Foreword
Revision History
Table of Contents
List of Tables
Conventions and Terminology
Conventions
Terminology
Document Organisation
1 Introduction
1.1 Identification
1.2 Protection Profile Overview
2 TOE Description
2.1 TOE Roles
2.2 TOE Usage
3 TOE Security Environment
3.1 Assets to protect
3.2 Assumptions
3.3 Threats to Security
3.4 Organisational Security Policies
4 Security Objectives
4.1 Security Objectives for the TOE
4.2 Security Objectives for the Environment
5 IT Security Requirements
5.1 TOE Security Functional Requirements
5.1.1 Security audit (FAU)
5.1.2 Cryptographic support (FCS)
5.1.3 User data protection (FDP)
5.1.4 Identification and authentication (FIA)
5.1.5 Security management (FMT)
5.1.6 Protection of the TOE Security Functions (FPT)
5.1.7 Trusted path (FTP)
5.2 TOE Security Assurance Requirements
5.2.1 Configuration management (ACM)
5.2.2 Delivery and operation (ADO)
5.2.3 Development (ADV)
5.2.4 Guidance documents (AGD)
5.2.5 Life cycle support (ALC)
5.2.6 Tests (ATE)
5.2.7 Vulnerability assessment (AVA)
5.3 Security Requirements for the IT Environment
5.3.1 Security audit (FAU)
5.3.2 Trusted path/channels (FTP)
5.3.3 Non-IT requirements
6 Rationale
6.1 Security Objectives Rationale
6.1.1 Security Objectives Coverage
6.1.2 Security Objectives Sufficiency
6.2 Security Requirements Rationale
6.2.1 Security Requirement Coverage
6.2.2 Security Requirements Sufficiency
6.3 Dependency Rationale
6.3.1 Functional and Assurance Requirements Dependencies
6.4 Security Functional Requirements Grounding in Objectives
6.5 Rationale for Extensions
6.5.1 Rationale for Extension of Class FCS with Family
FCS_RND
6.6 Rationale for Assurance Level 4 Augmented
Appendix A - References
Appendix B - Acronyms