{"product_id":10294,"v_id":10294,"product_name":"IBM DB2 Version 9.5.2 Enterprise Server Edition for Linux, Unix, and Windows","certification_status":"Not Certified","certification_date":"2008-12-18T00:12:00Z","tech_type":"DBMS","vendor_id":{"name":"IBM Corporation","website":"https://www.ibm.com"},"vendor_poc":"Scott Logan","vendor_phone":"905-413-2534","vendor_email":"silogan@ca.ibm.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p style=\"margin: 0in 0in 0pt 0.5in; mso-layout-grid-align: none;\"><span style=\"font-family: arial,helvetica,sans-serif;\"><span style=\"font-size: x-small;\"><span style=\"font-family: times new roman,times;\">DB2 is a relational database management system (RDBMS) provided by IBM. As a RDBMS, DB2 supports the Standard Query Language (SQL) interface from a client that is connected to the database server. From the client, commands can be entered interactively or through an executing program to the database server to create databases, database tables, and to store and retrieve information from tables.&nbsp; </span></span></span></p>\r\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt 0.5in; mso-layout-grid-align: none;\"><span style=\"font-family: arial,helvetica,sans-serif;\"><span style=\"font-size: x-small;\"><span style=\"font-family: times new roman,times;\"><span style=\"font-size: x-small;\">&nbsp;</span></span></span></span></p>\r\n<p style=\"margin: 0in 0in 6pt 0.5in;\"><span style=\"font-family: arial,helvetica,sans-serif;\"><span style=\"font-size: x-small;\"><span style=\"font-family: times new roman,times;\"><span style=\"font-size: x-small;\">DB2 enforces the following security functions: Access Control, Identification and Authentication, Audit, Security Management, and TOE Protection.&nbsp; DB2 supports User Data protection by providing the ability to control access to the database and objects within the database (e.g. views) based upon user and object security attributes. Additionally, DB2 supports User Data protection by restricting the flow of information based upon security labels assigned to users and objects. DB2 requires all users to be identified and authenticated before allowing them access to DB2 resources. Although the product supports a label-based policy, the application is not an MLS application, nor has it been tested in an MLS environment. As such, use of the product should ensure that all users have clearance for all data in the database.</span></span></span></span></p>\r\n<p style=\"margin: 0in 0in 6pt 0.5in;\"><span style=\"font-family: arial,helvetica,sans-serif;\"><span style=\"font-size: x-small;\"><span style=\"font-family: times new roman,times;\"><span style=\"font-size: x-small;\">DB2 relies upon the IT Environment to authenticate users before access to DB2 is allowed (e.g. DSAP, Kerberos); to provide a reliable time source; and to provide cryptographic services to support SSL as provided by the IBM GSKIT component.&nbsp; </span></span></span></span></p>\r\n<p style=\"margin: 0in 0in 6pt 0.5in;\"><span style=\"font-family: arial,helvetica,sans-serif;\"><span style=\"font-size: x-small;\"><span style=\"font-family: times new roman,times;\"><span style=\"font-size: x-small;\">The IT Environment performs the actual authentication and association of users with groups and passes the result to DB2.&nbsp; DB2 audits security relevant events such as access to database resources, changing of security attributes, and modification of security attributes.&nbsp;&nbsp; Management of the DB2 TOE, including the ability to select and review audit records, is restricted to authorized administrators based on authorities. Management of DB2 objects is restricted to those users that are assigned the appropriate privileges to do so. DB2 is designed so that each of its interfaces performs the necessary access checks before allowing access to DB2 resources. </span></span></span></span></p>\r\n<p style=\"margin: 0in 0in 6pt 0.5in;\"><span style=\"font-family: arial,helvetica,sans-serif;\"><span style=\"font-size: x-small;\"><span style=\"font-family: times new roman,times;\"><span style=\"font-size: x-small;\">It is assumed the product is being used in an environment that provides physical protection for all database servers and authentication servers.</span></span></span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt 0.5in;\"><span style=\"font-family: arial,helvetica,sans-serif;\"><span style=\"font-size: x-small;\"><span style=\"font-family: times new roman,times;\"><span style=\"font-size: x-small;\">&nbsp;</span></span></span></span></p>\r\n<p style=\"margin: 0in 0in 0pt 0.5in;\"><span style=\"font-family: arial,helvetica,sans-serif;\"><span style=\"font-size: x-small;\"><span style=\"font-family: times new roman,times;\"><span style=\"font-size: x-small;\">There are several IBM DB2 product versions included in the evaluated configuration and the differences have no affect on the security functions claimed in the Security Target. The various DB2 editions differ primarily in the number of resources (e.g., users) they support and are identical in terms of their security architecture and behavior.</span></span></span></span></p>","evaluation_configuration":"<p class=\"Body\" style=\"margin: 0in 0in 6pt 0.5in;\"><span style=\"font-size: x-small; font-family: Times;\">IBM DB2 Enterprise Server Edition Version 9.5.2 (also known as V9.5 Fix Pack 2) for Linux, Unix, and Windows</span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">Henceforth, the above components are referred to as the TOE<em>.</em></span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small; font-family: Times;\">The TOE is a Relational Database Management System (RDBMS) developed by IBM Canada, Ltd., 3600 Steeles Avenue East, Markham, Ontario L3R 9Z7, Canada and sold by IBM Corporation, Route 100, Somers, NY, USA 10589.</span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt;\"><span style=\"font-size: x-small; font-family: Times;\">In the evaluation configuration, the TOE can be installed upon </span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in; mso-list: l0 level1 lfo1; tab-stops: list .5in;\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&middot;</span><span style=\"font: 7pt &quot;Times New Roman&quot;;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style=\"font-size: x-small; font-family: Times;\">AIX 6</span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in; mso-list: l0 level1 lfo1; tab-stops: list .5in;\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: FR;\" lang=\"FR\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&middot;</span><span style=\"font: 7pt &quot;Times New Roman&quot;;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style=\"mso-ansi-language: FR;\" lang=\"FR\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">SuSE Linux Enterprise Server v10</span></span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in; mso-list: l0 level1 lfo1; tab-stops: list .5in;\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-ansi-language: FR;\" lang=\"FR\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&middot;</span><span style=\"font: 7pt &quot;Times New Roman&quot;;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style=\"mso-ansi-language: FR;\" lang=\"FR\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times;\">RedHat Linux (RHEL 5)</span></span></span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in; mso-list: l0 level1 lfo1; tab-stops: list .5in;\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&middot;</span><span style=\"font: 7pt &quot;Times New Roman&quot;;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style=\"font-size: x-small; font-family: Times;\">Windows Server 2003 with SP 1</span></p>\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt 0.5in; text-indent: -0.25in; mso-list: l0 level1 lfo1; tab-stops: list .5in;\"><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\"><span style=\"font-size: x-small;\">&middot;</span><span style=\"font: 7pt &quot;Times New Roman&quot;;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span><span style=\"font-size: x-small; font-family: Times;\">Solaris 10</span></p>\r\n<p class=\"Default\" style=\"margin: 0in 0in 0pt;\"><strong><span style=\"font-size: 10pt;\"><span style=\"font-family: Times New Roman;\">&nbsp;</span></span></strong></p>","security_evaluation_summary":"<p><span style=\"font-family: andale mono,times;\">\r\n<p class=\"Body\" style=\"margin: 0in 0in 6pt 0.5in;\"><span style=\"font-family: times new roman,times;\"><span style=\"font-size: x-small;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The evaluation demonstrated that<em> </em><span style=\"mso-bidi-font-style: italic;\">IBM DB2</span> meets the security requirements contained in the &ldquo;IBM DB2 Version 9.5.2 Enterprise Server Edition for Linux, Unix, and Windows Security Target&rdquo;.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The criteria against which IBM DB2 was judged are described in the Common Criteria for Information Technology Security Evaluation Version 2.3 <span style=\"layout-grid-mode: line;\">and the </span>International Interpretations effective as of January, 2006.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation Version 2.3 and Part 2: Evaluation Methodology, Supplement: ALC_FLR - Flaw Remediation, Version 1.1, February 2002, <span style=\"layout-grid-mode: line;\">CEM-2001/0015R</span>.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Science Application International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the IBM DB2 TOE is EAL 4 augmented with ALC_FLR.1.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE, configured as specified in the installation guide, satisfies all of the security functional requirements stated in the Security Target.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Validators on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation was completed in November 2008.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report<em> for </em>IBM DB2<em> </em>prepared by CCEVS.</span></span></p>\r\n</span></p>","environmental_strengths":"<p class=\"MsoNormal\" style=\"margin: 0in 0in 0pt 0.5in;\"><span style=\"font-size: x-small;\"><span style=\"font-family: Times New Roman;\"><span style=\"mso-bidi-font-style: italic;\">IBM DB2 </span>is a commercial network product that provides <span style=\"mso-bidi-font-weight: bold;\">identification and authentication, user data protection, audit, security management, and TOE protection. </span><span style=\"mso-spacerun: yes;\">&nbsp;</span>IBM DB2 provides a level of protection that is appropriate for IT environments that require that access is controlled to the database and its contents where the IBM TOE is appropriately protected from physical attacks.<span style=\"mso-bidi-font-weight: bold;\"> </span></span></span></p>","features":[]}