NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - Apple macOS 13 Ventura

Certificate Date:  2024.02.06

Validation Report Number:  CCEVS-VR-VID11347-2024

Product Type:    Operating System

Conformance Claim:  Protection Profile Compliant

PP Identifier:    PP-Module for Bluetooth Version 1.0
  Protection Profile for General Purpose Operating Systems Version 4.2.1

CC Testing Lab:  atsec information security corporation


CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]


Product Description

The TOE is the Apple macOS 13 Ventura general purpose operating system (GPOS). The TOE is tightly integrated with hardware and runs on Apple iMac, MacBook Air, MacBook Pro, Mac mini, Mac Pro, and Mac Studio computers. The macOS Ventura operating system is a Unix-based graphical operating system. The macOS core is a POSIX compliant operating system built on top of the XNU kernel with standard Unix facilities available from the command line interface. The TOE includes Bluetooth communication—both Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) and Low Energy (LE).


Evaluated Configuration

The evaluation covers the following hardware platforms.

Hardware Platform Covered by the Evaluation

Marketing Name

Model #

Model Identifier

Processor

microArch

Security Chip

BT

BT Chip

2023

MacBook Pro (16-inch, 2023)

A2780

Mac14,6

M2 Max

ARMv8.6-A

SEP v2.0

5.3

4388

Mac14,10

M2 Pro

ARMv8.6-A

SEP v2.0

5.3

4388

MacBook Pro (14-inch, 2023)

A2779

Mac14,5

M2 Max

ARMv8.6-A

SEP v2.0

5.3

4388

Mac14,9

M2 Pro

ARMv8.6-A

SEP v2.0

5.3

4388

Mac mini (M2 Pro, 2023)

A2816

Mac14,12

M2 Pro

ARMv8.6-A

SEP v2.0

5.3

4388

Mac mini (M2, 2023)

A2686

Mac14,3

M2

ARMv8.6-A

SEP v2.0

5.3

4388

2022

MacBook Pro (13-inch, M2, 2022)

A2338

Mac14,7

M2

ARMv8.6-A

SEP v2.0

5.0

4378

MacBook Air (M2, 2022)

A2861

Mac14,2

M2

ARMv8.6-A

SEP v2.0

5.0

4387

Mac Studio

A2615

Mac13,2

M1 Ultra

ARMv8.5-A

SEP v2.0

5.0

4387

A2615

Mac13,1

M1 Max

ARMv8.5-A

SEP v2.0

5.0

4387

2021

MacBook Pro (16-inch, 2021)

A2485

MacBookPro18,2

M1 Max

ARMv8.5-A

SEP v2.0

5.0

4387

MacBookPro18,1

M1 Pro

ARMv8.5-A

SEP v2.0

5.0

4387

MacBook Pro (14-inch, 2021)

A2442

MacBookPro18,4

M1 Max

ARMv8.5-A

SEP v2.0

5.0

4387

MacBookPro18,3

M1 Pro

ARMv8.5-A

SEP v2.0

5.0

4387

iMac (24-inch, M1, 2021)

A2438

iMac21,1

M1

ARMv8.5-A

SEP v2.0

5.0

4378

A2439

iMac21,2

M1

ARMv8.5-A

SEP v2.0

5.0

4378

2020

Mac mini (M1, 2020)

A2348

Macmini9,1

M1

ARMv8.5-A

SEP v2.0

5.0

4378

MacBook Air (M1, 2020)

A2337

MacBookAir10,1

M1

ARMv8.5-A

SEP v2.0

5.0

4378

MacBook Pro (13-inch, M1, 2020)

A2338

MacBookPro17,1

M1

ARMv8.5-A

SEP v2.0

5.0

4364

MacBook Air (Retina, 13-inch, 2020)

A2179

MacBookAir9,1

Core i5-1030NG7
Core i7-1060NG7

Ice Lake

T2

5.0

4377

MacBook Pro (13-inch, 2020, Four Thunderbolt 3 ports)

A2251

MacBookPro16,2

Core i5-1038NG7
Core i7-1068NG7

Ice Lake

T2

5.0

4377

MacBook Pro (13-inch, 2020, Two Thunderbolt 3 ports)

A2289

MacBookPro16,3

Core i5-8257U
Core i7-8557U

Coffee Lake

T2

5.0

4377

iMac (Retina 5K, 27-inch, 2020)

A2115

iMac20,1
iMac20,2

Core i5-10500
Core i5-10600
Core i7-10700K
Core i9-10910

Comet Lake

T2

5.0

4364

2019

MacBook Air (Retina, 13-inch, 2019)

A1932

MacBookAir8,2

Core i5-8210Y

Amber Lake

T2

4.2

4355

MacBook Pro (13-inch, 2019, Four Thunderbolt 3 ports)

A1989

MacBookPro15,2

Core i5-8279U
Core i7-8569U

Coffee Lake

T2

5.0

4364

MacBook Pro (13-inch, 2019, Two Thunderbolt 3 ports)

A2159

MacBookPro15,4

Core i5-8257U
Core i7-8557U

Coffee Lake

T2

5.0

4377

MacBook Pro (15-inch, 2019)

A1990

MacBookPro15,1
MacBookPro15,3

Core i7-9750H
Core i9-9880H
Core i9-9980HK

Coffee Lake

T2

5.0

4364

MacBook Pro (16-inch, 2019)

A2141

MacBookPro16,1
MacBookPro16,4

Core i7-9750H
Core i9-9880H
Core i9-9980HK

Coffee Lake

T2

5.0

4377

Mac Pro (2019)

A1991

MacPro7,1

Xeon W-3223
Xeon W-3235
Xeon W-3245
Xeon W-3265M
Xeon W-3275M

Cascade Lake

T2

5.0

4364

Mac Pro (2019 Rack)

A2304

MacPro7,1

Xeon W-3223
Xeon W-3235
Xeon W-3245
Xeon W-3265M
Xeon W-3275M

Cascade Lake

T2

5.0

4364

2018

MacBook Air (Retina, 13-inch, 2018)

A1932

MacBookAir8,1

Core i5-8210Y

Amber Lake

T2

4.2

4355

Mac mini (2018)

A1993

Macmini8,1

Core i5-8500B
Core i7-8700B

Coffee Lake

T2

5.0

4364

MacBook Pro (15-inch, 2018)

A1990

MacBookPro15,1
MacBookPro15,3

Core i7-8750H
Core i7-8850H
Core i9-8950HK

Coffee Lake

T2

5.0

4364

MacBook Pro (13-inch, 2018, Four Thunderbolt 3 ports)

A1989

MacBookPro15,2

Core i5-8259U
Core i7-8559U

Coffee Lake

T2

5.0

4364

2017

iMac Pro (2017)

A1862

iMacPro1,1

Xeon W-2140B
Xeon W-2150B
Xeon W-2170B
Xeon W-2190B

Skylake

T2

5.0

4364


Security Evaluation Summary

The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process. The criteria against which the Apple macOS 13 Ventura was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 R5. The evaluation methodology used by the evaluation team to conduct the evaluation was the Common Methodology for Information Technology Security Evaluation, Version 3.1, R5 supplemented by that found in the Protection Profiles cited above. The evaluation was completed in February 2024. The product, when delivered and configured as identified in the Apple macOS 13 Ventura Common Criteria Configuration Guide, meets the requirements of the following:

·        PP-Configuration for General Purpose Operating Systems and Bluetooth. Version 1.0 as of 2021-04-15; exact conformance

o   Protection Profile for General Purpose Operating Systems, Version 4.2.1

o   Protection Profile for Bluetooth, Version 1.0 

Apple macOS 13 Ventura

The product when configured as identified in the Apple macOS 13 Ventura Common Criteria Configuration Guide document satisfies all of the security functional requirements stated in the Apple macOS 13 Ventura  Security Target. The evaluation was subject to CCEVS Validator review. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report number CCEVS-VR-VID11348-2024, prepared by CCEVS.


Environmental Strengths

Security Audit

The TOE generates audit records for the following auditable events:

·        Start-up and shutdown of the audit functions

·        Authentication events (success/failure)

·        Use of privileged/special rights events (successful and unsuccessful security, audit, and configuration changes)

·        Privilege or role escalation events (success/failure)

The TOE also generates audit records for the following Bluetooth auditable events:

·        Failed user authorization of Bluetooth device and for local Bluetooth service

·        Initiation and failure of Bluetooth connection

Cryptographic Support

The TOE includes the Apple corecrypto v13.0 cryptographic libraries listed below for performing user space, kernel space, and Secure Enclave Processor (SEP) cryptographic operations. The TOE implements TLS 1.2 for secure communications with remote servers.

The Bluetooth hardware implements the bulk AES-CCM-128 cryptographic functionality used when connecting to Bluetooth devices.

 

Apple silicon

·        Apple corecrypto Module v13.0 [Apple ARM, User, Software, SL1]

·        Apple corecrypto Module v13.0 [Apple ARM, Kernel, Software, SL1]

·        Apple corecrypto Module v13.0 [Apple silicon, Secure Key Store, Hardware, SL2]

Intel with T2

·        Apple corecrypto Module v13.0 [Intel, User, Software, SL1]

·        Apple corecrypto Module v13.0 [Intel, Kernel, Software, SL1]

·        Apple corecrypto Module v13.0 [Apple ARM, Secure Key Store, Hardware, SL2]

User Data Protection

The TOE implements access controls that prevent unprivileged users from accessing files and directories owned by other users. The TOE uses the Apple File System (APFS), which provides access control to data. The TOE provides the file system security schemes including sandbox entitlements, POSIX access control lists (ACLs), Unix (BSD) permissions, and per-file BSD flags that override Unix permissions.

Identification and Authentication

All users must be authenticated to the TOE prior to carrying out any management actions. The TOE supports:

·        Password-based authentication

·        Authentication based on username and a PIN that releases an asymmetric key stored in Operational Environment (OE) protected storage

The TOE supports Bluetooth Secure Simple Pairing (SSP). It requires user authorization and mutual authentication during pairing. It also discards pairing attempts and session initialization from Bluetooth devices to which an active session pre-exists. The TOE requires explicit user authorization when pairing with an untrusted device.

Security Management

The TOE can perform management functions specified in the Security Target. The administrator has full access to carry out all management functions, whereas the user will have limited privileges.

The TOE can also perform Bluetooth management functions. The TOE supports both Bluetooth BR/EDR and LE and uses Secure Simple Pairing (SSP) for security.

Protection of the TSF

The TOE implements the following protection of TSF data functions:

·        Access controls

·        Address space layout randomization (ASLR) with 16 bits of entropy

·        Stack buffer overflow protection

·        Verification of integrity of the bootchain and operating system executable code

·        Trusted software updates using digital signatures

TOE Access

The TOE displays an advisory warning message regarding unauthorized use of the OS prior to establishment of a user session.

TOE Trusted Path/Channel

The TOE supports TLS 1.2 for trusted channel communications. The TOE uses TLS to securely communicate with the Apple Update Server. Applications may invoke the TOE-provided TLS to securely communicate with remote servers.

The TOE provides a trusted path between itself and local users that provides assured identification of its endpoints.

The TOE enforces encryption when transmitting data over Bluetooth for both BR/EDR and LE and terminates the connection if the connected device stops encrypting.


Vendor Information


Apple Inc.
Nina Kominiak
+1 907 227 9672
ninak@apple.com

https://support.apple.com/guide/certifications/welcome/web
Site Map              Contact Us              Home