NIAP: Assurance Continuity
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Trend Micro TippingPoint Threat Protection System (TPS) v5.5

Date of Maintenance Completion:  2023.09.01

Product Type:    Network Device

Conformance Claim:  Protection Profile Compliant

PP Identifier:    collaborative Protection Profile for Network Devices Version 2.2e

Original Evaluated TOE:  2022.02.02 - Trend Micro TippingPoint Threat Protection System (TPS) v5.3

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF] Administrative Guide [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with this latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

Changes to TOE:

 

For this Assurance Continuity, the version number of TOE changed from Version 5.3 to Version 5.5.

Software Enhancements

The following paragraphs list the new features introduced in version 5.4 that required minor software changes made to the TOE during the maintenance cycle. The developer reported the new features/changes to the product located in the table below:

 

TOS v5.4.0, TPS devices provide in-line, real-time threat protection for both inbound server SSL traffic and outbound client SSL traffic.

Impact: Minor

Rationale: The new feature does not affect any of the claimed security functionality.

TOS v5.4.0 includes support for the TLSv1.3 protocol and six new cipher suites, including TLSv1.3-specific ciphers.

Impact: Minor

Rationale: The new feature does not affect any of the claimed security functionality.

The debug congestion visibility command has been added so you can view how uninspected traffic correlates to any systems or applications that might have been having issues during the congestion period.

Impact: Minor

Rationale: This new view command improves the usability of the TOE without affecting security functionality.

A new ipsprefs option has been added to the display conf running command that enables device configuration information (except policy settings) to be displayed.

Impact: Minor

Rationale: This new view command improves the usability of the TOE without affecting security functionality.

 

Bug Fixes

There were several bug fixes that were addressed as part of release 5.3.1 through release 5.5.4. None of the bug fixes resulted in changes to the ST or the Common Criteria Evaluated Configuration Guide. Also, the changes made to the TOE as part of the bug fixes did not have any effect on the result of any Assurance Activities. The details of the bug fixes are documented in the proprietary IAR provided to the validation team.

Vendor Information


Trend Micro
Greg Cooper
512-646-6100
greg_cooper@trendmicro.com

www.trendmicro.com
Site Map              Contact Us              Home