NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - McAfee Advanced Threat Defense 4.12

Certificate Date:  2021.12.14

Validation Report Number:  CCEVS-VR-VID11219-2021

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 2.2e

CC Testing Lab:  Gossamer Security Solutions


CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]


Product Description

The ATD hardware appliance implements dynamic and statistical analysis on data transmitted through a network to provide malware detection, assessment and classification.

The ATD processes the files through the down selectors for statistical analysis and provides a sandbox test environment which includes virtual machines running customer environments, anti-virus, anti-malware, local blacklist, and whitelists. Files are executed within virtual machine environments that are monitored by the log file. The log file is then used to generate a security report of the potential malware.

For the purpose of evaluation, ATD will be treated as a network device offering CAVP tested cryptographic functions, security auditing, secure administration, trusted updates, self-tests, and secure connections to other servers (e.g., to transmit audit records).


Evaluated Configuration

The ATD evaluated configuration includes software version 4.12 running on one of the following models:

·         ATD-3100 with two E5-2609v4 (Broadwell)

·         ATD-6100 with two E5-2695v4 (Broadwell)


Security Evaluation Summary

The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.  The evaluation demonstrated that the TOE meets the security requirements contained in the Security Target.  The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.  The product, when delivered and configured as identified in the Configuration Guide for Common Criteria Evaluation McAfee Advanced Threat Defense 4.12 document, satisfies all of the security functional requirements stated in the McAfee Advanced Threat Defense 4.12 Security Target, Version 0.4, 12/02/2021.  The project underwent CCEVS Validator review.  The evaluation was completed in December 2021.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11219-2021) prepared by CCEVS.


Environmental Strengths

The logical boundaries of the Advanced Threat Defense are realized in the security functions that it implements. Each of these security functions is summarized below.

Security audit:

The TOE generates audit events associated with identification and authentication, management, updates, and user sessions.  The TOE can store the events in a local log or export them to a syslog server using a TLS protected channel.

Cryptographic support:

The TOE provides CAVP certified cryptography in support of its TLS and NTP implementations.  Cryptographic services include key management, random bit generation, encryption/decryption, digital signature, and secure hashing.

Identification and authentication:

The TOE requires users to be identified and authenticated before they can use functions mediated by the TOE, except for reading the login banner.  It provides the ability to both assign attributes (usernames, passwords, and roles) and to authenticate users against these attributes.  The TOE also provides X.509 certificate checking for its TLS connections.

Security management:

The TOE provides a command line (CLI) management interface as well as a graphical user interface (GUI) accessed via the web.  The web interface is protected with TLS. The management interface is limited to the authorized administrator (as defined by a role).

Protection of the TSF:

The TOE provides a variety of means of protecting itself.  The TOE performs self-tests that cover the correct operation of the TOE. It provides functions necessary to securely update the TOE.  It provides a hardware clock to ensure reliable timestamps and can also sync to an NTP server if configured.  It protects sensitive data such as stored passwords and cryptographic keys so that they are not accessible even by an authorized administrator.

TOE access:

The TOE can be configured to display a logon banner before a user session is established.  The TOE also enforces inactivity timeouts for local and remote sessions.

Trusted path/channels:

The TOE provides a local console which is subject to physical protection. For remote access, the web GUI is protected by TLS thus ensuring protection against modification and disclosure.

The TOE also protects its audit records from modification and disclosure by using TLS to communicate with the syslog server.


Vendor Information


Trellix
Product Certifications
N/A
sec_certs@trellix.com

www.trellix.com
Site Map              Contact Us              Home