{"product_id":10034,"v_id":10034,"product_name":"eEye Retina Enterprise Suite, comprising the following eEye components:  Retina Network Security Scanner Version 5.4.21.53, REM version 3.0.2.571, and REM Events Server version 2.2.0.194","certification_status":"Not Certified","certification_date":"2007-05-25T00:05:00Z","tech_type":"Wireless Monitoring","vendor_id":{"name":"eEye Digital Security Corporation","website":"www.eeye.com"},"vendor_poc":"Kimberly Lim","vendor_phone":"949-900-4115","vendor_email":"klim@eeye.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<div style=\"margin: 0in 0in 6pt\"><font size=\"2\">The TOE, eEye Retina Enterprise Suite, is a software-only, <span style=\"layout-grid-mode: line; color: black\">non-disruptive network security scanner</span> &ndash; the TOE is not invasive and does not interfere with the operation of the IT system being monitored. The TOE <span style=\"layout-grid-mode: line; color: black\">does not scan network traffic anomalies reported by sensors, as do some other types of IDS products. Instead, the TOE scans hosts identified within a specific IP range. Ports on targeted hosts are monitored for specific activities and events identified in an audit policy. The TOE includes a management capability that provides an authorized administrator with the ability to manage multiple scanners in the enterprise network, collating the results of scans from the various scanners and highlighting potential vulnerabilities for remedial action.</span></font></div>","evaluation_configuration":null,"security_evaluation_summary":"<div style=\"margin: 0in 0in 6pt\"><font size=\"2\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process. The criteria against which the eEye Retina Enterprise Suite TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 2.2 and International Interpretations effective on 8 October 2004.&nbsp;The evaluation methodology used by the Evaluation Team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 2.2.&nbsp;Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is the EAL2 family of assurance requirements.&nbsp;The product, when configured as specified in the following documents, satisfies all of the security functional requirements stated in the Retina Enterprise Suite Security Target:</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.5in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">REM Security Management Console Administration Guide, v3.02, 2005</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.5in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">REM Users Manual, REM-M-032803, 2003</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.5in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">REM Manual Addendum, REM-EU-M-030305, v2.2.0, 2005</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.5in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Retina Network Security Scanner Users Manual, 5-3-1, 2005</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.5in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Release Notes for REM Events Manager version 3.0.2</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.5in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Release Notes for REM Events Server version 2.2.0</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.5in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Release Notes for Retina Network Security Scanner version 5.4.21.</font></div>\r\n<div style=\"margin: 0in 0in 6pt\"><font size=\"2\">Several functions such as auto-update were excluded from the evaluation.&nbsp;See the VR and ST for a complete list.</font></div>\r\n<div style=\"margin: 0in 0in 6pt\"><font size=\"2\">One validator on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC.&nbsp;The evaluation was completed in May 2007.&nbsp;Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, (report number CCEVS-VR-07-0043) prepared by CCEVS.</font></div>","environmental_strengths":"<div style=\"margin: 0in 0in 6pt\"><font size=\"2\">The evaluation assurance level against which the eEye Retina Enterprise Suite TOE has been evaluated (EAL2) provides a low to moderate level of independently assured security in a conventional TOE and is suitable for a cooperative non-hostile environment with good physical access security and competent administrators.</font></div>\r\n<div style=\"margin: 0in 0in 6pt\"><font size=\"2\">The primary security functionality of the TOE is to provide the capabilities for non-intrusive scanning of IT systems within the IT environment of the TOE. The results of such scans identify vulnerabilities within the scanned IT systems that could lead to an intrusion of the IT environment. The TOE provides extensive security management capabilities for controlling scanning and reporting and requires identification and authentication before granting access to those capabilities.</font></div>\r\n<div style=\"margin: 0in 0in 6pt\"><font size=\"2\">eEye Retina Enterprise Suite provides the following security functions:</font></div>\r\n<div style=\"margin: 0in 0in 6pt\"><strong><font size=\"2\">Network Security System</font></strong></div>\r\n<div style=\"margin: 0in 0in 6pt\"><font size=\"2\">The TOE scans hosts identified within a specific IP range against predefined audit policies (that are set at the granularity of a specific host or collection of hosts), to detect known potential vulnerabilities. The audit policies govern the collection of data regarding inappropriate activities on the IT systems the TOE monitors. The TOE collects the following information from targeted IT systems:</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.45in; text-indent: -0.25in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Security configuration changes</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.45in; text-indent: -0.25in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Access control configuration</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.45in; text-indent: -0.25in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Service configuration</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.45in; text-indent: -0.25in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Authentication configuration</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.45in; text-indent: -0.25in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Accountability policy configuration</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.45in; text-indent: -0.25in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Detected known vulnerabilities.</font></div>\r\n<div style=\"margin: 0in 0in 6pt\"><font size=\"2\">The results of scans are analyzed to highlight potential areas of vulnerability. Potential vulnerabilities are highlighted as &lsquo;Events&rsquo; and reported as such to the TOE administrator.</font></div>\r\n<div style=\"margin: 0in 0in 6pt\"><strong><font size=\"2\">Security Management</font></strong></div>\r\n<div style=\"margin: 0in 0in 6pt\"><font size=\"2\">The <span style=\"color: black\">TOE</span> provides the user with a GUI that can be used to configure and modify the options of the TOE. In particular, the GUI provides the user with the following capabilities:</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Manage scanning policies and schedule scans across multiple scanners</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Review results of scans, including classification of vulnerabilities and other collected data</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Assign detected events to administrators for remediation </font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Generate remediation and summary reports of the results of the audit</font></div>\r\n<div style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in\"><span><font size=\"2\">&middot;</font><span style=\"font: 7pt 'Times New Roman'\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><font size=\"2\">Manage users and groups, including assigning permissions and scopes (i.e., ranges of IP addresses the user is responsible for).</font></div>\r\n<div style=\"margin: 0in 0in 6pt\"><strong><font size=\"2\">Identification and Authentication</font></strong></div>\r\n<div style=\"margin: 0in 0in 6pt\"><font size=\"2\">The TOE allows users to directly exercise the capabilities of the Network Security Scanner without being identified or authenticated. Otherwise, the TOE requires users to provide unique identification and authentication data (passwords) before being granted access to the management capabilities provided by the Events Manager.</font></div>","features":[]}