Joint task force transformation initiative



Yüklə 5,64 Mb.
səhifə173/186
tarix08.01.2019
ölçüsü5,64 Mb.
#93199
1   ...   169   170   171   172   173   174   175   176   ...   186

TSF Physical Protection

Notification of Physical Attack



PE-3 (5)

Physical Access Control

Tamper Protection



PE-6 (2)

Monitoring Physical Access

Automated Intrusion Recognition / Responses



SA-18

Tamper Resistance and Detection

FPT_PHP.3

TSF Physical Protection

Resistance to Physical Attack



PE-3 (5)

Physical Access Control

Tamper Protection



SA-18

Tamper Resistance and Detection

FPT_RCV.1

Trusted Recovery

Manual Recovery



CP-10

Information System Recovery and Reconstitution

CP-12

Safe Mode

FPT_RCV.2

Trusted Recovery

Automated Recovery



CP-10

Information System Recovery and Reconstitution

CP-12

Safe Mode

FPT_RCV.3

Trusted Recovery

Automated Recovery Without Undue Loss



CP-10

Information System Recovery and Reconstitution

CP-12

Safe Mode

FPT_RCV.4

Trusted Recovery

Function Recovery



SI-6

Security Function Verification

SI-10 (3)

Information Input Validation

Predictable Behavior



SC-24

Fail in Known State

FPT_RPL.1

Replay Detection

Replay Detection



IA-2 (8)

Identification and Authentication (Organizational Users)

Network Access To Privileged Accounts - Replay Resistant



IA-2 (9)

Identification and Authentication (Organizational Users)

Network Access To Non-Privileged Accounts - Replay Resistant



SC-23

Session Authenticity

SI-3 (9)

Malicious Code Protection

Authenticate Remote Commands



FPT_SSP.1

State Synchrony Protocol

Simple Trusted Acknowledgement



No Mapping.

FPT_SSP.2

State Synchrony Protocol

Mutual Trusted Acknowledgement



No Mapping.

FPT_STM.1

Time Stamps

Reliable Time Stamps



AU-8

Time Stamps

FPT_TDC.1

Inter-TSF TSF Data Consistency

Inter-TSF Basic Data Consistency



AC-16 (7)


Security Attributes | Consistent Attribute Interpretation

AC-16 (8)

Security Attributes

Association Techniques/Technologies



FPT_TEE.1

Testing of External Entities

Testing of External Entities



SI-6

Security Functionality Verification

FPT_TRC.1

Internal TOE TSF Data Replication Consistency

Internal TSF Consistency



SI-7

Software, Firmware, and Information Integrity

FPT_TST.1

TSF Self Test

TSF Testing



SI-6

Security Functionality Verification

SI-7

Software, Firmware, and Information Integrity

FRU_FLT.1

Fault Tolerance

Degraded Fault Tolerance



AU-15

Alternate Audit Capability

CP-11

Alternate Communications Protocols

SC-24

Fail in Known State

SI-13

Predictable Failure Prevention

SI-13 (1)

Predictable Failure Prevention

Transferring Component Responsibilities



SI-13 (2)

Predictable Failure Prevention

Time Limit on Process Execution Without Supervision



SI-13 (3)

Predictable Failure Prevention

Manual Transfer Between Components



SI-13 (4)

Predictable Failure Prevention

Standby Component Installation/Notification



SI-13 (5)

Predictable Failure Prevention

Failover Capability



FRU_FLT.2

Fault Tolerance

Limited Fault Tolerance



AU-15

Alternate Audit Capability

CP-11

Alternate Communications Protocols

SC-24

Fail in Known State

SI-13

Predictable Failure Prevention

SI-13 (1)

Predictable Failure Prevention

Transferring Component Responsibilities



SI-13 (2)

Predictable Failure Prevention

Time Limit on Process Execution Without Supervision



SI-13 (3)

Predictable Failure Prevention

Manual Transfer Between Components



SI-13 (4)

Predictable Failure Prevention

Standby Component Installation/Notification



SI-13 (5)

Predictable Failure Prevention

Failover Capability



FRU_PRS.1

Priority of Service

Limited Priority of Service



SC-6

Resource Availability

FRU_PRS.2

Priority of Service

Full Priority of Service



SC-6

Resource Availability

FRU_RSA.1

Resource Allocation

Maximum Quotas



SC-6

Resource Availability

FRU_RSA.2

Resource Allocation

Minimum and Maximum Quotas



SC-6

Resource Availability

FTA_LSA.1

Limitation on Scope of Selectable Attributes

Limitation on Scope of Selectable Attributes



AC-2 (6)

Account Management

Dynamic Privilege Management



AC-2 (11)

Account Management

Usage Conditions



FTA_MCS.1

Limitation on Multiple Concurrent Sessions

Basic Limitation on Multiple Concurrent Sessions



AC-10

Concurrent Session Control

FTA_MCS.2

Limitation on Multiple Concurrent Sessions

Per-User Limitation on Multiple Concurrent Sessions



AC-10

Concurrent Session Control

FTA_SSL.1

Session Locking and Termination

TSF-Initiated Session Locking



AC-11

Session Lock

AC-11 (1)

Session Lock

Pattern-Hiding Displays



FTA_SSL.2

Session Locking and Termination

User-Initiated Locking



AC-11

Session Lock

AC-11 (1)

Session Lock

Pattern-Hiding Displays



FTA_SSL.3

Session Locking and Termination

TSF-Initiated Termination



AC-12

Session Termination

SC-10

Network Disconnect

FTA_SSL.4

Session Locking and Termination

User-Initiated Termination



AC-12 (1)

Session Termination

User-Initiated Logouts / Message Displays



FTA_TAB.1

TOE Access Banners

Default TOE Access Banners



AC-8

System Use Notification

FTA_TAH.1

TOE Access History

TOE Access History



AC-9

Previous Login (Access) Notification

AC-9 (1)

Previous Login (Access) Notification

Unsuccessful Logons



FTA_TSE.1

TOE Session Establishment

TOE Session Establishment



AC-2 (11)

Account Management

Usage Conditions



FTP_ITC.1

Inter-TSF Trusted Channel

Inter-TSF Trusted Channel



IA-3 (1)

Device Identification and Authentication

Cryptographic Bidirectional Authentication



SC-8

Transmission Confidentiality and Integrity

SC-8 (1)

Transmission Confidentiality and Integrity

Cryptographic or Alternate Physical Protection



FTP_TRP.1

Trusted Path

Trusted Path



SC-11

Trusted Path

Assurance Requirements




ASE_INT.1

EAL1
EAL2


EAL3
EAL4
EAL5
EAL6
EAL7

ST Introduction

ST Introduction



SA-4

Acquisition Process

ASE_CCL.1

EAL1
EAL2


EAL3
EAL4
EAL5
EAL6
EAL7

Conformance Claims

Conformance Claims



PL-2

System Security Plan

SA-4 (7)

Acquisition Process

NIAP-Approved Protection Profiles



ASE_SPD.1

EAL1
EAL2


EAL3
EAL4
EAL5
EAL6
EAL7

Security Problem Definition

Security Problem Definition



PL-2

System Security Plan

SA-4

Acquisition Process

ASE_OBJ.1

EAL1


Security Objectives

Security Objectives for the Operational Environment



PL-2

System Security Plan

SA-4

Acquisition Process

ASE_OBJ.2

EAL2
EAL3


EAL4
EAL5
EAL6
EAL7

Security Objectives

Security Objectives



PL-2

System Security Plan

SA-4

Acquisition Process

ASE_ECD.1

EAL1
EAL2


EAL3
EAL4
EAL5
EAL6
EAL7

Extended Components Definition

Extended Components Definition



No Mapping.

ASE_REQ.1

EAL1


Security Requirements

Stated Security Requirements



PL-2

System Security Plan

SA-4

Acquisition Process

ASE_REQ.2

EAL2
EAL3


EAL4
EAL5
EAL6
EAL7

Security Requirements

Derived Security Requirements



PL-2

System Security Plan

SA-4

Acquisition Process

ASE_TSS.1

EAL1
EAL2


EAL3
EAL4
EAL5
EAL6
EAL7

TOE Summary Specification

TOE Summary Specification



PL-2

System Security Plan

SA-4 (1)


Acquisition Process

Functional Properties of Security Controls



ASE_TSS.2

TOE Summary Specification

TOE Summary Specification with Architectural Design Summary



PL-2

System Security Plan

SA-4 (1)

Acquisition Process

Functional Properties of Security Controls



SA-4 (2)

Yüklə 5,64 Mb.

Dostları ilə paylaş:
1   ...   169   170   171   172   173   174   175   176   ...   186




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin