VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 1 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. Security Target Lite for Voice Stream Interceptor (VSI) Product VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 2 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. Record of Changes Revision Date Changed By Change Description 0.1 08.12.2016 ASPE VSI ST Lite based on VSI ST document id SV000008 version 12. 1 08.12.2016 ASPE Updated according to review sheet SV000073-0.1- RR. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 3 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. Table of Contents Page 1 Introduction .....................................................................................................................5 1.1 Purpose..............................................................................................................................5 1.2 ST Reference .....................................................................................................................5 1.3 TOE Reference..................................................................................................................5 1.4 TOE Overview ..................................................................................................................5 1.4.1 Usage and major security features of the TOE.............................................................8 1.4.2 TOE type.......................................................................................................................9 1.4.3 Required non-TOE hardware/software/firmware.........................................................9 1.5 TOE Description................................................................................................................9 1.5.1 Physical scope.............................................................................................................10 1.5.2 Logical scope..............................................................................................................10 1.6 Approval & Maintenance of this document ....................................................................13 1.7 References .......................................................................................................................13 1.8 Terms & definitions.........................................................................................................13 2 CONFORMANCE CLAIMS........................................................................................14 2.1 CC Conformance Claim ..................................................................................................14 2.2 PP Claim..........................................................................................................................14 2.3 Package Claim.................................................................................................................15 2.4 Conformance Rationale...................................................................................................15 3 SECURITY PROBLEM DEFINITION......................................................................15 3.1 Threats.............................................................................................................................17 3.1.1 Assets..........................................................................................................................17 3.1.2 Threat Agents..............................................................................................................17 3.1.3 Identification of Threats .............................................................................................18 3.2 Organizational Security Policies (OSPs).........................................................................18 3.3 Assumptions....................................................................................................................19 4 SECURITY OBJECTIVES..........................................................................................20 4.1 TOE Security Objectives.................................................................................................20 4.2 Operational Environment Security Objectives................................................................20 4.3 Security Objectives Rationale .........................................................................................21 4.3.1 Security Objective Coverage ......................................................................................21 4.4 Security Objectives Sufficiency......................................................................................23 4.4.1 Threats ........................................................................................................................23 4.4.1.1 T.TERMINAL_INTEGRITY ................................................................................23 4.4.1.2 T.NETWORK_INTEGRITY.................................................................................23 4.4.1.3 T.WRONG_LABEL ..............................................................................................23 4.4.1.4 T.CORRUPT_STREAM .......................................................................................23 4.4.1.5 T.SETUP................................................................................................................24 4.4.1.6 T.CORRUPT_FORMAT.......................................................................................24 4.4.2 Organizational Security Policies ................................................................................24 4.4.3 Assumptions ...............................................................................................................24 4.4.3.1 A.SECURE_IP.......................................................................................................24 VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 4 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. 4.4.3.2 A.SECURE_LOCATION......................................................................................24 4.4.3.3 A.SECURE_OS .....................................................................................................24 4.4.3.4 A.TRUSTED_VPN................................................................................................24 5 EXTENDED COMPONENTS DEFINITION............................................................25 6 SECURITY REQUIREMENTS ..................................................................................25 6.1 Security Functional Requirements (SFRs)......................................................................25 6.1.1 FAU Security Audit....................................................................................................25 6.1.1.1 FAU_GEN.1 Audit data generation.......................................................................25 6.1.2 Information flow control policy (FDP_IFC) ..............................................................25 6.1.2.1 FDP_IFC.1(1) Subset information flow control ....................................................25 6.1.2.2 FDP_IFC.1(2) Subset information flow control ....................................................25 6.1.2.3 FDP_IFC.1(3) Subset information flow control ....................................................26 6.1.3 Information flow control functions (FDP_IFF)..........................................................26 6.1.3.1 FDP_IFF.1(1) Simple security attributes...............................................................26 6.1.3.2 FDP_IFF.1(2) Simple security attributes...............................................................27 6.1.3.3 FDP_IFF.1(3) Simple security attributes...............................................................28 6.1.4 Management of security attributes (FMT_MSA).......................................................28 6.1.4.1 FMT_MSA.3 Static attribute initialisation ............................................................28 6.1.5 Fail secure (FPT_FLS) ...............................................................................................29 6.1.5.1 FPT_FLS.1 Failure with preservation of secure state............................................29 6.1.6 TSF self test (FPT_TST) ............................................................................................29 6.1.6.1 FPT_TST.1 TSF testing.........................................................................................29 6.1.7 Trusted path (FTP_TRP) ............................................................................................30 6.1.7.1 FTP_TRP.1 Trusted path .......................................................................................30 6.2 Security Assurance Requirements (SARs)......................................................................30 6.3 Security Requirements Rationale ....................................................................................31 6.3.1 OT.SELECTOR..........................................................................................................31 6.3.2 OT.SANITY_CHECK................................................................................................31 6.3.3 OT.SUBSTITUTION .................................................................................................32 6.3.4 OT.SEND....................................................................................................................32 6.3.5 OT.LOG......................................................................................................................32 6.3.6 OT.ROBUST ..............................................................................................................32 6.3.7 OT.SUPPRESS...........................................................................................................32 7 TOE SUMMARY SPECIFICATION .........................................................................32 7.1 TOE Security Functions ..................................................................................................32 7.1.1 SF-1 BLACK Setup....................................................................................................33 7.1.2 SF-2 BLACK Voice ...................................................................................................33 7.1.3 SF-3 Cross Talk..........................................................................................................34 7.1.4 SF-4 Self-test and preserve secure state .....................................................................34 VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 5 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. 1 Introduction 1.1 Purpose This document is the Security Target (ST) Lite for the Voice Stream Interceptor (VSI) product named in this document as Target of Evaluation (TOE). The Lite version is made for the public release of the Security Target (ST) for the Voice Stream Interceptor (VSI) product. This Security Target aims at an Evaluation Assurance Level (EAL) 5. The certification is made by SERTIT and has the project number SERTIT-072. 1.2 ST Reference The security target is identified as: Title: Security Target – VSI product Version: 12 Authors: PSTE and ASPE Publication Date: 08.11.2016 Doc. Number: SV000008. 1.3 TOE Reference The TOE is identified as: Name: Voice Stream Interceptor Stock Number: SV000071 Version: 1 1.4 TOE Overview TOE is normally used in a system solution as shown in Figure 1. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 6 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. RED Network (E.g. National SECRET) BLACK Network (E.g. UNCLASSIFIED) Transfer CDS Z BLACK End Terminal Secure End Terminal TOE Z Another BLACK End Terminal / RED End Terminal Local user Local user Other local user Other local user Access CDS DMZ Radio 2 Naval vessel – Secure Voice System Z GFE Cryptographic Radio 1 Radio 3 Figure 1 Voice System deployment with two security domains. The shown communication lines are bi-directional. TOE makes sure that the Secure End Terminal can release voice streams, which only contains BLACK information (shown as dotted black line) and can be transported without loss of integrity (shown as dashed red line between Zs) over the classified network. The integrity check makes sure that no classified information in the classified network can be mixed with the BLACK (unclassified) voice stream. The user can make the selection between sending BLACK or RED information and gets an acknowledgement of the selection by a repeating non-secure warning tone while BLACK selection is made and the user is talking. TOE is providing a security mechanism, which together with a DMZ is providing a secure release mechanism. In this way the Secure Voice System can interact with unclassified voice BLACK End Terminals or Radio (shown as example for Radio 2) outside the secure area. The unclassified network is not connected to the Internet. TOE is also controlling the suppression of RED incoming voice stream, such that while sending non- classified voice the possible pickup and cross talk of classified voice via the speaker to the microphone can be eliminated. The RED talking user (shown as ‘Other local user’ in Figure 1) will not be aware of the suppression. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 7 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. For completeness the encryption of RED information has also been shown, where the Government Furnished Equipment (GFE) encryption is performed before it is transmitted via the radio (shown as example for Radio 1) and decrypted when receiving from the Radio into the RED Network. The system solution is based on a “defence in depth” security strategy, where a number of security layers are applied. Each of the security layers are shown in Figure 2 both for incoming and outgoing data traffic. The following example deployment illustrates how the TOE can be used (see Figure 2), where the defence in depth approach also has been included. Classified Network Unclassified Network VPN (Inverse Tunnel) End Terminal Red SIP Registrar Server Firewall 1. line of defence VPN 3. line of defence TOE 4. line of defence TOE 1. line of defence VPN 2. line of defence Firewall 3. line of defence Stream Setup Media Stream with Black Label Media Stream with Red Label RED BLACK RED/BLACK boundary Secure End Terminal Firewall 2. line of defence Black SIP Registrar Server Firewall 4. line of defence Secure Area RED BLACK TOE located inside End Terminal DMZ Figure 2 Example deployment of TOE in a secure voice system. Defence in depth has been shown as arrow lines of defence. TOE is located in the Secure End Terminal. The following layers apply for incoming flow: 1. Only allowed protocol type can be sent from Unclassified Network to DMZ. 2. Only allowed protocol type can be sent from DMZ to VPN. 3. Integrity of black information is intact, because RED network equipment cannot modify data inside the VPN tunnel. 4. Sanitation of incoming voice stream and setup is performed, such that defined protocol information is received. The following layers apply for outgoing flow: VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 8 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. 1. TOE performs separation between RED and BLACK information, such that only BLACK information is released to the VPN. 2. VPN is preventing RED information from the Classified Network to mix with the Inverse Tunnel. 3. The Firewall is only allowing information from the VPN to be transmitted, such that no information from the classified network can be transmitted into the DMZ. 4. Only allowed protocol type can be sent from DMZ to Unclassified Network. IMPORTANT: According to NATO Security Policy an External System must NOT have remote access to the secure system. The Stream Setup in Figure 2 is performed in such a way that the DMZ is acting as a Trusted End Point. This means that the shown Stream Setup is terminated at the DMZ, e.g. no direct setup is performed between the External End Terminal and Secure End Terminal. Figure 2 shows also that the communication line in Figure 1 actually is defined by the following:  Voice Stream – the stream of IP packages containing voice information. The Real-time Transport Protocol (RTP) is used for the transportation of Voice Stream.  Stream Setup – the communication required to setup the Voice Stream communication. The Session Initiation Protocol (SIP), Internet Group Management Protocol (IGMP) and Real-Time Transport Control Protocol (RTCP) are used for the Stream Setup. The reason for dividing the communication is based on the required real time communication of Voice Stream. The Stream Setup may require a so called SIP Registrar such that end points can send Voice Stream according to the setup. Sanitization of Stream Setup is performed before send to DMZ, which prevent it from being misused. TOE stores audits in the underlying IT environment, where self-test, failures and success are stored for later retrieval. 1.4.1 Usage and major security features of the TOE TOE has been designed in such a way that it can be integrated into an overall system solution, where existing standard trusted products are used. TOE makes it possible to provide the following important capabilities: 1. Secure Conferencing – multiple users can share a conference at the same classification level. 2. Release of classified and unclassified voice to another enclave with the correct classification level. TOE is providing the following security feature, such that that the above capabilities are supported: VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 9 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent.  TOE is a secure separation mechanism for voice streams, such that: o Transmission of BLACK streams to the DMZ does not contain any RED stream information. o The user can both listen to BLACK and RED streams at the same time.  TOE can minimise Cross talk of classified voice by suppression of incoming RED voice stream to the speaker while sending BLACK voice. Cross talk minimization is a feature, which can be enabled or disabled by a TOE configuration. 1.4.2 TOE type The Voice Stream Interceptor Product (the TOE) is categorized as an Access Cross Domain Solution (CDS), where voice information with different classification levels can be handled. 1.4.3 Required non-TOE hardware/software/firmware TOE requires the following non-TOE software:  Common Criteria approved Linux Operating System (reflects the assumption A.SECURE_OS).  IPsec tunnel (reflects the assumption A.TRUSTED_VPN). TOE requires the following non-TOE hardware:  Trusted Platform Module (TPM). However, the Common Criteria approved Linux Operating System might have indirect requirements. 1.5 TOE Description TOE must control all the communication to the Inverse Tunnel, because TOE makes sure that no RED Voice is sent to the Inverse Tunnel. The following type of communication has been identified: 1. Voice Stream is composed of the following information: a. Voice contents. b. Header information. 2. Stream Setup is a set of control protocols and is not intended to carry voice contents. TOE can be seen as an interceptor between the user application and the Inverse Tunnel, where the interceptor performs the following to prevent RED voice being sent to the Inverse Tunnel:  The voice contents of the Voice Stream from the application might contain RED voice and is therefore substituted with voice from the microphone attached to TOE. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 10 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent.  Voice Stream is sent to the Inverse Tunnel if and only if the selector is BLACK, which means that the user is talking BLACK. To make sure that the user is aware of the BLACK TALK selection TOE is providing a non-secure warning tone  The header information of the Voice Stream could be misused to contain RED voice and is therefore sanitized before it is sent to the Inverse Tunnel.  The Stream Setup could be misused to contain RED voice and is therefore sanitized before sent to the Inverse Tunnel.  Voice Stream and Stream Setup received from the Inverse Tunnel could corrupt the integrity of TOE and therefor sanitization is performed of the incoming information from the Inverse Tunnel.  The user can listen to both RED and BLACK voice. RED Voice could cross talk to the microphone. TOE can mute RED voice received from the network during BLACK talk operation, such that possible cross talk is prevented. 1.5.1 Physical scope TOE is purely software and can be installed on several physical devices as long as the non-TOE software requirements in section 1.4.3 are valid. 1.5.2 Logical scope The logical scope of TOE is defined by the logical interface in Figure 3. The user can perform RED and BLACK voice conversations, which are described in the following two cases. The user wants to perform a BLACK conversation with another Terminal or Radio on the BLACK network. The following steps are performed: 1. The user makes a BLACK TALK selection to let TOE know that a BLACK conversation shall take place. 2. The Non-Trusted Application will initiate the setup of the communication with the Terminal or Radio located on the BLACK network. The setup is performed with the Requested BLACK Stream Setup and Sanitized Stream Setup interface to/from TOE. 3. The User can listen to the BLACK voice received on Sanitized Voice Stream interface from TOE. 4. The User can talk to the Terminal or Radio on BLACK network by letting the Non-Trusted Application send voice stream to Requested BLACK Voice Stream TOE interface and the user is talking into the Microphone TOE interface. The voice stream contents of Requested BLACK Voice Stream will be substituted with voice from the Microphone interface, such that no RED voice stream is contained in the outgoing voice stream. Sanity check of Requested BLACK Voice Stream is performed. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 11 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. 5. The user will get a non-secure warning tone on the Indicator (speaker) TOE interface as acknowledge from TOE. 6. The user will repeatedly get a non-secure warning tone from TOE during the conversation to make him aware that he still is talking BLACK. 7. The user is also able to listen to RED conversation from the RED Voice Stream TOE interface, when he is not talking. 8. The user can make a RED TALK selection on the Selection TOE interface and continue with a RED conversation as described below. 9. The user can terminate the conversation by letting the Non-Trusted Application initiate a termination via Requested BLACK Stream Setup and Sanitized Stream Setup TOE Interface. The user wants to perform a RED conversation with another Terminal located on the RED network. The following steps are performed: 1. The user makes a RED TALK selection on the Selection TOE Interface to let TOE know that a RED conversation shall take place. 2. The Non-Trusted Application will initiate the setup of the communication with the Terminal located on the RED network. The setup is performed directly with the other Terminal and TOE is not involved. 3. The User can listen to the RED voice received on RED Voice Stream TOE Interface. 4. The User can talk to the Terminal on RED network by sending voice stream directly to the other terminal. TOE is not involved. 5. The user can terminate the conversation by letting the Non-Trusted Application initiate a termination. The termination is performed directly with the other Terminal and TOE is not involved. Self-test is performed during the start-up of TOE. During operation events generated by TOE are stored in the underlying Operating System, which is part of the IT Environment of TOE. In cases where TOE is detecting Audio Failure and Network Failure the secure state is preserved by blocking the Outgoing BLACK Stream Setup and Outgoing BLACK Voice Stream. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 12 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. Microphone RED TALK BLACK TALK Selection Requested BLACK Voice Stream Outgoing BLACK Voice Stream Indicator (Speaker) Incoming BLACK Voice Stream Sanitized Voice Stream Requested BLACK Stream Setup Sanitized Stream Setup Outgoing BLACK Stream Setup Incoming BLACK Stream Setup Non-Trusted Application IPsec Network to DMZ RED Voice Stream Incoming RED Voice Stream Other RED or Secure End Terminal TOE Figure 3: Overview of TOE with logical interfaces. Each interface is described in the following table: Interface Description Requested BLACK Voice Stream The requested voice stream to be sent on Outgoing BLACK Voice Stream, which will be sanitized before it is sent. Sanitized Voice Stream The sanitized voice stream of the Incoming BLACK Voice Stream. Requested BLACK Stream Setup The BLACK Stream Setup to be sent on the Outgoing BLACK Stream Setup, which will be sanitized before it is sent. Sanitized Stream Setup The sanitized stream setup of the Incoming BLACK Stream Setup. RED Voice Stream The possibly silenced voice stream of the Incoming RED Voice Stream. Incoming RED Voice Stream The RED Voice Stream to be sent on RED Voice Stream interface to the Non-Trusted Application. Incoming BLACK Stream Setup The BLACK Stream Setup to be sanitized and sent on the Sanitized Stream Setup to the Non-Trusted Application. Outgoing BLACK Stream Setup The Sanitized stream setup of the Requested BLACK Stream Setup. Incoming BLACK Voice Stream The Incoming BLACK Voice Stream, which will be sanitized and sent on the Sanitized Voice Stream interface. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 13 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. Outgoing BLACK Voice Stream The substituted BLACK Voice Stream of the Requested BLACK Voice Stream. Selection Selection by the user to talk RED or BLACK. Microphone Voice samples from the microphone. Indicator (Speaker) Speaker for indication of the non-secure warning tone. Note: No Outgoing RED Voice Stream has been shown on Figure 3. Outgoing RED Voice Stream can be sent to other TSS on the RED Network without restriction and does therefore not require to be intercepted by TOE. ‘IPsec Network to DMZ’ indicates that the communication of ‘Outgoing BLACK Voice Stream’, ‘Incoming BLACK Voice Stream’, ‘Outgoing BLACK Stream Setup’ and ‘Incoming BLACK Stream Setup’ are communicated in the Inverse Tunnel, such that communication with DMZ can utilise the RED network as a transport medium. ‘Other RED or Secure End Terminal’ shows that ‘Incoming RED Voice Stream’ is transported directly on the RED network and is not using the Inverse Tunnel. ‘Non-Trusted Application’ can be any application utilising the TOE functionality. The application is non-trusted, because TOE is making sure that no RED information is released via the Inverse Tunnel. 1.6 Approval & Maintenance of this document This document is part of the VSI Common Criteria Evaluation and will be approved and maintained accordingly. 1.7 References Ref. No Title Identification 1. Common Criteria Part 1: Introduction and general model Part 2: Security functional components Part 3: Security assurance components September 2012, Version 3.1 R4 CC 1.8 Terms & definitions Word/abbreviation/acronym Explanation Access CDS General category of IT products e.g. keyboard, video and mouse (KVM) switch etc. CC Common Criteria. CDS Cross Domain Solution CIS Communications and Information Systems. DMZ De-Militarized Zone. EAL Evaluation Assurance Level. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 14 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. Word/abbreviation/acronym Explanation Inverse tunnel Mechanism protecting lower classified information in a network at a higher accreditation level (e.g. UNCLASSIFIED information in a SECRET network). LSE Local Security Environment – A controlled access facility. IGMP Internet Group Management Protocol IP Internet Protocol. OSP Organizational Security Policies. PP Protection Profile. RTCP Real-Time Transport Control Protocol RTP Real-time Transport Protocol Secure End Terminal End Terminal located in the RED domain including a TOE Secure Voice over IP (SVoIP) End-to-end secure voice communications over IP-based networks. SERTIT Norwegian Certification Authority for IT Security SF Security Function SIP Session Initiation Protocol ST Security Target. TOE Target of Evaluation Transfer CDS General category of IT products e.g. firewall, content filter, crypto etc. TSF TOE Security Function TSS Tactical Subscriber Station is the SAAB product name for the End Terminal Voice over Secure IP (VoSIP) Voice communications that use an encrypted IP network for transmission; however the voice communications are not encrypted end-to end (handset-to-handset). Note that this differs from SVoIP in that VoSIP usually has an unencrypted local VoIP network using standard commercial off- the-shelf (COTS) VoIP phones, which interconnects with a secure IP network for wider communications. VPN Virtual Private Network Voice Stream Interceptor (VSI) SAAB product name for the TOE categorized as an Access CDS 2 CONFORMANCE CLAIMS 2.1 CC Conformance Claim The ST is Common Criteria Version 3.1 R4 Part 2 conformant and Part 3 conformant; no extended components have been defined. 2.2 PP Claim The ST does not claim conformance to any registered Protection Profile. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 15 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. 2.3 Package Claim The ST claims conformance to the EAL5 assurance package defined in Part 3 of the Common Criteria Version 3.1 R4. 2.4 Conformance Rationale No conformance rationale is necessary for this evaluation since this ST does not claim conformance to a Protection Profile. 3 SECURITY PROBLEM DEFINITION The purpose of the security problem definition is to define the scope and nature of the security problem the TOE is intended to address. The environment to which the TOE shall cope with is defined as a number of assets, threat agents, threats, assumptions and policies. The security problem definition consists of identified assumptions about the environment, threats to assets and organizational security policies. To facilitate easy definition of threats, organisational security policies, assumptions, security objectives and security requirements, the subjects, objects and operations to be used in the ST are defined first. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 16 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. TSS Classified Non-Classified Secure Area External Terminal Stream Setup Voice Stream with Black Label Recieve Operation Send Operation Send Security Selection (BLACK) Voice Stream Classification (BLACK) TSS Send Operation Send Security Selection (RED) Red Voice Stream DMZ Red Registrar Loudspeaker Figure 4: Overview of subjects, objects, security attributes and operations. Users and administrators have not been shown in the figure. Figure 4 gives an overview of the identified subjects, objects, security attributes and operations, which are defined and described in the following tables. The information flow for RED, BLACK Voice Stream and Stream setup is also shown, such that information flow end points can be seen. Please note that Stream Setup is terminated by the Red Registrar (for RED voice setup) and DMZ (for BLACK voice setup). VPN tunnel is not shown, because it is not import for the identification of subject and objects. The personnel that interact with the TOE are: Subjects Short name Description S.ADMIN Authenticated authorized administrator of the TOE. S.USER Authorized users of the TOE. The systems (equipment) that interact with the TOE are: VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 17 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. Subjects Short name Description S.TSS Voice End Terminal located inside the secure area (Secure End Terminal). S.DMZ DMZ between the BLACK and RED network with trusted firewall, voice registrar and other means for a secure connection between the two networks. S.EXTERNAL_TERMINAL Non trusted End Terminal located outside the secure area. The (data) objects for the TOE that the TOE will operate upon are: Objects Short name Description O.BLACK_VOICE_STREAM The BLACK voice stream flowing both in and out from/to the BLACK network. O.RED_VOICE_STREAM The RED voice stream flowing from the RED network. O.STREAM_SETUP The setup information for setting up the standard voice stream between Secure End Terminal and External End Terminal. Note: Setup Information is not used for the setup/management of secure voice, only for stream setup. Security Attributes Short name Description SA.VOICE_STREAM_CLASSIFICATION Classified Voice Stream has Classification RED. Unclassified Voice Stream has Classification BLACK. Operations Short name Description Receive The Authorized user (S.USER) is receiving a Voice Stream. Send The Authorized user (S.USER) is sending a Voice Stream. Depending on the TALK Selection the send voice will only be able to send Non-Classified (BLACK) voice or block the stream. Note: Receive and Send operation can be conducted at the same time; they do not exclude each other. 3.1 Threats 3.1.1 Assets Assets Short name Description AS.RED_VOICE Classified Voice Stream. 3.1.2 Threat Agents The following subjects are capable to effectuate threats for the TOE (i.e. Threat Agents): VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 18 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. Threat Agents Short name Description TA.EXTERNAL Personnel with no authorized access to the Secure System. These threat agents may try to access the Classified Voice Stream (AS.RED_VOICE) information and may have “unlimited” resources supporting them. TA.INTERNAL Authenticated authorized users or resource of the Secure System, which are not authorised TOE users. These threat agents may try to manipulate the Classified Voice Stream (AS.RED_VOICE) such that they can be released outside the Secure System. TA.USER Authenticated authorized users of the TOE. These threat agents may intentionally or unintentionally perform unauthorized actions. TA.TSS_APPLICATION The Secure End Terminal application utilising the TOE. 3.1.3 Identification of Threats Threats Short name Description T.TERMINAL_INTEGRITY The Secure End Terminal (TA.TSS_APPLICATION) may mix Non- Classified and Classified Voice Stream (AS.RED_VOICE), which could violate the security rules. T.NETWORK_INTEGRITY An internal user or resource (TA.INTERNAL) may corrupt the Voice Stream, such that Classified Voice Stream (AS.RED_VOICE) could be released to unclassified network. T.WRONG_LABEL The user (TA.USER) may select a wrong classification of a Voice Stream, which could lead to a violation of the security rules for Classified Voice Stream (AS.RED_VOICE). T.CORRUPT_STREAM An external user (TA.EXTERNAL) could send a corrupt incoming voice stream, so that a Secure End Terminal integrity failure could lead to a violation of the security rules for Classified Voice Stream (AS.RED_VOICE). T.SETUP Resources in the DMZ might be used by an external user (TA.EXTERNAL) to perform a tampering setup such that a violation of the security rules for Classified Voice Stream (AS.RED_VOICE) may occur. T.CORRUPT_FORMAT An external user (TA.EXTERNAL) might corrupt the stream setup, so that a Secure End Terminal integrity failure could lead to a violation of the security rules for Classified Voice Stream (AS.RED_VOICE). The security rules used in the above threat is referring to the security policy P.LABELLING_POLICY in next section. 3.2 Organizational Security Policies (OSPs) The operational environment of the TOE is Communications and Information Systems (CIS). CIS are an essential part of military operations and provide commanders at all levels with the means to exercise Command and Control (C2) and disseminate classified information. CIS must be accredited specifically to handle classified information by a National Security Authority (NSA). Operating authority who is handling accredited CIS classified information system must issue instructions for processing, handling and accounting for classified information. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 19 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. CIS handling classified information shall use a trusted release mechanism for release of unclassified or BLACK Voice Stream information. The trusted release mechanism provided by the TOE shall prevent unintended release of Classified or RED Voice Stream information. The main functionality of the TOE is to implement the policy for labelling in an automated way. The TOE documentation supports operating authorities with CIS handling classified information to be accredited, where BLACK Voice Stream information flows by tunnelling. The tunnelling provides a means to interconnect the TOE and the unclassified network using the classified network as communication bearer service. OSP Policy Description P.CIS_DEFINITION_POLICY The TOE, classified and unclassified network are according to AC/322-D/0030 defined as one CIS and under the control of one and the same CIS operating authority. P.CIS_PERSONNEL_POLICY CIS operators are military personnel with authorised access to the CIS based on their security clearance. P.CIS_INTERCONNECTION_POLICY Interconnection from both CIS classified and unclassified network to other CIS are known and controlled according to AC/322-D/0030 by the CIS operating authority. P.VOICE_PROCEDURES_POLICY The TOE shall, by an appropriate release mechanism, pass speech traffic as securely as possible consistent with accuracy, speed and the needs of command and control (C2) according to the Combined Communications Electronics Board (CCEB) in the Allied Communications Publication (ACP) 125 “Radiotelephone Procedures”. P.LABELLING_POLICY The TOE shall implement and comply with the labelling policy appropriate for handling classified information. This policy defines the  Labelling: the trusted indication of the classification level of the voice stream.  Security rules: the set of rules for the circumstances under which information will be allowed for declassification. In [SFP.BLACK_STREAM] this policy is fully defined, see section 6.1.2.1 and 6.1.3.1. 3.3 Assumptions The following are threats handled as assumptions, since it is not the TOE’s responsibility to counter these threats. Assumptions Assumption Description A.SECURE_IP Secure End Terminal containing TOE is connected to a Secure IP network, which means that measures for the secure transmission is fulfilled. A.SECURE_LOCATION TOE is located in a secure area. A.SECURE_OS TOE is executing on a Common Criteria evaluated OS with Assurance Level 3 or higher and has been configured with a hardening setup. A.TRUSTED_VPN TOE has a VPN connection to the DMZ, to prevent access to classified voice stream (AS.RED_VOICE). VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 20 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. Note: A threat could be stated instead of the assumption. However, the trusted VPN is a very generic security functionality and will be available in the IT Environment. Therefore the threat has not been stated and instead an assumption has been made. 4 SECURITY OBJECTIVES The high-level solution is divided into a two part solution, one part is the TOE, and the second part is the operational environment of TOE. Each part of the high-level solution has its own set of objectives to address the security problem. 4.1 TOE Security Objectives TOE Security Objectives Objective Description OT.SANITY_CHECK The TOE shall perform sanity check of Requested BLACK Voice Stream Header, Requested BLACK Stream Setup, Incoming BLACK Voice Stream Header and Incoming BLACK Stream Setup. OT.SELECTOR The TOE shall support the user in the reliable BLACK TALK operation. The TOE shall issue a non-secure warning tone when receiving the Requested BLACK Voice Stream and the selector is in position BLACK TALK. The non-secure warning tone is repeated periodically, while receiving Requested BLACK Voice Stream and the selector is in position BLACK TALK. OT.SUBSTITUTION The TOE shall provide Outgoing BLACK Voice Stream, where the Voice content of Requested BLACK Voice Stream is substituted with the incoming microphone stream. Substitution with incoming microphone stream is only made, when selector is BLACK TALK. Otherwise, the outgoing Voice Stream is blocked. OT.SEND The TOE shall send BLACK Voice Stream and Setup through the trusted release (OE.TRUSTED_RELEASE). OT.LOG The TOE shall store the failure of the substitution, integrity check and sanity check in a log. OT.ROBUST The TOE shall be robust, such that internal TOE errors are handled appropriately. OT.SUPPRESS The TOE can prevent acoustic feedback from the local speaker of the incoming RED Voice Stream when selector is BLACK TALK and receiving Requested BLACK Voice Stream. 4.2 Operational Environment Security Objectives This section defines the Security Objectives of the TOE and its environment. The Security Objectives reflect the stated intent to counter all identified threats. They comply with all organizational security policies identified and uphold all assumptions. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 21 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. Operational Environment Security Objectives Objective Description OE.SECURE_IP The communication infrastructure used by the TOE shall be a Secure IP. OE.SECURE_LOCATION The TOE shall be installed within controlled access facilities (LSE). OE.ENVIRONMENTAL The TOE shall operate within the manufacturer’s environmental specification. OE.ACOUSTIC_FEEDBACK The risk of acoustic feedback in the environment shall be addressed by operational procedures. OE.INSTRUCTED_USERS Trusted direct users are assigned, instructed and shall act as such in using equipment where the TOE is located. OE.INSTRUCTED_ADMIN Trusted direct users are assigned, instructed and shall act as such to manage the TOE. OE.EVALUATED_OS The operating system the TOE makes use of shall be evaluated OS. SFR FPT_STM.1, FMT_MSA.1 and FMT_SMR.1 shall be part of the OS due to dependencies between TOE SFRs. OE.LOG_ACCESS The IT Environment shall allow only the administrator (S.ADMIN) read access to the Log. OE.READ_LOG The S.ADMIN shall be able to read the TOE Log. OE.TRUSTED_RELEASE A trusted release security mechanism between the classified network within the LSE and the external system shall be used for the release of Unclassified Voice Streams. The trusted Voice Stream Labelling of the TOE is utilised by the trusted release security mechanism. OE.TRUSTED_REGISTRAR A trusted release security mechanism between the classified network within the LSE and the external system shall provide a trusted SIP Registrar. OE.PREVENT_ACCESS A Trusted VPN between the TOE and DMZ shall be used. The trusted VPN act as an inverse tunnel, such that uncontrolled access to the classified network is prevented. In this way, the Classified Network is only used as a pure transport of voice. 4.3 Security Objectives Rationale 4.3.1 Security Objective Coverage This section provides tracings between objectives for the TOE and what threats are being countered by the objective(s) and what OSPs being enforced by the security objectives. Also the tracing between each security objective for the operational environment and the threats countered by that security objective, OSPs enforced by that security objective, and assumptions upheld by that security objective is shown. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 22 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. Threats & Assumptions Objectives T.TERMINAL_INTEGRITY T.NETWORK_INTEGRITY T.WRONG_LABEL T.CORRUPT_STREAM T.SETUP T.CORRUPT_FORMAT A.SECURE_IP A.SECURE_LOCATION A.SECURE_OS A.TRUSTED_VPN P.CIS_DEFINITION_POLICY P.CIS_PERSONNEL_POLICY P.CIS_INTERCONNECTION_POLICY P.VOICE_PROCEDURES_POLICY P.LABELLING_POLICY OT.SELECTOR X X X X OT.SANITY_CHECK X X X X X X OT.SUBSTITUTION X X X OT.SEND X X X OT.LOG X OT.ROBUST X OT.SUPPRESS X OE.SECURE_IP X X OE.SECURE_LOCATION X X X X OE.ENVIRONMENTAL X X OE.ACOUSTIC_FEEDBACK X OE.INSTRUCTED_USERS X X X X X OE.INSTRUCTED_ADMIN X X X X X X OE.EVALUATED_OS X X X OE.LOG_ACCESS X X OE.READ_LOG X X OE.TRUSTED_RELEASE X X X OE.TRUSTED_REGISTRAR X OE.PREVENT_ACCESS X X X VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 23 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. 4.4 Security Objectives Sufficiency 4.4.1 Threats 4.4.1.1 T.TERMINAL_INTEGRITY The End Terminal has an underlying execution environment, which must guarantee no tampering and therefore requires a secure execution platform provided by the OE.EVALUATED_OS and OE.ENVIRONMENTAL. The robustness of TOE due to internal errors is handled by OT.ROBUST. The main function of the TOE is to perform a secure substitution (OT.SUBSTITUTION) of microphone signal according to security rules. Furthermore, the substitution relies on that the microphone stream is reflecting the TA.USER classification selection OT.SELECTOR. The substitution relies on correct Requested BLACK Voice Stream, which is checked by OT.SANITY_CHECK. The microphone might pick up unintended classified voice in the environment, which is handled by operational procedure OE.ACOUSTIC_FEEDBACK and OT.SUPPRESS. The resulting substituted output from the TOE can be used by a trusted release mechanism OE.TRUSTED_RELEASE. Outgoing BLACK Voice Stream will be blocked when attempting to send while OT.SELECTOR is RED TALK. Audits will be stored for later read by the environment OE.READ_LOG in OT.LOG. To prevent other than OE.INSTRUCTED_ADMIN to read the log the log is protected by OE.LOG_ACCESS. 4.4.1.2 T.NETWORK_INTEGRITY The transportation of the voice stream is performed by an OE.PREVENT_ACCESS on OE.SECURE_IP network in an OE.SECURE_LOCATION, such that the AS.RED_VOICE voice streams is handled securely. Furthermore, an unintended alternation might be performed in the secure network of the Outgoing BLACK Voice Stream. The alternation is protected by the OE.TRUSTED_RELEASE. 4.4.1.3 T.WRONG_LABEL The labeling of the voice stream is based on a trusted OT.SEND. The read back (OT.SELECTOR) of the label by OT.SEND must be observed by OE.INSTRUCTED_USERS. The internal handling of the label cannot be manipulated due to the underlying OE.EVALUATED_OS working at the correct OE.ENVIRONMENTAL conditions. 4.4.1.4 T.CORRUPT_STREAM Unauthorised access to stream is prevented by OE.PREVENT_ACCESS and Sanity check (OT.SANITY_CHECK) will detect corrupt incoming BLACK Voice Stream or Requested BLACK Voice Stream, so that they are according to the expected package format. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 24 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. Audits will be stored for later read by the environment OE.READ_LOG in OT.LOG. To prevent other than OE.INSTRUCTED_ADMIN to read the log the log is protected by OE.LOG_ACCESS. 4.4.1.5 T.SETUP Illegal format of Stream Setup is prevented by OT.SANITY_CHECK and OE.TRUSTED_REGISTRAR and will detect corrupt incoming setup, so that they are according to the expected subset of SIP. 4.4.1.6 T.CORRUPT_FORMAT Sanity check (OT.SANITY_CHECK) will detect corrupt Incoming BLACK Stream Setup, so that they are according to the expected package format. 4.4.2 Organizational Security Policies P.CIS_DEFINITION_POLICY is directly covered by OE.SECURE_LOCATION. The P.CIS_PERSONNEL_POLICY is covered by OE.INSTRUCTED_USERS and OE.INSTRUCTED_ADMIN and physical protected by OE.SECURE_LOCATION. P.CIS_INTERCONNECTION_POLICY is directly covered by OE.TRUSTED_RELEASE. P.VOICE_PROCEDURES_POLICY and P.LABELLING_POLICY are directly covered by OT.SUBSTITUTION and OT.SEND and supported by OT.SELECTOR and OT.SANITY_CHECK for the secure transmission to the trusted interconnection. 4.4.3 Assumptions 4.4.3.1 A.SECURE_IP A.SECURE_IP is directly covered by OE.SECURE_IP, securely administrated by OE.INSTRUCTED_ADMIN and securely used by OE.INSTRUCTED_USERS. 4.4.3.2 A.SECURE_LOCATION A.SECURE_LOCATION is directly covered by OE.SECURE_LOCATION, securely administrated by OE.INSTRUCTED_ADMIN and securely used by OE.INSTRUCTED_USERS. 4.4.3.3 A.SECURE_OS A.SECURE_OS is directly covered by OE.EVALUATED_OS, securely administrated by OE.INSTRUCTED_ADMIN and securely used by OE.INSTRUCTED_USERS. 4.4.3.4 A.TRUSTED_VPN A.TRUSTED_VPN is directly covered by OE.PREVENT_ACCESS, securely administrated by OE.INSTRUCTED_ADMIN. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 25 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. 5 EXTENDED COMPONENTS DEFINITION No additional extended components are needed and therefore none are defined. 6 SECURITY REQUIREMENTS 6.1 Security Functional Requirements (SFRs) 6.1.1 FAU Security Audit 6.1.1.1 FAU_GEN.1 Audit data generation Hierarchical to:  No other components. Dependencies:  FPT_STM.1 Reliable time stamps. FAU_GEN.1.1 The TSF shall be able to generate an audit record of the following auditable events: a) Start-up and shutdown of the audit functions; b) All auditable events for the [selection, choose one of: minimum, basic, detailed, not specified] level of audit; and c) [assignment: other specifically defined auditable events None]. FAU_GEN.1.2 The TSF shall record within each audit record at least the following information: a) Date and time of the event, type of event, subject identity (if applicable), and the outcome (success or failure) of the event; and b) For each audit event type, based on the auditable event definitions of the functional components included in the PP/ST, [assignment: other audit relevant information None]. 6.1.2 Information flow control policy (FDP_IFC) 6.1.2.1 FDP_IFC.1(1) Subset information flow control Hierarchical to:  No other components. Dependencies:  FDP_IFF.1(1) Simple security attributes FDP_IFC.1.1(1) The TSF shall enforce the [SFP.BLACK_STREAM] on [the subjects S.TSS and S.DMZ via OE.PREVENT_ACCESS, Send operation, on the information O.BLACK_VOICE_STREAM]. 6.1.2.2 FDP_IFC.1(2) Subset information flow control Hierarchical to: VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 26 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent.  No other components. Dependencies:  FDP_IFF.1(2) Simple security attributes FDP_IFC.1.1(2) The TSF shall enforce the [SFP.BLACK_SETUP] on [the subjects S.TSS and S.DMZ via OE.PREVENT_ACCESS, Send operation, on the information O.STREAM_SETUP]. 6.1.2.3 FDP_IFC.1(3) Subset information flow control Hierarchical to:  No other components. Dependencies:  FDP_IFF.1(3) Simple security attributes FDP_IFC.1.1(3) The TSF shall enforce the [SFP.RED_STREAM] on [the subjects S.TSS, Receive operation, on the information O.RED_VOICE_STREAM]. 6.1.3 Information flow control functions (FDP_IFF) 6.1.3.1 FDP_IFF.1(1) Simple security attributes Hierarchical to:  No other components. Dependencies:  FDP_IFC.1(1) Subset information flow control  FMT_MSA.3 Static attribute initialisation FDP_IFF.1.1(1) The TSF shall enforce the [SFP.BLACK_STREAM] based on the following types of subject and information security attributes: [the subjects S.TSS and S.DMZ, on the information O.BLACK_VOICE_STREAM, using security attributes SA.VOICE_STREAM_CLASSIFICATION]. FDP_IFF.1.2(1) The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules hold: [BLACK Send operation shall permit O.BLACK_VOICE_STREAM to flow from S.TSS to S.DMZ via OE.TRUSTED_RELEASE]. FDP_IFF.1.3(1) The TSF shall enforce the [following sequence of steps: A) Perform sanity check of Header Information in Requested Voice Stream (O.BLACK_VOICE_STREAM) from S.TSS and B) Substitution of Voice contents in Requested Voice Stream with Microphone Signal for O.BLACK_VOICE_STREAM flowing from S.TSS to S.DMZ and C) Add non-secure warning tone and periodically repeat the addition of the warning tone to the Indicator (Speaker)]. FDP_IFF.1.4(1) The TSF shall explicitly authorise an information flow based on the following rules: [ VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 27 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. A) Sanity check of Incoming BLACK Voice Stream O.BLACK_VOICE_STREAM with classification label SA.VOICE_STREAM_CLASSIFICATION=BLACK from S.DMZ and B) Send the sanitized O.BLACK_VOICE_STREAM to S.TSS]. FDP_IFF.1.5(1) The TSF shall explicitly deny an information flow based on the following rules: [ SA.VOICE_STREAM_CLASSIFICATION =RED shall deny O.BLACK_VOICE_STREAM to flow from S.TSS]. The following actions should be auditable: a) Minimal: Decisions to permit requested information flows. b) Basic: All decisions on requests for information flow. c) Detailed: The specific security attributes used in making an information flow enforcement decision. d) Detailed: Some specific subsets of the information that has flowed based upon policy goals (e.g. auditing of downgraded material). 6.1.3.2 FDP_IFF.1(2) Simple security attributes Hierarchical to:  No other components. Dependencies:  FDP_IFC.1(2) Subset information flow control  FMT_MSA.3 Static attribute initialisation FDP_IFF.1.1(2) The TSF shall enforce the [SFP.BLACK_SETUP] based on the following types of subject and information security attributes: [the subjects S.TSS and S.DMZ, on the information O. STREAM_SETUP, using no security attribute]. FDP_IFF.1.2(2) The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules hold: [None]. FDP_IFF.1.3(2) The TSF shall enforce the [following sequence of steps: A) Perform sanity check of Requested Stream Setup (O.STREAM_SETUP) from S.TSS and B) Send the sanitized O.STREAM_SETUP to S.DMZ via OE.TRUSTED_RELEASE]. FDP_IFF.1.4(2) The TSF shall explicitly authorise an information flow based on the following rules: [ A) Perform sanity check of Incoming Stream Setup (O.STREAM_SETUP) from S.DMZ and B) Send the sanitized O.STREAM_SETUP to S.TSS]. FDP_IFF.1.5(2) The TSF shall explicitly deny an information flow based on the following rules: [None]. The following actions should be auditable: a) Minimal: Decisions to permit requested information flows. b) Basic: All decisions on requests for information flow. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 28 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. c) Detailed: The specific security attributes used in making an information flow enforcement decision. d) Detailed: Some specific subsets of the information that has flowed based upon policy goals (e.g. auditing of downgraded material). 6.1.3.3 FDP_IFF.1(3) Simple security attributes Hierarchical to:  No other components. Dependencies:  FDP_IFC.1(3) Subset information flow control  FMT_MSA.3 Static attribute initialisation FDP_IFF.1.1(3) The TSF shall enforce the [SFP.RED_STREAM] based on the following types of subject and information security attributes: [the subjects S.TSS, on the information O.RED_VOICE_STREAM, using security attributes SA.VOICE_STREAM_CLASSIFICATION]. FDP_IFF.1.2(3) The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules hold: [None]. FDP_IFF.1.3(3) The TSF shall enforce the [None]. FDP_IFF.1.4(3) The TSF shall explicitly authorise an information flow based on the following rules: [ A) Incoming RED Voice Stream O.RED_VOICE_STREAM with classification SA.VOICE_STREAM_CLASSIFICATION=RED from S.TSS and B) Silence payload of O.RED_VOICE_STREAM when SA.VOICE_STREAM_CLASSIFICATION=BLACK and Requested BLACK Voice Stream is active and C) Forward O.RED_VOICE_STREAM from step B) to S.TSS application]. FDP_IFF.1.5(3) The TSF shall explicitly deny an information flow based on the following rules: [ None]. The following actions should be auditable: a) Minimal: Decisions to permit requested information flows. b) Basic: All decisions on requests for information flow. c) Detailed: The specific security attributes used in making an information flow enforcement decision. d) Detailed: Some specific subsets of the information that has flowed based upon policy goals (e.g. auditing of downgraded material). 6.1.4 Management of security attributes (FMT_MSA) 6.1.4.1 FMT_MSA.3 Static attribute initialisation Hierarchical to: VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 29 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent.  No other components. Dependencies:  FMT_MSA.1 Management of security attributes  FMT_SMR.1 Security roles FMT_MSA.3.1 The TSF shall enforce the [SFP.BLACK_STREAM, SFP.BLACK_SETUP and SFP.RED_STREAM] to provide [selection, choose one of: restrictive, permissive, [assignment: other property]] default values for security attributes that are used to enforce the SFP. FMT_MSA.3.2 The TSF shall allow the [S.ADMIN] to specify alternative initial values to override the default values when an object or information is created. The following actions should be auditable: a) Basic: Modifications of the default setting of permissive or restrictive rules. b) Basic: All modifications of the initial values of security attributes. 6.1.5 Fail secure (FPT_FLS) 6.1.5.1 FPT_FLS.1 Failure with preservation of secure state Hierarchical to:  No other components. Dependencies:  No dependencies. FPT_FLS.1.1 The TSF shall preserve a secure state when the following types of failures occur: [Audio Failure and Network Failure]. The following actions should be auditable: a) Basic: Failure of the TSF. 6.1.6 TSF self test (FPT_TST) 6.1.6.1 FPT_TST.1 TSF testing Hierarchical to:  No other components. Dependencies:  No dependencies. FPT_TST.1.1 The TSF shall run a suite of self-tests [selection: during initial start-up, periodically during normal operation, at the request of the authorised user, at the conditions [assignment: conditions under which self-test should occur]] to demonstrate the correct operation of [selection: [assignment: parts of TSF], the TSF]. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 30 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. FPT_TST.1.2 The TSF shall provide authorised users with the capability to verify the integrity of [selection: [assignment: parts of TSF data], TSF data No TSF Data]. FPT_TST.1.3 The TSF shall provide authorised users with the capability to verify the integrity of [selection: [assignment: parts of TSF], TSF]. The following actions should be auditable: a) Basic: Execution of the TSF self-tests and the results of the tests. 6.1.7 Trusted path (FTP_TRP) 6.1.7.1 FTP_TRP.1 Trusted path Hierarchical to:  No other components. Dependencies:  No dependencies. FTP_TRP.1.1 The TSF shall provide a communication path between itself and [selection: remote, local] users that is logically distinct from other communication paths and provides assured identification of its end points and protection of the communicated data from [selection: modification, disclosure, [assignment: other types of integrity or confidentiality violation]BLACK selector modification]. FTP_TRP.1.2 The TSF shall permit [selection: the TSF, local users, remote users] to initiate communication via the trusted path. FTP_TRP.1.3 The TSF shall require the use of the trusted path for [selection: initial user authentication, [assignment: other services for which trusted path is required]The user shall verify that non-secure warning tone is issued on the speaker and repeated when BLACK selector is selected and sending Requested BLACK Voice Stream]. The following actions should be auditable: a) Minimal: Failures of the trusted path functions. b) Minimal: Identification of the user associated with all trusted path failures, if available. c) Basic: All attempted uses of the trusted path functions. d) Basic: Identification of the user associated with all trusted path invocations, if available. 6.2 Security Assurance Requirements (SARs) The assurance level required for the TOE is EAL 5 and augmented with ALC_FLR.3. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 31 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. 6.3 Security Requirements Rationale Security Objective Security Functional Requirement (SFR) OT.SELECTOR OT.SANITY_CHECK OT.SUBSTITUTION OT.SEND OT.LOG OT.ROBUST OT.SUPPRESS FAU_GEN.1 X FDP_IFC.1(1) X X FDP_IFC.1(2) X FDP_IFC.1(3) X FDP_IFF.1(1) X X X FDP_IFF.1(2) X X FDP_IFF.1(3) X FMT_MSA.3 X X X FPT_FLS.1 X FPT_TST.1 X FTP_TRP.1 X 6.3.1 OT.SELECTOR The objective OT.SELECTOR is implemented by FTP_TRP.1, where selected operation is written back to the user. 6.3.2 OT.SANITY_CHECK The objective OT.SANITY_CHECK is directly implemented FDP_IFC.1(1), FDP_IFC.1(2), FDP_IFF.1(1), FDP_IFF.1(2) and FMT_MSA.3, where voice stream and setup is checked for correct protocol format. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 32 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. 6.3.3 OT.SUBSTITUTION The objective OT.SUBSTITUTION is implemented FDP_IFC.1(1), FDP_IFF.1(1) and FMT_MSA.3 is defining the correct substitution by the SFP, which also defines the security rules in OT.SUBSTITUTION. 6.3.4 OT.SEND The objective OT.SEND to send BLACK Voice Stream and Setup via the trusted release is covered by FDP_IFF.1(1) and FDP_IFF.1(2) respectively. 6.3.5 OT.LOG The objective OT.LOG is directly implemented by FAU_GEN.1 for the generation of audit information specified by each of the audit generating SFRs (FDP_IFC.1(1,2,3), FDP_IFF.1(1,2,3), FDP_ITC.1(1,2,3), FMT_MSA.3, FPT_FLS.1, FPT_TST.1 and FTP_TRP.1). FAU_GEN.1 has a dependency to FPT_STM.1, which is realised by OE.EVALUATED_OS. Therefore FPT_STM.1 has not been included as TOE SFR. FMT_MSA.3 has dependencies to FMT_MSA.1 and FMT_SMR.1, which is realised by OE.EVALUATED_OS. Therefore FMT_MSA.1 and FMT_SMR.1 have not been included as TOE SFR. 6.3.6 OT.ROBUST The objective OT.ROBUST is directly implemented by FPT_FLS.1 and FPT_TST.1 for detection of internal TOE failures. 6.3.7 OT.SUPPRESS The objective OT.SUPPRESS is directly implemented by FDP_IFC.1(3), FDP_IFF.1(3) and FMT_MSA.3. 7 TOE SUMMARY SPECIFICATION The TOE Summary specification defines the instantiation of the security requirements for the TOE. The first subsection describes the TOE Security Functions (TSF) and their correspondence to the stated security requirements. The next subsection states the assurance measures for the TOE to ensure the correct implementation of TSF. 7.1 TOE Security Functions An overview of all TOE Security Functions and which Security Requirements they fulfill is given in the following table. Further descriptions of TSFs are given in subsections below. In general TOE is: VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 33 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent.  Generating security events for later investigation. The stored events can be collected by the IT Environment. Security Functional Requirement (SFR) TOE Security Function (TSF) FAU_GEN.1 FDP_IFC.1(1) FDP_IFC.1(2) FDP_IFC.1(3) FDP_IFF.1(1) FDP_IFF.1(2) FDP_IFF.1(3) FMT_MSA.3 FPT_FLS.1 FPT_TST.1 FTP_TRP.1 SF-1 BLACK Setup X X X SF-2 BLACK Voice X X X X SF-3 Cross Talk X X X SF-4 Self-test and preserve secure state X X X X 7.1.1 SF-1 BLACK Setup BLACK Setup is sanitized both from the untrusted TSS application and the DMZ and controlled by information control flow according to the security policy. The configuration file for TOE is empty by default, which will prevent any communication on the BLACK Setup until the Administrator has made a proper configuration setup. 7.1.2 SF-2 BLACK Voice The SF makes sure that the voice stream is BLACK only and is transmitted via the trusted release communication path and controlled by information control flow according to the security policy. To make sure that no RED information is contained in the BLACK voice stream the following is performed:  Sanitization of header information.  For BLACK TALK selection: Substitution of voice contents with microphone voice, which is known not to contain RED voice, before sending BLACK Voice Stream.  For RED TALK selection: Block of voice contents before sending BLACK Voice Stream. Misuse is prevented by providing the user a non-secure warning tone, such that the probability of a wrong selection is minimized. VSI Security Target Lite Classification Company Confidentiality Page NOT CLASSIFIED 34 of 34 Saab Danmark Classification Defence Secrecy Document ID NOT CLASSIFIED SV000073 Document Owner, department - Classification Export Control Revision ASPE, SDK NOT EXPORT CONTROLLED 1 SV Document Template ID SV000011 Revision 2 This document and the information contained herein is the property of Saab Danmark A/S and must not be used, disclosed or altered without Saab Danmark A/S prior written consent. The configuration file for TOE is empty as default, which will prevent any communication on the BLACK Voice Stream until the Administrator has made a proper configuration setup. 7.1.3 SF-3 Cross Talk Cross talk of classified voice is minimised by suppression of incoming RED voice stream to the speaker while sending BLACK voice. SF-3 can be disabled or enabled by TOE configuration. As restrictive default is SF-3 enabled and can be disabled by the Administrator of TOE. 7.1.4 SF-4 Self-test and preserve secure state During start-up of TOE a self-test is performed and during operation, failure monitoring is performed such that a secure state can be preserved.