November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-1 Chapter 18: Evaluating Systems Goals Trusted Computer System Evaluation.

Slides:



Advertisements
Similar presentations
Security Requirements
Advertisements

Module 1 Evaluation Overview © Crown Copyright (2000)
Radiopharmaceutical Production
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 5.2: Evaluation of Secure Information Systems.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Software Quality Assurance Plan
4/28/20151 Computer Security Security Evaluation.
CS526Topic 22: TCSEC and Common Criteria 1 Information Security CS 526 Topic 22: TCSEC and Common Criteria.
Common Criteria Richard Newman. What is the Common Criteria Cooperative effort among Canada, France, Germany, the Netherlands, UK, USA (NSA, NIST) Defines.
Effective Design of Trusted Information Systems Luděk Novák,
IT Security Evaluation By Sandeep Joshi
1 norshahnizakamalbashah CEM v3.1: Chapter 10 Security Target Evaluation.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Secure Operating Systems Lesson 0x11h: Systems Assurance.
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
Security Controls – What Works
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Risk Management.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Purpose of the Standards
Fraud Prevention and Risk Management
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #17-1 Chapter 17: Introduction to Assurance Overview Why assurance? Trust and.
Gurpreet Dhillon Virginia Commonwealth University
SEC835 Database and Web application security Information Security Architecture.
Practical IS security design in accordance with Common Criteria Security and Protection of Information 2005 František VOSEJPKA S.ICZ a.s. June 5, 2005.
Chapter 4 Interpreting the CMM. Group (3) Fahmi Alkhalifi Pam Page Pardha Mugunda.
Chapter 2 The process Process, Methods, and Tools
Information Systems Security Computer System Life Cycle Security.
Evaluating Systems Information Assurance Fall 2010.
Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition Chapter 7 Software Supporting Processes and Software Reuse.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Centro de Estudos e Sistemas Avançados do Recife PMBOK - Chapter 4 Project Integration Management.
Software Engineering Lecture # 17
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
1.  Describe an overall framework for project integration management ◦ RelatIion to the other project management knowledge areas and the project life.
Background. History TCSEC Issues non-standard inflexible not scalable.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
CMSC : Common Criteria for Computer/IT Systems
CSCE 548 Secure Software Development Security Operations.
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Computer Security: Principles and Practice
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
~ pertemuan 4 ~ Oleh: Ir. Abdul Hayat, MTI 20-Mar-2009 [Abdul Hayat, [4]Project Integration Management, Semester Genap 2008/2009] 1 PROJECT INTEGRATION.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
The NIST Special Publications for Security Management By: Waylon Coulter.
CSCE 727 Awareness and Training Secure System Development and Monitoring.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Information Technology Project Management, Seventh Edition.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
CS457 Introduction to Information Security Systems
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
Software Project Configuration Management
Ch.18 Evaluating Systems - Part 2 -
TechStambha PMP Certification Training
Official levels of Computer Security
Chapter 19: Building Systems with Assurance
THE ORANGE BOOK Ravi Sandhu
PLANNING A SECURE BASELINE INSTALLATION
Radiopharmaceutical Production
Presentation transcript:

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-1 Chapter 18: Evaluating Systems Goals Trusted Computer System Evaluation Criteria FIPS 140 Common Criteria SSE-CMM

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-2 Overview Goals –Why evaluate? Evaluation criteria –TCSEC (aka Orange Book) –FIPS 140 –Common Criteria –SSE-CMM

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-3 Goals Show that a system meets specific security requirements under specific conditions –Called a trusted system –Based on specific assurance evidence Formal evaluation methodology –Technique used to provide measurements of trust based on specific security requirements and evidence of assurance

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-4 Evaluation Methodology Provides set of requirements defining security functionality for system Provides set of assurance requirements delineating steps for establishing that system meets its functional requirements Provides methodology for determining that system meets functional requirements based on analysis of assurance evidence Provides measure of result indicating how trustworthy system is with respect to security functional requirements –Called level of trust

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-5 Why Evaluate? Provides an independent assessment, and measure of assurance, by experts –Includes assessment of requirements to see if they are consistent, complete, technically sound, sufficient to counter threats –Includes assessment of administrative, user, installation, other documentation that provides information on proper configuration, administration, use of system Independence critical –Experts bring fresh perspectives, eyes to assessment

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-6 Bit of History Government, military drove early evaluation processes –Their desire to use commercial products led to businesses developing methodologies for evaluating security, trustworthiness of systems Methodologies provide combination of –Functional requirements –Assurance requirements –Levels of trust

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-7 TCSEC: 1983–1999 Trusted Computer System Evaluation Criteria –Also known as the Orange Book –Series that expanded on Orange Book in specific areas was called Rainbow Series –Developed by National Computer Security Center, US Dept. of Defense Heavily influenced by Bell-LaPadula model and reference monitor concept Emphasizes confidentiality –Integrity addressed by *-property

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-8 Functional Requirements Discretionary access control requirements –Control sharing of named objects –Address propagation of access rights, ACLs, granularity of controls Object reuse requirements –Hinder attacker gathering information from disk or memory that has been deleted –Address overwriting data, revoking access rights, and assignment of resources when data in resource from previous use is present

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-9 Functional Requirements Mandatory access control requirements (B1 up) –Simple security condition, *-property –Description of hierarchy of labels Label requirements (B1 up) –Used to enforce MAC –Address representation of classifications, clearances, exporting labeled information, human-readable output Identification, authentication requirements –Address granularity of authentication data, protecting that data, associating identity with auditable actions

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-10 Functional Requirements Audit requirements –Define what audit records contain, events to be recorded; set increases as other requirements increase Trusted path requirements (B2 up) –Communications path guaranteed between user, TCB System architecture requirements –Tamperproof reference validation mechanism –Process isolation –Enforcement of principle of least privilege –Well-defined user interfaces

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-11 Functional Requirements Trusted facility management (B2 up) –Separation of operator, administrator roles Trusted recovery (A1) –Securely recover after failure or discontinuity System integrity requirement –Hardware diagnostics to validate on-site hardware, firmware of TCB

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-12 Assurance Requirements Configuration management requirements (B2 up) –Identify configuration items, consistent mappings among documentation and code, tools for generating TCB System architecture requirements –Modularity, minimize complexity, etc. –TCB full reference validation mechanism at B3 Trusted distribution requirement (A1) –Address integrity of mapping between masters and on- site versions –Address acceptance procedures

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-13 Assurance Requirements Design specification, verification requirements –B1: informal security policy model shown to be consistent with its axioms –B2: formal security policy model proven to be consistent with its axioms, descriptive top-level specification (DTLS) –B3: DTLS shown to be consistent with security policy model –A1: formal top-level specification (FTLS) shown consistent with security policy model using approved formal methods; mapping between FTLS, source code

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-14 Assurance Requirements Testing requirements –Address conformance with claims, resistance to penetration, correction of flaws –Requires searching for covert channels for some classes Product documentation requirements –Security Features User’s Guide describes uses, interactions of protection mechanisms –Trusted Facility Manual describes requirements for running system securely Other documentation: test, design docs

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-15 Evaluation Classes A and B A1Verified protection; significant use of formal methods; trusted distribution; code, FTLS correspondence B3Security domains; full reference validation mechanism; increases trusted path requirements, constrains code development; more DTLS requirements; documentation B2Structured protection; formal security policy model; MAC for all objects, labeling; trusted path; least privilege; covert channel analysis, configuration management B1Labeled security protection; informal security policy model; MAC for some objects; labeling; more stringent security testing

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-16 Evaluation Classes C and D C2Controlled access protection; object reuse, auditing, more stringent security testing C1Discretionary protection; minimal functional, assurance requirements; I&A controls; DAC DDid not meet requirements of any other class

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-17 Evaluation Process Run by government, no fee to vendor 3 stages –Application: request for evaluation May be denied if gov’t didn’t need product –Preliminary technical review Discussion of evaluation process, schedules, development process, technical content, etc. Determined schedule for evaluation –Evaluation phase

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-18 Evaluation Phase 3 parts; results of each presented to technical review board composed of senior evaluators not on evaluating team; must approve that part before moving on to next part –Design analysis: review design based on documentation provided; developed initial product assessment report Source code not reviewed –Test analysis: vendor’s, evaluators’ tests –Final evaluation report Once approved, all items closed, rating given

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-19 RAMP Ratings Maintenance Program goal: maintain assurance for new version of evaluated product Vendor would update assurance evidence Technical review board reviewed vendor’s report and, on approval, assigned evaluation rating to new version of product Note: major changes (structural, addition of some new functions) could be rejected here and a full new evaluation required

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-20 Impact New approach to evaluating security –Based on analyzing design, implementation, documentation, procedures –Introduced evaluation classes, assurance requirements, assurance-based evaluation –High technical standards for evaluation –Technical depth in evaluation procedures Some problems –Evaluation process difficult, lacking in resources –Mixed assurance, functionality together –Evaluations only recognized in US

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-21 Scope Limitations Written for operating systems –NCSC introduced “interpretations” for other things such as networks (Trusted Network Interpretation, the Red Book), databases (Trusted Database Interpretation, the Purple or Lavender Book) Focuses on needs of US government –Most commercial firms do not need MAC Does not address integrity or availability –Critical to commercial firms

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-22 Process Limitations Criteria creep (expansion of requirements defining classes) –Criteria interpreted for specific product types –Sometimes strengthened basic requirements over time –Good for community (learned more about security), but inconsistent over time Length of time of evaluation –Misunderstanding depth of evaluation –Management practices of evaluation –As was free, sometimes lacking in motivation

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-23 Contributions Heightened awareness in commercial sector to computer security needs Commercial firms could not use it for their products –Did not cover networks, applications –Led to wave of new approaches to evaluation –Some commercial firms began offering certifications Basis for several other schemes, such as Federal Criteria, Common Criteria

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-24 FIPS 140: 1994–Present Evaluation standard for cryptographic modules (implementing cryptographic logic or processes) –Established by US government agencies and Canadian Security Establishment Updated in 2001 to address changes in process and technology –Officially, FIPS Evaluates only crypto modules –If software, processor executing it also included, as is operating system

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-25 Requirements Four increasing levels of security FIPS covers basic design, documentation, roles, cryptographic key management, testing, physical security (from electromagnetic interference), etc. FIPS covers specification, ports & interfaces; finite state model; physical security; mitigation of other attacks; etc.

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-26 Security Level 1 Encryption algorithm must be FIPS- approved algorithm Software, firmware components may be executed on general-purpose system using unevaluated OS No physical security beyond use of production-grade equipment required

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-27 Security Level 2 More physical security –Tamper-proof coatings or seals or pick-resistent locks Role-based authentication –Module must authenticate that operator is authorized to assume specific role and perform specific services Software, firmware components may be executed on multiuser system with OS evaluated at EAL2 or better under Common Criteria –Must use one of specified set of protection profiles

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-28 Security Level 3 Enhanced physical security –Enough to prevent intruders from accessing critical security parameters within module Identity-based authentication Strong requirements for reading, altering critical security parameters Software, firmware components require OS to have EAL3 evaluation, trusted path, informal security policy model –Can use equivalent evaluated trusted OS instead

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-29 Security Level 4 “Envelope of protection” around module that detects, responds to all unauthorized attempts at physical access –Includes protection against environmental conditions or fluctuations outside module’s range of voltage, temperatures Software, firmware components require OS meet functional requirements for Security Level 3, and assurance requirements for EAL4 –Equivalent trusted operating system may be used

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-30 Impact By 2002, 164 modules, 332 algorithms tested –About 50% of modules had security flaws –More than 95% of modules had documentation errors –About 25% of algorithms had security flaws –More than 65% had documentation errors Program greatly improved quality, security of cryptographic modules

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-31 Common Criteria: 1998–Present Began in 1998 with signing of Common Criteria Recognition Agreement with 5 signers –US, UK, Canada, France, Germany As of May 2002, 10 more signers –Australia, Finland, Greece, Israel, Italy, Netherlands, New Zealand, Norway, Spain, Sweden; India, Japan, Russia, South Korea developing appropriate schemes Standard of International Standards Organization De facto US security evaluation standard

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-32 Evaluation Methodology CC documents –Overview of methodology, functional requirements, assurance requirements CC Evaluation Methodology (CEM) –Detailed guidelines for evaluation at each EAL; currently only EAL1–EAL4 defined Evaluation Scheme or National Scheme –Country-specific infrastructures implementing CEM –In US, it’s CC Evaluation and Validation Scheme; NIST accredits commercial labs to do evaluations

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-33 CC Terms Target of Evaluation (TOE): system or product being evaluated TOE Security Policy (TSP): set of rules regulating how assets managed, protected, distributed within TOE TOE Security Functions (TSF): set consisting of all hardware, software, firmware of TOE that must be relied on for correct enforcement of TSP –Generalization of TCB

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-34 Protection Profiles CC Protection Profile (PP): implementation- independent set of security requirements for category of products or systems meeting specific consumer needs –Includes functional requirements Chosen from CC functional requirements by PP author –Includes assurance requirements Chosen from CC assurance requirements; may be EAL plus others –PPs for firewalls, desktop systems, etc. –Evolved from ideas in earlier criteria

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-35 Form of PP 1.Introduction PP Identification and PP Overview 2.Product or System Family Description Includes description of type, general features of product or system 3.Product or System Family Security Environment Assumptions about intended use, environment of use; Threats to the assets; and Organizational security policies for product or system

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-36 Form of PP (con’t) 4.Security Objectives Trace security objectives for product back to aspects of identified threats and/or policies Trace security objectives for environment back to threats not completely countered by product or systemand/or policies or assumptions not completely met by product or system 5.IT Security Requirements Security functional requirements drawn from CC Security assurance requirements based on an EAL May supply other requirements without reference to CC

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-37 Form of PP (con’t) 6.Rationale Security Objectives Rationale demonstrates stated objectives traceable to all assumptions, threats, policies Security Requirements Rationale demonstrates requirements for product or system and for environment traceable to objectives and meet them This section provides assurance evidence that PP is complete, consistent, technically sound

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-38 Security Target CC Security Target (ST): set of security requirements and specifications to be used as basis for evaluation of identified product or system –Can be derived from a PP, or directly from CC If from PP, ST can reference PP directly –Addresses issues for specific product or system PP addresses issues for a family of potential products or systems

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-39 How It Works Find appropriate PP and develop appropriate ST based upon it –If no PP, use CC to develop ST directly Evaluate ST in accordance with assurance class ASE –Validates that ST is complete, consistent, technically sound Evaluate product or system against ST

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-40 Form of ST 1.Introduction ST Identification, ST Overview CC Conformance Claim Part 2 (or part 3) conformant if all functional requirements are from part 2 (or part 3) of CC Part 2 (or part 3) extended if uses extended requirements defined by vendor as well 2.Product or System Description Describes TOE as aid to understanding its security requirement

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-41 Form of ST (con’t) 3.Product or System Family Security Environment 4.Security Objectives 5.IT Security Requirements These are the same as for a PP

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-42 Form of ST (con’t) 6.Product or System Summary Specification Statement of security functions, description of how these meet functional requirements Statement of assurance measures specifying how assurance requirements met 7.PP Claims Claims of conformance to (one or more) PP requirements

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-43 Form of ST (con’t) 8.Rationale Security objectives rationale demonstrates stated objectives traceable to assumptions, threats, policies Security requirements rationale demonstrates requirements for TOE and environment traceable to objectives and meets them TOE summary specification rationale demonstrates how TOE security functions and assurance measures meet security requirements Rationale for not meeting all dependencies PP claims rationale explains differences between the ST objectives and requirements and those of any PP to which conformance is claimed

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-44 CC Requirements Both functional and assurance requirements EALs built from assurance requirements Requirements divided into classes based on common purpose Classes broken into smaller groups (families) Families composed of components, or sets of definitions of detailed requirements, dependent requirements and definition of hierarchy of requirements

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-45 Security Functional Requirements

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-46 SSE-CMM: 1997–Present Based on Software Engineering Capability Maturity Model (SE-CMM or just CMM) Defines requirements for process of developing secure systems, not for systems themselves –Provides maturity levels, not levels of trust –Used to evaluate an organization’s security engineering

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-47 SSE-CMM Model Process capability: range of expected results that can be achieved by following process –Predictor of future project outcomes Process performance: measure of actual results Process maturity: extent to which a process explicitly defined, managed, measured, controlled, and is effective Divides process into 11 areas, and 11 more for project and organizational practices –Each process area contains a goal, set of base processes

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-48 Process Areas Process areas: –Administer security controls –Assess impact, security risk, threat, vulnerability –Build assurance argument –Coordinate security –Monitor system security posture –Provide security input –Specify security needs –Verify, validate security Practices: –Ensure quality –Manage configuration, project risk –Monitor, control technical effort –Plan technical effort –Define, improve organization’s systems engineering process –Manage product line evolution –Provide ongoing skills, knowledge –Coordinate with suppliers

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-49 Example: Assess Threat Goal: threats to the security of the system will be identified and characterized Base processes: –Identify natural, man-made threats –Identify threat units of measure –Assess threat agent capability, threat likelihood –Monitor threats and their characteristics

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-50 Capability Maturity Levels Performed informally: perform base processes Planned and tracked: address project-level definition, planning, performance, verification issues Well-defined: focus on defining, refining standard practice and coordinating it across organization Quantitatively controlled: focus on establishing measurable quality goals, objectively managing their performance Continuously improving: improve organizational capability, process effectiveness

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-51 Using the SSE-CMM Begin with process area –Identify area goals, base processes –If all processes present, determine how mature base processes are Assess them against capability maturity levels May require interacting with those who use the base processes –Do this for each process area Level of maturity for area is lowest level of the base processes for that area Tabular representation (called Rating Profile) helps communicate results

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-52 Key Points First public, widely used evaluation methodology was TCSEC (Orange Book) –Criticisms led to research and development of other methodologies Evolved into Common Criteria Other methodologies used for special environments