Nortel Networks 7.05, 7.11 manual IT Security Requirements, TOE Security Functional Requirements

Models: 7.11 7.05

1 67
Download 67 pages 33.01 Kb
Page 20
Image 20

Security Target, Version 3.9

March 18, 2008

 

 

5 IT Security Requirements

This section defines the Security Functional Requirements (SFRs) and Security Assurance Requirements (SARs) met by the TOE as well as SFRs met by the TOE IT environment. These requirements are presented following the conventions identified in Section 1.3.1.

5.1 TOE Security Functional Requirements

This section specifies the SFRs for the TOE. This section organizes the SFRs by CC class. Table 3 identifies all SFRs implemented by the TOE and indicates the ST operations performed on each requirement.

Table 3 - TOE Security Functional Requirements

 

 

 

 

 

ST Operation

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

SFR ID

 

Description

 

Selection

Assignment

Refinement

Iteration

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FAU_GEN.1

 

Audit Data Generation

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FAU_SAR.1

 

Audit Review

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FCS_CKM.1(a)

 

Cryptographic Key Generation

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FCS_CKM.4

 

Cryptographic Key Destruction

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FCS_COP.1(a)

 

Cryptographic Operation

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FCS_COP.1(b)

 

Cryptographic Operation

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FCS_COP.1(d)

 

Cryptographic Operation

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FCS_COP.1(e)

 

Cryptographic Operation

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FCS_CKM.1(b)

 

Cryptographic Key Generation

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FDP_ACC.2

 

Complete Access Control

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FDP_ACF.1

 

Security Attribute Based Access Control

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FDP_IFC.2(a)

 

Complete Information Flow Control

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FDP_IFC.2(b)

 

Complete Information Flow Control

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FDP_IFF.1(a)

 

Simple Security Attributes

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FDP_IFF.1(b)

 

Simple Security Attributes

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FDP_UCT.1

 

Basic Data Exchange Confidentiality

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FDP_UIT.1

 

Data Exchange Integrity

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FIA_UAU.1

 

Timing of Authentication

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FIA_UAU.5

 

Multiple Authentication Mechanisms

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FIA_UID.2

 

User Identification Before any Action

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FMT_MOF.1(a)

 

Management of Security Functions Behavior

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FMT_MOF.1(b)

 

Management of Security Functions Behavior

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FMT_MSA.1(a)

 

Management of Security Attributes

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Nortel VPN Router v7.05 and Client Workstation v7.11

 

 

 

 

 

Page 20 of 67

 

 

 

© 2008 Nortel Networks

 

 

 

 

 

 

Page 20
Image 20
Nortel Networks 7.05, 7.11 manual IT Security Requirements, TOE Security Functional Requirements