- Product Name :
- Hitachi Command Suite Common Component
- Version of TOE :
- 7.0.1-00
- Product Type :
- Foundational Module Software
- Certification No. :
- C0303
- Date :
- 2011-08-15
- Version of Common Criteria:
- 3.1
- Conformance Claim :
- EAL2 Augmented with ALC_FLR.1
- PP Identifier :
- None
- Vendor :
- Hitachi, Ltd.
-
- POC :
- Hitachi middleware and platform software contact point
- Division :
- -
- Phone :
- -
- Contact :
[Via Inquiry form]
http://www.hitachi.co.jp/Prod/comp/soft1/global/contact/index.html
- Evaluation Facility :
- Mizuho Information & Research Institute, Inc.
Center for Evaluation of Information Security
- Certification/Validation
Report :

(338 KB)(2011-09-28) - Security Target :

(446 KB)(2011-09-28)
PRODUCT DESCRIPTION
Description of TOE
TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment.
The following are examples of storage management software:
Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software.
These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products.
TOE security functionality
TOE provides the following security functionality:
-
- Identification/authentication functionality
(External authentication functionality provided by external authentication servers,
or the use of linkage functionality for external authentication groups)
- Security management functionality
(Functionality that manages TOE user account information,
and allows the user to set security parameters)
- Warning banner functionality
Security functional requirements
This TOE implements the following security functional requirements.
| Security audit | Non-repudiation of origin/receipt | Cryptographic functionality | Access control |
| Data authentication | Export data protection | Information flow control | Import data protection |
| Internal transfer data protection | Residual information protection | Rollback | Stored data integrity |
| Transfer data confidentiality | Transfer data integrity | Identification and authentication | Security management |
| Privacy Control | Security functionality protection | Resource utilisation management | TOE access control |
| Trusted path/channels |


