{"product_id":10199,"v_id":10199,"product_name":"MetaMatrix Enterprise Data Services Platform V5.5.3","certification_status":"Not Certified","certification_date":"2009-08-18T00:08:00Z","tech_type":"Miscellaneous","vendor_id":{"name":"Red Hat, Inc.","website":"http://www.redhat.com"},"vendor_poc":"Ken Johnson","vendor_phone":"978-392-1000","vendor_email":"ken.johnson@redhat.com","assigned_lab":{"cctl_name":"CygnaCom Solutions, Inc"},"product_description":"<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\">MetaMatrix Enterprise Release 5.5.3 (MetaMatrix) is an enterprise information integration (EII) system.<span style=\"mso-spacerun: yes;\">&nbsp; </span>EII is based on the premise that enterprises have a variety of information sources and information types, distributed geographically, and owned by different parts of the enterprise. A basic tenet of EII is that information should be capable of integration regardless of its native physical storage characteristics.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\">MetaMatrix manages and describes information that is spread across disparate enterprise information systems.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Using MetaMatrix these enterprise information systems can be integrated into a single, complete data access solution. It provides a way to define the characteristics of information and how information is related, and manage this &ldquo;data about data&rdquo;, or &ldquo;Metadata&rdquo;. MetaMatrix users can issue queries to any data source, process and integrate the results derived from multiple sources.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\">MetaMatrix protects the distributed data and Metadata through an access control policy, user identification and authentication, role-based management functions and auditing of security relevant events.</span></p>","evaluation_configuration":null,"security_evaluation_summary":"<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures. MetaMatrix Enterprise Release 5.5.3 software was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 R2. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 R2. CygnaCom Solutions has determined that the product meets the security criteria in the Security Target, which specifies an assurance level of EAL2 extended. A validator, on behalf of the CCEVS Validation Body, monitored the evaluation.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation was completed in July 2009. </span></p>","environmental_strengths":"<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\">The following security functions are in the scope of the evaluation:</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt;\"><span style=\"font-size: x-small;\">&nbsp;</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in; mso-list: l0 level1 lfo2; tab-stops: .25in list .5in;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-bidi-font-weight: bold; mso-bidi-font-style: italic;\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&middot;</span><span style=\"font-weight: normal; line-height: normal; font-style: normal;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style=\"font-size: x-small;\"><strong style=\"mso-bidi-font-weight: normal;\">Security audit </strong><span style=\"mso-spacerun: yes;\">&nbsp;</span><strong><em>&nbsp;</em></strong></span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt 0.5in;\"><span style=\"font-size: x-small;\">MetaMatrix&rsquo;s auditing capabilities include recording information about system processing and users&rsquo; access to the TOE.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Subject identity (user login name) and outcome are recorded for each event audited. The audit records generated by MetaMatrix are protected by the TSF working in conjunction with the protection mechanisms of the IT Environment.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt 0.5in;\">&nbsp;</p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in; mso-list: l0 level1 lfo2; tab-stops: .25in list .5in;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-bidi-font-weight: bold; mso-bidi-font-style: italic;\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&middot;</span><span style=\"font-weight: normal; line-height: normal; font-style: normal;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><strong style=\"mso-bidi-font-weight: normal;\"><span style=\"font-size: x-small;\">User data protection <em><span style=\"mso-bidi-font-weight: bold;\">&nbsp;</span></em></span></strong></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt 0.5in;\"><span style=\"font-size: x-small;\"><span style=\"font-size: x-small;\"><span style=\"mso-bidi-font-family: Arial; mso-bidi-font-style: italic;\">MetaMatrix </span>provides its own access control separate from the IT Environment between subjects and objects covered by the MetaMatrix Access Control SFP. MetaMatrix provides facilities to define and manage permissions to control a user&rsquo;s access to both Data from the EISs and Metadata stored in the MMR. </span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt 0.5in;\"><span style=\"font-size: x-small;\">&nbsp;</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in; mso-list: l1 level1 lfo1; tab-stops: .25in list .5in;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-bidi-font-weight: bold; mso-bidi-font-style: italic;\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&middot;</span><span style=\"font-weight: normal; line-height: normal; font-style: normal;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><strong style=\"mso-bidi-font-weight: normal;\"><span style=\"font-size: x-small;\">Identification and authentication <em>&nbsp;</em></span></strong></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt 0.5in;\"><span style=\"font-size: x-small;\"><span style=\"font-size: x-small;\">Each user must be successfully identified and authenticated with a username and password by the TSF or by an authentication service invoked by the TSF before access is allowed to MetaMatrix.<span style=\"mso-spacerun: yes;\">&nbsp; </span>There are two ways that users can be authenticated to the MetaMatrix system in the evaluated configuration.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The first is through username and password.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The second is through authentication by a third-party Membership Domain Provider. <span style=\"mso-bidi-font-size: 11.0pt; mso-bidi-font-family: Arial;\">The TSF maintains security attributes for each individual TOE user for the duration of the user&rsquo;s login session.</span></span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt 0.5in;\"><span style=\"font-size: x-small;\">&nbsp;</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in; mso-list: l0 level1 lfo2; tab-stops: .25in list .5in;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-bidi-font-weight: bold; mso-bidi-font-style: italic;\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&middot;</span><span style=\"font-weight: normal; line-height: normal; font-style: normal;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><strong style=\"mso-bidi-font-weight: normal;\"><span style=\"font-size: x-small;\">Security management<span style=\"mso-spacerun: yes;\">&nbsp; </span><em>&nbsp;</em></span></strong></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt 0.5in;\"><span style=\"font-size: x-small;\"><span style=\"font-size: x-small;\"><span style=\"mso-bidi-font-family: Arial; mso-bidi-font-style: italic;\">MetaMatrix </span>provides role-based security management functions through the use of the Console.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Through the enforcement of the MetaMatrix Access Control SFP, the ability to manage <span style=\"mso-bidi-font-size: 11.5pt; mso-bidi-font-weight: bold; mso-bidi-font-style: italic;\">various security attributes, system parameters and all TSF data is controlled and limited to those users who have been assigned the appropriate administrative role.</span></span></span></p>","features":[]}