Security Target Version 1.1
2022-03-08
ii
Table of Contents
1 Security Target Introduction.................................................................................................................1
1.1 Security Target, Target of Evaluation, and Common Criteria Identification..................................1
1.2 Conformance Claims.......................................................................................................................2
1.3 Conventions....................................................................................................................................3
1.3.1 Terminology ............................................................................................................................3
1.3.2 Acronyms.................................................................................................................................5
2 TOE Description ....................................................................................................................................6
2.1 Product Overview...........................................................................................................................6
2.2 TOE Overview .................................................................................................................................6
2.3 TOE Architecture ............................................................................................................................6
2.3.1 Physical Boundary .................................................................................................................10
2.4 Logical Boundary ..........................................................................................................................11
2.4.1 Security Audit........................................................................................................................12
2.4.2 User Data Protection.............................................................................................................12
2.4.3 Identification and Authentication.........................................................................................12
2.4.4 Security Management...........................................................................................................12
2.4.5 Protection of the TSF.............................................................................................................12
2.4.6 TOE Access ............................................................................................................................13
2.5 TOE Documentation .....................................................................................................................13
3Security Problem Definition................................................................................................................14
4 Security Objectives .............................................................................................................................15
4.1 Security Objectives for the Operational Environment .................................................................15
5 IT Security Requirements....................................................................................................................16
5.1 Extended Requirements...............................................................................................................16
5.2 TOE Security Functional Requirements (PSD, MOD_AO_V1.0, MOD_KM_V1.0, MOD_UA_V1.0)
17
5.2.1 Security Audit (FAU)..............................................................................................................19
5.2.2 User Data Protection (FDP) ...................................................................................................19
5.2.3 Identification and Authentication (FIA).................................................................................26
5.2.4 Security Management (FMT).................................................................................................27
5.2.5 Protection of the TSF (FPT)....................................................................................................27
5.2.6 TOE Access (FTA)...................................................................................................................28
5.3 TOE Security Functional Requirements (DP Models)...................................................................29
5.3.1 User Data Protection (FDP) ...................................................................................................29
5.4 TOE Security Functional Requirements (H Models) .....................................................................30
5.4.1 User Data Protection (FDP) ...................................................................................................30
5.5 TOE Security Functional Requirements (D Models) .....................................................................31
5.5.1 User Data Protection (FDP) ...................................................................................................31
5.6 TOE Security Assurance Requirements ........................................................................................32
6 TOE Summary Specification................................................................................................................33
6.1 Security Audit (FAU_GEN.1) .........................................................................................................33
6.2 User Data Protection....................................................................................................................34