NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - Unisys Stealth Solution Release v3.0 Windows Endpoint

Certificate Date:  2016.07.07

Validation Report Number:  CCEVS-VR-VID10716-2016

Product Type:    Virtual Private Network

Conformance Claim:  Protection Profile Compliant

PP Identifier:    Protection Profile for IPsec Virtual Private Network (VPN) Clients Version 1.4

CC Testing Lab:  Leidos Common Criteria Testing Laboratory

Maintenance Releases:
CC Certificate [PDF] Security Target [PDF] * Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]


* This is the Security Target (ST) associated with the latest Maintenance Release.  To view previous STs for this TOE, click here.

Product Description

The Target of Evaluation (TOE) is the Unisys Stealth Solution Release 3.0 Windows Endpoint.  It provides capabilities for protected transmission of private data between IPsec VPN endpoints.   The TOE is supported on the following platforms in its operational environment that have all completed Common Criteria evaluations under the US Common Criteria Evaluation and Validation Scheme (CCEVS)—the relevant Validation Identifiers (VIDs) are provided:
·    Windows 8 (VID #10520)
·    Windows 8.1 (VID #10592)
·    Windows Server 2012 R2 (VID #10529)


Evaluated Configuration


Security Evaluation Summary

The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme.  The product was evaluated at an Evaluated Assurance Level EAL1.  The criteria against which the Unisys Stealth Solution Release 3.0 Windows Endpoint was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 4.  The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 4.   The product, when delivered and configured as identified in the Unisys Stealth Solution Common Criteria Evaluation Guidance Document Release 3.0, June 2016, 8205 5823–000 document, satisfies all of the security functional requirements stated in the Unisys Stealth Solution Release 3.0 Windows Endpoint Security Target, v1.0, 16 June 2016.    The project underwent CCEVS Validator review.  The evaluation was completed in June 2016.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.


Environmental Strengths

Cryptographic Support

The TOE enables an end user to establish a point-to-point VPN tunnel with another Stealth-enabled endpoint, using the underlying platform’s implementation of IKE and IPsec.

User Data Protection

The TOE ensures that residual information is protected from potential reuse in accessible objects such as network packets.

Identification and Authentication

The TOE supports the use of X.509v3 certificates for IKE peer authentication. The TOE platform provides the ability to use, store, and protect these X.509v3 certificates and performs certificate validation.

Security Management

The TOE provides capabilities necessary to manage most of its security functionality. The TOE platform implements the security management functions not provided by the TOE.

Protection of the TSF

The TOE relies upon its underlying platform to perform self-tests that cover the TOE as well as the functions necessary to securely update the TOE.

Trusted Path/Channels

The TOE acts as a VPN client using IPsec to establish point-to-point secure channels with corresponding VPN clients.


Vendor Information

Logo
Unisys Corporation
Jan Wiewiora
(703) 439-5294
jan.wiewiora@unisys.com

www.unisys.com
Site Map              Contact Us              Home