{"product_id":11439,"v_id":11439,"product_name":"Cisco Secure Client - AnyConnect 5.1 for Red Hat Enterprise Linux 8.2","certification_status":"Certified","certification_date":"2024-06-25T00:00:00Z","tech_type":"Application Software, Virtual Private Network","vendor_id":{"name":"Cisco Systems, Inc.","website":"https://www.cisco.com"},"vendor_poc":"Petra Manche","vendor_phone":"(408) 526-4000","vendor_email":"certteam@cisco.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p class=\"MsoNormal\" style=\"text-align: justify;\">The Cisco AnyConnect TOE is a client application that provides remote users a secure VPN tunnel to protect data in transit on both IPv4 and IPv6 networks.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE provides IPsec to authenticate and encrypt network traffic travelling across an unprotected public network.<span style=\"mso-spacerun: yes;\">&nbsp; </span>By protecting the communication from unauthorized disclosure or modification, remote users can securely connect to an organization&rsquo;s network resources and applications.</p>","evaluation_configuration":"<p>The evaluated configuration is Cisco Secure Client &ndash; AnyConnect v5.1 installed on Red Hat Enterprise Linux 8.2.</p>","security_evaluation_summary":"<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation demonstrated that <span style=\"mso-bidi-font-style: italic;\">the TOE </span>meets the security requirements contained in the Security Target.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The product, when delivered and configured as identified in the <span style=\"mso-no-proof: yes;\">Cisco Secure Client - AnyConnect 5.1 for Red Hat Enterprise Linux 8.2 CC Configuration Guide</span>, Version <span style=\"mso-no-proof: yes;\">0.3</span>, <span style=\"mso-no-proof: yes;\">February 15, 2024</span> document, satisfies all of the security functional requirements stated in the <span style=\"mso-no-proof: yes;\">Cisco Secure Client - AnyConnect 5.1 for Red Hat Enterprise Linux 8.2 Security Target</span>, Version <span style=\"mso-no-proof: yes;\">0.5</span>, <span style=\"mso-no-proof: yes;\">May 7, 2024</span>.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The project underwent CCEVS Validator review.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The evaluation was completed in <span style=\"mso-no-proof: yes;\">June 2024</span>.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID<span style=\"mso-no-proof: yes;\">11439-2024</span>) prepared by CCEVS.</p>","environmental_strengths":"<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\">The logical boundaries of the <span style=\"mso-no-proof: yes;\">Cisco Secure Client - AnyConnect 5.1 for Red Hat Enterprise Linux 8.2</span> are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p class=\"MsoNormal\">&nbsp;</p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Cryptographic support:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify; mso-outline-level: 1;\">The TOE incorporates a cryptographic module, CiscoSSL FIPS Object Module, to provide the cryptography in support of IPsec with ESP symmetric cryptography for bulk AES encryption/decryption and SHA-2 algorithm for hashing.<span style=\"mso-spacerun: yes;\">&nbsp;&nbsp; </span>In addition, the TOE provides the cryptography to support <a name=\"_Hlk83105161\"></a>Elliptic-Curve Diffie-Hellman key exchange and the derivation function used in the IKEv2 and ESP protocols.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The cryptographic algorithm implementation has been validated for CAVP conformance.</p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify; mso-outline-level: 1;\">The TOE platform provides asymmetric cryptography, which is used by the TOE for IKE peer authentication using digital signature and hashing services.<span style=\"mso-spacerun: yes;\">&nbsp; </span>In addition, the TOE platform provides a DRBG.</p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>User data protection:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\">The TOE platform ensures that residual information from previously sent network packets processed through the platform are protected from being passed into subsequent network packets.</p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Identification and authentication:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\">The TOE and TOE platform perform device-level X.509 certificate-based authentication of the VPN Gateway during IKE v2 key exchange.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Device-level authentication allows the TOE to establish a secure channel with a trusted VPN Gateway.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The secure channel is established only after each endpoint successfully authenticates each other.</p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Security management:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\">The TOE, TOE platform, and VPN Gateway provide the management functions to configure the security functionality provided by the TOE.<span style=\"mso-spacerun: yes;\">&nbsp; </span>The TOE provides a Security Administrator role and only the Security Administrator can perform the above security management functions.</p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Privacy:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\">The TOE does not store or transmit Personally Identifiable Information (PII) over a network.</p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Protection of the TSF:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\">The TOE performs a suite of self-tests during initial start-up to verify correct operation of its CAVP tested algorithms.<span style=\"mso-spacerun: yes;\">&nbsp; </span>Upon execution, the integrity of the TOEs software executables is also verified.</p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\">The TOE Platform provides for verification of TOE software updates prior to installation.</p>\r\n<p class=\"MsoNormal\" style=\"text-align: justify; mso-outline-level: 1;\"><strong>Trusted path/channels:</strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-bottom: 6.0pt; text-align: justify;\">The TOE&rsquo;s implementation of IPsec provides a trusted channel ensuring sensitive data is protected from unauthorized disclosure or modification when transmitted from the host to a VPN gateway.</p>","features":[{"id":1335,"feature_name":"Application Software"},{"id":1342,"feature_name":"Asymmetric Key Generation"},{"id":1333,"feature_name":"Auditing"},{"id":1351,"feature_name":"Certificate Authentication"},{"id":1350,"feature_name":"Certificate Validation"},{"id":1336,"feature_name":"Credential Storage"},{"id":1345,"feature_name":"Cryptographic Hashing"},{"id":1344,"feature_name":"Cryptographic Key Establishment”"},{"id":1347,"feature_name":"Cryptographic Signature Generation"},{"id":1340,"feature_name":"DTLS Client"},{"id":1341,"feature_name":"DTLS Server with Mutual Authentication"},{"id":1332,"feature_name":"Flaw Remediation"},{"id":1348,"feature_name":"HTTPS Client"},{"id":1349,"feature_name":"HTTPS Server without Mutual Authentication"},{"id":1353,"feature_name":"IKEv1"},{"id":1354,"feature_name":"IKEv2"},{"id":1334,"feature_name":"Key Destruction"},{"id":1346,"feature_name":"Keyed-hash message authentication"},{"id":1343,"feature_name":"PBKDF"},{"id":1337,"feature_name":"TLS Client"},{"id":1338,"feature_name":"TLS Server with Mutual Authentication"},{"id":1339,"feature_name":"TLS Server without Mutual Authentication"},{"id":1352,"feature_name":"VPN Client"}]}