Cisco Cisco IOS Software Release 12.4(23)
6. TOE Summary Specification
Document Organization
29
Security Target For Cisco IOS IPSec
6.2 Assurance Measures
The purpose of this section is to show that the identified assurance measures are appropriate to meet the
assurance requirements by mapping the identified assurance measures onto the assurance requirements.
assurance requirements by mapping the identified assurance measures onto the assurance requirements.
The Assurance Measures that demonstrate the correct implementation and use of the Security Functions
of the TOE are as follows:
of the TOE are as follows:
•
User Guidance (UG) Documentation
•
Functional Specification (FSP) Document
•
High Level Design (HLD) Document
•
Configuration Management Plan (CMP) Document
•
Analysis of Testing (ATE) Document
•
Vulnerability Assessment (VA) Document
demonstrates that the identified assurance measures completely meet the assurance
requirements by showing that all requirements are mapped to an assurance measure.
1.
FAU_AUD.1 is a bespoke component based on the [CC] Part 2 component FAU_GEN.1.
Table 13
Mapping of Assurance Measures to Assurance Requirements
CC Assurance Component
Assurance Measure
ACM_CAP.2
Configuration Items
Configuration Management Plan
ADO_DEL.1
Delivery Procedures
Configuration Management Plan
ADO_IGS.1
Installation, generation, and
start-up procedures
start-up procedures
User Guidance
ADV_FSP.1
Information Functional
Specification
Specification
Functional Specification
User Guidance
ADV_HLD.1
Descriptive high-level design
High Level Design
ADV_RCR.1
Informal correspondence
demonstration
demonstration
Functional Specification
High Level Design
AGD_AGM.1
Administrator guidance
User Guidance
AGD_USR.1
User guidance
User Guidance
ATE_COV.1
Evidence of coverage
Analysis of Testing
ATE_FUN.1
Functional testing
Analysis of Testing
ATE_IND.2
Independent testing-sample
Analysis of Testing, TOE
AVA_SOF.1
Strength of TOE security function
evaluation
evaluation
Vulnerability Assessment
AVA_VLA.1
Independent vulnerability analysis Vulnerability Assessment