c0319 Est
c0319 Est
Security Target
Copyright
Microsoft and Windows are registered trademarks of Microsoft Corp. in the United States and other
countries.
Solaris is the registered trademark or trademark of Sun Microsystems, Inc. in the United States and other
countries.
HP-UX is the registered trademark of Hewlett-Packard Company.
RedHat is the registered trademark or trademark of RedHat, Inc. in the United States and other countries.
Linux is the registered trademark or trademark of Linus Torvalds in the United States and other countries.
AIX is the registered trademark or trademark of IBM Corporation.
All other company names and product names are the registered trademark or trademark of their respective
owners.
Page ii
HP StorageWorks P9500 Disk Array Security Target V1.17
- Table of Contents -
1 ST OVERVIEW ........................................................................................................................................... 1
1.1 ST REFERENCE ........................................................................................................................................... 1
1.2 TOE REFERENCE ........................................................................................................................................ 1
1.3 TOE OVERVIEW ......................................................................................................................................... 2
1.3.1 TOE type .......................................................................................................................................... 2
1.3.2 Relevant personnel........................................................................................................................... 2
1.3.3 How to use TOE and major security functions ................................................................................ 3
1.3.4 Environment for usage of TOE ........................................................................................................ 5
1.3.4.1 Environment for usage of TOE ..............................................................................................................5
1.3.4.2 TOE and other configuration components .............................................................................................6
1.4 TOE DESCRIPTION ..................................................................................................................................... 7
1.4.1 Control system ................................................................................................................................. 9
1.4.2 Storage management system............................................................................................................ 9
1.4.3 Other storages ............................................................................................................................... 10
1.4.4 TOE functions ................................................................................................................................ 10
1.4.4.1 Basic functions TOE provides..............................................................................................................10
1.4.4.2 TOE’s Security functions.....................................................................................................................11
1.4.5 Guidance documentation ............................................................................................................... 15
2 CONFORMANCE CLAIM ...................................................................................................................... 16
2.1 CC CONFORMANCE CLAIM ....................................................................................................................... 16
2.2 PP CONFORMANCE ................................................................................................................................... 16
2.3 PACKAGE NAME CONFORMANT ................................................................................................................ 16
3 SECURITY PROBLEM DEFINITION................................................................................................... 17
3.1 TOE ASSETS............................................................................................................................................. 17
3.2 THREATS .................................................................................................................................................. 17
3.3 ORGANIZATIONAL SECURITY POLICIES..................................................................................................... 18
3.4 ASSUMPTIONS .......................................................................................................................................... 18
4 SECURITY OBJECTIVES....................................................................................................................... 20
4.1 TOE SECURITY OBJECTIVES ..................................................................................................................... 20
4.2 OPERATIONAL ENVIRONMENT SECURITY OBJECTIVES .............................................................................. 21
4.3 SECURITY OBJECTIVE RATIONALE ............................................................................................................ 22
4.3.1 Security objective rational for assumption .................................................................................... 23
4.3.2 Security objective rationale for threat ........................................................................................... 24
4.3.3 Security objective rationale for organizational security policy ..................................................... 25
5 EXTENDED COMPONENTS DEFINITION......................................................................................... 27
Page iii
HP StorageWorks P9500 Disk Array Security Target V1.17
Page iv
HP StorageWorks P9500 Disk Array Security Target V1.17
List of tables
Table 1-1 Basic functions provided by TOE................................................................................................ 11
Table 4-2 Validity of the security objectives for the assumptions ............................................................... 23
Table 4-3 Validity of the security objectives to cope with threats ............................................................... 24
Table 4-4 Validity of the security objectives for organizational security policy ......................................... 25
Table 6-1 Individually defined items to be audited...................................................................................... 29
Table 6-10 Operations of Remote Web Console user and maintenance personnel for security attribute (user
group information) of processing act for Remote Web Console......................................................... 40
Table 6-11 Operations of Remote Web Console and maintenance personnel for user account.................. 42
Table 6-12 Operations of Remote Web Console user and maintenance personnel for host authentication
data...................................................................................................................................................... 42
Table 6-13 Operations of Remote Web Console user and maintenance personnel for encryption key for
data encryption.................................................................................................................................... 42
Table 6-14 Operations of Remote Web Console user and maintenance personnel for user authentication
method ................................................................................................................................................ 43
Table 6-15 Correspondence between security objectives and security function requirements .................... 47
Table 6-16 Validity of security function requirements for TOE security objectives ................................... 48
Table 6-17 Dependencies of security function requirements....................................................................... 54
Table 6-18 Consistency between security function requirements................................................................ 55
Table 7-1 Correspondence relation between TOE security functions and security function requirements . 58
Table 7-2 Encryption-relevant algorithm used by SSL................................................................................ 61
Page v
HP StorageWorks P9500 Disk Array Security Target V1.17
List of figures
Figure 1-1 General system configuration including storage system .............................................................. 5
Page vi
HP StorageWorks P9500 Disk Array Security Target V1.17
1 ST overview
This chapter describes Security Target (hereinafter referred to as “ST”) reference, TOE reference, TOE
overview and TOE description.
1.1 ST reference
This section describes ST identification information.
Page 1
HP StorageWorks P9500 Disk Array Security Target V1.17
・ Security administrator:
The security administrator can register, modify and delete administrator accounts using Remote Web
Console program (see 1.4). Also, the administrator can create and delete resource groups, migrate
resources between resource groups, and register resource groups to user groups. In addition to the
above, authentication setting of host and fibre channel switch and encryption operation of stored data
are enabled.
・ Storage administrator:
The storage administrator can manage resources assigned to the storage administrator (such as port,
parity group, external volume group, host group and LDEV) by using Remote Web Console program.
・ Maintenance personnel
The maintenance personnel belong to an entity specialized in maintenance with whom customers who
use the storage system sign contracts concerning maintenance. They are responsible for initial startup
process in installing the storage system, changing settings required in maintenance activities such as
parts replacement or addition, and disaster recovery.
Maintenance personnel access SVP PC from a PC for maintenance person (maintenance PC) (see
1.4.2) to perform maintenance operations. Only maintenance personnel can directly contact parts
inside the storage system and operate devices connected to the internal LAN. All resources of the
storage system are assigned to the maintenance personnel and they can perform operations allowed by
maintenance role (see Table 1-2). The TOE recognizes person who uses an interface to access SVP
PC from the maintenance PC as “the maintenance personnel” role.
・ Storage user:
It is a user of storage system (represents a host) who uses data stored in the storage system through
the host connected to the storage system.
The security administrator, storage administrator and the audit log administrator are hereinafter
Page 2
HP StorageWorks P9500 Disk Array Security Target V1.17
Many hosts of variety types of platforms connect to a storage system via the SAN environment or the IP
network environment. Unauthorized operation performed to this storage system may result in unintended
accesses to user data in the storage system. In order to prevent the situation, the access control is required
for the user data in storage system.
Under the condition that multiple storage administrators manage resources in a disk subsystem (such as
port, cache memory and disk) a configuration change beyond the administrator’s responsibility might be
made. The TOE therefore divides the port, disk (parity group) and cache memory into multiple resource
groups, and these groups are assigned to each corresponding administrator. The assignment of authority for
resource management allows each administrator to access the resource without interfering other
administrators’ resources. As the control program for P9500, the TOE consists of DKCMAIN micro-
program, SVP program and Remote Web Console program. The DKCMAIN micro-program controls
resources in the storage system and the SVP program controls the authorities for administrators of storage
system. The Remote Web Console program is contained in the SVP program and is downloaded from SVP
PC to a management PC from SVP PC when the Remote Web Console program is used. Hereinafter the
Remote Web Console program is called Remote Web Console.
This ST describes the security functions to protect confidentiality and integrity of user data in P9500 by
providing functions to prevent unauthorized access to storage resources assigned to specific storage users
from other storage users, and to encrypt and shred the user data in hard disks.
P9500 equipped with the TOE is manufactured and shipped by Disk Array Systems Division of Hewlett-
Packard Company.
LUN Manager:
It controls host access to logical devices in storage system.
Authentication of host:
It authenticates hosts and fibre channel switches to prevent accesses from an unauthorized host to the
storage system.
Identification and authentication of Remote Web Console user and maintenance personnel:
It controls users who access the TOE, and identifies and authenticates each user. It also can identify and
authenticate users by using an externally connected authentication server.
Page 3
HP StorageWorks P9500 Disk Array Security Target V1.17
Encrypted communication between Remote Web Console and SVP PC, and between SVP PC and external
authentication server:
It encrypts the communication between Remote Web Console and SVP PC, and communication between
SVP PC and external authentication server.
Encryption of stored data:
It collects logs of configuration change and update of the storage system and enable administrators to see
and manage the logs.
Page 4
HP StorageWorks P9500 Disk Array Security Target V1.17
Host
Figure 1-1 illustrates the general system configuration including storage system. Components of the system
configuration are as follows.
(1) Storage system
Normally, the storage system with TOE is installed in a secure area where entering and leaving the area are
controlled.
(2) SAN and host
Each Open server such as Windows, HP-UX and Solaris (collectively called “host” in this document) and
storage systems are connected via SAN (Storage Area Network). SAN is the dedicated network for storage
system to connect hosts and storage systems via the fibre channel.
To connect a host to SAN, fibre channel connection adapter (hardware and software) needs to be installed
on the host. The storage system identifies the host using the identification information in the fibre channel
connection adaptor. The identification information in the fibre channel connection adapter is set by the
storage administrator when connecting the host to the storage system.
Since customers performs the host access control configuration, the ST does not consider sophisticated
attack capability, such as unauthorized access to user data in the storage system by altering the
identification information of the host. However, if customer policy requires, the TOE can authenticate the
host (including fibre channel switch) connected with the storage system.
Page 5
HP StorageWorks P9500 Disk Array Security Target V1.17
(3) Management PC
The management PC is the PC for setting up configuration information of storage system via network. The
program for the administrator of storage system to set up the configuration information runs on the
management PC. The management PC and storage system are connected via LAN (Local Area Network).
The table below shows necessary hardware components and whether each component is included in the
TOE. The environment means that items are the component of other than TOE.
TOE/environ Configuration component Description
ment
Environment HP StorageWorks P9500 Disk P9500 hardware. It includes SVP PC.
Array The difference between the models is branding of
external rack. The TOE is installed on the hardware.
Environment Host Computers that access the disk subsystem. Windows,
HP-UX, Solaris, Linux and AIX are expected as host
OS.
Environment Fibre channel connection adapter An adapter equipped in computer to connect to SAN.
Environment Fibre channel connection adapter A switch to connect host with storage system, which
constitutes the SAN.
Environment Management PC Computers to administer the TOE.
Requirements for the computer are;
・ CPU: Pentium 4 640 3.2GHz and higher
Recommended: Core 2 Duo E6540 2.33GHz
and higher
・ RAM: 2GB or larger Recommended: 3GB
・ Available HDD capacity: 500 MB and larger
・ Monitor: True Color 32 bit and higher;
Resolution: 1280x1024 and higher
・ LAN card: 100Base-T
Environment SAN High speed network connecting storage system and
computers by using fibre channel.
Environment Other storage system Other storage system connected with the storage system
equipped with TOE. The other storage is limited to the
one equipped with TOE.
Environment Maintenance PC A computer used by maintenance personnel at
maintenance, which is prepared by maintenance
personnel.
Environment External authentication server A server that identifies and authenticates users, such as
LDAP server and RADIUS server.
Environment External LAN LAN to connect storage system, management PC and
external authentication server.
Environment Internal LAN LAN to connect package in the storage system and
maintenance PC.
Page 6
HP StorageWorks P9500 Disk Array Security Target V1.17
The table below shows necessary software components and if each component is included in the TOE.
TOE/environ Configuration component Description
ment
TOE DKCMAIN micro-program It operates on MP PCB.
Version 70-02-05-00/00 The TOE is embedded in the storage system at factory
shipment.
TOE SVP program It runs on SVP PC and Remote Web Console runs on
Version 70-02-03/00 management PC.
The TOE is embedded in the storage system at factory
shipment.
Environment SVP PC OS SVP PC OS
• Windows Vista Business US version
(64bit version) SP2
Environment Web server It operates on SVP PC and uses the software below.
• Apache Tomcat 6.0.16
Environment Management PC OS Os of management PC.
• Windows XP (SP3 and later)
Environment OS of maintenance PC OS of maintenance PC.
• Windows XP (SP3 and later)
Environment Web browser Web browser works on management PC.
The following browser is supported.
• Internet Explorer 8.0
Environment Flash Player It operates on management PC as a plug-in of web
browser. The following version is used.
• Flash Player 10.1
Environment Java runtime environment Java runtime environment operates on management
PC.
• JRE 6.0 Update 20(1.6.0_20)
Figure 1-2 illustrates hardware components constituting the storage system and shows that on which
components the identified TOE sub set works.
Page 7
HP StorageWorks P9500 Disk Array Security Target V1.17
External authentication
server
Web browser
CHA
MP PCB SVP PC
SVP program
Internal LAN
DKA
LU LU
Remote Web Console program consists of Flex application and Java applet, and runs on SVP and
control PC.
LU: Logical unit, which consists of one or multiple LDEVs (logical device) per access used from
host.
Page 8
HP StorageWorks P9500 Disk Array Security Target V1.17
The storage system consists of control system and storage management system. The control system
includes channel adapter (CHA), cache memory (CACHE), disk adapter (DKA), micro processor (MP),
and memory device. The storage management system includes SVP (service processor) PC. The control
system controls data input and output to and from memory device while the storage management system
performs storage maintenance and management operations. The configuration components are as follows.
The control network (CHA, CACHE, DKA, and MP PCB together connected by high speed crossbar
switch) and administration network (internal LAN and external LAN) are completely independent of each
other. This configuration does not allow direct access from SVP PC, management PC, and maintenance PC
connected either to the internal LAN or external LAN, to the cache and memory device.
Disk adapter (DKA) controls data transfer between the cache and memory device. The DKA is equipped
with LSI to encrypt and decrypt the stored data as encryption function.
(3) Cache memory
Cache memory (CACHE) is located between CHA and DKA and is commonly accessible from
DKCMAIN micro-program. The configuration information to access the data through CHA and DKA is
stored in it to be used for data reading and writing. The configuration information on the memory can be
accessed only through the DKCMAIN micro-program.
(4) MP PCB
One quad core CPU is equipped in one PCB for DKCMAIN micro-program to work.
(5) Memory device
Memory device consists of multiple hard disks and is used to store user data. In the memory device, an
LDEV (logical device) which is a volume to store user data is created. Access to the user data is controlled
per LDEV, and done via DKCMAIN micro-program. A part of or all data in the LDEV can be allocated to
cache memory so as to enable high speed data access.
An LU (logical unit), which is an access unit from a host, is mapped to one or more LDEV.
LDEVs are created on a parity group in the memory device. The parity group is a series of hard disk
drives handled as one data group, and composes RAID by storing the user data and parity information.
This RAID configuration enables accesses to the user data even when one or more drive in the parity group
is unavailable, which improves the reliability.
CHA, CACHE, DKA and MP PCB are connected with each other by the high-speed crossbar switch.
The SVP PC is a service processor embedded in the storage system to manage the entire storage system,
and SVP program, which is a part of TOE, runs on SVP PC. The SVP program is the software used to
manage configuration information and maintenance function of the entire storage system, and has a
Page 9
HP StorageWorks P9500 Disk Array Security Target V1.17
function to send DKCMAIN micro-program a command to set configuration information received from
Remote Web Console that works on management PC. SVP program also has a configuration related to
operations of security function in the storage system.
(2) Maintenance PC
The maintenance PC is the PC used by maintenance personnel at maintenance. It is connected to the SVP
PC by remote desktop function via internal LAN which is the network in the storage system.
(3) Management PC
Management PC is a customer’s PC used by Remote Web Console users (See 1.3.2) for storage system
operations and maintenance. Remote Web Console, which is a part of TOE, works on management PC.
The management PC and the SVP PC are connected via the external LAN.
(4) External authentication server
The external authentication server identifies and authenticates users by a request from the SVP program
when Remote Web Console user (see 1.3.2) at customer site accesses, and returns to the SVP program the
authentication result and user group information (see 1.4.4.2.1) that is a basis of approval information
when the authentication succeeds. The communication between the SVP PC and the external
authentication server is encryption communication.
(5) Remote Web Console
Remote Web Console is the software used by Remote Web Console users (See 1.3.2) at customer site to
manage configuration information of storage system.
Remote Web Console consists of Flex application and Java applet. The Flex application executes
operations specified from Web browser on the management PC on the SVP PC, and displays the result on
the Web browser of the management PC Java applet on the other hand downloads programs from the SVP
PC to the management PC. The programs run on the management PC. The communication between the
SVP PC and Remote Web Console are under protection of SSL. Remote Web Console users handle
configuration operations of the storage system by interacting with Remote Web Console through the Web
browser of the management PC.
In order to prevent unauthorized use of Remote Web Console by any malicious third party (See), Remote
Web Console identifies and authenticates users in collaboration with the SVP program.
Page 10
HP StorageWorks P9500 Disk Array Security Target V1.17
Function Description
Open Volume The customized volume size function can regard multiple LDEVs as free space
Management (Customized and create multiple customized volumes in arbitrary size, which enables
volume size function) effective use of disk capacity.
Cache Residency Manager Specific data in a logical volume is resident in cache memory. The resident data
(cache memory can always be accessed by memory access function.
management function)
Performance Monitor Monitoring Resource usage rate in disk subsystem, disk load and port load
(Performance information measurement are enabled.
management function)
External Storage The function realizes virtualization of storage. By using External Storage,
(External storage multiple disk subsystems including P9500 can be handled as one disk
management function) subsystem. It also allows the system administrator to easily manage multiple
storage systems in different types.
Continuous Access In P9500 series, replica volumes can be created at remote site without passing
Journal (Remote copy through a server. The replica can be used for backup as a measure for not only
function) local/regional but also large-scale disasters.
Without passing through a host, by updating the replica volume in
synchronization with update at the main site, remote copy between disk
subsystems is realized. For the connection between disk subsystems, fibre
channel is used.
Business Copy (Local copy Volume replication to create a replica of logical volume in a disk subsystem
function) without passing through a host is enabled. Using the replica allows obtaining
backup in the same database and concurrent processing such as batch processing
while continuing online operation for the data base and minimizing the impact
on operating performance.
Thin Provisioning With Thin Provisioning, the data of volume in a pool is accessed via a virtual
volume. For the virtual volume and pool volume, thresholds are set to
(Virtual volume continuously monitor overflow of the area, which eventually brings the
management function) following effects.
- Reduction of introduction cost by improving volume usage ratio
- Prevention of increases in management cost and time period of no operation
due to the stop of operation while establishing the system.
1.4.4.2.1 Access control function of Remote Web Console user and maintenance personnel
In an intensive environment with large-scale storage where data of multiple companies, departments,
systems and applications exist in one disk subsystem, so-called Multi-tenancy function to manage storage
operations individually by assigning storage administrators per company or department is required. The
Multi-tenancy function promises cost reduction by effective use of resource and management
simplification by dividing.
In Multi-tenancy environment, a security mechanism is necessary so as avoid destroying the data of other
organizations by mistake, leaking the data to other organization, and interfering operations by other storage
administrator.
Access control function of Remote Web Console user and maintenance personnel is per user group. A role
and a resource group, a group of resources which can be controlled by the role, are assigned to the user
group. Figure 1-3 shows the relationship among user (administrator), user group, resource group and role.
Page 11
HP StorageWorks P9500 Disk Array Security Target V1.17
This function enables each user to perform flexible resource allocation and realizes the above security.
1 1..n 0..x
..
User1 User Group1 Role
0..y
Resource Group
Figure 1-3 Relationship between user, user group, role and resource group
A user belongs to one or more user group. User group is assigned with roles and resource groups and
uses them as approved information. The user group information is obtained from SVP PC or external
authentication server. Each account can execute management operation allowed by the assigned role for
the assigned resource.
(1) Role
The security administrator creates a user account with Remote Web Console and registers the account
to a user group.
Permission of operation assignment to a user is determined based on the role assigned to the user
group. The roles are cataloged as follows.
Security administrator role A role, which is assigned to security administrator and can
execute the following operations.
User management
Resource management such as resource group creation and
edition.
Authentication setting of host and fibre channel
Encryption of stored data
Audit log administrator role A role, which is assigned to audit log administrator and can
execute the following operation.
Storage administrator role A role, which is assigned to storage administrator and can
execute the following operations.
Initial setting such as IP address setting
Configuration change such as logical device creation
Device performance information management
Local/remote backup of user data
Shredding of user data
Page 12
HP StorageWorks P9500 Disk Array Security Target V1.17
Storage
User Group (UG) 1 User Group 1 User Group 2
Recourse Resource group (RSG)
Management
Management
Management
Page 13
HP StorageWorks P9500 Disk Array Security Target V1.17
manager and sets each host whether to execute host authentication. Also, the security administrator
registers host authentication data (WWN, secret) to authenticate. The secret is a password for
authentication consists of combination of alphanumeric characters and symbols in 12 to 32 letters.
1.4.4.2.4 Identification and authentication of Remote Web Console user and maintenance personnel
Remote Web Console is used by customers to manage disk subsystem including security setting. The
TOE executes user identification and authentication at disk subsystem management (configuration of each
function and setting change) using Remote Web Console and remote desktop connection to SVP PC by
maintenance personnel. If the identification and authentication fail three times in a row, the identification
and authentication of the user are rejected for one minute.
As user authentication, the following 2 methods are supported.
(1) SVP PC internal authentication
ID and password of users are registered in the SVP PC, and the TOE execute authentication. The
password for user authentication is from 6 to 256, inclusively, letters with a combination of
alphanumeric characters and symbols. (The password of maintenance personnel is 127 letters)
(2) External authentication server
The SVP PC does not manage ID and password but the ID and the password are sent to an external
authentication server and the authentication result is sent back. After the success of authentication by
the external authentication server, the user group information is obtained from the server and used as
approved information. As protocols for user authentication, LDAP (Encryption supports LDAPS,
starttls) and RADIUS (authentication protocol is CHAP) are supported.
1.4.4.2.5 Encrypted communication between Remote Web Console and SVP PC, and between SVP PC
and external authentication server
To prevent falsification and leakage of communication data between storage system and the
management PC, the communication between Remote Web Console and SVP PC is encrypted by SSL. In
addition, LDAPS, starttls and RADIUS (authentication protocol is CHAP) protocols are employed for the
communication between the SVP PC and the external authentication server to protect passwords of Remote
Web Console user and maintenance personnel.
The TOE can encrypt the data stored in a volume in the storage system. For encryption and decryption,
LSI mounted in DKA is used. Encrypting data can prevent the information from being leaked when hard
disk in the storage system is replaced or when the data is stolen. In addition, the following key
management functions are available.
Encryption key creation
Encryption key deletion
1.4.4.2.7 Shredding
Page 14
HP StorageWorks P9500 Disk Array Security Target V1.17
This is a function to disable to restore data by writing dummy data over all the data in a volume, so as to
avoid data leakage and unauthorized use at reuse of the volume.
When the Shredding is executed, dummy data is written in the volume containing user data and the user
data cannot be restored. The function complies with DoD5220.22-M, recommends writing dummy data at
least 3 times. The dummy data is overwritten 3 times in the volume as default setting.
Only storage administrator with user account can operate the Shredding function.
Page 15
HP StorageWorks P9500 Disk Array Security Target V1.17
2 Conformance claim
2.2 PP conformance
This ST does not claim compliance with any PP.
Page 16
HP StorageWorks P9500 Disk Array Security Target V1.17
In the ST, the user data of storage user exists in a resource group is the asset subject to protection in the
environment of large-scale storage with data of multiple companies, departments, systems and
applications in disk subsystem, and the asset is protected from accesses by unauthorized storage users.
3.2 Threats
The TOE counters threats shown below. A third party in the following description means a person who is
none of Remote Web Console user, storage user, and maintenance personnel, and is not authorized to use
the storage system.
The degree of attack is assumed to be low.
T.ILLEGAL_XCNTL If Remote Web Console user or maintenance personnel wrongly uses a function
outside own authority, an LDEV storing user data may be accessed by a host
that is not allowed to access the LDEV.
T.TSF_COMP If a third party who can connect to external LAN makes an unauthorized
connection on the channel between Remote Web Console and SVP PC, or
between SVP PC and external authentication server and obtains the
communication data including ID and password of Remote Web Console user,
he/she impersonates the Remote Web Console user and changes the storage
system setting, eventually may access the LDEV where the user data is stored.
T.LP_LEAK If a third party entity such as a host administrator access an LDEV other than
those allocated to the host, the user data may be leaked or falsified.
T.CHG_CONFIG If a third party who can access external LAN change
the storage system setting by using Remote Web Console, he/she can access the
LDEV where the user data is stored, eventually the user data may be leaked,
falsified and deleted.
T.HDD_THEFT From a hard disk which maintenance personnel takes out from the storage
system for the purpose of such as preventive maintenance, the user data may
wrongly be leaked.
T.HDD_REUSE If a storage administrator reuses the storage system or hard disk, the user data
remained in it may be leaked to users of the storage system.
Page 17
HP StorageWorks P9500 Disk Array Security Target V1.17
3.4 Assumptions
A.NOEVIL Within Remote Web Console users, the security administrator and audit log
administrator are assumed to be the qualified person who is capable of
operating and managing the entire storage system, executes proper
operations as specified by manuals, and never commit any wrongdoing.
The storage administrator is assumed to be the qualified person who is
capable of managing and operating a disk subsystem to the range permitted
by the security administrator and executes proper operations as specified by
manuals and never commits any wrongdoing.
A.NOEVIL_MNT Maintenance personnel is assumed to be the qualified person who is capable
of doing maintenance safely for the entire storage system including
connection of host and port on CHA, executes proper maintenance
operations as specified by manuals, and never commit any wrongdoing.
A.PHYSICAL_SEC A storage system, host (including fibre channel connection adapter), fibre
channel switch, other storage system and external authentication server are
assumed to be set at a secure area where only persons permitted can enter
and exit under the security administrator’s responsibility, and observed
properly to protect from unauthorized use.
A.MANAGE_SECRET The secret for host authentication set in the host is assumed to be controlled
under the security administrator’s responsibility to protect from use by
unauthorized person.
A.MANAGEMENT_PC Remote Web Console user is assumed to install and manage the management
PC appropriately in accordance with a security policy of organization to
protect it from unauthorized use. The security policy of organization to apply
to the management PC contains the following.
・ Install it in a place where direct administration is enabled, such as
standard office area.
・ Use it at an area where the direct access from external network to the
management (administrator client PC) is disabled.
・ Manage user identity authentication and administrator authority to
prevent unauthorized access.
・ Address malicious codes by restricting software installation, installing
antivirus software and applying security patch, and so on.
A.CONNECT_STORAGE Other storage systems connected to TOE are assumed to be limited to those
TOE is embedded.
Page 18
HP StorageWorks P9500 Disk Array Security Target V1.17
Page 19
HP StorageWorks P9500 Disk Array Security Target V1.17
4 Security objectives
This chapter describes TOE security objective, operational environment security objective, and security
objective rationale.
O.ADM_AUTH The TOE must succeed the identity authentication of Remote Web Console user
and maintenance personnel before the Remote Web Console user and
maintenance personnel execute the management operations of disk subsystem.
O.ADM_ROLE The TOE must control the management operations done by Remote Web
Console user and maintenance personnel as follows.
・ Security administrator can perform user management operation, resource
management operation, host and fibre channel switch authentication setting,
and encryption of stored data.
・ Audit log administrator can perform operations related to audit log.
・ Storage administrator can perform storage management operation within the
permitted resource group.
・ Maintenance personnel can perform external authentication server
performance management and storage system maintenance operations.
O.SEC_COMM The TOE must provide the communication function which is secured by the
encrypted data on the channel between Remote Web Console and SVP PC, and
between SVP PC and external authentication server to protect from sniffing of
the data on the communication route.
O.HOST_AUTH The TOE must identity authentication of the host by FC-SP function if the host
requests connection.
O.HOST_ACCESS The TOE must identify hosts to control that only the host which is allowed to
connect to the storage system can access the permitted LDEV.
O.HDD_ENC The TOE must manage encryption key to encrypt the stored data to prevent the
user data from being leaked from the hard disk taken out of the storage system.
O.HDD_SHRED The TOE must shred the user data to make sure that the user data does not remain
in the hard disk when the hard disk in the storage system is replaced or stops to
be used.
O.AUD_GEN The TOE must track events regarding the security such as identity authentication
and setting change operation.
Page 20
HP StorageWorks P9500 Disk Array Security Target V1.17
OE.PHYSICAL_SEC A storage system, host (including fibre channel connection adapter), fibre
channel switch, other storage system and external authentication server
must be set at a secure area where only the security administrator, storage
administrator, audit log administrator and maintenance personnel are
allowed to enter and exit, and the above devices must be completely
protected from any unauthorized physical access.
OE.MANAGE_SECRET The security administrator must control the secret for host authentication
set in the host to protect it from the use by unauthorized person.
OE.MANAGEMENT_PC Remote Web Console user must properly install and manage the
management PC in accordance with a security policy of organization to
protect it from unauthorized use.
OE.CONNECT_STORAGE Other storage systems connected to the TOE must be limited to those with
TOE embedded
OE.EXTERNAL_SERVER The security administrator must use protocol (LDAPS, starttls and
RADIUS (authentication protocol is CHAP)) which can protect the
communication with SVP PC supported by the TOE for external
authentication server, and properly register and control the user
identification information and user group information while keeping the
consistency with TOE.
Page 21
HP StorageWorks P9500 Disk Array Security Target V1.17
Table 4-1 Relationship between TOE security problems and security objectives
Security objectives
OE_EXTERNAL_SERVER
OE.CONNECT_STORAGE
OE.MANAGEMENT_PC
OE.MANAGE_SECRET
OE.PHYSICAL_SEC
O.HOST_ACCESS
OE.NOEVIL-MNT
O.HDD_SHRED
O.HOST_AUTH
OE.FC-SP_HBA
O.ADM_AUTH
O.SEC_COMM
O.ADM_ROLE
OE.HDD_ENC
O.AUD_GEN
O.HDD_ENC
OE.NOEVIL
A.NOEVIL X
A.NOEVIL_MNT X
A.PHYSICAL_SEC X
A.MANAGE_SECRET X
A.MANAGEMENT_PC X
TOE security problem
A.CONNECT_STORAGE X
A.EXTERNAL_SERVER X
T.ILLEGAL_XCNTL X X X
T.TSF_COMP X X
T.LP_LEAK X X
T.CHG_CONFIG X X
T.HDD_THEFT X X
T.HDD_REUSE X
P.MASQ X X
Page 22
HP StorageWorks P9500 Disk Array Security Target V1.17
Page 23
HP StorageWorks P9500 Disk Array Security Target V1.17
Page 24
HP StorageWorks P9500 Disk Array Security Target V1.17
・ The TOE shreds the user data in hard disk of storage system
when the use of hard disk stops, which can reduce the threat
to the user data leakage from the hard disk.
Table 4-4 Validity of the security objectives for organizational security policy
Organizational security policy Rationale for the fact that organizational security policy is
realized
P.MASQ P.MASQ is realized by O.HOST_AUTH and OE.FC-SP_HBA
as follows.
Page 25
HP StorageWorks P9500 Disk Array Security Target V1.17
Page 26
HP StorageWorks P9500 Disk Array Security Target V1.17
Page 27
HP StorageWorks P9500 Disk Array Security Target V1.17
6 Security requirement
This section describes security requirements.
a: The functional requirement related to access restriction, and identification and authentication of
Remote Web Console and maintenance personnel.
b) All auditable events for the [selection, choose one of: minimum, basic, detailed,
not specified] level of audit; and
FAU_GEN.1.2 The TSF shall record within each audit record at least the following information:
a) Date and time of the event, type of event, subject identity (if applicable), and
the outcome (success or failure) of the event; and
b) For each audit event type, based on the auditable event definitions of the
functional components included in the PP/ST, [assignment: other audit relevant
information].
[selection: choose one of; minimum, basic, detailed, not specified]: not specified.
[assignment: other specifically defined auditable events]: Auditable event to be
described in “Audit Items” on Table 6-1.
Page 28
HP StorageWorks P9500 Disk Array Security Target V1.17
FAU_GEN.1 None.
FAU_GEN.2 None.
FAU_SAR.1 None.
FAU_STG.1 None.
FAU_STG.3 None.
FAU_STG.4 None.
FCS_CKM.1 ・ Record success or failure of the creation of encryption key for data encryption, in
the log file.
FCS_CKM.4 ・ Record success or failure of the deletion of encryption key for data encryption, in
the log file.
FDP_ACC.1 None.
FDP_ACF.1 None.
FDP_RIP.1 ・ Record success or failure of start or stop of user data shredding, in the log file.
FIA_AFL.1 None. Reaching threshold of authentication try is not recorded in log file.
FIA_ATD.1a None.
FIA_ATD.1b None.
FIA_SOS.1a None. Unmatched metric is not recorded.
FIA_SOS.1b None. Unmatched metric is not recorded.
FIA_UAU.1 ・ Record the result of host authentication by FC-SP, in the log file.
FIA_UAU.2 ・ Record the success or failure of identity authentication of Remote Web Console
use and maintenance personnel, in the log file.
FIA_UID.2 ・ Record the success or failure of identity authentication of Remote Web Console
use and maintenance personnel, in the log file.
FIA_USB.1a None.
FIA_USB.1b None.
FMT_MOF.1 ・ Record the enabled or disabled setting of stored data encryption function, in the
log file.
・ Record the setting change of host authentication by FC-SP, in the log file.
・ Record the start or stop of shredding function, in the log file.
FMT_MSA.1 ・ Record LU path information creation and deletion, in the log file.
・ Record that user account is added to or deleted from user group, in the log file.
・ Record that role is added to or deleted from user group, in the log file.
・ Record that resource group is added to or deleted from user group, in the log file.
FMT_MSA.3 None.
Page 29
HP StorageWorks P9500 Disk Array Security Target V1.17
FMT_MTD.1 ・ Record creation or deletion of user ID for user account and change of password, in
the log file.
・ Record host WWN, secret creation, change, or deletion, in the log file.
・ Record creation, deletion, backup or restore of encryption key for data encryption,
in the log file.
・ Record the change of user authentication method, in the log file.
FMT_MTD.3 ・ Record that encryption key for data encryption is restored, in the log file.
FMT_SMF.1 ・ Record creation or deletion of user ID for user account, change of password, or
change of belonged user group, in the log file.
・ Record creation, change, or deletion of host WWN or secret.
FMT_SMR.1 ・ Record change of user group where the user account belongs to, in the log file.
・ Record that role is added to or deleted from user group, in the log file.
FPT_STM.1 None.
FTP_ITC.1 ・ Record the success or failure of identity authentication of Remote Web Console
use and maintenance personnel, in the log file.
FTP_TRP.1 ・ Record the success or failure of identity authentication of Remote Web Console
use and maintenance personnel, in the log file.
Page 30
HP StorageWorks P9500 Disk Array Security Target V1.17
Identity authentication of the ・ Success or failure of the identity authentication of Remote Web
Remote Web Console user Console user, executed date and time of the identity authentication,
user ID of the Remote Web Console, IP address of the management
PC.
Creation, modification and ・ User ID of security administrator who creates or deletes a user ID
deletion of user account of of user account, executed date and time, user ID of the operation
Remote Web Console user target, authentication method, operation (creation, modification,
and maintenance personnel deletion), operation result (success or failure)
Change of user account ・ User ID of the Remote Web Console user and maintenance
password of Remote Web personnel who change user account password, executed date and
Console user and maintenance time, user ID of operation target and operation result (success or
personnel failure).
Change of user group where ・ User ID of the security administrator who changes user group,
the user account of Remote executed date and time, name of user group, name of role, name of
Web Console and resource group, operation (role addition, deletion, RSG # addition,
maintenance personnel and deletion), and operation results (success or failure).
belongs to
Creation and deletion of LU ・ User ID of the storage administrator who creates or delete the LU
path information path information, executed date and time, operation (creation or
deletion), port number, WWN, LU number, LDEV number and
operation result (success or failure).
Setting change of existence or ・ User ID of the security administrator who changes existence or
nonexistence of host identity nonexistence of host identity authentication by FC-SP, executed
authentication by FC-SP date and time, host WWN, existence of authentication, operation
(change), and operation result (success or failure).
Host identity authentication ・ WWN of host whose identity is authenticated, executed date and
by FC-SP time and authentication result.
Setting for encryption of ・ User ID of the administrator who per forms the setting to enable or
stored data disable encryption of stored data, executed date and time, parity
group number, encryption setting status (enable/disable), operated
encryption key number, the number of setting parity groups, and
operation result (success or failure).
Generation, deletion, backup ・ User ID of the security administrator who performs generation,
and restoring of encryption deletion, backup and restoring of encryption key for data
key for encryption of stored encryption, executed date and time, operation (generation, deletion,
data backup or restoring), encryption key number, the number of
Page 31
HP StorageWorks P9500 Disk Array Security Target V1.17
Start or stop of shredding ・ User ID of the storage administrator who performs volume
shredding, executed date and time, operation (start or stop), written
data, the number of writing operations, target LDEV number, the
execution order of shredding, and operation result (success or
failure).
Page 32
HP StorageWorks P9500 Disk Array Security Target V1.17
Encryption key for data encryption FIPS PUB 197 AES 256
Page 33
HP StorageWorks P9500 Disk Array Security Target V1.17
Encryption key for data According to an instruction of security administrator, destroy the
encryption specified encryption key information and release the memory where
the information is stored.
Page 34
HP StorageWorks P9500 Disk Array Security Target V1.17
Processing acts for User group information (role, RSG Resource group information (RSG
Remote Web Console number) number)
LU path information (WWN, LU
number, LDEV number)
Processing acts for Allow access to objects if the WWN and LU number given from LDEV
host a host to the processing acts for host, and the LU path
information that is the security attribute of corresponding objects
match each other.
Processing acts for Rule to create or delete the objects by the processing acts for RSG
Remote Web Console Remote Web Console.
Page 35
HP StorageWorks P9500 Disk Array Security Target V1.17
[assignment: list of actions]: refuse the login of the user for a minute, and then the
number of unsuccessful authentication attempts cleared to be 0.
Page 36
HP StorageWorks P9500 Disk Array Security Target V1.17
Page 37
HP StorageWorks P9500 Disk Array Security Target V1.17
Page 38
HP StorageWorks P9500 Disk Array Security Target V1.17
[selection: determine the behavior of, disable, enable, modify the behavior of]:
disable, enable
No Roles Functions
Page 39
HP StorageWorks P9500 Disk Array Security Target V1.17
[assignment: the authorized identified roles]: Described in “Roles” on Table 6-9 and
Table 6-10.
Table 6-9 Operations of Remote Web Console user and maintenance personnel for security
attributes of processing act for host
Security - - - - - -
administrator
Audit log - - - - - -
administrator
-: No operation
Table 6-10 Operations of Remote Web Console user and maintenance personnel for security attribute
(user group information) of processing act for Remote Web Console
Page 40
HP StorageWorks P9500 Disk Array Security Target V1.17
Page 41
HP StorageWorks P9500 Disk Array Security Target V1.17
Table 6-11 Operations of Remote Web Console and maintenance personnel for user account
User ID Password
Table 6-12 Operations of Remote Web Console user and maintenance personnel for host
authentication data
Audit log - -
administrator
-: No operation
Table 6-13 Operations of Remote Web Console user and maintenance personnel for encryption key f
or data encryption
Storage administrator -
Audit log -
administrator
Page 42
HP StorageWorks P9500 Disk Array Security Target V1.17
Maintenance -
personnel
-: No operation
Table 6-14 Operations of Remote Web Console user and maintenance personnel for user authenticat
ion method
Storage administrator -
Audit log -
administrator
Maintenance -
personnel
-: No operation
Page 43
HP StorageWorks P9500 Disk Array Security Target V1.17
Page 44
HP StorageWorks P9500 Disk Array Security Target V1.17
Page 45
HP StorageWorks P9500 Disk Array Security Target V1.17
The evaluation assurance level of the TOE is EAL2. All security assurance requirements directly use
security assurance components stipulated in CC Part3.
(1) Development (ADV)
ADV_ARC.1 : Security architecture description
ADV_FSP.2 : Security-enforcing functional specification
ADV_TDS.1 : Basic design
Page 46
HP StorageWorks P9500 Disk Array Security Target V1.17
Table 6-15 Correspondence between security objectives and security function requirements
O.HOST_ACCESS
O_HDD_SHRED
O.HOST_AUTH
O.ADM_AUTH
O.SEC_COMM
O.ADM_ROLE
O_HDD_ENC
O.AUD_GEN
FAU_GEN.1 X
FAU_GEN.2 X
FAU_SAR.1 X
FAU_STG.1 X
FAU_STG.3 X
FAU_STG.4 X
FCS_CKM.1 X
TOE security function requirements
FCS_CKM.4 X
FDP_ACC.1 X X
FDP_ACF.1 X X
FDP_RIP.1 X
FIA_AFL.1 X
FIA_ATD.1a X
FIA_ATD.1b X
FIA_SOS.1a X
FIA_SOS.1b X
FIA_UAU.1 X
FIA_UAU.2 X
FIA_UID.2 X X
FIA_USB.1a X
Page 47
HP StorageWorks P9500 Disk Array Security Target V1.17
O.HOST_ACCESS
O_HDD_SHRED
O.HOST_AUTH
O.ADM_AUTH
O.SEC_COMM
O.ADM_ROLE
O_HDD_ENC
O.AUD_GEN
FIA_USB.1b X
FMT_MOF.1 X
FMT_MSA.1 X
FMT_MSA.3 X
FMT_MTD.1 X X
FMT_MTD.3 X
FMT_SMF.1 X
FMT_SMR.1 X
FPT_STM.1 X
FTP_ITC.1 X
FTP_TRP.1 X
Table 6-16 shows that the TOE security objectives are realized by the TOE security function requirements.
Table 6-16 Validity of security function requirements for TOE security objectives
TOE security
Rationale that TOE security objectives are realized
objectives
O.ADM_AUTH O.ADM_AUTH requires performing identification and authentication of Remote Web
Console user before the Remote Web Console user performs management operation of
disk subsystem.
The details of necessary measures and required functions for the above request are as
follows.
a. Maintaining Remote Web Console user
The TOE must define user accounts, associate users with the user accounts, and
maintain them to identify Remote Web Console users. In other words, it enables
identification of Remote Web Console users. The security requirements corresponding to
the requirement are FIA_ATD.1a and FIA_USB.1a.
b. Identity authentication of Remote Web Console user account before using the TOE
Before the TOE is used, the TOE must identify user accounts. Therefore, performing
identity authentication of user accounts before execution of any of all Remote Web
Console functions is required. The security function requirements corresponding to the
Page 48
HP StorageWorks P9500 Disk Array Security Target V1.17
TOE security
Rationale that TOE security objectives are realized
objectives
requirement are FIA_UID.2 and FIA_UAU.2.
c. Managing password
The password for the TOE to authenticate user accounts must be at least 6 characters
and no more than 256 characters (the password for maintenance personnel is 127
characters) consist of combination of one-byte upper-case alphabet, one-byte lower-case
alphabet, one-byte number, and any of the following 32 symbols; !”#$%&’()*+,-
./:;<=>?@[\]^_`{|}~. If authentication fails 3 times in a row due to entering incorrect
password, login of the user ID is refused for a minute, which can decrease the possibility
of breaking password. The security function requirements corresponding to the function
are FIA_AFL.1 and FIA_SOS.1a.
The TOE must have a function to manage operations by Remote Web Console user
and maintenance personnel. Also, it must have a function to stop and activate the data
encryption function, the FC-SP authentication function, the shredding function, and the
external authentication server connection function. The security function requirement
corresponding to the above requirements is FMT_SMF.1.
d. Maintaining role
The TOE must maintain the roles of security administrator, storage administrator,
audit log administrator, maintenance personnel and storage user, and associate them with
users. The security function requirement corresponding to the above requirement is
Page 49
HP StorageWorks P9500 Disk Array Security Target V1.17
TOE security
Rationale that TOE security objectives are realized
objectives
FMT_SMR.1.
e. Managing behavior of security function
The TOE must restrict activation and stop of stored data encryption/decryption, host
authentication, connection with external authentication server, and shredding function
according to roles of user account. It can prevent unauthorized change to use or stop
each function. The security function requirement corresponding to the above function is
FMT_MOF.1.
f. Defining and executing access control
The TOE must create and delete RSG and LDEV in accordance with the rule defined as
[LM access control SFP] for Remote Web Console user and maintenance personnel. It
enables the storage administrator to create and delete LDEVs in the allocated RSG. Also,
restrictive default value can be assigned as access attribute at LDEV creation. It means
that accesses are limited because LU path information does not exist at the LDEV
creation. The security function requirements corresponding to the above requirement are
FDP_ACC.1, FDP_ACF.1 and FMT_MSA.3.
O.ADM_ROLE is satisfied by achieving the above a, b, c, d, e, and f.
And that is, achieving FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1,
FMT_SMR.1, FMT_MOF.1, FDP_ACC.1, and FDP_ACF.1, which are necessary
security function requirements for each measurement, can realize O.ADM_ROLE.
O.HOST_AUTH O.HOST_AUTH requires authenticating a host when the host requests connection.
The detail of necessary measurement and required function for the above request are as
follows.
a. Executing FC-SP function
When the TOE receives a command to execute security authentication from a host, it
Page 50
HP StorageWorks P9500 Disk Array Security Target V1.17
TOE security
Rationale that TOE security objectives are realized
objectives
generates and returns DH-CHAP authentication code. (FIA_UAU.1)
b. Managing secret
A secret for the TOE to authenticate a host is at least 12 characters and no more than
32 characters consist of combination of one-byte upper-case alphabet, one-byte lower-
case alphabet, one-byte number, one-byte space and any of the following 12 symbols; .-
+@_=:/[],~. It can decrease the possibility that the password is broken. The security
function requirement corresponding to the function is FIA_SOS.1b.
O.HOST_AUTH can be satisfied by achieving all of the above a and b.
And that is, achieving FIA_UAU.1 and FIA_SOS.1b which are the necessary security
function requirements can realize O.HOST_AUTH.
The detail of necessary measurement and required functions for the above request are as
follows.
a. Maintaining host
The TOE must define host attribute information (WWN, LU number), associate the
attribute to the host, and maintain them. The security function requirements
corresponding to the requirement are FIA_ATD.1b and FIA_USB.1b.
O.HDD_ENC O.HDD_ENC requires managing encryption key for data encryption to prevent user data
in a hard disk taken out of storage system from being leaked.
The detail of necessary measure and required function for the request are as follows.
a. Generating and deleting encryption key for data encryption
User data stored in a hard disk needs to be encrypted to prevent the user data from
being leaked from the hard disk replaced as preventive maintenance. For encryption and
decryption, LSI embedded in DKA is used. The TOE generates encryption keys to user
for encryption and deletes them after user. The security function requirements
corresponding to the above function are FCS_CKM.1, and FCS_CKM.4.
Page 51
HP StorageWorks P9500 Disk Array Security Target V1.17
TOE security
Rationale that TOE security objectives are realized
objectives
b. Restricting operations for encryption key for data encryption
The TOE needs to restrict operations for encryption keys according to user account
roles. In addition, it manages encryption keys so that keys other than those with backup
cannot be restored. This prevents unauthorized modification for encryption keys. The
security function requirements corresponding to the request are FMT_MTD.1 and
FMT_MTD.3.
O.HDD_SHRED O.HDD_ SHRED requires shredding old user data in a hard disk before re-using the hard
disk of storage system to prevent the user data from being leaked.
The detail of necessary measurement and required function for the request are as follows.
a. Protecting user data in hard disk
When a hard disk becomes disuse, the user data stored in the hard disk needs to be
shred so as to protect the user data from being leaked from the hard disk. The security
function requirement corresponding to the above function is FDP_RIP.1.
Because time stamps provided by FPT_STM.1 are those for SVP PC OS and cannot
be modified by other than maintenance personnel, logs for issue such as time setting
Page 52
HP StorageWorks P9500 Disk Array Security Target V1.17
TOE security
Rationale that TOE security objectives are realized
objectives
change do not need to be obtained.
When generating audit log, the date and time the issue occurs and user ID of user who
performs the operation need to be put in the audit log so that occurrence date and time
and the user who operates can be identified. The security function requirements
corresponding to the request are FAU_GEN.2 and FPT_STM.1.
b. Restricting reference to audit log
To refer audit records, the audit record in SVP PC needs to be downloaded from Remote
Web Console. Downloading the audit record is limited to a user account with audit log
administrator role to protect the audit logs from unauthorized reference. The security
function requirement corresponding to the request is FAU_SAR.1.
c. Protecting the audit log from falsification
The TOE must prevent deletion and falsification of audit logs by an unauthorized user.
Downloading the audit logs is limited to a user account with audit log administrator role.
The TOE itself does not have a function to modify the audit logs to protect the audit logs
from unauthorized deletion or modification. The security function requirement
corresponding to the request is FAU_STG.1.
d. Warning risk of loss of audit log
Up to 250,000 lines audit logs can be created but when the number of audit logs exceeds
the maximum, the oldest audit log is erased. To avoid the loss of audit logs, when the
number of audit logs goes over 175,000, a warning to indicate the exceedance is
displayed on Remote Web Console window to persuade downloading the audit logs. The
security function requirements corresponding to the request are FAU_STG.3 and
FAU_STG.4.
O.AUD_GEN can be satisfied by achieving all the above measurements a, b, c, and d.
And that is, achieving FAU_GEN.1, FAU_GEN.2, FPT_STM.1, FAU_SAR.1,
FAU_STG.1, FAU_STG.3, and FAU_STG.4 which are the security function requirements
can realize O.AUD_GEN.
Page 53
HP StorageWorks P9500 Disk Array Security Target V1.17
Page 54
HP StorageWorks P9500 Disk Array Security Target V1.17
*3: Because the TOE is software, and encryption and decryption are fulfilled by hardware, there is no
corresponding function requirement.
Table 6-18 shows the rationale that the definition maintains consistency of function requirements in the
same category for each TOE security function requirements.
Security function
No Category Rationale of consistency
requirements
Page 55
HP StorageWorks P9500 Disk Array Security Target V1.17
Security function
No Category Rationale of consistency
requirements
As stated below, mutual support is established by security function requirements which do not have
interdependence.
- For FIA_UID.2 and FIA_UAU.1, FMT_MOF.1 limits operations to start or stop the security function
according to roles, and operations can be allowed only from Remote Web Console. The security
function cannot be started or stopped by any other method to prevent deactivation.
As aforementioned, IT security requirements described in the ST establish the whole with internal
consistency by mutual support in integrated manner.
Page 56
HP StorageWorks P9500 Disk Array Security Target V1.17
Page 57
HP StorageWorks P9500 Disk Array Security Target V1.17
Table 7-1 Correspondence relation between TOE security functions and security function
requirements
SF.AUDIT
SF.ROLE
SF.FCSP
SF.HDD
SF.LM
SF.SN
FAU_GEN.1 X
FAU_GEN.2 X
FAU_SAR.1 X
FAU_STG.1 X
FAU_STG.3 X
FAU_STG.4 X
TOE security function requirements
FCS_CKM.1 X
FCS_CKM.4 X
FDP_ACC.1 X
FDP_ACF.1 X
FDP_RIP.1 X
FIA_AFL.1 X
FIA_ATD.1a X
FIA_ATD.1b X
FIA_SOS.1a X
FIA_SOS.1b X
FIA_UAU.1 X
FIA_UAU.2 X
FIA_UID.2 X X
Page 58
HP StorageWorks P9500 Disk Array Security Target V1.17
SF.AUDIT
SF.ROLE
SF.FCSP
SF.HDD
SF.LM
SF.SN
FIA_USB.1a X
FIA_USB.1b X
FMT_MOF.1 X
FMT_MSA.1 X
FMT_MSA.3 X
FMT_MTD.1 X X
FMT_MTD.3 X
FMT_SMF.1 X
FMT_SMR.1 X
FPT_STM.1 X
FTP_ITC.1 X
FTP_TRP.1 X
The following states each TOE security functions and the specific method to realize SFR corresponding to
the security functions.
7.1.1 SF.LM
The TOE is connected with a host via SAN environment. SAN is the dedicated network for storage system
that connects hosts and storage systems via the fibre channel. The TOE performs access control by SF.LM
while the host accesses LDEVs in the storage system.
The TOE maintains user group information (such as role and RSG number) and associates them with
processing acting for Remote Web Console (FIA_ATD.1a and FIA_USB.1a).
The TOE maintains the attribute information of host (such as WWN and LU number) and associates them
with processing acting for the host (FIA_ATD.1b and FIA_USB.1b).
The TOE identifies the host before an operation of security function related to access from host
(FIA_UID.2).
The TOE performs [LM access control SFP] when the processing acting for a host accesses a LDEV or the
Page 59
HP StorageWorks P9500 Disk Array Security Target V1.17
processing acting for Remote Web Console creates or delete the LDEV.
[LM access control SFP] consists of the following rules (FDP_ACC.1, FDP_ACF.1, and FMT_MSA.3)
・ When WWN and LU number passed over to the processing acting for the host are consistent with LU
path that is the security attribute of the corresponding object, the access to the LDEV is allowed while
it is rejected if the LU path information is not consistent.
・ When the processing acting for Remote Web Console creates or deletes RSG, only the security
administrator can create or delete the RSG according to [User group information of Remote Web
Console] (such as role and RSG) passed over to the processing acting for Remote Web Console.
・ When the processing acting for Remote Web Console creates or delete LDEV, according to [User
group information of Remote Web Console] (such as role and RSG) passed over to the processing
acting for Remote Web Console, the storage administrator can create or delete LDEV in a resource
group only when RSG number assigned to the user group where the storage administrator belongs
matches with the RSG number of the LDEV.
・ Condition when deleting LDEV: Delete a LDEV when there is no LU path associated with the LDEV.
・ When storage administrator creates LDEV, a restrictive default value is given as the access attribute. It
means that the access from the host is restricted because there is no LU path information at the LDEV
creation. (FMT_MSA.3)
7.1.2 SF.FCSP
The TOE executes identity authentication of host if customer security policy requires. DH-CHAP with
NULL DH Group authentication is used for this authentication.
[Satisfied requirements] FIA_SOS.1b, FIA_UAU.1
If host authentication is required, the TOE creates DH-CHAP authentication code when a command of
security authentication is received from the host, and sends it back to the host (FIA_UAU.1). The
connection between the host and storage system is allowed when a secret received from the host matches
with a secret that the TOE has (FIA_UAU.1).
The TOE restrict the entry of secret used for host identity authentication by FC-SP to be at least 12
characters and no more than 32 characters consists of one-byte upper-case alphabet, one-byte lower-case
alphabet, one-byte number, one-byte space and any of the following 12 symbols; .-+@_=:/[],~.
(FIA_SOS.1b)
7.1.3 SF.SN
[Satisfied requirements] FIA_AFL.1, FIA_SOS.1a, FIA_UID.2, FIA_UAU.2, FTP_TRP.1, and
FTP_ITC.1
The TOE executes identity authentication at remote desktop connection to Remote Web Console and SVP
PC using user ID and password before any operations of other security functions. If the identity
authentication fails 3 times in a row, the identity authentication of the user is refused for one minute.
(FIA_UID.2, FIA_UAU.2, and FIA_AFL.1)
The TOE restricts the entry for password used for Remote Web Console or maintenance personnel internal
authentication to be at least 6 characters and no more than 256 characters (127 characters for maintenance
personnel) consists of one-byte upper-case alphabet, one-byte lower-case alphabet, one-byte number, any
Page 60
HP StorageWorks P9500 Disk Array Security Target V1.17
The TOE employs SVP internal authentication method for identity authentication of Remote Web Console
user and maintenance personnel. If the entered user ID does not exist in the TOE, external authentication
server method is used.
When identity authentication of Remote Web Console user and maintenance personnel is executed by the
external authentication server method, TOE starts communication between SVP PC and external
authentication server using LDAPS, starttls or RADIUS (authentication protocol is CHAP) and sends user
ID and password of user account to be used for identification and authentication of Remote Web Console
user and maintenance personnel. Using LDAPS, starttls, or ADIUS (authentication protocol is CHAP) for
the communication between the SVP PC and the external authentication server can prevent TSF data from
being sniffed. (FTP_ITC.1)
The TOE allows starting communication when Remote Web Console user activates Remote Web Console
on management PC). For the communication between Remote Web Console and SVP PC, SSL is used to
prevent the TSF data from being sniffed. (FTP_TRP.1)
The SSL used for the communication between Remote Web Console and SVP PC supports [SSLv3.0] or
[TLSv1.0]. Table 7-2 shows Encryption-relevant algorithm used by SSL.
FIPS PUB 197 AES 256 Data encryption To select algorithm used
128 and decryption for session key by hand-
shake protocol in version of
FIPS PUB 46-3 3DES 168 [SSLv3.0] and [TLSv1.0]
7.1.4 SF.ROLE
[Satisfied requirements] FMT_MSA.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, and FMT_MOF.1
The TOE executes [LM access control SFP] for the access from the processing acting for Remote Web
Console to SVP PC.
Page 61
HP StorageWorks P9500 Disk Array Security Target V1.17
・ [LM access control SFP] restricts operations to create, delete and refer LU path information (WWN,
LU number, LDEV number) based on roles and RSG numbers. (FMT_MSA.1). Table 6-9 shows
operations each role can perform for the LU path information.
・ [LM access control SFP] restrict operations to add, delete and refer user group information (role and
RSG number) based on roles (FMT_MSA.1). Table 6-10 shows operations each role can perform for
the user group information.
・ The account management function of Remote Web Console manages user ID, password, role and RSG
number of Remote Web Console user and maintenance personnel. Table 6-10 and Table 6-11 show
management operations each role can perform.
・ The FC-SP function of Remote Web Console manages WWN and secret which are authentication data
of host. Table 6-12 shows management operations each role can perform.
・ The access control function of Remote Web Console manages user authentication method. Table 6-14
shows management operations each role can perform.
・ The function to manage user account of Remote Web Console, role of user account, host
authentication information, WWN authentication information, LU path information,
and user group information.
・ The function to manage operations by Remote Web Console user and maintenance personnel.
・ The function to manage functions for stored data encryption, FC-SP authentication function, shredding
function, management function for starting or stopping connection to external authentication server.
The TOE restricts an operation to set host authentication by FC-SP (With or without authentication) based
on roles. Table 6-8 shows operations each role can perform (FMT_MOF.1).
The TOE restricts setting operation to use or not to use the stored data encryption function based on roles.
Table 6-8 shows operations each role can perform (FMT_MOF.1).
The TOE restricts setting operation to user or not to use connecting function of external authentication
server (including connection setting parameter) based on roles. Table 6-8 shows operations each role can
perform (FMT_MOF.1).
The TOE restricts operations to start and stop shredding function based on roles. Table 6-8 shows
operations each role can perform (FMT_MOF.1).
The TOE maintains and associate roles (security administrator, storage administrator, audit log
administrator, maintenance personnel, and storage user). (FMT_SMR.1)
7.1.5 SF.HDD
[Satisfied requirements] FCS_CKM.1, FCS_CKM.4, FMT_MTD.1, FMT_MTD.3, and FDP_RIP.1
The TOE encrypts user data when storing it in a hard disk. For encryption and decryption, LSI embedded
in DKA is used. The TOE creates encryption key for data encryption. Table 6-3 shows the algorithm for
encryption key generation and Table 6-4 shows method to remove encryption key (FCS_CKM.1,
FCS_CKM.4).
Page 62
HP StorageWorks P9500 Disk Array Security Target V1.17
The TOE limits administrators who can perform operations for encryption key used for data encryption.
Only security administrator can create, delete, backup (inquiry) and restore (inquiry and modification) the
encryption keys (FMT_MTD.1).
The TOE can make backup of encryption key for data encryption in management PC. It also can restore
the backup encryption key from the management PC to storage system. At the restoring, a hash value set in
the backup data at the backup is verifies with a hash value of data to be restored. Only when the hash
values are consistent, the encryption key can be restored. As the hash value contains serial number of the
storage system, the encryption key can be restored only in the backed up storage system. (FMT_MTD.3)
The TOE shreds user data in LDEV which becomes disuse. (FDP_RIP.1)
7.1.6 SF.AUDIT
[Satisfied requirements] FAU_GEN.1, FAU_GEN.2, FPT_STM.1, FAU_SAR.1, FAU_STG.1,
FAU_STG.3 and FAU_STG.4
・ When an audit issue related to the security function in the TOE occurs, an audit log is generated. The
user ID of user account that causes each audit issue is added to the audit log. In addition, for the date
used when the audit log is generated, the time managed by OS on SVP PC is used. Table 6-2 describes
the audit information.
・ Up to 250,000 lines audit logs can be created. When the number of audit logs exceeds the maximum,
the oldest audit log is erased by returning to the line where the storing starts (wraparound method).
When the number of audit logs goes over 175,000, a warning to indicate the exceedance is displayed
on Remote Web Console window to persuade audit administrator to download the audit logs. If the
audit logs are downloaded, the number of lines is reset and audit log starts at the first line.
・ Starting and ending audit function works in conjunction with TOE activation and termination.
The audit logs the TOE obtains consists of basic information and detailed information. Table 7-3 and Table
7-4 show contents of output basic information and detailed information respectively.
No Item Description
5 Function name Character string indicates function which executes setting operation
Function names
Page 63
HP StorageWorks P9500 Disk Array Security Target V1.17
No Item Description
Console user and maintenance personnel
Page 64
HP StorageWorks P9500 Disk Array Security Target V1.17
No Item Description
Starting shredding
Stopping shredding
Page 65
HP StorageWorks P9500 Disk Array Security Target V1.17
5 Change of user group where ・ User ID of operation target, user group name, role, RSG
Remote Web Console user and number, operation result (success or failure)
maintenance personnel belong to
7 Creation, modification, deletion ・ Port number, host WWN, the number of hosts
of host WWN and secret
12 Start of stop shredding ・ Written data , the number of writing, target LDEV number,
the number of target LDEVs, execution order or shredding
processing
Page 66
HP StorageWorks P9500 Disk Array Security Target V1.17
8 Reference
- Common Criteria for Information Technology Security Evaluation
Part1: Introduction and general model July 2009 Version 3.1 Revision 3 Final
CCMB-2009-07-001
Page 67
HP StorageWorks P9500 Disk Array Security Target V1.17
Terms Definition
Redundant Array of A technology which can recover damaged data by spreading or duplicating to
Independent Disks multiple disk drives, improve the performance, and keep redundancy of data.一
(RAID) There are RAID0 (data striping), RAID 1 (disk mirroring) and RAID5 (data
striping with distributed parity added) as commonly used raid types.
Remote Web The program which provides GUI for storage system setting. It consists of Flex
Console application and Java applet, works on SVP PC and management PC. It is used by
Remote Web Console user and maintenance personnel.
Parity group A group of hard disk drives to realize RAID system (see above).
A parity group consists of multiple hard disk drives where user data and parity
information are stored. The user data can be accessed even if one or more drive
in the group becomes unavailable.
Fibre channel High speed network technology to build Storage Area Network (SAN).
Fibre channel switch A switch to connect each device of fibre channel interface. Using the fibre
channel switch enables to build SAN (Storage Area Network) by connecting
multiple host and storage systems in high speed.
LDEV Abbreviation of logical device and a unit of volume created in a user area in
storage system. It is also called as logical volume.
Logical unit (LU) The LDEV used from a host of Open system is called LU. On the Open system
fibre channel interface, access to LU mapped with one or more LDEV is enabled.
LU path Data input/output channel connecting Open system host and LU.
LU number (LUN) LDEV which is associated with fibre channel port and accessible from host. Or it
is an address allocated to volume for Open system.
Port The end of fibre channel. Each port is identified by port number.
Fibre Channel A protocol to execute authentication each other at communication between host
Security Protocol or fibre channel switch and storage system. DH-CHAP with NULL DH Group
(FC-SP) authentication is used.
Page 68
HP StorageWorks P9500 Disk Array Security Target V1.17
Terms Definition
Connection setting A parameter to be set in SVP PC for identification and authentication by using
parameter for external authentication server. It contains the following information.
external Type of external authentication server (LDAP, RADIUS), address of external
authentication server authentication server, certificate of external authentication server, protocol
(LDAPS, starttls, CHAP), and port number and so on.
DH-CHAP A protocol used for FC-SP. It uses CHAP protocol for key exchange.
8.1.1.2 Abbreviation
In this document, the following abbreviations are used.
CACHE CACHE memory
CC Common Criteria
CHA Channel Adapter
CHAP Challenge Handshake Authentication Protocol
DH-CHAP Diffie Hellman - Challenge Handshake Authentication Protocol
DKA Disk Adapter
DKC Disk Controller
EAL Evaluation Assurance Level
FC-SP Fibre Channel Security Protocol
HDD Hard disk drive
JRE Java Runtime Environment
LAN Local Area Network
LDAP Lightweight Directory Access Protocol
LDAPS LDAP over TLS
LDEV Logical Device
LSI Large Scale Integration
LU Logical unit
LUN Logical Unit Number
PC Personal Computer
Page 69
HP StorageWorks P9500 Disk Array Security Target V1.17
PP Protection Profile
RADIUS Remote Authentication Dial In User Service
RAID Redundant Array of Independent Disks
SAN Storage Area Network
SF Security Function
SFP Security Function Policy
SSL Secure Sockets Layer
ST Security Target
SVP Service Processor
TLS Transport Layer Security
TOE Target of Evaluation
TSF TOE Security Functions
P9500 HP StorageWorks P9500 Disk Array
WWN World Wide Name
Page 70