Security profile overview

Security profile is a product that specifies security requirements for general-purpose operating systems in networked environments. This profile establishes the requirements necessary to achieve the security objectives of the Target of evaluation (TOE) security function and its environment.

Security profile contains a base package and several extended packages. Products that are related to Security profile base package support are Identification and Authentication, Discretionary Access Control (DAC), Auditing, Cryptographic Services, Management of Security Mechanisms, and Trusted Channel communications. Security profile includes additional, optional packages for Labeled Security, Integrity Verification, Advanced Audit, General Purpose Cryptography, Advanced Management, Extended Identification and Authentication, Trusted Boot, and Virtualization.

Assumptions
  • Environment to use for the TOE:

    All assumptions in the section refer to Base AIX Security (BAS mode) and Labeled AIX Security (LAS mode) unless otherwise stated. All assumptions related to Virtual input output server (VIOS) are explicitly marked as VIOS only. VIOS does not share assumptions with the AIX operating system.

  • Physical:
    The IT environment provides the TOE with appropriate physical security that is commensurate with the value of the IT assets protected by the TOE.
    Note: VIOS only: The operational environment provides the TOE with appropriate physical security that is commensurate with the value of the IT assets protected by the TOE.
  • Administration:
    • The TOE security function is managed by one or more competent individuals. The system administrative personnel are not careless, willfully negligent, or hostile, and they abide by the instructions provided by the guidance documentation.
    • Authorized users can access some information managed by the TOE and are expected to act in a cooperating manner.
    • Users are sufficiently trained and trusted to accomplish some task or group of tasks within a secure IT environment. They must exercise complete control over their user data.
    • VIOS only: The TOE security function is managed by one or more competent individuals. The system administrative personnel are not careless, willfully negligent, or hostile, and they abide by the instructions provided by the guidance documentation.
    • VIOS only: Authorized users possess the necessary authorization to access at least some of the information managed by the TOE and are expected to act in a cooperating manner.
    • VIOS only: Users are sufficiently trained and trusted to accomplish some task or group of tasks within a secure operational environment. They must exercise complete control over their user data.
  • Procedural:
    • Any modification or corruption of security-enforcing or security-relevant files of the TOE that the user, or the underlying platform caused either intentionally or accidentally must be detected by an administrative user.
    • All remote trusted IT systems that are trusted by the Target Security Function (TSF) to provide TSF data or services to the TOE, or to support the TSF in the enforcement of security policy decisions, are assumed to be under the same management control and operate under security policy constraints that are compatible with the security policy of the TOE.
    • All remote trusted IT systems that are trusted by the TSF to provide TSF data or services to the TOE, or to support the TSF in the enforcement of security policy decisions, are assumed to correctly implement the functions that are used by the TSF consistent with the assumptions defined for this function.
    • The integrity of the following information is ensured:
      • All TSF code, including the integrity verification function that is loaded and run before starting the integrity verification mechanism
      • All TSF data, including TSF data to perform integrity verification that is used by the TSF code loaded and run before starting the integrity verification mechanism
    • VIOS only: Any modification or corruption of security-enforcing or security-relevant files of the TOE that the user, or the underlying platform caused either intentionally or accidentally must be detected by an administrative user.
  • Connectivity: All connections to and from remote trusted IT systems and between physically-separate parts of the TSF not protected by the TSF itself are physically or logically protected within the TOE environment to ensure the integrity and confidentiality of the data transmitted and to ensure the authenticity of the communication end points.

Obtaining the software

The obtain the software, complete the following steps:
  1. Download the product.
  2. Click on Help from the Entitled software support menu on the left pane. The Common Criteria evaluated configuration requires the product and any updates to be obtained on physical media or using download director.
For information on installing the product, see Installing a BAS /EAL4+ system.