Oracle Database 12c Enterprise Edition A Oracle Database SQL Language Reference
Oracle Database 12c Enterprise Edition A Oracle Database SQL Language Reference
Enterprise Edition
Security Target
Evaluation Assurance Level (EAL): EAL2+
Oracle Corporation
5000 Oracle Parkway
Redwood Shores, California
94065
Prepared by:
EWA-Canada
1223 Michael Street
Ottawa, Ontario, Canada
K1J7T2
Oracle Database 12c Enterprise Edition
Security Target
CONTENTS
1 SECURITY TARGET INTRODUCTION ............................................. 1
1.1 DOCUMENT ORGANIZATION............................................................. 1
1.2 SECURITY TARGET REFERENCE ........................................................ 1
1.3 TOE REFERENCE ............................................................................. 1
1.4 TOE OVERVIEW .............................................................................. 2
1.5 TOE DESCRIPTION .......................................................................... 2
1.5.1 Physical Scope ............................................................................... 2
1.5.2 TOE Environment ........................................................................... 4
1.5.3 TOE Guidance ................................................................................ 4
1.5.4 Logical Scope................................................................................. 4
1.5.5 Functionality Excluded from the Evaluated Configuration ..................... 5
Doc No: 1932-000-D102 Version: 1.2 Date: 6 March 2017 Page i of iii
Oracle Database 12c Enterprise Edition
Security Target
LIST OF TABLES
Table 1 – Operational Environment Operating System and Hardware
Requirements ...................................................................................... 4
Table 2 – Logical Scope of the TOE .............................................................. 5
Table 3 – Threats ...................................................................................... 9
Doc No: 1932-000-D102 Version: 1.2 Date: 6 March 2017 Page ii of iii
Oracle Database 12c Enterprise Edition
Security Target
LIST OF FIGURES
Figure 1 – Oracle Database 12c Diagram ...................................................... 3
Figure 2 – FIA_USB_(EXT): User-subject binding Component Levelling .......... 34
Figure 3 – FTA_TAH_(EXT): TOE Access History Component Levelling ............ 36
Doc No: 1932-000-D102 Version: 1.2 Date: 6 March 2017 Page iii of iii
Oracle Database 12c Enterprise Edition
Security Target
ST Version: 1.2
TOE
Operational
Environment
DBMS Server
Oracle Linux
DBMS Client
Oracle Linux
DBMS Server
General Purpose Computing
Oracle Linux Hardware
DBMS Client
DBMS Server
Oracle Linux
DBMS Server
General Purpose Computing
Hardware
Oracle Linux
Note that the Database client refers to the presentation of the SQL commands at
the TOE interface. These are the same whether they are entered on the
database machine, from a client machine or from an application.
Security Audit Audit entries are generated for security related events.
Audit policies may be created to generate logs based on
details such as the user, the object being accessed, event
type or success or failure of the operation.
User Data Protection The TOE provides a discretionary access control policy to
provide fine-grained access control between users and
database objects. Once data is allocated to a resource, the
previous information content is no longer available.
Identification and Users must identify and authenticate prior to TOE access.
Authentication Attributes are maintained to support the access control
policy.
2 CONFORMANCE CLAIMS
2.1 COMMON CRITERIA CONFORMANCE CLAIM
This Security Target claims to be conformant to Version 3.1 of Common Criteria
for Information Technology Security Evaluation according to:
• Common Criteria for Information Technology Security Evaluation, Part 1:
Introduction and General Model; CCMB-2012-09-001, Version 3.1,
Revision 4, September 2012
• Common Criteria for Information Technology Security Evaluation, Part 2:
Security Functional Components; CCMB-2012-09-002, Version 3.1,
Revision 4, September 2012
• Common Criteria for Information Technology Security Evaluation, Part 3:
Security Assurance Requirements CCMB-2012-09-003, Version 3.1,
Revision 4, September 2012
As follows:
• CC Part 2 extended
• CC Part 3 conformant
The Common Methodology for Information Technology Security Evaluation,
Version 3.1, Revision 4, September 2012 (CEM) has to be taken into account.
Threat Description
T.IA_USER A threat agent may gain access to user data, TSF data, or
TOE resources with the exception of public objects
without being identified and authenticated.
Threat Description
Table 3 – Threats
OSP Description
P.ACCOUNTABILITY The authorized users of the TOE shall be held accountable for
their actions within the TOE.
3.3 ASSUMPTIONS
The assumptions required to ensure the security of the TOE are listed in Table 5.
Assumptions Description
Physical aspects
Assumptions Description
Personnel aspects
Procedural aspects
A.PEER_FUNC All remote trusted IT systems trusted by the TSF to provide TSF
_&_MGT data or services to the TOE, or to support the TSF in the
enforcement of security policy decisions are assumed to correctly
implement the functionality used by the TSF consistent with the
assumptions defined for this functionality and to be properly
managed and operate under security policy constraints
compatible with those of the TOE.
Connectivity aspects
Table 5 – Assumptions
4 SECURITY OBJECTIVES
The purpose of the security objectives is to address the security concerns and to
show which security concerns are addressed by the TOE and which are
addressed by the environment. Threats may be addressed by the TOE or the
security environment or both. Therefore, the CC identifies two categories of
security objectives:
• Security objectives for the TOE
• Security objectives for the environment
O.ADMIN_ROLE The TOE will provide a mechanism (e.g. a "role") by which the
actions using administrative privileges may be restricted.
O.I&A The TOE ensures that users are authenticated before the TOE
processes any actions that require authentication.
O.MANAGE The TSF must provide all the functions and facilities necessary
to support the authorized users that are responsible for the
management of TOE security mechanisms, must allow
restricting such management actions to dedicated users, and
must ensure that only such authorized users are able to
access management functionality.
O.MEDIATE The TOE must protect user data in accordance with its
security policy, and must mediate all requests to access such
O.TOE_ACCESS The TOE will provide functionality that controls a user's logical
access 1 to user data and to the TSF.
Security Description
Objective
OE.ADMIN Those responsible for the TOE are competent and trustworthy
individuals, capable of managing the TOE and the security of
the information it contains.
OE.INFO_PROTECT Those responsible for the TOE must establish and implement
procedures to ensure that information is protected in an
appropriate manner. In particular:
• All network and peripheral cabling must be approved for
the transmittal of the most sensitive data transmitted
over the link. Such physical links are assumed to be
adequately protected against threats to the
confidentiality and integrity of the data transmitted using
appropriate physical and logical protection techniques.
• DAC protections on security-relevant files (such as audit
trails and authorization databases) shall always be set
up correctly.
• Users are authorized to access parts of the data
managed by the TOE and are trained to exercise control
over their own data.
1
As noted in the DBMS PP, "logical access" is specified, since the control of "physical
access" is outside the scope of the evaluation.
Security Description
Objective
_PURPOSE compilers or user applications) available on DBMS servers,
other than those services necessary for the operation,
administration, and support of the DBMS.
OE.PHYSICAL Those responsible for the TOE must ensure that those parts of
the TOE critical to enforcement of the security policy are
protected from physical attack that might compromise IT
security objectives. The protection must be commensurate with
the value of the IT assets protected by the TOE.
Security Description
Objective
T.UNAUTHORIZED_ACCESS
A.NO_GENERAL_PURPOSE
A.PEER_FUNC_&_MGT
T.TSF_COMPROMISE
T.ACCESS_TSFFUNC
T.ACCESS_TSFDATA
P.ACCOUNTABILITY
T.IA_MASQUERADE
T.RESIDUAL_DATA
A.TRAINEDUSER
A.AUTHUSER
A.PHYSICAL
A.CONNECT
A.SUPPORT
T.IA_USER
A.MANAGE
P.ROLES
P.USER
O.ACCESS_HISTORY X X X
O.ADMIN_ROLE X X X
O.AUDIT
X X
_GENERATION
O.DISCRETIONARY
X X
_ACCESS
O.I&A X X X X X
O.MANAGE X X X X
O.MEDIATE X X X
O.RESIDUAL
X X X
_INFORMATION
O.TOE_ACCESS X X X X X X X X
OE.ADMIN X X X X
OE.INFO_PROTECT X X X X X X X X X
OE.NO_GENERAL
X X X
_PURPOSE
OE.PHYSICAL X X X
OE.IT_I&A X
OE.IT_REMOTE X X X X
OE.IT_TRUSTED
X X X X
_SYSTEM
unauthorized users.
O.RESIDUAL_INFORMATION diminishes this threat since
information contained in protected resources will not be easily
available to the threat agent through reallocation attacks.
O.TOE_ACCESS diminishes this threat since it makes it more
unlikely that a threat agent has access to the TOE.
Threat: A threat agent may gain access to user data, TSF data, or TOE
resources with the exception of public objects without being
T.IA_USER identified and authenticated.
Threat: A threat agent may gain unauthorized access to user data for
which they are not authorized according to the TOE security
T.UNAUTHOR-
policy.
IZED_ACCESS
_MASQUERADE
Rationale: OE.NO_GENERAL_PURPOSE
The DBMS server must not include any general-purpose computing
or storage capabilities.
This diminishes the threat of masquerade since only users with
DBMS or related functions will be defined in the TOE environment.
Threat: A threat agent may gain unauthorized access to user data for
which they are not authorized according to the TOE security
T.UNAUTHOR-
IZED_ACCESS policy.
Rationale: O.ADMIN_ROLE supports this policy by ensuring that the TOE has
an objective to provide authorized administrators with the
privileges needed for secure administration.
O.AUDIT_GENERATION supports this policy by ensuring that audit
records are generated. Having these records available enables
accountability.
O.I&A supports this policy by requiring that each entity interacting
with the TOE is properly identified and authenticated before
allowing any action the TOE is defined to provide to authenticated
users only.
O.TOE_ACCESS supports this policy by providing a mechanism for
controlling access to authorized users.
Rationale: O.ADMIN_ROLE
The TOE has the objective of providing an authorized administrator
role for secure administration. The TOE may provide other roles as
well, but only the role of authorized administrator is required.
O.TOE_ACCESS supports this policy by ensuring that an authorized
administrator role can be distinguished from other authorized
users.
Policy: Authority shall only be given to users who are trusted to perform
the actions correctly.
P.USER
Objectives: O.MANAGE The TSF must provide all the functions and
facilities necessary to support the authorized
users that are responsible for the
management of TOE security mechanisms,
must allow restricting such management
actions to dedicated users, and must ensure
that only such authorized users are able to
access management functionality.
Rationale: O.MANAGE supports this policy by ensuring that the functions and
facilities supporting the authorized administrator role are in place.
O.TOE_ACCESS supports this policy by providing a mechanism for
controlling access to authorized users.
own data.
Policy: Authority shall only be given to users who are trusted to perform
the actions correctly.
P.USER
be set up correctly.
• Users are authorized to access parts of
the data managed by the TOE and are
trained to exercise control over their
own data.
Rationale: OE.PHYSICAL
The TOE, the TSF data, and protected user data is assumed to be
protected from physical attack (e.g., theft, modification,
destruction, or eavesdropping). Physical attack could include
unauthorized intruders into the TOE environment, but it does not
include physical destructive actions that might be taken by an
individual that is authorized to access the TOE environment.
OE.INFO_PROTECT supports the assumption by requiring that all
network and peripheral cabling must be approved for the
transmittal of the most sensitive data transmitted over the link.
Such physical links are assumed to be adequately protected against
threats to the confidentiality and integrity of the data transmitted
using appropriate physical and logical protection techniques.
protection techniques.
• DAC protections on security-relevant
files (such as audit trails and
authorization databases) shall always
be set up correctly.
• Users are authorized to access parts of
the data managed by the TOE and are
trained to exercise control over their
own data.
Assumption: Users are sufficiently trained and trusted to accomplish some task
or group of tasks within a secure IT environment by exercising
A.TRAINED- complete control over their user data.
USER
Rationale: OE.NO_GENERAL_PURPOSE
The DBMS server must not include any general-purpose computing
or storage capabilities. This will protect the TSF data from malicious
processes. The environmental objective is tightly related to the
assumption, which when fulfilled will address the assumption.
Assumption: All remote trusted IT systems trusted by the TSF to provide TSF
data or services to the TOE, or to support the TSF in the
A.PEER_FUNC enforcement of security policy decisions are assumed to correctly
_&_MGT implement the functionality used by the TSF consistent with the
assumptions defined for this functionality and to be properly
managed and operate under security policy constraints compatible
with those of the TOE.
Rationale: OE.IT_REMOTE
The assumption that connections between trusted systems or
physically separated parts of the TOE is addressed by the objective
specifying that such systems are sufficiently protected from any
Assumption: All connections to and from remote trusted IT systems and between
separate parts of the TSF are physically or logically protected within
A.CONNECT
the TOE environment to ensure the integrity and confidentiality of
the data transmitted and to ensure the authenticity of the
communication end points.
be set up correctly.
• Users are authorized to access parts of
the data managed by the TOE and are
trained to exercise control over their
own data.
Management: FIA_USB_(EXT).2
The following actions could be considered for the management functions in FMT:
EXT.1
Management: FTA_TAH_(EXT).1
There are no management activities foreseen.
Audit: FTA_TAH_(EXT).1
There are no auditable events foreseen.
FTA_TAH_(EXT).1 TOE access information
Hierarchical to: No other components.
Dependencies: No dependencies
FTA_TAH_(EXT).1.1 Upon a session establishment attempt, the TSF shall store
6 SECURITY REQUIREMENTS
Section 6 provides security functional and assurance requirements that must be
satisfied by a compliant TOE. These requirements consist of functional
components from Part 2 of the CC, extended requirements, and an Evaluation
Assurance Level (EAL) that contains assurance components from Part 3 of the
CC.
6.1 CONVENTIONS
The CC permits four types of operations to be performed on functional
requirements: selection, assignment, refinement, and iteration. These
operations, when performed on requirements that derive from CC Part 2 are
identified in this ST in the following manner:
• Selection: Indicated by surrounding brackets, e.g., [selected item].
• Assignment: Indicated by surrounding brackets and italics, e.g., [assigned
item].
• Refinement: Refined components are identified by using bold for
additional information, or strikeout for deleted text.
• Iteration: Indicated by assigning a number in parenthesis to the end of
the functional component identifier as well as by modifying the functional
component title to distinguish between iterations, e.g., ‘FDP_ACC.1(1),
Subset access control (administrators)’ and ‘FDP_ACC.1(2) Subset access
control (devices)’.
b) All auditable events for the [minimum] level of audit listed in Table
11: Auditable Events; and
c) [Start-up and shutdown of the DBMS;
d) Use of special permissions (e.g., those often used by authorized
administrators to circumvent access control policies); and
e) [no additional events]].
FAU_GEN.1.2 The TSF shall record within each audit record at least the following
information:
a) Date and time of the event, type of event, subject identity (if
applicable), and the outcome (success or failure) of the event; and
b) For each audit event type, based on the auditable event definitions of
the functional components included in the PP/ST, [information specified
in column three of Table 11: Auditable Events, below].
FAU_SEL.1.1 The TSF shall be able to select the set of events to be audited from
the set of all auditable events based on the following attributes:
a) [object identity,
b) user identity,
c) [no other identities];
d) event type;]
e) [success of auditable security events;
f) failure of auditable security events; and
g) [[no additional attributes]].]
Application Note: The audit functionality may be configured to audit specified operations.
‘Event type’ is defined to be these specified operations for the purposes of FAU_SEL.1.
Application Note: A database object is an object in the database that may be manipulated
with SQL. These include tables, cases, files, and views.
Application Note: ‘PUBLIC’ is a special role granted to all users.
FIA_USB_(EXT).2.1 The TSF shall associate the following user security attributes with
subjects acting on the behalf of that user: [Database user
identifier, roles, privileges].
FIA_USB_(EXT).2.2 The TSF shall enforce the following rules on the initial association
of user security attributes with subjects acting on the behalf of
users: [an authorized administrator may allow a proxy user to
perform database operations on behalf on another user].
FIA_USB_(EXT).2.3 The TSF shall enforce the following rules governing changes to the
user security attributes associated with subjects acting on the
behalf of users: [
a. granting and revoking of directly assigned privileges are
effective immediately;
b. granting and revoking of indirectly assigned privileges are
effective at the next log in].
FIA_USB_(EXT).2.4 The TSF shall enforce the following rules for the assignment of
subject security attributes not derived from user security attributes
when a subject is created: [the proxy may be limited to the
privileges of a particular role when acting on behalf of another
user].
FMT_MSA.3.1 The TSF shall enforce the [Discretionary Access Control Policy] to
provide [restrictive] default values for security attributes that are used
to enforce the SFP.
FMT_MSA.3.2 The TSF shall allow the [no user] to specify alternative initial values to
override the default values when an object or information is created.
O.DISCRETIONARY_ACCESS
O.RESIDUAL_INFORMATION
O.AUDIT_GENERATION
O.ACCESS_HISTORY
O.ADMIN_ROLE
O.TOE_ACCESS
O.MEDIATE
O.MANAGE
FAU_GEN.1 X O.I&A
FAU_GEN.2 X
FAU_SEL.1 X
FDP_ACC.1 X X X
FDP_ACF.1 X X X
FDP_RIP.1 X
FIA_ATD.1 X X
FIA_UAU.1 X
FIA_UID.1 X
FIA_USB_(EXT).2 X
FMT_MOF.1 X
FMT_MSA.1 X
FMT_MSA.3 X
FMT_MTD.1 X
FMT_REV.1(1) X
FMT_REV.1(2) X
O.DISCRETIONARY_ACCESS
O.RESIDUAL_INFORMATION
O.AUDIT_GENERATION
O.ACCESS_HISTORY
O.ADMIN_ROLE
O.TOE_ACCESS
O.MEDIATE
O.MANAGE
O.I&A
FMT_SMF.1 X
FMT_SMR.1 X X
FPT_TRC.1 X
FTA_MCS.1 X
FTA_TAH_(EXT).1 X
FTA_TSE.1 X
Rationale: The TOE must be able to store and retrieve information about
previous unauthorized login attempts and the number of times the
login was attempted every time the user logs into their account.
The TOE must also store the last successful authorized login. This
information will include the date, time, method, and location of the
attempts. When appropriately displayed, this will allow the user to
detect if another user is attempting to access their account. These
records should not be deleted until after the user has been notified
of their access history. [FTA_TAH_(EXT).1]
Objective: The TOE will provide a mechanism (e.g. a "role") by which the
actions using administrative privileges may be restricted.
O.ADMIN_ROLE
Rationale: FAU_GEN.1 defines the set of events that the TOE must be capable
of recording. This requirement ensures that the administrator has
the ability to audit any security relevant events that takes place in
the TOE. This requirement also defines the information that must
be contained in the audit record for each auditable event. This
requirement also places a requirement on the level of detail that is
recorded on any additional security functional requirements a ST
author adds to the ST. [FAU_GEN.1]
FAU_GEN.2 ensures that the audit records associate a user and any
associated group identity with the auditable event. In the case of
authorized users, the association is accomplished with the user ID.
In the case of authorized groups, the association is accomplished
with the group ID. [FAU_GEN.2]
FAU_SEL.1 allows the administrator to configure which auditable
events will be recorded in the audit trail. This provides the
administrator with the flexibility in recording only those events that
are deemed necessary by site policy, thus reducing the amount of
resources consumed by the audit mechanism. [FAU_SEL.1]
Objective: The TSF must control access of subjects and/or users to named
resources based on identity of the object, subject, or user. The TSF
O.DISCRETION must allow authorized users to specify for each access mode which
-ARY_ACCESS users/subjects are allowed to access a specific named object in that
access mode.
Rationale: The TSF must control access to resources based on the identity of
users that are allowed to specify which resources they want to
access for storing their data.
The access control policy must have a defined scope of control
[FDP_ACC.1]. The rules for the access control policy are defined
[FDP_ACF.1].
Objective: The TOE ensures that users are authenticated before the TOE
processes any actions that require authentication.
O.I&A
Rationale: The TSF must ensure that only authorized users gain access to the
TOE and its resources. Users authorized to access the TOE must
use an identification and authentication process [FIA_UID.1,
FIA_UAU.1].
To ensure that the security attributes used to determine access are
defined and available to the support authentication decisions.
[FIA_ATD.1].
Proper authorization for subjects acting on behalf of users is also
ensured [FIA_USB_(EXT).2]. The appropriate strength of the
authentication mechanism is ensured.
Objective: The TSF must provide all the functions and facilities necessary to
support the authorized users that are responsible for the
O.MANAGE management of TOE security mechanisms, must allow restricting
such management actions to dedicated users, and must ensure
that only such authorized users are able to access management
functionality.
Objective: The TOE must protect user data in accordance with its security
policy, and must mediate all requests to access such data.
O.MEDIATE
Rationale: The FDP requirements were chosen to define the policies, the
subjects, objects, and operations for how and when mediation
takes place in the TOE.
FDP_ACC.1 defines the Access Control policy that will be enforced
on a list of subjects acting on the behalf of users attempting to gain
access to a list of named objects. All the operations between
Objective: The TOE will ensure that any information contained in a protected
resource within its Scope of Control is not inappropriately
O.RESIDUAL disclosed when the resource is reallocated.
_INFORMATION
Objective: The TOE will provide mechanisms that control a user's logical
access to user data and to the TSF.
O.TOE_ACCESS
attributes. [FIA_ATD.1]
FTA_MCS.1 ensures that users may only have a maximum of a
specified number of active sessions open at any given time.
[FTA_MCS.1]
FTA_TSE.1 allows the TOE to restrict access to the TOE based on
certain criteria. [FTA_TSE.1]
Assurance Components
Assurance Class
Identifier Name
Security-enforcing functional
ADV_FSP.2
specification
ASE_INT.1 ST introduction
2
Configuration Management
Assurance Components
Assurance Class
Identifier Name
Vulnerability
AVA_VAN.2 Vulnerability analysis
Assessment
Database users make use of the database, but do not typically have
administrative system privileges.
TOE Security Functional Requirements addressed: FMT_MOF.1, FMT_MSA.1,
FMT_MSA.3, FMT_MTD.1, FMT_REV.1(1), FMT_REV.1(2), FMT_SMF.1,
FMT_SMR.1.
Term Description
Access Control Security service that controls the use of resources3 and
the disclosure and modification of data 4.
3
Hardware and software
4
Stored or communicated
5
According to a defined metric
Term Description
Executable code The software that makes up the TSF which is in a form
within the TSF that can be run by the computer.
Term Description
• Subjects in the TOE must be able to require a
specific instance of the object.
• The name used to refer to a specific instance of
the object must exist in a context that potentially
allows subjects with different user and/or group
identities to require the same instance of the
object.
Public Object An object for which the TSF unconditionally permits all
entities “read” access. Only the TSF or authorized
administrators may create, delete, or modify the public
objects.
Secure State Condition in which all TOE security policies are enforced.
Security attributes TSF data associated with subjects, objects, and users
that are used for the enforcement of the TOE security
policy.
Unauthorized user A user who may obtain access only to system provided
public objects if any exist.
Term Description
the TOE that interacts with the TOE.
Table 15 – Terminology
8.2 ACRONYMS
The following acronyms are used in this ST:
Acronym Definition
CC Common Criteria
CM Configuration Management
IT Information Technology
PP Protection Profile
ST Security Target
Table 16 – Acronyms