Archived U.S. Government Approved Protection Profile - U.S. Government Protection Profile Intrusion Detection System - Analyzer for Basic Robustness Environments, Version 1.3
Short Name: pp_ids_ana_br_v1.3
Technology Type: IDS/IPS
CC Version: 3.1
Date: 25 July 2007
Preceded By: pp_ids_ana_v1.2
Sunset Date: 01 June 2011
Conformance Claim: EAL2 Augmented
Please note: This serves as an addendum to the VR for the Original Evaluated PP
Herewith a brief summary, sufficiently detailed to enable a potential user to determine whether the PP is of interest.
The Common Criteria (CC) Intrusion Detection System Analyzer Protection Profile (PP_IDS_ANA_BR_V1.3) specifies a set of security functional and assurance requirements for Information Technology (IT) products. An Intrusion Detection system (IDS) monitors an IT System for activity that may inappropriately affect the IT System's assets. An IT System may range from a computer system to a computer network. An IDS consists of Sensors, Scanners and Analyzers. Sensors and Scanners collect information regarding IT System activity and vulnerabilities, and they forward the collected information to Analyzers. Analyzers perform intrusion analysis and reporting of the collected information.
PP_IDS_ANA_BR_V1.3 -conformant products support the ability to receive IDS Sensor or Scanner data and then apply analytical processes and information to derive conclusions about intrusions. PP_IDS_ANA_BR_V1.3 conformant products also provide the ability to protect themselves and their associated data from unauthorized access or modification and ensure accountability for authorized actions.
The PP_IDS_ANA_BR_V1.3 provides for a level of protection which is appropriate for IT environments that require detection of malicious and inadvertent attempts to gain inappropriate access to IT resources, where the IDS can be appropriately protected from hostile attacks. Though products that are PP_IDS_ANA_BR_V1.3 -conformant can be used to derive analytical conclusions about a system or network in a hostile environment, they are not designed to resist direct, hostile attacks. The IDSAPP does not fully address the threats posed by malicious administrative or system development personnel. This profile is also not intended to result in products that are foolproof and able to identify intrusion attempts by hostile and well-funded attackers. PP_IDS_ANA_BR_V1.3 -conformant products are suitable for use in both commercial and government environments.
The PP_IDS_ANA_BR_V1.3 was constructed to provide a target and metric for the development of Analyzers. This protection profile identifies security functions and assurances that represent the lowest common set of requirements that should be addressed by a useful Analyzer product.
The PP_IDS_ANA_BR_V1.3 is generally applicable to products regardless of whether they are embedded, stand-alone, centralized, or distributed. However, it addresses only security requirements and not any special considerations of any particular product design.
It should be noted that just because an Analyzer may be conformant with this Protection Profile, that Analyzer should not be assumed to be interoperable with any other IDS component evaluated against a protection profile in the Intrusion Detection System family of Protection Profiles. There are no requirements for interoperability within the Protection Profiles.
July 25, 2007
Assurance maintenance has been performed on this protection profile to update it to the common criteria version 3.1. This update caused a change in version number (from 1.2 to 1.3) that indicates an update has occurred. The updates included revisions based on the assurance requirements of the CC 3.1, removal of FPT_SEP and FPT_RVM since it is now covered by ADV_ARC and replacement of Explicitly stated requirements with Extended requirements (only the nomenclature changed and not the requirements.)
Assigned to the following Validated Product
- VID10423 – ArcSight ESM 4.5 SP3 Patch 2 (software only) with ArcSight Console, ArcSight Manager, ArcSight Database and ArcSight SmartConnectors: Tenable Nessus NSR, Check Point OPSEC NG, Snort DB and Cisco Secure IPS SDEE
Please forward any questions or comments to firstname.lastname@example.org