Cisco Cat4K NDPP ST
11 March 2014
EDCS-1228241
3
3.5
Threats ................................................................................................................ 34
3.6
Organizational Security Policies ........................................................................ 35
3.6.1
OSPs enforced by TOE ............................................................................... 35
4
Security Objectives ............................................................................................................... 36
4.1
Security Objectives for the TOE ........................................................................ 36
4.2
Security Objectives for the Environment ........................................................... 37
5
Security Requirements .......................................................................................................... 37
5.1
Conventions ........................................................................................................ 38
5.2
TOE Security Functional Requirements ............................................................ 38
5.2.1
Security audit (FAU)................................................................................... 40
5.2.2
Cryptographic Support (FCS) ..................................................................... 43
5.2.3
User data protection (FDP) ......................................................................... 47
5.2.4
Identification and authentication (FIA) ...................................................... 47
5.2.5
Security management (FMT) ...................................................................... 48
5.2.6
Protection of the TSF (FPT) ....................................................................... 49
5.2.7
FRU – Resource Utilization ........................................................................ 50
5.2.8
TOE Access (FTA) ..................................................................................... 51
5.2.9
Trusted Path/Channel (FTP) ....................................................................... 51
5.3
Extended Components Definition ...................................................................... 52
5.4
TOE SFR Dependencies Rationale .................................................................... 54
5.5
Security Assurance Requirements ...................................................................... 56
5.5.1
SAR Requirements...................................................................................... 56
5.5.2
Security Assurance Requirements Rationale .............................................. 57
5.6
Assurance Measures ........................................................................................... 57
6
TOE Summary Specification ................................................................................................ 59
6.1
TOE Security Functional Requirement Measures .............................................. 59
6.2
TOE Bypass and interference/logical tampering Protection Measures .............. 79
7
Rationale ............................................................................................................................... 81
7.1
Rationale for TOE Security Objectives .............................................................. 81
7.2
Rationale for the Security Objectives for the Environment ............................... 83
7.3
Rationale for TOE Security Functional Requirements ...................................... 84
Annex A: References ..................................................................................................................... 88