Security Target Version 1.1
2022-03-08
ii
Table of Contents
1 Security Target Introduction.................................................................................................................1
1.1 Security Target, Target of Evaluation, and Common Criteria Identification..................................1
1.2 Conformance Claims.......................................................................................................................2
1.3 Conventions....................................................................................................................................3
1.3.1 Terminology ............................................................................................................................3
1.3.2 Acronyms.................................................................................................................................5
2 TOE Description ....................................................................................................................................7
2.1 Product Overview...........................................................................................................................7
2.2 TOE Overview .................................................................................................................................7
2.3 TOE Architecture ............................................................................................................................7
2.3.1 Physical Boundary .................................................................................................................11
2.4 Logical Boundary ..........................................................................................................................12
2.4.1 Security Audit........................................................................................................................13
2.4.2 User Data Protection.............................................................................................................13
2.4.3 Identification and Authentication.........................................................................................13
2.4.4 Security Management...........................................................................................................13
2.4.5 Protection of the TSF.............................................................................................................13
2.4.6 TOE Access ............................................................................................................................14
2.5 TOE Documentation .....................................................................................................................14
3 Security Problem Definition................................................................................................................15
4 Security Objectives .............................................................................................................................16
4.1 Security Objectives for the Operational Environment .................................................................16
5 IT Security Requirements....................................................................................................................17
5.1 Extended Requirements...............................................................................................................17
5.2 TOE Security Functional Requirements (PSD, MOD-AO, MOD-KM, MOD_UA_V1.0)..................18
5.2.1 Security Audit (FAU)..............................................................................................................20
5.2.2 User Data Protection (FDP) ...................................................................................................20
5.2.3 Identification and Authentication (FIA).................................................................................27
5.2.4 Security Management (FMT).................................................................................................27
5.2.5 Protection of the TSF (FPT)....................................................................................................28
5.2.6 TOE Access (FTA)...................................................................................................................29
5.3 TOE Security Functional Requirements (DP Models) ...................................................................29
5.3.1 User Data Protection (FDP) ...................................................................................................30
5.4 TOE Security Functional Requirements (H Models) .....................................................................31
5.4.1 User Data Protection (FDP) ...................................................................................................31
5.5 TOE Security Functional Requirements (D Models) .....................................................................32
5.5.1 User Data Protection (FDP) ...................................................................................................32
5.6 TOE Security Assurance Requirements ........................................................................................33
6 TOE Summary Specification................................................................................................................34
6.1 Security Audit (FAU_GEN.1) .........................................................................................................34
6.2 User Data Protection....................................................................................................................35
6.2.1 FDP_AFL_EXT.1 –Audio Filtration.........................................................................................35