TOE TOE PP 20 3 25 (IT 8210) C0220 Hitachi Adaptable Modular Storage 2300 0862/ A-M EAL2 TOE 21 6 29 IT Common Criteria for Information Technology Security Evaluation Version 2.3 Common Methodology for Information Technology Security Evaluation Version 2.3 Hitachi Adaptable Modular Storage 2300 IT
1...1 1.1...1 1.2...1 1.2.1...1 1.2.2...1 1.2.3 TOE...2 1.2.4 TOE...5 1.2.5 TOE...6 1.3...8 1.4...8 1.5...9 1.5.1 PP...9 1.5.2 EAL...9 1.5.3...9 1.5.4...9 1.5.5...9 1.5.6...10 1.5.7...10 1.5.8...10 1.5.9...12 2...13 2.1...13 2.2...13 2.3...13 2.3.1...13 2.3.2...15 2.4...16 3...17 4...18 4.1...18 4.2...22 5...23 6...24
1 1.1 Hitachi Adaptable Modular Storage 2300 TOE IT ST TOE 1.5.9 ST TOE TOE IT IT IT IT CC CEM 1.2 1.2.1 1.2.2 Hitachi Adaptable Modular Storage 2300 0862/ A-M TOE Hitachi Adaptable Modular Storage 2300 Hitachi AMS2300 TOE 1
1.2.3 TOE TOE 1-1 1-1 Windows Solaris HP-UX RAID Manager RAID Manager FC-SAN Fibre Channel - Storage Area Network Fibre Channel Hitachi AMS 2300 TOE FC-SAN 2
LAN Ethernet OA GUI Hitachi Storage Navigator Modular 2 for GUI Hitachi Storage Navigator Modular 2 HSNM2 LAN Web HSNM2 for GUI TOE CLI GUI HSNM2 for CLI HSNM2 for GUI for CLI Web Web TOE LAN Hitachi Storage Navigator Modular 2 Web GUI Hitachi Storage Navigator Modular 2 for GUI Hitachi Storage Navigator Modular 2 for CLI 2 HSNM2 for GUI for CLI 3
TOE 1-2 TOE 1-2 TOE LAN Fibre Channel TOE LAN FC-SAN LAN 4
FC-SAN Fibre Channel Fibre Channel FC-SAN Read/Write TOE RAID LU Logical Unit LU 1.2.4 TOE TOE (1) HSNM2 Storage Administrator View and Modify (2) HSNM2 TOE Account Authentication Account Administrator View and Modify (3) HSNM2 TOE Audit Logging 5
Audit Log Administrator View and Modify (4) HSNM2 Web Web IP HSNM2 (1) (4) (5) 1.2.5 TOE TOE TOE TOE Account Administrator View and Modify Account Administrator View Only Audit Log Administrator View and Modify Audit Log Administrator View Only Storage Administrator View and Modify Storage Administrator View Only 6 HSNM2 1 Account Administrator View and Modify Audit Log Administrator View and Modify Storage Administrator View and Modify 6
View and Modify View Only TOE (1) Account Authentication TOE ID ID HSNM2HSNM2 ID TOE ID ID ID ID ID (2) Audit Logging TOE 7
(3) Account Authentication Audit Logging 1.3 IT IT [2] IT [3] IT [4] TOE TOE TOE TOE CC CEM TOE Hitachi Adaptable Modular Storage 2300 ST [1] TOE TOE TOE CC 1 [5][8][11] B CC 2 [6][9][12] TOE CC 3 [7][10][13] BES-ETR-0001-02 [18] CEM [14][15][16] CC CEM [17] 1.4 8
TOE 21 6 TOE CC CEM 1.5 1.5.1 PP PP 1.5.2 EAL ST TOE EAL2 1.5.3 ST SOF- TOE SOF- 1.5.4 TOE 1.2.5 TOE 1.5.5 TOE 1-1 1-1 T.MaliciousClient OA GUI Hitachi Storage Navigator Modular2 for GUI TOE 9
T.MaliciousApplication Hitachi Storage Navigator Modular2 OA LAN TOE 1.5.6 TOE 1-2 1-2 P.Role 1.5.7 TOE Hitachi Adaptable Modular Storage 2300 1.5.8 TOE 1-3 TOE 1-3 TOE A.Administrator A.CustomerEngineer A.Environment TOE 10
FC-SAN FC-SAN FC-SAN LAN TOE RAID Manager Account Authentication!"#$%&'()*+,-./:;<=>?@[ ]^_`{ }~ LAN Hitachi Storage NavigatorModular 2 Hitachi Storage Navigator Modular 2 Web Web Hitachi Storage Navigator Modular 2 Web Web Web 11
A.SSL Web LAN Hitachi Storage Navigator Modular 2 1.5.9 TOE Hitachi Adaptable Modular Storage 2300 ISO/IEC15408 Hitachi Adaptable Modular Storage 2300 ISO/IEC15408 Hitachi Adaptable Modular Storage 2300 ISO/IEC15408 Hitachi Adaptable Modular Storage2100/2300 12
2 2.1 CC 3 CEM TOE CEM 2.2 20 5 21 6 20 9 21 2 3 3 21 2 3 2.3 2.3.1 1) 2-1 13
2-1 2) a. 2-1ST TOE TOE b. HSNM2 HSNM2 c. 17 d. 14
2.3.2 1) 2-2 2) a. 2-2ST TOE TOE 15
b. c. 9 6 13 28 / TSFI d. TOE 2.4 TOE CEM 16
3 CEM ST 17
4 4.1 TOE CC 3 EAL2 4-1 4-1 ASE_DES.1.1E TOE ASE_DES.1.2E TOE ASE_DES.1.3E TOE ST ASE_ENV.1.1E TOE ASE_ENV.1.2E TOE ASE_INT.1.1E ST ST TOE CC ASE_INT.1.2E ST ASE_INT.1.3E ST ST ASE_OBJ.1.1E TOE 18
ASE_OBJ.1.2E ASE_PPC.1.1E PP ASE_PPC.1.2E PP ASE_REQ.1.1E TOE IT CC ASE_REQ.1.2E IT ASE_SRE.1.1E CC ASE_SRE.1.2E CC ASE_TSS.1.1E TOE IT ASE_TSS.1.2E TOE 19
ACM_CAP.2.1E TOE TOE ADO_DEL.1.1E TOE ADO_DEL.1.2D ADO_IGS.1.1E TOE ADO_IGS.1.2E ADO_IGS.1.1E ADV_FSP.1.1E TSF TSF ADV_FSP.1.2E TOE ADV_HLD.1.1E TSF IT TSF 20
ADV_HLD.1.2E TOE ADV_RCR.1.1E TOE AGD_ADM.1.1E TOE IT AGD_USR.1.1E TOE TOE IT ATE_COV.1.1E ATE_FUN.1.1E ST 21
ATE_IND.2.1E ST TOE ATE_IND.2.2E ATE_IND.2.3E AVA_SOF.1.1E ST SOF SOF SOF AVA_SOF.1.2E SOF SOF AVA_VLA.1.1E ST AVA_VLA.1.2E 4.2 TOE Hitachi Storage Navigator Modular 2 22
5 CC Common Criteria for Information Technology Security Evaluation CEM Common Methodology for Information Technology Security Evaluation EAL Evaluation Assurance Level PP Protection Profile SOF Strength of Function ST Security Target TOE Target of Evaluation TSF TOE Security Functions TOE HSNM2 Hitachi Storage Navigator Modular 2 FC FC-SAN LU RAID RAID Manager SAN Fibre Channel Fibre Channel - Storage Area Network Fibre Channel SAN Logical Unit Redundant Arrays of Inexpensive Independent Disks RAID Manager SAN Storage Area Network 23
6 [1] Hitachi Adaptable Modular Storage2300 Rev.11 2009 4 13 [2] IT 19 5 CCS-01 [3] IT 19 5 CCM-02 [4] IT 19 5 CCM-03 [5] Common Criteria for Information Technology Security Evaluation Part1: Introduction and general model Version 2.3 August 2005 CCMB-2005-08-001 [6] Common Criteria for Information Technology Security Evaluation Part2: Security functional requirements Version 2.3 August 2005 CCMB-2005-08-002 [7] Common Criteria for Information Technology Security Evaluation Part3: Security assurance requirements Version 2.3 August 2005 CCMB-2005-08-003 [8] 1: 2.3 2005 8 CCMB-2005-08-001 ( 17 12 1.0 ) [9] 2: 2.3 2005 8 CCMB-2005-08-002 ( 17 12 1.0 ) [10] 3: 2.3 2005 8 CCMB-2005-08-003 ( 17 12 1.0 ) [11] ISO/IEC 15408-1:2005 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model [12] ISO/IEC 15408-2:2005 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements [13] ISO/IEC 15408-3:2005 Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements [14] Common Methodology for Information Technology Security Evaluation : Evaluation Methodology Version 2.3 August 2005 CCMB-2005-08-004 [15] : 2.3 2005 8 ( 17 12 1.0 ) [16] ISO/IEC 18045:2005 Information technology - Security techniques - Methodology for IT security evaluation [17] -0512 17 12 [18] (BES-ETR-0001-02) 1.02 2009 6 18 24