NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - KeyW Protect for Samsung, Version 1.2.1.0

Certificate Date:  2020.06.09

Validation Report Number:  CCEVS-VR-VID11061-2020

Product Type:    Encrypted Storage

Conformance Claim:  Protection Profile Compliant

PP Identifier:    PP-Module for File Encryption Version 1.0
  Protection Profile for Application Software Version 1.3

CC Testing Lab:  Gossamer Security Solutions


CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]


Product Description

The Target of Evaluation (TOE) is KeyW Protect for Samsung, Version 1.2.1.0. The KeyW Protect for Samsung TOE is also known as KEYWprotect.  The TOE provides an AES-based Data at Rest (DAR) encryption model that is used to encrypt the Android Enterprise workspace data when the workspace is unlocked, and enables the protection of workspace data when the workspace is locked and when the Samsung mobile device is powered off.  The TOE is an application on the Samsung mobile device.


Evaluated Configuration

The KeyW Protect for Samsung 1.2.1.0 TOE is also known as KEYWprotect.  The following table shows the model numbers of the mobile devices used during evaluation testing of KEYWprotect:

Device Name

Model
Number

CPU

Android
Version

Samsung Galaxy S10e

SM-G970

Qualcomm Snapdragon 855 (SDM855)

Android 9.0

Samsung Galaxy S10e

SM-G970

Samsung Exynos 9820

Android 9.0

Table 1 - Tested Devices

In addition to the evaluated devices, the following device models are claimed as equivalent since they have the same processors and run the same KEYWprotect software.

 

Device Name

Model
Number

CPU

Android
Version

Samsung Galaxy S10

SM-G973

Qualcomm Snapdragon 855 (SDM855)

Android 9.0

Samsung Galaxy S10

SM-G973

Samsung Exynos 9820

Android 9.0

Samsung Galaxy S10+

SM-G975

Qualcomm Snapdragon 855 (SDM855)

Android 9.0

Samsung Galaxy S10+

SM-G975

Samsung Exynos 9820

Android 9.0

Samsung Galaxy S10 5G

SM-G977

Qualcomm Snapdragon 855 (SDM855)

Android 9.0

Samsung Galaxy S10 5G

SM-G977

Samsung Exynos 9820

Android 9.0

Samsung Galaxy Note10

SM-N970

Qualcomm Snapdragon 855 (SDM855)

Android 9.0

Samsung Galaxy Note10 5G

SM-N971

Qualcomm Snapdragon 855 (SDM855)

Android 9.0

Samsung Galaxy Note10+

SM-N975

Qualcomm Snapdragon 855 (SDM855)

Android 9.0

Samsung Galaxy Note10+ 5G

SM-N976

Qualcomm Snapdragon 855 (SDM855)

Android 9.0

Samsung Galaxy A90 5G

SM-A908

Qualcomm Snapdragon 855 (SDM855)

Android 9.0

Samsung Galaxy Fold

SM-F900

Qualcomm Snapdragon 855 (SDM855)

Android 9.0

Samsung Galaxy Fold 5G

SM-F907

Qualcomm Snapdragon 855 (SDM855)

Android 9.0

Samsung Tab S6 (Wi-Fi)

SM-T860

Qualcomm Snapdragon 855 (SDM855)

Android 9.0

Samsung Tab S6 (LTE)

SM-T865

Qualcomm Snapdragon 855 (SDM855)

Android 9.0

Table 2 - Equivalent Devices


Security Evaluation Summary

The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance. The evaluation demonstrated that the TOE meets the security requirements contained in the Security Target.  The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.  The product, when delivered and configured as identified in the Android OS Suite B Data At Rest v1.2.1.0 – User Guide, Document Version 1.3, 05/19/2020 document, satisfies all of the security functional requirements stated in the KeyW Protect for Samsung, Version 1.2.1.0 (PP_APP_V1.3/MOD_FE_V1.0) Security Target, Version 0.4, 06/04/2020.  The project underwent CCEVS Validator review.  The evaluation was completed in June 2020.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11061-2020) prepared by CCEVS.


Environmental Strengths

The logical boundaries of the KeyW Protect for Samsung are realized in the security functions that it implements. Each of these security functions is summarized in the following sections.

Cryptographic support:

The TOE operates on a Samsung mobile device and uses features provided by the platform for key storage.  The TOE includes the Suite B Cryptographic Algorithms library, which implements its own algorithms for random bit generation, AES encryption/decryption, AES key wrapping, keyed-hashing functions, password-based Key Derivation, key pair generation, key establishment and cryptographic hashing.

User data protection:

The TOE protects user data by providing an integrated file encryption capability that automatically encrypts new files and decrypts files upon user demand.  The TOE utilizes 256-bit AES encryption for confidentiality.

Identification and authentication:

The TOE authenticates a user by requiring a password before any file data decryption operation is initiated.  Without the correct password, the user is unable to decrypt the keys necessary to obtain clear text data from the Android Enterprise workspace file system.

Security management:

The TOE does not allow encryption/decryption operations while in the locked state until the user authenticates to the device upon first use of the TOE.  The TOE allows the following user management capabilities:

·        Change workspace password.

·        Reset workspace password using a reset token from the Unified Endpoint Management (UEM) console.  Samsung Knox DualDAR by default does not disable reset passwords thereby enabling key recovery.  To disable all key recovery mechanisms simply do not set a password using a token, which will prevent a password reset from the IT admin.

·        Configure password/passphrase complexity settings including the minimum and maximum lengths.

·        Perform a cryptographic erase of the data.

·        Configure the corrective behavior (wipe/disable workspace) and number of failed validation attempts required to trigger corrective behavior.

Privacy:

The TOE does not transmit Personally Identifiable Information over any network interfaces, nor does it request access to any applications that may contain such information.

Protection of the TSF:

The TOE relies on the physical boundary of the evaluated platform as well as the Android 9.0 operating system for the protection of the TOE’s application components. 

Updates to the TOE are handled via the UEM console.

Trusted path/channels:

The TOE does not transmit any data between itself and another network entity.  All of the data managed by the TOE resides on the evaluated platform (Samsung mobile device with Android OS 9.0, Knox 3.3, and DualDAR 1.0).


Vendor Information


KeyW Corporation
Brian Behler
443.733.1600
443.733.1779
niap_products@keywcorp.com

www.keywcorp.com
Site Map              Contact Us              Home