Adaptive Server version 12.5.2 is available for the common criteria configuration (called the Evaluated Configuration). The Evaluated Configuration consists of Adaptive Server version 12.5.2 with the security and directory services options, but enables only the row level access control and auditing features. Adaptive Server’s evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Adaptive Server Enterprise Target of Evaluation (TOE) was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 2.1 and International Interpretations effective on April 1, 2004. If you configure Adaptive Server as specified in the Supplement for Installing Adaptive Server for Common Criteria Configuration, Adaptive Server satisfies all of the security functional requirements stated in the Sybase Adaptive Server Enterprise Security Target (Version 1.0).
Adaptive Server supports seven security functions:
Security audit – an audit mechanism that checks access, authentication attempts, and administrator functions. The security audit records the date, time, responsible individual and other details describing the event in the audit trail.
User data protection – Adaptive Server implements the discretionary access control policy over applicable database objects: databases, tables, views, and stored procedures.
Identification and authentication – Adaptive Server provides its own identification and authentication mechanism in addition to the underlying operating system mechanism.
Security management – functions that allow you to manage users and associated privileges, access permissions, and other security functions such as the audit trail. These functions are restricted based on discretionary access control policy rules, including role restrictions.
Protection of the TSF – Adpative Server protects itself by keeping its context separate from that of its users and by using operating system mechanisms to ensure that memory and files used by Adaptive Server have the appropriate access settings. Adaptive Server interacts with users through well-defined interfaces designed to ensure that its security policies are enforced.
Resource utilization – Adaptive Server provides resource limits to prevent queries and transactions from monopolizing server resources.
TOE access: Adaptive Server allows authorized administrators to construct login triggers that restrict logins to a specific number of sessions and restrict access based on time. Authorized administrators can also restrict access based on user identities.
Adaptive Server 15.0 contains all of the security features included in Adaptive Server cersion 12.5.2 and additional new security features. The additional security features are listed in What’s New in Adaptive Server 15.0?
Copyright © 2005. Sybase Inc. All rights reserved. |