NIAP: Assurance Continuity
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Palo Alto Networks PA-200 Series, PA-500, PA-800 Series, PA-3000 Series, PA-3200 Series, PA-5000 Series, PA-5200 Series, PA-7000 Series, VM Series, Next-Generation Firewall with PAN-OS v8.0.12 and v8.1.3

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with this latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description
  • Software changes to the TOE involve updating PAN-OS from version 8.0.6 to version 8.0.12 and PAN-OS version 8.1.3 to accommodate new features and bug fixes outlined below.
    • Several new software features were added to the TOE including features related to App-ID, virtualization, decryption, WildFire, Panorama, Content Inspection, authentication, GlobalProtect, management, networking, User-ID, and certification.  These features are either performance enhancements, outside the scope of the evaluation, or otherwise not relevant to the security functionality of the evaluated TOE.  Overall, it has been determined that the new features added have “minor impact” to the evaluation.
    • Several bugs were fixed to resolve issues with performance, availability, diagnostics, and stability, or related to features that are not covered in the scope of the evaluation.  Overall, it has been determined that the bug fixes have “minor impact” to the evaluation.
  • The following hardware appliance models have been added to the TOE:
    • PA-220R
    • PA-3220
    • PA-3250
    • PA-3260
    • PA-5280

The new hardware only differs from the evaluated hardware in number of ports, interfaces, throughput and processing speed, memory and storage.  Overall, it has been determined that the new hardware models added have “minor impact” to the evaluation.

  • Vulnerability keyword searches either did not return any results or results were not applicable to the TOE, or were mitigated or corrected in the TOE.

Vendor Information

Palo Alto Networks, Inc.
Jake Bajic
Site Map              Contact Us              Home