{"product_id":10385,"v_id":10385,"product_name":"Teradata Database 13.0","certification_status":"Not Certified","certification_date":"2011-03-29T00:03:00Z","tech_type":"DBMS","vendor_id":{"name":"Teradata Corporation","website":"www.teradata.com"},"vendor_poc":"Matthew Zenus","vendor_phone":"858-485-3058","vendor_email":"matthew.zenus@teradata.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p>The Teradata Database is a relational database management system (RDBMS) that is designed to access, store, and operate on data using Teradata Structured Query Language (Teradata SQL), which is compatible to ANSI SQL with extensions.&nbsp; The database was developed to allow users to view and manage large amounts of data as a collection of related tables.&nbsp; The database executes as a trusted parallel application (TPA) on a symmetric multiprocessing (SMP) or massively parallel processing (MPP) database server.</p>","evaluation_configuration":"<ul>\r\n<li>user management - including identification and      authentication </li>\r\n<li>password management controls </li>\r\n<li>discretionary access control model to enforce      access controls  on database objects and resources (e.g., databases, users,      tables,  views, triggers, macros, stored procedures, external procedures,       functions, types, GLOP objects, replication groups, authorization  objects,      access roles and profiles) </li>\r\n<li>set of access rights for the enforcement of&nbsp; privileges </li>\r\n<li>security roles for management of access rights </li>\r\n<li>configurable auditing facility </li>\r\n</ul>\r\n<ul>\r\n<li>protection of all of the database-related files      and directories (including executables and run-time libraries) from      unauthorized access </li>\r\n<li>authentication and authorization of administrator      access to database control utilities and other utilities used to manage      system resources and I/O interfaces </li>\r\n<li>isolation of the TOE Security Functions (TSF) to      prevent tampering with TSF components (e.g., the TOE processes managing      the database) </li>\r\n<li>network perimeter controls to restrict network      access to the database server to mitigate malicious attacks against the      operating system upon which the TOE operates. </li>\r\n</ul>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme.&nbsp; The criteria against which the Teradata Database TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 R3.&nbsp; The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 R3.&nbsp; Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is EAL 4 augmented with ALC_FLR.3.&nbsp; The product, when delivered preconfigured as identified in the Teradata Database Security Administration, Appendix B, B035-1100-098A, November 2009, satisfies all of the security functional requirements stated in the Teradata Database 13.0 Security Target (Version 1.4).&nbsp; Validators on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC and the previous project version underwent three Validation Oversight Panel (VOR) reviews.&nbsp; The evaluation of V13.0 was completed in February 2011.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, (report number CCEVS-VR-10385-2009, dated 29 March 2011) prepared by CCEVS.</p>","environmental_strengths":"<p>The logical boundaries of Teradata Database can be characterized as the set of security functions available at its interfaces.&nbsp; Each of these security functions is summarized below.</p>\r\n<p><strong>Security Audit: </strong></p>\r\n<p>The Teradata Database automatically audits all successful and failed user logon attempts in the event log.&nbsp; An authorized administrative user may search and sort logon/logoff records using SQL statements to query a defined system view.&nbsp; Additionally, an authorized administrative user may control the monitoring of access rights checks performed by Teradata Database and may search and sort access log records using SQL statements to query a defined system view.</p>\r\n<p><strong>User Data Protection: </strong></p>\r\n<p>The Teradata Database enforces a Discretionary Access Control (DAC) policy for object access based on user identities, object ownership, and active roles.&nbsp; All access to database objects subject to the DAC policy is controlled using access rights.&nbsp; The Teradata Database supports three types of access rights.&nbsp; Implicit rights (ownership rights) are implicitly granted to the immediate owner of a database or database object.&nbsp; Automatic rights are granted automatically by the system to the creator of a database, user, or object, and to a newly created user or database.&nbsp; Explicit rights are granted by any user having the WITH GRANT OPTION privilege for that right.&nbsp; The database ensures that the requestor has the appropriate access rights before access to a database object is allowed.</p>\r\n<p>Upon initial installation of the Teradata Database, it has only one user.&nbsp; This user is called user DBC and will own all other databases and users in the system.&nbsp; User DBC also has access rights on all objects within the database with the exception of CREATE PROCEDURE and EXECUTE PROCEDURE.&nbsp; Typically, administrative users are created under user DBC and are granted access rights for creating and managing all other users, databases, and objects.</p>\r\n<p><strong>Identification and Authentication:</strong></p>\r\n<p>The Teradata Database provides user identification and authentication through the use of user accounts and the enforcement of password policies.&nbsp; Users must provide a valid username and password before they can access any database objects or resources.&nbsp; Once identified and authenticated, all subsequent actions allowed within that user's session are based on the user&rsquo;s identity, access rights, and active roles.</p>\r\n<p><strong>TOE Access:</strong> &nbsp;</p>\r\n<p>The Teradata Database allows authorized administrative users to restrict access to the database based on user identities.</p>\r\n<p><strong>Security management: </strong></p>\r\n<p>The Teradata Database provides security management functions that enable authorized administrative users to manage the secure operation of the database.&nbsp; These functions include management of users, user security attributes, access rights, security roles, and the audit facilities.</p>\r\n<p><strong>Resource Utilization</strong>:</p>\r\n<p>The Teradata Database enforces maximum quotas and limits on various resources to ensure that those resources are protected from monopolization by any individual database user.&nbsp; Specifically, an authorized administrator can configure the database to enforce limits on permanent database space allocation, temporary database space usage, and spool database space usage.</p>","features":[]}