Security Target: Author: Roger French 1.2 Date: 2009-01-23
Security Target: Author: Roger French 1.2 Date: 2009-01-23
Abstract
This document is the Security Target (ST) for the Common Criteria certification of the
database engine of Microsoft® SQL Server® 2008.
Keywords
CC, ST, Common Criteria, SQL, Security Target
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 2/56
Evaluation
Table of Contents
Page
1 ST INTRODUCTION ...................................................................................................... 6
1.1 ST and TOE Reference ........................................................................................... 6
1.2 TOE Overview ......................................................................................................... 7
1.3 TOE Description ...................................................................................................... 7
1.3.1 Product Type ....................................................................................................... 7
1.3.2 Physical Scope and Boundary of the TOE ........................................................... 8
1.3.3 Architecture of the TOE ......................................................................................11
1.3.4 Logical Scope and Boundary of the TOE ............................................................11
1.4 Conventions ...........................................................................................................14
2 CONFORMANCE CLAIMS ...........................................................................................15
2.1 CC Conformance Claim .........................................................................................15
2.2 PP Conformance Claim ..........................................................................................15
3 SECURITY PROBLEM DEFINITION ............................................................................16
3.1 Assets ....................................................................................................................16
3.2 Assumptions ..........................................................................................................17
3.3 Threats ...................................................................................................................18
3.4 Organizational Security Policies .............................................................................19
4 SECURITY OBJECTIVES.............................................................................................20
4.1 Security Objectives for the TOE .............................................................................20
4.2 Security Objectives for the operational Environment ..............................................21
4.3 Security Objectives Rationale .................................................................................22
4.3.1 Overview ............................................................................................................22
4.3.2 Rationale for TOE Security Objectives ................................................................23
4.3.3 Rationale for environmental Security Objectives .................................................26
5 EXTENDED COMPONENT DEFINITION ......................................................................28
5.1 Definition for FAU_STG.5.EXP ...............................................................................28
6 IT SECURITY REQUIREMENTS ..................................................................................30
6.1 TOE Security Functional Requirements..................................................................31
6.1.1 Class FAU: Security Audit ...................................................................................32
6.1.2 Class FDP: User Data Protection........................................................................34
6.1.3 Class FIA: Identification and authentication ........................................................35
6.1.4 Class FMT: Security Management ......................................................................36
6.2 TOE Security Assurance Requirements .................................................................40
6.3 Security Requirements rationale.............................................................................40
6.3.1 Security Functional Requirements rationale ........................................................40
6.3.2 Rationale for satisfying all Dependencies ...........................................................44
6.3.3 Rationale for Assurance Requirements...............................................................45
7 TOE SUMMARY SPECIFICATION ...............................................................................46
7.1 Security Management (SF.SM) ..............................................................................46
7.2 Access Control (SF.AC) .........................................................................................46
7.3 Identification and Authentication (SF.I&A) ..............................................................48
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 4/56
Evaluation
List of Tables
Page
List of Figures
Page
Figure 1: TOE........................................................................................................................ 9
Figure 2: Concept of Ownership Chaining ............................................................................52
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 6/56
Evaluation
1 ST Introduction
This chapter presents Security Target (ST) and TOE identification information and a general
overview of the ST. An ST contains the information technology (IT) security requirements of
an identified Target of Evaluation (TOE) and specifies the functional and assurance security
measures offered by that TOE to meet stated requirements. An ST principally defines:
a) A security problem expressed as a set of assumptions about the security aspects
of the environment, a list of threats that the TOE is intended to counter, and any
known rules with which the TOE must comply (chapter 3, Security Problem
Definition)
b) A set of security objectives and a set of security requirements to address the
security problem (chapters 4 and 6, Security Objectives and IT Security
Requirements, respectively).
c) The IT security functions provided by the TOE that meet the set of requirements
(chapter 7, TOE Summary Specification).
The SQL Server platform additionally includes the following tools which are not part of the
TOE:
SQL Server Replication: Data replication for distributed or mobile data processing
applications and integration with heterogeneous systems
Analysis Services: Online analytical processing (OLAP) capabilities for the analysis of
large and complex datasets.
Reporting Services: A comprehensive solution for creating, managing, and delivering
both traditional, paper-oriented reports and interactive, Web-based reports.
Integration Services: Microsoft Integration Services is a platform for building
enterprise-level data integration and data transformations solutions.
Management tools: The SQL Server platform includes integrated management tools
for database management and tuning as well as tight integration with tools such as
Microsoft Operations Manager (MOM) and Microsoft Systems Management Server
(SMS).
Development tools: SQL Server offers integrated development tools for the database
engine, data extraction, transformation, and loading (ETL), data mining, OLAP, and
reporting that are tightly integrated with Microsoft Visual Studio to provide end-to-end
application development capabilities
Other tools offered by the installation process: Full Text Search, Business Intelligence
Development Studio, Client tools connectivity, Client tools backwards compatibility,
Client tools SDK, SQL client connectivity SDK, Microsoft sync framework.
The TOE itself only comprises the database engine of the SQL Server 2008 platform which
provides the security functionality as required by this ST. Any additional tools of the SQL
Server 2008 platform interact with the TOE as a standard SQL client. The scope and
boundary of the TOE will be described in the next chapter. Please refer to [AGD_ADD] for
more information about the installation process of the TOE.
Figure 1: TOE
As seen in Figure 1 the TOE internally comprises the following logical units:
The Communication part is the interface for programs accessing the TOE. It is the interface
between the TOE and clients performing requests.
All responses to user application requests return to the client through this part of the TOE.
The Relational Engine is the core of the database engine and is responsible for all security
relevant decisions. The relational engine establishes a user context, syntactically checks
every Transact SQL (T-SQL) statement, compiles every statement, checks permissions to
determine if the statement can be executed by the user associated with the request,
optimizes the query request, builds and caches a query plan, and executes the statement.
The Storage Engine is a resource provider. When the relational engine attempts to execute
a T-SQL statement that accesses an object for the first time, it calls upon the storage engine
to retrieve the object, put it into memory and return a pointer to the execution engine. To
perform these tasks, the storage engine manages the physical resources for the TOE by
using the Windows OS.
The SQL-OS is a resource provider for all situations where the TOE uses functionality of the
operating system. SQL-OS provides an abstraction layer over common OS functions and
was designed to reduce the number of context switches within the TOE. SQL-OS especially
contains functionality for Task Management and for Memory Management.
For Task Management the TOE provides an OS-like environment for threads, including
scheduling, and synchronization —all running in user mode, all (except for I/O) without
calling the Windows Operating System.
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 10/56
Evaluation
The Memory Manager is responsible for the TOE memory pool. The memory pool is used to
supply the TOE with its memory while it is executing. Almost all data structures that use
memory in the TOE are allocated in the memory pool. The memory pool also provides
resources for transaction logging and data buffers.
The immediate environment of the TOE comprises:
The Windows 2008 Server Enterprise Edition Operating System, which hosts the TOE.
As the TOE is a software only TOE it lives as a process in the Operating System (OS) and
uses the resources of the OS. These resources comprise general functionality (e.g. the
memory management and scheduling features of the OS) as well as specific functionality of
the OS, which is important for the Security Functions of the TOE (see chapter 7 for more
details)
Other parts of the SQL Server 2008 Platform, which might be installed together with the
TOE. The TOE is the central part of a complete DBMS platform, which realizes all Security
Functions as described in this ST. However other parts of the platform may be installed on
the same machine if they are needed to support the operation or administration of the TOE.
However these other parts will interact with the TOE in the same way, every other client
would do.
Clients (comprising local clients and remote clients) are used to interact with the TOE during
administration and operation. Services of the Operating System are used to route the
communication of remote clients with the TOE.
The TOE relies on functionality of the Windows 2008 Server Operating System and has the
following hardware/software requirements:
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 11/56
Evaluation
The following guidance documents and supportive information belong to the TOE:
SQL Server 2008 Books Online: This is the general guidance documentation for the
complete SQL Server 2008 platform
SQL Server Guidance Addendum / Installation / Startup: This document contains the
aspects of the guidance that are specific to the evaluated configuration of SQL Server
2008
The website https://www.microsoft.com/sql/commoncriteria/2008/EAL1/default.mspx contains
additional information about the TOE and its evaluated configuration. Also the guidance
addendum that describes the specific aspects of the certified version can be obtained via this
website. The guidance addendum extends the general guidance of SQL Server 2008 that
ships along with the product in form of Books Online.
This website shall be visited before using the TOE.
1
Please note that IA64 CPUs are not supported for the certified version of the database engine of SQL Server
2008
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 12/56
Evaluation
If more than one instance of SQL Server 2008 is installed on one machine these just
represent multiple TOEs as there is no other interface between two instances of the TOE
than the standard client interface
In this way two or more instances of the TOE may only communicate through the standard
client interface.
The TOE provides the following set of security functionality
The Access Control function of the TOE controls the access of users to user and
TSF data stored in the TOE. It further controls that only authorized administrators are
able to manage the TOE.
The Security Audit function of the TOE produces log files about all security relevant
events.
The Management function allows authorized administrators to manage the behavior
of the security functions of the TOE.
The Identification and Authentication2 function of the TOE is able to identify and
authenticate users.
2
Note that the TOE as well as the environment provides a mechanism for identification and authentication.
Chapter 7 will describe this in more detail.
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 13/56
Evaluation
TCP/IP
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 14/56
Evaluation
1.4 Conventions
For this Security Target the following conventions are used:
The CC allows several operations to be performed on functional requirements; refinement,
selection, assignment, and iteration are defined in chapter C.4 of Part 1 of the CC. Each of
these operations is used in this ST.
The refinement operation is used to add detail to a requirement, and thus further restricts a
requirement. Refinement of security requirements is denoted by bold text.
The selection operation is used to select one or more options provided by the CC in stating
a requirement. Selections that have been made are denoted by italicized text.
The assignment operation is used to assign a specific value to an unspecified parameter,
such as the length of a password. Assignments that have been made are denoted by
showing the value in square brackets, [Assignment_value].
The iteration operation is used when a component is repeated with varying operations.
Iteration is denoted by showing the iteration number in parenthesis following the component
identifier, (iteration_number).
The CC paradigm also allows protection profile and security target authors to create their
own requirements. Such requirements are termed ‗explicit requirements‘ and are permitted if
the CC does not offer suitable requirements to meet the authors‘ needs. Explicit
requirements must be identified and are required to use the CC class/family/component
model in articulating the requirements. In this ST, explicit requirements will be indicated with
the ―.EXP‖ following the component name.
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 15/56
Evaluation
2 Conformance Claims
CC Part 2 (Version 3.1, Revision 2, September 2007) extended due to the use of
the component FAU_STG.5.EXP
CC Part 3 (Version 3.1, Revision 2, September 2007) conformant as only
assurance components as defined in part III of [CC] have been used.
Further this Security Target claims to be conformant to the Security Assurance Requirements
package EAL 1 augmented by ASE_OBJ.2, ASE_REQ.2 and ASE_SPD.1.
3.1 Assets
The TOE maintains two types of data which represent the assets: User Data and TSF Data.
The primary assets are the User Data which comprises the following:
The user data stored in or as database objects;
User-developed queries or procedures that the DBMS maintains for users.
The secondary assets comprise the TSF data that the TOE maintains and uses for its own
operation. This kind of data is also called metadata. It specifically includes:
The definitions of user databases and database objects
Configuration parameters,
User security attributes,
Security Audit instructions and records
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 17/56
Evaluation
3.2 Assumptions
The following table lists all the assumptions about the environment of the TOE.
Table 2 - Assumptions
Assumption Description
A.NO_EVIL Administrators are non-hostile, appropriately trained, and
follow all administrator guidance.
A.NO_GENERAL_PURPOSE There are no general-purpose computing capabilities
(e.g., compilers or user applications) available on DBMS
servers, other than those services necessary for the
operation, administration and support of the DBMS.
A.OS It is assumed that the TOE is installed on Windows Server
2008 Enterprise Edition and that this Operating System
provides functionality for
Identification and authentication of users,
Access Control for Files,
Time stamps,
Audit Storage,
Hashing of passwords
A.PHYSICAL It is assumed that appropriate physical security is
provided for the server, on which the TOE is installed,
considering the value of the stored, processed, and
transmitted information.
A.COMM It is assumed that any communication path from and to
the TOE is appropriately secured to avoid eavesdropping
and manipulation.
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 18/56
Evaluation
3.3 Threats
The following table lists the threats against the assets, which are protected by the TOE and
its environment.
4 Security Objectives
The purpose of the security objectives is to detail the planned response to a security problem
or threat. This chapter describes the security objectives for the TOE and its operational
environment.
OE.NO_GENERAL_ PURPOSE
O.AUDIT_GENERATION
OE:AUDIT_REVIEW
O.ADMIN_ROLE
OE.PHYSICAL
OE.NO_EVIL
O.MEDIATE
O.MANAGE
OE.COMM
OE.OS
O.I&A
T.ACCIDENTAL_ADMIN_ERROR X
T.MASQUERADE X
T.TSF_COMPROMISE X
T.UNAUTHORIZED_ACCESS X X
P.ACCOUNTABILITY X X X
P.ROLES X
A.NO_EVIL X
A.NO_GENERAL_PURPOSE X
A.OS X
A.PHYSICAL X
A.COMM X
1 2
5.EXP
6 IT Security Requirements
This chapter defines the IT security requirements that shall be satisfied by the TOE or its
environment:
Common Criteria divides TOE security requirements into two categories:
Security functional requirements (SFRs) (such as, identification and authentication,
security management, and user data protection) that the TOE and the supporting
evidence need to satisfy to meet the security objectives of the TOE.
Security assurance requirements (SARs) that provide grounds for confidence that the
TOE and its supporting IT environment meet its security objectives (e.g.,
configuration management, testing, and vulnerability assessment).
These requirements are discussed separately within the following subchapters.
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 31/56
Evaluation
3
Note that in the context of this Security Target the term „Authorized Administrator― refers either to the „sysadmin―
(sa) or any other user who has the permission to perform the administration activity based on the DAC policy (see
also chapter 8.3.1).
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 33/56
Evaluation
4
Please note that the term user in this context refers to a user or a group of users.
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 35/56
Evaluation
5
A windows account name may be a Windows user or a Windows group
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 36/56
Evaluation
Revocation (FMT_REV.1(1))
FMT_REV.1.1(1) The TSF shall restrict the ability to revoke [group membership]
associated with the users under the control of the TSF to [the
authorized administrators and database users as allowed by the
Discretionary Access Control policy].
FMT_REV.1.2(1) The TSF shall enforce the rules [Changes to logins are applied at the
latest as soon as a new session for the login is established].
Revocation (FMT_REV.1(2))
FMT_REV.1.1(2) The TSF shall restrict the ability to revoke6 [Access Control Lists]
associated with the objects under the control of the TSF to [the
authorized administrators and database users as allowed by the
Discretionary Access Control policy].
FMT_REV.1.2(2) The TSF shall enforce the rules [The changes have to be applied
immediately].
6
In this context ―revocation‖ refers to any change to an Access Control List that is associated with an object.
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 38/56
Evaluation
sysadmin Members of the sysadmin fixed server role can perform any activity
in the server. By default, all members of the Windows
BUILTIN\Administrators group, the local administrator's group, are
members of the sysadmin fixed server role.
Serveradmin Members of the serveradmin fixed server role can change server-
wide configuration options and shut down the server.
Securityadmin Members of the securityadmin fixed server role manage logins and
their properties. They can GRANT, DENY, and REVOKE server-
level permissions. They can also GRANT, DENY, and REVOKE
database-level permissions. Additionally, they can reset passwords
for SQL Server logins.
Processadmin Members of the processadmin fixed server role can end processes
that are running in an instance of SQL Server.
Setupadmin Members of the setupadmin fixed server role can add and remove
linked servers.
Bulkadmin Members of the bulkadmin fixed server role can run the BULK
INSERT statement.
Diskadmin The diskadmin fixed server role is used for managing disk files.
Dbcreator Members of the dbcreator fixed server role can create, alter, drop,
and restore any database.
db_datawriter Members of the db_datawriter fixed database role can add, delete,
or change data in all user tables.
db_datareader Members of the db_datareader fixed database role can read all
data from all user tables.
db_denydatawriter Members of the db_denydatawriter fixed database role cannot
add, modify, or delete any data in the user tables within a
database.
db_denydatareader Members of the db_denydatareader fixed database role cannot
read any data in the user tables within a database.
are restrictive.
FMT_MTD.1 FMT_MTD.1 requires that the
ability to manipulate TOE content
is restricted to administrators.
FMT_REV.1(1) FMT_REV.1 restricts the ability to
FMT_REV.1(2) revoke attributes to the
administrator
Members of the database roles ―db_owner‖ or ―db_accessadmin‖ are able to add users to a
database. The TOE maintains an internal security identifier (SID) for every user and role.
Each database user can be associated with at most one instance ―login‖.
Every object controlled by the TOE has an ID, an owner and a name.
Objects in the TOE form a hierarchy and belong to one of three different levels: server,
database and schema.
The TOE maintains an Access Control List (ACL) for each object within its scope. These
ACLs are stored in a system table which exists in every database for database related ACLs
and in a system table in the ‗master‘ database for instance level ACLs.
Each entry of an ACL contains a user SID and defines whether a permission is an ―Allow‖ or
a ―Deny‖ permission for that SID.
When a new object is created, the creating user is assigned as the owner of the object and
has complete control over the object. The ACL for a newly created object is always empty by
default. (FMT_MSA.3)
After creation, grant, deny or revoke permissions on objects can be assigned to users.
Changes to the security relevant attributes of objects are immediately applied.
(FMT_REV.1(2)
When a user attempts to perform an action to an object under the control of the TOE, the
TOE decides whether the action is to be permitted based on the following rules:
1. If the requested mode of access is denied to that authorized user, the TOE will deny
access
2. If the requested mode of access is denied to any role of which the authorized user is
a member, the TOE will deny access
3. If the requested mode of access is permitted to that authorized user, the TOE will
permit access
4. If the requested mode of access is permitted to any role of which the authorized user
is a member, the TOE will permit access
5. Else: The TOE will deny access
The TOE permission check for an action on an object includes the permissions of its parent
objects. The permissions for the object itself and all its parent objects are accumulated
together before the aforementioned rules are evaluated. Note: Some actions require more
than one permission.
This means that if a user or a role has been granted a permission to an object this
permission is also valid for all child objects. E.g. if a user has been granted a permission to a
schema, he automatically has the same permission on all tables within that schema, if the
permission has not explicitly been denied. Similarly, if a user has been denied a permission
on a schema, he will be denied the same permission to all tables within that schema,
regardless of explicit grant permissions.
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 48/56
Evaluation
The rules as described before are always applied when a user requests access to a certain
object using a certain operation. There are only two situations where these access control
rules are overridden:
1. The system administrator, the owner of an object and owners of parent objects
always have access, so for these users the TOE will always allow access to the
object
2. In the case of ―Ownership Chaining‖ which is described in chapter 8.1 in more detail
the access is allowed
(FDP_ACC.1 and FDP_ACF.1)
As the access to management functions of the TOE is controlled by the same functionality as
the access to user data this Security Function additionally ensures that the management
functions are only available for authorized administrators. (FMT_MOF.1, FMT_MSA.1,
FMT_MTD.1, FMT_REV.1(1))
7
Windows authentication of users may be based on a username and password or alternative mechanisms. After
successful authentication of a user Windows associates a list of SID(s) with every user which represent the user
and every group the user is a member of.
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 49/56
Evaluation
Each SQL Server login name is stored in a system table. SQL Server generates a
SID that is used as a security identifier and stores it in this table.
This SID is internally used as a security identifier for the login.
If a user is connecting to the TOE using a SQL Server login he has to provide the
username and password. The TOE hashes the password using the hash function
provided by the Operating System in the environment, and compares the hash to the
value stored for that user. If the values are identical the TOE has successfully
authenticated the user. (FIA_UAU.2, FIA_UID.2, FIA_UAU.5)
The TOE maintains a set of events which can be additionally audited and provides the
administrator with the capability to start a Security Audit process to capture these events.
For each event in the Security Audit logs the following information is stored:
1. Date and Time of the event
2. Identity of the user causing the event (if available)
3. Type of the event
4. ID of the object
5. Outcome (success or failure) of the event
Furthermore each audit file contains an introduction with the list of events which are audited
in the file. (FAU_GEN.1 and FAU_GEN.2)
The administrator has the possibility to specify, what should happen in case an audit file is
full. The following two scenarios are supported in the evaluated version:
1. Rollover
The administrator specifies a maximum size per trace file and a maximum number of files for
the Security Audit. If one audit file is full, the TOE starts the next file until the maximum
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 50/56
Evaluation
number of files has been reached. When the maximum number of files has been reached
and the last audit file is full, the TOE will start overwriting the oldest audit file.
2. Shutdown
The administrator specifies one trace file with a maximum size and the option to shut down
the TOE on any audit error. When the maximum size of the trace file has been reached the
TOE will stop operation.
(FAU_STG.5_EXP)
The TOE provides the possibility to create a filter for the audit function. Using this filter
mechanism the administrator is able to exclude auditable events from being audited based
on the following attributes:
User identity
Object identity,
Success or failure of auditable security events
However to modify the behavior of the Security Audit function by including additional or
excluding events from being audited the administrator has to stop the Security Audit process,
modify the Security Audit function and start the Security Audit process again. (FAU_SEL.1)
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 51/56
Evaluation
8 Appendix
owner of the previous object (Joe, not Sam), full information about permissions on this table
is retrieved. If the ExpenseXZ table has permissions that allow access by Alex, information is
returned.
When the July2003 view tries to retrieve information from the ProjectionsXZ table, the TOE
first checks to see whether cross-database chaining is enabled between Database 1 and
Database 2. If cross-database chaining is enabled, the TOE will check the ownership of the
ProjectionsXZ table. Because this table has the same owner as the calling view (Mary),
permissions on this table are not checked. The requested information is returned.
8.2 References
The following documentation was used to prepare this ST:
[CC] Common Criteria for Information Technology Security Evaluation –
Part 1: Introduction and general model, dated September 2006,
version 3.1 R1
Part 2: Security functional requirements, dated September 2007,
version 3.1, R2
Part 3: Security assurance requirements, dated September 2007,
version 3.1, R2
[CEM] Common Evaluation Methodology for Information Technology
Security – Evaluation Methodology, dated September 2007, version
3.1 R2
[TSQL] http://msdn.microsoft.com/library/default.asp?url=/library/en-
us/acdata/ac_oview_4pcx.asp
[AGD] Books online as of 2008-07-10
[AGD_ADD] Microsoft SQL Server 2008 Database Engine Common Criteria
Evaluation Guidance addendum, Version 1.2, 2008-11-26
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 54/56
Evaluation
This term refers to a group of users which comprise the ―sysadmin‖ (sa)
and any user who is allowed to perform a management operation
Authorized
because the permission has been granted to him within the DAC either
Administrators
by assigning him to a role with administrator permissions or by granting
him the possibility to perform an administrative operation explicitly.
Discretionary Access Control is a mechanism to limit the access of
DAC users to objects based on the ID of the user, the ID of the object and a
set of access control rules.
DBMS A DBMS is a computerized repository that stores information and allows
authorized users to retrieve and update that information.
An object within the TOE contains data and can be accessed by
Object subjects. However in the TOE an object is not necessarily only a
passive entity as some objects refer to other objects.
OC Ownership Chaining.
SQL The Structured Query Language is a language which can be used to
create, modify and retrieve data from a DBMS.
SQL Server SQL Server is a product of Microsoft to which the TOE belongs.
TDS Tabular Data Stream is a data format which is used for communication
with the TOE.
T-SQL Extension of the SQL language in order to support control flow,
variables, user authentication and various other functions.
See also http://msdn.microsoft.com/library/default.asp?url=/library/en-
us/acdata/ac_oview_4pcx.asp
Named Pipe Method for inter process communication
Security Target Microsoft SQL Server 2008 Database Engine Common Criteria Page 55/56
Evaluation
8.3.2 Abbreviations
The following abbreviations are used in this Security Target:
Abbreviation Definition
Abbreviation Definition