{"product_id":10214,"v_id":10214,"product_name":"BigFix Enterprise Suite v7.1.1.315","certification_status":"Not Certified","certification_date":"2009-01-16T00:01:00Z","tech_type":"Enterprise Security Management","vendor_id":{"name":"BigFix, Inc.","website":"www.bigfix.com"},"vendor_poc":"Noah Salzman","vendor_phone":"510-740-0308","vendor_email":"noah_salzman@bigfix.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt; text-align: justify;\"><span style=\"font-size: x-small; font-family: Times;\">The Target of Evaluation (TOE) is BigFix Enterprise Suite (BES), Version 7.1.1.315.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Note that there is no distinction between the BES product and the TOE since the TOE includes all parts of the product delivered to users and there are no specific restrictions imposed on the use of the product.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt; text-align: justify;\"><span style=\"font-size: x-small; font-family: Times;\">&nbsp;</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt; text-align: justify;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">BES enables operators to monitor the configurations of targeted systems on a network in the IT environment from a centralized location. BES provides operators the ability to define corrective actions on individual targeted systems to be applied at the direction of the operator. Corrective actions can include, for example, installing an application or an application/operating-system update.<span style=\"mso-spacerun: yes;\">&nbsp; </span></span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt; text-align: justify;\"><span style=\"font-size: x-small; font-family: Times;\">&nbsp;</span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">The TOE is a client-server application that allows monitoring and management of targeted IT systems from a central location. The TOE utilizes a patented Fixlet&reg; technology to identify vulnerable or misconfigured computers in the enterprise and allows authorized users to remediate identified issues across the network.<span style=\"mso-spacerun: yes;\">&nbsp; </span></span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt; text-align: justify; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-line-height-alt: 9.75pt;\"><span style=\"font-size: x-small; font-family: Times;\">Fixlet messages are available to an enterprise by subscribing to any of a number of Fixlet Sites that are maintained by the BigFix Fixlet Server which is outside the TOE evaluated configuration.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Each Fixlet Site contains pre-tested, pre-packaged Fixlet messages that provide out-of-the-box management solutions.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt; text-align: justify; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-line-height-alt: 9.75pt;\"><span style=\"font-size: x-small; font-family: Times;\">Fixlet messages can optionally also be developed in-house by administrators to address policy, configuration and vulnerability concerns specific to an enterprise.<span style=\"mso-spacerun: yes;\">&nbsp; </span>In-house fixes are known as Actions as these are developed by an authorized administrator to address specific situations.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Note that Fixlets and Fixlet Sites are not part of the TOE &ndash; they constitute data that the TOE collects, distributes and otherwise utilizes via the internet from the BigFix Fixlet Server to detect and remediate vulnerabilities.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt; text-align: justify;\"><span style=\"font-size: x-small; font-family: Times;\">Fixlets enable authorized users to perform the following functions within the enterprise:</span></p>\r\n<p class=\"Unclassified\" style=\"margin: 0in 0in 0pt 0.6in;\"><span style=\"font-family: Wingdings; mso-fareast-font-family: Wingdings; mso-bidi-font-family: Wingdings;\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&sect;</span><span style=\"font: 7pt \">&nbsp; </span></span></span><span style=\"font-size: x-small; font-family: Times New Roman;\">Analyze the vulnerability status (i.e., patched or insecure configurations);</span></p>\r\n<p class=\"Unclassified\" style=\"margin: 0in 0in 0pt 0.6in;\"><span style=\"font-family: Wingdings; mso-fareast-font-family: Wingdings; mso-bidi-font-family: Wingdings;\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&sect;</span><span style=\"font: 7pt \">&nbsp; </span></span></span><span style=\"font-size: x-small; font-family: Times New Roman;\">Distribute patches to vulnerable computers to maintain endpoint security;</span></p>\r\n<p class=\"Unclassified\" style=\"margin: 0in 0in 0pt 0.6in;\"><span style=\"font-family: Wingdings; mso-fareast-font-family: Wingdings; mso-bidi-font-family: Wingdings;\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&sect;</span><span style=\"font: 7pt \">&nbsp; </span></span></span><span style=\"font-size: x-small; font-family: Times New Roman;\">Establish and enforce configuration security policies across the network;</span></p>\r\n<p class=\"Unclassified\" style=\"margin: 0in 0in 0pt 0.6in;\"><span style=\"font-family: Wingdings; mso-fareast-font-family: Wingdings; mso-bidi-font-family: Wingdings;\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&sect;</span><span style=\"font: 7pt \">&nbsp; </span></span></span><span style=\"font-size: x-small; font-family: Times New Roman;\">Distribute and update software;</span></p>\r\n<p class=\"Unclassified\" style=\"margin: 0in 0in 0pt 0.6in;\"><span style=\"font-family: Wingdings; mso-fareast-font-family: Wingdings; mso-bidi-font-family: Wingdings;\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&sect;</span><span style=\"font: 7pt \">&nbsp; </span></span></span><span style=\"font-size: x-small; font-family: Times New Roman;\">Manage the network from a central Console; and,</span></p>\r\n<p class=\"Unclassified\" style=\"margin: 0in 0in 0pt 0.6in;\"><span style=\"font-family: Wingdings; mso-fareast-font-family: Wingdings; mso-bidi-font-family: Wingdings;\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&sect;</span><span style=\"font: 7pt \">&nbsp; </span></span></span><span style=\"font-size: x-small; font-family: Times New Roman;\">View, modify and audit properties and configurations of the networked client computers.</span></p>\r\n<p class=\"MsoBodyText3\" style=\"margin: 0in 0in 6pt; text-align: justify;\"><span style=\"font-size: 10pt;\"><span style=\"font-family: Times;\">&nbsp;</span></span></p>\r\n<p class=\"MsoBodyText3\" style=\"margin: 0in 0in 6pt; text-align: justify;\"><span style=\"font-size: 10pt;\"><span style=\"font-family: Times;\">The TOE contains built-in public/private key encryption capabilities to ensure the authenticity of the Fixlet messages and remedial Actions. Each Fixlet and Action received by a BES client is authenticated by verifying a signature affixed by the applicable administrator to ensure that it was generated by an administrator authorized to perform corresponding operations. These authorized operations instruct BES clients to view, modify and audit properties and configurations of the networked client computers. The results from those operations &mdash; or simply the gathered data &mdash; is encrypted and delivered back to the BES server.</span></span></p>","evaluation_configuration":"<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small; font-family: Times;\">Given that the TOE is a set of software applications or components, its physical boundaries are defined by those components: Server, Console, Client and Relays. Note that each of these components has a set of requirements for its hosting computer as follows: </span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\"><strong style=\"mso-bidi-font-weight: normal;\">Server:</strong> The hardware requirements for the Server component depends on the deployment (i.e., how many Clients are attached); and, specific data can be obtained from </span></span><a href=\"http://support.bigfix.com/cgi-bin/redir.pl?page=serverreq\"><span style=\"font-size: x-small; font-family: Times;\">http://support.bigfix.com/cgi-bin/redir.pl?page=serverreq</span></a><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">. The Server can be installed on the following OS platforms:<span style=\"mso-spacerun: yes;\">&nbsp; </span>Microsoft Windows 2000 and Server 2003. <span style=\"mso-spacerun: yes;\">&nbsp;</span>A Microsoft MSDE 2000, SQL Server 2000, or SQL Server 2005 database is required to be accessible to the Server to serve as the BES database. <span style=\"mso-spacerun: yes;\">&nbsp;</span></span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\"><strong style=\"mso-bidi-font-weight: normal;\">Console:</strong> The Console can be installed on the following OS platforms: Windows 2000, XP Home, XP Professional with MDAC 2.7. <span style=\"mso-spacerun: yes;\">&nbsp;</span></span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\"><strong style=\"mso-bidi-font-weight: normal;\">Client:</strong> The Client can be installed on the following OS platforms: Windows 95, 98, NT 4+, Me, 2000, Server 2003, XP; Red Hat Linux 8.0, 9.0; Red Hat Linux Enterprise 3, 4, 5; Solaris 7, 8, 9, 10; HPUX 11.00, 11.11, 11.23; AIX 5.1, 5.2, 5.3; SUSE 8, 9, 10; Mac OS X 10.3, 10.4, and 10.5. </span></span></p>\r\n<p><strong style=\"mso-bidi-font-weight: normal;\"><span style=\"font-size: 10pt; font-family: \">Relay:<span style=\"mso-spacerun: yes;\">&nbsp; </span></span></strong><span style=\"font-size: 10pt; font-family: \">Relays are optional and can be installed on any Windows server, workstation, PC or laptop within the TOE environment running Microsoft Windows NT SP6a, 2000, XP, Server 2003, or RHEL 4. </span></p>","security_evaluation_summary":"<p class=\"MsoBodyText\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The evaluation demonstrated that <span style=\"mso-bidi-font-style: italic;\">the <span style=\"mso-spacerun: yes;\">&nbsp;</span><span style=\"mso-spacerun: yes;\">&nbsp;</span>TOE<em> </em></span>meets the security requirements contained in the Security Target.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The criteria against which the <span style=\"mso-spacerun: yes;\">&nbsp;</span><span style=\"mso-spacerun: yes;\">&nbsp;</span>TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 2.3. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 2.3.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Science Application International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the TOE is EAL 3.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE, configured as specified in the installation guide, satisfies all of the security functional requirements stated in the Security Target.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Several validators on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation was completed in October 2008.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report<em> </em><span style=\"mso-bidi-font-style: italic;\">for</span></span><span style=\"font-family: \"> BigFix Enterprise Suite Version 7</span><span style=\"font-family: Times;\"><em> </em>prepared by CCEVS.</span></span></p>","environmental_strengths":"<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">The TOE protects itself from attempts to bypass its security mechanisms. Data transfer is protected by enforcing the information flow SFPs largely via the use of cryptographic signature verification to ensure authenticity and integrity of Fixlet and Action messages carrying the instructions of authorized administrators.<span style=\"mso-spacerun: yes;\">&nbsp; </span></span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt; mso-margin-bottom-alt: auto;\"><span style=\"font-size: x-small; font-family: Times;\">The TOE protects the security of audit data and operation results data gathered on networked client computers by encrypting this data before it is transmitted over the network.</span></p>","features":[]}