{"product_id":10234,"v_id":10234,"product_name":"Sybase Adaptive Server Enterprise 15.0.1","certification_status":"Not Certified","certification_date":"2007-09-21T00:09:00Z","tech_type":"DBMS","vendor_id":{"name":"Sybase, Inc.","website":"www.sybase.com"},"vendor_poc":"Jennifer Johnson","vendor_phone":"925-236-5000","vendor_email":"jjohnso@sybase.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\">Adaptive Server Enterprise is a relational database management system (RDBMS) server that operates in the context of a commercial operating system, providing services to local and remote clients via the Tabular Data Stream (TDS) protocol. <o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\">ASE version 15.0.1 is a revised version of the previously evaluated ASE Version 12.5.2. Among a number of non-security relevant feature additions and modifications (such as partitioned databases on a given server and a new query processing engine), ASE version 15.0.1 includes resource governor enhancements and the ability to encrypt database columns.<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\">The ASE Server runs as an application on top of an operating system and depends on the services exported by the operating system to function. ASE uses operating system services for process creation and manipulation; device and file processing; shared memory creation and manipulation; and security requests such as inter-process communication. The hardware upon which the operating system runs is completely transparent to ASE - ASE sees only the operating system&rsquo;s user interfaces. <o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\">The ASE Server is one or more operating system processes that service client requests. </span><span style=\"font-size: 10pt;\">Although not tested by the evaluation lab, m</span><span style=\"font-size: 10pt; font-family: Times;\">ultiple processes can be configured to enhance performance on multiprocessor systems. An ASE process has two distinct components, a DBMS component and a kernel component. The DBMS component manages the processing of SQL statements (data manipulation language - DML, data definition language - DDL, stored procedures and administrative commands), accesses data in a database, and manages different types of Server resources. The kernel component performs low-level functions for the DBMS component, such as task and engine management; network and disk I/O; and low-level memory management. Note that the TDS engine, that part of ASE that processes a TDS request, also uses the kernel component for low-level services.<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\">All of the ASE processes attach to one or more shared memory segments. The shared memory contains data structures that relate to task management and operating system services, caches of database buffers, object descriptors, and other resources </span><span style=\"font-size: 10pt;\">(e.g., other caches, queues, and stream I/O buffers)</span> <span style=\"font-size: 10pt; font-family: Times;\">required to manage and process database commands.<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\">Each client is associated with its own ASE task. In addition, there are several system tasks that perform specific services (e.g., tasks to write buffers to disk, tasks to write audit data to disk, and tasks to communicate with the network.)<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\">The set of operating systems included in the evaluation Microsoft Windows 2000 (SP4) for x86, Microsoft Windows Server 2003 for x86, Sun Solaris Version 8 for sparc (32- and 64-bit), Sun Solaris Version 9 for sparc (32- and 64-bit), Sun Solaris Version 10 for sparc (32- and 64-bit), IBM AIX 5L Version 5.2 (64-bit), Hewlett-Packard HP-UX 11i v1 for PA-risc (64-bit), Hewlett-Packard HP-UX 11i v2 for PA-risc (64-bit), Red Hat Enterprise Linux 3.0 for x86and Red Hat Enterprise Linux 4.0 for x86.<o:p></o:p></span></p>","evaluation_configuration":null,"security_evaluation_summary":"<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Sybase Adaptive Server Enterprise TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 2.3 and International Interpretations effective on </span><st1:date year=\"2007\" day=\"25\" month=\"1\"><span style=\"font-size: 10pt; font-family: Times;\">January 25, 2007</span></st1:date><span style=\"font-size: 10pt; font-family: Times;\">.<span style=\"\">  </span>The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 1.0.<span style=\"\">  </span>Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is EAL 4 augmented with ALC_</span><st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\">FLR</span></st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\">.2.<span style=\"\">  </span>The product, when configured as identified in the Supplement for Installing Adaptive Server for Common Criteria Configuration, Document ID: DC00080-01-1501-01, Last revised: April 2007, satisfies all of the security functional requirements stated in the Sybase Adaptive Server Enterprise 15.0.1 Security Target (Version 1.0). One Validator on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC and the project underwent two Validation Oversight Panel (VOR) panel reviews.<span style=\"\">  </span>The evaluation was completed in September 2007.<span style=\"\">  </span>Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, (report number CCEVS-VR-VID10234-2007, dated </span><st1:date month=\"9\" day=\"21\" year=\"2007\"><span style=\"font-size: 10pt; font-family: Times;\">21 September  2007</span></st1:date><span style=\"font-size: 10pt; font-family: Times;\">) prepared by CCEVS.<o:p></o:p></span></p>","environmental_strengths":"<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\">Adaptive Server Enterprise is a DBMS designed to execute as a set of applications in the context of commercially available operating systems. ASE supports eight security functions:<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><strong style=\"\"><span style=\"font-size: 10pt; font-family: Times;\">Security audit</span></strong><span style=\"font-size: 10pt; font-family: Times;\">: </span><st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\">ASE</span></st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\"> has an audit mechanism that is invoked for access checks, authentication attempts, administrator functions, and at other times during its operation. When invoked, the date, time, responsible individual and other details describing the event are recorded to the audit trail. The Audit log is stored as tables within </span><st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\">ASE</span></st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\"> itself so that audit records can be protected from unauthorized access or modification. Furthermore, the SQL select command provided by </span><st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\">ASE</span></st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\"> can be used by System Security Officers to effectively review the audit trail, including searching and sorting by user identities and other audit record attributes.<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><strong style=\"\"><span style=\"font-size: 10pt; font-family: Times;\">Cryptographic Support: </span></strong><span style=\"font-size: 10pt; font-family: Times;\">ASE supports the ability to encrypt data at the column level. Encryption of only the sensitive data minimizes processing overhead as compared to encrypting an entire database. SQL statements are available to create applicable encryption keys and specify columns for encryption. ASE handles key generation and storage and also provides System Security Officers the ability to destroy keys that are no longer needed. Encryption and decryption of data occurs automatically and transparently as data is written to and read from encrypted columns. No client application changes are required.<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><strong style=\"\"><span style=\"font-size: 10pt; font-family: Times;\">User data protection:</span></strong><span style=\"font-size: 10pt; font-family: Times;\"> ASE implements a Discretionary Access Control Policy over applicable database objects - databases, tables, views, and stored procedures. Note that there are other database objects that are either always private, always public, or are part of one of the afore-mentioned objects. In each case, the objects each have an owner which is initially the creator of the object. Object owners have special permissions, while other users can subsequently be granted specific access permissions based on user identity, group memberships and active roles allowing applicable operations on objects.<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\">ASE also implements a Policy-based Access Control Policy over the content of database tables. This policy controls access based on Application Contexts of the current subject in conjunction with Access Rules associated with columns in database tables. This policy effectively allows access to be controlled on very specific and widely varying information about users.<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><strong style=\"\"><span style=\"font-size: 10pt; font-family: Times;\">Identification and authentication:</span></strong><span style=\"font-size: 10pt; font-family: Times;\"> ASE provides its own identification and authentication mechanism in addition to the underlying operating system. Users must provide a valid username and password before they can access any security-related functions. Once identified and authenticated, all subsequent actions are associated with that user and policy decisions are based on the users identity, group memberships and active roles.<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><strong style=\"\"><span style=\"font-size: 10pt; font-family: Times;\">Security management:</span></strong><span style=\"font-size: 10pt; font-family: Times;\"> ASE provides functions necessary to manage users and associated privileges, access permissions, and other security functions such as audit. The functions are restricted based on Discretionary Access Control Policy rules including role restrictions. While all of the administrative functions are available through and restricted at the TDS ASE Server interface, an application (isql) is provided to support ASE administrators.<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\">ASE</span></st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\"> defines a number of system-defined roles - System Administrator (SA), System Security Officer (SSO), Operator, etc.. Otherwise, there are users of the TOE of which the Database Owner (DBO) has special rights with regard to their own database. However, of these roles, only the SA and SSO have any special rights with respect to the security functions claimed in this evaluation. While it seems the DBO has special rights, their rights are all based on access permissions associated with the database they own<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><strong style=\"\"><span style=\"font-size: 10pt; font-family: Times;\">Protection of the TSF:</span></strong><span style=\"font-size: 10pt; font-family: Times;\"> ASE protects itself and ensures that its policies are enforced in a number of ways. While there is dependence on the underlying operating system to separate its process constructs, enforce file and memory access restrictions, and to provide communication services, ASE protects itself by keeping</span> <span style=\"font-size: 10pt; font-family: Times;\">its context separate from that of its users and also by making effective use of the operating system mechanisms to ensure that memory and files used by ASE have the appropriate access settings. Furthermore, ASE interacts with users through well-defined interfaces designed to ensure that the ASE security policies are always enforced.<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><strong style=\"\"><span style=\"font-size: 10pt; font-family: Times;\">Resource utilization:</span></strong><span style=\"font-size: 10pt; font-family: Times;\"> ASE provides resource limits to help System Administrators prevent queries and transactions from monopolizing server resources. Specifically, System Administrators can configure ASE to prevent queries and transactions that: exceed estimated or actual I/O costs, return too many rows, exceed the temporary database space allocated, and/or exceed a specified elapsed time. When a System Administrator configures a resource limit, all current users are immediately subject to the new limits unless resource limits are not enabled. If resource limits are not enabled, the System Administrator is notified that the configured limits would become effective when resource limits are enabled for the server.<o:p></o:p></span></p>\r\n<p class=\"MsoNormal\"><span style=\"font-size: 10pt; font-family: Times;\"><o:p> </o:p></span></p>\r\n<p class=\"MsoNormal\"><strong style=\"\"><span style=\"font-size: 10pt; font-family: Times;\">TOE access:</span></strong><span style=\"font-size: 10pt; font-family: Times;\"> </span><st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\">ASE</span></st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\"> allows System Security Officers to construct login triggers that can be used to restrict logins to a specific number of sessions as well as to restrict access based on time. </span><st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\">ASE</span></st1:stockticker><span style=\"font-size: 10pt; font-family: Times;\"> also allows System Security Officers to restrict access based on user identities. <o:p></o:p></span></p>","features":[]}