{"product_id":10256,"v_id":10256,"product_name":"DbProtect AppDetective 2009.1 R2","certification_status":"Not Certified","certification_date":"2012-06-04T00:06:00Z","tech_type":"Miscellaneous","vendor_id":{"name":"Application Security, Inc.","website":"http://www.appsecinc.com"},"vendor_poc":"Anirban Chowdhuri","vendor_phone":"212-912-4126","vendor_email":"anirban@appsecinc.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p class=\"Body\">The Target of Evaluation (TOE) is DbProtect AppDetective 2009.1 R2, hereinafter referred to as DbProtect AppDetective, as configured in accordance with the supplied guidance documentation.</p>\r\n<p class=\"Body\">DbProtect AppDetective consists of the DbProtect Console (a web-based graphical user interface that provides the management capabilities) and one or more database scanning engines (the Scan Engine). Each of these components is an application designed to run in the context of a commercial operating system. Supported operating systems are: Microsoft Windows Server 2003 and 2008 Enterprise Edition, and Microsoft Windows Server 2003 and 2008 Enterprise x64, each with the latest patches. DbProtect AppDetective utilizes a library of known vulnerabilities and misconfiguration signatures. DbProtect AppDetective includes modules for the following database applications:</p>\r\n<ul>\r\n<li>Oracle 11g, Oracle 10g , Oracle9i, and Oracle8i (note that while Oracle 8 and Oracle 7 are also supported, Audit-type tests do not work for those versions)</li>\r\n<li>Oracle Application Server 9i and 9i Release 2</li>\r\n<li>Microsoft SQL Server Versions 6.x, 7.0, 2000, 2005, 2005 Express Edition, 2008 and MSDE versions 1.0&nbsp; and 2000 SP4</li>\r\n<li>Lotus Domino v4.5 through 7.0</li>\r\n<li>Sybase ASE 11.0, 11.5, 11.9.2, 12.0, 12.5, 15</li>\r\n<li>IBM DB2 Versions 6.1, 7.1, &nbsp;8.1 and 8.2</li>\r\n<li>IBM DB2 zSeries Versions 7 and 8</li>\r\n<li>MySQL 3.20, 3.21, 3.22, 3.23, 4.0, 4.1, and 5.0.</li>\r\n</ul>\r\n<p class=\"Body\">Note, in order to perform audit-type tests on some database applications, the administrator needs to ensure the following components are installed and accessible in the operational environment:</p>\r\n<ul>\r\n<li>IBM DB2 Server audits require the IBM DB2 runtime client</li>\r\n<li>IBM DB2 for Mainframe audits require IBM DB2 Connect</li>\r\n<li>Lotus Domino audits require the Lotus Notes client driver</li>\r\n<li>Sybase ASE audits require the Sybase ASE ODBC driver.</li>\r\n</ul>\r\n<p>DbProtect AppDetective performs the following operations:</p>\r\n<ul>\r\n<li>Discovery&mdash;Systematically searches the      network, inventorying applications and relevant application components by      vendor and release.&nbsp;&nbsp; </li>\r\n<li>Penetration Test (Pen Test)&mdash;Applies a      series of detailed security tests. DbProtect AppDetective Pen Tests      identify how an intruder or unauthorized user might gain access to      application components. Pen Tests use various mechanisms to simulate how      an intruder could exploit vulnerabilities to break into applications from      the outside without possessing any authentication credentials.</li>\r\n<li>Audit-type Test&mdash;Connects to the target      database application and its underlying operating system to perform an      assessment of its configuration, determining susceptibility to internal      misuse. DbProtect AppDetective Audit-type tests require a valid user      account on the target application in order to verify internal      configuration settings.</li>\r\n<li>Reporting&mdash;provides a reporting      capability that enables the administrator to generate and view various      types of report that document the results of a Pen Test or Audit-type Test,      identifying potential vulnerabilities, an assessment of the risk      associated with a vulnerability, and recommending actions to address a      vulnerability.</li>\r\n</ul>\r\n<p>DbProtect AppDetective includes a number of built-in Audit-type Test and Pen Test Policies that represent useful collections of checks to be performed against targeted database applications. It should be noted the evaluation has not assessed the efficacy of any specific built-in policy or its compliance with any regulatory requirements implied by the policy. Rather, the evaluation has assessed the ability of DbProtect AppDetective to perform specific types of checks that can detect particular types of vulnerability to which a targeted database may be susceptible. However, the evaluation did not analyze the signatures, templates, and other mechanisms used in the Penetration Test and Audit operations for suitability to task or completeness.</p>\r\n<p>The product includes a number of tools that are executed directly from the underlying operating system rather than from the Console, including Configuration Manager, DbProtect Migration, ASAP Updater, and Policy Editor. Access to these tools from the host cannot be controlled or monitored by the TOE and as such they are excluded from the scope of evaluation (and hence are not part of the TOE). Configuration Manager provides a means for modifying various configuration parameters on the Console&rsquo;s host machine. DbProtect Migration provides a means to migrate data from AppDetective Pro (a separately evaluated product from Application Security, Inc.) to DbProtect AppDetective. ASAP Updater upgrades product components to the most current version, and as such cannot be used with the evaluated version of the TOE. Policy Editor provides an interface for managing policies that define the checks to be performed by Audit-type Test and Pen Test jobs.</p>\r\n<p>It should be noted the evaluated TOE is not the current version of this product and must be specially ordered from the vendor.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p class=\"Body\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process. The criteria against which the DbProtect AppDetective 2009.1 R2 TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 3.&nbsp; The evaluation methodology used by the Evaluation Team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1, Revision 3.&nbsp; Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is the EAL2 family of assurance requirements, augmented with ALC_FLR.2 (Flaw reporting procedures).&nbsp; The product satisfies all of the security functional requirements stated in the DbProtect AppDetective 2009.1 R2 Security Target, when configured as specified in the supplied guidance documentation.</p>\r\n<p class=\"Body\">A validation team on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC.&nbsp; The evaluation was completed in April 2012.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID10256-2012), prepared by CCEVS.</p>","environmental_strengths":"<p class=\"Body\">DbProtect AppDetective 2009.1 R2 provides a low to moderate level of independently assured security in a conventional TOE and is suitable for a cooperative non-hostile environment with good physical access security and competent administrators.</p>\r\n<p class=\"Body\">DbProtect AppDetective 2009.1 R2 supports the following security functions:</p>\r\n<ul>\r\n<li><strong>Database Discovery and Scanning</strong></li>\r\n</ul>\r\n<p class=\"Body\">DbProtect AppDetective can discover database applications within the network infrastructure and assess them for potential vulnerabilities. Without requiring any agents on the target systems, DbProtect AppDetective can perform audit-type tests and simulate attacks against discovered and targeted applications to uncover security vulnerabilities and misconfiguration, and report the results to the authorized administrator.</p>\r\n<ul>\r\n<li><strong>Security Audit</strong></li>\r\n</ul>\r\n<p class=\"Body\">DbProtect AppDetective has the ability to generate audit records for the TOE security-relevant events, including management of security policies and launching of Discovery, Audit-type Test and Pen Test scans. The TOE records within each audit record at least the following information: Date, Time, Event Type, Success or Failure, User ID of the user. The TOE relies on the IT environment to protect and store the audit records, provide the ability to review the audit records, and to provide a reliable timestamp.</p>\r\n<ul>\r\n<li><strong>Identification and Authentication</strong></li>\r\n</ul>\r\n<p class=\"Body\">The Console component maintains four different roles (super user, admin user, basic user and view user). The Console requires each user to provide a username and password before accessing any Console security functions. The Console will pass the provided username and password to the underlying operating system and will deny the user session if the operating system does not indicate successful authentication of the username.</p>\r\n<ul>\r\n<li><strong>Security Management</strong></li>\r\n</ul>\r\n<p class=\"Body\">The Console implements role-based security management to control user access to the management functions. The Console partitions access in two ways: by Organization and by role. Organizations are created by super users. The admin user defines the users, policy access rights, and data partitioning within each Organization. The main principle is to restrict data stored, collected, and associated with an Organization to users in that Organization. This applies to all jobs, reports, and discovery results. Organizations are hierarchically organized, which affects the visibility of one Organization to another. The admin users can create new Organizations or delete Organizations within the Organization to which they have access. However, they are restricted from creating or deleting Organizations above the Organization to which they have access.</p>","features":[]}