NIAP: Assurance Continuity
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - BeyondTrust PowerBroker UNIX® + Linux® Edition V9.1

Date of Maintenance Completion:  2018.04.10

Product Type:    Network Access Control
   Network Management
   Enterprise Security Management

Conformance Claim:  Protection Profile Compliant

PP Identifier:    Protection Profile for Enterprise Security Management-Access Control Version 2.1
  Protection Profile for Enterprise Security Management - Policy Management Version 2.1

Original Evaluated TOE:  2016.08.30 - BeyondTrust PowerBroker ® UNIX® + Linux® Edition V9.1

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with the latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

A public search for new vulnerabilities that might affect the TOE since the evaluation was completed was performed. In summary, no vulnerabilities were discovered that were applicable to the TOE. 

A public search for vulnerabilities that might affect the TOE was performed. In summary, no vulnerabilities were discovered that were applicable to the TOE.  

Search Terms:



           Enterprise Security Management

           Controlled Access

           Policy Management

           Privilege Elevation   



The vulnerability assessment provided the search terms, shown above, and the resulting CVEs[1]. For the three CVEs identified from a search for ‘Spectre’ and ‘Meltdown’, the analysis states that “PowerBroker for Unix & Linux is a user space solution that has no interaction with the kernel. Additionally, the solution is only running when it is invoked by a user similar to 'vi'.  The TOE does not provide the capability to execute user-supplied code. The application is reliant on the operating environment to be patched. There are no mitigation or code changes required to PowerBroker for Unix & Linux or supporting components.”. The conclusion was that ‘The TOE is not vulnerable.

[1] CVE-2017-5753, 5754, and 5715: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (for 5754: of the data cache).


Vendor Information

BeyondTrust Software, Inc.
Rod Simmons
Site Map              Contact Us              Home