This chapter describes the target of evaluation (TOE) configuration for MarkLogic Server.
The target of evaluation (TOE) is the configuration of MarkLogic Server that is certified by the Common Criteria evaluation process as the proper setup of the environment in which an evaluated configuration of MarkLogic Server can run. All of the requirements for setup set forth in this guide must be met for a configuration to be considered an evaluated configuration. This section briefly describes the TOE and includes the following parts:
MarkLogic Server has gone through a rigorous process for the Common Criteria evaluation. The process includes detailed specifications and testing of the security architecture and implementation of MarkLogic Server. It also includes processes for development, support, and maintenance of the product through all phases of product development. These tests and processes are conducted by MarkLogic Corporation and by the Common Criteria evaluation labs. They follow the process outlined in the Common Criteria Evaluation Methodology (CEM). The documents describing this process are available at http://www.commoncriteriaportal.org.
MarkLogic Server is designed as a multi-user system, where each user can only see content or execute code according to the security policy implemented in the configuration. MarkLogic Server has many security features, including:
For details on the MarkLogic Server role-based security model, see Security Guide. For details on administrative procedures in MarkLogic Server, including security administrative procedures, see the Administrator's Guide.
The MarkLogic Server TOE was tested in a secure configuration that specifically excludes certain product capabilities and functionality that might make the system more vulnerable to attack. The following features of the TOE should not be enabled or used in an evaluated configuration to ensure a secure configuration. Note that all system administration tasks must be performed by an Authorized Administrator, as described in Authorized Administrator, according to the guidance described in this guide and in the rest of the MarkLogic Server documentation. Excluded functionality is as follows:
Any administration activities on the MarkLogic Server TOE must be performed on an App Server that is configured to use Transport Layer Security (TLS), which allows communication over HTTPS. For information about configuring the Admin Interface to use TLS (HTTPS), see Configure the Admin App Server to Use HTTPS.
Additionally, if you are using the Admin API, Security API, PKI API, or the Admin Built-in functions to perform TOE Security Functions, the HTTP or XDBC servers on which the Admin API, Security API, PKI API, or Admin Built-In API code runs must be configured to use HTTPS. For details on configuring App Servers, see the Administrator's Guide.
The evaluated configuration of MarkLogic Server must run on the following version:
Additionally, the TOE must be installed on the platform supported in the evaluated configuration, as specified in MarkLogic Server TOE Platform.
Any software updates, patches, fixes, or changes from this configuration will render the TOE out of is evaluated configuration.
The following assumptions (from section 3.1 of the Security Target) are made about the TOE:
TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner.
The OS in the environment shall be able to provide reliable time stamps for use by the TOE.
The underlying OS is trusted to provide protection of the DBMS processes and stored data from other processes running on the underlying OS.
It is assumed that there are no general-purpose computing capabilities (e.g., compilers or user applications) available on the DBMS, other than those services necessary for the operation, administration and support of the DBMS.
Physical security, commensurate with the value of the TOE and the data it contains, is assumed to be provided by the environment.
The web browsers used to access the Admin Interface perform correctly such that when the browser is closed, the active Admin session is terminated. Client applications used to access the Admin API, Security API, and PKI API will perform correctly and when the application is closed, the active Admin session will be terminated.