Security Target, Version 3.9 | March 18, 2008 |
|
|
5 IT Security Requirements
This section defines the Security Functional Requirements (SFRs) and Security Assurance Requirements (SARs) met by the TOE as well as SFRs met by the TOE IT environment. These requirements are presented following the conventions identified in Section 1.3.1.
5.1 TOE Security Functional Requirements
This section specifies the SFRs for the TOE. This section organizes the SFRs by CC class. Table 3 identifies all SFRs implemented by the TOE and indicates the ST operations performed on each requirement.
Table 3 - TOE Security Functional Requirements
|
|
|
|
| ST Operation |
| |||
|
|
|
|
|
| ||||
|
|
|
|
|
|
|
|
|
|
| SFR ID |
| Description |
| Selection | Assignment | Refinement | Iteration |
|
|
| ||||||||
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FAU_GEN.1 |
| Audit Data Generation |
| | |
|
|
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FAU_SAR.1 |
| Audit Review |
|
| |
|
|
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FCS_CKM.1(a) |
| Cryptographic Key Generation |
|
| |
|
|
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FCS_CKM.4 |
| Cryptographic Key Destruction |
|
| |
|
|
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FCS_COP.1(a) |
| Cryptographic Operation |
|
| |
| |
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FCS_COP.1(b) |
| Cryptographic Operation |
|
| |
| |
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FCS_COP.1(d) |
| Cryptographic Operation |
|
| |
| |
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FCS_COP.1(e) |
| Cryptographic Operation |
|
| |
| |
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FCS_CKM.1(b) |
| Cryptographic Key Generation |
|
| |
|
|
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FDP_ACC.2 |
| Complete Access Control |
|
| |
|
|
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FDP_ACF.1 |
| Security Attribute Based Access Control |
|
| |
|
|
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FDP_IFC.2(a) |
| Complete Information Flow Control |
|
| |
| |
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FDP_IFC.2(b) |
| Complete Information Flow Control |
|
| |
| |
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FDP_IFF.1(a) |
| Simple Security Attributes |
|
| |
| |
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FDP_IFF.1(b) |
| Simple Security Attributes |
|
| |
| |
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FDP_UCT.1 |
| Basic Data Exchange Confidentiality |
| | |
|
|
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FDP_UIT.1 |
| Data Exchange Integrity |
| | |
|
|
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FIA_UAU.1 |
| Timing of Authentication |
|
| |
|
|
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FIA_UAU.5 |
| Multiple Authentication Mechanisms |
|
| |
|
|
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FIA_UID.2 |
| User Identification Before any Action |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| FMT_MOF.1(a) |
| Management of Security Functions Behavior |
| | |
| |
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FMT_MOF.1(b) |
| Management of Security Functions Behavior |
| | |
| |
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
| FMT_MSA.1(a) |
| Management of Security Attributes |
| | |
| |
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Nortel VPN Router v7.05 and Client Workstation v7.11 |
|
|
|
|
| Page 20 of 67 | |||
|
|
| © 2008 Nortel Networks |
|
|
|
|
|
|