Compliant Product - Nessus Manager 8.11.1
Certificate Date: 2020.12.08CC Certificate Security Target Validation Report
Validation Report Number: CCEVS-VR-VID11067-2020
Product Type: Application Software
Conformance Claim: Protection Profile Compliant
PP Identifier: Functional Package for TLS Version 1.1
Protection Profile for Application Software Version 1.3
CC Testing Lab: Leidos Common Criteria Testing Laboratory
Tenable Nessus Manager is a software product that is designed to perform remote system scanning to determine configuration and patch levels that may indicate potential vulnerability risks to those systems. It is also designed to deploy, manage, and coordinate instances of the Nessus Agent application that is installed on endpoint systems to collect more detailed scan data than remote scanning can achieve on its own.
In addition to interacting with Nessus Agent applications in its operational environment, Nessus Manager also connects to an environmental instance of Tenable.sc (SecurityCenter) which serves as a single point to aggregate and analyze data collected from various Tenable applications, including Nessus Manager.
The evaluated version of Tenable Nessus Manager is supported on Red Hat Enterprise Linux 7 and Windows Server 2016.
Security Evaluation Summary
The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme for the Protection Profile for Application Software, Version 1.3 and Functional Package for Transport Layer Security (TLS), Version 1.1. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 release 5. The product, when delivered configured as identified in the guidance document, satisfies all of the security functional requirements stated in the Tenable Nessus Manager Security Target. The evaluation was completed in December 2020. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.
Timely Security Updates
The TOE developer has internal mechanisms for receiving reports of security flaws, tracking product vulnerabilities, and distributing software updates to customers in a timely manner.
The TOE implements cryptography to protect data at rest and in transit.
The TOE stores credential data and passphrase data encrypted using AES or a password-based key derivation function (PBKDF), depending on the data that is being stored.
For data in transit, the TOE implements TLS/HTTPS as a server. The TOE implements a TLS server for its administrative interface and to receive communications from other Tenable components in its operational environment.
The TOE implements all cryptography used for these functions with NIST-approved algorithms. The TOE’s DRBG is seeded using entropy from the underlying OS platform.
User Data Protection
The TOE uses cryptographic mechanisms to protect sensitive data at rest. The key used by the TOE to encrypt and decrypt sensitive data is cryptographically protected by the TOE platform.
The TOE relies on the network connectivity and system log capabilities of its host OS platform. The TOE supports user-initiated, externally-initiated, and application-initiated uses of the network. The TOE also accesses various system resources as part of conducting system scans. Specifically, the TOE supports remote scanning of a variety of target host systems from network devices to PCs running general-purpose operating systems. For the target system, the TOE can examine externally-visible ports and services. If provided credentials (either by receiving them from Tenable.sc or by direct administrator input), the TOE can authenticate to the target system and utilize platform-specific tools such as apt, yum, and WMI to collect more detailed information about the system.
Identification and Authentication
The TOE supports X.509 certificate validation as part of establishing TLS and HTTPS connections. The TOE supports various certificate validity checking methods and can also check certificate revocation status using OCSP. If the validity status of a certificate cannot be determined, the certificate will be accepted. All other cases where a certificate is found to be invalid will result in rejection without an administrative override.
The TOE itself and the configuration settings it uses are stored in locations recommended by the platform vendor.
The TOE includes a web GUI that enforces username/password authentication using locally-stored credentials that are created using the TOE. The TOE does not provide a default user account to access its management interface.
The security-relevant management functions supported by the TOE relate to configuration of transmission of system data (through execution of remote scanning) and configuration of transmission of application state information.
The TOE does not handle Personally Identifiable Information (PII) of any individuals.
Protection of the TSF
The TOE enforces various mechanisms to prevent itself from being used as an attack vector to its host OS platform. The TOE: implements address space layout randomization (ASLR); does not allocate any memory with both write and execute permissions; does not write user-modifiable files to directories that contain executable files; is compiled using stack overflow protection; and is compatible with the security features of its host OS platform.
The TOE contains libraries and invokes system APIs that are well-known and explicitly identified.
The TOE has a mechanism to determine its current software version. Software updates to the TOE can be acquired by leveraging its OS platform. All updates are digitally signed to guarantee their authenticity and integrity.
The TOE encrypts sensitive data in transit between itself and its operational environment using TLS and HTTPS. It facilitates the transmission of sensitive data from remote users over TLS and HTTPS.