Assurance Continuity - Palo Alto Networks PA-220 Series, PA-400 Series, PA-800 Series, PA-3200 Series, PA-3400 Series, PA-5200 Series, PA-5400 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 10.2
Date of Maintenance Completion: 2023.04.26CC Certificate Validation Report Assurance Activity
Product Type: Firewall
Virtual Private Network
Conformance Claim: Protection Profile Compliant
PP Identifier: collaborative Protection Profile for Network Devices Version 2.2e
collaborative Protection Profile Module for Stateful Traffic Filter Firewalls v1.4 + Errata 20200625
PP-Module for Virtual Private Network (VPN) Gateways Version 1.2
Original Evaluated TOE: 2022.08.31 - Palo Alto Networks PA-220 Series, PA-400 Series, PA-800 Series, PA-3200 Series, PA-5200 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 10.1
Please note: The above files are for the Original Evaluated TOE. Consequently, they do not refer to this maintained version, although they apply to the maintained version.
Security Target * Assurance Continuity Maintenance Report Administrative Guide
Please note: This serves as an addendum to the VR for the Original Evaluated TOE.
* This is the Security Target (ST) associated with the latest Maintenance Release. To view previous STs for this TOE, click here.
Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product. Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate. Such assurance can only be gained through re-evaluation.
Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary. A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target. Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents.
The changes described in the IAR constitute all changes made to the Palo Alto Networks PA-220 Series, PA-400 Series, PA-800 Series, PA-3200 Series, PA-3400 Series, PA-5200 Series, PA-5400 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 10.1 TOE since the previous Common Criteria evaluation (CCEVS-VR-VID11284-2022).
· Introduction of the PA-3400 Series (comprising the PA-3410, PA-3420, PA-3430, and PA-3440 appliances) and PA-5400 Series (comprising the PA-5410, PA-5420, and PA-5430 appliances) hardware appliances running PAN-OS 10.2 to the Palo Alto next-generation firewall product line
· Removal of the following PA-7000 line cards, which do not support the 10.2 firmware: PAN-PA-7050-SMC; PAN-PA-7080-SMC; PAN-PA-7000-20GXM-NPC; and PAN-PA-7000-20GQXM-NPC
· Updating the firmware running on the Palo Alto next-generation firewall hardware appliances and the software of the next-generation virtual appliances from PAN-OS 10.1 to PAN-OS 10.2. The software updates included new non-security relevant features and bug fixes. The PAN-OS updates listed below are reviewed with respect to the PAN-OS next-generation firewall evaluation.
· Updating the CAVP certificates for cryptographic algorithms implemented by the Palo Alto Networks Crypto Module, to account for minor updates to the cryptographic module itself that addressed published vulnerabilities, and to accommodate new operational environments introduced with the PA-3400 Series and PA-5400 Series appliances.
Description of Certificate changes
Palo Alto Networks obtained updated CAVP certificates covering the updated algorithm implementation for all hardware and virtual appliances, including the new appliances added to the TOE (A2906 for hardware and A2907 for virtual appliances). The Operating environment for A2907 is identical to the operating environment for A2244.
The Palo Alto Networks Crypto Module included with PAN-OS is substantially the same between versions 10.1 and 10.2. The only differences are patches made to address specific published vulnerabilities. The CAVP certificates for v10.2 of the Palo Alto Networks Crypto Module that is included with PAN-OS 10.2 cover the same set of functions and algorithms as obtained for v10.1.
The evaluation evidence presented by Palo Alto Networks for the CAVP certificates from the TOE’s original ETR and the evidence for the CAVP certificates for the updated TOE provided equivalence rationale to address any apparent differences between the two sets of certificates.
NIAP reviewed and verified that the CAVP cert changes are not considered major changes and they are the same in the relevant areas to the original certificates. The changes that resulted in the need for new crypto certs do not require a rerun in any of the testing assurance activities.
Palo Alto Networks, Inc.