{"product_id":11600,"v_id":11600,"product_name":"Bastille Enterprise Fusion Center Version 3.6","certification_status":"Certified","certification_date":"2026-01-15T00:00:00Z","tech_type":"Application Software","vendor_id":{"name":"Bastille Networks","website":"http://bastille.net"},"vendor_poc":"Christian Sepulveda","vendor_phone":null,"vendor_email":"christian@bastille.io","assigned_lab":{"cctl_name":"UL Verification Services"},"product_description":"<p>The Bastille Enterprise Fusion Center analyzes observed wireless device data to detect devices, their metadata, and their locations (the data collection component is not part of the evaluation). The Fusion Center provides real time feeds of this enriched device data. This data enables users to make security decisions by leveraging the real time wireless device inventory the Fusion Center provides and site policies of the organization. Sites can include one or more floors of a building, multiple buildings, or entire organization campuses.</p>\r\n<p>The Fusion Center provides secure access to the data through the use of APIs available to users via the TLS/HTTPS protected network connections. There are several web-based (single page) applications that are built into the TOE and these are built exclusively with the aforementioned APIs. Usage of these APIs is outside of scope of this evaluation. The TOE can optionally also provide notifications to subscriber applications through the use of webhooks via secured TLS/HTTPS protocol. Webhooks functionality is out of scope of this evaluation.</p>","evaluation_configuration":"<p>The TOE is running on Ubuntu Linux LTS 18.04 and 22.04, running on VMware ESXI Virtualization Server 7 or higher. Ubuntu Linux is not part of the TOE but is provided together with the TOE as a virtual appliance. Ubuntu Pro ESM long term support (LTS) subscription is prepaid by Bastille.</p>","security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures. The TOE was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 5. The evaluation methodology used by the Evaluation Team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1 Revision 5. &nbsp;The evaluation, completed in October 2025 was successful and provides a level of assurance that the TOE meets the Security Functional Requirements identified in the Security Target. This assurance comes from the performance of the work units associated with the Security Assurance Requirements. A detailed description of those Assurance Requirements as well as the details of how the product meets each of them can be found in the Security Target. A more detailed account of the evaluation assurance activities and the results obtained can be found in the Assurance Activity Report.</p>","environmental_strengths":"<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\">Cryptographic Support</span></h4>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE does not directly perform cryptographic services, but rather calls the platform-provided crypto library, so cryptographic operations are out of the TOE logical scope.</p>\r\n<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\">User Data Protection</span></h4>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE protects confidential data using platform provided mechanisms and does not collect sensitive information from the platform or users. The TOE restricts its access to platform resources to network connections.</p>\r\n<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\">Identification and Authentication</span></h4>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE uses x509 certificates to verify the authenticity of the remote services when initiating secure communications with them.</p>\r\n<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\">Security Management</span></h4>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE provides security management functionality for users to perform initial configuration and to configure external connections. Configuration is stored in a way recommended by the platform. The TOE requires users to change the built-in OS credentials during initial configuration of the TOE. TOE configures file permissions for its binaries to protect from modification by unprivileged users.</p>\r\n<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font: 7pt 'Times New Roman';\">&nbsp;</span></span><span style=\"font-family: Arial, sans-serif;\">Privacy</span></h4>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE does not collect or transmit Personal Identifiable Information.</p>\r\n<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font: 7pt 'Times New Roman';\">&nbsp;</span></span><span style=\"font-family: Arial, sans-serif;\">Protection of the TSF</span></h4>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE employs built-in anti-exploitation capabilities and uses only supported platform APIs and a limited number of 3<sup>rd</sup> party libraries. The TOE uses SemVer format to track TOE versions.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE provides its current version number and capabilities to check for existing updates to the TOE. The TOE is distributed with the OS as a Virtual Appliance, and updates are distributed as a complete virtual appliance image.</p>\r\n<h4 style=\"margin: 10pt 0in 6pt 45pt; text-indent: -45pt; text-align: justify; break-after: avoid; font-size: 11pt; font-family: Cambria, serif; color: rgb(192, 0, 0);\"><span style=\"font-family: Arial, sans-serif;\">Trusted Path/Channels</span></h4>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 11pt; font-family: Arial, sans-serif;\">The TOE performs encryption of transmitted sensitive data using platform provided functionality.</p>","features":[{"id":56,"feature_name":"Certificate Authentication"},{"id":55,"feature_name":"Certificate Validation"},{"id":49,"feature_name":"Credential Storage"},{"id":54,"feature_name":"DRBG"},{"id":51,"feature_name":"HTTPS Client"},{"id":53,"feature_name":"HTTPS Server with Mutual Authentication"},{"id":50,"feature_name":"PBKDF"},{"id":13,"feature_name":"Wifi Security Monitoring"}]}