Requirements for administrators, Requirements for users – Kanguru Common Criteria Evaluated v1.21 User Manual
Page 11
11
2.6 Requirements for administrators
When using the devices in an Enterprise configuration, there MUST be one or more competent individuals
who are assigned to manage the devices. These individuals will have the ability to initialize and reset
devices, reset and change user passwords as well as configure failed authentication handling.
The system administrative personnel MUST NOT be careless, willfully negligent, or hostile, and MUST
follow and abide by the instructions provided by the administrator documentation.
Every person that has the ability to perform administrative actions via UKLA and KRMC has control
over security properties of the devices and could, either by accident or deliberately, undermine security
features of the system. This Configuration Guide provides the basic guidance on how to set up and operate
the system securely, but is not intended to be the sole information required for a system administrator to
learn how to operate the devices securely.
It is assumed, within this Configuration Guide, that administrators who use this guide have a good
understanding and knowledge of operating security principles in general and of the Defender configuration
in particular. We strongly advise that any organization that wants to operate the system in the evaluated
configuration nevertheless have their administrators trained in security principles.
Every organization MUST trust their system administrators not to deliberately undermine the security
of the devices.
This Configuration Guide provides the additional information a system administrator MUST obey when
installing, configuring and operating the devices in compliance with the requirements defined in the
Security Target for the Common Criteria evaluation.
2.7 Requirements for users
Users MUST inspect the device and packaging before use to verify that it has not been tampered with.
The casing and any sealing (of the original packaging) MUST be intact without any marks. If the casing
or seal is broken or has been tampered with, users MUST refuse delivery of the package.
Users MUST ensure that the authentication attribute can not be obtained by spying or shoulder surfing.
Users MUST ensure that the system that they use to access the devices are secure and do not contain any
software that tries to access the devices in an unauthorized fashion.
Users MUST protect the host computer while absent (e.g. via a screen locker) while a device is connected
or disconnect the device.
Users MUST check that the firmware version on the device is the correct CC certified version. For
instructions on verifying the device’s firmware version and a comprehensive list of CC certified version,
please refer to Chapter 5. Common Criteria Certified Versions on page 25.
Requirements and Assumptions