NIAP: Assurance Continuity
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Palo Alto Networks M-200, M-300, M-600, and M-700 Hardware, and Virtual Appliances all running Panorama 10.2

Date of Maintenance Completion:  2023.05.31

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 2.2e

Original Evaluated TOE:  2022.08.04 - Palo Alto Networks Panorama 10.1

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Administrative Guide [PDF]

Administrative Guide [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF] Administrative Guide [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with the latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

The TOE changes consist of:

Introduction of the M-300 and M-700 hardware appliances running Panorama 10.2 to the Panorama product line.

Updating the firmware running on the Palo Alto Networks M-200 and M-600 Hardware, and Virtual Appliances from version Panorama 10.1 to   version Panorama 10.2.  The software updates included new non-security relevant features and bug fixes.

Palo Alto Networks removed the M-500 hardware appliance from the maintained TOE as it does not support the 10.2 firmware.

Palo Alto Networks obtained updated CAVP certificates covering the updated algorithm implementation for all hardware and virtual appliances,  including the new appliances added to the TOE (A2906 for hardware and A2907 for virtual appliances).



Number of Changes

Applicability to New Firmware Versions

New Features and Feature Enhancements


The software updates of the PAN-OS 10.1 to PAN-OS 10.2.3 were non-security relevant features and enhancements like Administrator-Level Push, Automatic Content Push for VN-Series and CN-Series Firewalls, and so on.

Bug Fixes


92 Bug Fixes were made for issues identified in previous releases of which 2 were security relevant (CVE) Fixes and 90 were behavioral Bug Fixes. The bug-fixes did not result in changes to the ST or guidance documentation and had no effect on the result of any Assurance Activity test.


NIST CAVP Certificates: 

Palo Alto Networks obtained updated CAVP certificates covering the updated algorithm implementation for all hardware and virtual appliances, including the new appliances added to the TOE (A2906 for hardware and A2907 for virtual appliances).

The Palo Alto Networks Crypto Module included with PAN-OS is substantially the same between versions 10.1 and 10.2. The only differences are patches made to address specific published vulnerabilities. The CAVP certificates for v10.2 of the Palo Alto Networks Crypto Module that is included with PAN-OS 10.2 cover the same set of functions and algorithms as obtained for v10.1.

The evaluation evidence presented by Palo Alto Networks for the CAVP certificates from the TOE’s original ETR and the evidence for the CAVP certificates for the updated TOE provided equivalence rationale to address any apparent differences between the two sets of certificates.

NIAP reviewed and verified that the CAVP cert changes are not considered major changes and they are the same in the relevant areas to the original certificates. The changes that resulted in the need for new crypto certs do not require a rerun in any of the testing assurance activities.

Vendor Information

Palo Alto Networks, Inc.
Jake Bajic
Site Map              Contact Us              Home