- i -
- Table of Contents -
1. ST INTRODUCTION ................................................................................................................ 1
1.1. ST Reference .................................................................................................................................................. 1
1.2. TOE Reference ............................................................................................................................................... 1
1.3. TOE Overview ................................................................................................................................................ 2
1.3.1. TOE Type and Major Security Features ...................................................................................................... 2
1.3.2. Environment Assumptions ............................................................................................................................... 5
1.3.3. Required Non-TOE Hardware and Software ............................................................................................ 6
1.4. TOE Description ............................................................................................................................................ 8
1.4.1. User Assumptions ................................................................................................................................................ 8
1.4.2. Logical Scope and Boundary .......................................................................................................................... 8
1.4.3. Physical Scope and Boundary ..................................................................................................................... 17
1.4.4. Guidance .............................................................................................................................................................. 18
2. CONFORMANCE CLAIM ..................................................................................................... 20
2.1. CC Conformance Claim .......................................................................................................................... 20
2.2. PP claim, Package Claim ........................................................................................................................ 20
2.2.1. PP Claim ............................................................................................................................................................... 20
2.2.2. Package Claim ................................................................................................................................................... 20
2.2.3. Conformance Rationale ................................................................................................................................. 21
3. SECURITY PROBLEM DEFINITION ................................................................................ 23
3.1. Threats .......................................................................................................................................................... 23
3.1.1. Assets Protected by TOE ................................................................................................................................ 23
3.1.2. Threats agents ................................................................................................................................................... 26
3.1.3. Threats .................................................................................................................................................................. 26
3.2. Organizational Security Policies .......................................................................................................... 27
3.3. Assumptions ............................................................................................................................................... 27
4. Security Objectives ................................................................................................................ 28
4.1. Security Objectives for the TOE ........................................................................................................... 28
4.2. Security Objectives for the Environment ......................................................................................... 29
4.3. Security Objectives Rationale .............................................................................................................. 29
5. EXTENDED COMPONENTS DEFINITION .................................................................... 34
5.1. FPT_FDI_EXP Restricted forwarding of data to external interfaces .................................... 34
6. SECURITY REQUIREMENTS .............................................................................................. 36
6.1. Security Functional Requirements ..................................................................................................... 40
6.1.1. Class FAU: Security Audit .............................................................................................................................. 43