Archived U.S. Government Approved Protection Profile - U.S. Government Protection Profile Intrusion Detection System - System for Basic Robustness Environments, Version 1.7, dated July 25, 2007
Short Name: pp_ids_sys_br_v1.7
Technology Type: Wireless Monitoring
CC Version: 3.1
Preceded By: pp_ids_sys_v1.6
Sunset Date: 2011.06.01
Conformance Claim: EAL2 AugmentedProtection Profile
Herewith a brief summary, sufficiently detailed to enable a potential user to determine whether the PP is of interest.
The Common Criteria (CC) Intrusion Detection System (System) Protection Profile specifies a set of security functional and assurance requirements for Information Technology (IT) products. An Intrusion Detection System (IDS) monitors an IT System for activity that may inappropriately affect the IT System's assets. An IT System may range from a computer system to a computer network. An IDS System (System) consists of Sensors, Scanners and Analyzers (i.e., IDS components). Sensors and Scanners collect information regarding IT System activity and vulnerabilities, and they forward the collected information to Analyzers. Analyzers perform intrusion analysis and reporting of the collected information.
PP_IDS_SYS_BR_V1.7 -conformant products support the ability that monitor (both real-time and statically) an IT System for activity that may inappropriately affect the IT System's assets and react appropriately. PP_IDS_SYS_BR_V1.7 -conformant products also provide the ability to protect themselves and their associated data from unauthorized access or modification and ensure accountability for authorized actions.
The PP_IDS_SYS_BR_V1.7 provides for a level of protection which is appropriate for IT environments that require detection of malicious and inadvertent attempts to gain inappropriate access to IT resources, where the System can be appropriately protected from hostile attacks. Though products that PP_IDS_SYS_BR_V1.7 -conformant can be used to monitor and analyze a system or network in a hostile environment, they are not designed to resist direct, hostile attacks. The PP_IDS_SYS_BR_V1.7 does not fully address the threats posed by malicious administrative or system development personnel. This profile is also not intended to result in products that are foolproof and able to detect intrusion attempts by hostile and well-funded attackers. PP_IDS_SYS_BR_V1.7 -conformant products are suitable for use in both commercial and government environments. The PP_IDS_SYS_BR_V1.7 was constructed to provide a target and metric for the development of systems. This PP identifies security functions and assurances that represent the lowest common set of requirements that should be addressed by a useful IDS System.
SECURITY EVALUATION SUMMARY
Because a PP is written to be implementation-independent, there may be some ambiguities that do not arise until a specific implementation is being evaluated against it. When this happens, a resolution is established through the Observation Decision (OD) process in the form of a Precedent Decision (PD), which is to be used consistently in subsequent evaluations involving the PP in question. The Precedent Decisions specifically associated with this PP are listed below:
July 25, 2007
Assurance maintenance has been performed on this protection profile to update it to the common criteria version 3.1. This update caused a change in version number (from 1.6 to 1.7) that indicates an update has occurred. The updates included revisions based on the assurance requirements of the CC 3.1, removal of FPT_SEP and FPT_RVM since it is now covered by ADV_ARC and replacement of Explicitly stated requirements with Extended requirements (only the nomenclature changed and not the requirements.)
This U.S. Government Approved Protection Profile is not assigned to any Validated Products
This U.S. Government Approved Protection Profile does not have any related Technical Decisions
Please forward any Protection Profile specific comments to the applicable Technical Rapid Response Team (TRRT).
Please forward any general questions to our Q&A tool.