
Зарубежные нормативные документы и критерии на английском / CCPART2V21
.pdfPart 2: Security functional requirements
|
Annex H |
|
(informative) |
|
Security management (FMT) |
1007 |
This class specifies the management of several aspects of the TSF: security |
|
attributes, TSF data and functions in the TSF. The different management roles and |
|
their interaction, such as separation of capability, can also be specified |
1008 |
In an environment where the TOE is made up of multiple physically separated parts |
|
that form a distributed system, the timing issues with respect to propagation of |
|
security attributes, TSF data, and function modification become very complex, |
|
especially if the information is required to be replicated across the parts of the TOE. |
|
This should be considered when selecting components such as |
FMT_REV.1 Revocation, or FMT_SAE.1 Time-limited authorisation, where the behaviour might be impaired. In such situations, use of components from FPT_TRC is advisable.
August 1999 |
Version 2.1 |
Page 273 of 354 |

H - Security management (FMT)
. |
|
|
Security management |
|
|
FMT_MOF Management of functions in TSF |
1 |
|
|
1 |
|
FMT_MSA Management of security attributes |
2 |
|
|
3 |
|
|
1 |
|
FMT_MTD Management of TSF data |
2 |
|
|
3 |
|
FMT_REV Revocation |
1 |
|
FMT_SAE Security attribute expiration |
1 |
|
FMT_SMR Security management roles |
1 |
2 |
|
3 |
|
Figure H.1 - Security management class decomposition
Page 274 of 354 |
2.1 |
August 1999 |
Management of functions in TSF (FMT_MOF) |
H - Security management (FMT) |
H.1 |
Management of functions in TSF (FMT_MOF) |
1009 |
The TSF management functions enable authorised users to set up and control the |
|
secure operation of the TOE. These administrative functions typically fall into a |
|
number of different categories: |
a)Management functions that relate to access control, accountability and authentication controls enforced by the TOE. For example, definition and update of user security characteristics (e.g. unique identifiers associated with user names, user accounts, system entry parameters) or definition and update of auditing system controls (e.g. selection of audit events, management of audit trails, audit trail analysis, and audit report generation), definition and update of per-user policy attributes (such as user clearance), definition of known system access control labels, and control and management of user groups.
b)Management functions that relate to controls over availability. For example, definition and update of availability parameters or resource quotas.
c)Management functions that relate to general installation and configuration. For example, TOE configuration, manual recovery, installation of TOE security fixes (if any), repair and reinstallation of hardware.
d)Management functions that relate to routine control and maintenance of TOE resources. For example, enabling and disabling peripheral devices, mounting of removable storage media, backup and recovery of user and system objects.
1010 |
Note that these functions need to be present in a TOE based on the families included |
|
in the PP or ST. It is the responsibility of the PP/ST author to ensure that adequate |
|
functions will be provided to manage the system in a secure fashion. |
1011 |
The TSF might contain functions that can be controlled by an administrator. For |
|
example, the auditing functions could be switched off, the time synchronisation |
|
could be switchable, and/or the authentication mechanism could be modifiable. |
FMT_MOF.1 Management of security functions behaviour |
|
1012 |
This component allows identified roles to manage the security functions of the TSF. |
|
This might entail obtaining the current status of a security function, disabling or |
enabling the security function, or modifying the behaviour of the security function. An example of modifying the behaviour of the security functions is changing of authentication mechanisms.
August 1999 |
Version 2.1 |
Page 275 of 354 |
H - Security management (FMT) |
Management of functions in TSF (FMT_MOF) |
|
Operations |
|
Selection: |
1013 |
In FMT_MOF.1.1 the PP/ST author should select whether the role can |
|
determine the behaviour of, disable, enable, and/or modify the |
|
behaviour of the security functions. |
|
Assignment: |
1014 |
In FMT_MOF.1.1 the PP/ST author should specify the functions that |
|
can be modified by the identified roles. Examples include auditing and |
|
time determination. |
1015 |
In FMT_MOF.1.1 the PP/ST author should specify the roles that are |
|
allowed to modify the functions in the TSF. The possible roles are |
|
specified in FMT_SMR.1. |
Page 276 of 354 |
Version 2.1 |
August 1999 |
Management of security attributes (FMT_MSA) |
H - Security management (FMT) |
H.2 |
Management of security attributes (FMT_MSA) |
1016 |
This family defines the requirements on the management of security attributes. |
1017 |
Users, subjects and objects have associated security attributes that will affect the |
|
behaviour of the TSF. Examples of such security attributes are the groups to which |
|
a user belongs, the roles he/she might assume, the priority of a process (subject), |
|
and the rights belonging to a role or a user. These security attributes might need to |
|
be managed by the user, a subject or a specific authorised user (a user with explicitly |
|
given rights for this management). |
1018 |
It is noted that the right to assign rights to users is itself a security attribute and/or |
|
potentially subject to management by FMT_MSA.1. |
1019 |
FMT_MSA.2 can be used to ensure that any accepted combination of security |
|
attributes is within a secure state. The definition of what “secure” means is left to |
|
the TOE guidance and the TSP model. If the developer provided a clear definition |
|
of the secure values and the reason why they should be considered secure, the |
|
dependency from FMT_MSA.2 to ADV_SPM.1 can be argued away. |
1020 |
In some instances subjects, objects or user accounts are created. If no explicit values |
|
for the related security attributes are given, default values need to be used. |
|
FMT_MSA.1 can be used to specify that these default values can be managed. |
FMT_MSA.1 Management of security attributes |
|
1021 |
This component allows users acting in certain roles to manage identified security |
|
attributes. The users are assigned to a role within the component FMT_SMR.1. |
1022 |
The default value of a parameter is the value the parameter takes when it is |
|
instantiated without specifically assigned values. An initial value is provided during |
|
the instantiation (creation) of a parameter, and overrides the default value. |
|
Operations |
|
Assignment: |
1023 |
In FMT_MSA.1.1, the PP/ST author should list the access control SFP |
|
or the information flow control SFP for which the security attributes |
|
are applicable. |
|
Selection: |
1024 |
In FMT_MSA.1.1 the PP/ST author should specify the operations that |
|
can be applied to the identified security attributes. The PP/ST author |
|
can specify that the role can modify the default value (change_default), |
|
query, modify the security attribute, delete the security attributes |
|
entirely or define their own operation. |
August 1999 |
Version 2.1 |
Page 277 of 354 |
H - Security management (FMT) |
Management of security attributes (FMT_MSA) |
|
Assignment: |
1025 |
In FMT_MSA.1.1, if selected, the PP/ST author should specify which |
|
other operations the role could perform. An example of such an |
|
operation could be ‘create’. |
1026 |
In FMT_MSA.1.1 the PP/ST author should specify the security |
|
attributes that can be operated on by the identified roles. It is possible |
|
for the PP/ST author to specify that the default value such as default |
|
access-rights can be managed. Examples of these security attributes are |
|
user-clearance, priority of service level, access control list, default |
|
access rights. |
1027 |
In FMT_MSA.1.1 the PP/ST author should specify the roles that are |
|
allowed to operate on the security attributes. The possible roles are |
|
specified in FMT_SMR.1. |
FMT_MSA.2 Secure security attributes
1028 |
This component contains requirements on the values that can be assigned to |
|
security attributes. The assigned values should be such that the TOE will remain in |
|
a secure state. |
1029 |
The definition of what ‘secure’ means is not answered in this component but is left |
|
to the development of the TOE (specifically ADV_SPM.1 Informal TOE security |
policy model) and the resulting information in the guidance. An example could be that if a user account is created, it should have a non-trivial password.
FMT_MSA.3 Static attribute initialisation
|
User application notes |
1030 |
This component requires that the TSF provide default values for relevant object |
|
security attributes, which can be overridden by an initial value. It may still be |
|
possible for a new object to have different security attributes at creation, if a |
|
mechanism exists to specify the permissions at time of creation. |
|
Operations |
|
Assignment: |
1031 |
In FMT_MSA.3.1,the PP/ST author should list the access control SFP |
|
or the information flow control SFP for which the security attributes |
|
are applicable. |
|
Selection: |
1032 |
In FMT_MSA.3.1, the PP/ST author should select whether the default |
|
property of the access control attribute will be restrictive, permissive, |
|
or another property. In case of another property, the PP/ST author |
|
should refine this to a specific property. |
Page 278 of 354 |
Version 2.1 |
August 1999 |
Management of security attributes (FMT_MSA) |
H - Security management (FMT) |
|
Assignment: |
1033 |
In FMT_MSA.3.2 the PP/ST author should specify the roles that are |
|
allowed to modify the values of the security attributes. The possible |
|
roles are specified in FMT_SMR.1. |
August 1999 |
Version 2.1 |
Page 279 of 354 |
H - Security management (FMT) |
Management of TSF data (FMT_MTD) |
H.3 |
Management of TSF data (FMT_MTD) |
1034 |
This component imposes requirements on the management of TSF data. Examples |
|
of TSF data are the current time and the audit trail. So, for example, this family |
|
allows the specification of whom can read, delete or create the audit trail. |
FMT_MTD.1 Management of TSF data |
|
1035 |
This component allows users with a certain role to manage values of TSF data. The |
|
users are assigned to a role within the component FMT_SMR.1. |
1036 |
The default value of a parameter is the values the parameter takes when it is |
|
instantiated without specifically assigned values. An initial value is provided during |
|
the instantiation (creation) of a parameter and overrides the default value. |
|
Operations |
|
Selection: |
1037 |
In FMT_MTD.1.1 the PP/ST author should specify the operations that |
|
can be applied to the identified TSF data. The PP/ST author can specify |
|
that the role can modify the default value (change_default), clear, query |
|
or modify the TSF data, or delete the TSF data entirely. If so desired |
|
the PP/ST author could specify any type of operation. To clarify “clear |
|
TSF data” means that the content of the TSF data is removed, but that |
|
the entity itself remains in the system. |
|
Assignment: |
1038 |
In FMT_MTD.1.1, if selected, the PP/ST author should specify which |
|
other operations the role could perform. An example could be ‘create’. |
1039 |
In FMT_MTD.1.1 the PP/ST author should specify the TSF data that |
|
can be operated on by the identified roles. It is possible for the PP/ST |
|
author to specify that the default value can be managed. |
1040 |
In FMT_MTD.1.1 the PP/ST author should specify the roles that are |
|
allowed to operate on the TSF data. The possible roles are specified in |
|
FMT_SMR.1. |
FMT_MTD.2 Management of limits on TSF data |
|
1041 |
This component specifies limits on TSF data, and actions to be taken if these limits |
|
are exceeded. This component, for example, will allow limits on the size of the audit |
|
trail to be defined, and specification of the actions to be taken when these limits are |
|
exceeded. |
Page 280 of 354 |
Version 2.1 |
August 1999 |
Management of TSF data (FMT_MTD) |
H - Security management (FMT) |
|
Operations |
|
Assignment: |
1042 |
In FMT_MTD.2.1 the PP/ST author should specify the TSF data that |
|
can have limits, and the value of those limits. An example of such TSF |
|
data is the number of users logged-in. |
1043 |
In FMT_MTD.2.1 the PP/ST author should specify the roles that are |
|
allowed to modify the limits on the TSF data and the actions to be taken. |
|
The possible roles are specified in FMT_SMR.1. |
1044 |
In FMT_MTD.2.2 the PP/ST author should specify the actions to be |
|
taken if the specified limit on the specified TSF data is exceeded. An |
|
example of such TSF action is that the authorised user is informed and |
|
an audit record is generated. |
FMT_MTD.3 Secure TSF data |
|
1045 |
This component covers requirements on the values that can be assigned to TSF data. |
|
The assigned values should be such that the TOE will remain in a secure state. |
1046 |
The definition of what ‘secure’ means is not answered in this component but is left |
|
to the development of the TOE (specifically ADV_SPM.1 Informal TOE security |
|
policy model) and the resulting information in the guidance. If the developer |
provided a clear definition of the secure values and the reason why they should be considered secure, the dependency from FMT_MSA.2 to ADV_SPM.1 can be argued away.
August 1999 |
Version 2.1 |
Page 281 of 354 |
H - Security management (FMT) |
Revocation (FMT_REV) |
H.4 |
Revocation (FMT_REV) |
1047 |
This family addresses revocation of security attributes for a variety of entities |
|
within a TOE. |
FMT_REV.1 Revocation |
|
1048 |
This component specifies requirements on the revocation of rights. It requires the |
|
specification of the revocation rules. Examples are: |
a)Revocation will take place on the next login of the user;
b)Revocation will take place on the next attempt to open the file;
c)Revocation will take place within a fixed time. This might mean that all open connections are re-evaluated every x minutes.
|
Operations |
|
Selection: |
1049 |
In FMT_REV.1.1, the PP/ST author should specify whether the ability |
|
to revoke security attributes from users, subjects, objects, or any other |
|
resources shall be provided by the TSF. If the last option is chosen, then |
|
the PP/ST author should use the refinement operation to define the |
|
resources. |
|
Assignment: |
1050 |
In FMT_REV.1.1 the PP/ST author should specify the roles that are |
|
allowed to modify the functions in the TSF. The possible roles are |
|
specified in FMT_SMR.1. |
1051 |
In FMT_REV.1.2, the PP/ST author should specify the revocation |
|
rules. Examples of these rules could include: “prior to the next |
|
operation on the associated resource”, or “for all new subject |
|
creations”. |
Page 282 of 354 |
Version 2.1 |
August 1999 |