Security Target, Version 3.9

March 18, 2008

 

 

5.2 Security Functional Requirements on the IT Environment

The TOE has the following security requirement for its IT environment. Table 5 identifies all SFRs implemented by the IT Environment and indicates the ST operations performed on each requirement.

Table 5 - IT Environment Security Functional Requirements

 

 

ST Operation

SFR ID

Description

Selection

Assignment

Refinement

Iteration

 

 

 

 

FPT_RVM.1

Non-bypassability of the TSP

 

 

 

 

 

 

 

FPT_SEP.1

TSF domain separation

 

 

 

 

 

 

 

FPT_STM.1

Reliable time stamps

 

 

 

 

 

 

 

FPT_RVM.1 Non-bypassability of the TSP

Hierarchical to: No other components.

FPT_RVM.1.1

The TSF IT Environment shall ensure that TSP enforcement functions are invoked and succeed before each function within the TSC is allowed to proceed.

Dependencies: No dependencies

FPT_SEP.1 TSF domain separation

Hierarchical to: No other components.

FPT_SEP.1.1

The TSF IT Environment shall maintain a security domain for its own the TOE’s execution that protects it the TOE from interference and tampering by untrusted subjects.

FPT_SEP.1.2

The TSF shall enforce separation between the security domains of subjects in the TSC.

Dependencies: No dependencies

FPT_STM.1 Reliable time stamps

Hierarchical to: No other components.

FPT_STM.1.1

Nortel VPN Router v7.05 and Client Workstation v7.11

Page 39 of 67

© 2008 Nortel Networks

Page 39
Image 39
Nortel Networks 7.11, 7.05 Security Functional Requirements on the IT Environment, FPTRVM.1 Non-bypassability of the TSP