9 th International Common Criteria Conference Report to IEEE P2600 WG Brian Smithson Ricoh Americas Corporation 10/24/2008.

Slides:



Advertisements
Similar presentations
© 2006 itSMF USA. All rights reserved. ITIL v3 – Familiar Ground, New Territory David Cannon ITSM Practice Principal - HP.
Advertisements

 The Citrix Application Firewall prevents security breaches, data loss, and possible unauthorized modifications to Web sites that access sensitive business.
The 7 Year Itch - Time To Commit Or Time To Move On? Shaun Lee Security Evaluations Manager, Global Product Security.
Chapter 2 The Software Process
IT Security Evaluation By Sandeep Joshi
The Common Criteria Cs5493(7493). CC: Background The need for independently evaluated IT security products and systems led to the TCSEC Rainbow series.
©2006 OLC 1 Process Management: The Foundation for Achieving Organizational Excellence Process Management Implementation Worldwide.
October 3, Partnerships for VoIP Security VoIP Protection Profiles David Smith Co-Chair, DoD VoIP Information Assurance Working Group NSA Information.
Bangalore, India,17-18 December 2012 Sustainable Broadband Communications: International Perspective – Common Criteria David Martin, Head of International.
Copyright © 2009 PMI RiskSIGNovember 5-6, 2009 “Project Risk Management – An International Perspective” RiskSIG - Advancing the State of the Art A collaboration.
1 Purchasing and Procurement Processes Module Four Revision Date: 2/06/2015.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 27 Slide 1 Quality Management 1.
SQA Architecture Software Quality.
Organizational Project Management Maturity: Roadmap to Success
Fraud Prevention and Risk Management
© 1998 Concept Five Technologies Enterprise Application Integration Capability Maturity Model.
Release & Deployment ITIL Version 3
ISO 9001:2015 Revision overview - General users
What is Business Analysis Planning & Monitoring?
Next Generation Trnsport Trnsport Users Group Conference Field Management TAG November 7, 2005.
Process: A Generic View n A software process  is a roadmap to building high quality software products.  provides a framework for managing activities.
Assurance Continuity: What and How? Nithya Rachamadugu September 25, 2007.
Smartcard Evaluation TM8104 – IT Security Evaluation Linda Ariani Gunawan.
SQA Architecture Software Quality By: MSMZ.
PMP® Exam Preparation Course
Software Development Life Cycle Decisions Project Management Disciplines Stacey Shearn September 8, 2005.
1 Anthony Apted/ James Arnold 26 September 2007 Has the Common Criteria Delivered?
Chapter 3 – Agile Software Development 1Chapter 3 Agile software development.
Test Organization and Management
Capability Maturity Model Part One - Overview. History Effort started by SEI and MITRE Corporation  assess capability of DoD contractors First.
-Nikhil Bhatia 28 th October What is RUP? Central Elements of RUP Project Lifecycle Phases Six Engineering Disciplines Three Supporting Disciplines.
Updates on Korean Scheme IT Security Certification Center, National Intelligence Service The 8 th ICCC in Rome, Italy.
Software Quality Assurance Activities
Commonwealth of Massachusetts Statewide Strategic IT Consolidation (ITC) Initiative ANF IT Consolidation Website Publishing / IA Working Group Kickoff.
Capability Cliff Notes Series PHEP Capability 3—Emergency Operations Coordination What Is It And How Will We Measure It? For sound, click on the megaphone.
Introduction to Software Engineering LECTURE 2 By Umm-e-Laila 1Compiled by: Umm-e-Laila.
Deakin Richard Tan Head, Information Technology Services Division DEAKIN UNIVERSITY 14 th October 2003.
Part 1-Intro; Part 2- Req; Part 3- Design  Chapter 20 Why evaluate the usability of user interface designs?  Chapter 21 Deciding on what you need to.
Capability Maturity Models Software Engineering Institute (supported by DoD) The problems of software development are mainly caused by poor process management.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
EMI INFSO-RI SA2 - Quality Assurance Alberto Aimar (CERN) SA2 Leader EMI First EC Review 22 June 2011, Brussels.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
This chapter is extracted from Sommerville’s slides. Text book chapter
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
SacProNet An Overview of Project Management Techniques.
University of Sunderland CIFM03Lecture 2 1 Quality Management of IT CIFM03 Lecture 2.
Quality Concepts within CMM and PMI G.C.Reddy
Standards Certification Education & Training Publishing Conferences & Exhibits 1Copyright © 2006 ISA ISA-SP99: Security for Industrial Automation and Control.
Bangalore, India,17-18 December 2012 Sustainable Broadband Communications: International Perspective – Common Criteria David Martin, Head of International.
COMP3615,5615 Capstone Projects Week Overview of the semester Website tour – XP and roles – Assessment – note especially the individual mark operating.
Common Criteria V3 Overview Presented to P2600 October Brian Smithson.
Introduction to the Continual Service Improvement Toolkit Welcome.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
CSCE 548 Secure Software Development Security Operations.
Copyright (C) 2007, Canon Inc. All rights reserved. P. 0 A Study on the Cryptographic Module Validation in the CC Evaluation from Vendors' point of view.
Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 Click to edit Master title style What is Business Analysis Body of Knowledge?
Data Archive Ingest WG Report to MOIMS Plenary May 14, 2004.
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
U.S. Department of Agriculture eGovernment Program Smart Choice Pre-Select Phase Transition September 2002.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
Grid as a Service. Agenda Targets Overview and awareness of the obtained material which determines the needs for defining Grid as a service and suggest.
Who doesn’t need to be WISE? Bringing into reality global information security collaboration Alessandra Scicchitano GÉANT - Project Development Officer.
Security Development Lifecycle (SDL) Overview
8ICCC Update for IEEE P2600 Brian Smithson Ricoh Americas Corporation
9th International Common Criteria Conference Report to IEEE P2600 WG
Chapter 13 Quality Management
Presentation transcript:

9 th International Common Criteria Conference Report to IEEE P2600 WG Brian Smithson Ricoh Americas Corporation 10/24/2008

Overview  Hosted by the Korean Certification Body, part of the IT Security Certification Center of the National Intelligence Service  Well organized and produced, very hospitable, included an island tour and some entertainment  Conference agenda and other info is here:  Slides available on request  Next ICCC will be in Norway

CCDB activities for CCv3.1  Guidance document for transitioning from 2.x to 3.1 will be published soon  Transition dates for assurance continuity will be realigned so as to be consistent with the transition dates for version 3.1 in general  Protection Profiles may be evaluated in the same project and at the same time as their first use in a Security Target (!).  Some initial guidance on developer evidence production will be published in about six weeks (from September 23), and more guidance later.  ISO has published CC version 3.1 parts 2 and 3; part 1 will be published later. There are some minor changes to version 3.1 that will be published

CCDB activities for CCv4  The CCDB has been considering what vendors need: An assurance process that gives credit to vendors’ other assurance efforts An efficient process A process that can lead to assurance improvement for vendors Results that are widely usable and recognized  They are also considering what customers need: Assurance in operation Meaningful information for people who build and operate certified systems and for people who are responsible for the data on those systems Evaluation of real products as they are delivered and used in the marketplace, not just artificially restricted configurations Some qualitative product assurance comparisons

CCDB activities for CCv4 (2)  Among the key ideas they are trying to achieve: More direct interaction between developers and assessment teams Evaluation of existing documentation (and code), requiring few documents that are CC-specific Evaluation of product development and update processes so that ongoing assurance can be predicted Tools to assist evaluators in collecting evidence and building evidence chains, and for producing evaluation reports More detailed reports for several different user audiences

CCDB activities for CCv4 (3)  To implement some of these ideas, they are forming several workgroups: Evidence-based approach (led by the US scheme) Predictive assurance (led by DE) Tools (led by ES, also UK)) Skills and interactions (led by UK, also US) Meaningful reports (led by CA) Lower assurance (EAL1~2) evaluations (led by UK)  Individual presentations were given for each of the WGs

CCDB activities for CCv4 (4)  The eventual aim of these activities: Evaluations to be performed by a combination of assurance experts and subject matter experts Creation of a body of knowledge (akin to “case law”) Interaction among evaluators, internationally (but with protection of intellectual property) Evaluations that examine evidence that is produced as a normal function of product development Evaluation reports that address the various needs of different user audiences (such as procurement, system integrators, IT staff, and data owners)  Rough schedule for these activities: Workgroups will use electronic methods (Wikis) more extensively, but will have a face-to-face meeting in the US around the beginning of 2Q2009. Finalizing changes for CC version 4 to take place sometime around 3Q~4Q2010.

Some other interesting presentations…  Dealing with the expanding membership of CCRA If mutual recognition stops at EAL4, and a product is validated at EAL5 (or higher), why not mutually recognize that product at EAL4? In CCv4, compromise on national differences so CCRA can be more united in the future  Integrating CC and Capability Maturity Model Integration (CMMI)  Portfolio approaches to managing CC and FIPS-140  Evaluate Process Assurance (as is done in manufacturing) instead of Product Assurance  Better approaches to security domain separation are needed for components of systems that have inherently different EAL needs  Integration of architectural requirements into the CC From our friends at atsec  Introduce usability into CC to better reflect overall assurance

Some other interesting presentations… (2)  Along with TOE assurance, provide some measure of ST assurance to represent the quality of threats, assumptions, OSPs, …  Expand process assessment in the CC, matching it with product objectives, and increase the scope of certification to include similar products developed under the same process  Apply code analysis tools as part of CC evaluation CC is good for finding vulnerabilities in design and TOE mecahnisms Code analysis tools are good for finding vulnerabilities in implementation and operation  Use existing metrics and tools for measuring code complexity  Apply failure mode and effect analysis (FMEA) for more structured evaluation  Several proposals about tools to automate evaluation process

CCVF meetings  Pre-conference, with CCDB David Martin (UK scheme) reviewed the CCDB WGs Question about considering non-government needs:  UK doesn’t, AU does, DE is interested in a broader approach at least for lower assurance levels CCDB progress seems to have been somewhat minimal since 8ICCC in Rome  Post-conference, CCVF only Decided to have liaisons with each CCDB WG  Track and report progress  Collect CCVF opinions/consensus and feed back to CCDB  Try to help CCDB with their direction Getting serious about creating a CCVF web site  Promoting awareness and recruiting new members  Collaborating and communicating