<section title="12.2. Product Installation and Configuration"><subsection title="Objective"><paragraph
    title="12.2.1."


><![CDATA[<p>Evaluated products use evaluated configurations.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="12.2.2."


><![CDATA[<p>This section covers information on installing and configuring products providing security functionality. It does not provide information on the installation and configuration of general products or physical security products.</p>]]></paragraph>
</block>
<block title="Evaluated configuration"><paragraph
    title="12.2.3."


><![CDATA[<p>A product is considered to be operating in its evaluated configuration if:</p><ul>
<li>functionality is used that was within the scope of the evaluation and implemented in the specified manner;</li>
<li>only patches that have been assessed through a formal assurance continuity process have been applied; and</li>
<li>the environment complies with assumptions or organisational security policies stated in the product’s security target or similar document.</li>
</ul>]]></paragraph>
</block>
<block title="Unevaluated configuration"><paragraph
    title="12.2.4."


><![CDATA[<p>A product is considered to be operating in an unevaluated configuration when it does not meet the requirements of an evaluated configuration.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Installation and configuration of evaluated products"><paragraph
    title="12.2.5.R.01."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>An evaluation of products provides assurance that the product will work as expected with a clearly defined set of constraints. These constraints, defined by the scope of the evaluation, generally consist of what security functionality can be used, and how the products are configured and operated.</p>]]></paragraph>
<paragraph
    title="12.2.5.R.02."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>Using an evaluated product in manner which it was not intended could result in the introduction of new threats and vulnerabilities that were not considered by the initial evaluation.</p>]]></paragraph>
<paragraph
    title="12.2.5.R.03."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>For products evaluated under the Common Criteria and ITSEC, information is available from the developer in the product’s installation, generation and startup documentation. Further information is also available in the security target and certification report.</p>]]></paragraph>
<paragraph
    title="12.2.5.C.01."

    tags="Technical,Evaluated Products,High Assurance Products,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3387"
><![CDATA[<p>Agencies MUST ensure that high assurance products and HACE are installed, configured, operated and administered in accordance with all product specific policy.</p>]]></paragraph>
<paragraph
    title="12.2.5.C.02."

    tags="Technical,Evaluated Products,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3389"
><![CDATA[<p>Agencies SHOULD install, configure, operate and administer evaluated products in accordance with available documentation resulting from the product’s evaluation.</p>]]></paragraph>
</block>
<block title="Use of evaluated products in unevaluated configurations"><paragraph
    title="12.2.6.R.01."

    tags="Technical,Evaluated Products,Product Security"


><![CDATA[<p>To ensure that a product will still provide the assurance desired by the agency when used in a manner for which it was not intended, a security risk assessment MUST be conducted upon the altered configuration. The further that a product deviates from its evaluated configuration, the less assurance can be gained from the evaluation.</p>]]></paragraph>
<paragraph
    title="12.2.6.R.02."

    tags="Technical,Evaluated Products,High Assurance Products,Product Security"


><![CDATA[<p>Given the potential threat vectors and the value of the classified information being protected, high assurance products and HACE MUST be configured in accordance with the GCSB’s guidelines.</p>]]></paragraph>
<paragraph
    title="12.2.6.C.01."

    tags="Technical,Evaluated Products,Product Security,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="3401"
><![CDATA[<p>Agencies wishing to use a product in an unevaluated configuration MUST undertake a security risk assessment including:</p><ul>
<li>the necessity of the unevaluated configuration;</li>
<li>testing of the unevaluated configuration; and</li>
<li>the environment in which the unevaluated product is to be used.</li>
</ul>]]></paragraph>
<paragraph
    title="12.2.6.C.02."

    tags="Technical,Evaluated Products,High Assurance Products,Product Security"


    classification="All Classifications"
    compliance="Must Not"
    cid="3404"
><![CDATA[<p>High assurance products and HACE MUST NOT be used in unevaluated configurations.</p>]]></paragraph>
</block>
</subsection>
</section>
