NIAP: Compliant Product
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - FireEye HX Appliances, Version 4.0

Certificate Date:  2018.07.31

Validation Report Number:  CCEVS-VR-VID10892-2018

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 2.0 + Errata 20180314

CC Testing Lab:  Acumen Security

CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]

Product Description

The FireEye HX Series Appliances are network devices providing organizations with the ability to continuously monitor endpoints for advanced malware and indicators of compromise. The HX 4502v is a virtual appliance version of the TOE, and the hardware and virtualization layer are included in the TOE boundary.  There may only be one instance of the HX 4502v virtual appliance installed on the physical hardware platform. FireEye HX series appliances are network devices that provide a managed solution for managing the security posture of connected end points. No other guest VMs providing network device functionality may be installed on the physical hardware platform. Thus, the TOE is considered to be a network device as defined in NDcPPv2.0e and a few TDs.

Evaluated Configuration

Security Evaluation Summary

The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the FireEye HX Series Appliances is evaluated as described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 5.  The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 5.  Acumen Security determined that the evaluation is a Collaborative Protection Profile for Network Devices, Version 2.0 + Errata 20180314 (NDcPPv2.0e).  The product, when delivered configured as identified in the Operational User Guidance and Preparative Procedures, satisfies all of the security functional requirements stated in the Security Target. The project underwent CCEVS Validator review.  The evaluation was completed in July 2018.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.

Environmental Strengths

The logical boundary of the TOE includes those security functions implemented exclusively by the TOE.

Security Audit

The TOE keeps local and remote audit records of security relevant events. The TOE internally maintains the date and time which can either be set manually or synchronized with an NTP server. 

Cryptographic Operations

The TOE provides cryptographic support for the services are provided in the table below.


Cryptographic Method

Use within the TOE

TLS Establishment

Used to establish initial TLS session.

SSH Establishment

Used to establish initial SSH session.

ECDSA Signature Services

Used in TLS session establishment.

RSA Signature Services

Used in TLS session establishment.

Used in SSH session establishment

Used in secure software update

SP 800-90 DRBG

Used in TLS session establishment.

Used in SSH session establishment


Used in secure software update


Used to provide TLS traffic integrity verification

Used to provide SSH traffic integrity verification


Used to encrypt TLS traffic

Used to encrypt SSH traffic

Protected Communications

The TOE protects the integrity and confidentiality of communications such as SSH connectivity with the Management SSH Client. Additionally, the TOE provides TLS connectivity with the following entities Audit Server (with device level authentication), Management Web Browser. 

Secure Administration

The TOE enables secure local and remote management of its security functions, including:

o   Local console CLI administration

o   Remote CLI administration via SSHv2

o   Remote GUI administration via HTTPS/TLS

o   Administrator authentication using a local database

o   Timed user lockout after multiple failed authentication attempts

o   Password complexity enforcement

o   Role Based Access Control - the TOE supports several types of administrative user roles. Collectively these sub-roles comprise the “Security Administrator”

o   Configurable banners to be displayed at login

o   Timeouts to terminate administrative sessions after a set period of inactivity

o   Protection of secret keys and passwords


The TOE performs a suite of self-tests to ensure the correct operation and enforcement of its security functions. 

Trusted Update

The TOE ensures the authenticity and integrity of software updates through digital signatures and requires administrative intervention prior to the software updates being installed.

Vendor Information

FireEye, Inc.
Erick Rozelle
Site Map              Contact Us              Home