NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 13- Spring

Certificate Date:  2023.04.26

Validation Report Number:  CCEVS-VR-VID11342-2023

Product Type:    Virtual Private Network
   Mobility
   Wireless LAN
   Network Encryption

Conformance Claim:  Protection Profile Compliant

PP Identifier:    PP-Module for Bluetooth Version 1.0
  PP-Module for VPN Client, Version 2.4
  PP-Module for Wireless Local Area Network (WLAN) Client Version 1.0
  Functional Package for TLS Version 1.1
  Protection Profile for Mobile Device Fundamentals Version 3.2

CC Testing Lab:  Gossamer Security Solutions


CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]


Product Description

The TOE is a mobile device based on Android 13 with a built-in IPsec VPN client and modifications made to increase the level of security provided to end users and enterprises. The TOE is intended for use as part of an enterprise mobility solution providing mobile staff with enterprise connectivity.

The TOE includes a Common Criteria mode (or “CC mode”) that an administrator can invoke using an MDM.  The TOE must meet the following prerequisites in order for an administrator to transition the TOE to and remain in the CC configuration.

o   Require a boot and device lock password (swipe, PIN, pattern, accessibility (direction), screen locks are not allowed). Acceptable biometrics vary with the device for the device lock.

o   The maximum password failure retry policy should be less than or equal to 30.

o   A screen lock password required to decrypt data on boot.

o   Revocation checking must be enabled.

o   Security and audit logging must be enabled.

o   External storage must be encrypted.

o   Developer debugging must be disabled.

o   When CC mode has been enabled, the TOE behaves as follows:

The TOE sets the system wide Android CC mode property to be enabled.

The TOE prevents loading of custom firmware/kernels and requires all updates occur through FOTA.

The TOE utilizes ACVP/CAVP approved cryptographic ciphers for TLS.

The TOE includes the ability to create separate profiles part of the Knox Platform. A profile provides a way to segment applications and data into two separate areas on the device, such as a personal area and a work area, each with its own separate apps, data and security policies. For this effort, the TOE was evaluated both without and with profiles created. Thus, the evaluation includes several Knox-specific claims that apply when these profiles are created.

There are different models of the TOE, the Samsung Galaxy Devices on Android 13, and these models differ in their internal components (as described in the table below). All devices are A64 architecture.


Evaluated Configuration

The model numbers of the mobile devices used during evaluation testing are as follows:

Device Name

Chipset Vendor

SoC

Arch

Kernel

Build Number

Galaxy S23 Ultra 5G

Qualcomm

Snapdragon 8 Gen 2 Mobile Platform

ARMv8

5.15

TP1A.220624.014

Galaxy S22 Ultra 5G

Samsung

Exynos 2200

ARMv8

5.10

TP1A.220624.014

Galaxy S22 5G

Qualcomm

Snapdragon 8 Gen 1 Mobile Platform

ARMv8

5.10

TP1A.220624.014

Galaxy S21 Ultra 5G

Samsung

Exynos 2100

ARMv8

5.4

TP1A.220624.014

Galaxy S21 Ultra 5G

Qualcomm

Snapdragon 888

ARMv8

5.4

TP1A.220624.014

Galaxy S20+ 5G

Samsung

Exynos 990

ARMv8

4.19

TP1A.220624.014

Galaxy S20+ 5G

Qualcomm

Snapdragon 865

ARMv8

4.19

TP1A.220624.014

Galaxy Z Flip

Qualcomm

Snapdragon 855+

ARMv8

4.14

TP1A.220624.014

Galaxy XCover Pro

Samsung

Exynos 9611

ARMv8

4.14

TP1A.220624.014

Galaxy A53 5G

Samsung

Exynos 1280

ARMv8

5.10

SP1A.210812.016

Galaxy XCover6 Pro

Qualcomm

Snapdragon 778G

ARMv8

5.4

SP1A.210812.016

Evaluated Devices

In addition to the evaluated devices, the following are claimed as equivalent:

Evaluated Device

SoC

Equivalent Devices

Differences

Galaxy S23 Ultra 5G

Qualcomm

Galaxy S23+ 5G

S23 Ultra > S23+ > S23 in terms of display size

Galaxy S23 5G

 

Galaxy S22 Ultra 5G

Exynos 2200

Galaxy S22+ 5G

S22 Ultra > S22+ > S22 in terms of display size

Galaxy S22 5G

S22+ & S22 devices have S21 Ultra 5G Wi-Fi chip

Galaxy S22 5G

Snapdragon 8 Gen 1

Galaxy S22 Ultra 5G

S22 Ultra > S22+ > S22 in terms of display size

Galaxy S22+ 5G

S22+ & S22 devices have S21 Ultra 5G Wi-Fi chip

Galaxy Tab S8 Ultra

Tab S8 devices are tablets (no voice calling) with S Pen

Galaxy Tab S8+

Tab S8 Ultra > Tab S8+ > Tab S7 in terms of display size

Galaxy Tab S8

Tab S8 Ultra & Tab S8+ have under screen image fingerprint sensor
Tab S8 has power button fingerprint sensor

Galaxy Z Flip4 5G

Z Flip4 & Z Fold4 have 2 displays & folding display

Galaxy Z Fold4 5G

Z Fold4 > Z Flip4 in terms of display size

Galaxy S21 Ultra 5G

Exynos 2100

Galaxy S21+ 5G

S21 Ultra > S21+ > S21 > S21 FE in terms of display size

Galaxy S21 5G

S21+ & S21 devices have S20+ 5G Wi-Fi chip

Galaxy S21 Ultra 5G

Snapdragon 888

Galaxy S21+ 5G

S21 Ultra > S21+ > S21 > S21 FE in terms of display size

Galaxy S21 5G

S21+ & S21 devices have S20+ 5G Wi-Fi chip

Galaxy S21 5G FE

Z Fold3 5G & Z Flip3 5G have 2 displays & folding display

Galaxy Z Fold3 5G

Z Fold3 5G & Z Flip3 5G have power button fingerprint sensor

Galaxy Z Flip3 5G

Z Fold3 & Z Flip3 have S22 Ultra Wi-Fi chip

Galaxy S20+ 5G

Exynos 990

Galaxy Note20 Ultra 5G

S20 Ultra > S20+ > S20 > S20 FE in terms of display size

Galaxy Note20 Ultra LTE

Galaxy Note20 5G

5G devices have different cellular modem

Galaxy Note20 LTE

Galaxy S20 Ultra 5G

Note20 Ultra > Note20 in terms of display size

Galaxy S20+ LTE

Galaxy S20 5G

Note20 devices include S Pen & functionality to take advantage of it for input (not security related)

Galaxy S20 LTE

Galaxy S20 FE

Galaxy S20+ 5G

Snapdragon 865

Galaxy Z Fold2 5G

S20 Ultra > S20+ > S20 > S20 FE in terms of display size

Galaxy Note20 Ultra 5G

Note20 Ultra > Note20 in terms of display size

Galaxy Note20 5G

Note20 devices include S Pen & functionality to take advantage of it for input (not security related)

Galaxy Tab S7+

Z Fold2 5G & Z Flip have 2 displays & folding display

Galaxy Tab S7

Tab S7 devices are tablets (no voice calling) with S Pen

Galaxy Z Flip 5G

Tx70 tablets only have Wi-Fi, others have cellular

Galaxy S20 Ultra 5G

Tab S7+ > Tab S7 in terms of display size

Galaxy S20 5G

Tab S7+ & S20 FE have under screen image fingerprint sensor

Galaxy S20 FE

Tab S7 & Z Flip 5G have power button fingerprint sensor

Galaxy Z Flip

Snapdragon 855+

N/A

 

Galaxy XCover Pro

Exynos 9611

Galaxy A51

XCover Pro is ruggedized

XCover Pro has Push-to-Talk button

XCover Pro has removable battery

A51 has under screen image fingerprint sensor

Galaxy XCover6 Pro

Snapdragon 778G

Galaxy Tab Active4 Pro

Tab Active4 Pro is tablet and have bigger screen size

 

Equivalent Devices

Equivalent devices are claimed as equivalent with a note about the differences between the evaluated device (first column) and the equivalent models (noted in the third column with the differences in the fourth column). Equivalence in this table is determined by the use of identical processors, kernel and build number, and is not made across processor types. If a device may be released with different processors around the world, a version of the device with each processor will be tested, and equivalence will be claimed specifically to similar devices utilizing the same processor. For example, the Galaxy S22 Ultra 5G has variants with a Samsung Exynos processor and a Qualcomm Snapdragon processor that were evaluated. The other Galaxy S22 devices are claimed as equivalent based on their processor, so S22 devices with a Qualcomm processor are not considered equivalent to S22 devices with a Samsung processor.

The Differences column in the table denotes the differences between the evaluated device and those listed in the Equivalent column (which typically contains multiple different derivative devices), and are not meant to line up with the devices listed in the Equivalent column itself. Except in the case of a different Wi-Fi radios or biometric sensors (in which case the radio or biometric is tested on a different device and so always verified as part of the evaluation), any differences between the evaluated device and claimed equivalent devices are outside the requirements of the evaluation requirements, such as screen size/type/resolution, battery size, position of ports.      In general, the devices include a final letter or number at the end of the name that denotes that the device is for a specific carrier or region (for example, U = US Carrier build and F = International, which were used during the evaluation).

For each device, there are specific models that are validated.  This table lists the specific carrier models that have the validated configuration (covering both evaluated and equivalent devices).

Device Name

Chipset Vendor

Chipset Name

Base Model Number

Carrier Models

Galaxy S23 Ultra 5G

Qualcomm

Snapdragon 8 Gen2 (SM8550)

SM-S918

W, B, N, U1, U, SC52D*, SCG20*

Galaxy S23+ 5G

Qualcomm

Snapdragon 8 Gen2 (SM8550)

SM-S916

W, B, N, U1, U

Galaxy S23 5G

Qualcomm

Snapdragon 8 Gen2 (SM8550)

SM-S911

W, B, N, U1, U, SC51D*, SCG19*

Galaxy S22 Ultra 5G

Samsung

Exynos 2200

SM-G908

B

Galaxy S22 Ultra 5G

Qualcomm

Snapdragon 8 Gen 1 (SM8450)

SM-G908

W, E, N, U1, U, SC52C*, SCG14*

Galaxy S22+ 5G

Samsung

Exynos 2200

SM-G906

B

Galaxy S22+ 5G

Qualcomm

Snapdragon 8 Gen 1 (SM8450)

SM-G906

W, E, N, U1, U

Galaxy S22 5G

Samsung

Exynos 2200

SM-G901

B

Galaxy S22 5G

Qualcomm

Snapdragon 8 Gen 1 (SM8450)

SM-G901

W, E, N, U1, U, SC51C*, SCG13*

Galaxy S21 Ultra 5G

Samsung

Exynos 2100

SM-G998

B, N

Galaxy S21 Ultra 5G

Qualcomm

Snapdragon 888 (SM8350)

SM-G998

W, U1, U, SC52B*

Galaxy S21+ 5G

Samsung

Exynos 2100

SM-G996

B, N

Galaxy S21+ 5G

Qualcomm

Snapdragon 888 (SM8350)

SM-G996

W, U1, U, SCG10*

Galaxy S21 5G

Samsung

Exynos 2100

SM-G991

B, N

Galaxy S21 5G

Qualcomm

Snapdragon 888 (SM8350)

SM-G991

W, Q, U1, U, SC51B*, SCG09*

Galaxy S21 5G FE

Qualcomm

Snapdragon 888 (SM8350)

SM-G990

W, W2, B, B2, U1, U3, U, U2

Galaxy S20 Ultra 5G

Samsung

Exynos 990

SM-G988

B

Galaxy S20 Ultra 5G

Qualcomm

Snapdragon 865 (SM8250)

SM-G988

W, N, U1, U, SCG03*

Galaxy S20+ 5G

Samsung

Exynos 990

SM-G986

B

Galaxy S20+ 5G

Qualcomm

Snapdragon 865 (SM8250)

SM-G986

W, N, U1, U, SC52A*, SCG02*

Galaxy S20+ LTE

Samsung

Exynos 990

SM-G985

F

Galaxy S20 5G

Samsung

Exynos 990

SM-G981

B

Galaxy S20 5G

Qualcomm

Snapdragon 865 (SM8250)

SM-G981

W, N, U1, V, U, SC51A*, SCG01*

Galaxy S20 LTE

Samsung

Exynos 990

SM-G980

F

Galaxy S20 FE

Samsung

Exynos 990

SM-G780

F

Galaxy S20 FE

Qualcomm

Snapdragon 865 (SM8250)

SM-G781

W, B, N, U1, V, U

Galaxy Z Fold4 5G

Qualcomm

Snapdragon 8+ Gen 1 (SM8475)

SM-F936

W, B, N, U1, U, SC-55C*, SCG16*

Galaxy Z Fold3 5G

Qualcomm

Snapdragon 888 (SM8350)

SM-F926

W, B, N, U1, U, SC-55B*, SCG11*

Galaxy Z Fold2 5G

Qualcomm

Snapdragon 865+ (SM8250)

SM-F916

W, B, N, U1, U

Galaxy Z Flip4

Qualcomm

Snapdragon 8+ Gen 1 (SM8475)

SM-F721

W, B, C, N, U1, U, SC-54C*, SCG17*,

Galaxy Z Flip3 5G

Qualcomm

Snapdragon 888 (SM8350)

SM-F711

W, B, N, U1, U, SC-54B*, SCG12*

Galaxy Z Flip 5G

Qualcomm

Snapdragon 865+ (SM8250)

SM-F707

W, B, N, U1, U, SCG04*

Galaxy Z Flip

Qualcomm

Snapdragon 855+ (SM8150)

SM-F700

W, F, N, U1, U, SCV47*

Galaxy Note20 Ultra 5G

Samsung

Exynos 990

SM-N986

B

Galaxy Note20 Ultra 5G

Qualcomm

Snapdragon 865+ (SM8250)

SM-N986

W, N, U1, U, SC53A*, SCG06*

Galaxy Note20 Ultra LTE

Samsung

Exynos 990

SM-N985

F

Galaxy Note20 5G

Samsung

Exynos 990

SM-N981

B

Galaxy Note20 5G

Qualcomm

Snapdragon 865+ (SM8250)

SM-N981

W, N, U1, U

Galaxy Note20 LTE

Samsung

Exynos 990

SM-N980

F

Galaxy Tab S8 Ultra

Qualcomm

Snapdragon 8 Gen 1 (SM8450)

SM-X906

B, N

SM-X900

None

Galaxy Tab S8+

Qualcomm

Snapdragon 8 Gen 1 (SM8450)

SM-X808

U

SM-X806

B, N, E

SM-X800

None

Galaxy Tab S8

Qualcomm

Snapdragon 8 Gen 1 (SM8450)

SM-X708

U

SM-X706

B, N

SM-X700

None

Galaxy Tab S7+

Qualcomm

Snapdragon 865+ (SM8250)

SM-T978

U

SM-T976

B, N

SM-T975

N, None

SM-T970

None

Galaxy Tab S7

Qualcomm

Snapdragon 865+ (SM8250)

SM-T878

U

SM-T875

N, None

SM-T870

None

Galaxy XCover Pro

Samsung

Exynos 9611

SM-G715

A, FN, U, W

Galaxy A51

Samsung

Exynos 9611

SM-A515

F, U, U1, W

SM-S515

DL

Galaxy XCover6 Pro

Qualcomm

Snapdragon 778G (SM7325)

SM-G736

W, B, U1, U

Galaxy A53 5G

Samsung

Exynos 1280 (S5E8825)

SM-A536

W, E, B, N, U1, V, U, SC-53C*, SCG15*

SM-S536

DL

Galaxy Tab Active4 Pro

Qualcomm

Snapdragon 778G (SM7325)

SM-T636

B, N

SM-T638

U

SM-T630

None

 

 

 

 


Security Evaluation Summary

The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance.  The evaluation demonstrated that the TOE meets the security requirements contained in the Security Target.  The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.  The product, when delivered and configured as identified in the Samsung Android 13 on Galaxy Devices Administrator Guide, Version 9.0.2, April 13, 2023 document, satisfies all of the security functional requirements stated in the Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 13 – Spring Security Target, Version 0.5, April 13, 2023.  The project underwent CCEVS Validator review.  The evaluation was completed in April 2023.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11342-2023) prepared by CCEVS.


Environmental Strengths

The logical boundaries of the Samsung Galaxy Devices on Android 13 - Spring are realized in the security functions that it implements. Each of these security functions is summarized below.

Security audit:

The TOE generates logs for a range of security relevant events. The TOE stores the logs locally so they can be accessed by an administrator or they can be exported to an MDM.

Cryptographic support:

The TOE includes multiple cryptographic libraries with ACVP certified algorithms for a wide range of cryptographic functions including the following: asymmetric key generation and establishment, symmetric key generation, encryption/decryption, cryptographic hashing and keyed-hash message authentication. These functions are supported with suitable random bit generation, key derivation, salt generation, initialization vector generation, secure key storage, and key and protected data destruction. These primitive cryptographic functions are used to implement security protocols such as TLS, EAP-TLS, IPsec, and HTTPS and to encrypt the media (including the generation and protection of data and key encryption keys) used by the TOE. Many of these cryptographic functions are also accessible as services to applications running on the TOE.

User data protection:

The TOE controls access to system services by hosted applications, including protection of the Trust Anchor Database. Additionally, the TOE protects user and other sensitive data using encryption so that even if a device is physically lost, the data remains protected. The functionality provided by work profiles and Knox Separated Apps enhance the security of user data by providing an additional layer of separation between different categories of apps and data while the device is in use. The TOE ensures that residual information is protected from potential reuse in accessible objects such as network packets.

Identification and authentication:

The TOE supports a number of features related to identification and authentication. From a user perspective, except for making phone calls to an emergency number, a password or Biometric Authentication Factor (BAF) must be correctly entered to unlock the TOE. In addition, even when the TOE is unlocked the password must be re-entered to change the password or re-enroll the biometric template. Passwords are obscured when entered so they cannot be read from the TOE's display, the frequency of entering passwords is limited and when a configured number of failures occurs, the TOE will be wiped to protect its contents. Passwords can be constructed using upper and lower case characters, numbers, and special characters and passwords between 4 and 16 characters are supported.

The TOE can also serve as an 802.1X supplicant and can use X.509v3 and validate certificates for EAP-TLS, TLS and IPsec exchanges. The TOE can also act as a client or server in an authenticated Bluetooth pairing. In addition to storing X.509 certificates used for IPsec connections, the TOE can also securely store pre-shared keys for VPN connections.

Security management:

The TOE provides all the interfaces necessary to manage the security functions (including the VPN client) identified throughout this Security Target as well as other functions commonly found in mobile devices. Many of the available functions are available to users of the TOE while many are restricted to administrators operating through a Mobile Device Management solution once the TOE has been enrolled. Once the TOE has been enrolled and then un-enrolled, it removes all MDM policies and disables CC mode.

Protection of the TSF:

The TOE implements a number of features to protect itself to ensure the reliability and integrity of its security features. It protects particularly sensitive data such as cryptographic keys so that they are not accessible or exportable. It also provides its own timing mechanism to ensure that reliable time information is available (e.g., for log accountability). It enforces read, write, and execute memory page protections, uses address space layout randomization, and stack-based buffer overflow protections to minimize the potential to exploit application flaws. It also protects itself from modification by applications as well as isolates the address spaces of applications from one another to protect those applications.

The TOE includes functions to perform self-tests and software/firmware integrity checking so that it might detect when it is failing or may be corrupt. If any self-tests fail, the TOE will not go into an operational mode. It also includes mechanisms (i.e., verification of the digital signature of each new image) so that the TOE itself can be updated while ensuring that the updates will not introduce malicious or other unexpected changes in the TOE. Digital signature checking also extends to verifying applications prior to their installation.

TOE access:

The TOE can be locked, obscuring its display, by the user or after a configured interval of inactivity. The TOE also has the capability to display an advisory message (banner) when users unlock the TOE for use.

The TOE is also able to attempt to connect to wireless networks as configured.

Trusted path/channels:

The TOE supports the use of 802.11-2012, 802.1X, EAP-TLS, TLS, HTTPS and IPsec to secure communications channels between itself and other trusted network devices.


Vendor Information


Samsung Electronics Co., Ltd.
Ranjit Mallela
6508611549
r.mallela@samsung.com

www.samsung.com
Site Map              Contact Us              Home