{"product_id":11595,"v_id":11595,"product_name":"RedSeal Server v10.5","certification_status":"Certified","certification_date":"2025-10-27T00:00:00Z","tech_type":"Network Device,Remote Access","vendor_id":{"name":"RedSeal, Inc.","website":"https://www.redseal.net/"},"vendor_poc":"Nate Cash","vendor_phone":null,"vendor_email":"ncash@redseal.net","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p>The RedSeal Platform is a Network Infrastructure Security Management (NISM) platform that continuously identifies critical attack risk and non-compliance in complex enterprise security infrastructure. It provides organizations with an understanding of where security is working, where improvement is needed, and where the greatest cyber-attack risks lie.</p>\r\n<p>RedSeal creates a model of the network based on information it collects from configuration files from switches, routers, firewalls and load balancers. RedSeal can integrate with public and private cloud managers to include all network environments in the network model. In addition, RedSeal imports host and vulnerability data from vulnerability scanners and other sources.</p>\r\n<p>For this evaluation, RedSeal Server is evaluated as a network device. The TOE claims exact conformance to the NDcPP and SSHPKG. As such, the security-relevant functionality of the product is limited to the claimed requirements in this PP and package.&nbsp;</p>\r\n<p>&nbsp;</p>","evaluation_configuration":"<p style=\"margin: 0in 0in 8pt; line-height: normal; text-align: justify; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-size: 11.0pt; font-family: Calibri, sans-serif;\">The TOE consists of a RedSeal G5C Appliance as defined in the following table, running firmware version 10.5.2.</span></p>\r\n<div align=\"center\">\r\n<table class=\"MsoNormalTable\" style=\"width: 58.46%; border-collapse: collapse; border: none;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\r\n<tbody>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 28.98%; border: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"break-after: avoid; margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><a name=\"_Hlk210034150\"></a>Height</p>\r\n</td>\r\n<td style=\"width: 71.02%; border: solid windowtext 1.0pt; border-left: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"break-after: avoid; margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">1.7 in (43 mm)</p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 28.98%; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">Width</p>\r\n</td>\r\n<td style=\"width: 71.02%; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">17.2 in (437 mm)</p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 28.98%; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">Depth</p>\r\n</td>\r\n<td style=\"width: 71.02%; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">23.5 in (597 mm)</p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 28.98%; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">Weight</p>\r\n</td>\r\n<td style=\"width: 71.02%; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">46 lbs (20 kg)</p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 28.98%; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">Temperature</p>\r\n</td>\r\n<td style=\"width: 71.02%; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">50 &ndash; 95 degrees F (10 &ndash; 35 degrees C)</p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 28.98%; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">Humidity (noncondensing)</p>\r\n</td>\r\n<td style=\"width: 71.02%; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">8 &ndash; 90 %</p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 28.98%; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">Voltage</p>\r\n</td>\r\n<td style=\"width: 71.02%; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">100-240V, 8.5A-3.8A, 50-60 Hz</p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 28.98%; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">Processor</p>\r\n</td>\r\n<td style=\"width: 71.02%; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\"><a name=\"_Hlk181887026\"></a>Intel Xeon Gold 5217 (Cascade Lake)</p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 28.98%; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">RAM</p>\r\n</td>\r\n<td style=\"width: 71.02%; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">256 GB, 2933 MHz</p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 28.98%; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">Disk storage</p>\r\n</td>\r\n<td style=\"width: 71.02%; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">Seagate 2.5&rdquo;, 1TB, SATA3 6Gb/s, 7.2K RPM, 512N, 128M</p>\r\n</td>\r\n</tr>\r\n<tr style=\"page-break-inside: avoid;\">\r\n<td style=\"width: 28.98%; border: solid windowtext 1.0pt; border-top: none; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">Power</p>\r\n</td>\r\n<td style=\"width: 71.02%; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; padding: 0in 5.4pt 0in 5.4pt;\" valign=\"top\">\r\n<p style=\"margin: 2pt 0in; font-size: 10pt; font-family: Calibri, sans-serif;\">Dual hot plug redundant (1 + 1) 700W</p>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</div>","security_evaluation_summary":"<p style=\"margin: 0in; font-size: 10pt; font-family: Aptos, sans-serif;\"><span style=\"font-size: 12.0pt;\">The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme for the&nbsp;<em>collaborative Protection Profile for Network Devices</em>, Version 3.0E with the <em>Functional Package for Secure Shell (SSH)</em>, Version 1.0 applied. The evaluation methodology used by the evaluation team to conduct the evaluation is the <em>Common Methodology for Information Technology Security Evaluation</em>, Version 3.1 release 5. The product, when delivered and configured as identified in the guidance documentation, satisfies all the security functional requirements stated in the <em>RedSeal Server v10.5 Security Target</em>. The evaluation was completed in October 2025. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report prepared by CCEVS.</span></p>","environmental_strengths":"<p><strong><em>Security Audit </em></strong></p>\r\n<p>The TOE generates audit records of security relevant events, including the events specified in [NDcPP] and [SSHPKG]. The TOE stores audit records locally and can also be configured to send the audit records to an external syslog server over a protected communication channel.</p>\r\n<p>The logs comprising the audit trail are stored in the TOE&rsquo;s filesystem and protected from unauthorized modification and deletion by file system permissions. The TOE maintains a maximum of five log files&mdash;the current log file and four backups or archives. Each file has a default maximum of 50 megabytes (which is configurable by an administrator). When the current log file reaches its configured maximum size, it is closed and rotated to an archive, and a new current log file is created. If the maximum number of archive files already exists, the oldest one is deleted. The TOE will generate a warning message if the storage space for audit records reaches 75% capacity.</p>\r\n<p><strong><em>&nbsp;</em></strong><strong><em>Cryptographic Support</em></strong></p>\r\n<p>The TOE implements cryptographic algorithms and mechanisms that provide random bit generation, asymmetric cryptographic key pair generation, key establishment, symmetric data encryption and decryption, digital signature generation and verification, cryptographic hashing, and keyed-hash message authentication services in support of higher level cryptographic protocols, including SSH and TLS.</p>\r\n<p><strong><em>Identification and Authentication</em></strong></p>\r\n<p>The TOE requires all users to be successfully identified and authenticated prior to accessing its security management functions and other capabilities. The TOE offers only remote access (via SSH) to a CLI (no local access); remote access (via HTTPS) to a browser-based administrative Web Beta client; and remote access (protected by TLS) using the Java client (either as a standalone Java application or the web-based Remote client) to support interactive administrator sessions.</p>\r\n<p>The TOE provides a local password-based authentication mechanism for all users and enforces a minimum length for passwords. SSH public key authentication is also supported for the CLI. The TOE will deny remote access to a user after a configurable number of consecutive failed password authentication attempts (default is three).</p>\r\n<p><strong><em>Security Management</em></strong></p>\r\n<p>The TOE provides the security management functions necessary to configure and administer its security capabilities, including: configuring a login access banner; configuring a remote session inactivity time limit before session termination; configuring the parameters (number of consecutive failures, lockout period) for the authentication failure handling mechanism; setting the system date and time and also configuring NTP; performing software updates and verifying updates using a digital signature.</p>\r\n<p>The TOE provides a CLI to access its security management functions. Administrators can access the CLI remotely using SSH (no local access provided). Additionally, some security management functions are accessible via the Web Beta client and the Java client. Security management commands are limited to administrators and are available only after they have been successfully identified and authenticated.</p>\r\n<p><strong><em>Protection of the TSF</em></strong></p>\r\n<p>The TOE protects sensitive data such as stored passwords and cryptographic keys so that they are not accessible even by an administrator.</p>\r\n<p>The TOE provides reliable time stamps for its own use and can be configured to synchronize its time via NTP.</p>\r\n<p>The TOE provides a trusted means for determining the current running version of its software and to update its software. The integrity of software updates can be verified using a digital signature.</p>\r\n<p>The TOE implements various self-tests that execute during the power-on and start up sequence, including firmware/software integrity tests and cryptographic known answer tests that verify the correct operation of the TOE&rsquo;s cryptographic functions.</p>\r\n<p><strong><em>TOE Access</em></strong></p>\r\n<p>The TOE will terminate remote interactive sessions after a configurable period of inactivity. The TOE additionally provides the capability for administrators to terminate their own interactive sessions. The TOE can be configured to display an advisory and consent warning message before establishing a user session.</p>\r\n<p><strong><em>Trusted Path/Channels</em></strong></p>\r\n<p>The TOE protects interactive communication with remote administrators using SSH for remote access to the CLI (no local access to CLI provided); TLS using the Java client/Remote client (for remote GUI access to the management interface whether through a standalone thick client or a browser-based Java implementation); and using HTTPS (for accessing the TOE&rsquo;s administrative Web Beta client).</p>\r\n<p>The TOE is able to protect transmission of audit records to an external audit server using TLS.</p>","features":[{"id":1072,"feature_name":"Asymmetric Key Generation"},{"id":1068,"feature_name":"Auditing"},{"id":1077,"feature_name":"Certificate Validation"},{"id":1075,"feature_name":"Cryptograhic Hashing"},{"id":1073,"feature_name":"Cryptographic Key Establishment"},{"id":1074,"feature_name":"Cryptographic Signature Verification"},{"id":1071,"feature_name":"DRBG"},{"id":1067,"feature_name":"Flaw Remediation"},{"id":1080,"feature_name":"HTTPS Client"},{"id":1081,"feature_name":"HTTPS Server with Mutual Authentication"},{"id":1082,"feature_name":"IPsec"},{"id":1069,"feature_name":"Key Destruction"},{"id":1076,"feature_name":"Keyed-hash message authentication"},{"id":20,"feature_name":"Network Security Monitoring"},{"id":1070,"feature_name":"SSH Server"},{"id":1083,"feature_name":"TLS 1.2"},{"id":1084,"feature_name":"TLS 1.3"},{"id":1078,"feature_name":"TLS Client"},{"id":1079,"feature_name":"TLS Server without Mutual Authentication"}]}