NIAP: Assurance Continuity
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - SilentEdge Enterprise Server and GoSilent Client

Date of Maintenance Completion:  2020.09.29

Product Type:    Firewall
   Virtual Private Network

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Stateful Traffic Filter Firewalls Version 2.0 + Errata 20180314
  Extended Package for VPN Gateways Version 2.1

Original Evaluated TOE:  2019.10.28 - SilentEdge Enterprise Server and GoSilent Client

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF] Administrative Guide [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with this latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

Hardware Changes:

None

Software Changes:

An additional virtual network interface was added to the virtual machine appliance operating in the VMware ESXi configuration. The existing web user interface is capable of the configuration and management of the additional virtual interface.

Functionally, the additional third virtual interface is identical to the existing two virtual interfaces and can be mapped to the underlying physical server NICs. The implementation of the additional interface does not impact any SFR claims or impact any security functionality claimed for the TOE in the Security Target.

The addition of the additional interface resulted in what was considered to be a “Minor Change”.

Regression Testing:

The vendor performed vulnerability testing, functional regression testing and unit testing against the release to ensure the TOE functionality was maintained and that the source code was fit for use. This functional testing included verification that any newly introduced features did not affect the security functionality previously tested and verified.

The regression testing performed against the TOE included manual test execution by the Quality Assurance Team within Atilla Security. This testing ensured that the functionality claimed within the Security Target had not been impacted by any software changes made to the product between

NIST CAVP Certificates:

The operational environment under which the validated cryptographic algorithm implementation was tested is the same as the operational environment as the changed TOE.  Therefore, the cryptographic algorithm implementation validated for CAVP conformance also applies to the changed TOE.

Vulnerability Analysis:

A public search for vulnerabilities that might affect the TOE was performed on August 28, 2020. All vulnerabilities found using the sites and search terms below have been addressed in the release 17.09.4 version of the TOE under Assurance Maintenance.

 

A search of the following national sites was conducted:

               http://nvd.nist.gov/

               https://www.cvedetails.com/

               http://www.kb.cert.org

               http://www.securiteam.com

               http://nessus.org

               http://www.zerodayinitiative.com

               https://www.exploit-db.com/

               https://www.rapid7

               Vendor website 

On 8/28/2020 a public domain vulnerability search was performed using the following key words:

• Atilla Security

• SilentEdge Enterprise Server

• GoSilent Client

• Atilla Security Software version 19.07

• Atilla GoSilent Crypto Library

• Atilla SilentEdge Crypto Library

• TLS 1.2

• IPsec

• TCP

• UDP

• Firewall

• VPN Gateway

 

The vulnerability search returned no matching results related to the product.

Vendor Information


Attila Security
Vesh Bhatt
410-849-9472
vbhatt@attilasec.com

https://attilasec.com
Site Map              Contact Us              Home