Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity...

21
Security Product Evaluations Common Criteria

Transcript of Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity...

Page 1: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

Security Product Evaluations

Common Criteria

Page 2: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

NIAP Website

www.niap.nist.gov

Page 3: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

CC Documents

Page 4: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

Historical Perspective

EuropeanNational

& RegionalInitiatives

‘89-’93

CanadianInitiatives

‘89-’93

CommonCriteriaProject

‘93--

ISOFDIS 15408

‘99

USTCSEC

‘83, ‘85

CTCPEC3

‘93

FederalCriteria

‘92

CommonCriteria

1.0

‘96

CommonCriteria

2.0

‘98

NIST’sMSFR

‘90

ITSEC1.2

‘91ISO

Initiatives‘92--

Page 5: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

Security Product EvaluationsNational Information Assurance PartnershipNational Information Assurance PartnershipNational Information Assurance Partnership

NIAP Evaluates and Validates Security Solutions

Using the Common Criteria

Common Criteria Evaluation and Validation Scheme The program developed by NIST and NSA as part of the National Information Assurance Partnership (NIAP) establishing an organizational and technical framework to evaluate the trustworthiness of IT Products and protection profiles.

Page 6: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

US Program Overview

NIAP AccreditsPrivate

Testing Labs

NIAP IssuesCC Certificates

to Products

Labs do CCEvaluations of

IT ProductsNIAP Reviews

& ValidatesLab Results

MRA NationsRecognize

Product Cert’s

Page 7: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

• Booz Allen Hamilton Common Criteria Testing Laboratory

• Cable and Wireless Common Criteria Testing Laboratory

• COACT Inc. CAFE Laboratory

• Computer Sciences Corporation

• Critrian Independent Labs

• CygnaCom Solutions Security Evaluation Laboratory

• InfoGard Laboratories Inc.

• SAIC Common Criteria Testing Laboratory

Common Criteria Testing Laboratory Within the context of the Common Criteria Evaluation and Validation Scheme (CCEVS), an IT security evaluation facility, accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) and aproved by the NIAP Validation Body to conduct Common Critieria-based evaluations.

Page 8: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

CC Evaluations

Evaluation The assessment of an IT product against the Common Criteria using the Common Evaluation Methodology to determine whether or not the claims made are justified; or the assessment of a protection profile against the Common Criteria using the Common Evaluation Methodology to determine if the profile is complete, consistent, technically sound and hence suitable for use as a statement of requirements for one or more TOEs that may be evaluated.

Page 9: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

EAL Equivalence

• EAL 1 =

• EAL 2 & 3 = Basic Assurance

• EAL 4 = Medium Assurance

• EAL 5, 6 & 7 = High Assurance

Page 10: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

EALS

*TCSEC

C1C2B1B2B3A1

EALEAL1EAL2EAL3EAL4EAL5EAL6EAL7

NameFunctionally TestedStructurally TestedMethodically Tested & CheckedMethodically Designed, Tested & ReviewedSemiformally Designed & TestedSemiformally Verified Design & TestedFormally Verified Design & Tested

*TCSEC = “Trusted Computer Security Evaluation Criteria” -- ”Orange Book”

Evaluation Assurance LevelsApproximate Backward Compatibility Comparison

Page 11: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

Typical CC Evaluations

• EAL 2 6 to 9 Months $200 K $400 K

• EAL 3 9 to 12 Months $300 $500 K

• EAL 4 1 Year + $500K +

Page 12: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

STs PPsSecurity Target A specification of the security required (both functionality and assurance) in a Target of Evaluation (TOE), used as a baseline for evaluation under the CC. The security target specifies the security objectives, the threats to those objectives, and any specific security mechanisms that will be employed.

Protection Profile An implementation independent set of security requirements for a category of IT products which meet specific consumer needs.

Page 13: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

Security Target Contents• Introduction

• TOE Description

• Security Environment Assumptions Threats Organizational Security Policies

• Security Objectives

• Security Requirements Functional Req’ts Assurance Req’ts

• TOE Summary Specification

• PP Claims

• Rationale

Target of Evaluation An IT product or group of IT products configured as an IT System and associated documentation that is the subject of a security evaluation under the CC.

Also, a protection profile that is the subject of a security evaluation under the CC.

Page 14: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

Target Of Evaluation• Target of Evaluation (TOE)

An IT product or system that is the subject of an evaluation.

• TOE Security Policy (TSP)

The rules that regulate how assets are managed, protected

and distributed within a TOE.

• TOE Security Functions (TSF)

All parts of the TOE that must be relied upon for the

correct enforcement of the TSP.

Page 15: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

CC Terminology

Acronym Overload

Page 16: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

Classes of Security Functional Requirements

ClassClassFAUFCOFCSFDPFIAFMTFPRFPTFRUFTAFTP

NameNameAuditCommunicationsCryptographic SupportUser Data ProtectionIdentification & AuthenticationSecurity ManagementPrivacyProtection of TOE Security FunctionsResource UtilizationTOE AccessTrusted Path / Channels

Page 17: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

Classes of Security Assurance Requirements

ClassClassACMADOADVAGDALCATEAVAAPEASEAMA

NameNameConfiguration ManagementDelivery & OperationDevelopmentGuidance DocumentsLife Cycle SupportTestsVulnerability AssessmentProtection Profile EvaluationSecurity Target EvaluationMaintenance of Assurance

Page 18: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

Protection Profile Contents

• Introduction

• TOE Description

• Security Environment Assumptions Threats Organizational Security Policies

• Security Objectives

• Security Requirements

• Functional Req’ts

• Assurance Req’ts

• Rationale

Page 19: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

Specification of the Attacker

• Corporate Security

• HIPPA / Gramm-Leach-Bliley

• Department of Defense

• Department of Energy

The Security Target Addresses the Sophistication of the Attacker

Protection Profile for Which Consumer ???

Page 20: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

Using CC

• IT Product ConsumersLook for PPs matching your security requirements -- use in procurement

specifications

• Consumer Consortia (Users Groups)Use CC to build PPs expressing members’ needsWork with Product Developers to build matching products

• Product DevelopersUse CC to specify product security capabilities via Security Targets

• Product Evaluators/ValidatorsUse CC-compliant Protection Profiles & Security Targets as yardstick for

measuring product compliance

Page 21: Security Product Evaluations - IEEEgrouper.ieee.org/groups/2600/presentations/IEEECC.pdfSecurity Target A specification of the security required (both functionality and assurance)

Questions?