{"product_id":10230,"v_id":10230,"product_name":"TIBCO ActiveMatrix BusinessWorks™ Release 5.8","certification_status":"Not Certified","certification_date":"2010-07-30T00:07:00Z","tech_type":"Miscellaneous","vendor_id":{"name":"TIBCO Software Inc.","website":"www.tibco.com"},"vendor_poc":"Carlo Milono","vendor_phone":"650-846-5152","vendor_email":"cmilono@tibco.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p class=\"Body\">The Target of Evaluation (TOE) is TIBCO ActiveMatrix BusinessWorks Release 5.8 (also known as ActiveMatrix BusinessWorks&trade;).&nbsp; ActiveMatrix BusinessWorks consists of a development application, an administration application, and a runtime integration engine.&nbsp; These applications utilize common libraries.&nbsp; The following are the software applications that make up the TOE.</p>\r\n<ul>\r\n<li>TIBCO Designer&trade; &ndash; Provides the ability to develop business processes.</li>\r\n<li>TIBCO Administrator&trade; &ndash; Provides administrative interfaces that can be used to manage services of the TOE and business processes.</li>\r\n<li>TIBCO ActiveMatrix BusinessWorks&trade; &ndash; Provides a runtime environment for business processes. </li>\r\n<li>TIBCO Runtime Agent&trade; &ndash; Provides common functionality in libraries used by ActiveMatrix BusinessWorks applications, including functions used to communicate between TOE components.</li>\r\n</ul>\r\n<p class=\"Body\">Figure 1-1 TIBCO Components depicts a very general view of the components that make up the TIBCO product.&nbsp; The TIBCO Designer<sup>TM</sup> application creates and deploys a definition of a business process and then plays no part in the operation of the deployed business process.&nbsp; The TIBCO Administrator application and TIBCO ActiveMatrix BusinessWorks engine each include an instance of TIBCO Runtime Agent.&nbsp;</p>\r\n<p class=\"Body\">The TIBCO Designer application creates an Enterprise Archive (EAR) file to describe a business process and associated resource information; in conjunction with the TIBCO Designer application, certain properties may be included in an XML file called &lsquo;bwengine.xml&rsquo;.&nbsp; Certain aspects of the design elements and all of the aspects of the bwengine.xml file are exposed to the TIBCO administrator application and may be changed prior to deployment.</p>\r\n<p class=\"Body\">&nbsp;TIBCO Runtime Agent is installed on all machines in the network that are participating in the business process.&nbsp;</p>\r\n<p class=\"Body\">These EAR files are moved<a href=\"http://taurus.missi.ncsc.mil:88/ccevsdb/projects/details/?project_id=10230&amp;&amp;msg.status=Project%20ID%20%2310230%20updated#_ftn1\">[1]</a> from the TIBCO Designer application to the TIBCO Administrator Application.&nbsp; The TIBCO Administrator application is then used to deploy applicable parts of the EAR file to applicable instances of the ActiveMatrix BusinessWorks Application.&nbsp; The TIBCO Administrator application starts the ActiveMatrix BusinessWorks engine to perform activities in the business process.</p>\r\n<p class=\"Body\">TIBCO Runtime Agent is an installation package that provides common functionality in libraries used by other ActiveMatrix BusinessWorks applications, including functions used to communicate between TOE components.&nbsp; Two significant pieces of TIBCO Runtime Agent are subsets of other TIBCO products:&nbsp; TIBCO Hawk<sup>&reg;</sup> Agent and TIBCO Rendezvous<sup>&reg;</sup> Daemon. Hawk<sup>&reg;</sup> Agent is configured for a business process (created by the Domain Utility) to use either Rendezvous&reg; or TIBCO Enterprise Message Service&trade; as a message carrying protocol to pass messages between subsystems.&nbsp; Hawk Agent is used by each subsystem to facilitate communication between subsystems while enforcing constraints defined for the business process.&nbsp; Rendezvous Daemon-based communication provides message passing similar to message passing using the TCP/IP-based socket programming construct.&nbsp; Rendezvous is a connectionless, transport layer protocol carried by UDP/IP packets. The TIBCO Designer application, the TIBCO Administrator application, and the ActiveMatrix BusinessWorks engine all rely upon software installed by TIBCO Runtime Agent.</p>\r\n<p class=\"Body\">The TOE supports creation of the Business Process, however, the security requirement described in the ST define the protections that are available once the business process has been deployed.</p>\r\n<p>&nbsp;</p>\r\n<hr size=\"1\" />\r\n<p><a href=\"http://taurus.missi.ncsc.mil:88/ccevsdb/projects/details/?project_id=10230&amp;&amp;msg.status=Project%20ID%20%2310230%20updated#_ftnref1\">[1]</a>&nbsp; The method of moving an EAR file depends upon administrative and physical concerns and is outside the scope of this security target.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which TIBCO ActiveMatrix BusinessWorks Release 5.8 TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2, September 2007.&nbsp; The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1, Revision 2, September 2007.&nbsp; Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is EAL2 augmented with ALC_FLR.2 family of assurance requirements.&nbsp; The product, when configured as specified in the TIBCO ActiveMatrix BusinessWorks Installation, TIBCO ActiveMatrix BusinessWorks Getting Started, TIBCO ActiveMatrix BusinessWorks Administration, and TIBCO ActiveMatrix BusinessWorks (5.8), TIBCO Administrator (5.6), and TIBCO Runtime Agent (5.6) Security Features User&rsquo;s Guide satisfies all of the security functional requirements stated in the TIBCO ActiveMatrix BusinessWorks Release 5.8 Security Target, Version 2.0, August 19, 2010.&nbsp; Two Validators on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC.&nbsp; The evaluation was completed in June 2010.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, CCEVS-VR-VID10230-2010, dated 30 July 2010.</p>","environmental_strengths":"<p class=\"Body\">EAL2 was selected as the assurance level because the TOE is a commercial product whose users require a low to moderate degree of independently assured security. The TOE is targeted at a relatively benign environment with good physical access security and competent administrators. Within such environments it is assumed that attackers will have little attack potential. &nbsp;&nbsp;TIBCO ActiveMatrix BusinessWorks Release 5.8 supports the following five security functions:</p>\r\n<p class=\"Body\"><strong>Security</strong><strong> Audit: </strong>The TOE generates audit records for start-up and shutdown of the audit functions, as well as an unspecified level of audit<a href=\"../../assets/js/tinymce/jscripts/tiny_mce/plugins/paste/pasteword.htm#_ftn1\">[1]</a>. The TIBCO Administrator application and ActiveMatrix BusinessWorks engine both generate audit records when security-relevant events occur. Log files are stored in administrator-configured locations in the environment. The TIBCO Administrator application provides the ability to specify a log file name, to specify search conditions (based on date and time of the event, and on type of event), and to view record details. The environment is relied on to provide a reliable time stamp, to protect the audit trail.</p>\r\n<p class=\"Body\"><strong>User Data Protection: </strong>The TIBCO ActiveMatrix BusinessWorks engine enforces security policies that are associated with resources by administrators. When a security policy is attached to a resource, the associated security policy is used for that process&rsquo; corresponding incoming and outgoing messages<a href=\"../../assets/js/tinymce/jscripts/tiny_mce/plugins/paste/pasteword.htm#_ftn2\">[2]</a>. The security policy may define transport characteristics, authentication characteristics, integrity characteristics, confidentiality characteristics, and timeout characteristics. The TOE is permissive by default with respect to message protection which means that in the evaluated configuration, if a security policy is not attached to a resource, no protection is provided.&nbsp; Therefore, in order to enforce the security functions a security policy must always be attached by an administrator to a resource before message transport, authentication, integrity, confidentiality, and timeout characteristics defined in the attached security policy are applied.</p>\r\n<p class=\"Body\"><strong>Identification and Authentication:</strong> The TIBCO Administrator application requires authorized administrators to logon using a username and password before it allows access to its interfaces. Authorized TIBCO administrators are uniquely identified and authenticated and associated with TIBCO administrative roles and TIBCO domains after being successfully authenticated. The ActiveMatrix BusinessWorks engine may, depending on business process activity or resource security policy configuration, require that incoming messages be authenticated to support the protection of messages.</p>\r\n<p class=\"Body\"><strong>Security</strong><strong> Management:</strong> The TIBCO Administrator application component provides command-line utilities and a web-based administrator console interfaces.&nbsp; These interfaces are used to manage TOE functions, including configuring security policies, deploying distributed applications, and administering distributed applications. The TOE provides administrative roles that correspond to permissions for items that display in the Security console component of the TIBCO Administrator application and that a command-line utility may access.</p>\r\n<p class=\"Body\"><strong>Protection of the TSF: </strong>Both the TIBCO Administrator application and ActiveMatrix BusinessWorks engine implement web servers. The web server implemented by the TIBCO Administrator application is used to provide an administrative console interface. The web server implemented by the ActiveMatrix BusinessWorks engine is used to provide a transport to send and receive messages. TOE web server instances are designed to ensure that TOE interfaces cannot be bypassed and to ensure that a security domain is provided for both administrative and calling application sessions. The TOE uses HTTPS<a href=\"../../assets/js/tinymce/jscripts/tiny_mce/plugins/paste/pasteword.htm#_ftn3\">[3]</a> (provided by the Environment) to protect communication with its TIBCO Administrator application GUI.&nbsp; The TOE also uses HTTPS to protect communication between the TIBCO Administrator application and Runtime Agent. TOE application components otherwise rely on the Environment for protection.</p>\r\n<p class=\"Body\">The TOE also utilizes mechanisms that are provided by the cryptomodule, operating system, DBMS and LDAP server to protect various pieces of TOE configuration data.</p>\r\n<p><strong>Cryptographic support provided by the environment: </strong>The TOE does not contain a cryptomodule but it is packaged with one.&nbsp; In the evaluated configuration, the TOE is delivered to customers with Entrust Authority Security Toolkit for Java 7.2. Authorized administrators can also configure the TOE to use third party cryptographic libraries that are compatible with the Java Cryptography Extension (JCE) standard. JCE defines a standardized Java language framework for implementing cryptographic algorithms and operations. The TOE uses the configured crypto module to perform cryptographic operations according to individual security policy settings. The TOE can perform the following types of cryptographic operations on SOAP messages:</p>\r\n<ul>\r\n<li>Certificate-Based Authentication &ndash; the ActiveMatrix BusinessWorks engine is used at the request of the TOE.&nbsp; The engine can verify the signature of a certificate and determine validity of a certificate path.&nbsp;&nbsp; \r\n<ul>\r\n<li>There is an administrator-configured root certificate provided by the environment stored in a file on the machine running the ActiveMatrix BusinessWorks engine and is imported or referenced by business processes.</li>\r\n</ul>\r\n</li>\r\n<li>Message Signing &ndash; the ActiveMatrix BusinessWorks application is used at the request of the TOE to sign, verify, or sign and verify inbound and/or outbound messages \r\n<ul>\r\n<li>There is an RSA (or DSA) certificate with a variable bit key pair (RSA 512 or 1024 , 2048, or 4096-bit key pair) stored encrypted in a file on the machine running the ActiveMatrix BusinessWorks engine; it is provided by the environment and used by the environment cryptographic engine</li>\r\n<li>There is an administrator-configured signing certificate (called the message signing certificate) provided by the environment (PKCS#10 message provided by the environment using the key pair and PKCS#7 certificate provided by the environment) stored in a file on the ActiveMatrix BusinessWorks engine machine</li>\r\n<li>There is support for both SHA-1 and MD5<a href=\"../../assets/js/tinymce/jscripts/tiny_mce/plugins/paste/pasteword.htm#_ftn4\">[4]</a> for creating signature</li>\r\n</ul>\r\n</li>\r\n<li>Message Encrypting &ndash; the ActiveMatrix BusinessWorks engine is used at the request of the TOE to encrypt and decrypt inbound and/or outbound SOAP messages \r\n<ul>\r\n<li>There is an Triple DES 168-bit asymmetric key stored encrypted (using an administrator-provided password turned into a DES key) in a file on the ActiveMatrix BusinessWorks engine machine</li>\r\n<li>There is an AES 128 or 256-bit asymmetric key stored encrypted (using an administrator-provided password turned into a DES key) in a file on the ActiveMatrix BusinessWorks engine machine</li>\r\n</ul>\r\n</li>\r\n</ul>\r\n<p>Only TIBCO administrative users with appropriate administrative permissions can modify the configuration of cryptographic operations on SOAP messages.</p>\r\n<p>Within the Entrust toolkit, there are non-FIPS algorithms that are not used in the evaluated configuration; guidance documentation instructs administrators that only FIPS certified algorithms can be used by the TOE in an evaluated configuration. There is a global setting that configures the minimum strength of the ciphers. If the administrator configures it to be 256, then FIPS mode AES-256 is always used.</p>\r\n<p class=\"Body\">Because JDBC and LDAP communications utilize JRE services for cryptography, the JRE must be configured to use the Entrust toolkit<a href=\"../../assets/js/tinymce/jscripts/tiny_mce/plugins/paste/pasteword.htm#_ftn5\">[5]</a> for communication between the TOE and a DBMS or an LDAP server.</p>\r\n<p>&nbsp;</p>\r\n<hr size=\"1\" />\r\n<p><a href=\"../../assets/js/tinymce/jscripts/tiny_mce/plugins/paste/pasteword.htm#_ftnref1\">[1]</a> &ldquo;Unspecified level of audit&rdquo; refers to the Common Criteria terminology required for proper selection in the FAU_GEN.1audit requirement (see Section 5.2.1.1).&nbsp; The actual set of audited events can be found in Section 5.2.1.</p>\r\n<p><a href=\"../../assets/js/tinymce/jscripts/tiny_mce/plugins/paste/pasteword.htm#_ftnref2\">[2]</a> The term message is used in a generic sense to refer to any distinct communication unit appropriate for the protocol type being used.&nbsp; A message can be a single email, a single data request, a single remote function invocation, a single packet or a single session depending upon the protocol being considered.</p>\r\n<p><a href=\"../../assets/js/tinymce/jscripts/tiny_mce/plugins/paste/pasteword.htm#_ftnref3\">[3]</a> While the product supports several protocols between the TIBCO Administrator application and the ActiveMatrix BusinessWorks engine, only HTTPS can be used by the TOE in the evaluated configuration.</p>\r\n<p><a href=\"../../assets/js/tinymce/jscripts/tiny_mce/plugins/paste/pasteword.htm#_ftnref4\">[4]</a> Administrators only use FIPS certified mechanisms in the evaluated configuration.</p>\r\n<p><a href=\"../../assets/js/tinymce/jscripts/tiny_mce/plugins/paste/pasteword.htm#_ftnref5\">[5]</a> The Security Features Users Guide provides this instruction.</p>","features":[]}