security product evaluations - ieeegrouper.ieee.org/groups/2600/presentations/ieeecc.pdfsecurity...
TRANSCRIPT
![Page 1: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/1.jpg)
Security Product Evaluations
Common Criteria
![Page 2: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/2.jpg)
NIAP Website
www.niap.nist.gov
![Page 3: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/3.jpg)
CC Documents
![Page 4: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/4.jpg)
Historical Perspective
EuropeanNational
& RegionalInitiatives
‘89-’93
CanadianInitiatives
‘89-’93
CommonCriteriaProject
‘93--
ISOFDIS 15408
‘99
USTCSEC
‘83, ‘85
CTCPEC3
‘93
FederalCriteria
‘92
CommonCriteria
1.0
‘96
CommonCriteria
2.0
‘98
NIST’sMSFR
‘90
ITSEC1.2
‘91ISO
Initiatives‘92--
![Page 5: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/5.jpg)
Security Product EvaluationsNational Information Assurance PartnershipNational Information Assurance PartnershipNational Information Assurance Partnership
NIAP Evaluates and Validates Security Solutions
Using the Common Criteria
Common Criteria Evaluation and Validation Scheme The program developed by NIST and NSA as part of the National Information Assurance Partnership (NIAP) establishing an organizational and technical framework to evaluate the trustworthiness of IT Products and protection profiles.
![Page 6: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/6.jpg)
US Program Overview
NIAP AccreditsPrivate
Testing Labs
NIAP IssuesCC Certificates
to Products
Labs do CCEvaluations of
IT ProductsNIAP Reviews
& ValidatesLab Results
MRA NationsRecognize
Product Cert’s
![Page 7: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/7.jpg)
• Booz Allen Hamilton Common Criteria Testing Laboratory
• Cable and Wireless Common Criteria Testing Laboratory
• COACT Inc. CAFE Laboratory
• Computer Sciences Corporation
• Critrian Independent Labs
• CygnaCom Solutions Security Evaluation Laboratory
• InfoGard Laboratories Inc.
• SAIC Common Criteria Testing Laboratory
Common Criteria Testing Laboratory Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility, accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and aproved by the NIAP Validation Body to conduct Common Critieria-based evaluations.
![Page 8: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/8.jpg)
CC Evaluations
Evaluation The assessment of an IT product against the Common Criteria using the Common Evaluation Methodology to determine whether or not the claims made are justified; or the assessment of a protection profile against the Common Criteria using the Common Evaluation Methodology to determine if the profile is complete, consistent, technically sound and hence suitable for use as a statement of requirements for one or more TOEs that may be evaluated.
![Page 9: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/9.jpg)
EAL Equivalence
• EAL 1 =
• EAL 2 & 3 = Basic Assurance
• EAL 4 = Medium Assurance
• EAL 5, 6 & 7 = High Assurance
![Page 10: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/10.jpg)
EALS
*TCSEC
C1C2B1B2B3A1
EALEAL1EAL2EAL3EAL4EAL5EAL6EAL7
NameFunctionally TestedStructurally TestedMethodically Tested & CheckedMethodically Designed, Tested & ReviewedSemiformally Designed & TestedSemiformally Verified Design & TestedFormally Verified Design & Tested
*TCSEC = “Trusted Computer Security Evaluation Criteria” -- ”Orange Book”
Evaluation Assurance LevelsApproximate Backward Compatibility Comparison
![Page 11: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/11.jpg)
Typical CC Evaluations
• EAL 2 6 to 9 Months $200 K $400 K
• EAL 3 9 to 12 Months $300 $500 K
• EAL 4 1 Year + $500K +
![Page 12: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/12.jpg)
STs PPsSecurity Target A specification of the security required (both functionality and assurance) in a Target of Evaluation (TOE), used as a baseline for evaluation under the CC. The security target specifies the security objectives, the threats to those objectives, and any specific security mechanisms that will be employed.
Protection Profile An implementation independent set of security requirements for a category of IT products which meet specific consumer needs.
![Page 13: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/13.jpg)
Security Target Contents• Introduction
• TOE Description
• Security Environment Assumptions Threats Organizational Security Policies
• Security Objectives
• Security Requirements Functional Req’ts Assurance Req’ts
• TOE Summary Specification
• PP Claims
• Rationale
Target of Evaluation An IT product or group of IT products configured as an IT System and associated documentation that is the subject of a security evaluation under the CC.
Also, a protection profile that is the subject of a security evaluation under the CC.
![Page 14: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/14.jpg)
Target Of Evaluation• Target of Evaluation (TOE)
An IT product or system that is the subject of an evaluation.
• TOE Security Policy (TSP)
The rules that regulate how assets are managed, protected
and distributed within a TOE.
• TOE Security Functions (TSF)
All parts of the TOE that must be relied upon for the
correct enforcement of the TSP.
![Page 15: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/15.jpg)
CC Terminology
Acronym Overload
![Page 16: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/16.jpg)
Classes of Security Functional Requirements
ClassClassFAUFCOFCSFDPFIAFMTFPRFPTFRUFTAFTP
NameNameAuditCommunicationsCryptographic SupportUser Data ProtectionIdentification & AuthenticationSecurity ManagementPrivacyProtection of TOE Security FunctionsResource UtilizationTOE AccessTrusted Path / Channels
![Page 17: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/17.jpg)
Classes of Security Assurance Requirements
ClassClassACMADOADVAGDALCATEAVAAPEASEAMA
NameNameConfiguration ManagementDelivery & OperationDevelopmentGuidance DocumentsLife Cycle SupportTestsVulnerability AssessmentProtection Profile EvaluationSecurity Target EvaluationMaintenance of Assurance
![Page 18: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/18.jpg)
Protection Profile Contents
• Introduction
• TOE Description
• Security Environment Assumptions Threats Organizational Security Policies
• Security Objectives
• Security Requirements
• Functional Req’ts
• Assurance Req’ts
• Rationale
![Page 19: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/19.jpg)
Specification of the Attacker
• Corporate Security
• HIPPA / Gramm-Leach-Bliley
• Department of Defense
• Department of Energy
The Security Target Addresses the Sophistication of the Attacker
Protection Profile for Which Consumer ???
![Page 20: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/20.jpg)
Using CC
• IT Product ConsumersLook for PPs matching your security requirements -- use in procurement
specifications
• Consumer Consortia (Users Groups)Use CC to build PPs expressing members’ needsWork with Product Developers to build matching products
• Product DevelopersUse CC to specify product security capabilities via Security Targets
• Product Evaluators/ValidatorsUse CC-compliant Protection Profiles & Security Targets as yardstick for
measuring product compliance
![Page 21: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)](https://reader035.vdocuments.mx/reader035/viewer/2022070804/5f0361597e708231d408edcb/html5/thumbnails/21.jpg)
Questions?