{"product_id":10445,"v_id":10445,"product_name":"IBM WebSphere Application Server for z/OS V7","certification_status":"Not Certified","certification_date":"2012-05-25T00:05:00Z","tech_type":"Web Server","vendor_id":{"name":"IBM Corporation","website":"https://www.ibm.com"},"vendor_poc":"Carlton Mason","vendor_phone":"512-286-7429","vendor_email":"ckmason@us.ibm.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p>&nbsp;The TOE is IBM&rsquo;s implementation of an application server:</p>\r\n<ul>\r\n<li>WebSphere Application Server for z/OS V7 Service level 7.0.0.19 with APAR PM55522 </li>\r\n</ul>\r\n<p>The TOE&rsquo;s primary purpose is to provide an environment for running and managing user-supplied enterprise applications and their components.&nbsp; In particular, the product provides the capabilities to identify users and to control what resources a user can access through enterprise applications. In addition to its primary purpose, the product provides tools for doing useful functions such as assembling and troubleshooting enterprise applications.</p>\r\n<p class=\"BodyChar\">The WebSphere Application Server TOE Components are the Product Application Server, wsadmin tool, Product Deployment Manager Server, and Product Node Agent Server.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The evaluation demonstrated that the WebSphere Application Server TOE<em> </em>meets the security requirements contained in the Security Target.&nbsp; The criteria against which the WebSphere Application Server TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1.&nbsp; Science Application International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the WebSphere Application Server TOE is EAL 4 augmented with ALC_FLR.2.&nbsp; The TOE, configured as specified in the installation guide, satisfies all of the security functional requirements stated in the Security Target.&nbsp; Several validators on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC.&nbsp; The evaluation was completed in May 2012.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report<em> </em>for<em> </em>WebSphere Application Server for z/OS V7 Service level 7.0.0.19 with APAR PM55522 prepared by CCEVS.</p>","environmental_strengths":"<p>The<strong> </strong>WebSphere Application Server TOE is a commercial product that provides identification, access control, Audit, and the management of access control to protective resources. The WebSphere Application Server TOE provides a level of protection that is appropriate for operating environments where the WebSphere Application Server TOE and the platform upon which is installed can be appropriately protected from physical attacks.</p>\r\n<p>The WebSphere Application Server TOE supports the following security functions: Identification, Access Control, Security Management, and Audit.</p>\r\n<p class=\"Body\"><strong>Identification and Re-identification</strong></p>\r\n<p>The TOE identifies a client before performing any other TSF mediated action for the client with the exception of access to a method or static web content that is not configured with a security constraint or specifically allows access to &ldquo;Everyone&rdquo;. The environment is depended upon to authenticate and maintain security attributes associated with users.&nbsp;</p>\r\n<p>&nbsp;</p>\r\n<p><strong>Access Control</strong></p>\r\n<p>The TOE provides access control functions that allow only authorized remote callers to access to the sensitive resources. The TOE permits a client to access a protected resource only if a user or group ID of the user is mapped to a role that has permission to access the resource. The resources protected by the TOE are:</p>\r\n<p>&nbsp;</p>\r\n<ul>\r\n<li>Methods in deployed enterprise beans</li>\r\n<li>Methods and HTML pages in deployed web server applications</li>\r\n<li>The Administration Service</li>\r\n<li>Naming Directory</li>\r\n<li>TOE files</li>\r\n<li>Configuration data</li>\r\n<li>TOE runtime state</li>\r\n<li>Transactions and activities</li>\r\n<li>Messaging resources (e.g. local bus, queue destinations)</li>\r\n<li>UDDI resources</li>\r\n<li>Methods and attributes in user MBeans</li>\r\n</ul>\r\n<p>&nbsp;</p>\r\n<p><strong>Security Management</strong></p>\r\n<p class=\"Body\">The TOE maintains the following Administration roles:</p>\r\n<ul>\r\n<li>Administrator</li>\r\n<li>Configurator</li>\r\n<li>Monitor</li>\r\n<li>Operator</li>\r\n<li>Deployer</li>\r\n<li>AdminSecurityManager</li>\r\n<li>Auditor </li>\r\n</ul>\r\n<p class=\"Body\">These roles may use the security management functions that provide a mechanism for dynamically configuring some security attributes used by TOE access control functions.</p>\r\n<p class=\"Body\">The TOE maintains other roles as follows:</p>\r\n<ul>\r\n<li><em>Naming roles</em>: COSNamingCreate, COSNamingDelete, COSNamingRead, COSNamingWrite (these roles can manage the TOE naming directory).</li>\r\n<li><em>UDDI Roles</em>: SOAP_Publish_User, V3SOAP_CustodyTransfer_User_Role, V3SOAP_Publish_User_Role, V3SOAP_Security_User_Role, EJB_Publish_Role (these roles can manage the Protected UDDI registry resources)</li>\r\n<li><em>Messaging Roles</em>: Browser, Bus Connector, Creator, Receiver, Sender (these roles can manage various messaging objects such as Queue and Temporary Destinations, Topics, and TopicSpace)</li>\r\n</ul>\r\n<p>&nbsp;</p>\r\n<p class=\"Body\"><strong>Security Audit</strong></p>\r\n<p>The TOE provides audit functions that provide authorized administrators to associate users with security relevant actions for identification, access control and for enabling and disabling the audit function.&nbsp; The TOE relies on the operational environment for audit record storage.</p>","features":[]}