{"product_id":10120,"v_id":10120,"product_name":"CA Unicenter Systems Management (NSM) r11.1","certification_status":"Not Certified","certification_date":"2008-05-16T00:05:00Z","tech_type":"Network Management","vendor_id":{"name":"CA Technologies","website":"www.ca.com"},"vendor_poc":"William F. Clark","vendor_phone":"703-708-3501","vendor_email":"william.clark@ca.com","assigned_lab":{"cctl_name":"CygnaCom Solutions, Inc"},"product_description":"<p>CA Unicenter&trade; Network and Systems Management, r11.1 SP1 CCV (Unicenter NSM r11.1 SP1 CCV) is a software tool that manages and monitors the health and performance of an IT infrastructure.  It provides users with a single management approach to monitor resources and invoke policy.  Its management functions provide information system services to manage systems resources including, enterprises with heterogeneous networks, systems, applications, databases, and non-IT devices.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures. CA Unicenter NSM r11.1 SP1 CCV software was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 2.2. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 2.2. CygnaCom Solutions has determined that the product meets the security criteria in the Security Target, which specifies an assurance level of EAL2. A validator, on behalf of the CCEVS Validation Body, monitored the evaluation.  The evaluation was completed in April 2008.</p>","environmental_strengths":"<p>The following security functions are in the scope of the evaluation:</p>\r\n<p>&bull;Audit &ndash; The TOE provides a decentralized audit generation capability along with a review process that allows the authorized user to selectively generate reports as well as search, sort, and order the display of audit records. The interface does not allow modifications or deletion of audit information.</p>\r\n<p>&bull;Alerts on event data &ndash; The TOE collects events that are used to categorize, log, and process events received from the Event Agents and Performance Agents throughout the IT Environment.  Alerts are triggered based on a defined escalation policy.</p>\r\n<p>&bull;User attribute definition - The TSF maintains user attributes.  These attributes are maintained by the TOE to grant access and permission for managing TSF data.</p>\r\n<p>&bull;Identification and Authentication - The TSF relies on password-based (provided by the TOE, MSSQL, and by the OS) and certificate-based mechanisms to support user authentication.  The certificate-based mechanism is also used for the secure communication between the TOE and the Unicenter NSM Agents.</p>\r\n<p>&bull;Administration and management of security - The TSF user interfaces provide a controlled interface for the management functions. The user interfaces to the management functions are mostly GUI based interfaces, with the exception of a small number of additional CLIs listed in Section 2.2.1 of the ST. The user interfaces provide a hierarchical view of the system for navigation to the requested services, referred to as &lsquo;Enterprise Management&rsquo;, providing views and access to the specific data to be managed, only displaying the relevant data for the operation and available to the user based on the user&rsquo;s role and permissions.  All access control pertains to security management functions.</p>\r\n<p>&bull;Partial Trusted communication - The TSF includes a trusted communication infrastructure that provides trusted communication channels among its distributed application components such as between the UCM and the Unicenter NSM Agents.</p>\r\n<p>&bull;Partial TSF self-protection - The TSF after being invoked by the OS ensures that TOE security functions are non-bypassable and protected from interference and tampering. Since this is a software-only TOE, it also relies on the underlying OS to provide non-bypassability and domain separation.  The TSF ensures that security protection enforcement functions are invoked and succeed before each function within Unicenter NSM&rsquo;s scope of control is allowed to proceed.  The TSF maintains a security domain for its own execution that protects it from interference and tampering by untrusted subjects.  A user session is allocated after successful authentication and all user operations are conducted in the context of the associated session. The TOE is also responsible to ensure that stored audit records cannot be modified or deleted via the TOE interfaces.</p>","features":[]}