NIAP: Assurance Continuity
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Ivanti EPMM 11.9

Date of Maintenance Completion:  2023.07.13

Product Type:    Mobility

Conformance Claim:  Protection Profile Compliant

PP Identifier:    PP-Module for MDM Agent Version 1.0
  Functional Package for TLS Version 1.1
  Protection Profile for Mobile Device Management Version 4.0

Original Evaluated TOE:  2021.09.01 - MobileIron Platform 11

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF] Administrative Guide [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with this latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

The changes are summarized below.

There are a relatively small number of updates that are considered more significant that have accumulated across 9 product updates. The change having the most impact on any actual security claim is the addition of a certificate pinning function.  While the requirements do not directly address that, there are test cases for that and those test cases were not performed during the evaluation since the function did not yet exist.  As such, while this function serves to add security, it should not be considered to be evaluated and this has been explicitly noted in the revised Security Target. The notable changes to the TOE are summarized below:

 

 

Feature

Impact Analysis

Certificate pinning to prevent Man-in-the-middle attacks

While this is a new security feature, it only serves to potentially add to and not otherwise impact the claimed and evaluated security function related to TLS X509 requirements. This function is not enabled by default and requires explicit administrator action to enable. Using this new function in addition to the evaluated function does not impact the evaluated function and as such should not be disallowed in an evaluated configuration, although it has not been evaluated or tested by a third party and cannot be claimed as evaluated and caution should be exercised.

Certificate pinning options now available from Certificate Management page

This is the user interface for the preceding function and only serves to present an additional configuration option and as such does not impact any evaluated security claims.

Support for mutual authentication between Core and Sentry

Sentry is an optional, non-evaluated component.  As such, adding additional security for its communication channel does not impact any evaluated security claims.

Support for IdP-based device registrations

DEP is an optional enrollment method in the evaluated configuration.  This additional feature provides a method to introduce additional information and checks for iOS enrollment via DEP, but does not otherwise affect the enrollment method (that is really controlled by Apple) and does not impact any evaluated security claims.

Export to CSV Installed Apps (App Inventory) Search Results

This is an added feature to export search results in CSV form.  This does not impact any evaluated security claims.

Weaker SSH algorithms removed from Core in favor of stronger ones

This change removed by default not-allowed algorithms for SSH, however, SSH was not included in scope of the evaluation and as such this does not impact any evaluated security claims.

New option to upload Certificate Authority chain for SCEP enrollment configurations

The evaluated TOE supports acting as a root CA or an intermediate CA.  This change allows an explicit certificate chain to be configured when multiple options are available from a specific SCEP CA.  However, device certificates are still issued from the configured CA certificate and the verification of those certificates is unchanged from the evaluation, so this does not impact any evaluated security claims.

Support for Entrust API version 11

Interoperation with Entrust was not a subject of the evaluation and as such this does not impact any evaluated security claims.

Support for bridging old and new client mutual authentication CA certificates

The process of changing a CA certificate was not a subject of the evaluation of the server.  As such, this is a new optional feature that is not evaluated and does not have to be used and as such does not impact any evaluated security claims.

Core support for Splunk Heavy Forwarder mutual authentication

Splunk features were not a subject of the evaluation and as such this does not impact any evaluated security claims.

New customization options for the self-service user portal (SSP)

These new settings basically allow an administrator to suppress things on the user pages to customize that portal.  This portal was not considered security relevant during the evaluation and is not related to any security claims and as such does not impact any evaluated security claims.

Support for Sentry-to-Core TFE mutual authentication

Sentry is an optional, non-evaluated component.  As such, adding additional security for its communication channel does not impact any evaluated security claims.

Administrators can copy existing managed app configuration settings and download updates

This change affects the managed app administrator interface.  It provides additional options to copy and edit app configurations, but does not serve to affect any evaluated security claims.

Support for Private DNS

This change serves to provide additional DNS configuration support that is not among the evaluated management claims and as such does not serve to affect any evaluated security claims.

Android File Transfer Configuration

This change serves to provide additional File Transfer support that is not among the evaluated management claims and as such does not serve to affect any evaluated security claims.

Android Bulk Enrollment

Enrollment tokens were not a subject of the evaluation so this change does not impact any evaluated security claims.

Support for pushing OS software to multiple devices

This change allows multiple devices to be selected for updates rather than a single device at a time.  The same function is implemented iteratively for all devices and as such this does not affect the underlying evaluated function so this change does not impact any evaluated security claims.

Samsung Firmware E-FOTA decommissioned

This change is related to a feature that was not part of the evaluation and as such does not serve to affect any evaluated security claims.

Samsung Knox Dual Encryption (DualDAR)

This change is related to a feature that was not part of the evaluation and as such does not serve to affect any evaluated security claims.

Ability to set apps to the foreground in devices

This change is related to a feature that was not part of the evaluation and as such does not serve to affect any evaluated security claims.

Android: Support for Common Criteria (CC) mode extended to Android 11+ devices

This change is related to new feature support not originally in the evaluated devices and as such does not serve to affect any evaluated security claims. There was a specific change to add support for a Google API. Note that the evaluation only claims evaluated Samsung devices and iOS devices so this Google API is outside the scope of the evaluation.

End of support for Android 5.0 and Android 5.1

This change is related to devices that predate any claimed in the evaluation and as such does not serve to affect any evaluated security claims.

Google official device admin deprecation

This change is related to a feature that was not part of the evaluation and as such does not serve to affect any evaluated security claims.

Corporate wallpaper for Android devices

This change is related to a feature that was not a subject of the evaluation and as such does not serve to affect any evaluated security claims.

Account-driven Apple User Enrollment

This change is related to an optional enrollment method that was not included in the evaluation and as such does not serve to affect any evaluated security claims. 

Unregistered devices can now redirect to Core from Office 365

This change is related to an optional enrollment method that was not addressed in the evaluation and as such does not serve to affect any evaluated security claims. 

Enable app restrictions for all supported devices

This change is related to a feature that was not a subject of the evaluation and as such does not serve to affect any evaluated security claims.

Android Enterprise Enable Single App Kiosk added to pin a single app to device screen

This change is related to a feature that was not a subject of the evaluation and as such does not serve to affect any evaluated security claims.

Windows registration configurations enabled upon upgrade

Management of Windows devices was not included in the evaluation and as such this change does not serve to affect any evaluated security claims. 

 

Vendor Information


MobileIron, an Ivanti Company
Babu Srinivasan
408-459-9634
babu.srinivasan@ivanti.com

www.mobileiron.com
Site Map              Contact Us              Home