CMSC : Common Criteria for Computer/IT Systems

Slides:



Advertisements
Similar presentations
Security Requirements
Advertisements

University of Tulsa - Center for Information Security Common Criteria Dawn Schulte Leigh Anne Winters.
Common Criteria Evaluation and Validation Scheme Syed Naqvi XtreemOS Training Day.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 5.2: Evaluation of Secure Information Systems.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Software Quality Assurance Plan
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-1 Chapter 18: Evaluating Systems Goals Trusted Computer System Evaluation.
CS526Topic 22: TCSEC and Common Criteria 1 Information Security CS 526 Topic 22: TCSEC and Common Criteria.
Information Security of Embedded Systems : Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Common Criteria Richard Newman. What is the Common Criteria Cooperative effort among Canada, France, Germany, the Netherlands, UK, USA (NSA, NIST) Defines.
Effective Design of Trusted Information Systems Luděk Novák,
The Common Criteria for Information Technology Security Evaluation
IT Security Evaluation By Sandeep Joshi
1 norshahnizakamalbashah CEM v3.1: Chapter 10 Security Target Evaluation.
Computer Security: Principles and Practice Chapter 10 – Trusted Computing and Multilevel Security.
The Common Criteria Cs5493(7493). CC: Background The need for independently evaluated IT security products and systems led to the TCSEC Rainbow series.
Standards In The Evaluation Of IT Security Steve Randall & Scott Cadzow TC-MTS# October 2004 Sophia Antipolis 39TD025.
An Overview of Common Criteria Protection Profiles María M. Larrondo Petrie, PhD March 26, 2004.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
October 3, Partnerships for VoIP Security VoIP Protection Profiles David Smith Co-Chair, DoD VoIP Information Assurance Working Group NSA Information.
, Name, Folie 1 IT Audit Methodologies.
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security.
Security Controls – What Works
8 November Common Criteria Protection Profiles and the NSA Strategy for Their Use Within the U.S. Department of Defense Louis.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
CSSE 375 Software Construction and Evolution: Configuration Management
Fraud Prevention and Risk Management
Comparison between Family of PPs and PP with Packages Brian Smithson and Ron Nevo.
1 A Common-Criteria Based Approach for COTS Component Selection Wes J. Lloyd Colorado State University Young Researchers Workshop (YRW) 2004.
Gurpreet Dhillon Virginia Commonwealth University
Assurance Continuity: What and How? Nithya Rachamadugu September 25, 2007.
SEC835 Database and Web application security Information Security Architecture.
1 Autumn 2008 TM8104 IT Security Evaluation Guide on the production of Protection Profiles Karin Sallhammar Q2S/NTNU 29/11/2003 Reference: ISO/IEC TR
Practical IS security design in accordance with Common Criteria Security and Protection of Information 2005 František VOSEJPKA S.ICZ a.s. June 5, 2005.
A Security Business Case for the Common Criteria Marty Ferris Ferris & Associates, Inc
Information Systems Security Computer System Life Cycle Security.
Evaluating Systems Information Assurance Fall 2010.
1 A Disciplined Security Specification for a High- Assurance Grid by Ning Zhu, Jussipekka Leiwo, and Stephen John Turner Parallel Computing Centre Distributed.
The Security Analysis Process University of Sunderland CSEM02 Harry R. Erwin, PhD.
Software Configuration Management (SCM)
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
Background. History TCSEC Issues non-standard inflexible not scalable.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Engineering Essential Characteristics Security Engineering Process Overview.
Common Criteria V3 Overview Presented to P2600 October Brian Smithson.
TM8104 IT Security EvaluationAutumn CC – Common Criteria (for IT Security Evaluation) The CC permits comparability between the results of independent.
Proposed Privacy Taxonomy for IOT Scott Shorter, Electrosoft, These slides are based on work contributed to the IDESG Use Case AHG in January.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Trusted Operating Systems
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
CSCE 727 Awareness and Training Secure System Development and Monitoring.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
The Common Criteria for Information Technology Security Evaluation
Ch.18 Evaluating Systems - Part 2 -
Partnerships for VoIP Security VoIP Protection Profiles
2006 Annual Research Review & Executive Forum
HIGHLIGHTING THE KEY CHANGES
Chapter 19: Building Systems with Assurance
Presentation transcript:

CMSC 426-626: Common Criteria for Computer/IT Systems Prof. Krishna Sivalingam Oct 23, 2006

Originally released in 1998 Common Criteria Commoncriteria.org Commoncriteriaportal.org Lists CC v3.1 (and older versions) Originally released in 1998 An International Standards Organisation (ISO) standard for security evaluation of software products IT product vendors use the CC as a benchmark for product security

NIAP National Information Assurance Partnership (NIAP) is a joint venture between NIST (nist.gov) and NSA (nsa.gov) Goal: “increase the level of consumer trust in information systems and networks” from http://www.nsa.gov/ia/industry/niap.cfm One service: Common Criteria Evaluation and Validation Scheme (CCEVS) that “focuses on meeting the security testing, evaluation, and assessment needs of both IT products and consumers.”

Security concepts and relationships From CC Part 1 (of v3.1)

Evaluation concepts & relationships From CC Part 1 (of v3.1)

The PP describes the product’s protection needs CC Process A user creates Packages or “Protection Profile” for a desired security product The PP describes the product’s protection needs Written by the user (e.g. government, banking industry, vendor’s marketing group, product inventor) Describes security aspects needed in an IT product

CC Protection profile (in Combined Federal Criteria) Rationale Protection policy and regulations Information protection philosophy Expected threats Environmental assumptions Intended Use Functionality Security Features Security Services Available security mechanisms Assurance Profile-specific assurances Profile-independent assurances Dependencies Internal External

CC Protection Profile Introduction Product/System Family Description: Generic description of family of products. Product/System Family Security Environment – intended use, environment of use, threats to assets, organizational security policies, etc. Security Objectives IT Security Requirements – Functional and Assurance Rationale

What happens with PP? A vendor develops an IT product based on the requirements set in the PP Vendor then prepares a “security target” document that describes the security and assurance aspects of the product. Can relate Security Target to Specs. In the Protection Profile Security Target can also be written independent of a PP and sold along with the IT product

CC Package A package is a named set of security requirements. A package is either a functional package, containing only SFRs (Security Functional Requirements) or an assurance package, containing only SARs (Security Assurace Requirements) But, not both. Examples of Assurance packages are the EALs (Evaluation Assurance Level), than run from EAL1 (lowest) through EAL7 (highest) EAL1 through EAL4 are most common

Security Target, contd. From CC, part I: “The Security Target begins with describing the assets and the threats to those assets. The Security Target then describes the countermeasures (in the form of Security Objectives) and demonstrates that these countermeasures are sufficient to counter these threats: if the countermeasures do what they claim to do, the threats are countered.”

Security Target (per Comb Fed Crit.) Rationale Implementation fundamentals Information protection philosophy Countered Threats Environmental Assumptions Intended Use Functionality Security features Security services Security mechanisms selected Assurance Target-specific assurances Target-independent assurances Dependencies Internal External

Security Target Introduction: description of the target of evaluation (TOE) at three different abstraction levels Conformance: If the ST is conformant with any PPs or packages Security problem definition: Threats, Assumptions, etc. Security objectives: Extended components definition: describes components not described in Part 2 or Part 3 of CC document Security requirements: Present security objectives in standard requirements format TOE Summary specifications: How functional requirements are implemented and met and how assurance reqts. Are met Rationale: Sec Objectives Rationale, Sec. Reqts. Rationale, TOE Summary Spec. Rationale, etc. Before and during evaluation, ST states “what is to be evaluated?” After evaluation, ST states “what was evaluated?”

From CC Part 1 (of v3.1)

Classes in Common Criteria Functionality (11) Security audit (FAU) Communications (FCO) Crypto support (FCS) User data protection (FDP) Identification & Authentication (FIA) Sec. Mgmt (FMT) Privacy (FPR) Protection of trusted security functions (FPT) Resource utilization (FRU) Trusted Path (FTP) TOE Access (FTA) Assurance (10) Configuration Management Delivery and operation Development Guidance documents Life-cycle support Testing Vulnerability Assessment Maintenance of Assurance Protection profile evaluation Security target evaluation

Classes Classes are broken down into families, which are broken down into components

Classes, contd.

Components

EAL Levels EAL1: Functionally Tested EAL2: Structurally Tested; Applicable to systems with low-moderate assurance needs, but not enough development record (e.g legacy systems) Based on High-Level Design Analysis & Sec. Fn. Analysis EAL3: Methodically Tested & Checked Use of devt. Environment controls and config. Mgt EAL4: Methodically Designed, Tested & Reviewed Includes Low-level design, complete interface description, and subset of implementation Informal model of security policy Windows 2000, XP, Red Hat Enterprise Linux (RHEL) Version 4 Update 1 AS and Red Hat Enterprise Linux (RHEL) Version 4 Update 1 WS

EAL5: Semi-formally Designed and Tested EAL Levels, contd. EAL5: Semi-formally Designed and Tested EAL6: Semi-formally Verified Design and Tested EAL7: Formally Verified Design and Tested Formal functional spec. and high-level design Implementation representation be used as testing basis Independent confirmation of developer’s test results Extremely high-risk situations and requires substantial security engineering