Kanguru Solutions will not be held responsible for any illegal use of this product nor any losses incurred
while using this product. The user is solely responsible for the copyright laws, and is fully responsible
for any illegal actions taken.
Customer Service
To obtain service or technical support for your system, please contact Kanguru Solutions Technical
Support Department at 508-376-4245, or visit www.Kanguru.com for web support.
Legal notice
In no event shall Kanguru Solutions’ liability exceed the price paid for the product from direct, indirect,
special, incidental, or consequential software, or its documentation. Kanguru Solutions offers no refunds
for its products. Kanguru Solutions makes no warranty or representation, expressed, implied, or statutory,
with respect to its products or the contents or use of this documentation and all accompanying software,
and specifically disclaims its quality, performance, merchantability, or fitness for any particular purpose.
Kanguru Solutions reserves the right to revise or update its products, software, or documentation without
obligation to notify any individual or entity.
Export Law Compliance
Regardless of any disclosure made to Kanguru Solutions pertaining to the ultimate destination of the
specific Kanguru product, you warrant that you will not export, directly or indirectly, any Kanguru
product without first obtaining the approval of Kanguru Solutions and the appropriate export license from
the Department of Commerce or other agency of the United States Government. Kanguru Solutions has
a wide range of products and each product family has different license requirements relative to exports.
2
End User License Agreement
End User License Agreement
This legal document is an agreement between you, the end user (“Licensee”), and Kanguru Solutions, a
division of Interactive Media Corporation (“Licensor”).
By downloading or obtaining and using this software, you are consenting to be bound by the terms of this
agreement, which includes the software license and software disclaimer of warranty.
This agreement constitutes the complete agreement between you and licensor. If you do not agree to
the terms of this agreement, cease to use the product immediately and destroy any copies that you have
made.
Software License
“The software” shall be taken to mean the software contained in this package, downloaded from
Licensor’s website, or included within a hardware device and any subsequent versions or upgrades
received as a result of having purchased this package. “Licensee” shall be taken as the original purchaser
of the software.
Licensee has the non-exclusive right to use the software only on a single computer. Licensee may not
electronically transfer the program from one computer to another over any type of network. Licensee
may not distribute copies of the software or the accompanying documentation to others either for a fee
or without charge. Licensee may not modify or translate the program or documentation. Licensee may
not disassemble the program or allow it to be disassembled into its constituent source code.
This software is licensed only to you, the Licensee. You may not permit non-Licensees to use or install it
on computers or networks other than explicitly specified in this license without the prior written consent
of Licensor.
This license does not entitle you to any future upgrades or updates of software or configuration files,
although Licensor may decide to make such upgrades or configuration file updates available with or
without an associated fee.
Licensee’s use of the software indicates his/her acceptance of these terms and conditions. If Licensee
does not agree to these conditions, then he or she must return any distribution media, documentation, and
associated materials to the vendor from whom the software was purchased, and erase the software from
any and all storage devices upon which it may have been installed or otherwise stored.
Disclaimer of Warranties
The software is provided on an “AS IS” basis, without warranty of any kind, including without limitation
the warranties of merchantability, fitness for a particular purpose, and non-infringement. The entire risk
as to the results and performance of the software is assumed by you, the Licensee. If the software is
defective, you, and not Licensor or any distributor, agent or employee of Licensor assumes the entire
cost of all necessary servicing, repair, or correction.
3
End User License Agreement
Limitations of Damages
In no event shall Licensor, or anyone else who has been involved in the creation, distribution, or delivery
of this product be liable for any direct, indirect, special, punitive, exemplary, consequential or incidental
damages (including but not limited to damages for loss of business profits, business interruption, loss of
business information, and the like) arising out of the use or inability to use such product even if Licensor
has been advised of the possibility of such damages. Because some states do not allow the exclusion or
limitation of liability for consequential or incidental damages, the above limitation may not apply to you.
Copyright Restrictions
This software and any accompanying materials are copyrighted. Unauthorized copying of this software
or of any of the textual materials accompanying it is expressly forbidden.
You may not modify, adapt, translate, reverse engineer, decompile, disassemble (except to the extent
applicable laws specifically prohibit such restriction), or create derivative works based on the software.
Export Restrictions
You agree that you will not export the software to any country, person or entity subject to U.S. export
restrictions.
Entire Agreement
This written End User License Agreement is the exclusive agreement between you and Licensor
concerning the software and supersedes any and all prior oral or written agreements, negotiations or
other dealings between us concerning the software. This License Agreement may be modified only by
a writing signed by you and Licensor.
This agreement is subject to the laws and jurisdiction of the courts of the Commonwealth of Massachusetts,
USA. If a court of competent jurisdiction invalidates one or more of the terms of this contract, the
surviving terms continue in force.
This License Agreement is effective upon the earlier of your (1) use of the software; or (2) your
manifesting assent to these terms as by clicking on the I Agree button shown when you downloaded or
installed the software.
The Kanguru Defender Family of encrypted storage devices is designed to provide secure and reliable
portable storage.
Because security requirements are dependent upon the applications and environment, it is not possible
to simply certify that the devices are “secure”, a more precise definition is needed.
The Common Criteria (CC) provides a widely recognized methodology for security certification of
products. A CC evaluation is fundamentally a two-step process, consisting of defining the “security
target” which describes the features that are to be evaluated, and then testing and verifying that the
product actually implements these features with a sufficient level of assurance.
This document is a security guide that explains how to set up the evaluated configuration, and provides
information to administrators and ordinary users to ensure secure operation of the Kanguru Defender
devices. It is intended to be self-contained in addressing the most important issues at a high level, and
refers to other existing documentation where more details are needed.
Introduction
The document addresses both administrators and users and the different tasks they are involved in.
Knowledge of the Common Criteria is not required for readers of this document.
6
Introduction
1.2 How to use this document
The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”,
“SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be
interpreted as described in RFC 2119 (http://www.ietf.org/rfc/rfc2119.txt). Note that this document
avoids the terms “SHOULD” and “SHOULD NOT” that are defined in RFC 2119.
Requirements are either absolute (and marked with MUST and equivalent terms), or entirely optional
(in the sense of not affecting required security functions) and marked with RECOMMENDED, MAY or
OPTIONAL.
If you follow the requirements in this document when setting up and using the devices, your configuration
will match the evaluated configuration. Certain configuration options are marked as OPTIONAL and
you MAY modify them as needed, but you MUST NOT make other changes, because they will make the
system fail to match the evaluated configuration.
Of course, you MUST always use common sense. This document is not a formal specification, and
legitimate reasons can exist to modify the device setup in ways not described here if that is necessary for
the system to fulfill its intended purpose. Specifically, applying security patches released by the Kanguru
is strongly RECOMMENDED even though that will cause a deviation from the evaluated configuration.
In cases where the requirements and recommendations in this document conflict with those in other sources
(such as the provided manuals), the information in this configuration guide has higher precedence. You
MUST follow the steps described here to reach the evaluated configuration, even if other documentation
describes different methods.
7
Requirements and Assumptions
2. Requirements and Assumptions
2.1 What is a CC compliant system?
A system can be considered to be “CC compliant” if it matches an evaluated and certified configuration.
This implies various requirements concerning hardware and software, as well as requirements concerning
the operating environment, users, and the ongoing operating procedures.
Strictly speaking, an evaluation according to the CC represents the results of investigation of the security
properties of the target system according to defined guidelines. It must not be considered as a guarantee
for fitness for any specific purpose, but will provide help in deciding the suitability of the system
considering how well the intended use fits the described capabilities. It is intended to provide a level of
assurance about the security functions that have been examined by a neutral third party.
The software MUST match the evaluated configuration. In the case of the Defender Family, this also
requires that the installed supporting software (UKLA and KRMC) are the same. The documentation
(including this guide) will specify permitted variations, such as modifying certain configuration files and
settings.
Note: KLA and UKLA are one and the same and are used interchangeably with each other in the
document.
Stated requirements concerning the operating environment MUST be met. They are linked to the
assumptions made in the Security Target.
Typical requirements are restrictions concerning permitted network connections (for the administrative
access) and usage scenarios.
The operation of the system MUST be in agreement with defined organizational security policies, to
ensure that actions by administrators and users do not undermine the system’s security.
8
Requirements and Assumptions
2.2 Identifying Your Defender Device
There are currently two Defender models that are certified for Common Criteria: 2000 and Elite200.
You can visually identify which Defender model you own by checking the logo engraved on the device’s
casing.
Defender 2000Defender Elite200
2.3 Hardware Requirements
The hardware MUST be one of the following devices. This entire document applies to all hardware
systems unless explicitly noted.
The device client software MUST be one of the following applications. This entire document applies
to all of the applications unless explicitly noted. The appropriate device specific Kanguru Defender
Manager has to be used.
• Kanguru Defender Manager Elite200:
○ KDME200 v 2.0.0.0 - 2○ KDME200 v 2.0.0.0 - 3○ KDME200 v 2.0.0.0 - 6
• Kanguru Defender Manager 2000:
○ KDM2000 v 1.2.1.8 - 2○ KDM2000 v 1.2.1.8 - 3○ KDM2000 v 1.2.1.8 - 6
• Universal Kanguru Local Administrator: Version Release 3.2.0.3
• Kanguru Remote Management Console: Version 5.0.2.6
Important! Your Defender security device MUST be running the Kanguru Defender Manager software
version listed above in order to be considered CC compliant. It is the user’s responsibility to ensure that
their hardware is in compliance. For instructions on determining what version of Kanguru Defender
Manager your device is running, please refer to section 4.4 KDM on page 18.
2.5 Requirements for the system’s environment
The security target covers devices that use Linux, MacOS and Windows hosts for access via the
appropriate Kanguru Defender manager (KDM).
It is assumed that the value of the stored assets merits moderately intensive penetration or masquerading
attacks. It is also assumed that physical controls in place would alert the system authorities to the physical
presence of attackers within the controlled space.
You MUST use the devices only on trustworthy hosts that can be relied on to not have any malware
installed.
The Kanguru Remote Management Console MUST be installed on a Windows 2008 System with MS
SQL Server 2005, MS SQL Server 2008 or MS SQL Express and IIS already installed and the latest
security patches applied.
The Kanguru Remote Management Console MUST be installed on a physically protected system that is
only used for KRMC.
The Kanguru Central Server MUST NOT be used in the evaluated configuration.
10
Requirements and Assumptions
2.6 Requirements for administrators
When using the devices in an Enterprise configuration, there MUST be one or more competent individuals
who are assigned to manage the devices. These individuals will have the ability to initialize and reset
devices, reset and change user passwords as well as configure failed authentication handling.
The system administrative personnel MUST NOT be careless, willfully negligent, or hostile, and MUST
follow and abide by the instructions provided by the administrator documentation.
Every person that has the ability to perform administrative actions via UKLA and KRMC has control
over security properties of the devices and could, either by accident or deliberately, undermine security
features of the system. This Configuration Guide provides the basic guidance on how to set up and operate
the system securely, but is not intended to be the sole information required for a system administrator to
learn how to operate the devices securely.
It is assumed, within this Configuration Guide, that administrators who use this guide have a good
understanding and knowledge of operating security principles in general and of the Defender configuration
in particular. We strongly advise that any organization that wants to operate the system in the evaluated
configuration nevertheless have their administrators trained in security principles.
Every organization MUST trust their system administrators not to deliberately undermine the security
of the devices.
This Configuration Guide provides the additional information a system administrator MUST obey when
installing, configuring and operating the devices in compliance with the requirements defined in the
Security Target for the Common Criteria evaluation.
2.7 Requirements for users
Users MUST inspect the device and packaging before use to verify that it has not been tampered with.
The casing and any sealing (of the original packaging) MUST be intact without any marks. If the casing
or seal is broken or has been tampered with, users MUST refuse delivery of the package.
Users MUST ensure that the authentication attribute can not be obtained by spying or shoulder surfing.
Users MUST ensure that the system that they use to access the devices are secure and do not contain any
software that tries to access the devices in an unauthorized fashion.
Users MUST protect the host computer while absent (e.g. via a screen locker) while a device is connected
or disconnect the device.
Users MUST check that the firmware version on the device is the correct CC certified version. For
instructions on verifying the device’s firmware version and a comprehensive list of CC certified version,
please refer to Chapter 5. Common Criteria Certified Versions on page 25.
11
Loading...
+ 25 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.