
McAfee Email Gateway
Security Target
Page 3 of 61
4.6 RATIONALE FOR ASSUMPTION COVERAGE ................................................................................26
5 IT SECURITY REQUIREMENTS .........................................................................27
5.1 EXTENDED COMPONENTS DEFINITION ......................................................................................28
5.1.1 Security audit event storage (FAU_STG) ............................................................................. 28
5.1.2 Cryptographic key management (FCS_CKM) ...................................................................... 29
5.1.3 Cryptographic operation: random bit generation (FCS_RBG) .............................................. 30
5.1.4 HTTPS (FCS_HTTPS) .......................................................................................................... 31
5.1.5 SSH (FCS_SSH) ................................................................................................................... 31
5.1.6 TLS (FCS_TLS) .................................................................................................................... 32
5.1.7 Password management (FIA_PMG) ..................................................................................... 34
5.1.8 User identification and authentication (FIA_UIA) .................................................................. 34
5.1.9 User authentication (FIA_UAU) ............................................................................................ 36
5.1.10 Protection of TSF data (FPT_SKP) ...................................................................................... 37
5.1.11 Protection of administrator passwords (FPT_APW) ............................................................. 37
5.1.12 Trusted update (FPT_TUD) .................................................................................................. 38
5.1.13 TSF self test (FPT_TST) ....................................................................................................... 39
5.1.14 Session locking and termination (FTA_SSL) ........................................................................ 39
5.2 SECURITY FUNCTIONAL REQUIREMENTS ..................................................................................41
5.2.1 Introduction ........................................................................................................................... 41
5.2.2 Security Audit (FAU) ............................................................................................................. 42
5.2.3 Cryptographic Support (FCS) ............................................................................................... 43
5.2.4 User Data Protection (FDP) .................................................................................................. 45
5.2.5 Identification and Authentication (FIA) .................................................................................. 45
5.2.6 Security Management (FMT) ................................................................................................ 46
5.2.7 Protection of the TSF (FPT) .................................................................................................. 46
5.2.8 TOE Access (FTA) ................................................................................................................ 47
5.2.9 Trusted Path/Channels (FTP) ............................................................................................... 47
5.3 TOE SECURITY ASSURANCE REQUIREMENTS ..........................................................................48
5.4 RATIONALE FOR TOE SECURITY REQUIREMENTS .....................................................................49
5.4.1 TOE Security Functional Requirements ............................................................................... 49
5.4.2 TOE Security Assurance Requirements ............................................................................... 50
5.5 RATIONALE FOR IT SECURITY FUNCTIONAL REQUIREMENT DEPENDENCIES .................................50
6 TOE SUMMARY SPECIFICATION ......................................................................53
6.1 TOE SECURITY FUNCTIONS ....................................................................................................53
6.1.1 Security Management ........................................................................................................... 53
6.1.2 Identification & Authentication .............................................................................................. 55
6.1.3 Audit ...................................................................................................................................... 56
6.1.4 Cryptographic Support .......................................................................................................... 57
6.2 RATIONALE FOR TOE SECURITY FUNCTIONS ............................................................................60
T
ABLES
Table 1 - TOE Specific Terminology ............................................................................................................10
Table 2 - Acronyms......................................................................................................................................12
Table 3 - Appliance hardware platform comparison ....................................................................................15
Table 4 - Blade hardware platform comparison ..........................................................................................15
Comentários a estes Manuais