{"product_id":11021,"v_id":11021,"product_name":"Pulse Connect Secure v9.1","certification_status":"Certified","certification_date":"2020-03-30T00:00:00Z","tech_type":"Network Device","vendor_id":{"name":"Pulse Secure LLC","website":"www.pulsesecure.net"},"vendor_poc":"Sashidhar Annaluru","vendor_phone":"8448078573","vendor_email":"certifications@pulsesecure.net","assigned_lab":{"cctl_name":"Acumen Security"},"product_description":"<p style=\"margin-bottom: .0001pt;\">The TOE is an infrastructure network device that provides secure remote management, auditing, and updating capabilities. The TOE provides secure remote management using an HTTPS/TLS web interface. The TOE generates audit logs and transmits the audit logs to a remote syslog server over a mutually authenticated TLS channel. The TOE verifies the authenticity of software updates by verifying the digital signature prior to installing any update.</p>","evaluation_configuration":"<p style=\"margin-bottom: .0001pt;\">The TOE consists of the following hardware: PSA 300, PSA 3000,<span style=\"mso-spacerun: yes;\">&nbsp; </span>PSA 5000,<span style=\"mso-spacerun: yes;\">&nbsp; </span>PSA 7000C, and PSA 7000F; Running:<span style=\"mso-spacerun: yes;\">&nbsp; </span>Pulse Connect Secure (PCS) v9.1.</p>\r\n<p style=\"margin-bottom: .0001pt;\">The TOE can also be a virtual appliance on VMware ESXi 6.0, with a Dell PowerEdge R430R530 as the hardware platform. ESXi is a bare-metal hypervisor so there is no underlying operation system. In the evaluated configuration, there are no guest VMs on the physical platform providing non-network device functionality.</p>","security_evaluation_summary":"<p><span style=\"font-size: 11.0pt; line-height: 106%; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Pulse Connect Secure v9.1 was evaluated are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 5.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 5.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Acumen Security determined that the evaluation assurance level (EAL) for the product is EAL 1.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The product, when delivered configured as identified in the administrative guidance, satisfies all security functional requirements stated in the Pulse Connect Secure v9.1 Security Target. The project underwent CCEVS Validator review.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation was completed in March 2020.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.</span><u></u></p>","environmental_strengths":"<p style=\"margin-bottom: .0001pt;\"><strong style=\"mso-bidi-font-weight: normal;\">Security Audit</strong></p>\r\n<p style=\"margin-bottom: .0001pt; mso-layout-grid-align: none; text-autospace: none;\"><span style=\"mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;\">The TOE generates audit records for security relevant events. The TOE maintains a local audit log as well </span><span style=\"mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;\">as sending the audit records to a remote Syslog server. Audit records sent to the remote server are </span><span style=\"mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;\">protected by a TLS connection. Each audit record includes identity (username, IP address, or process), </span><span style=\"mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;\">date and time of the event, type of event, and the outcome of the event. The TOE prevents modification </span><span style=\"mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;\">to the local audit log.</span></p>\r\n<p style=\"margin-bottom: .0001pt;\"><strong style=\"mso-bidi-font-weight: normal;\">Cryptographic Support</strong></p>\r\n<p><span style=\"mso-ascii-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;\">The TOE includes the Pulse Secure Cryptographic Module that implements CAVP validated cryptographic algorithms for random bit generation, encryption/decryption, authentication, and integrity protection/verification. These algorithms are used to provide security for the TLS and HTTPs connections for secure management and secure connections to a syslog server. TLS and HTTPs are also used to verify firmware updates. </span></p>\r\n<p style=\"margin-bottom: .0001pt;\"><strong style=\"mso-bidi-font-weight: normal;\">Identification and Authentication</strong></p>\r\n<p style=\"margin-bottom: .0001pt;\">The TOE authenticates administrative users using a username/password or username/X.509 certificate combination. The TOE does not allow access to any administrative functions prior to successful authentication. The TOE validates and authenticates X.509 certificates for all certificate uses. The TOE supports passwords consisting of alphanumeric and special characters and enforces minimum password lengths. The TSF supports certificates using RSA or ECDSA signature algorithms. The TOE only allows users to view the login warning banner and send/receive ICMP packets prior to authentication. Remote administrators are locked out after a configurable number of unsuccessful authentication attempts.</p>\r\n<p style=\"margin-bottom: .0001pt;\"><strong style=\"mso-bidi-font-weight: normal;\">Security Management</strong></p>\r\n<p style=\"mso-layout-grid-align: none; text-autospace: none;\"><span style=\"mso-ascii-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;\">The TOE allows users with the Security Administrator role to administer the TOE over a remote web UI or a local CLI. These interfaces do not allow the Security Administrator to execute arbitrary commands or executables on the TOE. Security Administrators can manage connections to an external Syslog server, as well as determine the size of local audit storage. </span></p>\r\n<p style=\"margin-bottom: .0001pt;\"><strong style=\"mso-bidi-font-weight: normal;\">Protection of the TSF</strong></p>\r\n<p style=\"margin-bottom: .0001pt; mso-layout-grid-align: none; text-autospace: none;\"><span style=\"mso-ascii-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;\">The TOE implements several self-protection mechanisms. It does not provide an interface for the </span><span style=\"mso-ascii-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;\">reading of secret or private keys. The TOE ensures timestamps, timeouts, and certificate checks are </span><span style=\"mso-ascii-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;\">accurate by maintaining a real-time clock. Upon startup, the TOE runs a suite of self-tests to verify that it is operating correctly. The TOE also verifies the integrity and authenticity of firmware updates by verifying a digital signature of the update prior to installing it.</span></p>\r\n<p>&nbsp;</p>\r\n<p style=\"margin-bottom: .0001pt;\"><strong style=\"mso-bidi-font-weight: normal;\">TOE Access</strong></p>\r\n<p style=\"margin-bottom: .0001pt; mso-layout-grid-align: none; text-autospace: none;\"><span style=\"mso-ascii-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;\">The TOE can be configured to display a warning and consent banner when an administrator attempts to </span><span style=\"mso-ascii-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;\">establish an interactive session over the local CLI or remote web UI. The TOE also enforces a configurable inactivity timeout for remote and local administrative sessions.</span></p>\r\n<p style=\"margin-bottom: .0001pt;\"><strong style=\"mso-bidi-font-weight: normal;\">Trusted Path/Channels</strong></p>\r\n<p style=\"margin-bottom: .0001pt; mso-layout-grid-align: none; text-autospace: none;\"><span style=\"mso-ascii-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;\">The TOE uses TLS to provide a trusted communication channel between itself and remote Syslog servers. </span><span style=\"mso-ascii-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;\">The trusted channels utilize X.509 certificates to perform mutual authentication. The TOE initiates the TLS trusted channel with the remote server. </span><span style=\"mso-ascii-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;\">The TOE uses HTTPS/TLS to provide a trusted path between itself and remote administrative users. The </span><span style=\"mso-ascii-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;\">TOE does not implement any additional methods of remote administration. The remote administrative </span><span style=\"mso-ascii-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;\">users are responsible for initiating the trusted path when they wish to communicate with the TOE.</span></p>","features":[]}