IT SECURITY EVALUATION ACCORDING TO HARMONIZED AND APPROVED CRITERIA

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

© Crown Copyright (2000) Module 2.2 Development Representations.
DRIVING DOD POLICY FOR COMMON CRITERIA TESTING OF IT PRODUCTS Wanda Nuckolls, Product Security Project Manager Canon U.S.A., Inc. Government Marketing.
Sony Smart Cards and International Evaluation 2 nd Common Criteria Conference London, UK July 2001 i-Card System Solutions Division Broadband Network.
Common Criteria Evaluation and Validation Scheme Syed Naqvi XtreemOS Training Day.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 5.2: Evaluation of Secure Information Systems.
4/28/20151 Computer Security Security Evaluation.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Chapter 16: Standardization and Security Criteria: Security Evaluation of Computer Products Guide to Computer Network Security.
1 Common Criteria Ravi Sandhu. 2 Common Criteria International unification CC v2.1 is ISO Flexibility Separation of Functional requirements Assurance.
Effective Design of Trusted Information Systems Luděk Novák,
The Common Criteria for Information Technology Security Evaluation
IT Security Evaluation By Sandeep Joshi
Computer Security: Principles and Practice Chapter 10 – Trusted Computing and Multilevel Security.
The Common Criteria Cs5493(7493). CC: Background The need for independently evaluated IT security products and systems led to the TCSEC Rainbow series.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 10 – Trusted Computing.
An Overview of Common Criteria Protection Profiles María M. Larrondo Petrie, PhD March 26, 2004.
German Research Center for Artificial Intelligence Protection Profile for Central Requirements for Online Voting German Research Center for Artificial.
Implementation of Electronic Signature Law Kęstutis Andrijauskas Information Society Development Committee under the Government of the Republic.
Security Models and Architecture
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security.
COEN 351: E-Commerce Security Public Key Infrastructure Assessment and Accreditation.
Stephen S. Yau CSE , Fall Evaluating Systems for Functionality and Assurance.
Chapter 3 Software process Structure Chapter 3 Software process Structure Moonzoo Kim KAIST 1.
Fraud Prevention and Risk Management
NVLAP Overview and Accreditation Process March 2006.
Gurpreet Dhillon Virginia Commonwealth University
Principles of Information System Security: Text and Cases
1 Anthony Apted/ James Arnold 26 September 2007 Has the Common Criteria Delivered?
A Security Business Case for the Common Criteria Marty Ferris Ferris & Associates, Inc
IS 2620: Developing Secure Systems Assurance and Evaluation Lecture 8 March 15, 2012.
Evaluating Systems Information Assurance Fall 2010.
ISA 562 Internet Security Theory & Practice
Common Criteria Recognition Arrangement 8 th ICCC Rome, 25 th September 2007 Report by the MC Chairman Gen. Luigi Palagiano.
Background. History TCSEC Issues non-standard inflexible not scalable.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Unix Systems security and security evaluation criteria.
You say to-mah-to, I say to-mae-to: why isn’t there a single solution to Information Security Assurance? Apostol Vassilev atsec information security &
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 13 “Trusted Computing and.
Page 1 ©1999 InfoGard Laboratories, Inc Centre for Applied Cryptographic Research workshop, Nov. 8, 1999 Third party evaluations of CA cryptographic implementations.
Chapter 18: Introduction to Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
TM8104 IT Security EvaluationAutumn CC – Common Criteria (for IT Security Evaluation) The CC permits comparability between the results of independent.
Security consulting What about the ITSEC?. security consulting What about the ITSEC? Where it came from Where it is going How it relates to CC and other.
1 Common Criteria Discussions CCSDS Security Working Group Fall 2007 Meeting 3-5 October 2007 ESA/ESOC, Darmstadt Germany (Hotel am Bruchsee, Heppenheim)
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Chapter 8: Principles of Security Models, Design, and Capabilities
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
Information Security tools for records managers Frank Rankin.
Technology Services – National Institute of Standards and Technology Conformity Assessment ANSI-HSSP Workshop Emergency Communications December 2, 2004.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
Harmonised use of accreditation for assessing the competence of various Conformity Assessment Bodies Dr Andreas Steinhorst, EA ERA workshop 13 April 2016,
2002 ANSI Annual Conference The Value of Accreditation Robert H. King Jr. President and CEO, RAB.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
The Common Criteria for Information Technology Security Evaluation
TeleTrusT Initiatives for PKI Solutions
Ch.18 Evaluating Systems - Part 2 -
Partnerships for VoIP Security VoIP Protection Profiles
Testing and Certification according to ISO and ISO 17065
Official levels of Computer Security
8ICCC Update for IEEE P2600 Brian Smithson Ricoh Americas Corporation
EU R&D in cybersecurity's certification
Common Criteria Ravi Sandhu.
Common Criteria Ravi Sandhu.
The Grand Goal: One Evaluation Per Planet
CHARIOT-VESSEDIA Workshop 9 May 2019, Dublin, Ireland
Presentation transcript:

IT SECURITY EVALUATION ACCORDING TO HARMONIZED AND APPROVED CRITERIA Roland Mueller TÜViT, Inc. 8716 North Mopac Austin, TX 78731 phone: (512) 795-0494 email: roland@tuvit.net URL: http:\\www.tuvit.net

Presentation Plan History of Harmonization Evaluations within QM Scheme Characteristics of an Evaluation Process Main Goal of an Evaluation Types of Evaluations Scaled Security Basic Approach Evaluated IT Components / Systems

HISTORY OF HARMONIZATION Orange Book (TCSEC) 1985 Federal Criteria Draft 1993 Canadian Criteria (CTCPEC) 1993 ITSEC 1991 Common Criteria 1998 ISO/IEC 15408 UK Confidence Levels 1989 German Criteria 1989 French Criteria 1989

EVALUATIONS WITHIN THE QM-SCHEME TGA Certificate Accreditation Body (EN 45002/3) Evaluation Body (EN 45001) Certification Body (EN 45011) Manufacturer/Product ( ISO 9001)

CHARACTERISTICS OF AN EVALUATION PROCESS Impartiality Repeatability Objectivity Reproducibility

MAIN GOAL OF AN EVALUATION CONFIDENCE in implemented Security Measures

TYPES OF EVALUATIONS collaterally afterwards Re-Evaluation

SCALED SECURITY Security Functionality technical security measures designed with a specific security purpose Assurance Level confidence in the correctness of the security functionality Effectiveness Level confidence in the robustness of the security functionality

SECURITY FUNCTIONALITY (I): DEFINITION Confidentiality Integrity Availability

SECURITY FUNCTIONALITY (II): PRESENTATION Generic Headings I&A Access Control Accountability ... Functional Requirements (Part II) modular hierarchical dependencies ITSEC CC or manufacturer requirements

ASSURANCE LEVEL E6 EAL7 E5 EAL6 ITSEC E4 EAL5 E3 EAL4 CC E2 EAL3 formally verified design and tested E2 EAL3 semi-formally verified design and tested E1 EAL2 semi-formally designed and tested methodically designed, tested and reviewed methodically tested and checked EAL1 structurally tested functionally tested

EFFECTIVENESS LEVEL protection against casual breach basic protection against straightforward or intentional breach medium protection against deliberately planned or organized breach high

Security Target (Protection Profile) BASIC APPROACH Security Target (Protection Profile) Installation Tests Configuration Specification Start Up Design Security Analyses Implementation Operation Development Environment Operational Environment

EVALUATED IT COMPONENTS / SYSTEMS Smart card Operating Systems (E3 - E4, high) PC Security Products (E1, basic - E3, high) Smart card Readers (E1 - E2, basic) Personalization Systems (E2, medium) Security Modules (E3, high) Security Controller (Chip-Hardware) (E4, high) Technical Components According to SigG (E2, high / E4, high) ... „TÜViT History“