CACR CC Briefing Stephen Booth Computer and System Security Section Communications Security Establishment

Slides:



Advertisements
Similar presentations
Security Requirements
Advertisements

Module 1 Evaluation Overview © Crown Copyright (2000)
University of Tulsa - Center for Information Security Common Criteria Dawn Schulte Leigh Anne Winters.
Common Criteria Evaluation and Validation Scheme Syed Naqvi XtreemOS Training Day.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 5.2: Evaluation of Secure Information Systems.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Manager, Product Evaluation
Software Quality Assurance Plan
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
1 WebTrust for Certification Authorities (CAs) Overview October 2011 WebTrust for Certification Authorities (CAs) Overview October 2011 Presentation based.
Common Criteria Richard Newman. What is the Common Criteria Cooperative effort among Canada, France, Germany, the Netherlands, UK, USA (NSA, NIST) Defines.
Effective Design of Trusted Information Systems Luděk Novák,
The Common Criteria for Information Technology Security Evaluation
IT Security Evaluation By Sandeep Joshi
1 norshahnizakamalbashah CEM v3.1: Chapter 10 Security Target Evaluation.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
Information Security Policies and Standards
COEN 351: E-Commerce Security Public Key Infrastructure Assessment and Accreditation.
Stephen S. Yau CSE , Fall Evaluating Systems for Functionality and Assurance.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
Short Course on Introduction to Meteorological Instrumentation and Observations Techniques QA and QC Procedures Short Course on Introduction to Meteorological.
Configuration Management
Release & Deployment ITIL Version 3
National Smartcard Project Work Package 8 – Security Issues Report.
Gurpreet Dhillon Virginia Commonwealth University
Practical IS security design in accordance with Common Criteria Security and Protection of Information 2005 František VOSEJPKA S.ICZ a.s. June 5, 2005.
A Security Business Case for the Common Criteria Marty Ferris Ferris & Associates, Inc
Evaluating Systems Information Assurance Fall 2010.
1 A Disciplined Security Specification for a High- Assurance Grid by Ning Zhu, Jussipekka Leiwo, and Stephen John Turner Parallel Computing Centre Distributed.
Cryptography and Network Security
Updates on Korean Scheme IT Security Certification Center, National Intelligence Service The 8 th ICCC in Rome, Italy.
ISA 562 Internet Security Theory & Practice
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Background. History TCSEC Issues non-standard inflexible not scalable.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Common Criteria V3 Overview Presented to P2600 October Brian Smithson.
CMSC : Common Criteria for Computer/IT Systems
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
TM8104 IT Security EvaluationAutumn CC – Common Criteria (for IT Security Evaluation) The CC permits comparability between the results of independent.
Proposed Privacy Taxonomy for IOT Scott Shorter, Electrosoft, These slides are based on work contributed to the IDESG Use Case AHG in January.
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
SecSDLC Chapter 2.
Information Security: Model, Process and Outputs Presentation to PRIA WG November 10, 2006.
Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
======!"§==Systems= Technical Guidance for CC Evaluation Wolfgang Killmann T-Systems GEI GmbH.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Technology Services – National Institute of Standards and Technology Conformity Assessment ANSI-HSSP Workshop Emergency Communications December 2, 2004.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
Service Organization Control Reports What Have We Learned? Chris Bruhn DIRECTOR, IT RISK SERVICES, BKD, LLP SAS 70 ENDS EXIT TO SSAE 16.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
Security Functional Requirements Kashif Imran. Overview Common Criteria Protection Profiles Security Objectives Security Requirements Security Functional.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
The Common Criteria for Information Technology Security Evaluation
Ch.18 Evaluating Systems - Part 2 -
Service Organization Control (SOC)
2006 Annual Research Review & Executive Forum
Presentation transcript:

CACR CC Briefing Stephen Booth Computer and System Security Section Communications Security Establishment

November 8, 1999CACR Briefing3 Presentation Objectives I intend to provide: – an overview of the CC Project –the Current Status of the CC and CEM –a description of the CC MRA –a high level description of the CC - how it is structured –a description of the Canadian CC Scheme

November 8, 1999CACR Briefing4 Terms Used CC - Common Criteria CCEF - (CCE Approved) CC Evaluation Facility CCS - Canadian CC Evaluation and Certification Scheme CEM - Common Evaluation Methodology EAL - Evaluation Assurance Level MRA Mutual Recognition Arrangement PP - Protection Profile ( what the buyer needs) ST - Security Target ( what the vendor has) TOE - Target of Evaluation (the product) TSF - TOE Security Functions

November 8, 1999CACR Briefing5 CC PPs and STs/TOEs Protection Profile (What I Need) Target of Evaluation (the Product) Security Target (What I Have) Customer Vendor

November 8, 1999CACR Briefing6 History of Evaluation Criteria ‘83/85: Trusted Computer System Evaluation Criteria (TCSEC) ‘91: Information Technology Security Evaluation Criteria (ITSEC) ‘93: Canadian Trusted Computer Evaluation Criteria (CTCPEC) ‘96: Common Criteria (CC)

November 8, 1999CACR Briefing7 TCSEC Trusted Computer System Evaluation Criteria (orange book) DoD STD, December 1983 Four trust rating divisions (classes): –D, C (C1, C2), B (B1, B2, B3), A (A1) Three basic requirements: specific security functionality requirement assurance requirement documentation requirement

November 8, 1999CACR Briefing8 ITSEC Information Technology Security Evaluation Criteria (France, Germany, Netherlands and UK) v1.2, 1991 focus is on assurance regardless of functionality product evaluated to perform as indicated in documentation

November 8, 1999CACR Briefing9 CTCPEC Canadian Trusted Computer Product Evaluation Criteria, Version 3.0, Jan two types of requirements are delineated: functionality requirements assurance requirements (T-0 to T-7) functionality: four policy-oriented criteria - Confidentiality, Integrity, Availability and Accountability

November 8, 1999CACR Briefing10 Common Criteria (CC) Common Criteria Version 1.0 (CC) 31 Jan 1996 aligned the evaluation criteria of nations (ie. TCSEC, FC (USA), CTCPEC (Canada), ITSEC (Europe), ISO) compatible with existing evaluation criteria one product evaluated against it (Milkyway Black Hole firewall) CC version 2.0 (May 1998) now superceded by CC Version 2.1 which is identical to ISO 17408

November 8, 1999CACR Briefing11 CEM What is the CEM? –Common Methodology for information technology security evaluation –An common understanding of what the CC assurance requirements mean and the minimum work necessary to satisfy them –Supports mutual recognition of evaluation results

November 8, 1999CACR Briefing12 Purpose of the CEM Defines specific evaluator work units Common approach to satisfying assurance requirements defined in CC Part 3 Primary audience is evaluators and certifiers overseeing evaluator work Counter balances commercial pressures to reduce evaluation effort

November 8, 1999CACR Briefing13 Progress to date on the CEM Part 1, Introduction and general model, release January 97 Part 2, Evaluation methodology, first released January 99 (ver 0.6) (1003 comments received) Part 2, re-released, August 99 (ver 1.0) –Incorporated large majority of comments Working document for next 12 to 18 months MRA requirement to use for evaluations commencing Jan 2000

November 8, 1999CACR Briefing14 Future work on the CEM Methodology for augmentations beyond predefined assurance packages Evaluations need not be performed using pre-define assurance packages Methodology for maintenance of certificates How to extend evaluation results to future releases Methodology for high assurance requirements Current CEM covers assurance requirements in low to medium assurance category

November 8, 1999CACR Briefing15 Mutual Recognition Arrangement attempted to document a “gentleman’s agreement” to accept each others evaluation results started as an agreement but that meant it was staffed and signed as an international treaty fundamental concept of the CC project if there is no effective MRA then the CC project has failed!

November 8, 1999CACR Briefing16 What do we need for MRA? Common and agreed upon standard Common and agreed upon evaluation methodology Trust / comfort that the other signatories are doing things if not the same way then at least in a consistent way Willingness of all the partners to take some risks

November 8, 1999CACR Briefing17 What do we have that let us sign MRA? CC CEM require evaluation facilities to be accredited to ISO 25 require CBs to meet the requirements of ISO 65 Technical discussion group that meets to talk about how each of our schemes work a commitment to undergo voluntary periodic assessments Are we all totally comfortable?

November 8, 1999CACR Briefing18 What do we have that let us sign MRA? Risk takers and mitigation steps –accepted each other “on faith” and before CEM was completed –we accept EAL 1 to 4 for now a commitment to make MRA and the CC project work

November 8, 1999CACR Briefing19 MRA Signing Arrangement on the Mutual Recognition of Common Criteria Certificates in the Field of Information Technology Security –signed October 8,1998 –Germany, UK, Canada, US and France –expanded this year (September )to include the Australasian Scheme

November 8, 1999CACR Briefing20 What does it mean? Extracts from the MRA document

November 8, 1999CACR Briefing21 MRA Future expand both signatories and scope ( >EAL 4) initiatives underway to expand to Europe work on CEM for higher assurance levels stepping up the schedule of “voluntary assessments”

November 8, 1999CACR Briefing22 CC Document Structure Part 1Introduction and general model Part 2Security functional requirements Part 3Security assurance requirements

November 8, 1999CACR Briefing23 CC Part 1 Introduction to the rest of the documents A general model of evaluation Common Criteria evaluation results Structure for expressing requirements and specifications

November 8, 1999CACR Briefing24 CC Part 2 Class, family, and component structure Operations Catalogue of functional requirements Application notes (housed in a separate volume)

November 8, 1999CACR Briefing25 CC Part 3 Assurance requirements of the criteria: –CC Assurance Paradigm –Evaluation criteria for PPs (Class APE) –Evaluation criteria for STs (Class ASE) –Catalogue of assurance requirements –Evaluation assurance levels (EALs)

CC Functionality

November 8, 1999CACR Briefing27 Functional Requirements Describe the desired security behavior of the TOE Intended to protect confidentiality, integrity and availability of assets, as required May be customized for inclusion in a PP/ST

November 8, 1999CACR Briefing28 Component Requirements Structure Class Family Element Family Element Component

November 8, 1999CACR Briefing29 Interpreting Functional Requirement Names FIA_UID.1.2 F=Functional A=Assurance Specific Class Family Name Component Number Element Number

November 8, 1999CACR Briefing30 CC Functional Classes (1) Security audit (FAU) Communication (FCO) Cryptographic support (FCS) User data protection (FDP) Identification and authentication (FIA) Security management (FMT)

November 8, 1999CACR Briefing31 CC Functional Classes (2) Privacy (FPR) Protection of the TOE Security Functions (FPT) Resource utilisation (FRU) TOE access (FTA) Trusted path/channels (FTP)

November 8, 1999CACR Briefing32 Functional Components It is the collection of functional components in a PP/ST that defines the functionality Each component contains a list of evaluatable statements, called “elements” All elements must be successfully evaluated within a component

November 8, 1999CACR Briefing33 FIA: Identification and authentication Addresses requirements for functions to establish and verify a claimed user identity FIA deals with: –user identification and authentication –authentication failures –user attributes (e.g., clearances, roles) –constraints on quality of authentication data (e.g. minimum password size)

November 8, 1999CACR Briefing34 Selected FIA families FIA_UID:User identification FIA_UAU:User authentication FIA_SOS:Specification of secrets

November 8, 1999CACR Briefing35 FAU: Security Audit Security auditing involves recognising, recording, storing, and analysing information related to security relevant events. Post event examination of which security events took place, and which user (if applicable) is responsible.

November 8, 1999CACR Briefing36 Selected FAU families FAU_GEN: Security Audit Data Generation FAU_SEL: Security Audit Event Selection FAU_STG: Security Audit Event Storage FAU_SAR: Security Audit Review FAU_SAA: Security Audit Analysis

November 8, 1999CACR Briefing37 FMT: Security Management management of TSF data (e.g. banners) management of security attributes (ACL’s) management of functions of the TSF (e.g. selection of functions, setting rules, etc.) definition of security roles

November 8, 1999CACR Briefing38 Selected FMT families FMT_MSA: Management of Security Attributes –attribute: used for enforcement of TSP FMT_MTD: Management of TSF Data –data: created by and for the TOE FMT_SMR: Security Management Roles

November 8, 1999CACR Briefing39 FCO:Communications Address the functions that are concerned with assuring the identity of a party participating in a data exchange –proof of origin –proof of receipt

November 8, 1999CACR Briefing40 FCO Families FCO_NRO: Non-repudaition of origin FCO_NRR: Non-repudiation of receipt

November 8, 1999CACR Briefing41 FDP: User data protection Specifies requirements for policies and functions related to user data protection FDP deals with: –security function policies for user data protection (access control, information flow) –forms of user data protection –off-line storage, import and export –inter-TSF communication

November 8, 1999CACR Briefing42 Selected FDP families FDP_ACC:Access control policy FDP_ACF:Access control functions FDP_RIP:Residual information protection FDP_ROL:Rollback FDP_SDI:Stored data integrity

November 8, 1999CACR Briefing43 FPR: Privacy Addresses those functions that protect against discovery and misuse of identity by others

November 8, 1999CACR Briefing44 FPR Families FPR_ANO: Anonymity FPR_PSE: Pseudonymity FRP_UNL: Unlinkability FPR: Unobservability

November 8, 1999CACR Briefing45 FRU: Resource utilization Supports the availability of required resources (processing capability, storage capacity) FRU deals with: –fault tolerance –prioritization of services –resource allocation

November 8, 1999CACR Briefing46 Selected FRU family FRU_RSA:Resource allocation

November 8, 1999CACR Briefing47 FPT: Protection of the TOE Security Functions 3 significant portions of the TSF: –abstract machine what does the TOE “sit upon” –implementation the mechanisms that enforce the TSP –TSF data the transient rules and data of the TOE

November 8, 1999CACR Briefing48 Selected FPT families FPT_FLS: Fail Secure FPT_RCV: Trusted Recovery FPT_RVM: Reference Mediation FPT_SEP: Domain Separation

November 8, 1999CACR Briefing49 FTA: TOE Access Addresses functional requirements for controlling the establishment of a user’s session

November 8, 1999CACR Briefing50 FTA Families FTA_LSA: Limitation on scope of slectable attributes FTA_MCS: Limitation on multiple concurrent sessions FTA_SSL: Session locking FTA_TAB: TOE Access banners FTA_TAH: TOE Access history FTA_TSE: TOE Session establishment

November 8, 1999CACR Briefing51 FTP:Trusted Path/Channels Addresses functional requirements for –trusted communications path between users and the TSF and –trusted channel between TSF and other trusted IT products

November 8, 1999CACR Briefing52 FTP Families FTP_ITC: Inter TSF trusted channel FTP_TRP: Trusted path –a direct path between users and the TSF

November 8, 1999CACR Briefing53 FCS: Cryptographic support Addresses TOEs which employ cryptographic functionality FCS deals with: –cryptographic key generation, distribution, access and destruction –cryptographic operations performed by the TOE (e.g., encryption, decryption, digital signatures, checksums, secure hash, etc.)

November 8, 1999CACR Briefing54 FCS families FCS_CKM:Cryptographic key management FCS_COP:Cryptographic operation

November 8, 1999CACR Briefing55 FCS_CKM: Cryptographic key management (1) This family supports the management of cryptographic keys throughout their life cycle Each of the components allow for claims to be made that particular standards are met FCS_CKM.1 requires that the TSF generate cryptographic keys; operations are completed for the key generation algorithm and key size

November 8, 1999CACR Briefing56 FCS_CKM: Cryptographic key management (2) FCS_CKM.2 defines how the TSF distributes cryptographic keys (operations) FCS_CKM.3 specifies the types of cryptographic access (with associated methods) employed by the TSF (operations) FCS_CKM.4 defines how the TSF destroys cryptographic keys (operations)

November 8, 1999CACR Briefing57 FCS_COP: Cryptographic operation (1) This family contains only one component: FCS_COP.1 This family identifies which cryptographic operations (e.g., data encryption, digital signature) are performed by the TOE, and using which cryptographic algorithms, and key sizes

November 8, 1999CACR Briefing58 FCS_COP: Cryptographic operation (2) Although strength of cryptographic algorithms is outside the scope of the CC, the correct implementation of the cryptographic algorithms must still be verified by the evaluator

November 8, 1999CACR Briefing59 CC Assurance Configuration Management Delivery & Operation Development Guidance Documents Life Cycle Support Tests Vulnerability Assessment

November 8, 1999CACR Briefing60 Different Levels of Assurance The CC Provides for 7 different “Evaluation Assurance Levels” (EALs) –Starts at EAL1 (Low Assurance) –EAL3 & EAL4 (Medium Assurance) –EAL5 & EAL6 (High Assurance) –EAL7 (State of the Art)

November 8, 1999CACR Briefing62 Objective of EAL 1 Security requirements are traced into the design testing verifies behavior is as expected This provides assurance because; –if a product behaves IAW with security requirements, and –if security requirements are effective to solve security problem, then –product will effectively solve security problem

November 8, 1999CACR Briefing63 Why EAL 1 is considered basic So little is known about the product’s design –correct behavior does not mean vulnerability free Nothing is known about the development process –poor development practices often means poor security, or –good security cannot be assured in the absence of good development practices

November 8, 1999CACR Briefing64 EAL1 versus EAL3 EAL1 ( Low Assurance ) –“Functionally Tested” –Given a product with Installation, Admin & User Guides. –Does it do what the Guides said it would? EAL3 ( Medium Assurance ) –EAL1 plus… –High Level Design –Test Plan, Procedures, Results, Coverage, Depth, Independent –Misuse, SOF, Obvious Vulnerabilities

November 8, 1999CACR Briefing65 Canadian Common Criteria Evaluation and Certification Scheme

November 8, 1999CACR Briefing66 CCS Purpose To provide a cost effective, expandable IT security evaluation capability in Canada ensure quality of evaluations improve availability of evaluated products improve efficiency and cost effectiveness of evaluation and certification processes

November 8, 1999CACR Briefing67 CCS Framework SCC Accreditation of IT E&T Facilities CSE Approval of CCS ITSEFs >>CCEFs CCEFs will Evaluate IT products CSE will Certify CCEF results

November 8, 1999CACR Briefing68 General requirements for the Competence of Calibration & Testing Laboratories: ISO Guide 25, CAN-P-4 A Framework for Commercial ITS Evaluation and Testing Basic Quality System Management Structure Documented Procedures

November 8, 1999CACR Briefing69 General requirements for the Competence of Calibration & Testing Laboratories: ISO Guide 25, CAN-P-4 Guidelines for the Accreditation of ITS Evaluation and Testing Facilities (CAN-P-1591) A Framework for Commercial ITS Evaluation and Testing ITS Knowledge and Skills

November 8, 1999CACR Briefing70 General requirements for the Competence of Calibration & Testing Laboratories: ISO Guide 25, CAN-P-4 Guidelines for the Accreditation of ITS Evaluation and Testing Facilities (CAN-P-1591) A Framework for Commercial ITS Evaluation and Testing CC Based Product (Phase I) and System (Phase II) Evaluations and Certifications The Canadian CCS will be the first program to build on this “foundation” in Canada

November 8, 1999CACR Briefing71 General requirements for the Competence of Calibration & Testing Laboratories: ISO Guide 25, CAN-P-4 Secure Electronic Business Testing / Approvals? System Vulnerability Analysis? Biometric Testing / Approvals? CBA Testing? Guidelines for the Accreditation of ITS Evaluation and Testing Facilities (CAN-P-1591) A Framework for Commercial ITS Evaluation and Testing CC Based Product (Phase I) and System (Phase II) Evaluations and Certifications PKI Certificate Policy Approvals?

November 8, 1999CACR Briefing72 CSE as the Certification Body approve prospective CCEFs provide advice & guidance to the CCEFs monitor the conduct of evaluations certify conformance of evaluation results provide international liaison - the MRA

November 8, 1999CACR Briefing73 Certification - 3 Pillars Performance of Evaluator Activities –Independently perform & compare Observation of Evaluator Activities –First hand observe Evaluator Activities Examination of Evaluation deliverables –Approval of final results (e.g. ETR, PCR)

November 8, 1999CACR Briefing74 The Big Picture

November 8, 1999CACR Briefing75 Summary IT Products Evaluated by a Trusted & Qualified 3rd Party are of Value. The CC is the New World Standard ( ISO ) The CCS and the CCEF’s are here today to help you acquire Security and Assurance.

November 8, 1999CACR Briefing76 Points of Contact / Info CSE & CCS: SCC: EWA: –has evaluated at EAL1 LGS/Domus: –is evaluating CGI: –has evaluated at EAL1

November 8, 1999CACR Briefing77 Links Common Criteria Support Environment –ccse.cesg.gov.uk/ Protection Profiles - WEB site – –csrc.nist.gov/cc/pp/pplist.htm – CC Resource WEB sites – –ftp://ftp.cse.dnd.ca/pub/criteria –

November 8, 1999CACR Briefing78 CSE Approved CCEFs  CGI Information Systems and Management Consultants Inc. POC: Mr Andrew Pridham Tel: (613)  DOMUS ITSL, a division of LGS Group Inc. POC: Mr Bill Dziadyk Tel: (613)  EWA - Canada Ltd, POC: Mr Paul Zatychec Tel: (613) Ex

November 8, 1999CACR Briefing79 Questions?