Assurance Continuity - SilentEdge Enterprise Server and GoSilent Client
Date of Maintenance Completion: 2020.09.29CC Certificate Validation Report Assurance Activity
Product Type: Firewall
Virtual Private Network
Conformance Claim: Protection Profile Compliant
PP Identifier: collaborative Protection Profile for Stateful Traffic Filter Firewalls Version 2.0 + Errata 20180314
Extended Package for VPN Gateways Version 2.1
Original Evaluated TOE: 2019.10.28 - SilentEdge Enterprise Server and GoSilent Client
Please note: The above files are for the Original Evaluated TOE. Consequently, they do not refer to this maintained version, although they apply to the maintained version.
Security Target * Assurance Continuity Maintenance Report Administrative Guide
Please note: This serves as an addendum to the VR for the Original Evaluated TOE.
* This is the Security Target (ST) associated with this latest Maintenance Release. To view previous STs for this TOE, click here.
Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product. Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate. Such assurance can only be gained through re-evaluation.
Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary. A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target. Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents.
An additional virtual network interface was added to the virtual machine appliance operating in the VMware ESXi configuration. The existing web user interface is capable of the configuration and management of the additional virtual interface.
Functionally, the additional third virtual interface is identical to the existing two virtual interfaces and can be mapped to the underlying physical server NICs. The implementation of the additional interface does not impact any SFR claims or impact any security functionality claimed for the TOE in the Security Target.
The addition of the additional interface resulted in what was considered to be a “Minor Change”.
The vendor performed vulnerability testing, functional regression testing and unit testing against the release to ensure the TOE functionality was maintained and that the source code was fit for use. This functional testing included verification that any newly introduced features did not affect the security functionality previously tested and verified.
The regression testing performed against the TOE included manual test execution by the Quality Assurance Team within Atilla Security. This testing ensured that the functionality claimed within the Security Target had not been impacted by any software changes made to the product between
NIST CAVP Certificates:
The operational environment under which the validated cryptographic algorithm implementation was tested is the same as the operational environment as the changed TOE. Therefore, the cryptographic algorithm implementation validated for CAVP conformance also applies to the changed TOE.
A public search for vulnerabilities that might affect the TOE was performed on August 28, 2020. All vulnerabilities found using the sites and search terms below have been addressed in the release 17.09.4 version of the TOE under Assurance Maintenance.
A search of the following national sites was conducted:
• Vendor website
On 8/28/2020 a public domain vulnerability search was performed using the following key words:
• Atilla Security
• SilentEdge Enterprise Server
• GoSilent Client
• Atilla Security Software version 19.07
• Atilla GoSilent Crypto Library
• Atilla SilentEdge Crypto Library
• TLS 1.2
• VPN Gateway
The vulnerability search returned no matching results related to the product.