{"product_id":11040,"v_id":11040,"product_name":"BlackBerry Unified Endpoint Management (UEM) Server and Android Client, version 12","certification_status":"Certified","certification_date":"2020-04-28T00:00:00Z","tech_type":"Mobility","vendor_id":{"name":"BlackBerry Ltd.","website":"https://www.blackberry.com"},"vendor_poc":"Lyndon Levett","vendor_phone":"1-519-597-3683","vendor_email":"llevett@blackberry.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p style=\"text-align: justify;\">The Target of Evaluation (TOE) is the BlackBerry Unified Endpoint Management (UEM) Server and Android Client version 12<span style=\"mso-bidi-font-size: 10.0pt; font-family: 'Times New Roman',serif;\">.<span style=\"mso-spacerun: yes;\">&nbsp; </span></span></p>\r\n<p style=\"text-align: justify;\">The UEM Server provides centralized management of mobile devices and the UEM Android Client Agent (installed on each android device) enforces the policies of the Server on each android device.</p>\r\n<p style=\"text-align: justify;\">The BlackBerry UEM server, including the Core and UI security enforcing components, is implemented with a combination of Java and native code running on Windows Server 2016 with Java JRE 8.0.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The UEM Server consists of a number of components.<span style=\"mso-spacerun: yes;\">&nbsp; </span>However, only the Core and UI components are included in the TOE for the purpose of evaluation. The other components are either disabled or play no role in any security enforcement.<span style=\"mso-spacerun: yes;\">&nbsp; </span></p>\r\n<p style=\"text-align: justify;\">The UEM Server requires a SQL database to operate and can optionally be configured to utilize an LDAP server for user authentication as well as a SYSLOG server to export audit records.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Some other components such as Exchange are not included in the scope of evaluation or are not security relevant &ndash; the BBR (BlackBerry router) and BlackBerry NOC are network routing components through which UEM Server &ndash; client communication travels.<span style=\"mso-spacerun: yes;\">&nbsp; </span>They are not security relevant for the purpose of this evaluation since the server-client channels are secured end to end between the TOE components and through the other components.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Those other components cannot decrypt or otherwise access information in those secure channels, although they can disrupt or redirect them, like any other components on the Internet.</p>\r\n<p style=\"text-align: justify;\">The UEM Android Client is part of the TOE since Android does not have agents of its own.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The UEM Server can manage mobile Android devices through interaction with an enrolled UEM Android Client and can alternately manage mobile iOS devices through interaction with the iOS agent developed and evaluated by Apple.</p>","evaluation_configuration":"<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The Target of Evaluation (TOE) is the BlackBerry Unified Endpoint Management (UEM) Server and Android Client version 12.<span style=\"mso-spacerun: yes;\">&nbsp;</span></span></p>","security_evaluation_summary":"<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance. The evaluation demonstrated that the TOE meets the security requirements contained in the Security Target.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.<span style=\"mso-spacerun: yes;\">&nbsp; </span></span></p>\r\n<p style=\"text-align: justify; mso-outline-level: 1;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The product, when delivered and configured as identified in the BlackBerry UEM Administrative Guidance Document, UEM Version 12, April 2020, satisfies all of the security functional requirements stated in the BlackBerry UEM Server and Android Client Security Target, Version 0.6, 28 April 2020.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The project underwent CCEVS Validator review.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation was completed in April 2020.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11040-2020) prepared by CCEVS.</span></p>","environmental_strengths":"<p style=\"text-align: justify; mso-outline-level: 1;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The logical boundaries of the UEM Server and Android Client are realized in the security functions that it implements. Each of these security functions is summarized below.</span></p>\r\n<p><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\"><strong style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-GB\" style=\"mso-ansi-language: EN-GB;\">Security audit:</span></strong><span style=\"mso-spacerun: yes;\">&nbsp; </span>The BlackBerry UEM server is designed to generate and export audit events.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The audit events are stored in the SQL database and sent to the configured syslog servers as events occur. The BlackBerry UEM server can also generate alerts for specific events &ndash; these alerts are sent to administrators as e-mails. The BlackBerry UEM server supports TLS tunneling of syslog messages to protect exported audit records. </span></p>\r\n<p style=\"margin-bottom: 6.0pt; text-align: justify; line-height: 11.0pt; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none; vertical-align: baseline;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The BlackBerry UEM Android client is also designed to generate and export audit events.<span style=\"mso-spacerun: yes;\">&nbsp; </span>It stores audit events in the platform audit logs which it can retrieve and send to its enrolled BlackBerry UEM server.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The BlackBerry UEM server will forward the events to a configured syslog server as the events are received.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The BlackBerry UEM Android client can also send required alerts directly to the BlackBerry UEM server which are received, logged as audit events, and treated as administrator alerts.</span></p>\r\n<p style=\"margin-bottom: .0001pt; line-height: normal;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\"><strong style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-GB\" style=\"mso-ansi-language: EN-GB;\">Cryptographic support</span></strong><span lang=\"EN-GB\" style=\"mso-ansi-language: EN-GB;\">: </span><span lang=\"EN-GB\"><span style=\"mso-spacerun: yes;\">&nbsp;</span></span>The BlackBerry UEM server uses the Certicom Security Builder GSE-J Crypto Core Module (<u><span style=\"color: blue;\"><a href=\"https://csrc.nist.gov/projects/cryptographic-module-validation-program/Certificate/3391\"><span style=\"color: blue;\">https://csrc.nist.gov/projects/cryptographic-module-validation-program/Certificate/3391</span></a></span></u>) for its cryptographic operations.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The Certicom Security Builder GSE-J Crypto Core Module provides Cryptographic Algorithm Validation Program (CAVP) certified algorithms for a wide range of cryptographic functions including: asymmetric key generation and establishment, encryption/decryption, and cryptographic hashing and keyed-hash message authentication. These functions are supported with suitable random bit generation, initialization vector generation, secure key storage, and key and protected data destruction. <span style=\"mso-spacerun: yes;\">&nbsp;</span>The primitive cryptographic functions are used to implement security communication protocols (TLS and HTTPS) used for communication between the Server and Agent and between the Server and remote administrators.</span></p>\r\n<p style=\"margin-bottom: .0001pt; line-height: normal;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The UEM Android Client uses the cryptographic functions provided by the evaluated mobile devices.<span style=\"mso-spacerun: yes;\">&nbsp; </span></span></p>\r\n<p><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\"><strong style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-GB\" style=\"mso-ansi-language: EN-GB;\">Identification and authentication</span></strong><span lang=\"EN-GB\" style=\"mso-ansi-language: EN-GB;\">: </span>The BlackBerry UEM server require administrators to login prior to performing any security functions or accessing any services, such as creating an activation password.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Similarly, mobile devices must authenticate with the server using an activation password prior to enrolling</span></p>\r\n<p style=\"margin-bottom: 6.0pt; text-align: justify; line-height: 11.0pt; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none; vertical-align: baseline;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">Both the BlackBerry UEM server and Android client use X.509 certificates in conjunction with TLS to both authenticate and secure remote connections.</span></p>\r\n<p><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\"><strong style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-GB\" style=\"mso-ansi-language: EN-GB;\">Security management</span></strong><span lang=\"EN-GB\" style=\"mso-ansi-language: EN-GB;\">: </span>The BlackBerry UEM server facilitates granular administrative access to functions based on roles: server primary administrators, security configuration administrators, device user administrators, auditor, and mobile device users.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Administrators access the BlackBerry UEM server via a web-based interface.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The BlackBerry UEM server also supports the definition of mobile device users, and upon enrollment each mobile device generates an X.509 certificate used to identify that enrolled device.</span></p>\r\n<p style=\"margin-bottom: 6.0pt; text-align: justify; line-height: 11.0pt; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none; vertical-align: baseline;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The BlackBerry UEM server provides all the features necessary to manage its own security functions as well as to manage mobile device policies sent to enrolled mobile devices (via their clients).</span></p>\r\n<p style=\"margin-bottom: 6.0pt; text-align: justify; line-height: 11.0pt; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none; vertical-align: baseline;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The BlackBerry UEM Android client provides the features necessary to securely communicate and enroll with the BlackBerry UEM server, apply policies received from the BlackBerry UEM server, and report the results of applying policies.</span></p>\r\n<p><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\"><strong style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-GB\" style=\"mso-ansi-language: EN-GB;\">Protection of the TSF</span></strong><span lang=\"EN-GB\" style=\"mso-ansi-language: EN-GB;\">: </span>The BlackBerry UEM server and Android client work together to ensure that all security related communication between those components is protected from disclosure and modification.</span></p>\r\n<p style=\"margin-bottom: 6.0pt; text-align: justify; line-height: 11.0pt; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none; vertical-align: baseline;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The BlackBerry UEM server includes self-testing capabilities to ensure that they are functioning properly as well as to cryptographically verify that their executable images are not corrupted.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The UEM server also includes secure update capabilities to ensure the integrity of any updates so that updates will not introduce malicious or other unexpected changes in the TOE.</span></p>\r\n<p><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\"><strong style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-GB\" style=\"mso-ansi-language: EN-GB;\">TOE access</span></strong><span lang=\"EN-GB\" style=\"mso-ansi-language: EN-GB;\">: </span>The BlackBerry UEM server has the capability to display an advisory banner when users attempt to login in order to manage the TOE.</span></p>\r\n<p><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\"><strong style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-GB\" style=\"mso-ansi-language: EN-GB;\">Trusted path/channels</span></strong><span lang=\"EN-GB\" style=\"mso-ansi-language: EN-GB;\">: </span>The BlackBerry UEM server uses TLS/HTTPS to secure communication channels between itself and remote administrators and mobile device users accessing the server via a web-based user interface. It also uses TLS to secure communication channels between itself, enrolled devices, its configured SQL database server, syslog servers, and optionally configured LDAP servers. </span></p>\r\n<p style=\"margin-bottom: 6.0pt; text-align: justify; line-height: 11.0pt; mso-layout-grid-align: none; punctuation-wrap: simple; text-autospace: none; vertical-align: baseline;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The following is a summary of applicable secure channels:</span></p>\r\n<ol style=\"margin-top: 0in;\" start=\"1\" type=\"1\">\r\n<li style=\"text-align: justify; color: #000000; line-height: 11pt; ; font-size: 10pt; font-style: normal; font-weight: 400; margin-bottom: 6pt; vertical-align: baseline;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">UEM server console used by administrators &ndash; TLS not subject to mutual X.509 authentication. Certicom implementation of TLS on server.</span></li>\r\n<li style=\"text-align: justify; color: #000000; line-height: 11pt; ; font-size: 10pt; font-style: normal; font-weight: 400; margin-bottom: 6pt; vertical-align: baseline;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">Mobile device UEM client to UEM server &ndash; TLS not subject to mutual X.509 authentication for initial enrollment, but always uses mutual X.509 authentication once enrolled. Certicom implementation of TLS on server &ndash; Mobile device implementation of TLS on the client end.</span></li>\r\n<li style=\"text-align: justify; color: #000000; line-height: 11pt; ; font-size: 10pt; font-style: normal; font-weight: 400; margin-bottom: 6pt; vertical-align: baseline;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">UEM server to SQL database, SYSLOG and LDAP &ndash; TLS optionally configured for mutual X.509 authentication. Certicom implementation of TLS on server.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Communication with the SQL database is either local within the Windows platform on which the UEM server executes, or protected by IPsec provided by the Windows platform.</span></li>\r\n</ol>","features":[]}