Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Common Criteria Certification: What Is It, and What Does It Mean for Tripwire Enterprise?
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Common Criteria Certification: What Is It, and What Does It Mean for Tripwire Enterprise?

5 years ago Logan Guzman
Common Criteria Certification: What Is It, and What Does It Mean for Tripwire Enterprise?

The Canadian Centre for Cyber Security performs evaluations on common IT products and releases a report called “Common Criteria Certification.” This process allows for organizations to review an evaluation without needing to set up and configure an IT product that they would like to test. Tripwire Enterprise v8.8.2.2 was recently evaluated and passed the certification.

How the Certification Process Works

The Canadian Common Criteria Scheme provides a third-party commercial Common Criteria Evaluation Facility (CCEF) for determining the trustworthiness of Information Technology (IT) security products. These evaluations take place under the oversight of the Certification Body, which is managed by the Canadian Centre for Cyber Security.

A CCEF is a commercial facility that has been approved by the Certification Body to perform Common Criteria evaluations. A significant requirement for such approval is accreditation to the requirements of ISO/IEC 17025, the General Requirements for the Competence of Testing and Calibration Laboratories.

A Breakdown of the Certification Stages

As explained in a report published by the Government of Canada, the first stage is to identify and describe the Target of Evaluation (TOE) and the architecture around this. Next, the report summarizes data found from a security policy that is checked against evaluated products. This allows for the results of an Intrusion Detection System (IDS), Security Audit and User Data Protection and others to be checked against the TOE.    

One or more individuals are subsequently assigned to manage the TOE and the security of the information it contains. The authorized administrators follow and abide by the instructions provided in the TOE documentation.

By awarding a Common Criteria certificate, the Certification Body asserts that the product complies with the security requirements specified in a security target, or a requirements specification document which defines the scope of the evaluation activities. The consumer of certified IT products should review the security target in addition to this certification report in order to gain an understanding of any assumptions made during the evaluation, the IT product’s intended environment, the evaluated security functionality and the testing and analysis conducted by the CCEF.

The certification report, certificate of product evaluation and security target are listed on the Certified Products list (CPL) for the Canadian CC Scheme and posted on the Common Criteria portal (the official website of the International Common Criteria Project).

The remaining steps of the evaluation of the Common Criteria Certification Report look at other things like assumptions/requirements for the expected user, the documentation of the solution, life cycle and the test activities performed with results. The test activities and results contain most of the information for the report.

Inside Tripwire’s Results

Below is a list of the security features that were highlighted by the Common Criteria Certification Security Target report for Tripwire Enterprise Version 8.8.2.2:

  • Security Audit
  • Cryptographic Support
  • User Data Protection
  • Identification and Authentication
  • Security Function Management
  • Protection of the Target of Evaluation Security Features
  • Intrusion Detection

Why Is This Certification Important?

Tripwire Enterprise v8.8.2.2 is one of eight certified products listed in Common Criteria’s “Detection Devices and Systems” category. (Two other Tripwire products, Tripwire IP360 Version 9.0.1 and Tripwire Enterprise Version 8.4.1, also hold spots on that list.)

Megan Freshley explains in this blog that this latest certification shows how Tripwire is committed to helping its federal customers protect their critical data using file integrity monitoring, security configuration management and advanced vulnerability management functionality.

Achieving the most current Common Criteria certification illustrates Tripwire’s continuing commitment to meet increasingly stringent U.S. national and international security standards and is assurance that we’re bringing the most secure products to market.

Need more information? Check out Tripwire Enterprise’s Certification report here.

The post ” Common Criteria Certification: What Is It, and What Does It Mean for Tripwire Enterprise?” appeared first on TripWire

Source:TripWire – Logan Guzman

Tags: Compliance, Critical Severity, TripWire

Continue Reading

Previous Scams Starting on Social Media and Targeting Your Business
Next Apple will proxy Safe Browsing requests to hide iOS users’ IP from Google

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

6 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

11 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

14 hours ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT