{"product_id":11640,"v_id":11640,"product_name":"BlackBerry SecuSUITE version 6.0 and BlackBerry Envoy version 6.0 Client","certification_status":"Certified","certification_date":"2026-02-19T00:00:00Z","tech_type":"Application Software,Network Encryption,VoIP","vendor_id":{"name":"BlackBerry Ltd.","website":"https://www.blackberry.com"},"vendor_poc":"Keith Balasingham","vendor_phone":"(519) 888-7465","vendor_email":"secusuiteinquiries@blackberry.com","assigned_lab":{"cctl_name":"Gossamer Security Solutions"},"product_description":"<p>The Target of Evaluation (TOE) is BlackBerry SecuSUITE version 6.0 and BlackBerry Envoy version 6.0 Client.</p>\r\n<p><span style=\"text-decoration: underline;\"><em>User Context</em></span></p>\r\n<p>The TOE user downloads the TOE from an app store (e.g., Apple Store, Google Play). On first use of the app, the user must go through a registration process in order to register to a specified BlackBerry SecuSUITE Server (identified by URI).</p>\r\n<p>Once registered, the user can place secure VoIP calls using the app with largely the same interactions as with a normal phone call. The SecuSUITE Client provides encryption of user call signaling and voice data.</p>\r\n<p>Users are typically invited to join SecuSUITE/Envoy service via an activation email initiated by their corporate IT administrator who adds users via the BlackBerry SecuSUITE Server administration portal. The activation email includes the activation credentials as well as the option to scan a QR code to initiate the registration with the SCA server.</p>\r\n<p><em><span style=\"text-decoration: underline;\">SecuSUITE Context</span></em></p>\r\n<p>The TOE is part of the SecuSUITE Security Solution. The TOE does not work in isolation, but relies on BlackBerry SecuSUITE Server components to enable a secure VoIP communication.</p>\r\n<p><em><span style=\"text-decoration: underline;\">VVoIP Client</span></em></p>\r\n<p>The SecuSUITE Client establishes a secure tunnel for voice communications with another SecuSUITE/Envoy client or the SecuSUITE Server. The tunnel provides confidentiality, integrity, and data authentication for information that travels across the public network. This occurs using the Secure Real-Time Transport Protocol (SRTP) that has been established using the Session Description Protocol (SDP) and the Security Descriptions for Media Streams (SDES) for SDP &ndash; the TOE supports SDES-SRTP.</p>\r\n<p>The TOE Client also protects communications between itself and the SIP Server by using a Transport Layer Security (TLS)-protected signaling channel. To register the TOE within the domain, the TOE is required to be password authenticated by the SIP Server. The TOE also makes use of certificates to authenticate both the SIP server end and the TOE itself through the TLS connection.</p>\r\n<p><span style=\"text-decoration: underline;\"><em>Group/Conference Calls</em></span></p>\r\n<p>Besides the peer-to-peer calls between two instances of the TOE, the SecuSUITE/Envoy solution also allows the setup of a secure conference call between a group of SecuSUITE users. For that, individual calls and trusted channels are established between all TOEs participating in the group call (for a group call between 4 participants, every TOE has 3 individual calls to the members of the group). The individual SIP and SRTP connections are established exactly the same way the peer-to-peer calls are setup via the SecuSUITE Server. They are encrypted end-2-end and the individually decrypted audio stream is mixed only locally by each client so that no clear text representations of the audio streams exist in a central component.</p>\r\n<p><em><span style=\"text-decoration: underline;\">Secure Text Messaging</span></em></p>\r\n<p>The TOE client allows encrypted instant message transfer between client applications. Secure Text Messaging utilizes the same TLS protected communication channel that is used during initial SCA registration used to transfer client configuration settings and SIP credentials between SecuSUITE Server and client.</p>\r\n<p><span style=\"text-decoration: underline;\"><em>Group Messaging</em></span></p>\r\n<p>Besides the peer-to-peer text messaging between two instances of the TOE, the SecuSUITE/Envoy solution also allows the setup of messaging groups between an arbitrary number of SecuSUITE users. The messages are individually encrypted for all TOE users participating in the group messaging session the same way peer-to-peer messages <em><span style=\"text-decoration: underline;\">are protected.</span></em></p>\r\n<p><em><span style=\"text-decoration: underline;\">Calls Destined Beyond the SecuSUITE Server</span></em></p>\r\n<p>The TOE always encrypts the user&rsquo;s call signaling and data (voice) transmitted to other TOE VoIP endpoints registered with the SecuSUITE Server and transmitted to the SecuSUITE Server itself. The SecuSUITE Server administrator can configure calling to additional endpoints which are reached through a PBX (another SIP server connected to local/internal landline phones and potentially connected to outside phone lines). If configured, the TOE can then place calls to additional endpoints beyond the SecuSUITE Server through the configured PBX; however, because the call signaling and call data travels beyond the SecuSUITE Server itself, its security lies beyond the TOE and SecuSUITE Server&rsquo;s control.</p>\r\n<p>While the ability of the SecuSUITE Server to route calls to additional endpoints through a PBX lies beyond the scope of this ASPP14/PKGTLS11/VVoIPAS10 evaluation, the TOE can indicate when a user&rsquo;s call travels beyond the SecuSUITE Server.</p>\r\n<p>The SecuSUITE Server allows an administrator to configure (refer to BlackBerry SecuSUITE Server evaluation VID11634 against the Enterprise Session Controller Protection Profile) which phone number prefixes the administrator deems &ldquo;land secure&rdquo; and which calls &ldquo;breakout&rdquo; to external phone lines (with unknown security). By default, the SecuSUITE Server treats all calls routed to the PBX as &ldquo;breakout&rdquo; calls. These designations cause an image indicating this disposition of the call to appear on the TOE&rsquo;s User Interface (UI) as described in the Common Criteria Configuration Guide. Again, while beyond the scope of this evaluation, the concepts of &ldquo;Secure Landing&rdquo; and &ldquo;Breakout Calls&rdquo; are useful for TOE users to understand, in the event that their administrator has configured their SecuSUITE Server to route calls to additional endpoints through a PBX.</p>\r\n<p><em><span style=\"text-decoration: underline;\">Envoy Client</span></em></p>\r\n<p>The Envoy Client is a branded version of the SecuSUITE client that is identical from functional and security implementation perspective. The Envoy client is distributed by BlackBerry and differs basically in the used UI assets and product publishing.</p>","evaluation_configuration":"<p>The evaluated configuration is BlackBerry SecuSUITE version 6.0 and BlackBerry Envoy version 6.0 Client installed on Android 14, iOS 17 or iPadOS 17. Please note that the same TOE compiled for Apple platforms executes on both iOS and iPadOS.</p>\r\n<p style=\"margin: 0in 0in 6pt; text-align: justify; line-height: 11pt; font-size: 10pt; font-family: Times, serif;\">&nbsp;</p>","security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.&nbsp; The evaluation demonstrated that the TOE meets the security requirements contained in the Security Target.&nbsp; The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.&nbsp; The product, when delivered and configured as identified in the BlackBerry SecuSUITE 6.0 Common Criteria Guide, Version 2 10a, Release 6.0 document, satisfies all of the security functional requirements stated in the BlackBerry SecuSUITE version 6.0 and BlackBerry Envoy version 6.0 Client Security Target, Version 0.6, February 17, 2026.&nbsp; The project underwent CCEVS Validator review.&nbsp; The evaluation was completed in February 2026.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11640-2026) prepared by CCEVS.</p>\r\n<p>&nbsp;</p>","environmental_strengths":"<p>The logical boundaries of the SecuSUITE/Envoy Client are realized in the security functions that it implements. Each of these security functions is summarized below.</p>\r\n<p><strong>Communication:</strong></p>\r\n<p>The TOE utilizes the Opus codec by default to transmit voice media. The Opus codec utilizes a fixed bit-rate.</p>\r\n<p><strong>Cryptographic support:</strong></p>\r\n<p>The TOE includes its own cryptographic module to perform operations in support of authentication actions and network communications using the TLS and SRTP protocol. The TOE implements TLS version 1.2 with mutual authentication using elliptic-curve cryptography. The TOE also relies upon its platform for certain cryptographic operations, including providing random data to seed the TOE&rsquo;s own DRBG. The TOE relies upon the platform (i.e., iOS, iPadOS, and Android) cryptographic libraries for operations related to protecting keys in platform offer storage (i.e., a key store).</p>\r\n<p><strong>User data protection:</strong></p>\r\n<p>The TOE enforces the media transmission policy when communicating with remote VVoIP endpoints which use TLS and SRTP protocols. The TOE also ensures that communication with an SCA server is protected using TLS. The TOE protects user data by utilizing platform services for data storage.</p>\r\n<p><strong>Identification and authentication:</strong></p>\r\n<p>The TOE authenticates TLS peers using X.509v3 certificates. It performs extensive X.509 certificate validation checks on these certificates, rejecting invalid or revoked certificates.</p>\r\n<p><strong>Security management:</strong></p>\r\n<p>The TOE receives configuration setting during its registration with an SCA server. The client allows management operations that specify the SIP server to use for connections.</p>\r\n<p><strong>Privacy:</strong></p>\r\n<p>The TOE does not transmit Personally Identifiable Information over any network interfaces.</p>\r\n<p><strong>Protection of the TSF:</strong></p>\r\n<p>The TOE relies on the physical boundary of the evaluated platform as well as the Android and iOS/iPadOS operating systems for the protection of the TOE&rsquo;s application components.</p>\r\n<p>The TOE relies upon these platforms to indicate the current TOE version. If an update is needed, it is obtained from the platform&rsquo;s application store. The TOE&rsquo;s software is digitally signed in accordance with the requirements of each application store.</p>\r\n<p>The native Apple and Android cryptographic library, which provides some of the TOE&rsquo;s cryptographic services, have built-in self-tests that are run at client start-up to ensure that the algorithms are correct. If any self-tests fail, the TOE will not be able to perform its cryptographic services. The TOE includes its own cryptographic library that also includes self-tests that are run when the client starts.</p>\r\n<p><strong>TOE access:</strong></p>\r\n<p>The TOE includes a 15 second default timeout that can terminate idle voice/video transmission. This timeout value can be changed by the configuration obtained from the SCA server.</p>\r\n<p><strong>Trusted path/channels:</strong></p>\r\n<p>The TOE encrypts all data transmitted with an Enterprise Session Controller and another VVoIP endpoint using TLS to protect HTTPS, SIP and SRTP communications. The TLS channel established with an ESC or VVoIP endpoint can be used to exchange SIP messages or to initiate the use of SRTP for voice/video traffic.</p>","features":[]}