{"product_id":11108,"v_id":11108,"product_name":"Splunk Enterprise 8.1","certification_status":"Certified","certification_date":"2021-01-26T00:00:00Z","tech_type":"Application Software","vendor_id":{"name":"Splunk LLC","website":"https://www.splunk.com"},"vendor_poc":"Siddharth Bhai","vendor_phone":"669 444-8102","vendor_email":"ssg-security-certifications@splunk.com","assigned_lab":{"cctl_name":"Acumen Security"},"product_description":"<p class=\"Body\" style=\"margin-left: 0in; text-indent: 0in; mso-list: none;\"><span lang=\"EN-GB\">The Target of Evaluation (TOE) is the Splunk Enterprise v8.1 which runs on Red Hat Linux Enterprise (RHEL) v7.7 and v8.2 operating systems. Splunk collects data from various sources such as systems, devices, and interactions and presents the data for real time visibility and analysis. The TOE can be configured as a forwarder and an indexer. When the TOE is configured as the indexer, it will receive data from external sources such as web services, databases, and one or more instance of Splunk configured as a Forwarder. In Forwarder configuration, it will transmit all system generated data to the other instance of Splunk configured as an Indexer.</span></p>","evaluation_configuration":"","security_evaluation_summary":"<p class=\"MsoNormal\" style=\"margin-bottom: .0001pt;\"><span style=\"mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the </span><span lang=\"EN\" style=\"mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN;\">Splunk Enterprise 8.1</span> <span style=\"mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;\">is evaluated as described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 rev 5.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 rev 5.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Acumen Security determined that the evaluation is a <span style=\"mso-bidi-font-weight: bold;\">Protection Profile for Application Software, Version 1.3 [SWAPP] and Functional Package for Transport Layer Security (TLS), Version 1.1 [TLS-PKG]</span>.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The product, when delivered configured as identified in the Operational User Guidance and Preparative Procedures, satisfies all of the security functional requirements stated in the Security Target. The project underwent CCEVS Validator review.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation was completed in <span style=\"mso-bidi-font-weight: bold;\">January 2021</span>.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.</span></p>","environmental_strengths":"<p class=\"MsoNormal\" style=\"text-align: justify;\">The TOE provides the security functionality required by [SWAPP] and [TLS v1.1 package].</p>\r\n<h4 style=\"margin-left: 0in; text-align: justify; text-indent: 0in;\"><strong><a name=\"_Toc49419219\"></a><span style=\"font-family: Calibri, sans-serif;\">Cryptographic Support</span></strong></h4>\r\n<p class=\"MsoNormal\" style=\"text-align: justify;\">The TOE platform provides HTTPS/TLS functionality to securely communicate with trusted entities. TOE is shipped with the OpenSSL which performs the TOE&rsquo;s cryptographic operations. TOE leverages the services of the underlying platform to generate entropy for deterministic random bit generator and key store to store the key data. (The CAVP algorithm certificates is identified in <strong>Table 3 CAVP Certificate References </strong>in the ST).</p>\r\n<h4 style=\"margin-left: 0in; text-align: justify; text-indent: 0in;\"><strong><a name=\"_Toc49419220\"></a><span style=\"font-family: Calibri, sans-serif;\">User Data Protection</span></strong></h4>\r\n<p class=\"MsoNormal\" style=\"text-align: justify;\">The TOE is installed on the encrypted partition of the underlying host platform to secure its data. The private key data for the certificates is stored on the secret storage that can be accessed with the password set to encrypt the partition. Prior to the installation of TOE, the hard drive on the host machine should be encrypted using LUKS. The TOE depends on the underlying platform's network connectivity for its management purpose, sending email alerts to the SMTP server and sending data to the external trusted data feed receiver (TOE Indexer) or receiving the data from the external trusted data feed (TOE Forwarder).</p>\r\n<h4 style=\"margin-left: 0in; text-align: justify; text-indent: 0in;\"><strong><a name=\"_Toc49419221\"></a><span style=\"font-family: Calibri, sans-serif;\">Identification and Authentication</span></strong></h4>\r\n<p class=\"MsoNormalCxSpFirst\" style=\"text-align: justify;\">The TOE relies on X.509v3 certificate validation functions provided by the platform to authenticate the</p>\r\n<p class=\"MsoNormalCxSpMiddle\" style=\"text-align: justify;\">certificate(s) during the establishment of the HTTPS/TLS trusted channel. If the certificate is found to be</p>\r\n<p class=\"MsoNormalCxSpLast\" style=\"text-align: justify;\">invalid the TOE rejects such certificate. Certificate with the unknown revocation status is accepted if the TOE is unable to validate the certificate through CRL.</p>\r\n<h4 style=\"margin-left: 0in; text-align: justify; text-indent: 0in;\"><strong><a name=\"_Toc49419222\"></a><span style=\"font-family: Calibri, sans-serif;\">Security Management</span></strong></h4>\r\n<p class=\"MsoNormal\" style=\"text-align: justify;\">The TOE is not shipped with the default credentials used for the Initial authentication. Once the TOE is installed on the RHEL server all the directories and configuration files that are related to the TOE are protected and has the write access to only the user that performed the installation. The TOE has several configuration files that makes communication possible between the other network entities. An administrator can configure the supported TLS cipher suites and curves in these files for the secure communication with the entities and can also query the TOE version.</p>\r\n<h4 style=\"margin-left: 0in; text-align: justify; text-indent: 0in;\"><strong><a name=\"_Toc49419223\"></a><span style=\"font-family: Calibri, sans-serif;\">Privacy</span></strong></h4>\r\n<p class=\"MsoNormal\" style=\"text-align: justify;\">The TOE does not request any personally identifiable information (PII) with the intent to transmit the data over the network, thus maintaining privacy of the security administrators and the users.</p>\r\n<h4 style=\"margin-left: 0in; text-align: justify; text-indent: 0in;\"><strong><a name=\"_Toc49419224\"></a><span style=\"font-family: Calibri, sans-serif;\">Protection of the TSF</span></strong></h4>\r\n<p class=\"MsoNormal\" style=\"text-align: justify;\">The TOE&rsquo;s platform performs cryptographic self-tests at startup which ensures the TOE&rsquo;s ability to properly operate. The updates must be downloaded manually and installed using the platform&rsquo;s package manager. The TOE platform also verifies all software updates via digital signature wherein the administrator must install the public key of the TOE's developer to check the integrity of any available updates. The TOE uses platform APIs and includes only 3rd party libraries. It also implements stack-based buffer overflow protection along with ASLR (address space layout randomization) and allocating memory for both writing and execution for just-in-time compilation. The TOE supports SElinux and is one of the pre-requisites before installing the TOE application.</p>\r\n<h4 style=\"margin-left: 0in; text-align: justify; text-indent: 0in;\"><strong><a name=\"_Toc49419225\"></a><span style=\"font-family: Calibri, sans-serif;\">Trusted Path/Channels</span></strong></h4>\r\n<p class=\"MsoNormal\" style=\"text-align: justify;\">The TOE is a software application. It supports HTTPS/TLS for secure remote administration communication for WebUI. HTTPS/TLS is used for secure communication channel between the TOE indexer and external trusted data feeds (TOE Forwarder), the TOE acting as an Indexer uses TLS to securely send email alerts to a remote SMTP server. The TOE when configured as a Forwarder uses HTTPS/TLS for sending a data to an external data feed receiver (TOE Indexer).</p>","features":[]}