NIAP: Assurance Continuity
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Palo Alto Networks PA-220R, PA-400 Series, PA-800 Series, PA-1400 Series, PA-3200 Series, PA-3400 Series, PA-5200 Series, PA-5400 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 11.0

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF] Administrative Guide [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with this latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

The changes described in the IAR constitute all changes made to the Palo Alto Networks PA-220 Series, PA-400 Series, PA-800 Series, PA-3200 Series, PA-3400 Series, PA-5200 Series, PA-5400 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS v10.2 TOE since the previous assurance maintenance activity (CCEVS-VR-VID11284-2023).

·       Introduction of the PA-415 and PA-445 to the PA-400 Series hardware appliances running PAN-OS 11.0

·       Introduction of the PA-5440 to the PA-5400 Series hardware appliances running PAN-OS 11.0

·       Introduction of the PA-1400 Series (comprising the PA-1410 and PA-1420) hardware appliances running PAN-OS 11.0 to the Palo Alto next-generation firewall product line

·       Removal of the PA-220 hardware appliance from the PA-220 Series hardware appliances

·       Updating the firmware running on the Palo Alto next-generation firewall hardware appliances and the software of the next-generation virtual appliances from PAN-OS 10.2 to PAN-OS 11.0.  The software updates included new non-security relevant features and bug fixes.

·       Updating the CAVP certificates for cryptographic algorithms implemented by the Palo Alto Networks Crypto Module, to account for minor updates to the cryptographic module itself that addressed published vulnerabilities.

 

Category

Number of Changes

Applicability to New Firmware Versions

Performance Improvements

16

All 16 features improved performance without affecting security functionality.

Non-Security-Relevant

Features and Feature Enhancements

6

Six of the software updates of the next-generation virtual appliances from PAN-OS 10.2 to PAN-OS 11.0 were non-security relevant features and enhancements like Increased Maximum Number of Security Zones for PA-3400 Series Firewalls, Multi-Vsys Capability for the PA-400 Series Firewalls, and soon

Non-SFR-related (Security -Relevant) Features and Feature Enhancements

18

18 of the software updates/new features applied were outside the TOE boundary,  disabled by default in the evaluated configuration, and/or applied to Panorama and not Palo Alto Networks firewall running PAN-OS. These features include WEB PROXY,TLSv1.3 Support for Management Access, Advanced Routing Engine support on CN-Series and soon

Bug Fixes

Performance Improvement

90

204 Bug Fixes were made for issues identified in previous releases. The bug fixes were behavioral and performance Bug Fixes and not security relevant (CVE) Fixes. The bug-fixes did not result in changes to the ST or guidance documentation. These changes were either unrelated to SFR testing or were not visible at the level of testing performed for the SFRs. Thus, the original testing still holds, and any fix testing was covered by vendor non-evaluation regression and checkout testing.

Behavior Corrections

67

Outside the Scope of Evaluation/ Not related to the TOE

47

 

 

Vendor Information


Palo Alto Networks, Inc.
Jake Bajic
408-753-3901
jbajic@paloaltonetworks.com

www.paloaltonetworks.com
Site Map              Contact Us              Home