RSA , The Security Division Of EMC RSA Archer EGRC .

Transcription

RSA , The Security Division of EMC RSA Archer eGRC Platform v5.0Security TargetEvaluation Assurance Level (EAL): EAL2 Document Version: 0.6Prepared for:Prepared by:RSA , The Security Division of EMC 174 Middlesex TurnpikeBedford, MA 01730United States of AmericaCorsec Security, Inc.13135 Lee Jackson Memorial Hwy., Suite 220Fairfax, VA 22033United States of AmericaPhone: 1 (877) 722-4900Email: info@rsa.comhttp://www.rsa.comPhone: 1 (703) 267-6050Email: info@corsec.comhttp://www.corsec.com

Security Target, Version 0.6September 20, 2011Table of Contents1INTRODUCTION . 41.1 PURPOSE . 41.2 SECURITY TARGET AND TOE REFERENCES . 41.3 PRODUCT OVERVIEW . 41.3.1 Platform Components . 61.3.2 Reports and Dashboards . 71.4 TOE OVERVIEW . 81.5 TOE ENVIRONMENT . 81.6 TOE DESCRIPTION . 91.6.1 Physical Scope. 91.6.2 Logical Scope . 101.6.3 Product Physical/Logical Features and Functionality not included in the TSF . 112CONFORMANCE CLAIMS . 123SECURITY PROBLEM . 133.1 THREATS TO SECURITY.133.2 ORGANIZATIONAL SECURITY POLICIES .133.3 ASSUMPTIONS .144SECURITY OBJECTIVES . 154.1 SECURITY OBJECTIVES FOR THE TOE .154.2 SECURITY OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT.154.2.1 IT Security Objectives . 154.2.2 Non-IT Security Objectives . 155EXTENDED COMPONENTS . 176SECURITY REQUIREMENTS . 186.1.1 Conventions . 186.2 SECURITY FUNCTIONAL REQUIREMENTS .186.2.1 Class FAU: Security Audit . 206.2.2 Class FDP: User Data Protection . 226.2.3 Class FIA: Identification and Authentication. 236.2.4 Class FMT: Security Management . 246.2.5 Class FMT: TOE Access . 266.3 SECURITY ASSURANCE REQUIREMENTS .277TOE SPECIFICATION . 287.1 TOE SECURITY FUNCTIONS .287.1.1 Security Audit . 297.1.2 User Data Protection. 297.1.3 Identification and Authentication. 297.1.4 Security Management . 307.1.5 TOE Access . 308RATIONALE . 318.1 CONFORMANCE CLAIMS RATIONALE .318.2 SECURITY OBJECTIVES RATIONALE .318.2.1 Security Objectives Rationale Relating to Threats . 318.2.2 Security Objectives Rationale Relating to Policies . 328.2.3 Security Objectives Rationale Relating to Assumptions . 348.3 RATIONALE FOR EXTENDED SECURITY FUNCTIONAL REQUIREMENTS .358.4 RATIONALE FOR EXTENDED TOE SECURITY ASSURANCE REQUIREMENTS .358.5 SECURITY REQUIREMENTS RATIONALE .358.5.1 Rationale for Security Functional Requirements of the TOE Objectives . 35RSA Archer eGRC Platform v5.0 2011 RSA , The Security Division of EMC This document may be freely reproduced and distributed whole and intact including this copyright notice.Page 2 of 41

Security Target, Version 0.68.5.28.5.39September 20, 2011Security Assurance Requirements Rationale . 38Dependency Rationale . 38ACRONYMS . 40Table of FiguresFIGURE 1 – RSA ARCHER EGRC PLATFORM V5.0.5FIGURE 2 – RSA ARCHER EGRC PLATFORM V5.0 COMPONENTS .6FIGURE 3 – PHYSICAL TOE BOUNDARY .9List of TablesTABLE 1 - ST AND TOE REFERENCES .4TABLE 2 - CC AND PP CONFORMANCE . 12TABLE 3 - THREATS . 13TABLE 4 - ORGANIZATIONAL SECURITY POLICIES . 14TABLE 5 - ASSUMPTIONS . 14TABLE 6 - SECURITY OBJECTIVES FOR THE TOE . 15TABLE 7 - IT SECURITY OBJECTIVES . 15TABLE 8 - NON-IT SECURITY OBJECTIVES . 16TABLE 9 - TOE SECURITY FUNCTIONAL REQUIREMENTS . 18TABLE 10 - ASSURANCE REQUIREMENTS . 27TABLE 11 - MAPPING OF TOE SECURITY FUNCTIONS TO SECURITY FUNCTIONAL REQUIREMENTS. 28TABLE 12 - THREATS:OBJECTIVES MAPPING . 31TABLE 13 - POLICIES:OBJECTIVES MAPPING . 32TABLE 14 - ASSUMPTIONS:OBJECTIVES MAPPING . 34TABLE 15 - OBJECTIVES:SFRS MAPPING . 35TABLE 16 - FUNCTIONAL REQUIREMENTS DEPENDENCIES . 38TABLE 17 - ACRONYMS . 40RSA Archer eGRC Platform v5.0 2011 RSA , The Security Division of EMC This document may be freely reproduced and distributed whole and intact including this copyright notice.Page 3 of 41

Security Target, Version 0.6September 20, 20111IntroductionThis section identifies the Security Target (ST), Target of Evaluation (TOE), and the ST organization. TheTOE is the RSA Archer eGRC Platform v5.0, and will hereafter be referred to as the TOE throughout thisdocument. This software-only TOE is a platform for building on-demand applications and packaging theminto solutions that solve specific business needs.1.1 PurposeThis ST is divided into nine sections, as follows: Introduction (Section 1) – Provides a brief summary of the ST contents and describes theorganization of other sections within this document. It also provides an overview of the TOEsecurity functions and describes the physical and logical scope for the TOE, as well as the ST andTOE references.Conformance Claims (Section 2) – Provides the identification of any Common Criteria (CC), STProtection Profile, and Evaluation Assurance Level (EAL) package claims. It also identifieswhether the ST contains extended security requirements.Security Problem (Section 3) – Describes the threats, organizational security policies, andassumptions that pertain to the TOE and its environment.Security Objectives (Section 4) – Identifies the security objectives that are satisfied by the TOEand its environment.Extended Components (Section 5) – Identifies new components (extended Security FunctionalRequirements (SFRs) and extended Security Assurance Requirements (SARs)) that are notincluded in CC Part 2 or CC Part 3.Security Requirements (Section 6) – Presents the SFRs and SARs met by the TOE.TOE Specification (Section 7) – Describes the security functions provided by the TOE that satisfythe security functional requirements and objectives.Rationale (Section 8) – Presents the rationale for the security objectives, requirements, and SFRdependencies as to their consistency, completeness, and suitability.Acronyms (Section 9) – Defines the acronyms and terminology used within this ST.1.2 Security Target and TOE ReferencesTable 1 - ST and TOE ReferencesST TitleRSA , The Security Division of EMC RSA Archer eGRC Platform v5.0Security TargetST VersionVersion 0.6ST AuthorCorsec Security, Inc.ST Publication DateSeptember 20, 2011TOE ReferenceRSA Archer eGRC Platform v5.0, build 5.0.2.11301.3 Product OverviewThe Product Overview provides a high level description of the product that is the subject of the evaluation.The following section, TOE Overview, will provide the introduction to the parts of the overall productoffering that are specifically being evaluated.RSA Archer eGRC Platform v5.0 2011 RSA , The Security Division of EMC This document may be freely reproduced and distributed whole and intact including this copyright notice.Page 4 of 41

Security Target, Version 0.6September 20, 2011The RSA Archer eGRC Platform supports business-level management of Enterprise Governance, Risk, andCompliance (eGRC). As the foundation for all RSA Archer eGRC Solutions, the Platform allows you toadapt the solutions to your requirements, build your own applications, and integrate with other systemswithout writing a single line of code.Figure 1 – RSA Archer eGRC Platform v5.0The RSA Archer eGRC Platform is: Flexibleo The Platform offers a point-and-click interface for building and managing businessapplications. Non-technical users can automate processes, streamline workflow, controluser access, tailor the user interface, and report in real-time.Unifiedo RSA provides a common platform to manage policies, controls, risks, assessments anddeficiencies across lines of business. This unified approach eases system complexity,strengthens user adoption, and reduces training time.Collaborativeo The Platform enables cross-functional collaboration and alignment. Business usersacross IT1, finance, operations and legal domains can work together in an integratedframework using common processes and data.A few of RSA Archer eGRC Platform v5.0’s key features are: 1Rapid Application Developmento Administrators can seize the power of the RSA Archer eGRC Platform to modelhundreds of business processes in a fraction of the time it would take to developtraditional custom applications.Deployment Flexibilityo Administrators can balance administrative control, time-to-value, and cost considerationswhen planning their implementation of the RSA Archer eGRC Platform.System Integrationo Administrators can automate the movement of data into and out of the RSA ArchereGRC Platform to support data analysis, process management, and reporting.Archer eGRC ExchangeIT: Information TechnologyRSA Archer eGRC Platform v5.0 2011 RSA , The Security Division of EMC This document may be freely reproduced and distributed whole and intact including this copyright notice.Page 5 of 41

Security Target, Version 0.6o1.3.1September 20, 2011Users can take advantage of pre-built applications and integrations for the RSA ArchereGRC Platform. They can test drive, download and deploy from the Archer eGRCExchange.Platform ComponentsThe RSA Archer eGRC Platform offers a point-and-click interface for tailoring solutions, building newapplications and integrating with external data sources. Non-technical users can automate businessprocesses, streamline workflow, control user access, adapt the user interface and deliver real-time reportswithout relying on IT to accomplish their goals.Figure 2 – RSA Archer eGRC Platform v5.0 Components1.3.1.1Application BuilderThe Application Builder offers powerful tools and a user-friendly interface for building and tailoringbusiness applications with no programming required. Administrators can design applications to captureand display any kind of data, and they have full control over the page layout, allowing them to create anintuitive experience for end users.1.3.1.2Reports and DashboardsTo gain value from the data, administrators need a comprehensive, real-time view of the business. Throughthe RSA Archer eGRC Platform, administrators can generate actionable reports that allow them to sharedata with other users and track the status of various initiatives. They can also build graphical, role-specificdashboards to monitor metrics across business units.1.3.1.3Access ControlTo ensure the integrity of the business data and a streamlined user experience, administrators need toenforce access controls so users can interact only with the information that is appropriate for their roles.With powerful yet easy-to-use access control features, administrators can control information access at thesystem, application, record and field level.1.3.1.4User ExperienceThe RSA Archer eGRC Platform offers a simple interface for customizing the user’s experience in thesoftware, including branding applications with a corporate look and feel. Administrators are free to useRSA Archer eGRC Platform v5.0 2011 RSA , The Security Division of EMC This document may be freely reproduced and distributed whole and intact including this copyright notice.Page 6 of 41

Security Target, Version 0.6September 20, 2011their unique company colors, graphics, icons and text to facilitate end-user adoption of new applications.Administrators can also embed custom instructions in the user interface to facilitate self-training anddiminish the learning curve.1.3.1.5NotificationsThe RSA Archer eGRC Platform allows administrators to automatically notify users via email when newinformation requires their attention, when tasks enter their queue, or when deadlines approach. To ensurethat right users are alerted at the right time, RSA enables administrators to define simple or complexnotification rules. Email notifications can also include direct links to the content that users need to takeaction or make a decision.1.3.1.6Business WorkflowWorkflow capabilities allow administrators to define and automate business processes for streamlining themanagement of content, tasks, statuses, and approvals. Through the content review feature, administratorscan route information to subject-matter experts for editing or authorization prior to sharing that

Administrators can also embed custom instructions in the user interface to facilitate self-training and diminish the learning curve. 1.3.1.5 Notifications The RSA Archer eGRC Platform allows admini