commoncriteria / virtualization

Protection Profile for Virtualization
The Unlicense
3 stars 0 forks source link

5.1.7 Security Functional Requirements SFR FPT_VIV_EXT.1 #31

Closed robertmclemons closed 3 years ago

robertmclemons commented 3 years ago

The Application Notes for SFR FPT_VIV_EXT.1 ‘VMM Isolation from VMs’ says “FPT_VIV_EXT.1.2 addresses several specific mechanisms that must not be permitted to bypass the VMM and invoke privileged code on the Platform. At a minimum, the TSF should enforce the following: a. On the x86 platform, a virtual System Management Interrupt (SMI) cannot invoke platform System Management Mode (SMM) b. An attempt to update virtual firmware or virtual BIOS cannot cause physical platform firmware or physical platform BIOS to be modified c. An attempt to update virtual firmware or virtual BIOS cannot cause the VMM to be modified” If these 3 items are required, they should be included in the actual text of the SFR element FPT_VIV_EXT.1.2 as Application Notes are not requirements and not tested.

robertmclemons commented 3 years ago

These are examples to be used as guidance in evaluating a TSS description that is now required in place of the attestation statement.