{"product_id":11048,"v_id":11048,"product_name":"Micro Focus Data Protector Premium Edition, 2020.05 (A.10.70)","certification_status":"Certified","certification_date":"2020-05-26T00:00:00Z","tech_type":"Application Software","vendor_id":{"name":"Micro Focus, LLC","website":"www.MicroFocus.com"},"vendor_poc":"Chane Cullens","vendor_phone":"+1 203 512 8057","vendor_email":"Chane@MicroFocus.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The TOE is Micro Focus Data Protector Premium Edition, release 2020.05, software version A.10.70. Data Protector provides backup and restore functionality tailored for enterprise-wide and distributed environments. Data Protector is an enterprise-level software application for Windows. It includes cryptographic modules providing NIST-validated implementations of cryptographic functionality to support secure storage of credentials and secure communications with external IT entities. Data Protector restricts network connections to those required for it to perform its intended functions. Data Protector supports the use of X.509 certificates for authentication of TLS connections. Data Protector is implemented to utilize anti-exploitation capabilities provided by its execution environment. The application installation package and application updates are digitally signed by an authorized source.</span></p>","evaluation_configuration":"<p><span style=\"line-height: 115%; font-family: 'times new roman',times,serif; font-size: 12pt;\">The TOE is Micro Focus Data Protector Premium Edition, release 2020.05, software version A.10.70.</span><u></u></p>","security_evaluation_summary":"<p style=\"text-align: justify;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme for the <em style=\"mso-bidi-font-style: normal;\">Protection Profile for Application Software</em>, Version 1.3 and <em style=\"mso-bidi-font-style: normal;\">Functional Package for Transport Layer Security (TLS), </em>Version 1.1.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 release 5. The product, when delivered configured as identified in the guidance document, satisfies all of the security functional requirements stated in the Micro Focus Data Protector Security Target. The evaluation was completed in May 2020. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.</span></p>\r\n<p>&nbsp;</p>","environmental_strengths":"<p style=\"margin-bottom: .0001pt;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\"><strong><em style=\"mso-bidi-font-style: normal;\"><span style=\"color: black;\">Cryptographic Support</span></em></strong></span></p>\r\n<p><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">Data Protector incorporates OpenSSL to provide its cryptographic functionality.</span></p>\r\n<p><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">Data Protector provides cryptographic mechanisms for symmetric encryption and decryption, cryptographic signature services, cryptographic hashing services, keyed-hash message authentication services, deterministic random bit generation seeded from a suitable entropy source, key establishment, and secure credential storage. The cryptographic mechanisms support TLS used for secure communication, both as client and server.</span></p>\r\n<p style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\"><strong style=\"mso-bidi-font-weight: normal;\"><em style=\"mso-bidi-font-style: normal;\">User Data Protection</em></strong></span></p>\r\n<p style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">Data Protector leverages the BitLocker functionality of its Windows platform to protect backed-up data written to disk on a Media Agent instance.</span></p>\r\n<p style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">Data Protector does not access sensitive information repositories as defined and intended by the Protection Profile for Application Software, Version 1.3. </span></p>\r\n<p style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">Data Protector restricts network communications to application-initiated network communication for scheduled backup and restore operations.</span></p>\r\n<p style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\"><strong style=\"mso-bidi-font-weight: normal;\"><em style=\"mso-bidi-font-style: normal;\">Identification and Authentication</em></strong></span></p>\r\n<p><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The TOE supports the use of X.509 certificates for authentication of TLS connections. </span></p>\r\n<p><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">The TOE will not accept a certificate if it is unable to determine the revocation status of the certificate.</span></p>\r\n<p style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\"><strong style=\"mso-bidi-font-weight: normal;\"><em style=\"mso-bidi-font-style: normal;\">Security Management</em></strong></span></p>\r\n<p><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">Data Protector does not create credentials by default. The user logged into the underlying Windows system with admin privileges performs the installation and the TOE subsequently ensures only that user is able to run the TOE.</span></p>\r\n<p style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\"><strong style=\"mso-bidi-font-weight: normal;\"><em style=\"mso-bidi-font-style: normal;\">Privacy</em></strong></span></p>\r\n<p><span style=\"font-family: 'times new roman',times,serif; font-size: 12pt;\">Data Protector does not collect Personally Identifiable Information (PII) from administrators or users.</span></p>\r\n<p style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><strong style=\"mso-bidi-font-weight: normal;\"><em style=\"mso-bidi-font-style: normal;\">Protection of the TSF</em></strong></p>\r\n<p><span style=\"font-size: 10.0pt;\">Data Protector uses only documented platform APIs.</span></p>\r\n<p><span style=\"font-size: 10.0pt;\">Data Protector does not perform memory mapping to explicit addresses.</span></p>\r\n<p><span style=\"font-size: 10.0pt;\">Data Protector does not make any memory mapping requests with both write and execute permissions.</span></p>\r\n<p><span style=\"font-size: 10.0pt;\">Data Protector runs successfully with process exploit mitigations enabled on the underlying Windows Server platform</span></p>\r\n<p><span style=\"font-size: 10.0pt;\">Data Protector documentation describes the procedure for users to check for the availability of updates. Data Protector is packaged in the standard Windows Installer (.MSI) format and signed by a code-signing certificate.</span></p>\r\n<p><span style=\"font-size: 10.0pt;\">Data Protector provides the ability to query the current version of the application software.</span></p>\r\n<p style=\"margin-bottom: .0001pt; page-break-after: avoid; mso-layout-grid-align: none; text-autospace: none;\"><strong style=\"mso-bidi-font-weight: normal;\"><em style=\"mso-bidi-font-style: normal;\">Trusted Path/Channels</em></strong></p>\r\n<p><span style=\"font-size: 10.0pt; mso-bidi-font-size: 11.0pt; color: black; mso-bidi-font-weight: bold;\">All data transmitted by Data Protector is assumed to be sensitive data.</span></p>\r\n<p><span style=\"font-size: 10.0pt; mso-bidi-font-size: 11.0pt; color: black; mso-bidi-font-weight: bold;\">A Data Protector instance uses TLS to protect all data it transmits to other Data Protector instances.</span></p>","features":[]}