Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Report Number: CCEVS-VR-10431-2012 Dated: September 2012 Version: 1.0 National Institute of Standards and Technology Department of Defense Information Technology Laboratory National Security Agency 100 Bureau Drive 9800 Savage Road Gaithersburg, MD 20899 Fort Meade, MD 20755-6940 ® TM Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 ACKNOWLEDGEMENTS Validation Team Mario Tinto – The Aerospace Corporation Jean Hung - Mitre Corporation Common Criteria Testing Laboratory Computer Sciences Corporation 7231 Parkway Drive Hanover, Maryland 21076 Evaluators Cheryl Dugan Annette Nadeau Lachlan Turner Huan Zhou Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 Contents 1. Executive Summary..................................................................................................... 5 1.1. Interpretations....................................................................................................... 5 2. Identification................................................................................................................ 6 3. Security Policy............................................................................................................. 8 4. Security Problem Definition........................................................................................ 9 4.1. Assumptions......................................................................................................... 9 4.2. Threats.................................................................................................................. 9 4.3. Organizational Security Policies.......................................................................... 9 5. Architectural information .......................................................................................... 10 5.1. Logical Scope and Boundary ............................................................................. 10 5.2. Physical Scope and Boundary............................................................................ 11 6. Documentation........................................................................................................... 14 7. IT Product Testing..................................................................................................... 15 7.1. Developer testing................................................................................................ 15 7.2. Evaluation team independent testing.................................................................. 15 7.3. Vulnerability analysis......................................................................................... 16 8. Evaluated configuration............................................................................................. 17 9. Results of the Evaluation........................................................................................... 18 10. Validator Comments.............................................................................................. 20 11. Annexes.................................................................................................................. 21 12. Security Target....................................................................................................... 22 13. Glossary ................................................................................................................. 23 14. Bibliography .......................................................................................................... 24 Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 1. EXECUTIVE SUMMARY This report is intended to assist the end-user of this product and any security certification Agent for the end-user with determining the suitability of this Information Technology (IT) product in their environment. End-users should review both the Security Target (ST), which is where specific security claims are made, in conjunction with this Validation Report (VR), which describes how those security claims were evaluated. This report documents the assessment by the National Information Assurance Partnership (NIAP) validation team of the evaluation of the Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790, the target of evaluation (TOE), performed by Computer Sciences Corporation. It presents the evaluation results, their justifications, and the conformance results. This report is not an endorsement of the TOE by any agency of the U.S. government, and no warranty is either expressed or implied. The evaluation was performed by Computer Sciences Corporation (CSC) of Hanover, MD in accordance with the United States evaluation scheme and completed on the 25th of May 2012. The information in this report is largely derived from the ST, the Evaluation Technical Report (ETR) and the functional testing report. The ST was written by Computer Sciences Corporation on behalf of Xerox. The evaluation was performed to conform to the requirements of the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2, dated September 2007 at Evaluation Assurance Level 2 (EAL 2) augmented with ALC_FLR.3, and the Common Evaluation Methodology for IT Security Evaluation (CEM), Version 3.1, Revision 2, dated September 2007. The Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 is a multi-function device (MFD) that copies, prints, scans and faxes. The MFD contains an internal hard disk drive. Standard security functions include SSL, IPSec, SNMPv3, a host-based firewall, and an internal audit log. Users may be authenticated to the network or locally at the device. The evaluated configuration includes the Image Overwrite Security package. The Image Overwrite Security package causes any temporary image files to be erased from the internal hard disk drive when those files are no longer needed or on demand at the discretion of the system administrator. 1.1.Interpretations There are no applicable Common Criteria interpretations. Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 2. IDENTIFICATION The CCEVS is a joint National Security Agency (NSA) and National Institute of Standards and Technology (NIST) effort to establish commercial facilities to perform trusted product evaluations. Under this program, commercial testing laboratories called Common Criteria Testing Laboratories (CCTLs) using the Common Evaluation Methodology (CEM) for Evaluation Assurance Level (EAL) 1 through EAL 4 in accordance with National Voluntary Laboratory Assessment Program (NVLAP) accreditation conduct security evaluations. The NIAP Validation Body assigns Validators to monitor the CCTLs to ensure quality and consistency across evaluations. Developers of IT products desiring a security evaluation contract with a CCTL and pay a fee for their product’s evaluation. Upon successful completion of the evaluation, the product is added to NIAP’s Validated Products List. Table 1 provides information needed to completely identify the product, including:  The Target of Evaluation (TOE): the fully qualified identifier of the product as evaluated;  The Security Target (ST), describing the security features, claims, and assurances of the product;  The conformance result of the evaluation;  Any Protection Profile to which the product is conformant;  The organizations participating in the evaluation. Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 Table 1: Evaluation Identifiers Item Identifier Evaluation Scheme United States NIAP Common Criteria Evaluation and Validation Scheme Target of Evaluation Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Protection Profile U.S. Government Protection Profile for Hardcopy Devices Version (IEEE Std. 2600.2-2009 Protection Profile, v1.0, 26 February 2010 Security Target Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Security Target, Version 1.0, Revision 1.7, 22nd May 2012 Dates of evaluation April 2010 to June 2012 Evaluation Technical Report Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Evaluation Technical Report, Computer Sciences Corporation, v1.1, 1 June 2012 Conformance Result EAL 2 augmented with ALC_FLR.3 Common Criteria version Common Criteria for Information Technology Security Evaluation Version 3.1, Revision 2, September 2007 Common Evaluation Methodology (CEM) version CEM version 3.1R2, September 2007 Sponsor Xerox Corporation Developer Xerox Corporation Evaluators Cheryl Dugan, Annette Nadeau, Lachlan Turner, Huan Zhou Validation Team Mario Tinto, Jean Hung Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 3. SECURITY POLICY The TOE enforces the following security policies:  Information Flow Security. The TOE prevents unauthorized data flow between the fax line interface and the network interface.  User Data Protection – SSL. The TOE implements the Secure Sockets Layer (SSL) protocol to protect communication via the Web Graphical User Interface (GUI) and to protect workflow scanning communications to an SSL enabled repository.  User Data Protection – IPSec. The TOE implements Internet Protocol Security (IPSec) to protect print client communications.  IP Filtering. The TOE provides the ability for the system administrator to configure IPv4 filtering rules.  Network Management Security. The TOE implements Simple Network Management Protocol v3 (SNMP) for management communications via the SNMP interface.  Privileged User Access Control. The TOE restricts management of security functions to the authorized system administrator.  User Access Control. The TOE enables system administrators to restrict access to the print, copy, scan and fax functions to authorized users. A complete list of the security functions of the TOE is provided at section 5.1. Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 4. SECURITY PROBLEM DEFINITION 4.1.Assumptions The ST identified the following security assumptions:  The TOE is located in a restricted or monitored environment that provides protection from unmanaged access to the physical components and data interfaces of the TOE.  TOE Users are aware of the security policies and procedures of their organization, and are trained and competent to follow those policies and procedures.  Administrators are aware of the security policies and procedures of their organization, are trained and competent to follow the manufacturer’s guidance and documentation, and correctly configure and operate the TOE in accordance with those policies and procedures.  Administrators do not use their privileged access rights for malicious purposes. 4.2.Threats The ST identified the following threats addressed by the TOE:  User Document Data may be disclosed to unauthorized persons  User Document Data may be altered by unauthorized persons  User Function Data may be altered by unauthorized persons 4.3.Organizational Security Policies The ST identified the following OSPs addressed by the TOE:  To preserve operational accountability and security, Users will be authorized to use the TOE only as permitted by the TOE Owner  To detect corruption of the executable code in the TSF, procedures will exist to self-verify executable code in the TSF  To preserve operational accountability and security, records that provide an audit trail of TOE use and security-relevant events will be created, maintained, and protected from unauthorized disclosure or alteration, and will be reviewed by authorized personnel  To prevent unauthorized use of the external interfaces of the TOE, operation of those interfaces will be controlled by the TOE and its IT environment Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 5. ARCHITECTURAL INFORMATION 5.1.Logical Scope and Boundary The TOE logical scope and boundary consists of the security functions provided/controlled by the TOE as follows:  Image Overwrite. The TOE implements an image overwrite security function to overwrite all temporary files created during processing of jobs.  Information Flow Security. The TOE prevents unauthorized data flow between the fax line interface and the network interface.  Authentication. The TOE can be configured to authenticate users against an internal database via username and password.  Network Identification. The TOE can be configured to authenticate users against an external database via username and password or smartcard and Personal Identification Number (PIN).  Security Audit. The TOE generates audit logs that track events/actions (e.g., copy/print/scan/fax job completion) to identified users.  User Data Protection – SSL. The TOE implements the Secure Sockets Layer (SSL) protocol to protect communication via the Web Graphical User Interface (GUI) and to protect workflow scanning communications to an SSL enabled repository.  User Data Protection – IPSec. The TOE implements Internet Protocol Security (IPSec) to protect print client communications.  User Data Protection – Disk Encryption. The TOE implements AES data encryption to protect all areas of the hard drive where user jobs are temporarily stored for processing.  IP Filtering. The TOE provides the ability for the system administrator to configure IPv4 filtering rules.  Network Management Security. The TOE implements Simple Network Management Protocol v3 (SNMP) for management communications via the SNMP interface.  Privileged User Access Control. The TOE restricts management of security functions to the authorized system administrator. User Access Control. The TOE enables system administrators to restrict access to the print, copy, scan and fax functions to authorized users. The difference between the seven TOE models is their printing speed. The following figure depicts the TOE’s architectural subsystems and its environment. Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 Figure 1: Depiction of TOE and Subsystems 5.2.Physical Scope and Boundary The Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 is a multi-function device (MFD). The physical boundary of the TOE consists of the MFD and optional fax accessory, and accompanying user and administrator guidance listed in section 6. In the evaluated configuration, the TOE is connected to the Public Switched Telephone Network (PSTN) and the Local Area Network (LAN) as described in the user guidance delivered with the TOE. Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 The following figure depicts the TOE. Figure 2: Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 The various software and firmware that comprise the TOE are listed in Table 2. A system administrator can ensure that they have a TOE by printing a configuration sheet and comparing the version numbers reported on the sheet to the table below. Table 2: Evaluated version Software/Firmware Item WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Software 061.132.222.03800 System Software Source Code 061.132.222.03800 Network Controller Software 061.132.03820 Network Controller OS 061.062.02800 UI Software 028.071.024 IOT Software 093.070.000 SIP (Copy Controller) Software 028.080.013 DADH Software (Options)  DADH 75 016.028.000  DADH 100 020.019.000  DADH 100 Quiet Mode 025.020.000 Paper Feeder Software 000.040.000 High Capacity Feeder Software 000.010.009 Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 Software/Firmware Item WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Finisher Software (Options)  1K LCSS 001.031.000  LCSS 003.057.000  HCSS 013.040.000  HCSS with BookletMaker 024.016.000  High Volume Feeder (HVF) 004.003.084  HVF with BookletMaker 003.006.007 FAX Software 003.010.004 Scanner Software (options)  35.40, 45, 55 PPM 017.005.000  65, 75, 90 PPM 004.022.000 Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 6. DOCUMENTATION This section details the documentation that is (a) delivered to the customer, and (b) was used as evidence for the evaluation of the Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790. Note that not all evidence is available to customers. The following documentation is available to the customer:  Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 System Administrator Guide v1.0  Xerox WorkCentre 5735/5740/5745/5755/5765/5775/5790 User Guide v1.0  Secure Installation and Operation of Your WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 v1.3  Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Smart Card Installation Guide v7.0 The remaining evaluation evidence is described in the Evaluation Technical Report developed by Computer Sciences Corporation. Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 7. IT PRODUCT TESTING This section describes the testing efforts of the developer and the evaluation team. 7.1.Developer testing Test procedures were written by the developer and designed to be conducted using manual interaction with the TOE interfaces. The developer tested all of the interfaces to the TOE and in doing so tested all TSFs. The developer tested the TOE consistent with the Common Criteria evaluated configuration identified in the ST. The developer’s approach to testing is defined in the TOE Test Plan. The expected and actual test results (ATRs) are also included with each of the tests in the TOE Test Procedures. Each test case was assigned an identifier that was used to reference it throughout the testing evidence. The evaluation team analyzed the developer’s testing to ensure adequate coverage for EAL 2. The evaluation team determined that the developer’s actual test results matched the developer’s expected test results. The evaluators assessed that the test environment used by the developers was appropriate and mirrored the test configuration during independent testing. 7.2.Evaluation team independent testing The evaluation team conducted independent testing at the CCTL facility. The TOE was delivered in accordance with the documented delivery procedures. The evaluation team installed and configured the TOE according to vendor installation instructions and the evaluated configuration as identified in the Security Target. The evaluation team confirmed the technical accuracy of the setup and installation guide during installation of the TOE while the associated ATE_IND work units. The evaluation team confirmed that the TOE version delivered for testing was identical to the version identified in the ST. The evaluation team used the developer’s test plan as a basis for creating the Independent Test Plan. The evaluation team analyzed the developer’s test procedures to determine their relevance and adequacy to test the security function under test. The following items represent a subset of the factors considered in selecting the functional tests to be conducted:  Security functions that implement critical security features  Security functions critical to the TOE’s security objectives  Security functions that gave rise to suspicion regarding the behavior of the security features during the documentation evidence evaluation  Security functions not tested adequately in the vendor’s test plan and procedures Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 The evaluation team repeated a sample of the developer’s test cases and designed additional independent tests. The additional test coverage was determined based on the analysis of the developer test coverage and the ST. The evaluators examined the design evidence and selected an appropriate test platform. Each TOE Security Function was exercised and the evaluation team verified that each test passed. 7.3.Vulnerability analysis The evaluation team performed a vulnerability analysis of the TOE evidence and a search of publicly available information to identify potential vulnerabilities in the TOE. Based on the results of this effort, the evaluation team conducted penetration testing to determine if the identified potential vulnerabilities was indeed exploitable. The evaluation team concluded that the TOE does not contain exploitable vulnerabilities in the intended environment and for the postulated attackers. Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 8. EVALUATED CONFIGURATION In the evaluated configuration the Image Overwrite Security Package is installed and enabled on the TOE; SSL is enabled on the TOE; and User Authorization is enabled on the TOE. The FAX (Xerox Embedded Fax accessory) option, if purchased by the consumer, is installed and enabled on the TOE. The LanFax option is included in the evaluated configuration of the TOE. In the evaluated configuration, the following options are disabled:  Network Accounting  Copy/Print, Store and Reprint  SMart eSolutions  Xerox Extensible Interface Platform (EIP)  USB direct printing The Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 must be configured in accordance with the guidance documents listed at section 6. In particular, Secure Installation and Operation of Your WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 v1.3 provides Common Criteria specific advice. Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 9. RESULTS OF THE EVALUATION The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures. The TOE was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1R2. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1R2. The following evaluation results are extracted from the non-proprietary Evaluation Technical Report provided by the CCTL, and are augmented with the validator’s observations thereof. ENVIRONMENTAL STRENGTHS: The TOE provides the following security features: Communications Security The TOE provides secure communications over the SSL, IPSec, and SNMPv3 protocols. Remote management of the device is secured from the Web User Interface using HTTPS/SSL. Alternatively secure remote management is provided using a manager that supports SNMPv3. Secure scanning to a repository is provided using HTTPS/SSL. Secure printing is provided by using IPSec. Disk Encryption AES data encryption is used to protect all areas of the hard drive where user jobs are temporarily stored for processing. Image Overwrite The TOE can be configured to automatically overwrite files created during job processing. The TOE also has an on-demand function that overwrites the hard drive(s) on-demand of the system administrator. Contents stored on the hard disk are overwritten using a three pass overwrite procedure as described in DOD 5800.28-M. Authentication A user must authenticate prior to being granted access to the Local User Interface or the Web User Interface. Upon successful authentication, users are granted access based on their role and predefined privileges. The system administrator can configure session timeouts to terminate an inactive session after some period of time. TOE supports password and usernames, smart card authentication, LDAP v4, Kerberos v5 (Solaris) and Kerberos v5 (Windows 2000/2003). Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 Security Audit The TOE generates audit logs that track events/actions (e.g., copy/print/scan/fax job completion) to identified users. IP Filtering The TOE provides the ability for the system administrator to configure IPv4 filtering rules. Fax / Network Separation The TOE ensures separation between the optional fax processing board and the network controller. This architecture ensures that a malicious user cannot access network resources from the telephone line via the system’s optional fax modem. Security Management The TOE restricts access to management functions and is capable of performing self-tests to verify integrity. Computer Sciences Corporation (CSC) has determined that the product meets the security criteria in the Security Target, which specifies an assurance level of EAL 2 augmented with ALC_FLR.3. A team of Validators, on behalf of the CCEVS Validation Body, monitored the evaluation. The evaluation effort was finished on May 25, 2012. A final Validation Oversight Review (VOR) was held on June 18, 2012 and final changes to the VR were completed on August 10, 2012. Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 10. VALIDATOR COMMENTS The potential for the over flow of audit storage exists in the TOE and it must be addressed by the vendor. To do that, the vendor is expected to develop a software update and to make it available to TOE users. That software update must, at least, send warning messages to administrative users, in real-time, when the audit log entry limit is approached and instruct those users to take appropriate action to preserve the audit log entries. Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 11. ANNEXES None Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 12. SECURITY TARGET Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Security Target, Version 1.0, Revision 1.7, 22nd May 2012 Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 13. GLOSSARY  Common Criteria Testing Laboratory (CCTL): An IT security evaluation facility accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and approved by the CCEVS Validation Body to conduct Common Criteria-based evaluations.  Evaluation: The assessment of an IT product against the Common Criteria using the Common Criteria Evaluation Methodology to determine whether or not the claims made are justified; or the assessment of a protection profile against the Common Criteria using the Common Evaluation Methodology to determine if the Profile is complete, consistent, technically sound and hence suitable for use as a statement of requirements for one or more TOEs that may be evaluated.  Evaluation Evidence: Any tangible resource (information) required from the sponsor or developer by the evaluator to perform one or more evaluation activities.  Target of Evaluation (TOE): A group of IT products configured as an IT system, or an IT product, and associated documentation that is the subject of a security evaluation under the CC.  Threat: Means through which the ability or intent of a threat agent to adversely affect the primary functionality of the TOE, facility that contains the TOE, or malicious operation directed towards the TOE. A potential violation of security.  Validation: The process carried out by the CCEVS Validation Body leading to the issue of a Common Criteria certificate.  Validation Body: A governmental organization responsible for carrying out validation and for overseeing the day-to-day operation of the NIAP Common Criteria Evaluation and Validation Scheme.  Vulnerabilities: A vulnerability is a hardware, firmware, or software flaw that leaves an Automated Information System (AIS) open for potential exploitation. A weakness in automated system security procedures, administrative controls, physical layout, internal controls, and so forth, which could be exploited by a threat to gain unauthorized access to information or disrupt critical processing. Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Validation Report, Version 1.1 14. BIBLIOGRAPHY 1.) Common Criteria for Information Technology Security Evaluation – Part 1: Introduction and general model, dated September 2006, Version 3.1, Revision 1, CCMB-2006-09-001. 2.) Common Criteria for Information Technology Security Evaluation – Part 2: Security functional requirements, dated September 2007, Version 3.1, Revision 2, CCMB- 2007-09-002. 3.) Common Criteria for Information Technology Security Evaluation – Part 3: Security assurance requirements, dated September 2007, Version 3.1, Revision 2, CCMB- 2007-09-003. 4.) Common Evaluation Methodology for Information Technology Security Evaluation, dated September 2007, Version 3.1, Revision 2, CCMB-2007-09-004. 5.) Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790 Security Target, Version 1.0, Revision 1.7, 22nd May 2012 6.) Computer Sciences Corporation (CSC) Evaluation Technical Report for Xerox WorkCentre™ 5735/5740/5745/5755/5765/5775/5790, Version 1.1, 1 June 2012.