Assurance Continuity - Trend Micro TippingPoint Threat Protection System (TPS) v5.2
Date of Maintenance Completion: 2019.11.06CC Certificate Validation Report Assurance Activity
Product Type: Network Device
Conformance Claim: Protection Profile Compliant
PP Identifier: collaborative Protection Profile for Network Devices Version 2.0 + Errata 20180314
Original Evaluated TOE: 2019.01.30 - Trend Micro TippingPoint Threat Protection System version 5.1.0
Please note: The above files are for the Original Evaluated TOE. Consequently, they do not refer to this maintained version, although they apply to the maintained version.
Security Target * Assurance Continuity Maintenance Report
Please note: This serves as an addendum to the VR for the Original Evaluated TOE.
* This is the Security Target (ST) associated with the latest Maintenance Release. To view previous STs for this TOE, click here.
Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product. Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate. Such assurance can only be gained through re-evaluation.
Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary. A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target. Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents.
For this Assurance Continuity, the following TOE updates were released:
No functionality, as defined in the SFRs, was impacted, and none of the software updates affected the security functionality or the SFRs identified in the Security Target. In addition, while the addition of the two new appliances required the introduction of new processors (an Intel Pentium D-1517 in the 1100TX and an Intel Xeon D-1559 in the 5500TX, each with a Broadwell microarchitecture), they are both Intel x86 processors that use an extended version of the Haswell microarchitecture instruction set used in the original evaluation. The new processors are equivalent in cryptographic functionality as demonstrated by CAVP testing.
All updates are, therefore, considered to be Minor Changes.
Regression testing was performed on the two new Tipping Point devices. The test cases verified that software updates had no security-relevant impact, that the two devices generated the correct results, and did not affect the security functionality defined in the Security Target. The TOE was received from the vendor and configured according to the guidance documents. Both new appliances were tested according to the Assurance Activities contained in the NDcPP. Testing took place at Leidos in Columbia MD, from 8/19-9/24/2019. The overall testing verdict was that Trend Micro TPS 5.2 passed.
The results of testing were contained in a supplemental Test Report. The report was reviewed and considered acceptable.
NIST CAVP Certificates:
CAVP certificate #C1262 was obtained for the 1100TX and 5500TX. Specific information about that certificate is contained in the Impact Analysis Report.
The evaluation team conducted a public search for vulnerabilities that might affect the TOE on October 4, 2019. The results were compared to the original vulnerability analysis document, dated November 30, 2018.
The Search Terms used included:
· “threat protection”
· “linux (kernel)”
All issues (e.g., CVEs) located were confirmed as not directly effecting the TOE.
In summary, no residual vulnerabilities were discovered that were applicable to the TOE or that were not mitigated or corrected in the updated version of the TOE.