%3CLINGO-SUB%20id%3D%22lingo-sub-1819776%22%20slang%3D%22en-US%22%3ECommon%20Criteria%20Certification%20for%20SQL%20Server%202019%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1819776%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20very%20pleased%20to%20announce%20that%20SQL%20Server%202019%20has%20obtained%20Common%20Criteria%20certification%20for%20the%20Windows%20and%20the%20Linux%20version.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOverall%2C%20SQL%20Server%202019%20is%20the%207th%20major%20release%20that%20has%20successfully%20completed%20this%20security%20attestation.%20It%20started%20with%20Yukon%20in%202005%2C%20followed%20by%20Katmai%20(2008)%20and%20Denali%20(2012)%2C%20and%20continued%20with%20SQL%20Server%202014%2C%202016%2C%20and%202017.%20Thanks%20to%20several%20internal%20and%20external%20changes%20to%20the%20process%2C%20we%20were%20able%20to%20accomplish%20the%20SQL%20Server%202019%20certification%20in%20a%20much%20shorter%20time%20compared%20to%20SQL%20Server%202017%20and%20earlier%20versions.%20SQL%20Server%202017%20was%20the%20first%20version%20that%20supports%20Linux%20and%20obtained%20Common%20Criteria%20certification%20for%20RHEL.%20The%20current%20certificate%20for%20SQL%20Server%202019%20on%20Linux%20has%20now%20been%20extended%20to%20support%20RHEL%20as%20well%20as%20SLES%20and%20Ubuntu.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAbout%20Common%20Criteria%3C%2FP%3E%3CP%3EThe%20Common%20Criteria%20(CC)%20is%20an%20international%20program%20which%20is%20broadly%20used%20as%20a%20(cyber)%20security%20standard%20(ISO%2015408)%20to%20test%20and%20improve%20the%20IT%20security%20measures%20of%20commercial%20products%20for%20use%20in%20National%20Security%20Systems%20(see%20e.g.%20%3CA%20href%3D%22https%3A%2F%2Fec.europa.eu%2Fdigital-single-market%2Fen%2Feu-cybersecurity-act%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EEUCSA%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fwww.niap-ccevs.org%2F%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3ENIAP%3C%2FA%3E%20).%20As%20such%20it%20serves%20as%20a%20world-wide%20compliance%20obligation%20across%20regulated%20industries%20and%20authorities%20and%20can%20be%20applied%20to%20almost%20any%20type%20of%20IT%20product%20implemented%20in%20hardware%2C%20firmware%2C%20or%20software%2C%20like%20operating%20systems%2C%20database%20management%20systems%2C%20network%20devices%2C%20firewalls%2C%20intrusion%20detection%20systems%2C%20smart%20cards%2C%20biometric%20devices%2C%20IoT%20devices.%3C%2FP%3E%3CP%3EIT%20security%20measures%20in%20the%20context%20of%20CC%20are%20usually%20a%20mean%20to%20protect%20information%20(or%20in%20other%20words%20%E2%80%98assets%E2%80%99)%20from%20unauthorized%20disclosure%2C%20modification%2C%20or%20loss%20of%20use%2C%20covering%2C%20for%20example%2C%20areas%20such%20as%20I%26amp%3BA%2C%20access%20control%2C%20accountability%2C%20audit%2C%20object%20re-use%2C%20error%20recovery.%20Appropriate%20confidence%20in%20(the%20correct%20and%20effective%20implementation%20of)%20those%20measures%20is%20needed%20to%20help%20consumers%20determine%20whether%20IT%20products%20fulfil%20their%20security%20needs.%20Competence-tested%20and%20thus%20authorized%20(i.e.%2C%20accredited)%20laboratories%20therefore%20evaluate%20those%20IT%20products%20against%20pre-defined%20security%20specifications%20called%20Protection%20Profiles%20(PPs).%20These%20PPs%20represent%20the%20security%20functional%20and%20assurance%20requirements%20for%20technology%20classes%20and%20are%20developed%20and%20maintained%20by%20international%20Technical%20Communities%20(iTCs)%20made%20up%20of%20CC%20and%20technology%20area%20experts%20such%20as%20vendors%2C%20validation%20schemes%2C%20laboratories%2C%20and%20consultants%20(see%20e.g.%20%3CA%20href%3D%22https%3A%2F%2Fdbms-itc.github.io%2F%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EDBMS-iTC%3C%2FA%3E).%20Under%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.commoncriteriaportal.org%2Fccra%2Findex.cfm%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3ECommon%20Criteria%20Recognition%20Arrangement%20(CCRA)%3C%2FA%3E%2C%20all%20signatories%2C%20thus%20current%2031%20countries%2C%20agree%20to%20recognize%20CC%20certificates%20produced%20by%20any%20certificate-authorizing%20participant.%20Each%20participating%20country%20in%20the%20CC%20operates%20a%20certification%20body%20that%20oversees%20evaluations%20conducted%20by%20accredited%20commercial%20evaluation%20facilities.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20CC%20Certification%20process%3C%2FP%3E%3CP%3EEach%20vendor%20must%20contract%20an%20accredited%20evaluation%20laboratory%20in%20one%20of%20the%20certificate-authorizing%20CCRA%20participant%20countries%20and%20then%20have%20the%20evaluation%20certified%20by%20the%20governmental%20certification%20body%20of%20that%20laboratory.%20This%20has%20been%20%3CA%20href%3D%22https%3A%2F%2Fwww.dekra-product-safety.com%2Fen%2Fprograms%2Fcyber-security%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EDEKRA%20TC%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Foc.ccn.cni.es%2F%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3ECCN%3C%2FA%3E%20for%20SQL%20Server%202019.%20The%20evaluation%20then%20is%20based%20on%20a%20comprehensive%20investigation%20performed%20by%20the%20laboratory%20on%20the%20basis%20of%20document%20reviews%20for%20various%20design%20representations%2C%20independent%20functional%20and%20penetration%20testing%2C%20code%20analysis%2C%20site%20audit(s)%20for%20used%20development%20sites%2C%20data%20centers%20and%20support%20sites%2C%20and%20a%20vulnerability%20assessment.%20The%20scope%20and%20rigor%20of%20this%20investigation%20is%20basically%20defined%20by%20the%20security%20assurance%20requirements%20compiled%20or%20referenced%20in%20the%20applied%20PP%20(%3CA%20href%3D%22https%3A%2F%2Fwww.commoncriteriaportal.org%2Ffiles%2Fppfiles%2Fpp0088V2b_pdf.pdf%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EDBMS%20PP%3C%2FA%3E%20for%20SQL%20Server%202019).%20The%20results%20obtained%20by%20the%20laboratory%20are%20continuously%20monitored%20by%20the%20certification%20body%20in%20order%20to%20confirm%20their%20accuracy%20and%20to%20ensure%20comparability%20with%20other%20independent%20evaluations%20of%20the%20same%20product%20type.%20In%20the%20positive%20case%2C%20a%20certificate%20is%20issued%20at%20the%20end%20of%20the%20CC%20process.%20The%20certificate%20is%20typically%20mutually%20recognized%20within%20the%20CCRA%20member%20countries%20and%20published%20along%20with%20a%20certification%20report%20and%20links%20to%20documents%20or%20sources%20that%20are%20important%20for%20using%20the%20product%20in%20its%20certified%20version%2C%20such%20as%20the%20Security%20Target%2C%20the%20CC%20user%20guidance%2C%20the%20installer%20for%20login%20triggers%2C%20etc.%20for%20us%20(see%20%3CA%20href%3D%22https%3A%2F%2Foc.ccn.cni.es%2Fen%2Fcertified-products%2Fcertified-products%2F604-microsoft-sql-server-2019-database-engine-enterprise-edition-x64-english-version-15-0-4033-1%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3ESQL%20Server%202019%20on%20Windows%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Foc.ccn.cni.es%2Fen%2Fcertified-products%2Fcertified-products%2Fproduct-category%2F92-sistema-de-gestion-de-base-de-datos%2F603-microsoft-sql-server-2019-on-linux-database-engine-enterprise-edition-x64-english-version-15-0-4033-1%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3ESQL%20Server%202019%20on%20Linux%3C%2FA%3E).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20CC%20certificate%20validity%3C%2FP%3E%3CP%3EThe%20CCRA%20has%20approved%20a%20resolution%20restricting%20the%20validity%20of%20mutually%20recognized%20CC%20certificates%20over%20time.%20This%20means%20that%20a%20certificate%20should%20have%20a%20definite%20period%20of%20validity%2C%20which%20is%20typically%20set%20at%20five%20(5)%20years.%20Nonetheless%2C%20a%20CC%20certificate%20states%20the%20assurance%20requirements%20reached%20by%20a%20product%20at%20the%20time%20it%20is%20issued.%20As%20such%20it%20is%20valid%20for%20a%20specific%20release%20of%20the%20product%20only%2C%20which%20is%20SQL%20Server%202019%2C%20CU4%20(build%20version%2015.0.4033.1)%20in%20our%20case.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ELearn%20more%20about%20CC%3C%2FP%3E%3CP%3EPlease%20visit%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.commoncriteriaportal.org%2F%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3ECommon%20Criteria%20Portal%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1819776%22%20slang%3D%22en-US%22%3E%3CP%3EIn%20this%20blog%20post%20we'll%20provide%20information%20on%20the%20most%20recent%20Common%20Criteria%20certification%20for%20SQL%20Server.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1819776%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESQLServerSecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

We are very pleased to announce that SQL Server 2019 has obtained Common Criteria certification for the Windows and the Linux version.

 

SQL19 on Windows certificateSQL19 on Windows certificate

 

Overall, SQL Server 2019 is the 7th major release that has successfully completed this security attestation. It started with Yukon in 2005, followed by Katmai (2008) and Denali (2012), and continued with SQL Server 2014, 2016, and 2017. Thanks to several internal and external changes to the process, we were able to accomplish the SQL Server 2019 certification in a much shorter time compared to SQL Server 2017 and earlier versions. SQL Server 2017 was the first version that supports Linux and obtained Common Criteria certification for RHEL. The current certificate for SQL Server 2019 on Linux has now been extended to support RHEL as well as SLES and Ubuntu.

 

SQL19 on Linux certificateSQL19 on Linux certificate

 

About Common Criteria

The Common Criteria (CC) is an international program which is broadly used as a (cyber) security standard (ISO 15408) to test and improve the IT security measures of commercial products for use in National Security Systems (see e.g. EUCSA, NIAP ). As such it serves as a world-wide compliance obligation across regulated industries and authorities and can be applied to almost any type of IT product implemented in hardware, firmware, or software, like operating systems, database management systems, network devices, firewalls, intrusion detection systems, smart cards, biometric devices, IoT devices.

IT security measures in the context of CC are usually a mean to protect information (or in other words ‘assets’) from unauthorized disclosure, modification, or loss of use, covering, for example, areas such as I&A, access control, accountability, audit, object re-use, error recovery. Appropriate confidence in (the correct and effective implementation of) those measures is needed to help consumers determine whether IT products fulfil their security needs. Competence-tested and thus authorized (i.e., accredited) laboratories therefore evaluate those IT products against pre-defined security specifications called Protection Profiles (PPs). These PPs represent the security functional and assurance requirements for technology classes and are developed and maintained by international Technical Communities (iTCs) made up of CC and technology area experts such as vendors, validation schemes, laboratories, and consultants (see e.g. DBMS-iTC). Under the Common Criteria Recognition Arrangement (CCRA), all signatories, thus current 31 countries, agree to recognize CC certificates produced by any certificate-authorizing participant. Each participating country in the CC operates a certification body that oversees evaluations conducted by accredited commercial evaluation facilities.

 

The CC Certification process

Each vendor must contract an accredited evaluation laboratory in one of the certificate-authorizing CCRA participant countries and then have the evaluation certified by the governmental certification body of that laboratory. This has been DEKRA TC and CCN for SQL Server 2019. The evaluation then is based on a comprehensive investigation performed by the laboratory on the basis of document reviews for various design representations, independent functional and penetration testing, code analysis, site audit(s) for used development sites, data centers and support sites, and a vulnerability assessment. The scope and rigor of this investigation is basically defined by the security assurance requirements compiled or referenced in the applied PP (DBMS PP for SQL Server 2019). The results obtained by the laboratory are continuously monitored by the certification body in order to confirm their accuracy and to ensure comparability with other independent evaluations of the same product type. In the positive case, a certificate is issued at the end of the CC process. The certificate is typically mutually recognized within the CCRA member countries and published along with a certification report and links to documents or sources that are important for using the product in its certified version, such as the Security Target, the CC user guidance, the installer for login triggers, etc. for us (see SQL Server 2019 on Windows and SQL Server 2019 on Linux).

 

The CC certificate validity

The CCRA has approved a resolution restricting the validity of mutually recognized CC certificates over time. This means that a certificate should have a definite period of validity, which is typically set at five (5) years. Nonetheless, a CC certificate states the assurance requirements reached by a product at the time it is issued. As such it is valid for a specific release of the product only, which is SQL Server 2019, CU4 (build version 15.0.4033.1) in our case.

 

Learn more about CC

Please visit the Common Criteria Portal.