<section title="12.1. Product Selection and Acquisition"><subsection title="Objective"><paragraph
    title="12.1.1."


><![CDATA[<p>Products providing security functions for the protection of classified information are formally evaluated in order to provide a degree of assurance over the integrity and performance of the product.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="12.1.2."


><![CDATA[<p>This section covers information on the selection and acquisition of any product that provide security functionality for the protection of information. It DOES NOT provide information on the selection or acquisition of products that do not provide security functionality or physical security products.</p>]]></paragraph>
</block>
<block title="Selecting products without security functions"><paragraph
    title="12.1.3."


><![CDATA[<p>Agencies selecting products that do not provide a security function or selecting products that will not use their security functions are free to follow their own agency or departmental acquisition guidelines.</p>]]></paragraph>
</block>
<block title="Product specific requirements"><paragraph
    title="12.1.4."


><![CDATA[<p>Where consumer guides exist for evaluated products, agencies should identify and assess any potential conflicts with this manual. Where further advice is required, consult the GCSB.</p>]]></paragraph>
</block>
<block title="Convergence"><paragraph
    title="12.1.5."


><![CDATA[<p>Convergence is the integration of a number of discrete technologies into one product. Converged solutions can include the advantages and disadvantages of each discrete technology.</p>]]></paragraph>
<paragraph
    title="12.1.6."


><![CDATA[<p>Most products will exhibit some element of convergence. When products have converged elements, agencies will need to comply with the relevant areas of this manual for the discrete technologies when deploying the converged product.</p>]]></paragraph>
<paragraph
    title="12.1.7."


><![CDATA[<p>As an example, when agencies choose to use evaluated media, such as encrypted flash memory media, the requirements for evaluated products, media and cryptographic security apply.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Assurance"><paragraph
    title="12.1.8."


><![CDATA[<p>In Common Criteria (CC), assurance is the confidence that a Target of Evaluation (TOE) meets the Security Functional Requirements (SFR) of the product.</p>]]></paragraph>
 <block title="Determining Assurance"><paragraph
    title="12.1.9."


><![CDATA[<p>In order to determine the level of assurance (the EAL), the CC standard requires tests, checks and evaluations in several areas. Higher levels of assurance require more extensive design, documentation, testing and evaluation. Determining assurance requires assessment of the following elements:</p><ul>
<li>Development;</li>
<li>Guidance documents;</li>
<li>Life-cycle support;</li>
<li>Security Target evaluation;</li>
<li>Tests; and</li>
<li>Vulnerability assessment.</li>
</ul>]]></paragraph>
</block>
<block title="Augmented Assurance"><paragraph
    title="12.1.10."


><![CDATA[<p>It is possible to “augment” an evaluation to provide additional assurance without changing the fundamental assurance level. This mechanism allows the addition of assurance components not specifically required for a specific level of evaluation or the substitution of assurance components from the specification of another hierarchically higher assurance component. Of the assurance constructs defined in the CC, only EALs may be augmented. An augmented EAL is often indicated by a ”+”-sign (for example EAL4+). The concept of negative augmentation or an “EAL minus” is not recognised by the standard.</p>]]></paragraph>
</block>
<block title="High Assurance"><paragraph
    title="12.1.11."


><![CDATA[<p>High Assurance is a generic term encompassing EAL levels 5, 6 and 7. ASD run an independent High Assurance Evaluation scheme which is not related to AISEP or an EAL rating.</p>]]></paragraph>
</block>
<block title="Evaluated Products List"><paragraph
    title="12.1.12."


><![CDATA[<p>The Certified Products List (CPL) records products that have been evaluated through one or more of the following schemes:</p>
<ul>
<li>Common Criteria;</li>
<li>high assurance evaluation; or</li>
<li>an <a title="AISEP" rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/australian-information-security-evaluation-program" target="_blank">Australian Information Security Evaluation Program (AISEP)</a> approved evaluation.</li>
</ul>]]></paragraph>
<paragraph
    title="12.1.13."


><![CDATA[<p>AISEP certified products can be viewed&nbsp;on the <a title="CPL" rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/products/index.cfm" target="_blank">Common Criteria Certified Products List (CPL)</a>.&nbsp;IT security products that are&nbsp;currently undergoing an evaluation in the AISEP are listed on the AISEP webpage under the section <a title="Products in Evaluation" rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/australian-information-security-evaluation-program" target="_blank">Products in Evaluation</a>.</p>]]></paragraph>
</block>
<block title="Evaluation level mapping"><paragraph
    title="12.1.14."


><![CDATA[<p>The Information Technology Security Evaluation Criteria (ITSEC) and Common Criteria (CC) assurance levels used in the EPL are similar, but not identical, in their relationship. The table below shows the relationship between the two evaluation criteria.</p>]]></paragraph>
<paragraph
    title="12.1.15."


><![CDATA[<p>This manual refers only to Common Criteria Evaluation Assurance Levels (EALs). The table below maps ITSEC evaluation assurance levels to Common Criteria EALs. EAL’s are defined in the Common Criteria Standard – part 3.</p><table>
<tbody>
<tr style="background-color: #bbbbbb;">
<td>Criteria</td>
<td colspan="8">Assurance level</td>
</tr>
<tr>
<td>
<p>Common Criteria</p>
</td>
<td>
<p>N/A</p>
</td>
<td>EAL1</td>
<td>EAL2</td>
<td>EAL3</td>
<td>EAL4</td>
<td>EAL5</td>
<td>EAL6</td>
<td>EAL7</td>
</tr>
<tr>
<td>ITSEC</td>
<td>E0</td>
<td>N/A</td>
<td>E1</td>
<td>E2</td>
<td>E3</td>
<td>E4</td>
<td>E5</td>
<td>E6</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Recognition arrangements"><paragraph
    title="12.1.16."


><![CDATA[<p>The AISEP programme has a number of recognition arrangements regarding evaluated products. Before choosing a product that has not been evaluated by the AISEP, agencies are encouraged to contact the GCSB to enquire whether the product will be recognised for New Zealand use once it has complete evaluation in a foreign scheme.</p>]]></paragraph>
<paragraph
    title="12.1.17."


><![CDATA[<p>Two such recognition arrangements are for the Common Criteria Recognition Arrangement up to the assurance level of EAL2 with the lifecycle flaw remediation augmentation and for degausser products listed on the National Security Agency/Central Security Service’s EPLD.</p>]]></paragraph>
</block>
<block title="Australian Information Security Evaluation Program (AISEP)"><paragraph
    title="12.1.18."


><![CDATA[<p>The <a title="AISEP" rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/australian-information-security-evaluation-program" target="_blank">AISEP</a> exists to ensure that a range of evaluated products are available to meet the needs of Australian and New Zealand Government agencies.</p>]]></paragraph>
<paragraph
    title="12.1.19."


><![CDATA[<p>The <a title="AISEP" rel="noopener noreferrer" href="https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/australian-information-security-evaluation-program" target="_blank">AISEP</a> performs the following functions:</p>
<ul>
<li>evaluation and certification of products using the Common Criteria;</li>
<li>continued maintenance of the assurance of evaluated products; and</li>
<li>recognition of products evaluated by a foreign scheme with which the AISEP has a mutual recognition agreement (generally the <a title="CCRA" rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/ccra/index.cfm" target="_blank">Common Criteria Recognition Agreement – CCRA</a>).</li>
</ul>]]></paragraph>
</block>
<block title="Protection Profiles"><paragraph
    title="12.1.20."


><![CDATA[<p>A Protection Profile (PP) describes the security functionality that must be included in a Common Criteria evaluation to meet a range of defined threats. PPs also define the activities to be taken to assess the security functions of a product. Agencies can have confidence that a product evaluated against an AISEP or GCSB approved PP addresses the defined threats. Approved PPs are published on the <a title="CPL" rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/products/index.cfm" target="_blank">Certified Products List</a>.</p>]]></paragraph>
<paragraph
    title="12.1.21."


><![CDATA[<p>The introduction of PP’s is to reduce the time required for evaluation, compared with the traditional approach to allow the AISEP to keep pace with the rapid evolution, production and release of security products and updates.  Cryptographic security functionality is included in the scope of evaluation against an approved Protection Profile. </p>]]></paragraph>
<paragraph
    title="12.1.22."


><![CDATA[<p>To facilitate the transition to AISEP approved Protection Profiles, a cap of Evaluation Assurance Level (EAL) 2 applies for all traditional AISEP (EAL based evaluations), including for technologies with no existing approved Protection Profile. EAL 2 is considered to represent a sensible trade-off between completion time and meaningful security assurance gains.</p>]]></paragraph>
<paragraph
    title="12.1.23."


><![CDATA[<p>Evaluations conducted in other nations’ Common Criteria schemes will continue to be recognised by the GCSB under the AISEP.</p>]]></paragraph>
<paragraph
    title="12.1.24."


><![CDATA[<p>Some High Assurance evaluations continue to be conducted in European Approved Testing Facilities and use the EAL rating scheme. ASD run an independent High Assurance Evaluation scheme which is not related to AISEP or an EAL rating.</p>]]></paragraph>
<paragraph
    title="12.1.25."


><![CDATA[<p>It is important that Agencies check the evaluation has examined the security enforcing functions by reviewing the target of evaluation/security target and other testing documentation.</p>]]></paragraph>
<paragraph
    title="12.1.26."


><![CDATA[<p>The UK utilises several product evaluation schemes such as the CESG Assisted Products Service (CAPS), CESG Assured Service (CAS) and IT Security Evaluation Criteria (ITSEC). Agencies should consult the GCSB if further clarity on the utilisation of these evaluation schemes and products is required.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Product Selection"><paragraph
    title="12.1.27."


><![CDATA[<p>The UK utilises several product evaluation schemes such as the CESG Assisted Products Service (CAPS), CESG Assured Service (CAS) and IT Security Evaluation Criteria (ITSEC). Agencies should consult the GCSB if further clarity on the utilisation of these evaluation schemes and products is required.</p>
<p><img class="leftAlone" title="" src="assets/NZISM/ProductSelectionGuide.png" alt="Product Selection Guide Diagram" width="681" height="948"></p>]]></paragraph>
 </subsection>
<subsection title="References"><paragraph
    title="12.1.28."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Reference</strong></p>
</td>
<td>
<p><strong>Title</strong></p>
</td>
<td>
<p><strong>Publisher</strong></p>
</td>
<td>
<p><strong>Source</strong></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>AISEP Policy Manual, August 2022</strong></p>
</td>
<td style="text-align: center;">ASD</td>
<td><a href="https://www.cyber.gov.au/sites/default/files/2022-10/2022_AUG_REL_AISEP_Policy_Manual_6.3.pdf">2022_AUG_REL_AISEP_Policy_Manual_6.3.pdf (cyber.gov.au)</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Australian Information Security Evaluation Program (AISEP)</strong></p>
</td>
<td style="text-align: center;">ASD</td>
<td><a title="Australian Information Security Evaluation Program" rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/programs/australasian-information-security-evaluation-program" target="_blank">https://www.cyber.gov.au/acsc/view-all-content/programs/australasian-information-security-evaluation-program</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Common Criteria</strong></p>
</td>
<td style="text-align: center;">
<p>CC</p>
</td>
<td><a rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/index.cfm?" target="_blank">https://www.commoncriteriaportal.org</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Common Criteria Certified Products</strong></p>
</td>
<td style="text-align: center;">CC</td>
<td>
<p><a title="Common Criteria Certified Products" rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/products" target="_blank">https://www.commoncriteriaportal.org/products</a>&nbsp;<a title="NCSC UK" rel="noopener noreferrer" href="https://www.ncsc.gov.uk/marketplace" target="_blank"><br></a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Product &amp; Services Marketplace</strong></p>
</td>
<td style="text-align: center;">NCSC, UK</td>
<td>
<p><a title="NCSC UK" rel="noopener noreferrer" href="https://www.ncsc.gov.uk/marketplace" target="_blank">https://www.ncsc.gov.uk/marketplace</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>National Information Assurance Partnership (NIAP)</strong></p>
</td>
<td style="text-align: center;">NIAP</td>
<td><a rel="noopener noreferrer" href="https://ww.niap-ccevs.org" target="_blank">https://ww.niap-ccevs.org</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Government Rules of Sourcing</strong></p>
</td>
<td style="text-align: center;">
<p>Ministry of Business Innovation &amp; Employment (MBIE)</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.procurement.govt.nz/assets/procurement-property/documents/government-procurement-rules.pdf" target="_blank">Government Procurement Rules - Rules for sustainable and inclusive procurement</a></p>
<p><a rel="noopener noreferrer" href="https://www.procurement.govt.nz/procurement/principles-charter-and-rules/government-procurement-rules/" target="_blank">​​Government Procurement Rules | New Zealand Government Procurement and Property</a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Commonwealth Procurement Rules</strong></td>
<td style="text-align: center;">Department of Finance and deregulation (Financial Management Group)&nbsp;</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.finance.gov.au/government/procurement/commonwealth-procurement-rules" target="_blank">Commonwealth Procurement Rules | Department of Finance</a> <a rel="noopener noreferrer" href="https://www.gov.uk/government/publications/government-ict-offshoring-international-sourcing-guidance" target="_blank"></a></p>
<p><a rel="noopener noreferrer" href="https://www.finance.gov.au/sites/default/files/2022-06/CPRs%20-%201%20July%202022.pdf" target="_blank">https://www.finance.gov.au/sites/default/files/2022-06/CPRs 1 July 2022.pdf</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="12.1.29."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey" style="width: 112.5%; height: 204.306px;">
<tbody>
<tr style="height: 57.6389px;">
<td style="width: 16.9963%; height: 57.6389px;"><strong>Reference</strong></td>
<td style="width: 15.7602%; height: 57.6389px;"><strong>Title</strong></td>
<td style="width: 67.2126%; height: 57.6389px;"><strong>Source</strong></td>
</tr>
<tr style="height: 146.667px;">
<td style="width: 16.9963%; height: 146.667px;">
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td style="width: 15.7602%; height: 146.667px;">GOV5, INFOSEC1, INFOSEC2, INFOSEC3, INFOSEC4, PHYSEC1 and PHYSEC2</td>
<td style="width: 67.2126%; height: 146.667px;">
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements/&nbsp;&nbsp;&nbsp;</a></p>
<a title="Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">Physical security (PHYSEC) | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Evaluated product selection preference order"><paragraph
    title="12.1.30.R.01."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>In selecting products for use, agencies should note that completed evaluations provide greater assurance than those products that are still undergoing evaluation or have not completed any formal evaluation activity. This assurance gradation is reflected in the preference order for selecting security products. If an agency selects a product that is ranked lower in the preference order, the justification for this decision MUST be recorded.</p>]]></paragraph>
<paragraph
    title="12.1.30.R.02."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>For products that are currently in evaluation, agencies should select those that are undergoing evaluation through AISEP in preference to those being conducted in a recognised foreign scheme. If a major vulnerability is found during the course of an AISEP evaluation, the GCSB may advise agencies on appropriate risk reduction strategies.</p>]]></paragraph>
<paragraph
    title="12.1.30.R.03."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>It is important to recognise that a product that is under evaluation has not, and might never, complete all relevant evaluation processes.</p>]]></paragraph>
<paragraph
    title="12.1.30.R.04."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>Agencies should be aware that while this section provides a product selection preference order, policy stated elsewhere in this manual, or product specific advice from the GCSB, could override this standard by specifying more rigorous requirements for particular functions and device use.</p>]]></paragraph>
<paragraph
    title="12.1.30.R.05."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>Additionally, where an EAL rating is mandated for a product to perform a cryptographic function for the protection of data at rest or in transit, as specified within <a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a>, products that have not completed an Approved Evaluation do not satisfy the requirement.</p>]]></paragraph>
<paragraph
    title="12.1.30.C.01."

    tags="Governance,Evaluated Products,Product Security"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="3284"
><![CDATA[<p>Agencies MUST select products in the following order of preference:</p><ul>
<li>a protection profile (PP) evaluated product;</li>
<li>products having completed an evaluation through the AISEP or recognised under the Common Criteria Recognition Arrangement (CCRA);</li>
<li>products in evaluation in the AISEP; </li>
<li>products in evaluation in a scheme where the outcome will be recognised by the GCSB when the evaluation is complete; or</li>
<li>If products do not fall within any of these categories, contact the GCSB.</li>
</ul>]]></paragraph>
<paragraph
    title="12.1.30.C.02."

    tags="Governance,Information Security Documentation,Evaluated Products,Product Security"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="3286"
><![CDATA[<p>When choosing a product, agencies MUST document the justification for any decision to choose a product that is still in evaluation and accept any security risk introduced by the use of such a product.</p>]]></paragraph>
<paragraph
    title="12.1.30.C.03."

    tags="Governance,Evaluated Products,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3287"
><![CDATA[<p>Agencies SHOULD select products in the following order of preference:</p><ul>
<li>a protection profile (PP) evaluated product;</li>
<li>products having completed an evaluation through the AISEP or recognised under the Common Criteria Recognition Arrangement (CCRA);</li>
<li>products in evaluation in the AISEP; </li>
<li>products in evaluation in a scheme where the outcome will be recognised by the GCSB when the evaluation is complete; or</li>
<li>If products do not fall within any of these categories, normal selection criteria (such as functionality and security) will apply.</li>
</ul>]]></paragraph>
</block>
<block title="Evaluated product selection"><paragraph
    title="12.1.31.R.01."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p class="NormS12C1">A certified product might not meet the security requirements of an agency.&nbsp; This could occur for a number of reasons, including that the scope of the evaluation is inappropriate for the intended use or the operational environment differs from that assumed in the evaluation.&nbsp; As such, an agency should ensure that a product is suitable by reviewing all available documentation.&nbsp; In the case of <a rel="noopener noreferrer" href="https://www.commoncriteriaportal.org/products/index.cfm" target="_blank">Common Criteria certified products list</a>, this documentation includes the protection profile, target of evaluation, security target, certification report, consumer guide along with any qualifications and limitations.</p>]]></paragraph>
<paragraph
    title="12.1.31.R.02."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>Products that are in evaluation will not have a certification report and may not have a published security target. A protection profile will, as a rule, exist. A draft security target can be obtained from the GCSB for products that are in evaluation through AISEP. For products that are in evaluation through a foreign scheme, the vendor can be contacted directly for further information.</p>]]></paragraph>
<paragraph
    title="12.1.31.C.01."

    tags="Governance,Evaluated Products,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3294"
><![CDATA[<p>Agencies SHOULD select products that have their desired security functionality within the scope of the product’s evaluation and are applicable to the agency’s intended environment.</p>]]></paragraph>
</block>
<block title="Product specific requirements"><paragraph
    title="12.1.32.R.01."

    tags="Governance,Product Security"


><![CDATA[<p>Whilst this manual may recommend a minimum level of assurance in the evaluation of a product’s security functionality not all evaluated products may be found suitable for their intended purpose even if they pass their Common Criteria evaluation. Typically such products will have cryptographic functionality that is not covered in sufficient depth under the Common Criteria. Where products have specific usage requirements, in addition to this manual, or supersede requirements in this manual, they will be outlined in the product’s consumer guide.</p>]]></paragraph>
<paragraph
    title="12.1.32.C.01."

    tags="Governance,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3299"
><![CDATA[<p>Agencies MUST check consumer guides for products, where available, to determine any product specific requirements.</p>]]></paragraph>
<paragraph
    title="12.1.32.C.02."

    tags="Governance,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3304"
><![CDATA[<p>Where product specific requirements exist in a consumer guide, agencies MUST comply with the requirements outlined in the consumer guide.</p>]]></paragraph>
<paragraph
    title="12.1.32.C.03."

    tags="Governance,High Assurance Products,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3306"
><![CDATA[<p>Agencies selecting high assurance products and HACE MUST contact the GCSB and comply with any product specific requirements, before any purchase is made.</p>]]></paragraph>
</block>
<block title="Sourcing non-evaluated software"><paragraph
    title="12.1.33.R.01."

    tags="Technical,Product Security,Software Security"


><![CDATA[<p>Software downloaded from websites on the Internet can contain malicious code or malicious content that is installed along with the legitimate software. Agencies need to confirm the integrity of the software they are installing before deploying it on a system to ensure that no unintended software is installed at the same time.</p>]]></paragraph>
<paragraph
    title="12.1.33.C.01."

    tags="Technical,Product Security,Software Security"


    classification="All Classifications"
    compliance="Should"
    cid="3310"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>obtain software from verifiable sources and verify its integrity using vendor supplied checksums; and</li>
<li>validate the software’s interaction with the operating systems and network within a test environment prior to use on operational systems.</li>
</ul>]]></paragraph>
</block>
<block title="Delivery of evaluated products"><paragraph
    title="12.1.34.R.01."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>It is important that agencies ensure that the selected product is the actual product received. If the product differs from the evaluated version, then NO assurance can be gained from an evaluation being previously performed.</p>]]></paragraph>
<paragraph
    title="12.1.34.R.02."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>For products evaluated under the ITSEC or the Common Criteria scheme at EAL2 or higher, delivery information is available from the developer in the delivery procedures document.</p>]]></paragraph>
<paragraph
    title="12.1.34.R.03."

    tags="Governance,Evaluated Products,Product Security"


><![CDATA[<p>For products that do not have evaluated delivery procedures, it is recommended that agencies assess whether the vendor’s delivery procedures are sufficient to maintain the integrity of the product.</p>]]></paragraph>
<paragraph
    title="12.1.34.R.04."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>Other factors that the assessment of the delivery procedures for products might consider include:</p><ul>
<li>the intended environment of the product;</li>
<li>likely attack vectors;</li>
<li>the types of attackers that the product will defend against;</li>
<li>the resources of any potential attackers;</li>
<li>the likelihood of an attack;</li>
<li>the level of importance of maintaining confidentiality of the product purchase; and</li>
<li>the level of importance of ensuring adherence to delivery timeframes.</li>
</ul>]]></paragraph>
<paragraph
    title="12.1.34.R.05."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>Delivery procedures can vary greatly from product to product. For most products the standard commercial practice for packaging and delivery can be sufficient for agencies requirements. More secure delivery procedures can include measures to detect tampering or masquerading. Some examples of specific security measures include tamper evident seals, cryptographic checksums and signatures, and secure transportation.</p>]]></paragraph>
<paragraph
    title="12.1.34.C.01."

    tags="Technical,Evaluated Products,High Assurance Products,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3318"
><![CDATA[<p>Agencies procuring high assurance products and HACE MUST contact the GCSB and comply with any product specific delivery procedures.</p>]]></paragraph>
<paragraph
    title="12.1.34.C.02."

    tags="Technical,Evaluated Products,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3320"
><![CDATA[<p>Agencies SHOULD ensure that products are delivered in a manner consistent with any delivery procedures defined in associated documentation.</p>]]></paragraph>
</block>
<block title="Delivery of non-evaluated products"><paragraph
    title="12.1.35.R.01."

    tags="IT Equipment,Technical,Product Security"


><![CDATA[<p>When a non-evaluated product is purchased agencies should determine if the product has arrived in a state that they were expecting it to and that there are no obvious signs of tampering.</p>]]></paragraph>
<paragraph
    title="12.1.35.C.01."

    tags="IT Equipment,Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3325"
><![CDATA[<p>Agencies SHOULD ensure that products purchased without the delivery assurances provided through the use of formally evaluated procedures are delivered in a manner that provides confidence that they receive the product that they expect to receive in an unaltered state, including checking:</p><ul>
<li>any labelling changes;</li>
<li>any damage; and</li>
<li>any signs of tampering.</li>
</ul>]]></paragraph>
</block>
<block title="Leasing arrangements"><paragraph
    title="12.1.36.R.01."

    tags="Governance,IT Equipment,Product Security"


><![CDATA[<p>Agencies should consider security and policy requirements when entering into a leasing agreement for IT equipment in order to avoid potential information security incidents during maintenance, repairs or disposal processes.</p>]]></paragraph>
<paragraph
    title="12.1.36.C.01."

    tags="Governance,IT Equipment,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3330"
><![CDATA[<p>Agencies SHOULD ensure that leasing agreements for IT equipment takes into account the:</p><ul>
<li>difficulties that could be encountered when the equipment needs maintenance;</li>
<li>control of remote maintenance, software updates and fault diagnosis;</li>
<li>if the equipment can be easily sanitised prior to its return; and</li>
<li>the possible requirement for destruction if sanitisation cannot be performed.</li>
</ul>]]></paragraph>
</block>
<block title="Ongoing maintenance of assurance"><paragraph
    title="12.1.37.R.01."

    tags="Technical,Product Security"


><![CDATA[<p>Developers that have demonstrated a commitment to ongoing maintenance or evaluation are more likely to be responsive to ensuring that security patches are independently assessed.</p>]]></paragraph>
<paragraph
    title="12.1.37.R.02."

    tags="Technical,Product Security"


><![CDATA[<p>A vendor’s commitment to assurance continuity can be gauged through the number of evaluations undertaken and whether assurance maintenance has been performed on previous evaluations.</p>]]></paragraph>
<paragraph
    title="12.1.37.C.01."

    tags="Technical,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3337"
><![CDATA[<p>Agencies SHOULD choose products from developers that have made a commitment to the ongoing maintenance of the assurance of their product.</p>]]></paragraph>
</block>
</subsection>
</section>
