
Cisco Intrusion Prevention System Security Target
4 SECURITY OBJECTIVES
This Chapter identifies the security objectives of the TOE and the Operational Environment. The
security objectives identify the responsibilities of the TOE and the TOE’s IT environment in
meeting the security needs.
This document identifies objectives of the TOE as O.objective with objective specifying
a unique name. Objectives that apply to the IT environment are designated as
OE.objective with objective specifying a unique name.
4.1 Security Objectives for the TOE
The following table, Security Objectives for the TOE, identifies the security objectives of the
TOE. These security objectives reflect the stated intent to counter identified threats and/or
comply with any security policies identified. An explanation of the relationship between the
objectives and the threats/policies is provided in the rationale section of this document.
Table 11: Security Objectives for the TOE
TOE Security Objective Definition
Reproduced from the U.S. Government Protection Profile for Security Requirements for Network Devices
O.PROTECTED_COMMUNICATIONS
The TOE will provide protected communication channels for
administrators, other parts of a distributed TOE, and authorized
IT entities.
The TOE will provide the capability to help ensure that any
updates to the TOE can be verified by the administrator to be
unaltered and (optionally) from a trusted source.
The TOE will provide the capability to generate audit data and
send those data to an external IT entity.
The TOE will display an advisory warning regarding use of the
TOE.
The TOE will provide mechanisms to ensure that only
administrators are able to log in and configure the TOE, and
provide protections for logged-in administrators.
O.RESIDUAL_INFORMATION_CLEARING
The TOE will ensure that any data contained in a protected
resource is not available when the resource is reallocated.
The TOE shall provide mechanisms that mitigate the risk of
unattended sessions being hijacked.
The TOE will provide the capability to test some subset of its
security functionality to ensure it is operating properly.
Comentarios a estos manuales