Foreword
Next
Part 2 Contents
(Part 1
Introduction and General Model
)
1
Scope
1.1
Extending and maintaining functional requirements
1.2
Organisation of CC Part 2
1.3
Functional requirements paradigm
2
Security functional components
2.1
Overview
2.1.1
Class structure
2.1.2
Family structure
2.1.3
Component structure
2.1.4
Permitted functional component operations
2.2
Component catalogue
2.2.1
Component changes highlighting
3
Class FAU: Security audit
3.1
Security audit automatic response (FAU_ARP)
3.2
Security audit data generation (FAU_GEN)
3.3
Security audit analysis (FAU_SAA)
3.4
Security audit review (FAU_SAR)
3.5
Security audit event selection (FAU_SEL)
3.6
Security audit event storage (FAU_STG)
4
Class FCO: Communication
4.1
Non-repudiation of origin (FCO_NRO)
4.2
Non-repudiation of receipt (FCO_NRR)
5
Class FCS: Cryptographic support
5.1
Cryptographic key management (FCS_CKM)
5.2
Cryptographic operation (FCS_COP)
6
Class FDP: User data protection
6.1
Access control policy (FDP_ACC)
6.2
Access control functions (FDP_ACF)
6.3
Data authentication (FDP_DAU)
6.4
Export to outside TSF control (FDP_ETC)
6.5
Information flow control policy (FDP_IFC)
6.6
Information flow control functions (FDP_IFF)
6.7
Import from outside TSF control (FDP_ITC)
6.8
Internal TOE transfer (FDP_ITT)
6.9
Residual information protection (FDP_RIP)
6.10
Rollback (FDP_ROL)
6.11
Stored data integrity (FDP_SDI)
6.12
Inter-TSF user data confidentiality transfer protection (FDP_UCT)
6.13
Inter-TSF user data integrity transfer protection (FDP_UIT)
7
Class FIA: Identification and authentication
7.1
Authentication failures (FIA_AFL)
7.2
User attribute definition (FIA_ATD)
7.3
Specification of secrets (FIA_SOS)
7.4
User authentication (FIA_UAU)
7.5
User identification (FIA_UID)
7.6
User-subject binding (FIA_USB)
8
Class FMT: Security management
8.1
Management of functions in TSF (FMT_MOF)
8.2
Management of security attributes (FMT_MSA)
8.3
Management of TSF data (FMT_MTD)
8.4
Revocation (FMT_REV)
8.5
Security attribute expiration (FMT_SAE)
8.6
Security management roles (FMT_SMR)
9
Class FPR: Privacy
9.1
Anonymity (FPR_ANO)
9.2
Pseudonymity (FPR_PSE)
9.3
Unlinkability (FPR_UNL)
9.4
Unobservability (FPR_UNO)
10
Class FPT: Protection of the TSF
10.1
Underlying abstract machine test (FPT_AMT)
10.2
Fail secure (FPT_FLS)
10.3
Availability of exported TSF data (FPT_ITA)
10.4
Confidentiality of exported TSF data (FPT_ITC)
10.5
Integrity of exported TSF data (FPT_ITI)
10.6
Internal TOE TSF data transfer (FPT_ITT)
10.7
TSF physical protection (FPT_PHP)
10.8
Trusted recovery (FPT_RCV)
10.9
Replay detection (FPT_RPL)
10.10
Reference mediation (FPT_RVM)
10.11
Domain separation (FPT_SEP)
10.12
State synchrony protocol (FPT_SSP)
10.13
Time stamps (FPT_STM)
10.14
Inter-TSF TSF data consistency (FPT_TDC)
10.15
Internal TOE TSF data replication consistency (FPT_TRC)
10.16
TSF self test (FPT_TST)
11
Class FRU: Resource utilisation
11.1
Fault tolerance (FRU_FLT)
11.2
Priority of service (FRU_PRS)
11.3
Resource allocation (FRU_RSA)
12
Class FTA: TOE access
12.1
Limitation on scope of selectable attributes (FTA_LSA)
12.2
Limitation on multiple concurrent sessions (FTA_MCS)
12.3
Session locking (FTA_SSL)
12.4
TOE access banners (FTA_TAB)
12.5
TOE access history (FTA_TAH)
12.6
TOE session establishment (FTA_TSE)
13
Class FTP: Trusted path/channels
13.1
Inter-TSF trusted channel (FTP_ITC)
13.2
Trusted path (FTP_TRP)
Annex A
Security functional requirements application notes
A.1
Structure of the notes
A.1.1
Class structure
A.1.2
Family structure
A.1.3
Component structure
A.2
Dependency table
Annex B
Functional classes, families, and components
Annex C
Security audit (FAU)
C.1
Security audit automatic response (FAU_ARP)
C.2
Security audit data generation (FAU_GEN)
C.3
Security audit analysis (FAU_SAA)
C.4
Security audit review (FAU_SAR)
C.5
Security audit event selection (FAU_SEL)
C.6
Security audit event storage (FAU_STG)
Annex D
Communication (FCO)
D.1
Non-repudiation of origin (FCO_NRO)
D.2
Non-repudiation of receipt (FCO_NRR)
Annex E
Cryptographic support (FCS)
E.1
Cryptographic key management (FCS_CKM)
E.2
Cryptographic operation (FCS_COP)
Annex F
User data protection (FDP)
F.1
Access control policy (FDP_ACC)
F.2
Access control functions (FDP_ACF)
F.3
Data authentication (FDP_DAU)
F.4
Export to outside TSF control (FDP_ETC)
F.5
Information flow control policy (FDP_IFC)
F.6
Information flow control functions (FDP_IFF)
F.7
Import from outside TSF control (FDP_ITC)
F.8
Internal TOE transfer (FDP_ITT)
F.9
Residual information protection (FDP_RIP)
F.10
Rollback (FDP_ROL)
F.11
Stored data integrity (FDP_SDI)
F.12
Inter-TSF user data confidentiality transfer protection (FDP_UCT)
F.13
Inter-TSF user data integrity transfer protection (FDP_UIT)
Annex G
Identification and authentication (FIA)
G.1
Authentication failures (FIA_AFL)
G.2
User attribute definition (FIA_ATD)
G.3
Specification of secrets (FIA_SOS)
G.4
User authentication (FIA_UAU)
G.5
User identification (FIA_UID)
G.6
User-subject binding (FIA_USB)
Annex H
Security management (FMT)
H.1
Management of functions in TSF (FMT_MOF)
H.2
Management of security attributes (FMT_MSA)
H.3
Management of TSF data (FMT_MTD)
H.4
Revocation (FMT_REV)
H.5
Security attribute expiration (FMT_SAE)
H.6
Security management roles (FMT_SMR)
Annex I
Privacy (FPR)
I.1
Anonymity (FPR_ANO)
I.2
Pseudonymity (FPR_PSE)
I.3
Unlinkability (FPR_UNL)
I.4
Unobservability (FPR_UNO)
Annex J
Protection of the TSF (FPT)
J.1
Underlying abstract machine test (FPT_AMT)
J.2
Fail secure (FPT_FLS)
J.3
Availability of exported TSF data (FPT_ITA)
J.4
Confidentiality of exported TSF data (FPT_ITC)
J.5
Integrity of exported TSF data (FPT_ITI)
J.6
Internal TOE TSF data transfer (FPT_ITT)
J.7
TSF physical protection (FPT_PHP)
J.8
Trusted recovery (FPT_RCV)
J.9
Replay detection (FPT_RPL)
J.10
Reference mediation (FPT_RVM)
J.11
Domain separation (FPT_SEP)
J.12
State synchrony protocol (FPT_SSP)
J.13
Time stamps (FPT_STM)
J.14
Inter-TSF TSF data consistency (FPT_TDC)
J.15
Internal TOE TSF data replication consistency (FPT_TRC)
J.16
TSF self test (FPT_TST)
Annex K
Resource utilisation (FRU)
K.1
Fault tolerance (FRU_FLT)
K.2
Priority of service (FRU_PRS)
K.3
Resource allocation (FRU_RSA)
Annex L
TOE access (FTA)
L.1
Limitation on scope of selectable attributes (FTA_LSA)
L.2
Limitation on multiple concurrent sessions (FTA_MCS)
L.3
Session locking (FTA_SSL)
L.4
TOE access banners (FTA_TAB)
L.5
TOE ccess history (FTA_TAH)
L.6
TOE session establishment (FTA_TSE)
Annex M
Trusted path/channels (FTP)
M.1
Inter-TSF trusted channel (FTP_ITC)
M.2
Trusted path (FTP_TRP)
(Part 3:
Security assurance requirements
)
Foreword
Next