Physical Access Control
Tamper Protection
PE-6(2)
|
Monitoring Physical Access
Automated Intrusion Recognition / Responses
|
SA-18
|
Tamper Resistance and Detection
|
FPT_PHP.3
|
TSF Physical Protection
Resistance to Physical Attack
|
PE-3(5)
|
Physical Access Control
Tamper Protection
|
SA-18
|
Tamper Resistance and Detection
|
FPT_RCV.1
|
Trusted Recovery
Manual Recovery
|
CP-10
|
Information System Recovery and Reconstitution
|
CP-12
|
Safe Mode
|
FPT_RCV.2
|
Trusted Recovery
Automated Recovery
|
CP-10
|
Information System Recovery and Reconstitution
|
CP-12
|
Safe Mode
|
FPT_RCV.3
|
Trusted Recovery
Automated Recovery Without Undue Loss
|
CP-10
|
Information System Recovery and Reconstitution
|
CP-12
|
Safe Mode
|
FPT_RCV.4
|
Trusted Recovery
Function Recovery
|
SI-6
|
Security Function Verification
|
SI-10(3)
|
Information Input Validation
Predictable Behavior
|
SC-24
|
Fail in Known State
|
FPT_RPL.1
|
Replay Detection
Replay Detection
|
IA-2(8)
|
Identification and Authentication (Organizational Users)
Network Access To Privileged Accounts - Replay Resistant
|
IA-2(9)
|
Identification and Authentication (Organizational Users)
Network Access To Non-Privileged Accounts - Replay Resistant
|
SC-23
|
Session Authenticity
|
SI-3(9)
|
Malicious Code Protection
Authenticate Remote Commands
|
FPT_SSP.1
|
State Synchrony Protocol
Simple Trusted Acknowledgement
|
No Mapping.
|
FPT_SSP.2
|
State Synchrony Protocol
Mutual Trusted Acknowledgement
|
No Mapping.
|
FPT_STM.1
|
Time Stamps
Reliable Time Stamps
|
AU-8
|
Time Stamps
|
FPT_TDC.1
|
Inter-TSF TSF Data Consistency
Inter-TSF Basic Data Consistency
|
AC-16(7)
|
Security Attributes | Consistent Attribute Interpretation
|
AC-16(8)
|
Security Attributes
Association Techniques/Technologies
|
FPT_TEE.1
|
Testing of External Entities
Testing of External Entities
|
SI-6
|
Security Functionality Verification
|
FPT_TRC.1
|
Internal TOE TSF Data Replication Consistency
Internal TSF Consistency
|
SI-7
|
Software, Firmware, and Information Integrity
|
FPT_TST.1
|
TSF Self-Test
TSF Testing
|
SI-6
|
Security Functionality Verification
|
SI-7
|
Software, Firmware, and Information Integrity
|
FRU_FLT.1
|
Fault Tolerance
Degraded Fault Tolerance
|
AU-15
|
Alternate Audit Capability
|
CP-11
|
Alternate Communications Protocols
|
SC-24
|
Fail in Known State
|
SI-13
|
Predictable Failure Prevention
|
SI-13(1)
|
Predictable Failure Prevention
Transferring Component Responsibilities
|
SI-13(2)
|
Predictable Failure Prevention
Time Limit on Process Execution Without Supervision
|
SI-13(3)
|
Predictable Failure Prevention
Manual Transfer Between Components
|
SI-13(4)
|
Predictable Failure Prevention
Standby Component Installation/Notification
|
SI-13(5)
|
Predictable Failure Prevention
Failover Capability
|
FRU_FLT.2
|
Fault Tolerance
Limited Fault Tolerance
|
AU-15
|
Alternate Audit Capability
|
CP-11
|
Alternate Communications Protocols
|
SC-24
|
Fail in Known State
|
SI-13
|
Predictable Failure Prevention
|
SI-13(1)
|
Predictable Failure Prevention
Transferring Component Responsibilities
|
SI-13(2)
|
Predictable Failure Prevention
Time Limit on Process Execution Without Supervision
|
SI-13(3)
|
Predictable Failure Prevention
Manual Transfer Between Components
|
SI-13(4)
|
Predictable Failure Prevention
Standby Component Installation/Notification
|
SI-13(5)
|
Predictable Failure Prevention
Failover Capability
|
FRU_PRS.1
|
Priority of Service
Limited Priority of Service
|
SC-6
|
Resource Availability
|
FRU_PRS.2
|
Priority of Service
Full Priority of Service
|
SC-6
|
Resource Availability
|
FRU_RSA.1
|
Resource Allocation
Maximum Quotas
|
SC-6
|
Resource Availability
|
FRU_RSA.2
|
Resource Allocation
Minimum and Maximum Quotas
|
SC-6
|
Resource Availability
|
FTA_LSA.1
|
Limitation on Scope of Selectable Attributes
Limitation on Scope of Selectable Attributes
|
AC-2(6)
|
Account Management
Dynamic Privilege Management
|
AC-2(11)
|
Account Management
Usage Conditions
|
FTA_MCS.1
|
Limitation on Multiple Concurrent Sessions
Basic Limitation on Multiple Concurrent Sessions
|
AC-10
|
Concurrent Session Control
|
FTA_MCS.2
|
Limitation on Multiple Concurrent Sessions
Per-User Limitation on Multiple Concurrent Sessions
|
AC-10
|
Concurrent Session Control
|
FTA_SSL.1
|
Session Locking and Termination
TSF-Initiated Session Locking
|
AC-11
|
Session Lock
|
AC-11(1)
|
Session Lock
Pattern-Hiding Displays
|
FTA_SSL.2
|
Session Locking and Termination
User-Initiated Locking
|
AC-11
|
Session Lock
|
AC-11(1)
|
Session Lock
Pattern-Hiding Displays
|
FTA_SSL.3
|
Session Locking and Termination
TSF-Initiated Termination
|
AC-12
|
Session Termination
|
SC-10
|
Network Disconnect
|
FTA_SSL.4
|
Session Locking and Termination
User-Initiated Termination
|
AC-12(1)
|
Session Termination
User-Initiated Logouts / Message Displays
|
FTA_TAB.1
|
TOE Access Banners
Default TOE Access Banners
|
AC-8
|
System Use Notification
|
FTA_TAH.1
|
TOE Access History
TOE Access History
|
AC-9
|
Previous Login (Access) Notification
|
AC-9(1)
|
Previous Login (Access) Notification
Unsuccessful Logons
|
FTA_TSE.1
|
TOE Session Establishment
TOE Session Establishment
|
AC-2(11)
|
Account Management
Usage Conditions
|
FTP_ITC.1
|
Inter-TSF Trusted Channel
Inter-TSF Trusted Channel
|
IA-3(1)
|
Device Identification and Authentication
Cryptographic Bidirectional Authentication
|
SC-8
|
Transmission Confidentiality and Integrity
|
SC-8(1)
|
Transmission Confidentiality and Integrity
Cryptographic or Alternate Physical Protection
|
FTP_TRP.1
|
Trusted Path
Trusted Path
|
SC-11
|
Trusted Path
|
Assurance Requirements
|
|
ASE_INT.1
EAL1
EAL2
EAL3
EAL4
EAL5
EAL6
EAL7
|
ST Introduction
ST Introduction
|
SA-4
|
Acquisition Process
|
ASE_CCL.1
EAL1
EAL2
EAL3
EAL4
EAL5
EAL6
EAL7
|
Conformance Claims
Conformance Claims
|
PL-2
|
System Security Plan
|
SA-4(7)
|
Acquisition Process
NIAP-Approved Protection Profiles
|
ASE_SPD.1
EAL1
EAL2
EAL3
EAL4
EAL5
EAL6
EAL7
|
Security Problem Definition
Security Problem Definition
|
PL-2
|
System Security Plan
|
SA-4
|
Acquisition Process
|
ASE_OBJ.1
EAL1
|
Security Objectives
Security Objectives for the Operational Environment
|
PL-2
|
System Security Plan
|
SA-4
|
Acquisition Process
|
ASE_OBJ.2
EAL2
EAL3
EAL4
EAL5
EAL6
EAL7
|
Security Objectives
Security Objectives
|
PL-2
|
System Security Plan
|
SA-4
|
Acquisition Process
|
ASE_ECD.1
EAL1
EAL2
EAL3
EAL4
EAL5
EAL6
EAL7
|
Extended Components Definition
Extended Components Definition
|
No Mapping.
|
ASE_REQ.1
EAL1
|
Security Requirements
Stated Security Requirements
|
PL-2
|
System Security Plan
|
SA-4
|
Acquisition Process
|
ASE_REQ.2
EAL2
EAL3
EAL4
EAL5
EAL6
EAL7
|
Security Requirements
Derived Security Requirements
|
PL-2
|
System Security Plan
|
SA-4
|
Acquisition Process
|
ASE_TSS.1
EAL1
EAL2
EAL3
EAL4
EAL5
EAL6
EAL7
|
TOE Summary Specification
TOE Summary Specification
|
PL-2
|
System Security Plan
|
SA-4(1)
|
Acquisition Process
Functional Properties of Security Controls
|
ASE_TSS.2
|
TOE Summary Specification
TOE Summary Specification with Architectural Design Summary
|
PL-2
|
System Security Plan
|
SA-4(1)
|
Acquisition Process
Functional Properties of Security Controls
|
SA-4(2)
|
Acquisition Process
Design / Implementation Information For Security Controls
|
SA-17
|
|