{"product_id":11634,"v_id":11634,"product_name":"BlackBerry SecuSUITE Server Version 6.0","certification_status":"Certified","certification_date":"2026-01-27T00:00:00Z","tech_type":"Network Device,Remote Access,SIP Server","vendor_id":{"name":"BlackBerry Ltd.","website":"https://www.blackberry.com"},"vendor_poc":"Keith Balasingham","vendor_phone":"(519) 888-7465","vendor_email":"secusuiteinquiries@blackberry.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">The TOE is the SecuSUITE Server Version 6.0.&nbsp; The SecuSUITE Server Version 6.0 enables use of the Session Initiation Protocol (SIP) to establish secure connections between mobile devices.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; font-size: 10pt; font-family: Times, serif;\">The SecuSUITE Server is the centerpiece in the SecuSUITE Security Solution. The SecuSUITE Security Solution includes the SecuSUITE SIP Server and client software<a title=\"\" href=\"#_ftn1\" name=\"_ftnref1\"><sup><span style=\"font-size: 10.0pt; font-family: Times, serif;\">[1]</span></sup></a> for mobile device platforms. Together these form a system that provides end-to-end secure mobile voice communication and instant messaging, using IP-based mobile data connections such as EDGE, UMTS/HSPA, LTE, and Wi-Fi.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">The SecuSUITE Server is an infrastructure component of the SecuSUITE Security Solution.&nbsp; The SecuSUITE Server does not work in isolation but relies on other infrastructure components to enable secure VoIP communications.</p>\r\n<div><br clear=\"all\"><hr align=\"left\" size=\"1\" width=\"33%\">\r\n<div id=\"ftn1\">\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: 'Times New Roman', serif;\"><a title=\"\" href=\"#_ftnref1\" name=\"_ftn1\"><span style=\"font-family: 'Times New Roman', serif; vertical-align: super;\"><span style=\"font-family: 'Times New Roman', serif; vertical-align: super;\"><span style=\"font-size: 10.0pt;\">[1]</span></span></span></a> The client software is the target for another evaluation.</p>\r\n</div>\r\n</div>","evaluation_configuration":"<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">The SecuSUITE Server runs on RHEL 8 OS within an ESXi version 8 virtualized environment using one of the following physical platforms:</p>\r\n<ul style=\"margin-top: 0in; margin-bottom: 0in;\">\r\n<li style=\"margin: 0in 0in 0in 0px; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">Dell PowerEdge R660 system with an Intel Xeon Silver 4510 processor (Sapphire Rapids microarchitecture) running ESXi 8</li>\r\n<li style=\"margin: 0in 0in 6pt 0px; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">PacStar 451 system with an Intel Xeon D-1539 (Broadwell microarchitecture) running ESXi 8.</li>\r\n</ul>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">The Dell PowerEdge R660 system can support either Broadcom Ethernet or Intel Ethernet network interfaces, while the PacStar 451 system supports only Intel Ethernet network interfaces.</p>","security_evaluation_summary":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.&nbsp; The evaluation demonstrated that the TOE<em> </em>meets the security requirements contained in the Security Target.&nbsp; The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.&nbsp; The product, when delivered and configured as identified in the BlackBerry SecuSUITE Server Common Criteria Configuration Guide SecuSUITE for Government 6.0, Version 1.2 document, satisfies all of the security functional requirements stated in the BlackBerry SecuSUITE Server Version 6.0 Security Target, Version 0.7, January 23, 2026.&nbsp; The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in January 2026.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11634-2026) prepared by CCEVS.</p>","environmental_strengths":"<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\">The logical boundaries of the SecuSUITE Server are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p style=\"margin: 0in; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security audit:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE generates audit events for numerous activities including policy enforcement, system management, authentication, and system status (i.e., system log records). The TOE also generates call detail records providing information about connections that are mediated by the TOE. A syslog server in the environment is relied on to store audit and system log records generated by the TOE. The TOE generates a complete audit record including the IP address of the TOE, the event details, and the time the event occurred. The time stamp is provided by the TOE appliance hardware.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Cryptographic support:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE contains CAVP-tested cryptographic implementations that provide key management, random bit generation, encryption/decryption, digital signature, and secure hashing and key-hashing features in support of higher-level cryptographic protocols, including HTTPS, NTP, SSH, and TLS.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>User data protection:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE mediates connections between VVoIP endpoints, allowing enrolled endpoints to establish &ldquo;calls&rdquo; with other enrolled endpoints.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Identification and authentication:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE authenticates administrative users. In order for an administrative user to access the TOE, a user account including a username and password must be created for the user, and an administrative role must be assigned. The TOE performs the validation of the login credentials. The TOE also performs extensive X.509v3 certificate validation checks on certificates it receives as identification and authentication material.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Security management:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE also provides a Web UI (protected by HTTPS) and Command Line Interface (protected by SSH) to configure the TOE. Security management commands are limited to authorized users (i.e., administrators) and available only after they have provided acceptable user identification and authentication data to the TOE. The security management functions are controlled through the use of privileges associated with roles that can be assigned to TOE users. Among the available privileges, only the Authorized Administrator role can actually manage the security policies provided by the TOE and the TOE offers a complete set of functions to facilitate effective management.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Protection of the TSF:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE implements a number of features designed to protect itself to ensure the reliability and integrity of its security features.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">It protects particularly sensitive data such as stored passwords and cryptographic keys so that they are not accessible even by an administrator. It also provides its own timing mechanism to ensure that reliable time information is available (e.g., for log accountability) and can obtain time from external time sources using NTP.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE performs self-tests and integrity checks on TOE executables during system start-up as well as periodically during normal operation. The TOE also includes mechanisms (i.e., verification of the digital signature of each new update package) so that the TOE itself can be updated while ensuring that the updates will not introduce malicious or other unexpected changes in the TOE.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>TOE access:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE can be configured to display a warning banner when an administrator establishes an interactive session and subsequently will enforce an administrator-defined inactivity timeout value after which the inactive session (local or remote) will be terminated.</span></p>\r\n<p style=\"text-align: justify; margin: 0in; font-size: 10pt; font-family: Times, serif;\"><strong>Trusted path/channels:</strong></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE protects interactive communication with administrators using SSHv2 for CLI access, ensuring both integrity and disclosure protection. The TOE also provides a Web UI API interface for security management that is protected with HTTPS/TLS. If the negotiation of an encrypted session (either SSH or TLS) fails or if the user does not have authorization for remote administration, an attempted connection is not established.</span></p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\"><span style=\"font-family: 'Times New Roman', serif;\">The TOE protects communication with network peers, such as an audit server, VVoIP endpoints, ESC devices for trunking, and a VVoIP conferencing system using TLS connections to prevent unintended disclosure or modification of data.</span></p>","features":[{"id":1780,"feature_name":"Asymmetric Key Generation"},{"id":1853,"feature_name":"Auditing"},{"id":1850,"feature_name":"Certificate Authentication"},{"id":1844,"feature_name":"Certificate Validation"},{"id":1842,"feature_name":"Cryptographic Hashing"},{"id":1781,"feature_name":"Cryptographic Key Establishment"},{"id":1782,"feature_name":"Cryptographic Signature Verification"},{"id":1778,"feature_name":"DRBG"},{"id":1852,"feature_name":"Enterprise Session Controller"},{"id":1848,"feature_name":"HTTPS Client"},{"id":1849,"feature_name":"HTTPS Server with Mutual Authentication"},{"id":1854,"feature_name":"Key Destruction"},{"id":1843,"feature_name":"Keyed-hash message authentication"},{"id":1847,"feature_name":"SSH Server"},{"id":1851,"feature_name":"TLS 1.2"},{"id":1846,"feature_name":"TLS Client"},{"id":1845,"feature_name":"TLS Server with Mutual Authentication"},{"id":1779,"feature_name":"Virtual Network Device"}]}