Zte MSC
Zte MSC
ZTE CORPORATION
NO. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://ensupport.zte.com.cn
E-mail: [email protected]
Publishing Date: 2011-08-18
Version: R1.1
LEGAL INFORMATION
Copyright 2011 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided as is, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
0.42 June 23, 2011 Added that logs can be deleted after 30 days. ZTE comments
added.
0.43 July 14, 2011 Added Certified Configuration Manual, corrected scope.
1.1 Aug 18, 2011 Change reference documents version number and legal information
[CCp2] Common Criteria for IT Security Evaluation, Part 2, v3.1r3, July 2009
[CCp3] Common Criteria for IT Security Evaluation, Part 3, v3.1r3, July 2009
I
This page intentionally left blank.
II
Contents
References ...................................................................................................... I
Chapter 1 ST Introduction ................................................................................... 1-1
1.1 ST and TOE References............................................................................................... 1-1
1.2 TOE Overview and Usage .......................................................................................... 1-1
1.2.1 Major Security Features.................................................................................................. 1-4
I
Chapter 7 Rationales.................................................................................. 7-1
7.1 Security Objectives Rationale.................................................................................................. 7-1
Figures...................................................................................................................... I
II
Chapter 1
ST Introduction
Table of Contents
ST and TOE References ............................................................................................1-1
TOE Overview and Usage ..........................................................................................1-1
TOE Description .........................................................................................................1-5
1-1
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
A Secure Network: This is the internal network of the provider, and is considered
secure in this evaluation.
An External network: This is an external network (it might even include Internet) and
is considered insecure in this evaluation.
The MSCS is the management and control part of the IMS Network and is therefore
connected to a wide variety of other systems and networks, as shown in Figure 1-2 .
1-2
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 1 ST Introduction
1-3
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
consists of mobile phones and similar equipment that uses GSM and/or UMTS. It
is considered a trusted network in this evaluation.
The other part of IMS network: This includes elements like:
The MGW (Media Gateway), which provides transcoding services and is
controlled by the MSCS
The HLR (Home Location Register), which provides a mobile subscriber location
register.
These elements interact with the MSCS to perform the management and control
functions of the IMS network.
The other part of IMS Network is considered a trusted network in this evaluation, as are
the MGW, HLR and other elements.
The MSCS has the following general functionalities:
Telecommunications functionality
Interact with PSTN, Wireless Network, other parts of IMS network to perform the
management and control functions of the IMS network
Interact with the Billing Center to charge for these functionalities
Lawful Interception:
Interact with MGW to ensure that intercepted voice data is sent to the LIC
Management:
Interact with EMS to be managed and configured (except for lawful interception)
1-4
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 1 ST Introduction
3. This is the evaluated configuration. The MSCS can be extended with additional GPBX1 boards (for
fault tolerance) or additional GPBB0 boards (for increased capacity), but these options were not
evaluated.
4. These are boards built by ZTE. The last digit is the version number.
5. Note that this includes the Service Part, the CUS (v4.10.20) and the OMS (v4.10.13).
6. Note that the Service Part of the MSCS is extensible with additional boards to add capacity. This
should have no effect on security. In this evaluation only the non-extended configuration was tested.
1-5
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
Certified Configuration
CC Security Evaluation Certified Configuration R1.2
Standard Guidance
MSC Server Product Description
MSC Server Signaling Description
MSC Server Hardware Description
Hardware Installation Guide
Software Installation Guide
Data Configuration Guide(MSCS I)
Data Configuration Guide(MSCS II)
Alarm Management Operation Guide
Performance Management Operation Guide
Signaling Trace Operation Guide
General Operation Guide R1.2
Parts Replacement Guide
Alarm Message Reference
Notification Message Reference
Troubleshooting Guide
Routine Maintenance Guide
Performance Counter Reference (Global Traffic)
Performance Counter Reference (Signal Measurement)
Performance Counter Reference (Base Measurement)
Performance Counter Reference (Global Measurement and Charge Statistics)
Performance Counter Reference (Combination Traffic)
Performance Counter Reference (Special Operation)
Performance Counter Reference (Handover Operation)
Performance Index Reference
Documentation Guide
Interception Service User Guide
1-6
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 1 ST Introduction
LIG V3.10.22
Secure management of the TOE, to ensure that only properly authorized staff can
manage the TOE.
Secure access to the Lawful Interception functionality of the TOE, ensuring that only
the LIC can access this functionality.
Secure interaction between the TOE and the Billing Center, so that billing data cannot
be read or modified in between these two.
Secure management of the TOE, to ensure that only properly authorized staff can manage the TOE.
Proper authentication (who is the user), authorization (what is the user allowed to do)
and auditing (what has the user done)
Protection of communication between Client/EMS and MSCS against disclosure,
undetected modification and masquerading
7. The difference is that the EMS is centralised while the OMM Client is local to the specific
MSCS instance. EMS has limited management functionalities while OMM has full
management functionalities
1-7
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
Note that the first bullet is out-of-scope for the EMS, since it is not part of the TOE. The
protection of communication between EMS and OMS is in scope.
Provides secure access to its Lawful Interception functionality, ensuring that only the LIC can access
this functionality
The TOE will prevent EMS, OMM and LIG users from accessing its functionality, either
directly or by hacking the MSCS.
Provides secure interaction between itself and the Billing Center, itself and the EMS and itself and the
OMM Client so that data cannot be read or modified in between
1-8
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 2
Conformance Claims
This ST conforms to:
2-1
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
2-2
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 3
General Documentation
Table of Contents
Organisational Security Policies .................................................................................3-1
Threats.......................................................................................................................3-1
Assumptions ..............................................................................................................3-2
authenticate LIG users, log their activities8, and allow them to set-up and configure
the LIG functionality
authenticate CUS users, log their activities, and allow them to set-up and configure
the billing functionality
authenticate OMM users, log their activities, and allow OMM users to set-up and
configure the TOE functionality (except for billing and LIG functionality)
3.2 Threats
3.2.1 Assets and Threat Agents
The assets are:
The ability to allow various users to manage various aspects of the TOE securely,
especially the lawful interception functionality
The confidentiality and integrity of the communication between the TOE and:
Clients
EMS
Billing Center
8. Note that LIG user activities should be logged, but that LIC activities should not be
logged by the LIS due to the laws restriction in some country.
3-1
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
TA_ROGUE_USER_LIG: which has legitimate access to the LIG Client, but not
to the other Clients
TA_ROGUE_USER_OMM: which has legitimate access to the OMM Client, but
not to the other Clients
TA_ROGUE_USER_CUS: which has legitimate access to the CUS Client, but not
to the other Clients
2. TA.NETWORK An attacker with IP-access to the External Network that is connected
to the TOE
3. TA.PHYSICAL An attacker with physical access to the TOE
3.2.2 Threats
The combination of assets and threats gives rise to the following threats:
T.UNAUTHORISED
T.UNKNOWN_ USER
TA.NETWORK gains unauthorized access to the TOE and is able to perform actions on
the TOE.
T. NETWORK
TA.PHYSICAL gains physical access to the TOE (either clients or MSC Server) and is able
to perform actions on the TOE.
3.3 Assumptions
This Security Target uses one assumption:
A.TRUSTED_SYSTEMS
9. For example, the user is allowed to modify billing records in case of obvious error, but
he misuses this to delete all billing records.
3-2
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 3 General Documentation
It is assumed that:
The EMS, LIC, NTP Server and Billing Center are trusted, and will not be used to
attack the TOE.
The PSTN, Service Part Private Network, Wireless Network and Rest of IMS Network
are trusted networks, and will not be used to attack the TOE.
Traffic on the Secure Network or the connection between LIS and LIC cannot be
modified or read by threat agents.
The L3 switch will block all traffic from/to the external network except for:
3-3
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
3-4
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 4
Security Objectives
Table of Contents
Overfiew.....................................................................................................................4-1
Security Objectives for the TOE..................................................................................4-1
Security Objectives for the Operational Environment ..................................................4-2
4.1 Overfiew
These security objectives describe how the threats described in the previous section will
be addressed. It is divided into:
The Security Objectives for the TOE, describing what the TOE will do to address the
threats.
The Security Objectives for the Operational Environment, describing what other
entities must do to address the threats.
A rationale that the combination of all of these security objectives indeed addresses the
threats may be found in 7.1 Security Objectives Rationale of this Security Target.
O. AUTHORISE_LIG
The LIS shall support a flexible role-based authorization framework with predefined and
customizable roles. These roles can use the LI Client to manage the LIS. Each role allows
a user to perform certain actions, and the LIS shall ensure that users can only perform
actions when they have a role that allows this.
O.AUDITING_LIG
The LIS shall support logging and auditing of LIG user actions.Actions of the LIC shall not
be logged.
O. AUTHENTICATE_OMM
The OMS shall support OMM Client user authentication, allowing the OMS to accept/reject
OMM users based on username and password.
O. AUTHORISE_OMM
4-1
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
The OMS shall support a flexible role-based authorization framework with predefined and
customizable roles. These roles can use the OMS to manage the OMS and the Service
Part. Each role allows a user to perform certain actions, and the OMS shall ensure that
users can only perform actions when they have a role that allows this.
O.AUDITING_OMM
The OMS shall support logging and auditing of OMM user actions.
O. AUTHENTICATE_CUS
The CUS shall support CUS Client user authentication, allowing the CUS to accept/reject
CUS users based on username and password.
O. AUTHORISE_CUS
The CUS shall support a role-based authorization framework with predefined roles. These
roles can use the CUS Client to manage the CUS. Each role allows a user to perform
certain actions, and the CUS shall ensure that users can only perform actions when they
have a role that allows this.
O.AUDITING_CUS
The TOE shall support logging and auditing of CUS user actions.
O.SEPARATE_USERS
The TOE shall:
prohibit LIG users from accessing CUS and OMM related data and functionality
prohibit CUS users from accessing LIG and OMM related data and functionality
prohibit OMM users from accessing LIG and CUS related data and functionality
O.PROTECT_COMMUNICATION
The TOE shall:
protect communication between the TOE and the EMS against masquerading,
disclosure and modification
protect communication between the TOE and the Billing Center against
masquerading, disclosure and modification
protect communication between the OMM Client and the OMS against masquerading,
disclosure and modification
The operator shall ensure that workstations that host one of the Clients are protected from
physical and logical attacks that would allow attackers to subsequently:
Disclose passwords or other sensitive information
Hijack the client
4-2
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 4 Security Objectives
The operator shall protect the communication between LIC and LIS against disclosure,
masquerading and modification according to the laws of the appropriate country.
OE.SERVER_SECURITY
The operator shall ensure that the MSC Server shall be protected from physical attacks.
OE.TIME
The NTP Server shall supply the TOE with reliable time.
OE.TRUST&TRAIN_USERS
The operator shall ensure that LI, CUS and OMM roles are only assigned to users that are
sufficiently trustworthy and sufficiently trained to fulfill those roles.
OE.TRUSTED_SYSTEMS
The operator shall ensure that the EMS, LIC, Billing Center and NTP are trusted, and will
not be used to attack the TOE.
The operator shall ensure that the PSTN, Service Part Private Network, Wireless Network
and Rest of IMS Network are trusted networks, and will not be used to attack the TOE.
The operator shall configure the L3 switch to block all traffic from/to the external network
except for:
Selected traffic between EMS and OMS
Selected traffic between Billing Center and CUS
Selected traffic between OMS and OMM Client
4-3
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
4-4
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 5
Security Requirements
Table of Contents
Extended Components Definition ...............................................................................5-1
Definitions ..................................................................................................................5-1
Security Functional Requirements ..............................................................................5-2
Security Assurance Requirements............................................................................5-14
Security Assurance Requirements Rationale ............................................................5-15
FAU_GEN.3.1 The TSF shall be able to generate an audit record of the following auditable
events: [assignment: defined auditable events].
FAU_GEN.3.2 The TSF shall record within each audit record: Date and time of the event,
[assignment: other information about the event].
5.2 Definitions
The following terms are used in the security requirements:
Lawful Interception related roles:
LIG Administrator
LIG Supervisor
LIG Maintenance
LIG PowerUser
LIG Operator
Customizable roles
Lawful Interception related external entities:
LI Center (LIC)
5-1
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
OMM Administrator
OMM Supervisor
OMM Maintainer
OMM PowerUser
OMM Operator
Customizable roles
Management related external entities
CUS Admin
CUS Manager
CUS Operator
Billing related external entities
Billing Center
None of the roles above has full root access to the TOE. This is reserved for ZTE
maintenance staff that regularly service the TOE using the systems console, but this is
out of scope and not described further in this ST.
Objects:
Locking (of a user): a locked user can no longer login to the system until that user has
been unlocked.
Locking (of a role): if a role is locked, users that login and would normally get that role,
do not get that role until they login again and the role is unlocked.
The following notational conventions are used in the requirements. Operations are
indicated in bold, except refinements, which are indicated in bold italic. In general
refinements were applied to clarify requirements and/or make them more readable.
Iterations were indicated by adding three letters to the component name.
5-2
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 5 Security Requirements
FIA_UID.2.1 The CUS shall require each CUS- user to be successfully identified
FIA_AFL.1.2 When the defined number of unsuccessful authentication attempts has been
met, the CUS shall lock the CUS-user account11
10. For administrator, the IP range can directly be configured. For normal users the IP
range can be configured via the roles.
11. Unless this account has been set to unlockable.
5-3
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
FIA_SOS.1.1 The CUS shall provide a mechanism to verify that CUS passwords meet:
At least 6 characters including three of the four types: number, small letter,
capital letter, other characters
cannot be the same as the user name, the user name twice12 ,the username in
reverse13 or a common dictionary word
can be configured to expire after a configurable amount of time < 180 days
can be configured to be different from the previous 5 CUS-passwords when
changed
FTA_SSL.3.CUS TSF-initiated termination
FTA_MCS.1.1 The CUS shall restrict the maximum number of concurrent sessions that
belong to the same CUS-user.
FTA_MCS.1.2 The CUS shall enforce, by default, a limit of 1 sessions per CUS-user and
a limit of 64 sessions for all CUS-users together.
FMT_SMR.1.CUS Security roles
CUS Admin
CUS Manager
CUS Operator
FMT_SMR.1.2 The CUS shall be able to associate CUS-users with one or more roles.
FAU_GEN.3.1 The CUS shall be able to generate an audit record of the following auditable
events:
(in the CUS security log):
authentication success/failure
user account is locked
5-4
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 5 Security Requirements
FAU_STG.1.2 The CUS shall be able to prevent unauthorised modifications to the stored
audit records in the CUS audit trail.
FTP_ITC.1.2 The CUS shall permit the CUS and the Billing Center to initiate
communication via the trusted channel.
FTP_ITC.1.3 The CUS shall initiate communication via the trusted channel for sending
billing data (Call Detail Records).
FMT_SMF.1.CUS Specification of Management Functions
FMT_SMF.1.1 The TSF shall be capable of performing the following CUS management
functions:
15. The operation was completed to take no other actions, and this was subsequently
refined away to make the sentence more readable.
5-5
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
5-6
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 5 Security Requirements
by IP-address (if so configured for that user16 ) and ensure that the user is
allowed to login at this time (if so configured for that user)before allowing any
other TSF-mediated actions on behalf of that user.
FIA_SOS.1.1 The LIS shall provide a mechanism to verify that LIG passwords meet:
At least 6 characters including three of the four types: number, small letter,
capital letter, other characters
cannot be the same as the user name, the user name twice, the username in
reverse or a common dictionary word
can be configured to expire after a configurable amount of time < 180 days
can be configured to be different from the previous 5 LIG-passwords when
changed
FTA_SSL.3.LIG TSF-initiated termination
FTA_MCS.1.1 The LIG shall restrict the maximum number of concurrent sessions that
belong to the same LIG-user.
FTA_MCS.1.2 The LIG shall enforce, by default, a limit of 1 sessions per LIG-user and a
limit of 255 sessions for all LIG-users together.
16. For administrator, the IP range can directly be configured. For normal users the IP
range can be configured via the roles.
17. Unless this account has been set to unlockable.
18. The sentence was refined to make it more readable.
5-7
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
FMT_SMR.1.2 The LIS shall be able to associate LIS-users with one or more roles.
FAU_GEN.3.LIG Simplified audit data generation
FAU_GEN.3.1 The LIS shall be able to generate an audit record of the following auditable
events:
(in the LIG security log and only of LIG users and not of LIC users):
FAU_SAR.1.2 The LIS shall provide the audit records in a manner suitable for the user to
interpret the information.
FAU_STG.1.LIG Protected audit trail storage
FAU_STG.1.1 The LIS shall protect the stored audit records in the LIS audit trail from
unauthorised deletion.
FAU_STG.1.2 The LIS shall be able to prevent unauthorised modifications to the stored
audit records in the LIS audit trail.
Application Note:
5-8
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 5 Security Requirements
Deletion of audit records is only authorized when it is done by the LIG administrator
(or a suitably customized role) and the records are more than 30 days old
Modification of audit records is never authorized
20. The operation was completed to take no other actions, and this was subsequently
refined away to make the sentence more readable.
21. This column of the table is for reference only, and is not part of the SFR. The same holds for
the iterations.
5-9
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
FIA_AFL.1.2 When the defined number of unsuccessful authentication attempts has been
met, the OMS shall lock the OMM-user account23
until unlocked by the OMM-administrator, or
until a OMM-administrator configurable positive integer within [24-72 or infinity]
of hours have passed, if the account has not been set to permanent locking.
At least 6 characters including three of the four types: number, small letter,
capital letter, other characters
cannot be the same as the user name, the user name twice, the username in
reverse or a common dictionary word
can be configured to expire after a configurable amount of time < 90 days
22. For administrator, the IP range can directly be configured. For normal users the IP
range can be configured via the roles.
23. Unless this account has been set to unlockable.
5-10
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 5 Security Requirements
FTA_MCS.1.1 The OMS shall restrict the maximum number of concurrent sessions that
belong to the same OMM-user.
FTA_MCS.1.2 The OMS shall enforce, by default, a limit of 1 sessions per OMM-user and
a limit of 255 sessions for all OMM-users together.
FMT_SMR.1.OMM Security roles
OMM Administrator
OMM Supervisor
OMM Maintainer
OMM PowerUser
OMM Operator
Customizable roles
FMT_SMR.1.2 The OMS shall be able to associate OMS-users with one or more roles.
FAU_GEN.3.1 The OMS shall be able to generate an audit record of the following auditable
events:
(in the OMM security log):
5-11
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
Detailed Information
Application Note:
Deletion of audit records is only authorized when it is done by the OMM administrator
(or a suitably customized role) and the records are more than 30 days old
Modification of audit records is never authorized
FAU_STG.4.OMM Prevention of audit data loss
FAU_STG.4.1 The OMS shal overwrite the oldest stored audit records25if the OMM
audit trail is full.
FTP_ITC.1.2 The OMS shall permit the OMS and the EMSto initiate communication via
the trusted channel.
FTP_ITC.1.3 The OMS shall initiate communication via the trusted channel for performing
OMM-related actions.
FMT_SMF.1.OMM Specification of Management Functions
25. The operation was completed to take no other actions, and this was subsequently
refined away to make the sentence more readable.
26. The reference to the SFP was refined away: as FDP_ITT.1 already states all relevant
parts of the policy, defining it separately is superfluous.
5-12
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 5 Security Requirements
Lock/unlock roles -
FDP_ACC.2.1The TSF shall enforce the Role Policy on all roles and the TOE and
alloperationsamong roles and the TOE .
FDP_ACC.2.2 The TSF shall ensure that all operations between any role and the TOE
are covered by an access control SFP.
FDP_ACF.1 Security attribute based access control
5-13
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
FDP_ACF.1.1 The TSF shall enforce the Role Policy to objects based on the following:
all roles, the TOE.
FDP_ACF.1.2 The TSF shall enforce the following rules to determine if an operation among
roles and the TOE is allowed:
LIG Administrator can configure the LIG and perform the actions specified in
FMT_SMF.1.LIG
Other LIG Roles can perform LIG-related actions according to their role
definition/customization
LI Center can access LI-information
CUS Administrator can perform all CUS-related actions in the TOE, including
those specified in FMT_SMF.1.CUS
Other CUS Roles can perform CUS-related actions according to their role
definition/customisation
OMM Administrator can perform all OMM-related actions in the TOE, including
those specified in FMT_SMF.1.OMM
Other OMM Roles can perform OMM-related actions according to their role
definition/customisation
FDP_ACF.1.3, (refined away).
FDP_ACF.1.4 The TSF shall explicitly deny access of subjects to objects based on the
following additional rules:
LIG Users cannot perform OMM and CUS actions
CUS Users cannot perform OMM and LIG actions
OMM Users cannot perform CUS and LIG actions
No users (other than LI Center) can access LI-information
Assurance Components
Assurance Class
Identifier Name
5-14
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 5 Security Requirements
ASE_INT.1 ST introduction
ASE: Security Target
ASE_OBJ.2 Security objectives
evaluation
ASE_REQ.2 Derived security requirements
AVA: Vulnerability
AVA_VAN.2 Vulnerability analysis
assessment
5-15
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
5-16
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 6
TOE Summary Specification
Secure management of the TOE, to ensure that only properly authorized staff can manage the TOE.
General: functionality is provided through the use of the login screens depicted below and
a series of standard windows providing the management functionality.
FIA_UID.2.*, FIA_UAU.2.*, FIA_AFL.1.*
Whenever a user of the TOE wishes to use the TOE, the user needs to use one of the
clients of the TOE. The first action required by the user is then to log-in.
The TOE allows the appropriate administrator to configure (for each user), how that user
must log-in:
The user must always provide a username and a password
Whether the user can only login from a predefined IP-address
Whether the user is only allowed to be logged in during a certain time interval (e.g.
office hours)
Whether an account is unlockable or not, and when an account is not unlockable:
how many times a user can fail consecutive authentication attempts before that
account is locked
Even if all of the above is correct, the user can still be denied access when:
the user is already logged in
too many other users are already logged in
FTA_SSL.3.*
6-1
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
The Administrator locks one of the roles that that user currently has. The user can
subsequently log in again, but he will not have that role.
The user is only allowed to be logged in during a certain time interval, and this interval
expires.
FIA_SOS.1.*
Whenever the user has to provide a new password to the TSF, these passwords have to
meet certain rules to ensure that the passwords cannot be easily guessed or broken by
brute force. Passwords that do not meet these rules are rejected by the TOE.
FMT_SMR.1.*, FDP_ACC.2, FDP_ACF.1, FMT_SMF.1.*
The TOE provides a set of roles that can be assigned to users. The users can then use
these roles to perform the actions (including various management actions) allowed by the
roles.
Provides secure access to its Lawful Interception functionality, ensuring that only the LIC can access
this functionality
FDP_ACF.1
No user (except LIC) has any form of access to the LI functionality. LIG users can only
perform some minor configuration to allow the LIC to connect to the LIS, but cannot access
the LI functionality of the LIS by themselves. The other clients cannot see the LIS at all.
Data exchange between LIS, CUS, OMS and Service Part is carefully controlled to prevent
LI data from the LIS or Service Part leaking out.
Provides secure interaction between itself and the Billing Center, itself and the EMS and itself and the
OMM Client so that data cannot be read or modified in between
FTP_ITC.1.BIL
The connection between the Billing Center and the TOE is protected by sftp.
FTP_ITC.1.EMS
The connection between the EMS and the TOE is protected by sftp and ssh.
FDP_ITT.1.OMM
The connection between the OMM Client and the TOE is protected by sftp and ssh.
6-2
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 7
Rationales
Table of Contents
Security Objectives Rationale.....................................................................................7-1
Security Functional Requirements Rationale ..............................................................7-3
Dependencies ............................................................................................................7-7
OSP.USERS
This OSP is primarily implemented by:
The TOE must:
the combination of O.*_LIG that together
authenticate LIG users, log their activities,
restate the first bullet.
and allow them to set-up and configure the
the combination of O.*_CUS, that together
LIG functionality
restate the second bullet.
authenticate CUS users, log their activities,
the combination of O.*_OMM, that together
and allow them to set-up and configure the
restate the third bullet.
billing functionality
Additionally, to perform logging, the TOE must
authenticate OMM users, log their activities,
have a time source. OE.TIME states that this time
and allow OMM users to set-up and configure
source will be an external NTP Server connected
the TOE functionality (except for billing and
to the TOE.
LI functionality)
This threat is countered by the following security
objectives:
OE.TRUST&TRAIN that ensures that only
users that are properly trusted and trained
will be able to gain access to certain roles
T.UNAUTHORISED O.AUTHENTICATE_* that ensures users are
TA.ROGUE_USER_LIG, properly authenticated so the TOE knows
TA.ROGUE_USER_CUS or TA.ROGUE_USER which roles they have
performs actions on the TOE that he is not O.AUTHORISE_* that ensures users with
authorized to do. certain roles have rights to do certain actions
for a certain group of functionality (OMM,
CUS, LIG).
O.SEPARATE_USERS that ensures that
users without rights for certain functionality
groups cannot access that functionality.
7-1
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
Assumptions/OSPs/Threats Objectives
So the only way that a user can perform an action
is when he has a role for that action, and the only
way he can get this role is if he is properly trained
and trusted. Therefore this threat is countered.
T. NETWORK
TA.NETWORK is able to modify/read external This threat is countered by O.PROTECT_COM-
network traffic originating from / destined for the MUNICATION that protects traffic between:
TOE and thereby: the OMS and the EMS
perform actions on the TOE, the EMS or the the CUS and the Billing Center
Billing Center and/or. the OMS and the OMM Client
gain unauthorized knowledge about traffic As this is all traffic between the TOE and the
between the TOE and the EMS/Billing EMS/Billing Center, this threat is countered.
Center.
7-2
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 7 Rationales
Assumptions/OSPs/Threats Objectives
A.TRUSTED_SYSTEMS
It is assumed that:
The EMS, LIC, NTP Server and Billing
Center are trusted, and will not be used to
attack the TOE.
The PSTN, Service Part Private Network,
The first, second and fourth bullet
Wireless Network and Rest of IMS Network
of this assumption are upheld by
are trusted networks , and will not be used
OE.TRUSTED_SYSTEMS which restates
to attack the TOE
the assumption.
Traffic on the Secure Network or the
The third bullet of this assumption is upheld by
connection between LIS and LIC cannot be
OE.PROTECT_COMMUNICATION which lists
modified or read by threat agents.
the various communications to be protected.
The L3 switch will block all traffic from/to the
external network except for:
Selected traffic between EMS and OMS
Selected traffic between Billing Center and
CUS
Selected traffic between OMS and OMM Client
7-3
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
7-4
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 7 Rationales
O.SEPARATE_USERS
The TOE shall:
prohibit LIG users from accessing CUS and
This objective is met by FDP_ACC.2 and
OMM related data and functionality
FDP_ACF.1. FDP_ACF.1.4 specifically forbids
prohibit CUS users from accessing LIG and
the actions listed in the security objective.
OMM related data and functionality
prohibit OMM users from accessing LIG and
CUS related data and functionality
7-5
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
7-6
SJ-20110818121552-001|2011-08-18(R1.1)
Chapter 7 Rationales
O.PROTECT_COMMUNICATION
The TOE shall:
protect communication between the TOE and
the EMS against masquerading, disclosure
This objective is met by:
and modification
FTP_ITC.1.EMS restating the first bullet
protect communication between the TOE
FTP_ITC.1.BIL restating the second bullet
and the Billing Center against masquerading,
FDP_ITT.1.OMM restating the third bullet
disclosure and modification
protect communication between the OMM
Client and the OMS against disclosure and
modification
7.3 Dependencies
SFR Dependencies
FIA_UID.2.XYZ27 -
FIA_UAU.2.XYZ FIA_UID.1: met by FIA_UID.2.XYZ
FTA_SSL.3.XYZ -
FPT_SMF.1.XYZ -
FPT_ITC.1.BIL -
FPT_ITC.1.EMS -
FDP_ITT.1.OMM FDP_ACC.1 or FDP_IFC.1: not met, since the policy was refined
away the dependency is unnecessary
7-7
SJ-20110818121552-001|2011-08-18(R1.1)
ZXWN MSCS / ZXUN iCX Security Target
SFR Dependencies
SAR Dependencies
EAL 2 All dependencies within an EAL are satisfied
ALC_FLR.2 -
7-8
SJ-20110818121552-001|2011-08-18(R1.1)
Figures
Figure 1-1 The TOE .................................................................................................. 1-1
Figure 1-2 The TOE in its environment ..................................................................... 1-3