Skip to main content

Illumio Core 22. 2 Administration Guide

Common Criteria Only Events

The following table lists the types of JSON events that are generated and their descriptions.

For each of these events, the CEF/LEEF success or failure events generated are the event name followed by .success or .failure.

For example, the CEF/LEEF success event for agent.update is agent.update.success and the failure event is agent.update.failure.

Auditable Event

Description

pce.application_started

PCE application started

pce.application_stopped

PCE application stopped

remote_syslog.reachable

Remote syslog destination reachable

remote_syslog.unreachable

Remote syslog destination not reachable

tls_channel.establish

TLS channel established

tls_channel.terminate

TLS channel terminated

Management Functions

The following table describes management activities of the evaluated security functionality. All management activities require the role Global Organization Owner.

Requirement

Management Activities

ESM_ACD.1

Creation of policies

ESM_ACT.1

Transmission of policies

ESM_ATD.1

Definition of object attributes

Association of attributes with objects

ESM_EAU.2

Management of authentication data for both interactive users and authorized IT entities (if managed by the TSF)

ESM_EID.2

Management of authentication data for both interactive users and authorized IT entities (if managed by the TSF)

FAU_SEL_EXT.1

Configuration of auditable events for defined external entities

FAU_STG_EXT.1

Configuration of external audit storage location

FIA_AFL.1

Configuration of authentication failure threshold value

Configuration of actions to take when threshold is reached

Execution of restoration to normal state following threshold action (if applicable)

FIA_SOS.1

Verification of secrets

FIA_USB.1

Definition of default subject security attributes, modification of subject security attributes

FMT_MOF_EXT.1

Configuration of the behavior of other ESM products

FMT_MSA_EXT.5

Configuration of what policy inconsistencies the TSF shall identify and how the TSF shall respond if any inconsistencies are detected (if applicable)

FMT_MTD.1

Management of user authentication data

FMT_SMR.1

Management of the users that belong to a particular role

FTA_TAB.1

Maintenance of the banner

FTP_ITC.1

Configuration of actions that require trusted channel (if applicable)

FTP_TRP.1

Configuration of actions that require trusted path (if applicable)