Compliant Product - Cisco AnyConnect Secure Mobility Client v4.10 for Red Hat Enterprise Linux 8.1
Certificate Date: 2022.07.18CC Certificate Security Target Validation Report
Validation Report Number: CCEVS-VR-VID11289-2022
Product Type: Virtual Private Network
Conformance Claim: Protection Profile Compliant
PP Identifier: PP-Module for VPN Client, Version 2.3
Protection Profile for Application Software Version 1.3
CC Testing Lab: Gossamer Security Solutions
The Cisco AnyConnect Target of Evaluation (TOE) is a client application that provides remote users a secure VPN tunnel to protect data in transit on both IPv4 and IPv6 networks. The TOE provides IPsec to authenticate and encrypt network traffic travelling across an unprotected public network. By protecting the communication from unauthorized disclosure or modification, remote users can securely connect to an organization’s network resources and applications.
The evaluated configuration is the Cisco AnyConnect Secure Mobility Client v4.10 installed on Red Hat Enterprise Linux 8.1.
Security Evaluation Summary
The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance. The evaluation demonstrated that the TOE meets the security requirements contained in the Security Target. The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017. The product, when delivered and configured as identified in the Cisco AnyConnect Secure Mobility Client v4.10 for Red Hat Enterprise Linux 8.1 CC Configuration Guide, Version 0.3, July 15, 2022 document, satisfies all of the security functional requirements stated in the Cisco AnyConnect Secure Mobility Client v4.10 for Red Hat Enterprise Linux 8.1 Security Target, Version 0.3, July 15, 2022. The project underwent CCEVS Validator review. The evaluation was completed in July 2022. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11289-2022) prepared by CCEVS.
The logical boundaries of the AnyConnect Secure Mobility Client v4.10 for Red Hat Enterprise Linux 8.1 are realized in the security functions that it implements. Each of these security functions is summarized below.
The TOE incorporates a cryptographic module, CiscoSSL FIPS Object Module, to provide the cryptography in support of IPsec with ESP symmetric cryptography for bulk AES encryption/decryption and SHA-2 algorithm for hashing. In addition, the TOE provides the cryptography to support Elliptic-Curve Diffie-Hellman key exchange and the derivation function used in the IKEv2 and ESP protocols. The cryptographic algorithm implementation has been validated Cryptographic Algorithm Validation Program (CAVP) conformance. See Table 15 in the CAVP Certificates Section of the Security Target for certificate references.
The TOE platform provides asymmetric cryptography, which is used by the TOE for IKE peer authentication using digital signature and hashing services. In addition, the TOE platform provides a Deterministic Random Bit Generator (DRBG).
User data protection:
The TOE platform ensures that residual information from previously sent network packets processed through the platform are protected from being passed into subsequent network packets.
Identification and authentication:
The TOE and TOE platform perform device-level X.509 certificate-based authentication of the VPN Gateway during IKE v2 key exchange. Device-level authentication allows the TOE to establish a secure channel with a trusted VPN Gateway. The secure channel is established only after each endpoint successfully authenticates each other.
The TOE, TOE platform, and VPN Gateway provide the management functions to configure the security functionality provided by the TOE. The TOE provides a Security Administrator role and only the Security Administrator can perform security management functions.
The TOE does not store or transmit Personally Identifiable Information (PII) over a network.
Protection of the TSF:
The TOE performs a suite of self-tests during initial start-up to verify correct operation of its CAVP tested algorithms. Upon execution, the integrity of the TOEs software executables is also verified.
The TOE Platform provides for verification of TOE software updates prior to installation.
The TOE’s implementation of IPsec provides a trusted channel ensuring sensitive data is protected from unauthorized disclosure or modification when transmitted from the host to a VPN gateway.
Cisco Systems, Inc.