Brocade Communications Systems FCX Series User Manual Page 49

  • Download
  • Add to my manuals
  • Print
  • Page
    / 53
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 48
Version 1.1, 05/19/2014
GSS CCT Evaluation Technical Report Page 49 of 53
© 2014 Gossamer Security Solutions, Inc.
Document: AAR-BrocadeFastIron8010
All rights reserved.
3. PROTECTION PROFILE SAR ASSURANCE ACTIVITIES
The following sections address assurance activities specifically defined in the claimed Protection Profile that
correspond with Security Assurance Requirements.
3.1 DEVELOPMENT (ADV)
3.1.1 BASIC FUNCTIONAL SPECIFICATION (ADV_FSP.1)
Assurance Activities: There are no specific assurance activities associated with these SARs. The functional
specification documentation is provided to support the evaluation activities described in Section 4.2, and other
activities described for AGD, ATE, and AVA SARs. The requirements on the content of the functional specification
information is implicitly assessed by virtue of the other assurance activities being performed; if the evaluator is
unable to perform an activity because the there is insufficient interface information, then an adequate functional
specification has not been provided.
3.2 GUIDANCE DOCUMENTS (AGD)
3.2.1 OPERATIONAL USER GUIDANCE (AGD_OPE.1)
Assurance Activities: Some of the contents of the operational guidance will be verified by the assurance activities
in Section 4.2 of the NDPP and evaluation of the TOE according to the CEM. The following additional information is
also required.
The operational guidance shall at a minimum list the processes running (or that could run) on the TOE in its
evaluated configuration during its operation that are capable of processing data received on the network
interfaces (there are likely more than one of these, and this is not limited to the process that 'listens' on the
network interface). It is acceptable to list all processes running (or that could run) on the TOE in its evaluated
configuration instead of attempting to determine just those that process the network data. For each process listed,
the administrative guidance will contain a short (e.g., one- or two-line) description of the process' function, and
the privilege with which the service runs. 'Privilege' includes the hardware privilege level (e.g., ring 0, ring 1), any
software privileges specifically associated with the process, and the privileges associated with the user role the
process runs as or under.
The operational guidance shall contain instructions for configuring the cryptographic engine associated with the
evaluated configuration of the TOE. It shall provide a warning to the administrator that use of other cryptographic
engines was not evaluated nor tested during the CC evaluation of the TOE.
Page view 48
1 2 ... 44 45 46 47 48 49 50 51 52 53

Comments to this Manuals

No comments