
Cisco Intrusion Prevention System Security Target
List of Tables
TABLE 1: ACRONYMS .......................................................................................................................................................................................... 5
TABLE 2: ST AND TOE IDENTIFICATION ........................................................................................................................................................ 7
TABLE 3: OPERATIONAL ENVIRONMENT COMPONENTS ............................................................................................................................. 12
TABLE 4: TOE SPECIFICATIONS...................................................................................................................................................................... 14
TABLE 5: TOE PROVIDED CRYPTOGRAPHY .................................................................................................................................................. 16
TABLE 6: EXCLUDED FUNCTIONALITY ........................................................................................................................................................... 17
TABLE 7: PROTECTION PROFILES .................................................................................................................................................................... 19
TABLE 8: TOE ASSUMPTIONS ......................................................................................................................................................................... 21
TABLE 9: THREATS............................................................................................................................................................................................ 22
TABLE 10: ORGANIZATIONAL SECURITY POLICIES ...................................................................................................................................... 22
TABLE 11: SECURITY OBJECTIVES FOR THE TOE ........................................................................................................................................ 23
TABLE 12: SECURITY OBJECTIVES FOR THE ENVIRONMENT ...................................................................................................................... 24
TABLE 13: TRACING OF SECURITY OBJECTIVES TO SPD ............................................................................................................................. 24
TABLE 14: ASSUMPTION RATIONALE ............................................................................................................................................................ 25
TABLE 15: THREAT AND OSP RATIONALE ................................................................................................................................................... 25
TABLE 16: SECURITY FUNCTIONAL REQUIREMENTS .................................................................................................................................. 27
TABLE 17 AUDITABLE EVENTS ....................................................................................................................................................................... 29
TABLE 18: RATIONALE FOR EXPLICITLY STATED REQUIREMENTS .......................................................................................................... 36
TABLE 19: SFR DEPENDENCY RATIONALE ................................................................................................................................................... 37
TABLE 20: ASSURANCE MEASURES................................................................................................................................................................. 39
TABLE 21: ASSURANCE MEASURES................................................................................................................................................................. 39
TABLE 22: SECURITY REQUIREMENTS MAPPING TO OBJECTIVES ............................................................................................................ 41
TABLE 23: HOW THE SFRS ARE SATISFIED .................................................................................................................................................. 42
TABLE 24: TOE KEY ZEROIZATION ................................................................................................................................................................ 49
TABLE 25 800-56A COMPLIANCE ................................................................................................................................................................. 49
TABLE 26 800-56B COMPLIANCE ................................................................................................................................................................. 55
TABLE 27: REFERENCES ................................................................................................................................................................................... 61
List of Figures
FIGURE 1 EXAMPLE TOE DEPLOYMENT .................................................................................................................................................... 13
Kommentare zu diesen Handbüchern