnerability scan data and vulnerability remediation data from outside the TOE boundary FDP_IFF 1 Simple security attributes Simple security attributes No other components a The TSF shall enforce the assignment SERVER SFP based on the following types of subject and information security attributes assignment 1 Identification and authentication of the client
74. s Null Passwords Admin No Password etc Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 3 of 68 E WA Hercules AVR Security Target e Back Doors NetBus BackOrifice SubSeven etc e Mis Configurations NetBIOS file system privileges Null Sessions etc The Hercules AVR product is designed to operate on standard TCP IP networks and can remediate vulnerabilities on both Windows and UNIX Solaris Linux based clients The Hercules AVR human machine interface HMI provides the user with complete control over the functionality of the product The HMI allows the user to specify e An automated frequency with which client systems will request updated vulnerability remediations e Manual remediations for selected client machines e Specific vulnerabilities which will not be remediated 1 4 CONVENTIONS TERMINOLOGY AND ACRONYMS This section identifies the formatting conventions used to convey additional information and terminology having specific meaning It also defines the meanings of abbreviations and acronyms used throughout the remainder of this document 1 4 1 Conventions This section describes the conventions used to denote CC operations on security requirements and to distinguish text with special meaning The notation formatting and conventions used in this ST are largely consistent with those used in the CC Selection presentation choices are discussed here to aid the ST reader The CC all
75. s available to the non administrative users of the TOE AGD_USR 1 2C The user guidance shall describe the use of user accessible security functions provided by the TOE AGD USR 1 3C The user guidance shall contain warnings about user accessible functions and privileges that should be controlled in a secure processing environment AGD_USR 1 4C The user guidance shall clearly present all user responsibilities necessary for secure operation of the TOE including those related to assumptions regarding user behaviour found in the statement of TOE security environment AGD_USR 1 5C The user guidance shall be consistent with all other documentation supplied for evaluation AGD USR 1 6C The user guidance shall describe all security requirements for the IT environment that are relevant to the user Evaluator action elements AGD_USR 1 1E The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence ALC_DVS 1 Identification of security measures Dependencies No dependencies Developer action elements Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 34 of 68 E WA Hercules AVR Security Target ALC_DVS 1 1D The developer shall produce development security documentation Content and presentation of evidence elements ALC DVS 1 1C The development security documentation shall describe all the physical procedural personnel and other security measures that
76. s a comprehensive audit trail of its actions FAU_GEN 1 The TOE must provide a controlled interface to its functionality such that only authorized TOE users are able to access the interface The TOE HMI is provided by the Hercules AVR Administrator Console This component of the TOE is only accessible to authorized administrative users FIA_AFL 1 FIA UAU 2 FIA UID 2 FMT SMR 1 Authorized users of the Hercules AVR Administrator may control all of the security functions of the TOE including setting security attributes and importing vulnerability scan and remediation data FIA_SOS 1 FMT MSA 1 FMT MSA 3 FMT_SMF 1 Actions performed by authorized users are subject to auditing FAU_GEN 1 FAU SAR 1 FAU_SEL 1 FPT_STM 1 The TOE must protect itself against network attackers The TOE protects itself against network attackers through its identification and authentication functions FIA UAU 2 FIA_UID 2 The TOE also protects its data from disclosure and modification while transmitting this data to the client systems FPT_ITT 1 The collection of audit data FAU_GEN 1 ensures Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 56 of 68 E WA Hercules AVR Security Target that attacks of this type will be detected O REMDATA The TOE must ensure that its remediation data is obtained from trusted sources and must provide a mechanism to ensure the integrity of this data After initial installation the TOE ob
77. s that TOE Users must be knowledgeable TOE Users are non hostile and follow all guidance documents The OE GOODUSER objective notes that TOE Users must be non malicious The Server and Administrator elements of the TOE are physically secure and only authorized personnel have physical access to these elements of the TOE The OE AUTHUSER objective notes that only authorized personnel are permitted physical access to the TOE Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 52 of 68 EMMA Hercules AVR Security Target A TOEUSER T BADDATA T CLIENT T CONSOLE T EXPLOIT T NETEXPLOIT T REMSERVER T SNIFF There is only one category of TOE user All authorized TOE users have full access to all of the TOE s functions and for this reason there is no distinction between TOE users and TOE administrators For the remainder of this document the phrase TOE User shall be employed The OE GOODUSER objective describes the characteristics of the TOE Users and notes that these users must be authorized system administrators A network attacker may attempt to provide the Remediation Server with erroneous remediation information in an attempt to compromise the Client systems The O REMDATA objective ensures that the remediation data used by the TOE is accurate and secure An unauthorized person may have administrator root control of one of the client systems and may use that control to attempt to c
78. spondence demonstration Dependencies No dependencies Developer action elements ADV_RCR 1 1D The developer shall provide an analysis of correspondence between all adjacent pairs of TSF representations that are provided Content and presentation of evidence elements ADV_RCR 1 1C For each adjacent pair of provided TSF representations the analysis shall demonstrate that all relevant security functionality of the more abstract TSF representation is correctly and completely refined in the less abstract TSF representation Evaluator action elements ADV_RCR 1 1E The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence AGD ADM 1 Administrator guidance Dependencies ADV FSP 1 Informal functional specification Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 32 of 68 WEVA Hercules AVR Security Target Developer action elements AGD_ADM 1 1D The developer shall provide administrator guidance addressed to system administrative personnel Content and presentation of evidence elements AGD_ADM 1 1C AGD_ADM 1 2C AGD_ADM 1 3C AGD_ADM 1 4C AGD_ADM 1 5C AGD_ADM 1 6C AGD_ADM 1 7C AGD_ADM 1 8C Evaluator action elements AGD_ADM 1 1E The administrator guidance shall describe the administrative functions and interfaces available to the administrator of the TOE The administrator guidance shall describe how to administer th
79. tains its remediation data updates either from manual entry by an authorized user or by remote download from the Hercules AVR VFlash server Since all Hercules AVR users are subject to the I amp A mechanisms of the product FIA UAU 2 FIA_UID 2 it follows that only authorized and identified users may manually create remediation data The product also enforces the IMPORT_SFP information flow security functional policy FDP_IFC 1 FDP_IFF 1 FDP_ITC 1 when importing remediation data from the V Flash server This ensures that the remediation data is obtained from a trusted source The TOE maintains an audit record of import sessions FAU_GEN 1 so that it is possible to confirm that the product has current accurate and valid remediation data O SCANDATA The TOE must ensure that its scanner data is obtained from trusted sources and must provide a mechanism to ensure the integrity of this data The TOE enforces the IMPORT_SFP information flow control security functional policy FDP_ITC 1 to ensure that only trusted scanner data is imported by the TOE Once under the control of the TOE the scanner data may only be accessed by authorized TOE users FMT MTD 1 This ensures the integrity of the data The audit trail records the details of scanner data import sessions FAU_GEN 1 8 3 SECURITY FUNCTIONAL REQUIREMENT DEPENDENCIES Table 5 identifies the TOE Security Functional Requirements and their associated dependencies It also indicates wh
80. tion need not be exhaustive Dependencies Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 35 of 68 E WA Hercules AVR Security Target ADV_FSP 1 Informal functional specification ATE FUN Functional testing Developer action elements ATE _COV 2 1D The developer shall provide an analysis of the test coverage Content and presentation of evidence elements ATE COV 2 1C The analysis of the test coverage shall demonstrate the correspondence between the tests identified in the test documentation and the TSF as described in the functional specification ATE COV 22C The analysis of the test coverage shall demonstrate that the correspondence between the TSF as described in the functional specification and the tests identified in the test documentation is complete Evaluator action elements ATE _COV 2 1E The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence ATE DPT 1 Testing high level design Objectives The subsystems of a TSF provide a high level description of the internal workings of the TSF Testing at the level of the subsystems in order to demonstrate the presence of any flaws provides assurance that the TSF subsystems have been correctly realized Application notes The developer is expected to describe the testing of the high level design of the TSF in terms of subsystems The term subsystem is used to express the notio
81. tiplicity of systems Two or more machines interconnected for communications Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 5 of 68 WEVA Hercules AVR Security Target Protection Profile PP Security Security Policy Security Target ST Target of Evaluation TOE Threat TOE Security Functions TSF TOE Security Policy TSP TSF Data TSF Scope of Control User Vulnerability An implementation independent set of security requirements for a category of TOE that meet specific consumer needs A condition that results from the establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences The set of laws rules and practices that regulate how an organisation manages protects and distributes sensitive information A set of security requirements and specification to be used as the basis for evaluation of an identified TOE An IT product or system and its associated administrator and user guidance documentation that is the subject of an evaluation The means through which the ability or intent of a threat agent to adversely affect an automated system facility or operation can be manifest A potential violation of security A set of all hardware software and firmware of the TOE that must be relied upon for the correct enforcement of the TSP A set of rules that regulate how assets are managed protected and distribut
82. tween the Remediation Server and the Client systems and use the information gained to compromise the Remediation Server and or a Client system T SNIFFSCAN A network attacker may monitor communications between the Remediation Server and a vulnerability scanner to learn vulnerabilities of client systems T SPOOF A network attacker may attempt to imitate the Remediation Server and provide erroneous remediation information to a client system in order to compromise the client T SPOOFCLIENT A network attacker may attempt to imitate a client system in order to gain information about the vulnerabilities of the client system T SPOOFSCAN A network attacker may attempt to provide the Remediation Server with erroneous vulnerability assessment information in an attempt to Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 13 of 68 E UA Hercules AVR Security Target prevent the remediation of vulnerable network systems 3 3 ORGANIZATIONAL SECURITY POLICIES There is no requirement for the TOE to comply with any organizational security policy statements or rules Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 14 of 68 E UA Hercules AVR Security Target 4 SECURITY OBJECTIVES 4 1 SECURITY OBJECTIVES FOR THE TOE O CLIENTAUTH The TOE must provide a mechanism for a two way authentication between client systems and the Remediation Server O CLIENTPROT The TOE must protect itself against attacks initiated by
83. vileges es They are configured with user accounts for authorized system administrators only and do not provide any end user accounts The Operating System of the client machines has been configured in accordance with the Hercules AVR Security Configuration Guide and therefore may be trusted to function correctly for those OS functions required by the TOE component that is installed on the client machine TOE Users have knowledge of the Windows 2000 XP 2003 operating systems networking technology and general IT security practices TOE Users are non hostile and follow all guidance documents The Server and Administrator elements of the TOE are physically secure and only authorized personnel have physical access to these elements of the TOE There is only one category of TOE user All authorized TOE users have full access to all of the TOE s functions and for this reason there is no distinction between TOE users and TOE administrators For the remainder of this document the phrase TOE User shall be employed Doc No 1451 011 D001 Version 1 13 Date 27 Feb 2004 Page 12 of 68 E WA Hercules AVR Security Target 3 2 THREATS The threats discussed below are addressed by a compliant TOE The threat agents are either human users or external IT entities not authorized to use the TOE Additionally threat agents may be users with administrative privileges that introduce vulnerabilities either deliberately or inadvert
84. y information and client machines with their corresponding remediations e Allow an administrator to target network machines for automated remediation e Support CVE compliance by displaying CVE identifiers and supporting searching using these identifiers Fundamentally the Hercules AVR product provides enterprise administrators with the ability to manage a large scale vulnerability remediation process in a manner that is both systematic and comprehensive Today many organizations employ an incomplete hybrid of manual and partially automated techniques that are often implemented in an ad hoc manner Hercules AVR is a tool that is intended to bring a defined and systematic maturity into these security critical processes In a Windows environment Hercules AVR is a product that provides and includes all of the functionality typically associated with the vulnerability remediation capabilities of commercial and open source vulnerability scanners These typically provide registry fixes for Windows machines However this type of vulnerability only represents a small sub set of the vulnerabilities that require remediation The Hercules AVR product expands this set to include the automated remediation of vulnerabilities associated with the following five classes of vulnerabilities e Software Defects Hot fixes patches registry settings etc e Unnecessary Insecure Services Telnet Remote Access FTP etc e Insecure Account

Download Pdf Manuals

image

Related Search

Related Contents

operating instructions and service manual soccer scoreboard model  BC-252 取扱説明書  APAxxx - Series of panel computersfor rolling stock  John Deere Products & Services AT-3106-J User's Manual  Bedienungsanleitung, Operating instructions    361868 Videojet 1210_1510 Operator Manual.book  User manual - PMS (Instruments)  Toshiba Satellite A665-S5180  Philips SHH8006  

Copyright © All rights reserved.
Failed to retrieve file