Security Target Version 1.1
2022-03-08
ii
Table of Contents
1 Security Target Introduction.................................................................................................................1
1.1 Security Target, Target of Evaluation, and Common Criteria Identification..................................1
1.2 Conformance Claims.......................................................................................................................2
1.3 Conventions....................................................................................................................................3
1.3.1 Terminology ............................................................................................................................3
1.3.2 Acronyms.................................................................................................................................5
2 TOE Description ....................................................................................................................................7
2.1 Product Overview...........................................................................................................................7
2.2 TOE Overview .................................................................................................................................7
2.3 TOE Architecture ............................................................................................................................7
2.3.1 Physical Boundary .................................................................................................................11
2.4 Logical Boundary ..........................................................................................................................12
2.4.1 Security Audit........................................................................................................................13
2.4.2 User Data Protection.............................................................................................................13
2.4.3 Identification and Authentication.........................................................................................13
2.4.4 Security Management...........................................................................................................13
2.4.5 Protection of the TSF.............................................................................................................13
2.4.6 TOE Access ............................................................................................................................14
2.5 TOE Documentation .....................................................................................................................14
3 Security Problem Definition................................................................................................................15
4 Security Objectives .............................................................................................................................16
4.1 Security Objectives for the Operational Environment .................................................................16
5 IT Security Requirements....................................................................................................................17
5.1 Extended Requirements...............................................................................................................17
5.2 TOE Security Functional Requirements (PSD, MOD_AO_V1.0, MOD_KM_V1.0).........................18
5.2.1 Security Audit (FAU)..............................................................................................................19
5.2.2 User Data Protection (FDP) ...................................................................................................20
5.2.3 Identification and Authentication (FIA).................................................................................24
5.2.4 Security Management (FMT).................................................................................................25
5.2.5 Protection of the TSF (FPT)....................................................................................................25
5.2.6 TOE Access (FTA)...................................................................................................................26
5.3 TOE Security Functional Requirements (DP Models) ...................................................................27
5.3.1 User Data Protection (FDP) ...................................................................................................27
5.4 TOE Security Functional Requirements (H Models) .....................................................................28
5.4.1 User Data Protection (FDP) ...................................................................................................28
5.5 TOE Security Functional Requirements (D Models) .....................................................................29
5.5.1 User Data Protection (FDP) ...................................................................................................29
5.6 TOE Security Assurance Requirements ........................................................................................30
6 TOE Summary Specification................................................................................................................31
6.1 Security Audit (FAU_GEN.1) .........................................................................................................31
6.2 User Data Protection....................................................................................................................32
6.2.1 FDP_AFL_EXT.1 –Audio Filtration.........................................................................................32