{"product_id":2018,"v_id":2018,"product_name":"Symantec CyberWolf, Version 2.0","certification_status":"Not Certified","certification_date":"2004-06-04T00:06:00Z","tech_type":"Wireless Monitoring","vendor_id":{"name":"Symantec Corporation","website":"www.symantec.com"},"vendor_poc":"Ronald Partridge","vendor_phone":"801.444.3527","vendor_email":"rpartridge@symantec.com","assigned_lab":{"cctl_name":"DXC.technology"},"product_description":"The TOE is an automated incident reporting system designed for security operations centers and managed security service providers that need automated incident reports in near real-time. CyberWolf provides correlation of high volume of security alert information generated by computers, network devices, and intrusion detection sensors. CyberWolf automates the detection and analysis of events and alerts to define security incidents. By analyzing the thousands of alerts most likely present during an attack, CyberWolf tracks and correlates these alerts to determine attack patterns and the development of a security incident.","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The evaluation demonstrated that the product meets the security requirements contained in the Security Target. The criteria against which CyberWolf was judged are described in the <em>Common Criteria for Information Technology Security Evaluation, Version 2.1. </em>The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 1.0. Computer Sciences Corporation determined that the evaluation assurance level (EAL) for the product is EAL2. The product, when configured and installed according to supplied guidance, satisfies all of the security functional requirements stated in the Security Target. A validator, on behalf of the CCEVS Validation Body, monitored the evaluation carried out by Computer Sciences Corporation. The evaluation was completed in May 2004. Results of the evaluation can be found in the NIAP CCEVS Report, CCEVS-VR-04-0061 prepared by NIAP CCEVS.<br />\r\n</p>","environmental_strengths":"<p>The TOE provides the following security features:</p>\r\n<p><strong>Security Management (TSF_FMT):</strong> CyberWolf differentiates between four user roles. Each user role is assigned a limited number of security functions that the role can perform on the TOE. The roles defined for TOE usage are: Administrator, Senior Incident Handler, Junior Incident Handler, Read-Only User.</p>\r\n<p><strong>User Action Log (TSF_UAL): </strong>CyberWolf collects a log of certain user actions that result in changes to the Oracle database. The logs include the user name performing the action, the type of even, the date and time of the event, and the outcome of the event.</p>\r\n<p><strong>Data Collection (TSF_EDC): </strong>CyberWolf utilizes its Device Experts to collect data from security components outside the TOE. The TOE contains the RealSecure Device Expert which is programmed to read fro the RealSecure database and the Snort Device Expert which reads from the Snort log file.<br />\r\n<br />\r\n<strong>Key Management (TSF_KMG): </strong>CyberWolf performs Key Management through the use of the Monitor subsystem. The Monitor maintains a list of each of the active keys and their associated components. As each component starts, it generates its own symmetric secret key. The Monitor subsystem performs key management for the Manager, SecurSite, and each Device Expert subsystem.</p>\r\n<p><strong>Communications Security (TSF_CCS): </strong>All message traffic between CyberWolf components is encypted. At the time CyberWolf is installed, the type of encryption can be selected. When the Monitor component is installed, it generates a shared secret key of maximum length. This secret key is then encrypted with a pseudo-random password. They key is then used as an encryption key for sending messages to the CyberWolf Monitor. The CyberWolf Monitor uses it as its decryption key.</p>\r\n<p><strong>Data Reporting (TSF_DRE): </strong>Reporting is done in both real-time for listing alerts and incidents and generated graphically in predefined intervals. Reports are viewable by all valid CyberWolf users. Reports are generated on a daily and weekly basis. By default daily reports are generated at 2:00AM everyday and weekly reports are generated on every Wednesday at the same time specified for the daily reports (i.e. 2:00AM). Users must manually edit the reports configuration file if the desired reporting schedule does not match the default settings. CyberWolf reports are generated directly from the data in the database at the time the report is run.<br />\r\n</p>","features":[]}