NIAP: Assurance Continuity
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Maintenance Update of Cisco Email Security Appliance 11.0

Date of Maintenance Completion:  2017.10.23

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 1.0

Original Evaluated TOE:  2017.08.08 - Cisco Email Security Appliance 9.8

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF] Adminstrative Guide [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with this latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

Software bug fixes were made to non-security relevant system functions. Also, the listings, in the ST and guide document, of originally incorrect hardware models were corrected but that had no effect on the TOE itself. A list of the various bug fixes was presented in the IAR and all were listed as being either associated with non-security relevant commands and configuration or for functions/components not claimed in the original evaluation (e.g., Cisco Advanced Malware Protection, antivirus functions, clustering, content filtering, etc.). Rational was included for why the various bug fixes did not affect the TOE.

Changes to Evaluation Documents: 

·         ST: Updated to add the C690X model and update the list of TOE Hardware Models listed in ST Table 3 to correct typographical errors. 

·         AGD_PRE and OPE: Updated to add new hardware model and to correct typographical errors in the list of supported hardware and to reflect updated software versions

All these changes were made to either correct errors in the original evaluated versions of the ST and CC configuration guide document or to add a new hardware version.

Regression Testing: 

Although no changes were made to the security functionality of the TOE, but a new hardware model was added, and testing was rerun.  The same Test Plan used for the original evaluation was used.  New test results were generated, and were reviewed by Cisco. An updated search for vulnerabilities was also done for the updated TOE version. No new vulnerabilities were detected.

Vendor Information

Logo
Cisco Systems, Inc.
Lisa Rogers
4103094862
certteam@cisco.com

www.cisco.com
Site Map              Contact Us              Home