NIAP: Assurance Continuity
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Maintenance Update of Venafi Trust Protection Platform

Date of Maintenance Completion:  2018.08.27

Product Type:    Application Software

Conformance Claim:  Protection Profile Compliant

PP Identifier:    Protection Profile for Application Software Version 1.2
  Extended Package for Secure Shell (SSH)

Original Evaluated TOE:  2017.09.15 - Venafi Trust Protection Platform v17.1

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF] Administrative Guide [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with this latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

Venafi submitted an Impact Analysis Report (IAR) to Common Criteria Evaluation Validation Scheme (CCEVS) for approval on 20 July 30, 2018. The IAR is intended to satisfy requirements outlined in Common Criteria Evaluation and Validation Scheme Publication #6, Assurance Continuity: Guidance for Maintenance and Re-evaluation, version 2.0. In accordance with those requirements, the IAR describes the changes made to the certified TOE, the evidence updated because of the changes, and the security impact of the changes. 

The IAR identified changes to the TOE including several software security updates and non-security relevant feature updates. The platform has had four version updates since the original product was certified. The security updates ensure that the software maintenance is current, including bugs fixes and security updates have been applied. No hardware changes were reported.

The evaluation evidence consisted of the Security Target, Impact Analysis Report (IAR), and User Guidance.  The Security Target was revised to introduce the updated platform version number. The User Guide was similarly revised to identify current platform version. The IAR was new.

The evaluation was performed against the collaborative Protection Profile for Application Software, version 1.2, and the Extended Package for Secure Shell, version 1.0. The ST referenced validated FIPS certificates. No changes were made in the processor, and the bug fixes had no effect on cryptographic processing, so no modifications were required in any of the valid NIST certificates.

Changes to TOE:

Fifty-Eight Software changes and bug fixes were identified and claimed to be non-security relevant system updates across four platform version updates. A complete listing of the software changes, per version, was supplied in the IAR. The changes were either associated with non-security relevant commands and configuration or for functions/components not claimed in the original evaluation. 

A detailed description of each change and the associated impact and rational was provided for all the changes in each platform version. The rational provided supporting evidence to ensure that the changes were not TOE security relevant and outside the scope of the TOE security boundary.

Changes to Evaluation Documents: 

·         ST: Updated to indicate current Venafi Trust Protection Platform software version. 

·         AGD: Updated to indicate current Venafi Trust Protection Platform software version

Regression Testing: 

Although no changes were made to the security functionality of the TOE, vulnerability testing, functional regression testing and unit testing was performed against each release and software build.  The regression testing included automation testing and manual test execution by the Quality Assurance Team.

Vendor Information

Logo
Venafi
Jason Brothers
801-676-6900
jason.brothers@venafi.com

www.venafi.com
Site Map              Contact Us              Home