1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security.

Slides:



Advertisements
Similar presentations
Security Requirements
Advertisements

Module 1 Evaluation Overview © Crown Copyright (2000)
University of Tulsa - Center for Information Security Common Criteria Dawn Schulte Leigh Anne Winters.
Common Criteria Evaluation and Validation Scheme Syed Naqvi XtreemOS Training Day.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 5.2: Evaluation of Secure Information Systems.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Software Quality Assurance Plan
4/28/20151 Computer Security Security Evaluation.
CS526Topic 22: TCSEC and Common Criteria 1 Information Security CS 526 Topic 22: TCSEC and Common Criteria.
Chapter 16: Standardization and Security Criteria: Security Evaluation of Computer Products Guide to Computer Network Security.
Auditing Concepts.
Common Criteria Richard Newman. What is the Common Criteria Cooperative effort among Canada, France, Germany, the Netherlands, UK, USA (NSA, NIST) Defines.
Effective Design of Trusted Information Systems Luděk Novák,
IT Security Evaluation By Sandeep Joshi
The Common Criteria Cs5493(7493). CC: Background The need for independently evaluated IT security products and systems led to the TCSEC Rainbow series.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Dr. Julian Lo Consulting Director ITIL v3 Expert
Secure Operating Systems Lesson 0x11h: Systems Assurance.
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
Security Controls – What Works
COEN 351: E-Commerce Security Public Key Infrastructure Assessment and Accreditation.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
ISO 9001 Interpretation : Exclusions
Computer Security: Principles and Practice
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
Fraud Prevention and Risk Management
Gurpreet Dhillon Virginia Commonwealth University
SEC835 Database and Web application security Information Security Architecture.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Introduction to Software Quality Assurance (SQA)
1 Anthony Apted/ James Arnold 26 September 2007 Has the Common Criteria Delivered?
Information Systems Security Computer System Life Cycle Security.
Evaluating Systems Information Assurance Fall 2010.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Background. History TCSEC Issues non-standard inflexible not scalable.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
CMSC : Common Criteria for Computer/IT Systems
TM8104 IT Security EvaluationAutumn CC – Common Criteria (for IT Security Evaluation) The CC permits comparability between the results of independent.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
CSCE 727 Awareness and Training Secure System Development and Monitoring.
Technology Services – National Institute of Standards and Technology Conformity Assessment ANSI-HSSP Workshop Emergency Communications December 2, 2004.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
Computer Security Introduction
Auditing Concepts.
Official levels of Computer Security
THE ORANGE BOOK Ravi Sandhu
Cryptography and Network Security
IT SECURITY EVALUATION ACCORDING TO HARMONIZED AND APPROVED CRITERIA
Presentation transcript:

1 Lecture 8 Security Evaluation

2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security Evaluation Criteria u The Common Criteria u Security Analysis

3 What is an Evaluation? u Independent Verification and Validation (IV&V) by an accredited and competent Trusted Third Party u Provides a basis for international Certification against specific formal standards (i.e. CC) by national authorities

4 Evaluation Process Assurance Techniques Independent Evaluations Assurance Produceprovide formal evidence of Privacy Requirements that are Properly Managed Privacy Rights to protect Information Asset Owners Confidence require giving

5 The target of the evaluation u Products, e.g., operating systems, which will be used in a variety of applications and have to meet the generic security requirements. u Systems, i.e., a collection of products assembled to meet the specific requirements of a given application.

6 The purpose of the evaluation u Evaluation: assessing whether a product has the security properties claimed for it. u Certification: assessing whether a product is suitable for a given application. u Accreditation: deciding that a product will be used in a given application.

7 The method of the evaluation u A method must prevent from: u The product is later found to contain a serious flaw u Different evaluations of the same product disagree in their assessment u Product-Oriented: u Examine and test the product. u Different evaluations may give different results. u Process-Oriented: u Look at the documentation and the process of product development. u Easier to achieve repeatable results, but may not be very useful

8 The structure of the evaluation criteria u Functionality: u The security features of a system, e.g., DAC (Discretionary), MAC (Mandate), authentication, auditing u Effectiveness: u The mechanisms used appropriate for the given security requirements? u Assurance: u The thoroughness of the evaluation

9 Organizations of the evaluation process u Government agency: backs the evaluation process and issues the certification u Accredited private enterprise: enforce the consistency of evaluations (repeatability and reproducibility)

10 What Do CC Evaluations Give Us?-Benefits u Confidence & Trust in privacy and security characteristics of products and the processes used to develop and support them (full product life cycle) u Build official assurance arguments u Prove technologies are indeed privacy enhancing as claimed u formal, independently verifiable and repeatable methods u Provide basis for international certification u Provide Certification Report u Differentiate products u Formally support demonstrable due diligence/care

11 The costs of evaluation u Costs: u Fee paid to evaluation; u Time to collect required evidences u Time and money of training of evaluators u Time and efforts of liaising with the evaluation team

12 The Orange Book u Trusted Computer Security Evaluation Criteria (1985) u A yardstick for users to assess the degree of trust that can be placed in a computer security systems; u Guidance for manufacturers of computer security systems; u A basis for specifying security requirements when acquire a computer security system

13 Security and evaluation categories u Security policy: u mandatory and discretionary access control policies expressed in terms of subjects and objects u Marking of objects: u Labels specify the sensitivity of objects u Identification of subjects: u Individual subjects must be identified and authenticated u Accountability: u audit logs of security relevant events have to be kept.

14 Security and evaluation categories (Cont’d) u Assurance: u Operational: architecture u Life cycle: design, test, and configuration management u Documentation: u Required by system managers, users and evaluators u Continuous protection: u Security mechanisms cannot be tampered with.

15 Four security divisions u D: Minimal protection u C: Discretionary protection u B: Mandatory protection u A: Verified protection

16 Orange Book Ratings u D: Minimal Protection u Did not qualify for higher u C1: Discretionary Security Protection u Resources protected by ACLs, memory overwrites prevented u C2: Controlled Access Protection u Access control at user level, clear memory when released u B1: Labeled Security Protection u Users, files, processes, etc, must be labeled u B2: Structured Security Protection u Big step, covert channels, secure kernel, etc. u B3: Security Domains u Auditing, secure crash u A1: Verified Design u Same requirements, more rigorous implementation

17 TNI-The Trusted Network Interpretation-The Red Book u Two kinds of networks u Networks of independent components, with different jurisdictions, policies, management, etc. u Centralized networks with single accredited authority, policy and network trusted computing base u The red book only considers the 2 nd type. u The vulnerability of the communication paths u Concurrent and asynchronous operation of the network components

18 Red book Policy u Security policies deal with secrecy and integrity. u Node names as DAC group identifiers in C1 u Audit trails should log the user of cryptographic keys. u In the red book, integrity refers to u The protection of data and labels against unauthorized modification u The correctness of message transmission, authentication of source and destination of a message. u Labels indicate whether an object had ever been transmitted between nodes

19 Other Security Services in the Red Book u Describe Services u Functionality u Strength: how well it is expected to meet its objective u Assurance: derived from theory, testing, SE practice, validation and verification. u Rating u None u Minimum (C1) u Fair(C2) u Good (B2) u Not offered - present

20 Services in the red book u Communication integrity u Authentication u Communication field integrity u Non-repudiation u Denial of Service u Continuity of operation u Protocol-based protection u Network management u Compromise protection u Data confidentiality u Traffic confidentiality

21 Windows NT security rating u Windows NT is only secure for such purposes (e.g. - "C2 Certified") if: u Run the particular Compaq or Digital hardware models specified by NIST, u Run the particular version of Windows NT (3.50) specified by NIST, u Remove the floppy drive from the computer, and u Remove network connectivity, and u Configure Windows NT as specified by NIST.

22 UNIX security rating u The Unix system is only as secure as the C1 criterion u provides only discretionary security protection (DSP) against browsers or non-programmer users u AT&T, Gould and Honeywell made vital changes to the kernel and file system in order to produce a C2 rated Unix operating system. u Have to sacrifice some of the portability of the Unix system. It is hoped that in the near future a Unix system with an A1 classification will be realized, though not at the expense of losing its valued portability. u ecurity_Issues.html

23 ITSEC: Information Technology Security Evaluation Criteria u A harmonized European criteria refers to (1991) u Effectiveness: how well a system is suited for countering the threats envisaged. u And correctness: assurance aspects relating to the development and operation of a system.

24 The Evaluation Process u TOE (Target of Evaluation) u An IT system, part of a system or product that has been identified as requiring security evaluation; ie, that which is being evaluated. u A Target of Evaluation (TOE) is the specific IT product or system that is subject to evaluation. u It is particularly relevant to, and part of the standard terms within, Common Criteria and ITSEC. u A Security Target (ST) contains the IT security objectives and requirements as pertaining to a specific target of evaluation with the definition of its functional and assurance measures. u

25 Security target u All aspects of the TOE that are relevant for evaluation u Security objectives u Statements about the system environment u Assumptions about the TOE environment u Security functions u Rationale for security functions u Required security mechanisms u Required evaluation level u Claimed rating of the minimum strength of mechanisms u u Definition (Matt Bishop, 2003): u A security target is a set of security requirements and specifications to be used as the basis for evaluation of an identified product or system.

26 Security Functionality u Security functionality description: u Security objectives: u Why is the functionality wanted? u Security functions: u What is actually done? u Security mechanisms: u How is it done?

27 Security functions in ITSEC u Identification and authentication u Access control u Accountability: record the exercise of rights u Audit: detect and investigate events that might represent threats to security u Object reuse u Accuracy: correctness and consistency of data u Reliability: consistency and availability of service u Data exchange: referring to the International standard ISO

28 Security rating in ITSEC u F1: C1 Discretionary security protection u F2: C2 Controlled Access Protection u F3: B1 Labeled Security Protection u F4: B2 Structured Protection u F5: B3 & A1 Security domain and verified design u F6: high integrity u F7: high availability u F8: data integrity during communication u F9: for high confidentiality (cryptographic devices) u F10: for networks with high demands on confidentiality and integrity

29 Assurance of Effectiveness u An assessment of effectiveness should examine u Suitability of functionality u Binding of functionality (compatibility) u Strength of mechanism u Ease of use u Assessment of security vulnerabilities within the construction of the TOE, e.g., ways of bypassing or corrupting security enforcing functions u Assessment of security vulnerabilities within the operation of the TOE.

30 Assurance of Correctness u Seven levels E0-E6 specify the list of documents that have to be provided by the sponsor and the actions to be performed by the evaluator. u Development Process: u Following the stages of a top-down methodology, security requirements, architectural design, detailed design, and implementation are considered. u Development evaluation: u includes configuration control and, from class E2 upwards, developer security, e.g., the confidentiality of documents association. u Operation: u Refers to operational document, including delivery, configuration, star-up and operation.

31 Seven Evaluation classes u E0: fail u E1:a security target and an informal description of the target u E2:+informal description of detailed design, configuration control and a controlled distribution process u E3: + a detailed design and the source code corresponding to the security functions shall be provided u E4: formal model of the security policy; rigorous approach and notation for architectural and detailed design, vulnerability analysis u E5: close correspondence between detailed design and source code, vulnerability based on source code u E6: formal description of the security architecture of the TOE, consistent formal model of security policy, possible to relate portions of the executable form of TOE to the source code

32 Correspondence between Orange Book and ITSEC OBITSEC DE0 C1F1+E1 C2F2+E2 B1F3+E3 B2F4+E4 B3F5+E5 A1F5+E6

33 Common Criteria ISO u International ISO IT Security standard for formally specifying IT Security Requirements and how these are to be independently evaluated and tested so products may be formally certified as being trustworthy (1991) u 3-Part Standard, plus evaluation methodology u

34 CC Evaluations Involve: u ANALYSIS u Product Documentation u Product Design (Security & Privacy Focus) u Development Processes & Procedures u Operation & Administration Guidance and Procedures u Vulnerability Assessments u TESTING u Independent & Witnessed u Fully Documented & Repeatable u REPORTS u Lead to International Certification

35 Types of Common Criteria evaluations u Categories of Evaluations * Typically as the first step in an EAL. Protection Profile *Security Target Evaluation Assurance Levels (EALs)

36 Scope u Interviews u Full Documentation Review u Independent Testing u Witness of Developer Testing u Observation Reports When Required u Deliverables: u Security/Privacy Target or Protection Profile u Evaluation Technical Report u Certification Report (published by CSE, and recognized by NSA and other Certification Bodies)

37 Protection Profiles u A Protection Profile (PP) is an implementation- independent statement of security requirements that is shown to address threats that exist in a specified environment. u A PP would be appropriate in the following cases: u A consumer group wishes to specify security requirements for an application type u A government wishes to specify security requirements for a class of security products u An organization wishes to purchase an IT system to address its security requirements u A certified protection profile is one that a recognized Certification Body asserts as having been evaluated by a laboratory competent in the field of IT security evaluation to the requirements of the Common Criteria and Common Methodology for Information Technology Security Evaluation.

38 The evaluation process Documentation Preparation Vendor Consultant Develop Security Target Vendor Consultant or Lab Conduct Evaluation Lab Vendor NIAP CCEVS NIAP Issues Certificate NIAP CCEVS u Work not necessarily performed by the CCTL: u Documentation preparation u Writing the Security Target u Other consulting u Evaluations must be performed by lab personnel CCTL: Common Criteria Test Labs CCEVS ( Common Criteria Evaluations ) The National Information Assurance Partnership (NIAP) is the governing body for all CCTLs in the U.S.

39 Required evaluation materials u Security Target u TOE (target of evaluation) u Configuration Management documentation u Functionality Specification u High and low level design documentation u User and Administrator’s guides u Life-cycle documentation u Development tool documentation u Security Policy model u Correspondence analyses u Installation and start-up procedures u Delivery procedures

40 Steps in the evaluation process Evaluation assurance levels (EAL)

41 Results of the evaluation process u Outcomes of Common Criteria Testing u In U.S. this follows approval of lab test results u Public posting of ST, validation report, and certificate Validation Certificate

42 How the Process Works 1. Privacy (and security) requirements for a technology and associated claims are precisely specified using the CC 2. Technology is built, documented and tested to these requirements 3. Technology is submitted to nationally accredited labs for evaluation against the standards 4. Evaluation is conducted under the oversight of national authority

43 Process (Continued) 5. Once vendor claims are proven, national authority confers certification and publishes a Certification Report 6. Results are internationally recognized under a Mutual Recognition Arrangement

44 Evaluation assurance levels (EAL) u To meet the great variation in required levels of security within and between both government and commercial interests, there are seven levels of evaluation (EAL-1 through EAL-7). u Only the first four levels can be evaluated by commercial laboratories.

45 EAL (Cont’d) u EAL-1 examines the product and its documentation for conformity, establishing that the Target does what its documentation claims. u EAL-2 tests the structure of the product through an evaluation, which includes the product’s design history and testing. u EAL-3 evaluates a product in design stage, with independent verification of the developer’s testing results, and evaluates the developer’s checks for vulnerabilities, the development environmental controls, and the Target’s configuration management. u EAL-4 is an even greater in-depth analysis of the development and implementation of the Target and may require more significant security engineering costs.

46 EAL (Cont’d) u EALs 5-7 require even more formality in the design process and implementation, analysis of the Target’s ability to handle attacks and prevent covert channels, for products in high- risk environments. u In the United States, evaluation to EALs 5-7 must be done by the National Security Agency (NSA) for the U.S. government.

47 Correspondences OBITSECCC DE0NA EAL1 C1F1+E1EAL2 C2F2+E2EAL3 B1F3+E3EAL4 B2F4+E4EAL5 B3F5+E5EAL6 A1F5+E6EAL7

48 International evaluations history u TCSEC (1980) u Trusted Computer System Evaluation Criteria (U.S.) u ITSEC (1991) u Information Technology Security Evaluation and Certification Scheme (Europe) u CTCPEC (1993) u Canadian Trusted Computer Product Evaluation Criteria (CTCPEC)

49 TCSEC – U.S. (Orange Book) 1985 U.K. Confidence Levels 1989 German Criteria French Criteria Federal Criteria Draft 1993 Canadian Criteria 1993 ITSEC 1991 Common Criteria V V International evaluations history

50 Common Criteria participating countries u Certificate producing countries u Australia u New Zealand u Canada u France u Germany u United Kingdom u United States u Certificate consuming countries u Austria u Finland u Greece u Israel u Italy u Netherlands u Norway u Spain u Sweden

51 Security Analysis u Phases: u Identification of the system and its assets u Valuation of the assets u security levels u Identification of vulnerabilities and threats u Valuation of vulnerabilities and threats u Assessment of risks on assets u depending on security levels and misuse likelihoods u stop, if all risks are bearable u Planning and design of countermeasures u Analysis of the extended system u countermeasures are also vulnerable

52 Security Analysis u Common Criteria Trust Concept: u Owner of an asset has to trust countermeasures built up by audits u concept is insufficient since it does not concentrate on parts of the audited system! u Potentially Trusted System Parts: u Principals with access to an asset u all principals may be benevolent u Asset itself u free of vulnerabilities u Countermeasures u sufficient protection u immune against attacks on itself u Reduction of the analysis process by considering trust in system parts

53 Summary u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security Evaluation Criteria u The Common Criteria u Security Analysis