NIAP: Assurance Continuity
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Palo Alto Networks PA-220 Series, PA-400 Series, PA-800 Series, PA-3200 Series, PA-3400 Series, PA-5200 Series, PA-5400 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 10.2

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF] Administrative Guide [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with the latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

The changes described in the IAR constitute all changes made to the Palo Alto Networks PA-220 Series, PA-400 Series, PA-800 Series, PA-3200 Series, PA-3400 Series, PA-5200 Series, PA-5400 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 10.1 TOE since the previous Common Criteria evaluation (CCEVS-VR-VID11284-2022).

·       Introduction of the PA-3400 Series (comprising the PA-3410, PA-3420, PA-3430, and PA-3440 appliances) and PA-5400 Series (comprising the PA-5410, PA-5420, and PA-5430 appliances) hardware appliances running PAN-OS 10.2 to the Palo Alto next-generation firewall product line

·       Removal of the following PA-7000 line cards, which do not support the 10.2 firmware: PAN-PA-7050-SMC; PAN-PA-7080-SMC; PAN-PA-7000-20GXM-NPC; and PAN-PA-7000-20GQXM-NPC

·       Updating the firmware running on the Palo Alto next-generation firewall hardware appliances and the software of the next-generation virtual appliances from PAN-OS 10.1 to PAN-OS 10.2.  The software updates included new non-security relevant features and bug fixes. The PAN-OS updates listed below are reviewed with respect to the PAN-OS next-generation firewall evaluation.

·       Updating the CAVP certificates for cryptographic algorithms implemented by the Palo Alto Networks Crypto Module, to account for minor updates to the cryptographic module itself that addressed published vulnerabilities, and to accommodate new operational environments introduced with the PA-3400 Series and PA-5400 Series appliances.

 

 

 

Category

Number of Changes

Applicability to New Firmware Versions

Performance Improvements

8

All 8 Performance Improvements were included in all the new firmware versions.

New Features and Feature Enhancements

27

The software updates of the next-generation virtual appliances from PAN-OS 10.1 to PAN-OS 10.2.3 were non-security relevant features and enhancements like advanced routing engine, new BGP capabilities, new OSPFv3 and OSPFv2 capabilities and so on.

Bug Fixes

215

215 Bug Fixes were made for issues identified in previous releases of which two were security relevant (CVE) Fixes and 213 were behavioral Bug Fixes. The bug-fixes did not result in changes to the ST or guidance documentation and had no effect on the result of any Assurance Activity test.

 

Description of Certificate changes

Palo Alto Networks obtained updated CAVP certificates covering the updated algorithm implementation for all hardware and virtual appliances, including the new appliances added to the TOE (A2906 for hardware and A2907 for virtual appliances). The Operating environment  for A2907 is identical to the operating environment for A2244.

The Palo Alto Networks Crypto Module included with PAN-OS is substantially the same between versions 10.1 and 10.2. The only differences are patches made to address specific published vulnerabilities. The CAVP certificates for v10.2 of the Palo Alto Networks Crypto Module that is included with PAN-OS 10.2 cover the same set of functions and algorithms as obtained for v10.1.

The evaluation evidence presented by Palo Alto Networks for the CAVP certificates from the TOE’s original ETR and the evidence for the CAVP certificates for the updated TOE provided equivalence rationale to address any apparent differences between the two sets of certificates.

NIAP reviewed and verified that the CAVP cert changes are not considered major changes and they are the same in the relevant areas to the original certificates. The changes that resulted in the need for new crypto certs do not require a rerun in any of the testing assurance activities.

Vendor Information


Palo Alto Networks, Inc.
Jake Bajic
408-753-3901
jbajic@paloaltonetworks.com

www.paloaltonetworks.com
Site Map              Contact Us              Home