From 64c7db6cfe9b0d2430397802a1d78e02b0018218 Mon Sep 17 00:00:00 2001 From: s-choudhury <77070072+s-choudhury@users.noreply.github.com> Date: Mon, 12 Aug 2024 02:34:20 +0000 Subject: [PATCH] =?UTF-8?q?Deploying=20to=20gh-pages=20from=20@=20commoncr?= =?UTF-8?q?iteria/virtualization@1b0e234cfedb5384cde2b3aec5b3e28af2b9acc9?= =?UTF-8?q?=20=F0=9F=9A=80?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- index.html | 1146 ++++++++--------- xml-builder-test/AppliedTDs-Diff.html | 461 ++++--- xml-builder-test/AppliedTDs.html | 611 +++++---- xml-builder-test/SanityChecksOutput.md | 24 +- xml-builder-test/SpellCheckReport.txt | 11 + xml-builder-test/effective.xml | 404 ++++-- xml-builder-test/meta-info.txt | 2 +- xml-builder-test/spell-badge.svg | 8 +- .../virtualization-release-linkable.html | 602 +++++---- xml-builder-test/virtualization-release.html | 611 +++++---- xml-builder-test/virtualization.html | 611 +++++---- 11 files changed, 2483 insertions(+), 2008 deletions(-) diff --git a/index.html b/index.html index c4eba4b..a93b98f 100644 --- a/index.html +++ b/index.html @@ -1,651 +1,651 @@ Listing -Tue Jul 16 20:43:50 UTC 2024 +Mon Aug 12 02:34:16 UTC 2024
  1. .
  2. -
  3. ./test1/html_count.svg
  4. -
  5. ./test1/pkg-ssh.xml
  6. -
  7. ./test1/pkg-tls.xml
  8. -
  9. ./test1/transforms.svg
  10. -
  11. ./test1/client-virt.xml
  12. -
  13. ./test1/virtualization-release-linkable.html.pdf
  14. -
  15. ./test1/pdf_count.svg
  16. -
  17. ./test1/HTMLs.adoc
  18. -
  19. ./test1/TDValidationReport.txt
  20. -
  21. ./test1/virtualization-release.html
  22. -
  23. ./test1/SanityChecksOutput.md
  24. -
  25. ./test1/Minidash.adoc
  26. -
  27. ./test1/validation.svg
  28. -
  29. ./test1/AppliedTDs-Diff.html
  30. -
  31. ./test1/virtualization.html
  32. -
  33. ./test1/SpellCheckReport.txt
  34. -
  35. ./test1/server-virt.xml
  36. -
  37. ./test1/ValidationReport.txt
  38. -
  39. ./test1/virtualization-release.html.pdf
  40. -
  41. ./test1/css/diff.css
  42. -
  43. ./test1/meta-info.txt
  44. -
  45. ./test1/js/diff.js
  46. -
  47. ./test1/js/dojo/src/lang.js
  48. -
  49. ./test1/js/dojo/src/event/browser.js
  50. -
  51. ./test1/js/dojo/src/event/topic.js
  52. -
  53. ./test1/js/dojo/src/event/common.js
  54. -
  55. ./test1/js/dojo/src/event/__package__.js
  56. -
  57. ./test1/js/dojo/src/event.js
  58. -
  59. ./test1/js/dojo/src/lang/func.js
  60. -
  61. ./test1/js/dojo/src/lang/timing/Timer.js
  62. -
  63. ./test1/js/dojo/src/lang/timing/Streamer.js
  64. -
  65. ./test1/js/dojo/src/lang/timing/__package__.js
  66. -
  67. ./test1/js/dojo/src/lang/type.js
  68. -
  69. ./test1/js/dojo/src/lang/array.js
  70. -
  71. ./test1/js/dojo/src/lang/repr.js
  72. -
  73. ./test1/js/dojo/src/lang/extras.js
  74. -
  75. ./test1/js/dojo/src/lang/common.js
  76. -
  77. ./test1/js/dojo/src/lang/assert.js
  78. -
  79. ./test1/js/dojo/src/lang/declare.js
  80. -
  81. ./test1/js/dojo/src/lang/__package__.js
  82. -
  83. ./test1/js/dojo/src/html.js
  84. -
  85. ./test1/js/dojo/src/html/util.js
  86. -
  87. ./test1/js/dojo/src/html/display.js
  88. -
  89. ./test1/js/dojo/src/html/layout.js
  90. -
  91. ./test1/js/dojo/src/html/color.js
  92. -
  93. ./test1/js/dojo/src/html/common.js
  94. -
  95. ./test1/js/dojo/src/html/shadow.js
  96. -
  97. ./test1/js/dojo/src/html/style.js
  98. -
  99. ./test1/js/dojo/src/html/metrics.js
  100. -
  101. ./test1/js/dojo/src/html/__package__.js
  102. -
  103. ./test1/js/dojo/src/html/selection.js
  104. -
  105. ./test1/js/dojo/src/experimental.js
  106. -
  107. ./test1/js/dojo/dojo.js
  108. -
  109. ./test1/js/tooltip/tip_balloon.js
  110. -
  111. ./test1/js/tooltip/tip_balloon/stemt.gif
  112. -
  113. ./test1/js/tooltip/tip_balloon/lt.gif
  114. -
  115. ./test1/js/tooltip/tip_balloon/t.gif
  116. -
  117. ./test1/js/tooltip/tip_balloon/stemb.gif
  118. -
  119. ./test1/js/tooltip/tip_balloon/b.gif
  120. -
  121. ./test1/js/tooltip/tip_balloon/l.gif
  122. -
  123. ./test1/js/tooltip/tip_balloon/rt.gif
  124. -
  125. ./test1/js/tooltip/tip_balloon/lb.gif
  126. -
  127. ./test1/js/tooltip/tip_balloon/r.gif
  128. -
  129. ./test1/js/tooltip/tip_balloon/background.gif
  130. -
  131. ./test1/js/tooltip/tip_balloon/rb.gif
  132. -
  133. ./test1/js/tooltip/wz_tooltip.js
  134. -
  135. ./test1/AppliedTDs.html
  136. -
  137. ./test1/virtualization-release-linkable.html
  138. -
  139. ./test1/images/diff-previous.gif
  140. -
  141. ./test1/images/figure1.png
  142. -
  143. ./test1/images/collapsed.png
  144. -
  145. ./test1/images/niaplogo.png
  146. -
  147. ./test1/images/expanded.png
  148. -
  149. ./test1/images/network.png
  150. -
  151. ./test1/images/niaplogodraft.png
  152. -
  153. ./test1/images/cclogo.png
  154. -
  155. ./test1/images/Toe.png
  156. -
  157. ./test1/images/diffplus.gif
  158. -
  159. ./test1/images/diffmin.gif
  160. -
  161. ./test1/images/diff-first.gif
  162. -
  163. ./test1/images/diff-next.gif
  164. -
  165. ./test1/images/diffunderline.gif
  166. -
  167. ./test1/images/diff-last.gif
  168. -
  169. ./test1/warnings.svg
  170. -
  171. ./test1/spell-badge.svg
  172. -
  173. ./test1/PDFs.adoc
  174. -
  175. ./test1/effective.xml
  176. -
  177. ./test1/virtualization.html.pdf
  178. -
  179. ./test1/tds.svg
  180. -
  181. ./pkg-ssh.xml
  182. -
  183. ./pkg-tls.xml
  184. +
  185. ./test/pdf_count.svg
  186. +
  187. ./test/meta-info.txt
  188. ./test/html_count.svg
  189. -
  190. ./test/pkg-ssh.xml
  191. -
  192. ./test/pkg-tls.xml
  193. ./test/transforms.svg
  194. -
  195. ./test/client-virt.xml
  196. -
  197. ./test/pdf_count.svg
  198. +
  199. ./test/Minidash.adoc
  200. +
  201. ./test/spell-badge.svg
  202. +
  203. ./test/effective.xml
  204. +
  205. ./test/pkg-ssh.xml
  206. ./test/HTMLs.adoc
  207. -
  208. ./test/TDValidationReport.txt
  209. ./test/virtualization-release.html
  210. +
  211. ./test/AppliedTDs.html
  212. +
  213. ./test/virtualization.html
  214. +
  215. ./test/virtualization-release-linkable.html
  216. +
  217. ./test/PDFs.adoc
  218. +
  219. ./test/tds.svg
  220. ./test/SanityChecksOutput.md
  221. -
  222. ./test/Minidash.adoc
  223. -
  224. ./test/validation.svg
  225. ./test/AppliedTDs-Diff.html
  226. -
  227. ./test/virtualization.html
  228. -
  229. ./test/SpellCheckReport.txt
  230. -
  231. ./test/server-virt.xml
  232. -
  233. ./test/ValidationReport.txt
  234. -
  235. ./test/css/diff.css
  236. -
  237. ./test/meta-info.txt
  238. ./test/js/diff.js
  239. -
  240. ./test/js/dojo/src/lang.js
  241. -
  242. ./test/js/dojo/src/event/browser.js
  243. -
  244. ./test/js/dojo/src/event/topic.js
  245. -
  246. ./test/js/dojo/src/event/common.js
  247. -
  248. ./test/js/dojo/src/event/__package__.js
  249. +
  250. ./test/js/tooltip/wz_tooltip.js
  251. +
  252. ./test/js/tooltip/tip_balloon.js
  253. +
  254. ./test/js/tooltip/tip_balloon/t.gif
  255. +
  256. ./test/js/tooltip/tip_balloon/lt.gif
  257. +
  258. ./test/js/tooltip/tip_balloon/stemt.gif
  259. +
  260. ./test/js/tooltip/tip_balloon/l.gif
  261. +
  262. ./test/js/tooltip/tip_balloon/lb.gif
  263. +
  264. ./test/js/tooltip/tip_balloon/r.gif
  265. +
  266. ./test/js/tooltip/tip_balloon/b.gif
  267. +
  268. ./test/js/tooltip/tip_balloon/rb.gif
  269. +
  270. ./test/js/tooltip/tip_balloon/stemb.gif
  271. +
  272. ./test/js/tooltip/tip_balloon/background.gif
  273. +
  274. ./test/js/tooltip/tip_balloon/rt.gif
  275. +
  276. ./test/js/dojo/dojo.js
  277. ./test/js/dojo/src/event.js
  278. +
  279. ./test/js/dojo/src/html.js
  280. +
  281. ./test/js/dojo/src/lang/__package__.js
  282. ./test/js/dojo/src/lang/func.js
  283. -
  284. ./test/js/dojo/src/lang/timing/Timer.js
  285. -
  286. ./test/js/dojo/src/lang/timing/Streamer.js
  287. -
  288. ./test/js/dojo/src/lang/timing/__package__.js
  289. -
  290. ./test/js/dojo/src/lang/type.js
  291. -
  292. ./test/js/dojo/src/lang/array.js
  293. ./test/js/dojo/src/lang/repr.js
  294. ./test/js/dojo/src/lang/extras.js
  295. +
  296. ./test/js/dojo/src/lang/array.js
  297. ./test/js/dojo/src/lang/common.js
  298. -
  299. ./test/js/dojo/src/lang/assert.js
  300. +
  301. ./test/js/dojo/src/lang/timing/__package__.js
  302. +
  303. ./test/js/dojo/src/lang/timing/Timer.js
  304. +
  305. ./test/js/dojo/src/lang/timing/Streamer.js
  306. +
  307. ./test/js/dojo/src/lang/type.js
  308. ./test/js/dojo/src/lang/declare.js
  309. -
  310. ./test/js/dojo/src/lang/__package__.js
  311. -
  312. ./test/js/dojo/src/html.js
  313. -
  314. ./test/js/dojo/src/html/util.js
  315. -
  316. ./test/js/dojo/src/html/display.js
  317. -
  318. ./test/js/dojo/src/html/layout.js
  319. -
  320. ./test/js/dojo/src/html/color.js
  321. -
  322. ./test/js/dojo/src/html/common.js
  323. -
  324. ./test/js/dojo/src/html/shadow.js
  325. +
  326. ./test/js/dojo/src/lang/assert.js
  327. +
  328. ./test/js/dojo/src/experimental.js
  329. +
  330. ./test/js/dojo/src/event/__package__.js
  331. +
  332. ./test/js/dojo/src/event/topic.js
  333. +
  334. ./test/js/dojo/src/event/common.js
  335. +
  336. ./test/js/dojo/src/event/browser.js
  337. ./test/js/dojo/src/html/style.js
  338. ./test/js/dojo/src/html/metrics.js
  339. ./test/js/dojo/src/html/__package__.js
  340. +
  341. ./test/js/dojo/src/html/shadow.js
  342. +
  343. ./test/js/dojo/src/html/util.js
  344. +
  345. ./test/js/dojo/src/html/color.js
  346. +
  347. ./test/js/dojo/src/html/common.js
  348. +
  349. ./test/js/dojo/src/html/display.js
  350. ./test/js/dojo/src/html/selection.js
  351. -
  352. ./test/js/dojo/src/experimental.js
  353. -
  354. ./test/js/dojo/dojo.js
  355. -
  356. ./test/js/tooltip/tip_balloon.js
  357. -
  358. ./test/js/tooltip/tip_balloon/stemt.gif
  359. -
  360. ./test/js/tooltip/tip_balloon/lt.gif
  361. -
  362. ./test/js/tooltip/tip_balloon/t.gif
  363. -
  364. ./test/js/tooltip/tip_balloon/stemb.gif
  365. -
  366. ./test/js/tooltip/tip_balloon/b.gif
  367. -
  368. ./test/js/tooltip/tip_balloon/l.gif
  369. -
  370. ./test/js/tooltip/tip_balloon/rt.gif
  371. -
  372. ./test/js/tooltip/tip_balloon/lb.gif
  373. -
  374. ./test/js/tooltip/tip_balloon/r.gif
  375. -
  376. ./test/js/tooltip/tip_balloon/background.gif
  377. -
  378. ./test/js/tooltip/tip_balloon/rb.gif
  379. -
  380. ./test/js/tooltip/wz_tooltip.js
  381. -
  382. ./test/AppliedTDs.html
  383. -
  384. ./test/virtualization-release-linkable.html
  385. -
  386. ./test/images/diff-previous.gif
  387. -
  388. ./test/images/figure1.png
  389. -
  390. ./test/images/collapsed.png
  391. -
  392. ./test/images/niaplogo.png
  393. -
  394. ./test/images/expanded.png
  395. -
  396. ./test/images/network.png
  397. -
  398. ./test/images/niaplogodraft.png
  399. -
  400. ./test/images/cclogo.png
  401. -
  402. ./test/images/Toe.png
  403. +
  404. ./test/js/dojo/src/html/layout.js
  405. +
  406. ./test/js/dojo/src/lang.js
  407. +
  408. ./test/images/diff-next.gif
  409. ./test/images/diffplus.gif
  410. +
  411. ./test/images/cclogo.png
  412. ./test/images/diffmin.gif
  413. +
  414. ./test/images/figure1.png
  415. +
  416. ./test/images/network.png
  417. ./test/images/diff-first.gif
  418. -
  419. ./test/images/diff-next.gif
  420. -
  421. ./test/images/diffunderline.gif
  422. ./test/images/diff-last.gif
  423. +
  424. ./test/images/niaplogo.png
  425. +
  426. ./test/images/Toe.png
  427. +
  428. ./test/images/diffunderline.gif
  429. +
  430. ./test/images/expanded.png
  431. +
  432. ./test/images/diff-previous.gif
  433. +
  434. ./test/images/collapsed.png
  435. +
  436. ./test/images/niaplogodraft.png
  437. +
  438. ./test/ValidationReport.txt
  439. +
  440. ./test/SpellCheckReport.txt
  441. ./test/warnings.svg
  442. -
  443. ./test/spell-badge.svg
  444. -
  445. ./test/PDFs.adoc
  446. -
  447. ./test/effective.xml
  448. -
  449. ./test/tds.svg
  450. -
  451. ./xml-builder-test/html_count.svg
  452. -
  453. ./xml-builder-test/tls.xml
  454. -
  455. ./xml-builder-test/transforms.svg
  456. -
  457. ./xml-builder-test/ssh.xml
  458. -
  459. ./xml-builder-test/client-virt.xml
  460. -
  461. ./xml-builder-test/pdf_count.svg
  462. -
  463. ./xml-builder-test/HTMLs.adoc
  464. -
  465. ./xml-builder-test/TDValidationReport.txt
  466. -
  467. ./xml-builder-test/virtualization-release.html
  468. -
  469. ./xml-builder-test/SanityChecksOutput.md
  470. -
  471. ./xml-builder-test/Minidash.adoc
  472. -
  473. ./xml-builder-test/validation.svg
  474. -
  475. ./xml-builder-test/AppliedTDs-Diff.html
  476. -
  477. ./xml-builder-test/virtualization.html
  478. -
  479. ./xml-builder-test/SpellCheckReport.txt
  480. -
  481. ./xml-builder-test/server-virt.xml
  482. -
  483. ./xml-builder-test/ValidationReport.txt
  484. -
  485. ./xml-builder-test/css/diff.css
  486. -
  487. ./xml-builder-test/meta-info.txt
  488. -
  489. ./xml-builder-test/js/diff.js
  490. -
  491. ./xml-builder-test/js/dojo/src/lang.js
  492. -
  493. ./xml-builder-test/js/dojo/src/event/browser.js
  494. -
  495. ./xml-builder-test/js/dojo/src/event/topic.js
  496. -
  497. ./xml-builder-test/js/dojo/src/event/common.js
  498. -
  499. ./xml-builder-test/js/dojo/src/event/__package__.js
  500. -
  501. ./xml-builder-test/js/dojo/src/event.js
  502. -
  503. ./xml-builder-test/js/dojo/src/lang/func.js
  504. -
  505. ./xml-builder-test/js/dojo/src/lang/timing/Timer.js
  506. -
  507. ./xml-builder-test/js/dojo/src/lang/timing/Streamer.js
  508. -
  509. ./xml-builder-test/js/dojo/src/lang/timing/__package__.js
  510. -
  511. ./xml-builder-test/js/dojo/src/lang/type.js
  512. -
  513. ./xml-builder-test/js/dojo/src/lang/array.js
  514. -
  515. ./xml-builder-test/js/dojo/src/lang/repr.js
  516. -
  517. ./xml-builder-test/js/dojo/src/lang/extras.js
  518. -
  519. ./xml-builder-test/js/dojo/src/lang/common.js
  520. -
  521. ./xml-builder-test/js/dojo/src/lang/assert.js
  522. -
  523. ./xml-builder-test/js/dojo/src/lang/declare.js
  524. -
  525. ./xml-builder-test/js/dojo/src/lang/__package__.js
  526. -
  527. ./xml-builder-test/js/dojo/src/html.js
  528. -
  529. ./xml-builder-test/js/dojo/src/html/util.js
  530. -
  531. ./xml-builder-test/js/dojo/src/html/display.js
  532. -
  533. ./xml-builder-test/js/dojo/src/html/layout.js
  534. -
  535. ./xml-builder-test/js/dojo/src/html/color.js
  536. -
  537. ./xml-builder-test/js/dojo/src/html/common.js
  538. -
  539. ./xml-builder-test/js/dojo/src/html/shadow.js
  540. -
  541. ./xml-builder-test/js/dojo/src/html/style.js
  542. -
  543. ./xml-builder-test/js/dojo/src/html/metrics.js
  544. -
  545. ./xml-builder-test/js/dojo/src/html/__package__.js
  546. -
  547. ./xml-builder-test/js/dojo/src/html/selection.js
  548. -
  549. ./xml-builder-test/js/dojo/src/experimental.js
  550. -
  551. ./xml-builder-test/js/dojo/dojo.js
  552. -
  553. ./xml-builder-test/js/tooltip/tip_balloon.js
  554. -
  555. ./xml-builder-test/js/tooltip/tip_balloon/stemt.gif
  556. -
  557. ./xml-builder-test/js/tooltip/tip_balloon/lt.gif
  558. -
  559. ./xml-builder-test/js/tooltip/tip_balloon/t.gif
  560. -
  561. ./xml-builder-test/js/tooltip/tip_balloon/stemb.gif
  562. -
  563. ./xml-builder-test/js/tooltip/tip_balloon/b.gif
  564. -
  565. ./xml-builder-test/js/tooltip/tip_balloon/l.gif
  566. -
  567. ./xml-builder-test/js/tooltip/tip_balloon/rt.gif
  568. -
  569. ./xml-builder-test/js/tooltip/tip_balloon/lb.gif
  570. -
  571. ./xml-builder-test/js/tooltip/tip_balloon/r.gif
  572. -
  573. ./xml-builder-test/js/tooltip/tip_balloon/background.gif
  574. -
  575. ./xml-builder-test/js/tooltip/tip_balloon/rb.gif
  576. -
  577. ./xml-builder-test/js/tooltip/wz_tooltip.js
  578. -
  579. ./xml-builder-test/AppliedTDs.html
  580. -
  581. ./xml-builder-test/virtualization-release-linkable.html
  582. -
  583. ./xml-builder-test/images/diff-previous.gif
  584. -
  585. ./xml-builder-test/images/figure1.png
  586. -
  587. ./xml-builder-test/images/collapsed.png
  588. -
  589. ./xml-builder-test/images/niaplogo.png
  590. -
  591. ./xml-builder-test/images/expanded.png
  592. -
  593. ./xml-builder-test/images/network.png
  594. -
  595. ./xml-builder-test/images/niaplogodraft.png
  596. -
  597. ./xml-builder-test/images/cclogo.png
  598. -
  599. ./xml-builder-test/images/Toe.png
  600. -
  601. ./xml-builder-test/images/diffplus.gif
  602. -
  603. ./xml-builder-test/images/diffmin.gif
  604. -
  605. ./xml-builder-test/images/diff-first.gif
  606. -
  607. ./xml-builder-test/images/diff-next.gif
  608. -
  609. ./xml-builder-test/images/diffunderline.gif
  610. -
  611. ./xml-builder-test/images/diff-last.gif
  612. -
  613. ./xml-builder-test/warnings.svg
  614. -
  615. ./xml-builder-test/spell-badge.svg
  616. -
  617. ./xml-builder-test/PDFs.adoc
  618. -
  619. ./xml-builder-test/effective.xml
  620. -
  621. ./xml-builder-test/tds.svg
  622. -
  623. ./virtualization-release.html
  624. -
  625. ./master/html_count.svg
  626. -
  627. ./master/pkg-ssh.xml
  628. -
  629. ./master/pkg-tls.xml
  630. -
  631. ./master/transforms.svg
  632. -
  633. ./master/client-virt.xml
  634. -
  635. ./master/pdf_count.svg
  636. -
  637. ./master/HTMLs.adoc
  638. -
  639. ./master/TDValidationReport.txt
  640. -
  641. ./master/virtualization-release.html
  642. -
  643. ./master/SanityChecksOutput.md
  644. -
  645. ./master/Minidash.adoc
  646. -
  647. ./master/validation.svg
  648. -
  649. ./master/AppliedTDs-Diff.html
  650. -
  651. ./master/virtualization.html
  652. -
  653. ./master/SpellCheckReport.txt
  654. -
  655. ./master/server-virt.xml
  656. -
  657. ./master/ValidationReport.txt
  658. -
  659. ./master/css/diff.css
  660. -
  661. ./master/meta-info.txt
  662. -
  663. ./master/js/diff.js
  664. -
  665. ./master/js/dojo/src/lang.js
  666. -
  667. ./master/js/dojo/src/event/browser.js
  668. -
  669. ./master/js/dojo/src/event/topic.js
  670. -
  671. ./master/js/dojo/src/event/common.js
  672. -
  673. ./master/js/dojo/src/event/__package__.js
  674. -
  675. ./master/js/dojo/src/event.js
  676. -
  677. ./master/js/dojo/src/lang/func.js
  678. -
  679. ./master/js/dojo/src/lang/timing/Timer.js
  680. -
  681. ./master/js/dojo/src/lang/timing/Streamer.js
  682. -
  683. ./master/js/dojo/src/lang/timing/__package__.js
  684. -
  685. ./master/js/dojo/src/lang/type.js
  686. -
  687. ./master/js/dojo/src/lang/array.js
  688. -
  689. ./master/js/dojo/src/lang/repr.js
  690. -
  691. ./master/js/dojo/src/lang/extras.js
  692. -
  693. ./master/js/dojo/src/lang/common.js
  694. -
  695. ./master/js/dojo/src/lang/assert.js
  696. -
  697. ./master/js/dojo/src/lang/declare.js
  698. -
  699. ./master/js/dojo/src/lang/__package__.js
  700. -
  701. ./master/js/dojo/src/html.js
  702. -
  703. ./master/js/dojo/src/html/util.js
  704. -
  705. ./master/js/dojo/src/html/display.js
  706. -
  707. ./master/js/dojo/src/html/layout.js
  708. -
  709. ./master/js/dojo/src/html/color.js
  710. -
  711. ./master/js/dojo/src/html/common.js
  712. -
  713. ./master/js/dojo/src/html/shadow.js
  714. -
  715. ./master/js/dojo/src/html/style.js
  716. -
  717. ./master/js/dojo/src/html/metrics.js
  718. -
  719. ./master/js/dojo/src/html/__package__.js
  720. -
  721. ./master/js/dojo/src/html/selection.js
  722. -
  723. ./master/js/dojo/src/experimental.js
  724. -
  725. ./master/js/dojo/dojo.js
  726. -
  727. ./master/js/tooltip/tip_balloon.js
  728. -
  729. ./master/js/tooltip/tip_balloon/stemt.gif
  730. -
  731. ./master/js/tooltip/tip_balloon/lt.gif
  732. -
  733. ./master/js/tooltip/tip_balloon/t.gif
  734. -
  735. ./master/js/tooltip/tip_balloon/stemb.gif
  736. -
  737. ./master/js/tooltip/tip_balloon/b.gif
  738. -
  739. ./master/js/tooltip/tip_balloon/l.gif
  740. -
  741. ./master/js/tooltip/tip_balloon/rt.gif
  742. -
  743. ./master/js/tooltip/tip_balloon/lb.gif
  744. -
  745. ./master/js/tooltip/tip_balloon/r.gif
  746. -
  747. ./master/js/tooltip/tip_balloon/background.gif
  748. -
  749. ./master/js/tooltip/tip_balloon/rb.gif
  750. -
  751. ./master/js/tooltip/wz_tooltip.js
  752. -
  753. ./master/AppliedTDs.html
  754. -
  755. ./master/virtualization-release-linkable.html
  756. -
  757. ./master/images/diff-previous.gif
  758. -
  759. ./master/images/figure1.png
  760. -
  761. ./master/images/collapsed.png
  762. -
  763. ./master/images/niaplogo.png
  764. -
  765. ./master/images/expanded.png
  766. -
  767. ./master/images/network.png
  768. -
  769. ./master/images/niaplogodraft.png
  770. -
  771. ./master/images/cclogo.png
  772. -
  773. ./master/images/Toe.png
  774. -
  775. ./master/images/diffplus.gif
  776. -
  777. ./master/images/diffmin.gif
  778. -
  779. ./master/images/diff-first.gif
  780. -
  781. ./master/images/diff-next.gif
  782. -
  783. ./master/images/diffunderline.gif
  784. -
  785. ./master/images/diff-last.gif
  786. -
  787. ./master/warnings.svg
  788. -
  789. ./master/spell-badge.svg
  790. -
  791. ./master/PDFs.adoc
  792. -
  793. ./master/effective.xml
  794. -
  795. ./master/tds.svg
  796. +
  797. ./test/pkg-tls.xml
  798. +
  799. ./test/TDValidationReport.txt
  800. +
  801. ./test/css/diff.css
  802. +
  803. ./test/client-virt.xml
  804. +
  805. ./test/validation.svg
  806. +
  807. ./test/server-virt.xml
  808. +
  809. ./.git
  810. +
  811. ./.git/hooks/applypatch-msg.sample
  812. +
  813. ./.git/hooks/update.sample
  814. +
  815. ./.git/hooks/fsmonitor-watchman.sample
  816. +
  817. ./.git/hooks/pre-merge-commit.sample
  818. +
  819. ./.git/hooks/pre-push.sample
  820. +
  821. ./.git/hooks/commit-msg.sample
  822. +
  823. ./.git/hooks/pre-commit.sample
  824. +
  825. ./.git/hooks/pre-applypatch.sample
  826. +
  827. ./.git/hooks/sendemail-validate.sample
  828. +
  829. ./.git/hooks/post-update.sample
  830. +
  831. ./.git/hooks/prepare-commit-msg.sample
  832. +
  833. ./.git/hooks/push-to-checkout.sample
  834. +
  835. ./.git/hooks/pre-receive.sample
  836. +
  837. ./.git/hooks/pre-rebase.sample
  838. +
  839. ./.git/objects/pack/pack-d4fd50cf1c1485fbb2d7e21e9c88f05a3a2779c8.idx
  840. +
  841. ./.git/objects/pack/pack-d4fd50cf1c1485fbb2d7e21e9c88f05a3a2779c8.pack
  842. +
  843. ./.git/objects/pack/pack-d4fd50cf1c1485fbb2d7e21e9c88f05a3a2779c8.rev
  844. +
  845. ./test2/pdf_count.svg
  846. +
  847. ./test2/meta-info.txt
  848. ./test2/html_count.svg
  849. -
  850. ./test2/pkg-ssh.xml
  851. -
  852. ./test2/pkg-tls.xml
  853. ./test2/transforms.svg
  854. -
  855. ./test2/client-virt.xml
  856. ./test2/virtualization-release-linkable.html.pdf
  857. -
  858. ./test2/pdf_count.svg
  859. +
  860. ./test2/Minidash.adoc
  861. +
  862. ./test2/spell-badge.svg
  863. +
  864. ./test2/virtualization.html.pdf
  865. +
  866. ./test2/effective.xml
  867. +
  868. ./test2/pkg-ssh.xml
  869. ./test2/HTMLs.adoc
  870. -
  871. ./test2/TDValidationReport.txt
  872. ./test2/virtualization-release.html
  873. +
  874. ./test2/AppliedTDs.html
  875. +
  876. ./test2/virtualization.html
  877. +
  878. ./test2/virtualization-release-linkable.html
  879. +
  880. ./test2/PDFs.adoc
  881. +
  882. ./test2/tds.svg
  883. ./test2/SanityChecksOutput.md
  884. -
  885. ./test2/Minidash.adoc
  886. -
  887. ./test2/validation.svg
  888. ./test2/AppliedTDs-Diff.html
  889. -
  890. ./test2/virtualization.html
  891. -
  892. ./test2/SpellCheckReport.txt
  893. -
  894. ./test2/server-virt.xml
  895. -
  896. ./test2/ValidationReport.txt
  897. -
  898. ./test2/virtualization-release.html.pdf
  899. -
  900. ./test2/css/diff.css
  901. -
  902. ./test2/meta-info.txt
  903. ./test2/js/diff.js
  904. -
  905. ./test2/js/dojo/src/lang.js
  906. -
  907. ./test2/js/dojo/src/event/browser.js
  908. -
  909. ./test2/js/dojo/src/event/topic.js
  910. -
  911. ./test2/js/dojo/src/event/common.js
  912. -
  913. ./test2/js/dojo/src/event/__package__.js
  914. +
  915. ./test2/js/tooltip/wz_tooltip.js
  916. +
  917. ./test2/js/tooltip/tip_balloon.js
  918. +
  919. ./test2/js/tooltip/tip_balloon/t.gif
  920. +
  921. ./test2/js/tooltip/tip_balloon/lt.gif
  922. +
  923. ./test2/js/tooltip/tip_balloon/stemt.gif
  924. +
  925. ./test2/js/tooltip/tip_balloon/l.gif
  926. +
  927. ./test2/js/tooltip/tip_balloon/lb.gif
  928. +
  929. ./test2/js/tooltip/tip_balloon/r.gif
  930. +
  931. ./test2/js/tooltip/tip_balloon/b.gif
  932. +
  933. ./test2/js/tooltip/tip_balloon/rb.gif
  934. +
  935. ./test2/js/tooltip/tip_balloon/stemb.gif
  936. +
  937. ./test2/js/tooltip/tip_balloon/background.gif
  938. +
  939. ./test2/js/tooltip/tip_balloon/rt.gif
  940. +
  941. ./test2/js/dojo/dojo.js
  942. ./test2/js/dojo/src/event.js
  943. +
  944. ./test2/js/dojo/src/html.js
  945. +
  946. ./test2/js/dojo/src/lang/__package__.js
  947. ./test2/js/dojo/src/lang/func.js
  948. -
  949. ./test2/js/dojo/src/lang/timing/Timer.js
  950. -
  951. ./test2/js/dojo/src/lang/timing/Streamer.js
  952. -
  953. ./test2/js/dojo/src/lang/timing/__package__.js
  954. -
  955. ./test2/js/dojo/src/lang/type.js
  956. -
  957. ./test2/js/dojo/src/lang/array.js
  958. ./test2/js/dojo/src/lang/repr.js
  959. ./test2/js/dojo/src/lang/extras.js
  960. +
  961. ./test2/js/dojo/src/lang/array.js
  962. ./test2/js/dojo/src/lang/common.js
  963. -
  964. ./test2/js/dojo/src/lang/assert.js
  965. +
  966. ./test2/js/dojo/src/lang/timing/__package__.js
  967. +
  968. ./test2/js/dojo/src/lang/timing/Timer.js
  969. +
  970. ./test2/js/dojo/src/lang/timing/Streamer.js
  971. +
  972. ./test2/js/dojo/src/lang/type.js
  973. ./test2/js/dojo/src/lang/declare.js
  974. -
  975. ./test2/js/dojo/src/lang/__package__.js
  976. -
  977. ./test2/js/dojo/src/html.js
  978. -
  979. ./test2/js/dojo/src/html/util.js
  980. -
  981. ./test2/js/dojo/src/html/display.js
  982. -
  983. ./test2/js/dojo/src/html/layout.js
  984. -
  985. ./test2/js/dojo/src/html/color.js
  986. -
  987. ./test2/js/dojo/src/html/common.js
  988. -
  989. ./test2/js/dojo/src/html/shadow.js
  990. +
  991. ./test2/js/dojo/src/lang/assert.js
  992. +
  993. ./test2/js/dojo/src/experimental.js
  994. +
  995. ./test2/js/dojo/src/event/__package__.js
  996. +
  997. ./test2/js/dojo/src/event/topic.js
  998. +
  999. ./test2/js/dojo/src/event/common.js
  1000. +
  1001. ./test2/js/dojo/src/event/browser.js
  1002. ./test2/js/dojo/src/html/style.js
  1003. ./test2/js/dojo/src/html/metrics.js
  1004. ./test2/js/dojo/src/html/__package__.js
  1005. +
  1006. ./test2/js/dojo/src/html/shadow.js
  1007. +
  1008. ./test2/js/dojo/src/html/util.js
  1009. +
  1010. ./test2/js/dojo/src/html/color.js
  1011. +
  1012. ./test2/js/dojo/src/html/common.js
  1013. +
  1014. ./test2/js/dojo/src/html/display.js
  1015. ./test2/js/dojo/src/html/selection.js
  1016. -
  1017. ./test2/js/dojo/src/experimental.js
  1018. -
  1019. ./test2/js/dojo/dojo.js
  1020. -
  1021. ./test2/js/tooltip/tip_balloon.js
  1022. -
  1023. ./test2/js/tooltip/tip_balloon/stemt.gif
  1024. -
  1025. ./test2/js/tooltip/tip_balloon/lt.gif
  1026. -
  1027. ./test2/js/tooltip/tip_balloon/t.gif
  1028. -
  1029. ./test2/js/tooltip/tip_balloon/stemb.gif
  1030. -
  1031. ./test2/js/tooltip/tip_balloon/b.gif
  1032. -
  1033. ./test2/js/tooltip/tip_balloon/l.gif
  1034. -
  1035. ./test2/js/tooltip/tip_balloon/rt.gif
  1036. -
  1037. ./test2/js/tooltip/tip_balloon/lb.gif
  1038. -
  1039. ./test2/js/tooltip/tip_balloon/r.gif
  1040. -
  1041. ./test2/js/tooltip/tip_balloon/background.gif
  1042. -
  1043. ./test2/js/tooltip/tip_balloon/rb.gif
  1044. -
  1045. ./test2/js/tooltip/wz_tooltip.js
  1046. -
  1047. ./test2/AppliedTDs.html
  1048. -
  1049. ./test2/virtualization-release-linkable.html
  1050. -
  1051. ./test2/images/diff-previous.gif
  1052. +
  1053. ./test2/js/dojo/src/html/layout.js
  1054. +
  1055. ./test2/js/dojo/src/lang.js
  1056. +
  1057. ./test2/images/diff-next.gif
  1058. +
  1059. ./test2/images/diffplus.gif
  1060. +
  1061. ./test2/images/cclogo.png
  1062. +
  1063. ./test2/images/diffmin.gif
  1064. ./test2/images/figure1.png
  1065. -
  1066. ./test2/images/collapsed.png
  1067. -
  1068. ./test2/images/niaplogo.png
  1069. -
  1070. ./test2/images/expanded.png
  1071. ./test2/images/network.png
  1072. -
  1073. ./test2/images/niaplogodraft.png
  1074. -
  1075. ./test2/images/cclogo.png
  1076. -
  1077. ./test2/images/Toe.png
  1078. -
  1079. ./test2/images/diffplus.gif
  1080. -
  1081. ./test2/images/diffmin.gif
  1082. ./test2/images/diff-first.gif
  1083. -
  1084. ./test2/images/diff-next.gif
  1085. -
  1086. ./test2/images/diffunderline.gif
  1087. ./test2/images/diff-last.gif
  1088. +
  1089. ./test2/images/niaplogo.png
  1090. +
  1091. ./test2/images/Toe.png
  1092. +
  1093. ./test2/images/diffunderline.gif
  1094. +
  1095. ./test2/images/expanded.png
  1096. +
  1097. ./test2/images/diff-previous.gif
  1098. +
  1099. ./test2/images/collapsed.png
  1100. +
  1101. ./test2/images/niaplogodraft.png
  1102. +
  1103. ./test2/ValidationReport.txt
  1104. +
  1105. ./test2/SpellCheckReport.txt
  1106. ./test2/warnings.svg
  1107. -
  1108. ./test2/spell-badge.svg
  1109. -
  1110. ./test2/PDFs.adoc
  1111. -
  1112. ./test2/effective.xml
  1113. -
  1114. ./test2/virtualization.html.pdf
  1115. -
  1116. ./test2/tds.svg
  1117. +
  1118. ./test2/pkg-tls.xml
  1119. +
  1120. ./test2/TDValidationReport.txt
  1121. +
  1122. ./test2/css/diff.css
  1123. +
  1124. ./test2/client-virt.xml
  1125. +
  1126. ./test2/virtualization-release.html.pdf
  1127. +
  1128. ./test2/validation.svg
  1129. +
  1130. ./test2/server-virt.xml
  1131. +
  1132. ./pkg-ssh.xml
  1133. +
  1134. ./virtualization-release.html
  1135. +
  1136. ./master/pdf_count.svg
  1137. +
  1138. ./master/meta-info.txt
  1139. +
  1140. ./master/html_count.svg
  1141. +
  1142. ./master/transforms.svg
  1143. +
  1144. ./master/Minidash.adoc
  1145. +
  1146. ./master/spell-badge.svg
  1147. +
  1148. ./master/effective.xml
  1149. +
  1150. ./master/pkg-ssh.xml
  1151. +
  1152. ./master/HTMLs.adoc
  1153. +
  1154. ./master/virtualization-release.html
  1155. +
  1156. ./master/AppliedTDs.html
  1157. +
  1158. ./master/virtualization.html
  1159. +
  1160. ./master/virtualization-release-linkable.html
  1161. +
  1162. ./master/PDFs.adoc
  1163. +
  1164. ./master/tds.svg
  1165. +
  1166. ./master/SanityChecksOutput.md
  1167. +
  1168. ./master/AppliedTDs-Diff.html
  1169. +
  1170. ./master/js/diff.js
  1171. +
  1172. ./master/js/tooltip/wz_tooltip.js
  1173. +
  1174. ./master/js/tooltip/tip_balloon.js
  1175. +
  1176. ./master/js/tooltip/tip_balloon/t.gif
  1177. +
  1178. ./master/js/tooltip/tip_balloon/lt.gif
  1179. +
  1180. ./master/js/tooltip/tip_balloon/stemt.gif
  1181. +
  1182. ./master/js/tooltip/tip_balloon/l.gif
  1183. +
  1184. ./master/js/tooltip/tip_balloon/lb.gif
  1185. +
  1186. ./master/js/tooltip/tip_balloon/r.gif
  1187. +
  1188. ./master/js/tooltip/tip_balloon/b.gif
  1189. +
  1190. ./master/js/tooltip/tip_balloon/rb.gif
  1191. +
  1192. ./master/js/tooltip/tip_balloon/stemb.gif
  1193. +
  1194. ./master/js/tooltip/tip_balloon/background.gif
  1195. +
  1196. ./master/js/tooltip/tip_balloon/rt.gif
  1197. +
  1198. ./master/js/dojo/dojo.js
  1199. +
  1200. ./master/js/dojo/src/event.js
  1201. +
  1202. ./master/js/dojo/src/html.js
  1203. +
  1204. ./master/js/dojo/src/lang/__package__.js
  1205. +
  1206. ./master/js/dojo/src/lang/func.js
  1207. +
  1208. ./master/js/dojo/src/lang/repr.js
  1209. +
  1210. ./master/js/dojo/src/lang/extras.js
  1211. +
  1212. ./master/js/dojo/src/lang/array.js
  1213. +
  1214. ./master/js/dojo/src/lang/common.js
  1215. +
  1216. ./master/js/dojo/src/lang/timing/__package__.js
  1217. +
  1218. ./master/js/dojo/src/lang/timing/Timer.js
  1219. +
  1220. ./master/js/dojo/src/lang/timing/Streamer.js
  1221. +
  1222. ./master/js/dojo/src/lang/type.js
  1223. +
  1224. ./master/js/dojo/src/lang/declare.js
  1225. +
  1226. ./master/js/dojo/src/lang/assert.js
  1227. +
  1228. ./master/js/dojo/src/experimental.js
  1229. +
  1230. ./master/js/dojo/src/event/__package__.js
  1231. +
  1232. ./master/js/dojo/src/event/topic.js
  1233. +
  1234. ./master/js/dojo/src/event/common.js
  1235. +
  1236. ./master/js/dojo/src/event/browser.js
  1237. +
  1238. ./master/js/dojo/src/html/style.js
  1239. +
  1240. ./master/js/dojo/src/html/metrics.js
  1241. +
  1242. ./master/js/dojo/src/html/__package__.js
  1243. +
  1244. ./master/js/dojo/src/html/shadow.js
  1245. +
  1246. ./master/js/dojo/src/html/util.js
  1247. +
  1248. ./master/js/dojo/src/html/color.js
  1249. +
  1250. ./master/js/dojo/src/html/common.js
  1251. +
  1252. ./master/js/dojo/src/html/display.js
  1253. +
  1254. ./master/js/dojo/src/html/selection.js
  1255. +
  1256. ./master/js/dojo/src/html/layout.js
  1257. +
  1258. ./master/js/dojo/src/lang.js
  1259. +
  1260. ./master/images/diff-next.gif
  1261. +
  1262. ./master/images/diffplus.gif
  1263. +
  1264. ./master/images/cclogo.png
  1265. +
  1266. ./master/images/diffmin.gif
  1267. +
  1268. ./master/images/figure1.png
  1269. +
  1270. ./master/images/network.png
  1271. +
  1272. ./master/images/diff-first.gif
  1273. +
  1274. ./master/images/diff-last.gif
  1275. +
  1276. ./master/images/niaplogo.png
  1277. +
  1278. ./master/images/Toe.png
  1279. +
  1280. ./master/images/diffunderline.gif
  1281. +
  1282. ./master/images/expanded.png
  1283. +
  1284. ./master/images/diff-previous.gif
  1285. +
  1286. ./master/images/collapsed.png
  1287. +
  1288. ./master/images/niaplogodraft.png
  1289. +
  1290. ./master/ValidationReport.txt
  1291. +
  1292. ./master/SpellCheckReport.txt
  1293. +
  1294. ./master/warnings.svg
  1295. +
  1296. ./master/pkg-tls.xml
  1297. +
  1298. ./master/TDValidationReport.txt
  1299. +
  1300. ./master/css/diff.css
  1301. +
  1302. ./master/client-virt.xml
  1303. +
  1304. ./master/validation.svg
  1305. +
  1306. ./master/server-virt.xml
  1307. ./index.html
  1308. -
  1309. ./release-1.1
  1310. -
  1311. ./release-1.1/html_count.svg
  1312. -
  1313. ./release-1.1/tls.xml
  1314. -
  1315. ./release-1.1/transforms.svg
  1316. -
  1317. ./release-1.1/ssh.xml
  1318. -
  1319. ./release-1.1/client-virt.xml
  1320. -
  1321. ./release-1.1/virtualization-release-linkable.html.pdf
  1322. -
  1323. ./release-1.1/pdf_count.svg
  1324. -
  1325. ./release-1.1/HTMLs.adoc
  1326. -
  1327. ./release-1.1/TDValidationReport.txt
  1328. -
  1329. ./release-1.1/virtualization-release.html
  1330. -
  1331. ./release-1.1/SanityChecksOutput.md
  1332. -
  1333. ./release-1.1/Minidash.adoc
  1334. -
  1335. ./release-1.1/validation.svg
  1336. -
  1337. ./release-1.1/AppliedTDs-Diff.html
  1338. -
  1339. ./release-1.1/virtualization.html
  1340. -
  1341. ./release-1.1/SpellCheckReport.txt
  1342. -
  1343. ./release-1.1/server-virt.xml
  1344. -
  1345. ./release-1.1/ValidationReport.txt
  1346. -
  1347. ./release-1.1/virtualization-release.html.pdf
  1348. -
  1349. ./release-1.1/css/diff.css
  1350. -
  1351. ./release-1.1/meta-info.txt
  1352. -
  1353. ./release-1.1/js/diff.js
  1354. -
  1355. ./release-1.1/js/dojo/src/lang.js
  1356. -
  1357. ./release-1.1/js/dojo/src/event/browser.js
  1358. -
  1359. ./release-1.1/js/dojo/src/event/topic.js
  1360. -
  1361. ./release-1.1/js/dojo/src/event/common.js
  1362. -
  1363. ./release-1.1/js/dojo/src/event/__package__.js
  1364. -
  1365. ./release-1.1/js/dojo/src/event.js
  1366. -
  1367. ./release-1.1/js/dojo/src/lang/func.js
  1368. -
  1369. ./release-1.1/js/dojo/src/lang/timing/Timer.js
  1370. -
  1371. ./release-1.1/js/dojo/src/lang/timing/Streamer.js
  1372. -
  1373. ./release-1.1/js/dojo/src/lang/timing/__package__.js
  1374. -
  1375. ./release-1.1/js/dojo/src/lang/type.js
  1376. -
  1377. ./release-1.1/js/dojo/src/lang/array.js
  1378. -
  1379. ./release-1.1/js/dojo/src/lang/repr.js
  1380. -
  1381. ./release-1.1/js/dojo/src/lang/extras.js
  1382. -
  1383. ./release-1.1/js/dojo/src/lang/common.js
  1384. -
  1385. ./release-1.1/js/dojo/src/lang/assert.js
  1386. -
  1387. ./release-1.1/js/dojo/src/lang/declare.js
  1388. -
  1389. ./release-1.1/js/dojo/src/lang/__package__.js
  1390. -
  1391. ./release-1.1/js/dojo/src/html.js
  1392. -
  1393. ./release-1.1/js/dojo/src/html/util.js
  1394. -
  1395. ./release-1.1/js/dojo/src/html/display.js
  1396. -
  1397. ./release-1.1/js/dojo/src/html/layout.js
  1398. -
  1399. ./release-1.1/js/dojo/src/html/color.js
  1400. -
  1401. ./release-1.1/js/dojo/src/html/common.js
  1402. -
  1403. ./release-1.1/js/dojo/src/html/shadow.js
  1404. -
  1405. ./release-1.1/js/dojo/src/html/style.js
  1406. -
  1407. ./release-1.1/js/dojo/src/html/metrics.js
  1408. -
  1409. ./release-1.1/js/dojo/src/html/__package__.js
  1410. -
  1411. ./release-1.1/js/dojo/src/html/selection.js
  1412. -
  1413. ./release-1.1/js/dojo/src/experimental.js
  1414. -
  1415. ./release-1.1/js/dojo/dojo.js
  1416. -
  1417. ./release-1.1/js/tooltip/tip_balloon.js
  1418. -
  1419. ./release-1.1/js/tooltip/tip_balloon/stemt.gif
  1420. -
  1421. ./release-1.1/js/tooltip/tip_balloon/lt.gif
  1422. -
  1423. ./release-1.1/js/tooltip/tip_balloon/t.gif
  1424. -
  1425. ./release-1.1/js/tooltip/tip_balloon/stemb.gif
  1426. -
  1427. ./release-1.1/js/tooltip/tip_balloon/b.gif
  1428. -
  1429. ./release-1.1/js/tooltip/tip_balloon/l.gif
  1430. -
  1431. ./release-1.1/js/tooltip/tip_balloon/rt.gif
  1432. -
  1433. ./release-1.1/js/tooltip/tip_balloon/lb.gif
  1434. -
  1435. ./release-1.1/js/tooltip/tip_balloon/r.gif
  1436. -
  1437. ./release-1.1/js/tooltip/tip_balloon/background.gif
  1438. -
  1439. ./release-1.1/js/tooltip/tip_balloon/rb.gif
  1440. -
  1441. ./release-1.1/js/tooltip/wz_tooltip.js
  1442. -
  1443. ./release-1.1/AppliedTDs.html
  1444. -
  1445. ./release-1.1/virtualization-release-linkable.html
  1446. -
  1447. ./release-1.1/images/diff-previous.gif
  1448. -
  1449. ./release-1.1/images/figure1.png
  1450. -
  1451. ./release-1.1/images/collapsed.png
  1452. -
  1453. ./release-1.1/images/niaplogo.png
  1454. -
  1455. ./release-1.1/images/expanded.png
  1456. -
  1457. ./release-1.1/images/network.png
  1458. -
  1459. ./release-1.1/images/niaplogodraft.png
  1460. -
  1461. ./release-1.1/images/cclogo.png
  1462. -
  1463. ./release-1.1/images/Toe.png
  1464. -
  1465. ./release-1.1/images/diffplus.gif
  1466. -
  1467. ./release-1.1/images/diffmin.gif
  1468. -
  1469. ./release-1.1/images/diff-first.gif
  1470. -
  1471. ./release-1.1/images/diff-next.gif
  1472. -
  1473. ./release-1.1/images/diffunderline.gif
  1474. -
  1475. ./release-1.1/images/diff-last.gif
  1476. -
  1477. ./release-1.1/warnings.svg
  1478. -
  1479. ./release-1.1/spell-badge.svg
  1480. -
  1481. ./release-1.1/PDFs.adoc
  1482. -
  1483. ./release-1.1/effective.xml
  1484. -
  1485. ./release-1.1/virtualization.html.pdf
  1486. -
  1487. ./release-1.1/tds.svg
  1488. ./virtualization-release-linkable.html
  1489. +
  1490. ./xml-builder-test/pdf_count.svg
  1491. +
  1492. ./xml-builder-test/tls.xml
  1493. +
  1494. ./xml-builder-test/meta-info.txt
  1495. +
  1496. ./xml-builder-test/html_count.svg
  1497. +
  1498. ./xml-builder-test/transforms.svg
  1499. +
  1500. ./xml-builder-test/Minidash.adoc
  1501. +
  1502. ./xml-builder-test/spell-badge.svg
  1503. +
  1504. ./xml-builder-test/effective.xml
  1505. +
  1506. ./xml-builder-test/HTMLs.adoc
  1507. +
  1508. ./xml-builder-test/virtualization-release.html
  1509. +
  1510. ./xml-builder-test/AppliedTDs.html
  1511. +
  1512. ./xml-builder-test/virtualization.html
  1513. +
  1514. ./xml-builder-test/virtualization-release-linkable.html
  1515. +
  1516. ./xml-builder-test/PDFs.adoc
  1517. +
  1518. ./xml-builder-test/tds.svg
  1519. +
  1520. ./xml-builder-test/SanityChecksOutput.md
  1521. +
  1522. ./xml-builder-test/AppliedTDs-Diff.html
  1523. +
  1524. ./xml-builder-test/js/diff.js
  1525. +
  1526. ./xml-builder-test/js/tooltip/wz_tooltip.js
  1527. +
  1528. ./xml-builder-test/js/tooltip/tip_balloon.js
  1529. +
  1530. ./xml-builder-test/js/tooltip/tip_balloon/t.gif
  1531. +
  1532. ./xml-builder-test/js/tooltip/tip_balloon/lt.gif
  1533. +
  1534. ./xml-builder-test/js/tooltip/tip_balloon/stemt.gif
  1535. +
  1536. ./xml-builder-test/js/tooltip/tip_balloon/l.gif
  1537. +
  1538. ./xml-builder-test/js/tooltip/tip_balloon/lb.gif
  1539. +
  1540. ./xml-builder-test/js/tooltip/tip_balloon/r.gif
  1541. +
  1542. ./xml-builder-test/js/tooltip/tip_balloon/b.gif
  1543. +
  1544. ./xml-builder-test/js/tooltip/tip_balloon/rb.gif
  1545. +
  1546. ./xml-builder-test/js/tooltip/tip_balloon/stemb.gif
  1547. +
  1548. ./xml-builder-test/js/tooltip/tip_balloon/background.gif
  1549. +
  1550. ./xml-builder-test/js/tooltip/tip_balloon/rt.gif
  1551. +
  1552. ./xml-builder-test/js/dojo/dojo.js
  1553. +
  1554. ./xml-builder-test/js/dojo/src/event.js
  1555. +
  1556. ./xml-builder-test/js/dojo/src/html.js
  1557. +
  1558. ./xml-builder-test/js/dojo/src/lang/__package__.js
  1559. +
  1560. ./xml-builder-test/js/dojo/src/lang/func.js
  1561. +
  1562. ./xml-builder-test/js/dojo/src/lang/repr.js
  1563. +
  1564. ./xml-builder-test/js/dojo/src/lang/extras.js
  1565. +
  1566. ./xml-builder-test/js/dojo/src/lang/array.js
  1567. +
  1568. ./xml-builder-test/js/dojo/src/lang/common.js
  1569. +
  1570. ./xml-builder-test/js/dojo/src/lang/timing/__package__.js
  1571. +
  1572. ./xml-builder-test/js/dojo/src/lang/timing/Timer.js
  1573. +
  1574. ./xml-builder-test/js/dojo/src/lang/timing/Streamer.js
  1575. +
  1576. ./xml-builder-test/js/dojo/src/lang/type.js
  1577. +
  1578. ./xml-builder-test/js/dojo/src/lang/declare.js
  1579. +
  1580. ./xml-builder-test/js/dojo/src/lang/assert.js
  1581. +
  1582. ./xml-builder-test/js/dojo/src/experimental.js
  1583. +
  1584. ./xml-builder-test/js/dojo/src/event/__package__.js
  1585. +
  1586. ./xml-builder-test/js/dojo/src/event/topic.js
  1587. +
  1588. ./xml-builder-test/js/dojo/src/event/common.js
  1589. +
  1590. ./xml-builder-test/js/dojo/src/event/browser.js
  1591. +
  1592. ./xml-builder-test/js/dojo/src/html/style.js
  1593. +
  1594. ./xml-builder-test/js/dojo/src/html/metrics.js
  1595. +
  1596. ./xml-builder-test/js/dojo/src/html/__package__.js
  1597. +
  1598. ./xml-builder-test/js/dojo/src/html/shadow.js
  1599. +
  1600. ./xml-builder-test/js/dojo/src/html/util.js
  1601. +
  1602. ./xml-builder-test/js/dojo/src/html/color.js
  1603. +
  1604. ./xml-builder-test/js/dojo/src/html/common.js
  1605. +
  1606. ./xml-builder-test/js/dojo/src/html/display.js
  1607. +
  1608. ./xml-builder-test/js/dojo/src/html/selection.js
  1609. +
  1610. ./xml-builder-test/js/dojo/src/html/layout.js
  1611. +
  1612. ./xml-builder-test/js/dojo/src/lang.js
  1613. +
  1614. ./xml-builder-test/images/diff-next.gif
  1615. +
  1616. ./xml-builder-test/images/diffplus.gif
  1617. +
  1618. ./xml-builder-test/images/cclogo.png
  1619. +
  1620. ./xml-builder-test/images/diffmin.gif
  1621. +
  1622. ./xml-builder-test/images/figure1.png
  1623. +
  1624. ./xml-builder-test/images/network.png
  1625. +
  1626. ./xml-builder-test/images/diff-first.gif
  1627. +
  1628. ./xml-builder-test/images/diff-last.gif
  1629. +
  1630. ./xml-builder-test/images/niaplogo.png
  1631. +
  1632. ./xml-builder-test/images/Toe.png
  1633. +
  1634. ./xml-builder-test/images/diffunderline.gif
  1635. +
  1636. ./xml-builder-test/images/expanded.png
  1637. +
  1638. ./xml-builder-test/images/diff-previous.gif
  1639. +
  1640. ./xml-builder-test/images/collapsed.png
  1641. +
  1642. ./xml-builder-test/images/niaplogodraft.png
  1643. +
  1644. ./xml-builder-test/ValidationReport.txt
  1645. +
  1646. ./xml-builder-test/SpellCheckReport.txt
  1647. +
  1648. ./xml-builder-test/warnings.svg
  1649. +
  1650. ./xml-builder-test/TDValidationReport.txt
  1651. +
  1652. ./xml-builder-test/ssh.xml
  1653. +
  1654. ./xml-builder-test/css/diff.css
  1655. +
  1656. ./xml-builder-test/client-virt.xml
  1657. +
  1658. ./xml-builder-test/validation.svg
  1659. +
  1660. ./xml-builder-test/server-virt.xml
  1661. +
  1662. ./test1/pdf_count.svg
  1663. +
  1664. ./test1/meta-info.txt
  1665. +
  1666. ./test1/html_count.svg
  1667. +
  1668. ./test1/transforms.svg
  1669. +
  1670. ./test1/virtualization-release-linkable.html.pdf
  1671. +
  1672. ./test1/Minidash.adoc
  1673. +
  1674. ./test1/spell-badge.svg
  1675. +
  1676. ./test1/virtualization.html.pdf
  1677. +
  1678. ./test1/effective.xml
  1679. +
  1680. ./test1/pkg-ssh.xml
  1681. +
  1682. ./test1/HTMLs.adoc
  1683. +
  1684. ./test1/virtualization-release.html
  1685. +
  1686. ./test1/AppliedTDs.html
  1687. +
  1688. ./test1/virtualization.html
  1689. +
  1690. ./test1/virtualization-release-linkable.html
  1691. +
  1692. ./test1/PDFs.adoc
  1693. +
  1694. ./test1/tds.svg
  1695. +
  1696. ./test1/SanityChecksOutput.md
  1697. +
  1698. ./test1/AppliedTDs-Diff.html
  1699. +
  1700. ./test1/js/diff.js
  1701. +
  1702. ./test1/js/tooltip/wz_tooltip.js
  1703. +
  1704. ./test1/js/tooltip/tip_balloon.js
  1705. +
  1706. ./test1/js/tooltip/tip_balloon/t.gif
  1707. +
  1708. ./test1/js/tooltip/tip_balloon/lt.gif
  1709. +
  1710. ./test1/js/tooltip/tip_balloon/stemt.gif
  1711. +
  1712. ./test1/js/tooltip/tip_balloon/l.gif
  1713. +
  1714. ./test1/js/tooltip/tip_balloon/lb.gif
  1715. +
  1716. ./test1/js/tooltip/tip_balloon/r.gif
  1717. +
  1718. ./test1/js/tooltip/tip_balloon/b.gif
  1719. +
  1720. ./test1/js/tooltip/tip_balloon/rb.gif
  1721. +
  1722. ./test1/js/tooltip/tip_balloon/stemb.gif
  1723. +
  1724. ./test1/js/tooltip/tip_balloon/background.gif
  1725. +
  1726. ./test1/js/tooltip/tip_balloon/rt.gif
  1727. +
  1728. ./test1/js/dojo/dojo.js
  1729. +
  1730. ./test1/js/dojo/src/event.js
  1731. +
  1732. ./test1/js/dojo/src/html.js
  1733. +
  1734. ./test1/js/dojo/src/lang/__package__.js
  1735. +
  1736. ./test1/js/dojo/src/lang/func.js
  1737. +
  1738. ./test1/js/dojo/src/lang/repr.js
  1739. +
  1740. ./test1/js/dojo/src/lang/extras.js
  1741. +
  1742. ./test1/js/dojo/src/lang/array.js
  1743. +
  1744. ./test1/js/dojo/src/lang/common.js
  1745. +
  1746. ./test1/js/dojo/src/lang/timing/__package__.js
  1747. +
  1748. ./test1/js/dojo/src/lang/timing/Timer.js
  1749. +
  1750. ./test1/js/dojo/src/lang/timing/Streamer.js
  1751. +
  1752. ./test1/js/dojo/src/lang/type.js
  1753. +
  1754. ./test1/js/dojo/src/lang/declare.js
  1755. +
  1756. ./test1/js/dojo/src/lang/assert.js
  1757. +
  1758. ./test1/js/dojo/src/experimental.js
  1759. +
  1760. ./test1/js/dojo/src/event/__package__.js
  1761. +
  1762. ./test1/js/dojo/src/event/topic.js
  1763. +
  1764. ./test1/js/dojo/src/event/common.js
  1765. +
  1766. ./test1/js/dojo/src/event/browser.js
  1767. +
  1768. ./test1/js/dojo/src/html/style.js
  1769. +
  1770. ./test1/js/dojo/src/html/metrics.js
  1771. +
  1772. ./test1/js/dojo/src/html/__package__.js
  1773. +
  1774. ./test1/js/dojo/src/html/shadow.js
  1775. +
  1776. ./test1/js/dojo/src/html/util.js
  1777. +
  1778. ./test1/js/dojo/src/html/color.js
  1779. +
  1780. ./test1/js/dojo/src/html/common.js
  1781. +
  1782. ./test1/js/dojo/src/html/display.js
  1783. +
  1784. ./test1/js/dojo/src/html/selection.js
  1785. +
  1786. ./test1/js/dojo/src/html/layout.js
  1787. +
  1788. ./test1/js/dojo/src/lang.js
  1789. +
  1790. ./test1/images/diff-next.gif
  1791. +
  1792. ./test1/images/diffplus.gif
  1793. +
  1794. ./test1/images/cclogo.png
  1795. +
  1796. ./test1/images/diffmin.gif
  1797. +
  1798. ./test1/images/figure1.png
  1799. +
  1800. ./test1/images/network.png
  1801. +
  1802. ./test1/images/diff-first.gif
  1803. +
  1804. ./test1/images/diff-last.gif
  1805. +
  1806. ./test1/images/niaplogo.png
  1807. +
  1808. ./test1/images/Toe.png
  1809. +
  1810. ./test1/images/diffunderline.gif
  1811. +
  1812. ./test1/images/expanded.png
  1813. +
  1814. ./test1/images/diff-previous.gif
  1815. +
  1816. ./test1/images/collapsed.png
  1817. +
  1818. ./test1/images/niaplogodraft.png
  1819. +
  1820. ./test1/ValidationReport.txt
  1821. +
  1822. ./test1/SpellCheckReport.txt
  1823. +
  1824. ./test1/warnings.svg
  1825. +
  1826. ./test1/pkg-tls.xml
  1827. +
  1828. ./test1/TDValidationReport.txt
  1829. +
  1830. ./test1/css/diff.css
  1831. +
  1832. ./test1/client-virt.xml
  1833. +
  1834. ./test1/virtualization-release.html.pdf
  1835. +
  1836. ./test1/validation.svg
  1837. +
  1838. ./test1/server-virt.xml
  1839. +
  1840. ./images/cclogo.png
  1841. ./images/figure1.png
  1842. -
  1843. ./images/collapsed.png
  1844. +
  1845. ./images/network.png
  1846. ./images/niaplogo.png
  1847. +
  1848. ./images/Toe.png
  1849. ./images/expanded.png
  1850. -
  1851. ./images/network.png
  1852. +
  1853. ./images/collapsed.png
  1854. ./images/niaplogodraft.png
  1855. -
  1856. ./images/cclogo.png
  1857. -
  1858. ./images/Toe.png
  1859. -
  1860. ./.git
  1861. -
  1862. ./.git/hooks/update.sample
  1863. -
  1864. ./.git/hooks/pre-rebase.sample
  1865. -
  1866. ./.git/hooks/pre-commit.sample
  1867. -
  1868. ./.git/hooks/fsmonitor-watchman.sample
  1869. -
  1870. ./.git/hooks/applypatch-msg.sample
  1871. -
  1872. ./.git/hooks/pre-applypatch.sample
  1873. -
  1874. ./.git/hooks/post-update.sample
  1875. -
  1876. ./.git/hooks/pre-merge-commit.sample
  1877. -
  1878. ./.git/hooks/sendemail-validate.sample
  1879. -
  1880. ./.git/hooks/prepare-commit-msg.sample
  1881. -
  1882. ./.git/hooks/pre-receive.sample
  1883. -
  1884. ./.git/hooks/push-to-checkout.sample
  1885. -
  1886. ./.git/hooks/commit-msg.sample
  1887. -
  1888. ./.git/hooks/pre-push.sample
  1889. -
  1890. ./.git/objects/pack/pack-fb474a0d253ba79c2d42236fc9ac847a754ab8f4.idx
  1891. -
  1892. ./.git/objects/pack/pack-fb474a0d253ba79c2d42236fc9ac847a754ab8f4.rev
  1893. -
  1894. ./.git/objects/pack/pack-fb474a0d253ba79c2d42236fc9ac847a754ab8f4.pack
  1895. +
  1896. ./pkg-tls.xml
  1897. +
  1898. ./test3/pdf_count.svg
  1899. +
  1900. ./test3/meta-info.txt
  1901. ./test3/html_count.svg
  1902. -
  1903. ./test3/pkg-ssh.xml
  1904. -
  1905. ./test3/pkg-tls.xml
  1906. ./test3/transforms.svg
  1907. -
  1908. ./test3/client-virt.xml
  1909. ./test3/virtualization-release-linkable.html.pdf
  1910. -
  1911. ./test3/pdf_count.svg
  1912. +
  1913. ./test3/Minidash.adoc
  1914. +
  1915. ./test3/spell-badge.svg
  1916. +
  1917. ./test3/virtualization.html.pdf
  1918. +
  1919. ./test3/effective.xml
  1920. +
  1921. ./test3/pkg-ssh.xml
  1922. ./test3/HTMLs.adoc
  1923. -
  1924. ./test3/TDValidationReport.txt
  1925. ./test3/virtualization-release.html
  1926. +
  1927. ./test3/AppliedTDs.html
  1928. +
  1929. ./test3/virtualization.html
  1930. +
  1931. ./test3/virtualization-release-linkable.html
  1932. +
  1933. ./test3/PDFs.adoc
  1934. +
  1935. ./test3/tds.svg
  1936. ./test3/SanityChecksOutput.md
  1937. -
  1938. ./test3/Minidash.adoc
  1939. -
  1940. ./test3/validation.svg
  1941. ./test3/AppliedTDs-Diff.html
  1942. -
  1943. ./test3/virtualization.html
  1944. -
  1945. ./test3/SpellCheckReport.txt
  1946. -
  1947. ./test3/server-virt.xml
  1948. -
  1949. ./test3/ValidationReport.txt
  1950. -
  1951. ./test3/virtualization-release.html.pdf
  1952. -
  1953. ./test3/css/diff.css
  1954. -
  1955. ./test3/meta-info.txt
  1956. ./test3/js/diff.js
  1957. -
  1958. ./test3/js/dojo/src/lang.js
  1959. -
  1960. ./test3/js/dojo/src/event/browser.js
  1961. -
  1962. ./test3/js/dojo/src/event/topic.js
  1963. -
  1964. ./test3/js/dojo/src/event/common.js
  1965. -
  1966. ./test3/js/dojo/src/event/__package__.js
  1967. +
  1968. ./test3/js/tooltip/wz_tooltip.js
  1969. +
  1970. ./test3/js/tooltip/tip_balloon.js
  1971. +
  1972. ./test3/js/tooltip/tip_balloon/t.gif
  1973. +
  1974. ./test3/js/tooltip/tip_balloon/lt.gif
  1975. +
  1976. ./test3/js/tooltip/tip_balloon/stemt.gif
  1977. +
  1978. ./test3/js/tooltip/tip_balloon/l.gif
  1979. +
  1980. ./test3/js/tooltip/tip_balloon/lb.gif
  1981. +
  1982. ./test3/js/tooltip/tip_balloon/r.gif
  1983. +
  1984. ./test3/js/tooltip/tip_balloon/b.gif
  1985. +
  1986. ./test3/js/tooltip/tip_balloon/rb.gif
  1987. +
  1988. ./test3/js/tooltip/tip_balloon/stemb.gif
  1989. +
  1990. ./test3/js/tooltip/tip_balloon/background.gif
  1991. +
  1992. ./test3/js/tooltip/tip_balloon/rt.gif
  1993. +
  1994. ./test3/js/dojo/dojo.js
  1995. ./test3/js/dojo/src/event.js
  1996. +
  1997. ./test3/js/dojo/src/html.js
  1998. +
  1999. ./test3/js/dojo/src/lang/__package__.js
  2000. ./test3/js/dojo/src/lang/func.js
  2001. -
  2002. ./test3/js/dojo/src/lang/timing/Timer.js
  2003. -
  2004. ./test3/js/dojo/src/lang/timing/Streamer.js
  2005. -
  2006. ./test3/js/dojo/src/lang/timing/__package__.js
  2007. -
  2008. ./test3/js/dojo/src/lang/type.js
  2009. -
  2010. ./test3/js/dojo/src/lang/array.js
  2011. ./test3/js/dojo/src/lang/repr.js
  2012. ./test3/js/dojo/src/lang/extras.js
  2013. +
  2014. ./test3/js/dojo/src/lang/array.js
  2015. ./test3/js/dojo/src/lang/common.js
  2016. -
  2017. ./test3/js/dojo/src/lang/assert.js
  2018. +
  2019. ./test3/js/dojo/src/lang/timing/__package__.js
  2020. +
  2021. ./test3/js/dojo/src/lang/timing/Timer.js
  2022. +
  2023. ./test3/js/dojo/src/lang/timing/Streamer.js
  2024. +
  2025. ./test3/js/dojo/src/lang/type.js
  2026. ./test3/js/dojo/src/lang/declare.js
  2027. -
  2028. ./test3/js/dojo/src/lang/__package__.js
  2029. -
  2030. ./test3/js/dojo/src/html.js
  2031. -
  2032. ./test3/js/dojo/src/html/util.js
  2033. -
  2034. ./test3/js/dojo/src/html/display.js
  2035. -
  2036. ./test3/js/dojo/src/html/layout.js
  2037. -
  2038. ./test3/js/dojo/src/html/color.js
  2039. -
  2040. ./test3/js/dojo/src/html/common.js
  2041. -
  2042. ./test3/js/dojo/src/html/shadow.js
  2043. +
  2044. ./test3/js/dojo/src/lang/assert.js
  2045. +
  2046. ./test3/js/dojo/src/experimental.js
  2047. +
  2048. ./test3/js/dojo/src/event/__package__.js
  2049. +
  2050. ./test3/js/dojo/src/event/topic.js
  2051. +
  2052. ./test3/js/dojo/src/event/common.js
  2053. +
  2054. ./test3/js/dojo/src/event/browser.js
  2055. ./test3/js/dojo/src/html/style.js
  2056. ./test3/js/dojo/src/html/metrics.js
  2057. ./test3/js/dojo/src/html/__package__.js
  2058. +
  2059. ./test3/js/dojo/src/html/shadow.js
  2060. +
  2061. ./test3/js/dojo/src/html/util.js
  2062. +
  2063. ./test3/js/dojo/src/html/color.js
  2064. +
  2065. ./test3/js/dojo/src/html/common.js
  2066. +
  2067. ./test3/js/dojo/src/html/display.js
  2068. ./test3/js/dojo/src/html/selection.js
  2069. -
  2070. ./test3/js/dojo/src/experimental.js
  2071. -
  2072. ./test3/js/dojo/dojo.js
  2073. -
  2074. ./test3/js/tooltip/tip_balloon.js
  2075. -
  2076. ./test3/js/tooltip/tip_balloon/stemt.gif
  2077. -
  2078. ./test3/js/tooltip/tip_balloon/lt.gif
  2079. -
  2080. ./test3/js/tooltip/tip_balloon/t.gif
  2081. -
  2082. ./test3/js/tooltip/tip_balloon/stemb.gif
  2083. -
  2084. ./test3/js/tooltip/tip_balloon/b.gif
  2085. -
  2086. ./test3/js/tooltip/tip_balloon/l.gif
  2087. -
  2088. ./test3/js/tooltip/tip_balloon/rt.gif
  2089. -
  2090. ./test3/js/tooltip/tip_balloon/lb.gif
  2091. -
  2092. ./test3/js/tooltip/tip_balloon/r.gif
  2093. -
  2094. ./test3/js/tooltip/tip_balloon/background.gif
  2095. -
  2096. ./test3/js/tooltip/tip_balloon/rb.gif
  2097. -
  2098. ./test3/js/tooltip/wz_tooltip.js
  2099. -
  2100. ./test3/AppliedTDs.html
  2101. -
  2102. ./test3/virtualization-release-linkable.html
  2103. -
  2104. ./test3/images/diff-previous.gif
  2105. -
  2106. ./test3/images/figure1.png
  2107. -
  2108. ./test3/images/collapsed.png
  2109. -
  2110. ./test3/images/niaplogo.png
  2111. -
  2112. ./test3/images/expanded.png
  2113. -
  2114. ./test3/images/network.png
  2115. -
  2116. ./test3/images/niaplogodraft.png
  2117. -
  2118. ./test3/images/cclogo.png
  2119. -
  2120. ./test3/images/Toe.png
  2121. +
  2122. ./test3/js/dojo/src/html/layout.js
  2123. +
  2124. ./test3/js/dojo/src/lang.js
  2125. +
  2126. ./test3/images/diff-next.gif
  2127. ./test3/images/diffplus.gif
  2128. +
  2129. ./test3/images/cclogo.png
  2130. ./test3/images/diffmin.gif
  2131. +
  2132. ./test3/images/figure1.png
  2133. +
  2134. ./test3/images/network.png
  2135. ./test3/images/diff-first.gif
  2136. -
  2137. ./test3/images/diff-next.gif
  2138. -
  2139. ./test3/images/diffunderline.gif
  2140. ./test3/images/diff-last.gif
  2141. +
  2142. ./test3/images/niaplogo.png
  2143. +
  2144. ./test3/images/Toe.png
  2145. +
  2146. ./test3/images/diffunderline.gif
  2147. +
  2148. ./test3/images/expanded.png
  2149. +
  2150. ./test3/images/diff-previous.gif
  2151. +
  2152. ./test3/images/collapsed.png
  2153. +
  2154. ./test3/images/niaplogodraft.png
  2155. +
  2156. ./test3/ValidationReport.txt
  2157. +
  2158. ./test3/SpellCheckReport.txt
  2159. ./test3/warnings.svg
  2160. -
  2161. ./test3/spell-badge.svg
  2162. -
  2163. ./test3/PDFs.adoc
  2164. -
  2165. ./test3/effective.xml
  2166. -
  2167. ./test3/virtualization.html.pdf
  2168. -
  2169. ./test3/tds.svg
  2170. +
  2171. ./test3/pkg-tls.xml
  2172. +
  2173. ./test3/TDValidationReport.txt
  2174. +
  2175. ./test3/css/diff.css
  2176. +
  2177. ./test3/client-virt.xml
  2178. +
  2179. ./test3/virtualization-release.html.pdf
  2180. +
  2181. ./test3/validation.svg
  2182. +
  2183. ./test3/server-virt.xml
  2184. +
  2185. ./release-1.1
  2186. +
  2187. ./release-1.1/pdf_count.svg
  2188. +
  2189. ./release-1.1/tls.xml
  2190. +
  2191. ./release-1.1/meta-info.txt
  2192. +
  2193. ./release-1.1/html_count.svg
  2194. +
  2195. ./release-1.1/transforms.svg
  2196. +
  2197. ./release-1.1/virtualization-release-linkable.html.pdf
  2198. +
  2199. ./release-1.1/Minidash.adoc
  2200. +
  2201. ./release-1.1/spell-badge.svg
  2202. +
  2203. ./release-1.1/virtualization.html.pdf
  2204. +
  2205. ./release-1.1/effective.xml
  2206. +
  2207. ./release-1.1/HTMLs.adoc
  2208. +
  2209. ./release-1.1/virtualization-release.html
  2210. +
  2211. ./release-1.1/AppliedTDs.html
  2212. +
  2213. ./release-1.1/virtualization.html
  2214. +
  2215. ./release-1.1/virtualization-release-linkable.html
  2216. +
  2217. ./release-1.1/PDFs.adoc
  2218. +
  2219. ./release-1.1/tds.svg
  2220. +
  2221. ./release-1.1/SanityChecksOutput.md
  2222. +
  2223. ./release-1.1/AppliedTDs-Diff.html
  2224. +
  2225. ./release-1.1/js/diff.js
  2226. +
  2227. ./release-1.1/js/tooltip/wz_tooltip.js
  2228. +
  2229. ./release-1.1/js/tooltip/tip_balloon.js
  2230. +
  2231. ./release-1.1/js/tooltip/tip_balloon/t.gif
  2232. +
  2233. ./release-1.1/js/tooltip/tip_balloon/lt.gif
  2234. +
  2235. ./release-1.1/js/tooltip/tip_balloon/stemt.gif
  2236. +
  2237. ./release-1.1/js/tooltip/tip_balloon/l.gif
  2238. +
  2239. ./release-1.1/js/tooltip/tip_balloon/lb.gif
  2240. +
  2241. ./release-1.1/js/tooltip/tip_balloon/r.gif
  2242. +
  2243. ./release-1.1/js/tooltip/tip_balloon/b.gif
  2244. +
  2245. ./release-1.1/js/tooltip/tip_balloon/rb.gif
  2246. +
  2247. ./release-1.1/js/tooltip/tip_balloon/stemb.gif
  2248. +
  2249. ./release-1.1/js/tooltip/tip_balloon/background.gif
  2250. +
  2251. ./release-1.1/js/tooltip/tip_balloon/rt.gif
  2252. +
  2253. ./release-1.1/js/dojo/dojo.js
  2254. +
  2255. ./release-1.1/js/dojo/src/event.js
  2256. +
  2257. ./release-1.1/js/dojo/src/html.js
  2258. +
  2259. ./release-1.1/js/dojo/src/lang/__package__.js
  2260. +
  2261. ./release-1.1/js/dojo/src/lang/func.js
  2262. +
  2263. ./release-1.1/js/dojo/src/lang/repr.js
  2264. +
  2265. ./release-1.1/js/dojo/src/lang/extras.js
  2266. +
  2267. ./release-1.1/js/dojo/src/lang/array.js
  2268. +
  2269. ./release-1.1/js/dojo/src/lang/common.js
  2270. +
  2271. ./release-1.1/js/dojo/src/lang/timing/__package__.js
  2272. +
  2273. ./release-1.1/js/dojo/src/lang/timing/Timer.js
  2274. +
  2275. ./release-1.1/js/dojo/src/lang/timing/Streamer.js
  2276. +
  2277. ./release-1.1/js/dojo/src/lang/type.js
  2278. +
  2279. ./release-1.1/js/dojo/src/lang/declare.js
  2280. +
  2281. ./release-1.1/js/dojo/src/lang/assert.js
  2282. +
  2283. ./release-1.1/js/dojo/src/experimental.js
  2284. +
  2285. ./release-1.1/js/dojo/src/event/__package__.js
  2286. +
  2287. ./release-1.1/js/dojo/src/event/topic.js
  2288. +
  2289. ./release-1.1/js/dojo/src/event/common.js
  2290. +
  2291. ./release-1.1/js/dojo/src/event/browser.js
  2292. +
  2293. ./release-1.1/js/dojo/src/html/style.js
  2294. +
  2295. ./release-1.1/js/dojo/src/html/metrics.js
  2296. +
  2297. ./release-1.1/js/dojo/src/html/__package__.js
  2298. +
  2299. ./release-1.1/js/dojo/src/html/shadow.js
  2300. +
  2301. ./release-1.1/js/dojo/src/html/util.js
  2302. +
  2303. ./release-1.1/js/dojo/src/html/color.js
  2304. +
  2305. ./release-1.1/js/dojo/src/html/common.js
  2306. +
  2307. ./release-1.1/js/dojo/src/html/display.js
  2308. +
  2309. ./release-1.1/js/dojo/src/html/selection.js
  2310. +
  2311. ./release-1.1/js/dojo/src/html/layout.js
  2312. +
  2313. ./release-1.1/js/dojo/src/lang.js
  2314. +
  2315. ./release-1.1/images/diff-next.gif
  2316. +
  2317. ./release-1.1/images/diffplus.gif
  2318. +
  2319. ./release-1.1/images/cclogo.png
  2320. +
  2321. ./release-1.1/images/diffmin.gif
  2322. +
  2323. ./release-1.1/images/figure1.png
  2324. +
  2325. ./release-1.1/images/network.png
  2326. +
  2327. ./release-1.1/images/diff-first.gif
  2328. +
  2329. ./release-1.1/images/diff-last.gif
  2330. +
  2331. ./release-1.1/images/niaplogo.png
  2332. +
  2333. ./release-1.1/images/Toe.png
  2334. +
  2335. ./release-1.1/images/diffunderline.gif
  2336. +
  2337. ./release-1.1/images/expanded.png
  2338. +
  2339. ./release-1.1/images/diff-previous.gif
  2340. +
  2341. ./release-1.1/images/collapsed.png
  2342. +
  2343. ./release-1.1/images/niaplogodraft.png
  2344. +
  2345. ./release-1.1/ValidationReport.txt
  2346. +
  2347. ./release-1.1/SpellCheckReport.txt
  2348. +
  2349. ./release-1.1/warnings.svg
  2350. +
  2351. ./release-1.1/TDValidationReport.txt
  2352. +
  2353. ./release-1.1/ssh.xml
  2354. +
  2355. ./release-1.1/css/diff.css
  2356. +
  2357. ./release-1.1/client-virt.xml
  2358. +
  2359. ./release-1.1/virtualization-release.html.pdf
  2360. +
  2361. ./release-1.1/validation.svg
  2362. +
  2363. ./release-1.1/server-virt.xml
diff --git a/xml-builder-test/AppliedTDs-Diff.html b/xml-builder-test/AppliedTDs-Diff.html index 761f65c..2104627 100644 --- a/xml-builder-test/AppliedTDs-Diff.html +++ b/xml-builder-test/AppliedTDs-Diff.html @@ -46,7 +46,7 @@

Contents

- 1Introduction1.1Compliant Targets of Evaluation1.2Terms1.2.1Common Criteria Terms1.2.2Technical Terms1.3Use Cases2Conformance Claims3Security Problem Definition3.1Threats3.2Assumptions3.3Organizational Security Policies4Security Objectives4.1Security Objectives for the TOE4.2Security Objectives for the Operational Environment4.3Security Objectives Rationale5Security Requirements5.1Security Functional Requirements5.1.1Class: Security Audit (FAU)5.1.2Class: Cryptographic Support (FCS)5.1.3Class: User Data Protection (FDP)5.1.4Class: Identification and Authentication (FIA)5.1.5Class: Security Management (FMT)5.1.6Class: Protection of the TSF (FPT)5.1.7Class: TOE Access Banner (FTA)5.1.8Class: Trusted Path/Channel (FTP)5.1.9TOE Security Functional Requirements Rationale5.2Security Assurance Requirements5.2.1Class ASE: Security Target Evaluation5.2.2Class ADV: Development5.2.3Class AGD: Guidance Documents5.2.4Class ALC: Life-Cycle Support5.2.5Class ATE: Tests5.2.6Class AVA: Vulnerability AssessmentAppendix A - Optional RequirementsA.1Strictly Optional Requirements A.1.1Class: Security Audit (FAU)A.1.2Class: Protection of the TSF (FPT)A.2Objective Requirements A.2.1Class: Protection of the TSF (FPT)A.3Implementation-dependent Requirements Appendix B - Selection-based Requirements B.1Class: Cryptographic Support (FCS)B.2Class: Identification and Authentication (FIA)B.3Class: Protection of the TSF (FPT)Appendix C - Implicitly Satisfied RequirementsAppendix D - Entropy Documentation and AssessmentD.1Design DescriptionD.2Entropy JustificationD.3Operating ConditionsD.4Health TestingAppendix E - Equivalency GuidelinesE.1IntroductionE.2Approach to Equivalency AnalysisE.3Specific Guidance for Determining Product Model EquivalenceE.4Specific Guidance for Determining Product Version EquivalenceE.5Specific Guidance for Determining Platform EquivalenceE.5.1Hardware Platform EquivalenceE.5.2Software Platform EquivalenceE.6Level of Specificity for Tested and Claimed Equivalent ConfigurationsAppendix F - AcronymsAppendix G - Bibliography + 1Introduction1.1Compliant Targets of Evaluation1.2Terms1.2.1Common Criteria Terms1.2.2Technical Terms1.3Use Cases2Conformance Claims3Security Problem Definition3.1Threats3.2Assumptions3.3Organizational Security Policies4Security Objectives4.1Security Objectives for the TOE4.2Security Objectives for the Operational Environment4.3Security Objectives Rationale5Security Requirements5.1Security Functional Requirements5.1.1Class: Security Audit (FAU)5.1.2Class: Cryptographic Support (FCS)5.1.3Class: User Data Protection (FDP)5.1.4Class: Identification and Authentication (FIA)5.1.5Class: Security Management (FMT)5.1.6Class: Protection of the TSF (FPT)5.1.7Class: TOE Access Banner (FTA)5.1.8Class: Trusted Path/Channel (FTP)5.1.9TOE Security Functional Requirements Rationale5.2Security Assurance Requirements5.2.1Class ASE: Security Target Evaluation5.2.2Class ADV: Development5.2.3Class AGD: Guidance Documents5.2.4Class ALC: Life-Cycle Support5.2.5Class ATE: Tests5.2.6Class AVA: Vulnerability AssessmentAppendix A - Optional RequirementsA.1Strictly Optional Requirements A.1.1Class: Security Audit (FAU)A.1.2Class: Protection of the TSF (FPT)A.2Objective Requirements A.2.1Class: Protection of the TSF (FPT)A.3Implementation-dependent Requirements Appendix B - Selection-based Requirements B.1Class: Cryptographic Support (FCS)B.2Class: Identification and Authentication (FIA)B.3Class: Protection of the TSF (FPT)Appendix C - Implicitly Satisfied RequirementsAppendix D - Entropy Documentation and AssessmentD.1Design DescriptionD.2Entropy JustificationD.3Operating ConditionsD.4Health TestingAppendix E - Equivalency GuidelinesE.1IntroductionE.2Approach to Equivalency AnalysisE.3Specific Guidance for Determining Product Model EquivalenceE.4Specific Guidance for Determining Product Version EquivalenceE.5Specific Guidance for Determining Platform EquivalenceE.5.1Hardware Platform EquivalenceE.5.2Software Platform EquivalenceE.6Level of Specificity for Tested and Claimed Equivalent ConfigurationsAppendix F - AcronymsAppendix G - Bibliography

1 Introduction

1.1 Compliant Targets of Evaluation

@@ -176,7 +176,7 @@

1.2.2 Technical Terms

-
Guest Operating System (OS)
+
Guest Operating System
An operating system that runs within a Guest VM. @@ -191,7 +191,7 @@

1.2.2 Technical Terms

-
Host Operating System (OS)
+
Host Operating System
An operating system onto which a VS is installed. Relative to the VS, the Host OS is part of the Platform. There need not be a Host OS, but often VSes employ a Host OS or Control Domain to support guest access to host resources. Sometimes these domains are themselves encapsulated within VMs. @@ -246,7 +246,7 @@

1.2.2 Technical Terms

-
System Security Policy (SSP)
+
System Security Policy
The overall policy enforced by the VS defining constraints on the behavior of VMs and users. @@ -256,17 +256,17 @@

1.2.2 Technical Terms

-
Virtual Machine (VM)
+
Virtual Machine
A Virtual Machine is a virtualized hardware environment in which an operating system may execute. -
Virtual Machine Manager (VMM)
+
Virtual Machine Manager
A VMM is a collection of software components responsible for enabling VMs to function as expected by the software executing within them. Generally, the VMM consists of a Hypervisor, Service VMs, and other components of the VS, such as virtual devices, binary translation systems, and physical device drivers. It manages concurrent execution of all VMs and virtualizes platform resources as needed. -
Virtualization System (VS)
+
Virtualization System
A software product that enables multiple independent computing systems to execute on the same physical hardware platform without interference from one another. For the purposes of this document, the VS consists of a Virtual Machine Manager (VMM), Virtual Machine abstractions, a management subsystem, and other components. @@ -296,13 +296,13 @@

2 Conformance Claim
This PP is conformant to Parts 2 (extended) and 3 (extended) of Common Criteria Version 3.1, Release 5 [CC].
-
PP Claim
+
PP Claims

-
Package Claim
+
Package Claims

@@ -311,57 +311,56 @@

2 Conformance Claim

3 Security Problem Definition

-

3.1 Threats

T.3P_SOFTWARE
- In some VS implementations, functions critical to the security of the TOE are by necessity performed by software not produced by the virtualization vendor. Such software may include physical device drivers, and even non-TOE entities such as Host Operating Systems. Since this software has the same or similar privilege level as the VS, vulnerabilities can be exploited by an adversary to compromise the VS and VMs. Where possible, the VS should mitigate the results of potential vulnerabilities or malicious content in third-party code on which it relies. For example, physical device drivers (potentially the Host OS) could be encapsulated within VMs in order to limit the effects of compromise. + In some VS implementations, functions critical to the security of the TOE are by necessity performed by software not produced by the virtualization vendor. Such software may include physical device drivers, and even non-TOE entities such as Host Operating Systems. Since this software has the same or similar privilege level as the VS, vulnerabilities can be exploited by an adversary to compromise the VS and VMs. Where possible, the VS should mitigate the results of potential vulnerabilities or malicious content in third-party code on which it relies. For example, physical device drivers (potentially the Host OS) could be encapsulated within VMs in order to limit the effects of compromise.
T.DATA_LEAKAGE
- It is a fundamental property of VMs that the domains encapsulated by different VMs remain separate unless data sharing is permitted by policy. For this reason, all Virtualization Systems shall support a policythat prohibits information transfer between VMs. It shall be possible to configure VMs such that data cannot be moved between domains from VM to VM, orthrough virtual or physical network components under the control of the VS. When VMs are configured assuch, it shall not be possible for data to leak between domains, neither by the express efforts ofsoftware or users of a VM, nor because of vulnerabilities or errors in the implementation of the VMM orother VS components. If it is possible for data to leak between domains when prohibited by policy, then an adversary on one domain or network can obtain data from another domain. Such cross-domain data leakage can, for example, causeclassified information, corporate proprietary information, or personally identifiable information to bemade accessible to unauthorized entities. + It is a fundamental property of VMs that the domains encapsulated by different VMs remain separate unless data sharing is permitted by policy. For this reason, all Virtualization Systems shall support a policythat prohibits information transfer between VMs. It shall be possible to configure VMs such that data cannot be moved between domains from VM to VM, orthrough virtual or physical network components under the control of the VS. When VMs are configured assuch, it shall not be possible for data to leak between domains, neither by the express efforts ofsoftware or users of a VM, nor because of vulnerabilities or errors in the implementation of the VMM orother VS components. If it is possible for data to leak between domains when prohibited by policy, then an adversary on one domain or network can obtain data from another domain. Such cross-domain data leakage can, for example, causeclassified information, corporate proprietary information, or personally identifiable information to bemade accessible to unauthorized entities.
T.DENIAL_OF_SERVICE
- A VM may block others from system resources (e.g., system memory, persistent storage, and processing time) via a resource exhaustion attack. + A VM may block others from system resources (e.g., system memory, persistent storage, and processing time) via a resource exhaustion attack.
T.MISCONFIGURATION
- The VS may be misconfigured, which could impact its functioning and security. This misconfiguration could be due to an administrative error or the use of faulty configuration data. + The VS may be misconfigured, which could impact its functioning and security. This misconfiguration could be due to an administrative error or the use of faulty configuration data.
T.PLATFORM_COMPROMISE
- The VS must be capable of protecting the platform from threats that originate within VMs and operational networks connected to the VS. The hosting of untrusted—even malicious—domains by the VS cannot be permitted to compromise the security and integrity of the platform on which the VS executes. If an attacker can access the underlying platform in a manner not controlled by the VMM, the attacker might be able to modify system firmware or software—compromising both the VS and the underlying platform. + The VS must be capable of protecting the platform from threats that originate within VMs and operational networks connected to the VS. The hosting of untrusted—even malicious—domains by the VS cannot be permitted to compromise the security and integrity of the platform on which the VS executes. If an attacker can access the underlying platform in a manner not controlled by the VMM, the attacker might be able to modify system firmware or software—compromising both the VS and the underlying platform.
T.UNAUTHORIZED_ACCESS
- Functions performed by the management layer include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only certain authorized system users (administrators) are allowed to exercise management functions or obtain sensitive information from the TOE. Virtualization Systems are often managed remotely over communication networks. Members of these networks can be both geographically and logically separated from each other, and pass through a variety of other systems which may be under the control of an adversary, and offer the opportunity for communications to be compromised. An adversary with access to an open management network could inject commands into the management infrastructure or extract sensitive information. This would provide an adversary with administrator privilege on the platform, and administrative control over the VMs and virtual network connections. The adversary could also gain access to the management network by hijacking the management network channel. + Functions performed by the management layer include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only certain authorized system users (administrators) are allowed to exercise management functions or obtain sensitive information from the TOE. Virtualization Systems are often managed remotely over communication networks. Members of these networks can be both geographically and logically separated from each other, and pass through a variety of other systems which may be under the control of an adversary, and offer the opportunity for communications to be compromised. An adversary with access to an open management network could inject commands into the management infrastructure or extract sensitive information. This would provide an adversary with administrator privilege on the platform, and administrative control over the VMs and virtual network connections. The adversary could also gain access to the management network by hijacking the management network channel.
T.UNAUTHORIZED_MODIFICATION
- System integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. Malware running on the platform must not be able to undetectably modify VS components while the system is running or at rest. Likewise, malicious code running within a virtual machine must not be able to modify Virtualization System components. + System integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. Malware running on the platform must not be able to undetectably modify VS components while the system is running or at rest. Likewise, malicious code running within a virtual machine must not be able to modify Virtualization System components.
T.UNAUTHORIZED_UPDATE
- It is common for attackers to target outdated versions of software containing known flaws. This means it is extremely important to update VS software as soon as possible when updates are available. But the source of the updates and the updates themselves must be trusted. If an attacker can write their own update containing malicious code they can take control of the VS. + It is common for attackers to target outdated versions of software containing known flaws. This means it is extremely important to update VS software as soon as possible when updates are available. But the source of the updates and the updates themselves must be trusted. If an attacker can write their own update containing malicious code they can take control of the VS.
T.UNPATCHED_SOFTWARE
- Vulnerabilities in outdated or unpatched software can be exploited by adversaries to compromise the VS or platform. + Vulnerabilities in outdated or unpatched software can be exploited by adversaries to compromise the VS or platform.
T.USER_ERROR
- If a Virtualization System is capable of simultaneously displaying VMs of different domains to the same user at the same time, there is always the chance that the user will become confused and unintentionally leak information between domains. This is especially likely if VMs belonging to different domains are indistinguishable. Malicious code may also attempt to interfere with the user’s ability to distinguish between domains. The VS must take measures to minimize the likelihood of such confusion. + If a Virtualization System is capable of simultaneously displaying VMs of different domains to the same user at the same time, there is always the chance that the user will become confused and unintentionally leak information between domains. This is especially likely if VMs belonging to different domains are indistinguishable. Malicious code may also attempt to interfere with the user’s ability to distinguish between domains. The VS must take measures to minimize the likelihood of such confusion.
T.VMM_COMPROMISE
- The VS is designed to provide the appearance of exclusivity to the VMs and is designed to separate or isolate their functions except where specifically shared. Failure of security mechanisms could lead to unauthorized intrusion into or modification of the VMM, or bypass of the VMM altogether, by non-TOE software, such as that running in Guest or Helper VMs or on the host platform. This must be prevented to avoid compromising the VS. + The VS is designed to provide the appearance of exclusivity to the VMs and is designed to separate or isolate their functions except where specifically shared. Failure of security mechanisms could lead to unauthorized intrusion into or modification of the VMM, or bypass of the VMM altogether, by non-TOE software, such as that running in Guest or Helper VMs or on the host platform. This must be prevented to avoid compromising the VS.
T.WEAK_CRYPTO
- To the extent that VMs appear isolated within the VS, a threat of weak cryptography may arise if the VMM does not provide good entropy to support security-related features that depend on entropy to implement cryptographic algorithms. For example, a random number generator keeps an estimate of the number of bits of noise in the entropy pool. From this entropy pool random numbers are created. Good random numbers are essential to implementing strong cryptography. Cryptography implemented using poor random numbers can be defeated by a sophisticated adversary. Such defeat can result in the compromise of Guest VM data and credentials, and of VS data and credentials, and can enable unauthorized access to the VS or VMs. + To the extent that VMs appear isolated within the VS, a threat of weak cryptography may arise if the VMM does not provide good entropy to support security-related features that depend on entropy to implement cryptographic algorithms. For example, a random number generator keeps an estimate of the number of bits of noise in the entropy pool. From this entropy pool random numbers are created. Good random numbers are essential to implementing strong cryptography. Cryptography implemented using poor random numbers can be defeated by a sophisticated adversary. Such defeat can result in the compromise of Guest VM data and credentials, and of VS data and credentials, and can enable unauthorized access to the VS or VMs.
@@ -370,7 +369,7 @@

3.2 Assumptions

A.NON_MALICIOUS_USER
- The user of the VS is not willfully negligent or hostile, and uses the VS in compliance with the applied enterprise security policy and guidance. At the same time, malicious applications could act as the user, so requirements which confine malicious applications are still in scope. + The user of the VS is not willfully negligent or hostile, and uses the VS in compliance with the applied enterprise security policy and guidance. At the same time, malicious applications could act as the user, so requirements which confine malicious applications are still in scope.
A.PHYSICAL
@@ -378,7 +377,7 @@

3.2 Assumptions

A.PLATFORM_INTEGRITY
- The platform has not been compromised prior to installation of the VS. + The platform has not been compromised prior to installation of the VS.
A.TRUSTED_ADMIN
@@ -398,23 +397,23 @@

4.1 Se

O.CORRECTLY_APPLIED_CONFIGURATION
- The TOE must not apply configurations that violate the current security policy. The TOE must correctly apply configurations and policies to a newly created Guest VM, as well as to existing Guest VMs when applicable configuration or policy changes are made. All changes to configuration and to policy must conform to the existing security policy. Similarly, changes made to the configuration of the TOE itself must not violate the existing security policy. + The TOE must not apply configurations that violate the current security policy. The TOE must correctly apply configurations and policies to a newly created Guest VM, as well as to existing Guest VMs when applicable configuration or policy changes are made. All changes to configuration and to policy must conform to the existing security policy. Similarly, changes made to the configuration of the TOE itself must not violate the existing security policy.
O.DOMAIN_INTEGRITY
- While the VS is not responsible for the contents or correct functioning of software that runs within Guest VMs, it is responsible for ensuring that the correct functioning of the software within a Guest VM is not interfered with by other VMs. + While the VS is not responsible for the contents or correct functioning of software that runs within Guest VMs, it is responsible for ensuring that the correct functioning of the software within a Guest VM is not interfered with by other VMs.
O.MANAGEMENT_ACCESS
- VMM management functions include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only authorized users (administrators) may exercise management functions. Because of the privileges exercised by the VMM management functions, it must not be possible for the VMM’s management components to be compromised without administrator notification. This means that unauthorized users cannot be permitted access to the management functions, and the management components must not be interfered with by Guest VMs or unprivileged users on other networks—including operational networks connected to the TOE. VMMs include a set of management functions that collectively allow administrators to configure and manage the VMM, as well as configure Guest VMs. These management functions are specific to the VS and are distinct from any other management functions that might exist for the internal management of any given Guest VM. These VMM management functions are privileged, with the security of the entire system relying on their proper use. The VMM management functions can be classified into different categories and the policy for their use and the impact to security may vary accordingly. The management functions are distributed throughout the VMM (within the VMM and Service VMs). The VMM must support the necessary mechanisms to enable the control of all management functions according to the system security policy. When a management function is distributed among multiple Service VMs, the VMs must be protected using the security mechanisms of the Hypervisor and any Service VMs involved to ensure that the intent of the system security policy is not compromised. Additionally, since hypercalls permit Guest VMs to invoke the Hypervisor, and often allow the passing of data to the Hypervisor, it is important that the hypercall interface is well-guarded and that all parameters be validated. The VMM maintains configuration data for every VM on the system. This configuration data, whether of Service or Guest VMs, must be protected. The mechanisms used to establish, modify and verify configuration data are part of the VS management functions and must be protected as such. The proper internal configuration of Service VMs that provide critical security functions can also greatly impact VS security. These configurations must also be protected. Internal configuration of Guest VMs should not impact overall VS security. The overall goal is to ensure that the VMM, including the environments internal to Service VMs, is properly configured and that all Guest VM configurations are maintained consistent with the system security policy throughout their lifecycle. Virtualization Systems are often managed remotely. For example, an administrator can remotely update virtualization software, start and shut down VMs, and manage virtualized network connections. If a console is required, it could be run on a separate machine or it could itself run in a VM. When performing remote management, an administrator must communicate with a privileged management agent over a network. Communications with the management infrastructure must be protected from Guest VMs and operational networks. + VMM management functions include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only authorized users (administrators) may exercise management functions. Because of the privileges exercised by the VMM management functions, it must not be possible for the VMM’s management components to be compromised without administrator notification. This means that unauthorized users cannot be permitted access to the management functions, and the management components must not be interfered with by Guest VMs or unprivileged users on other networks—including operational networks connected to the TOE. VMMs include a set of management functions that collectively allow administrators to configure and manage the VMM, as well as configure Guest VMs. These management functions are specific to the VS and are distinct from any other management functions that might exist for the internal management of any given Guest VM. These VMM management functions are privileged, with the security of the entire system relying on their proper use. The VMM management functions can be classified into different categories and the policy for their use and the impact to security may vary accordingly. The management functions are distributed throughout the VMM (within the VMM and Service VMs). The VMM must support the necessary mechanisms to enable the control of all management functions according to the system security policy. When a management function is distributed among multiple Service VMs, the VMs must be protected using the security mechanisms of the Hypervisor and any Service VMs involved to ensure that the intent of the system security policy is not compromised. Additionally, since hypercalls permit Guest VMs to invoke the Hypervisor, and often allow the passing of data to the Hypervisor, it is important that the hypercall interface is well-guarded and that all parameters be validated. The VMM maintains configuration data for every VM on the system. This configuration data, whether of Service or Guest VMs, must be protected. The mechanisms used to establish, modify and verify configuration data are part of the VS management functions and must be protected as such. The proper internal configuration of Service VMs that provide critical security functions can also greatly impact VS security. These configurations must also be protected. Internal configuration of Guest VMs should not impact overall VS security. The overall goal is to ensure that the VMM, including the environments internal to Service VMs, is properly configured and that all Guest VM configurations are maintained consistent with the system security policy throughout their lifecycle. Virtualization Systems are often managed remotely. For example, an administrator can remotely update virtualization software, start and shut down VMs, and manage virtualized network connections. If a console is required, it could be run on a separate machine or it could itself run in a VM. When performing remote management, an administrator must communicate with a privileged management agent over a network. Communications with the management infrastructure must be protected from Guest VMs and operational networks.
O.PATCHED_SOFTWARE
- The VS must be updated and patched when needed in order to prevent the potential compromise of the VMM, as well as the networks and VMs that it hosts. Identifying and applying needed updates must be a normal part of the operating procedure to ensure that patches are applied in a timely and thorough manner. In order to facilitate this, the VS must support standards and protocols that help enhance the manageability of the VS as an IT product, enabling it to be integrated as part of a manageable network (e.g., reporting current patch level and patchability). + The VS must be updated and patched when needed in order to prevent the potential compromise of the VMM, as well as the networks and VMs that it hosts. Identifying and applying needed updates must be a normal part of the operating procedure to ensure that patches are applied in a timely and thorough manner. In order to facilitate this, the VS must support standards and protocols that help enhance the manageability of the VS as an IT product, enabling it to be integrated as part of a manageable network (e.g., reporting current patch level and patchability).
O.PLATFORM_INTEGRITY
- The integrity of the VMM depends on the integrity of the hardware and software on which the VMM relies. Although the VS does not have complete control over the integrity of the platform, the VS should as much as possible try to ensure that no users or software hosted by the VS can undermine the integrity of the platform. + The integrity of the VMM depends on the integrity of the hardware and software on which the VMM relies. Although the VS does not have complete control over the integrity of the platform, the VS should as much as possible try to ensure that no users or software hosted by the VS can undermine the integrity of the platform.
O.RESOURCE_ALLOCATION
@@ -422,7 +421,7 @@

4.1 Se

O.VMM_INTEGRITY
- Integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. This objective concerns only the integrity of the VS—not the integrity of software running inside of Guest VMs or of the physical platform. The overall objective is to ensure the integrity of critical components of a VS. Initial integrity of a VS can be established through mechanisms such as a digitally signed installation or update package, or through integrity measurements made at launch. Integrity is maintained in a running system by careful protection of the VMM from untrusted users and software. For example, it must not be possible for software running within a Guest VM to exploit a vulnerability in a device or hypercall interface and gain control of the VMM. The vendor must release patches for vulnerabilities as soon as practicable after discovery. + Integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. This objective concerns only the integrity of the VS—not the integrity of software running inside of Guest VMs or of the physical platform. The overall objective is to ensure the integrity of critical components of a VS. Initial integrity of a VS can be established through mechanisms such as a digitally signed installation or update package, or through integrity measurements made at launch. Integrity is maintained in a running system by careful protection of the VMM from untrusted users and software. For example, it must not be possible for software running within a Guest VM to exploit a vulnerability in a device or hypercall interface and gain control of the VMM. The vendor must release patches for vulnerabilities as soon as practicable after discovery.
O.VM_ENTROPY
@@ -430,7 +429,7 @@

4.1 Se

O.VM_ISOLATION
- VMs are the fundamental subject of the system. The VMM is responsible for applying the system security policy (SSP) to the VM and all resources. As basic functionality, the VMM must support a security policy that mandates no information transfer between VMs. The VMM must support the necessary mechanisms to isolate the resources of all VMs. The VMM partitions a platform's physical resources for use by the supported virtual environments. Depending on customer requirements, a VM may need a completely isolated environment with exclusive access to system resources or share some of its resources with other VMs. It must be possible to enforce a security policy that prohibits the transfer of data between VMs through shared devices. When the platform security policy allows the sharing of resources across VM boundaries, the VMM must ensure that all access to those resources is consistent with the policy. The VMM may delegate the responsibility for the mediation of resource sharing to select Service VMs; however in doing so, it remains responsible for mediating access to the Service VMs, and each Service VM must mediate all access to any shared resource that has been delegated to it in accordance with the SSP. Both virtual and physical devices are resources requiring access control. The VMM must enforce access control in accordance with system security policy. Physical devices are platform devices with access mediated via the VMM per the O.VMM_Integrity objective. Virtual devices may include virtual storage devices and virtual network devices. Some of the access control restrictions must be enforced internal to Service VMs, as may be the case for isolating virtual networks. VMMs may also expose purely virtual interfaces. These are VMM specific, and while they are not analogous to a physical device, they are also subject to access control. The VMM must support the mechanisms to isolate all resources associated with virtual networks and to limit a VM's access to only those virtual networks for which it has been configured. The VMM must also support the mechanisms to control the configurations of virtual networks according to the SSP. + VMs are the fundamental subject of the system. The VMM is responsible for applying the system security policy (SSP) to the VM and all resources. As basic functionality, the VMM must support a security policy that mandates no information transfer between VMs. The VMM must support the necessary mechanisms to isolate the resources of all VMs. The VMM partitions a platform's physical resources for use by the supported virtual environments. Depending on customer requirements, a VM may need a completely isolated environment with exclusive access to system resources or share some of its resources with other VMs. It must be possible to enforce a security policy that prohibits the transfer of data between VMs through shared devices. When the platform security policy allows the sharing of resources across VM boundaries, the VMM must ensure that all access to those resources is consistent with the policy. The VMM may delegate the responsibility for the mediation of resource sharing to select Service VMs; however in doing so, it remains responsible for mediating access to the Service VMs, and each Service VM must mediate all access to any shared resource that has been delegated to it in accordance with the SSP. Both virtual and physical devices are resources requiring access control. The VMM must enforce access control in accordance with system security policy. Physical devices are platform devices with access mediated via the VMM per the O.VMM_Integrity objective. Virtual devices may include virtual storage devices and virtual network devices. Some of the access control restrictions must be enforced internal to Service VMs, as may be the case for isolating virtual networks. VMMs may also expose purely virtual interfaces. These are VMM specific, and while they are not analogous to a physical device, they are also subject to access control. The VMM must support the mechanisms to isolate all resources associated with virtual networks and to limit a VM's access to only those virtual networks for which it has been configured. The VMM must also support the mechanisms to control the configurations of virtual networks according to the SSP.
@@ -439,11 +438,11 @@

OE.CONFIG
- TOE administrators will configure the VS correctly to create the intended security policy. + TOE administrators will configure the VS correctly to create the intended security policy.
OE.NON_MALICIOUS_USER
- Users are trusted to not be willfully negligent or hostile and use the VS in compliance with the applied enterprise security policy and guidance. + Users are trusted to not be willfully negligent or hostile and use the VS in compliance with the applied enterprise security policy and guidance.
OE.PHYSICAL
@@ -465,13 +464,13 @@

4.3 Security Objectives Rationale< Threat, Assumption, or OSPSecurity ObjectivesRationale - T.3P_​SOFTWAREO.VMM_​INTEGRITYThe VMM integrity mechanisms include environment-based vulnerability mitigation and potentiallysupport for introspection and device driver isolation, all of which reduce the likelihood that any vulnerabilities in third-party software can be used to exploit the TOE. + T.3P_​SOFTWAREO.VMM_​INTEGRITYThe VMM integrity mechanisms include environment-based vulnerability mitigation and potentiallysupport for introspection and device driver isolation, all of which reduce the likelihood that any vulnerabilities in third-party software can be used to exploit the TOE. - T.DATA_​LEAKAGEO.DOMAIN_​INTEGRITYLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another. + T.DATA_​LEAKAGEO.DOMAIN_​INTEGRITYLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another. - O.VM_​ISOLATIONLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another. + O.VM_​ISOLATIONLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another. T.DENIAL_​OF_​SERVICEO.RESOURCE_​ALLOCATIONThe ability of the TSF to ensure the proper allocation of resources makes denial of serviceattacks more difficult. @@ -480,16 +479,16 @@

4.3 Security Objectives Rationale< T.MISCONFIGURATIONO.CORRECTLY_​APPLIED_​CONFIGURATIONMechanisms to prevent the application of configurations that violate the current security policy help prevent misconfigurations. - T.PLATFORM_​COMPROMISEO.PLATFORM_​INTEGRITYPlatform integrity mechanisms used by the TOE reduce the risk that an attacker can ‘break out’ of a VM and affect the platform on which the VS is running. + T.PLATFORM_​COMPROMISEO.PLATFORM_​INTEGRITYPlatform integrity mechanisms used by the TOE reduce the risk that an attacker can ‘break out’ of a VM and affect the platform on which the VS is running. T.UNAUTHORIZED_​ACCESSO.MANAGEMENT_​ACCESSEnsuring that TSF management functions cannot be executed without authorization prevents untrustedsubjects from modifying the behavior of the TOE in an unanticipated manner. - T.UNAUTHORIZED_​MODIFICATIONO.AUDITEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected. + T.UNAUTHORIZED_​MODIFICATIONO.AUDITEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected. - O.VMM_​INTEGRITYEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected. + O.VMM_​INTEGRITYEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected. T.UNAUTHORIZED_​UPDATEO.VMM_​INTEGRITYSystem integrity prevents the TOE from installing a software patch containing unknown andpotentially malicious code. @@ -498,13 +497,13 @@

4.3 Security Objectives Rationale< T.UNPATCHED_​SOFTWAREO.PATCHED_​SOFTWAREThe ability to patch the TOE software ensures that protections against vulnerabilities can be applied as they become available. - T.USER_​ERRORO.VM_​ISOLATIONIsolation of VMs includes clear attribution of those VMs to their respective domains which reducesthe likelihood that a user inadvertently inputs or transfers data meant for one VM into another. + T.USER_​ERRORO.VM_​ISOLATIONIsolation of VMs includes clear attribution of those VMs to their respective domains which reducesthe likelihood that a user inadvertently inputs or transfers data meant for one VM into another. - T.VMM_​COMPROMISEO.VMM_​INTEGRITYMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed. + T.VMM_​COMPROMISEO.VMM_​INTEGRITYMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed. - O.VM_​ISOLATIONMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed. + O.VM_​ISOLATIONMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed. T.WEAK_​CRYPTOO.VM_​ENTROPYAcquisition of good entropy is necessary to support the TOE's security-related cryptographicalgorithms. @@ -584,13 +583,13 @@

FAU_GEN.1 Audit Data Generation

- Application Note: The ST author can include other auditable events directly in Table t-audit-mandatory; they are not limited to the list presented. The ST author should update the table in FAU_GEN.1.2 with any additional information generated. “Subject identity” in FAU_GEN.1.2 could be a user id or an identifier specifying a VM, for example. + Application Note: The ST author can include other auditable events directly in Table t-audit-mandatory; they are not limited to the list presented. The ST author should update the table in FAU_GEN.1.2 with any additional information generated. “Subject identity” in FAU_GEN.1.2 could be a user id or an identifier specifying a VM, for example.

Appropriate entries from Table t-audit-optional, Table t-audit-objective, and Table t-audit-sel-based should be included in the ST if the associated SFRs and selections are included.

- The Table t-audit-mandatory entry for FDP_VNC_EXT.1 refers to configuration settings that attach VMs to virtualized network components. Changes to these configurations can be made during VM execution or when VMs are not running. Audit records must be generated for either case. + The Table t-audit-mandatory entry for FDP_VNC_EXT.1 refers to configuration settings that attach VMs to virtualized network components. Changes to these configurations can be made during VM execution or when VMs are not running. Audit records must be generated for either case.

- The intent of the audit requirement for FDP_PPR_EXT.1 is to log that the VM is connected to a physical device (when the device becomes part of the VM's hardware view), not to log every time that the device is accessed. Generally, this is only once at VM startup. However, some devices can be connected and disconnected during operation (e.g., virtual USB devices such as CD-ROMs). All such connection/disconnection events must be logged. + The intent of the audit requirement for FDP_PPR_EXT.1 is to log that the VM is connected to a physical device (when the device becomes part of the VM's hardware view), not to log every time that the device is accessed. Generally, this is only once at VM startup. However, some devices can be connected and disconnected during operation (e.g., virtual USB devices such as CD-ROMs). All such connection/disconnection events must be logged.

The following table contains the events enumerated in the auditable events table for the TLS Functional Package. Inclusion of these events in the ST is subject to selection above, inclusion of the corresponding SFRs in the ST, and support in the FP as represented by a selection in the table below.

@@ -753,7 +752,7 @@

FAU_STG_EXT.1 Off-Loading of Audit Data

FAU_STG_EXT.1.2
- The TSF shall[selection: drop new audit data, overwrite previous audit records according to the following rule: [assignment: rule for overwriting previous audit records ], other action ]when the local storage space for audit data is full. + The TSF shall[selection: drop new audit data, overwrite previous audit records according to the following rule: [assignment: rule for overwriting previous audit records ], [assignment: other action ]]when the local storage space for audit data is full.
Application Note: An external log server, if available, might be used as alternative storage space in case the local storage space is full. An ‘other action’ could be defined in this case as ‘send the new audit data to an external IT entity’.
@@ -820,7 +819,7 @@

FCS_CKM.1 Cryptographic Key Generation

RSA schemes using cryptographic key sizes [2048-bit or greater] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.3]
  • - ECC schemes using [“NIST curves” P-256, P-384, and [selection: P-521, no other curves] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.4] + ECC schemes using [“NIST curves” P-256, P-384, and [selection: P-521, no other curves] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.4]
  • FFC schemes using cryptographic key sizes [2048-bit or greater] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.1]]. @@ -1264,7 +1263,7 @@

    FCS_COP.1/Sig Cryptographic Operation (Signature Algorithms)

    RSA schemes using cryptographic key sizes [2048-bit or greater] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 4]
  • - ECDSA schemes using [“NIST curves” P-256, P-384 and [selection: P-521, no other curves]] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 5] + ECDSA schemes using [“NIST curves” P-256, P-384 and [selection: P-521, no other curves]] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 5]
  • ]. @@ -1428,13 +1427,13 @@

    FCS_ENT_EXT.1 Entropy for Virtual Machines

    The TSF shall provide independent entropy across multiple VMs.
    - Application Note: This requirement ensures that sufficient entropy is available to any VM that requires it. The entropy need not provide high-quality entropy for every possible method that a VM might acquire it. The VMM must, however, provide some means for VMs to get sufficient entropy. For example, the VMM can provide an interface that returns entropy to a Guest VM. Alternatively, the VMM could provide pass-through access to entropy sources provided by the host platform. + Application Note: This requirement ensures that sufficient entropy is available to any VM that requires it. The entropy need not provide high-quality entropy for every possible method that a VM might acquire it. The VMM must, however, provide some means for VMs to get sufficient entropy. For example, the VMM can provide an interface that returns entropy to a Guest VM. Alternatively, the VMM could provide pass-through access to entropy sources provided by the host platform.

    - This requirement allows for three general ways of providing entropy to guests: 1) The VS can provide a Hypercall accessible to VM-aware guests, 2) access to a virtualized device that provides entropy, or 3) pass-through access to a hardware entropy source (including a source of random numbers). In all cases, it is possible that the guest is made VM-aware through installation of software or drivers. For the second and third cases, it is possible that the guest could be VM-unaware. There is no requirement that the TOE provide entropy sources as expected by VM-unaware guests. That is, the TOE does not have to anticipate every way a guest might try to acquire entropy as long as it supplies a mechanism that can be used by VM-aware guests, or provides access to a standard mechanism that a VM-unaware guest would use. + This requirement allows for three general ways of providing entropy to guests: 1) The VS can provide a Hypercall accessible to VM-aware guests, 2) access to a virtualized device that provides entropy, or 3) pass-through access to a hardware entropy source (including a source of random numbers). In all cases, it is possible that the guest is made VM-aware through installation of software or drivers. For the second and third cases, it is possible that the guest could be VM-unaware. There is no requirement that the TOE provide entropy sources as expected by VM-unaware guests. That is, the TOE does not have to anticipate every way a guest might try to acquire entropy as long as it supplies a mechanism that can be used by VM-aware guests, or provides access to a standard mechanism that a VM-unaware guest would use.

    - The ST author should select “Hypercall interface” if the TSF provides an API function through which guest-resident software can obtain entropy or random numbers. The ST author should select “virtual device interface” if the TSF presents a virtual device interface to the Guest OS through which it can obtain entropy or random numbers. Such an interface could present a virtualized real device, such as a TPM, that can be accessed by VM-unaware guests, or a virtualized fictional device that would require the Guest OS to be VM-aware. The ST author should select “passthrough access to hardware entropy source” if the TSF permits Guest VMs to have direct access to hardware entropy or random number source on the platform. The ST author should select all items that are appropriate. + The ST author should select “Hypercall interface” if the TSF provides an API function through which guest-resident software can obtain entropy or random numbers. The ST author should select “virtual device interface” if the TSF presents a virtual device interface to the Guest OS through which it can obtain entropy or random numbers. Such an interface could present a virtualized real device, such as a TPM, that can be accessed by VM-unaware guests, or a virtualized fictional device that would require the Guest OS to be VM-aware. The ST author should select “passthrough access to hardware entropy source” if the TSF permits Guest VMs to have direct access to hardware entropy or random number source on the platform. The ST author should select all items that are appropriate.

    - For FCS_ENT_EXT.1.2, the VMM must ensure that the provision of entropy to one VM cannot affect the quality of entropy provided to another VM on the same platform.
    + For FCS_ENT_EXT.1.2, the VMM must ensure that the provision of entropy to one VM cannot affect the quality of entropy provided to another VM on the same platform.
    @@ -1450,7 +1449,7 @@

    FCS_ENT_EXT.1 Entropy for Virtual Machines

    TSS
    - The evaluator shall verify that the TSS describes how the TOE provides entropy to Guest VMs, and how to access the interface to acquire entropy or random numbers. The evaluator shall verify that the TSS describes the mechanisms for ensuring that one VM does not affect the entropy acquired by another. + The evaluator shall verify that the TSS describes how the TOE provides entropy to Guest VMs, and how to access the interface to acquire entropy or random numbers. The evaluator shall verify that the TSS describes the mechanisms for ensuring that one VM does not affect the entropy acquired by another.
    Tests
    @@ -1458,10 +1457,10 @@

    FCS_ENT_EXT.1 Entropy for Virtual Machines

      The evaluator shall perform the following tests:
    • - Test FCS_ENT_EXT.1.2:1: The evaluator shall invoke entropy from each Guest VM. The evaluator shall verify that each VM acquires values from the interface. + Test FCS_ENT_EXT.1.2:1: The evaluator shall invoke entropy from each Guest VM. The evaluator shall verify that each VM acquires values from the interface.
    • - Test FCS_ENT_EXT.1.2:2: The evaluator shall invoke entropy from multiple VMs as nearly simultaneously as practicable. The evaluator shall verify that the entropy used in one VM is not identical to that invoked from the other VMs. + Test FCS_ENT_EXT.1.2:2: The evaluator shall invoke entropy from multiple VMs as nearly simultaneously as practicable. The evaluator shall verify that the entropy used in one VM is not identical to that invoked from the other VMs.
    @@ -1530,9 +1529,9 @@

    FDP_HBI_EXT.1 Hardware-Based Isolation Mechanisms

    FDP_HBI_EXT.1.1
    - The TSF shall use[selection: no mechanism, list of platform-provided, hardware-based mechanisms ]to constrain a Guest VM's direct access to the following physical devices:[selection: no devices, physical devices to which the VMM allows Guest VMs physical access ]. + The TSF shall use[selection: no mechanism, [assignment: list of platform-provided, hardware-based mechanisms ]]to constrain a Guest VM's direct access to the following physical devices:[selection: no devices, [assignment: physical devices to which the VMM allows Guest VMs physical access ]].
    - Application Note: The TSF must use available hardware-based isolation mechanisms to constrain VMs when VMs have direct access to physical devices. “Direct access” in this context means that the VM can read or write device memory or access device I/O ports without the VMM being able to intercept and validate every transaction. + Application Note: The TSF must use available hardware-based isolation mechanisms to constrain VMs when VMs have direct access to physical devices. “Direct access” in this context means that the VM can read or write device memory or access device I/O ports without the VMM being able to intercept and validate every transaction.
    @@ -1562,7 +1561,7 @@

    FDP_PPR_EXT.1 Physical Platform Resource Controls

    FDP_PPR_EXT.1.1
    - The TSF shall allow an authorized administrator to control Guest VM access to the following physical platform resources:[assignment: list of physical platform resources the VMM isable to control access to]. + The TSF shall allow an authorized administrator to control Guest VM access to the following physical platform resources:[assignment: list of physical platform resources the VMM isable to control access to].
    @@ -1570,7 +1569,7 @@

    FDP_PPR_EXT.1 Physical Platform Resource Controls

    FDP_PPR_EXT.1.2
    - The TSF shall explicitly deny all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, list of physical platform resources to which access is explicitly denied ]. + The TSF shall explicitly deny all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, [assignment: list of physical platform resources to which access is explicitly denied ]].
    @@ -1578,21 +1577,15 @@

    FDP_PPR_EXT.1 Physical Platform Resource Controls

    FDP_PPR_EXT.1.3
    - The TSF shall explicitly allow all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, list of physical platform resources to which access is always allowed ]. + The TSF shall explicitly allow all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, [assignment: list of physical platform resources to which access is always allowed ]].
    Application Note: For purposes of this requirement, physical platform resources are divided into three categories:
      -
    1. - those to which Guest OS access is configurable and moderated by the VMM -
    2. -
    3. - those to which the Guest OS is never allowed to have direct access, and -
    4. -
    5. - those to which the Guest OS is always allowed to have direct access. -
    6. +
    7. those to which Guest OS access is configurable and moderated by the VMM
    8. +
    9. those to which the Guest OS is never allowed to have direct access, and
    10. +
    11. those to which the Guest OS is always allowed to have direct access.
    - For element 1, the ST author lists the physical platform resources that can be configured for Guest VM access by an administrator. For element 2, the ST author lists the physical platform resources to which Guest VMs may never be allowed direct access. If there are no such resources, the ST author selects "no physical platform resources." Likewise, any resources to which all Guest VMs automatically have access to are to be listed in the third element. If there are no such resources, then "no physical platform resources" is selected.
    + For element 1, the ST author lists the physical platform resources that can be configured for Guest VM access by an administrator. For element 2, the ST author lists the physical platform resources to which Guest VMs may never be allowed direct access. If there are no such resources, the ST author selects "no physical platform resources." Likewise, any resources to which all Guest VMs automatically have access to are to be listed in the third element. If there are no such resources, then "no physical platform resources" is selected.
    @@ -1608,11 +1601,11 @@

    FDP_PPR_EXT.1 Physical Platform Resource Controls

    TSS
    - The evaluator shall examine the TSS to determine that it describes the mechanism by which the VMM controls a Guest VM's access to physical platform resources. This description shall cover all of the physical platforms allowed in the evaluated configuration by the ST. It should explain how the VMM distinguishes among Guest VMs, and how each physical platform resource that is controllable (that is, listed in the assignment statement in the first element) is identified to an Administrator. + The evaluator shall examine the TSS to determine that it describes the mechanism by which the VMM controls a Guest VM's access to physical platform resources. This description shall cover all of the physical platforms allowed in the evaluated configuration by the ST. It should explain how the VMM distinguishes among Guest VMs, and how each physical platform resource that is controllable (that is, listed in the assignment statement in the first element) is identified to an Administrator.

    - The evaluator shall ensure that the TSS describes how the Guest VM is associated with each physical resource, and how other Guest VMs cannot access a physical resource without being granted explicit access. For TOEs that implement a robust interface (other than just "allow access" or "deny access"), the evaluator shall ensure that the TSS describes the possible operations or modes of access between a Guest VM's and physical platform resources. + The evaluator shall ensure that the TSS describes how the Guest VM is associated with each physical resource, and how other Guest VMs cannot access a physical resource without being granted explicit access. For TOEs that implement a robust interface (other than just "allow access" or "deny access"), the evaluator shall ensure that the TSS describes the possible operations or modes of access between a Guest VM's and physical platform resources.

    - If physical resources are listed in the second element, the evaluator shall examine the TSS and operational guidance to determine that there appears to be no way to configure those resources for access by a Guest VM. The evaluator shall document in the evaluation report their analysis of why the controls offered to configure access to physical resources can't be used to specify access to the resources identified in the second element (for example, if the interface offers a drop-down list of resources to assign, and the denied resources are not included on that list, that would be sufficient justification in the evaluation report). + If physical resources are listed in the second element, the evaluator shall examine the TSS and operational guidance to determine that there appears to be no way to configure those resources for access by a Guest VM. The evaluator shall document in the evaluation report their analysis of why the controls offered to configure access to physical resources can't be used to specify access to the resources identified in the second element (for example, if the interface offers a drop-down list of resources to assign, and the denied resources are not included on that list, that would be sufficient justification in the evaluation report).
    Guidance
    @@ -1623,19 +1616,19 @@

    FDP_PPR_EXT.1 Physical Platform Resource Controls

    • - Test FDP_PPR_EXT.1.3:1: For each physical platform resource identified in the first element, the evaluator shall configure a Guest VM to have access to that resource and show that the Guest VM is able to successfully access that resource. + Test FDP_PPR_EXT.1.3:1: For each physical platform resource identified in the first element, the evaluator shall configure a Guest VM to have access to that resource and show that the Guest VM is able to successfully access that resource.
    • - Test FDP_PPR_EXT.1.3:2: For each physical platform resource identified in the first element, the evaluator shall configure the system such that a Guest VM does not have access to that resource and show that the Guest VM is unable to successfully access that resource. + Test FDP_PPR_EXT.1.3:2: For each physical platform resource identified in the first element, the evaluator shall configure the system such that a Guest VM does not have access to that resource and show that the Guest VM is unable to successfully access that resource.
    • Test FDP_PPR_EXT.1.3:3: [conditional]: For TOEs that have a robust control interface, the evaluator shall exercise each element of the interface as described in the TSS and the operational guidance to ensure that the behavior described in the operational guidance is exhibited.
    • - Test FDP_PPR_EXT.1.3:4: [conditional]: If the TOE explicitly denies access to certain physical resources, the evaluator shall attempt to access each listed (in FDP_PPR_EXT.1.2) physical resource from a Guest VM and observe that access is denied. + Test FDP_PPR_EXT.1.3:4: [conditional]: If the TOE explicitly denies access to certain physical resources, the evaluator shall attempt to access each listed (in FDP_PPR_EXT.1.2) physical resource from a Guest VM and observe that access is denied.
    • - Test FDP_PPR_EXT.1.3:5: [conditional]: If the TOE explicitly allows access to certain physical resources, the evaluator shall attempt to access each listed (in FDP_PPR_EXT.1.3) physical resource from a Guest VM and observe that the access is allowed. If the operational guidance specifies that access is allowed simultaneously by more than one Guest VM, the evaluator shall attempt to access each resource listed from more than one Guest VM and show that access is allowed. + Test FDP_PPR_EXT.1.3:5: [conditional]: If the TOE explicitly allows access to certain physical resources, the evaluator shall attempt to access each listed (in FDP_PPR_EXT.1.3) physical resource from a Guest VM and observe that the access is allowed. If the operational guidance specifies that access is allowed simultaneously by more than one Guest VM, the evaluator shall attempt to access each resource listed from more than one Guest VM and show that access is allowed.
    @@ -1650,15 +1643,15 @@

    FDP_RIP_EXT.1 Residual Information in Memory

    FDP_RIP_EXT.1.1
    - The TSF shall ensure that any previous information content of physical memory is cleared prior to allocation to a Guest VM. + The TSF shall ensure that any previous information content of physical memory is cleared prior to allocation to a Guest VM.
    - Application Note: Physical memory must be zeroed before it is made accessible to a VM for general use by a Guest OS. + Application Note: Physical memory must be zeroed before it is made accessible to a VM for general use by a Guest OS.

    - The purpose of this requirement is to ensure that a VM does not receive memory containing data previously used by another VM or the host. + The purpose of this requirement is to ensure that a VM does not receive memory containing data previously used by another VM or the host.

    - “For general use” means for use by the Guest OS in its page tables for running applications or system software. + “For general use” means for use by the Guest OS in its page tables for running applications or system software.

    - This does not apply to pages shared by design or policy between VMs or between the VMMs and VMs, such as read-only OS pages or pages used for virtual device buffers.
    + This does not apply to pages shared by design or policy between VMs or between the VMMs and VMs, such as read-only OS pages or pages used for virtual device buffers.
    @@ -1674,7 +1667,7 @@

    FDP_RIP_EXT.1 Residual Information in Memory

    TSS
    - The evaluator shall ensure that the TSS documents the process used for clearing physical memory prior to allocation to a Guest VM, providing details on when and how this is performed. Additionally, the evaluator shall ensure that the TSS documents the conditions under which physical memory is not cleared prior to allocation to a Guest VM, and describes when and how the memory is cleared. + The evaluator shall ensure that the TSS documents the process used for clearing physical memory prior to allocation to a Guest VM, providing details on when and how this is performed. Additionally, the evaluator shall ensure that the TSS documents the conditions under which physical memory is not cleared prior to allocation to a Guest VM, and describes when and how the memory is cleared.
    @@ -1686,9 +1679,9 @@

    FDP_RIP_EXT.2 Residual Information on Disk

    FDP_RIP_EXT.2.1
    - The TSF shall ensure that any previous information content of physical disk storage is cleared to zeros upon allocation to a Guest VM. + The TSF shall ensure that any previous information content of physical disk storage is cleared to zeros upon allocation to a Guest VM.
    - Application Note: The purpose of this requirement is to ensure that a VM does not receive disk storage containing data previously used by another VM or by the host. + Application Note: The purpose of this requirement is to ensure that a VM does not receive disk storage containing data previously used by another VM or by the host.

    Clearing of disk storage only upon deallocation does not meet this requirement.

    @@ -1708,14 +1701,14 @@

    FDP_RIP_EXT.2 Residual Information on Disk

    TSS
    - The evaluator shall ensure that the TSS documents how the TSF ensures that disk storage is zeroed upon allocation to Guest VMs. Also, the TSS must document any conditions under which disk storage is not cleared prior to allocation to a Guest VM. Any file system format and metadata information needed by the evaluator to perform the below test shall be made available to the evaluator, but need not be published in the TSS. + The evaluator shall ensure that the TSS documents how the TSF ensures that disk storage is zeroed upon allocation to Guest VMs. Also, the TSS must document any conditions under which disk storage is not cleared prior to allocation to a Guest VM. Any file system format and metadata information needed by the evaluator to perform the below test shall be made available to the evaluator, but need not be published in the TSS.
    Tests
    • - Test FDP_RIP_EXT.2.1:1: On the host, the evaluator creates a file that is more than half the size of a connected physical storage device (or multiple files whose individual sizes add up to more than half the size of the storage media). This file (or files) shall be filled entirely with a non-zero value. Then, the file (or files) shall be released (freed for use but not cleared). Next, the evaluator (as a VS Administrator) creates a virtual disk at least that large on the same physical storage device and connects it to a powered-off VM. Then, from outside the Guest VM, scan through and check that all the non-metadata (as documented in the TSS) in the file corresponding to that virtual disk is set to zero. + Test FDP_RIP_EXT.2.1:1: On the host, the evaluator creates a file that is more than half the size of a connected physical storage device (or multiple files whose individual sizes add up to more than half the size of the storage media). This file (or files) shall be filled entirely with a non-zero value. Then, the file (or files) shall be released (freed for use but not cleared). Next, the evaluator (as a VS Administrator) creates a virtual disk at least that large on the same physical storage device and connects it to a powered-off VM. Then, from outside the Guest VM, scan through and check that all the non-metadata (as documented in the TSS) in the file corresponding to that virtual disk is set to zero.
    @@ -1730,7 +1723,7 @@

    FDP_VMS_EXT.1 VM Separation

    FDP_VMS_EXT.1.1
    - The VS shall provide the following mechanisms for transferring data between Guest VMs:[selection: no mechanism, virtual networking, other inter-VM data sharing mechanisms ]. + The VS shall provide the following mechanisms for transferring data between Guest VMs:[selection: no mechanism, virtual networking, [assignment: other inter-VM data sharing mechanisms ]].
    @@ -1754,11 +1747,11 @@

    FDP_VMS_EXT.1 VM Separation

    FDP_VMS_EXT.1.4
    - The VS shall ensure that no Guest VM is able to read or transfer data to or from another Guest VM except through the mechanisms listed in FDP_VMS_EXT.1.1. + The VS shall ensure that no Guest VM is able to read or transfer data to or from another Guest VM except through the mechanisms listed in FDP_VMS_EXT.1.1.
    - Application Note: The fundamental requirement of a Virtualization System is the ability to enforce separation between information domains implemented as Virtual Machines and Virtual Networks. The intent of this requirement is to ensure that VMs, VMMs, and the VS as a whole is implemented with this fundamental requirement in mind. + Application Note: The fundamental requirement of a Virtualization System is the ability to enforce separation between information domains implemented as Virtual Machines and Virtual Networks. The intent of this requirement is to ensure that VMs, VMMs, and the VS as a whole is implemented with this fundamental requirement in mind.

    - The ST author should select “no mechanism” in the unlikely event that the VS implements no mechanisms for transferring data between Guest VMs. Otherwise, the ST author should select “virtual networking” and identify all other mechanisms through which data can be transferred between Guest VMs. + The ST author should select “no mechanism” in the unlikely event that the VS implements no mechanisms for transferring data between Guest VMs. Otherwise, the ST author should select “virtual networking” and identify all other mechanisms through which data can be transferred between Guest VMs.

    Examples of non-network inter-VM sharing mechanisms are:

    @@ -1769,9 +1762,9 @@

    FDP_VMS_EXT.1 VM Separation

    For data transfer mechanisms implemented in terms of Hypercall functions, FDP_VMS_EXT.1.3 is met if FPT_HCL_EXT.1.1 is met for those Hypercall functions (Hypercall function parameters are checked).

    - For data transfer mechanisms that use shared physical devices, FDP_VMS_EXT.1.3 is met if the device is listed in and meets FDP_PPR_EXT.1.1 (VM access to the physical device is configurable). + For data transfer mechanisms that use shared physical devices, FDP_VMS_EXT.1.3 is met if the device is listed in and meets FDP_PPR_EXT.1.1 (VM access to the physical device is configurable).

    - For data transfer mechanisms that use virtual networking, FDP_VMS_EXT.1.3 is met if FDP_VNC_EXT.1.1 is met (VM access to virtual networks is configurable). + For data transfer mechanisms that use virtual networking, FDP_VMS_EXT.1.3 is met if FDP_VNC_EXT.1.1 is met (VM access to virtual networks is configurable).

    @@ -1811,9 +1804,7 @@

    FDP_VMS_EXT.1 VM Separation

  • Test that communications can be passed between the VMs through the channel.
  • Create two new VMs, the first with the inter-VM communications channel currently being tested enabled, and the second with the inter-VM communications channel currently being tested disabled.
  • Test that communications cannot be passed between the VMs through the channel.
  • -
  • - As an Administrator, enable inter-VM communications between the VMs on the second VM. -
  • +
  • As an Administrator, enable inter-VM communications between the VMs on the second VM.
  • Test that communications can be passed through the inter-VM channel.
  • As an Administrator again, disable inter-VM communications between the two VMs.
  • Test that communications can no longer be passed through the channel.
  • @@ -1842,9 +1833,9 @@

    FDP_VNC_EXT.1 Virtual Networking Components

    FDP_VNC_EXT.1.2
    - The TSF shall ensure that network traffic visible to a Guest VM on a virtual network--or virtual segment of a physical network--is visible only to Guest VMs configured to be on that virtual network or segment. + The TSF shall ensure that network traffic visible to a Guest VM on a virtual network--or virtual segment of a physical network--is visible only to Guest VMs configured to be on that virtual network or segment.
    - Application Note: Virtual networks must be separated from one another to provide isolation commensurate with that provided by physically separate networks. It must not be possible for data to cross between properly configured virtual networks regardless of whether the traffic originated from a local Guest VM or a remote host. + Application Note: Virtual networks must be separated from one another to provide isolation commensurate with that provided by physically separate networks. It must not be possible for data to cross between properly configured virtual networks regardless of whether the traffic originated from a local Guest VM or a remote host.

    Unprivileged users must not be able to connect VMs to each other or to external networks.

    @@ -1873,10 +1864,10 @@

    FDP_VNC_EXT.1 Virtual Networking Components

    • - Test FDP_VNC_EXT.1.2:1: The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect to a network component. The evaluator shall verify that the attempt is successful. The evaluator shall then assume the role of an unprivileged user and attempt the same connection. If the attempt fails, or there is no way for an unprivileged user to configure VM network connections, the requirement is met. + Test FDP_VNC_EXT.1.2:1: The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect to a network component. The evaluator shall verify that the attempt is successful. The evaluator shall then assume the role of an unprivileged user and attempt the same connection. If the attempt fails, or there is no way for an unprivileged user to configure VM network connections, the requirement is met.
    • - Test FDP_VNC_EXT.1.2:2: The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect to a physical network. The evaluator shall verify that the attempt is successful. The evaluator shall then assume the role of an unprivileged user and make the same attempt. If the attempt fails, or there is no way for an unprivileged user to configure VM network connections, the requirement is met. + Test FDP_VNC_EXT.1.2:2: The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect to a physical network. The evaluator shall verify that the attempt is successful. The evaluator shall then assume the role of an unprivileged user and make the same attempt. If the attempt fails, or there is no way for an unprivileged user to configure VM network connections, the requirement is met.
    @@ -1892,7 +1883,7 @@

    FIA_AFL_EXT.1 Authentication Failure Handling

    FIA_AFL_EXT.1.1
    - The TSF shall detect when[selection: a positive integer number , an administrator configurable positive integer within a [assignment: range of acceptable values ]]unsuccessful authentication attempts occur related to Administrators attempting to authenticate remotely using[selection: username and password, username and PIN]. + The TSF shall detect when[selection: [assignment: a positive integer number ], an administrator configurable positive integer within a [assignment: range of acceptable values ]]unsuccessful authentication attempts occur related to Administrators attempting to authenticate remotely using[selection: username and password, username and PIN].
    @@ -1900,7 +1891,7 @@

    FIA_AFL_EXT.1 Authentication Failure Handling

    FIA_AFL_EXT.1.2
    - When the defined number of unsuccessful authentication attempts has been met, the TSF shall:[selection: prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until [assignment: action to unlock ] is taken by an Administrator, prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until an Administrator-defined time period has elapsed] + When the defined number of unsuccessful authentication attempts has been met, the TSF shall:[selection: prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until [assignment: action to unlock ] is taken by an Administrator, prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until an Administrator-defined time period has elapsed]
    Application Note: The action to be taken shall be populated in the selection of the ST and defined in the Administrator guidance.

    @@ -1953,7 +1944,7 @@

    FIA_PMG_EXT.1 Password Management

    The TSF shall provide the following password management capabilities for administrative passwords:
    1. - Passwords shall be able to be composed of any combination of upper and lower case characters, digits, and the following special characters: [selection: “!”, “@”, “#”, “$”, “%”, “^”, “& ”, “*”, “(“, “)”, other characters ] + Passwords shall be able to be composed of any combination of upper and lower case characters, digits, and the following special characters: [selection: “!”, “@”, “#”, “$”, “%”, “^”, “& ”, “*”, “(“, “)”, [assignment: other characters ]]
    2. Minimum password length shall be configurable
    3. Passwords of at least 15 characters in length shall be supported
    4. @@ -2001,16 +1992,16 @@

      FIA_UAU.5 Multiple Authentication Mechanisms

      The TSF shall provide the following authentication mechanisms:[selection:
      • - [selection: local, directory-based] authentication based on username and password + [selection: local, directory-based] authentication based on username and password
      • authentication based on username and a PIN that releases an asymmetric key stored in OE-protected storage
      • - [selection: local, directory-based] authentication based on X.509 certificates + [selection: local, directory-based] authentication based on X.509 certificates
      • - [selection: local, directory-based] authentication based on an SSH public key credential + [selection: local, directory-based] authentication based on an SSH public key credential
      ]to support Administrator authentication. @@ -2044,42 +2035,42 @@

      FIA_UAU.5 Multiple Authentication Mechanisms

        - If ‘username and password authentication‘ is selected, the evaluator will configure the VS with a known username and password and conduct the following tests: + If ‘username and password authentication‘ is selected, the evaluator will configure the VS with a known username and password and conduct the following tests:
      • - Test FIA_UAU.5.2:1: The evaluator will attempt to authenticate to the VS using the known username and password. The evaluator will ensure that the authentication attempt is successful. + Test FIA_UAU.5.2:1: The evaluator will attempt to authenticate to the VS using the known username and password. The evaluator will ensure that the authentication attempt is successful.
      • - Test FIA_UAU.5.2:2: The evaluator will attempt to authenticate to the VS using the known username but an incorrect password. The evaluator will ensure that the authentication attempt is unsuccessful. + Test FIA_UAU.5.2:2: The evaluator will attempt to authenticate to the VS using the known username but an incorrect password. The evaluator will ensure that the authentication attempt is unsuccessful.
        - If ‘username and PIN that releases an asymmetric key‘ is selected, the evaluator will examine the TSS for guidance on supported protected storage and will then configure the TOE or OE to establish a PIN which enables release of the asymmetric key from the protected storage (such as a TPM, a hardware token, or isolated execution environment) with which the VS can interface. The evaluator will then conduct the following tests: + If ‘username and PIN that releases an asymmetric key‘ is selected, the evaluator will examine the TSS for guidance on supported protected storage and will then configure the TOE or OE to establish a PIN which enables release of the asymmetric key from the protected storage (such as a TPM, a hardware token, or isolated execution environment) with which the VS can interface. The evaluator will then conduct the following tests:
      • - Test FIA_UAU.5.2:3: The evaluator will attempt to authenticate to the VS using the known user name and PIN. The evaluator will ensure that the authentication attempt is successful. + Test FIA_UAU.5.2:3: The evaluator will attempt to authenticate to the VS using the known user name and PIN. The evaluator will ensure that the authentication attempt is successful.
      • - Test FIA_UAU.5.2:4: The evaluator will attempt to authenticate to the VS using the known user name but an incorrect PIN. The evaluator will ensure that the authentication attempt is unsuccessful. + Test FIA_UAU.5.2:4: The evaluator will attempt to authenticate to the VS using the known user name but an incorrect PIN. The evaluator will ensure that the authentication attempt is unsuccessful.
        - If ‘X.509 certificate authentication‘ is selected, the evaluator will generate an X.509v3 certificate for an Administrator user with the Client Authentication Enhanced Key Usage field set. The evaluator will provision the VS for authentication with the X.509v3 certificate. The evaluator will ensure that the certificates are validated by the VS as per FIA_X509_EXT.1.1 and then conduct the following tests: + If ‘X.509 certificate authentication‘ is selected, the evaluator will generate an X.509v3 certificate for an Administrator user with the Client Authentication Enhanced Key Usage field set. The evaluator will provision the VS for authentication with the X.509v3 certificate. The evaluator will ensure that the certificates are validated by the VS as per FIA_X509_EXT.1.1 and then conduct the following tests:
      • - Test FIA_UAU.5.2:5: The evaluator will attempt to authenticate to the VS using the X.509v3 certificate. The evaluator will ensure that the authentication attempt is successful. + Test FIA_UAU.5.2:5: The evaluator will attempt to authenticate to the VS using the X.509v3 certificate. The evaluator will ensure that the authentication attempt is successful.
      • - Test FIA_UAU.5.2:6: The evaluator will generate a second certificate identical to the first except for the public key and any values derived from the public key. The evaluator will attempt to authenticate to the VS with this certificate. The evaluator will ensure that the authentication attempt is unsuccessful. + Test FIA_UAU.5.2:6: The evaluator will generate a second certificate identical to the first except for the public key and any values derived from the public key. The evaluator will attempt to authenticate to the VS with this certificate. The evaluator will ensure that the authentication attempt is unsuccessful.
        - If ‘SSH public-key credential authentication‘ is selected, the evaluator shall generate a public-private host key pair on the TOE using RSA or ECDSA, and a second public-private key pair on a remote client. The evaluator shall provision the VS with the client public key for authentication over SSH, and conduct the following tests: + If ‘SSH public-key credential authentication‘ is selected, the evaluator shall generate a public-private host key pair on the TOE using RSA or ECDSA, and a second public-private key pair on a remote client. The evaluator shall provision the VS with the client public key for authentication over SSH, and conduct the following tests:
      • - Test FIA_UAU.5.2:7: The evaluator will attempt to authenticate to the VS using a message signed by the client private key that corresponds to provisioned client public key. The evaluator will ensure that the authentication attempt is successful. + Test FIA_UAU.5.2:7: The evaluator will attempt to authenticate to the VS using a message signed by the client private key that corresponds to provisioned client public key. The evaluator will ensure that the authentication attempt is successful.
      • - Test FIA_UAU.5.2:8: The evaluator will generate a second client key pair and will attempt to authenticate to the VS with the private key over SSH without first provisioning the VS to support the new key pair. The evaluator will ensure that the authentication attempt is unsuccessful. + Test FIA_UAU.5.2:8: The evaluator will generate a second client key pair and will attempt to authenticate to the VS with the private key over SSH without first provisioning the VS to support the new key pair. The evaluator will ensure that the authentication attempt is unsuccessful.

      @@ -2128,7 +2119,7 @@

      FMT_SMO_EXT.1 Separation of Management and Operational Networks

      The TSF shall support the separation of management and operational network traffic through[selection: separate physical networks, separate logical networks, trusted channels as defined in FTP_ITC_EXT.1, data encryption using an algorithm specified in FCS_COP.1/UDE].
      - Application Note: Management communications must be separate from user workload communications. Administrative network traffic—including communications between physical hosts concerning load balancing, audit data, VM startup and shutdown—must be isolated from guest operational networks. For purposes of this requirement, management traffic also includes VMs transmitted over management networks whether for backup, live migration, or deployment. + Application Note: Management communications must be separate from user workload communications. Administrative network traffic—including communications between physical hosts concerning load balancing, audit data, VM startup and shutdown—must be isolated from guest operational networks. For purposes of this requirement, management traffic also includes VMs transmitted over management networks whether for backup, live migration, or deployment.

      “Separate physical networks” refers to using separate physical interfaces and cables to isolate management and operational networks from each other.

      @@ -2157,16 +2148,14 @@

      FMT_SMO_EXT.1 Separation of Management and Operational Networks

      The evaluator shall examine the TSS to verify that it describes how management and operational traffic is separated.
      Guidance
      -
      - The evaluator shall examine the operational guidance to verify that it details how to configure the VS to keep Management and Operational traffic separate. -
      +
      The evaluator shall examine the operational guidance to verify that it details how to configure the VS to keep Management and Operational traffic separate.
      Tests
      The evaluator shall configure the TOE as documented in the guidance. If separation is logical, then the evaluator shall capture packets on the management network. If plaintext Guest network traffic is detected, the requirement is not met.

      If separation uses trusted channels, then the evaluator shall capture packets on the network over which traffic is tunneled. If plaintext Guest network traffic is detected, the requirement is not met.

      - If data encryption is used, then the evaluator shall capture packets on the network over which the data is sent while a VM or other large data structure is being transmitted. If plaintext VM contents are detected, the requirement is not met. + If data encryption is used, then the evaluator shall capture packets on the network over which the data is sent while a VM or other large data structure is being transmitted. If plaintext VM contents are detected, the requirement is not met.

      @@ -2180,13 +2169,13 @@

      FPT_DVD_EXT.1 Non-Existence of Disconnected Virtual Devices

      FPT_DVD_EXT.1.1
      - The TSF shall prevent Guest VMs from accessing virtual device interfaces that are not present in the VM’s current virtual hardware configuration. + The TSF shall prevent Guest VMs from accessing virtual device interfaces that are not present in the VM’s current virtual hardware configuration.
      - Application Note: The virtualized hardware abstraction implemented by a particular VS might include the virtualized interfaces for many different devices. Sometimes these devices are not present in a particular instantiation of a VM. The interface for devices not present must not be accessible by the VM. + Application Note: The virtualized hardware abstraction implemented by a particular VS might include the virtualized interfaces for many different devices. Sometimes these devices are not present in a particular instantiation of a VM. The interface for devices not present must not be accessible by the VM.

      Such interfaces include memory buffers, PCI Bus interfaces, and processor I/O ports.

      - The purpose of this requirement is to reduce the attack surface of the VMM by blocking access to unused interfaces.
      + The purpose of this requirement is to reduce the attack surface of the VMM by blocking access to unused interfaces.
    @@ -2200,7 +2189,7 @@

    FPT_DVD_EXT.1 Non-Existence of Disconnected Virtual Devices

    Tests
    - The evaluator shall connect a device to a VM, then from within the guest scan the VM's devices to ensure that the connected device is present--using a device driver or other available means to scan the VM's I/O ports or PCI Bus interfaces. (The device's interface should be documented in the TSS under FPT_VDP_EXT.1.) The evaluator shall remove the device from the VM and run the scan again. This requirement is met if the device's interfaces are no longer present. + The evaluator shall connect a device to a VM, then from within the guest scan the VM's devices to ensure that the connected device is present--using a device driver or other available means to scan the VM's I/O ports or PCI Bus interfaces. (The device's interface should be documented in the TSS under FPT_VDP_EXT.1.) The evaluator shall remove the device from the VM and run the scan again. This requirement is met if the device's interfaces are no longer present.
    @@ -2212,7 +2201,7 @@

    FPT_EEM_EXT.1 Execution Environment Mitigations

    FPT_EEM_EXT.1.1
    - The TSF shall take advantage of execution environment-based vulnerability mitigation mechanisms supported by the Platform such as:[selection: Address space randomization, Memory execution protection (e.g., DEP), Stack buffer overflow protection, Heap corruption detection, other mechanisms , No mechanisms] + The TSF shall take advantage of execution environment-based vulnerability mitigation mechanisms supported by the Platform such as:[selection: Address space randomization, Memory execution protection (e.g., DEP), Stack buffer overflow protection, Heap corruption detection, [assignment: other mechanisms ], No mechanisms]
    Application Note: Processor manufacturers, compiler developers, and operating system vendors have developed execution environment-based mitigations that increase the cost to attackers by adding complexity to the task of compromising systems. Software can often take advantage of these mechanisms by using APIs provided by the operating system or by enabling the mechanism through compiler or linker options.

    @@ -2246,7 +2235,7 @@

    FPT_HAS_EXT.1 Hardware Assists

    FPT_HAS_EXT.1.1
    - The VMM shall use[assignment: list of hardware-based virtualization assists]to reduce or eliminate the need for binary translation. + The VMM shall use[assignment: list of hardware-based virtualization assists]to reduce or eliminate the need for binary translation.
    @@ -2254,13 +2243,13 @@

    FPT_HAS_EXT.1 Hardware Assists

    FPT_HAS_EXT.1.2
    - The VMM shall use[assignment: list of hardware-based virtualization memory-handling assists]to reduce or eliminate the need for shadow page tables. + The VMM shall use[assignment: list of hardware-based virtualization memory-handling assists]to reduce or eliminate the need for shadow page tables.
    - Application Note: These hardware-assists help reduce the size and complexity of the VMM, and thus, of the trusted computing base, by eliminating or reducing the need for paravirtualization or binary translation. Paravirtualization involves modifying guest software so that instructions that cannot be properly virtualized are never executed on the physical processor. + Application Note: These hardware-assists help reduce the size and complexity of the VMM, and thus, of the trusted computing base, by eliminating or reducing the need for paravirtualization or binary translation. Paravirtualization involves modifying guest software so that instructions that cannot be properly virtualized are never executed on the physical processor.

    - For the assignment in FPT_HAS_EXT.1, the ST author lists the hardware-based virtualization assists on all platforms included in the ST that are used by the VMM to reduce or eliminate the need for software-based binary translation. Examples for the x86 platform are Intel VT-x and AMD-V. “None” is an acceptable assignment for platforms that do not require virtualization assists in order to eliminate the need for binary translation. This must be documented in the TSS. + For the assignment in FPT_HAS_EXT.1, the ST author lists the hardware-based virtualization assists on all platforms included in the ST that are used by the VMM to reduce or eliminate the need for software-based binary translation. Examples for the x86 platform are Intel VT-x and AMD-V. “None” is an acceptable assignment for platforms that do not require virtualization assists in order to eliminate the need for binary translation. This must be documented in the TSS.

    - For the assignment in FPT_HAS_EXT.1.2, the ST author lists the set of hardware-based virtualization memory-handling extensions for all platforms listed in the ST that are used by the VMM to reduce or eliminate the need for shadow page tables. Examples for the x86 platform are Intel EPT and AMD RVI. “None” is an acceptable assignment for platforms that do not require memory-handling assists in order to eliminate the need for shadow page tables. This must be documented in the TSS.
    + For the assignment in FPT_HAS_EXT.1.2, the ST author lists the set of hardware-based virtualization memory-handling extensions for all platforms listed in the ST that are used by the VMM to reduce or eliminate the need for shadow page tables. Examples for the x86 platform are Intel EPT and AMD RVI. “None” is an acceptable assignment for platforms that do not require memory-handling assists in order to eliminate the need for shadow page tables. This must be documented in the TSS.
    @@ -2288,11 +2277,11 @@

    FPT_HCL_EXT.1 Hypercall Controls

    FPT_HCL_EXT.1.1
    - The TSF shall validate the parameters passed to Hypercall interfaces prior to execution of the VMM functionality exposed by each interface. + The TSF shall validate the parameters passed to Hypercall interfaces prior to execution of the VMM functionality exposed by each interface.
    - Application Note: The purpose of this requirement is to help ensure the integrity of the VMM by protecting the attack surface exposed to untrusted Guest VMs through Hypercalls. + Application Note: The purpose of this requirement is to help ensure the integrity of the VMM by protecting the attack surface exposed to untrusted Guest VMs through Hypercalls.

    - A Hypercall interface allows VMM functionality to be invoked by VM-aware guest software. For example, a hypercall interface could be used to get information about the real world, such as the time of day or the underlying hardware of the host system. A hypercall could also be used to transfer data between VMs through a copy-paste mechanism. Because hypercall interfaces expose the VMM to Guest software, these interfaces constitute attack surface. + A Hypercall interface allows VMM functionality to be invoked by VM-aware guest software. For example, a hypercall interface could be used to get information about the real world, such as the time of day or the underlying hardware of the host system. A hypercall could also be used to transfer data between VMs through a copy-paste mechanism. Because hypercall interfaces expose the VMM to Guest software, these interfaces constitute attack surface.

    There is no expectation that the evaluator will need to review source code in order to accomplish the evaluation activity.
    @@ -2318,7 +2307,7 @@

    FPT_HCL_EXT.1 Hypercall Controls

    The evaluator shall perform the following test:

    - For each hypercall interface documented in the TSS or proprietary TSS Annex, the evaluator shall attempt to invoke the function from within the VM using an invalid parameter (if any). If the VMM or VS crashes or generates an exception, or if no error is returned to the guest, then the test fails. If an error is returned to the guest, then the test succeeds. + For each hypercall interface documented in the TSS or proprietary TSS Annex, the evaluator shall attempt to invoke the function from within the VM using an invalid parameter (if any). If the VMM or VS crashes or generates an exception, or if no error is returned to the guest, then the test fails. If an error is returned to the guest, then the test succeeds.
    @@ -2348,13 +2337,9 @@

    FPT_RDM_EXT.1 Removable Devices and Media

    For purposes of this requirement, an Information Domain is:
      -
    1. - A VM or collection of VMs -
    2. +
    3. A VM or collection of VMs
    4. The Virtualization System
    5. -
    6. - Host OS -
    7. +
    8. Host OS
    9. Management Subsystem
    These requirements also apply to virtualized removable media—such as virtual CD drives that connect to ISO images—as well as physical media—such as CDROMs and USB flash drives. In the case of virtual CDROMs, virtual ejection of the virtual media is sufficient. @@ -2387,7 +2372,7 @@

    FPT_RDM_EXT.1 Removable Devices and Media

      The evaluator shall perform the following test for each listed media or device:
    • - Test FPT_RDM_EXT.1.2:1: The evaluator shall configure two VMs that are members of different information domains, with the media or device connected to one of the VMs. The evaluator shall disconnect the media or device from the VM and connect it to the other VM. The evaluator shall verify that the action performed is consistent with the action assigned in the TSS. + Test FPT_RDM_EXT.1.2:1: The evaluator shall configure two VMs that are members of different information domains, with the media or device connected to one of the VMs. The evaluator shall disconnect the media or device from the VM and connect it to the other VM. The evaluator shall verify that the action performed is consistent with the action assigned in the TSS.
    @@ -2482,7 +2467,7 @@

    FPT_VDP_EXT.1 Virtual Device Parameters

    FPT_VDP_EXT.1.1
    - The TSF shall provide interfaces for virtual devices implemented by the VMM as part of the virtual hardware abstraction. + The TSF shall provide interfaces for virtual devices implemented by the VMM as part of the virtual hardware abstraction.
    @@ -2490,9 +2475,9 @@

    FPT_VDP_EXT.1 Virtual Device Parameters

    FPT_VDP_EXT.1.2
    - The TSF shall validate the parameters passed to the virtual device interface prior to execution of the VMM functionality exposed by those interfaces. + The TSF shall validate the parameters passed to the virtual device interface prior to execution of the VMM functionality exposed by those interfaces.
    - Application Note: The purpose of this requirement is to ensure that the VMM is not vulnerable to compromise through the processing of malformed data passed to the virtual device interface from a Guest OS. The VMM cannot assume that any data coming from a VM is well-formed—even if the virtual device interface is unique to the VS and the data comes from a virtual device driver supplied by the Virtualization Vendor. + Application Note: The purpose of this requirement is to ensure that the VMM is not vulnerable to compromise through the processing of malformed data passed to the virtual device interface from a Guest OS. The VMM cannot assume that any data coming from a VM is well-formed—even if the virtual device interface is unique to the VS and the data comes from a virtual device driver supplied by the Virtualization Vendor.
    @@ -2510,7 +2495,7 @@

    FPT_VDP_EXT.1 Virtual Device Parameters

    TSS
    - The evaluator shall examine the TSS to ensure it lists all virtual devices accessible by the guest OS. The TSS, or a separate proprietary document, must also document all virtual device interfaces at the level of I/O ports or PCI Bus interfaces - including port numbers (absolute or relative to a base), port name, address range, and a description of legal input values. + The evaluator shall examine the TSS to ensure it lists all virtual devices accessible by the guest OS. The TSS, or a separate proprietary document, must also document all virtual device interfaces at the level of I/O ports or PCI Bus interfaces - including port numbers (absolute or relative to a base), port name, address range, and a description of legal input values.

    The TSS must also describe the expected behavior of the interface when presented with illegal input values. This behavior must be deterministic and indicative of parameter checking by the TSF.

    @@ -2532,7 +2517,7 @@

    FPT_VIV_EXT.1 VMM Isolation from VMs

    FPT_VIV_EXT.1.1
    - The TSF must ensure that software running in a VM is not able to degrade or disrupt the functioning of other VMs, the VMM, or the Platform. + The TSF must ensure that software running in a VM is not able to degrade or disrupt the functioning of other VMs, the VMM, or the Platform.
    @@ -2540,24 +2525,22 @@

    FPT_VIV_EXT.1 VMM Isolation from VMs

    FPT_VIV_EXT.1.2
    - The TSF must ensure that a Guest VM is unable to invoke platform code that runs at a privilege level equal to or exceeding that of the VMM without involvement of the VMM. + The TSF must ensure that a Guest VM is unable to invoke platform code that runs at a privilege level equal to or exceeding that of the VMM without involvement of the VMM.
    - Application Note: This requirement is intended to ensure that software running within a Guest VM cannot compromise other VMs, the VMM, or the platform. This requirement is not met if Guest VM software—whatever its privilege level—can crash the VS or the Platform, or breakout of its virtual hardware abstraction to gain execution on the platform, within or outside of the context of the VMM. + Application Note: This requirement is intended to ensure that software running within a Guest VM cannot compromise other VMs, the VMM, or the platform. This requirement is not met if Guest VM software—whatever its privilege level—can crash the VS or the Platform, or breakout of its virtual hardware abstraction to gain execution on the platform, within or outside of the context of the VMM.

    - This requirement is not violated if software running within a VM can crash the Guest OS and there is no way for an attacker to gain execution in the VMM or outside of the virtualized domain. + This requirement is not violated if software running within a VM can crash the Guest OS and there is no way for an attacker to gain execution in the VMM or outside of the virtualized domain.

    - FPT_VIV_EXT.1.2 addresses several specific mechanisms that must not be permitted to bypass the VMM and invoke privileged code on the Platform. + FPT_VIV_EXT.1.2 addresses several specific mechanisms that must not be permitted to bypass the VMM and invoke privileged code on the Platform.

    At a minimum, the TSF should enforce the following:

    • On the x86 platform, a virtual System Management Interrupt (SMI) cannot invoke platform System Management Mode (SMM).
    • An attempt to update virtual firmware or virtual BIOS cannot cause physical platform firmware or physical platform BIOS to be modified.
    • -
    • - An attempt to update virtual firmware or virtual BIOS cannot cause the VMM to be modified. -
    • +
    • An attempt to update virtual firmware or virtual BIOS cannot cause the VMM to be modified.
    - Of the above, the first bullet does not apply to platforms that do not support SMM. The rationale behind the third bullet is that a firmware update of a single VM must not affect other VMs. So if multiple VMs share the same firmware image as part of a common hardware abstraction, then the update of a single machine’s BIOS must not be allowed to change the common abstraction. The virtual hardware abstraction is part of the VMM. + Of the above, the first bullet does not apply to platforms that do not support SMM. The rationale behind the third bullet is that a firmware update of a single VM must not affect other VMs. So if multiple VMs share the same firmware image as part of a common hardware abstraction, then the update of a single machine’s BIOS must not be allowed to change the common abstraction. The virtual hardware abstraction is part of the VMM.
    @@ -2575,7 +2558,7 @@

    FPT_VIV_EXT.1 VMM Isolation from VMs

    TSS
    - The evaluator shall verify that the TSS (or a proprietary annex to the TSS) describes how the TSF ensures that guest software cannot degrade or disrupt the functioning of other VMs, the VMM or the platform. And how the TSF prevents guests from invoking higher-privilege platform code, such as the examples in the note. + The evaluator shall verify that the TSS (or a proprietary annex to the TSS) describes how the TSF ensures that guest software cannot degrade or disrupt the functioning of other VMs, the VMM or the platform. And how the TSF prevents guests from invoking higher-privilege platform code, such as the examples in the note.
    @@ -2625,7 +2608,7 @@

    FTP_ITC_EXT.1 Trusted Channel Communications

  • audit servers (as required by FAU_STG_EXT.1), and
  • - [selection: remote administrators (as required by FTP_TRP.1.1 if selected in FMT_MOF_EXT.1.1 in the Client or Server PP-Module), separation of management and operational networks (if selected in FMT_SMO_EXT.1), other capabilities , no other capabilities]that is logically distinct from other communication paths and provides assured identification of its endpoints and protection of the communicated data from disclosure and detection of modification of the communicated data. + [selection: remote administrators (as required by FTP_TRP.1.1 if selected in FMT_MOF_EXT.1.1 in the Client or Server PP-Module), separation of management and operational networks (if selected in FMT_SMO_EXT.1), [assignment: other capabilities ], no other capabilities]that is logically distinct from other communication paths and provides assured identification of its endpoints and protection of the communicated data from disclosure and detection of modification of the communicated data.
    Application Note: If the ST author selects either TLS or HTTPS, the TSF shall be validated against the Functional Package for TLS. This PP does not mandate that a product implement TLS with mutual authentication, but if the product includes the capability to perform TLS with mutual authentication, then mutual authentication must be included within the TOE boundary. The TLS Package requires that the X509 requirements be included by the PP, so selection of TLS or HTTPS causes FIA_X509_EXT.* to be selected.

    @@ -2656,7 +2639,7 @@

    FTP_ITC_EXT.1 Trusted Channel Communications

    Tests
    - The evaluator will configure the TOE to communicate with each external IT entity and type of remote user identified in the TSS. The evaluator will monitor network traffic while the VS performs communication with each of these destinations. The evaluator will ensure that for each session a trusted channel was established in conformance with the protocols identified in the selection. + The evaluator will configure the TOE to communicate with each external IT entity and type of remote user identified in the TSS. The evaluator will monitor network traffic while the VS performs communication with each of these destinations. The evaluator will ensure that for each session a trusted channel was established in conformance with the protocols identified in the selection.
    @@ -2741,11 +2724,11 @@

    FTP_UIF_EXT.1 User Interface: I/O Focus

    FTP_UIF_EXT.1.1
    - The TSF shall indicate to users which VM, if any, has the current input focus. + The TSF shall indicate to users which VM, if any, has the current input focus.
    - Application Note: This requirement applies to all users—whether User or Administrator. In environments where multiple VMs run at the same time, the user must have a way of knowing which VM user input is directed to at any given moment. This is especially important in multiple-domain environments. + Application Note: This requirement applies to all users—whether User or Administrator. In environments where multiple VMs run at the same time, the user must have a way of knowing which VM user input is directed to at any given moment. This is especially important in multiple-domain environments.

    - In the case of a human user, this is usually a visual indicator. In the case of headless VMs, the user is considered to be a program, but this program still needs to know which VM it is sending input to; this would typically be accomplished through programmatic means.
    + In the case of a human user, this is usually a visual indicator. In the case of headless VMs, the user is considered to be a program, but this program still needs to know which VM it is sending input to; this would typically be accomplished through programmatic means.
    @@ -2767,7 +2750,7 @@

    FTP_UIF_EXT.1 User Interface: I/O Focus

    The evaluator shall ensure that the operational guidance specifies how the current input focus is indicated to the user.
    Tests
    - For each supported input device, the evaluator shall demonstrate that the input from each device listed in the TSS is directed to the VM that is indicated to have the input focus. + For each supported input device, the evaluator shall demonstrate that the input from each device listed in the TSS is directed to the VM that is indicated to have the input focus.
    @@ -2779,11 +2762,11 @@

    FTP_UIF_EXT.2 User Interface: Identification of VM

    FTP_UIF_EXT.2.1
    - The TSF shall support the unique identification of a VM’s output display to users. + The TSF shall support the unique identification of a VM’s output display to users.
    - Application Note: In environments where a user has access to more than one VM at the same time, the user must be able to determine the identity of each VM displayed in order to avoid inadvertent cross-domain data entry. + Application Note: In environments where a user has access to more than one VM at the same time, the user must be able to determine the identity of each VM displayed in order to avoid inadvertent cross-domain data entry.

    - There must be a mechanism for associating an identifier with a VM so that an application or program displaying the VM can identify the VM to users. This is generally indicated visually for human users (e.g., VM identity in the window title bar) and programmatically for headless VMs (e.g., an API function). The identification must be unique to the VS, but does not need to be universally unique.
    + There must be a mechanism for associating an identifier with a VM so that an application or program displaying the VM can identify the VM to users. This is generally indicated visually for human users (e.g., VM identity in the window title bar) and programmatically for headless VMs (e.g., an API function). The identification must be unique to the VS, but does not need to be universally unique.
    @@ -2805,7 +2788,7 @@

    FTP_UIF_EXT.2 User Interface: Identification of VM

    The evaluator shall perform the following test:

    - The evaluator shall attempt to create and start at least three Guest VMs on a single display device where the evaluator attempts to assign two of the VMs the same identifier. If the user interface displays different identifiers for each VM, then the requirement is met. Likewise, the requirement is met if the system refuses to create or start a VM when there is already a VM with the same identifier. + The evaluator shall attempt to create and start at least three Guest VMs on a single display device where the evaluator attempts to assign two of the VMs the same identifier. If the user interface displays different identifiers for each VM, then the requirement is met. Likewise, the requirement is met if the system refuses to create or start a VM when there is already a VM with the same identifier.
    @@ -2873,7 +2856,7 @@

    5.1.9 TOE Security Functio FPT_EEM_EXT.1Requires that the TOE use security mechanisms supported by the physical platform. - FPT_GVI_EXT.1Requires that the TOE support Guest VM measurements and integrity checks (optional). + FPT_GVI_EXT.1Requires that the TOE support Guest VM measurements and integrity checks (optional). FPT_HAS_EXT.1Requires that the TOE use platform-supported virtualization assists to reduce attack surface. @@ -2966,7 +2949,7 @@

    5.1.9 TOE Security Functio FPT_HCL_EXT.1Requires that Hypercall parameters be validated. - FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective). + FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective). FPT_VDP_EXT.1Requires validation of parameter data passed to the hardware abstraction by untrusted VMs. @@ -3018,7 +3001,7 @@

    5.1.9 TOE Security Functio FPT_HCL_EXT.1Requires that Hypercall parameters be validated. - FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective). + FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective). FPT_VDP_EXT.1Requires validation of parameter data passed to the hardware abstraction by untrusted VMs. @@ -3074,12 +3057,10 @@

    5.1.9 TOE Security Functio

    -

    5.2 Security Assurance Requirements

    - The Security Objectives for the TOE in Section 4 were constructed to address threats identified in Section 3.1. The Security Functional Requirements (SFRs) in Section 5.1 are a formal instantiation of the Security Objectives. The PP identifies the Security Assurance Requirements (SARs) to frame the extent to which the evaluator assesses the documentation applicable for the evaluation and performs independent testing. -

    - This section lists the set of Security Assurance Requirements (SARs) from Part 3 of the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5 that are required in evaluations against this PP. Individual evaluation activities to be performed are specified in both Section 5.1 as well as in this section. -

    - After the ST has been approved for evaluation, the Information Technology Security Evaluation Facility (ITSEF) will obtain the TOE, supporting environmental IT, and the administrative/user guides for the TOE. The ITSEF is expected to perform actions mandated by the CEM for the ASE and ALC SARs. The ITSEF also performs the evaluation activities contained within Section 5, which are intended to be an interpretation of the other CEM assurance requirements as they apply to the specific technology instantiated in the TOE. The evaluation activities that are captured in Section 5 also provide clarification as to what the developer needs to provide to demonstrate the TOE is compliant with the PP. +

    5.2 Security Assurance Requirements

    +

    + The Security Objectives for the TOE in Section 4 were constructed to address threats identified in Section 3.1. The Security Functional Requirements (SFRs) in Section 5.1 are a formal instantiation of the Security Objectives. The PP identifies the Security Assurance Requirements (SARs) to frame the extent to which the evaluator assesses the documentation applicable for the evaluation and performs independent testing. This section lists the set of Security Assurance Requirements (SARs) from Part 3 of the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5 that are required in evaluations against this PP. Individual evaluation activities to be performed are specified in both Section 5.1 as well as in this section. After the ST has been approved for evaluation, the Information Technology Security Evaluation Facility (ITSEF) will obtain the TOE, supporting environmental IT, and the administrative/user guides for the TOE. The ITSEF is expected to perform actions mandated by the CEM for the ASE and ALC SARs. The ITSEF also performs the evaluation activities contained within Section 5, which are intended to be an interpretation of the other CEM assurance requirements as they apply to the specific technology instantiated in the TOE. The evaluation activities that are captured in Section 5 also provide clarification as to what the developer needs to provide to demonstrate the TOE is compliant with the PP. +

    5.2.1 Class ASE: Security Target Evaluation

    As per ASE activities defined in [CEM] plus the TSS evaluation activities defined for any SFRs claimed by the TOE.

    5.2.2 Class ADV: Development

    @@ -3100,7 +3081,7 @@

    Developer action elements:

    The developer shall provide a tracing from the functional specification to the SFRs.
    - Developer Note: As indicated in the introduction to this section, the functional specification is composed of the information contained in the AGD_OPR and AGD_PRE documentation, coupled with the information provided in the TSS of the ST. The evaluation activities in the functional requirements point to evidence that should exist in the documentation and TSS section; since these are directly associated with the SFRs, the tracing in element ADV_FSP.1.2D is implicitly already done and no additional documentation is necessary. + Note: As indicated in the introduction to this section, the functional specification is composed of the information contained in the AGD_OPR and AGD_PRE documentation, coupled with the information provided in the TSS of the ST. The evaluation activities in the functional requirements point to evidence that should exist in the documentation and TSS section; since these are directly associated with the SFRs, the tracing in element ADV_FSP.1.2D is implicitly already done and no additional documentation is necessary.
    @@ -3151,7 +3132,17 @@

    Evaluator action elements:

    The evaluator shall determine that the functional specification is an accurate and complete instantiation of the SFRs.
    - Application Note: There are no specific evaluation activities associated with these SARs. The functional specification documentation is provided to support the evaluation activities described in Section 5.2, and other activities described for AGD, ATE, and AVA SARs. The requirements on the content of the functional specification information is implicitly assessed by virtue of the other evaluation activities being performed; if the evaluator is unable to perform an activity because there is insufficient interface information, then an adequate functional specification has not been provided. + Note: There are no specific evaluation activities associated with these SARs. The functional specification documentation is provided to support the evaluation activities described in Section 5.2, and other activities described for AGD, ATE, and AVA SARs. The requirements on the content of the functional specification information is implicitly assessed by virtue of the other evaluation activities being performed; if the evaluator is unable to perform an activity because there is insufficient interface information, then an adequate functional specification has not been provided. +
    +
    + + @@ -3179,7 +3170,7 @@

    Developer action elements:

    The developer shall provide operational user guidance.
    - Developer Note: Rather than repeat information here, the developer should review the evaluation activities for this component to ascertain the specifics of the guidance that the evaluators will be checking for. This will provide the necessary information for the preparation of acceptable guidance. + Note: Rather than repeat information here, the developer should review the evaluation activities for this component to ascertain the specifics of the guidance that the evaluators will be checking for. This will provide the necessary information for the preparation of acceptable guidance.
    @@ -3189,7 +3180,7 @@

    Content and presentation elements:

    AGD_OPE.1.1C
    - The operational user guidance shall describe what for each user role the authorized user-accessible functions and privileges that should be controlled in a secure processing environment, including appropriate warnings. + The operational user guidance shall describe what for each user role the authorized user-accessible functions and privileges that should be controlled in a secure processing environment, including appropriate warnings.
    @@ -3197,7 +3188,7 @@

    Content and presentation elements:

    AGD_OPE.1.2C
    - The operational user guidance shall describe, for each user role the authorized user, how to use the available interfaces provided by the TOE in a secure manner. + The operational user guidance shall describe, for each user role the authorized user, how to use the available interfaces provided by the TOE in a secure manner.
    @@ -3205,7 +3196,7 @@

    Content and presentation elements:

    AGD_OPE.1.3C
    - The operational user guidance shall describe, for each user role the authorized user, the available functions and interfaces, in particular all security parameters under the control of the user, indicating secure values as appropriate. + The operational user guidance shall describe, for each user role the authorized user, the available functions and interfaces, in particular all security parameters under the control of the user, indicating secure values as appropriate.
    @@ -3213,7 +3204,7 @@

    Content and presentation elements:

    AGD_OPE.1.4C
    - The operational user guidance shall, for each user role the authorized user, clearly present each type of security-relevant event relative to the user-accessible functions that need to be performed, including changing the security characteristics of entities under the control of the TSF. + The operational user guidance shall, for each user role the authorized user, clearly present each type of security-relevant event relative to the user-accessible functions that need to be performed, including changing the security characteristics of entities under the control of the TSF.
    @@ -3229,7 +3220,7 @@

    Content and presentation elements:

    AGD_OPE.1.6C
    - The operational user guidance shall, for each user role the authorized user, describe the security measures to be followed in order to fulfill the security objectives for the operational environment as described in the ST. + The operational user guidance shall, for each user role the authorized user, describe the security measures to be followed in order to fulfill the security objectives for the operational environment as described in the ST.
    @@ -3257,7 +3248,7 @@

    Evaluator action elements:

    The operational guidance shall contain instructions for configuring the password characteristics, number of allowed authentication attempt failures, the lockout period times for inactivity, and the notice and consent warning that is to be provided when authenticating.

    - The operational guidance shall contain step-by-step instructions suitable for use by an end-user of the VS to configure a new, out-of-the-box system into the configuration evaluated under this Protection Profile. + The operational guidance shall contain step-by-step instructions suitable for use by an end-user of the VS to configure a new, out-of-the-box system into the configuration evaluated under this Protection Profile.

    The documentation shall describe the process for verifying updates to the TOE, either by checking the hash or by verifying a digital signature. The evaluator shall verify that this process includes the following steps:
      @@ -3283,7 +3274,7 @@

      Developer action elements:

      The developer shall provide the TOE including its preparative procedures.
      - Developer Note: As with the operational guidance, the developer should look to the evaluation activities to determine the required content with respect to preparative procedures. + Note: As with the operational guidance, the developer should look to the evaluation activities to determine the required content with respect to preparative procedures.
    @@ -3329,7 +3320,7 @@

    Evaluator action elements:

    As indicated in the introduction above, there are significant expectations with respect to the documentation—especially when configuring the operational environment to support TOE functional requirements. The evaluator shall check to ensure that the guidance provided for the TOE adequately addresses all platforms (that is, combination of hardware and operating system) claimed for the TOE in the ST.

    - The operational guidance shall contain step-by-step instructions suitable for use by an end-user of the VS to configure a new, out-of-the-box system into the configuration evaluated under this Protection Profile. + The operational guidance shall contain step-by-step instructions suitable for use by an end-user of the VS to configure a new, out-of-the-box system into the configuration evaluated under this Protection Profile. @@ -3426,7 +3417,7 @@

    Evaluator action elements:

    ALC_TSU_EXT.1 Timely Security Updates

    - This component requires the TOE developer, in conjunction with any other necessary parties, to provide information as to how the VS is updated to address security issues in a timely manner. The documentation describes the process of providing updates to the public from the time a security flaw is reported/discovered, to the time an update is released. This description includes the parties involved (e.g., the developer, hardware vendors) and the steps that are performed (e.g., developer testing), including worst case time periods, before an update is made available to the public. + This component requires the TOE developer, in conjunction with any other necessary parties, to provide information as to how the VS is updated to address security issues in a timely manner. The documentation describes the process of providing updates to the public from the time a security flaw is reported/discovered, to the time an update is released. This description includes the parties involved (e.g., the developer, hardware vendors) and the steps that are performed (e.g., developer testing), including worst case time periods, before an update is made available to the public.

    Developer action elements:

    @@ -3452,7 +3443,7 @@

    Content and presentation elements:

    The description shall express the time window as the length of time, in days, between public disclosure of a vulnerability and the public availability of security updates to the TOE.
    - Application Note: The total length of time may be presented as a summation of the periods of time that each party (e.g., TOE developer, hardware vendor) on the critical path consumes. The time period until public availability per deployment mechanism may differ; each is described. + Note: The total length of time may be presented as a summation of the periods of time that each party (e.g., TOE developer, hardware vendor) on the critical path consumes. The time period until public availability per deployment mechanism may differ; each is described.
    @@ -3463,7 +3454,7 @@

    Content and presentation elements:

    The description shall include the mechanisms publicly available for reporting security issues pertaining to the TOE.
    - Application Note: The reporting mechanism could include websites, email addresses, and a means to protect the sensitive nature of the report (e.g., public keys that could be used to encrypt the details of a proof-of-concept exploit). + Note: The reporting mechanism could include websites, email addresses, and a means to protect the sensitive nature of the report (e.g., public keys that could be used to encrypt the details of a proof-of-concept exploit).
    @@ -3474,6 +3465,16 @@

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    +

    5.2.5 Class ATE: Tests

    Testing is specified for functional aspects of the system as well as aspects that take advantage of design or implementation weaknesses. The former is done through the ATE_IND family, while the latter is through the AVA_VAN family. At the assurance level specified in this PP, testing is based on advertised functionality and interfaces with dependency on the availability of design information. One of the primary outputs of the evaluation process is the test report as specified in the following requirements. @@ -3610,7 +3611,7 @@

    FAU_ARP.1 Security Audit Automatic Response

    The TSF shall take[assignment: list of actions]upon detection of a potential security violation.
    - Application Note: In certain cases, it may be useful for Virtualization Systems to perform automated responses to certain security events. An example may include halting a VM which has taken some action to violate a key system security policy. This may be especially useful with headless endpoints when there is no human user in the loop. + Application Note: In certain cases, it may be useful for Virtualization Systems to perform automated responses to certain security events. An example may include halting a VM which has taken some action to violate a key system security policy. This may be especially useful with headless endpoints when there is no human user in the loop.

    The potential security violation mentioned in FAU_ARP.1.1 refers to FAU_SAA.1.
    @@ -3683,9 +3684,9 @@

    FPT_GVI_EXT.1 Guest VM Integrity

    FPT_GVI_EXT.1.1
    - The TSF shall verify the integrity of Guest VMs through the following mechanisms:[assignment: list of Guest VM integrity mechanisms]. + The TSF shall verify the integrity of Guest VMs through the following mechanisms:[assignment: list of Guest VM integrity mechanisms].
    - Application Note: The primary purpose of this requirement is to identify and describe the mechanisms used to verify the integrity of Guest VMs that have been 'imported' in some fashion, though these mechanisms could also be applied to all Guest VMs, depending on the mechanism used. Importation for this requirement could include VM migration (live or otherwise), the importation of virtual disk files that were previously exported, VMs in shared storage, etc. It is possible that a trusted VM could have been modified during the migration or import/export process, or VMs could have been obtained from untrusted sources in the first place, so integrity checks on these VMs can be a prudent measure to take. These integrity checks could be as thorough as making sure the entire VM exactly matches a previously known VM (by hash for example), or by simply checking certain configuration settings to ensure that the VM's configuration will not violate the security model of the VS. + Application Note: The primary purpose of this requirement is to identify and describe the mechanisms used to verify the integrity of Guest VMs that have been 'imported' in some fashion, though these mechanisms could also be applied to all Guest VMs, depending on the mechanism used. Importation for this requirement could include VM migration (live or otherwise), the importation of virtual disk files that were previously exported, VMs in shared storage, etc. It is possible that a trusted VM could have been modified during the migration or import/export process, or VMs could have been obtained from untrusted sources in the first place, so integrity checks on these VMs can be a prudent measure to take. These integrity checks could be as thorough as making sure the entire VM exactly matches a previously known VM (by hash for example), or by simply checking certain configuration settings to ensure that the VM's configuration will not violate the security model of the VS.
    @@ -3701,7 +3702,7 @@

    FPT_GVI_EXT.1 Guest VM Integrity

    TSS
    - For each mechanism listed in the assignment, the evaluator shall ensure that the TSS documents the mechanism, including how it verifies VM integrity, which set of Guest VMs it will check (all Guest VMs, only migrated VM s, etc.), when such checks occur (before VM startup, immediately following importation/migration, on demand, etc.), and which actions are taken if a VM fails the integrity check (or which range of actions are possible if the action is configurable). + For each mechanism listed in the assignment, the evaluator shall ensure that the TSS documents the mechanism, including how it verifies VM integrity, which set of Guest VMs it will check (all Guest VMs, only migrated VM s, etc.), when such checks occur (before VM startup, immediately following importation/migration, on demand, etc.), and which actions are taken if a VM fails the integrity check (or which range of actions are possible if the action is configurable).
    @@ -3715,9 +3716,9 @@

    FPT_DDI_EXT.1 Device Driver Isolation

    FPT_DDI_EXT.1.1
    - The TSF shall ensure that device drivers for physical devices are isolated from the VMM and all other domains. + The TSF shall ensure that device drivers for physical devices are isolated from the VMM and all other domains.
    - Application Note: In order to function on physical hardware, the VMM must have access to the device drivers for the physical platform on which it runs. These drivers are often written by third parties, and yet are effectively a part of the VMM. Thus the integrity of the VMM in part depends on the quality of third party code that the virtualization vendor has no control over. By encapsulating these drivers within one or more dedicated driver domains (e.g., Service VM or VMs) the damage of a driver failure or vulnerability can be contained within the domain, and would not compromise the VMM. When driver domains have exclusive access to a physical device, hardware isolation mechanisms, such as Intel's VT-d, AMD's Input/Output Memory Management Unit (IOMMU), or ARM's System Memory Management Unit (MMU) should be used to ensure that operations performed by Direct Memory Access (DMA) hardware are properly constrained. + Application Note: In order to function on physical hardware, the VMM must have access to the device drivers for the physical platform on which it runs. These drivers are often written by third parties, and yet are effectively a part of the VMM. Thus the integrity of the VMM in part depends on the quality of third party code that the virtualization vendor has no control over. By encapsulating these drivers within one or more dedicated driver domains (e.g., Service VM or VMs) the damage of a driver failure or vulnerability can be contained within the domain, and would not compromise the VMM. When driver domains have exclusive access to a physical device, hardware isolation mechanisms, such as Intel's VT-d, AMD's Input/Output Memory Management Unit (IOMMU), or ARM's System Memory Management Unit (MMU) should be used to ensure that operations performed by Direct Memory Access (DMA) hardware are properly constrained.
    @@ -3794,11 +3795,11 @@

    FPT_INT_EXT.1 Support for Introspection

    FPT_INT_EXT.1.1
    - The TSF shall support a mechanism for permitting the VMM or privileged VMs to access the internals of another VM for purposes of introspection. + The TSF shall support a mechanism for permitting the VMM or privileged VMs to access the internals of another VM for purposes of introspection.
    - Application Note: Introspection can be used to support malware and anomaly detection from outside of the guest environment. This not only helps protect the Guest OS, it also protects the VS by providing an opportunity for the VS to detect threats to itself that originate within VMs, and that may attempt to break out of the VM and compromise the VMM or other VMs. + Application Note: Introspection can be used to support malware and anomaly detection from outside of the guest environment. This not only helps protect the Guest OS, it also protects the VS by providing an opportunity for the VS to detect threats to itself that originate within VMs, and that may attempt to break out of the VM and compromise the VMM or other VMs.

    - The hosting of malware detection software outside of the guest VM helps protect the guest and helps ensure the integrity of the malware detection/antivirus software. This capability can be implemented in the VMM itself, but ideally it should be hosted by a Service VM so that it can be better contained and does not introduce bugs into the VMM.
    + The hosting of malware detection software outside of the guest VM helps protect the guest and helps ensure the integrity of the malware detection/antivirus software. This capability can be implemented in the VMM itself, but ideally it should be hosted by a Service VM so that it can be better contained and does not introduce bugs into the VMM.
    @@ -3814,7 +3815,7 @@

    FPT_INT_EXT.1 Support for Introspection

    TSS
    - The evaluator shall examine the TSS documentation to verify that it describes the interface for VM introspection and whether the introspection is performed by the VMM or another VM. + The evaluator shall examine the TSS documentation to verify that it describes the interface for VM introspection and whether the introspection is performed by the VMM or another VM.
    Guidance
    The evaluator shall examine the operational guidance to ensure that it contains instructions for configuration of the introspection mechanism.
    @@ -3828,7 +3829,7 @@

    FPT_ML_EXT.1 Measured Launch of Platform and VMM

    FPT_ML_EXT.1.1
    - The TSF shall support a measured launch of the Virtualization System. Measured components of the VS shall include the static executable image of the Hypervisor and:[selection: Static executable images of the Management Subsystem, list of (static images of) Service VMs , list of configuration files , no other components] + The TSF shall support a measured launch of the Virtualization System. Measured components of the VS shall include the static executable image of the Hypervisor and:[selection: Static executable images of the Management Subsystem, [assignment: list of (static images of) Service VMs ], [assignment: list of configuration files ], no other components]
    @@ -3838,9 +3839,9 @@

    FPT_ML_EXT.1 Measured Launch of Platform and VMM

    The TSF shall make the measurements selected in FPT_ML_EXT.1.1 available to the Management Subsystem.
    - Application Note: A measured launch of the platform and VS demonstrates that the proper TOE software was loaded. A measured launch process employs verifiable integrity measurement mechanisms. For example, a VS may hash components such as the hypervisor, service VMs, or the Management Subsystem. A measured launch process only allows components to be executed after the measurement has been recorded. An example process may add each component’s hash before it is executed so that the final hash reflects the evidence of a component’s state prior to execution. The measurement may be verified as the system boots, but this is not required. + Application Note: A measured launch of the platform and VS demonstrates that the proper TOE software was loaded. A measured launch process employs verifiable integrity measurement mechanisms. For example, a VS may hash components such as the hypervisor, service VMs, or the Management Subsystem. A measured launch process only allows components to be executed after the measurement has been recorded. An example process may add each component’s hash before it is executed so that the final hash reflects the evidence of a component’s state prior to execution. The measurement may be verified as the system boots, but this is not required.

    - The Platform is outside of the TOE. However, this requirement specifies that the VS must be capable of receiving Platform measurements if the Platform provides them. This requirement is requiring TOE support for Platform measurements if provided; it is not placing a requirement on the Platform to take such measurements. + The Platform is outside of the TOE. However, this requirement specifies that the VS must be capable of receiving Platform measurements if the Platform provides them. This requirement is requiring TOE support for Platform measurements if provided; it is not placing a requirement on the Platform to take such measurements.

    If available, hardware should be used to store measurements in such a manner that they cannot be modified in any manner except to be extended. These measurements should be produced in a repeatable manner so that a third party can verify the measurements if given the inputs. Hardware devices, like Trusted Platform Modules (TPM), TrustZone, and MMU are some examples that may serve as foundations for storing and reporting measurements.

    @@ -3867,7 +3868,7 @@

    FPT_ML_EXT.1 Measured Launch of Platform and VMM

    • - Test FPT_ML_EXT.1.2:1: The evaluator shall start the VS, login as an Administrator, and verify that the measurements for the specified components are viewable in the Management Subsystem. + Test FPT_ML_EXT.1.2:1: The evaluator shall start the VS, login as an Administrator, and verify that the measurements for the specified components are viewable in the Management Subsystem.
    @@ -3996,10 +3997,10 @@

    FCS_IPSEC_EXT.1 IPsec Protocol

    [selection:
    • - IKEv1, using Main Mode for Phase 1 exchanges, as defined in RFC 2407, RFC 2408, RFC 2409, RFC 4109, [selection: no other RFCs for extended sequence numbers, RFC 4304 for extended sequence numbers], [selection: no other RFCs for hash functions, RFC 4868 for hash functions], and [selection: support for XAUTH, no support for XAUTH] + IKEv1, using Main Mode for Phase 1 exchanges, as defined in RFC 2407, RFC 2408, RFC 2409, RFC 4109, [selection: no other RFCs for extended sequence numbers, RFC 4304 for extended sequence numbers], [selection: no other RFCs for hash functions, RFC 4868 for hash functions], and [selection: support for XAUTH, no support for XAUTH]
    • - IKEv2 as defined in RFC 7296 (with mandatory support for NAT traversal as specified in section 2.23), RFC 8784, RFC 8247, and [selection: no other RFCs for hash functions, RFC 4868 for hash functions]. + IKEv2 as defined in RFC 7296 (with mandatory support for NAT traversal as specified in section 2.23), RFC 8784, RFC 8247, and [selection: no other RFCs for hash functions, RFC 4868 for hash functions].
    ] @@ -4024,13 +4025,13 @@

    FCS_IPSEC_EXT.1 IPsec Protocol

    The TSF shall ensure that[selection:
    • - IKEv2 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time] + IKEv2 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • - IKEv1 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time] + IKEv1 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • - IKEv1 SA lifetimes are fixed based on [selection: number of packets/number of bytes, length of time]. If length of time is used, it must include at least one option that is 24 hours or less for Phase 1 SAs and 8 hours or less for Phase 2 SAs. + IKEv1 SA lifetimes are fixed based on [selection: number of packets/number of bytes, length of time]. If length of time is used, it must include at least one option that is 24 hours or less for Phase 1 SAs and 8 hours or less for Phase 2 SAs.
    ] @@ -4090,7 +4091,7 @@

    FCS_IPSEC_EXT.1 IPsec Protocol

    FCS_IPSEC_EXT.1.12
    - The TSF shall not establish an SA if the [[selection: IP address, Fully Qualified Domain Name (FQDN), user FQDN, Distinguished Name (DN)]and[selection: no other reference identifier type, other supported reference identifier types ]] contained in a certificate does not match the expected values for the entity attempting to establish a connection. + The TSF shall not establish an SA if the [[selection: IP address, Fully Qualified Domain Name (FQDN), user FQDN, Distinguished Name (DN)]and[selection: no other reference identifier type, [assignment: other supported reference identifier types ]]] contained in a certificate does not match the expected values for the entity attempting to establish a connection.
    Application Note: The TOE must support at least one of the following identifier types: IP address, Fully Qualified Domain Name (FQDN), user FQDN, or Distinguished Name (DN). In the future, the TOE will be required to support all of these identifier types. The TOE is expected to support as many IP address formats (IPv4 and IPv6) as IP versions supported by the TOE in general. The ST author may assign additional supported identifier types in the second selection.
    @@ -4149,7 +4150,7 @@

    FCS_IPSEC_EXT.1 IPsec Protocol

    If the configuration of the IPsec behavior is from an environmental source, most notably a VPN gateway (e.g through receipt of required connection parameters from a VPN gateway), the evaluator shall ensure that the operational guidance contains any appropriate information for ensuring that this configuration can be properly applied.

    - Note in this case that the implementation of the IPsec protocol must be enforced entirely within the TOE boundary; i.e. it is not permissible for a software application TOE to be a graphical front-end for IPsec functionality implemented totally or in part by the underlying OS platform. The behavior referenced here is for the possibility that the configuration of the IPsec connection is initiated from outside the TOE, which is permissible so long as the TSF is solely responsible for enforcing the configured behavior. However, it is allowable for the TSF to rely on low-level platform-provided networking functions to implement the SPD from the client (e.g., enforcement of packet routing decisions). + Note in this case that the implementation of the IPsec protocol must be enforced entirely within the TOE boundary; i.e. it is not permissible for a software application TOE to be a graphical front-end for IPsec functionality implemented totally or in part by the underlying OS platform. The behavior referenced here is for the possibility that the configuration of the IPsec connection is initiated from outside the TOE, which is permissible so long as the TSF is solely responsible for enforcing the configured behavior. However, it is allowable for the TSF to rely on low-level platform-provided networking functions to implement the SPD from the client (e.g., enforcement of packet routing decisions).

    Tests
    @@ -4604,7 +4605,7 @@

    FIA_X509_EXT.2 X.509 Certificate Authentication

    FIA_X509_EXT.2.1
    - The TSF shall use X.509v3 certificates as defined by RFC 5280 to support authentication for[selection: IPsec, TLS, HTTPS, SSH, code signing for system software updates, other uses ] + The TSF shall use X.509v3 certificates as defined by RFC 5280 to support authentication for[selection: IPsec, TLS, HTTPS, SSH, code signing for system software updates, [assignment: other uses ]]
    Application Note: This SFR must be included in the ST if the selection for FPT_TUD_EXT.1.3 is “digital signature mechanism,” if "certificate-based authentication of the remote peer" is selected in FTP_ITC_EXT.1, or if "authentication based on X.509 certificates" is selected in FIA_UAU.5.1.

    @@ -4837,7 +4838,7 @@

    E.4 Specific Guidance f

    E.5 Specific Guidance for Determining Platform Equivalence

    - Platform equivalence is used to determine the platforms that a product must be tested on. These guidelines are divided into sections for determining hardware equivalence and software (host OS/control domain) equivalence. If the Product is installed onto bare metal, then only hardware equivalence is relevant. If the Product is installed onto an OS—or is integrated into an OS—then both hardware and software equivalence are required. Likewise, if the Product can be installed either on bare metal or on an operating system, both hardware and software equivalence are relevant. + Platform equivalence is used to determine the platforms that a product must be tested on. These guidelines are divided into sections for determining hardware equivalence and software (host OS/control domain) equivalence. If the Product is installed onto bare metal, then only hardware equivalence is relevant. If the Product is installed onto an OS—or is integrated into an OS—then both hardware and software equivalence are required. Likewise, if the Product can be installed either on bare metal or on an operating system, both hardware and software equivalence are relevant.

    E.5.1 Hardware Platform Equivalence

    @@ -4847,13 +4848,13 @@

    E.5.1 Hardware Platf Platforms with different processor architectures and instruction sets are not equivalent. This is probably not an issue because there is likely to be a different product model for different hardware environments.

    - Equivalency analysis becomes important when comparing platforms with the same processor architecture. Processors with the same architecture that have instruction sets that are subsets or supersets of each other are not disqualified from being equivalent for purposes of a VPP evaluation. If the VS takes the same code paths when executing PP-specified security functionality on different processors of the same family, then the processors can be considered equivalent with respect to that application. + Equivalency analysis becomes important when comparing platforms with the same processor architecture. Processors with the same architecture that have instruction sets that are subsets or supersets of each other are not disqualified from being equivalent for purposes of a VPP evaluation. If the VS takes the same code paths when executing PP-specified security functionality on different processors of the same family, then the processors can be considered equivalent with respect to that application.

    - For example, if a VS follows one code path on platforms that support the AES-NI instruction and another on platforms that do not, then those two platforms are not equivalent with respect to that VS functionality. But if the VS follows the same code path whether or not the platform supports AES-NI, then the platforms are equivalent with respect to that functionality. + For example, if a VS follows one code path on platforms that support the AES-NI instruction and another on platforms that do not, then those two platforms are not equivalent with respect to that VS functionality. But if the VS follows the same code path whether or not the platform supports AES-NI, then the platforms are equivalent with respect to that functionality.

    - The platforms are equivalent with respect to the VS if the platforms are equivalent with respect to all PP-specified security functionality. + The platforms are equivalent with respect to the VS if the platforms are equivalent with respect to all PP-specified security functionality.

    Table 7: Factors for Determining Hardware Platform Equivalence @@ -4909,19 +4910,19 @@

    E.6 Level of Specificity The ST must describe all configurations evaluated down to processor manufacturer, model number, and microarchitecture version.

    - The information regarding claimed equivalent configurations depends on the platform that the VS was developed for and runs on. + The information regarding claimed equivalent configurations depends on the platform that the VS was developed for and runs on.

    - Bare-Metal VS + Bare-Metal VS

    For VSes that run without an operating system on bare-metal or virtual bare-metal, the claimed configuration must describe the platform down to the specific processor manufacturer, model number, and microarchitecture version. The Vendor must describe the differences in the TOE with respect to PP-specified security functionality and how the TOE operates differently to leverage platform differences (e.g., instruction set extensions) in the tested configuration versus the claimed equivalent configuration.

    - VS with OS Support + VS with OS Support

    - For VSes that run on an OS host or with the assistance of an OS, then the claimed configuration must describe the OS down to its specific model and version number. The Vendor must describe the differences in the TOE with respect to PP-specified security functionality and how the TOE functions differently to leverage platform differences in the tested configuration versus the claimed equivalent configuration. + For VSes that run on an OS host or with the assistance of an OS, then the claimed configuration must describe the OS down to its specific model and version number. The Vendor must describe the differences in the TOE with respect to PP-specified security functionality and how the TOE functions differently to leverage platform differences in the tested configuration versus the claimed equivalent configuration.

    Appendix F - Acronyms

    - - - - - - @@ -4972,9 +4967,6 @@

    Appendix F - Acronyms

    - - - @@ -4990,15 +4982,6 @@

    Appendix F - Acronyms

    - - - - - - - - -
    @@ -4951,12 +4952,6 @@

    Appendix F - Acronyms

    OEOperational Environment
    OSGuest Operating System
    OSHost Operating System
    PPProtection Profile
    SFRSecurity Functional Requirement
    SSPSystem Security Policy
    STSecurity Target
    TSSTOE Summary Specification
    VMVirtual Machine
    VMMVirtual Machine Manager
    VSVirtualization System

    Appendix G - Bibliography

    diff --git a/xml-builder-test/AppliedTDs.html b/xml-builder-test/AppliedTDs.html index 553230b..dcf511a 100644 --- a/xml-builder-test/AppliedTDs.html +++ b/xml-builder-test/AppliedTDs.html @@ -632,7 +632,7 @@

    Protection Profile for Virtualization

    NIAP Logo
    Version: 1.1
    2021-06-14
    NIAP

    Revision History

    -
    VersionDateComment
    1.02016-11-17Initial Publication
    1.12021-06-14Incorporate TDs, Reference TLS Package, Add Equivalency Guidelines, etc.

    TDs Applied

    Contents

    1Introduction1.1Compliant Targets of Evaluation1.2Terms1.2.1Common Criteria Terms1.2.2Technical Terms1.3Use Cases2Conformance Claims3Security Problem Definition3.1Threats3.2Assumptions3.3Organizational Security Policies4Security Objectives4.1Security Objectives for the TOE4.2Security Objectives for the Operational Environment4.3Security Objectives Rationale5Security Requirements5.1Security Functional Requirements5.1.1Class: Security Audit (FAU)5.1.2Class: Cryptographic Support (FCS)5.1.3Class: User Data Protection (FDP)5.1.4Class: Identification and Authentication (FIA)5.1.5Class: Security Management (FMT)5.1.6Class: Protection of the TSF (FPT)5.1.7Class: TOE Access Banner (FTA)5.1.8Class: Trusted Path/Channel (FTP)5.1.9TOE Security Functional Requirements Rationale5.2Security Assurance Requirements5.2.1Class ASE: Security Target Evaluation5.2.2Class ADV: Development5.2.3Class AGD: Guidance Documents5.2.4Class ALC: Life-Cycle Support5.2.5Class ATE: Tests5.2.6Class AVA: Vulnerability AssessmentAppendix A - Optional RequirementsA.1Strictly Optional Requirements +

    TDs Applied

    Contents

    1Introduction1.1Compliant Targets of Evaluation1.2Terms1.2.1Common Criteria Terms1.2.2Technical Terms1.3Use Cases2Conformance Claims3Security Problem Definition3.1Threats3.2Assumptions3.3Organizational Security Policies4Security Objectives4.1Security Objectives for the TOE4.2Security Objectives for the Operational Environment4.3Security Objectives Rationale5Security Requirements5.1Security Functional Requirements5.1.1Class: Security Audit (FAU)5.1.2Class: Cryptographic Support (FCS)5.1.3Class: User Data Protection (FDP)5.1.4Class: Identification and Authentication (FIA)5.1.5Class: Security Management (FMT)5.1.6Class: Protection of the TSF (FPT)5.1.7Class: TOE Access Banner (FTA)5.1.8Class: Trusted Path/Channel (FTP)5.1.9TOE Security Functional Requirements Rationale5.2Security Assurance Requirements5.2.1Class ASE: Security Target Evaluation5.2.2Class ADV: Development5.2.3Class AGD: Guidance Documents5.2.4Class ALC: Life-Cycle Support5.2.5Class ATE: Tests5.2.6Class AVA: Vulnerability AssessmentAppendix A - Optional RequirementsA.1Strictly Optional Requirements A.1.1Class: Security Audit (FAU)A.1.2Class: Protection of the TSF (FPT)A.2Objective Requirements A.2.1Class: Protection of the TSF (FPT)A.3Implementation-dependent Requirements Appendix B - Selection-based Requirements @@ -678,7 +678,7 @@

    1.2.1 Common Criteria Terms
    Guest Network
    See Operational Network. -
    Guest Operating System (OS)
    An operating system that runs within a Guest VM. +
    Guest Operating System
    An operating system that runs within a Guest VM.
    Guest VM
    A Guest VM is a VM that contains a virtual environment for the execution of an independent computing system. Virtual environments execute mission workloads and implement customer-specific client or server functionality in Guest VMs, such as a web server or desktop productivity applications. @@ -687,7 +687,7 @@

    1.2.1 Common Criteria Terms -
    Host Operating System (OS)
    An operating system onto which a VS is installed. Relative to the VS, the Host OS is +
    Host Operating System
    An operating system onto which a VS is installed. Relative to the VS, the Host OS is part of the Platform. There need not be a Host OS, but often VSes employ a Host OS or Control Domain to support guest access to host resources. Sometimes these domains are themselves encapsulated within VMs.
    Hypercall
    An API function that allows VM-aware software running within a VM to invoke VMM functionality. @@ -720,34 +720,33 @@

    1.2.1 Common Criteria Terms -
    System Security Policy (SSP)
    The overall policy enforced by the VS defining constraints on the behavior +
    System Security Policy
    The overall policy enforced by the VS defining constraints on the behavior of VMs and users.
    User
    Users operate Guest VMs and are subject to configuration policies applied to the VS by Administrators. Users need not be human as in the case of embedded or headless VMs, users are often nothing more than software entities that operate within the VM. -
    Virtual Machine (VM)
    A Virtual Machine is a virtualized hardware environment in which an operating system +
    Virtual Machine
    A Virtual Machine is a virtualized hardware environment in which an operating system may execute. -
    Virtual Machine Manager (VMM)
    A VMM is a collection of software components responsible for enabling VMs to +
    Virtual Machine Manager
    A VMM is a collection of software components responsible for enabling VMs to function as expected by the software executing within them. Generally, the VMM consists of a Hypervisor, Service VMs, and other components of the VS, such as virtual devices, binary translation systems, and physical device drivers. It manages concurrent execution of all VMs and virtualizes platform resources as needed. -
    Virtualization System (VS)
    A software product that enables multiple independent computing systems to +
    Virtualization System
    A software product that enables multiple independent computing systems to execute on the same physical hardware platform without interference from one another. For the purposes of this document, the VS consists of a Virtual Machine Manager (VMM), Virtual Machine abstractions, a management subsystem, and other components.

    1.3 Use Cases

    This
    Base-PP does not define any use cases for virtualization technology. Client Virtualization and Server Virtualization products have different use cases and so these are defined in their respective PP-Modules.

    2 Conformance Claims

    -
    Conformance Statement

    A Security Target must claim exact conformance to this Protection Profile, as defined in the CC and CEM addenda for Exact Conformance, Selection-Based SFRs, and Optional SFRs (dated May 2017). The following PPs and PP-Modules are allowed to be specified in a PP-Configuration with this PP-Module with this PP.

    • PP-Module for Client Virtualization Systems, Version 1.1
    • PP-Module for Server Virtualization Systems, Version 1.1
    CC Conformance Claims
    This PP is conformant to Parts 2 (extended) and 3 (extended) of Common Criteria Version 3.1, Release 5 [CC].
    PP Claim

    Package Claim

    +
    Conformance Statement

    A Security Target must claim exact conformance to this Protection Profile, as defined in the CC and CEM addenda for Exact Conformance, Selection-Based SFRs, and Optional SFRs (dated May 2017). The following PPs and PP-Modules are allowed to be specified in a PP-Configuration with this PP-Module with this PP.

    • PP-Module for Client Virtualization Systems, Version 1.1
    • PP-Module for Server Virtualization Systems, Version 1.1
    CC Conformance Claims
    This PP is conformant to Parts 2 (extended) and 3 (extended) of Common Criteria Version 3.1, Release 5 [CC].
    PP Claims

    Package Claims

    3 Security Problem Definition

    -

    3.1 Threats

    -
    T.3P_SOFTWARE
    In some VS implementations, functions critical to the security of the TOE are by necessity performed by software not produced by the virtualization vendor. Such software may include physical device drivers, and even non-TOE entities such as Host Operating Systems. Since this software has the same or similar privilege level as the VS, vulnerabilities can be exploited by an adversary to compromise the VS and VMs. Where possible, the VS should mitigate the results of potential vulnerabilities or malicious content in third-party code on which it relies. For example, physical device drivers (potentially the Host OS) could be encapsulated within VMs in order to limit the effects of compromise.
    T.DATA_LEAKAGE
    It is a fundamental property of VMs that the domains encapsulated by different VMs remain separate unless data sharing is permitted by policy. For this reason, all Virtualization Systems shall support a policythat prohibits information transfer between VMs. It shall be possible to configure VMs such that data cannot be moved between domains from VM to VM, orthrough virtual or physical network components under the control of the VS. When VMs are configured assuch, it shall not be possible for data to leak between domains, neither by the express efforts ofsoftware or users of a VM, nor because of vulnerabilities or errors in the implementation of the VMM orother VS components. If it is possible for data to leak between domains when prohibited by policy, then an adversary on one domain or network can obtain data from another domain. Such cross-domain data leakage can, for example, causeclassified information, corporate proprietary information, or personally identifiable information to bemade accessible to unauthorized entities.
    T.DENIAL_OF_SERVICE
    A VM may block others from system resources (e.g., system memory, persistent storage, and processing time) via a resource exhaustion attack.
    T.MISCONFIGURATION
    The VS may be misconfigured, which could impact its functioning and security. This misconfiguration could be due to an administrative error or the use of faulty configuration data.
    T.PLATFORM_COMPROMISE
    The VS must be capable of protecting the platform from threats that originate within VMs and operational networks connected to the VS. The hosting of untrusted—even malicious—domains by the VS cannot be permitted to compromise the security and integrity of the platform on which the VS executes. If an attacker can access the underlying platform in a manner not controlled by the VMM, the attacker might be able to modify system firmware or software—compromising both the VS and the underlying platform.
    T.UNAUTHORIZED_ACCESS
    Functions performed by the management layer include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only certain authorized system users (administrators) are allowed to exercise management functions or obtain sensitive information from the TOE. Virtualization Systems are often managed remotely over communication networks. Members of these networks can be both geographically and logically separated from each other, and pass through a variety of other systems which may be under the control of an adversary, and offer the opportunity for communications to be compromised. An adversary with access to an open management network could inject commands into the management infrastructure or extract sensitive information. This would provide an adversary with administrator privilege on the platform, and administrative control over the VMs and virtual network connections. The adversary could also gain access to the management network by hijacking the management network channel.
    T.UNAUTHORIZED_MODIFICATION
    System integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. Malware running on the platform must not be able to undetectably modify VS components while the system is running or at rest. Likewise, malicious code running within a virtual machine must not be able to modify Virtualization System components.
    T.UNAUTHORIZED_UPDATE
    It is common for attackers to target outdated versions of software containing known flaws. This means it is extremely important to update VS software as soon as possible when updates are available. But the source of the updates and the updates themselves must be trusted. If an attacker can write their own update containing malicious code they can take control of the VS.
    T.UNPATCHED_SOFTWARE
    Vulnerabilities in outdated or unpatched software can be exploited by adversaries to compromise the VS or platform.
    T.USER_ERROR
    If a Virtualization System is capable of simultaneously displaying VMs of different domains to the same user at the same time, there is always the chance that the user will become confused and unintentionally leak information between domains. This is especially likely if VMs belonging to different domains are indistinguishable. Malicious code may also attempt to interfere with the user’s ability to distinguish between domains. The VS must take measures to minimize the likelihood of such confusion.
    T.VMM_COMPROMISE
    The VS is designed to provide the appearance of exclusivity to the VMs and is designed to separate or isolate their functions except where specifically shared. Failure of security mechanisms could lead to unauthorized intrusion into or modification of the VMM, or bypass of the VMM altogether, by non-TOE software, such as that running in Guest or Helper VMs or on the host platform. This must be prevented to avoid compromising the VS.
    T.WEAK_CRYPTO
    To the extent that VMs appear isolated within the VS, a threat of weak cryptography may arise if the VMM does not provide good entropy to support security-related features that depend on entropy to implement cryptographic algorithms. For example, a random number generator keeps an estimate of the number of bits of noise in the entropy pool. From this entropy pool random numbers are created. Good random numbers are essential to implementing strong cryptography. Cryptography implemented using poor random numbers can be defeated by a sophisticated adversary. Such defeat can result in the compromise of Guest VM data and credentials, and of VS data and credentials, and can enable unauthorized access to the VS or VMs.
    +
    T.3P_SOFTWARE
    In some VS implementations, functions critical to the security of the TOE are by necessity performed by software not produced by the virtualization vendor. Such software may include physical device drivers, and even non-TOE entities such as Host Operating Systems. Since this software has the same or similar privilege level as the VS, vulnerabilities can be exploited by an adversary to compromise the VS and VMs. Where possible, the VS should mitigate the results of potential vulnerabilities or malicious content in third-party code on which it relies. For example, physical device drivers (potentially the Host OS) could be encapsulated within VMs in order to limit the effects of compromise.
    T.DATA_LEAKAGE
    It is a fundamental property of VMs that the domains encapsulated by different VMs remain separate unless data sharing is permitted by policy. For this reason, all Virtualization Systems shall support a policythat prohibits information transfer between VMs. It shall be possible to configure VMs such that data cannot be moved between domains from VM to VM, orthrough virtual or physical network components under the control of the VS. When VMs are configured assuch, it shall not be possible for data to leak between domains, neither by the express efforts ofsoftware or users of a VM, nor because of vulnerabilities or errors in the implementation of the VMM orother VS components. If it is possible for data to leak between domains when prohibited by policy, then an adversary on one domain or network can obtain data from another domain. Such cross-domain data leakage can, for example, causeclassified information, corporate proprietary information, or personally identifiable information to bemade accessible to unauthorized entities.
    T.DENIAL_OF_SERVICE
    A VM may block others from system resources (e.g., system memory, persistent storage, and processing time) via a resource exhaustion attack.
    T.MISCONFIGURATION
    The VS may be misconfigured, which could impact its functioning and security. This misconfiguration could be due to an administrative error or the use of faulty configuration data.
    T.PLATFORM_COMPROMISE
    The VS must be capable of protecting the platform from threats that originate within VMs and operational networks connected to the VS. The hosting of untrusted—even malicious—domains by the VS cannot be permitted to compromise the security and integrity of the platform on which the VS executes. If an attacker can access the underlying platform in a manner not controlled by the VMM, the attacker might be able to modify system firmware or software—compromising both the VS and the underlying platform.
    T.UNAUTHORIZED_ACCESS
    Functions performed by the management layer include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only certain authorized system users (administrators) are allowed to exercise management functions or obtain sensitive information from the TOE. Virtualization Systems are often managed remotely over communication networks. Members of these networks can be both geographically and logically separated from each other, and pass through a variety of other systems which may be under the control of an adversary, and offer the opportunity for communications to be compromised. An adversary with access to an open management network could inject commands into the management infrastructure or extract sensitive information. This would provide an adversary with administrator privilege on the platform, and administrative control over the VMs and virtual network connections. The adversary could also gain access to the management network by hijacking the management network channel.
    T.UNAUTHORIZED_MODIFICATION
    System integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. Malware running on the platform must not be able to undetectably modify VS components while the system is running or at rest. Likewise, malicious code running within a virtual machine must not be able to modify Virtualization System components.
    T.UNAUTHORIZED_UPDATE
    It is common for attackers to target outdated versions of software containing known flaws. This means it is extremely important to update VS software as soon as possible when updates are available. But the source of the updates and the updates themselves must be trusted. If an attacker can write their own update containing malicious code they can take control of the VS.
    T.UNPATCHED_SOFTWARE
    Vulnerabilities in outdated or unpatched software can be exploited by adversaries to compromise the VS or platform.
    T.USER_ERROR
    If a Virtualization System is capable of simultaneously displaying VMs of different domains to the same user at the same time, there is always the chance that the user will become confused and unintentionally leak information between domains. This is especially likely if VMs belonging to different domains are indistinguishable. Malicious code may also attempt to interfere with the user’s ability to distinguish between domains. The VS must take measures to minimize the likelihood of such confusion.
    T.VMM_COMPROMISE
    The VS is designed to provide the appearance of exclusivity to the VMs and is designed to separate or isolate their functions except where specifically shared. Failure of security mechanisms could lead to unauthorized intrusion into or modification of the VMM, or bypass of the VMM altogether, by non-TOE software, such as that running in Guest or Helper VMs or on the host platform. This must be prevented to avoid compromising the VS.
    T.WEAK_CRYPTO
    To the extent that VMs appear isolated within the VS, a threat of weak cryptography may arise if the VMM does not provide good entropy to support security-related features that depend on entropy to implement cryptographic algorithms. For example, a random number generator keeps an estimate of the number of bits of noise in the entropy pool. From this entropy pool random numbers are created. Good random numbers are essential to implementing strong cryptography. Cryptography implemented using poor random numbers can be defeated by a sophisticated adversary. Such defeat can result in the compromise of Guest VM data and credentials, and of VS data and credentials, and can enable unauthorized access to the VS or VMs.

    3.2 Assumptions

    -
    A.NON_MALICIOUS_USER
    The user of the VS is not willfully negligent or hostile, and uses the VS in compliance with the applied enterprise security policy and guidance. At the same time, malicious applications could act as the user, so requirements which confine malicious applications are still in scope.
    A.PHYSICAL
    Physical security commensurate with the value of the TOE and the data it contains is assumed to be provided by the environment.
    A.PLATFORM_INTEGRITY
    The platform has not been compromised prior to installation of the VS.
    A.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance.
    +
    A.NON_MALICIOUS_USER
    The user of the VS is not willfully negligent or hostile, and uses the VS in compliance with the applied enterprise security policy and guidance. At the same time, malicious applications could act as the user, so requirements which confine malicious applications are still in scope.
    A.PHYSICAL
    Physical security commensurate with the value of the TOE and the data it contains is assumed to be provided by the environment.
    A.PLATFORM_INTEGRITY
    The platform has not been compromised prior to installation of the VS.
    A.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance.

    3.3 Organizational Security Policies

    @@ -759,17 +758,17 @@

    3.3 O

    4 Security Objectives

    4.1 Security Objectives for the TOE

    -
    O.AUDIT
    An audit log must be created that captures accesses to the objects the TOE protects. The log of these accesses, or audit events, must be protected from modification, unauthorized access, and destruction. The audit log must be sufficiently detailed to indicate the date and time of the event, the identify of the user, the type of event, and the success or failure of the event.
    O.CORRECTLY_APPLIED_CONFIGURATION
    The TOE must not apply configurations that violate the current security policy. The TOE must correctly apply configurations and policies to a newly created Guest VM, as well as to existing Guest VMs when applicable configuration or policy changes are made. All changes to configuration and to policy must conform to the existing security policy. Similarly, changes made to the configuration of the TOE itself must not violate the existing security policy.
    O.DOMAIN_INTEGRITY
    While the VS is not responsible for the contents or correct functioning of software that runs within Guest VMs, it is responsible for ensuring that the correct functioning of the software within a Guest VM is not interfered with by other VMs.
    O.MANAGEMENT_ACCESS
    VMM management functions include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only authorized users (administrators) may exercise management functions. Because of the privileges exercised by the VMM management functions, it must not be possible for the VMM’s management components to be compromised without administrator notification. This means that unauthorized users cannot be permitted access to the management functions, and the management components must not be interfered with by Guest VMs or unprivileged users on other networks—including operational networks connected to the TOE. VMMs include a set of management functions that collectively allow administrators to configure and manage the VMM, as well as configure Guest VMs. These management functions are specific to the VS and are distinct from any other management functions that might exist for the internal management of any given Guest VM. These VMM management functions are privileged, with the security of the entire system relying on their proper use. The VMM management functions can be classified into different categories and the policy for their use and the impact to security may vary accordingly. The management functions are distributed throughout the VMM (within the VMM and Service VMs). The VMM must support the necessary mechanisms to enable the control of all management functions according to the system security policy. When a management function is distributed among multiple Service VMs, the VMs must be protected using the security mechanisms of the Hypervisor and any Service VMs involved to ensure that the intent of the system security policy is not compromised. Additionally, since hypercalls permit Guest VMs to invoke the Hypervisor, and often allow the passing of data to the Hypervisor, it is important that the hypercall interface is well-guarded and that all parameters be validated. The VMM maintains configuration data for every VM on the system. This configuration data, whether of Service or Guest VMs, must be protected. The mechanisms used to establish, modify and verify configuration data are part of the VS management functions and must be protected as such. The proper internal configuration of Service VMs that provide critical security functions can also greatly impact VS security. These configurations must also be protected. Internal configuration of Guest VMs should not impact overall VS security. The overall goal is to ensure that the VMM, including the environments internal to Service VMs, is properly configured and that all Guest VM configurations are maintained consistent with the system security policy throughout their lifecycle. Virtualization Systems are often managed remotely. For example, an administrator can remotely update virtualization software, start and shut down VMs, and manage virtualized network connections. If a console is required, it could be run on a separate machine or it could itself run in a VM. When performing remote management, an administrator must communicate with a privileged management agent over a network. Communications with the management infrastructure must be protected from Guest VMs and operational networks.
    O.PATCHED_SOFTWARE
    The VS must be updated and patched when needed in order to prevent the potential compromise of the VMM, as well as the networks and VMs that it hosts. Identifying and applying needed updates must be a normal part of the operating procedure to ensure that patches are applied in a timely and thorough manner. In order to facilitate this, the VS must support standards and protocols that help enhance the manageability of the VS as an IT product, enabling it to be integrated as part of a manageable network (e.g., reporting current patch level and patchability).
    O.PLATFORM_INTEGRITY
    The integrity of the VMM depends on the integrity of the hardware and software on which the VMM relies. Although the VS does not have complete control over the integrity of the platform, the VS should as much as possible try to ensure that no users or software hosted by the VS can undermine the integrity of the platform.
    O.RESOURCE_ALLOCATION
    The TOE will provide mechanisms that enforce constraints on the allocation of system resources in accordance with existing security policy.
    O.VMM_INTEGRITY
    Integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. This objective concerns only the integrity of the VS—not the integrity of software running inside of Guest VMs or of the physical platform. The overall objective is to ensure the integrity of critical components of a VS. Initial integrity of a VS can be established through mechanisms such as a digitally signed installation or update package, or through integrity measurements made at launch. Integrity is maintained in a running system by careful protection of the VMM from untrusted users and software. For example, it must not be possible for software running within a Guest VM to exploit a vulnerability in a device or hypercall interface and gain control of the VMM. The vendor must release patches for vulnerabilities as soon as practicable after discovery.
    O.VM_ENTROPY
    VMs must have access to good entropy sources to support security-related features that implement cryptographic algorithms. For example, in order to function as members of operational networks, VMs must be able to communicate securely with other network entities—whether virtual or physical. They must therefore have access to sources of good entropy to support that secure communication.
    O.VM_ISOLATION
    VMs are the fundamental subject of the system. The VMM is responsible for applying the system security policy (SSP) to the VM and all resources. As basic functionality, the VMM must support a security policy that mandates no information transfer between VMs. The VMM must support the necessary mechanisms to isolate the resources of all VMs. The VMM partitions a platform's physical resources for use by the supported virtual environments. Depending on customer requirements, a VM may need a completely isolated environment with exclusive access to system resources or share some of its resources with other VMs. It must be possible to enforce a security policy that prohibits the transfer of data between VMs through shared devices. When the platform security policy allows the sharing of resources across VM boundaries, the VMM must ensure that all access to those resources is consistent with the policy. The VMM may delegate the responsibility for the mediation of resource sharing to select Service VMs; however in doing so, it remains responsible for mediating access to the Service VMs, and each Service VM must mediate all access to any shared resource that has been delegated to it in accordance with the SSP. Both virtual and physical devices are resources requiring access control. The VMM must enforce access control in accordance with system security policy. Physical devices are platform devices with access mediated via the VMM per the O.VMM_Integrity objective. Virtual devices may include virtual storage devices and virtual network devices. Some of the access control restrictions must be enforced internal to Service VMs, as may be the case for isolating virtual networks. VMMs may also expose purely virtual interfaces. These are VMM specific, and while they are not analogous to a physical device, they are also subject to access control. The VMM must support the mechanisms to isolate all resources associated with virtual networks and to limit a VM's access to only those virtual networks for which it has been configured. The VMM must also support the mechanisms to control the configurations of virtual networks according to the SSP.
    +
    O.AUDIT
    An audit log must be created that captures accesses to the objects the TOE protects. The log of these accesses, or audit events, must be protected from modification, unauthorized access, and destruction. The audit log must be sufficiently detailed to indicate the date and time of the event, the identify of the user, the type of event, and the success or failure of the event.
    O.CORRECTLY_APPLIED_CONFIGURATION
    The TOE must not apply configurations that violate the current security policy. The TOE must correctly apply configurations and policies to a newly created Guest VM, as well as to existing Guest VMs when applicable configuration or policy changes are made. All changes to configuration and to policy must conform to the existing security policy. Similarly, changes made to the configuration of the TOE itself must not violate the existing security policy.
    O.DOMAIN_INTEGRITY
    While the VS is not responsible for the contents or correct functioning of software that runs within Guest VMs, it is responsible for ensuring that the correct functioning of the software within a Guest VM is not interfered with by other VMs.
    O.MANAGEMENT_ACCESS
    VMM management functions include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only authorized users (administrators) may exercise management functions. Because of the privileges exercised by the VMM management functions, it must not be possible for the VMM’s management components to be compromised without administrator notification. This means that unauthorized users cannot be permitted access to the management functions, and the management components must not be interfered with by Guest VMs or unprivileged users on other networks—including operational networks connected to the TOE. VMMs include a set of management functions that collectively allow administrators to configure and manage the VMM, as well as configure Guest VMs. These management functions are specific to the VS and are distinct from any other management functions that might exist for the internal management of any given Guest VM. These VMM management functions are privileged, with the security of the entire system relying on their proper use. The VMM management functions can be classified into different categories and the policy for their use and the impact to security may vary accordingly. The management functions are distributed throughout the VMM (within the VMM and Service VMs). The VMM must support the necessary mechanisms to enable the control of all management functions according to the system security policy. When a management function is distributed among multiple Service VMs, the VMs must be protected using the security mechanisms of the Hypervisor and any Service VMs involved to ensure that the intent of the system security policy is not compromised. Additionally, since hypercalls permit Guest VMs to invoke the Hypervisor, and often allow the passing of data to the Hypervisor, it is important that the hypercall interface is well-guarded and that all parameters be validated. The VMM maintains configuration data for every VM on the system. This configuration data, whether of Service or Guest VMs, must be protected. The mechanisms used to establish, modify and verify configuration data are part of the VS management functions and must be protected as such. The proper internal configuration of Service VMs that provide critical security functions can also greatly impact VS security. These configurations must also be protected. Internal configuration of Guest VMs should not impact overall VS security. The overall goal is to ensure that the VMM, including the environments internal to Service VMs, is properly configured and that all Guest VM configurations are maintained consistent with the system security policy throughout their lifecycle. Virtualization Systems are often managed remotely. For example, an administrator can remotely update virtualization software, start and shut down VMs, and manage virtualized network connections. If a console is required, it could be run on a separate machine or it could itself run in a VM. When performing remote management, an administrator must communicate with a privileged management agent over a network. Communications with the management infrastructure must be protected from Guest VMs and operational networks.
    O.PATCHED_SOFTWARE
    The VS must be updated and patched when needed in order to prevent the potential compromise of the VMM, as well as the networks and VMs that it hosts. Identifying and applying needed updates must be a normal part of the operating procedure to ensure that patches are applied in a timely and thorough manner. In order to facilitate this, the VS must support standards and protocols that help enhance the manageability of the VS as an IT product, enabling it to be integrated as part of a manageable network (e.g., reporting current patch level and patchability).
    O.PLATFORM_INTEGRITY
    The integrity of the VMM depends on the integrity of the hardware and software on which the VMM relies. Although the VS does not have complete control over the integrity of the platform, the VS should as much as possible try to ensure that no users or software hosted by the VS can undermine the integrity of the platform.
    O.RESOURCE_ALLOCATION
    The TOE will provide mechanisms that enforce constraints on the allocation of system resources in accordance with existing security policy.
    O.VMM_INTEGRITY
    Integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. This objective concerns only the integrity of the VS—not the integrity of software running inside of Guest VMs or of the physical platform. The overall objective is to ensure the integrity of critical components of a VS. Initial integrity of a VS can be established through mechanisms such as a digitally signed installation or update package, or through integrity measurements made at launch. Integrity is maintained in a running system by careful protection of the VMM from untrusted users and software. For example, it must not be possible for software running within a Guest VM to exploit a vulnerability in a device or hypercall interface and gain control of the VMM. The vendor must release patches for vulnerabilities as soon as practicable after discovery.
    O.VM_ENTROPY
    VMs must have access to good entropy sources to support security-related features that implement cryptographic algorithms. For example, in order to function as members of operational networks, VMs must be able to communicate securely with other network entities—whether virtual or physical. They must therefore have access to sources of good entropy to support that secure communication.
    O.VM_ISOLATION
    VMs are the fundamental subject of the system. The VMM is responsible for applying the system security policy (SSP) to the VM and all resources. As basic functionality, the VMM must support a security policy that mandates no information transfer between VMs. The VMM must support the necessary mechanisms to isolate the resources of all VMs. The VMM partitions a platform's physical resources for use by the supported virtual environments. Depending on customer requirements, a VM may need a completely isolated environment with exclusive access to system resources or share some of its resources with other VMs. It must be possible to enforce a security policy that prohibits the transfer of data between VMs through shared devices. When the platform security policy allows the sharing of resources across VM boundaries, the VMM must ensure that all access to those resources is consistent with the policy. The VMM may delegate the responsibility for the mediation of resource sharing to select Service VMs; however in doing so, it remains responsible for mediating access to the Service VMs, and each Service VM must mediate all access to any shared resource that has been delegated to it in accordance with the SSP. Both virtual and physical devices are resources requiring access control. The VMM must enforce access control in accordance with system security policy. Physical devices are platform devices with access mediated via the VMM per the O.VMM_Integrity objective. Virtual devices may include virtual storage devices and virtual network devices. Some of the access control restrictions must be enforced internal to Service VMs, as may be the case for isolating virtual networks. VMMs may also expose purely virtual interfaces. These are VMM specific, and while they are not analogous to a physical device, they are also subject to access control. The VMM must support the mechanisms to isolate all resources associated with virtual networks and to limit a VM's access to only those virtual networks for which it has been configured. The VMM must also support the mechanisms to control the configurations of virtual networks according to the SSP.

    4.2 Security Objectives for the Operational Environment

    -
    OE.CONFIG
    TOE administrators will configure the VS correctly to create the intended security policy.
    OE.NON_MALICIOUS_USER
    Users are trusted to not be willfully negligent or hostile and use the VS in compliance with the applied enterprise security policy and guidance.
    OE.PHYSICAL
    Physical security, commensurate with the value of the TOE and the data it contains, is provided by the environment.
    OE.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner.
    +
    OE.CONFIG
    TOE administrators will configure the VS correctly to create the intended security policy.
    OE.NON_MALICIOUS_USER
    Users are trusted to not be willfully negligent or hostile and use the VS in compliance with the applied enterprise security policy and guidance.
    OE.PHYSICAL
    Physical security, commensurate with the value of the TOE and the data it contains, is provided by the environment.
    OE.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner.

    4.3 Security Objectives Rationale

    This section describes how the assumptions, threats, and organizational security policies map to the security objectives. -
    Table 1: Security Objectives Rationale
    Threat, Assumption, or OSPSecurity ObjectivesRationale
    T.3P_​SOFTWAREO.VMM_​INTEGRITYThe VMM integrity mechanisms include environment-based vulnerability mitigation and potentiallysupport for introspection and device driver isolation, all of which reduce the likelihood that any vulnerabilities in third-party software can be used to exploit the TOE.
    T.DATA_​LEAKAGEO.DOMAIN_​INTEGRITYLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    O.VM_​ISOLATIONLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    T.DENIAL_​OF_​SERVICEO.RESOURCE_​ALLOCATIONThe ability of the TSF to ensure the proper allocation of resources makes denial of serviceattacks more difficult.
    T.MISCONFIGURATIONO.CORRECTLY_​APPLIED_​CONFIGURATIONMechanisms to prevent the application of configurations that violate the current security policy help prevent misconfigurations.
    T.PLATFORM_​COMPROMISEO.PLATFORM_​INTEGRITYPlatform integrity mechanisms used by the TOE reduce the risk that an attacker can ‘break out’ of a VM and affect the platform on which the VS is running.
    T.UNAUTHORIZED_​ACCESSO.MANAGEMENT_​ACCESSEnsuring that TSF management functions cannot be executed without authorization prevents untrustedsubjects from modifying the behavior of the TOE in an unanticipated manner.
    T.UNAUTHORIZED_​MODIFICATIONO.AUDITEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    O.VMM_​INTEGRITYEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    T.UNAUTHORIZED_​UPDATEO.VMM_​INTEGRITYSystem integrity prevents the TOE from installing a software patch containing unknown andpotentially malicious code.
    T.UNPATCHED_​SOFTWAREO.PATCHED_​SOFTWAREThe ability to patch the TOE software ensures that protections against vulnerabilities can be applied as they become available.
    T.USER_​ERRORO.VM_​ISOLATIONIsolation of VMs includes clear attribution of those VMs to their respective domains which reducesthe likelihood that a user inadvertently inputs or transfers data meant for one VM into another.
    T.VMM_​COMPROMISEO.VMM_​INTEGRITYMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    O.VM_​ISOLATIONMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    T.WEAK_​CRYPTOO.VM_​ENTROPYAcquisition of good entropy is necessary to support the TOE's security-related cryptographicalgorithms.
    A.NON_​MALICIOUS_​USEROE.CONFIGIf the TOE is administered by a non-malicious and non-negligent user, the expected result is that the TOE + - + @@ -2736,7 +2745,7 @@

    5.1.9 TOE Security Functio

    - + @@ -2752,7 +2761,7 @@

    5.1.9 TOE Security Functio

    - + @@ -2771,30 +2780,29 @@

    5.1.9 TOE Security Functio

    Table 1: Security Objectives Rationale
    Threat, Assumption, or OSPSecurity ObjectivesRationale
    T.3P_​SOFTWAREO.VMM_​INTEGRITYThe VMM integrity mechanisms include environment-based vulnerability mitigation and potentiallysupport for introspection and device driver isolation, all of which reduce the likelihood that any vulnerabilities in third-party software can be used to exploit the TOE.
    T.DATA_​LEAKAGEO.DOMAIN_​INTEGRITYLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    O.VM_​ISOLATIONLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    T.DENIAL_​OF_​SERVICEO.RESOURCE_​ALLOCATIONThe ability of the TSF to ensure the proper allocation of resources makes denial of serviceattacks more difficult.
    T.MISCONFIGURATIONO.CORRECTLY_​APPLIED_​CONFIGURATIONMechanisms to prevent the application of configurations that violate the current security policy help prevent misconfigurations.
    T.PLATFORM_​COMPROMISEO.PLATFORM_​INTEGRITYPlatform integrity mechanisms used by the TOE reduce the risk that an attacker can ‘break out’ of a VM and affect the platform on which the VS is running.
    T.UNAUTHORIZED_​ACCESSO.MANAGEMENT_​ACCESSEnsuring that TSF management functions cannot be executed without authorization prevents untrustedsubjects from modifying the behavior of the TOE in an unanticipated manner.
    T.UNAUTHORIZED_​MODIFICATIONO.AUDITEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    O.VMM_​INTEGRITYEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    T.UNAUTHORIZED_​UPDATEO.VMM_​INTEGRITYSystem integrity prevents the TOE from installing a software patch containing unknown andpotentially malicious code.
    T.UNPATCHED_​SOFTWAREO.PATCHED_​SOFTWAREThe ability to patch the TOE software ensures that protections against vulnerabilities can be applied as they become available.
    T.USER_​ERRORO.VM_​ISOLATIONIsolation of VMs includes clear attribution of those VMs to their respective domains which reducesthe likelihood that a user inadvertently inputs or transfers data meant for one VM into another.
    T.VMM_​COMPROMISEO.VMM_​INTEGRITYMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    O.VM_​ISOLATIONMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    T.WEAK_​CRYPTOO.VM_​ENTROPYAcquisition of good entropy is necessary to support the TOE's security-related cryptographicalgorithms.
    A.NON_​MALICIOUS_​USEROE.CONFIGIf the TOE is administered by a non-malicious and non-negligent user, the expected result is that the TOE will be configured in a correct and secure manner.
    OE.NON_​MALICIOUS_​USERIf the organization properly vets and trains users, it is expected that they will be non-malicious.
    A.PHYSICALOE.PHYSICALIf the TOE is deployed in a location that has appropriate physical safeguards, it can be assumed to be physically secure.
    A.PLATFORM_​INTEGRITYOE.PHYSICALIf the underlying platform has not been compromised prior to installation of the TOE, its integrity can be assumed to be intact.
    A.TRUSTED_​ADMINOE.TRUSTED_​ADMINProviding guidance to administrators and ensuring that individuals are properly trained and @@ -823,17 +822,17 @@

    5.1.1 Class: Security Audit (FAU)< The ST author can include other auditable events directly in Table t-audit-mandatory; they are not limited to the list presented. The ST author should update the table in FAU_GEN.1.2 with any additional information generated. “Subject identity” in FAU_GEN.1.2 could be a - user id or an identifier specifying a VM, for example.

    + user id or an identifier specifying a VM, for example.

    Appropriate entries from Table t-audit-optional, Table t-audit-objective, and Table t-audit-sel-based should be included in the ST if the associated SFRs and selections are included.

    The Table t-audit-mandatory entry for FDP_VNC_EXT.1 refers to configuration settings that attach VMs to virtualized network components. Changes to these configurations can be made - during VM execution or when VMs are not running. Audit records + during VM execution or when VMs are not running. Audit records must be generated for either case.

    - The intent of the audit requirement for FDP_PPR_EXT.1 is to log that the VM is connected - to a physical device (when the device becomes part of the VM's hardware view), not - to log every time that the device is accessed. Generally, this is only once at VM + The intent of the audit requirement for FDP_PPR_EXT.1 is to log that the VM is connected + to a physical device (when the device becomes part of the VM's hardware view), not + to log every time that the device is accessed. Generally, this is only once at VM startup. However, some devices can be connected and disconnected during operation (e.g., virtual USB devices such as CD-ROMs). All such connection/disconnection events must be logged.

    @@ -924,8 +923,9 @@

    5.1.1 Class: Security Audit (FAU)<
    The TSF shall be able to transmit the generated audit data to an external IT entity using a trusted channel as specified in FTP_ITC_EXT.1.
    -
    The TSF shall[selection: drop new audit data, overwrite previous audit records according to the following rule: [assignment: - rule for overwriting previous audit records ], other action ]when the local storage space for audit data is full.
    Application +
    The TSF shall[selection: drop new audit data, overwrite previous audit records according to the following rule: [assignment: + rule for overwriting previous audit records ], [assignment: + other action ]]when the local storage space for audit data is full.
    Application Note: An external log server, if available, might be used as alternative storage space in case the local storage space is full. An ‘other action’ could be defined in this case as ‘send the @@ -984,7 +984,7 @@

    5.1.2 Class: Cryptographic Support

    FCS_CKM.1 Cryptographic Key Generation

    The TSF shall generate asymmetric cryptographic keys in accordance with a specified cryptographic key generation algorithm[selection:
    • RSA schemes using cryptographic key sizes [2048-bit or greater] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.3] -
    • ECC schemes using [“NIST curves” P-256, P-384, and [selection: P-521, no other curves] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.4]
    • +
    • ECC schemes using [“NIST curves” P-256, P-384, and [selection: P-521, no other curves] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.4]
    • FFC schemes using cryptographic key sizes [2048-bit or greater] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.1]].
    • FFC Schemes using Diffie-Hellman group 14 that meet the following: [RFC 3526]
    • FFC Schemes using safe primes that meet the following: [‘NIST Special Publication 800-56A Revision 3, “Recommendation for Pair-Wise Key Establishment Schemes"]
    ]and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet the @@ -1342,7 +1342,7 @@

    5.1.2 Class: Cryptographic Support

    FCS_COP.1/Sig Cryptographic Operation (Signature Algorithms)

    The TSF shall perform [ cryptographic signature services (generation and verification) ] in accordance with a specified cryptographic algorithm[selection:
    • RSA schemes using cryptographic key sizes [2048-bit or greater] that meet - the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 4]
    • ECDSA schemes using [“NIST curves” P-256, P-384 and [selection: P-521, no other curves]] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 5]
    ].
    Application + the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 4]
  • ECDSA schemes using [“NIST curves” P-256, P-384 and [selection: P-521, no other curves]] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 5]
  • ].
    Application Note: The ST Author should choose the algorithm implemented to perform digital signatures; if more than one algorithm is available, this requirement should be iterated to specify the @@ -1533,36 +1533,36 @@

    5.1.2 Class: Cryptographic Support
    The TSF shall provide independent entropy across multiple VMs.
    Application Note: - This requirement ensures that sufficient entropy is available to any VM that requires it. The entropy - need not provide high-quality entropy for every possible method that a VM might acquire it. The VMM - must, however, provide some means for VMs to get sufficient entropy. For example, the VMM can - provide an interface that returns entropy to a Guest VM. Alternatively, the VMM could provide + This requirement ensures that sufficient entropy is available to any VM that requires it. The entropy + need not provide high-quality entropy for every possible method that a VM might acquire it. The VMM + must, however, provide some means for VMs to get sufficient entropy. For example, the VMM can + provide an interface that returns entropy to a Guest VM. Alternatively, the VMM could provide pass-through access to entropy sources provided by the host platform.

    - This requirement allows for three general ways of providing entropy to guests: 1) The VS can provide a - Hypercall accessible to VM-aware guests, 2) access to a virtualized device that provides entropy, or + This requirement allows for three general ways of providing entropy to guests: 1) The VS can provide a + Hypercall accessible to VM-aware guests, 2) access to a virtualized device that provides entropy, or 3) pass-through access to a hardware entropy source (including a source of random numbers). In all - cases, it is possible that the guest is made VM-aware through installation of software or drivers. - For the second and third cases, it is possible that the guest could be VM-unaware. There is no - requirement that the TOE provide entropy sources as expected by VM-unaware guests. That is, the TOE + cases, it is possible that the guest is made VM-aware through installation of software or drivers. + For the second and third cases, it is possible that the guest could be VM-unaware. There is no + requirement that the TOE provide entropy sources as expected by VM-unaware guests. That is, the TOE does not have to anticipate every way a guest might try to acquire entropy as long as it supplies a - mechanism that can be used by VM-aware guests, or provides access to a standard mechanism that a - VM-unaware guest would use.

    + mechanism that can be used by VM-aware guests, or provides access to a standard mechanism that a + VM-unaware guest would use.

    The ST author should select “Hypercall interface” if the TSF provides an API function through which guest-resident software can obtain entropy or random numbers. The ST author should select - “virtual device interface” if the TSF presents a virtual device interface to the Guest OS through + “virtual device interface” if the TSF presents a virtual device interface to the Guest OS through which it can obtain entropy or random numbers. Such an interface could present a virtualized real - device, such as a TPM, that can be accessed by VM-unaware guests, or a virtualized fictional device - that would require the Guest OS to be VM-aware. The ST author should select “passthrough access to + device, such as a TPM, that can be accessed by VM-unaware guests, or a virtualized fictional device + that would require the Guest OS to be VM-aware. The ST author should select “passthrough access to hardware entropy source” if the TSF permits Guest VMs to have direct access to hardware entropy or random number source on the platform. The ST author should select all items that are appropriate.

    - For FCS_ENT_EXT.1.2, the VMM must ensure that the provision of entropy to one VM cannot affect the quality - of entropy provided to another VM on the same platform. + For FCS_ENT_EXT.1.2, the VMM must ensure that the provision of entropy to one VM cannot affect the quality + of entropy provided to another VM on the same platform.
    The evaluator shall verify that the TSS describes how the TOE provides entropy to Guest VMs, and how to access the interface to acquire entropy or random numbers. The evaluator shall verify that - the TSS describes the mechanisms for ensuring that one VM does not affect the entropy acquired by + the TSS describes the mechanisms for ensuring that one VM does not affect the entropy acquired by another.
    Tests
      @@ -1571,13 +1571,13 @@

      5.1.2 Class: Cryptographic Support
    • Test FCS_ENT_EXT.1.2:1: - The evaluator shall invoke entropy from each Guest VM. The evaluator shall - verify that each VM acquires values from the interface. + The evaluator shall invoke entropy from each Guest VM. The evaluator shall + verify that each VM acquires values from the interface.
    • Test FCS_ENT_EXT.1.2:2: The evaluator shall invoke entropy from multiple VMs as nearly simultaneously as practicable. The evaluator shall verify that the entropy used in one - VM is not identical to that invoked from the other VMs. + VM is not identical to that invoked from the other VMs.
    @@ -1655,11 +1655,13 @@

    5.1.3 Class: User Data Protection -
    The TSF shall use[selection: no mechanism, list of platform-provided, hardware-based mechanisms ]to constrain a Guest VM's direct access to the following physical devices:[selection: no devices, physical devices to which the VMM allows Guest VMs physical access ].
    Application +
    The TSF shall use[selection: no mechanism, [assignment: + list of platform-provided, hardware-based mechanisms ]]to constrain a Guest VM's direct access to the following physical devices:[selection: no devices, [assignment: + physical devices to which the VMM allows Guest VMs physical access ]].
    Application Note: The TSF must use available hardware-based isolation mechanisms to constrain VMs when VMs have direct access to physical devices. “Direct access” in this context means that the - VM can read or write device memory or access device I/O ports without the VMM being able to intercept + VM can read or write device memory or access device I/O ports without the VMM being able to intercept and validate every transaction.
    @@ -1679,15 +1681,17 @@

    5.1.3 Class: User Data Protection -
    The TSF shall allow an authorized administrator to control Guest VM access to the following physical platform resources:[assignment: - list of physical platform resources the VMM isable to control access to].
    -
    The TSF shall explicitly deny all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, list of physical platform resources to which access is explicitly denied ].
    -
    The TSF shall explicitly allow all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, list of physical platform resources to which access is always allowed ].
    Application +
    The TSF shall allow an authorized administrator to control Guest VM access to the following physical platform resources:[assignment: + list of physical platform resources the VMM isable to control access to].
    +
    The TSF shall explicitly deny all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, [assignment: + list of physical platform resources to which access is explicitly denied ]].
    +
    The TSF shall explicitly allow all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, [assignment: + list of physical platform resources to which access is always allowed ]].
    Application Note: For purposes of this requirement, physical platform resources are divided into three categories: -
    1. those to which Guest OS access is configurable and moderated by the VMM
    2. those to which the Guest OS is never allowed to have direct access, and
    3. those to which the Guest OS is always allowed to have direct access.
    - For element 1, the ST author lists the physical platform resources that can be configured for Guest VM access by +
    1. those to which Guest OS access is configurable and moderated by the VMM
    2. those to which the Guest OS is never allowed to have direct access, and
    3. those to which the Guest OS is always allowed to have direct access.
    + For element 1, the ST author lists the physical platform resources that can be configured for Guest VM access by an administrator. For element 2, the ST author lists the physical platform resources to which Guest VMs may never be allowed direct access. If there are no such resources, the ST author selects "no physical platform resources." Likewise, any resources to which all Guest VMs automatically have access to are to be listed in @@ -1696,20 +1700,20 @@

    5.1.3 Class: User Data Protection
    -
    The evaluator shall examine the TSS to determine that it describes the mechanism by which the VMM controls a Guest VM's access to +
    The evaluator shall examine the TSS to determine that it describes the mechanism by which the VMM controls a Guest VM's access to physical platform resources. This description shall cover all of the physical - platforms allowed in the evaluated configuration by the ST. It should explain how the VMM distinguishes among Guest VMs, and + platforms allowed in the evaluated configuration by the ST. It should explain how the VMM distinguishes among Guest VMs, and how each physical platform resource that is controllable (that is, listed in the assignment statement in the first element) is identified to an Administrator.

    - The evaluator shall ensure that the TSS describes how the Guest VM is associated with each + The evaluator shall ensure that the TSS describes how the Guest VM is associated with each physical resource, and how other Guest VMs cannot access a physical resource without being granted explicit access. For TOEs that implement a robust interface (other than just "allow access" or "deny access"), the evaluator shall ensure that the TSS describes the possible operations or modes of access between a Guest - VM's and physical platform resources.

    + VM's and physical platform resources.

    If physical resources are listed in the second element, the evaluator shall examine the TSS and operational guidance to determine that there appears to be no way to - configure those resources for access by a Guest VM. The evaluator shall + configure those resources for access by a Guest VM. The evaluator shall document in the evaluation report their analysis of why the controls offered to configure access to physical resources can't be used to specify access to the resources identified in the second element (for example, if the interface offers a drop-down list of resources to assign, and the @@ -1727,12 +1731,12 @@

    5.1.3 Class: User Data Protection
    • Test FDP_PPR_EXT.1.3:1: For each physical platform resource identified in the first element, the evaluator shall - configure a Guest VM to have access to that resource and show that the Guest VM is able to + configure a Guest VM to have access to that resource and show that the Guest VM is able to successfully access that resource.
    • Test FDP_PPR_EXT.1.3:2: For each physical platform resource identified in the first element, the evaluator shall - configure the system such that a Guest VM does not have access to that resource and show - that the Guest VM is unable to successfully access that resource.
    • + configure the system such that a Guest VM does not have access to that resource and show + that the Guest VM is unable to successfully access that resource.
    • Test FDP_PPR_EXT.1.3:3: [conditional]: For TOEs that have a robust control interface, the evaluator shall exercise each element of the interface as described in the TSS and the operational guidance to @@ -1740,13 +1744,13 @@

      5.1.3 Class: User Data Protection
    • Test FDP_PPR_EXT.1.3:4: [conditional]: If the TOE explicitly denies access to certain physical resources, the evaluator shall attempt to access each listed (in FDP_PPR_EXT.1.2) physical resource - from a Guest VM and observe that access is denied.
    • + from a Guest VM and observe that access is denied.

    • Test FDP_PPR_EXT.1.3:5: [conditional]: If the TOE explicitly allows access to certain physical resources, the evaluator shall attempt to access each listed (in FDP_PPR_EXT.1.3) physical resource - from a Guest VM and observe that the access is allowed. If the operational guidance - specifies that access is allowed simultaneously by more than one Guest VM, the evaluator - shall attempt to access each resource listed from more than one Guest VM and show that + from a Guest VM and observe that the access is allowed. If the operational guidance + specifies that access is allowed simultaneously by more than one Guest VM, the evaluator + shall attempt to access each resource listed from more than one Guest VM and show that access is allowed.

    @@ -1758,24 +1762,24 @@

    5.1.3 Class: User Data Protection -
    The TSF shall ensure that any previous information content of physical memory is cleared prior to allocation to a Guest VM.
    Application +
    The TSF shall ensure that any previous information content of physical memory is cleared prior to allocation to a Guest VM.
    Application Note: - Physical memory must be zeroed before it is made accessible to a VM for general use - by a Guest OS.

    - The purpose of this requirement is to ensure that a VM does not receive memory - containing data previously used by another VM or the host.

    - “For general use” means for use by the Guest OS in its page tables for running applications or system +
    Physical memory must be zeroed before it is made accessible to a VM for general use + by a Guest OS.

    + The purpose of this requirement is to ensure that a VM does not receive memory + containing data previously used by another VM or the host.

    + “For general use” means for use by the Guest OS in its page tables for running applications or system software.

    This does not apply to pages shared by design or policy between VMs or between the VMMs and VMs, such - as read-only OS pages or pages used for virtual device buffers. + as read-only OS pages or pages used for virtual device buffers.
    The evaluator shall ensure that the TSS documents the process used for clearing - physical memory prior to allocation to a Guest VM, providing details on when + physical memory prior to allocation to a Guest VM, providing details on when and how this is performed. Additionally, the evaluator shall ensure that the TSS documents the conditions under which physical memory is not cleared prior to allocation to a - Guest VM, and describes when and how the memory is cleared.
    + Guest VM, and describes when and how the memory is cleared.

    FDP_RIP_EXT.2 Residual Information on Disk

    @@ -1784,18 +1788,18 @@

    5.1.3 Class: User Data Protection -
    The TSF shall ensure that any previous information content of physical disk storage is cleared to zeros upon allocation to a Guest VM.
    Application +
    The TSF shall ensure that any previous information content of physical disk storage is cleared to zeros upon allocation to a Guest VM.
    Application Note: - The purpose of this requirement is to ensure that a VM does not receive disk storage containing data - previously used by another VM or by the host.

    + The purpose of this requirement is to ensure that a VM does not receive disk storage containing data + previously used by another VM or by the host.

    Clearing of disk storage only upon deallocation does not meet this requirement.

    This does not apply to disk-resident files shared by design or policy between VMs or between the VMMs and VMs, such as read-only data files or files used for inter-VM data transfers permitted by policy.
    The evaluator shall ensure that the TSS documents how the TSF ensures that disk storage is zeroed upon allocation to - Guest VMs. Also, the TSS must document any conditions under which disk storage is not cleared prior to allocation to a Guest VM. + Guest VMs. Also, the TSS must document any conditions under which disk storage is not cleared prior to allocation to a Guest VM. Any file system format and metadata information needed by the evaluator to perform the below test shall be made available to the evaluator, but need not be published in the TSS.
    Tests
    @@ -1806,8 +1810,8 @@

    5.1.3 Class: User Data Protection storage device (or multiple files whose individual sizes add up to more than half the size of the storage media). This file (or files) shall be filled entirely with a non-zero value. Then, the file (or files) shall be released (freed for use but not cleared). Next, the - evaluator (as a VS Administrator) creates a virtual disk at least that large on the same - physical storage device and connects it to a powered-off VM. Then, from outside the Guest VM, + evaluator (as a VS Administrator) creates a virtual disk at least that large on the same + physical storage device and connects it to a powered-off VM. Then, from outside the Guest VM, scan through and check that all the non-metadata (as documented in the TSS) in the file corresponding to that virtual disk is set to zero. @@ -1821,26 +1825,27 @@

    5.1.3 Class: User Data Protection -
    The VS shall provide the following mechanisms for transferring data between Guest VMs:[selection: no mechanism, virtual networking, other inter-VM data sharing mechanisms ].
    +
    The VS shall provide the following mechanisms for transferring data between Guest VMs:[selection: no mechanism, virtual networking, [assignment: + other inter-VM data sharing mechanisms ]].
    The TSF shall by default enforce a policy prohibiting sharing of data between Guest VMs.
    The TSF shall allow Administrators to configure the mechanisms selected in FDP_VMS_EXT.1.1 to enable and disable the transfer of data between Guest VMs.
    -
    The VS shall ensure that no Guest VM is able to read or transfer data to or from another Guest VM except through the mechanisms listed in FDP_VMS_EXT.1.1.
    Application +
    The VS shall ensure that no Guest VM is able to read or transfer data to or from another Guest VM except through the mechanisms listed in FDP_VMS_EXT.1.1.
    Application Note: The fundamental requirement of a Virtualization System is the ability to enforce separation between information domains implemented as Virtual Machines and Virtual Networks. The intent of this - requirement is to ensure that VMs, VMMs, and the VS as a whole is implemented with + requirement is to ensure that VMs, VMMs, and the VS as a whole is implemented with this fundamental requirement in mind.

    - The ST author should select “no mechanism” in the unlikely event that the VS implements no mechanisms for + The ST author should select “no mechanism” in the unlikely event that the VS implements no mechanisms for transferring data between Guest VMs. Otherwise, the ST author should select “virtual networking” and identify all other mechanisms through which data can be transferred between Guest VMs.

    Examples of non-network inter-VM sharing mechanisms are:

    • User interface-based mechanisms, such as copy-paste and drag-and-drop
    • Shared virtual or physical devices
    • API-based mechanisms such as Hypercalls
    For data transfer mechanisms implemented in terms of Hypercall functions, FDP_VMS_EXT.1.3 is met if FPT_HCL_EXT.1.1 is met for those Hypercall functions (Hypercall function parameters are checked).

    For data transfer mechanisms that use shared physical devices, FDP_VMS_EXT.1.3 is met if the device is - listed in and meets FDP_PPR_EXT.1.1 (VM access to the physical device is configurable).

    + listed in and meets FDP_PPR_EXT.1.1 (VM access to the physical device is configurable).

    For data transfer mechanisms that use virtual networking, FDP_VMS_EXT.1.3 is met if FDP_VNC_EXT.1.1 - is met (VM access to virtual networks is configurable).

    + is met (VM access to virtual networks is configurable).

    The evaluator shall examine the TSS to verify that it documents all inter-VM @@ -1860,7 +1865,7 @@

    5.1.3 Class: User Data Protection the default configuration.
  • Test that the two VMs cannot communicate through the mechanisms selected in FDP_VMS_EXT.1.1.
  • Create two new VMs, overriding the default configuration to allow communications through a channel selected in FDP_VMS_EXT.1.1.
  • Test that communications can be passed between the VMs through the channel.
  • Create two new VMs, the first with the inter-VM communications channel currently being tested enabled, and the second with the inter-VM communications channel currently - being tested disabled.
  • Test that communications cannot be passed between the VMs through the channel.
  • As an Administrator, enable inter-VM communications between the VMs on the second VM.
  • Test that communications can be passed through the inter-VM channel.
  • As an Administrator again, disable inter-VM communications between the two VMs.
  • Test that communications can no longer be passed through the channel.
  • + being tested disabled.
  • Test that communications cannot be passed between the VMs through the channel.
  • As an Administrator, enable inter-VM communications between the VMs on the second VM.
  • Test that communications can be passed through the inter-VM channel.
  • As an Administrator again, disable inter-VM communications between the two VMs.
  • Test that communications can no longer be passed through the channel.
  • FDP_VMS_EXT.1.2 is met if communication is unsuccessful in step (b). FDP_VMS_EXT.1.3 is met if communication is successful in step (d) and unsuccessful in step (f).

    @@ -1875,12 +1880,12 @@

    5.1.3 Class: User Data Protection
    The TSF shall allow Administrators to configure virtual networking components to connect VMs to each other and to physical networks.
    -
    The TSF shall ensure that network traffic visible to a Guest VM on a virtual network--or virtual segment of a physical network--is visible only to Guest VMs configured to be on that virtual network or segment.
    Application +
    The TSF shall ensure that network traffic visible to a Guest VM on a virtual network--or virtual segment of a physical network--is visible only to Guest VMs configured to be on that virtual network or segment.
    Application Note: Virtual networks must be separated from one another to provide isolation commensurate with that provided by physically separate networks. It must not be possible for data to cross between properly configured - virtual networks regardless of whether the traffic originated from a local Guest VM or a remote host.

    + virtual networks regardless of whether the traffic originated from a local Guest VM or a remote host.

    Unprivileged users must not be able to connect VMs to each other or to external networks.

    @@ -1895,16 +1900,16 @@

    5.1.3 Class: User Data Protection
    Tests
    • Test FDP_VNC_EXT.1.2:1: - The evaluator shall assume the role of the Administrator and attempt to configure a VM to + The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect to a network component. The evaluator shall verify that the attempt is successful. The evaluator shall then assume the role of an unprivileged user and attempt the same connection. - If the attempt fails, or there is no way for an unprivileged user to configure VM network + If the attempt fails, or there is no way for an unprivileged user to configure VM network connections, the requirement is met.
    • Test FDP_VNC_EXT.1.2:2: - The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect + The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect to a physical network. The evaluator shall verify that the attempt is successful. The evaluator shall then assume the role of an unprivileged user and make the same attempt. - If the attempt fails, or there is no way for an unprivileged user to configure VM network + If the attempt fails, or there is no way for an unprivileged user to configure VM network connections, the requirement is met.
    @@ -1919,10 +1924,11 @@

    5.1.4 Class: Identification and Au -
    The TSF shall detect when[selection: a positive integer number , an administrator configurable positive integer within a [assignment: - range of acceptable values ]]unsuccessful authentication attempts occur related to Administrators attempting to authenticate remotely using[selection: username and password, username and PIN].
    -
    When the defined number of unsuccessful authentication attempts has been met, the TSF shall:[selection: prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until [assignment: - action to unlock ] is taken by an Administrator, prevent the offending Administrator from successfully establishing a remote session using +
    The TSF shall detect when[selection: [assignment: + a positive integer number ], an administrator configurable positive integer within a [assignment: + range of acceptable values ]]unsuccessful authentication attempts occur related to Administrators attempting to authenticate remotely using[selection: username and password, username and PIN].
    +
    When the defined number of unsuccessful authentication attempts has been met, the TSF shall:[selection: prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until [assignment: + action to unlock ] is taken by an Administrator, prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until an Administrator-defined time period has elapsed]
    Application Note: @@ -1979,7 +1985,8 @@

    5.1.4 Class: Identification and Au
    The TSF shall provide the following password management capabilities for administrative passwords:
    1. Passwords shall be able to be composed of any combination of upper and lower case characters, digits, and the following special characters: - [selection: “!”, “@”, “#”, “$”, “%”, “^”, “& ”, “*”, “(“, “)”, other characters ]
    2. Minimum password length shall be configurable
    3. Passwords of at least 15 characters in length shall be supported
    Application + [selection: “!”, “@”, “#”, “$”, “%”, “^”, “& ”, “*”, “(“, “)”, [assignment: + other characters ]]
  • Minimum password length shall be configurable
  • Passwords of at least 15 characters in length shall be supported
  • Application Note: This SFR is included in the ST if the ST Author selects ‘authentication based on username and password’ @@ -2014,8 +2021,8 @@

    5.1.4 Class: Identification and Au If "directory-based" is selected anywhere in FIA_UAU.5.1 then "Ability to configure name/address of directory server to bind with" must be selected in the Client or Server module management function table. -
    The TSF shall provide the following authentication mechanisms:[selection:
    • [selection: local, directory-based] authentication based on username and password
    • authentication based on username and a PIN that releases an asymmetric key stored in - OE-protected storage
    • [selection: local, directory-based] authentication based on X.509 certificates
    • [selection: local, directory-based] authentication based on an SSH public key credential
    ]to support Administrator authentication.
    Application +
    The TSF shall provide the following authentication mechanisms:[selection:
    • [selection: local, directory-based] authentication based on username and password
    • authentication based on username and a PIN that releases an asymmetric key stored in + OE-protected storage
    • [selection: local, directory-based] authentication based on X.509 certificates
    • [selection: local, directory-based] authentication based on an SSH public key credential
    ]to support Administrator authentication.
    Application Note: Selection of ‘authentication based on username and password’ requires that FIA_PMG_EXT.1 be included in the ST. This also requires that the ST include a management function for @@ -2031,14 +2038,14 @@

    5.1.4 Class: Identification and Au
    Tests
      - If ‘username and password authentication‘ is selected, the evaluator will configure the VS with a + If ‘username and password authentication‘ is selected, the evaluator will configure the VS with a known username and password and conduct the following tests:
    • Test FIA_UAU.5.2:1: - The evaluator will attempt to authenticate to the VS using the known username and password. + The evaluator will attempt to authenticate to the VS using the known username and password. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:2: - The evaluator will attempt to authenticate to the VS using the known username but an incorrect + The evaluator will attempt to authenticate to the VS using the known username but an incorrect password. The evaluator will ensure that the authentication attempt is unsuccessful.
      @@ -2046,47 +2053,47 @@

      5.1.4 Class: Identification and Au If ‘username and PIN that releases an asymmetric key‘ is selected, the evaluator will examine the TSS for guidance on supported protected storage and will then configure the TOE or OE to establish a PIN which enables release of the asymmetric key from the protected storage (such as a TPM, a hardware - token, or isolated execution environment) with which the VS can interface. The evaluator will then + token, or isolated execution environment) with which the VS can interface. The evaluator will then conduct the following tests:
    • Test FIA_UAU.5.2:3: - The evaluator will attempt to authenticate to the VS using the known user name and PIN. The + The evaluator will attempt to authenticate to the VS using the known user name and PIN. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:4: - The evaluator will attempt to authenticate to the VS using the known user name but an incorrect + The evaluator will attempt to authenticate to the VS using the known user name but an incorrect PIN. The evaluator will ensure that the authentication attempt is unsuccessful.
      If ‘X.509 certificate authentication‘ is selected, the evaluator will generate an X.509v3 certificate for an Administrator user with the Client Authentication Enhanced Key Usage field set. The evaluator - will provision the VS for authentication with the X.509v3 certificate. The evaluator will ensure - that the certificates are validated by the VS as per FIA_X509_EXT.1.1 and then conduct the + will provision the VS for authentication with the X.509v3 certificate. The evaluator will ensure + that the certificates are validated by the VS as per FIA_X509_EXT.1.1 and then conduct the following tests:
    • Test FIA_UAU.5.2:5: - The evaluator will attempt to authenticate to the VS using the X.509v3 certificate. The + The evaluator will attempt to authenticate to the VS using the X.509v3 certificate. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:6: The evaluator will generate a second certificate identical to the first except for the public key and any values derived from the public key. The evaluator will attempt to authenticate to - the VS with this certificate. The evaluator will ensure that the authentication attempt is + the VS with this certificate. The evaluator will ensure that the authentication attempt is unsuccessful.
      If ‘SSH public-key credential authentication‘ is selected, the evaluator shall generate a public-private host key pair on the TOE using RSA or ECDSA, and a second public-private key pair on a remote - client. The evaluator shall provision the VS with the client public key for authentication over + client. The evaluator shall provision the VS with the client public key for authentication over SSH, and conduct the following tests:
    • Test FIA_UAU.5.2:7: - The evaluator will attempt to authenticate to the VS using a message signed by the client + The evaluator will attempt to authenticate to the VS using a message signed by the client private key that corresponds to provisioned client public key. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:8: - The evaluator will generate a second client key pair and will attempt to authenticate to the VS - with the private key over SSH without first provisioning the VS to support the new key pair. + The evaluator will generate a second client key pair and will attempt to authenticate to the VS + with the private key over SSH without first provisioning the VS to support the new key pair. The evaluator will ensure that the authentication attempt is unsuccessful.

    @@ -2134,7 +2141,7 @@

    5.1.5 Class: Security Management ( Note: Management communications must be separate from user workload communications. Administrative network traffic—including communications between physical hosts concerning load balancing, audit data, - VM startup and shutdown—must be isolated from guest operational networks. For purposes of this requirement, + VM startup and shutdown—must be isolated from guest operational networks. For purposes of this requirement, management traffic also includes VMs transmitted over management networks whether for backup, live migration, or deployment.

    “Separate physical networks” refers to using separate physical interfaces and cables to isolate management and operational networks from @@ -2156,7 +2163,7 @@

    5.1.5 Class: Security Management ( operational traffic is separated.

    Guidance
    The evaluator shall examine the operational guidance to verify that it details how to configure the - VS to keep Management and Operational traffic separate. + VS to keep Management and Operational traffic separate.
    Tests
    The evaluator shall configure the TOE as documented in the guidance. @@ -2165,7 +2172,7 @@

    5.1.5 Class: Security Management ( If separation uses trusted channels, then the evaluator shall capture packets on the network over which traffic is tunneled. If plaintext Guest network traffic is detected, the requirement is not met.

    If data encryption is used, then the evaluator shall capture packets on the network over which the data is sent - while a VM or other large data structure is being transmitted. If plaintext VM contents are detected, the + while a VM or other large data structure is being transmitted. If plaintext VM contents are detected, the requirement is not met.

    @@ -2180,23 +2187,23 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall prevent Guest VMs from accessing virtual device interfaces that are not present in the VM’s current virtual hardware configuration.
    Application +
    The TSF shall prevent Guest VMs from accessing virtual device interfaces that are not present in the VM’s current virtual hardware configuration.
    Application Note: - The virtualized hardware abstraction implemented by a particular VS might include the + The virtualized hardware abstraction implemented by a particular VS might include the virtualized interfaces for many different devices. Sometimes these devices are not present in a - particular instantiation of a VM. The interface for devices not present must not be accessible by the - VM.

    + particular instantiation of a VM. The interface for devices not present must not be accessible by the + VM.

    Such interfaces include memory buffers, PCI Bus interfaces, and processor I/O ports.

    - The purpose of this requirement is to reduce the attack surface of the VMM by blocking access to unused interfaces. + The purpose of this requirement is to reduce the attack surface of the VMM by blocking access to unused interfaces.
    Tests
    - The evaluator shall connect a device to a VM, then from within the guest scan the VM's devices + The evaluator shall connect a device to a VM, then from within the guest scan the VM's devices to ensure that the connected device is present--using a device driver or other available means - to scan the VM's I/O ports or PCI Bus interfaces. + to scan the VM's I/O ports or PCI Bus interfaces. (The device's interface should be documented in the TSS under FPT_VDP_EXT.1.) The evaluator shall - remove the device from the VM and run the scan again. This requirement is met if the device's + remove the device from the VM and run the scan again. This requirement is met if the device's interfaces are no longer present.
    @@ -2207,7 +2214,8 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall take advantage of execution environment-based vulnerability mitigation mechanisms supported by the Platform such as:[selection: Address space randomization, Memory execution protection (e.g., DEP), Stack buffer overflow protection, Heap corruption detection, other mechanisms , No mechanisms]
    Application +
    The TSF shall take advantage of execution environment-based vulnerability mitigation mechanisms supported by the Platform such as:[selection: Address space randomization, Memory execution protection (e.g., DEP), Stack buffer overflow protection, Heap corruption detection, [assignment: + other mechanisms ], No mechanisms]
    Application Note: Processor manufacturers, compiler developers, and operating system vendors have developed execution environment-based mitigations that increase the cost to attackers by adding @@ -2235,22 +2243,22 @@

    5.1.6 Class: Protection of the TSF -
    The VMM shall use[assignment: +
    The VMM shall use[assignment: list of hardware-based virtualization assists]to reduce or eliminate the need for binary translation.
    -
    The VMM shall use[assignment: +
    The VMM shall use[assignment: list of hardware-based virtualization memory-handling assists]to reduce or eliminate the need for shadow page tables.
    Application Note: - These hardware-assists help reduce the size and complexity of the VMM, and thus, of + These hardware-assists help reduce the size and complexity of the VMM, and thus, of the trusted computing base, by eliminating or reducing the need for paravirtualization or binary translation. Paravirtualization involves modifying guest software so that instructions that cannot be properly virtualized are never executed on the physical processor.

    For the assignment in FPT_HAS_EXT.1, the ST author lists the hardware-based virtualization assists on all - platforms included in the ST that are used by the VMM to reduce or eliminate the need for + platforms included in the ST that are used by the VMM to reduce or eliminate the need for software-based binary translation. Examples for the x86 platform are Intel VT-x and AMD-V. “None” is an acceptable assignment for platforms that do not require virtualization assists in order to eliminate the need for binary translation. This must be documented in the TSS.

    For the assignment in FPT_HAS_EXT.1.2, the ST author lists the set of hardware-based virtualization - memory-handling extensions for all platforms listed in the ST that are used by the VMM to reduce or + memory-handling extensions for all platforms listed in the ST that are used by the VMM to reduce or eliminate the need for shadow page tables. Examples for the x86 platform are Intel EPT and AMD RVI. “None” is an acceptable assignment for platforms that do not require memory-handling assists in order to eliminate the need for shadow page tables. This must be documented in the TSS. @@ -2269,15 +2277,15 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall validate the parameters passed to Hypercall interfaces prior to execution of the VMM functionality exposed by each interface.
    Application +
    The TSF shall validate the parameters passed to Hypercall interfaces prior to execution of the VMM functionality exposed by each interface.
    Application Note: The purpose of this requirement is to help ensure the integrity of the - VMM by protecting the attack surface exposed to untrusted Guest VMs through Hypercalls.

    - A Hypercall interface allows VMM functionality to be invoked by VM-aware guest software. + VMM by protecting the attack surface exposed to untrusted Guest VMs through Hypercalls.

    + A Hypercall interface allows VMM functionality to be invoked by VM-aware guest software. For example, a hypercall interface could be used to get information about the real world, such as the time of day or the underlying hardware of the host system. A hypercall could also be used to transfer data between VMs through a copy-paste mechanism. Because hypercall - interfaces expose the VMM to Guest software, these interfaces constitute attack surface.

    + interfaces expose the VMM to Guest software, these interfaces constitute attack surface.

    There is no expectation that the evaluator will need to review source code in order to accomplish the evaluation activity.
    @@ -2295,7 +2303,7 @@

    5.1.6 Class: Protection of the TSF
    Tests
    The evaluator shall perform the following test:

    For each hypercall interface documented in the TSS or proprietary TSS Annex, the evaluator shall attempt to - invoke the function from within the VM using an invalid parameter (if any). If the VMM or VS crashes + invoke the function from within the VM using an invalid parameter (if any). If the VMM or VS crashes or generates an exception, or if no error is returned to the guest, then the test fails. If an error is returned to the guest, then the test succeeds.
    @@ -2328,7 +2336,7 @@

    5.1.6 Class: Protection of the TSF Removable media devices are removable devices that include media, such as USB flash drives and USB hard drives. Removable media devices can themselves contain removable media (e.g., USB CDROM drives).

    For purposes of this requirement, an Information Domain is: -
    1. A VM or collection of VMs
    2. The Virtualization System
    3. Host OS
    4. Management Subsystem
    +
    1. A VM or collection of VMs
    2. The Virtualization System
    3. Host OS
    4. Management Subsystem
    These requirements also apply to virtualized removable media—such as virtual CD drives that connect to ISO images—as well as physical media—such as CDROMs and USB flash drives. In the case of virtual CDROMs, virtual ejection of the virtual media is sufficient.

    @@ -2359,7 +2367,7 @@

    5.1.6 Class: Protection of the TSF
  • Test FPT_RDM_EXT.1.2:1: The evaluator shall configure two VMs that are members of different information domains, with the media or device connected to one of the VMs. The evaluator shall disconnect the - media or device from the VM and connect it to the other VM. The evaluator shall verify + media or device from the VM and connect it to the other VM. The evaluator shall verify that the action performed is consistent with the action assigned in the TSS.
  • @@ -2453,18 +2461,18 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall provide interfaces for virtual devices implemented by the VMM as part of the virtual hardware abstraction.
    -
    The TSF shall validate the parameters passed to the virtual device interface prior to execution of the VMM functionality exposed by those interfaces.
    Application +
    The TSF shall provide interfaces for virtual devices implemented by the VMM as part of the virtual hardware abstraction.
    +
    The TSF shall validate the parameters passed to the virtual device interface prior to execution of the VMM functionality exposed by those interfaces.
    Application Note: - The purpose of this requirement is to ensure that the VMM is not vulnerable to + The purpose of this requirement is to ensure that the VMM is not vulnerable to compromise through the processing of malformed data passed to the virtual device interface from a - Guest OS. The VMM cannot assume that any data coming from a VM is well-formed—even if the virtual - device interface is unique to the VS and the data comes from a virtual device + Guest OS. The VMM cannot assume that any data coming from a VM is well-formed—even if the virtual + device interface is unique to the VS and the data comes from a virtual device driver supplied by the Virtualization Vendor.
    The evaluator shall examine the TSS to ensure it lists all virtual devices - accessible by the guest OS. The TSS, or a separate proprietary document, must + accessible by the guest OS. The TSS, or a separate proprietary document, must also document all virtual device interfaces at the level of I/O ports or PCI Bus interfaces - including port numbers (absolute or relative to a base), port name, address range, and a description of @@ -2490,30 +2498,30 @@

    5.1.6 Class: Protection of the TSF -
    The TSF must ensure that software running in a VM is not able to degrade or disrupt the functioning of other VMs, the VMM, or the Platform.
    -
    The TSF must ensure that a Guest VM is unable to invoke platform code that runs at a privilege level equal to or exceeding that of the VMM without involvement of the VMM.
    Application +
    The TSF must ensure that software running in a VM is not able to degrade or disrupt the functioning of other VMs, the VMM, or the Platform.
    +
    The TSF must ensure that a Guest VM is unable to invoke platform code that runs at a privilege level equal to or exceeding that of the VMM without involvement of the VMM.
    Application Note: - This requirement is intended to ensure that software running within a Guest VM cannot - compromise other VMs, the VMM, or the platform. This requirement is not met if Guest VM - software—whatever its privilege level—can crash the VS or the Platform, or breakout + This requirement is intended to ensure that software running within a Guest VM cannot + compromise other VMs, the VMM, or the platform. This requirement is not met if Guest VM + software—whatever its privilege level—can crash the VS or the Platform, or breakout of its virtual hardware abstraction to gain execution on the platform, within or outside of the context - of the VMM.

    - This requirement is not violated if software running within a VM can crash the Guest OS and there is no - way for an attacker to gain execution in the VMM or outside of the virtualized domain.

    - FPT_VIV_EXT.1.2 addresses several specific mechanisms that must not be permitted to bypass the VMM and + of the VMM.

    + This requirement is not violated if software running within a VM can crash the Guest OS and there is no + way for an attacker to gain execution in the VMM or outside of the virtualized domain.

    + FPT_VIV_EXT.1.2 addresses several specific mechanisms that must not be permitted to bypass the VMM and invoke privileged code on the Platform.

    At a minimum, the TSF should enforce the following:

    • On the x86 platform, a virtual System Management Interrupt (SMI) cannot invoke platform System Management Mode (SMM).
    • An attempt to update virtual firmware or virtual BIOS cannot cause physical platform firmware - or physical platform BIOS to be modified.
    • An attempt to update virtual firmware or virtual BIOS cannot cause the VMM to be modified.
    + or physical platform BIOS to be modified.
  • An attempt to update virtual firmware or virtual BIOS cannot cause the VMM to be modified.
  • Of the above, the first bullet does not apply to platforms that do not support SMM. The rationale behind the third bullet - is that a firmware update of a single VM must not affect other VMs. So if multiple VMs share the same + is that a firmware update of a single VM must not affect other VMs. So if multiple VMs share the same firmware image as part of a common hardware abstraction, then the update of a single machine’s BIOS must not be allowed to change the common abstraction. The virtual hardware abstraction is part of the - VMM.
    + VMM.
    The evaluator shall verify that the TSS (or a proprietary annex to the TSS) describes how the TSF ensures - that guest software cannot degrade or disrupt the functioning of other VMs, the VMM or the platform. And + that guest software cannot degrade or disrupt the functioning of other VMs, the VMM or the platform. And how the TSF prevents guests from invoking higher-privilege platform code, such as the examples in the note.

    @@ -2549,7 +2557,8 @@

    5.1.8 Class: Trusted Path/Channel then "" must be selected in FIA_X509_EXT.2.1.
    The TSF shall use[selection: TLS as conforming to the Functional Package for Transport Layer Security, TLS/HTTPS as conforming to FCS_HTTPS_EXT.1, IPsec as conforming to FCS_IPSEC_EXT.1, SSH as conforming to the Functional Package - for Secure Shell]and[selection: certificate-based authentication of the remote peer, non-certificate-based authentication of the remote peer, no authentication of the remote peer]to provide a trusted communication channel between itself, and

  • audit servers (as required by FAU_STG_EXT.1), and
  • [selection: remote administrators (as required by FTP_TRP.1.1 if selected in FMT_MOF_EXT.1.1 in the Client or Server PP-Module), separation of management and operational networks (if selected in FMT_SMO_EXT.1), other capabilities , no other capabilities]that is logically distinct from other communication paths and provides assured identification of its endpoints and protection of the communicated data from disclosure and detection of modification of the communicated data.
    Application + for Secure Shell]and[selection: certificate-based authentication of the remote peer, non-certificate-based authentication of the remote peer, no authentication of the remote peer]to provide a trusted communication channel between itself, and

  • audit servers (as required by FAU_STG_EXT.1), and
  • [selection: remote administrators (as required by FTP_TRP.1.1 if selected in FMT_MOF_EXT.1.1 in the Client or Server PP-Module), separation of management and operational networks (if selected in FMT_SMO_EXT.1), [assignment: + other capabilities ], no other capabilities]that is logically distinct from other communication paths and provides assured identification of its endpoints and protection of the communicated data from disclosure and detection of modification of the communicated data.
    Application Note: If the ST author selects either TLS or HTTPS, the TSF shall be validated against the Functional Package for TLS. This PP does not mandate that a product implement TLS with mutual authentication, @@ -2572,7 +2581,7 @@

    5.1.8 Class: Trusted Path/Channel
    Tests
    The evaluator will configure the TOE to communicate with each external IT entity and type of remote user identified in the TSS. The evaluator will monitor network - traffic while the VS performs communication with each of these destinations. The evaluator will ensure + traffic while the VS performs communication with each of these destinations. The evaluator will ensure that for each session a trusted channel was established in conformance with the protocols identified in the selection.
    @@ -2638,14 +2647,14 @@

    5.1.8 Class: Trusted Path/Channel -
    The TSF shall indicate to users which VM, if any, has the current input focus.
    Application +
    The TSF shall indicate to users which VM, if any, has the current input focus.
    Application Note: This requirement applies to all users—whether User or Administrator. In environments where multiple VMs run at the same time, the user must have a way of knowing which - VM user input is directed to at any given moment. This is especially important in multiple-domain + VM user input is directed to at any given moment. This is especially important in multiple-domain environments.

    In the case of a human user, this is usually a visual indicator. In the case of headless VMs, the user is - considered to be a program, but this program still needs to know which VM it is sending input to; + considered to be a program, but this program still needs to know which VM it is sending input to; this would typically be accomplished through programmatic means.
    @@ -2656,7 +2665,7 @@

    5.1.8 Class: Trusted Path/Channel

    Tests
    For each supported input device, the evaluator shall demonstrate that the input from each device - listed in the TSS is directed to the VM that is indicated to have + listed in the TSS is directed to the VM that is indicated to have the input focus.
    @@ -2667,15 +2676,15 @@

    5.1.8 Class: Trusted Path/Channel -
    The TSF shall support the unique identification of a VM’s output display to users.
    Application +
    The TSF shall support the unique identification of a VM’s output display to users.
    Application Note: - In environments where a user has access to more than one VM at the same time, the - user must be able to determine the identity of each VM displayed in order to avoid inadvertent + In environments where a user has access to more than one VM at the same time, the + user must be able to determine the identity of each VM displayed in order to avoid inadvertent cross-domain data entry.

    - There must be a mechanism for associating an identifier with a VM so that an application or program - displaying the VM can identify the VM to users. This is generally indicated visually for human users - (e.g., VM identity in the window title bar) and programmatically for headless VMs (e.g., an API - function). The identification must be unique to the VS, but does not need to be universally unique.
    + There must be a mechanism for associating an identifier with a VM so that an application or program + displaying the VM can identify the VM to users. This is generally indicated visually for human users + (e.g., VM identity in the window title bar) and programmatically for headless VMs (e.g., an API + function). The identification must be unique to the VS, but does not need to be universally unique.
    The evaluator shall ensure that the TSS describes the mechanism for identifying @@ -2685,9 +2694,9 @@

    5.1.8 Class: Trusted Path/Channel The evaluator shall perform the following test:

    The evaluator shall attempt to create and start at least three Guest VMs on a single display device where the evaluator attempts to assign two of the VMs the same - identifier. If the user interface displays different identifiers for each VM, then + identifier. If the user interface displays different identifiers for each VM, then the requirement is met. Likewise, the requirement is met if the system refuses to create or start a - VM when there is already a VM with the same identifier. + VM when there is already a VM with the same identifier.

    @@ -2707,7 +2716,7 @@

    5.1.9 TOE Security Functio

    FDP_VMS_EXT.1Ensures that authorized data transfers between domains are done securely.
    FDP_VNC_EXT.1Ensures that network traffic is visible only to VMs configured to be that network.
    FPT_EEM_EXT.1Requires that the TOE use security mechanisms supported by the physical platform.
    FPT_GVI_EXT.1Requires that the TOE support Guest VM measurements and integrity checks (optional).
    FPT_GVI_EXT.1Requires that the TOE support Guest VM measurements and integrity checks (optional).
    FPT_HAS_EXT.1Requires that the TOE use platform-supported virtualization assists to reduce attack surface.
    FPT_INT_EXT.1Requires that the TOE support introspection into Guest VMs (optional).
    FPT_RDM_EXT.1Requires support for rules for switching removeable media between domains to reduce the chance of data spillage.
    FPT_EEM_EXT.1Requires that the TOE use security mechanisms supported by the physical platform.
    FPT_HAS_EXT.1Requires that the TOE use platform-supported virtualization assists to reduce attack surface.
    FPT_HCL_EXT.1Requires that Hypercall parameters be validated.
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_VDP_EXT.1Requires validation of parameter data passed to the hardware abstraction by untrusted VMs.
    FPT_VIV_EXT.1Ensures that untrusted VMs cannot invoke privileged code without proper hypervisor mediation.
    O.RESOURCE_​ALLOCATION
    FCS_CKM_EXT.4Requires cryptographic key destruction to ensure residual data in shared storage is unrecoverable.
    FPT_EEM_EXT.1Requires that the TOE use security mechanisms supported by the physical platform.
    FPT_HAS_EXT.1Requires that the TOE use platform-supported virtualization assists to reduce attack surface.
    FPT_HCL_EXT.1Requires that Hypercall parameters be validated.
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_VDP_EXT.1Requires validation of parameter data passed to the hardware abstraction by untrusted VMs.
    FPT_VIV_EXT.1Ensures that untrusted VMs cannot invoke privileged code without proper hypervisor mediation.
    O.VM_​ENTROPY
    FCS_ENT_EXT.1Requires that domains have access to high-quality entropy for cryptographic purposes.
    FPT_VIV_EXT.1Ensures that untrusted VMs cannot invoke privileged code without proper hypervisor mediation.

    -

    5.2 Security Assurance Requirements

    - The Security Objectives for the TOE in Section 4 were constructed to address threats identified in Section 3.1. The - Security Functional Requirements (SFRs) in Section 5.1 are a formal instantiation of the Security Objectives. The PP - identifies the Security Assurance Requirements (SARs) to frame the extent to which the evaluator assesses the - documentation applicable for the evaluation and performs independent testing.

    - This section lists the set of Security Assurance Requirements (SARs) from Part 3 of the Common Criteria for Information - Technology Security Evaluation, Version 3.1, Revision 5 that are required in evaluations against this PP. Individual - evaluation activities to be performed are specified in both Section 5.1 as well as in this section.

    - After the ST has been approved for evaluation, the Information Technology Security Evaluation Facility (ITSEF) will obtain - the TOE, supporting environmental IT, and the administrative/user guides for the TOE. The ITSEF is expected to perform - actions mandated by the CEM for the ASE and ALC SARs. The ITSEF also performs the evaluation activities contained - within Section 5, which are intended to be an interpretation of the other CEM assurance requirements as they apply - to the specific technology instantiated in the TOE. The evaluation activities that are captured in Section 5 also - provide clarification as to what the developer needs to provide to demonstrate the TOE is compliant with the PP. - -

    5.2.1 Class ASE: Security Target Evaluation

    +

    5.2 Security Assurance Requirements

    +

    The Security Objectives for the TOE in Section 4 were constructed to address threats identified in Section 3.1. The Security Functional Requirements (SFRs) in Section 5.1 are a formal instantiation of the Security Objectives. The PP identifies the Security Assurance Requirements (SARs) to frame the extent to which the evaluator assesses the documentation applicable for the evaluation and performs independent testing. This section lists the set of Security Assurance Requirements (SARs) from Part 3 of the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5 that are required in evaluations against this PP. Individual evaluation activities to be performed are specified in both Section 5.1 as well as in this section. After the ST has been approved for evaluation, the Information Technology Security Evaluation Facility (ITSEF) will obtain the TOE, supporting environmental IT, and the administrative/user guides for the TOE. The ITSEF is expected to perform actions mandated by the CEM for the ASE and ALC SARs. The ITSEF also performs the evaluation activities contained within Section 5, which are intended to be an interpretation of the other CEM assurance requirements as they apply to the specific technology instantiated in the TOE. The evaluation activities that are captured in Section 5 also provide clarification as to what the developer needs to provide to demonstrate the TOE is compliant with the PP.

    +

    5.2.1 Class ASE: Security Target Evaluation

    As per ASE activities defined in [CEM] plus the TSS evaluation activities defined for any SFRs claimed by the TOE. -

    5.2.2 Class ADV: Development

    + +

    5.2.2 Class ADV: Development

    + The information about the TOE is contained in the guidance documentation available to the end user as well as the TOE Summary Specification (TSS) portion of the ST. The TOE developer must concur with the description of the product that is contained in the TSS as it relates to the functional requirements. The evaluation activities contained in Section 5.2 should provide the ST authors with sufficient information to determine the appropriate content for the TSS section. -

    ADV_FSP.1 Basic functional specification

    Developer action elements:

    The developer shall provide a functional specification.
    The developer shall provide a tracing from the functional specification to the SFRs.
    Developer + +

    ADV_FSP.1 Basic functional specification

    + + + + + + + + +

    Developer action elements:

    The developer shall provide a functional specification.
    The developer shall provide a tracing from the functional specification to the SFRs.
    Note: As indicated in the introduction to this section, the functional specification is composed of the information @@ -2806,7 +2814,7 @@

    5.2.2 Class ADV: DevelopmentSFR-supporting TSFI.

    The functional specification shall provide rationale for the implicit categorization of interfaces as SFR-non-interfering.
    The tracing shall demonstrate that the SFRs trace to TSFIs in the functional specification.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall determine that the functional specification is an accurate and complete instantiation of - the SFRs.
    Application + the SFRs.
    Note: There are no specific evaluation activities associated with these SARs. The functional specification documentation @@ -2815,7 +2823,10 @@

    5.2.2 Class ADV: Development

    5.2.3 Class AGD: Guidance Documents

    +
    + +

    5.2.3 Class AGD: Guidance Documents

    + The guidance documents will be provided with the developer’s security target. Guidance must include a description of how the authorized user verifies that the Operational Environment can fulfill its role for the security functionality. The documentation should be in an informal style and readable by an authorized user.

    @@ -2826,22 +2837,33 @@

    5.2.2 Class ADV: DevelopmentSFRs where applicable. -

    AGD_OPE.1 Operational User Guidance

    Developer action elements:

    The developer shall provide operational user guidance. -
    Developer + +

    AGD_OPE.1 Operational User Guidance

    + + + + + + + + + +

    Developer action elements:

    The developer shall provide operational user guidance. +
    Note: Rather than repeat information here, the developer should review the evaluation activities for this component to ascertain the specifics of the guidance that the evaluators will be checking for. This - will provide the necessary information for the preparation of acceptable guidance.

    Content and presentation elements:

    The operational user guidance shall describe what for each user role the authorized user-accessible functions and + will provide the necessary information for the preparation of acceptable guidance.

    Content and presentation elements:

    The operational user guidance shall describe what for each user role the authorized user-accessible functions and privileges that should be controlled in a secure processing environment, including appropriate - warnings.
    The operational user guidance shall describe, for each user role the authorized user, how to use the available - interfaces provided by the TOE in a secure manner.
    The operational user guidance shall describe, for each user role the authorized user, the available functions and + warnings.
    The operational user guidance shall describe, for each user role the authorized user, how to use the available + interfaces provided by the TOE in a secure manner.
    The operational user guidance shall describe, for each user role the authorized user, the available functions and interfaces, in particular all security parameters under the control of the user, indicating secure - values as appropriate.
    The operational user guidance shall, for each user role the authorized user, clearly present each type of + values as appropriate.
    The operational user guidance shall, for each user role the authorized user, clearly present each type of security-relevant event relative to the user-accessible functions that need to be performed, including changing the security characteristics of entities under the control of the TSF.
    The operational user guidance shall identify all possible modes of operation of the TOE (including operation following failure or operational error), their consequences and implications for - maintaining secure operation.
    The operational user guidance shall, for each user role the authorized user, describe the security measures to be + maintaining secure operation.
    The operational user guidance shall, for each user role the authorized user, describe the security measures to be followed in order to fulfill the security objectives for the operational environment as described in the ST.
    The operational user guidance shall be clear and reasonable.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    @@ -2852,7 +2874,7 @@

    5.2.2 Class ADV: Development

    The operational guidance shall contain step-by-step instructions suitable for use by an end-user - of the VS to configure a new, out-of-the-box system into the configuration + of the VS to configure a new, out-of-the-box system into the configuration evaluated under this Protection Profile.

    The documentation shall describe the process for verifying updates to the TOE, either by checking the hash or by verifying a digital signature. The evaluator shall verify that @@ -2863,8 +2885,15 @@

    5.2.2 Class ADV: Development
  • Instructions for obtaining the update itself. This should include instructions for making the update accessible to the TOE (e.g., placement in a specific directory).
  • Instructions for initiating the update process, as well as discerning whether the process - was successful or unsuccessful. This includes generation of the hash/digital signature.
  • AGD_PRE.1 Preparative procedures

    Developer action elements:

    The developer shall provide the TOE including its preparative procedures. -
    Developer + was successful or unsuccessful. This includes generation of the hash/digital signature.
    +

    AGD_PRE.1 Preparative procedures

    + + + + + +

    Developer action elements:

    The developer shall provide the TOE including its preparative procedures. +
    Note: As with the operational guidance, the developer should look to the evaluation activities to determine the required content with respect to preparative procedures. @@ -2880,16 +2909,24 @@

    5.2.2 Class ADV: DevelopmentTOE adequately addresses all platforms (that is, combination of hardware and operating system) claimed for the TOE in the ST.

    The operational guidance shall contain step-by-step instructions suitable for use by an end-user of - the VS to configure a new, out-of-the-box system into the configuration evaluated + the VS to configure a new, out-of-the-box system into the configuration evaluated under this Protection Profile. -

    5.2.4 Class ALC: Life-Cycle Support

    +
    + +

    5.2.4 Class ALC: Life-Cycle Support

    + At the assurance level specified for TOEs conformant to this PP, life-cycle support is limited to an examination of the TOE vendor’s development and configuration management process in order to provide a baseline level of assurance that the TOE itself is developed in a secure manner and that the developer has a well-defined process in place to deliver updates to mitigate known security flaws. This is a result of the critical role that a developer’s practices play in contributing to the overall trustworthiness of a product. -

    ALC_CMC.1 Labeling of the TOE

    Developer action elements:

    The developer shall provide the TOE and a reference for the TOE. + +

    ALC_CMC.1 Labeling of the TOE

    + + + +

    Developer action elements:

    The developer shall provide the TOE and a reference for the TOE.

    Content and presentation elements:

    The TOE shall be labeled with its unique reference.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence. @@ -2899,7 +2936,13 @@

    5.2.2 Class ADV: DevelopmentTOE samples received for testing to ensure that the version number is consistent with that in the ST.

    If the vendor maintains a website advertising the TOE, the evaluator shall examine the information on the website to ensure that - the information in the ST is sufficient to distinguish the product.

    ALC_CMS.1 TOE CM coverage

    Developer action elements:

    The developer shall provide a configuration list for the TOE. + the information in the ST is sufficient to distinguish the product.

    +

    ALC_CMS.1 TOE CM coverage

    + + + + +

    Developer action elements:

    The developer shall provide a configuration list for the TOE.

    Content and presentation elements:

    The configuration list shall include the following: the TOE itself; and the evaluation evidence required by the SARs.
    The configuration list shall uniquely identify the configuration items. @@ -2915,37 +2958,50 @@

    5.2.2 Class ADV: DevelopmentTSF is uniquely identified (with respect to other products from the TSF vendor), and that documentation provided by the developer in association with the requirements in the ST is associated with the TSF using this unique identification. -

    ALC_TSU_EXT.1 Timely Security Updates

    +
    +

    ALC_TSU_EXT.1 Timely Security Updates

    + This component requires the TOE developer, in conjunction with any other necessary parties, to provide information - as to how the VS is updated to address security issues in a timely manner. The + as to how the VS is updated to address security issues in a timely manner. The documentation describes the process of providing updates to the public from the time a security flaw is reported/discovered, to the time an update is released. This description includes the parties involved (e.g., the developer, hardware vendors) and the steps that are performed (e.g., developer testing), including worst case time periods, before an update is made available to the public. -

    Developer action elements:

    The developer shall provide a description in the TSS of how timely security updates are made to the + + + + + + +

    Developer action elements:

    The developer shall provide a description in the TSS of how timely security updates are made to the TOE.

    Content and presentation elements:

    The description shall include the process for creating and deploying security updates for the TOE software/firmware.
    The description shall express the time window as the length of time, in days, between public disclosure - of a vulnerability and the public availability of security updates to the TOE.
    Application + of a vulnerability and the public availability of security updates to the TOE.
    Note: The total length of time may be presented as a summation of the periods of time that each party (e.g., TOE developer, hardware vendor) on the critical path consumes. The time period until public availability per deployment mechanism may differ; each is described.
    The description shall include the mechanisms publicly available for reporting security issues - pertaining to the TOE.
    Application + pertaining to the TOE.
    Note: The reporting mechanism could include websites, email addresses, and a means to protect the sensitive nature of the report (e.g., public keys that could be used to encrypt the details of a proof-of-concept exploit).

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and - presentation of evidence.

    5.2.5 Class ATE: Tests

    + presentation of evidence.
    + +

    5.2.5 Class ATE: Tests

    + Testing is specified for functional aspects of the system as well as aspects that take advantage of design or implementation weaknesses. The former is done through the ATE_IND family, while the latter is through the AVA_VAN family. At the assurance level specified in this PP, testing is based on advertised functionality and interfaces with dependency on the availability of design information. One of the primary outputs of the evaluation process is the test report as specified in the following requirements. -

    ATE_IND.1 Independent Testing - Conformance

    + +

    ATE_IND.1 Independent Testing - Conformance

    + Testing is performed to confirm the functionality described in the TSS as well as the administrative (including configuration and operation) documentation provided. The focus of the testing is to confirm that the requirements specified in Section 5.1 are being met, although some additional testing is specified for SARs @@ -2953,7 +3009,12 @@

    Developer action elements:

    TOE combinations that are claiming conformance to this PP. -

    Developer action elements:

    The developer shall provide the TOE for testing. + + + + + +

    Developer action elements:

    The developer shall provide the TOE for testing.

    Content and presentation elements:

    The TOE shall be suitable for testing.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall test a subset of the TSF to confirm that the TSF operates as specified. @@ -2985,7 +3046,10 @@

    Developer action elements:

    5.2.6 Class AVA: Vulnerability Assessment

    +
    + +

    5.2.6 Class AVA: Vulnerability Assessment

    + For the first generation of this Protection Profile, the evaluation lab is expected to survey open sources to learn what vulnerabilities have been discovered in these types of products. In most cases, these vulnerabilities will require sophistication beyond that of a basic attacker. Until penetration tools are created and uniformly @@ -2994,7 +3058,14 @@

    Developer action elements:

    PPs. -

    AVA_VAN.1 Vulnerability survey

    Developer action elements:

    The developer shall provide the TOE for testing. + +

    AVA_VAN.1 Vulnerability survey

    + + + + + +

    Developer action elements:

    The developer shall provide the TOE for testing.

    Content and presentation elements:

    The TOE shall be suitable for testing.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall perform a search of public domain sources to identify potential vulnerabilities @@ -3014,6 +3085,8 @@

    Developer action elements:

    Appendix A - Optional Requirements As indicated in the introduction to this PP, the baseline requirements (those that must be performed by the TOE) are contained in the body of this PP. @@ -3038,7 +3111,7 @@

    A.1 Strictly Optional R list of actions]upon detection of a potential security violation.
    Application Note: In certain cases, it may be useful for Virtualization Systems to perform automated - responses to certain security events. An example may include halting a VM which has taken some action + responses to certain security events. An example may include halting a VM which has taken some action to violate a key system security policy. This may be especially useful with headless endpoints when there is no human user in the loop.

    The potential security violation mentioned in FAU_ARP.1.1 refers to FAU_SAA.1.

    @@ -3073,26 +3146,26 @@

    A.1 Strictly Optional R
    The TSF shall verify the integrity of Guest VMs through the following mechanisms:[assignment: - list of Guest VM integrity mechanisms].
    Application + list of Guest VM integrity mechanisms].
    Application Note: The primary purpose of this requirement is to identify and describe the mechanisms used to verify the integrity of Guest VMs that have been 'imported' in some fashion, though these mechanisms could also be applied to all Guest VMs, depending on the mechanism used. - Importation for this requirement could include VM migration (live or otherwise), the importation of + Importation for this requirement could include VM migration (live or otherwise), the importation of virtual disk files that were previously exported, VMs in shared storage, etc. It is possible that a - trusted VM could have been modified during the migration or import/export process, or VMs could have + trusted VM could have been modified during the migration or import/export process, or VMs could have been obtained from untrusted sources in the first place, so integrity checks on these VMs can be a - prudent measure to take. These integrity checks could be as thorough as making sure the entire VM - exactly matches a previously known VM (by hash for example), or by simply checking certain - configuration settings to ensure that the VM's configuration will not violate the security model - of the VS.
    + prudent measure to take. These integrity checks could be as thorough as making sure the entire VM + exactly matches a previously known VM (by hash for example), or by simply checking certain + configuration settings to ensure that the VM's configuration will not violate the security model + of the VS.

    For each mechanism listed in the assignment, the evaluator shall ensure that the TSS - documents the mechanism, including how it verifies VM integrity, which set of Guest - VMs it will check (all Guest VMs, only migrated VM - s, etc.), when such checks occur (before VM startup, immediately following - importation/migration, on demand, etc.), and which actions are taken if a VM fails + documents the mechanism, including how it verifies VM integrity, which set of Guest + VMs it will check (all Guest VMs, only migrated VM + s, etc.), when such checks occur (before VM startup, immediately following + importation/migration, on demand, etc.), and which actions are taken if a VM fails the integrity check (or which range of actions are possible if the action is configurable).

    A.2 Objective Requirements

    A.2.1 Class: Protection of the TSF (FPT)

    FPT_DDI_EXT.1 Device Driver Isolation

    @@ -3101,14 +3174,14 @@

    A.1 Strictly Optional R -
    The TSF shall ensure that device drivers for physical devices are isolated from the VMM and all other domains.
    Application +
    The TSF shall ensure that device drivers for physical devices are isolated from the VMM and all other domains.
    Application Note: - In order to function on physical hardware, the VMM must have access to the device + In order to function on physical hardware, the VMM must have access to the device drivers for the physical platform on which it runs. These drivers are often written by third parties, - and yet are effectively a part of the VMM. Thus the integrity of the VMM in part depends on the quality + and yet are effectively a part of the VMM. Thus the integrity of the VMM in part depends on the quality of third party code that the virtualization vendor has no control over. By encapsulating these drivers - within one or more dedicated driver domains (e.g., Service VM or VMs) the damage of a driver failure or - vulnerability can be contained within the domain, and would not compromise the VMM. When driver domains + within one or more dedicated driver domains (e.g., Service VM or VMs) the damage of a driver failure or + vulnerability can be contained within the domain, and would not compromise the VMM. When driver domains have exclusive access to a physical device, hardware isolation mechanisms, such as Intel's VT-d, AMD's Input/Output Memory Management Unit (IOMMU), or ARM's System Memory Management Unit (MMU) should be used to ensure that operations performed by Direct Memory Access (DMA) hardware are properly constrained.
    @@ -3158,21 +3231,21 @@

    A.1 Strictly Optional R -
    The TSF shall support a mechanism for permitting the VMM or privileged VMs to access the internals of another VM for purposes of introspection.
    Application +
    The TSF shall support a mechanism for permitting the VMM or privileged VMs to access the internals of another VM for purposes of introspection.
    Application Note: Introspection can be used to support malware and anomaly detection from outside of - the guest environment. This not only helps protect the Guest OS, it also protects the VS by providing - an opportunity for the VS to detect threats to itself that originate within VMs, and that may attempt - to break out of the VM and compromise the VMM or other VMs.

    - The hosting of malware detection software outside of the guest VM helps protect the guest and helps ensure + the guest environment. This not only helps protect the Guest OS, it also protects the VS by providing + an opportunity for the VS to detect threats to itself that originate within VMs, and that may attempt + to break out of the VM and compromise the VMM or other VMs.

    + The hosting of malware detection software outside of the guest VM helps protect the guest and helps ensure the integrity of the malware detection/antivirus software. This capability can be implemented in - the VMM itself, but ideally it should be hosted by a Service VM so that it can be better contained - and does not introduce bugs into the VMM.
    + the VMM itself, but ideally it should be hosted by a Service VM so that it can be better contained + and does not introduce bugs into the VMM.
    The evaluator shall examine the TSS documentation to verify that it describes the - interface for VM introspection and whether the introspection is performed by the - VMM or another VM.
    + interface for VM introspection and whether the introspection is performed by the + VMM or another VM.
    Guidance
    The evaluator shall examine the operational guidance to ensure that it contains instructions for configuration of the introspection mechanism. @@ -3183,18 +3256,20 @@

    A.1 Strictly Optional R -
    The TSF shall support a measured launch of the Virtualization System. Measured components of the VS shall include the static executable image of the Hypervisor and:[selection: Static executable images of the Management Subsystem, list of (static images of) Service VMs , list of configuration files , no other components]
    +
    The TSF shall support a measured launch of the Virtualization System. Measured components of the VS shall include the static executable image of the Hypervisor and:[selection: Static executable images of the Management Subsystem, [assignment: + list of (static images of) Service VMs ], [assignment: + list of configuration files ], no other components]
    The TSF shall make the measurements selected in FPT_ML_EXT.1.1 available to the Management Subsystem.
    Application Note: - A measured launch of the platform and VS demonstrates that the proper TOE software was + A measured launch of the platform and VS demonstrates that the proper TOE software was loaded. A measured launch process employs verifiable integrity measurement mechanisms. For example, a - VS may hash components such as the hypervisor, service VMs, or the Management Subsystem. A + VS may hash components such as the hypervisor, service VMs, or the Management Subsystem. A measured launch process only allows components to be executed after the measurement has been recorded. An example process may add each component’s hash before it is executed so that the final hash reflects the evidence of a component’s state prior to execution. The measurement may be verified as the system boots, but this is not required.

    - The Platform is outside of the TOE. However, this requirement specifies that the VS must be capable of + The Platform is outside of the TOE. However, this requirement specifies that the VS must be capable of receiving Platform measurements if the Platform provides them. This requirement is requiring TOE support for Platform measurements if provided; it is not placing a requirement on the Platform to take such measurements.

    @@ -3217,7 +3292,7 @@

    A.1 Strictly Optional R
    Tests
    • Test FPT_ML_EXT.1.2:1: - The evaluator shall start the VS, login as an Administrator, and verify that the measurements for the specified components are viewable in the Management Subsystem.
    • + The evaluator shall start the VS, login as an Administrator, and verify that the measurements for the specified components are viewable in the Management Subsystem.

    A.3 Implementation-dependent Requirements @@ -3298,12 +3373,12 @@

    A.1 Strictly Optional R transport mode.

    The TSF shall have a nominal, final entry in the SPD that matches anything that is otherwise unmatched, and discards it.
    The TSF shall implement the IPsec protocol ESP as defined by RFC 4303 using the cryptographic algorithms [AES-GCM-128, AES-GCM-256 (as specified in RFC 4106),[selection: AES-CBC-128 (specified in RFC 3602), AES-CBC-256 (specified in RFC 3602), no other algorithms]] together with a Secure Hash Algorithm (SHA)-based HMAC.
    -
    The TSF shall implement the protocol:

    [selection:
    • IKEv1, using Main Mode for Phase 1 exchanges, as defined in RFC 2407, RFC 2408, RFC 2409, RFC 4109, [selection: no other RFCs for extended sequence numbers, RFC 4304 for extended sequence numbers], [selection: no other RFCs for hash functions, RFC 4868 for hash functions], and [selection: support for XAUTH, no support for XAUTH]
    • IKEv2 as defined in RFC 7296 (with mandatory support for NAT traversal as specified in section 2.23), RFC 8784, RFC 8247, and [selection: no other RFCs for hash functions, RFC 4868 for hash functions].
    ]
    Application +
    The TSF shall implement the protocol:

    [selection:
    • IKEv1, using Main Mode for Phase 1 exchanges, as defined in RFC 2407, RFC 2408, RFC 2409, RFC 4109, [selection: no other RFCs for extended sequence numbers, RFC 4304 for extended sequence numbers], [selection: no other RFCs for hash functions, RFC 4868 for hash functions], and [selection: support for XAUTH, no support for XAUTH]
    • IKEv2 as defined in RFC 7296 (with mandatory support for NAT traversal as specified in section 2.23), RFC 8784, RFC 8247, and [selection: no other RFCs for hash functions, RFC 4868 for hash functions].
    ]
    Application Note: If the TOE implements SHA-2 hash algorithms for IKEv1 or IKEv2, the ST author shall select RFC 4868.
    The TSF shall ensure the encrypted payload in the[selection: IKEv1, IKEv2]protocol uses the cryptographic algorithms AES-CBC-128, AES-CBC-256 as specified in RFC 6379 and[selection: AES-GCM-128 as specified in RFC 5282, AES-GCM-256 as specified in RFC 5282, no other algorithm].
    -
    The TSF shall ensure that[selection:
    • IKEv2 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes are fixed based on [selection: number of packets/number of bytes, length of time]. If length of time is used, it must include at least one option that is 24 hours or less for Phase 1 SAs and 8 hours or less for Phase 2 SAs.
    ]
    Application +
    The TSF shall ensure that[selection:
    • IKEv2 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes are fixed based on [selection: number of packets/number of bytes, length of time]. If length of time is used, it must include at least one option that is 24 hours or less for Phase 1 SAs and 8 hours or less for Phase 2 SAs.
    ]
    Application Note: The ST author is afforded a selection based on the version of IKE in their @@ -3365,7 +3440,8 @@

    A.1 Strictly Optional R If “pre-shared keys” is selected, the selection-based requirement FIA_PSK_EXT.1 must be claimed.

    -
    The TSF shall not establish an SA if the [[selection: IP address, Fully Qualified Domain Name (FQDN), user FQDN, Distinguished Name (DN)]and[selection: no other reference identifier type, other supported reference identifier types ]] contained in a certificate does not match the expected values for the entity attempting to establish a connection.
    Application +
    The TSF shall not establish an SA if the [[selection: IP address, Fully Qualified Domain Name (FQDN), user FQDN, Distinguished Name (DN)]and[selection: no other reference identifier type, [assignment: + other supported reference identifier types ]]] contained in a certificate does not match the expected values for the entity attempting to establish a connection.
    Application Note: The TOE must support at least one of the following identifier types: IP address, @@ -3428,7 +3504,7 @@

    A.1 Strictly Optional R can be properly applied.

    Note in this case that the implementation of the IPsec protocol must be enforced entirely within the TOE boundary; i.e. it is not permissible for a software application TOE to be a graphical front-end for IPsec - functionality implemented totally or in part by the underlying OS platform. The behavior referenced here + functionality implemented totally or in part by the underlying OS platform. The behavior referenced here is for the possibility that the configuration of the IPsec connection is initiated from outside the TOE, which is permissible so long as the TSF is solely responsible for enforcing the configured behavior. However, it is allowable for the TSF to rely on low-level platform-provided networking functions to implement the SPD @@ -3856,7 +3932,8 @@

    A.1 Strictly Optional R If "" is selected then "Ability to configure action taken if unable to determine the validity of a certificate" in the Client or Server module management function table must also be selected. -
    The TSF shall use X.509v3 certificates as defined by RFC 5280 to support authentication for[selection: IPsec, TLS, HTTPS, SSH, code signing for system software updates, other uses ]
    Application +
    The TSF shall use X.509v3 certificates as defined by RFC 5280 to support authentication for[selection: IPsec, TLS, HTTPS, SSH, code signing for system software updates, [assignment: + other uses ]]
    Application Note: This SFR must be included in the ST if the selection for FPT_TUD_EXT.1.3 is “digital signature mechanism,” if "certificate-based authentication of the remote peer" is @@ -4080,9 +4157,9 @@

    E.3 Specific Guidance for PP-specified functionality. If the Product Versions are fully tested separately, then there is no need to document the differences.



    E.5 Specific Guidance for Determining Platform Equivalence

    Platform equivalence is used to determine the platforms that a product must be tested on. These guidelines are divided - into sections for determining hardware equivalence and software (host OS/control domain) equivalence. If the Product is - installed onto bare metal, then only hardware equivalence is relevant. If the Product is installed onto an OS—or is integrated - into an OS—then both hardware and software equivalence are required. Likewise, if the Product can be installed either on bare + into sections for determining hardware equivalence and software (host OS/control domain) equivalence. If the Product is + installed onto bare metal, then only hardware equivalence is relevant. If the Product is installed onto an OS—or is integrated + into an OS—then both hardware and software equivalence are required. Likewise, if the Product can be installed either on bare metal or on an operating system, both hardware and software equivalence are relevant.

    E.5.1 Hardware Platform Equivalence

    If a Virtualization Solution runs directly on hardware without an operating system, then platform equivalence is based primarily @@ -4093,15 +4170,15 @@

    E.3 Specific Guidance for

    Equivalency analysis becomes important when comparing platforms with the same processor architecture. Processors with the same architecture that have instruction sets that are subsets or supersets of each other are not disqualified - from being equivalent for purposes of a VPP evaluation. If the VS takes the same code paths when executing PP-specified + from being equivalent for purposes of a VPP evaluation. If the VS takes the same code paths when executing PP-specified security functionality on different processors of the same family, then the processors can be considered equivalent with respect to that application.

    - For example, if a VS follows one code path on platforms that support the AES-NI instruction and another on platforms that do - not, then those two platforms are not equivalent with respect to that VS functionality. But if the VS follows the same code + For example, if a VS follows one code path on platforms that support the AES-NI instruction and another on platforms that do + not, then those two platforms are not equivalent with respect to that VS functionality. But if the VS follows the same code path whether or not the platform supports AES-NI, then the platforms are equivalent with respect to that functionality.

    - The platforms are equivalent with respect to the VS if the platforms are equivalent with respect to all PP-specified + The platforms are equivalent with respect to the VS if the platforms are equivalent with respect to all PP-specified security functionality.

    Table 7: Factors for Determining Hardware Platform Equivalence
    - - - - - -
    FactorSame/Different/NoneGuidance
    Platform ArchitecturesDifferentHardware platforms that implement different processor architectures and instruction sets are not equivalent.
    PP-Specified FunctionalitySameFor platforms with the same processor architecture, the platforms are equivalent with respect to the application if execution of all PP-specified security functionality follows the same code path on @@ -4127,15 +4204,15 @@

    E.3 Specific Guidance for

    The ST must describe all configurations evaluated down to processor manufacturer, model number, and microarchitecture version.

    - The information regarding claimed equivalent configurations depends on the platform that the VS was developed for and runs on. -

    Bare-Metal VS

    + The information regarding claimed equivalent configurations depends on the platform that the VS was developed for and runs on. +

    Bare-Metal VS

    For VSes that run without an operating system on bare-metal or virtual bare-metal, the claimed configuration must describe the platform down to the specific processor manufacturer, model number, and microarchitecture version. The Vendor must describe the differences in the TOE with respect to PP-specified security functionality and how the TOE operates differently to leverage platform differences (e.g., instruction set extensions) in the tested configuration versus the claimed equivalent configuration. -

    VS with OS Support

    - For VSes that run on an OS host or with the assistance of an OS, then the claimed configuration must describe the OS down to +

    VS with OS Support

    + For VSes that run on an OS host or with the assistance of an OS, then the claimed configuration must describe the OS down to its specific model and version number. The Vendor must describe the differences in the TOE with respect to PP-specified security functionality and how the TOE functions differently to leverage platform differences in the tested configuration versus the claimed equivalent configuration. @@ -4147,22 +4224,16 @@

    Appendix F - Acronyms

    EPExtended Package
    FPFunctional Package
    OEOperational Environment
    OSGuest Operating System
    OSHost Operating System
    PPProtection Profile
    PP-ConfigurationProtection Profile Configuration
    PP-ModuleProtection Profile Module
    SARSecurity Assurance Requirement
    SFRSecurity Functional Requirement
    SSPSystem Security Policy
    STSecurity Target
    TOETarget of Evaluation
    TSFTOE Security Functionality
    TSFITSF Interface
    TSSTOE Summary Specification
    VMVirtual Machine
    VMMVirtual Machine Manager
    VSVirtualization System

    Appendix G - Bibliography

    Table 10: Bibliography
    IdentifierTitle
    [CC]Common Criteria for Information Technology Security Evaluation -
    • Part 1: Introduction and General Model, CCMB-2017-04-001, Version 3.1 Revision 5, diff --git a/xml-builder-test/SanityChecksOutput.md b/xml-builder-test/SanityChecksOutput.md index 17cbc34..5235f4d 100644 --- a/xml-builder-test/SanityChecksOutput.md +++ b/xml-builder-test/SanityChecksOutput.md @@ -289,17 +289,15 @@ * Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/sec:SFRs[1]""/section[8]""/f-component[3]""/f-element[1]""/note[1]"This requ"/h:p[1]"" * Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/sec:SFRs[1]""/section[8]""/f-component[4]""/f-element[1]""/note[1]"In enviro"/h:p[1]"" * Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/sec:SFRs[1]""/section[8]""/f-component[4]""/f-element[1]""/aactivity[1]""/Tests[1]"The evalu"/h:p[1]"" -* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]"The Secur"/h:p[1]"" -* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]"The Secur"/h:p[2]"" -* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]"The Secur"/section[3]"The guida"/h:p[1]"" -* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]"The Secur"/section[3]"The guida"/a-component[1]""/a-element[9]""/aactivity[1]"Some of t"/h:p[1]"" -* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]"The Secur"/section[3]"The guida"/a-component[1]""/a-element[9]""/aactivity[1]"Some of t"/h:p[2]"" -* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]"The Secur"/section[3]"The guida"/a-component[1]""/a-element[9]""/aactivity[1]"Some of t"/h:p[3]"" -* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]"The Secur"/section[3]"The guida"/a-component[2]""/a-element[5]""/aactivity[1]"As indica"/h:p[1]"" -* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]"The Secur"/section[4]"At the as"/a-component[1]""/a-element[3]""/aactivity[1]"The evalu"/h:p[1]"" -* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]"The Secur"/section[4]"At the as"/a-component[1]""/a-element[3]""/aactivity[1]"The evalu"/h:p[2]"" -* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]"The Secur"/section[4]"At the as"/a-component[1]""/a-element[3]""/aactivity[1]"The evalu"/h:p[3]"" -* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]"The Secur"/section[5]"Testing i"/a-component[1]"Testing i"/a-element[4]""/aactivity[1]"The evalu"/h:p[1]"" -* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]"The Secur"/section[5]"Testing i"/a-component[1]"Testing i"/a-element[4]""/aactivity[1]"The evalu"/h:p[2]"" -* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]"The Secur"/section[5]"Testing i"/a-component[1]"Testing i"/a-element[4]""/aactivity[1]"The evalu"/h:p[3]"" +* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]""/section[3]"The guida"/h:p[1]"" +* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]""/section[3]"The guida"/a-component[1]""/a-element[9]""/aactivity[1]"Some of t"/h:p[1]"" +* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]""/section[3]"The guida"/a-component[1]""/a-element[9]""/aactivity[1]"Some of t"/h:p[2]"" +* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]""/section[3]"The guida"/a-component[1]""/a-element[9]""/aactivity[1]"Some of t"/h:p[3]"" +* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]""/section[3]"The guida"/a-component[2]""/a-element[5]""/aactivity[1]"As indica"/h:p[1]"" +* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]""/section[4]"At the as"/a-component[1]""/a-element[3]""/aactivity[1]"The evalu"/h:p[1]"" +* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]""/section[4]"At the as"/a-component[1]""/a-element[3]""/aactivity[1]"The evalu"/h:p[2]"" +* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]""/section[4]"At the as"/a-component[1]""/a-element[3]""/aactivity[1]"The evalu"/h:p[3]"" +* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]""/section[5]"Testing i"/a-component[1]"Testing i"/a-element[4]""/aactivity[1]"The evalu"/h:p[1]"" +* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]""/section[5]"Testing i"/a-component[1]"Testing i"/a-element[4]""/aactivity[1]"The evalu"/h:p[2]"" +* Warning: Detected an empty _p_ element./PP[1]""/sec:req[1]""/section[1]""/section[5]"Testing i"/a-component[1]"Testing i"/a-element[4]""/aactivity[1]"The evalu"/h:p[3]"" * Warning: Detected an empty _p_ element./PP[1]""/appendix[2]""/section[1]"Documenta"/h:p[1]"" diff --git a/xml-builder-test/SpellCheckReport.txt b/xml-builder-test/SpellCheckReport.txt index ccefd40..6f5776d 100644 --- a/xml-builder-test/SpellCheckReport.txt +++ b/xml-builder-test/SpellCheckReport.txt @@ -3,6 +3,7 @@ output/virtualization-release-linkable.html: KDF output/virtualization-release-linkable.html: NISTSP output/virtualization-release-linkable.html: Part1 output/virtualization-release-linkable.html: SPD +output/virtualization-release-linkable.html: SSP output/virtualization-release-linkable.html: andpotentially output/virtualization-release-linkable.html: assuch output/virtualization-release-linkable.html: bemade @@ -22,11 +23,13 @@ output/virtualization-release-linkable.html: policythat output/virtualization-release-linkable.html: potentiallysupport output/virtualization-release-linkable.html: reducesthe output/virtualization-release-linkable.html: removeable +output/virtualization-release-linkable.html: rized output/virtualization-release-linkable.html: rulesdescribing output/virtualization-release-linkable.html: rulesets output/virtualization-release-linkable.html: sel output/virtualization-release-linkable.html: selectted output/virtualization-release-linkable.html: serviceattacks +output/virtualization-release-linkable.html: unautho output/virtualization-release-linkable.html: untrustedsubjects output/virtualization-release-linkable.html: valueassociated output/virtualization-release.html: FFC @@ -34,6 +37,9 @@ output/virtualization-release.html: KDF output/virtualization-release.html: NISTSP output/virtualization-release.html: Part1 output/virtualization-release.html: SPD +output/virtualization-release.html: SSP +output/virtualization-release.html: VMM’s +output/virtualization-release.html: VM’s output/virtualization-release.html: action’ output/virtualization-release.html: andpotentially output/virtualization-release.html: assuch @@ -62,6 +68,7 @@ output/virtualization-release.html: reducesthe output/virtualization-release.html: removeable output/virtualization-release.html: rulesdescribing output/virtualization-release.html: rulesets +output/virtualization-release.html: securit output/virtualization-release.html: sel output/virtualization-release.html: selectted output/virtualization-release.html: serviceattacks @@ -72,6 +79,9 @@ output/virtualization.html: KDF output/virtualization.html: NISTSP output/virtualization.html: Part1 output/virtualization.html: SPD +output/virtualization.html: SSP +output/virtualization.html: VMM’s +output/virtualization.html: VM’s output/virtualization.html: action’ output/virtualization.html: andpotentially output/virtualization.html: assuch @@ -99,6 +109,7 @@ output/virtualization.html: reducesthe output/virtualization.html: removeable output/virtualization.html: rulesdescribing output/virtualization.html: rulesets +output/virtualization.html: securit output/virtualization.html: sel output/virtualization.html: selectted output/virtualization.html: serviceattacks diff --git a/xml-builder-test/effective.xml b/xml-builder-test/effective.xml index 681ed8e..ae992d8 100644 --- a/xml-builder-test/effective.xml +++ b/xml-builder-test/effective.xml @@ -56,7 +56,7 @@ or coalitions. In the context of a VS, information domains are generally implemented as collections of VMs connected by virtual networks. The VS itself can be considered an Information Domain, as can its Management Subsystem. See Operational Network. - An operating system that runs within a Guest VM. + An operating system that runs within a Guest VM. A Guest VM is a VM that contains a virtual environment for the execution of an independent computing system. Virtual environments execute mission workloads and implement customer-specific client or server functionality in Guest VMs, such as a web server or desktop productivity applications. @@ -65,7 +65,7 @@ to the workloads of Guest VMs. For example, a VM that provides a virus scanning service for a Guest VM would be considered a Helper VM. For the purposes of this document, Helper VMs are considered a type of Guest VM, and are therefore subject to all the same requirements, unless specifically stated otherwise. - An operating system onto which a VS is installed. Relative to the VS, the Host OS is + An operating system onto which a VS is installed. Relative to the VS, the Host OS is part of the Platform. There need not be a Host OS, but often VSes employ a Host OS or Control Domain to support guest access to host resources. Sometimes these domains are themselves encapsulated within VMs. The Hypervisor is part of the VMM. It is the software executive of the physical platform of a VS. @@ -98,18 +98,18 @@ designed functionality. Examples of Service VMs include device driver VMs that manage access to physical devices, VMs that provide life-cycle management and provisioning of Hypervisor and Guest VMs, and name-service VMs that help establish communication paths between VMs. - The overall policy enforced by the VS defining constraints on the behavior + The overall policy enforced by the VS defining constraints on the behavior of VMs and users. Users operate Guest VMs and are subject to configuration policies applied to the VS by Administrators. Users need not be human as in the case of embedded or headless VMs, users are often nothing more than software entities that operate within the VM. - A Virtual Machine is a virtualized hardware environment in which an operating system + A Virtual Machine is a virtualized hardware environment in which an operating system may execute. - A VMM is a collection of software components responsible for enabling VMs to + A VMM is a collection of software components responsible for enabling VMs to function as expected by the software executing within them. Generally, the VMM consists of a Hypervisor, Service VMs, and other components of the VS, such as virtual devices, binary translation systems, and physical device drivers. It manages concurrent execution of all VMs and virtualizes platform resources as needed. - A software product that enables multiple independent computing systems to + A software product that enables multiple independent computing systems to execute on the same physical hardware platform without interference from one another. For the purposes of this document, the VS consists of a Virtual Machine Manager (VMM), Virtual Machine abstractions, a management subsystem, and other components. @@ -124,17 +124,16 @@ This PP is conformant to Parts 2 (extended) and 3 (extended) of Common Criteria Version 3.1, Release 5 [CC]. - + - + - @@ -689,7 +688,7 @@ - The TSF shall<selectables><selectable id="fau_stg_ext.1.2_1">drop new audit data</selectable><selectable>overwrite previous audit records according to the following rule: <assignable id="fau_stg_ext.1.2_3">rule for overwriting previous audit records </assignable></selectable><selectable id="fau_stg_ext.1.2_5">other action </selectable></selectables>when the local storage space for audit data is full. + The TSF shall<selectables><selectable id="fau_stg_ext.1.2_1">drop new audit data</selectable><selectable id="fau_stg_ext.1.2_2">overwrite previous audit records according to the following rule: <assignable>rule for overwriting previous audit records </assignable></selectable><selectable id="fau_stg_ext.1.2_5"><assignable>other action </assignable></selectable></selectables>when the local storage space for audit data is full. An external log server, if available, might be used as alternative storage space in case the local storage space is full. An ‘other action’ could be defined in this case as ‘send the new audit data to an external IT entity’. @@ -727,7 +726,7 @@ The TSF shall generate <h:b>asymmetric</h:b> cryptographic keys in accordance with a specified cryptographic key generation algorithm<selectables><selectable id="fcs_ckm.1.1_1"> RSA schemes using cryptographic key sizes [2048-bit or greater] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.3] - </selectable><selectable> ECC schemes using [“NIST curves” P-256, P-384, and <selectables><selectable id="fcs_ckm.1.1_3">P-521</selectable><selectable id="fcs_ckm.1.1_4">no other curves</selectable></selectables> that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.4] </selectable><selectable id="fcs_ckm.1.1_5"> + </selectable><selectable id="fcs_ckm.1.1_2"> ECC schemes using [“NIST curves” P-256, P-384, and <selectables><selectable id="fcs_ckm.1.1_3">P-521</selectable><selectable id="fcs_ckm.1.1_4">no other curves</selectable></selectables> that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.4] </selectable><selectable id="fcs_ckm.1.1_5"> FFC schemes using cryptographic key sizes [2048-bit or greater] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.1]]. </selectable><selectable id="fcs_ckm.1.1_6">FFC Schemes using Diffie-Hellman group 14 that meet the following: [RFC 3526]</selectable><selectable id="fcs_ckm.1.1_7"> FFC Schemes using safe primes that meet the following: [‘NIST Special Publication 800-56A Revision 3, “Recommendation for Pair-Wise Key Establishment Schemes"]</selectable></selectables><h:s>and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet the @@ -1100,7 +1099,7 @@ <f-component cc-id="fcs_cop.1" id="fcs-cop-1-sig" name="Cryptographic Operation (Signature Algorithms)" iteration="Sig"> <f-element id="fcs-cop-1e1-sig"> <title>The TSF shall perform [ <h:i>cryptographic signature services (generation and verification)</h:i> ] in accordance with a specified cryptographic algorithm<selectables><selectable id="sel-sig-rsa">RSA schemes using cryptographic key sizes [2048-bit or greater] that meet - the following: [<h:i>FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 4</h:i>]</selectable><selectable>ECDSA schemes using [“NIST curves” P-256, P-384 and <selectables><selectable id="fcs_cop.1.1_Sig_1">P-521</selectable><selectable id="fcs_cop.1.1_Sig_2">no other curves</selectable></selectables>] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 5] </selectable></selectables>. + the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 4]ECDSA schemes using [“NIST curves” P-256, P-384 and P-521no other curves] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 5] . The ST Author should choose the algorithm implemented to perform digital signatures; if more than one algorithm is available, this requirement should be iterated to specify the functionality. For the algorithm chosen, the ST author should make the appropriate @@ -1536,7 +1535,7 @@ - The TSF shall implement the protocol: <h:p/><selectables><selectable>IKEv1, using Main Mode for Phase 1 exchanges, as defined in RFC 2407, RFC 2408, RFC 2409, RFC 4109, <selectables><selectable id="fcs_ipsec_ext.1.5_2">no other RFCs for extended sequence numbers</selectable><selectable id="fcs_ipsec_ext.1.5_3">RFC 4304 for extended sequence numbers</selectable></selectables>, <selectables><selectable id="fcs_ipsec_ext.1.5_4">no other RFCs for hash functions</selectable><selectable id="fcs_ipsec_ext.1.5_5">RFC 4868 for hash functions</selectable></selectables>, and <selectables><selectable id="fcs_ipsec_ext.1.5_6">support for XAUTH</selectable><selectable id="fcs_ipsec_ext.1.5_7">no support for XAUTH</selectable></selectables></selectable><selectable>IKEv2 as defined in RFC 7296 (with mandatory support for NAT traversal as specified in section 2.23), RFC 8784, RFC 8247, and <selectables><selectable id="fcs_ipsec_ext.1.5_9">no other RFCs for hash functions</selectable><selectable id="fcs_ipsec_ext.1.5_10">RFC 4868 for hash functions</selectable></selectables>.</selectable></selectables> + The TSF shall implement the protocol: <h:p/><selectables><selectable id="fcs_ipsec_ext.1.5_1">IKEv1, using Main Mode for Phase 1 exchanges, as defined in RFC 2407, RFC 2408, RFC 2409, RFC 4109, <selectables><selectable id="fcs_ipsec_ext.1.5_2">no other RFCs for extended sequence numbers</selectable><selectable id="fcs_ipsec_ext.1.5_3">RFC 4304 for extended sequence numbers</selectable></selectables>, <selectables><selectable id="fcs_ipsec_ext.1.5_4">no other RFCs for hash functions</selectable><selectable id="fcs_ipsec_ext.1.5_5">RFC 4868 for hash functions</selectable></selectables>, and <selectables><selectable id="fcs_ipsec_ext.1.5_6">support for XAUTH</selectable><selectable id="fcs_ipsec_ext.1.5_7">no support for XAUTH</selectable></selectables></selectable><selectable id="fcs_ipsec_ext.1.5_8">IKEv2 as defined in RFC 7296 (with mandatory support for NAT traversal as specified in section 2.23), RFC 8784, RFC 8247, and <selectables><selectable id="fcs_ipsec_ext.1.5_9">no other RFCs for hash functions</selectable><selectable id="fcs_ipsec_ext.1.5_10">RFC 4868 for hash functions</selectable></selectables>.</selectable></selectables> If the TOE implements SHA-2 hash algorithms for IKEv1 or IKEv2, the ST author shall select RFC 4868. @@ -1593,7 +1592,7 @@ - The TSF shall ensure that<selectables><selectable>IKEv2 SA lifetimes can be configured by <selectables><selectable id="fcs_ipsec_ext.1.7_2">an Administrator</selectable><selectable id="fcs_ipsec_ext.1.7_3">a VPN Gateway</selectable></selectables> based on <selectables><selectable id="fcs_ipsec_ext.1.7_4">number of packets/number of bytes</selectable><selectable id="fcs_ipsec_ext.1.7_5">length of time</selectable></selectables></selectable><selectable>IKEv1 SA lifetimes can be configured by <selectables><selectable id="fcs_ipsec_ext.1.7_7">an Administrator</selectable><selectable id="fcs_ipsec_ext.1.7_8">a VPN Gateway</selectable></selectables> based on <selectables><selectable id="fcs_ipsec_ext.1.7_9">number of packets/number of bytes</selectable><selectable id="fcs_ipsec_ext.1.7_10">length of time</selectable></selectables></selectable><selectable>IKEv1 SA lifetimes are fixed based on <selectables><selectable id="fcs_ipsec_ext.1.7_12">number of packets/number of bytes</selectable><selectable id="fcs_ipsec_ext.1.7_13">length of time</selectable></selectables>. If length of time is used, it must include at least one option that is 24 hours or less for Phase 1 SAs and 8 hours or less for Phase 2 SAs. </selectable></selectables> + The TSF shall ensure that<selectables><selectable id="fcs_ipsec_ext.1.7_1">IKEv2 SA lifetimes can be configured by <selectables><selectable id="fcs_ipsec_ext.1.7_2">an Administrator</selectable><selectable id="fcs_ipsec_ext.1.7_3">a VPN Gateway</selectable></selectables> based on <selectables><selectable id="fcs_ipsec_ext.1.7_4">number of packets/number of bytes</selectable><selectable id="fcs_ipsec_ext.1.7_5">length of time</selectable></selectables></selectable><selectable id="fcs_ipsec_ext.1.7_6">IKEv1 SA lifetimes can be configured by <selectables><selectable id="fcs_ipsec_ext.1.7_7">an Administrator</selectable><selectable id="fcs_ipsec_ext.1.7_8">a VPN Gateway</selectable></selectables> based on <selectables><selectable id="fcs_ipsec_ext.1.7_9">number of packets/number of bytes</selectable><selectable id="fcs_ipsec_ext.1.7_10">length of time</selectable></selectables></selectable><selectable id="fcs_ipsec_ext.1.7_11">IKEv1 SA lifetimes are fixed based on <selectables><selectable id="fcs_ipsec_ext.1.7_12">number of packets/number of bytes</selectable><selectable id="fcs_ipsec_ext.1.7_13">length of time</selectable></selectables>. If length of time is used, it must include at least one option that is 24 hours or less for Phase 1 SAs and 8 hours or less for Phase 2 SAs. </selectable></selectables> The ST author is afforded a selection based on the version of IKE in their implementation. There is a further selection within this selection that allows the @@ -1793,7 +1792,7 @@ - The TSF shall not establish an SA if the [<selectables><selectable id="fcs_ipsec_ext.1.12_1">IP address</selectable><selectable id="fcs_ipsec_ext.1.12_2">Fully Qualified Domain Name (FQDN)</selectable><selectable id="fcs_ipsec_ext.1.12_3">user FQDN</selectable><selectable id="fcs_ipsec_ext.1.12_4">Distinguished Name (DN)</selectable></selectables>and<selectables><selectable id="fcs_ipsec_ext.1.12_5">no other reference identifier type</selectable><selectable id="fcs_ipsec_ext.1.12_7">other supported reference identifier types </selectable></selectables>] contained in a certificate does not match the expected values for the entity attempting to establish a connection. + The TSF shall not establish an SA if the [<selectables><selectable id="fcs_ipsec_ext.1.12_1">IP address</selectable><selectable id="fcs_ipsec_ext.1.12_2">Fully Qualified Domain Name (FQDN)</selectable><selectable id="fcs_ipsec_ext.1.12_3">user FQDN</selectable><selectable id="fcs_ipsec_ext.1.12_4">Distinguished Name (DN)</selectable></selectables>and<selectables><selectable id="fcs_ipsec_ext.1.12_5">no other reference identifier type</selectable><selectable id="fcs_ipsec_ext.1.12_7"><assignable>other supported reference identifier types </assignable></selectable></selectables>] contained in a certificate does not match the expected values for the entity attempting to establish a connection. The TOE must support at least one of the following identifier types: IP address, Fully Qualified Domain Name (FQDN), user FQDN, or Distinguished Name (DN). @@ -1958,7 +1957,7 @@ There are no auditable events foreseen. FDP_VMS_EXT.1 VM Separation - The TSF shall use<selectables><selectable id="fdp_hbi_ext.1.1_1">no mechanism</selectable><selectable id="fdp_hbi_ext.1.1_3">list of platform-provided, hardware-based mechanisms </selectable></selectables>to constrain a Guest VM's direct access to the following physical devices:<selectables><selectable id="fdp_hbi_ext.1.1_4">no devices</selectable><selectable id="fdp_hbi_ext.1.1_6"> physical devices to which the VMM allows Guest VMs physical access </selectable></selectables>. + The TSF shall use<selectables><selectable id="fdp_hbi_ext.1.1_1">no mechanism</selectable><selectable id="fdp_hbi_ext.1.1_3"><assignable>list of platform-provided, hardware-based mechanisms </assignable></selectable></selectables>to constrain a Guest VM's direct access to the following physical devices:<selectables><selectable id="fdp_hbi_ext.1.1_4">no devices</selectable><selectable id="fdp_hbi_ext.1.1_6"><assignable> physical devices to which the VMM allows Guest VMs physical access </assignable></selectable></selectables>. The TSF must use available hardware-based isolation mechanisms to constrain VMs when VMs have direct access to physical devices. “Direct access” in this context means that the VM can read or write device memory or access device I/O ports without the VMM being able to intercept @@ -1993,10 +1992,10 @@ The TSF shall allow an authorized administrator to control Guest VM access to the following physical platform resources:<assignable>list of physical platform resources the VMM isable to control access to</assignable>. - The TSF shall explicitly deny all Guest VMs access to the following physical platform resources:<selectables><selectable id="fdp_ppr_ext.1.2_1">no physical platform resources</selectable><selectable id="fdp_ppr_ext.1.2_3">list of physical platform resources to which access is explicitly denied </selectable></selectables>. + The TSF shall explicitly deny all Guest VMs access to the following physical platform resources:<selectables><selectable id="fdp_ppr_ext.1.2_1">no physical platform resources</selectable><selectable id="fdp_ppr_ext.1.2_3"><assignable>list of physical platform resources to which access is explicitly denied </assignable></selectable></selectables>. - The TSF shall explicitly allow all Guest VMs access to the following physical platform resources:<selectables><selectable id="fdp_ppr_ext.1.3_1">no physical platform resources</selectable><selectable id="fdp_ppr_ext.1.3_3">list of physical platform resources to which access is always allowed </selectable></selectables>. + The TSF shall explicitly allow all Guest VMs access to the following physical platform resources:<selectables><selectable id="fdp_ppr_ext.1.3_1">no physical platform resources</selectable><selectable id="fdp_ppr_ext.1.3_3"><assignable>list of physical platform resources to which access is always allowed </assignable></selectable></selectables>. For purposes of this requirement, physical platform resources are divided into three categories: those to which Guest OS access is configurable and moderated by the VMMthose to which the Guest OS is never allowed to have direct access, andthose to which the Guest OS is always allowed to have direct access. @@ -2146,7 +2145,7 @@ There are no auditable events foreseen. No dependencies. - The VS shall provide the following mechanisms for transferring data between Guest VMs:<selectables><selectable id="fdp_vms_ext.1.1_1">no mechanism</selectable><selectable id="fdp_vms_ext.1.1_2">virtual networking</selectable><selectable id="fdp_vms_ext.1.1_4">other inter-VM data sharing mechanisms </selectable></selectables>. + The VS shall provide the following mechanisms for transferring data between Guest VMs:<selectables><selectable id="fdp_vms_ext.1.1_1">no mechanism</selectable><selectable id="fdp_vms_ext.1.1_2">virtual networking</selectable><selectable id="fdp_vms_ext.1.1_4"><assignable>other inter-VM data sharing mechanisms </assignable></selectable></selectables>. The TSF shall by default enforce a policy prohibiting sharing of data between Guest VMs. @@ -2276,10 +2275,10 @@ FIA_UIA_EXT.1 Administrator Identification and Authentication FMT_SMR.1 Security Roles - The TSF shall detect when<selectables><selectable id="fia_afl_ext.1.1_2">a positive integer number </selectable><selectable>an administrator configurable positive integer within a <assignable id="fia_afl_ext.1.1_4">range of acceptable values </assignable></selectable></selectables>unsuccessful authentication attempts occur related to Administrators attempting to authenticate remotely using<selectables><selectable id="fia_afl_ext.1.1_5">username and password</selectable><selectable id="fia_afl_ext.1.1_6">username and PIN</selectable></selectables>. + The TSF shall detect when<selectables><selectable id="fia_afl_ext.1.1_2"><assignable>a positive integer number </assignable></selectable><selectable id="fia_afl_ext.1.1_3">an administrator configurable positive integer within a <assignable>range of acceptable values </assignable></selectable></selectables>unsuccessful authentication attempts occur related to Administrators attempting to authenticate remotely using<selectables><selectable id="fia_afl_ext.1.1_5">username and password</selectable><selectable id="fia_afl_ext.1.1_6">username and PIN</selectable></selectables>. - When the defined number of unsuccessful authentication attempts has been met, the TSF shall:<selectables><selectable>prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until <assignable id="fia_afl_ext.1.2_2">action to unlock </assignable> is taken by an Administrator</selectable><selectable id="fia_afl_ext.1.2_3">prevent the offending Administrator from successfully establishing a remote session using + <title>When the defined number of unsuccessful authentication attempts has been met, the TSF shall:<selectables><selectable id="fia_afl_ext.1.2_1">prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until <assignable>action to unlock </assignable> is taken by an Administrator</selectable><selectable id="fia_afl_ext.1.2_3">prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until an Administrator-defined time period has elapsed</selectable></selectables> The action to be taken shall be populated in the selection of the ST @@ -2341,7 +2340,7 @@ The TSF shall provide the following password management capabilities for administrative passwords: <h:ol><h:li>Passwords shall be able to be composed of any combination of upper and lower case characters, digits, and the following special characters: - <selectables><selectable id="fia_pmg_ext.1.1_1">“!”</selectable><selectable id="fia_pmg_ext.1.1_2">“@”</selectable><selectable id="fia_pmg_ext.1.1_3">“#”</selectable><selectable id="fia_pmg_ext.1.1_4">“$”</selectable><selectable id="fia_pmg_ext.1.1_5">“%”</selectable><selectable id="fia_pmg_ext.1.1_6">“^”</selectable><selectable id="fia_pmg_ext.1.1_7">“& ”</selectable><selectable id="fia_pmg_ext.1.1_8">“*”</selectable><selectable id="fia_pmg_ext.1.1_9">“(“</selectable><selectable id="fia_pmg_ext.1.1_10">“)”</selectable><selectable id="fia_pmg_ext.1.1_12">other characters </selectable></selectables></h:li><h:li>Minimum password length shall be configurable</h:li><h:li>Passwords of at least 15 characters in length shall be supported</h:li></h:ol> + “!”“@”“#”“$”“%”“^”“& ”“*”“(““)”other characters Minimum password length shall be configurablePasswords of at least 15 characters in length shall be supported This SFR is included in the ST if the ST Author selects ‘authentication based on username and password’ in FIA_UAU.5.1. @@ -2377,8 +2376,8 @@ "Ability to configure name/address of directory server to bind with" must be selected in the Client or Server module management function table. - The TSF shall provide the following authentication mechanisms:<selectables><selectable><selectables><selectable id="fia_uau.5.1_1">local</selectable><selectable id="sel-uau-pwd-dirbased">directory-based</selectable></selectables> authentication based on username and password </selectable><selectable id="fia_uau.5.1_2">authentication based on username and a PIN that releases an asymmetric key stored in - OE-protected storage</selectable><selectable><selectables><selectable id="fia_uau.5.1_3">local</selectable><selectable id="sel-uau-x509-dirbased">directory-based</selectable></selectables> authentication based on X.509 certificates </selectable><selectable><selectables><selectable id="fia_uau.5.1_4">local</selectable><selectable id="sel-uau-ssh-dirbased">directory-based</selectable></selectables> authentication based on an SSH public key credential </selectable></selectables>to support Administrator authentication. + The TSF shall provide the following authentication mechanisms:<selectables><selectable id="sel-uau-pwd"><selectables><selectable id="fia_uau.5.1_1">local</selectable><selectable id="sel-uau-pwd-dirbased">directory-based</selectable></selectables> authentication based on username and password </selectable><selectable id="fia_uau.5.1_2">authentication based on username and a PIN that releases an asymmetric key stored in + OE-protected storage</selectable><selectable id="sel-uau-x509"><selectables><selectable id="fia_uau.5.1_3">local</selectable><selectable id="sel-uau-x509-dirbased">directory-based</selectable></selectables> authentication based on X.509 certificates </selectable><selectable id="sel-uau-ssh"><selectables><selectable id="fia_uau.5.1_4">local</selectable><selectable id="sel-uau-ssh-dirbased">directory-based</selectable></selectables> authentication based on an SSH public key credential </selectable></selectables>to support Administrator authentication. Selection of ‘authentication based on username and password’ requires that FIA_PMG_EXT.1 be included in the ST. This also requires that the ST include a management function for password management. If the ST author selects ‘authentication based on an SSH public-key credential’, @@ -2612,7 +2611,7 @@ "Ability to configure action taken if unable to determine the validity of a certificate" in the Client or Server module management function table must also be selected. - The TSF shall use X.509v3 certificates as defined by RFC 5280 to support authentication for<selectables><selectable id="sel-x509-2-ipsec">IPsec</selectable><selectable id="sel-x509-2-tls">TLS</selectable><selectable id="sel-x509-2-https">HTTPS</selectable><selectable id="sel-x509-2-ssh">SSH</selectable><selectable id="sel-x5092-signed-updates">code signing for system software updates</selectable><selectable id="fia_x509_ext.2.1_2">other uses </selectable></selectables> + The TSF shall use X.509v3 certificates as defined by RFC 5280 to support authentication for<selectables><selectable id="sel-x509-2-ipsec">IPsec</selectable><selectable id="sel-x509-2-tls">TLS</selectable><selectable id="sel-x509-2-https">HTTPS</selectable><selectable id="sel-x509-2-ssh">SSH</selectable><selectable id="sel-x5092-signed-updates">code signing for system software updates</selectable><selectable id="fia_x509_ext.2.1_2"><assignable>other uses </assignable></selectable></selectables> This SFR must be included in the ST if the selection for FPT_TUD_EXT.1.3 is “digital signature mechanism,” if "certificate-based authentication of the remote peer" is selected in FTP_ITC_EXT.1, or if "authentication based on X.509 certificates" @@ -2787,7 +2786,7 @@ There are no auditable events foreseen. No dependencies. - The TSF shall take advantage of execution environment-based vulnerability mitigation mechanisms supported by the Platform such as:<selectables><selectable id="fpt_eem_ext.1.1_1">Address space randomization</selectable><selectable id="fpt_eem_ext.1.1_2">Memory execution protection (e.g., DEP)</selectable><selectable id="fpt_eem_ext.1.1_3">Stack buffer overflow protection</selectable><selectable id="fpt_eem_ext.1.1_4">Heap corruption detection</selectable><selectable id="fpt_eem_ext.1.1_6">other mechanisms </selectable><selectable id="fpt_eem_ext.1.1_7">No mechanisms</selectable></selectables> + The TSF shall take advantage of execution environment-based vulnerability mitigation mechanisms supported by the Platform such as:<selectables><selectable id="fpt_eem_ext.1.1_1">Address space randomization</selectable><selectable id="fpt_eem_ext.1.1_2">Memory execution protection (e.g., DEP)</selectable><selectable id="fpt_eem_ext.1.1_3">Stack buffer overflow protection</selectable><selectable id="fpt_eem_ext.1.1_4">Heap corruption detection</selectable><selectable id="fpt_eem_ext.1.1_6"><assignable>other mechanisms </assignable></selectable><selectable id="fpt_eem_ext.1.1_7">No mechanisms</selectable></selectables> Processor manufacturers, compiler developers, and operating system vendors have developed execution environment-based mitigations that increase the cost to attackers by adding complexity to the task of compromising systems. Software can often take advantage of these mechanisms @@ -3006,7 +3005,7 @@ Integrity measurements collected. No dependencies. - The TSF shall support a measured launch of the Virtualization System. Measured components of the VS shall include the static executable image of the Hypervisor and:<selectables><selectable id="fpt_ml_ext.1.1_1">Static executable images of the Management Subsystem</selectable><selectable id="fpt_ml_ext.1.1_3">list of (static images of) Service VMs </selectable><selectable id="fpt_ml_ext.1.1_5">list of configuration files </selectable><selectable id="fpt_ml_ext.1.1_6">no other components</selectable></selectables> + The TSF shall support a measured launch of the Virtualization System. Measured components of the VS shall include the static executable image of the Hypervisor and:<selectables><selectable id="fpt_ml_ext.1.1_1">Static executable images of the Management Subsystem</selectable><selectable id="fpt_ml_ext.1.1_3"><assignable>list of (static images of) Service VMs </assignable></selectable><selectable id="fpt_ml_ext.1.1_5"><assignable>list of configuration files </assignable></selectable><selectable id="fpt_ml_ext.1.1_6">no other components</selectable></selectables> The TSF shall make the measurements selected in FPT_ML_EXT.1.1 available to the Management Subsystem. @@ -3366,7 +3365,7 @@ The TSF shall use<selectables><selectable id="sel-itc-tls">TLS as conforming to the <h:a href="https://www.niap-ccevs.org/MMO/PP/-439-/">Functional Package for Transport Layer Security</h:a></selectable><selectable id="sel-itc-https">TLS/HTTPS as conforming to FCS_HTTPS_EXT.1</selectable><selectable id="sel-itc-ipsec">IPsec as conforming to FCS_IPSEC_EXT.1</selectable><selectable id="sel-itc-ssh">SSH as conforming to the <h:a href="https://www.niap-ccevs.org/MMO/PP/-459-/">Functional Package - for Secure Shell</h:a></selectable></selectables>and<selectables><selectable id="sel-itc-certauth">certificate-based authentication of the remote peer</selectable><selectable id="ftp_itc_ext.1.1_1">non-certificate-based authentication of the remote peer</selectable><selectable id="ftp_itc_ext.1.1_2">no authentication of the remote peer</selectable></selectables>to provide a trusted communication channel between itself, and <h:p/> <h:li>audit servers (as required by FAU_STG_EXT.1), and</h:li><selectables><selectable id="ftp_itc_ext.1.1_3">remote administrators (as required by FTP_TRP.1.1 if selected in FMT_MOF_EXT.1.1 in the Client or Server PP-Module)</selectable><selectable id="ftp_itc_ext.1.1_4">separation of management and operational networks (if selected in FMT_SMO_EXT.1)</selectable><selectable id="ftp_itc_ext.1.1_6">other capabilities </selectable><selectable id="ftp_itc_ext.1.1_7">no other capabilities</selectable></selectables>that is logically distinct from other communication paths and provides assured identification of its endpoints and protection of the communicated data from disclosure and detection of modification of the communicated data. + for Secure Shellandcertificate-based authentication of the remote peernon-certificate-based authentication of the remote peerno authentication of the remote peerto provide a trusted communication channel between itself, and audit servers (as required by FAU_STG_EXT.1), andremote administrators (as required by FTP_TRP.1.1 if selected in FMT_MOF_EXT.1.1 in the Client or Server PP-Module)separation of management and operational networks (if selected in FMT_SMO_EXT.1)other capabilities no other capabilitiesthat is logically distinct from other communication paths and provides assured identification of its endpoints and protection of the communicated data from disclosure and detection of modification of the communicated data. If the ST author selects either TLS or HTTPS, the TSF shall be validated against the Functional Package for TLS. This PP does not mandate that a product implement TLS with mutual authentication, but if the product includes the capability to perform TLS with mutual authentication, then @@ -3537,47 +3536,75 @@ -
      - The Security Objectives for the TOE in Section 4 were constructed to address threats identified in Section 3.1. The - Security Functional Requirements (SFRs) in Section 5.1 are a formal instantiation of the Security Objectives. The PP - identifies the Security Assurance Requirements (SARs) to frame the extent to which the evaluator assesses the - documentation applicable for the evaluation and performs independent testing. - This section lists the set of Security Assurance Requirements (SARs) from Part 3 of the Common Criteria for Information - Technology Security Evaluation, Version 3.1, Revision 5 that are required in evaluations against this PP. Individual - evaluation activities to be performed are specified in both Section 5.1 as well as in this section. - After the ST has been approved for evaluation, the Information Technology Security Evaluation Facility (ITSEF) will obtain - the TOE, supporting environmental IT, and the administrative/user guides for the TOE. The ITSEF is expected to perform - actions mandated by the CEM for the ASE and ALC SARs. The ITSEF also performs the evaluation activities contained - within Section 5, which are intended to be an interpretation of the other CEM assurance requirements as they apply - to the specific technology instantiated in the TOE. The evaluation activities that are captured in Section 5 also - provide clarification as to what the developer needs to provide to demonstrate the TOE is compliant with the PP. - -
      +
      + The Security Objectives for the TOE in Section 4 were constructed to address threats identified in Section 3.1. The Security Functional Requirements (SFRs) in Section 5.1 are a formal instantiation of the Security Objectives. The PP identifies the Security Assurance Requirements (SARs) to frame the extent to which the evaluator assesses the documentation applicable for the evaluation and performs independent testing. This section lists the set of Security Assurance Requirements (SARs) from Part 3 of the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5 that are required in evaluations against this PP. Individual evaluation activities to be performed are specified in both Section 5.1 as well as in this section. After the ST has been approved for evaluation, the Information Technology Security Evaluation Facility (ITSEF) will obtain the TOE, supporting environmental IT, and the administrative/user guides for the TOE. The ITSEF is expected to perform actions mandated by the CEM for the ASE and ALC SARs. The ITSEF also performs the evaluation activities contained within Section 5, which are intended to be an interpretation of the other CEM assurance requirements as they apply to the specific technology instantiated in the TOE. The evaluation activities that are captured in Section 5 also provide clarification as to what the developer needs to provide to demonstrate the TOE is compliant with the PP. +
      As per ASE activities defined in [CEM] plus the TSS evaluation activities defined for any SFRs claimed by the TOE. -
      +
      +
      + The information about the TOE is contained in the guidance documentation available to the end user as well as the TOE Summary Specification (TSS) portion of the ST. The TOE developer must concur with the description of the product that is contained in the TSS as it relates to the functional requirements. The evaluation activities contained in Section 5.2 should provide the ST authors with sufficient information to determine the appropriate content for the TSS section. - The developer shall provide a functional specification.The developer shall provide a tracing from the functional specification to the SFRs. + + + + The developer shall provide a functional specification. + + + + The developer shall provide a tracing from the functional specification to the SFRs. + As indicated in the introduction to this section, the functional specification is composed of the information contained in the AGD_OPR and AGD_PRE documentation, coupled with the information provided in the TSS of the ST. The evaluation activities in the functional requirements point to evidence that should exist in the documentation and TSS section; since these are directly associated with the SFRs, the tracing in element - ADV_FSP.1.2D is implicitly already done and no additional documentation is necessary.The functional specification shall describe the purpose and method of use for each SFR-enforcing and - SFR-supporting TSFI.The functional specification shall identify all parameters associated with each SFR-enforcing and - SFR-supporting TSFI.The functional specification shall provide rationale for the implicit categorization of interfaces as - SFR-non-interfering.The tracing shall demonstrate that the SFRs trace to TSFIs in the functional specification.The evaluator shall confirm that the information provided meets all requirements for content and presentation - of evidence.The evaluator shall determine that the functional specification is an accurate and complete instantiation of - the SFRs. + ADV_FSP.1.2D is implicitly already done and no additional documentation is necessary. + + + + The functional specification shall describe the purpose and method of use for each SFR-enforcing and + SFR-supporting TSFI. + + + + The functional specification shall identify all parameters associated with each SFR-enforcing and + SFR-supporting TSFI. + + + + The functional specification shall provide rationale for the implicit categorization of interfaces as + SFR-non-interfering. + + + + The tracing shall demonstrate that the SFRs trace to TSFIs in the functional specification. + + + + The evaluator shall confirm that the information provided meets all requirements for content and presentation + of evidence. + + + + The evaluator shall determine that the functional specification is an accurate and complete instantiation of + the SFRs. + There are no specific evaluation activities associated with these SARs. The functional specification documentation is provided to support the evaluation activities described in Section 5.2, and other activities described for AGD, ATE, and AVA SARs. The requirements on the content of the functional specification information is implicitly assessed by virtue of the other evaluation activities being performed; if the evaluator is unable to perform an activity because there is insufficient interface information, then an adequate functional specification has not been provided. -
      + + + + +
      +
      + The guidance documents will be provided with the developer’s security target. Guidance must include a description of how the authorized user verifies that the Operational Environment can fulfill its role for the security functionality. The documentation should be in an informal style and readable by an authorized user. @@ -3588,23 +3615,60 @@ Guidance pertaining to particular security functionality is also provided; specific requirements on such guidance are contained in the evaluation activities specified with individual SFRs where applicable. - The developer shall provide operational user guidance. - + + + + The developer shall provide operational user guidance. + + Rather than repeat information here, the developer should review the evaluation activities for this component to ascertain the specifics of the guidance that the evaluators will be checking for. This - will provide the necessary information for the preparation of acceptable guidance.The operational user guidance shall describe what <h:s>for each user role </h:s><refinement>the authorized user-</refinement>accessible functions and + will provide the necessary information for the preparation of acceptable guidance.</note> + <aactivity/> + </a-element> + <a-element type="C"> + <title>The operational user guidance shall describe what <h:s>for each user role </h:s><h:b>the authorized user-</h:b>accessible functions and privileges that should be controlled in a secure processing environment, including appropriate - warnings.The operational user guidance shall describe, for <h:s>each user role </h:s><refinement>the authorized user</refinement>, how to use the available - interfaces provided by the TOE in a secure manner.The operational user guidance shall describe, for <h:s>each user role </h:s><refinement>the authorized user</refinement>, the available functions and + warnings. + + + + The operational user guidance shall describe, for <h:s>each user role </h:s><h:b>the authorized user</h:b>, how to use the available + interfaces provided by the TOE in a secure manner. + + + + The operational user guidance shall describe, for <h:s>each user role </h:s><h:b>the authorized user</h:b>, the available functions and interfaces, in particular all security parameters under the control of the user, indicating secure - values as appropriate.The operational user guidance shall, for <h:s>each user role </h:s><refinement>the authorized user</refinement>, clearly present each type of + values as appropriate. + + + + The operational user guidance shall, for <h:s>each user role </h:s><h:b>the authorized user</h:b>, clearly present each type of security-relevant event relative to the user-accessible functions that need to be performed, - including changing the security characteristics of entities under the control of the TSF.The operational user guidance shall identify all possible modes of operation of the TOE + including changing the security characteristics of entities under the control of the TSF. + + + + The operational user guidance shall identify all possible modes of operation of the TOE (including operation following failure or operational error), their consequences and implications for - maintaining secure operation.The operational user guidance shall, for <h:s>each user role </h:s><refinement>the authorized user</refinement>, describe the security measures to be + maintaining secure operation. + + + + The operational user guidance shall, for <h:s>each user role </h:s><h:b>the authorized user</h:b>, describe the security measures to be followed in order to fulfill the security objectives for the operational environment as described in - the ST.The operational user guidance shall be clear and reasonable.The evaluator shall confirm that the information provided meets all requirements for content and - presentation of evidence. + the ST. + + + + The operational user guidance shall be clear and reasonable. + + + + The evaluator shall confirm that the information provided meets all requirements for content and + presentation of evidence. + Some of the contents of the operational guidance will be verified by the evaluation activities in Section 5.2 and evaluation of the TOE according to the CEM. The following additional information is also required. @@ -3623,15 +3687,38 @@ certificate owner. This may be supplied with the product initially, or may be obtained by some other means.Instructions for obtaining the update itself. This should include instructions for making the update accessible to the TOE (e.g., placement in a specific directory).Instructions for initiating the update process, as well as discerning whether the process - was successful or unsuccessful. This includes generation of the hash/digital signature.The developer shall provide the TOE including its preparative procedures. - As with the operational guidance, the developer should look to the evaluation activities + was successful or unsuccessful. This includes generation of the hash/digital signature. + + + + + The developer shall provide the TOE including its preparative procedures. + + As with the operational guidance, the developer should look to the evaluation activities to determine the required content with respect to preparative procedures. - The preparative procedures shall describe all the steps necessary for secure acceptance of the - delivered TOE in accordance with the developer’s delivery procedures.The preparative procedures shall describe all the steps necessary for secure installation of the TOE + </note> + <aactivity/> + </a-element> + <a-element type="C"> + <title>The preparative procedures shall describe all the steps necessary for secure acceptance of the + delivered TOE in accordance with the developer’s delivery procedures. + + + + The preparative procedures shall describe all the steps necessary for secure installation of the TOE and for the secure preparation of the operational environment in accordance with the security - objectives for the operational environment as described in the ST.The evaluator shall confirm that the information provided meets all requirements for content and - presentation of evidence.The evaluator shall apply the preparative procedures to confirm that the TOE can be prepared securely - for operation. + objectives for the operational environment as described in the ST. + + + + The evaluator shall confirm that the information provided meets all requirements for content and + presentation of evidence. + + + + The evaluator shall apply the preparative procedures to confirm that the TOE can be prepared securely + for operation. + As indicated in the introduction above, there are significant expectations with respect to the documentation—especially when configuring the operational environment to support TOE functional requirements. The evaluator shall check to ensure that the guidance provided for the @@ -3640,29 +3727,64 @@ The operational guidance shall contain step-by-step instructions suitable for use by an end-user of the VS to configure a new, out-of-the-box system into the configuration evaluated under this Protection Profile. -
      + + + +
      +
      + At the assurance level specified for TOEs conformant to this PP, life-cycle support is limited to an examination of the TOE vendor’s development and configuration management process in order to provide a baseline level of assurance that the TOE itself is developed in a secure manner and that the developer has a well-defined process in place to deliver updates to mitigate known security flaws. This is a result of the critical role that a developer’s practices play in contributing to the overall trustworthiness of a product. - The developer shall provide the TOE and a reference for the TOE. - The TOE shall be labeled with its unique reference. - The evaluator shall confirm that the information provided meets all requirements for content and + + <a-component cc-id="alc_cmc.1" name="Labeling of the TOE"> + <a-element type="D"> + <title>The developer shall provide the TOE and a reference for the TOE. + + + + + The TOE shall be labeled with its unique reference. + + + + + The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence. - + + The evaluator shall check the ST to ensure that it contains an identifier (such as a product name/version number) that specifically identifies the version that meets the requirements of the ST. The evaluator shall check the AGD guidance and TOE samples received for testing to ensure that the version number is consistent with that in the ST. If the vendor maintains a website advertising the TOE, the evaluator shall examine the information on the website to ensure that - the information in the ST is sufficient to distinguish the product.The developer shall provide a configuration list for the TOE. - The configuration list shall include the following: the TOE itself; and the + the information in the ST is sufficient to distinguish the product.<h:p/></aactivity> + </a-element> + </a-component> + <a-component cc-id="alc_cms.1" name="TOE CM coverage"> + <a-element type="D"> + <title>The developer shall provide a configuration list for the TOE. + + + + + The configuration list shall include the following: the TOE itself; and the evaluation evidence required by the SARs. - The configuration list shall uniquely identify the configuration items. - The evaluator shall confirm that the information provided meets all requirements for content and - presentation of evidence. + + + + + The configuration list shall uniquely identify the configuration items. + + + + + The evaluator shall confirm that the information provided meets all requirements for content and + presentation of evidence. + The evaluator shall ensure that the developer has identified (in public-facing development guidance for their platform) one or more development environments appropriate for use in developing applications for the developer’s platform. For each of these development environments, the developer @@ -3673,7 +3795,11 @@ The evaluator shall ensure that the TSF is uniquely identified (with respect to other products from the TSF vendor), and that documentation provided by the developer in association with the requirements in the ST is associated with the TSF using this unique identification. - + + + + + This component requires the TOE developer, in conjunction with any other necessary parties, to provide information as to how the VS is updated to address security issues in a timely manner. The documentation describes the process of providing updates to the public from the time a security flaw is @@ -3681,25 +3807,53 @@ (e.g., the developer, hardware vendors) and the steps that are performed (e.g., developer testing), including worst case time periods, before an update is made available to the public. - The developer shall provide a description in the TSS of how timely security updates are made to the - TOE.The description shall include the process for creating and deploying security updates for the TOE - software/firmware.The description shall express the time window as the length of time, in days, between public disclosure - of a vulnerability and the public availability of security updates to the TOE. + + + The developer shall provide a description in the TSS of how timely security updates are made to the + TOE. + + + + The description shall include the process for creating and deploying security updates for the TOE + software/firmware. + + + + The description shall express the time window as the length of time, in days, between public disclosure + of a vulnerability and the public availability of security updates to the TOE. + The total length of time may be presented as a summation of the periods of time that each party (e.g., TOE developer, hardware vendor) on the critical path consumes. The time period until public - availability per deployment mechanism may differ; each is described.The description shall include the mechanisms publicly available for reporting security issues - pertaining to the TOE. + availability per deployment mechanism may differ; each is described. + + + + The description shall include the mechanisms publicly available for reporting security issues + pertaining to the TOE. + The reporting mechanism could include websites, email addresses, and a means to protect the sensitive nature of the report (e.g., public keys that could be used to encrypt the details of a - proof-of-concept exploit).The evaluator shall confirm that the information provided meets all requirements for content and - presentation of evidence.
      + proof-of-concept exploit). + + + + The evaluator shall confirm that the information provided meets all requirements for content and + presentation of evidence. + + + +
      +
      + Testing is specified for functional aspects of the system as well as aspects that take advantage of design or implementation weaknesses. The former is done through the ATE_IND family, while the latter is through the AVA_VAN family. At the assurance level specified in this PP, testing is based on advertised functionality and interfaces with dependency on the availability of design information. One of the primary outputs of the evaluation process is the test report as specified in the following requirements. - + + + Testing is performed to confirm the functionality described in the TSS as well as the administrative (including configuration and operation) documentation provided. The focus of the testing is to confirm that the requirements specified in Section 5.1 are being met, although some additional testing is specified for SARs @@ -3707,11 +3861,26 @@ components. The evaluator produces a test report documenting the plan for and results of testing, as well as coverage arguments focused on the platform/TOE combinations that are claiming conformance to this PP. - The developer shall provide the TOE for testing. - The TOE shall be suitable for testing. - The evaluator shall confirm that the information provided meets all requirements for content and - presentation of evidence.The evaluator shall test a subset of the TSF to confirm that the TSF operates as specified. - + + + The developer shall provide the TOE for testing. + + + + + The TOE shall be suitable for testing. + + + + + The evaluator shall confirm that the information provided meets all requirements for content and + presentation of evidence. + + + + The evaluator shall test a subset of the TSF to confirm that the TSF operates as specified. + + The evaluator shall prepare a test plan and report documenting the testing aspects of the system. While it is not necessary to have one test case per test listed in an evaluation activity, the evaluators must document in the test plan that each applicable testing requirement in the @@ -3739,7 +3908,12 @@ cumulative account, so if there was a test run that resulted in a failure; a fix installed; and then a successful re-run of the test, the report would show a “fail” and “pass” result (and the supporting details), and not just the “pass” result. -
      + + + +
      +
      + For the first generation of this Protection Profile, the evaluation lab is expected to survey open sources to learn what vulnerabilities have been discovered in these types of products. In most cases, these vulnerabilities will require sophistication beyond that of a basic attacker. Until penetration tools are created and uniformly @@ -3748,13 +3922,33 @@ provided by the vendor. This information will be used in the development of penetration testing tools and for the development of future PPs. - The developer shall provide the TOE for testing. - The TOE shall be suitable for testing. - The evaluator shall confirm that the information provided meets all requirements for content and - presentation of evidence.The evaluator shall perform a search of public domain sources to identify potential vulnerabilities - in the TOE.The evaluator shall conduct penetration testing, based on the identified potential vulnerabilities, + + <a-component cc-id="ava_van.1" name="Vulnerability survey"> + <a-element type="D"> + <title>The developer shall provide the TOE for testing. + + + + + The TOE shall be suitable for testing. + + + + + The evaluator shall confirm that the information provided meets all requirements for content and + presentation of evidence. + + + + The evaluator shall perform a search of public domain sources to identify potential vulnerabilities + in the TOE. + + + + The evaluator shall conduct penetration testing, based on the identified potential vulnerabilities, to determine that the TOE is resistant to attacks performed by an attacker possessing Basic attack - potential.As with ATE_IND the evaluator shall generate a report to document their findings with respect + potential. + As with ATE_IND the evaluator shall generate a report to document their findings with respect to this requirement. This report could physically be part of the overall test report mentioned in ATE_IND, or a separate document. The evaluator performs a search of public information to determine the vulnerabilities that have been found in virtualization in general, as well as those that pertain @@ -3767,7 +3961,11 @@ the assurance level of this PP. If exploiting the vulnerability requires expert skills and an electron microscope, for instance, then a test would not be suitable and an appropriate justification would be formulated. -
      + + + +
      +
      : Implicitly Satisfied RequirementsRequirementRationale for SatisfactionFCS_CKM.4 – Cryptographic Key Destruction FCS_CKM.1 has a dependency on FCS_CKM.4. The extended SFR FCS_CKM_EXT.4 addresses this dependency diff --git a/xml-builder-test/meta-info.txt b/xml-builder-test/meta-info.txt index b672180..9209a76 100644 --- a/xml-builder-test/meta-info.txt +++ b/xml-builder-test/meta-info.txt @@ -1,2 +1,2 @@ T_VER=master-2024-04-30_10:59:56_-0400 -BUILD_TIME=2024-07-16 20:43 +BUILD_TIME=2024-08-12 02:34 diff --git a/xml-builder-test/spell-badge.svg b/xml-builder-test/spell-badge.svg index c44de45..b646719 100644 --- a/xml-builder-test/spell-badge.svg +++ b/xml-builder-test/spell-badge.svg @@ -1,5 +1,5 @@ - - Misspellings: 106 + + Misspellings: 117 @@ -13,8 +13,8 @@ \ No newline at end of file diff --git a/xml-builder-test/virtualization-release-linkable.html b/xml-builder-test/virtualization-release-linkable.html index c6dc8dc..20f3263 100644 --- a/xml-builder-test/virtualization-release-linkable.html +++ b/xml-builder-test/virtualization-release-linkable.html @@ -630,7 +630,7 @@

      Protection Profile for Virtualization

      NIAP Logo
      Version: 1.1
      2021-06-14
      NIAP

      Revision History

      -
      VersionDateComment
      1.02016-11-17Initial Publication
      1.12021-06-14Incorporate TDs, Reference TLS Package, Add Equivalency Guidelines, etc.

      TDs Applied

      Contents

    TDs Applied

    Contents

    1Introduction1.1Compliant Targets of Evaluation1.2Terms1.2.1Common Criteria Terms1.2.2Technical Terms1.3Use Cases2Conformance Claims3Security Problem Definition3.1Threats3.2Assumptions3.3Organizational Security Policies4Security Objectives4.1Security Objectives for the TOE4.2Security Objectives for the Operational Environment4.3Security Objectives Rationale5Security Requirements5.1Security Functional Requirements5.1.1Class: Security Audit (FAU)5.1.2Class: Cryptographic Support (FCS)5.1.3Class: User Data Protection (FDP)5.1.4Class: Identification and Authentication (FIA)5.1.5Class: Security Management (FMT)5.1.6Class: Protection of the TSF (FPT)5.1.7Class: TOE Access Banner (FTA)5.1.8Class: Trusted Path/Channel (FTP)5.1.9TOE Security Functional Requirements Rationale5.2Security Assurance Requirements5.2.1Class ASE: Security Target Evaluation5.2.2Class ADV: Development5.2.3Class AGD: Guidance Documents5.2.4Class ALC: Life-Cycle Support5.2.5Class ATE: Tests5.2.6Class AVA: Vulnerability AssessmentAppendix A - Optional RequirementsA.1Strictly Optional Requirements A.1.1Class: Security Audit (FAU)A.1.2Class: Protection of the TSF (FPT)A.2Objective Requirements A.2.1Class: Protection of the TSF (FPT)A.3Implementation-dependent Requirements Appendix B - Selection-based Requirements @@ -674,7 +674,7 @@

    1.1 Compliant Targets o or coalitions. In the context of a VS, information domains are generally implemented as collections of VMs connected by virtual networks. The VS itself can be considered an Information Domain, as can its Management Subsystem.
    Guest Network
    See Operational Network. -
    Guest Operating System (OS)
    An operating system that runs within a Guest VM. +
    Guest Operating System
    An operating system that runs within a Guest VM.
    Guest VM
    A Guest VM is a VM that contains a virtual environment for the execution of an independent computing system. Virtual environments execute mission workloads and implement customer-specific client or server functionality in Guest VMs, such as a web server or desktop productivity applications. @@ -683,7 +683,7 @@

    1.1 Compliant Targets o to the workloads of Guest VMs. For example, a VM that provides a virus scanning service for a Guest VM would be considered a Helper VM. For the purposes of this document, Helper VMs are considered a type of Guest VM, and are therefore subject to all the same requirements, unless specifically stated otherwise. -
    Host Operating System (OS)
    An operating system onto which a VS is installed. Relative to the VS, the Host OS is +
    Host Operating System
    An operating system onto which a VS is installed. Relative to the VS, the Host OS is part of the Platform. There need not be a Host OS, but often VSes employ a Host OS or Control Domain to support guest access to host resources. Sometimes these domains are themselves encapsulated within VMs.
    Hypercall
    An API function that allows VM-aware software running within a VM to invoke VMM functionality. @@ -715,32 +715,31 @@

    1.1 Compliant Targets o designed functionality. Examples of Service VMs include device driver VMs that manage access to physical devices, VMs that provide life-cycle management and provisioning of Hypervisor and Guest VMs, and name-service VMs that help establish communication paths between VMs. -
    System Security Policy (SSP)
    The overall policy enforced by the VS defining constraints on the behavior +
    System Security Policy
    The overall policy enforced by the VS defining constraints on the behavior of VMs and users.
    User
    Users operate Guest VMs and are subject to configuration policies applied to the VS by Administrators. Users need not be human as in the case of embedded or headless VMs, users are often nothing more than software entities that operate within the VM. -
    Virtual Machine (VM)
    A Virtual Machine is a virtualized hardware environment in which an operating system +
    Virtual Machine
    A Virtual Machine is a virtualized hardware environment in which an operating system may execute. -
    Virtual Machine Manager (VMM)
    A VMM is a collection of software components responsible for enabling VMs to +
    Virtual Machine Manager
    A VMM is a collection of software components responsible for enabling VMs to function as expected by the software executing within them. Generally, the VMM consists of a Hypervisor, Service VMs, and other components of the VS, such as virtual devices, binary translation systems, and physical device drivers. It manages concurrent execution of all VMs and virtualizes platform resources as needed. -
    Virtualization System (VS)
    A software product that enables multiple independent computing systems to +
    Virtualization System
    A software product that enables multiple independent computing systems to execute on the same physical hardware platform without interference from one another. For the purposes of this document, the VS consists of a Virtual Machine Manager (VMM), Virtual Machine abstractions, a management subsystem, and other components.

    1.3 Use Cases

    This Base-PP does not define any use cases for virtualization technology. Client Virtualization and Server Virtualization products have different use cases and so these are defined in their respective PP-Modules.

    2 Conformance Claims

    -
    Conformance Statement

    A Security Target must claim exact conformance to this Protection Profile, as defined in the CC and CEM addenda for Exact Conformance, Selection-Based SFRs, and Optional SFRs (dated May 2017). The following PPs and PP-Modules are allowed to be specified in a PP-Configuration with this PP-Module with this PP.

    • PP-Module for Client Virtualization Systems, Version 1.1
    • PP-Module for Server Virtualization Systems, Version 1.1
    CC Conformance Claims
    This PP is conformant to Parts 2 (extended) and 3 (extended) of Common Criteria Version 3.1, Release 5 [CC].
    PP Claim

    Package Claim

    +
    Conformance Statement

    A Security Target must claim exact conformance to this Protection Profile, as defined in the CC and CEM addenda for Exact Conformance, Selection-Based SFRs, and Optional SFRs (dated May 2017). The following PPs and PP-Modules are allowed to be specified in a PP-Configuration with this PP-Module with this PP.

    • PP-Module for Client Virtualization Systems, Version 1.1
    • PP-Module for Server Virtualization Systems, Version 1.1
    CC Conformance Claims
    This PP is conformant to Parts 2 (extended) and 3 (extended) of Common Criteria Version 3.1, Release 5 [CC].
    PP Claims

    Package Claims

    3 Security Problem Definition

    -

    3.1 Threats

    -
    T.3P_SOFTWARE
    In some VS implementations, functions critical to the security of the TOE are by necessity performed by software not produced by the virtualization vendor. Such software may include physical device drivers, and even non-TOE entities such as Host Operating Systems. Since this software has the same or similar privilege level as the VS, vulnerabilities can be exploited by an adversary to compromise the VS and VMs. Where possible, the VS should mitigate the results of potential vulnerabilities or malicious content in third-party code on which it relies. For example, physical device drivers (potentially the Host OS) could be encapsulated within VMs in order to limit the effects of compromise.
    T.DATA_LEAKAGE
    It is a fundamental property of VMs that the domains encapsulated by different VMs remain separate unless data sharing is permitted by policy. For this reason, all Virtualization Systems shall support a policythat prohibits information transfer between VMs. It shall be possible to configure VMs such that data cannot be moved between domains from VM to VM, orthrough virtual or physical network components under the control of the VS. When VMs are configured assuch, it shall not be possible for data to leak between domains, neither by the express efforts ofsoftware or users of a VM, nor because of vulnerabilities or errors in the implementation of the VMM orother VS components. If it is possible for data to leak between domains when prohibited by policy, then an adversary on one domain or network can obtain data from another domain. Such cross-domain data leakage can, for example, causeclassified information, corporate proprietary information, or personally identifiable information to bemade accessible to unauthorized entities.
    T.DENIAL_OF_SERVICE
    A VM may block others from system resources (e.g., system memory, persistent storage, and processing time) via a resource exhaustion attack.
    T.MISCONFIGURATION
    The VS may be misconfigured, which could impact its functioning and security. This misconfiguration could be due to an administrative error or the use of faulty configuration data.
    T.PLATFORM_COMPROMISE
    The VS must be capable of protecting the platform from threats that originate within VMs and operational networks connected to the VS. The hosting of untrusted—even malicious—domains by the VS cannot be permitted to compromise the security and integrity of the platform on which the VS executes. If an attacker can access the underlying platform in a manner not controlled by the VMM, the attacker might be able to modify system firmware or software—compromising both the VS and the underlying platform.
    T.UNAUTHORIZED_ACCESS
    Functions performed by the management layer include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only certain authorized system users (administrators) are allowed to exercise management functions or obtain sensitive information from the TOE. Virtualization Systems are often managed remotely over communication networks. Members of these networks can be both geographically and logically separated from each other, and pass through a variety of other systems which may be under the control of an adversary, and offer the opportunity for communications to be compromised. An adversary with access to an open management network could inject commands into the management infrastructure or extract sensitive information. This would provide an adversary with administrator privilege on the platform, and administrative control over the VMs and virtual network connections. The adversary could also gain access to the management network by hijacking the management network channel.
    T.UNAUTHORIZED_MODIFICATION
    System integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. Malware running on the platform must not be able to undetectably modify VS components while the system is running or at rest. Likewise, malicious code running within a virtual machine must not be able to modify Virtualization System components.
    T.UNAUTHORIZED_UPDATE
    It is common for attackers to target outdated versions of software containing known flaws. This means it is extremely important to update VS software as soon as possible when updates are available. But the source of the updates and the updates themselves must be trusted. If an attacker can write their own update containing malicious code they can take control of the VS.
    T.UNPATCHED_SOFTWARE
    Vulnerabilities in outdated or unpatched software can be exploited by adversaries to compromise the VS or platform.
    T.USER_ERROR
    If a Virtualization System is capable of simultaneously displaying VMs of different domains to the same user at the same time, there is always the chance that the user will become confused and unintentionally leak information between domains. This is especially likely if VMs belonging to different domains are indistinguishable. Malicious code may also attempt to interfere with the user’s ability to distinguish between domains. The VS must take measures to minimize the likelihood of such confusion.
    T.VMM_COMPROMISE
    The VS is designed to provide the appearance of exclusivity to the VMs and is designed to separate or isolate their functions except where specifically shared. Failure of security mechanisms could lead to unauthorized intrusion into or modification of the VMM, or bypass of the VMM altogether, by non-TOE software, such as that running in Guest or Helper VMs or on the host platform. This must be prevented to avoid compromising the VS.
    T.WEAK_CRYPTO
    To the extent that VMs appear isolated within the VS, a threat of weak cryptography may arise if the VMM does not provide good entropy to support security-related features that depend on entropy to implement cryptographic algorithms. For example, a random number generator keeps an estimate of the number of bits of noise in the entropy pool. From this entropy pool random numbers are created. Good random numbers are essential to implementing strong cryptography. Cryptography implemented using poor random numbers can be defeated by a sophisticated adversary. Such defeat can result in the compromise of Guest VM data and credentials, and of VS data and credentials, and can enable unauthorized access to the VS or VMs.
    +
    T.3P_SOFTWARE
    In some VS implementations, functions critical to the security of the TOE are by necessity performed by software not produced by the virtualization vendor. Such software may include physical device drivers, and even non-TOE entities such as Host Operating Systems. Since this software has the same or similar privilege level as the VS, vulnerabilities can be exploited by an adversary to compromise the VS and VMs. Where possible, the VS should mitigate the results of potential vulnerabilities or malicious content in third-party code on which it relies. For example, physical device drivers (potentially the Host OS) could be encapsulated within VMs in order to limit the effects of compromise.
    T.DATA_LEAKAGE
    It is a fundamental property of VMs that the domains encapsulated by different VMs remain separate unless data sharing is permitted by policy. For this reason, all Virtualization Systems shall support a policythat prohibits information transfer between VMs. It shall be possible to configure VMs such that data cannot be moved between domains from VM to VM, orthrough virtual or physical network components under the control of the VS. When VMs are configured assuch, it shall not be possible for data to leak between domains, neither by the express efforts ofsoftware or users of a VM, nor because of vulnerabilities or errors in the implementation of the VMM orother VS components. If it is possible for data to leak between domains when prohibited by policy, then an adversary on one domain or network can obtain data from another domain. Such cross-domain data leakage can, for example, causeclassified information, corporate proprietary information, or personally identifiable information to bemade accessible to unauthorized entities.
    T.DENIAL_OF_SERVICE
    A VM may block others from system resources (e.g., system memory, persistent storage, and processing time) via a resource exhaustion attack.
    T.MISCONFIGURATION
    The VS may be misconfigured, which could impact its functioning and security. This misconfiguration could be due to an administrative error or the use of faulty configuration data.
    T.PLATFORM_COMPROMISE
    The VS must be capable of protecting the platform from threats that originate within VMs and operational networks connected to the VS. The hosting of untrusted—even malicious—domains by the VS cannot be permitted to compromise the security and integrity of the platform on which the VS executes. If an attacker can access the underlying platform in a manner not controlled by the VMM, the attacker might be able to modify system firmware or software—compromising both the VS and the underlying platform.
    T.UNAUTHORIZED_ACCESS
    Functions performed by the management layer include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only certain authorized system users (administrators) are allowed to exercise management functions or obtain sensitive information from the TOE. Virtualization Systems are often managed remotely over communication networks. Members of these networks can be both geographically and logically separated from each other, and pass through a variety of other systems which may be under the control of an adversary, and offer the opportunity for communications to be compromised. An adversary with access to an open management network could inject commands into the management infrastructure or extract sensitive information. This would provide an adversary with administrator privilege on the platform, and administrative control over the VMs and virtual network connections. The adversary could also gain access to the management network by hijacking the management network channel.
    T.UNAUTHORIZED_MODIFICATION
    System integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. Malware running on the platform must not be able to undetectably modify VS components while the system is running or at rest. Likewise, malicious code running within a virtual machine must not be able to modify Virtualization System components.
    T.UNAUTHORIZED_UPDATE
    It is common for attackers to target outdated versions of software containing known flaws. This means it is extremely important to update VS software as soon as possible when updates are available. But the source of the updates and the updates themselves must be trusted. If an attacker can write their own update containing malicious code they can take control of the VS.
    T.UNPATCHED_SOFTWARE
    Vulnerabilities in outdated or unpatched software can be exploited by adversaries to compromise the VS or platform.
    T.USER_ERROR
    If a Virtualization System is capable of simultaneously displaying VMs of different domains to the same user at the same time, there is always the chance that the user will become confused and unintentionally leak information between domains. This is especially likely if VMs belonging to different domains are indistinguishable. Malicious code may also attempt to interfere with the user’s ability to distinguish between domains. The VS must take measures to minimize the likelihood of such confusion.
    T.VMM_COMPROMISE
    The VS is designed to provide the appearance of exclusivity to the VMs and is designed to separate or isolate their functions except where specifically shared. Failure of security mechanisms could lead to unauthorized intrusion into or modification of the VMM, or bypass of the VMM altogether, by non-TOE software, such as that running in Guest or Helper VMs or on the host platform. This must be prevented to avoid compromising the VS.
    T.WEAK_CRYPTO
    To the extent that VMs appear isolated within the VS, a threat of weak cryptography may arise if the VMM does not provide good entropy to support security-related features that depend on entropy to implement cryptographic algorithms. For example, a random number generator keeps an estimate of the number of bits of noise in the entropy pool. From this entropy pool random numbers are created. Good random numbers are essential to implementing strong cryptography. Cryptography implemented using poor random numbers can be defeated by a sophisticated adversary. Such defeat can result in the compromise of Guest VM data and credentials, and of VS data and credentials, and can enable unauthorized access to the VS or VMs.

    3.2 Assumptions

    -
    A.NON_MALICIOUS_USER
    The user of the VS is not willfully negligent or hostile, and uses the VS in compliance with the applied enterprise security policy and guidance. At the same time, malicious applications could act as the user, so requirements which confine malicious applications are still in scope.
    A.PHYSICAL
    Physical security commensurate with the value of the TOE and the data it contains is assumed to be provided by the environment.
    A.PLATFORM_INTEGRITY
    The platform has not been compromised prior to installation of the VS.
    A.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance.
    +
    A.NON_MALICIOUS_USER
    The user of the VS is not willfully negligent or hostile, and uses the VS in compliance with the applied enterprise security policy and guidance. At the same time, malicious applications could act as the user, so requirements which confine malicious applications are still in scope.
    A.PHYSICAL
    Physical security commensurate with the value of the TOE and the data it contains is assumed to be provided by the environment.
    A.PLATFORM_INTEGRITY
    The platform has not been compromised prior to installation of the VS.
    A.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance.

    3.3 Organizational Security Policies

    @@ -751,16 +750,16 @@

    3.3 O

    4 Security Objectives

    4.1 Security Objectives for the TOE

    -
    O.AUDIT
    An audit log must be created that captures accesses to the objects the TOE protects. The log of these accesses, or audit events, must be protected from modification, unauthorized access, and destruction. The audit log must be sufficiently detailed to indicate the date and time of the event, the identify of the user, the type of event, and the success or failure of the event.
    O.CORRECTLY_APPLIED_CONFIGURATION
    The TOE must not apply configurations that violate the current security policy. The TOE must correctly apply configurations and policies to a newly created Guest VM, as well as to existing Guest VMs when applicable configuration or policy changes are made. All changes to configuration and to policy must conform to the existing security policy. Similarly, changes made to the configuration of the TOE itself must not violate the existing security policy.
    O.DOMAIN_INTEGRITY
    While the VS is not responsible for the contents or correct functioning of software that runs within Guest VMs, it is responsible for ensuring that the correct functioning of the software within a Guest VM is not interfered with by other VMs.
    O.MANAGEMENT_ACCESS
    VMM management functions include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only authorized users (administrators) may exercise management functions. Because of the privileges exercised by the VMM management functions, it must not be possible for the VMM’s management components to be compromised without administrator notification. This means that unauthorized users cannot be permitted access to the management functions, and the management components must not be interfered with by Guest VMs or unprivileged users on other networks—including operational networks connected to the TOE. VMMs include a set of management functions that collectively allow administrators to configure and manage the VMM, as well as configure Guest VMs. These management functions are specific to the VS and are distinct from any other management functions that might exist for the internal management of any given Guest VM. These VMM management functions are privileged, with the security of the entire system relying on their proper use. The VMM management functions can be classified into different categories and the policy for their use and the impact to security may vary accordingly. The management functions are distributed throughout the VMM (within the VMM and Service VMs). The VMM must support the necessary mechanisms to enable the control of all management functions according to the system security policy. When a management function is distributed among multiple Service VMs, the VMs must be protected using the security mechanisms of the Hypervisor and any Service VMs involved to ensure that the intent of the system security policy is not compromised. Additionally, since hypercalls permit Guest VMs to invoke the Hypervisor, and often allow the passing of data to the Hypervisor, it is important that the hypercall interface is well-guarded and that all parameters be validated. The VMM maintains configuration data for every VM on the system. This configuration data, whether of Service or Guest VMs, must be protected. The mechanisms used to establish, modify and verify configuration data are part of the VS management functions and must be protected as such. The proper internal configuration of Service VMs that provide critical security functions can also greatly impact VS security. These configurations must also be protected. Internal configuration of Guest VMs should not impact overall VS security. The overall goal is to ensure that the VMM, including the environments internal to Service VMs, is properly configured and that all Guest VM configurations are maintained consistent with the system security policy throughout their lifecycle. Virtualization Systems are often managed remotely. For example, an administrator can remotely update virtualization software, start and shut down VMs, and manage virtualized network connections. If a console is required, it could be run on a separate machine or it could itself run in a VM. When performing remote management, an administrator must communicate with a privileged management agent over a network. Communications with the management infrastructure must be protected from Guest VMs and operational networks.
    O.PATCHED_SOFTWARE
    The VS must be updated and patched when needed in order to prevent the potential compromise of the VMM, as well as the networks and VMs that it hosts. Identifying and applying needed updates must be a normal part of the operating procedure to ensure that patches are applied in a timely and thorough manner. In order to facilitate this, the VS must support standards and protocols that help enhance the manageability of the VS as an IT product, enabling it to be integrated as part of a manageable network (e.g., reporting current patch level and patchability).
    O.PLATFORM_INTEGRITY
    The integrity of the VMM depends on the integrity of the hardware and software on which the VMM relies. Although the VS does not have complete control over the integrity of the platform, the VS should as much as possible try to ensure that no users or software hosted by the VS can undermine the integrity of the platform.
    O.RESOURCE_ALLOCATION
    The TOE will provide mechanisms that enforce constraints on the allocation of system resources in accordance with existing security policy.
    O.VMM_INTEGRITY
    Integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. This objective concerns only the integrity of the VS—not the integrity of software running inside of Guest VMs or of the physical platform. The overall objective is to ensure the integrity of critical components of a VS. Initial integrity of a VS can be established through mechanisms such as a digitally signed installation or update package, or through integrity measurements made at launch. Integrity is maintained in a running system by careful protection of the VMM from untrusted users and software. For example, it must not be possible for software running within a Guest VM to exploit a vulnerability in a device or hypercall interface and gain control of the VMM. The vendor must release patches for vulnerabilities as soon as practicable after discovery.
    O.VM_ENTROPY
    VMs must have access to good entropy sources to support security-related features that implement cryptographic algorithms. For example, in order to function as members of operational networks, VMs must be able to communicate securely with other network entities—whether virtual or physical. They must therefore have access to sources of good entropy to support that secure communication.
    O.VM_ISOLATION
    VMs are the fundamental subject of the system. The VMM is responsible for applying the system security policy (SSP) to the VM and all resources. As basic functionality, the VMM must support a security policy that mandates no information transfer between VMs. The VMM must support the necessary mechanisms to isolate the resources of all VMs. The VMM partitions a platform's physical resources for use by the supported virtual environments. Depending on customer requirements, a VM may need a completely isolated environment with exclusive access to system resources or share some of its resources with other VMs. It must be possible to enforce a security policy that prohibits the transfer of data between VMs through shared devices. When the platform security policy allows the sharing of resources across VM boundaries, the VMM must ensure that all access to those resources is consistent with the policy. The VMM may delegate the responsibility for the mediation of resource sharing to select Service VMs; however in doing so, it remains responsible for mediating access to the Service VMs, and each Service VM must mediate all access to any shared resource that has been delegated to it in accordance with the SSP. Both virtual and physical devices are resources requiring access control. The VMM must enforce access control in accordance with system security policy. Physical devices are platform devices with access mediated via the VMM per the O.VMM_Integrity objective. Virtual devices may include virtual storage devices and virtual network devices. Some of the access control restrictions must be enforced internal to Service VMs, as may be the case for isolating virtual networks. VMMs may also expose purely virtual interfaces. These are VMM specific, and while they are not analogous to a physical device, they are also subject to access control. The VMM must support the mechanisms to isolate all resources associated with virtual networks and to limit a VM's access to only those virtual networks for which it has been configured. The VMM must also support the mechanisms to control the configurations of virtual networks according to the SSP.
    +
    O.AUDIT
    An audit log must be created that captures accesses to the objects the TOE protects. The log of these accesses, or audit events, must be protected from modification, unauthorized access, and destruction. The audit log must be sufficiently detailed to indicate the date and time of the event, the identify of the user, the type of event, and the success or failure of the event.
    O.CORRECTLY_APPLIED_CONFIGURATION
    The TOE must not apply configurations that violate the current security policy. The TOE must correctly apply configurations and policies to a newly created Guest VM, as well as to existing Guest VMs when applicable configuration or policy changes are made. All changes to configuration and to policy must conform to the existing security policy. Similarly, changes made to the configuration of the TOE itself must not violate the existing security policy.
    O.DOMAIN_INTEGRITY
    While the VS is not responsible for the contents or correct functioning of software that runs within Guest VMs, it is responsible for ensuring that the correct functioning of the software within a Guest VM is not interfered with by other VMs.
    O.MANAGEMENT_ACCESS
    VMM management functions include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only authorized users (administrators) may exercise management functions. Because of the privileges exercised by the VMM management functions, it must not be possible for the VMM’s management components to be compromised without administrator notification. This means that unauthorized users cannot be permitted access to the management functions, and the management components must not be interfered with by Guest VMs or unprivileged users on other networks—including operational networks connected to the TOE. VMMs include a set of management functions that collectively allow administrators to configure and manage the VMM, as well as configure Guest VMs. These management functions are specific to the VS and are distinct from any other management functions that might exist for the internal management of any given Guest VM. These VMM management functions are privileged, with the security of the entire system relying on their proper use. The VMM management functions can be classified into different categories and the policy for their use and the impact to security may vary accordingly. The management functions are distributed throughout the VMM (within the VMM and Service VMs). The VMM must support the necessary mechanisms to enable the control of all management functions according to the system security policy. When a management function is distributed among multiple Service VMs, the VMs must be protected using the security mechanisms of the Hypervisor and any Service VMs involved to ensure that the intent of the system security policy is not compromised. Additionally, since hypercalls permit Guest VMs to invoke the Hypervisor, and often allow the passing of data to the Hypervisor, it is important that the hypercall interface is well-guarded and that all parameters be validated. The VMM maintains configuration data for every VM on the system. This configuration data, whether of Service or Guest VMs, must be protected. The mechanisms used to establish, modify and verify configuration data are part of the VS management functions and must be protected as such. The proper internal configuration of Service VMs that provide critical security functions can also greatly impact VS security. These configurations must also be protected. Internal configuration of Guest VMs should not impact overall VS security. The overall goal is to ensure that the VMM, including the environments internal to Service VMs, is properly configured and that all Guest VM configurations are maintained consistent with the system security policy throughout their lifecycle. Virtualization Systems are often managed remotely. For example, an administrator can remotely update virtualization software, start and shut down VMs, and manage virtualized network connections. If a console is required, it could be run on a separate machine or it could itself run in a VM. When performing remote management, an administrator must communicate with a privileged management agent over a network. Communications with the management infrastructure must be protected from Guest VMs and operational networks.
    O.PATCHED_SOFTWARE
    The VS must be updated and patched when needed in order to prevent the potential compromise of the VMM, as well as the networks and VMs that it hosts. Identifying and applying needed updates must be a normal part of the operating procedure to ensure that patches are applied in a timely and thorough manner. In order to facilitate this, the VS must support standards and protocols that help enhance the manageability of the VS as an IT product, enabling it to be integrated as part of a manageable network (e.g., reporting current patch level and patchability).
    O.PLATFORM_INTEGRITY
    The integrity of the VMM depends on the integrity of the hardware and software on which the VMM relies. Although the VS does not have complete control over the integrity of the platform, the VS should as much as possible try to ensure that no users or software hosted by the VS can undermine the integrity of the platform.
    O.RESOURCE_ALLOCATION
    The TOE will provide mechanisms that enforce constraints on the allocation of system resources in accordance with existing security policy.
    O.VMM_INTEGRITY
    Integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. This objective concerns only the integrity of the VS—not the integrity of software running inside of Guest VMs or of the physical platform. The overall objective is to ensure the integrity of critical components of a VS. Initial integrity of a VS can be established through mechanisms such as a digitally signed installation or update package, or through integrity measurements made at launch. Integrity is maintained in a running system by careful protection of the VMM from untrusted users and software. For example, it must not be possible for software running within a Guest VM to exploit a vulnerability in a device or hypercall interface and gain control of the VMM. The vendor must release patches for vulnerabilities as soon as practicable after discovery.
    O.VM_ENTROPY
    VMs must have access to good entropy sources to support security-related features that implement cryptographic algorithms. For example, in order to function as members of operational networks, VMs must be able to communicate securely with other network entities—whether virtual or physical. They must therefore have access to sources of good entropy to support that secure communication.
    O.VM_ISOLATION
    VMs are the fundamental subject of the system. The VMM is responsible for applying the system security policy (SSP) to the VM and all resources. As basic functionality, the VMM must support a security policy that mandates no information transfer between VMs. The VMM must support the necessary mechanisms to isolate the resources of all VMs. The VMM partitions a platform's physical resources for use by the supported virtual environments. Depending on customer requirements, a VM may need a completely isolated environment with exclusive access to system resources or share some of its resources with other VMs. It must be possible to enforce a security policy that prohibits the transfer of data between VMs through shared devices. When the platform security policy allows the sharing of resources across VM boundaries, the VMM must ensure that all access to those resources is consistent with the policy. The VMM may delegate the responsibility for the mediation of resource sharing to select Service VMs; however in doing so, it remains responsible for mediating access to the Service VMs, and each Service VM must mediate all access to any shared resource that has been delegated to it in accordance with the SSP. Both virtual and physical devices are resources requiring access control. The VMM must enforce access control in accordance with system security policy. Physical devices are platform devices with access mediated via the VMM per the O.VMM_Integrity objective. Virtual devices may include virtual storage devices and virtual network devices. Some of the access control restrictions must be enforced internal to Service VMs, as may be the case for isolating virtual networks. VMMs may also expose purely virtual interfaces. These are VMM specific, and while they are not analogous to a physical device, they are also subject to access control. The VMM must support the mechanisms to isolate all resources associated with virtual networks and to limit a VM's access to only those virtual networks for which it has been configured. The VMM must also support the mechanisms to control the configurations of virtual networks according to the SSP.

    4.2 Security Objectives for the Operational Environment

    -
    OE.CONFIG
    TOE administrators will configure the VS correctly to create the intended security policy.
    OE.NON_MALICIOUS_USER
    Users are trusted to not be willfully negligent or hostile and use the VS in compliance with the applied enterprise security policy and guidance.
    OE.PHYSICAL
    Physical security, commensurate with the value of the TOE and the data it contains, is provided by the environment.
    OE.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner.
    +
    OE.CONFIG
    TOE administrators will configure the VS correctly to create the intended security policy.
    OE.NON_MALICIOUS_USER
    Users are trusted to not be willfully negligent or hostile and use the VS in compliance with the applied enterprise security policy and guidance.
    OE.PHYSICAL
    Physical security, commensurate with the value of the TOE and the data it contains, is provided by the environment.
    OE.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner.

    4.3 Security Objectives Rationale

    This section describes how the assumptions, threats, and organizational - security policies map to the security objectives.
    Table 1: Security Objectives Rationale
    Threat, Assumption, or OSPSecurity ObjectivesRationale
    T.3P_​SOFTWAREO.VMM_​INTEGRITYThe VMM integrity mechanisms include environment-based vulnerability mitigation and potentiallysupport for introspection and device driver isolation, all of which reduce the likelihood that any vulnerabilities in third-party software can be used to exploit the TOE.
    T.DATA_​LEAKAGEO.DOMAIN_​INTEGRITYLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    O.VM_​ISOLATIONLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    T.DENIAL_​OF_​SERVICEO.RESOURCE_​ALLOCATIONThe ability of the TSF to ensure the proper allocation of resources makes denial of serviceattacks more difficult.
    T.MISCONFIGURATIONO.CORRECTLY_​APPLIED_​CONFIGURATIONMechanisms to prevent the application of configurations that violate the current security policy help prevent misconfigurations.
    T.PLATFORM_​COMPROMISEO.PLATFORM_​INTEGRITYPlatform integrity mechanisms used by the TOE reduce the risk that an attacker can ‘break out’ of a VM and affect the platform on which the VS is running.
    T.UNAUTHORIZED_​ACCESSO.MANAGEMENT_​ACCESSEnsuring that TSF management functions cannot be executed without authorization prevents untrustedsubjects from modifying the behavior of the TOE in an unanticipated manner.
    T.UNAUTHORIZED_​MODIFICATIONO.AUDITEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    O.VMM_​INTEGRITYEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    T.UNAUTHORIZED_​UPDATEO.VMM_​INTEGRITYSystem integrity prevents the TOE from installing a software patch containing unknown andpotentially malicious code.
    T.UNPATCHED_​SOFTWAREO.PATCHED_​SOFTWAREThe ability to patch the TOE software ensures that protections against vulnerabilities can be applied as they become available.
    T.USER_​ERRORO.VM_​ISOLATIONIsolation of VMs includes clear attribution of those VMs to their respective domains which reducesthe likelihood that a user inadvertently inputs or transfers data meant for one VM into another.
    T.VMM_​COMPROMISEO.VMM_​INTEGRITYMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    O.VM_​ISOLATIONMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    T.WEAK_​CRYPTOO.VM_​ENTROPYAcquisition of good entropy is necessary to support the TOE's security-related cryptographicalgorithms.
    A.NON_​MALICIOUS_​USEROE.CONFIGIf the TOE is administered by a non-malicious and non-negligent user, the expected result is that the TOE + security policies map to the security objectives. - + @@ -2626,7 +2635,7 @@

    5.1.9 TOE Security Functio

    - + @@ -2642,7 +2651,7 @@

    5.1.9 TOE Security Functio

    - + @@ -2661,27 +2670,27 @@

    5.1.9 TOE Security Functio

    Table 1: Security Objectives Rationale
    Threat, Assumption, or OSPSecurity ObjectivesRationale
    T.3P_​SOFTWAREO.VMM_​INTEGRITYThe VMM integrity mechanisms include environment-based vulnerability mitigation and potentiallysupport for introspection and device driver isolation, all of which reduce the likelihood that any vulnerabilities in third-party software can be used to exploit the TOE.
    T.DATA_​LEAKAGEO.DOMAIN_​INTEGRITYLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    O.VM_​ISOLATIONLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    T.DENIAL_​OF_​SERVICEO.RESOURCE_​ALLOCATIONThe ability of the TSF to ensure the proper allocation of resources makes denial of serviceattacks more difficult.
    T.MISCONFIGURATIONO.CORRECTLY_​APPLIED_​CONFIGURATIONMechanisms to prevent the application of configurations that violate the current security policy help prevent misconfigurations.
    T.PLATFORM_​COMPROMISEO.PLATFORM_​INTEGRITYPlatform integrity mechanisms used by the TOE reduce the risk that an attacker can ‘break out’ of a VM and affect the platform on which the VS is running.
    T.UNAUTHORIZED_​ACCESSO.MANAGEMENT_​ACCESSEnsuring that TSF management functions cannot be executed without authorization prevents untrustedsubjects from modifying the behavior of the TOE in an unanticipated manner.
    T.UNAUTHORIZED_​MODIFICATIONO.AUDITEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    O.VMM_​INTEGRITYEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    T.UNAUTHORIZED_​UPDATEO.VMM_​INTEGRITYSystem integrity prevents the TOE from installing a software patch containing unknown andpotentially malicious code.
    T.UNPATCHED_​SOFTWAREO.PATCHED_​SOFTWAREThe ability to patch the TOE software ensures that protections against vulnerabilities can be applied as they become available.
    T.USER_​ERRORO.VM_​ISOLATIONIsolation of VMs includes clear attribution of those VMs to their respective domains which reducesthe likelihood that a user inadvertently inputs or transfers data meant for one VM into another.
    T.VMM_​COMPROMISEO.VMM_​INTEGRITYMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    O.VM_​ISOLATIONMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    T.WEAK_​CRYPTOO.VM_​ENTROPYAcquisition of good entropy is necessary to support the TOE's security-related cryptographicalgorithms.
    A.NON_​MALICIOUS_​USEROE.CONFIGIf the TOE is administered by a non-malicious and non-negligent user, the expected result is that the TOE will be configured in a correct and secure manner.
    OE.NON_​MALICIOUS_​USERIf the organization properly vets and trains users, it is expected that they will be non-malicious.
    A.PHYSICALOE.PHYSICALIf the TOE is deployed in a location that has appropriate physical safeguards, it can be assumed to be physically secure.
    A.PLATFORM_​INTEGRITYOE.PHYSICALIf the underlying platform has not been compromised prior to installation of the TOE, its integrity can be assumed to be intact.
    A.TRUSTED_​ADMINOE.TRUSTED_​ADMINProviding guidance to administrators and ensuring that individuals are properly trained and @@ -811,17 +810,17 @@

    5.1.1 Class: Security Audit (FAU)< The ST author can include other auditable events directly in Table t-audit-mandatory; they are not limited to the list presented. The ST author should update the table in FAU_GEN.1.2 with any additional information generated. “Subject identity” in FAU_GEN.1.2 could be a - user id or an identifier specifying a VM, for example.

    + user id or an identifier specifying a VM, for example.

    Appropriate entries from Table t-audit-optional, Table t-audit-objective, and Table t-audit-sel-based should be included in the ST if the associated SFRs and selections are included.

    The Table t-audit-mandatory entry for FDP_VNC_EXT.1 refers to configuration settings that attach VMs to virtualized network components. Changes to these configurations can be made - during VM execution or when VMs are not running. Audit records + during VM execution or when VMs are not running. Audit records must be generated for either case.

    - The intent of the audit requirement for FDP_PPR_EXT.1 is to log that the VM is connected - to a physical device (when the device becomes part of the VM's hardware view), not - to log every time that the device is accessed. Generally, this is only once at VM + The intent of the audit requirement for FDP_PPR_EXT.1 is to log that the VM is connected + to a physical device (when the device becomes part of the VM's hardware view), not + to log every time that the device is accessed. Generally, this is only once at VM startup. However, some devices can be connected and disconnected during operation (e.g., virtual USB devices such as CD-ROMs). All such connection/disconnection events must be logged.

    @@ -907,8 +906,9 @@

    5.1.1 Class: Security Audit (FAU)<
    The TSF shall be able to transmit the generated audit data to an external IT entity using a trusted channel as specified in FTP_ITC_EXT.1.
    -
    The TSF shall[selection: drop new audit data, overwrite previous audit records according to the following rule: [assignment: - rule for overwriting previous audit records ], other action ]when the local storage space for audit data is full.
    Application +
    The TSF shall[selection: drop new audit data, overwrite previous audit records according to the following rule: [assignment: + rule for overwriting previous audit records ], [assignment: + other action ]]when the local storage space for audit data is full.
    Application Note: An external log server, if available, might be used as alternative storage space in case the local storage space is full. An ‘other action’ could be defined in this case as ‘send the @@ -961,7 +961,7 @@

    5.1.2 Class: Cryptographic Support

    FCS_CKM.1 Cryptographic Key Generation

    The TSF shall generate asymmetric cryptographic keys in accordance with a specified cryptographic key generation algorithm[selection:
    • RSA schemes using cryptographic key sizes [2048-bit or greater] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.3] -
    • ECC schemes using [“NIST curves” P-256, P-384, and [selection: P-521, no other curves] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.4]
    • +
    • ECC schemes using [“NIST curves” P-256, P-384, and [selection: P-521, no other curves] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.4]
    • FFC schemes using cryptographic key sizes [2048-bit or greater] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.1]].
    • FFC Schemes using Diffie-Hellman group 14 that meet the following: [RFC 3526]
    • FFC Schemes using safe primes that meet the following: [‘NIST Special Publication 800-56A Revision 3, “Recommendation for Pair-Wise Key Establishment Schemes"]
    ]and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet the following: [assignment: list of standards] .
    Application @@ -1297,7 +1297,7 @@

    5.1.2 Class: Cryptographic Support

    FCS_COP.1/Sig Cryptographic Operation (Signature Algorithms)

    The TSF shall perform [ cryptographic signature services (generation and verification) ] in accordance with a specified cryptographic algorithm[selection:
    • RSA schemes using cryptographic key sizes [2048-bit or greater] that meet - the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 4]
    • ECDSA schemes using [“NIST curves” P-256, P-384 and [selection: P-521, no other curves]] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 5]
    ].
    Application + the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 4]
  • ECDSA schemes using [“NIST curves” P-256, P-384 and [selection: P-521, no other curves]] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 5]
  • ].
    Application Note: The ST Author should choose the algorithm implemented to perform digital signatures; if more than one algorithm is available, this requirement should be iterated to specify the @@ -1466,34 +1466,34 @@

    5.1.2 Class: Cryptographic Support
    The TSF shall provide independent entropy across multiple VMs.
    Application Note: - This requirement ensures that sufficient entropy is available to any VM that requires it. The entropy - need not provide high-quality entropy for every possible method that a VM might acquire it. The VMM - must, however, provide some means for VMs to get sufficient entropy. For example, the VMM can - provide an interface that returns entropy to a Guest VM. Alternatively, the VMM could provide + This requirement ensures that sufficient entropy is available to any VM that requires it. The entropy + need not provide high-quality entropy for every possible method that a VM might acquire it. The VMM + must, however, provide some means for VMs to get sufficient entropy. For example, the VMM can + provide an interface that returns entropy to a Guest VM. Alternatively, the VMM could provide pass-through access to entropy sources provided by the host platform.

    - This requirement allows for three general ways of providing entropy to guests: 1) The VS can provide a - Hypercall accessible to VM-aware guests, 2) access to a virtualized device that provides entropy, or + This requirement allows for three general ways of providing entropy to guests: 1) The VS can provide a + Hypercall accessible to VM-aware guests, 2) access to a virtualized device that provides entropy, or 3) pass-through access to a hardware entropy source (including a source of random numbers). In all - cases, it is possible that the guest is made VM-aware through installation of software or drivers. For the second and third cases, it is possible that the guest could be VM-unaware. There is no - requirement that the TOE provide entropy sources as expected by VM-unaware guests. That is, the TOE + cases, it is possible that the guest is made VM-aware through installation of software or drivers. For the second and third cases, it is possible that the guest could be VM-unaware. There is no + requirement that the TOE provide entropy sources as expected by VM-unaware guests. That is, the TOE does not have to anticipate every way a guest might try to acquire entropy as long as it supplies a - mechanism that can be used by VM-aware guests, or provides access to a standard mechanism that a - VM-unaware guest would use.

    + mechanism that can be used by VM-aware guests, or provides access to a standard mechanism that a + VM-unaware guest would use.

    The ST author should select “Hypercall interface” if the TSF provides an API function through which guest-resident software can obtain entropy or random numbers. The ST author should select - “virtual device interface” if the TSF presents a virtual device interface to the Guest OS through + “virtual device interface” if the TSF presents a virtual device interface to the Guest OS through which it can obtain entropy or random numbers. Such an interface could present a virtualized real - device, such as a TPM, that can be accessed by VM-unaware guests, or a virtualized fictional device - that would require the Guest OS to be VM-aware. The ST author should select “passthrough access to + device, such as a TPM, that can be accessed by VM-unaware guests, or a virtualized fictional device + that would require the Guest OS to be VM-aware. The ST author should select “passthrough access to hardware entropy source” if the TSF permits Guest VMs to have direct access to hardware entropy or random number source on the platform. The ST author should select all items that are appropriate.

    - For FCS_ENT_EXT.1.2, the VMM must ensure that the provision of entropy to one VM cannot affect the quality - of entropy provided to another VM on the same platform.
    + For FCS_ENT_EXT.1.2, the VMM must ensure that the provision of entropy to one VM cannot affect the quality + of entropy provided to another VM on the same platform.

    The evaluator shall verify that the TSS describes how the TOE provides entropy to Guest VMs, and how to access the interface to acquire entropy or random numbers. The evaluator shall verify that - the TSS describes the mechanisms for ensuring that one VM does not affect the entropy acquired by + the TSS describes the mechanisms for ensuring that one VM does not affect the entropy acquired by another.
    Tests
      @@ -1502,12 +1502,12 @@

      5.1.2 Class: Cryptographic Support
    • Test FCS_ENT_EXT.1.2:1: - The evaluator shall invoke entropy from each Guest VM. The evaluator shall - verify that each VM acquires values from the interface.
    • + The evaluator shall invoke entropy from each Guest VM. The evaluator shall + verify that each VM acquires values from the interface.
    • Test FCS_ENT_EXT.1.2:2: The evaluator shall invoke entropy from multiple VMs as nearly simultaneously as practicable. The evaluator shall verify that the entropy used in one - VM is not identical to that invoked from the other VMs.
    • + VM is not identical to that invoked from the other VMs.

    @@ -1580,11 +1580,13 @@

    5.1.3 Class: User Data Protection -
    The TSF shall use[selection: no mechanism, list of platform-provided, hardware-based mechanisms ]to constrain a Guest VM's direct access to the following physical devices:[selection: no devices, physical devices to which the VMM allows Guest VMs physical access ].
    Application +
    The TSF shall use[selection: no mechanism, [assignment: + list of platform-provided, hardware-based mechanisms ]]to constrain a Guest VM's direct access to the following physical devices:[selection: no devices, [assignment: + physical devices to which the VMM allows Guest VMs physical access ]].
    Application Note: The TSF must use available hardware-based isolation mechanisms to constrain VMs when VMs have direct access to physical devices. “Direct access” in this context means that the - VM can read or write device memory or access device I/O ports without the VMM being able to intercept + VM can read or write device memory or access device I/O ports without the VMM being able to intercept and validate every transaction.
    @@ -1603,15 +1605,17 @@

    5.1.3 Class: User Data Protection -
    The TSF shall allow an authorized administrator to control Guest VM access to the following physical platform resources:[assignment: - list of physical platform resources the VMM isable to control access to].
    -
    The TSF shall explicitly deny all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, list of physical platform resources to which access is explicitly denied ].
    -
    The TSF shall explicitly allow all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, list of physical platform resources to which access is always allowed ].
    Application +
    The TSF shall allow an authorized administrator to control Guest VM access to the following physical platform resources:[assignment: + list of physical platform resources the VMM isable to control access to].
    +
    The TSF shall explicitly deny all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, [assignment: + list of physical platform resources to which access is explicitly denied ]].
    +
    The TSF shall explicitly allow all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, [assignment: + list of physical platform resources to which access is always allowed ]].
    Application Note: For purposes of this requirement, physical platform resources are divided into three categories: -
    1. those to which Guest OS access is configurable and moderated by the VMM
    2. those to which the Guest OS is never allowed to have direct access, and
    3. those to which the Guest OS is always allowed to have direct access.
    - For element 1, the ST author lists the physical platform resources that can be configured for Guest VM access by +
    1. those to which Guest OS access is configurable and moderated by the VMM
    2. those to which the Guest OS is never allowed to have direct access, and
    3. those to which the Guest OS is always allowed to have direct access.
    + For element 1, the ST author lists the physical platform resources that can be configured for Guest VM access by an administrator. For element 2, the ST author lists the physical platform resources to which Guest VMs may never be allowed direct access. If there are no such resources, the ST author selects "no physical platform resources." Likewise, any resources to which all Guest VMs automatically have access to are to be listed in @@ -1619,20 +1623,20 @@

    5.1.3 Class: User Data Protection
    -
    The evaluator shall examine the TSS to determine that it describes the mechanism by which the VMM controls a Guest VM's access to +
    The evaluator shall examine the TSS to determine that it describes the mechanism by which the VMM controls a Guest VM's access to physical platform resources. This description shall cover all of the physical - platforms allowed in the evaluated configuration by the ST. It should explain how the VMM distinguishes among Guest VMs, and + platforms allowed in the evaluated configuration by the ST. It should explain how the VMM distinguishes among Guest VMs, and how each physical platform resource that is controllable (that is, listed in the assignment statement in the first element) is identified to an Administrator.

    - The evaluator shall ensure that the TSS describes how the Guest VM is associated with each + The evaluator shall ensure that the TSS describes how the Guest VM is associated with each physical resource, and how other Guest VMs cannot access a physical resource without being granted explicit access. For TOEs that implement a robust interface (other than just "allow access" or "deny access"), the evaluator shall ensure that the TSS describes the possible operations or modes of access between a Guest - VM's and physical platform resources.

    + VM's and physical platform resources.

    If physical resources are listed in the second element, the evaluator shall examine the TSS and operational guidance to determine that there appears to be no way to - configure those resources for access by a Guest VM. The evaluator shall + configure those resources for access by a Guest VM. The evaluator shall document in the evaluation report their analysis of why the controls offered to configure access to physical resources can't be used to specify access to the resources identified in the second element (for example, if the interface offers a drop-down list of resources to assign, and the @@ -1649,12 +1653,12 @@

    5.1.3 Class: User Data Protection
    • Test FDP_PPR_EXT.1.3:1: For each physical platform resource identified in the first element, the evaluator shall - configure a Guest VM to have access to that resource and show that the Guest VM is able to + configure a Guest VM to have access to that resource and show that the Guest VM is able to successfully access that resource.
    • Test FDP_PPR_EXT.1.3:2: For each physical platform resource identified in the first element, the evaluator shall - configure the system such that a Guest VM does not have access to that resource and show - that the Guest VM is unable to successfully access that resource.
    • + configure the system such that a Guest VM does not have access to that resource and show + that the Guest VM is unable to successfully access that resource.
    • Test FDP_PPR_EXT.1.3:3: [conditional]: For TOEs that have a robust control interface, the evaluator shall exercise each element of the interface as described in the TSS and the operational guidance to @@ -1662,13 +1666,13 @@

      5.1.3 Class: User Data Protection
    • Test FDP_PPR_EXT.1.3:4: [conditional]: If the TOE explicitly denies access to certain physical resources, the evaluator shall attempt to access each listed (in FDP_PPR_EXT.1.2) physical resource - from a Guest VM and observe that access is denied.
    • + from a Guest VM and observe that access is denied.

    • Test FDP_PPR_EXT.1.3:5: [conditional]: If the TOE explicitly allows access to certain physical resources, the evaluator shall attempt to access each listed (in FDP_PPR_EXT.1.3) physical resource - from a Guest VM and observe that the access is allowed. If the operational guidance - specifies that access is allowed simultaneously by more than one Guest VM, the evaluator - shall attempt to access each resource listed from more than one Guest VM and show that + from a Guest VM and observe that the access is allowed. If the operational guidance + specifies that access is allowed simultaneously by more than one Guest VM, the evaluator + shall attempt to access each resource listed from more than one Guest VM and show that access is allowed.

    @@ -1680,23 +1684,23 @@

    5.1.3 Class: User Data Protection -
    The TSF shall ensure that any previous information content of physical memory is cleared prior to allocation to a Guest VM.
    Application +
    The TSF shall ensure that any previous information content of physical memory is cleared prior to allocation to a Guest VM.
    Application Note: - Physical memory must be zeroed before it is made accessible to a VM for general use - by a Guest OS.

    - The purpose of this requirement is to ensure that a VM does not receive memory - containing data previously used by another VM or the host.

    - “For general use” means for use by the Guest OS in its page tables for running applications or system +
    Physical memory must be zeroed before it is made accessible to a VM for general use + by a Guest OS.

    + The purpose of this requirement is to ensure that a VM does not receive memory + containing data previously used by another VM or the host.

    + “For general use” means for use by the Guest OS in its page tables for running applications or system software.

    This does not apply to pages shared by design or policy between VMs or between the VMMs and VMs, such - as read-only OS pages or pages used for virtual device buffers.
    + as read-only OS pages or pages used for virtual device buffers.
    The evaluator shall ensure that the TSS documents the process used for clearing - physical memory prior to allocation to a Guest VM, providing details on when + physical memory prior to allocation to a Guest VM, providing details on when and how this is performed. Additionally, the evaluator shall ensure that the TSS documents the conditions under which physical memory is not cleared prior to allocation to a - Guest VM, and describes when and how the memory is cleared.
    + Guest VM, and describes when and how the memory is cleared.

    FDP_RIP_EXT.2 Residual Information on Disk

    @@ -1705,18 +1709,18 @@

    5.1.3 Class: User Data Protection -
    The TSF shall ensure that any previous information content of physical disk storage is cleared to zeros upon allocation to a Guest VM.
    Application +
    The TSF shall ensure that any previous information content of physical disk storage is cleared to zeros upon allocation to a Guest VM.
    Application Note: - The purpose of this requirement is to ensure that a VM does not receive disk storage containing data - previously used by another VM or by the host.

    + The purpose of this requirement is to ensure that a VM does not receive disk storage containing data + previously used by another VM or by the host.

    Clearing of disk storage only upon deallocation does not meet this requirement.

    This does not apply to disk-resident files shared by design or policy between VMs or between the VMMs and VMs, such as read-only data files or files used for inter-VM data transfers permitted by policy.
    The evaluator shall ensure that the TSS documents how the TSF ensures that disk storage is zeroed upon allocation to - Guest VMs. Also, the TSS must document any conditions under which disk storage is not cleared prior to allocation to a Guest VM. + Guest VMs. Also, the TSS must document any conditions under which disk storage is not cleared prior to allocation to a Guest VM. Any file system format and metadata information needed by the evaluator to perform the below test shall be made available to the evaluator, but need not be published in the TSS.
    Tests
    @@ -1727,8 +1731,8 @@

    5.1.3 Class: User Data Protection storage device (or multiple files whose individual sizes add up to more than half the size of the storage media). This file (or files) shall be filled entirely with a non-zero value. Then, the file (or files) shall be released (freed for use but not cleared). Next, the - evaluator (as a VS Administrator) creates a virtual disk at least that large on the same - physical storage device and connects it to a powered-off VM. Then, from outside the Guest VM, + evaluator (as a VS Administrator) creates a virtual disk at least that large on the same + physical storage device and connects it to a powered-off VM. Then, from outside the Guest VM, scan through and check that all the non-metadata (as documented in the TSS) in the file corresponding to that virtual disk is set to zero. @@ -1741,26 +1745,27 @@

    5.1.3 Class: User Data Protection -
    The VS shall provide the following mechanisms for transferring data between Guest VMs:[selection: no mechanism, virtual networking, other inter-VM data sharing mechanisms ].
    +
    The VS shall provide the following mechanisms for transferring data between Guest VMs:[selection: no mechanism, virtual networking, [assignment: + other inter-VM data sharing mechanisms ]].
    The TSF shall by default enforce a policy prohibiting sharing of data between Guest VMs.
    The TSF shall allow Administrators to configure the mechanisms selected in FDP_VMS_EXT.1.1 to enable and disable the transfer of data between Guest VMs.
    -
    The VS shall ensure that no Guest VM is able to read or transfer data to or from another Guest VM except through the mechanisms listed in FDP_VMS_EXT.1.1.
    Application +
    The VS shall ensure that no Guest VM is able to read or transfer data to or from another Guest VM except through the mechanisms listed in FDP_VMS_EXT.1.1.
    Application Note: The fundamental requirement of a Virtualization System is the ability to enforce separation between information domains implemented as Virtual Machines and Virtual Networks. The intent of this - requirement is to ensure that VMs, VMMs, and the VS as a whole is implemented with + requirement is to ensure that VMs, VMMs, and the VS as a whole is implemented with this fundamental requirement in mind.

    - The ST author should select “no mechanism” in the unlikely event that the VS implements no mechanisms for + The ST author should select “no mechanism” in the unlikely event that the VS implements no mechanisms for transferring data between Guest VMs. Otherwise, the ST author should select “virtual networking” and identify all other mechanisms through which data can be transferred between Guest VMs.

    Examples of non-network inter-VM sharing mechanisms are:

    • User interface-based mechanisms, such as copy-paste and drag-and-drop
    • Shared virtual or physical devices
    • API-based mechanisms such as Hypercalls
    For data transfer mechanisms implemented in terms of Hypercall functions, FDP_VMS_EXT.1.3 is met if FPT_HCL_EXT.1.1 is met for those Hypercall functions (Hypercall function parameters are checked).

    For data transfer mechanisms that use shared physical devices, FDP_VMS_EXT.1.3 is met if the device is - listed in and meets FDP_PPR_EXT.1.1 (VM access to the physical device is configurable).

    + listed in and meets FDP_PPR_EXT.1.1 (VM access to the physical device is configurable).

    For data transfer mechanisms that use virtual networking, FDP_VMS_EXT.1.3 is met if FDP_VNC_EXT.1.1 - is met (VM access to virtual networks is configurable).

    + is met (VM access to virtual networks is configurable).

    The evaluator shall examine the TSS to verify that it documents all inter-VM @@ -1779,7 +1784,7 @@

    5.1.3 Class: User Data Protection the default configuration.
  • Test that the two VMs cannot communicate through the mechanisms selected in FDP_VMS_EXT.1.1.
  • Create two new VMs, overriding the default configuration to allow communications through a channel selected in FDP_VMS_EXT.1.1.
  • Test that communications can be passed between the VMs through the channel.
  • Create two new VMs, the first with the inter-VM communications channel currently being tested enabled, and the second with the inter-VM communications channel currently - being tested disabled.
  • Test that communications cannot be passed between the VMs through the channel.
  • As an Administrator, enable inter-VM communications between the VMs on the second VM.
  • Test that communications can be passed through the inter-VM channel.
  • As an Administrator again, disable inter-VM communications between the two VMs.
  • Test that communications can no longer be passed through the channel.
  • + being tested disabled.
  • Test that communications cannot be passed between the VMs through the channel.
  • As an Administrator, enable inter-VM communications between the VMs on the second VM.
  • Test that communications can be passed through the inter-VM channel.
  • As an Administrator again, disable inter-VM communications between the two VMs.
  • Test that communications can no longer be passed through the channel.
  • FDP_VMS_EXT.1.2 is met if communication is unsuccessful in step (b). FDP_VMS_EXT.1.3 is met if communication is successful in step (d) and unsuccessful in step (f).

    @@ -1792,12 +1797,12 @@

    5.1.3 Class: User Data Protection
    The TSF shall allow Administrators to configure virtual networking components to connect VMs to each other and to physical networks.
    -
    The TSF shall ensure that network traffic visible to a Guest VM on a virtual network--or virtual segment of a physical network--is visible only to Guest VMs configured to be on that virtual network or segment.
    Application +
    The TSF shall ensure that network traffic visible to a Guest VM on a virtual network--or virtual segment of a physical network--is visible only to Guest VMs configured to be on that virtual network or segment.
    Application Note: Virtual networks must be separated from one another to provide isolation commensurate with that provided by physically separate networks. It must not be possible for data to cross between properly configured - virtual networks regardless of whether the traffic originated from a local Guest VM or a remote host.

    + virtual networks regardless of whether the traffic originated from a local Guest VM or a remote host.

    Unprivileged users must not be able to connect VMs to each other or to external networks.

    @@ -1811,14 +1816,14 @@

    5.1.3 Class: User Data Protection
    Tests
    • Test FDP_VNC_EXT.1.2:1: - The evaluator shall assume the role of the Administrator and attempt to configure a VM to + The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect to a network component. The evaluator shall verify that the attempt is successful. The - evaluator shall then assume the role of an unprivileged user and attempt the same connection. If the attempt fails, or there is no way for an unprivileged user to configure VM network + evaluator shall then assume the role of an unprivileged user and attempt the same connection. If the attempt fails, or there is no way for an unprivileged user to configure VM network connections, the requirement is met.
    • Test FDP_VNC_EXT.1.2:2: - The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect + The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect to a physical network. The evaluator shall verify that the attempt is successful. The - evaluator shall then assume the role of an unprivileged user and make the same attempt. If the attempt fails, or there is no way for an unprivileged user to configure VM network + evaluator shall then assume the role of an unprivileged user and make the same attempt. If the attempt fails, or there is no way for an unprivileged user to configure VM network connections, the requirement is met.
    @@ -1833,10 +1838,11 @@

    5.1.4 Class: Identification and Au -
    The TSF shall detect when[selection: a positive integer number , an administrator configurable positive integer within a [assignment: - range of acceptable values ]]unsuccessful authentication attempts occur related to Administrators attempting to authenticate remotely using[selection: username and password, username and PIN].
    -
    When the defined number of unsuccessful authentication attempts has been met, the TSF shall:[selection: prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until [assignment: - action to unlock ] is taken by an Administrator, prevent the offending Administrator from successfully establishing a remote session using +
    The TSF shall detect when[selection: [assignment: + a positive integer number ], an administrator configurable positive integer within a [assignment: + range of acceptable values ]]unsuccessful authentication attempts occur related to Administrators attempting to authenticate remotely using[selection: username and password, username and PIN].
    +
    When the defined number of unsuccessful authentication attempts has been met, the TSF shall:[selection: prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until [assignment: + action to unlock ] is taken by an Administrator, prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until an Administrator-defined time period has elapsed]
    Application Note: @@ -1891,7 +1897,8 @@

    5.1.4 Class: Identification and Au
    The TSF shall provide the following password management capabilities for administrative passwords:
    1. Passwords shall be able to be composed of any combination of upper and lower case characters, digits, and the following special characters: - [selection: “!”, “@”, “#”, “$”, “%”, “^”, “& ”, “*”, “(“, “)”, other characters ]
    2. Minimum password length shall be configurable
    3. Passwords of at least 15 characters in length shall be supported
    Application + [selection: “!”, “@”, “#”, “$”, “%”, “^”, “& ”, “*”, “(“, “)”, [assignment: + other characters ]]
  • Minimum password length shall be configurable
  • Passwords of at least 15 characters in length shall be supported
  • Application Note: This SFR is included in the ST if the ST Author selects ‘authentication based on username and password’ @@ -1926,8 +1933,8 @@

    5.1.4 Class: Identification and Au If "directory-based" is selected anywhere in FIA_UAU.5.1 then "Ability to configure name/address of directory server to bind with" must be selected in the Client or Server module management function table. -
    The TSF shall provide the following authentication mechanisms:[selection:
    • [selection: local, directory-based] authentication based on username and password
    • authentication based on username and a PIN that releases an asymmetric key stored in - OE-protected storage
    • [selection: local, directory-based] authentication based on X.509 certificates
    • [selection: local, directory-based] authentication based on an SSH public key credential
    ]to support Administrator authentication.
    Application +
    The TSF shall provide the following authentication mechanisms:[selection:
    • [selection: local, directory-based] authentication based on username and password
    • authentication based on username and a PIN that releases an asymmetric key stored in + OE-protected storage
    • [selection: local, directory-based] authentication based on X.509 certificates
    • [selection: local, directory-based] authentication based on an SSH public key credential
    ]to support Administrator authentication.
    Application Note: Selection of ‘authentication based on username and password’ requires that FIA_PMG_EXT.1 be included in the ST. This also requires that the ST include a management function for @@ -1943,13 +1950,13 @@

    5.1.4 Class: Identification and Au
    Tests
      - If ‘username and password authentication‘ is selected, the evaluator will configure the VS with a + If ‘username and password authentication‘ is selected, the evaluator will configure the VS with a known username and password and conduct the following tests:
    • Test FIA_UAU.5.2:1: - The evaluator will attempt to authenticate to the VS using the known username and password. The evaluator will ensure that the authentication attempt is successful.
    • + The evaluator will attempt to authenticate to the VS using the known username and password. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:2: - The evaluator will attempt to authenticate to the VS using the known username but an incorrect + The evaluator will attempt to authenticate to the VS using the known username but an incorrect password. The evaluator will ensure that the authentication attempt is unsuccessful.
      @@ -1957,47 +1964,47 @@

      5.1.4 Class: Identification and Au If ‘username and PIN that releases an asymmetric key‘ is selected, the evaluator will examine the TSS for guidance on supported protected storage and will then configure the TOE or OE to establish a PIN which enables release of the asymmetric key from the protected storage (such as a TPM, a hardware - token, or isolated execution environment) with which the VS can interface. The evaluator will then + token, or isolated execution environment) with which the VS can interface. The evaluator will then conduct the following tests:
    • Test FIA_UAU.5.2:3: - The evaluator will attempt to authenticate to the VS using the known user name and PIN. The + The evaluator will attempt to authenticate to the VS using the known user name and PIN. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:4: - The evaluator will attempt to authenticate to the VS using the known user name but an incorrect + The evaluator will attempt to authenticate to the VS using the known user name but an incorrect PIN. The evaluator will ensure that the authentication attempt is unsuccessful.
      If ‘X.509 certificate authentication‘ is selected, the evaluator will generate an X.509v3 certificate for an Administrator user with the Client Authentication Enhanced Key Usage field set. The evaluator - will provision the VS for authentication with the X.509v3 certificate. The evaluator will ensure - that the certificates are validated by the VS as per FIA_X509_EXT.1.1 and then conduct the + will provision the VS for authentication with the X.509v3 certificate. The evaluator will ensure + that the certificates are validated by the VS as per FIA_X509_EXT.1.1 and then conduct the following tests:
    • Test FIA_UAU.5.2:5: - The evaluator will attempt to authenticate to the VS using the X.509v3 certificate. The + The evaluator will attempt to authenticate to the VS using the X.509v3 certificate. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:6: The evaluator will generate a second certificate identical to the first except for the public key and any values derived from the public key. The evaluator will attempt to authenticate to - the VS with this certificate. The evaluator will ensure that the authentication attempt is + the VS with this certificate. The evaluator will ensure that the authentication attempt is unsuccessful.
      If ‘SSH public-key credential authentication‘ is selected, the evaluator shall generate a public-private host key pair on the TOE using RSA or ECDSA, and a second public-private key pair on a remote - client. The evaluator shall provision the VS with the client public key for authentication over + client. The evaluator shall provision the VS with the client public key for authentication over SSH, and conduct the following tests:
    • Test FIA_UAU.5.2:7: - The evaluator will attempt to authenticate to the VS using a message signed by the client + The evaluator will attempt to authenticate to the VS using a message signed by the client private key that corresponds to provisioned client public key. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:8: - The evaluator will generate a second client key pair and will attempt to authenticate to the VS - with the private key over SSH without first provisioning the VS to support the new key pair. The evaluator will ensure that the authentication attempt is unsuccessful.

    • + The evaluator will generate a second client key pair and will attempt to authenticate to the VS + with the private key over SSH without first provisioning the VS to support the new key pair. The evaluator will ensure that the authentication attempt is unsuccessful.

    @@ -2044,7 +2051,7 @@

    5.1.5 Class: Security Management ( Note: Management communications must be separate from user workload communications. Administrative network traffic—including communications between physical hosts concerning load balancing, audit data, - VM startup and shutdown—must be isolated from guest operational networks. For purposes of this requirement, + VM startup and shutdown—must be isolated from guest operational networks. For purposes of this requirement, management traffic also includes VMs transmitted over management networks whether for backup, live migration, or deployment.

    “Separate physical networks” refers to using separate physical interfaces and cables to isolate management and operational networks from @@ -2065,7 +2072,7 @@

    5.1.5 Class: Security Management ( operational traffic is separated.

    Guidance
    The evaluator shall examine the operational guidance to verify that it details how to configure the - VS to keep Management and Operational traffic separate.
    + VS to keep Management and Operational traffic separate.
    Tests
    The evaluator shall configure the TOE as documented in the guidance. If separation is logical, then the evaluator shall capture packets on the management network. If plaintext Guest network traffic is @@ -2073,7 +2080,7 @@

    5.1.5 Class: Security Management ( If separation uses trusted channels, then the evaluator shall capture packets on the network over which traffic is tunneled. If plaintext Guest network traffic is detected, the requirement is not met.

    If data encryption is used, then the evaluator shall capture packets on the network over which the data is sent - while a VM or other large data structure is being transmitted. If plaintext VM contents are detected, the + while a VM or other large data structure is being transmitted. If plaintext VM contents are detected, the requirement is not met.

    @@ -2088,22 +2095,22 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall prevent Guest VMs from accessing virtual device interfaces that are not present in the VM’s current virtual hardware configuration.
    Application +
    The TSF shall prevent Guest VMs from accessing virtual device interfaces that are not present in the VM’s current virtual hardware configuration.
    Application Note: - The virtualized hardware abstraction implemented by a particular VS might include the + The virtualized hardware abstraction implemented by a particular VS might include the virtualized interfaces for many different devices. Sometimes these devices are not present in a - particular instantiation of a VM. The interface for devices not present must not be accessible by the - VM.

    + particular instantiation of a VM. The interface for devices not present must not be accessible by the + VM.

    Such interfaces include memory buffers, PCI Bus interfaces, and processor I/O ports.

    - The purpose of this requirement is to reduce the attack surface of the VMM by blocking access to unused interfaces.
    + The purpose of this requirement is to reduce the attack surface of the VMM by blocking access to unused interfaces.
    Tests
    - The evaluator shall connect a device to a VM, then from within the guest scan the VM's devices + The evaluator shall connect a device to a VM, then from within the guest scan the VM's devices to ensure that the connected device is present--using a device driver or other available means - to scan the VM's I/O ports or PCI Bus interfaces. + to scan the VM's I/O ports or PCI Bus interfaces. (The device's interface should be documented in the TSS under FPT_VDP_EXT.1.) The evaluator shall - remove the device from the VM and run the scan again. This requirement is met if the device's + remove the device from the VM and run the scan again. This requirement is met if the device's interfaces are no longer present.

    @@ -2113,7 +2120,8 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall take advantage of execution environment-based vulnerability mitigation mechanisms supported by the Platform such as:[selection: Address space randomization, Memory execution protection (e.g., DEP), Stack buffer overflow protection, Heap corruption detection, other mechanisms , No mechanisms]
    Application +
    The TSF shall take advantage of execution environment-based vulnerability mitigation mechanisms supported by the Platform such as:[selection: Address space randomization, Memory execution protection (e.g., DEP), Stack buffer overflow protection, Heap corruption detection, [assignment: + other mechanisms ], No mechanisms]
    Application Note: Processor manufacturers, compiler developers, and operating system vendors have developed execution environment-based mitigations that increase the cost to attackers by adding @@ -2141,22 +2149,22 @@

    5.1.6 Class: Protection of the TSF -
    The VMM shall use[assignment: +
    The VMM shall use[assignment: list of hardware-based virtualization assists]to reduce or eliminate the need for binary translation.
    -
    The VMM shall use[assignment: +
    The VMM shall use[assignment: list of hardware-based virtualization memory-handling assists]to reduce or eliminate the need for shadow page tables.
    Application Note: - These hardware-assists help reduce the size and complexity of the VMM, and thus, of + These hardware-assists help reduce the size and complexity of the VMM, and thus, of the trusted computing base, by eliminating or reducing the need for paravirtualization or binary translation. Paravirtualization involves modifying guest software so that instructions that cannot be properly virtualized are never executed on the physical processor.

    For the assignment in FPT_HAS_EXT.1, the ST author lists the hardware-based virtualization assists on all - platforms included in the ST that are used by the VMM to reduce or eliminate the need for + platforms included in the ST that are used by the VMM to reduce or eliminate the need for software-based binary translation. Examples for the x86 platform are Intel VT-x and AMD-V. “None” is an acceptable assignment for platforms that do not require virtualization assists in order to eliminate the need for binary translation. This must be documented in the TSS.

    For the assignment in FPT_HAS_EXT.1.2, the ST author lists the set of hardware-based virtualization - memory-handling extensions for all platforms listed in the ST that are used by the VMM to reduce or + memory-handling extensions for all platforms listed in the ST that are used by the VMM to reduce or eliminate the need for shadow page tables. Examples for the x86 platform are Intel EPT and AMD RVI. “None” is an acceptable assignment for platforms that do not require memory-handling assists in order to eliminate the need for shadow page tables. This must be documented in the TSS.
    @@ -2173,15 +2181,15 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall validate the parameters passed to Hypercall interfaces prior to execution of the VMM functionality exposed by each interface.
    Application +
    The TSF shall validate the parameters passed to Hypercall interfaces prior to execution of the VMM functionality exposed by each interface.
    Application Note: The purpose of this requirement is to help ensure the integrity of the - VMM by protecting the attack surface exposed to untrusted Guest VMs through Hypercalls.

    - A Hypercall interface allows VMM functionality to be invoked by VM-aware guest software. + VMM by protecting the attack surface exposed to untrusted Guest VMs through Hypercalls.

    + A Hypercall interface allows VMM functionality to be invoked by VM-aware guest software. For example, a hypercall interface could be used to get information about the real world, such as the time of day or the underlying hardware of the host system. A hypercall could also be used to transfer data between VMs through a copy-paste mechanism. Because hypercall - interfaces expose the VMM to Guest software, these interfaces constitute attack surface.

    + interfaces expose the VMM to Guest software, these interfaces constitute attack surface.

    There is no expectation that the evaluator will need to review source code in order to accomplish the evaluation activity.
    @@ -2198,7 +2206,7 @@

    5.1.6 Class: Protection of the TSF
    Tests
    The evaluator shall perform the following test:

    For each hypercall interface documented in the TSS or proprietary TSS Annex, the evaluator shall attempt to - invoke the function from within the VM using an invalid parameter (if any). If the VMM or VS crashes + invoke the function from within the VM using an invalid parameter (if any). If the VMM or VS crashes or generates an exception, or if no error is returned to the guest, then the test fails. If an error is returned to the guest, then the test succeeds.

    @@ -2230,7 +2238,7 @@

    5.1.6 Class: Protection of the TSF Removable media devices are removable devices that include media, such as USB flash drives and USB hard drives. Removable media devices can themselves contain removable media (e.g., USB CDROM drives).

    For purposes of this requirement, an Information Domain is: -
    1. A VM or collection of VMs
    2. The Virtualization System
    3. Host OS
    4. Management Subsystem
    +
    1. A VM or collection of VMs
    2. The Virtualization System
    3. Host OS
    4. Management Subsystem
    These requirements also apply to virtualized removable media—such as virtual CD drives that connect to ISO images—as well as physical media—such as CDROMs and USB flash drives. In the case of virtual CDROMs, virtual ejection of the virtual media is sufficient.

    @@ -2259,7 +2267,7 @@

    5.1.6 Class: Protection of the TSF
  • Test FPT_RDM_EXT.1.2:1: The evaluator shall configure two VMs that are members of different information domains, with the media or device connected to one of the VMs. The evaluator shall disconnect the - media or device from the VM and connect it to the other VM. The evaluator shall verify + media or device from the VM and connect it to the other VM. The evaluator shall verify that the action performed is consistent with the action assigned in the TSS.
  • @@ -2351,18 +2359,18 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall provide interfaces for virtual devices implemented by the VMM as part of the virtual hardware abstraction.
    -
    The TSF shall validate the parameters passed to the virtual device interface prior to execution of the VMM functionality exposed by those interfaces.
    Application +
    The TSF shall provide interfaces for virtual devices implemented by the VMM as part of the virtual hardware abstraction.
    +
    The TSF shall validate the parameters passed to the virtual device interface prior to execution of the VMM functionality exposed by those interfaces.
    Application Note: - The purpose of this requirement is to ensure that the VMM is not vulnerable to + The purpose of this requirement is to ensure that the VMM is not vulnerable to compromise through the processing of malformed data passed to the virtual device interface from a - Guest OS. The VMM cannot assume that any data coming from a VM is well-formed—even if the virtual - device interface is unique to the VS and the data comes from a virtual device + Guest OS. The VMM cannot assume that any data coming from a VM is well-formed—even if the virtual + device interface is unique to the VS and the data comes from a virtual device driver supplied by the Virtualization Vendor.
    The evaluator shall examine the TSS to ensure it lists all virtual devices - accessible by the guest OS. The TSS, or a separate proprietary document, must + accessible by the guest OS. The TSS, or a separate proprietary document, must also document all virtual device interfaces at the level of I/O ports or PCI Bus interfaces - including port numbers (absolute or relative to a base), port name, address range, and a description of @@ -2387,30 +2395,30 @@

    5.1.6 Class: Protection of the TSF -
    The TSF must ensure that software running in a VM is not able to degrade or disrupt the functioning of other VMs, the VMM, or the Platform.
    -
    The TSF must ensure that a Guest VM is unable to invoke platform code that runs at a privilege level equal to or exceeding that of the VMM without involvement of the VMM.
    Application +
    The TSF must ensure that software running in a VM is not able to degrade or disrupt the functioning of other VMs, the VMM, or the Platform.
    +
    The TSF must ensure that a Guest VM is unable to invoke platform code that runs at a privilege level equal to or exceeding that of the VMM without involvement of the VMM.
    Application Note: - This requirement is intended to ensure that software running within a Guest VM cannot - compromise other VMs, the VMM, or the platform. This requirement is not met if Guest VM - software—whatever its privilege level—can crash the VS or the Platform, or breakout + This requirement is intended to ensure that software running within a Guest VM cannot + compromise other VMs, the VMM, or the platform. This requirement is not met if Guest VM + software—whatever its privilege level—can crash the VS or the Platform, or breakout of its virtual hardware abstraction to gain execution on the platform, within or outside of the context - of the VMM.

    - This requirement is not violated if software running within a VM can crash the Guest OS and there is no - way for an attacker to gain execution in the VMM or outside of the virtualized domain.

    - FPT_VIV_EXT.1.2 addresses several specific mechanisms that must not be permitted to bypass the VMM and + of the VMM.

    + This requirement is not violated if software running within a VM can crash the Guest OS and there is no + way for an attacker to gain execution in the VMM or outside of the virtualized domain.

    + FPT_VIV_EXT.1.2 addresses several specific mechanisms that must not be permitted to bypass the VMM and invoke privileged code on the Platform.

    At a minimum, the TSF should enforce the following:

    • On the x86 platform, a virtual System Management Interrupt (SMI) cannot invoke platform System Management Mode (SMM).
    • An attempt to update virtual firmware or virtual BIOS cannot cause physical platform firmware - or physical platform BIOS to be modified.
    • An attempt to update virtual firmware or virtual BIOS cannot cause the VMM to be modified.
    + or physical platform BIOS to be modified.
  • An attempt to update virtual firmware or virtual BIOS cannot cause the VMM to be modified.
  • Of the above, the first bullet does not apply to platforms that do not support SMM. The rationale behind the third bullet - is that a firmware update of a single VM must not affect other VMs. So if multiple VMs share the same + is that a firmware update of a single VM must not affect other VMs. So if multiple VMs share the same firmware image as part of a common hardware abstraction, then the update of a single machine’s BIOS must not be allowed to change the common abstraction. The virtual hardware abstraction is part of the - VMM.
    + VMM.
    The evaluator shall verify that the TSS (or a proprietary annex to the TSS) describes how the TSF ensures - that guest software cannot degrade or disrupt the functioning of other VMs, the VMM or the platform. And + that guest software cannot degrade or disrupt the functioning of other VMs, the VMM or the platform. And how the TSF prevents guests from invoking higher-privilege platform code, such as the examples in the note.

    @@ -2445,7 +2453,8 @@

    5.1.8 Class: Trusted Path/Channel then "" must be selected in FIA_X509_EXT.2.1.
    The TSF shall use[selection: TLS as conforming to the Functional Package for Transport Layer Security, TLS/HTTPS as conforming to FCS_HTTPS_EXT.1, IPsec as conforming to FCS_IPSEC_EXT.1, SSH as conforming to the Functional Package - for Secure Shell]and[selection: certificate-based authentication of the remote peer, non-certificate-based authentication of the remote peer, no authentication of the remote peer]to provide a trusted communication channel between itself, and

  • audit servers (as required by FAU_STG_EXT.1), and
  • [selection: remote administrators (as required by FTP_TRP.1.1 if selected in FMT_MOF_EXT.1.1 in the Client or Server PP-Module), separation of management and operational networks (if selected in FMT_SMO_EXT.1), other capabilities , no other capabilities]that is logically distinct from other communication paths and provides assured identification of its endpoints and protection of the communicated data from disclosure and detection of modification of the communicated data.
    Application + for Secure Shell]and[selection: certificate-based authentication of the remote peer, non-certificate-based authentication of the remote peer, no authentication of the remote peer]to provide a trusted communication channel between itself, and

  • audit servers (as required by FAU_STG_EXT.1), and
  • [selection: remote administrators (as required by FTP_TRP.1.1 if selected in FMT_MOF_EXT.1.1 in the Client or Server PP-Module), separation of management and operational networks (if selected in FMT_SMO_EXT.1), [assignment: + other capabilities ], no other capabilities]that is logically distinct from other communication paths and provides assured identification of its endpoints and protection of the communicated data from disclosure and detection of modification of the communicated data.
    Application Note: If the ST author selects either TLS or HTTPS, the TSF shall be validated against the Functional Package for TLS. This PP does not mandate that a product implement TLS with mutual authentication, @@ -2468,7 +2477,7 @@

    5.1.8 Class: Trusted Path/Channel
    Tests
    The evaluator will configure the TOE to communicate with each external IT entity and type of remote user identified in the TSS. The evaluator will monitor network - traffic while the VS performs communication with each of these destinations. The evaluator will ensure + traffic while the VS performs communication with each of these destinations. The evaluator will ensure that for each session a trusted channel was established in conformance with the protocols identified in the selection.

    @@ -2532,13 +2541,13 @@

    5.1.8 Class: Trusted Path/Channel -
    The TSF shall indicate to users which VM, if any, has the current input focus.
    Application +
    The TSF shall indicate to users which VM, if any, has the current input focus.
    Application Note: This requirement applies to all users—whether User or Administrator. In environments where multiple VMs run at the same time, the user must have a way of knowing which - VM user input is directed to at any given moment. This is especially important in multiple-domain + VM user input is directed to at any given moment. This is especially important in multiple-domain environments.

    In the case of a human user, this is usually a visual indicator. In the case of headless VMs, the user is - considered to be a program, but this program still needs to know which VM it is sending input to; + considered to be a program, but this program still needs to know which VM it is sending input to; this would typically be accomplished through programmatic means.
    @@ -2548,7 +2557,7 @@

    5.1.8 Class: Trusted Path/Channel indicated to the user.

    Tests
    For each supported input device, the evaluator shall demonstrate that the input from each device - listed in the TSS is directed to the VM that is indicated to have + listed in the TSS is directed to the VM that is indicated to have the input focus.
    @@ -2558,15 +2567,15 @@

    5.1.8 Class: Trusted Path/Channel -
    The TSF shall support the unique identification of a VM’s output display to users.
    Application +
    The TSF shall support the unique identification of a VM’s output display to users.
    Application Note: - In environments where a user has access to more than one VM at the same time, the - user must be able to determine the identity of each VM displayed in order to avoid inadvertent + In environments where a user has access to more than one VM at the same time, the + user must be able to determine the identity of each VM displayed in order to avoid inadvertent cross-domain data entry.

    - There must be a mechanism for associating an identifier with a VM so that an application or program - displaying the VM can identify the VM to users. This is generally indicated visually for human users - (e.g., VM identity in the window title bar) and programmatically for headless VMs (e.g., an API - function). The identification must be unique to the VS, but does not need to be universally unique.
    + There must be a mechanism for associating an identifier with a VM so that an application or program + displaying the VM can identify the VM to users. This is generally indicated visually for human users + (e.g., VM identity in the window title bar) and programmatically for headless VMs (e.g., an API + function). The identification must be unique to the VS, but does not need to be universally unique.
    The evaluator shall ensure that the TSS describes the mechanism for identifying @@ -2576,9 +2585,9 @@

    5.1.8 Class: Trusted Path/Channel The evaluator shall perform the following test:

    The evaluator shall attempt to create and start at least three Guest VMs on a single display device where the evaluator attempts to assign two of the VMs the same - identifier. If the user interface displays different identifiers for each VM, then + identifier. If the user interface displays different identifiers for each VM, then the requirement is met. Likewise, the requirement is met if the system refuses to create or start a - VM when there is already a VM with the same identifier.

    + VM when there is already a VM with the same identifier.

    5.1.9 TOE Security Functional Requirements Rationale

    The following rationale provides justification for each security objective for the TOE, @@ -2597,7 +2606,7 @@

    5.1.9 TOE Security Functio

    FDP_VMS_EXT.1Ensures that authorized data transfers between domains are done securely.
    FDP_VNC_EXT.1Ensures that network traffic is visible only to VMs configured to be that network.
    FPT_EEM_EXT.1Requires that the TOE use security mechanisms supported by the physical platform.
    FPT_GVI_EXT.1Requires that the TOE support Guest VM measurements and integrity checks (optional).
    FPT_GVI_EXT.1Requires that the TOE support Guest VM measurements and integrity checks (optional).
    FPT_HAS_EXT.1Requires that the TOE use platform-supported virtualization assists to reduce attack surface.
    FPT_INT_EXT.1Requires that the TOE support introspection into Guest VMs (optional).
    FPT_RDM_EXT.1Requires support for rules for switching removeable media between domains to reduce the chance of data spillage.
    FPT_EEM_EXT.1Requires that the TOE use security mechanisms supported by the physical platform.
    FPT_HAS_EXT.1Requires that the TOE use platform-supported virtualization assists to reduce attack surface.
    FPT_HCL_EXT.1Requires that Hypercall parameters be validated.
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_VDP_EXT.1Requires validation of parameter data passed to the hardware abstraction by untrusted VMs.
    FPT_VIV_EXT.1Ensures that untrusted VMs cannot invoke privileged code without proper hypervisor mediation.
    O.RESOURCE_​ALLOCATION
    FCS_CKM_EXT.4Requires cryptographic key destruction to ensure residual data in shared storage is unrecoverable.
    FPT_EEM_EXT.1Requires that the TOE use security mechanisms supported by the physical platform.
    FPT_HAS_EXT.1Requires that the TOE use platform-supported virtualization assists to reduce attack surface.
    FPT_HCL_EXT.1Requires that Hypercall parameters be validated.
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_VDP_EXT.1Requires validation of parameter data passed to the hardware abstraction by untrusted VMs.
    FPT_VIV_EXT.1Ensures that untrusted VMs cannot invoke privileged code without proper hypervisor mediation.
    O.VM_​ENTROPY
    FCS_ENT_EXT.1Requires that domains have access to high-quality entropy for cryptographic purposes.
    FPT_VIV_EXT.1Ensures that untrusted VMs cannot invoke privileged code without proper hypervisor mediation.

    -

    5.2 Security Assurance Requirements

    - The Security Objectives for the TOE in Section 4 were constructed to address threats identified in Section 3.1. The - Security Functional Requirements (SFRs) in Section 5.1 are a formal instantiation of the Security Objectives. The PP - identifies the Security Assurance Requirements (SARs) to frame the extent to which the evaluator assesses the - documentation applicable for the evaluation and performs independent testing.

    - This section lists the set of Security Assurance Requirements (SARs) from Part 3 of the Common Criteria for Information - Technology Security Evaluation, Version 3.1, Revision 5 that are required in evaluations against this PP. Individual - evaluation activities to be performed are specified in both Section 5.1 as well as in this section.

    - After the ST has been approved for evaluation, the Information Technology Security Evaluation Facility (ITSEF) will obtain - the TOE, supporting environmental IT, and the administrative/user guides for the TOE. The ITSEF is expected to perform - actions mandated by the CEM for the ASE and ALC SARs. The ITSEF also performs the evaluation activities contained - within Section 5, which are intended to be an interpretation of the other CEM assurance requirements as they apply - to the specific technology instantiated in the TOE. The evaluation activities that are captured in Section 5 also - provide clarification as to what the developer needs to provide to demonstrate the TOE is compliant with the PP. -

    5.2.1 Class ASE: Security Target Evaluation

    - As per ASE activities defined in [CEM] plus the TSS evaluation activities defined for any SFRs claimed by the TOE.

    5.2.2 Class ADV: Development

    +

    5.2 Security Assurance Requirements

    +

    The Security Objectives for the TOE in Section 4 were constructed to address threats identified in Section 3.1. The Security Functional Requirements (SFRs) in Section 5.1 are a formal instantiation of the Security Objectives. The PP identifies the Security Assurance Requirements (SARs) to frame the extent to which the evaluator assesses the documentation applicable for the evaluation and performs independent testing. This section lists the set of Security Assurance Requirements (SARs) from Part 3 of the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5 that are required in evaluations against this PP. Individual evaluation activities to be performed are specified in both Section 5.1 as well as in this section. After the ST has been approved for evaluation, the Information Technology Security Evaluation Facility (ITSEF) will obtain the TOE, supporting environmental IT, and the administrative/user guides for the TOE. The ITSEF is expected to perform actions mandated by the CEM for the ASE and ALC SARs. The ITSEF also performs the evaluation activities contained within Section 5, which are intended to be an interpretation of the other CEM assurance requirements as they apply to the specific technology instantiated in the TOE. The evaluation activities that are captured in Section 5 also provide clarification as to what the developer needs to provide to demonstrate the TOE is compliant with the PP.

    +

    5.2.1 Class ASE: Security Target Evaluation

    + As per ASE activities defined in [CEM] plus the TSS evaluation activities defined for any SFRs claimed by the TOE. +

    5.2.2 Class ADV: Development

    + The information about the TOE is contained in the guidance documentation available to the end user as well as the TOE Summary Specification (TSS) portion of the ST. The TOE developer must concur with the description of the product that is contained in the TSS as it relates to the functional requirements. The evaluation activities contained in Section 5.2 should provide the ST authors with sufficient information to determine the appropriate content for the TSS section. -

    ADV_FSP.1 Basic functional specification

    Developer action elements:

    The developer shall provide a functional specification.
    The developer shall provide a tracing from the functional specification to the SFRs.
    Developer + +

    ADV_FSP.1 Basic functional specification

    + + + + + + + + +

    Developer action elements:

    The developer shall provide a functional specification.
    The developer shall provide a tracing from the functional specification to the SFRs.
    Note: As indicated in the introduction to this section, the functional specification is composed of the information @@ -2693,7 +2702,7 @@

    5.2.1 Class ASE: Security Targe SFR-supporting TSFI.

    The functional specification shall provide rationale for the implicit categorization of interfaces as SFR-non-interfering.
    The tracing shall demonstrate that the SFRs trace to TSFIs in the functional specification.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall determine that the functional specification is an accurate and complete instantiation of - the SFRs.
    Application + the SFRs.
    Note: There are no specific evaluation activities associated with these SARs. The functional specification documentation @@ -2701,7 +2710,10 @@

    5.2.1 Class ASE: Security Targe AGD, ATE, and AVA SARs. The requirements on the content of the functional specification information is implicitly assessed by virtue of the other evaluation activities being performed; if the evaluator is unable to perform an activity because there is insufficient interface information, then an adequate functional - specification has not been provided.

    5.2.3 Class AGD: Guidance Documents

    + specification has not been provided.
    + +

    5.2.3 Class AGD: Guidance Documents

    + The guidance documents will be provided with the developer’s security target. Guidance must include a description of how the authorized user verifies that the Operational Environment can fulfill its role for the security functionality. The documentation should be in an informal style and readable by an authorized user.

    @@ -2711,21 +2723,32 @@

    5.2.1 Class ASE: Security Targe environment. Guidance pertaining to particular security functionality is also provided; specific requirements on such guidance are contained in the evaluation activities specified with individual SFRs where applicable. -

    AGD_OPE.1 Operational User Guidance

    Developer action elements:

    The developer shall provide operational user guidance.
    Developer + +

    AGD_OPE.1 Operational User Guidance

    + + + + + + + + + +

    Developer action elements:

    The developer shall provide operational user guidance.
    Note: Rather than repeat information here, the developer should review the evaluation activities for this component to ascertain the specifics of the guidance that the evaluators will be checking for. This - will provide the necessary information for the preparation of acceptable guidance.

    Content and presentation elements:

    The operational user guidance shall describe what for each user role the authorized user-accessible functions and + will provide the necessary information for the preparation of acceptable guidance.

    Content and presentation elements:

    The operational user guidance shall describe what for each user role the authorized user-accessible functions and privileges that should be controlled in a secure processing environment, including appropriate - warnings.
    The operational user guidance shall describe, for each user role the authorized user, how to use the available - interfaces provided by the TOE in a secure manner.
    The operational user guidance shall describe, for each user role the authorized user, the available functions and + warnings.
    The operational user guidance shall describe, for each user role the authorized user, how to use the available + interfaces provided by the TOE in a secure manner.
    The operational user guidance shall describe, for each user role the authorized user, the available functions and interfaces, in particular all security parameters under the control of the user, indicating secure - values as appropriate.
    The operational user guidance shall, for each user role the authorized user, clearly present each type of + values as appropriate.
    The operational user guidance shall, for each user role the authorized user, clearly present each type of security-relevant event relative to the user-accessible functions that need to be performed, including changing the security characteristics of entities under the control of the TSF.
    The operational user guidance shall identify all possible modes of operation of the TOE (including operation following failure or operational error), their consequences and implications for - maintaining secure operation.
    The operational user guidance shall, for each user role the authorized user, describe the security measures to be + maintaining secure operation.
    The operational user guidance shall, for each user role the authorized user, describe the security measures to be followed in order to fulfill the security objectives for the operational environment as described in the ST.
    The operational user guidance shall be clear and reasonable.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    @@ -2736,7 +2759,7 @@

    5.2.1 Class ASE: Security Targe number of allowed authentication attempt failures, the lockout period times for inactivity, and the notice and consent warning that is to be provided when authenticating.

    The operational guidance shall contain step-by-step instructions suitable for use by an end-user - of the VS to configure a new, out-of-the-box system into the configuration + of the VS to configure a new, out-of-the-box system into the configuration evaluated under this Protection Profile.

    The documentation shall describe the process for verifying updates to the TOE, either by checking the hash or by verifying a digital signature. The evaluator shall verify that @@ -2747,7 +2770,14 @@

    5.2.1 Class ASE: Security Targe certificate owner. This may be supplied with the product initially, or may be obtained by some other means.
  • Instructions for obtaining the update itself. This should include instructions for making the update accessible to the TOE (e.g., placement in a specific directory).
  • Instructions for initiating the update process, as well as discerning whether the process - was successful or unsuccessful. This includes generation of the hash/digital signature.
  • AGD_PRE.1 Preparative procedures

    Developer action elements:

    The developer shall provide the TOE including its preparative procedures.
    Developer + was successful or unsuccessful. This includes generation of the hash/digital signature.
    +

    AGD_PRE.1 Preparative procedures

    + + + + + +

    Developer action elements:

    The developer shall provide the TOE including its preparative procedures.
    Note: As with the operational guidance, the developer should look to the evaluation activities to determine the required content with respect to preparative procedures.

    Content and presentation elements:

    The preparative procedures shall describe all the steps necessary for secure acceptance of the @@ -2762,21 +2792,35 @@

    5.2.1 Class ASE: Security Targe TOE adequately addresses all platforms (that is, combination of hardware and operating system) claimed for the TOE in the ST.

    The operational guidance shall contain step-by-step instructions suitable for use by an end-user of - the VS to configure a new, out-of-the-box system into the configuration evaluated - under this Protection Profile.

    5.2.4 Class ALC: Life-Cycle Support

    + the VS to configure a new, out-of-the-box system into the configuration evaluated + under this Protection Profile.
    + +

    5.2.4 Class ALC: Life-Cycle Support

    + At the assurance level specified for TOEs conformant to this PP, life-cycle support is limited to an examination of the TOE vendor’s development and configuration management process in order to provide a baseline level of assurance that the TOE itself is developed in a secure manner and that the developer has a well-defined process in place to deliver updates to mitigate known security flaws. This is a result of the critical role that a developer’s practices play in contributing to the overall trustworthiness of a product. -

    ALC_CMC.1 Labeling of the TOE

    Developer action elements:

    The developer shall provide the TOE and a reference for the TOE.

    Content and presentation elements:

    The TOE shall be labeled with its unique reference.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and + +

    ALC_CMC.1 Labeling of the TOE

    + + + +

    Developer action elements:

    The developer shall provide the TOE and a reference for the TOE.

    Content and presentation elements:

    The TOE shall be labeled with its unique reference.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall check the ST to ensure that it contains an identifier (such as a product name/version number) that specifically identifies the version that meets the requirements of the ST.

    The evaluator shall check the AGD guidance and TOE samples received for testing to ensure that the version number is consistent with that in the ST.

    If the vendor maintains a website advertising the TOE, the evaluator shall examine the information on the website to ensure that - the information in the ST is sufficient to distinguish the product.

    ALC_CMS.1 TOE CM coverage

    Developer action elements:

    The developer shall provide a configuration list for the TOE.

    Content and presentation elements:

    The configuration list shall include the following: the TOE itself; and the + the information in the ST is sufficient to distinguish the product.

    +

    ALC_CMS.1 TOE CM coverage

    + + + + +

    Developer action elements:

    The developer shall provide a configuration list for the TOE.

    Content and presentation elements:

    The configuration list shall include the following: the TOE itself; and the evaluation evidence required by the SARs.
    The configuration list shall uniquely identify the configuration items.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall ensure that the developer has identified (in public-facing development @@ -2787,42 +2831,60 @@

    5.2.1 Class ASE: Security Targe ensure that this documentation also includes an indication of whether such protections are on by default, or have to be specifically enabled. The evaluator shall ensure that the TSF is uniquely identified (with respect to other products from the TSF vendor), and that documentation provided by the developer in association with the requirements - in the ST is associated with the TSF using this unique identification.

    ALC_TSU_EXT.1 Timely Security Updates

    + in the ST is associated with the TSF using this unique identification.
    +

    ALC_TSU_EXT.1 Timely Security Updates

    + This component requires the TOE developer, in conjunction with any other necessary parties, to provide information - as to how the VS is updated to address security issues in a timely manner. The + as to how the VS is updated to address security issues in a timely manner. The documentation describes the process of providing updates to the public from the time a security flaw is reported/discovered, to the time an update is released. This description includes the parties involved (e.g., the developer, hardware vendors) and the steps that are performed (e.g., developer testing), including worst case time periods, before an update is made available to the public. -

    Developer action elements:

    The developer shall provide a description in the TSS of how timely security updates are made to the + + + + + + +

    Developer action elements:

    The developer shall provide a description in the TSS of how timely security updates are made to the TOE.

    Content and presentation elements:

    The description shall include the process for creating and deploying security updates for the TOE software/firmware.
    The description shall express the time window as the length of time, in days, between public disclosure - of a vulnerability and the public availability of security updates to the TOE.
    Application + of a vulnerability and the public availability of security updates to the TOE.
    Note: The total length of time may be presented as a summation of the periods of time that each party (e.g., TOE developer, hardware vendor) on the critical path consumes. The time period until public availability per deployment mechanism may differ; each is described.
    The description shall include the mechanisms publicly available for reporting security issues - pertaining to the TOE.
    Application + pertaining to the TOE.
    Note: The reporting mechanism could include websites, email addresses, and a means to protect the sensitive nature of the report (e.g., public keys that could be used to encrypt the details of a proof-of-concept exploit).

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and - presentation of evidence.

    5.2.5 Class ATE: Tests

    + presentation of evidence.
    + +

    5.2.5 Class ATE: Tests

    + Testing is specified for functional aspects of the system as well as aspects that take advantage of design or implementation weaknesses. The former is done through the ATE_IND family, while the latter is through the AVA_VAN family. At the assurance level specified in this PP, testing is based on advertised functionality and interfaces with dependency on the availability of design information. One of the primary outputs of the evaluation process is the test report as specified in the following requirements. -

    ATE_IND.1 Independent Testing - Conformance

    + +

    ATE_IND.1 Independent Testing - Conformance

    + Testing is performed to confirm the functionality described in the TSS as well as the administrative (including configuration and operation) documentation provided. The focus of the testing is to confirm that the requirements specified in Section 5.1 are being met, although some additional testing is specified for SARs in Section 5.2. The evaluation activities identify the additional testing activities associated with these components. The evaluator produces a test report documenting the plan for and results of testing, as well as coverage arguments focused on the platform/TOE combinations that are claiming conformance to this PP. -

    Developer action elements:

    The developer shall provide the TOE for testing.

    Content and presentation elements:

    The TOE shall be suitable for testing.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and + + + + + +

    Developer action elements:

    The developer shall provide the TOE for testing.

    Content and presentation elements:

    The TOE shall be suitable for testing.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall test a subset of the TSF to confirm that the TSF operates as specified.
    The evaluator shall prepare a test plan and report documenting the testing aspects of the system. While it is not necessary to have one test case per test listed in an evaluation activity, the evaluators must document in the test plan that each applicable testing requirement in the @@ -2848,7 +2910,10 @@

    Developer action elements:

    . This shall be a cumulative account, so if there was a test run that resulted in a failure; a fix installed; and then a successful re-run of the test, the report would show a “fail” and “pass” result (and the - supporting details), and not just the “pass” result.

    5.2.6 Class AVA: Vulnerability Assessment

    + supporting details), and not just the “pass” result.
    + +

    5.2.6 Class AVA: Vulnerability Assessment

    + For the first generation of this Protection Profile, the evaluation lab is expected to survey open sources to learn what vulnerabilities have been discovered in these types of products. In most cases, these vulnerabilities will require sophistication beyond that of a basic attacker. Until penetration tools are created and uniformly @@ -2856,7 +2921,14 @@

    Developer action elements:

    TOE. The labs will be expected to comment on the likelihood of these vulnerabilities given the documentation provided by the vendor. This information will be used in the development of penetration testing tools and for the development of future PPs. -

    AVA_VAN.1 Vulnerability survey

    Developer action elements:

    The developer shall provide the TOE for testing.

    Content and presentation elements:

    The TOE shall be suitable for testing.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and + +

    AVA_VAN.1 Vulnerability survey

    + + + + + +

    Developer action elements:

    The developer shall provide the TOE for testing.

    Content and presentation elements:

    The TOE shall be suitable for testing.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall perform a search of public domain sources to identify potential vulnerabilities in the TOE.
    The evaluator shall conduct penetration testing, based on the identified potential vulnerabilities, to determine that the TOE is resistant to attacks performed by an attacker possessing Basic attack @@ -2874,6 +2946,8 @@

    Developer action elements:

    .
    + +

    Appendix A - Optional Requirements

    As indicated in the introduction to this PP, the baseline requirements (those that must be performed by the TOE) are contained in the body of this PP. This appendix contains three other types of optional requirements:

    @@ -2895,7 +2969,7 @@

    A.1 Strictly Optional R list of actions]upon detection of a potential security violation.
    Application Note: In certain cases, it may be useful for Virtualization Systems to perform automated - responses to certain security events. An example may include halting a VM which has taken some action + responses to certain security events. An example may include halting a VM which has taken some action to violate a key system security policy. This may be especially useful with headless endpoints when there is no human user in the loop.

    The potential security violation mentioned in FAU_ARP.1.1 refers to FAU_SAA.1.

    @@ -2928,25 +3002,25 @@

    A.1 Strictly Optional R
    The TSF shall verify the integrity of Guest VMs through the following mechanisms:[assignment: - list of Guest VM integrity mechanisms].
    Application + list of Guest VM integrity mechanisms].
    Application Note: The primary purpose of this requirement is to identify and describe the mechanisms used to verify the integrity of Guest VMs that have been 'imported' in some fashion, - though these mechanisms could also be applied to all Guest VMs, depending on the mechanism used. Importation for this requirement could include VM migration (live or otherwise), the importation of + though these mechanisms could also be applied to all Guest VMs, depending on the mechanism used. Importation for this requirement could include VM migration (live or otherwise), the importation of virtual disk files that were previously exported, VMs in shared storage, etc. It is possible that a - trusted VM could have been modified during the migration or import/export process, or VMs could have + trusted VM could have been modified during the migration or import/export process, or VMs could have been obtained from untrusted sources in the first place, so integrity checks on these VMs can be a - prudent measure to take. These integrity checks could be as thorough as making sure the entire VM - exactly matches a previously known VM (by hash for example), or by simply checking certain - configuration settings to ensure that the VM's configuration will not violate the security model - of the VS.
    + prudent measure to take. These integrity checks could be as thorough as making sure the entire VM + exactly matches a previously known VM (by hash for example), or by simply checking certain + configuration settings to ensure that the VM's configuration will not violate the security model + of the VS.

    For each mechanism listed in the assignment, the evaluator shall ensure that the TSS - documents the mechanism, including how it verifies VM integrity, which set of Guest - VMs it will check (all Guest VMs, only migrated VM - s, etc.), when such checks occur (before VM startup, immediately following - importation/migration, on demand, etc.), and which actions are taken if a VM fails + documents the mechanism, including how it verifies VM integrity, which set of Guest + VMs it will check (all Guest VMs, only migrated VM + s, etc.), when such checks occur (before VM startup, immediately following + importation/migration, on demand, etc.), and which actions are taken if a VM fails the integrity check (or which range of actions are possible if the action is configurable).

    A.2 Objective Requirements

    A.2.1 Class: Protection of the TSF (FPT)

    FPT_DDI_EXT.1 Device Driver Isolation

    @@ -2955,14 +3029,14 @@

    A.1 Strictly Optional R -
    The TSF shall ensure that device drivers for physical devices are isolated from the VMM and all other domains.
    Application +
    The TSF shall ensure that device drivers for physical devices are isolated from the VMM and all other domains.
    Application Note: - In order to function on physical hardware, the VMM must have access to the device + In order to function on physical hardware, the VMM must have access to the device drivers for the physical platform on which it runs. These drivers are often written by third parties, - and yet are effectively a part of the VMM. Thus the integrity of the VMM in part depends on the quality + and yet are effectively a part of the VMM. Thus the integrity of the VMM in part depends on the quality of third party code that the virtualization vendor has no control over. By encapsulating these drivers - within one or more dedicated driver domains (e.g., Service VM or VMs) the damage of a driver failure or - vulnerability can be contained within the domain, and would not compromise the VMM. When driver domains + within one or more dedicated driver domains (e.g., Service VM or VMs) the damage of a driver failure or + vulnerability can be contained within the domain, and would not compromise the VMM. When driver domains have exclusive access to a physical device, hardware isolation mechanisms, such as Intel's VT-d, AMD's Input/Output Memory Management Unit (IOMMU), or ARM's System Memory Management Unit (MMU) should be used to ensure that operations performed by Direct Memory Access (DMA) hardware are properly constrained.
    @@ -3012,21 +3086,21 @@

    A.1 Strictly Optional R -
    The TSF shall support a mechanism for permitting the VMM or privileged VMs to access the internals of another VM for purposes of introspection.
    Application +
    The TSF shall support a mechanism for permitting the VMM or privileged VMs to access the internals of another VM for purposes of introspection.
    Application Note: Introspection can be used to support malware and anomaly detection from outside of - the guest environment. This not only helps protect the Guest OS, it also protects the VS by providing - an opportunity for the VS to detect threats to itself that originate within VMs, and that may attempt - to break out of the VM and compromise the VMM or other VMs.

    - The hosting of malware detection software outside of the guest VM helps protect the guest and helps ensure + the guest environment. This not only helps protect the Guest OS, it also protects the VS by providing + an opportunity for the VS to detect threats to itself that originate within VMs, and that may attempt + to break out of the VM and compromise the VMM or other VMs.

    + The hosting of malware detection software outside of the guest VM helps protect the guest and helps ensure the integrity of the malware detection/antivirus software. This capability can be implemented in - the VMM itself, but ideally it should be hosted by a Service VM so that it can be better contained - and does not introduce bugs into the VMM.
    + the VMM itself, but ideally it should be hosted by a Service VM so that it can be better contained + and does not introduce bugs into the VMM.
    The evaluator shall examine the TSS documentation to verify that it describes the - interface for VM introspection and whether the introspection is performed by the - VMM or another VM.
    + interface for VM introspection and whether the introspection is performed by the + VMM or another VM.
    Guidance
    The evaluator shall examine the operational guidance to ensure that it contains instructions for configuration of the introspection mechanism.
    @@ -3036,17 +3110,19 @@

    A.1 Strictly Optional R -
    The TSF shall support a measured launch of the Virtualization System. Measured components of the VS shall include the static executable image of the Hypervisor and:[selection: Static executable images of the Management Subsystem, list of (static images of) Service VMs , list of configuration files , no other components]
    +
    The TSF shall support a measured launch of the Virtualization System. Measured components of the VS shall include the static executable image of the Hypervisor and:[selection: Static executable images of the Management Subsystem, [assignment: + list of (static images of) Service VMs ], [assignment: + list of configuration files ], no other components]
    The TSF shall make the measurements selected in FPT_ML_EXT.1.1 available to the Management Subsystem.
    Application Note: - A measured launch of the platform and VS demonstrates that the proper TOE software was + A measured launch of the platform and VS demonstrates that the proper TOE software was loaded. A measured launch process employs verifiable integrity measurement mechanisms. For example, a - VS may hash components such as the hypervisor, service VMs, or the Management Subsystem. A + VS may hash components such as the hypervisor, service VMs, or the Management Subsystem. A measured launch process only allows components to be executed after the measurement has been recorded. An example process may add each component’s hash before it is executed so that the final hash reflects the evidence of a component’s state prior to execution. The measurement may be verified as the system boots, but this is not required.

    - The Platform is outside of the TOE. However, this requirement specifies that the VS must be capable of + The Platform is outside of the TOE. However, this requirement specifies that the VS must be capable of receiving Platform measurements if the Platform provides them. This requirement is requiring TOE support for Platform measurements if provided; it is not placing a requirement on the Platform to take such measurements.

    @@ -3068,7 +3144,7 @@

    A.1 Strictly Optional R
    Tests
    • Test FPT_ML_EXT.1.2:1: - The evaluator shall start the VS, login as an Administrator, and verify that the measurements for the specified components are viewable in the Management Subsystem.
    • + The evaluator shall start the VS, login as an Administrator, and verify that the measurements for the specified components are viewable in the Management Subsystem.

    A.3 Implementation-dependent Requirements @@ -3144,12 +3220,12 @@

    A.1 Strictly Optional R transport mode.

    The TSF shall have a nominal, final entry in the SPD that matches anything that is otherwise unmatched, and discards it.
    The TSF shall implement the IPsec protocol ESP as defined by RFC 4303 using the cryptographic algorithms [AES-GCM-128, AES-GCM-256 (as specified in RFC 4106),[selection: AES-CBC-128 (specified in RFC 3602), AES-CBC-256 (specified in RFC 3602), no other algorithms]] together with a Secure Hash Algorithm (SHA)-based HMAC.
    -
    The TSF shall implement the protocol:

    [selection:
    • IKEv1, using Main Mode for Phase 1 exchanges, as defined in RFC 2407, RFC 2408, RFC 2409, RFC 4109, [selection: no other RFCs for extended sequence numbers, RFC 4304 for extended sequence numbers], [selection: no other RFCs for hash functions, RFC 4868 for hash functions], and [selection: support for XAUTH, no support for XAUTH]
    • IKEv2 as defined in RFC 7296 (with mandatory support for NAT traversal as specified in section 2.23), RFC 8784, RFC 8247, and [selection: no other RFCs for hash functions, RFC 4868 for hash functions].
    ]
    Application +
    The TSF shall implement the protocol:

    [selection:
    • IKEv1, using Main Mode for Phase 1 exchanges, as defined in RFC 2407, RFC 2408, RFC 2409, RFC 4109, [selection: no other RFCs for extended sequence numbers, RFC 4304 for extended sequence numbers], [selection: no other RFCs for hash functions, RFC 4868 for hash functions], and [selection: support for XAUTH, no support for XAUTH]
    • IKEv2 as defined in RFC 7296 (with mandatory support for NAT traversal as specified in section 2.23), RFC 8784, RFC 8247, and [selection: no other RFCs for hash functions, RFC 4868 for hash functions].
    ]
    Application Note: If the TOE implements SHA-2 hash algorithms for IKEv1 or IKEv2, the ST author shall select RFC 4868.
    The TSF shall ensure the encrypted payload in the[selection: IKEv1, IKEv2]protocol uses the cryptographic algorithms AES-CBC-128, AES-CBC-256 as specified in RFC 6379 and[selection: AES-GCM-128 as specified in RFC 5282, AES-GCM-256 as specified in RFC 5282, no other algorithm].
    -
    The TSF shall ensure that[selection:
    • IKEv2 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes are fixed based on [selection: number of packets/number of bytes, length of time]. If length of time is used, it must include at least one option that is 24 hours or less for Phase 1 SAs and 8 hours or less for Phase 2 SAs.
    ]
    Application +
    The TSF shall ensure that[selection:
    • IKEv2 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes are fixed based on [selection: number of packets/number of bytes, length of time]. If length of time is used, it must include at least one option that is 24 hours or less for Phase 1 SAs and 8 hours or less for Phase 2 SAs.
    ]
    Application Note: The ST author is afforded a selection based on the version of IKE in their @@ -3209,7 +3285,8 @@

    A.1 Strictly Optional R each one supported will be described in the TSS).

    If “pre-shared keys” is selected, the selection-based requirement FIA_PSK_EXT.1 must be claimed.

    -
    The TSF shall not establish an SA if the [[selection: IP address, Fully Qualified Domain Name (FQDN), user FQDN, Distinguished Name (DN)]and[selection: no other reference identifier type, other supported reference identifier types ]] contained in a certificate does not match the expected values for the entity attempting to establish a connection.
    Application +
    The TSF shall not establish an SA if the [[selection: IP address, Fully Qualified Domain Name (FQDN), user FQDN, Distinguished Name (DN)]and[selection: no other reference identifier type, [assignment: + other supported reference identifier types ]]] contained in a certificate does not match the expected values for the entity attempting to establish a connection.
    Application Note: The TOE must support at least one of the following identifier types: IP address, @@ -3268,7 +3345,7 @@

    A.1 Strictly Optional R can be properly applied.

    Note in this case that the implementation of the IPsec protocol must be enforced entirely within the TOE boundary; i.e. it is not permissible for a software application TOE to be a graphical front-end for IPsec - functionality implemented totally or in part by the underlying OS platform. The behavior referenced here + functionality implemented totally or in part by the underlying OS platform. The behavior referenced here is for the possibility that the configuration of the IPsec connection is initiated from outside the TOE, which is permissible so long as the TSF is solely responsible for enforcing the configured behavior. However, it is allowable for the TSF to rely on low-level platform-provided networking functions to implement the SPD @@ -3683,7 +3760,8 @@

    A.1 Strictly Optional R If "" is selected then "Ability to configure action taken if unable to determine the validity of a certificate" in the Client or Server module management function table must also be selected. -
    The TSF shall use X.509v3 certificates as defined by RFC 5280 to support authentication for[selection: IPsec, TLS, HTTPS, SSH, code signing for system software updates, other uses ]
    Application +
    The TSF shall use X.509v3 certificates as defined by RFC 5280 to support authentication for[selection: IPsec, TLS, HTTPS, SSH, code signing for system software updates, [assignment: + other uses ]]
    Application Note: This SFR must be included in the ST if the selection for FPT_TUD_EXT.1.3 is “digital signature mechanism,” if "certificate-based authentication of the remote peer" is @@ -3878,9 +3956,9 @@

    A.1 Strictly Optional R PP-specified functionality. If the Product Versions are fully tested separately, then there is no need to document the differences.



    E.5 Specific Guidance for Determining Platform Equivalence

    Platform equivalence is used to determine the platforms that a product must be tested on. These guidelines are divided - into sections for determining hardware equivalence and software (host OS/control domain) equivalence. If the Product is - installed onto bare metal, then only hardware equivalence is relevant. If the Product is installed onto an OS—or is integrated - into an OS—then both hardware and software equivalence are required. Likewise, if the Product can be installed either on bare + into sections for determining hardware equivalence and software (host OS/control domain) equivalence. If the Product is + installed onto bare metal, then only hardware equivalence is relevant. If the Product is installed onto an OS—or is integrated + into an OS—then both hardware and software equivalence are required. Likewise, if the Product can be installed either on bare metal or on an operating system, both hardware and software equivalence are relevant.

    E.5.1 Hardware Platform Equivalence

    If a Virtualization Solution runs directly on hardware without an operating system, then platform equivalence is based primarily on processor architecture and instruction sets.

    @@ -3888,13 +3966,13 @@

    A.1 Strictly Optional R not an issue because there is likely to be a different product model for different hardware environments.

    Equivalency analysis becomes important when comparing platforms with the same processor architecture. Processors with the same architecture that have instruction sets that are subsets or supersets of each other are not disqualified - from being equivalent for purposes of a VPP evaluation. If the VS takes the same code paths when executing PP-specified + from being equivalent for purposes of a VPP evaluation. If the VS takes the same code paths when executing PP-specified security functionality on different processors of the same family, then the processors can be considered equivalent with respect to that application.

    - For example, if a VS follows one code path on platforms that support the AES-NI instruction and another on platforms that do - not, then those two platforms are not equivalent with respect to that VS functionality. But if the VS follows the same code + For example, if a VS follows one code path on platforms that support the AES-NI instruction and another on platforms that do + not, then those two platforms are not equivalent with respect to that VS functionality. But if the VS follows the same code path whether or not the platform supports AES-NI, then the platforms are equivalent with respect to that functionality.

    - The platforms are equivalent with respect to the VS if the platforms are equivalent with respect to all PP-specified + The platforms are equivalent with respect to the VS if the platforms are equivalent with respect to all PP-specified security functionality.

    Table 7: Factors for Determining Hardware Platform Equivalence
    - + @@ -687,7 +687,7 @@

    1.2.1 Common Criteria Terms -

    @@ -720,34 +720,33 @@

    1.2.1 Common Criteria Terms -

    - - -
    FactorSame/Different/NoneGuidance
    Platform ArchitecturesDifferentHardware platforms that implement different processor architectures and instruction sets are not equivalent.
    PP-Specified FunctionalitySameFor platforms with the same processor architecture, the platforms are equivalent with respect to the application if execution of all PP-specified security functionality follows the same code path on @@ -3916,13 +3994,13 @@

    A.1 Strictly Optional R then provide the scheme with sufficient information about the TOE instances and platforms that were evaluated, and the TOE instances and platforms that are claimed to be equivalent.

    The ST must describe all configurations evaluated down to processor manufacturer, model number, and microarchitecture version.

    - The information regarding claimed equivalent configurations depends on the platform that the VS was developed for and runs on.

    Bare-Metal VS

    + The information regarding claimed equivalent configurations depends on the platform that the VS was developed for and runs on.

    Bare-Metal VS

    For VSes that run without an operating system on bare-metal or virtual bare-metal, the claimed configuration must describe the platform down to the specific processor manufacturer, model number, and microarchitecture version. The Vendor must describe the differences in the TOE with respect to PP-specified security functionality and how the TOE operates differently to leverage platform differences (e.g., instruction set extensions) in the tested configuration versus the - claimed equivalent configuration.

    VS with OS Support

    - For VSes that run on an OS host or with the assistance of an OS, then the claimed configuration must describe the OS down to + claimed equivalent configuration.

    VS with OS Support

    + For VSes that run on an OS host or with the assistance of an OS, then the claimed configuration must describe the OS down to its specific model and version number. The Vendor must describe the differences in the TOE with respect to PP-specified security functionality and how the TOE functions differently to leverage platform differences in the tested configuration versus the claimed equivalent configuration.

    Appendix F - Acronyms

    - - - - - -
    Table 9: Acronyms @@ -3933,22 +4011,16 @@

    A.1 Strictly Optional R

    EPExtended Package
    FPFunctional Package
    OEOperational Environment
    OSGuest Operating System
    OSHost Operating System
    PPProtection Profile
    PP-ConfigurationProtection Profile Configuration
    PP-ModuleProtection Profile Module
    SARSecurity Assurance Requirement
    SFRSecurity Functional Requirement
    SSPSystem Security Policy
    STSecurity Target
    TOETarget of Evaluation
    TSFTOE Security Functionality
    TSFITSF Interface
    TSSTOE Summary Specification
    VMVirtual Machine
    VMMVirtual Machine Manager
    VSVirtualization System

    Appendix G - Bibliography

    Table 10: Bibliography
    IdentifierTitle
    [CC]Common Criteria for Information Technology Security Evaluation -

    Contents

    Guest Network
    See Operational Network.
    Guest Operating System (OS)
    An operating system that runs within a Guest VM.
    Guest Operating System
    An operating system that runs within a Guest VM.
    Guest VM
    A Guest VM is a VM that contains a virtual environment for the execution of an independent computing system. Virtual environments execute mission workloads and implement customer-specific client or server functionality in Guest VMs, such as a web server or desktop productivity applications.
    Host Operating System (OS)
    An operating system onto which a VS is installed. Relative to the VS, the Host OS is +
    Host Operating System
    An operating system onto which a VS is installed. Relative to the VS, the Host OS is part of the Platform. There need not be a Host OS, but often VSes employ a Host OS or Control Domain to support guest access to host resources. Sometimes these domains are themselves encapsulated within VMs.
    Hypercall
    An API function that allows VM-aware software running within a VM to invoke VMM functionality.
    System Security Policy (SSP)
    The overall policy enforced by the VS defining constraints on the behavior +
    System Security Policy
    The overall policy enforced by the VS defining constraints on the behavior of VMs and users.
    User
    Users operate Guest VMs and are subject to configuration policies applied to the VS by Administrators. Users need not be human as in the case of embedded or headless VMs, users are often nothing more than software entities that operate within the VM.
    Virtual Machine (VM)
    A Virtual Machine is a virtualized hardware environment in which an operating system +
    Virtual Machine
    A Virtual Machine is a virtualized hardware environment in which an operating system may execute.
    Virtual Machine Manager (VMM)
    A VMM is a collection of software components responsible for enabling VMs to +
    Virtual Machine Manager
    A VMM is a collection of software components responsible for enabling VMs to function as expected by the software executing within them. Generally, the VMM consists of a Hypervisor, Service VMs, and other components of the VS, such as virtual devices, binary translation systems, and physical device drivers. It manages concurrent execution of all VMs and virtualizes platform resources as needed.
    Virtualization System (VS)
    A software product that enables multiple independent computing systems to +
    Virtualization System
    A software product that enables multiple independent computing systems to execute on the same physical hardware platform without interference from one another. For the purposes of this document, the VS consists of a Virtual Machine Manager (VMM), Virtual Machine abstractions, a management subsystem, and other components.

    1.3 Use Cases

    This Base-PP does not define any use cases for virtualization technology. Client Virtualization and Server Virtualization products have different use cases and so these are defined in their respective PP-Modules.

    2 Conformance Claims

    -
    Conformance Statement

    A Security Target must claim exact conformance to this Protection Profile, as defined in the CC and CEM addenda for Exact Conformance, Selection-Based SFRs, and Optional SFRs (dated May 2017). The following PPs and PP-Modules are allowed to be specified in a PP-Configuration with this PP-Module with this PP.

    • PP-Module for Client Virtualization Systems, Version 1.1
    • PP-Module for Server Virtualization Systems, Version 1.1
    CC Conformance Claims
    This PP is conformant to Parts 2 (extended) and 3 (extended) of Common Criteria Version 3.1, Release 5 [CC].
    PP Claim

    Package Claim

    +
    Conformance Statement

    A Security Target must claim exact conformance to this Protection Profile, as defined in the CC and CEM addenda for Exact Conformance, Selection-Based SFRs, and Optional SFRs (dated May 2017). The following PPs and PP-Modules are allowed to be specified in a PP-Configuration with this PP-Module with this PP.

    • PP-Module for Client Virtualization Systems, Version 1.1
    • PP-Module for Server Virtualization Systems, Version 1.1
    CC Conformance Claims
    This PP is conformant to Parts 2 (extended) and 3 (extended) of Common Criteria Version 3.1, Release 5 [CC].
    PP Claims

    Package Claims

    3 Security Problem Definition

    -

    3.1 Threats

    -
    T.3P_SOFTWARE
    In some VS implementations, functions critical to the security of the TOE are by necessity performed by software not produced by the virtualization vendor. Such software may include physical device drivers, and even non-TOE entities such as Host Operating Systems. Since this software has the same or similar privilege level as the VS, vulnerabilities can be exploited by an adversary to compromise the VS and VMs. Where possible, the VS should mitigate the results of potential vulnerabilities or malicious content in third-party code on which it relies. For example, physical device drivers (potentially the Host OS) could be encapsulated within VMs in order to limit the effects of compromise.
    T.DATA_LEAKAGE
    It is a fundamental property of VMs that the domains encapsulated by different VMs remain separate unless data sharing is permitted by policy. For this reason, all Virtualization Systems shall support a policythat prohibits information transfer between VMs. It shall be possible to configure VMs such that data cannot be moved between domains from VM to VM, orthrough virtual or physical network components under the control of the VS. When VMs are configured assuch, it shall not be possible for data to leak between domains, neither by the express efforts ofsoftware or users of a VM, nor because of vulnerabilities or errors in the implementation of the VMM orother VS components. If it is possible for data to leak between domains when prohibited by policy, then an adversary on one domain or network can obtain data from another domain. Such cross-domain data leakage can, for example, causeclassified information, corporate proprietary information, or personally identifiable information to bemade accessible to unauthorized entities.
    T.DENIAL_OF_SERVICE
    A VM may block others from system resources (e.g., system memory, persistent storage, and processing time) via a resource exhaustion attack.
    T.MISCONFIGURATION
    The VS may be misconfigured, which could impact its functioning and security. This misconfiguration could be due to an administrative error or the use of faulty configuration data.
    T.PLATFORM_COMPROMISE
    The VS must be capable of protecting the platform from threats that originate within VMs and operational networks connected to the VS. The hosting of untrusted—even malicious—domains by the VS cannot be permitted to compromise the security and integrity of the platform on which the VS executes. If an attacker can access the underlying platform in a manner not controlled by the VMM, the attacker might be able to modify system firmware or software—compromising both the VS and the underlying platform.
    T.UNAUTHORIZED_ACCESS
    Functions performed by the management layer include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only certain authorized system users (administrators) are allowed to exercise management functions or obtain sensitive information from the TOE. Virtualization Systems are often managed remotely over communication networks. Members of these networks can be both geographically and logically separated from each other, and pass through a variety of other systems which may be under the control of an adversary, and offer the opportunity for communications to be compromised. An adversary with access to an open management network could inject commands into the management infrastructure or extract sensitive information. This would provide an adversary with administrator privilege on the platform, and administrative control over the VMs and virtual network connections. The adversary could also gain access to the management network by hijacking the management network channel.
    T.UNAUTHORIZED_MODIFICATION
    System integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. Malware running on the platform must not be able to undetectably modify VS components while the system is running or at rest. Likewise, malicious code running within a virtual machine must not be able to modify Virtualization System components.
    T.UNAUTHORIZED_UPDATE
    It is common for attackers to target outdated versions of software containing known flaws. This means it is extremely important to update VS software as soon as possible when updates are available. But the source of the updates and the updates themselves must be trusted. If an attacker can write their own update containing malicious code they can take control of the VS.
    T.UNPATCHED_SOFTWARE
    Vulnerabilities in outdated or unpatched software can be exploited by adversaries to compromise the VS or platform.
    T.USER_ERROR
    If a Virtualization System is capable of simultaneously displaying VMs of different domains to the same user at the same time, there is always the chance that the user will become confused and unintentionally leak information between domains. This is especially likely if VMs belonging to different domains are indistinguishable. Malicious code may also attempt to interfere with the user’s ability to distinguish between domains. The VS must take measures to minimize the likelihood of such confusion.
    T.VMM_COMPROMISE
    The VS is designed to provide the appearance of exclusivity to the VMs and is designed to separate or isolate their functions except where specifically shared. Failure of security mechanisms could lead to unauthorized intrusion into or modification of the VMM, or bypass of the VMM altogether, by non-TOE software, such as that running in Guest or Helper VMs or on the host platform. This must be prevented to avoid compromising the VS.
    T.WEAK_CRYPTO
    To the extent that VMs appear isolated within the VS, a threat of weak cryptography may arise if the VMM does not provide good entropy to support security-related features that depend on entropy to implement cryptographic algorithms. For example, a random number generator keeps an estimate of the number of bits of noise in the entropy pool. From this entropy pool random numbers are created. Good random numbers are essential to implementing strong cryptography. Cryptography implemented using poor random numbers can be defeated by a sophisticated adversary. Such defeat can result in the compromise of Guest VM data and credentials, and of VS data and credentials, and can enable unauthorized access to the VS or VMs.
    +
    T.3P_SOFTWARE
    In some VS implementations, functions critical to the security of the TOE are by necessity performed by software not produced by the virtualization vendor. Such software may include physical device drivers, and even non-TOE entities such as Host Operating Systems. Since this software has the same or similar privilege level as the VS, vulnerabilities can be exploited by an adversary to compromise the VS and VMs. Where possible, the VS should mitigate the results of potential vulnerabilities or malicious content in third-party code on which it relies. For example, physical device drivers (potentially the Host OS) could be encapsulated within VMs in order to limit the effects of compromise.
    T.DATA_LEAKAGE
    It is a fundamental property of VMs that the domains encapsulated by different VMs remain separate unless data sharing is permitted by policy. For this reason, all Virtualization Systems shall support a policythat prohibits information transfer between VMs. It shall be possible to configure VMs such that data cannot be moved between domains from VM to VM, orthrough virtual or physical network components under the control of the VS. When VMs are configured assuch, it shall not be possible for data to leak between domains, neither by the express efforts ofsoftware or users of a VM, nor because of vulnerabilities or errors in the implementation of the VMM orother VS components. If it is possible for data to leak between domains when prohibited by policy, then an adversary on one domain or network can obtain data from another domain. Such cross-domain data leakage can, for example, causeclassified information, corporate proprietary information, or personally identifiable information to bemade accessible to unauthorized entities.
    T.DENIAL_OF_SERVICE
    A VM may block others from system resources (e.g., system memory, persistent storage, and processing time) via a resource exhaustion attack.
    T.MISCONFIGURATION
    The VS may be misconfigured, which could impact its functioning and security. This misconfiguration could be due to an administrative error or the use of faulty configuration data.
    T.PLATFORM_COMPROMISE
    The VS must be capable of protecting the platform from threats that originate within VMs and operational networks connected to the VS. The hosting of untrusted—even malicious—domains by the VS cannot be permitted to compromise the security and integrity of the platform on which the VS executes. If an attacker can access the underlying platform in a manner not controlled by the VMM, the attacker might be able to modify system firmware or software—compromising both the VS and the underlying platform.
    T.UNAUTHORIZED_ACCESS
    Functions performed by the management layer include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only certain authorized system users (administrators) are allowed to exercise management functions or obtain sensitive information from the TOE. Virtualization Systems are often managed remotely over communication networks. Members of these networks can be both geographically and logically separated from each other, and pass through a variety of other systems which may be under the control of an adversary, and offer the opportunity for communications to be compromised. An adversary with access to an open management network could inject commands into the management infrastructure or extract sensitive information. This would provide an adversary with administrator privilege on the platform, and administrative control over the VMs and virtual network connections. The adversary could also gain access to the management network by hijacking the management network channel.
    T.UNAUTHORIZED_MODIFICATION
    System integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. Malware running on the platform must not be able to undetectably modify VS components while the system is running or at rest. Likewise, malicious code running within a virtual machine must not be able to modify Virtualization System components.
    T.UNAUTHORIZED_UPDATE
    It is common for attackers to target outdated versions of software containing known flaws. This means it is extremely important to update VS software as soon as possible when updates are available. But the source of the updates and the updates themselves must be trusted. If an attacker can write their own update containing malicious code they can take control of the VS.
    T.UNPATCHED_SOFTWARE
    Vulnerabilities in outdated or unpatched software can be exploited by adversaries to compromise the VS or platform.
    T.USER_ERROR
    If a Virtualization System is capable of simultaneously displaying VMs of different domains to the same user at the same time, there is always the chance that the user will become confused and unintentionally leak information between domains. This is especially likely if VMs belonging to different domains are indistinguishable. Malicious code may also attempt to interfere with the user’s ability to distinguish between domains. The VS must take measures to minimize the likelihood of such confusion.
    T.VMM_COMPROMISE
    The VS is designed to provide the appearance of exclusivity to the VMs and is designed to separate or isolate their functions except where specifically shared. Failure of security mechanisms could lead to unauthorized intrusion into or modification of the VMM, or bypass of the VMM altogether, by non-TOE software, such as that running in Guest or Helper VMs or on the host platform. This must be prevented to avoid compromising the VS.
    T.WEAK_CRYPTO
    To the extent that VMs appear isolated within the VS, a threat of weak cryptography may arise if the VMM does not provide good entropy to support security-related features that depend on entropy to implement cryptographic algorithms. For example, a random number generator keeps an estimate of the number of bits of noise in the entropy pool. From this entropy pool random numbers are created. Good random numbers are essential to implementing strong cryptography. Cryptography implemented using poor random numbers can be defeated by a sophisticated adversary. Such defeat can result in the compromise of Guest VM data and credentials, and of VS data and credentials, and can enable unauthorized access to the VS or VMs.

    3.2 Assumptions

    -
    A.NON_MALICIOUS_USER
    The user of the VS is not willfully negligent or hostile, and uses the VS in compliance with the applied enterprise security policy and guidance. At the same time, malicious applications could act as the user, so requirements which confine malicious applications are still in scope.
    A.PHYSICAL
    Physical security commensurate with the value of the TOE and the data it contains is assumed to be provided by the environment.
    A.PLATFORM_INTEGRITY
    The platform has not been compromised prior to installation of the VS.
    A.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance.
    +
    A.NON_MALICIOUS_USER
    The user of the VS is not willfully negligent or hostile, and uses the VS in compliance with the applied enterprise security policy and guidance. At the same time, malicious applications could act as the user, so requirements which confine malicious applications are still in scope.
    A.PHYSICAL
    Physical security commensurate with the value of the TOE and the data it contains is assumed to be provided by the environment.
    A.PLATFORM_INTEGRITY
    The platform has not been compromised prior to installation of the VS.
    A.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance.

    3.3 Organizational Security Policies

    @@ -759,17 +758,17 @@

    3.3 O

    4 Security Objectives

    4.1 Security Objectives for the TOE

    -
    O.AUDIT
    An audit log must be created that captures accesses to the objects the TOE protects. The log of these accesses, or audit events, must be protected from modification, unauthorized access, and destruction. The audit log must be sufficiently detailed to indicate the date and time of the event, the identify of the user, the type of event, and the success or failure of the event.
    O.CORRECTLY_APPLIED_CONFIGURATION
    The TOE must not apply configurations that violate the current security policy. The TOE must correctly apply configurations and policies to a newly created Guest VM, as well as to existing Guest VMs when applicable configuration or policy changes are made. All changes to configuration and to policy must conform to the existing security policy. Similarly, changes made to the configuration of the TOE itself must not violate the existing security policy.
    O.DOMAIN_INTEGRITY
    While the VS is not responsible for the contents or correct functioning of software that runs within Guest VMs, it is responsible for ensuring that the correct functioning of the software within a Guest VM is not interfered with by other VMs.
    O.MANAGEMENT_ACCESS
    VMM management functions include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only authorized users (administrators) may exercise management functions. Because of the privileges exercised by the VMM management functions, it must not be possible for the VMM’s management components to be compromised without administrator notification. This means that unauthorized users cannot be permitted access to the management functions, and the management components must not be interfered with by Guest VMs or unprivileged users on other networks—including operational networks connected to the TOE. VMMs include a set of management functions that collectively allow administrators to configure and manage the VMM, as well as configure Guest VMs. These management functions are specific to the VS and are distinct from any other management functions that might exist for the internal management of any given Guest VM. These VMM management functions are privileged, with the security of the entire system relying on their proper use. The VMM management functions can be classified into different categories and the policy for their use and the impact to security may vary accordingly. The management functions are distributed throughout the VMM (within the VMM and Service VMs). The VMM must support the necessary mechanisms to enable the control of all management functions according to the system security policy. When a management function is distributed among multiple Service VMs, the VMs must be protected using the security mechanisms of the Hypervisor and any Service VMs involved to ensure that the intent of the system security policy is not compromised. Additionally, since hypercalls permit Guest VMs to invoke the Hypervisor, and often allow the passing of data to the Hypervisor, it is important that the hypercall interface is well-guarded and that all parameters be validated. The VMM maintains configuration data for every VM on the system. This configuration data, whether of Service or Guest VMs, must be protected. The mechanisms used to establish, modify and verify configuration data are part of the VS management functions and must be protected as such. The proper internal configuration of Service VMs that provide critical security functions can also greatly impact VS security. These configurations must also be protected. Internal configuration of Guest VMs should not impact overall VS security. The overall goal is to ensure that the VMM, including the environments internal to Service VMs, is properly configured and that all Guest VM configurations are maintained consistent with the system security policy throughout their lifecycle. Virtualization Systems are often managed remotely. For example, an administrator can remotely update virtualization software, start and shut down VMs, and manage virtualized network connections. If a console is required, it could be run on a separate machine or it could itself run in a VM. When performing remote management, an administrator must communicate with a privileged management agent over a network. Communications with the management infrastructure must be protected from Guest VMs and operational networks.
    O.PATCHED_SOFTWARE
    The VS must be updated and patched when needed in order to prevent the potential compromise of the VMM, as well as the networks and VMs that it hosts. Identifying and applying needed updates must be a normal part of the operating procedure to ensure that patches are applied in a timely and thorough manner. In order to facilitate this, the VS must support standards and protocols that help enhance the manageability of the VS as an IT product, enabling it to be integrated as part of a manageable network (e.g., reporting current patch level and patchability).
    O.PLATFORM_INTEGRITY
    The integrity of the VMM depends on the integrity of the hardware and software on which the VMM relies. Although the VS does not have complete control over the integrity of the platform, the VS should as much as possible try to ensure that no users or software hosted by the VS can undermine the integrity of the platform.
    O.RESOURCE_ALLOCATION
    The TOE will provide mechanisms that enforce constraints on the allocation of system resources in accordance with existing security policy.
    O.VMM_INTEGRITY
    Integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. This objective concerns only the integrity of the VS—not the integrity of software running inside of Guest VMs or of the physical platform. The overall objective is to ensure the integrity of critical components of a VS. Initial integrity of a VS can be established through mechanisms such as a digitally signed installation or update package, or through integrity measurements made at launch. Integrity is maintained in a running system by careful protection of the VMM from untrusted users and software. For example, it must not be possible for software running within a Guest VM to exploit a vulnerability in a device or hypercall interface and gain control of the VMM. The vendor must release patches for vulnerabilities as soon as practicable after discovery.
    O.VM_ENTROPY
    VMs must have access to good entropy sources to support security-related features that implement cryptographic algorithms. For example, in order to function as members of operational networks, VMs must be able to communicate securely with other network entities—whether virtual or physical. They must therefore have access to sources of good entropy to support that secure communication.
    O.VM_ISOLATION
    VMs are the fundamental subject of the system. The VMM is responsible for applying the system security policy (SSP) to the VM and all resources. As basic functionality, the VMM must support a security policy that mandates no information transfer between VMs. The VMM must support the necessary mechanisms to isolate the resources of all VMs. The VMM partitions a platform's physical resources for use by the supported virtual environments. Depending on customer requirements, a VM may need a completely isolated environment with exclusive access to system resources or share some of its resources with other VMs. It must be possible to enforce a security policy that prohibits the transfer of data between VMs through shared devices. When the platform security policy allows the sharing of resources across VM boundaries, the VMM must ensure that all access to those resources is consistent with the policy. The VMM may delegate the responsibility for the mediation of resource sharing to select Service VMs; however in doing so, it remains responsible for mediating access to the Service VMs, and each Service VM must mediate all access to any shared resource that has been delegated to it in accordance with the SSP. Both virtual and physical devices are resources requiring access control. The VMM must enforce access control in accordance with system security policy. Physical devices are platform devices with access mediated via the VMM per the O.VMM_Integrity objective. Virtual devices may include virtual storage devices and virtual network devices. Some of the access control restrictions must be enforced internal to Service VMs, as may be the case for isolating virtual networks. VMMs may also expose purely virtual interfaces. These are VMM specific, and while they are not analogous to a physical device, they are also subject to access control. The VMM must support the mechanisms to isolate all resources associated with virtual networks and to limit a VM's access to only those virtual networks for which it has been configured. The VMM must also support the mechanisms to control the configurations of virtual networks according to the SSP.
    +
    O.AUDIT
    An audit log must be created that captures accesses to the objects the TOE protects. The log of these accesses, or audit events, must be protected from modification, unauthorized access, and destruction. The audit log must be sufficiently detailed to indicate the date and time of the event, the identify of the user, the type of event, and the success or failure of the event.
    O.CORRECTLY_APPLIED_CONFIGURATION
    The TOE must not apply configurations that violate the current security policy. The TOE must correctly apply configurations and policies to a newly created Guest VM, as well as to existing Guest VMs when applicable configuration or policy changes are made. All changes to configuration and to policy must conform to the existing security policy. Similarly, changes made to the configuration of the TOE itself must not violate the existing security policy.
    O.DOMAIN_INTEGRITY
    While the VS is not responsible for the contents or correct functioning of software that runs within Guest VMs, it is responsible for ensuring that the correct functioning of the software within a Guest VM is not interfered with by other VMs.
    O.MANAGEMENT_ACCESS
    VMM management functions include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only authorized users (administrators) may exercise management functions. Because of the privileges exercised by the VMM management functions, it must not be possible for the VMM’s management components to be compromised without administrator notification. This means that unauthorized users cannot be permitted access to the management functions, and the management components must not be interfered with by Guest VMs or unprivileged users on other networks—including operational networks connected to the TOE. VMMs include a set of management functions that collectively allow administrators to configure and manage the VMM, as well as configure Guest VMs. These management functions are specific to the VS and are distinct from any other management functions that might exist for the internal management of any given Guest VM. These VMM management functions are privileged, with the security of the entire system relying on their proper use. The VMM management functions can be classified into different categories and the policy for their use and the impact to security may vary accordingly. The management functions are distributed throughout the VMM (within the VMM and Service VMs). The VMM must support the necessary mechanisms to enable the control of all management functions according to the system security policy. When a management function is distributed among multiple Service VMs, the VMs must be protected using the security mechanisms of the Hypervisor and any Service VMs involved to ensure that the intent of the system security policy is not compromised. Additionally, since hypercalls permit Guest VMs to invoke the Hypervisor, and often allow the passing of data to the Hypervisor, it is important that the hypercall interface is well-guarded and that all parameters be validated. The VMM maintains configuration data for every VM on the system. This configuration data, whether of Service or Guest VMs, must be protected. The mechanisms used to establish, modify and verify configuration data are part of the VS management functions and must be protected as such. The proper internal configuration of Service VMs that provide critical security functions can also greatly impact VS security. These configurations must also be protected. Internal configuration of Guest VMs should not impact overall VS security. The overall goal is to ensure that the VMM, including the environments internal to Service VMs, is properly configured and that all Guest VM configurations are maintained consistent with the system security policy throughout their lifecycle. Virtualization Systems are often managed remotely. For example, an administrator can remotely update virtualization software, start and shut down VMs, and manage virtualized network connections. If a console is required, it could be run on a separate machine or it could itself run in a VM. When performing remote management, an administrator must communicate with a privileged management agent over a network. Communications with the management infrastructure must be protected from Guest VMs and operational networks.
    O.PATCHED_SOFTWARE
    The VS must be updated and patched when needed in order to prevent the potential compromise of the VMM, as well as the networks and VMs that it hosts. Identifying and applying needed updates must be a normal part of the operating procedure to ensure that patches are applied in a timely and thorough manner. In order to facilitate this, the VS must support standards and protocols that help enhance the manageability of the VS as an IT product, enabling it to be integrated as part of a manageable network (e.g., reporting current patch level and patchability).
    O.PLATFORM_INTEGRITY
    The integrity of the VMM depends on the integrity of the hardware and software on which the VMM relies. Although the VS does not have complete control over the integrity of the platform, the VS should as much as possible try to ensure that no users or software hosted by the VS can undermine the integrity of the platform.
    O.RESOURCE_ALLOCATION
    The TOE will provide mechanisms that enforce constraints on the allocation of system resources in accordance with existing security policy.
    O.VMM_INTEGRITY
    Integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. This objective concerns only the integrity of the VS—not the integrity of software running inside of Guest VMs or of the physical platform. The overall objective is to ensure the integrity of critical components of a VS. Initial integrity of a VS can be established through mechanisms such as a digitally signed installation or update package, or through integrity measurements made at launch. Integrity is maintained in a running system by careful protection of the VMM from untrusted users and software. For example, it must not be possible for software running within a Guest VM to exploit a vulnerability in a device or hypercall interface and gain control of the VMM. The vendor must release patches for vulnerabilities as soon as practicable after discovery.
    O.VM_ENTROPY
    VMs must have access to good entropy sources to support security-related features that implement cryptographic algorithms. For example, in order to function as members of operational networks, VMs must be able to communicate securely with other network entities—whether virtual or physical. They must therefore have access to sources of good entropy to support that secure communication.
    O.VM_ISOLATION
    VMs are the fundamental subject of the system. The VMM is responsible for applying the system security policy (SSP) to the VM and all resources. As basic functionality, the VMM must support a security policy that mandates no information transfer between VMs. The VMM must support the necessary mechanisms to isolate the resources of all VMs. The VMM partitions a platform's physical resources for use by the supported virtual environments. Depending on customer requirements, a VM may need a completely isolated environment with exclusive access to system resources or share some of its resources with other VMs. It must be possible to enforce a security policy that prohibits the transfer of data between VMs through shared devices. When the platform security policy allows the sharing of resources across VM boundaries, the VMM must ensure that all access to those resources is consistent with the policy. The VMM may delegate the responsibility for the mediation of resource sharing to select Service VMs; however in doing so, it remains responsible for mediating access to the Service VMs, and each Service VM must mediate all access to any shared resource that has been delegated to it in accordance with the SSP. Both virtual and physical devices are resources requiring access control. The VMM must enforce access control in accordance with system security policy. Physical devices are platform devices with access mediated via the VMM per the O.VMM_Integrity objective. Virtual devices may include virtual storage devices and virtual network devices. Some of the access control restrictions must be enforced internal to Service VMs, as may be the case for isolating virtual networks. VMMs may also expose purely virtual interfaces. These are VMM specific, and while they are not analogous to a physical device, they are also subject to access control. The VMM must support the mechanisms to isolate all resources associated with virtual networks and to limit a VM's access to only those virtual networks for which it has been configured. The VMM must also support the mechanisms to control the configurations of virtual networks according to the SSP.

    4.2 Security Objectives for the Operational Environment

    -
    OE.CONFIG
    TOE administrators will configure the VS correctly to create the intended security policy.
    OE.NON_MALICIOUS_USER
    Users are trusted to not be willfully negligent or hostile and use the VS in compliance with the applied enterprise security policy and guidance.
    OE.PHYSICAL
    Physical security, commensurate with the value of the TOE and the data it contains, is provided by the environment.
    OE.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner.
    +
    OE.CONFIG
    TOE administrators will configure the VS correctly to create the intended security policy.
    OE.NON_MALICIOUS_USER
    Users are trusted to not be willfully negligent or hostile and use the VS in compliance with the applied enterprise security policy and guidance.
    OE.PHYSICAL
    Physical security, commensurate with the value of the TOE and the data it contains, is provided by the environment.
    OE.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner.

    4.3 Security Objectives Rationale

    This section describes how the assumptions, threats, and organizational security policies map to the security objectives. -
    Table 1: Security Objectives Rationale
    Threat, Assumption, or OSPSecurity ObjectivesRationale
    T.3P_​SOFTWAREO.VMM_​INTEGRITYThe VMM integrity mechanisms include environment-based vulnerability mitigation and potentiallysupport for introspection and device driver isolation, all of which reduce the likelihood that any vulnerabilities in third-party software can be used to exploit the TOE.
    T.DATA_​LEAKAGEO.DOMAIN_​INTEGRITYLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    O.VM_​ISOLATIONLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    T.DENIAL_​OF_​SERVICEO.RESOURCE_​ALLOCATIONThe ability of the TSF to ensure the proper allocation of resources makes denial of serviceattacks more difficult.
    T.MISCONFIGURATIONO.CORRECTLY_​APPLIED_​CONFIGURATIONMechanisms to prevent the application of configurations that violate the current security policy help prevent misconfigurations.
    T.PLATFORM_​COMPROMISEO.PLATFORM_​INTEGRITYPlatform integrity mechanisms used by the TOE reduce the risk that an attacker can ‘break out’ of a VM and affect the platform on which the VS is running.
    T.UNAUTHORIZED_​ACCESSO.MANAGEMENT_​ACCESSEnsuring that TSF management functions cannot be executed without authorization prevents untrustedsubjects from modifying the behavior of the TOE in an unanticipated manner.
    T.UNAUTHORIZED_​MODIFICATIONO.AUDITEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    O.VMM_​INTEGRITYEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    T.UNAUTHORIZED_​UPDATEO.VMM_​INTEGRITYSystem integrity prevents the TOE from installing a software patch containing unknown andpotentially malicious code.
    T.UNPATCHED_​SOFTWAREO.PATCHED_​SOFTWAREThe ability to patch the TOE software ensures that protections against vulnerabilities can be applied as they become available.
    T.USER_​ERRORO.VM_​ISOLATIONIsolation of VMs includes clear attribution of those VMs to their respective domains which reducesthe likelihood that a user inadvertently inputs or transfers data meant for one VM into another.
    T.VMM_​COMPROMISEO.VMM_​INTEGRITYMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    O.VM_​ISOLATIONMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    T.WEAK_​CRYPTOO.VM_​ENTROPYAcquisition of good entropy is necessary to support the TOE's security-related cryptographicalgorithms.
    A.NON_​MALICIOUS_​USEROE.CONFIGIf the TOE is administered by a non-malicious and non-negligent user, the expected result is that the TOE + - + @@ -2736,7 +2745,7 @@

    5.1.9 TOE Security Functio

    - + @@ -2752,7 +2761,7 @@

    5.1.9 TOE Security Functio

    - + @@ -2771,30 +2780,29 @@

    5.1.9 TOE Security Functio

    Table 1: Security Objectives Rationale
    Threat, Assumption, or OSPSecurity ObjectivesRationale
    T.3P_​SOFTWAREO.VMM_​INTEGRITYThe VMM integrity mechanisms include environment-based vulnerability mitigation and potentiallysupport for introspection and device driver isolation, all of which reduce the likelihood that any vulnerabilities in third-party software can be used to exploit the TOE.
    T.DATA_​LEAKAGEO.DOMAIN_​INTEGRITYLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    O.VM_​ISOLATIONLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    T.DENIAL_​OF_​SERVICEO.RESOURCE_​ALLOCATIONThe ability of the TSF to ensure the proper allocation of resources makes denial of serviceattacks more difficult.
    T.MISCONFIGURATIONO.CORRECTLY_​APPLIED_​CONFIGURATIONMechanisms to prevent the application of configurations that violate the current security policy help prevent misconfigurations.
    T.PLATFORM_​COMPROMISEO.PLATFORM_​INTEGRITYPlatform integrity mechanisms used by the TOE reduce the risk that an attacker can ‘break out’ of a VM and affect the platform on which the VS is running.
    T.UNAUTHORIZED_​ACCESSO.MANAGEMENT_​ACCESSEnsuring that TSF management functions cannot be executed without authorization prevents untrustedsubjects from modifying the behavior of the TOE in an unanticipated manner.
    T.UNAUTHORIZED_​MODIFICATIONO.AUDITEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    O.VMM_​INTEGRITYEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    T.UNAUTHORIZED_​UPDATEO.VMM_​INTEGRITYSystem integrity prevents the TOE from installing a software patch containing unknown andpotentially malicious code.
    T.UNPATCHED_​SOFTWAREO.PATCHED_​SOFTWAREThe ability to patch the TOE software ensures that protections against vulnerabilities can be applied as they become available.
    T.USER_​ERRORO.VM_​ISOLATIONIsolation of VMs includes clear attribution of those VMs to their respective domains which reducesthe likelihood that a user inadvertently inputs or transfers data meant for one VM into another.
    T.VMM_​COMPROMISEO.VMM_​INTEGRITYMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    O.VM_​ISOLATIONMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    T.WEAK_​CRYPTOO.VM_​ENTROPYAcquisition of good entropy is necessary to support the TOE's security-related cryptographicalgorithms.
    A.NON_​MALICIOUS_​USEROE.CONFIGIf the TOE is administered by a non-malicious and non-negligent user, the expected result is that the TOE will be configured in a correct and secure manner.
    OE.NON_​MALICIOUS_​USERIf the organization properly vets and trains users, it is expected that they will be non-malicious.
    A.PHYSICALOE.PHYSICALIf the TOE is deployed in a location that has appropriate physical safeguards, it can be assumed to be physically secure.
    A.PLATFORM_​INTEGRITYOE.PHYSICALIf the underlying platform has not been compromised prior to installation of the TOE, its integrity can be assumed to be intact.
    A.TRUSTED_​ADMINOE.TRUSTED_​ADMINProviding guidance to administrators and ensuring that individuals are properly trained and @@ -823,17 +822,17 @@

    5.1.1 Class: Security Audit (FAU)< The ST author can include other auditable events directly in Table t-audit-mandatory; they are not limited to the list presented. The ST author should update the table in FAU_GEN.1.2 with any additional information generated. “Subject identity” in FAU_GEN.1.2 could be a - user id or an identifier specifying a VM, for example.

    + user id or an identifier specifying a VM, for example.

    Appropriate entries from Table t-audit-optional, Table t-audit-objective, and Table t-audit-sel-based should be included in the ST if the associated SFRs and selections are included.

    The Table t-audit-mandatory entry for FDP_VNC_EXT.1 refers to configuration settings that attach VMs to virtualized network components. Changes to these configurations can be made - during VM execution or when VMs are not running. Audit records + during VM execution or when VMs are not running. Audit records must be generated for either case.

    - The intent of the audit requirement for FDP_PPR_EXT.1 is to log that the VM is connected - to a physical device (when the device becomes part of the VM's hardware view), not - to log every time that the device is accessed. Generally, this is only once at VM + The intent of the audit requirement for FDP_PPR_EXT.1 is to log that the VM is connected + to a physical device (when the device becomes part of the VM's hardware view), not + to log every time that the device is accessed. Generally, this is only once at VM startup. However, some devices can be connected and disconnected during operation (e.g., virtual USB devices such as CD-ROMs). All such connection/disconnection events must be logged.

    @@ -924,8 +923,9 @@

    5.1.1 Class: Security Audit (FAU)<
    The TSF shall be able to transmit the generated audit data to an external IT entity using a trusted channel as specified in FTP_ITC_EXT.1.
    -
    The TSF shall[selection: drop new audit data, overwrite previous audit records according to the following rule: [assignment: - rule for overwriting previous audit records ], other action ]when the local storage space for audit data is full.
    Application +
    The TSF shall[selection: drop new audit data, overwrite previous audit records according to the following rule: [assignment: + rule for overwriting previous audit records ], [assignment: + other action ]]when the local storage space for audit data is full.
    Application Note: An external log server, if available, might be used as alternative storage space in case the local storage space is full. An ‘other action’ could be defined in this case as ‘send the @@ -984,7 +984,7 @@

    5.1.2 Class: Cryptographic Support

    FCS_CKM.1 Cryptographic Key Generation

    The TSF shall generate asymmetric cryptographic keys in accordance with a specified cryptographic key generation algorithm[selection:
    • RSA schemes using cryptographic key sizes [2048-bit or greater] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.3] -
    • ECC schemes using [“NIST curves” P-256, P-384, and [selection: P-521, no other curves] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.4]
    • +
    • ECC schemes using [“NIST curves” P-256, P-384, and [selection: P-521, no other curves] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.4]
    • FFC schemes using cryptographic key sizes [2048-bit or greater] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.1]].
    • FFC Schemes using Diffie-Hellman group 14 that meet the following: [RFC 3526]
    • FFC Schemes using safe primes that meet the following: [‘NIST Special Publication 800-56A Revision 3, “Recommendation for Pair-Wise Key Establishment Schemes"]
    ]and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet the @@ -1342,7 +1342,7 @@

    5.1.2 Class: Cryptographic Support

    FCS_COP.1/Sig Cryptographic Operation (Signature Algorithms)

    The TSF shall perform [ cryptographic signature services (generation and verification) ] in accordance with a specified cryptographic algorithm[selection:
    • RSA schemes using cryptographic key sizes [2048-bit or greater] that meet - the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 4]
    • ECDSA schemes using [“NIST curves” P-256, P-384 and [selection: P-521, no other curves]] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 5]
    ].
    Application + the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 4]
  • ECDSA schemes using [“NIST curves” P-256, P-384 and [selection: P-521, no other curves]] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 5]
  • ].
    Application Note: The ST Author should choose the algorithm implemented to perform digital signatures; if more than one algorithm is available, this requirement should be iterated to specify the @@ -1533,36 +1533,36 @@

    5.1.2 Class: Cryptographic Support
    The TSF shall provide independent entropy across multiple VMs.
    Application Note: - This requirement ensures that sufficient entropy is available to any VM that requires it. The entropy - need not provide high-quality entropy for every possible method that a VM might acquire it. The VMM - must, however, provide some means for VMs to get sufficient entropy. For example, the VMM can - provide an interface that returns entropy to a Guest VM. Alternatively, the VMM could provide + This requirement ensures that sufficient entropy is available to any VM that requires it. The entropy + need not provide high-quality entropy for every possible method that a VM might acquire it. The VMM + must, however, provide some means for VMs to get sufficient entropy. For example, the VMM can + provide an interface that returns entropy to a Guest VM. Alternatively, the VMM could provide pass-through access to entropy sources provided by the host platform.

    - This requirement allows for three general ways of providing entropy to guests: 1) The VS can provide a - Hypercall accessible to VM-aware guests, 2) access to a virtualized device that provides entropy, or + This requirement allows for three general ways of providing entropy to guests: 1) The VS can provide a + Hypercall accessible to VM-aware guests, 2) access to a virtualized device that provides entropy, or 3) pass-through access to a hardware entropy source (including a source of random numbers). In all - cases, it is possible that the guest is made VM-aware through installation of software or drivers. - For the second and third cases, it is possible that the guest could be VM-unaware. There is no - requirement that the TOE provide entropy sources as expected by VM-unaware guests. That is, the TOE + cases, it is possible that the guest is made VM-aware through installation of software or drivers. + For the second and third cases, it is possible that the guest could be VM-unaware. There is no + requirement that the TOE provide entropy sources as expected by VM-unaware guests. That is, the TOE does not have to anticipate every way a guest might try to acquire entropy as long as it supplies a - mechanism that can be used by VM-aware guests, or provides access to a standard mechanism that a - VM-unaware guest would use.

    + mechanism that can be used by VM-aware guests, or provides access to a standard mechanism that a + VM-unaware guest would use.

    The ST author should select “Hypercall interface” if the TSF provides an API function through which guest-resident software can obtain entropy or random numbers. The ST author should select - “virtual device interface” if the TSF presents a virtual device interface to the Guest OS through + “virtual device interface” if the TSF presents a virtual device interface to the Guest OS through which it can obtain entropy or random numbers. Such an interface could present a virtualized real - device, such as a TPM, that can be accessed by VM-unaware guests, or a virtualized fictional device - that would require the Guest OS to be VM-aware. The ST author should select “passthrough access to + device, such as a TPM, that can be accessed by VM-unaware guests, or a virtualized fictional device + that would require the Guest OS to be VM-aware. The ST author should select “passthrough access to hardware entropy source” if the TSF permits Guest VMs to have direct access to hardware entropy or random number source on the platform. The ST author should select all items that are appropriate.

    - For FCS_ENT_EXT.1.2, the VMM must ensure that the provision of entropy to one VM cannot affect the quality - of entropy provided to another VM on the same platform. + For FCS_ENT_EXT.1.2, the VMM must ensure that the provision of entropy to one VM cannot affect the quality + of entropy provided to another VM on the same platform.
    The evaluator shall verify that the TSS describes how the TOE provides entropy to Guest VMs, and how to access the interface to acquire entropy or random numbers. The evaluator shall verify that - the TSS describes the mechanisms for ensuring that one VM does not affect the entropy acquired by + the TSS describes the mechanisms for ensuring that one VM does not affect the entropy acquired by another.
    Tests
      @@ -1571,13 +1571,13 @@

      5.1.2 Class: Cryptographic Support
    • Test FCS_ENT_EXT.1.2:1: - The evaluator shall invoke entropy from each Guest VM. The evaluator shall - verify that each VM acquires values from the interface. + The evaluator shall invoke entropy from each Guest VM. The evaluator shall + verify that each VM acquires values from the interface.
    • Test FCS_ENT_EXT.1.2:2: The evaluator shall invoke entropy from multiple VMs as nearly simultaneously as practicable. The evaluator shall verify that the entropy used in one - VM is not identical to that invoked from the other VMs. + VM is not identical to that invoked from the other VMs.
    @@ -1655,11 +1655,13 @@

    5.1.3 Class: User Data Protection -
    The TSF shall use[selection: no mechanism, list of platform-provided, hardware-based mechanisms ]to constrain a Guest VM's direct access to the following physical devices:[selection: no devices, physical devices to which the VMM allows Guest VMs physical access ].
    Application +
    The TSF shall use[selection: no mechanism, [assignment: + list of platform-provided, hardware-based mechanisms ]]to constrain a Guest VM's direct access to the following physical devices:[selection: no devices, [assignment: + physical devices to which the VMM allows Guest VMs physical access ]].
    Application Note: The TSF must use available hardware-based isolation mechanisms to constrain VMs when VMs have direct access to physical devices. “Direct access” in this context means that the - VM can read or write device memory or access device I/O ports without the VMM being able to intercept + VM can read or write device memory or access device I/O ports without the VMM being able to intercept and validate every transaction.
    @@ -1679,15 +1681,17 @@

    5.1.3 Class: User Data Protection -
    The TSF shall allow an authorized administrator to control Guest VM access to the following physical platform resources:[assignment: - list of physical platform resources the VMM isable to control access to].
    -
    The TSF shall explicitly deny all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, list of physical platform resources to which access is explicitly denied ].
    -
    The TSF shall explicitly allow all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, list of physical platform resources to which access is always allowed ].
    Application +
    The TSF shall allow an authorized administrator to control Guest VM access to the following physical platform resources:[assignment: + list of physical platform resources the VMM isable to control access to].
    +
    The TSF shall explicitly deny all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, [assignment: + list of physical platform resources to which access is explicitly denied ]].
    +
    The TSF shall explicitly allow all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, [assignment: + list of physical platform resources to which access is always allowed ]].
    Application Note: For purposes of this requirement, physical platform resources are divided into three categories: -
    1. those to which Guest OS access is configurable and moderated by the VMM
    2. those to which the Guest OS is never allowed to have direct access, and
    3. those to which the Guest OS is always allowed to have direct access.
    - For element 1, the ST author lists the physical platform resources that can be configured for Guest VM access by +
    1. those to which Guest OS access is configurable and moderated by the VMM
    2. those to which the Guest OS is never allowed to have direct access, and
    3. those to which the Guest OS is always allowed to have direct access.
    + For element 1, the ST author lists the physical platform resources that can be configured for Guest VM access by an administrator. For element 2, the ST author lists the physical platform resources to which Guest VMs may never be allowed direct access. If there are no such resources, the ST author selects "no physical platform resources." Likewise, any resources to which all Guest VMs automatically have access to are to be listed in @@ -1696,20 +1700,20 @@

    5.1.3 Class: User Data Protection
    -
    The evaluator shall examine the TSS to determine that it describes the mechanism by which the VMM controls a Guest VM's access to +
    The evaluator shall examine the TSS to determine that it describes the mechanism by which the VMM controls a Guest VM's access to physical platform resources. This description shall cover all of the physical - platforms allowed in the evaluated configuration by the ST. It should explain how the VMM distinguishes among Guest VMs, and + platforms allowed in the evaluated configuration by the ST. It should explain how the VMM distinguishes among Guest VMs, and how each physical platform resource that is controllable (that is, listed in the assignment statement in the first element) is identified to an Administrator.

    - The evaluator shall ensure that the TSS describes how the Guest VM is associated with each + The evaluator shall ensure that the TSS describes how the Guest VM is associated with each physical resource, and how other Guest VMs cannot access a physical resource without being granted explicit access. For TOEs that implement a robust interface (other than just "allow access" or "deny access"), the evaluator shall ensure that the TSS describes the possible operations or modes of access between a Guest - VM's and physical platform resources.

    + VM's and physical platform resources.

    If physical resources are listed in the second element, the evaluator shall examine the TSS and operational guidance to determine that there appears to be no way to - configure those resources for access by a Guest VM. The evaluator shall + configure those resources for access by a Guest VM. The evaluator shall document in the evaluation report their analysis of why the controls offered to configure access to physical resources can't be used to specify access to the resources identified in the second element (for example, if the interface offers a drop-down list of resources to assign, and the @@ -1727,12 +1731,12 @@

    5.1.3 Class: User Data Protection
    • Test FDP_PPR_EXT.1.3:1: For each physical platform resource identified in the first element, the evaluator shall - configure a Guest VM to have access to that resource and show that the Guest VM is able to + configure a Guest VM to have access to that resource and show that the Guest VM is able to successfully access that resource.
    • Test FDP_PPR_EXT.1.3:2: For each physical platform resource identified in the first element, the evaluator shall - configure the system such that a Guest VM does not have access to that resource and show - that the Guest VM is unable to successfully access that resource.
    • + configure the system such that a Guest VM does not have access to that resource and show + that the Guest VM is unable to successfully access that resource.
    • Test FDP_PPR_EXT.1.3:3: [conditional]: For TOEs that have a robust control interface, the evaluator shall exercise each element of the interface as described in the TSS and the operational guidance to @@ -1740,13 +1744,13 @@

      5.1.3 Class: User Data Protection
    • Test FDP_PPR_EXT.1.3:4: [conditional]: If the TOE explicitly denies access to certain physical resources, the evaluator shall attempt to access each listed (in FDP_PPR_EXT.1.2) physical resource - from a Guest VM and observe that access is denied.
    • + from a Guest VM and observe that access is denied.

    • Test FDP_PPR_EXT.1.3:5: [conditional]: If the TOE explicitly allows access to certain physical resources, the evaluator shall attempt to access each listed (in FDP_PPR_EXT.1.3) physical resource - from a Guest VM and observe that the access is allowed. If the operational guidance - specifies that access is allowed simultaneously by more than one Guest VM, the evaluator - shall attempt to access each resource listed from more than one Guest VM and show that + from a Guest VM and observe that the access is allowed. If the operational guidance + specifies that access is allowed simultaneously by more than one Guest VM, the evaluator + shall attempt to access each resource listed from more than one Guest VM and show that access is allowed.

    @@ -1758,24 +1762,24 @@

    5.1.3 Class: User Data Protection -
    The TSF shall ensure that any previous information content of physical memory is cleared prior to allocation to a Guest VM.
    Application +
    The TSF shall ensure that any previous information content of physical memory is cleared prior to allocation to a Guest VM.
    Application Note: - Physical memory must be zeroed before it is made accessible to a VM for general use - by a Guest OS.

    - The purpose of this requirement is to ensure that a VM does not receive memory - containing data previously used by another VM or the host.

    - “For general use” means for use by the Guest OS in its page tables for running applications or system +
    Physical memory must be zeroed before it is made accessible to a VM for general use + by a Guest OS.

    + The purpose of this requirement is to ensure that a VM does not receive memory + containing data previously used by another VM or the host.

    + “For general use” means for use by the Guest OS in its page tables for running applications or system software.

    This does not apply to pages shared by design or policy between VMs or between the VMMs and VMs, such - as read-only OS pages or pages used for virtual device buffers. + as read-only OS pages or pages used for virtual device buffers.
    The evaluator shall ensure that the TSS documents the process used for clearing - physical memory prior to allocation to a Guest VM, providing details on when + physical memory prior to allocation to a Guest VM, providing details on when and how this is performed. Additionally, the evaluator shall ensure that the TSS documents the conditions under which physical memory is not cleared prior to allocation to a - Guest VM, and describes when and how the memory is cleared.
    + Guest VM, and describes when and how the memory is cleared.

    FDP_RIP_EXT.2 Residual Information on Disk

    @@ -1784,18 +1788,18 @@

    5.1.3 Class: User Data Protection -
    The TSF shall ensure that any previous information content of physical disk storage is cleared to zeros upon allocation to a Guest VM.
    Application +
    The TSF shall ensure that any previous information content of physical disk storage is cleared to zeros upon allocation to a Guest VM.
    Application Note: - The purpose of this requirement is to ensure that a VM does not receive disk storage containing data - previously used by another VM or by the host.

    + The purpose of this requirement is to ensure that a VM does not receive disk storage containing data + previously used by another VM or by the host.

    Clearing of disk storage only upon deallocation does not meet this requirement.

    This does not apply to disk-resident files shared by design or policy between VMs or between the VMMs and VMs, such as read-only data files or files used for inter-VM data transfers permitted by policy.
    The evaluator shall ensure that the TSS documents how the TSF ensures that disk storage is zeroed upon allocation to - Guest VMs. Also, the TSS must document any conditions under which disk storage is not cleared prior to allocation to a Guest VM. + Guest VMs. Also, the TSS must document any conditions under which disk storage is not cleared prior to allocation to a Guest VM. Any file system format and metadata information needed by the evaluator to perform the below test shall be made available to the evaluator, but need not be published in the TSS.
    Tests
    @@ -1806,8 +1810,8 @@

    5.1.3 Class: User Data Protection storage device (or multiple files whose individual sizes add up to more than half the size of the storage media). This file (or files) shall be filled entirely with a non-zero value. Then, the file (or files) shall be released (freed for use but not cleared). Next, the - evaluator (as a VS Administrator) creates a virtual disk at least that large on the same - physical storage device and connects it to a powered-off VM. Then, from outside the Guest VM, + evaluator (as a VS Administrator) creates a virtual disk at least that large on the same + physical storage device and connects it to a powered-off VM. Then, from outside the Guest VM, scan through and check that all the non-metadata (as documented in the TSS) in the file corresponding to that virtual disk is set to zero. @@ -1821,26 +1825,27 @@

    5.1.3 Class: User Data Protection -
    The VS shall provide the following mechanisms for transferring data between Guest VMs:[selection: no mechanism, virtual networking, other inter-VM data sharing mechanisms ].
    +
    The VS shall provide the following mechanisms for transferring data between Guest VMs:[selection: no mechanism, virtual networking, [assignment: + other inter-VM data sharing mechanisms ]].
    The TSF shall by default enforce a policy prohibiting sharing of data between Guest VMs.
    The TSF shall allow Administrators to configure the mechanisms selected in FDP_VMS_EXT.1.1 to enable and disable the transfer of data between Guest VMs.
    -
    The VS shall ensure that no Guest VM is able to read or transfer data to or from another Guest VM except through the mechanisms listed in FDP_VMS_EXT.1.1.
    Application +
    The VS shall ensure that no Guest VM is able to read or transfer data to or from another Guest VM except through the mechanisms listed in FDP_VMS_EXT.1.1.
    Application Note: The fundamental requirement of a Virtualization System is the ability to enforce separation between information domains implemented as Virtual Machines and Virtual Networks. The intent of this - requirement is to ensure that VMs, VMMs, and the VS as a whole is implemented with + requirement is to ensure that VMs, VMMs, and the VS as a whole is implemented with this fundamental requirement in mind.

    - The ST author should select “no mechanism” in the unlikely event that the VS implements no mechanisms for + The ST author should select “no mechanism” in the unlikely event that the VS implements no mechanisms for transferring data between Guest VMs. Otherwise, the ST author should select “virtual networking” and identify all other mechanisms through which data can be transferred between Guest VMs.

    Examples of non-network inter-VM sharing mechanisms are:

    • User interface-based mechanisms, such as copy-paste and drag-and-drop
    • Shared virtual or physical devices
    • API-based mechanisms such as Hypercalls
    For data transfer mechanisms implemented in terms of Hypercall functions, FDP_VMS_EXT.1.3 is met if FPT_HCL_EXT.1.1 is met for those Hypercall functions (Hypercall function parameters are checked).

    For data transfer mechanisms that use shared physical devices, FDP_VMS_EXT.1.3 is met if the device is - listed in and meets FDP_PPR_EXT.1.1 (VM access to the physical device is configurable).

    + listed in and meets FDP_PPR_EXT.1.1 (VM access to the physical device is configurable).

    For data transfer mechanisms that use virtual networking, FDP_VMS_EXT.1.3 is met if FDP_VNC_EXT.1.1 - is met (VM access to virtual networks is configurable).

    + is met (VM access to virtual networks is configurable).

    The evaluator shall examine the TSS to verify that it documents all inter-VM @@ -1860,7 +1865,7 @@

    5.1.3 Class: User Data Protection the default configuration.
  • Test that the two VMs cannot communicate through the mechanisms selected in FDP_VMS_EXT.1.1.
  • Create two new VMs, overriding the default configuration to allow communications through a channel selected in FDP_VMS_EXT.1.1.
  • Test that communications can be passed between the VMs through the channel.
  • Create two new VMs, the first with the inter-VM communications channel currently being tested enabled, and the second with the inter-VM communications channel currently - being tested disabled.
  • Test that communications cannot be passed between the VMs through the channel.
  • As an Administrator, enable inter-VM communications between the VMs on the second VM.
  • Test that communications can be passed through the inter-VM channel.
  • As an Administrator again, disable inter-VM communications between the two VMs.
  • Test that communications can no longer be passed through the channel.
  • + being tested disabled.
  • Test that communications cannot be passed between the VMs through the channel.
  • As an Administrator, enable inter-VM communications between the VMs on the second VM.
  • Test that communications can be passed through the inter-VM channel.
  • As an Administrator again, disable inter-VM communications between the two VMs.
  • Test that communications can no longer be passed through the channel.
  • FDP_VMS_EXT.1.2 is met if communication is unsuccessful in step (b). FDP_VMS_EXT.1.3 is met if communication is successful in step (d) and unsuccessful in step (f).

    @@ -1875,12 +1880,12 @@

    5.1.3 Class: User Data Protection
    The TSF shall allow Administrators to configure virtual networking components to connect VMs to each other and to physical networks.
    -
    The TSF shall ensure that network traffic visible to a Guest VM on a virtual network--or virtual segment of a physical network--is visible only to Guest VMs configured to be on that virtual network or segment.
    Application +
    The TSF shall ensure that network traffic visible to a Guest VM on a virtual network--or virtual segment of a physical network--is visible only to Guest VMs configured to be on that virtual network or segment.
    Application Note: Virtual networks must be separated from one another to provide isolation commensurate with that provided by physically separate networks. It must not be possible for data to cross between properly configured - virtual networks regardless of whether the traffic originated from a local Guest VM or a remote host.

    + virtual networks regardless of whether the traffic originated from a local Guest VM or a remote host.

    Unprivileged users must not be able to connect VMs to each other or to external networks.

    @@ -1895,16 +1900,16 @@

    5.1.3 Class: User Data Protection
    Tests
    • Test FDP_VNC_EXT.1.2:1: - The evaluator shall assume the role of the Administrator and attempt to configure a VM to + The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect to a network component. The evaluator shall verify that the attempt is successful. The evaluator shall then assume the role of an unprivileged user and attempt the same connection. - If the attempt fails, or there is no way for an unprivileged user to configure VM network + If the attempt fails, or there is no way for an unprivileged user to configure VM network connections, the requirement is met.
    • Test FDP_VNC_EXT.1.2:2: - The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect + The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect to a physical network. The evaluator shall verify that the attempt is successful. The evaluator shall then assume the role of an unprivileged user and make the same attempt. - If the attempt fails, or there is no way for an unprivileged user to configure VM network + If the attempt fails, or there is no way for an unprivileged user to configure VM network connections, the requirement is met.
    @@ -1919,10 +1924,11 @@

    5.1.4 Class: Identification and Au -
    The TSF shall detect when[selection: a positive integer number , an administrator configurable positive integer within a [assignment: - range of acceptable values ]]unsuccessful authentication attempts occur related to Administrators attempting to authenticate remotely using[selection: username and password, username and PIN].
    -
    When the defined number of unsuccessful authentication attempts has been met, the TSF shall:[selection: prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until [assignment: - action to unlock ] is taken by an Administrator, prevent the offending Administrator from successfully establishing a remote session using +
    The TSF shall detect when[selection: [assignment: + a positive integer number ], an administrator configurable positive integer within a [assignment: + range of acceptable values ]]unsuccessful authentication attempts occur related to Administrators attempting to authenticate remotely using[selection: username and password, username and PIN].
    +
    When the defined number of unsuccessful authentication attempts has been met, the TSF shall:[selection: prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until [assignment: + action to unlock ] is taken by an Administrator, prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until an Administrator-defined time period has elapsed]
    Application Note: @@ -1979,7 +1985,8 @@

    5.1.4 Class: Identification and Au
    The TSF shall provide the following password management capabilities for administrative passwords:
    1. Passwords shall be able to be composed of any combination of upper and lower case characters, digits, and the following special characters: - [selection: “!”, “@”, “#”, “$”, “%”, “^”, “& ”, “*”, “(“, “)”, other characters ]
    2. Minimum password length shall be configurable
    3. Passwords of at least 15 characters in length shall be supported
    Application + [selection: “!”, “@”, “#”, “$”, “%”, “^”, “& ”, “*”, “(“, “)”, [assignment: + other characters ]]
  • Minimum password length shall be configurable
  • Passwords of at least 15 characters in length shall be supported
  • Application Note: This SFR is included in the ST if the ST Author selects ‘authentication based on username and password’ @@ -2014,8 +2021,8 @@

    5.1.4 Class: Identification and Au If "directory-based" is selected anywhere in FIA_UAU.5.1 then "Ability to configure name/address of directory server to bind with" must be selected in the Client or Server module management function table. -
    The TSF shall provide the following authentication mechanisms:[selection:
    • [selection: local, directory-based] authentication based on username and password
    • authentication based on username and a PIN that releases an asymmetric key stored in - OE-protected storage
    • [selection: local, directory-based] authentication based on X.509 certificates
    • [selection: local, directory-based] authentication based on an SSH public key credential
    ]to support Administrator authentication.
    Application +
    The TSF shall provide the following authentication mechanisms:[selection:
    • [selection: local, directory-based] authentication based on username and password
    • authentication based on username and a PIN that releases an asymmetric key stored in + OE-protected storage
    • [selection: local, directory-based] authentication based on X.509 certificates
    • [selection: local, directory-based] authentication based on an SSH public key credential
    ]to support Administrator authentication.
    Application Note: Selection of ‘authentication based on username and password’ requires that FIA_PMG_EXT.1 be included in the ST. This also requires that the ST include a management function for @@ -2031,14 +2038,14 @@

    5.1.4 Class: Identification and Au
    Tests
      - If ‘username and password authentication‘ is selected, the evaluator will configure the VS with a + If ‘username and password authentication‘ is selected, the evaluator will configure the VS with a known username and password and conduct the following tests:
    • Test FIA_UAU.5.2:1: - The evaluator will attempt to authenticate to the VS using the known username and password. + The evaluator will attempt to authenticate to the VS using the known username and password. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:2: - The evaluator will attempt to authenticate to the VS using the known username but an incorrect + The evaluator will attempt to authenticate to the VS using the known username but an incorrect password. The evaluator will ensure that the authentication attempt is unsuccessful.
      @@ -2046,47 +2053,47 @@

      5.1.4 Class: Identification and Au If ‘username and PIN that releases an asymmetric key‘ is selected, the evaluator will examine the TSS for guidance on supported protected storage and will then configure the TOE or OE to establish a PIN which enables release of the asymmetric key from the protected storage (such as a TPM, a hardware - token, or isolated execution environment) with which the VS can interface. The evaluator will then + token, or isolated execution environment) with which the VS can interface. The evaluator will then conduct the following tests:
    • Test FIA_UAU.5.2:3: - The evaluator will attempt to authenticate to the VS using the known user name and PIN. The + The evaluator will attempt to authenticate to the VS using the known user name and PIN. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:4: - The evaluator will attempt to authenticate to the VS using the known user name but an incorrect + The evaluator will attempt to authenticate to the VS using the known user name but an incorrect PIN. The evaluator will ensure that the authentication attempt is unsuccessful.
      If ‘X.509 certificate authentication‘ is selected, the evaluator will generate an X.509v3 certificate for an Administrator user with the Client Authentication Enhanced Key Usage field set. The evaluator - will provision the VS for authentication with the X.509v3 certificate. The evaluator will ensure - that the certificates are validated by the VS as per FIA_X509_EXT.1.1 and then conduct the + will provision the VS for authentication with the X.509v3 certificate. The evaluator will ensure + that the certificates are validated by the VS as per FIA_X509_EXT.1.1 and then conduct the following tests:
    • Test FIA_UAU.5.2:5: - The evaluator will attempt to authenticate to the VS using the X.509v3 certificate. The + The evaluator will attempt to authenticate to the VS using the X.509v3 certificate. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:6: The evaluator will generate a second certificate identical to the first except for the public key and any values derived from the public key. The evaluator will attempt to authenticate to - the VS with this certificate. The evaluator will ensure that the authentication attempt is + the VS with this certificate. The evaluator will ensure that the authentication attempt is unsuccessful.
      If ‘SSH public-key credential authentication‘ is selected, the evaluator shall generate a public-private host key pair on the TOE using RSA or ECDSA, and a second public-private key pair on a remote - client. The evaluator shall provision the VS with the client public key for authentication over + client. The evaluator shall provision the VS with the client public key for authentication over SSH, and conduct the following tests:
    • Test FIA_UAU.5.2:7: - The evaluator will attempt to authenticate to the VS using a message signed by the client + The evaluator will attempt to authenticate to the VS using a message signed by the client private key that corresponds to provisioned client public key. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:8: - The evaluator will generate a second client key pair and will attempt to authenticate to the VS - with the private key over SSH without first provisioning the VS to support the new key pair. + The evaluator will generate a second client key pair and will attempt to authenticate to the VS + with the private key over SSH without first provisioning the VS to support the new key pair. The evaluator will ensure that the authentication attempt is unsuccessful.

    @@ -2134,7 +2141,7 @@

    5.1.5 Class: Security Management ( Note: Management communications must be separate from user workload communications. Administrative network traffic—including communications between physical hosts concerning load balancing, audit data, - VM startup and shutdown—must be isolated from guest operational networks. For purposes of this requirement, + VM startup and shutdown—must be isolated from guest operational networks. For purposes of this requirement, management traffic also includes VMs transmitted over management networks whether for backup, live migration, or deployment.

    “Separate physical networks” refers to using separate physical interfaces and cables to isolate management and operational networks from @@ -2156,7 +2163,7 @@

    5.1.5 Class: Security Management ( operational traffic is separated.

    Guidance
    The evaluator shall examine the operational guidance to verify that it details how to configure the - VS to keep Management and Operational traffic separate. + VS to keep Management and Operational traffic separate.
    Tests
    The evaluator shall configure the TOE as documented in the guidance. @@ -2165,7 +2172,7 @@

    5.1.5 Class: Security Management ( If separation uses trusted channels, then the evaluator shall capture packets on the network over which traffic is tunneled. If plaintext Guest network traffic is detected, the requirement is not met.

    If data encryption is used, then the evaluator shall capture packets on the network over which the data is sent - while a VM or other large data structure is being transmitted. If plaintext VM contents are detected, the + while a VM or other large data structure is being transmitted. If plaintext VM contents are detected, the requirement is not met.

    @@ -2180,23 +2187,23 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall prevent Guest VMs from accessing virtual device interfaces that are not present in the VM’s current virtual hardware configuration.
    Application +
    The TSF shall prevent Guest VMs from accessing virtual device interfaces that are not present in the VM’s current virtual hardware configuration.
    Application Note: - The virtualized hardware abstraction implemented by a particular VS might include the + The virtualized hardware abstraction implemented by a particular VS might include the virtualized interfaces for many different devices. Sometimes these devices are not present in a - particular instantiation of a VM. The interface for devices not present must not be accessible by the - VM.

    + particular instantiation of a VM. The interface for devices not present must not be accessible by the + VM.

    Such interfaces include memory buffers, PCI Bus interfaces, and processor I/O ports.

    - The purpose of this requirement is to reduce the attack surface of the VMM by blocking access to unused interfaces. + The purpose of this requirement is to reduce the attack surface of the VMM by blocking access to unused interfaces.
    Tests
    - The evaluator shall connect a device to a VM, then from within the guest scan the VM's devices + The evaluator shall connect a device to a VM, then from within the guest scan the VM's devices to ensure that the connected device is present--using a device driver or other available means - to scan the VM's I/O ports or PCI Bus interfaces. + to scan the VM's I/O ports or PCI Bus interfaces. (The device's interface should be documented in the TSS under FPT_VDP_EXT.1.) The evaluator shall - remove the device from the VM and run the scan again. This requirement is met if the device's + remove the device from the VM and run the scan again. This requirement is met if the device's interfaces are no longer present.
    @@ -2207,7 +2214,8 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall take advantage of execution environment-based vulnerability mitigation mechanisms supported by the Platform such as:[selection: Address space randomization, Memory execution protection (e.g., DEP), Stack buffer overflow protection, Heap corruption detection, other mechanisms , No mechanisms]
    Application +
    The TSF shall take advantage of execution environment-based vulnerability mitigation mechanisms supported by the Platform such as:[selection: Address space randomization, Memory execution protection (e.g., DEP), Stack buffer overflow protection, Heap corruption detection, [assignment: + other mechanisms ], No mechanisms]
    Application Note: Processor manufacturers, compiler developers, and operating system vendors have developed execution environment-based mitigations that increase the cost to attackers by adding @@ -2235,22 +2243,22 @@

    5.1.6 Class: Protection of the TSF -
    The VMM shall use[assignment: +
    The VMM shall use[assignment: list of hardware-based virtualization assists]to reduce or eliminate the need for binary translation.
    -
    The VMM shall use[assignment: +
    The VMM shall use[assignment: list of hardware-based virtualization memory-handling assists]to reduce or eliminate the need for shadow page tables.
    Application Note: - These hardware-assists help reduce the size and complexity of the VMM, and thus, of + These hardware-assists help reduce the size and complexity of the VMM, and thus, of the trusted computing base, by eliminating or reducing the need for paravirtualization or binary translation. Paravirtualization involves modifying guest software so that instructions that cannot be properly virtualized are never executed on the physical processor.

    For the assignment in FPT_HAS_EXT.1, the ST author lists the hardware-based virtualization assists on all - platforms included in the ST that are used by the VMM to reduce or eliminate the need for + platforms included in the ST that are used by the VMM to reduce or eliminate the need for software-based binary translation. Examples for the x86 platform are Intel VT-x and AMD-V. “None” is an acceptable assignment for platforms that do not require virtualization assists in order to eliminate the need for binary translation. This must be documented in the TSS.

    For the assignment in FPT_HAS_EXT.1.2, the ST author lists the set of hardware-based virtualization - memory-handling extensions for all platforms listed in the ST that are used by the VMM to reduce or + memory-handling extensions for all platforms listed in the ST that are used by the VMM to reduce or eliminate the need for shadow page tables. Examples for the x86 platform are Intel EPT and AMD RVI. “None” is an acceptable assignment for platforms that do not require memory-handling assists in order to eliminate the need for shadow page tables. This must be documented in the TSS. @@ -2269,15 +2277,15 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall validate the parameters passed to Hypercall interfaces prior to execution of the VMM functionality exposed by each interface.
    Application +
    The TSF shall validate the parameters passed to Hypercall interfaces prior to execution of the VMM functionality exposed by each interface.
    Application Note: The purpose of this requirement is to help ensure the integrity of the - VMM by protecting the attack surface exposed to untrusted Guest VMs through Hypercalls.

    - A Hypercall interface allows VMM functionality to be invoked by VM-aware guest software. + VMM by protecting the attack surface exposed to untrusted Guest VMs through Hypercalls.

    + A Hypercall interface allows VMM functionality to be invoked by VM-aware guest software. For example, a hypercall interface could be used to get information about the real world, such as the time of day or the underlying hardware of the host system. A hypercall could also be used to transfer data between VMs through a copy-paste mechanism. Because hypercall - interfaces expose the VMM to Guest software, these interfaces constitute attack surface.

    + interfaces expose the VMM to Guest software, these interfaces constitute attack surface.

    There is no expectation that the evaluator will need to review source code in order to accomplish the evaluation activity.
    @@ -2295,7 +2303,7 @@

    5.1.6 Class: Protection of the TSF
    Tests
    The evaluator shall perform the following test:

    For each hypercall interface documented in the TSS or proprietary TSS Annex, the evaluator shall attempt to - invoke the function from within the VM using an invalid parameter (if any). If the VMM or VS crashes + invoke the function from within the VM using an invalid parameter (if any). If the VMM or VS crashes or generates an exception, or if no error is returned to the guest, then the test fails. If an error is returned to the guest, then the test succeeds.
    @@ -2328,7 +2336,7 @@

    5.1.6 Class: Protection of the TSF Removable media devices are removable devices that include media, such as USB flash drives and USB hard drives. Removable media devices can themselves contain removable media (e.g., USB CDROM drives).

    For purposes of this requirement, an Information Domain is: -
    1. A VM or collection of VMs
    2. The Virtualization System
    3. Host OS
    4. Management Subsystem
    +
    1. A VM or collection of VMs
    2. The Virtualization System
    3. Host OS
    4. Management Subsystem
    These requirements also apply to virtualized removable media—such as virtual CD drives that connect to ISO images—as well as physical media—such as CDROMs and USB flash drives. In the case of virtual CDROMs, virtual ejection of the virtual media is sufficient.

    @@ -2359,7 +2367,7 @@

    5.1.6 Class: Protection of the TSF
  • Test FPT_RDM_EXT.1.2:1: The evaluator shall configure two VMs that are members of different information domains, with the media or device connected to one of the VMs. The evaluator shall disconnect the - media or device from the VM and connect it to the other VM. The evaluator shall verify + media or device from the VM and connect it to the other VM. The evaluator shall verify that the action performed is consistent with the action assigned in the TSS.
  • @@ -2453,18 +2461,18 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall provide interfaces for virtual devices implemented by the VMM as part of the virtual hardware abstraction.
    -
    The TSF shall validate the parameters passed to the virtual device interface prior to execution of the VMM functionality exposed by those interfaces.
    Application +
    The TSF shall provide interfaces for virtual devices implemented by the VMM as part of the virtual hardware abstraction.
    +
    The TSF shall validate the parameters passed to the virtual device interface prior to execution of the VMM functionality exposed by those interfaces.
    Application Note: - The purpose of this requirement is to ensure that the VMM is not vulnerable to + The purpose of this requirement is to ensure that the VMM is not vulnerable to compromise through the processing of malformed data passed to the virtual device interface from a - Guest OS. The VMM cannot assume that any data coming from a VM is well-formed—even if the virtual - device interface is unique to the VS and the data comes from a virtual device + Guest OS. The VMM cannot assume that any data coming from a VM is well-formed—even if the virtual + device interface is unique to the VS and the data comes from a virtual device driver supplied by the Virtualization Vendor.
    The evaluator shall examine the TSS to ensure it lists all virtual devices - accessible by the guest OS. The TSS, or a separate proprietary document, must + accessible by the guest OS. The TSS, or a separate proprietary document, must also document all virtual device interfaces at the level of I/O ports or PCI Bus interfaces - including port numbers (absolute or relative to a base), port name, address range, and a description of @@ -2490,30 +2498,30 @@

    5.1.6 Class: Protection of the TSF -
    The TSF must ensure that software running in a VM is not able to degrade or disrupt the functioning of other VMs, the VMM, or the Platform.
    -
    The TSF must ensure that a Guest VM is unable to invoke platform code that runs at a privilege level equal to or exceeding that of the VMM without involvement of the VMM.
    Application +
    The TSF must ensure that software running in a VM is not able to degrade or disrupt the functioning of other VMs, the VMM, or the Platform.
    +
    The TSF must ensure that a Guest VM is unable to invoke platform code that runs at a privilege level equal to or exceeding that of the VMM without involvement of the VMM.
    Application Note: - This requirement is intended to ensure that software running within a Guest VM cannot - compromise other VMs, the VMM, or the platform. This requirement is not met if Guest VM - software—whatever its privilege level—can crash the VS or the Platform, or breakout + This requirement is intended to ensure that software running within a Guest VM cannot + compromise other VMs, the VMM, or the platform. This requirement is not met if Guest VM + software—whatever its privilege level—can crash the VS or the Platform, or breakout of its virtual hardware abstraction to gain execution on the platform, within or outside of the context - of the VMM.

    - This requirement is not violated if software running within a VM can crash the Guest OS and there is no - way for an attacker to gain execution in the VMM or outside of the virtualized domain.

    - FPT_VIV_EXT.1.2 addresses several specific mechanisms that must not be permitted to bypass the VMM and + of the VMM.

    + This requirement is not violated if software running within a VM can crash the Guest OS and there is no + way for an attacker to gain execution in the VMM or outside of the virtualized domain.

    + FPT_VIV_EXT.1.2 addresses several specific mechanisms that must not be permitted to bypass the VMM and invoke privileged code on the Platform.

    At a minimum, the TSF should enforce the following:

    • On the x86 platform, a virtual System Management Interrupt (SMI) cannot invoke platform System Management Mode (SMM).
    • An attempt to update virtual firmware or virtual BIOS cannot cause physical platform firmware - or physical platform BIOS to be modified.
    • An attempt to update virtual firmware or virtual BIOS cannot cause the VMM to be modified.
    + or physical platform BIOS to be modified.
  • An attempt to update virtual firmware or virtual BIOS cannot cause the VMM to be modified.
  • Of the above, the first bullet does not apply to platforms that do not support SMM. The rationale behind the third bullet - is that a firmware update of a single VM must not affect other VMs. So if multiple VMs share the same + is that a firmware update of a single VM must not affect other VMs. So if multiple VMs share the same firmware image as part of a common hardware abstraction, then the update of a single machine’s BIOS must not be allowed to change the common abstraction. The virtual hardware abstraction is part of the - VMM.
    + VMM.
    The evaluator shall verify that the TSS (or a proprietary annex to the TSS) describes how the TSF ensures - that guest software cannot degrade or disrupt the functioning of other VMs, the VMM or the platform. And + that guest software cannot degrade or disrupt the functioning of other VMs, the VMM or the platform. And how the TSF prevents guests from invoking higher-privilege platform code, such as the examples in the note.

    @@ -2549,7 +2557,8 @@

    5.1.8 Class: Trusted Path/Channel then "" must be selected in FIA_X509_EXT.2.1.
    The TSF shall use[selection: TLS as conforming to the Functional Package for Transport Layer Security, TLS/HTTPS as conforming to FCS_HTTPS_EXT.1, IPsec as conforming to FCS_IPSEC_EXT.1, SSH as conforming to the Functional Package - for Secure Shell]and[selection: certificate-based authentication of the remote peer, non-certificate-based authentication of the remote peer, no authentication of the remote peer]to provide a trusted communication channel between itself, and

  • audit servers (as required by FAU_STG_EXT.1), and
  • [selection: remote administrators (as required by FTP_TRP.1.1 if selected in FMT_MOF_EXT.1.1 in the Client or Server PP-Module), separation of management and operational networks (if selected in FMT_SMO_EXT.1), other capabilities , no other capabilities]that is logically distinct from other communication paths and provides assured identification of its endpoints and protection of the communicated data from disclosure and detection of modification of the communicated data.
    Application + for Secure Shell]and[selection: certificate-based authentication of the remote peer, non-certificate-based authentication of the remote peer, no authentication of the remote peer]to provide a trusted communication channel between itself, and

  • audit servers (as required by FAU_STG_EXT.1), and
  • [selection: remote administrators (as required by FTP_TRP.1.1 if selected in FMT_MOF_EXT.1.1 in the Client or Server PP-Module), separation of management and operational networks (if selected in FMT_SMO_EXT.1), [assignment: + other capabilities ], no other capabilities]that is logically distinct from other communication paths and provides assured identification of its endpoints and protection of the communicated data from disclosure and detection of modification of the communicated data.
    Application Note: If the ST author selects either TLS or HTTPS, the TSF shall be validated against the Functional Package for TLS. This PP does not mandate that a product implement TLS with mutual authentication, @@ -2572,7 +2581,7 @@

    5.1.8 Class: Trusted Path/Channel
    Tests
    The evaluator will configure the TOE to communicate with each external IT entity and type of remote user identified in the TSS. The evaluator will monitor network - traffic while the VS performs communication with each of these destinations. The evaluator will ensure + traffic while the VS performs communication with each of these destinations. The evaluator will ensure that for each session a trusted channel was established in conformance with the protocols identified in the selection.
    @@ -2638,14 +2647,14 @@

    5.1.8 Class: Trusted Path/Channel -
    The TSF shall indicate to users which VM, if any, has the current input focus.
    Application +
    The TSF shall indicate to users which VM, if any, has the current input focus.
    Application Note: This requirement applies to all users—whether User or Administrator. In environments where multiple VMs run at the same time, the user must have a way of knowing which - VM user input is directed to at any given moment. This is especially important in multiple-domain + VM user input is directed to at any given moment. This is especially important in multiple-domain environments.

    In the case of a human user, this is usually a visual indicator. In the case of headless VMs, the user is - considered to be a program, but this program still needs to know which VM it is sending input to; + considered to be a program, but this program still needs to know which VM it is sending input to; this would typically be accomplished through programmatic means.
    @@ -2656,7 +2665,7 @@

    5.1.8 Class: Trusted Path/Channel

    Tests
    For each supported input device, the evaluator shall demonstrate that the input from each device - listed in the TSS is directed to the VM that is indicated to have + listed in the TSS is directed to the VM that is indicated to have the input focus.
    @@ -2667,15 +2676,15 @@

    5.1.8 Class: Trusted Path/Channel -
    The TSF shall support the unique identification of a VM’s output display to users.
    Application +
    The TSF shall support the unique identification of a VM’s output display to users.
    Application Note: - In environments where a user has access to more than one VM at the same time, the - user must be able to determine the identity of each VM displayed in order to avoid inadvertent + In environments where a user has access to more than one VM at the same time, the + user must be able to determine the identity of each VM displayed in order to avoid inadvertent cross-domain data entry.

    - There must be a mechanism for associating an identifier with a VM so that an application or program - displaying the VM can identify the VM to users. This is generally indicated visually for human users - (e.g., VM identity in the window title bar) and programmatically for headless VMs (e.g., an API - function). The identification must be unique to the VS, but does not need to be universally unique.
    + There must be a mechanism for associating an identifier with a VM so that an application or program + displaying the VM can identify the VM to users. This is generally indicated visually for human users + (e.g., VM identity in the window title bar) and programmatically for headless VMs (e.g., an API + function). The identification must be unique to the VS, but does not need to be universally unique.
    The evaluator shall ensure that the TSS describes the mechanism for identifying @@ -2685,9 +2694,9 @@

    5.1.8 Class: Trusted Path/Channel The evaluator shall perform the following test:

    The evaluator shall attempt to create and start at least three Guest VMs on a single display device where the evaluator attempts to assign two of the VMs the same - identifier. If the user interface displays different identifiers for each VM, then + identifier. If the user interface displays different identifiers for each VM, then the requirement is met. Likewise, the requirement is met if the system refuses to create or start a - VM when there is already a VM with the same identifier. + VM when there is already a VM with the same identifier.

    @@ -2707,7 +2716,7 @@

    5.1.9 TOE Security Functio

    FDP_VMS_EXT.1Ensures that authorized data transfers between domains are done securely.
    FDP_VNC_EXT.1Ensures that network traffic is visible only to VMs configured to be that network.
    FPT_EEM_EXT.1Requires that the TOE use security mechanisms supported by the physical platform.
    FPT_GVI_EXT.1Requires that the TOE support Guest VM measurements and integrity checks (optional).
    FPT_GVI_EXT.1Requires that the TOE support Guest VM measurements and integrity checks (optional).
    FPT_HAS_EXT.1Requires that the TOE use platform-supported virtualization assists to reduce attack surface.
    FPT_INT_EXT.1Requires that the TOE support introspection into Guest VMs (optional).
    FPT_RDM_EXT.1Requires support for rules for switching removeable media between domains to reduce the chance of data spillage.
    FPT_EEM_EXT.1Requires that the TOE use security mechanisms supported by the physical platform.
    FPT_HAS_EXT.1Requires that the TOE use platform-supported virtualization assists to reduce attack surface.
    FPT_HCL_EXT.1Requires that Hypercall parameters be validated.
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_VDP_EXT.1Requires validation of parameter data passed to the hardware abstraction by untrusted VMs.
    FPT_VIV_EXT.1Ensures that untrusted VMs cannot invoke privileged code without proper hypervisor mediation.
    O.RESOURCE_​ALLOCATION
    FCS_CKM_EXT.4Requires cryptographic key destruction to ensure residual data in shared storage is unrecoverable.
    FPT_EEM_EXT.1Requires that the TOE use security mechanisms supported by the physical platform.
    FPT_HAS_EXT.1Requires that the TOE use platform-supported virtualization assists to reduce attack surface.
    FPT_HCL_EXT.1Requires that Hypercall parameters be validated.
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_VDP_EXT.1Requires validation of parameter data passed to the hardware abstraction by untrusted VMs.
    FPT_VIV_EXT.1Ensures that untrusted VMs cannot invoke privileged code without proper hypervisor mediation.
    O.VM_​ENTROPY
    FCS_ENT_EXT.1Requires that domains have access to high-quality entropy for cryptographic purposes.
    FPT_VIV_EXT.1Ensures that untrusted VMs cannot invoke privileged code without proper hypervisor mediation.

    -

    5.2 Security Assurance Requirements

    - The Security Objectives for the TOE in Section 4 were constructed to address threats identified in Section 3.1. The - Security Functional Requirements (SFRs) in Section 5.1 are a formal instantiation of the Security Objectives. The PP - identifies the Security Assurance Requirements (SARs) to frame the extent to which the evaluator assesses the - documentation applicable for the evaluation and performs independent testing.

    - This section lists the set of Security Assurance Requirements (SARs) from Part 3 of the Common Criteria for Information - Technology Security Evaluation, Version 3.1, Revision 5 that are required in evaluations against this PP. Individual - evaluation activities to be performed are specified in both Section 5.1 as well as in this section.

    - After the ST has been approved for evaluation, the Information Technology Security Evaluation Facility (ITSEF) will obtain - the TOE, supporting environmental IT, and the administrative/user guides for the TOE. The ITSEF is expected to perform - actions mandated by the CEM for the ASE and ALC SARs. The ITSEF also performs the evaluation activities contained - within Section 5, which are intended to be an interpretation of the other CEM assurance requirements as they apply - to the specific technology instantiated in the TOE. The evaluation activities that are captured in Section 5 also - provide clarification as to what the developer needs to provide to demonstrate the TOE is compliant with the PP. - -

    5.2.1 Class ASE: Security Target Evaluation

    +

    5.2 Security Assurance Requirements

    +

    The Security Objectives for the TOE in Section 4 were constructed to address threats identified in Section 3.1. The Security Functional Requirements (SFRs) in Section 5.1 are a formal instantiation of the Security Objectives. The PP identifies the Security Assurance Requirements (SARs) to frame the extent to which the evaluator assesses the documentation applicable for the evaluation and performs independent testing. This section lists the set of Security Assurance Requirements (SARs) from Part 3 of the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5 that are required in evaluations against this PP. Individual evaluation activities to be performed are specified in both Section 5.1 as well as in this section. After the ST has been approved for evaluation, the Information Technology Security Evaluation Facility (ITSEF) will obtain the TOE, supporting environmental IT, and the administrative/user guides for the TOE. The ITSEF is expected to perform actions mandated by the CEM for the ASE and ALC SARs. The ITSEF also performs the evaluation activities contained within Section 5, which are intended to be an interpretation of the other CEM assurance requirements as they apply to the specific technology instantiated in the TOE. The evaluation activities that are captured in Section 5 also provide clarification as to what the developer needs to provide to demonstrate the TOE is compliant with the PP.

    +

    5.2.1 Class ASE: Security Target Evaluation

    As per ASE activities defined in [CEM] plus the TSS evaluation activities defined for any SFRs claimed by the TOE. -

    5.2.2 Class ADV: Development

    + +

    5.2.2 Class ADV: Development

    + The information about the TOE is contained in the guidance documentation available to the end user as well as the TOE Summary Specification (TSS) portion of the ST. The TOE developer must concur with the description of the product that is contained in the TSS as it relates to the functional requirements. The evaluation activities contained in Section 5.2 should provide the ST authors with sufficient information to determine the appropriate content for the TSS section. -

    ADV_FSP.1 Basic functional specification

    Developer action elements:

    The developer shall provide a functional specification.
    The developer shall provide a tracing from the functional specification to the SFRs.
    Developer + +

    ADV_FSP.1 Basic functional specification

    + + + + + + + + +

    Developer action elements:

    The developer shall provide a functional specification.
    The developer shall provide a tracing from the functional specification to the SFRs.
    Note: As indicated in the introduction to this section, the functional specification is composed of the information @@ -2806,7 +2814,7 @@

    5.2.2 Class ADV: DevelopmentSFR-supporting TSFI.

    The functional specification shall provide rationale for the implicit categorization of interfaces as SFR-non-interfering.
    The tracing shall demonstrate that the SFRs trace to TSFIs in the functional specification.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall determine that the functional specification is an accurate and complete instantiation of - the SFRs.
    Application + the SFRs.
    Note: There are no specific evaluation activities associated with these SARs. The functional specification documentation @@ -2815,7 +2823,10 @@

    5.2.2 Class ADV: Development

    5.2.3 Class AGD: Guidance Documents

    +
    + +

    5.2.3 Class AGD: Guidance Documents

    + The guidance documents will be provided with the developer’s security target. Guidance must include a description of how the authorized user verifies that the Operational Environment can fulfill its role for the security functionality. The documentation should be in an informal style and readable by an authorized user.

    @@ -2826,22 +2837,33 @@

    5.2.2 Class ADV: DevelopmentSFRs where applicable. -

    AGD_OPE.1 Operational User Guidance

    Developer action elements:

    The developer shall provide operational user guidance. -
    Developer + +

    AGD_OPE.1 Operational User Guidance

    + + + + + + + + + +

    Developer action elements:

    The developer shall provide operational user guidance. +
    Note: Rather than repeat information here, the developer should review the evaluation activities for this component to ascertain the specifics of the guidance that the evaluators will be checking for. This - will provide the necessary information for the preparation of acceptable guidance.

    Content and presentation elements:

    The operational user guidance shall describe what for each user role the authorized user-accessible functions and + will provide the necessary information for the preparation of acceptable guidance.

    Content and presentation elements:

    The operational user guidance shall describe what for each user role the authorized user-accessible functions and privileges that should be controlled in a secure processing environment, including appropriate - warnings.
    The operational user guidance shall describe, for each user role the authorized user, how to use the available - interfaces provided by the TOE in a secure manner.
    The operational user guidance shall describe, for each user role the authorized user, the available functions and + warnings.
    The operational user guidance shall describe, for each user role the authorized user, how to use the available + interfaces provided by the TOE in a secure manner.
    The operational user guidance shall describe, for each user role the authorized user, the available functions and interfaces, in particular all security parameters under the control of the user, indicating secure - values as appropriate.
    The operational user guidance shall, for each user role the authorized user, clearly present each type of + values as appropriate.
    The operational user guidance shall, for each user role the authorized user, clearly present each type of security-relevant event relative to the user-accessible functions that need to be performed, including changing the security characteristics of entities under the control of the TSF.
    The operational user guidance shall identify all possible modes of operation of the TOE (including operation following failure or operational error), their consequences and implications for - maintaining secure operation.
    The operational user guidance shall, for each user role the authorized user, describe the security measures to be + maintaining secure operation.
    The operational user guidance shall, for each user role the authorized user, describe the security measures to be followed in order to fulfill the security objectives for the operational environment as described in the ST.
    The operational user guidance shall be clear and reasonable.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    @@ -2852,7 +2874,7 @@

    5.2.2 Class ADV: Development

    The operational guidance shall contain step-by-step instructions suitable for use by an end-user - of the VS to configure a new, out-of-the-box system into the configuration + of the VS to configure a new, out-of-the-box system into the configuration evaluated under this Protection Profile.

    The documentation shall describe the process for verifying updates to the TOE, either by checking the hash or by verifying a digital signature. The evaluator shall verify that @@ -2863,8 +2885,15 @@

    5.2.2 Class ADV: Development
  • Instructions for obtaining the update itself. This should include instructions for making the update accessible to the TOE (e.g., placement in a specific directory).
  • Instructions for initiating the update process, as well as discerning whether the process - was successful or unsuccessful. This includes generation of the hash/digital signature.
  • AGD_PRE.1 Preparative procedures

    Developer action elements:

    The developer shall provide the TOE including its preparative procedures. -
    Developer + was successful or unsuccessful. This includes generation of the hash/digital signature.
    +

    AGD_PRE.1 Preparative procedures

    + + + + + +

    Developer action elements:

    The developer shall provide the TOE including its preparative procedures. +
    Note: As with the operational guidance, the developer should look to the evaluation activities to determine the required content with respect to preparative procedures. @@ -2880,16 +2909,24 @@

    5.2.2 Class ADV: DevelopmentTOE adequately addresses all platforms (that is, combination of hardware and operating system) claimed for the TOE in the ST.

    The operational guidance shall contain step-by-step instructions suitable for use by an end-user of - the VS to configure a new, out-of-the-box system into the configuration evaluated + the VS to configure a new, out-of-the-box system into the configuration evaluated under this Protection Profile. -

    5.2.4 Class ALC: Life-Cycle Support

    +
    + +

    5.2.4 Class ALC: Life-Cycle Support

    + At the assurance level specified for TOEs conformant to this PP, life-cycle support is limited to an examination of the TOE vendor’s development and configuration management process in order to provide a baseline level of assurance that the TOE itself is developed in a secure manner and that the developer has a well-defined process in place to deliver updates to mitigate known security flaws. This is a result of the critical role that a developer’s practices play in contributing to the overall trustworthiness of a product. -

    ALC_CMC.1 Labeling of the TOE

    Developer action elements:

    The developer shall provide the TOE and a reference for the TOE. + +

    ALC_CMC.1 Labeling of the TOE

    + + + +

    Developer action elements:

    The developer shall provide the TOE and a reference for the TOE.

    Content and presentation elements:

    The TOE shall be labeled with its unique reference.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence. @@ -2899,7 +2936,13 @@

    5.2.2 Class ADV: DevelopmentTOE samples received for testing to ensure that the version number is consistent with that in the ST.

    If the vendor maintains a website advertising the TOE, the evaluator shall examine the information on the website to ensure that - the information in the ST is sufficient to distinguish the product.

    ALC_CMS.1 TOE CM coverage

    Developer action elements:

    The developer shall provide a configuration list for the TOE. + the information in the ST is sufficient to distinguish the product.

    +

    ALC_CMS.1 TOE CM coverage

    + + + + +

    Developer action elements:

    The developer shall provide a configuration list for the TOE.

    Content and presentation elements:

    The configuration list shall include the following: the TOE itself; and the evaluation evidence required by the SARs.
    The configuration list shall uniquely identify the configuration items. @@ -2915,37 +2958,50 @@

    5.2.2 Class ADV: DevelopmentTSF is uniquely identified (with respect to other products from the TSF vendor), and that documentation provided by the developer in association with the requirements in the ST is associated with the TSF using this unique identification. -

    ALC_TSU_EXT.1 Timely Security Updates

    +
    +

    ALC_TSU_EXT.1 Timely Security Updates

    + This component requires the TOE developer, in conjunction with any other necessary parties, to provide information - as to how the VS is updated to address security issues in a timely manner. The + as to how the VS is updated to address security issues in a timely manner. The documentation describes the process of providing updates to the public from the time a security flaw is reported/discovered, to the time an update is released. This description includes the parties involved (e.g., the developer, hardware vendors) and the steps that are performed (e.g., developer testing), including worst case time periods, before an update is made available to the public. -

    Developer action elements:

    The developer shall provide a description in the TSS of how timely security updates are made to the + + + + + + +

    Developer action elements:

    The developer shall provide a description in the TSS of how timely security updates are made to the TOE.

    Content and presentation elements:

    The description shall include the process for creating and deploying security updates for the TOE software/firmware.
    The description shall express the time window as the length of time, in days, between public disclosure - of a vulnerability and the public availability of security updates to the TOE.
    Application + of a vulnerability and the public availability of security updates to the TOE.
    Note: The total length of time may be presented as a summation of the periods of time that each party (e.g., TOE developer, hardware vendor) on the critical path consumes. The time period until public availability per deployment mechanism may differ; each is described.
    The description shall include the mechanisms publicly available for reporting security issues - pertaining to the TOE.
    Application + pertaining to the TOE.
    Note: The reporting mechanism could include websites, email addresses, and a means to protect the sensitive nature of the report (e.g., public keys that could be used to encrypt the details of a proof-of-concept exploit).

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and - presentation of evidence.

    5.2.5 Class ATE: Tests

    + presentation of evidence.
    + +

    5.2.5 Class ATE: Tests

    + Testing is specified for functional aspects of the system as well as aspects that take advantage of design or implementation weaknesses. The former is done through the ATE_IND family, while the latter is through the AVA_VAN family. At the assurance level specified in this PP, testing is based on advertised functionality and interfaces with dependency on the availability of design information. One of the primary outputs of the evaluation process is the test report as specified in the following requirements. -

    ATE_IND.1 Independent Testing - Conformance

    + +

    ATE_IND.1 Independent Testing - Conformance

    + Testing is performed to confirm the functionality described in the TSS as well as the administrative (including configuration and operation) documentation provided. The focus of the testing is to confirm that the requirements specified in Section 5.1 are being met, although some additional testing is specified for SARs @@ -2953,7 +3009,12 @@

    Developer action elements:

    TOE combinations that are claiming conformance to this PP. -

    Developer action elements:

    The developer shall provide the TOE for testing. + + + + + +

    Developer action elements:

    The developer shall provide the TOE for testing.

    Content and presentation elements:

    The TOE shall be suitable for testing.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall test a subset of the TSF to confirm that the TSF operates as specified. @@ -2985,7 +3046,10 @@

    Developer action elements:

    5.2.6 Class AVA: Vulnerability Assessment

    +
    + +

    5.2.6 Class AVA: Vulnerability Assessment

    + For the first generation of this Protection Profile, the evaluation lab is expected to survey open sources to learn what vulnerabilities have been discovered in these types of products. In most cases, these vulnerabilities will require sophistication beyond that of a basic attacker. Until penetration tools are created and uniformly @@ -2994,7 +3058,14 @@

    Developer action elements:

    PPs. -

    AVA_VAN.1 Vulnerability survey

    Developer action elements:

    The developer shall provide the TOE for testing. + +

    AVA_VAN.1 Vulnerability survey

    + + + + + +

    Developer action elements:

    The developer shall provide the TOE for testing.

    Content and presentation elements:

    The TOE shall be suitable for testing.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall perform a search of public domain sources to identify potential vulnerabilities @@ -3014,6 +3085,8 @@

    Developer action elements:

    Appendix A - Optional Requirements As indicated in the introduction to this PP, the baseline requirements (those that must be performed by the TOE) are contained in the body of this PP. @@ -3038,7 +3111,7 @@

    A.1 Strictly Optional R list of actions]upon detection of a potential security violation.
    Application Note: In certain cases, it may be useful for Virtualization Systems to perform automated - responses to certain security events. An example may include halting a VM which has taken some action + responses to certain security events. An example may include halting a VM which has taken some action to violate a key system security policy. This may be especially useful with headless endpoints when there is no human user in the loop.

    The potential security violation mentioned in FAU_ARP.1.1 refers to FAU_SAA.1.

    @@ -3073,26 +3146,26 @@

    A.1 Strictly Optional R
    The TSF shall verify the integrity of Guest VMs through the following mechanisms:[assignment: - list of Guest VM integrity mechanisms].
    Application + list of Guest VM integrity mechanisms].
    Application Note: The primary purpose of this requirement is to identify and describe the mechanisms used to verify the integrity of Guest VMs that have been 'imported' in some fashion, though these mechanisms could also be applied to all Guest VMs, depending on the mechanism used. - Importation for this requirement could include VM migration (live or otherwise), the importation of + Importation for this requirement could include VM migration (live or otherwise), the importation of virtual disk files that were previously exported, VMs in shared storage, etc. It is possible that a - trusted VM could have been modified during the migration or import/export process, or VMs could have + trusted VM could have been modified during the migration or import/export process, or VMs could have been obtained from untrusted sources in the first place, so integrity checks on these VMs can be a - prudent measure to take. These integrity checks could be as thorough as making sure the entire VM - exactly matches a previously known VM (by hash for example), or by simply checking certain - configuration settings to ensure that the VM's configuration will not violate the security model - of the VS.
    + prudent measure to take. These integrity checks could be as thorough as making sure the entire VM + exactly matches a previously known VM (by hash for example), or by simply checking certain + configuration settings to ensure that the VM's configuration will not violate the security model + of the VS.

    For each mechanism listed in the assignment, the evaluator shall ensure that the TSS - documents the mechanism, including how it verifies VM integrity, which set of Guest - VMs it will check (all Guest VMs, only migrated VM - s, etc.), when such checks occur (before VM startup, immediately following - importation/migration, on demand, etc.), and which actions are taken if a VM fails + documents the mechanism, including how it verifies VM integrity, which set of Guest + VMs it will check (all Guest VMs, only migrated VM + s, etc.), when such checks occur (before VM startup, immediately following + importation/migration, on demand, etc.), and which actions are taken if a VM fails the integrity check (or which range of actions are possible if the action is configurable).

    A.2 Objective Requirements

    A.2.1 Class: Protection of the TSF (FPT)

    FPT_DDI_EXT.1 Device Driver Isolation

    @@ -3101,14 +3174,14 @@

    A.1 Strictly Optional R -
    The TSF shall ensure that device drivers for physical devices are isolated from the VMM and all other domains.
    Application +
    The TSF shall ensure that device drivers for physical devices are isolated from the VMM and all other domains.
    Application Note: - In order to function on physical hardware, the VMM must have access to the device + In order to function on physical hardware, the VMM must have access to the device drivers for the physical platform on which it runs. These drivers are often written by third parties, - and yet are effectively a part of the VMM. Thus the integrity of the VMM in part depends on the quality + and yet are effectively a part of the VMM. Thus the integrity of the VMM in part depends on the quality of third party code that the virtualization vendor has no control over. By encapsulating these drivers - within one or more dedicated driver domains (e.g., Service VM or VMs) the damage of a driver failure or - vulnerability can be contained within the domain, and would not compromise the VMM. When driver domains + within one or more dedicated driver domains (e.g., Service VM or VMs) the damage of a driver failure or + vulnerability can be contained within the domain, and would not compromise the VMM. When driver domains have exclusive access to a physical device, hardware isolation mechanisms, such as Intel's VT-d, AMD's Input/Output Memory Management Unit (IOMMU), or ARM's System Memory Management Unit (MMU) should be used to ensure that operations performed by Direct Memory Access (DMA) hardware are properly constrained.
    @@ -3158,21 +3231,21 @@

    A.1 Strictly Optional R -
    The TSF shall support a mechanism for permitting the VMM or privileged VMs to access the internals of another VM for purposes of introspection.
    Application +
    The TSF shall support a mechanism for permitting the VMM or privileged VMs to access the internals of another VM for purposes of introspection.
    Application Note: Introspection can be used to support malware and anomaly detection from outside of - the guest environment. This not only helps protect the Guest OS, it also protects the VS by providing - an opportunity for the VS to detect threats to itself that originate within VMs, and that may attempt - to break out of the VM and compromise the VMM or other VMs.

    - The hosting of malware detection software outside of the guest VM helps protect the guest and helps ensure + the guest environment. This not only helps protect the Guest OS, it also protects the VS by providing + an opportunity for the VS to detect threats to itself that originate within VMs, and that may attempt + to break out of the VM and compromise the VMM or other VMs.

    + The hosting of malware detection software outside of the guest VM helps protect the guest and helps ensure the integrity of the malware detection/antivirus software. This capability can be implemented in - the VMM itself, but ideally it should be hosted by a Service VM so that it can be better contained - and does not introduce bugs into the VMM.
    + the VMM itself, but ideally it should be hosted by a Service VM so that it can be better contained + and does not introduce bugs into the VMM.
    The evaluator shall examine the TSS documentation to verify that it describes the - interface for VM introspection and whether the introspection is performed by the - VMM or another VM.
    + interface for VM introspection and whether the introspection is performed by the + VMM or another VM.
    Guidance
    The evaluator shall examine the operational guidance to ensure that it contains instructions for configuration of the introspection mechanism. @@ -3183,18 +3256,20 @@

    A.1 Strictly Optional R -
    The TSF shall support a measured launch of the Virtualization System. Measured components of the VS shall include the static executable image of the Hypervisor and:[selection: Static executable images of the Management Subsystem, list of (static images of) Service VMs , list of configuration files , no other components]
    +
    The TSF shall support a measured launch of the Virtualization System. Measured components of the VS shall include the static executable image of the Hypervisor and:[selection: Static executable images of the Management Subsystem, [assignment: + list of (static images of) Service VMs ], [assignment: + list of configuration files ], no other components]
    The TSF shall make the measurements selected in FPT_ML_EXT.1.1 available to the Management Subsystem.
    Application Note: - A measured launch of the platform and VS demonstrates that the proper TOE software was + A measured launch of the platform and VS demonstrates that the proper TOE software was loaded. A measured launch process employs verifiable integrity measurement mechanisms. For example, a - VS may hash components such as the hypervisor, service VMs, or the Management Subsystem. A + VS may hash components such as the hypervisor, service VMs, or the Management Subsystem. A measured launch process only allows components to be executed after the measurement has been recorded. An example process may add each component’s hash before it is executed so that the final hash reflects the evidence of a component’s state prior to execution. The measurement may be verified as the system boots, but this is not required.

    - The Platform is outside of the TOE. However, this requirement specifies that the VS must be capable of + The Platform is outside of the TOE. However, this requirement specifies that the VS must be capable of receiving Platform measurements if the Platform provides them. This requirement is requiring TOE support for Platform measurements if provided; it is not placing a requirement on the Platform to take such measurements.

    @@ -3217,7 +3292,7 @@

    A.1 Strictly Optional R
    Tests
    • Test FPT_ML_EXT.1.2:1: - The evaluator shall start the VS, login as an Administrator, and verify that the measurements for the specified components are viewable in the Management Subsystem.
    • + The evaluator shall start the VS, login as an Administrator, and verify that the measurements for the specified components are viewable in the Management Subsystem.

    A.3 Implementation-dependent Requirements @@ -3298,12 +3373,12 @@

    A.1 Strictly Optional R transport mode.

    The TSF shall have a nominal, final entry in the SPD that matches anything that is otherwise unmatched, and discards it.
    The TSF shall implement the IPsec protocol ESP as defined by RFC 4303 using the cryptographic algorithms [AES-GCM-128, AES-GCM-256 (as specified in RFC 4106),[selection: AES-CBC-128 (specified in RFC 3602), AES-CBC-256 (specified in RFC 3602), no other algorithms]] together with a Secure Hash Algorithm (SHA)-based HMAC.
    -
    The TSF shall implement the protocol:

    [selection:
    • IKEv1, using Main Mode for Phase 1 exchanges, as defined in RFC 2407, RFC 2408, RFC 2409, RFC 4109, [selection: no other RFCs for extended sequence numbers, RFC 4304 for extended sequence numbers], [selection: no other RFCs for hash functions, RFC 4868 for hash functions], and [selection: support for XAUTH, no support for XAUTH]
    • IKEv2 as defined in RFC 7296 (with mandatory support for NAT traversal as specified in section 2.23), RFC 8784, RFC 8247, and [selection: no other RFCs for hash functions, RFC 4868 for hash functions].
    ]
    Application +
    The TSF shall implement the protocol:

    [selection:
    • IKEv1, using Main Mode for Phase 1 exchanges, as defined in RFC 2407, RFC 2408, RFC 2409, RFC 4109, [selection: no other RFCs for extended sequence numbers, RFC 4304 for extended sequence numbers], [selection: no other RFCs for hash functions, RFC 4868 for hash functions], and [selection: support for XAUTH, no support for XAUTH]
    • IKEv2 as defined in RFC 7296 (with mandatory support for NAT traversal as specified in section 2.23), RFC 8784, RFC 8247, and [selection: no other RFCs for hash functions, RFC 4868 for hash functions].
    ]
    Application Note: If the TOE implements SHA-2 hash algorithms for IKEv1 or IKEv2, the ST author shall select RFC 4868.
    The TSF shall ensure the encrypted payload in the[selection: IKEv1, IKEv2]protocol uses the cryptographic algorithms AES-CBC-128, AES-CBC-256 as specified in RFC 6379 and[selection: AES-GCM-128 as specified in RFC 5282, AES-GCM-256 as specified in RFC 5282, no other algorithm].
    -
    The TSF shall ensure that[selection:
    • IKEv2 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes are fixed based on [selection: number of packets/number of bytes, length of time]. If length of time is used, it must include at least one option that is 24 hours or less for Phase 1 SAs and 8 hours or less for Phase 2 SAs.
    ]
    Application +
    The TSF shall ensure that[selection:
    • IKEv2 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes are fixed based on [selection: number of packets/number of bytes, length of time]. If length of time is used, it must include at least one option that is 24 hours or less for Phase 1 SAs and 8 hours or less for Phase 2 SAs.
    ]
    Application Note: The ST author is afforded a selection based on the version of IKE in their @@ -3365,7 +3440,8 @@

    A.1 Strictly Optional R If “pre-shared keys” is selected, the selection-based requirement FIA_PSK_EXT.1 must be claimed.

    -
    The TSF shall not establish an SA if the [[selection: IP address, Fully Qualified Domain Name (FQDN), user FQDN, Distinguished Name (DN)]and[selection: no other reference identifier type, other supported reference identifier types ]] contained in a certificate does not match the expected values for the entity attempting to establish a connection.
    Application +
    The TSF shall not establish an SA if the [[selection: IP address, Fully Qualified Domain Name (FQDN), user FQDN, Distinguished Name (DN)]and[selection: no other reference identifier type, [assignment: + other supported reference identifier types ]]] contained in a certificate does not match the expected values for the entity attempting to establish a connection.
    Application Note: The TOE must support at least one of the following identifier types: IP address, @@ -3428,7 +3504,7 @@

    A.1 Strictly Optional R can be properly applied.

    Note in this case that the implementation of the IPsec protocol must be enforced entirely within the TOE boundary; i.e. it is not permissible for a software application TOE to be a graphical front-end for IPsec - functionality implemented totally or in part by the underlying OS platform. The behavior referenced here + functionality implemented totally or in part by the underlying OS platform. The behavior referenced here is for the possibility that the configuration of the IPsec connection is initiated from outside the TOE, which is permissible so long as the TSF is solely responsible for enforcing the configured behavior. However, it is allowable for the TSF to rely on low-level platform-provided networking functions to implement the SPD @@ -3856,7 +3932,8 @@

    A.1 Strictly Optional R If "" is selected then "Ability to configure action taken if unable to determine the validity of a certificate" in the Client or Server module management function table must also be selected. -
    The TSF shall use X.509v3 certificates as defined by RFC 5280 to support authentication for[selection: IPsec, TLS, HTTPS, SSH, code signing for system software updates, other uses ]
    Application +
    The TSF shall use X.509v3 certificates as defined by RFC 5280 to support authentication for[selection: IPsec, TLS, HTTPS, SSH, code signing for system software updates, [assignment: + other uses ]]
    Application Note: This SFR must be included in the ST if the selection for FPT_TUD_EXT.1.3 is “digital signature mechanism,” if "certificate-based authentication of the remote peer" is @@ -4080,9 +4157,9 @@

    E.3 Specific Guidance for PP-specified functionality. If the Product Versions are fully tested separately, then there is no need to document the differences.



    E.5 Specific Guidance for Determining Platform Equivalence

    Platform equivalence is used to determine the platforms that a product must be tested on. These guidelines are divided - into sections for determining hardware equivalence and software (host OS/control domain) equivalence. If the Product is - installed onto bare metal, then only hardware equivalence is relevant. If the Product is installed onto an OS—or is integrated - into an OS—then both hardware and software equivalence are required. Likewise, if the Product can be installed either on bare + into sections for determining hardware equivalence and software (host OS/control domain) equivalence. If the Product is + installed onto bare metal, then only hardware equivalence is relevant. If the Product is installed onto an OS—or is integrated + into an OS—then both hardware and software equivalence are required. Likewise, if the Product can be installed either on bare metal or on an operating system, both hardware and software equivalence are relevant.

    E.5.1 Hardware Platform Equivalence

    If a Virtualization Solution runs directly on hardware without an operating system, then platform equivalence is based primarily @@ -4093,15 +4170,15 @@

    E.3 Specific Guidance for

    Equivalency analysis becomes important when comparing platforms with the same processor architecture. Processors with the same architecture that have instruction sets that are subsets or supersets of each other are not disqualified - from being equivalent for purposes of a VPP evaluation. If the VS takes the same code paths when executing PP-specified + from being equivalent for purposes of a VPP evaluation. If the VS takes the same code paths when executing PP-specified security functionality on different processors of the same family, then the processors can be considered equivalent with respect to that application.

    - For example, if a VS follows one code path on platforms that support the AES-NI instruction and another on platforms that do - not, then those two platforms are not equivalent with respect to that VS functionality. But if the VS follows the same code + For example, if a VS follows one code path on platforms that support the AES-NI instruction and another on platforms that do + not, then those two platforms are not equivalent with respect to that VS functionality. But if the VS follows the same code path whether or not the platform supports AES-NI, then the platforms are equivalent with respect to that functionality.

    - The platforms are equivalent with respect to the VS if the platforms are equivalent with respect to all PP-specified + The platforms are equivalent with respect to the VS if the platforms are equivalent with respect to all PP-specified security functionality.

    Table 7: Factors for Determining Hardware Platform Equivalence
    - - - - - -
    FactorSame/Different/NoneGuidance
    Platform ArchitecturesDifferentHardware platforms that implement different processor architectures and instruction sets are not equivalent.
    PP-Specified FunctionalitySameFor platforms with the same processor architecture, the platforms are equivalent with respect to the application if execution of all PP-specified security functionality follows the same code path on @@ -4127,15 +4204,15 @@

    E.3 Specific Guidance for

    The ST must describe all configurations evaluated down to processor manufacturer, model number, and microarchitecture version.

    - The information regarding claimed equivalent configurations depends on the platform that the VS was developed for and runs on. -

    Bare-Metal VS

    + The information regarding claimed equivalent configurations depends on the platform that the VS was developed for and runs on. +

    Bare-Metal VS

    For VSes that run without an operating system on bare-metal or virtual bare-metal, the claimed configuration must describe the platform down to the specific processor manufacturer, model number, and microarchitecture version. The Vendor must describe the differences in the TOE with respect to PP-specified security functionality and how the TOE operates differently to leverage platform differences (e.g., instruction set extensions) in the tested configuration versus the claimed equivalent configuration. -

    VS with OS Support

    - For VSes that run on an OS host or with the assistance of an OS, then the claimed configuration must describe the OS down to +

    VS with OS Support

    + For VSes that run on an OS host or with the assistance of an OS, then the claimed configuration must describe the OS down to its specific model and version number. The Vendor must describe the differences in the TOE with respect to PP-specified security functionality and how the TOE functions differently to leverage platform differences in the tested configuration versus the claimed equivalent configuration. @@ -4147,22 +4224,16 @@

    Appendix F - Acronyms

    EPExtended Package
    FPFunctional Package
    OEOperational Environment
    OSGuest Operating System
    OSHost Operating System
    PPProtection Profile
    PP-ConfigurationProtection Profile Configuration
    PP-ModuleProtection Profile Module
    SARSecurity Assurance Requirement
    SFRSecurity Functional Requirement
    SSPSystem Security Policy
    STSecurity Target
    TOETarget of Evaluation
    TSFTOE Security Functionality
    TSFITSF Interface
    TSSTOE Summary Specification
    VMVirtual Machine
    VMMVirtual Machine Manager
    VSVirtualization System

    Appendix G - Bibliography

    Table 10: Bibliography
    IdentifierTitle
    [CC]Common Criteria for Information Technology Security Evaluation -

    Contents

    1Introduction1.1Compliant Targets of Evaluation1.2Terms1.2.1Common Criteria Terms1.2.2Technical Terms1.3Use Cases2Conformance Claims3Security Problem Definition3.1Threats3.2Assumptions3.3Organizational Security Policies4Security Objectives4.1Security Objectives for the TOE4.2Security Objectives for the Operational Environment4.3Security Objectives Rationale5Security Requirements5.1Security Functional Requirements5.1.1Class: Security Audit (FAU)5.1.2Class: Cryptographic Support (FCS)5.1.3Class: User Data Protection (FDP)5.1.4Class: Identification and Authentication (FIA)5.1.5Class: Security Management (FMT)5.1.6Class: Protection of the TSF (FPT)5.1.7Class: TOE Access Banner (FTA)5.1.8Class: Trusted Path/Channel (FTP)5.1.9TOE Security Functional Requirements Rationale5.2Security Assurance Requirements5.2.1Class ASE: Security Target Evaluation5.2.2Class ADV: Development5.2.3Class AGD: Guidance Documents5.2.4Class ALC: Life-Cycle Support5.2.5Class ATE: Tests5.2.6Class AVA: Vulnerability AssessmentAppendix A - Implementation-dependent RequirementsAppendix B - Implicitly Satisfied RequirementsAppendix C - Entropy Documentation and AssessmentC.1Design DescriptionC.2Entropy JustificationC.3Operating ConditionsC.4Health TestingAppendix D - Equivalency GuidelinesD.1IntroductionD.2Approach to Equivalency AnalysisD.3Specific Guidance for Determining Product Model EquivalenceD.4Specific Guidance for Determining Product Version EquivalenceD.5Specific Guidance for Determining Platform EquivalenceD.5.1Hardware Platform EquivalenceD.5.2Software Platform EquivalenceD.6Level of Specificity for Tested and Claimed Equivalent ConfigurationsAppendix E - AcronymsAppendix F - Bibliography

    1 Introduction

    1.1 Compliant Targets of Evaluation


    1.3 Use Cases

    This Base-PP does not define any use cases for virtualization technology. Client Virtualization and Server Virtualization products have different use cases and so these are defined in their respective PP-Modules.

    2 Conformance Claims

    -
    Conformance Statement

    A Security Target must claim exact conformance to this Protection Profile, as defined in the CC and CEM addenda for Exact Conformance, Selection-Based SFRs, and Optional SFRs (dated May 2017). The following PPs and PP-Modules are allowed to be specified in a PP-Configuration with this PP-Module with this PP.

    • PP-Module for Client Virtualization Systems, Version 1.1
    • PP-Module for Server Virtualization Systems, Version 1.1
    CC Conformance Claims
    This PP is conformant to Parts 2 (extended) and 3 (extended) of Common Criteria Version 3.1, Release 5 [CC].
    PP Claim

    Package Claim

    +
    Conformance Statement

    A Security Target must claim exact conformance to this Protection Profile, as defined in the CC and CEM addenda for Exact Conformance, Selection-Based SFRs, and Optional SFRs (dated May 2017). The following PPs and PP-Modules are allowed to be specified in a PP-Configuration with this PP-Module with this PP.

    • PP-Module for Client Virtualization Systems, Version 1.1
    • PP-Module for Server Virtualization Systems, Version 1.1
    CC Conformance Claims
    This PP is conformant to Parts 2 (extended) and 3 (extended) of Common Criteria Version 3.1, Release 5 [CC].
    PP Claims

    Package Claims

    3 Security Problem Definition

    -

    3.1 Threats

    -
    T.3P_SOFTWARE
    In some VS implementations, functions critical to the security of the TOE are by necessity performed by software not produced by the virtualization vendor. Such software may include physical device drivers, and even non-TOE entities such as Host Operating Systems. Since this software has the same or similar privilege level as the VS, vulnerabilities can be exploited by an adversary to compromise the VS and VMs. Where possible, the VS should mitigate the results of potential vulnerabilities or malicious content in third-party code on which it relies. For example, physical device drivers (potentially the Host OS) could be encapsulated within VMs in order to limit the effects of compromise.
    T.DATA_LEAKAGE
    It is a fundamental property of VMs that the domains encapsulated by different VMs remain separate unless data sharing is permitted by policy. For this reason, all Virtualization Systems shall support a policythat prohibits information transfer between VMs. It shall be possible to configure VMs such that data cannot be moved between domains from VM to VM, orthrough virtual or physical network components under the control of the VS. When VMs are configured assuch, it shall not be possible for data to leak between domains, neither by the express efforts ofsoftware or users of a VM, nor because of vulnerabilities or errors in the implementation of the VMM orother VS components. If it is possible for data to leak between domains when prohibited by policy, then an adversary on one domain or network can obtain data from another domain. Such cross-domain data leakage can, for example, causeclassified information, corporate proprietary information, or personally identifiable information to bemade accessible to unauthorized entities.
    T.DENIAL_OF_SERVICE
    A VM may block others from system resources (e.g., system memory, persistent storage, and processing time) via a resource exhaustion attack.
    T.MISCONFIGURATION
    The VS may be misconfigured, which could impact its functioning and security. This misconfiguration could be due to an administrative error or the use of faulty configuration data.
    T.PLATFORM_COMPROMISE
    The VS must be capable of protecting the platform from threats that originate within VMs and operational networks connected to the VS. The hosting of untrusted—even malicious—domains by the VS cannot be permitted to compromise the security and integrity of the platform on which the VS executes. If an attacker can access the underlying platform in a manner not controlled by the VMM, the attacker might be able to modify system firmware or software—compromising both the VS and the underlying platform.
    T.UNAUTHORIZED_ACCESS
    Functions performed by the management layer include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only certain authorized system users (administrators) are allowed to exercise management functions or obtain sensitive information from the TOE. Virtualization Systems are often managed remotely over communication networks. Members of these networks can be both geographically and logically separated from each other, and pass through a variety of other systems which may be under the control of an adversary, and offer the opportunity for communications to be compromised. An adversary with access to an open management network could inject commands into the management infrastructure or extract sensitive information. This would provide an adversary with administrator privilege on the platform, and administrative control over the VMs and virtual network connections. The adversary could also gain access to the management network by hijacking the management network channel.
    T.UNAUTHORIZED_MODIFICATION
    System integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. Malware running on the platform must not be able to undetectably modify VS components while the system is running or at rest. Likewise, malicious code running within a virtual machine must not be able to modify Virtualization System components.
    T.UNAUTHORIZED_UPDATE
    It is common for attackers to target outdated versions of software containing known flaws. This means it is extremely important to update VS software as soon as possible when updates are available. But the source of the updates and the updates themselves must be trusted. If an attacker can write their own update containing malicious code they can take control of the VS.
    T.UNPATCHED_SOFTWARE
    Vulnerabilities in outdated or unpatched software can be exploited by adversaries to compromise the VS or platform.
    T.USER_ERROR
    If a Virtualization System is capable of simultaneously displaying VMs of different domains to the same user at the same time, there is always the chance that the user will become confused and unintentionally leak information between domains. This is especially likely if VMs belonging to different domains are indistinguishable. Malicious code may also attempt to interfere with the user’s ability to distinguish between domains. The VS must take measures to minimize the likelihood of such confusion.
    T.VMM_COMPROMISE
    The VS is designed to provide the appearance of exclusivity to the VMs and is designed to separate or isolate their functions except where specifically shared. Failure of security mechanisms could lead to unauthorized intrusion into or modification of the VMM, or bypass of the VMM altogether, by non-TOE software, such as that running in Guest or Helper VMs or on the host platform. This must be prevented to avoid compromising the VS.
    T.WEAK_CRYPTO
    To the extent that VMs appear isolated within the VS, a threat of weak cryptography may arise if the VMM does not provide good entropy to support security-related features that depend on entropy to implement cryptographic algorithms. For example, a random number generator keeps an estimate of the number of bits of noise in the entropy pool. From this entropy pool random numbers are created. Good random numbers are essential to implementing strong cryptography. Cryptography implemented using poor random numbers can be defeated by a sophisticated adversary. Such defeat can result in the compromise of Guest VM data and credentials, and of VS data and credentials, and can enable unauthorized access to the VS or VMs.
    +
    T.3P_SOFTWARE
    In some VS implementations, functions critical to the security of the TOE are by necessity performed by software not produced by the virtualization vendor. Such software may include physical device drivers, and even non-TOE entities such as Host Operating Systems. Since this software has the same or similar privilege level as the VS, vulnerabilities can be exploited by an adversary to compromise the VS and VMs. Where possible, the VS should mitigate the results of potential vulnerabilities or malicious content in third-party code on which it relies. For example, physical device drivers (potentially the Host OS) could be encapsulated within VMs in order to limit the effects of compromise.
    T.DATA_LEAKAGE
    It is a fundamental property of VMs that the domains encapsulated by different VMs remain separate unless data sharing is permitted by policy. For this reason, all Virtualization Systems shall support a policythat prohibits information transfer between VMs. It shall be possible to configure VMs such that data cannot be moved between domains from VM to VM, orthrough virtual or physical network components under the control of the VS. When VMs are configured assuch, it shall not be possible for data to leak between domains, neither by the express efforts ofsoftware or users of a VM, nor because of vulnerabilities or errors in the implementation of the VMM orother VS components. If it is possible for data to leak between domains when prohibited by policy, then an adversary on one domain or network can obtain data from another domain. Such cross-domain data leakage can, for example, causeclassified information, corporate proprietary information, or personally identifiable information to bemade accessible to unauthorized entities.
    T.DENIAL_OF_SERVICE
    A VM may block others from system resources (e.g., system memory, persistent storage, and processing time) via a resource exhaustion attack.
    T.MISCONFIGURATION
    The VS may be misconfigured, which could impact its functioning and security. This misconfiguration could be due to an administrative error or the use of faulty configuration data.
    T.PLATFORM_COMPROMISE
    The VS must be capable of protecting the platform from threats that originate within VMs and operational networks connected to the VS. The hosting of untrusted—even malicious—domains by the VS cannot be permitted to compromise the security and integrity of the platform on which the VS executes. If an attacker can access the underlying platform in a manner not controlled by the VMM, the attacker might be able to modify system firmware or software—compromising both the VS and the underlying platform.
    T.UNAUTHORIZED_ACCESS
    Functions performed by the management layer include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only certain authorized system users (administrators) are allowed to exercise management functions or obtain sensitive information from the TOE. Virtualization Systems are often managed remotely over communication networks. Members of these networks can be both geographically and logically separated from each other, and pass through a variety of other systems which may be under the control of an adversary, and offer the opportunity for communications to be compromised. An adversary with access to an open management network could inject commands into the management infrastructure or extract sensitive information. This would provide an adversary with administrator privilege on the platform, and administrative control over the VMs and virtual network connections. The adversary could also gain access to the management network by hijacking the management network channel.
    T.UNAUTHORIZED_MODIFICATION
    System integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. Malware running on the platform must not be able to undetectably modify VS components while the system is running or at rest. Likewise, malicious code running within a virtual machine must not be able to modify Virtualization System components.
    T.UNAUTHORIZED_UPDATE
    It is common for attackers to target outdated versions of software containing known flaws. This means it is extremely important to update VS software as soon as possible when updates are available. But the source of the updates and the updates themselves must be trusted. If an attacker can write their own update containing malicious code they can take control of the VS.
    T.UNPATCHED_SOFTWARE
    Vulnerabilities in outdated or unpatched software can be exploited by adversaries to compromise the VS or platform.
    T.USER_ERROR
    If a Virtualization System is capable of simultaneously displaying VMs of different domains to the same user at the same time, there is always the chance that the user will become confused and unintentionally leak information between domains. This is especially likely if VMs belonging to different domains are indistinguishable. Malicious code may also attempt to interfere with the user’s ability to distinguish between domains. The VS must take measures to minimize the likelihood of such confusion.
    T.VMM_COMPROMISE
    The VS is designed to provide the appearance of exclusivity to the VMs and is designed to separate or isolate their functions except where specifically shared. Failure of security mechanisms could lead to unauthorized intrusion into or modification of the VMM, or bypass of the VMM altogether, by non-TOE software, such as that running in Guest or Helper VMs or on the host platform. This must be prevented to avoid compromising the VS.
    T.WEAK_CRYPTO
    To the extent that VMs appear isolated within the VS, a threat of weak cryptography may arise if the VMM does not provide good entropy to support security-related features that depend on entropy to implement cryptographic algorithms. For example, a random number generator keeps an estimate of the number of bits of noise in the entropy pool. From this entropy pool random numbers are created. Good random numbers are essential to implementing strong cryptography. Cryptography implemented using poor random numbers can be defeated by a sophisticated adversary. Such defeat can result in the compromise of Guest VM data and credentials, and of VS data and credentials, and can enable unauthorized access to the VS or VMs.

    3.2 Assumptions

    -
    A.NON_MALICIOUS_USER
    The user of the VS is not willfully negligent or hostile, and uses the VS in compliance with the applied enterprise security policy and guidance. At the same time, malicious applications could act as the user, so requirements which confine malicious applications are still in scope.
    A.PHYSICAL
    Physical security commensurate with the value of the TOE and the data it contains is assumed to be provided by the environment.
    A.PLATFORM_INTEGRITY
    The platform has not been compromised prior to installation of the VS.
    A.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance.
    +
    A.NON_MALICIOUS_USER
    The user of the VS is not willfully negligent or hostile, and uses the VS in compliance with the applied enterprise security policy and guidance. At the same time, malicious applications could act as the user, so requirements which confine malicious applications are still in scope.
    A.PHYSICAL
    Physical security commensurate with the value of the TOE and the data it contains is assumed to be provided by the environment.
    A.PLATFORM_INTEGRITY
    The platform has not been compromised prior to installation of the VS.
    A.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance.

    3.3 Organizational Security Policies

    @@ -755,17 +754,17 @@

    3.3 O

    4 Security Objectives

    4.1 Security Objectives for the TOE

    -
    O.AUDIT
    An audit log must be created that captures accesses to the objects the TOE protects. The log of these accesses, or audit events, must be protected from modification, unauthorized access, and destruction. The audit log must be sufficiently detailed to indicate the date and time of the event, the identify of the user, the type of event, and the success or failure of the event.
    O.CORRECTLY_APPLIED_CONFIGURATION
    The TOE must not apply configurations that violate the current security policy. The TOE must correctly apply configurations and policies to a newly created Guest VM, as well as to existing Guest VMs when applicable configuration or policy changes are made. All changes to configuration and to policy must conform to the existing security policy. Similarly, changes made to the configuration of the TOE itself must not violate the existing security policy.
    O.DOMAIN_INTEGRITY
    While the VS is not responsible for the contents or correct functioning of software that runs within Guest VMs, it is responsible for ensuring that the correct functioning of the software within a Guest VM is not interfered with by other VMs.
    O.MANAGEMENT_ACCESS
    VMM management functions include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only authorized users (administrators) may exercise management functions. Because of the privileges exercised by the VMM management functions, it must not be possible for the VMM’s management components to be compromised without administrator notification. This means that unauthorized users cannot be permitted access to the management functions, and the management components must not be interfered with by Guest VMs or unprivileged users on other networks—including operational networks connected to the TOE. VMMs include a set of management functions that collectively allow administrators to configure and manage the VMM, as well as configure Guest VMs. These management functions are specific to the VS and are distinct from any other management functions that might exist for the internal management of any given Guest VM. These VMM management functions are privileged, with the security of the entire system relying on their proper use. The VMM management functions can be classified into different categories and the policy for their use and the impact to security may vary accordingly. The management functions are distributed throughout the VMM (within the VMM and Service VMs). The VMM must support the necessary mechanisms to enable the control of all management functions according to the system security policy. When a management function is distributed among multiple Service VMs, the VMs must be protected using the security mechanisms of the Hypervisor and any Service VMs involved to ensure that the intent of the system security policy is not compromised. Additionally, since hypercalls permit Guest VMs to invoke the Hypervisor, and often allow the passing of data to the Hypervisor, it is important that the hypercall interface is well-guarded and that all parameters be validated. The VMM maintains configuration data for every VM on the system. This configuration data, whether of Service or Guest VMs, must be protected. The mechanisms used to establish, modify and verify configuration data are part of the VS management functions and must be protected as such. The proper internal configuration of Service VMs that provide critical security functions can also greatly impact VS security. These configurations must also be protected. Internal configuration of Guest VMs should not impact overall VS security. The overall goal is to ensure that the VMM, including the environments internal to Service VMs, is properly configured and that all Guest VM configurations are maintained consistent with the system security policy throughout their lifecycle. Virtualization Systems are often managed remotely. For example, an administrator can remotely update virtualization software, start and shut down VMs, and manage virtualized network connections. If a console is required, it could be run on a separate machine or it could itself run in a VM. When performing remote management, an administrator must communicate with a privileged management agent over a network. Communications with the management infrastructure must be protected from Guest VMs and operational networks.
    O.PATCHED_SOFTWARE
    The VS must be updated and patched when needed in order to prevent the potential compromise of the VMM, as well as the networks and VMs that it hosts. Identifying and applying needed updates must be a normal part of the operating procedure to ensure that patches are applied in a timely and thorough manner. In order to facilitate this, the VS must support standards and protocols that help enhance the manageability of the VS as an IT product, enabling it to be integrated as part of a manageable network (e.g., reporting current patch level and patchability).
    O.PLATFORM_INTEGRITY
    The integrity of the VMM depends on the integrity of the hardware and software on which the VMM relies. Although the VS does not have complete control over the integrity of the platform, the VS should as much as possible try to ensure that no users or software hosted by the VS can undermine the integrity of the platform.
    O.RESOURCE_ALLOCATION
    The TOE will provide mechanisms that enforce constraints on the allocation of system resources in accordance with existing security policy.
    O.VMM_INTEGRITY
    Integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. This objective concerns only the integrity of the VS—not the integrity of software running inside of Guest VMs or of the physical platform. The overall objective is to ensure the integrity of critical components of a VS. Initial integrity of a VS can be established through mechanisms such as a digitally signed installation or update package, or through integrity measurements made at launch. Integrity is maintained in a running system by careful protection of the VMM from untrusted users and software. For example, it must not be possible for software running within a Guest VM to exploit a vulnerability in a device or hypercall interface and gain control of the VMM. The vendor must release patches for vulnerabilities as soon as practicable after discovery.
    O.VM_ENTROPY
    VMs must have access to good entropy sources to support security-related features that implement cryptographic algorithms. For example, in order to function as members of operational networks, VMs must be able to communicate securely with other network entities—whether virtual or physical. They must therefore have access to sources of good entropy to support that secure communication.
    O.VM_ISOLATION
    VMs are the fundamental subject of the system. The VMM is responsible for applying the system security policy (SSP) to the VM and all resources. As basic functionality, the VMM must support a security policy that mandates no information transfer between VMs. The VMM must support the necessary mechanisms to isolate the resources of all VMs. The VMM partitions a platform's physical resources for use by the supported virtual environments. Depending on customer requirements, a VM may need a completely isolated environment with exclusive access to system resources or share some of its resources with other VMs. It must be possible to enforce a security policy that prohibits the transfer of data between VMs through shared devices. When the platform security policy allows the sharing of resources across VM boundaries, the VMM must ensure that all access to those resources is consistent with the policy. The VMM may delegate the responsibility for the mediation of resource sharing to select Service VMs; however in doing so, it remains responsible for mediating access to the Service VMs, and each Service VM must mediate all access to any shared resource that has been delegated to it in accordance with the SSP. Both virtual and physical devices are resources requiring access control. The VMM must enforce access control in accordance with system security policy. Physical devices are platform devices with access mediated via the VMM per the O.VMM_Integrity objective. Virtual devices may include virtual storage devices and virtual network devices. Some of the access control restrictions must be enforced internal to Service VMs, as may be the case for isolating virtual networks. VMMs may also expose purely virtual interfaces. These are VMM specific, and while they are not analogous to a physical device, they are also subject to access control. The VMM must support the mechanisms to isolate all resources associated with virtual networks and to limit a VM's access to only those virtual networks for which it has been configured. The VMM must also support the mechanisms to control the configurations of virtual networks according to the SSP.
    +
    O.AUDIT
    An audit log must be created that captures accesses to the objects the TOE protects. The log of these accesses, or audit events, must be protected from modification, unauthorized access, and destruction. The audit log must be sufficiently detailed to indicate the date and time of the event, the identify of the user, the type of event, and the success or failure of the event.
    O.CORRECTLY_APPLIED_CONFIGURATION
    The TOE must not apply configurations that violate the current security policy. The TOE must correctly apply configurations and policies to a newly created Guest VM, as well as to existing Guest VMs when applicable configuration or policy changes are made. All changes to configuration and to policy must conform to the existing security policy. Similarly, changes made to the configuration of the TOE itself must not violate the existing security policy.
    O.DOMAIN_INTEGRITY
    While the VS is not responsible for the contents or correct functioning of software that runs within Guest VMs, it is responsible for ensuring that the correct functioning of the software within a Guest VM is not interfered with by other VMs.
    O.MANAGEMENT_ACCESS
    VMM management functions include VM configuration, virtualized network configuration, allocation of physical resources, and reporting. Only authorized users (administrators) may exercise management functions. Because of the privileges exercised by the VMM management functions, it must not be possible for the VMM’s management components to be compromised without administrator notification. This means that unauthorized users cannot be permitted access to the management functions, and the management components must not be interfered with by Guest VMs or unprivileged users on other networks—including operational networks connected to the TOE. VMMs include a set of management functions that collectively allow administrators to configure and manage the VMM, as well as configure Guest VMs. These management functions are specific to the VS and are distinct from any other management functions that might exist for the internal management of any given Guest VM. These VMM management functions are privileged, with the security of the entire system relying on their proper use. The VMM management functions can be classified into different categories and the policy for their use and the impact to security may vary accordingly. The management functions are distributed throughout the VMM (within the VMM and Service VMs). The VMM must support the necessary mechanisms to enable the control of all management functions according to the system security policy. When a management function is distributed among multiple Service VMs, the VMs must be protected using the security mechanisms of the Hypervisor and any Service VMs involved to ensure that the intent of the system security policy is not compromised. Additionally, since hypercalls permit Guest VMs to invoke the Hypervisor, and often allow the passing of data to the Hypervisor, it is important that the hypercall interface is well-guarded and that all parameters be validated. The VMM maintains configuration data for every VM on the system. This configuration data, whether of Service or Guest VMs, must be protected. The mechanisms used to establish, modify and verify configuration data are part of the VS management functions and must be protected as such. The proper internal configuration of Service VMs that provide critical security functions can also greatly impact VS security. These configurations must also be protected. Internal configuration of Guest VMs should not impact overall VS security. The overall goal is to ensure that the VMM, including the environments internal to Service VMs, is properly configured and that all Guest VM configurations are maintained consistent with the system security policy throughout their lifecycle. Virtualization Systems are often managed remotely. For example, an administrator can remotely update virtualization software, start and shut down VMs, and manage virtualized network connections. If a console is required, it could be run on a separate machine or it could itself run in a VM. When performing remote management, an administrator must communicate with a privileged management agent over a network. Communications with the management infrastructure must be protected from Guest VMs and operational networks.
    O.PATCHED_SOFTWARE
    The VS must be updated and patched when needed in order to prevent the potential compromise of the VMM, as well as the networks and VMs that it hosts. Identifying and applying needed updates must be a normal part of the operating procedure to ensure that patches are applied in a timely and thorough manner. In order to facilitate this, the VS must support standards and protocols that help enhance the manageability of the VS as an IT product, enabling it to be integrated as part of a manageable network (e.g., reporting current patch level and patchability).
    O.PLATFORM_INTEGRITY
    The integrity of the VMM depends on the integrity of the hardware and software on which the VMM relies. Although the VS does not have complete control over the integrity of the platform, the VS should as much as possible try to ensure that no users or software hosted by the VS can undermine the integrity of the platform.
    O.RESOURCE_ALLOCATION
    The TOE will provide mechanisms that enforce constraints on the allocation of system resources in accordance with existing security policy.
    O.VMM_INTEGRITY
    Integrity is a core security objective for Virtualization Systems. To achieve system integrity, the integrity of each VMM component must be established and maintained. This objective concerns only the integrity of the VS—not the integrity of software running inside of Guest VMs or of the physical platform. The overall objective is to ensure the integrity of critical components of a VS. Initial integrity of a VS can be established through mechanisms such as a digitally signed installation or update package, or through integrity measurements made at launch. Integrity is maintained in a running system by careful protection of the VMM from untrusted users and software. For example, it must not be possible for software running within a Guest VM to exploit a vulnerability in a device or hypercall interface and gain control of the VMM. The vendor must release patches for vulnerabilities as soon as practicable after discovery.
    O.VM_ENTROPY
    VMs must have access to good entropy sources to support security-related features that implement cryptographic algorithms. For example, in order to function as members of operational networks, VMs must be able to communicate securely with other network entities—whether virtual or physical. They must therefore have access to sources of good entropy to support that secure communication.
    O.VM_ISOLATION
    VMs are the fundamental subject of the system. The VMM is responsible for applying the system security policy (SSP) to the VM and all resources. As basic functionality, the VMM must support a security policy that mandates no information transfer between VMs. The VMM must support the necessary mechanisms to isolate the resources of all VMs. The VMM partitions a platform's physical resources for use by the supported virtual environments. Depending on customer requirements, a VM may need a completely isolated environment with exclusive access to system resources or share some of its resources with other VMs. It must be possible to enforce a security policy that prohibits the transfer of data between VMs through shared devices. When the platform security policy allows the sharing of resources across VM boundaries, the VMM must ensure that all access to those resources is consistent with the policy. The VMM may delegate the responsibility for the mediation of resource sharing to select Service VMs; however in doing so, it remains responsible for mediating access to the Service VMs, and each Service VM must mediate all access to any shared resource that has been delegated to it in accordance with the SSP. Both virtual and physical devices are resources requiring access control. The VMM must enforce access control in accordance with system security policy. Physical devices are platform devices with access mediated via the VMM per the O.VMM_Integrity objective. Virtual devices may include virtual storage devices and virtual network devices. Some of the access control restrictions must be enforced internal to Service VMs, as may be the case for isolating virtual networks. VMMs may also expose purely virtual interfaces. These are VMM specific, and while they are not analogous to a physical device, they are also subject to access control. The VMM must support the mechanisms to isolate all resources associated with virtual networks and to limit a VM's access to only those virtual networks for which it has been configured. The VMM must also support the mechanisms to control the configurations of virtual networks according to the SSP.

    4.2 Security Objectives for the Operational Environment

    -
    OE.CONFIG
    TOE administrators will configure the VS correctly to create the intended security policy.
    OE.NON_MALICIOUS_USER
    Users are trusted to not be willfully negligent or hostile and use the VS in compliance with the applied enterprise security policy and guidance.
    OE.PHYSICAL
    Physical security, commensurate with the value of the TOE and the data it contains, is provided by the environment.
    OE.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner.
    +
    OE.CONFIG
    TOE administrators will configure the VS correctly to create the intended security policy.
    OE.NON_MALICIOUS_USER
    Users are trusted to not be willfully negligent or hostile and use the VS in compliance with the applied enterprise security policy and guidance.
    OE.PHYSICAL
    Physical security, commensurate with the value of the TOE and the data it contains, is provided by the environment.
    OE.TRUSTED_ADMIN
    TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner.

    4.3 Security Objectives Rationale

    This section describes how the assumptions, threats, and organizational security policies map to the security objectives. -
    Table 1: Security Objectives Rationale
    Threat, Assumption, or OSPSecurity ObjectivesRationale
    T.3P_​SOFTWAREO.VMM_​INTEGRITYThe VMM integrity mechanisms include environment-based vulnerability mitigation and potentiallysupport for introspection and device driver isolation, all of which reduce the likelihood that any vulnerabilities in third-party software can be used to exploit the TOE.
    T.DATA_​LEAKAGEO.DOMAIN_​INTEGRITYLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    O.VM_​ISOLATIONLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    T.DENIAL_​OF_​SERVICEO.RESOURCE_​ALLOCATIONThe ability of the TSF to ensure the proper allocation of resources makes denial of serviceattacks more difficult.
    T.MISCONFIGURATIONO.CORRECTLY_​APPLIED_​CONFIGURATIONMechanisms to prevent the application of configurations that violate the current security policy help prevent misconfigurations.
    T.PLATFORM_​COMPROMISEO.PLATFORM_​INTEGRITYPlatform integrity mechanisms used by the TOE reduce the risk that an attacker can ‘break out’ of a VM and affect the platform on which the VS is running.
    T.UNAUTHORIZED_​ACCESSO.MANAGEMENT_​ACCESSEnsuring that TSF management functions cannot be executed without authorization prevents untrustedsubjects from modifying the behavior of the TOE in an unanticipated manner.
    T.UNAUTHORIZED_​MODIFICATIONO.AUDITEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    O.VMM_​INTEGRITYEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    T.UNAUTHORIZED_​UPDATEO.VMM_​INTEGRITYSystem integrity prevents the TOE from installing a software patch containing unknown andpotentially malicious code.
    T.UNPATCHED_​SOFTWAREO.PATCHED_​SOFTWAREThe ability to patch the TOE software ensures that protections against vulnerabilities can be applied as they become available.
    T.USER_​ERRORO.VM_​ISOLATIONIsolation of VMs includes clear attribution of those VMs to their respective domains which reducesthe likelihood that a user inadvertently inputs or transfers data meant for one VM into another.
    T.VMM_​COMPROMISEO.VMM_​INTEGRITYMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    O.VM_​ISOLATIONMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    T.WEAK_​CRYPTOO.VM_​ENTROPYAcquisition of good entropy is necessary to support the TOE's security-related cryptographicalgorithms.
    A.NON_​MALICIOUS_​USEROE.CONFIGIf the TOE is administered by a non-malicious and non-negligent user, the expected result is that the TOE + - + @@ -3619,7 +3632,7 @@

    5.1.9 TOE Security Functio

    - + @@ -3635,7 +3648,7 @@

    5.1.9 TOE Security Functio

    - + @@ -3654,30 +3667,29 @@

    5.1.9 TOE Security Functio

    Table 1: Security Objectives Rationale
    Threat, Assumption, or OSPSecurity ObjectivesRationale
    T.3P_​SOFTWAREO.VMM_​INTEGRITYThe VMM integrity mechanisms include environment-based vulnerability mitigation and potentiallysupport for introspection and device driver isolation, all of which reduce the likelihood that any vulnerabilities in third-party software can be used to exploit the TOE.
    T.DATA_​LEAKAGEO.DOMAIN_​INTEGRITYLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    O.VM_​ISOLATIONLogical separation of VMs and enforcement of domain integrity prevent unauthorized transmission of data from one VM to another.
    T.DENIAL_​OF_​SERVICEO.RESOURCE_​ALLOCATIONThe ability of the TSF to ensure the proper allocation of resources makes denial of serviceattacks more difficult.
    T.MISCONFIGURATIONO.CORRECTLY_​APPLIED_​CONFIGURATIONMechanisms to prevent the application of configurations that violate the current security policy help prevent misconfigurations.
    T.PLATFORM_​COMPROMISEO.PLATFORM_​INTEGRITYPlatform integrity mechanisms used by the TOE reduce the risk that an attacker can ‘break out’ of a VM and affect the platform on which the VS is running.
    T.UNAUTHORIZED_​ACCESSO.MANAGEMENT_​ACCESSEnsuring that TSF management functions cannot be executed without authorization prevents untrustedsubjects from modifying the behavior of the TOE in an unanticipated manner.
    T.UNAUTHORIZED_​MODIFICATIONO.AUDITEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    O.VMM_​INTEGRITYEnforcement of VMM integrity prevents the bypass of enforcement mechanisms and auditing ensuresthat abuse of legitimate authority can be detected.
    T.UNAUTHORIZED_​UPDATEO.VMM_​INTEGRITYSystem integrity prevents the TOE from installing a software patch containing unknown andpotentially malicious code.
    T.UNPATCHED_​SOFTWAREO.PATCHED_​SOFTWAREThe ability to patch the TOE software ensures that protections against vulnerabilities can be applied as they become available.
    T.USER_​ERRORO.VM_​ISOLATIONIsolation of VMs includes clear attribution of those VMs to their respective domains which reducesthe likelihood that a user inadvertently inputs or transfers data meant for one VM into another.
    T.VMM_​COMPROMISEO.VMM_​INTEGRITYMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    O.VM_​ISOLATIONMaintaining the integrity of the VMM and ensuring that VMs execute in isolated domains mitigatethe risk that the VMM can be compromised or bypassed.
    T.WEAK_​CRYPTOO.VM_​ENTROPYAcquisition of good entropy is necessary to support the TOE's security-related cryptographicalgorithms.
    A.NON_​MALICIOUS_​USEROE.CONFIGIf the TOE is administered by a non-malicious and non-negligent user, the expected result is that the TOE will be configured in a correct and secure manner.
    OE.NON_​MALICIOUS_​USERIf the organization properly vets and trains users, it is expected that they will be non-malicious.
    A.PHYSICALOE.PHYSICALIf the TOE is deployed in a location that has appropriate physical safeguards, it can be assumed to be physically secure.
    A.PLATFORM_​INTEGRITYOE.PHYSICALIf the underlying platform has not been compromised prior to installation of the TOE, its integrity can be assumed to be intact.
    A.TRUSTED_​ADMINOE.TRUSTED_​ADMINProviding guidance to administrators and ensuring that individuals are properly trained and @@ -805,7 +804,7 @@

    5.1.1 Class: Security Audit (FAU)< list of actions]upon detection of a potential security violation.
    Application Note: In certain cases, it may be useful for Virtualization Systems to perform automated - responses to certain security events. An example may include halting a VM which has taken some action + responses to certain security events. An example may include halting a VM which has taken some action to violate a key system security policy. This may be especially useful with headless endpoints when there is no human user in the loop.

    The potential security violation mentioned in FAU_ARP.1.1 refers to FAU_SAA.1.
    @@ -836,17 +835,17 @@

    5.1.1 Class: Security Audit (FAU)< The ST author can include other auditable events directly in Table t-audit-mandatory; they are not limited to the list presented. The ST author should update the table in FAU_GEN.1.2 with any additional information generated. “Subject identity” in FAU_GEN.1.2 could be a - user id or an identifier specifying a VM, for example.

    + user id or an identifier specifying a VM, for example.

    Appropriate entries from Table t-audit-optional, Table t-audit-objective, and Table t-audit-sel-based should be included in the ST if the associated SFRs and selections are included.

    The Table t-audit-mandatory entry for FDP_VNC_EXT.1 refers to configuration settings that attach VMs to virtualized network components. Changes to these configurations can be made - during VM execution or when VMs are not running. Audit records + during VM execution or when VMs are not running. Audit records must be generated for either case.

    - The intent of the audit requirement for FDP_PPR_EXT.1 is to log that the VM is connected - to a physical device (when the device becomes part of the VM's hardware view), not - to log every time that the device is accessed. Generally, this is only once at VM + The intent of the audit requirement for FDP_PPR_EXT.1 is to log that the VM is connected + to a physical device (when the device becomes part of the VM's hardware view), not + to log every time that the device is accessed. Generally, this is only once at VM startup. However, some devices can be connected and disconnected during operation (e.g., virtual USB devices such as CD-ROMs). All such connection/disconnection events must be logged.

    @@ -953,8 +952,9 @@

    5.1.1 Class: Security Audit (FAU)<
    The TSF shall be able to transmit the generated audit data to an external IT entity using a trusted channel as specified in FTP_ITC_EXT.1.
    -
    The TSF shall[selection: drop new audit data, overwrite previous audit records according to the following rule: [assignment: - rule for overwriting previous audit records ], other action ]when the local storage space for audit data is full.
    Application +
    The TSF shall[selection: drop new audit data, overwrite previous audit records according to the following rule: [assignment: + rule for overwriting previous audit records ], [assignment: + other action ]]when the local storage space for audit data is full.
    Application Note: An external log server, if available, might be used as alternative storage space in case the local storage space is full. An ‘other action’ could be defined in this case as ‘send the @@ -1013,7 +1013,7 @@

    5.1.2 Class: Cryptographic Support

    FCS_CKM.1 Cryptographic Key Generation

    The TSF shall generate asymmetric cryptographic keys in accordance with a specified cryptographic key generation algorithm[selection:
    • RSA schemes using cryptographic key sizes [2048-bit or greater] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.3] -
    • ECC schemes using [“NIST curves” P-256, P-384, and [selection: P-521, no other curves] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.4]
    • +
    • ECC schemes using [“NIST curves” P-256, P-384, and [selection: P-521, no other curves] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.4]
    • FFC schemes using cryptographic key sizes [2048-bit or greater] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Appendix B.1]].
    • FFC Schemes using Diffie-Hellman group 14 that meet the following: [RFC 3526]
    • FFC Schemes using safe primes that meet the following: [‘NIST Special Publication 800-56A Revision 3, “Recommendation for Pair-Wise Key Establishment Schemes"]
    ]and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet the @@ -1371,7 +1371,7 @@

    5.1.2 Class: Cryptographic Support

    FCS_COP.1/Sig Cryptographic Operation (Signature Algorithms)

    The TSF shall perform [ cryptographic signature services (generation and verification) ] in accordance with a specified cryptographic algorithm[selection:
    • RSA schemes using cryptographic key sizes [2048-bit or greater] that meet - the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 4]
    • ECDSA schemes using [“NIST curves” P-256, P-384 and [selection: P-521, no other curves]] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 5]
    ].
    Application + the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 4]
  • ECDSA schemes using [“NIST curves” P-256, P-384 and [selection: P-521, no other curves]] that meet the following: [FIPS PUB 186-4, “Digital Signature Standard (DSS)”, Section 5]
  • ].
    Application Note: The ST Author should choose the algorithm implemented to perform digital signatures; if more than one algorithm is available, this requirement should be iterated to specify the @@ -1562,36 +1562,36 @@

    5.1.2 Class: Cryptographic Support
    The TSF shall provide independent entropy across multiple VMs.
    Application Note: - This requirement ensures that sufficient entropy is available to any VM that requires it. The entropy - need not provide high-quality entropy for every possible method that a VM might acquire it. The VMM - must, however, provide some means for VMs to get sufficient entropy. For example, the VMM can - provide an interface that returns entropy to a Guest VM. Alternatively, the VMM could provide + This requirement ensures that sufficient entropy is available to any VM that requires it. The entropy + need not provide high-quality entropy for every possible method that a VM might acquire it. The VMM + must, however, provide some means for VMs to get sufficient entropy. For example, the VMM can + provide an interface that returns entropy to a Guest VM. Alternatively, the VMM could provide pass-through access to entropy sources provided by the host platform.

    - This requirement allows for three general ways of providing entropy to guests: 1) The VS can provide a - Hypercall accessible to VM-aware guests, 2) access to a virtualized device that provides entropy, or + This requirement allows for three general ways of providing entropy to guests: 1) The VS can provide a + Hypercall accessible to VM-aware guests, 2) access to a virtualized device that provides entropy, or 3) pass-through access to a hardware entropy source (including a source of random numbers). In all - cases, it is possible that the guest is made VM-aware through installation of software or drivers. - For the second and third cases, it is possible that the guest could be VM-unaware. There is no - requirement that the TOE provide entropy sources as expected by VM-unaware guests. That is, the TOE + cases, it is possible that the guest is made VM-aware through installation of software or drivers. + For the second and third cases, it is possible that the guest could be VM-unaware. There is no + requirement that the TOE provide entropy sources as expected by VM-unaware guests. That is, the TOE does not have to anticipate every way a guest might try to acquire entropy as long as it supplies a - mechanism that can be used by VM-aware guests, or provides access to a standard mechanism that a - VM-unaware guest would use.

    + mechanism that can be used by VM-aware guests, or provides access to a standard mechanism that a + VM-unaware guest would use.

    The ST author should select “Hypercall interface” if the TSF provides an API function through which guest-resident software can obtain entropy or random numbers. The ST author should select - “virtual device interface” if the TSF presents a virtual device interface to the Guest OS through + “virtual device interface” if the TSF presents a virtual device interface to the Guest OS through which it can obtain entropy or random numbers. Such an interface could present a virtualized real - device, such as a TPM, that can be accessed by VM-unaware guests, or a virtualized fictional device - that would require the Guest OS to be VM-aware. The ST author should select “passthrough access to + device, such as a TPM, that can be accessed by VM-unaware guests, or a virtualized fictional device + that would require the Guest OS to be VM-aware. The ST author should select “passthrough access to hardware entropy source” if the TSF permits Guest VMs to have direct access to hardware entropy or random number source on the platform. The ST author should select all items that are appropriate.

    - For FCS_ENT_EXT.1.2, the VMM must ensure that the provision of entropy to one VM cannot affect the quality - of entropy provided to another VM on the same platform. + For FCS_ENT_EXT.1.2, the VMM must ensure that the provision of entropy to one VM cannot affect the quality + of entropy provided to another VM on the same platform.
    The evaluator shall verify that the TSS describes how the TOE provides entropy to Guest VMs, and how to access the interface to acquire entropy or random numbers. The evaluator shall verify that - the TSS describes the mechanisms for ensuring that one VM does not affect the entropy acquired by + the TSS describes the mechanisms for ensuring that one VM does not affect the entropy acquired by another.
    Tests
      @@ -1600,13 +1600,13 @@

      5.1.2 Class: Cryptographic Support
    • Test FCS_ENT_EXT.1.2:1: - The evaluator shall invoke entropy from each Guest VM. The evaluator shall - verify that each VM acquires values from the interface. + The evaluator shall invoke entropy from each Guest VM. The evaluator shall + verify that each VM acquires values from the interface.
    • Test FCS_ENT_EXT.1.2:2: The evaluator shall invoke entropy from multiple VMs as nearly simultaneously as practicable. The evaluator shall verify that the entropy used in one - VM is not identical to that invoked from the other VMs. + VM is not identical to that invoked from the other VMs.
    @@ -1680,12 +1680,12 @@

    5.1.2 Class: Cryptographic Support transport mode.

    The TSF shall have a nominal, final entry in the SPD that matches anything that is otherwise unmatched, and discards it.
    The TSF shall implement the IPsec protocol ESP as defined by RFC 4303 using the cryptographic algorithms [AES-GCM-128, AES-GCM-256 (as specified in RFC 4106),[selection: AES-CBC-128 (specified in RFC 3602), AES-CBC-256 (specified in RFC 3602), no other algorithms]] together with a Secure Hash Algorithm (SHA)-based HMAC.
    -
    The TSF shall implement the protocol:

    [selection:
    • IKEv1, using Main Mode for Phase 1 exchanges, as defined in RFC 2407, RFC 2408, RFC 2409, RFC 4109, [selection: no other RFCs for extended sequence numbers, RFC 4304 for extended sequence numbers], [selection: no other RFCs for hash functions, RFC 4868 for hash functions], and [selection: support for XAUTH, no support for XAUTH]
    • IKEv2 as defined in RFC 7296 (with mandatory support for NAT traversal as specified in section 2.23), RFC 8784, RFC 8247, and [selection: no other RFCs for hash functions, RFC 4868 for hash functions].
    ]
    Application +
    The TSF shall implement the protocol:

    [selection:
    • IKEv1, using Main Mode for Phase 1 exchanges, as defined in RFC 2407, RFC 2408, RFC 2409, RFC 4109, [selection: no other RFCs for extended sequence numbers, RFC 4304 for extended sequence numbers], [selection: no other RFCs for hash functions, RFC 4868 for hash functions], and [selection: support for XAUTH, no support for XAUTH]
    • IKEv2 as defined in RFC 7296 (with mandatory support for NAT traversal as specified in section 2.23), RFC 8784, RFC 8247, and [selection: no other RFCs for hash functions, RFC 4868 for hash functions].
    ]
    Application Note: If the TOE implements SHA-2 hash algorithms for IKEv1 or IKEv2, the ST author shall select RFC 4868.
    The TSF shall ensure the encrypted payload in the[selection: IKEv1, IKEv2]protocol uses the cryptographic algorithms AES-CBC-128, AES-CBC-256 as specified in RFC 6379 and[selection: AES-GCM-128 as specified in RFC 5282, AES-GCM-256 as specified in RFC 5282, no other algorithm].
    -
    The TSF shall ensure that[selection:
    • IKEv2 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes are fixed based on [selection: number of packets/number of bytes, length of time]. If length of time is used, it must include at least one option that is 24 hours or less for Phase 1 SAs and 8 hours or less for Phase 2 SAs.
    ]
    Application +
    The TSF shall ensure that[selection:
    • IKEv2 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes can be configured by [selection: an Administrator, a VPN Gateway] based on [selection: number of packets/number of bytes, length of time]
    • IKEv1 SA lifetimes are fixed based on [selection: number of packets/number of bytes, length of time]. If length of time is used, it must include at least one option that is 24 hours or less for Phase 1 SAs and 8 hours or less for Phase 2 SAs.
    ]
    Application Note: The ST author is afforded a selection based on the version of IKE in their @@ -1747,7 +1747,8 @@

    5.1.2 Class: Cryptographic Support If “pre-shared keys” is selected, the selection-based requirement FIA_PSK_EXT.1 must be claimed.

    -
    The TSF shall not establish an SA if the [[selection: IP address, Fully Qualified Domain Name (FQDN), user FQDN, Distinguished Name (DN)]and[selection: no other reference identifier type, other supported reference identifier types ]] contained in a certificate does not match the expected values for the entity attempting to establish a connection.
    Application +
    The TSF shall not establish an SA if the [[selection: IP address, Fully Qualified Domain Name (FQDN), user FQDN, Distinguished Name (DN)]and[selection: no other reference identifier type, [assignment: + other supported reference identifier types ]]] contained in a certificate does not match the expected values for the entity attempting to establish a connection.
    Application Note: The TOE must support at least one of the following identifier types: IP address, @@ -1810,7 +1811,7 @@

    5.1.2 Class: Cryptographic Support can be properly applied.

    Note in this case that the implementation of the IPsec protocol must be enforced entirely within the TOE boundary; i.e. it is not permissible for a software application TOE to be a graphical front-end for IPsec - functionality implemented totally or in part by the underlying OS platform. The behavior referenced here + functionality implemented totally or in part by the underlying OS platform. The behavior referenced here is for the possibility that the configuration of the IPsec connection is initiated from outside the TOE, which is permissible so long as the TSF is solely responsible for enforcing the configured behavior. However, it is allowable for the TSF to rely on low-level platform-provided networking functions to implement the SPD @@ -2195,11 +2196,13 @@

    5.1.3 Class: User Data Protection -
    The TSF shall use[selection: no mechanism, list of platform-provided, hardware-based mechanisms ]to constrain a Guest VM's direct access to the following physical devices:[selection: no devices, physical devices to which the VMM allows Guest VMs physical access ].
    Application +
    The TSF shall use[selection: no mechanism, [assignment: + list of platform-provided, hardware-based mechanisms ]]to constrain a Guest VM's direct access to the following physical devices:[selection: no devices, [assignment: + physical devices to which the VMM allows Guest VMs physical access ]].
    Application Note: The TSF must use available hardware-based isolation mechanisms to constrain VMs when VMs have direct access to physical devices. “Direct access” in this context means that the - VM can read or write device memory or access device I/O ports without the VMM being able to intercept + VM can read or write device memory or access device I/O ports without the VMM being able to intercept and validate every transaction.
    @@ -2219,15 +2222,17 @@

    5.1.3 Class: User Data Protection -
    The TSF shall allow an authorized administrator to control Guest VM access to the following physical platform resources:[assignment: - list of physical platform resources the VMM isable to control access to].
    -
    The TSF shall explicitly deny all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, list of physical platform resources to which access is explicitly denied ].
    -
    The TSF shall explicitly allow all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, list of physical platform resources to which access is always allowed ].
    Application +
    The TSF shall allow an authorized administrator to control Guest VM access to the following physical platform resources:[assignment: + list of physical platform resources the VMM isable to control access to].
    +
    The TSF shall explicitly deny all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, [assignment: + list of physical platform resources to which access is explicitly denied ]].
    +
    The TSF shall explicitly allow all Guest VMs access to the following physical platform resources:[selection: no physical platform resources, [assignment: + list of physical platform resources to which access is always allowed ]].
    Application Note: For purposes of this requirement, physical platform resources are divided into three categories: -
    1. those to which Guest OS access is configurable and moderated by the VMM
    2. those to which the Guest OS is never allowed to have direct access, and
    3. those to which the Guest OS is always allowed to have direct access.
    - For element 1, the ST author lists the physical platform resources that can be configured for Guest VM access by +
    1. those to which Guest OS access is configurable and moderated by the VMM
    2. those to which the Guest OS is never allowed to have direct access, and
    3. those to which the Guest OS is always allowed to have direct access.
    + For element 1, the ST author lists the physical platform resources that can be configured for Guest VM access by an administrator. For element 2, the ST author lists the physical platform resources to which Guest VMs may never be allowed direct access. If there are no such resources, the ST author selects "no physical platform resources." Likewise, any resources to which all Guest VMs automatically have access to are to be listed in @@ -2236,20 +2241,20 @@

    5.1.3 Class: User Data Protection
    -
    The evaluator shall examine the TSS to determine that it describes the mechanism by which the VMM controls a Guest VM's access to +
    The evaluator shall examine the TSS to determine that it describes the mechanism by which the VMM controls a Guest VM's access to physical platform resources. This description shall cover all of the physical - platforms allowed in the evaluated configuration by the ST. It should explain how the VMM distinguishes among Guest VMs, and + platforms allowed in the evaluated configuration by the ST. It should explain how the VMM distinguishes among Guest VMs, and how each physical platform resource that is controllable (that is, listed in the assignment statement in the first element) is identified to an Administrator.

    - The evaluator shall ensure that the TSS describes how the Guest VM is associated with each + The evaluator shall ensure that the TSS describes how the Guest VM is associated with each physical resource, and how other Guest VMs cannot access a physical resource without being granted explicit access. For TOEs that implement a robust interface (other than just "allow access" or "deny access"), the evaluator shall ensure that the TSS describes the possible operations or modes of access between a Guest - VM's and physical platform resources.

    + VM's and physical platform resources.

    If physical resources are listed in the second element, the evaluator shall examine the TSS and operational guidance to determine that there appears to be no way to - configure those resources for access by a Guest VM. The evaluator shall + configure those resources for access by a Guest VM. The evaluator shall document in the evaluation report their analysis of why the controls offered to configure access to physical resources can't be used to specify access to the resources identified in the second element (for example, if the interface offers a drop-down list of resources to assign, and the @@ -2267,12 +2272,12 @@

    5.1.3 Class: User Data Protection
    • Test FDP_PPR_EXT.1.3:1: For each physical platform resource identified in the first element, the evaluator shall - configure a Guest VM to have access to that resource and show that the Guest VM is able to + configure a Guest VM to have access to that resource and show that the Guest VM is able to successfully access that resource.
    • Test FDP_PPR_EXT.1.3:2: For each physical platform resource identified in the first element, the evaluator shall - configure the system such that a Guest VM does not have access to that resource and show - that the Guest VM is unable to successfully access that resource.
    • + configure the system such that a Guest VM does not have access to that resource and show + that the Guest VM is unable to successfully access that resource.
    • Test FDP_PPR_EXT.1.3:3: [conditional]: For TOEs that have a robust control interface, the evaluator shall exercise each element of the interface as described in the TSS and the operational guidance to @@ -2280,13 +2285,13 @@

      5.1.3 Class: User Data Protection
    • Test FDP_PPR_EXT.1.3:4: [conditional]: If the TOE explicitly denies access to certain physical resources, the evaluator shall attempt to access each listed (in FDP_PPR_EXT.1.2) physical resource - from a Guest VM and observe that access is denied.
    • + from a Guest VM and observe that access is denied.

    • Test FDP_PPR_EXT.1.3:5: [conditional]: If the TOE explicitly allows access to certain physical resources, the evaluator shall attempt to access each listed (in FDP_PPR_EXT.1.3) physical resource - from a Guest VM and observe that the access is allowed. If the operational guidance - specifies that access is allowed simultaneously by more than one Guest VM, the evaluator - shall attempt to access each resource listed from more than one Guest VM and show that + from a Guest VM and observe that the access is allowed. If the operational guidance + specifies that access is allowed simultaneously by more than one Guest VM, the evaluator + shall attempt to access each resource listed from more than one Guest VM and show that access is allowed.

    @@ -2298,24 +2303,24 @@

    5.1.3 Class: User Data Protection -
    The TSF shall ensure that any previous information content of physical memory is cleared prior to allocation to a Guest VM.
    Application +
    The TSF shall ensure that any previous information content of physical memory is cleared prior to allocation to a Guest VM.
    Application Note: - Physical memory must be zeroed before it is made accessible to a VM for general use - by a Guest OS.

    - The purpose of this requirement is to ensure that a VM does not receive memory - containing data previously used by another VM or the host.

    - “For general use” means for use by the Guest OS in its page tables for running applications or system +
    Physical memory must be zeroed before it is made accessible to a VM for general use + by a Guest OS.

    + The purpose of this requirement is to ensure that a VM does not receive memory + containing data previously used by another VM or the host.

    + “For general use” means for use by the Guest OS in its page tables for running applications or system software.

    This does not apply to pages shared by design or policy between VMs or between the VMMs and VMs, such - as read-only OS pages or pages used for virtual device buffers. + as read-only OS pages or pages used for virtual device buffers.
    The evaluator shall ensure that the TSS documents the process used for clearing - physical memory prior to allocation to a Guest VM, providing details on when + physical memory prior to allocation to a Guest VM, providing details on when and how this is performed. Additionally, the evaluator shall ensure that the TSS documents the conditions under which physical memory is not cleared prior to allocation to a - Guest VM, and describes when and how the memory is cleared.
    + Guest VM, and describes when and how the memory is cleared.

    FDP_RIP_EXT.2 Residual Information on Disk

    @@ -2324,18 +2329,18 @@

    5.1.3 Class: User Data Protection -
    The TSF shall ensure that any previous information content of physical disk storage is cleared to zeros upon allocation to a Guest VM.
    Application +
    The TSF shall ensure that any previous information content of physical disk storage is cleared to zeros upon allocation to a Guest VM.
    Application Note: - The purpose of this requirement is to ensure that a VM does not receive disk storage containing data - previously used by another VM or by the host.

    + The purpose of this requirement is to ensure that a VM does not receive disk storage containing data + previously used by another VM or by the host.

    Clearing of disk storage only upon deallocation does not meet this requirement.

    This does not apply to disk-resident files shared by design or policy between VMs or between the VMMs and VMs, such as read-only data files or files used for inter-VM data transfers permitted by policy.
    The evaluator shall ensure that the TSS documents how the TSF ensures that disk storage is zeroed upon allocation to - Guest VMs. Also, the TSS must document any conditions under which disk storage is not cleared prior to allocation to a Guest VM. + Guest VMs. Also, the TSS must document any conditions under which disk storage is not cleared prior to allocation to a Guest VM. Any file system format and metadata information needed by the evaluator to perform the below test shall be made available to the evaluator, but need not be published in the TSS.
    Tests
    @@ -2346,8 +2351,8 @@

    5.1.3 Class: User Data Protection storage device (or multiple files whose individual sizes add up to more than half the size of the storage media). This file (or files) shall be filled entirely with a non-zero value. Then, the file (or files) shall be released (freed for use but not cleared). Next, the - evaluator (as a VS Administrator) creates a virtual disk at least that large on the same - physical storage device and connects it to a powered-off VM. Then, from outside the Guest VM, + evaluator (as a VS Administrator) creates a virtual disk at least that large on the same + physical storage device and connects it to a powered-off VM. Then, from outside the Guest VM, scan through and check that all the non-metadata (as documented in the TSS) in the file corresponding to that virtual disk is set to zero. @@ -2361,26 +2366,27 @@

    5.1.3 Class: User Data Protection -
    The VS shall provide the following mechanisms for transferring data between Guest VMs:[selection: no mechanism, virtual networking, other inter-VM data sharing mechanisms ].
    +
    The VS shall provide the following mechanisms for transferring data between Guest VMs:[selection: no mechanism, virtual networking, [assignment: + other inter-VM data sharing mechanisms ]].
    The TSF shall by default enforce a policy prohibiting sharing of data between Guest VMs.
    The TSF shall allow Administrators to configure the mechanisms selected in FDP_VMS_EXT.1.1 to enable and disable the transfer of data between Guest VMs.
    -
    The VS shall ensure that no Guest VM is able to read or transfer data to or from another Guest VM except through the mechanisms listed in FDP_VMS_EXT.1.1.
    Application +
    The VS shall ensure that no Guest VM is able to read or transfer data to or from another Guest VM except through the mechanisms listed in FDP_VMS_EXT.1.1.
    Application Note: The fundamental requirement of a Virtualization System is the ability to enforce separation between information domains implemented as Virtual Machines and Virtual Networks. The intent of this - requirement is to ensure that VMs, VMMs, and the VS as a whole is implemented with + requirement is to ensure that VMs, VMMs, and the VS as a whole is implemented with this fundamental requirement in mind.

    - The ST author should select “no mechanism” in the unlikely event that the VS implements no mechanisms for + The ST author should select “no mechanism” in the unlikely event that the VS implements no mechanisms for transferring data between Guest VMs. Otherwise, the ST author should select “virtual networking” and identify all other mechanisms through which data can be transferred between Guest VMs.

    Examples of non-network inter-VM sharing mechanisms are:

    • User interface-based mechanisms, such as copy-paste and drag-and-drop
    • Shared virtual or physical devices
    • API-based mechanisms such as Hypercalls
    For data transfer mechanisms implemented in terms of Hypercall functions, FDP_VMS_EXT.1.3 is met if FPT_HCL_EXT.1.1 is met for those Hypercall functions (Hypercall function parameters are checked).

    For data transfer mechanisms that use shared physical devices, FDP_VMS_EXT.1.3 is met if the device is - listed in and meets FDP_PPR_EXT.1.1 (VM access to the physical device is configurable).

    + listed in and meets FDP_PPR_EXT.1.1 (VM access to the physical device is configurable).

    For data transfer mechanisms that use virtual networking, FDP_VMS_EXT.1.3 is met if FDP_VNC_EXT.1.1 - is met (VM access to virtual networks is configurable).

    + is met (VM access to virtual networks is configurable).

    The evaluator shall examine the TSS to verify that it documents all inter-VM @@ -2400,7 +2406,7 @@

    5.1.3 Class: User Data Protection the default configuration.
  • Test that the two VMs cannot communicate through the mechanisms selected in FDP_VMS_EXT.1.1.
  • Create two new VMs, overriding the default configuration to allow communications through a channel selected in FDP_VMS_EXT.1.1.
  • Test that communications can be passed between the VMs through the channel.
  • Create two new VMs, the first with the inter-VM communications channel currently being tested enabled, and the second with the inter-VM communications channel currently - being tested disabled.
  • Test that communications cannot be passed between the VMs through the channel.
  • As an Administrator, enable inter-VM communications between the VMs on the second VM.
  • Test that communications can be passed through the inter-VM channel.
  • As an Administrator again, disable inter-VM communications between the two VMs.
  • Test that communications can no longer be passed through the channel.
  • + being tested disabled.
  • Test that communications cannot be passed between the VMs through the channel.
  • As an Administrator, enable inter-VM communications between the VMs on the second VM.
  • Test that communications can be passed through the inter-VM channel.
  • As an Administrator again, disable inter-VM communications between the two VMs.
  • Test that communications can no longer be passed through the channel.
  • FDP_VMS_EXT.1.2 is met if communication is unsuccessful in step (b). FDP_VMS_EXT.1.3 is met if communication is successful in step (d) and unsuccessful in step (f).

    @@ -2415,12 +2421,12 @@

    5.1.3 Class: User Data Protection
    The TSF shall allow Administrators to configure virtual networking components to connect VMs to each other and to physical networks.
    -
    The TSF shall ensure that network traffic visible to a Guest VM on a virtual network--or virtual segment of a physical network--is visible only to Guest VMs configured to be on that virtual network or segment.
    Application +
    The TSF shall ensure that network traffic visible to a Guest VM on a virtual network--or virtual segment of a physical network--is visible only to Guest VMs configured to be on that virtual network or segment.
    Application Note: Virtual networks must be separated from one another to provide isolation commensurate with that provided by physically separate networks. It must not be possible for data to cross between properly configured - virtual networks regardless of whether the traffic originated from a local Guest VM or a remote host.

    + virtual networks regardless of whether the traffic originated from a local Guest VM or a remote host.

    Unprivileged users must not be able to connect VMs to each other or to external networks.

    @@ -2435,16 +2441,16 @@

    5.1.3 Class: User Data Protection
    Tests
    • Test FDP_VNC_EXT.1.2:1: - The evaluator shall assume the role of the Administrator and attempt to configure a VM to + The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect to a network component. The evaluator shall verify that the attempt is successful. The evaluator shall then assume the role of an unprivileged user and attempt the same connection. - If the attempt fails, or there is no way for an unprivileged user to configure VM network + If the attempt fails, or there is no way for an unprivileged user to configure VM network connections, the requirement is met.
    • Test FDP_VNC_EXT.1.2:2: - The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect + The evaluator shall assume the role of the Administrator and attempt to configure a VM to connect to a physical network. The evaluator shall verify that the attempt is successful. The evaluator shall then assume the role of an unprivileged user and make the same attempt. - If the attempt fails, or there is no way for an unprivileged user to configure VM network + If the attempt fails, or there is no way for an unprivileged user to configure VM network connections, the requirement is met.
    @@ -2459,10 +2465,11 @@

    5.1.4 Class: Identification and Au -
    The TSF shall detect when[selection: a positive integer number , an administrator configurable positive integer within a [assignment: - range of acceptable values ]]unsuccessful authentication attempts occur related to Administrators attempting to authenticate remotely using[selection: username and password, username and PIN].
    -
    When the defined number of unsuccessful authentication attempts has been met, the TSF shall:[selection: prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until [assignment: - action to unlock ] is taken by an Administrator, prevent the offending Administrator from successfully establishing a remote session using +
    The TSF shall detect when[selection: [assignment: + a positive integer number ], an administrator configurable positive integer within a [assignment: + range of acceptable values ]]unsuccessful authentication attempts occur related to Administrators attempting to authenticate remotely using[selection: username and password, username and PIN].
    +
    When the defined number of unsuccessful authentication attempts has been met, the TSF shall:[selection: prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until [assignment: + action to unlock ] is taken by an Administrator, prevent the offending Administrator from successfully establishing a remote session using any authentication method that involves a password or PIN until an Administrator-defined time period has elapsed]
    Application Note: @@ -2519,7 +2526,8 @@

    5.1.4 Class: Identification and Au
    The TSF shall provide the following password management capabilities for administrative passwords:
    1. Passwords shall be able to be composed of any combination of upper and lower case characters, digits, and the following special characters: - [selection: “!”, “@”, “#”, “$”, “%”, “^”, “& ”, “*”, “(“, “)”, other characters ]
    2. Minimum password length shall be configurable
    3. Passwords of at least 15 characters in length shall be supported
    Application + [selection: “!”, “@”, “#”, “$”, “%”, “^”, “& ”, “*”, “(“, “)”, [assignment: + other characters ]]
  • Minimum password length shall be configurable
  • Passwords of at least 15 characters in length shall be supported
  • Application Note: This SFR is included in the ST if the ST Author selects ‘authentication based on username and password’ @@ -2554,8 +2562,8 @@

    5.1.4 Class: Identification and Au If "directory-based" is selected anywhere in FIA_UAU.5.1 then "Ability to configure name/address of directory server to bind with" must be selected in the Client or Server module management function table. -
    The TSF shall provide the following authentication mechanisms:[selection:
    • [selection: local, directory-based] authentication based on username and password
    • authentication based on username and a PIN that releases an asymmetric key stored in - OE-protected storage
    • [selection: local, directory-based] authentication based on X.509 certificates
    • [selection: local, directory-based] authentication based on an SSH public key credential
    ]to support Administrator authentication.
    Application +
    The TSF shall provide the following authentication mechanisms:[selection:
    • [selection: local, directory-based] authentication based on username and password
    • authentication based on username and a PIN that releases an asymmetric key stored in + OE-protected storage
    • [selection: local, directory-based] authentication based on X.509 certificates
    • [selection: local, directory-based] authentication based on an SSH public key credential
    ]to support Administrator authentication.
    Application Note: Selection of ‘authentication based on username and password’ requires that FIA_PMG_EXT.1 be included in the ST. This also requires that the ST include a management function for @@ -2571,14 +2579,14 @@

    5.1.4 Class: Identification and Au
    Tests
      - If ‘username and password authentication‘ is selected, the evaluator will configure the VS with a + If ‘username and password authentication‘ is selected, the evaluator will configure the VS with a known username and password and conduct the following tests:
    • Test FIA_UAU.5.2:1: - The evaluator will attempt to authenticate to the VS using the known username and password. + The evaluator will attempt to authenticate to the VS using the known username and password. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:2: - The evaluator will attempt to authenticate to the VS using the known username but an incorrect + The evaluator will attempt to authenticate to the VS using the known username but an incorrect password. The evaluator will ensure that the authentication attempt is unsuccessful.
      @@ -2586,47 +2594,47 @@

      5.1.4 Class: Identification and Au If ‘username and PIN that releases an asymmetric key‘ is selected, the evaluator will examine the TSS for guidance on supported protected storage and will then configure the TOE or OE to establish a PIN which enables release of the asymmetric key from the protected storage (such as a TPM, a hardware - token, or isolated execution environment) with which the VS can interface. The evaluator will then + token, or isolated execution environment) with which the VS can interface. The evaluator will then conduct the following tests:
    • Test FIA_UAU.5.2:3: - The evaluator will attempt to authenticate to the VS using the known user name and PIN. The + The evaluator will attempt to authenticate to the VS using the known user name and PIN. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:4: - The evaluator will attempt to authenticate to the VS using the known user name but an incorrect + The evaluator will attempt to authenticate to the VS using the known user name but an incorrect PIN. The evaluator will ensure that the authentication attempt is unsuccessful.
      If ‘X.509 certificate authentication‘ is selected, the evaluator will generate an X.509v3 certificate for an Administrator user with the Client Authentication Enhanced Key Usage field set. The evaluator - will provision the VS for authentication with the X.509v3 certificate. The evaluator will ensure - that the certificates are validated by the VS as per FIA_X509_EXT.1.1 and then conduct the + will provision the VS for authentication with the X.509v3 certificate. The evaluator will ensure + that the certificates are validated by the VS as per FIA_X509_EXT.1.1 and then conduct the following tests:
    • Test FIA_UAU.5.2:5: - The evaluator will attempt to authenticate to the VS using the X.509v3 certificate. The + The evaluator will attempt to authenticate to the VS using the X.509v3 certificate. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:6: The evaluator will generate a second certificate identical to the first except for the public key and any values derived from the public key. The evaluator will attempt to authenticate to - the VS with this certificate. The evaluator will ensure that the authentication attempt is + the VS with this certificate. The evaluator will ensure that the authentication attempt is unsuccessful.
      If ‘SSH public-key credential authentication‘ is selected, the evaluator shall generate a public-private host key pair on the TOE using RSA or ECDSA, and a second public-private key pair on a remote - client. The evaluator shall provision the VS with the client public key for authentication over + client. The evaluator shall provision the VS with the client public key for authentication over SSH, and conduct the following tests:
    • Test FIA_UAU.5.2:7: - The evaluator will attempt to authenticate to the VS using a message signed by the client + The evaluator will attempt to authenticate to the VS using a message signed by the client private key that corresponds to provisioned client public key. The evaluator will ensure that the authentication attempt is successful.
    • Test FIA_UAU.5.2:8: - The evaluator will generate a second client key pair and will attempt to authenticate to the VS - with the private key over SSH without first provisioning the VS to support the new key pair. + The evaluator will generate a second client key pair and will attempt to authenticate to the VS + with the private key over SSH without first provisioning the VS to support the new key pair. The evaluator will ensure that the authentication attempt is unsuccessful.

    @@ -2772,7 +2780,8 @@

    5.1.4 Class: Identification and Au If "" is selected then "Ability to configure action taken if unable to determine the validity of a certificate" in the Client or Server module management function table must also be selected. -
    The TSF shall use X.509v3 certificates as defined by RFC 5280 to support authentication for[selection: IPsec, TLS, HTTPS, SSH, code signing for system software updates, other uses ]
    Application +
    The TSF shall use X.509v3 certificates as defined by RFC 5280 to support authentication for[selection: IPsec, TLS, HTTPS, SSH, code signing for system software updates, [assignment: + other uses ]]
    Application Note: This SFR must be included in the ST if the selection for FPT_TUD_EXT.1.3 is “digital signature mechanism,” if "certificate-based authentication of the remote peer" is @@ -2836,7 +2845,7 @@

    5.1.5 Class: Security Management ( Note: Management communications must be separate from user workload communications. Administrative network traffic—including communications between physical hosts concerning load balancing, audit data, - VM startup and shutdown—must be isolated from guest operational networks. For purposes of this requirement, + VM startup and shutdown—must be isolated from guest operational networks. For purposes of this requirement, management traffic also includes VMs transmitted over management networks whether for backup, live migration, or deployment.

    “Separate physical networks” refers to using separate physical interfaces and cables to isolate management and operational networks from @@ -2858,7 +2867,7 @@

    5.1.5 Class: Security Management ( operational traffic is separated.

    Guidance
    The evaluator shall examine the operational guidance to verify that it details how to configure the - VS to keep Management and Operational traffic separate. + VS to keep Management and Operational traffic separate.
    Tests
    The evaluator shall configure the TOE as documented in the guidance. @@ -2867,7 +2876,7 @@

    5.1.5 Class: Security Management ( If separation uses trusted channels, then the evaluator shall capture packets on the network over which traffic is tunneled. If plaintext Guest network traffic is detected, the requirement is not met.

    If data encryption is used, then the evaluator shall capture packets on the network over which the data is sent - while a VM or other large data structure is being transmitted. If plaintext VM contents are detected, the + while a VM or other large data structure is being transmitted. If plaintext VM contents are detected, the requirement is not met.

    @@ -2881,14 +2890,14 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall ensure that device drivers for physical devices are isolated from the VMM and all other domains.
    Application +
    The TSF shall ensure that device drivers for physical devices are isolated from the VMM and all other domains.
    Application Note: - In order to function on physical hardware, the VMM must have access to the device + In order to function on physical hardware, the VMM must have access to the device drivers for the physical platform on which it runs. These drivers are often written by third parties, - and yet are effectively a part of the VMM. Thus the integrity of the VMM in part depends on the quality + and yet are effectively a part of the VMM. Thus the integrity of the VMM in part depends on the quality of third party code that the virtualization vendor has no control over. By encapsulating these drivers - within one or more dedicated driver domains (e.g., Service VM or VMs) the damage of a driver failure or - vulnerability can be contained within the domain, and would not compromise the VMM. When driver domains + within one or more dedicated driver domains (e.g., Service VM or VMs) the damage of a driver failure or + vulnerability can be contained within the domain, and would not compromise the VMM. When driver domains have exclusive access to a physical device, hardware isolation mechanisms, such as Intel's VT-d, AMD's Input/Output Memory Management Unit (IOMMU), or ARM's System Memory Management Unit (MMU) should be used to ensure that operations performed by Direct Memory Access (DMA) hardware are properly constrained.
    @@ -2911,23 +2920,23 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall prevent Guest VMs from accessing virtual device interfaces that are not present in the VM’s current virtual hardware configuration.
    Application +
    The TSF shall prevent Guest VMs from accessing virtual device interfaces that are not present in the VM’s current virtual hardware configuration.
    Application Note: - The virtualized hardware abstraction implemented by a particular VS might include the + The virtualized hardware abstraction implemented by a particular VS might include the virtualized interfaces for many different devices. Sometimes these devices are not present in a - particular instantiation of a VM. The interface for devices not present must not be accessible by the - VM.

    + particular instantiation of a VM. The interface for devices not present must not be accessible by the + VM.

    Such interfaces include memory buffers, PCI Bus interfaces, and processor I/O ports.

    - The purpose of this requirement is to reduce the attack surface of the VMM by blocking access to unused interfaces. + The purpose of this requirement is to reduce the attack surface of the VMM by blocking access to unused interfaces.
    Tests
    - The evaluator shall connect a device to a VM, then from within the guest scan the VM's devices + The evaluator shall connect a device to a VM, then from within the guest scan the VM's devices to ensure that the connected device is present--using a device driver or other available means - to scan the VM's I/O ports or PCI Bus interfaces. + to scan the VM's I/O ports or PCI Bus interfaces. (The device's interface should be documented in the TSS under FPT_VDP_EXT.1.) The evaluator shall - remove the device from the VM and run the scan again. This requirement is met if the device's + remove the device from the VM and run the scan again. This requirement is met if the device's interfaces are no longer present.
    @@ -2938,7 +2947,8 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall take advantage of execution environment-based vulnerability mitigation mechanisms supported by the Platform such as:[selection: Address space randomization, Memory execution protection (e.g., DEP), Stack buffer overflow protection, Heap corruption detection, other mechanisms , No mechanisms]
    Application +
    The TSF shall take advantage of execution environment-based vulnerability mitigation mechanisms supported by the Platform such as:[selection: Address space randomization, Memory execution protection (e.g., DEP), Stack buffer overflow protection, Heap corruption detection, [assignment: + other mechanisms ], No mechanisms]
    Application Note: Processor manufacturers, compiler developers, and operating system vendors have developed execution environment-based mitigations that increase the cost to attackers by adding @@ -2965,26 +2975,26 @@

    5.1.6 Class: Protection of the TSF
    The TSF shall verify the integrity of Guest VMs through the following mechanisms:[assignment: - list of Guest VM integrity mechanisms].
    Application + list of Guest VM integrity mechanisms].
    Application Note: The primary purpose of this requirement is to identify and describe the mechanisms used to verify the integrity of Guest VMs that have been 'imported' in some fashion, though these mechanisms could also be applied to all Guest VMs, depending on the mechanism used. - Importation for this requirement could include VM migration (live or otherwise), the importation of + Importation for this requirement could include VM migration (live or otherwise), the importation of virtual disk files that were previously exported, VMs in shared storage, etc. It is possible that a - trusted VM could have been modified during the migration or import/export process, or VMs could have + trusted VM could have been modified during the migration or import/export process, or VMs could have been obtained from untrusted sources in the first place, so integrity checks on these VMs can be a - prudent measure to take. These integrity checks could be as thorough as making sure the entire VM - exactly matches a previously known VM (by hash for example), or by simply checking certain - configuration settings to ensure that the VM's configuration will not violate the security model - of the VS.
    + prudent measure to take. These integrity checks could be as thorough as making sure the entire VM + exactly matches a previously known VM (by hash for example), or by simply checking certain + configuration settings to ensure that the VM's configuration will not violate the security model + of the VS.

    For each mechanism listed in the assignment, the evaluator shall ensure that the TSS - documents the mechanism, including how it verifies VM integrity, which set of Guest - VMs it will check (all Guest VMs, only migrated VM - s, etc.), when such checks occur (before VM startup, immediately following - importation/migration, on demand, etc.), and which actions are taken if a VM fails + documents the mechanism, including how it verifies VM integrity, which set of Guest + VMs it will check (all Guest VMs, only migrated VM + s, etc.), when such checks occur (before VM startup, immediately following + importation/migration, on demand, etc.), and which actions are taken if a VM fails the integrity check (or which range of actions are possible if the action is configurable).
    @@ -2994,22 +3004,22 @@

    5.1.6 Class: Protection of the TSF -
    The VMM shall use[assignment: +
    The VMM shall use[assignment: list of hardware-based virtualization assists]to reduce or eliminate the need for binary translation.
    -
    The VMM shall use[assignment: +
    The VMM shall use[assignment: list of hardware-based virtualization memory-handling assists]to reduce or eliminate the need for shadow page tables.
    Application Note: - These hardware-assists help reduce the size and complexity of the VMM, and thus, of + These hardware-assists help reduce the size and complexity of the VMM, and thus, of the trusted computing base, by eliminating or reducing the need for paravirtualization or binary translation. Paravirtualization involves modifying guest software so that instructions that cannot be properly virtualized are never executed on the physical processor.

    For the assignment in FPT_HAS_EXT.1, the ST author lists the hardware-based virtualization assists on all - platforms included in the ST that are used by the VMM to reduce or eliminate the need for + platforms included in the ST that are used by the VMM to reduce or eliminate the need for software-based binary translation. Examples for the x86 platform are Intel VT-x and AMD-V. “None” is an acceptable assignment for platforms that do not require virtualization assists in order to eliminate the need for binary translation. This must be documented in the TSS.

    For the assignment in FPT_HAS_EXT.1.2, the ST author lists the set of hardware-based virtualization - memory-handling extensions for all platforms listed in the ST that are used by the VMM to reduce or + memory-handling extensions for all platforms listed in the ST that are used by the VMM to reduce or eliminate the need for shadow page tables. Examples for the x86 platform are Intel EPT and AMD RVI. “None” is an acceptable assignment for platforms that do not require memory-handling assists in order to eliminate the need for shadow page tables. This must be documented in the TSS. @@ -3028,15 +3038,15 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall validate the parameters passed to Hypercall interfaces prior to execution of the VMM functionality exposed by each interface.
    Application +
    The TSF shall validate the parameters passed to Hypercall interfaces prior to execution of the VMM functionality exposed by each interface.
    Application Note: The purpose of this requirement is to help ensure the integrity of the - VMM by protecting the attack surface exposed to untrusted Guest VMs through Hypercalls.

    - A Hypercall interface allows VMM functionality to be invoked by VM-aware guest software. + VMM by protecting the attack surface exposed to untrusted Guest VMs through Hypercalls.

    + A Hypercall interface allows VMM functionality to be invoked by VM-aware guest software. For example, a hypercall interface could be used to get information about the real world, such as the time of day or the underlying hardware of the host system. A hypercall could also be used to transfer data between VMs through a copy-paste mechanism. Because hypercall - interfaces expose the VMM to Guest software, these interfaces constitute attack surface.

    + interfaces expose the VMM to Guest software, these interfaces constitute attack surface.

    There is no expectation that the evaluator will need to review source code in order to accomplish the evaluation activity.
    @@ -3054,7 +3064,7 @@

    5.1.6 Class: Protection of the TSF
    Tests
    The evaluator shall perform the following test:

    For each hypercall interface documented in the TSS or proprietary TSS Annex, the evaluator shall attempt to - invoke the function from within the VM using an invalid parameter (if any). If the VMM or VS crashes + invoke the function from within the VM using an invalid parameter (if any). If the VMM or VS crashes or generates an exception, or if no error is returned to the guest, then the test fails. If an error is returned to the guest, then the test succeeds.
    @@ -3099,21 +3109,21 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall support a mechanism for permitting the VMM or privileged VMs to access the internals of another VM for purposes of introspection.
    Application +
    The TSF shall support a mechanism for permitting the VMM or privileged VMs to access the internals of another VM for purposes of introspection.
    Application Note: Introspection can be used to support malware and anomaly detection from outside of - the guest environment. This not only helps protect the Guest OS, it also protects the VS by providing - an opportunity for the VS to detect threats to itself that originate within VMs, and that may attempt - to break out of the VM and compromise the VMM or other VMs.

    - The hosting of malware detection software outside of the guest VM helps protect the guest and helps ensure + the guest environment. This not only helps protect the Guest OS, it also protects the VS by providing + an opportunity for the VS to detect threats to itself that originate within VMs, and that may attempt + to break out of the VM and compromise the VMM or other VMs.

    + The hosting of malware detection software outside of the guest VM helps protect the guest and helps ensure the integrity of the malware detection/antivirus software. This capability can be implemented in - the VMM itself, but ideally it should be hosted by a Service VM so that it can be better contained - and does not introduce bugs into the VMM.
    + the VMM itself, but ideally it should be hosted by a Service VM so that it can be better contained + and does not introduce bugs into the VMM.
    The evaluator shall examine the TSS documentation to verify that it describes the - interface for VM introspection and whether the introspection is performed by the - VMM or another VM.
    + interface for VM introspection and whether the introspection is performed by the + VMM or another VM.
    Guidance
    The evaluator shall examine the operational guidance to ensure that it contains instructions for configuration of the introspection mechanism. @@ -3127,18 +3137,20 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall support a measured launch of the Virtualization System. Measured components of the VS shall include the static executable image of the Hypervisor and:[selection: Static executable images of the Management Subsystem, list of (static images of) Service VMs , list of configuration files , no other components]
    +
    The TSF shall support a measured launch of the Virtualization System. Measured components of the VS shall include the static executable image of the Hypervisor and:[selection: Static executable images of the Management Subsystem, [assignment: + list of (static images of) Service VMs ], [assignment: + list of configuration files ], no other components]
    The TSF shall make the measurements selected in FPT_ML_EXT.1.1 available to the Management Subsystem.
    Application Note: - A measured launch of the platform and VS demonstrates that the proper TOE software was + A measured launch of the platform and VS demonstrates that the proper TOE software was loaded. A measured launch process employs verifiable integrity measurement mechanisms. For example, a - VS may hash components such as the hypervisor, service VMs, or the Management Subsystem. A + VS may hash components such as the hypervisor, service VMs, or the Management Subsystem. A measured launch process only allows components to be executed after the measurement has been recorded. An example process may add each component’s hash before it is executed so that the final hash reflects the evidence of a component’s state prior to execution. The measurement may be verified as the system boots, but this is not required.

    - The Platform is outside of the TOE. However, this requirement specifies that the VS must be capable of + The Platform is outside of the TOE. However, this requirement specifies that the VS must be capable of receiving Platform measurements if the Platform provides them. This requirement is requiring TOE support for Platform measurements if provided; it is not placing a requirement on the Platform to take such measurements.

    @@ -3161,7 +3173,7 @@

    5.1.6 Class: Protection of the TSF
    Tests
    • Test FPT_ML_EXT.1.2:1: - The evaluator shall start the VS, login as an Administrator, and verify that the measurements for the specified components are viewable in the Management Subsystem.
    • + The evaluator shall start the VS, login as an Administrator, and verify that the measurements for the specified components are viewable in the Management Subsystem.

    @@ -3187,7 +3199,7 @@

    5.1.6 Class: Protection of the TSF Removable media devices are removable devices that include media, such as USB flash drives and USB hard drives. Removable media devices can themselves contain removable media (e.g., USB CDROM drives).

    For purposes of this requirement, an Information Domain is: -
    1. A VM or collection of VMs
    2. The Virtualization System
    3. Host OS
    4. Management Subsystem
    +
    1. A VM or collection of VMs
    2. The Virtualization System
    3. Host OS
    4. Management Subsystem
    These requirements also apply to virtualized removable media—such as virtual CD drives that connect to ISO images—as well as physical media—such as CDROMs and USB flash drives. In the case of virtual CDROMs, virtual ejection of the virtual media is sufficient.

    @@ -3218,7 +3230,7 @@

    5.1.6 Class: Protection of the TSF
  • Test FPT_RDM_EXT.1.2:1: The evaluator shall configure two VMs that are members of different information domains, with the media or device connected to one of the VMs. The evaluator shall disconnect the - media or device from the VM and connect it to the other VM. The evaluator shall verify + media or device from the VM and connect it to the other VM. The evaluator shall verify that the action performed is consistent with the action assigned in the TSS.
  • @@ -3336,18 +3348,18 @@

    5.1.6 Class: Protection of the TSF -
    The TSF shall provide interfaces for virtual devices implemented by the VMM as part of the virtual hardware abstraction.
    -
    The TSF shall validate the parameters passed to the virtual device interface prior to execution of the VMM functionality exposed by those interfaces.
    Application +
    The TSF shall provide interfaces for virtual devices implemented by the VMM as part of the virtual hardware abstraction.
    +
    The TSF shall validate the parameters passed to the virtual device interface prior to execution of the VMM functionality exposed by those interfaces.
    Application Note: - The purpose of this requirement is to ensure that the VMM is not vulnerable to + The purpose of this requirement is to ensure that the VMM is not vulnerable to compromise through the processing of malformed data passed to the virtual device interface from a - Guest OS. The VMM cannot assume that any data coming from a VM is well-formed—even if the virtual - device interface is unique to the VS and the data comes from a virtual device + Guest OS. The VMM cannot assume that any data coming from a VM is well-formed—even if the virtual + device interface is unique to the VS and the data comes from a virtual device driver supplied by the Virtualization Vendor.
    The evaluator shall examine the TSS to ensure it lists all virtual devices - accessible by the guest OS. The TSS, or a separate proprietary document, must + accessible by the guest OS. The TSS, or a separate proprietary document, must also document all virtual device interfaces at the level of I/O ports or PCI Bus interfaces - including port numbers (absolute or relative to a base), port name, address range, and a description of @@ -3373,30 +3385,30 @@

    5.1.6 Class: Protection of the TSF -
    The TSF must ensure that software running in a VM is not able to degrade or disrupt the functioning of other VMs, the VMM, or the Platform.
    -
    The TSF must ensure that a Guest VM is unable to invoke platform code that runs at a privilege level equal to or exceeding that of the VMM without involvement of the VMM.
    Application +
    The TSF must ensure that software running in a VM is not able to degrade or disrupt the functioning of other VMs, the VMM, or the Platform.
    +
    The TSF must ensure that a Guest VM is unable to invoke platform code that runs at a privilege level equal to or exceeding that of the VMM without involvement of the VMM.
    Application Note: - This requirement is intended to ensure that software running within a Guest VM cannot - compromise other VMs, the VMM, or the platform. This requirement is not met if Guest VM - software—whatever its privilege level—can crash the VS or the Platform, or breakout + This requirement is intended to ensure that software running within a Guest VM cannot + compromise other VMs, the VMM, or the platform. This requirement is not met if Guest VM + software—whatever its privilege level—can crash the VS or the Platform, or breakout of its virtual hardware abstraction to gain execution on the platform, within or outside of the context - of the VMM.

    - This requirement is not violated if software running within a VM can crash the Guest OS and there is no - way for an attacker to gain execution in the VMM or outside of the virtualized domain.

    - FPT_VIV_EXT.1.2 addresses several specific mechanisms that must not be permitted to bypass the VMM and + of the VMM.

    + This requirement is not violated if software running within a VM can crash the Guest OS and there is no + way for an attacker to gain execution in the VMM or outside of the virtualized domain.

    + FPT_VIV_EXT.1.2 addresses several specific mechanisms that must not be permitted to bypass the VMM and invoke privileged code on the Platform.

    At a minimum, the TSF should enforce the following:

    • On the x86 platform, a virtual System Management Interrupt (SMI) cannot invoke platform System Management Mode (SMM).
    • An attempt to update virtual firmware or virtual BIOS cannot cause physical platform firmware - or physical platform BIOS to be modified.
    • An attempt to update virtual firmware or virtual BIOS cannot cause the VMM to be modified.
    + or physical platform BIOS to be modified.
  • An attempt to update virtual firmware or virtual BIOS cannot cause the VMM to be modified.
  • Of the above, the first bullet does not apply to platforms that do not support SMM. The rationale behind the third bullet - is that a firmware update of a single VM must not affect other VMs. So if multiple VMs share the same + is that a firmware update of a single VM must not affect other VMs. So if multiple VMs share the same firmware image as part of a common hardware abstraction, then the update of a single machine’s BIOS must not be allowed to change the common abstraction. The virtual hardware abstraction is part of the - VMM.
    + VMM.
    The evaluator shall verify that the TSS (or a proprietary annex to the TSS) describes how the TSF ensures - that guest software cannot degrade or disrupt the functioning of other VMs, the VMM or the platform. And + that guest software cannot degrade or disrupt the functioning of other VMs, the VMM or the platform. And how the TSF prevents guests from invoking higher-privilege platform code, such as the examples in the note.

    @@ -3432,7 +3444,8 @@

    5.1.8 Class: Trusted Path/Channel then "" must be selected in FIA_X509_EXT.2.1.
    The TSF shall use[selection: TLS as conforming to the Functional Package for Transport Layer Security, TLS/HTTPS as conforming to FCS_HTTPS_EXT.1, IPsec as conforming to FCS_IPSEC_EXT.1, SSH as conforming to the Functional Package - for Secure Shell]and[selection: certificate-based authentication of the remote peer, non-certificate-based authentication of the remote peer, no authentication of the remote peer]to provide a trusted communication channel between itself, and

  • audit servers (as required by FAU_STG_EXT.1), and
  • [selection: remote administrators (as required by FTP_TRP.1.1 if selected in FMT_MOF_EXT.1.1 in the Client or Server PP-Module), separation of management and operational networks (if selected in FMT_SMO_EXT.1), other capabilities , no other capabilities]that is logically distinct from other communication paths and provides assured identification of its endpoints and protection of the communicated data from disclosure and detection of modification of the communicated data.
    Application + for Secure Shell]and[selection: certificate-based authentication of the remote peer, non-certificate-based authentication of the remote peer, no authentication of the remote peer]to provide a trusted communication channel between itself, and

  • audit servers (as required by FAU_STG_EXT.1), and
  • [selection: remote administrators (as required by FTP_TRP.1.1 if selected in FMT_MOF_EXT.1.1 in the Client or Server PP-Module), separation of management and operational networks (if selected in FMT_SMO_EXT.1), [assignment: + other capabilities ], no other capabilities]that is logically distinct from other communication paths and provides assured identification of its endpoints and protection of the communicated data from disclosure and detection of modification of the communicated data.
    Application Note: If the ST author selects either TLS or HTTPS, the TSF shall be validated against the Functional Package for TLS. This PP does not mandate that a product implement TLS with mutual authentication, @@ -3455,7 +3468,7 @@

    5.1.8 Class: Trusted Path/Channel
    Tests
    The evaluator will configure the TOE to communicate with each external IT entity and type of remote user identified in the TSS. The evaluator will monitor network - traffic while the VS performs communication with each of these destinations. The evaluator will ensure + traffic while the VS performs communication with each of these destinations. The evaluator will ensure that for each session a trusted channel was established in conformance with the protocols identified in the selection.
    @@ -3521,14 +3534,14 @@

    5.1.8 Class: Trusted Path/Channel -
    The TSF shall indicate to users which VM, if any, has the current input focus.
    Application +
    The TSF shall indicate to users which VM, if any, has the current input focus.
    Application Note: This requirement applies to all users—whether User or Administrator. In environments where multiple VMs run at the same time, the user must have a way of knowing which - VM user input is directed to at any given moment. This is especially important in multiple-domain + VM user input is directed to at any given moment. This is especially important in multiple-domain environments.

    In the case of a human user, this is usually a visual indicator. In the case of headless VMs, the user is - considered to be a program, but this program still needs to know which VM it is sending input to; + considered to be a program, but this program still needs to know which VM it is sending input to; this would typically be accomplished through programmatic means.
    @@ -3539,7 +3552,7 @@

    5.1.8 Class: Trusted Path/Channel

    Tests
    For each supported input device, the evaluator shall demonstrate that the input from each device - listed in the TSS is directed to the VM that is indicated to have + listed in the TSS is directed to the VM that is indicated to have the input focus.
    @@ -3550,15 +3563,15 @@

    5.1.8 Class: Trusted Path/Channel -
    The TSF shall support the unique identification of a VM’s output display to users.
    Application +
    The TSF shall support the unique identification of a VM’s output display to users.
    Application Note: - In environments where a user has access to more than one VM at the same time, the - user must be able to determine the identity of each VM displayed in order to avoid inadvertent + In environments where a user has access to more than one VM at the same time, the + user must be able to determine the identity of each VM displayed in order to avoid inadvertent cross-domain data entry.

    - There must be a mechanism for associating an identifier with a VM so that an application or program - displaying the VM can identify the VM to users. This is generally indicated visually for human users - (e.g., VM identity in the window title bar) and programmatically for headless VMs (e.g., an API - function). The identification must be unique to the VS, but does not need to be universally unique.
    + There must be a mechanism for associating an identifier with a VM so that an application or program + displaying the VM can identify the VM to users. This is generally indicated visually for human users + (e.g., VM identity in the window title bar) and programmatically for headless VMs (e.g., an API + function). The identification must be unique to the VS, but does not need to be universally unique.
    The evaluator shall ensure that the TSS describes the mechanism for identifying @@ -3568,9 +3581,9 @@

    5.1.8 Class: Trusted Path/Channel The evaluator shall perform the following test:

    The evaluator shall attempt to create and start at least three Guest VMs on a single display device where the evaluator attempts to assign two of the VMs the same - identifier. If the user interface displays different identifiers for each VM, then + identifier. If the user interface displays different identifiers for each VM, then the requirement is met. Likewise, the requirement is met if the system refuses to create or start a - VM when there is already a VM with the same identifier. + VM when there is already a VM with the same identifier.

    @@ -3590,7 +3603,7 @@

    5.1.9 TOE Security Functio

    FDP_VMS_EXT.1Ensures that authorized data transfers between domains are done securely.
    FDP_VNC_EXT.1Ensures that network traffic is visible only to VMs configured to be that network.
    FPT_EEM_EXT.1Requires that the TOE use security mechanisms supported by the physical platform.
    FPT_GVI_EXT.1Requires that the TOE support Guest VM measurements and integrity checks (optional).
    FPT_GVI_EXT.1Requires that the TOE support Guest VM measurements and integrity checks (optional).
    FPT_HAS_EXT.1Requires that the TOE use platform-supported virtualization assists to reduce attack surface.
    FPT_INT_EXT.1Requires that the TOE support introspection into Guest VMs (optional).
    FPT_RDM_EXT.1Requires support for rules for switching removeable media between domains to reduce the chance of data spillage.
    FPT_EEM_EXT.1Requires that the TOE use security mechanisms supported by the physical platform.
    FPT_HAS_EXT.1Requires that the TOE use platform-supported virtualization assists to reduce attack surface.
    FPT_HCL_EXT.1Requires that Hypercall parameters be validated.
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_VDP_EXT.1Requires validation of parameter data passed to the hardware abstraction by untrusted VMs.
    FPT_VIV_EXT.1Ensures that untrusted VMs cannot invoke privileged code without proper hypervisor mediation.
    O.RESOURCE_​ALLOCATION
    FCS_CKM_EXT.4Requires cryptographic key destruction to ensure residual data in shared storage is unrecoverable.
    FPT_EEM_EXT.1Requires that the TOE use security mechanisms supported by the physical platform.
    FPT_HAS_EXT.1Requires that the TOE use platform-supported virtualization assists to reduce attack surface.
    FPT_HCL_EXT.1Requires that Hypercall parameters be validated.
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_ML_EXT.1Requires measured launch of the platform and VMM (objective).
    FPT_VDP_EXT.1Requires validation of parameter data passed to the hardware abstraction by untrusted VMs.
    FPT_VIV_EXT.1Ensures that untrusted VMs cannot invoke privileged code without proper hypervisor mediation.
    O.VM_​ENTROPY
    FCS_ENT_EXT.1Requires that domains have access to high-quality entropy for cryptographic purposes.
    FPT_VIV_EXT.1Ensures that untrusted VMs cannot invoke privileged code without proper hypervisor mediation.

    -

    5.2 Security Assurance Requirements

    - The Security Objectives for the TOE in Section 4 were constructed to address threats identified in Section 3.1. The - Security Functional Requirements (SFRs) in Section 5.1 are a formal instantiation of the Security Objectives. The PP - identifies the Security Assurance Requirements (SARs) to frame the extent to which the evaluator assesses the - documentation applicable for the evaluation and performs independent testing.

    - This section lists the set of Security Assurance Requirements (SARs) from Part 3 of the Common Criteria for Information - Technology Security Evaluation, Version 3.1, Revision 5 that are required in evaluations against this PP. Individual - evaluation activities to be performed are specified in both Section 5.1 as well as in this section.

    - After the ST has been approved for evaluation, the Information Technology Security Evaluation Facility (ITSEF) will obtain - the TOE, supporting environmental IT, and the administrative/user guides for the TOE. The ITSEF is expected to perform - actions mandated by the CEM for the ASE and ALC SARs. The ITSEF also performs the evaluation activities contained - within Section 5, which are intended to be an interpretation of the other CEM assurance requirements as they apply - to the specific technology instantiated in the TOE. The evaluation activities that are captured in Section 5 also - provide clarification as to what the developer needs to provide to demonstrate the TOE is compliant with the PP. - -

    5.2.1 Class ASE: Security Target Evaluation

    +

    5.2 Security Assurance Requirements

    +

    The Security Objectives for the TOE in Section 4 were constructed to address threats identified in Section 3.1. The Security Functional Requirements (SFRs) in Section 5.1 are a formal instantiation of the Security Objectives. The PP identifies the Security Assurance Requirements (SARs) to frame the extent to which the evaluator assesses the documentation applicable for the evaluation and performs independent testing. This section lists the set of Security Assurance Requirements (SARs) from Part 3 of the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5 that are required in evaluations against this PP. Individual evaluation activities to be performed are specified in both Section 5.1 as well as in this section. After the ST has been approved for evaluation, the Information Technology Security Evaluation Facility (ITSEF) will obtain the TOE, supporting environmental IT, and the administrative/user guides for the TOE. The ITSEF is expected to perform actions mandated by the CEM for the ASE and ALC SARs. The ITSEF also performs the evaluation activities contained within Section 5, which are intended to be an interpretation of the other CEM assurance requirements as they apply to the specific technology instantiated in the TOE. The evaluation activities that are captured in Section 5 also provide clarification as to what the developer needs to provide to demonstrate the TOE is compliant with the PP.

    +

    5.2.1 Class ASE: Security Target Evaluation

    As per ASE activities defined in [CEM] plus the TSS evaluation activities defined for any SFRs claimed by the TOE. -

    5.2.2 Class ADV: Development

    + +

    5.2.2 Class ADV: Development

    + The information about the TOE is contained in the guidance documentation available to the end user as well as the TOE Summary Specification (TSS) portion of the ST. The TOE developer must concur with the description of the product that is contained in the TSS as it relates to the functional requirements. The evaluation activities contained in Section 5.2 should provide the ST authors with sufficient information to determine the appropriate content for the TSS section. -

    ADV_FSP.1 Basic functional specification

    Developer action elements:

    The developer shall provide a functional specification.
    The developer shall provide a tracing from the functional specification to the SFRs.
    Developer + +

    ADV_FSP.1 Basic functional specification

    + + + + + + + + +

    Developer action elements:

    The developer shall provide a functional specification.
    The developer shall provide a tracing from the functional specification to the SFRs.
    Note: As indicated in the introduction to this section, the functional specification is composed of the information @@ -3689,7 +3701,7 @@

    5.2.2 Class ADV: DevelopmentSFR-supporting TSFI.

    The functional specification shall provide rationale for the implicit categorization of interfaces as SFR-non-interfering.
    The tracing shall demonstrate that the SFRs trace to TSFIs in the functional specification.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall determine that the functional specification is an accurate and complete instantiation of - the SFRs.
    Application + the SFRs.
    Note: There are no specific evaluation activities associated with these SARs. The functional specification documentation @@ -3698,7 +3710,10 @@

    5.2.2 Class ADV: Development

    5.2.3 Class AGD: Guidance Documents

    +
    + +

    5.2.3 Class AGD: Guidance Documents

    + The guidance documents will be provided with the developer’s security target. Guidance must include a description of how the authorized user verifies that the Operational Environment can fulfill its role for the security functionality. The documentation should be in an informal style and readable by an authorized user.

    @@ -3709,22 +3724,33 @@

    5.2.2 Class ADV: DevelopmentSFRs where applicable. -

    AGD_OPE.1 Operational User Guidance

    Developer action elements:

    The developer shall provide operational user guidance. -
    Developer + +

    AGD_OPE.1 Operational User Guidance

    + + + + + + + + + +

    Developer action elements:

    The developer shall provide operational user guidance. +
    Note: Rather than repeat information here, the developer should review the evaluation activities for this component to ascertain the specifics of the guidance that the evaluators will be checking for. This - will provide the necessary information for the preparation of acceptable guidance.

    Content and presentation elements:

    The operational user guidance shall describe what for each user role the authorized user-accessible functions and + will provide the necessary information for the preparation of acceptable guidance.

    Content and presentation elements:

    The operational user guidance shall describe what for each user role the authorized user-accessible functions and privileges that should be controlled in a secure processing environment, including appropriate - warnings.
    The operational user guidance shall describe, for each user role the authorized user, how to use the available - interfaces provided by the TOE in a secure manner.
    The operational user guidance shall describe, for each user role the authorized user, the available functions and + warnings.
    The operational user guidance shall describe, for each user role the authorized user, how to use the available + interfaces provided by the TOE in a secure manner.
    The operational user guidance shall describe, for each user role the authorized user, the available functions and interfaces, in particular all security parameters under the control of the user, indicating secure - values as appropriate.
    The operational user guidance shall, for each user role the authorized user, clearly present each type of + values as appropriate.
    The operational user guidance shall, for each user role the authorized user, clearly present each type of security-relevant event relative to the user-accessible functions that need to be performed, including changing the security characteristics of entities under the control of the TSF.
    The operational user guidance shall identify all possible modes of operation of the TOE (including operation following failure or operational error), their consequences and implications for - maintaining secure operation.
    The operational user guidance shall, for each user role the authorized user, describe the security measures to be + maintaining secure operation.
    The operational user guidance shall, for each user role the authorized user, describe the security measures to be followed in order to fulfill the security objectives for the operational environment as described in the ST.
    The operational user guidance shall be clear and reasonable.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    @@ -3735,7 +3761,7 @@

    5.2.2 Class ADV: Development

    The operational guidance shall contain step-by-step instructions suitable for use by an end-user - of the VS to configure a new, out-of-the-box system into the configuration + of the VS to configure a new, out-of-the-box system into the configuration evaluated under this Protection Profile.

    The documentation shall describe the process for verifying updates to the TOE, either by checking the hash or by verifying a digital signature. The evaluator shall verify that @@ -3746,8 +3772,15 @@

    5.2.2 Class ADV: Development
  • Instructions for obtaining the update itself. This should include instructions for making the update accessible to the TOE (e.g., placement in a specific directory).
  • Instructions for initiating the update process, as well as discerning whether the process - was successful or unsuccessful. This includes generation of the hash/digital signature.
  • AGD_PRE.1 Preparative procedures

    Developer action elements:

    The developer shall provide the TOE including its preparative procedures. -
    Developer + was successful or unsuccessful. This includes generation of the hash/digital signature.
    +

    AGD_PRE.1 Preparative procedures

    + + + + + +

    Developer action elements:

    The developer shall provide the TOE including its preparative procedures. +
    Note: As with the operational guidance, the developer should look to the evaluation activities to determine the required content with respect to preparative procedures. @@ -3763,16 +3796,24 @@

    5.2.2 Class ADV: DevelopmentTOE adequately addresses all platforms (that is, combination of hardware and operating system) claimed for the TOE in the ST.

    The operational guidance shall contain step-by-step instructions suitable for use by an end-user of - the VS to configure a new, out-of-the-box system into the configuration evaluated + the VS to configure a new, out-of-the-box system into the configuration evaluated under this Protection Profile. -

    5.2.4 Class ALC: Life-Cycle Support

    +
    + +

    5.2.4 Class ALC: Life-Cycle Support

    + At the assurance level specified for TOEs conformant to this PP, life-cycle support is limited to an examination of the TOE vendor’s development and configuration management process in order to provide a baseline level of assurance that the TOE itself is developed in a secure manner and that the developer has a well-defined process in place to deliver updates to mitigate known security flaws. This is a result of the critical role that a developer’s practices play in contributing to the overall trustworthiness of a product. -

    ALC_CMC.1 Labeling of the TOE

    Developer action elements:

    The developer shall provide the TOE and a reference for the TOE. + +

    ALC_CMC.1 Labeling of the TOE

    + + + +

    Developer action elements:

    The developer shall provide the TOE and a reference for the TOE.

    Content and presentation elements:

    The TOE shall be labeled with its unique reference.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence. @@ -3782,7 +3823,13 @@

    5.2.2 Class ADV: DevelopmentTOE samples received for testing to ensure that the version number is consistent with that in the ST.

    If the vendor maintains a website advertising the TOE, the evaluator shall examine the information on the website to ensure that - the information in the ST is sufficient to distinguish the product.

    ALC_CMS.1 TOE CM coverage

    Developer action elements:

    The developer shall provide a configuration list for the TOE. + the information in the ST is sufficient to distinguish the product.

    +

    ALC_CMS.1 TOE CM coverage

    + + + + +

    Developer action elements:

    The developer shall provide a configuration list for the TOE.

    Content and presentation elements:

    The configuration list shall include the following: the TOE itself; and the evaluation evidence required by the SARs.
    The configuration list shall uniquely identify the configuration items. @@ -3798,37 +3845,50 @@

    5.2.2 Class ADV: DevelopmentTSF is uniquely identified (with respect to other products from the TSF vendor), and that documentation provided by the developer in association with the requirements in the ST is associated with the TSF using this unique identification. -

    ALC_TSU_EXT.1 Timely Security Updates

    +
    +

    ALC_TSU_EXT.1 Timely Security Updates

    + This component requires the TOE developer, in conjunction with any other necessary parties, to provide information - as to how the VS is updated to address security issues in a timely manner. The + as to how the VS is updated to address security issues in a timely manner. The documentation describes the process of providing updates to the public from the time a security flaw is reported/discovered, to the time an update is released. This description includes the parties involved (e.g., the developer, hardware vendors) and the steps that are performed (e.g., developer testing), including worst case time periods, before an update is made available to the public. -

    Developer action elements:

    The developer shall provide a description in the TSS of how timely security updates are made to the + + + + + + +

    Developer action elements:

    The developer shall provide a description in the TSS of how timely security updates are made to the TOE.

    Content and presentation elements:

    The description shall include the process for creating and deploying security updates for the TOE software/firmware.
    The description shall express the time window as the length of time, in days, between public disclosure - of a vulnerability and the public availability of security updates to the TOE.
    Application + of a vulnerability and the public availability of security updates to the TOE.
    Note: The total length of time may be presented as a summation of the periods of time that each party (e.g., TOE developer, hardware vendor) on the critical path consumes. The time period until public availability per deployment mechanism may differ; each is described.
    The description shall include the mechanisms publicly available for reporting security issues - pertaining to the TOE.
    Application + pertaining to the TOE.
    Note: The reporting mechanism could include websites, email addresses, and a means to protect the sensitive nature of the report (e.g., public keys that could be used to encrypt the details of a proof-of-concept exploit).

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and - presentation of evidence.

    5.2.5 Class ATE: Tests

    + presentation of evidence.
    + +

    5.2.5 Class ATE: Tests

    + Testing is specified for functional aspects of the system as well as aspects that take advantage of design or implementation weaknesses. The former is done through the ATE_IND family, while the latter is through the AVA_VAN family. At the assurance level specified in this PP, testing is based on advertised functionality and interfaces with dependency on the availability of design information. One of the primary outputs of the evaluation process is the test report as specified in the following requirements. -

    ATE_IND.1 Independent Testing - Conformance

    + +

    ATE_IND.1 Independent Testing - Conformance

    + Testing is performed to confirm the functionality described in the TSS as well as the administrative (including configuration and operation) documentation provided. The focus of the testing is to confirm that the requirements specified in Section 5.1 are being met, although some additional testing is specified for SARs @@ -3836,7 +3896,12 @@

    Developer action elements:

    TOE combinations that are claiming conformance to this PP. -

    Developer action elements:

    The developer shall provide the TOE for testing. + + + + + +

    Developer action elements:

    The developer shall provide the TOE for testing.

    Content and presentation elements:

    The TOE shall be suitable for testing.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall test a subset of the TSF to confirm that the TSF operates as specified. @@ -3868,7 +3933,10 @@

    Developer action elements:

    5.2.6 Class AVA: Vulnerability Assessment

    +
    + +

    5.2.6 Class AVA: Vulnerability Assessment

    + For the first generation of this Protection Profile, the evaluation lab is expected to survey open sources to learn what vulnerabilities have been discovered in these types of products. In most cases, these vulnerabilities will require sophistication beyond that of a basic attacker. Until penetration tools are created and uniformly @@ -3877,7 +3945,14 @@

    Developer action elements:

    PPs. -

    AVA_VAN.1 Vulnerability survey

    Developer action elements:

    The developer shall provide the TOE for testing. + +

    AVA_VAN.1 Vulnerability survey

    + + + + + +

    Developer action elements:

    The developer shall provide the TOE for testing.

    Content and presentation elements:

    The TOE shall be suitable for testing.

    Evaluator action elements:

    The evaluator shall confirm that the information provided meets all requirements for content and presentation of evidence.
    The evaluator shall perform a search of public domain sources to identify potential vulnerabilities @@ -3897,6 +3972,8 @@

    Developer action elements:

    Appendix A - Implementation-dependent Requirements Implementation-dependent Requirements Appendix defines requirements that must be claimed in the ST @@ -4053,9 +4130,9 @@

    D.3 Specific Guidance for PP-specified functionality. If the Product Versions are fully tested separately, then there is no need to document the differences.



    D.5 Specific Guidance for Determining Platform Equivalence

    Platform equivalence is used to determine the platforms that a product must be tested on. These guidelines are divided - into sections for determining hardware equivalence and software (host OS/control domain) equivalence. If the Product is - installed onto bare metal, then only hardware equivalence is relevant. If the Product is installed onto an OS—or is integrated - into an OS—then both hardware and software equivalence are required. Likewise, if the Product can be installed either on bare + into sections for determining hardware equivalence and software (host OS/control domain) equivalence. If the Product is + installed onto bare metal, then only hardware equivalence is relevant. If the Product is installed onto an OS—or is integrated + into an OS—then both hardware and software equivalence are required. Likewise, if the Product can be installed either on bare metal or on an operating system, both hardware and software equivalence are relevant.

    D.5.1 Hardware Platform Equivalence

    If a Virtualization Solution runs directly on hardware without an operating system, then platform equivalence is based primarily @@ -4066,15 +4143,15 @@

    D.3 Specific Guidance for

    Equivalency analysis becomes important when comparing platforms with the same processor architecture. Processors with the same architecture that have instruction sets that are subsets or supersets of each other are not disqualified - from being equivalent for purposes of a VPP evaluation. If the VS takes the same code paths when executing PP-specified + from being equivalent for purposes of a VPP evaluation. If the VS takes the same code paths when executing PP-specified security functionality on different processors of the same family, then the processors can be considered equivalent with respect to that application.

    - For example, if a VS follows one code path on platforms that support the AES-NI instruction and another on platforms that do - not, then those two platforms are not equivalent with respect to that VS functionality. But if the VS follows the same code + For example, if a VS follows one code path on platforms that support the AES-NI instruction and another on platforms that do + not, then those two platforms are not equivalent with respect to that VS functionality. But if the VS follows the same code path whether or not the platform supports AES-NI, then the platforms are equivalent with respect to that functionality.

    - The platforms are equivalent with respect to the VS if the platforms are equivalent with respect to all PP-specified + The platforms are equivalent with respect to the VS if the platforms are equivalent with respect to all PP-specified security functionality.

    Table 7: Factors for Determining Hardware Platform Equivalence
    - - - - - -
    FactorSame/Different/NoneGuidance
    Platform ArchitecturesDifferentHardware platforms that implement different processor architectures and instruction sets are not equivalent.
    PP-Specified FunctionalitySameFor platforms with the same processor architecture, the platforms are equivalent with respect to the application if execution of all PP-specified security functionality follows the same code path on @@ -4100,15 +4177,15 @@

    D.3 Specific Guidance for

    The ST must describe all configurations evaluated down to processor manufacturer, model number, and microarchitecture version.

    - The information regarding claimed equivalent configurations depends on the platform that the VS was developed for and runs on. -

    Bare-Metal VS

    + The information regarding claimed equivalent configurations depends on the platform that the VS was developed for and runs on. +

    Bare-Metal VS

    For VSes that run without an operating system on bare-metal or virtual bare-metal, the claimed configuration must describe the platform down to the specific processor manufacturer, model number, and microarchitecture version. The Vendor must describe the differences in the TOE with respect to PP-specified security functionality and how the TOE operates differently to leverage platform differences (e.g., instruction set extensions) in the tested configuration versus the claimed equivalent configuration. -

    VS with OS Support

    - For VSes that run on an OS host or with the assistance of an OS, then the claimed configuration must describe the OS down to +

    VS with OS Support

    + For VSes that run on an OS host or with the assistance of an OS, then the claimed configuration must describe the OS down to its specific model and version number. The Vendor must describe the differences in the TOE with respect to PP-specified security functionality and how the TOE functions differently to leverage platform differences in the tested configuration versus the claimed equivalent configuration. @@ -4120,22 +4197,16 @@

    Appendix E - Acronyms

    EPExtended Package
    FPFunctional Package
    OEOperational Environment
    OSGuest Operating System
    OSHost Operating System
    PPProtection Profile
    PP-ConfigurationProtection Profile Configuration
    PP-ModuleProtection Profile Module
    SARSecurity Assurance Requirement
    SFRSecurity Functional Requirement
    SSPSystem Security Policy
    STSecurity Target
    TOETarget of Evaluation
    TSFTOE Security Functionality
    TSFITSF Interface
    TSSTOE Summary Specification
    VMVirtual Machine
    VMMVirtual Machine Manager
    VSVirtualization System

    Appendix F - Bibliography

    Table 10: Bibliography
    IdentifierTitle
    [CC]Common Criteria for Information Technology Security Evaluation -