Emc Vnxe v311 Sec Eng
Emc Vnxe v311 Sec Eng
Security Target
Evaluation Assurance Level (EAL): EAL2+
Document Version: 1.2
Table of Contents
1 INTRODUCTION ................................................................................................................... 4
1.1 PURPOSE ................................................................................................................................................................ 4
1.2 SECURITY TARGET AND TOE REFERENCES ...................................................................................................... 4
1.3 PRODUCT OVERVIEW .......................................................................................................................................... 5
1.4 TOE OVERVIEW ................................................................................................................................................... 7
1.4.1 Brief Description of the Components of the TOE........................................................................................ 8
1.4.2 TOE Environment ................................................................................................................................................... 9
1.5 TOE DESCRIPTION ............................................................................................................................................10
1.5.1 Physical Scope....................................................................................................................................................... 10
1.5.2 Logical Scope ........................................................................................................................................................ 11
1.5.3 Product Physical/Logical Features and Functionality not included in the TOE ................................. 12
2 CONFORMANCE CLAIMS .................................................................................................. 13
3 SECURITY PROBLEM .......................................................................................................... 14
3.1 THREATS TO SECURITY......................................................................................................................................14
3.2 ORGANIZATIONAL SECURITY POLICIES ..........................................................................................................15
3.3 ASSUMPTIONS .....................................................................................................................................................15
4 SECURITY OBJECTIVES ...................................................................................................... 16
4.1 SECURITY OBJECTIVES FOR THE TOE ..............................................................................................................16
4.2 SECURITY OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT..................................................................16
4.2.1 IT Security Objectives ......................................................................................................................................... 16
4.2.2 Non-IT Security Objectives ............................................................................................................................... 17
5 EXTENDED COMPONENTS .............................................................................................. 18
6 SECURITY REQUIREMENTS .............................................................................................. 19
6.1 CONVENTIONS ...................................................................................................................................................19
6.2 SECURITY FUNCTIONAL REQUIREMENTS ........................................................................................................19
6.2.1 Class FAU: Security Audit .................................................................................................................................. 21
6.2.3 Class FDP: User Data Protection .................................................................................................................... 22
6.2.4 Class FIA: Identification and Authentication................................................................................................ 25
6.2.5 Class FMT: Security Management ................................................................................................................. 26
6.2.6 Security Assurance Requirements .................................................................................................................. 29
7 TOE SECURITY SPECIFICATION...................................................................................... 30
7.1 TOE SECURITY FUNCTIONALITY .....................................................................................................................30
7.1.1 Security Audit ........................................................................................................................................................ 31
7.1.2 User Data Protection .......................................................................................................................................... 31
7.1.3 Identification and Authentication.................................................................................................................... 32
7.1.4 Security Management ........................................................................................................................................ 33
8 RATIONALE .......................................................................................................................... 35
8.1 CONFORMANCE CLAIMS RATIONALE .............................................................................................................35
8.2 SECURITY OBJECTIVES RATIONALE ..................................................................................................................35
8.2.1 Security Objectives Rationale Relating to Threats .................................................................................... 35
8.2.2 Security Objectives Rationale Relating to Policies ..................................................................................... 37
8.2.3 Security Objectives Rationale Relating to Assumptions ........................................................................... 37
8.3 RATIONALE FOR EXTENDED SECURITY FUNCTIONAL REQUIREMENTS ......................................................38
8.4 RATIONALE FOR EXTENDED TOE SECURITY ASSURANCE REQUIREMENTS ...............................................38
8.5 SECURITY REQUIREMENTS RATIONALE ...........................................................................................................38
8.5.1 Rationale for Security Functional Requirements of the TOE Objectives ............................................ 38
8.5.2 Security Assurance Requirements Rationale ............................................................................................... 41
8.5.3 Dependency Rationale ....................................................................................................................................... 41
9 ACRONYMS .......................................................................................................................... 43
9.1 ACRONYMS .........................................................................................................................................................43
Table of Figures
FIGURE 1 VNXE SYSTEM .........................................................................................................................................................5
FIGURE 2 DEPLOYMENT CONFIGURATION OF THE TOE ...................................................................................................8
List of Tables
TABLE 1 ST AND TOE REFERENCES ......................................................................................................................................4
TABLE 2 CC AND PP CONFORMANCE .............................................................................................................................. 13
TABLE 3 THREATS ................................................................................................................................................................. 14
TABLE 4 ASSUMPTIONS ......................................................................................................................................................... 15
TABLE 5 SECURITY OBJECTIVES FOR THE TOE.................................................................................................................. 16
TABLE 6 IT SECURITY OBJECTIVES ...................................................................................................................................... 16
TABLE 7 NON-IT SECURITY OBJECTIVES ........................................................................................................................... 17
TABLE 8 TOE SECURITY FUNCTIONAL REQUIREMENTS .................................................................................................. 19
TABLE 9 FILE STORAGE ACCESS CONTROL SFP MANAGEMENT ..................................................................................... 26
TABLE 10 AUTHORIZED ROLES ............................................................................................................................................ 28
TABLE 11 ASSURANCE REQUIREMENTS .............................................................................................................................. 29
TABLE 12 MAPPING OF TOE SECURITY FUNCTIONALITY TO SECURITY FUNCTIONAL REQUIREMENTS .................. 30
TABLE 13 THREATS: OBJECTIVES MAPPING ....................................................................................................................... 35
TABLE 14 ASSUMPTIONS: OBJECTIVES MAPPING ............................................................................................................... 37
TABLE 15 OBJECTIVES: SFRS MAPPING............................................................................................................................... 38
TABLE 16 FUNCTIONAL REQUIREMENTS DEPENDENCIES ................................................................................................ 41
TABLE 17 ACRONYMS .......................................................................................................................................................... 43
1 Introduction
This section identifies the Security Target (ST), Target of Evaluation (TOE), and the ST organization. The
TOE is EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™ Hardware, and may be referred to as
the TOE or “VNXe” throughout the remainder of this document. The TOE contains a combination File
(IP1) and Block (iSCSI2 over IP, and FC3) operating environment with Unified Management (Unisphere).
The TOE provides storage and access controls for block services over IP and FC and standard IP-based file
sharing protocols.
1.1 Purpose
This ST is divided into nine sections, as follows:
Introduction (Section 1) – Provides a brief summary of the ST contents and describes the
organization of other sections within this document. It also provides an overview of the TOE
security functionality and describes the physical and logical scope for the TOE, as well as the ST
and TOE references.
Conformance Claims (Section 2) – Provides the identification of any Common Criteria (CC),
Protection Profile, and Evaluation Assurance Level (EAL) package claims. It also identifies
whether the ST contains extended security requirements.
Security Problem (Section 3) – Describes the threats, organizational security policies, and
assumptions that pertain to the TOE and its environment.
Security Objectives (Section 4) – Identifies the security objectives that are satisfied by the TOE
and its environment.
Extended Components (Section 5) – Identifies new components (extended Security Functional
Requirements (SFRs) and extended Security Assurance Requirements (SARs)) that are not
included in CC Part 2 or CC Part 3.
Security Requirements (Section 6) – Presents the SFRs and SARs met by the TOE.
TOE Security Specification (Section 7) – Describes the security functions provided by the TOE
that satisfy the security functional requirements and objectives.
Rationale (Section 8) - Presents the rationale for the security objectives, requirements, and SFR
dependencies as to their consistency, completeness, and suitability.
Acronyms (Section 9) – Defines the acronyms and terminology used within this ST.
ST Title EMC® Corporation EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™
Hardware Security Target
ST Version Version 1.2
ST Author Corsec Security, Inc.
ST Publication Date 2015-07-08
1
IP – Internet Protocol
2
iSCSI – Internet Small Computer Systems Interface
3
FC – Fibre Channel
EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™ Hardware Page 4 of 45
© 2015 EMC® Corporation
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Security Target, Version 1.2 July 8, 2015
ST Title EMC® Corporation EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™
Hardware Security Target
TOE Reference TOE Software:
EMC VNXe OE v3.1.1.5395470
EMC VNXe Unisphere v3.1.1.5395470
EMC VNXe Unisphere CLI4 v3.0.0.1.16
TOE Hardware:
EMC VNXe3200 DPE5 V32D12AN2 P/N 100-542-455-11
EMC VNXe3200 DPE V32D12AN5QS25 P/N 100-542-441-01
EMC VNXe3200 DAE6 V32-DAE-12 P/N 100-542-104-01
EMC VNXe3200 DAE V32-DAE-25 P/N 100-563-628
Disk Drives:
EMC KSHWXG8J SAS7 P/N 005049804PWR
EMC SS162511 CLAR100 EFD8 P/N 5050500
EMC Z1X1972R NL-SAS P/N 005050143PWR
VNXe/Unisphere allows an organization to manage its storage needs separately from its application and
file servers. This allows greater control over storage allocation, fault tolerance, and backups versus storage
that is directly attached to individual application or file servers. In a typical deployment scenario, hosts9
connect to VNXe/Unisphere over an IP-based network through standard IP-based networking equipment
(routers and switches as needed) or through a typical SAN architecture using FC equipment. These hosts
are then configured to use storage on VNXe3200 hardware in the form of Logical Units or file systems for
their applications.
VNXe includes the VNXe Operating Environment v3.1.1, which provides RAID10 and storage capabilities.
The product provides the ability to combine several individual drives into useful logical groups, provides
4
CLI – Command Line Interface
5
DPE – Disk Processor Enclosure
6
DAE – Disk Array Enclosure
7
SAS – Serial-Attached SCSI
8
EFD – Enterprise Flash Drive
9
Host – a host is a term used to generically define systems accessing storage on the TOE, whether that acces is Block-
based access or File-based access
10
RAID – Redundant Array of Independent Disks
EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™ Hardware Page 5 of 45
© 2015 EMC® Corporation
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Security Target, Version 1.2 July 8, 2015
fault tolerance for stored data, and manages access to stored data. The product is designed to allow
customers to scale both system performance and storage capacity.
VNXe Operating Environment v3.1.1 software includes the Unisphere management software that allows
administrators to manage and configure the VNXe. The VNXe3200 is the hardware platform, which
includes back-end disk arrays. Together these components provide three main features:
VNXe users access storage through traditional IP-based block and file protocols. VNXe can present itself
as one or more standard network-based file servers to IP-based client machines (as a NAS12), or as a block
storage device to application servers with iSCSI and FC. Administrators manage VNXe and control the
policies that govern access to storage with VNXe Operating Environment v3.1.1 software.
The product runs Unified13 Block and File protocols, allowing the product to provide and control access to
storage from both IP-connected clients and clients connecting via FC.
CSX14 implements the File and Block functionality. CSX is an execution environment built on a Linux
kernel that processes and performs the actual transfer of data between the back-end disk drives and clients.
Each CSX process provided by VNXe can host one or more “virtual servers” that present shared services to
IP-based and FC-based hosts. Protocols that VNXe supports include:
Administrators can configure the type of protocols that are supported for that server per process. IP-
connected hosts, with the appropriate access privileges, can then use VNXe to store and access data.
VNXe is responsible for enforcing all access permissions for user data. Each File-based “virtual server” on
VNXe can be configured to interface with an LDAPv3-compatible or Network Information Service (NIS)
server. When a request for data access is made from a File-based client machine, VNXe utilizes the
LDAPv3-compatible server or NIS server for authentication, checks the Access Control List (ACL) of the
requested file or directory, and either grants or denies access to the user. User data is stored directly on
storage provided by VNXe3200.
The VNXe3200 platform includes disk drives and other hardware to run the system (such as memory and
processor). The VNXe hardware offers options to choose the capacity and performance of storage by
customizing the number and capacity of SSD, NL-SAS17, and SAS18 disks in the system.
The disk storage is configured to provide a storage system for use by VNXe users. The block storage
portion of VNXe allows this storage system to store and retrieve block units of data for VNXe users. Each
11
CIFS is the Microsoft implementation of System Message Block (SMB)
12
NAS – Network Attached Storage
13
Unified refers to both Block and File storage functionality being present on the same storage system.
14
CSX – Common Software eXecution
15
CIFS is a platform-independent file sharing system commonly used by Microsoft Windows network file sharing
16
NFS is a platform-independent file sharing system commonly used by UNIX and UNIX variants for file sharing
17
NL SAS – Near Line Serial Attached Small Computer System Interface (SCSI)
18
SAS – Serial Attached SCSI
EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™ Hardware Page 6 of 45
© 2015 EMC® Corporation
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Security Target, Version 1.2 July 8, 2015
of these block units is associated with a Logical Unit, which is in turn associated with a Logical Unit
Number (LUN). Individual elements of the storage system are presented to VNXe as Logical Units. Each
Logical Unit is a useable storage system volume that VNXe can expose to the user.
The VNXe Operating Environment v3.1.1 software contains utilities and a user interface for installing and
configuring VNXe, maintaining the system, and monitoring system performance.
The hardware and software TOE is the EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™
Hardware. The TOE is a mid-to-high capacity storage system. The VNXe Operating Environment v3.1.1
provides RAID and virtual storage capabilities, one or more NAS servers that allow IP-based clients to
connect and use storage, an interface by which the TOE provides access controls for storage under
management by VNXe. The VNXe3200 includes the hardware needed to access and provide storage and
the disk storage itself.
The TOE is managed by authorized users through the UEMCLI19 and the Unisphere GUI20 interfaces.
Unisphere GUI is an Adobe Flex application that runs within a web browser. To access the functions
available via Unisphere GUI, an authorized user must open a web browser and enter the IP address or
hostname of the VNXe management port. UEMCLI is a command line interface that provides access to
common functions for monitoring and managing the TOE. The UEMCLI provides access to functions for
storage provisioning, status and configuration information retrieval, and other TOE administrative
functions. UEMCLI commands can also be used to automate management functions via shell scripts and
batch files.
The TOE software provides RAID storage architectures, fault detection, isolation, and diagnosis
capabilities. It enables the use of virtual storage elements (LUNs) to improve performance and capacity
utilization.
The TOE provides NAS services that allow hosts on an IP network to access file systems via one of the
supported file-based protocols (CIFS and NFS). The TOE presents this storage as one or more file servers
on the customer’s network. Client systems that attempt to access the file systems must pass TOE access
controls before the TOE allows the access to occur. The TOE provides Storage Area Network (SAN)
services that allow hosts to access storage as Logical Units via iSCSI or FC.
The TOE also performs identification and authorization of TOE Administrators, and Users; discovery and
monitoring of File-side and Block-side components; storage configuration and allocation; status and
configuration information display; and event management. The TOE hardware provides the physical
storage and processing resources necessary for the TOE to function.
19
UEMCLI – Unified Element Manager Command Line Interface
20
GUI – Graphical User Interface
EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™ Hardware Page 7 of 45
© 2015 EMC® Corporation
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Security Target, Version 1.2 July 8, 2015
Each LUN can then be mounted by hosts. When this mechanism is used, a host can only access LUNs that
the host has been permitted to access. It is also possible that multiple hosts are given access to the same
LUNs. This is used in cases where the host has been deployed in such a way as to manage multiple servers
accessing the same LUN, for example, in a clustered environment.
1.4.1.6 Unisphere
Unisphere is the Adobe Flex GUI used to manage the TOE. Administrators must log into Unisphere in
order to manage the TOE or the policies that control user access. Management functionality is presented in
the form of multiple screens that contain graphical elements, such as fields, buttons, and boxes. Unisphere
also provides utilities to maintain and install the TOE.
1.4.2.2 Unisphere
Adobe Flash Player v11
Mozilla Firefox v28
The TOE relies on secure access provided by the network to which it is attached. The purpose of the TOE
is to mediate access to user data for File-based users and Block-based application servers connected to an
IP or FC network. Hosts connecting to the TOE to access storage must use CIFS, NFS, iSCSI, or FC.
21 For a list of supported disk drives, please refer to EMC VNXe Series Storage Systems Disk and OE
Matrix, available at https://support.emc.com/products/30951_VNXe3200/Documentation/.
EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™ Hardware Page 9 of 45
© 2015 EMC® Corporation
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Security Target, Version 1.2 July 8, 2015
An LDAPv3-compliant Microsoft Active Directory Domain Controller is included within the TOE
Environment in order to provide remote password-based authentication for the TOE for administrators and
CIFS File-based users. A NIS Server is also included within the TOE environment for remote password-
based authentication to the TOE for NFS File-based users. A Network Time Protocol Server is included
within the TOE Environment in order to synchronize the system time of the TOE with the rest of the
deployment environment.
The essential physical components for the proper operation of the TOE in its minimal configuration are:
TOE:
o Software:
EMC VNXe Operating Environment v3.1.1 software (includes EMC VNXe
Unisphere)
EMC VNXe Unisphere CLI (UEMCLI) v3.0
o Hardware:
EMC VNXe3200 DPE – includes two SPs
EMC VNXe3200 DAE
EMC EFD and SAS disk drives
TOE Environment:
o Management workstation used to access the Unisphere GUI via a web browser or the
UEMCLI (the workstation and web browser are not included within the TOE boundary)
o LDAPv3-compatible Server (Active Directory)
o NTP Server (Active Directory)
o NIS Server
o Application Servers accessing Block storage
o Client Systems accessing File storage
22
CLI – Command Line Interface
EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™ Hardware Page 10 of 45
© 2015 EMC® Corporation
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Security Target, Version 1.2 July 8, 2015
Security Audit
User Data Protection
Identification and Authentication
Security Management
The TOE protects user data primarily in two additional ways. First, it ensures that only the users or
application servers that have been granted access to LUNs have access to those LUNs. Second, it ensures
the integrity of the data entrusted to it through its use of RAID levels.
The TOE is managed by authorized users through the Unisphere GUI and the UEMCLI. Unisphere GUI is
an Adobe Flex application that runs within a web browser. UEMCLI is a command line interface that
provides access to common functions for monitoring and managing the TOE.
The Security Management function provides administrators with the ability to properly manage and
configure the TOE storage. Administrators are assigned a role that governs what aspects of the TOE they
are authorized to manage. Configuration of RAID settings and administrator access is all supported
through this security function.
Event Enabler
REST interface
SMI-S interface
VASA interface
File-level retention
Simple Mail Transfer Protocol (SMTP) and Simple Network Management Protocol (SNMP)
notification functionality
2 Conformance Claims
This section and Table 2 provide the identification for any CC, Protection Profile (PP), and EAL package
conformance claims. Rationale is provided for any extensions or augmentations to the conformance
claims. Rationale for CC and PP conformance claims can be found in Section 8.1.
Table 2 CC and PP Conformance
Common Criteria Common Criteria for Information Technology Security Evaluation, Version 3.1,
(CC) Identification Release 4, September 2012; CC Part 2 conformant; CC Part 3 conformant; PP
and Conformance claim (none); Parts 2 and 3 Interpretations of the CEM as of 2014-12-11 were
reviewed, and no interpretations apply to the claims made in this ST.
PP Identification None
Evaluation EAL2+ augmented with Flaw Reporting Procedures (ALC_FLR.2)
Assurance Level
3 Security Problem
This section describes the security aspects of the environment in which the TOE will be used and the
manner in which the TOE is expected to be employed. It provides the statement of the TOE security
environment, which identifies and explains all:
Known and presumed threats countered by either the TOE or by the security environment
Organizational security policies with which the TOE must comply
Assumptions about the secure usage of the TOE, including physical, personnel and connectivity
aspects
Attackers who are not TOE users: They have public knowledge of how the TOE operates and are
assumed to possess a low skill level, limited resources to alter TOE configuration settings or
parameters and no physical access to the TOE.
TOE users: They have extensive knowledge of how the TOE operates and are assumed to possess
a high skill level, moderate resources to alter TOE configuration settings or parameters and
physical access to the TOE. (TOE users are, however, assumed not to be willfully hostile to the
TOE.)
[Both are assumed to have a low level of motivation. The IT assets requiring protection are the TSF24 and
user data saved on or transitioning through the TOE and the hosts on the protected network. Removal,
diminution and mitigation of the threats are through the objectives identified in Section 4 Security
Objectives. Table 3 below lists the applicable threats.
Table 3 Threats
Name Description
T.DATA_CORRUPTION Data could become corrupted due to hardware failure or incorrect
system access by users of the TOE or attackers.
T.IMPROPER_SERVER A system connected to the TOE could access data that it was not
intended to gain access by bypassing the protection mechanisms of the
TOE.
T.IMPROPER_CONFIG The TOE could be misconfigured to provide improper storage or
enforce improper access to user data.
T.MEDIATE_ACCESS Access to user data could be improperly granted to users who should
not have access to it.
T.UNAUTH An unauthorized user could access data stored by the TOE by
bypassing the protection mechanisms of the TOE.
23
IT – Information Technology
24
TSF – TOE Security Functionality
EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™ Hardware Page 14 of 45
© 2015 EMC® Corporation
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Security Target, Version 1.2 July 8, 2015
3.3 Assumptions
This section describes the security aspects of the intended environment for the evaluated TOE. The
operational environment must be managed in accordance with assurance requirement documentation for
delivery, operation, and user guidance. Table 4 lists the specific conditions that are required to ensure the
security of the TOE and are assumed to exist in an environment where this TOE is employed.
Table 4 Assumptions
Name Description
A.MANAGE There are one or more competent individuals assigned to manage the
TOE and the security of the information it contains.
A.NOEVIL Administrators are non-hostile, appropriately trained, and follow all
administrator guidance.
A.PHYSICAL Physical security will be provided for the TOE and its environment.
The TOE is on an internal network and the environment protects
against all external access to the operating system.
A.TIMESTAMP The IT environment provides the TOE with the necessary reliable
timestamps.
4 Security Objectives
Security objectives are concise, abstract statements of the intended solution to the problem defined by the
security problem definition (see Section 3). The set of security objectives for a TOE form a high-level
solution to the security problem. This high-level solution is divided into two part-wise solutions: the
security objectives for the TOE, and the security objectives for the TOE’s operational environment. This
section identifies the security objectives for the TOE and its supporting environment.
Name Description
O.AUDIT The TOE must record audit records for data accesses and use of the
TOE functions on the management system.
O.AUDIT_REVIEW The TOE must provide authorized administrators with the ability to
review the audit trail.
O.ADMIN The TOE must provide a method for administrative control of the
TOE.
O.PROTECT The TOE must protect data that it has been entrusted to protect.
O.I&A The TOE will verify that users have been uniquely identified and
authenticated before granting those users access to the TSFs where
authentication is required.
Name Description
OE.SECURE_SERVERS The TOE Environment must provide properly configured
authentication servers and client machines to communicate with
the TOE.
OE.TIME The TOE environment must provide reliable time stamps to the
TOE.
OE.PROPER_NAME_ASSIGNMENT The TOE Environment must provide accurate World Wide Names
for each system that communicates with the TOE.
Name Description
NOE.MANAGE Sites deploying the TOE will provide competent TOE administrators
who will ensure the system is used securely.
NOE.NOEVIL Sites using the TOE shall ensure that TOE administrators are non-
hostile, appropriately trained, and follow all administrator guidance.
NOE.PHYSICAL The TOE will be used in a physically secure site that protects it from
interference and tampering by untrusted subjects.
5 Extended Components
There are no extended SFRs or SARs defined for this evaluation of the TOE.
6 Security Requirements
This section defines the SFRs and SARs met by the TOE. These requirements are presented following the
conventions identified in Section 6.1.
6.1 Conventions
There are several font variations used within this ST. Selected presentation choices are discussed here to
aid the Security Target reader.
The CC allows for assignment, refinement, selection and iteration operations to be performed on security
functional requirements. All of these operations are used within this ST. These operations are performed
as described in Part 2 of the CC, and are shown as follows:
Completed assignment statements are identified using [italicized text within brackets].
Completed selection statements are identified using [underlined text within brackets].
Refinements are identified using bold text. Any text removed is stricken (Example: TSF Data)
and should be considered as a refinement.
Extended Functional and Assurance Requirements are identified using “EXT_” at the beginning of
the short name.
Iterations are identified by appending a letter in parentheses following the component title. For
example, FAU_GEN.1a Audit Data Generation would be the first iteration and FAU_GEN.1b
Audit Data Generation would be the second iteration.
Name Description S A R I
FAU_GEN.1 Audit data generation
FAU_SAR.1 Audit review
FDP_ACC.1a Subset access control
FDP_ACF.1a Security attribute based access control
FDP_ACC.1b Subset access control
FDP_ACF.1b Security attribute based access control
FDP_SDI.2 Stored data integrity
FIA_ATD.1 User attribute definition
FIA_UAU.2 User authentication before any action
FIA_UID.2 User identification before any action
FMT_MSA.1a Management of security attributes
FMT_MSA.1b Management of security attributes
FMT_MSA.3a Static attribute initialisation
Name Description S A R I
FMT_MSA.3b Static attribute initialisation
FMT_MTD.1a Management of TSF data
FMT_MTD.1b Management of TSF data
FMT_MTD.1c Management of TSF data
FMT_SMF.1 Specification of management functions
FMT_SMR.1 Security roles
Application note: the Subjects are application servers connected to the TOE acting on behalf of an
authorized user.
25
SFP – Security Functional Policy
EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™ Hardware Page 22 of 45
© 2015 EMC® Corporation
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Security Target, Version 1.2 July 8, 2015
Application Note: The CIFS naming convention has been used for operations. NFS v2 and NFS v3 access
supports the following subset of commands: Create, Read, Write, Delete, Change Ownership, Read
Permissions, Change Permissions, Read Attributes, Write Attributes.
26
DACL – Discretionary Access Control List
EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™ Hardware Page 23 of 45
© 2015 EMC® Corporation
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Security Target, Version 1.2 July 8, 2015
User Authentication applies to users accessing File-based storage on the TOE as well as administrators
accessing management functionality via the management interfaces.
User Identification applies to users accessing File-based storage on the TOE as well as administrators
accessing management functionality via the management interfaces.
Application Note: The Block Storage Access Control SFP does not actually control access to the security
attributes; rather, these attributes are used in the enforcement of the Block Storage Access Control SFP
and are restricted by role-based access control.
Application Note: The File Storage Access Control SFP does not actually control access to the security
attributes; rather, these attributes are used in the enforcement of the File Storage Access Control SFP and
are restricted by role-based access control.
d) Manage storage
e) Manage users
].
Role Description
Operator Can only perform monitoring activities in
Unisphere. Read-only access.
Storage Administrator Can configure Unisphere and provision and reclaim
storage.
Administrator All administration capabilities.
Assurance Requirements
Class ASE: Security Target ASE_CCL.1 Conformance claims
evaluation
ASE_ECD.1 Extended components definition
ASE_INT.1 ST introduction
ASE_OBJ.2 Security objectives
ASE_REQ.2 Derived security requirements
ASE_SPD.1 Security problem definition
ASE_TSS.1 TOE summary specification
Class ALC : Life Cycle Support ALC_CMC.2 Use of a CM system
ALC_CMS.2 Parts of the TOE CM Coverage
ALC_DEL.1 Delivery Procedures
ALC_FLR.2 Flaw reporting procedures
Class ADV: Development ADV_ARC.1 Security Architecture Description
ADV_FSP.2 Security-enforcing functional specification
File Storage Access Control SFP: All access to storage is performed via a CIFS or NFS client on behalf
of the user. These clients are basic pieces of software (such as the CIFS client within Windows Explorer)
used to map and access file-based storage. The TOE enforces the File Storage Access Control SFP on
users connecting to the storage on the TOE for NFS and CIFS. After successful authentication for NFS
users, the TOE checks user permissions for each file or directory’s ACL on each user’s access request to
determine if the user has appropriate permissions to access the files or directories. After successful
authentication for CIFS users, the TOE checks user permissions for each file or directory’s DACL on each
user’s access request to determine if the user has appropriate permissions to access the files or directories.
The ability to connect to an NFS mount or CIFS share is granted to users by Administrators or Storage
Administrators. Users are associated with CIFS shares via an access list, while a list of IP addresses is
associated with NFS mounts as an access list.
Individual file and directory access control management is granted to CIFS users with File Owner or
Change Permissions set in the DACL for the user. NFS users with the root role can modify permissions for
all files and directories, or users with the File Owner or Change Permissions for any given file or directory
can manage access controls for those particular files and directories.
A Linux/Unix host can mount to the VNXe hosted NFS Shared Folder Server if the host has been explicitly
authorized to the NFS Shared Folder Server. Similarly, a Windows user can map to the VNXe hosted CIFS
Shared Folder Server if the user has been explicitly authorized to the CIFS Shared Folder.
The export of a CIFS Shared Folder Server is based off of the Server Configuration LDAP setting. The
VNXe hosted CIFS Shared Folder Server must be in a Windows domain with an LDAPv3-compatible
server set up. A Windows client machine can map to the share only if it is a member of the defined domain.
For CIFS access, subjects that are members of the group Domain Administrators shall be authorized to
backup, restore, and take ownership of all objects.
27
SFP – Security Functional Policy
EMC VNXe™ OE v3.1.1 with Unisphere and VNXe3200™ Hardware Page 31 of 45
© 2015 EMC® Corporation
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Security Target, Version 1.2 July 8, 2015
Client machine access to the VNXe hosted NFS Shared Folder Server can be configured based on IP
address or network host name, IP subnet range, or a Netgroup. For the NFS access protocol, users
connecting to TOE storage who are superusers can perform all operations on all objects. Clients must be
recognized as “trusted” by the system in order to submit a root request, otherwise it will be mapped to the
“nobody” role.
Each file and directory has an ACL associated with it. Each ACL has a set of permissions that are granted
or explicitly denied to that user. Whenever a user requests an access to a file or directory, the TOE utilizes
its File Storage Access Control SFP (stored with each file and directory) to decide whether or not that
access is permitted.
Using the Security Management security function, Administrators of the TOE can configure Logical Units
to provide storage to client machines. LUNs allow Administrators to limit access to one or more specified
application servers. When an iSCSI application server requests a list of available LUNs from the TOE, the
TOE Environment provides an IQN, or a WWN for FC application servers. This IQN or WWN is used to
identify the application servers to the TOE. If the iSCSI application server has a host object created to
represent itself on the TOE, the TOE then provides a list of LUNs that the application server has been
granted access to. FC is slightly more complicated by requiring the physical adapters to be connected to
the application server (either through the SAN fabric or otherwise). Once the host is connected to the
proper Host Bus Adapter (HBA), the WWN for the host can be associated with a host object on the TOE as
is done with iSCSI. After all of this, each successive request to read or write information to or from a
LUN, the TOE ensures that only authorized application servers have access to the LUNs to which they
have been given access.
7.1.2.3 RAID
The TOE also provides for the integrity of user data. When creating RAID Groups from individual disk
drives, an Administrator can configure RAID levels 1/0, 5, or 6. Each of these provides fault tolerance for
integrity errors or individual disk drive failure. The TOE provides mechanisms to check data integrity
continuously while reading and writing data to individual disks. Integrity errors or drive errors are fixed
on-the-fly. Additionally, Administrators can configure “hot spare” disk drives. These “hot spares” are
used when a disk failure has been detected by the system. Once a failure has been detected, the drive that
has been lost will be recreated on the “hot spare”. The Administrator can then replace the failed drive and
configure it as a new “hot spare”. This process is provided while real-time access to user data continues.
When an integrity error occurs, the TOE notifies the administrator of the error. This notification is an alert
that is placed in a log file. Administrators can view alerts via the Alerts page of Unisphere or from the
UEMCLI.
authentication services. Once the username and password has been verified, the TOE uses the message
returned from the LDAP or NIS server to assign a role to users and administrators.
For NFSv2 and NFSv3, users are authenticated against a NIS server. The server from which the request is
coming is identified and authenticated based on the username and password. If the user ID is “root” then
the host must also be assigned as a “trusted host” within the TOE configuration.
Administrators, storage administrators, and operators may use Unisphere or UEMCLI to query all
administrative information on the TOE. This includes all TOE configuration settings, all storage
information, and all user accounts on the system. Only users with the administrator role may manage users.
User accounts can only be managed via UEMCLI or Unisphere.
Client machines accessing the TOE via CIFS and NFS protocols have restrictive default attributes and are
not granted any access to data until the TOE verifies that each user has been identified and authenticated by
the LDAPv3-compatible server or NIS server in the TOE Environment. Once authenticated, the user is
granted access according to the DACL (CIFS) or ACL (NFS) associated with each file and directory. CIFS
and NFS file and directory attributes that can be modified include read, write, and execute permissions.
For CIFS users, the user is granted access to the share based on whether they have read and write
permissions for the whole share, as granted by a Domain Administrator via a CIFS client (no permissions
are set by default). For NFS, the IP address of the system accessing storage must be authorized before any
access is allowed. In these ways, access to storage via the File Storage Access Control SFP are restrictive
by default.
Unisphere and UEMCLI administrators with the Administrator or Storage Administrator role can modify
the NFS access lists and CIFS Domain Administrator attributes. Domain Administrators can modify CIFS
share permissions via a CIFS client, and users assigned file owner or change permissions rights for a file
can modify the read, write, and execute settings for each file.
Application servers accessing the TOE via block protocols have restrictive default values and are required
to be listed in the TOE configuration with a valid WWN or IQN in order access stored data. Additionally,
the WWN must be mapped to a valid initiator in order to access the storage for FC.
The TOE provides mechanisms to govern which hosts can access which LUNs. The Security Management
function allows Administrators to properly configure this functionality. Additionally, the storage
management portion of Unisphere allows administrators to manage the RAID settings for storage, although
this can also be managed via UEMCLI.
Administrators of the TOE are assigned one of the roles described in Table 10 above. Section 7.1.2 above
describes how the Block and File Access Control SFPs are managed.
8 Rationale
8.1 Conformance Claims Rationale
This Security Target conforms to Part 2 and Part 3 of the Common Criteria for Information Technology
Security Evaluation, Version 3.1 Release 4.
Every Threat is mapped to one or more Objectives in the table above. This complete mapping
demonstrates that the defined security objectives counter all defined threats.
Every assumption is mapped to one or more Objectives in the table above. This complete mapping
demonstrates that the defined security objectives uphold all defined assumptions.
The augmentation of ALC_FLR.2 was chosen to give greater assurance of the developer’s on-going flaw
reporting procedures.
9 Acronyms
This section and Table 17 define the acronyms used throughout this document.
9.1 Acronyms
Table 17 Acronyms
Acronym Definition
ACL Access Control List
API Application Programming Interface
CC Common Criteria
CIFS Common Internet File System
CLI Command Line Interface
CPU Central Processing Unit
CSX Common Software eXecution
DPE Disk Processor Enclosure
DRAM Dynamic Random Access Memory
EAL Evaluation Assurance Level
EFD Enterprise Flash Drive
FAST Fully Automated Storage Tiering
FC Fibre Channel
GUI Graphical User Interface
HBA Host Bus Adapter
HDD Hard Disk Drive
Health Insurance Portability and Accountability Act of
HIPAA
1996
ID Identifier
IP Internet Protocol
IQN iSCSI Qualified Name
iSCSI Internet Small Computer System Interface
IT Information Technology
LUN Logical Unit or Logical Unit Number
MCx Multicore x
NAS Network Attached Storage
NFS Network File System
NIS Network Information Service
Acronym Definition
NL SAS Near Line Serial Attached SCSI
OSP Organizational Security Policy
PP Protection Profile
RAID Redundant Array of Independent Disks
REST Representational State Transfer
SAN Storage Area Network
SAR Security Assurance Requirement
SAS Serial Attached SCSI
SCSI Small Computer System Interface
SFP Security Functional Policy
SFR Security Functional Requirement
SMB System Message Block
SMI-S Storage Management Initiative Specification
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SOX Sarbanes-Oxley Act of 2002
SP Storage Processor
SSD Solid State Drive
ST Security Target
TOE Target of Evaluation
TSF TOE Security Functionality
UEMCLI Unified Element Manager Command Line Interface
VASA vStorage APIs for Storage Awareness
VP Virtual Pool
WWN World Wide Name