{"product_id":11499,"v_id":11499,"product_name":"Forescout eyeInspect v5.2","certification_status":"Certified","certification_date":"2024-12-27T00:00:00Z","tech_type":"Network Device","vendor_id":{"name":"Forescout Technologies Inc.","website":"https://www.forescout.com/"},"vendor_poc":"Hanuja Sakhamuri","vendor_phone":"866-377-8773","vendor_email":"Hanuja.sakhamuri@forescout.com","assigned_lab":{"cctl_name":"Booz Allen Hamilton Common Criteria Testing Laboratory"},"product_description":"<p>Forescout eyeInspect&rsquo;s primary purpose is to help reduce risk, automate compliance, and optimize threat analysis for industrial operations management technology within a network. The Command Center provides the main interface for management of eyeInspect, including the ability to manage eyeInspect configuration, manage Sensors, and perform analytics on collected device and threat data. Meanwhile, eyeInspect Sensor(s) receive device information gathered from within the network and send it to the Command Center for analysis. A Forescout eyeInspect deployment consists of one Command Center and at least one Sensor. The Command Center and the Sensor(s) work together to provide visibility and an understanding of security posture for Industrial Control System and Supervisory Control and Data Acquisition (ICS/SCADA) networks.</p>","evaluation_configuration":"<p>The TOE is Forescout eyeInspect v5.2 which consists of a Command Center and one or more Sensors. The TOE contains the following models for each TOE component:&nbsp;</p>\r\n<ul>\r\n<li>Command Center: Forescout FS-HS-5160-OT</li>\r\n<li>Sensors: Forescout FS-HW-5120, Forescout FS-HW-5160, Forescout FS-HW-4130, and Forescout FS-HW-2130</li>\r\n</ul>\r\n<p>The minimum configuration for a deployment of Forescout eyeInspect is one Command Center and one Sensor. Only one Command Center can be deployed as part of the operational configuration. Including additional Sensors within a deployment of Forescout eyeInspect as part of the operational configuration will not affect the validity of the functional claims made within the Common Criteria certification.</p>\r\n<p>The following lists components and applications in the environment that the TOE relies upon in order to function properly:</p>\r\n<ul>\r\n<li>Terminal: A terminal is a device that handles the input and display of data when connected to an appliance&rsquo;s serial port. A terminal client, such as Hyper Terminal (Windows) or minicom (Linux) can be used on a general purpose computer. The TOE&rsquo;s CLI can be accessed locally with a physical connection to the TOE using the designated management port and must use a terminal emulator that is compatible or use the keyboard and display ports.</li>\r\n<li>Remote Management Workstation: Any general-purpose computer that is used by an administrator to manage the TOE. For the TOE to be managed remotely the Remote Management Workstation is required to have a SSHv2 client installed to access the TOE&rsquo;s CLI on both TOE components, and a web browser installed to access the Web GUI on the Command Center.</li>\r\n<li>Audit Server: The TOE connects to an audit server to send the audit records for remote storage via SSH connection where the TOE is the SSH client. This is used to send copies of audit data to be stored in a remote location for data redundancy purposes.</li>\r\n<li>Monitored Network: The monitored network contains operational technology components, Industrial Control Systems, Supervisory Control and Data Acquisition systems, etc. Figure 1 identifies these as a single interface. The interface to the manage the Forescout eyeInspect product is a separate connection from that of the monitored network that the Forescout eyeInspect product is managing. The Forescout eyeInspect&rsquo;s management of the monitored network is out of scope for the NDcPP.</li>\r\n</ul>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures. Forescout eyeInspect v5.2 was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 5. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 5. The product, when installed and configured per the instructions provided in the preparative guidance, satisfies all of the security functional requirements stated in the&nbsp;<em>Forescout eyeInspect v5.2 Security Target Version 1.0 </em>as scoped by the NDcPP2.2E. The evaluation underwent CCEVS Validator review. The evaluation was completed in December 2024. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, CCEVS-VR-VID11499-2024 prepared by CCEVS.</p>","environmental_strengths":"<p><strong>Security Audit</strong></p>\r\n<p>The TOE contains mechanisms to generate audit data to record predefined events for all components of the TOE. Both the Command Center and the Sensor store audit logs locally. The TOE supports forwarding audit records to an external audit server at a predefined frequency. There is no direct connection between the Sensors and the remote audit server. Therefore, audit events from the Sensors are first forwarded to the Command Center, and then forwarded to the remote audit server by the Command Center. The Command Center also forwards its audit records directly to the external audit server. In the evaluated configuration, the audit data is securely transmitted to the audit server using a SSHv2 communication channel.</p>\r\n<p><strong>Cryptographic Support</strong></p>\r\n<p>The TOE provides cryptography in support of TLS (v1.2), HTTPS, and SSH trusted communications. The Command Center utilizes Bouncy Castle for TLS and HTTPS communications, and OpenSSL for SSH communications. The Sensor utilizes OpenSSL for TLS and SSH communication. The TOE destroys keys when no longer needed.</p>\r\n<p><strong>Communication</strong></p>\r\n<p>Initial TLS communications between TOE components does not occur until the Sensor is configured and enabled by the Security Administrator. Once enabled the Sensor application will send a request for enrollment, via TLS, to the configured Command Center, where the Security Administer must approve before full communications are established.</p>\r\n<p><strong>Identification and Authentication</strong></p>\r\n<p>The TSF provides a configurable number of maximum consecutive authentication failures that are permitted by a user. Once this number has been met, the account is locked for a configurable time interval or until a Security Administrator manually unlocks the account. Additionally, a Security Administrator can define the minimum password length. The displaying of a pre-authentication warning banner is the only function available prior to user authenticating.</p>\r\n<p>The TOE provides a native password authentication mechanism for Web GUI and CLI users. The inter-TOE TLS client functionality on the Sensor performs the validation, without revocation checking, of the presented X.509v3 certificates from the Command Center server.&nbsp;</p>\r\n<p><strong>Security Management</strong></p>\r\n<p>The TOE uses role-based access control to prevent unauthorized management of and access to TSF data. The TOE provides a Security Administrator role that can be assigned to a user which provides the ability to administer the TOE locally and remotely.</p>\r\n<p><strong>Protection of the TSF</strong></p>\r\n<p>The TOE ensures the security and integrity of all data that is stored locally and accessed locally or remotely. User authentication passwords are not stored in plaintext. The Security Administrator is required to manually initiate the update process on the Command Center and the Sensors; as the TOE does not support automatic updates. The TOE automatically verifies the digital signature of the software update prior to installation and if the digital signature is found to be invalid, the update is not installed. The current executing version of the TOE software is displayed upon login. The TOE implements a self-testing mechanism that is automatically executed upon startup. The TOE provides its own time via the underlying OS&rsquo;s internal clock and a Security Administrator has the ability to manually set the time.</p>\r\n<p><strong>TOE Access</strong></p>\r\n<p>The TOE displays a configurable warning banner prior to user authentication. Remote and local sessions are terminated after an administrator-configurable time period of inactivity. Users are allowed to terminate their own interactive session. Once a session has been terminated, the TOE requires the user to re-authenticate to establish a new session.</p>\r\n<p><strong>Trusted Path/Channels</strong></p>\r\n<p>Security Administrators can remotely manage the Command Center through an SSH channel to access the CLI or HTTPS to access the Web GUI. The Command Center uses a SSH connection to the audit server for remote audit storage.&nbsp;</p>\r\n<p>Security administrators can remotely manage the Sensor through an SSH channel to access the CLI. The Sensor communicates with the Command Center via secure TLS channels.</p>","features":[{"id":778,"feature_name":"Asymmetric Key Generation"},{"id":773,"feature_name":"Auditing"},{"id":800,"feature_name":"Certificate Authentication"},{"id":785,"feature_name":"Certificate Validation"},{"id":782,"feature_name":"Cryptographic Hashing"},{"id":779,"feature_name":"Cryptographic Key Establishment"},{"id":781,"feature_name":"Cryptographic Signature Verification"},{"id":775,"feature_name":"DRBG"},{"id":797,"feature_name":"HTTPS Client"},{"id":1557,"feature_name":"HTTPS Server without Mutual Authentication"},{"id":774,"feature_name":"Key Destruction"},{"id":783,"feature_name":"Keyed-hash message authentication"},{"id":794,"feature_name":"SSH Client"},{"id":795,"feature_name":"SSH Server"},{"id":789,"feature_name":"TLS 1.2"},{"id":790,"feature_name":"TLS Client"},{"id":792,"feature_name":"TLS Server without Mutual Authentication"}]}