![]() |
||
Overview| Examples| Bugs| FAQ | White papers | Download | Help wanted | SourceForge Project page | Filltable utility | ||
Next
Previous
Contents
5. Security functional requirementsThe security functional requirements are labeled with a reference. Each reference have the form SYSTEM:COMPONENT, where component is the name of the part2 security functional requirement component, and system is either TOE, ENV, or BUS. The requirements which have been labeled as TOE, are requirements against the TOE. The requirements which have been labeled ENV, are requirements against the IT environment of the TOE. The requirements which have been labeled as BUS, are requirements against the business function of the TOE, which means that the IT environment can relay on it as a requirement stated against the IT environment of the IT environment which is the TOE itself. 5.1 Security Audit (FAU)Audit Data Generation (TOE:FAU_GEN.1)The TSF shall be able to generate an audit record of the auditable events listed below. This includes all auditable events for the basic level of audit. refinement: The TOE shall generate audit trails no longer than 1024 characters. Should the length of the audit trail would exceed this limit, it should be truncated on the end. The audit trail should only contain known nonproblematic characters. The TSF shall record within each audit record at least the following information:
Application notes:
User Identity Association (ENV:FAU_GEN.2)The underlying operatin system shall be able to associate each auditable event with the identity of the user that caused the event. Application note: the TOE supports this by auditing the unix uid and euid of the subject running the TOE. User Identity Association support (SUP:FAU_GEN.2)The TOE should include the unix uid and euid of the subject the TOE runs as in each audit records. Applcatio note: To link either this or the subject which modified the input file is out of the TOE scope of control. Audit Review (TOE:FAU_SAR.1)The TOE shall generate the audit records in a manner suitable for the user to interpret the information. Restricted Audit Review support (SUP:FAU_SAR.2)The TOE shall generate audit trails only to the standard syslog interface and the standard error. 5.2 User Data Protection (FDP)Export of unlabeled user data (TOE:FDP_ETC.1)The TOE shall enforce the Filltable policy when exporting user data, controlled under the SFP(s), outside of the TSC. The TSF shall export the user data without the user data's associated security attributes. Application note: The utility does have an entry for labels in the input file format, but that is not used yet. Complete information flow control (TOE:FDP_IFC.2)The TSF shall enforce the Filltable policy on the packet filter configuration data and all operations that cause that information to flow to and from subjects covered by the SFP. The TSF shall ensure that all operations that cause any information in the TSC to flow to and from any subject in the TSC are covered by an information flow control SFP. Hierarchical security attributes (ENV:FDP_IFF.2)The underlying operating system shall enforce the Filltable policy based on the following types of subject and information security attributes: filltable domain.
The TSF shall enforce the following relationships for any two valid information flow control security attributes:
Application note: the ordering function is that the filltable input domain is lower than the filltable output and audit domains. The least upper bound is greater or equal than the filltable output domain, and the greatest lower bound is lower than equal than the filltable input domain. Hierarchical security attributes (TOE:FDP_IFF.2)The TSF shall enforce the Filltable policy based on the following types of subject and information security attributes: filltable domain. The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules, based on the ordering relationships between security attributes hold:
Application note: with ENV:FDP_IFF.2 we have the Bell&LaPadula modell here. The TSF shall enforce the following additional flow control SFP rules:
Application note: we have the rules of the Clark-Wilson modell here The TSF shall not provide additional SFP capabilities. The TSF shall not explicitly authorize information flow based on any additional rules. The TSF shall not explicitly deny information flow based on any additional rules. No illicit information flows (TOE:FDP_IFF.5)The TSF shall ensure that no illicit information flows exist to circumvent the filltable policy, to the extent to which the underlying operating system's information flow control policy covers the subjects and object interfacing with the TOE. No illicit information flows (ENV:FDP_IFC.1)The underlying operating system shall ensure that its information flow control policy covers all objects and subjects interacting with the TOE. Import of user data without security attributes (TOE: FDP_ITC.1)The TSF shall enforce the filltable policy when importing user data, controlled under the SFP, from outside of the TSC. The TSF shall ignore any security attributes associated with the user data when imported from outside the TSC. The TSF shall not enforce additional importation control rules when importing user data controlled under the SFP from outside the TSC. 5.3 Security Management (FMT)Specification of Management Functions (TOE:SMT_SMF.1)The TSF shall not be capable of performing any security management functions related to its own security functions. Specification of Management Functions (BUS:SMT_SMF.1)The TSF shall be capable of performing the following security management function related to the security functions of the underlying operating system:
Security roles (ENV:FMT_SMR.1)The underlying operating system shall maintain the roles junior system administrator and senior system administrator The underlying operating system shall be able to associate users with roles. The underlying operating system shall ensure that the following conditions are satisfied:
5.4 Protection of the TSF (FPT)Abstract machine testing (TOE:FPT_AMT.1)The TSF shall run a suite of tests at the request of the senior system administrator to demonstrate the correct operation of the security assumptions provided by the abstract machine that underlies the TSF. Application note: this is a TODO Application note: the underlying abstract machine is the underlaying python interpreter and/or its re and os modules, which have the operating system under it. Non-bypassability of the TSP (TOE:FPT_RVM.1)The TSF shall ensure that TSP enforcement functions are invoked and succeed before each function within the TSC is allowed to proceed. Complete reference monitor (ENV:FPT_SEP.3)The unisolated portion of the TSF of the underlying operating system shall maintain a security domain for its own execution that protects it from interference and tampering by untrusted subjects. The TSF of the underlying operating system shall enforce separation between the security domains of subjects in the TSC. The TSF of the underlying operating system shall maintain the TOE in a security domain for its own execution that protects them from interference and tampering by the remainder of the TSF of the operating system and by subjects untrusted with respect to the TSP. Application note: the text "the part of the TSF that enforces the access control and/or information flow control SFPs" is changed to "the TOE", as it is the part of the TSF of the underlying operating system which enforces the information flow control SFP. Reliable time stamps (ENV:FPT_STM.1)The underlying operating system shall add reliable time stamps to the audit records generated by the TOE. TSF testing (TOE:FPT_TST.1)The TSF shall run a suite of self tests at the request of the senior system administrator to demonstrate the correct operation of the TSF. Application note: the following text: "The TSF shall provide authorised users with the capability to verify the integrity of TSF data." is skipped, because there are no persistent TSF data. The TSF shall provide authorised users with the capability to verify the integrity of stored TSF executable code. Next Previous Contents |