National Information Assurance Partnership Paul Mansfield January 2013

Slides:



Advertisements
Similar presentations
1 Making the Desktop Dynamic. 2 What does RES do? »IT as a Service & Automation »Context Aware Security »Dynamic Desktop Delivery »Follow-me Secure Data.
Advertisements

Georgia Department of Community Health
September 2013 ASTM Officers Training Workshop September 2013 ASTM Officers Training Workshop Membership & Roster Maintenance September 2013 ASTM Officers.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
1Copyright © 2013 The Printer Working Group. All rights reserved. MFP Technical Community Vendor F2F 1 Agenda Notes from ICCC Recap of the F2F meeting.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
The National Standards and Quality System Jean-Louis Racine The World Bank Cambridge, England April 19, 2007 Knowledge Economy Forum VI Technology Acquisition.
1 2 nd Shanghai, 19/02/06 Architecture for Next Generation Grids Kostas Tserpes, NTUA Shanghai, 20th of February 2006.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
ZMQS ZMQS
1 Welcome to ASTM International Association of State Correctional Administrators Association of State Correctional Administrators.
WP3. Evaluation, Monitoring and Quality Plan Dr. Luis Sobrado 27 th May 2011.
Mobile Devices in the DoD
A Roadmap to Successful Implementation Management Plans.
Effective Contract Management Planning
Accelerate the on-boarding of Service Providers in Trusted Infrasturcture Virginia Chan, Vice President Hong Kong Mar 19 th, 2014.
1. 2 August Recommendation 9.1 of the Strategic Information Technology Advisory Committee (SITAC) report initiated the effort to create an Administrative.
Securing Emerging Mobile Technology JOHN G. LEVINE PH.D. D/CHIEF ARCHITECTURE GROUP 13 SEP
Khammar Mrabit Director Office of Nuclear Security
January 10, 2008www.infosecurity.ca.gov/1 Role, Responsibility and Authority of New Office Presented by Colleen Pedroza, State Chief Information Security.
© The Treasury 1 Better Business Cases “Investing for change” Overview.
SAI Performance Measurement Framework
Environmental Management Systems Refresher
Environment Launch & Student Project Presentation Environment Policy Environment Action Plan 2010 Faculty of the Built Environment Designing a Student.
DRIVING DOD POLICY FOR COMMON CRITERIA TESTING OF IT PRODUCTS Wanda Nuckolls, Product Security Project Manager Canon U.S.A., Inc. Government Marketing.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
MAMA - Network Project WP 7. MAMA-AWARE Coordinated by UNEP/MAP (MB 11) – MED POL Unit.
Sony Smart Cards and International Evaluation 2 nd Common Criteria Conference London, UK July 2001 i-Card System Solutions Division Broadband Network.
University of Tulsa - Center for Information Security Common Criteria Dawn Schulte Leigh Anne Winters.
FPS HEALTH, FOOD CHAIN SAFETY AND ENVIRONMENT 1 Joint Action on Health Workforce Planning and Forecasting Zuzana Matlonova Brussels – April 11th, 2013.
Addition 1’s to 20.
25 seconds left…...
Week 1.
We will resume in: 25 Minutes.
1 Mitacs Globalink and International Research Rob Annan Interim CEO and Scientific Director October 2014.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
Presenter: Jennifer LoGalbo RHP 8 Monthly Learning Collaborative Call February 10,
CTS Strategic Roadmap Walkthrough, v1.2 Dan Mercer.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Common Criteria Richard Newman. What is the Common Criteria Cooperative effort among Canada, France, Germany, the Netherlands, UK, USA (NSA, NIST) Defines.
IT Security Evaluation By Sandeep Joshi
The Common Criteria Cs5493(7493). CC: Background The need for independently evaluated IT security products and systems led to the TCSEC Rainbow series.
German Research Center for Artificial Intelligence Protection Profile for Central Requirements for Online Voting German Research Center for Artificial.
October 3, Partnerships for VoIP Security VoIP Protection Profiles David Smith Co-Chair, DoD VoIP Information Assurance Working Group NSA Information.
Bangalore, India,17-18 December 2012 Sustainable Broadband Communications: International Perspective – Common Criteria David Martin, Head of International.
Common Criteria National Information Assurance Partnership Evaluation of Mobile Technology Janine Pedersen 1.
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
1 Copyright © 2014 M. E. Kabay. All rights reserved. Standards for Security Products CSH5 Chapter 51 “Security Standards for Products” Paul J. Brusil and.
Melanie Volkamer (Research Manager) University of Passau, Innstraße 43, Passau, Germany, Tel: / Webpage:
Comparison between Family of PPs and PP with Packages Brian Smithson and Ron Nevo.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Assurance Continuity: What and How? Nithya Rachamadugu September 25, 2007.
1 Anthony Apted/ James Arnold 26 September 2007 Has the Common Criteria Delivered?
A Security Business Case for the Common Criteria Marty Ferris Ferris & Associates, Inc
Updates on Korean Scheme IT Security Certification Center, National Intelligence Service The 8 th ICCC in Rome, Italy.
Conformity Assessment and Accreditation Mike Peet Chief Executive Officer South African National Accreditation System.
Common Criteria Recognition Arrangement 8 th ICCC Rome, 25 th September 2007 Report by the MC Chairman Gen. Luigi Palagiano.
U.S. Common Criteria Evaluation & Validation Scheme (CCEVS) Update 25 September 2007 Audrey M. Dale Director, NIAP CCEVS.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Bangalore, India,17-18 December 2012 Sustainable Broadband Communications: International Perspective – Common Criteria David Martin, Head of International.
CMSC : Common Criteria for Computer/IT Systems
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
Fax: (703) DoD BIOMETRICS PROGRAM DoD Biometrics Management Office Phone: (703)
Partnerships for VoIP Security VoIP Protection Profiles
8ICCC Update for IEEE P2600 Brian Smithson Ricoh Americas Corporation
Presentation transcript:

National Information Assurance Partnership Paul Mansfield January 2013 An Evolution

Common Criteria Recognition Arrangement (CCRA) ® Certificate Consumers Finland Greece Israel Austria Turkey Hungary Czech Republic Singapore India Denmark Pakistan Malaysia US Canada UK Germany France Australia Japan Netherlands Norway South Korea New Zealand Spain Sweden Italy Certificate Producers

2012 International Common Criteria Conference Common Criteria Recognition Arrangement (CCRA) Management Committee (CCMC) Agreement Vision Statement Develop Collaborative Protection Profiles (cPP) International Technical Communities (iTC) CC Schemes Labs Stakeholders Vendors CCMC Chair Directed CC Executive Secretariat and CC Directors Board Update CCRA Terms of Reference & CCRA Documents Transition Plan

2012 ICCC Vision Statement Key Points Raise General Security Level Standardization CCRA Mutual Recognition – cPP iTCs Define cPPs cPPs Instead of Individual STs STs w/o cPP – Limited to EAL2 2 Nations Disagreement Evaluations above cPP National Requirements & Special Arrangements CCRA MR @ cPP Only cPPs Will Address Vulnerability Analysis Transparent and Repeatable https://www.commoncriteriaportal.org/

Develop, promulgate and manage foundational security requirements NIAP Functions: Prioritize PP Development Author and promulgate PPs Conduct risk analysis Develop profiles with a risk-based mindset Influence international standards (e.g., ISO) NIAP leads technical communities to develop, promulgate and manage foundational security requirements that enable the acquisition of validated products to continually improve network defense for America and its Allies.

GOTS vs. COTS Government Devices (GOTS) Commercial Devices (COTS) Traditionally, the US government has used government designed and certified devices to protect its most sensitive data. Government Devices (GOTS) Purpose-built for security Strict design and implementation criteria Long, exhaustive security evaluation Commercial Devices (COTS) Provide a balance of security and features Quick to market, flexible

Committee on National Security Systems Policy (CNSSP) 11 COTS comply with NIAP process Layered COTS preferred over GOTS GOTS evaluated by NSA Evolution Move away from Evaluation Assurance Level (EAL) Comply with Protection Profile (PP) PPs developed by Technical Communities CCRA Collaborative PPs (cPP)

Benefits of New Evaluation Process One Evaluation Level Achievable, Repeatable, Testable One PP per Technology Internationally accepted Objective Assurance Requirements Extended Package (EP) if required Technical Communities Industry/Government Partners, shared expertise, contribute to PP development

What’s Not Working? “Cookie cutter approach” to technology type being evaluated Subjective, inconsistent standards across vendors or countries Higher EAL doesn’t equal higher security Process is too lengthy Not repeatable across labs, schemes/nations No enforcement of security requirement testing EALs are not related to the technology type being evaluated, such that a USB and Firewall are evaluated against the same criteria. Evaluations at higher levels of assurance provide a false sense of confidence. Common Evaluation Methodology (CEM) does not recognize technologies as different – rather, the current model utilizes a cookie cutter approach. Since the EALs are broad, vendors can choose the standards they want the products to be evaluated against an EAL. Each nation creates their own testing regimens. There has not been sufficient cooperation among all stakeholders to reach agreement in requirements. In many nations conforming to CC evaluations is optional. A higher EAL level meant that the product adhered to a more stringent set of quality assurance requirements during evaluation, but the security features were not tested. A higher EAL level does not mean that one product is more secure than another, so that in reality, an EAL6 product may be no better than an EAL2 product. b. The CC became an opportunity to force vendors to disclose sensitive information. Evaluations for an EAL can take years to complete, which can mean that products may be out-of-date by the time an evaluation is completed. EAL evaluations are not repeatable across the labs, schemes or nations. EALs look at documentation of a security requirement being implemented but does not test the security requirement.

What is a Protection Profile? Tailored set of baseline security functional and security assurance requirements Focuses on tailored requirements and assurance activities by technology Tailored set of use cases, threats, and objectives Allows for the expansion of baseline requirements through extended packages for specialized technologies i.e. Network Device PP and Firewall EP PPs are a set of security functional requirements that have international recognition. A PP is tailored to products of a specific technology type, such as a Network Devise or IPSec for VPN Clients. It focuses on functional requirements and assurance activities by technology. PPs can have extended packages so that specific functions of a product can also be evaluated. An example of an extended package would be for a firewall. The firewall would be evaluated against a Network Devise PP and then also to a Firewall Extended Package. The requirements of PPs will be a set of technology-specific threats and core function requirements necessary to mitigate those threats to create a basic level of security for a particular technology and product.

Why Are PP’s Good (Achievable) Reduced time and costs of evaluation (Repeatable) Produce comparable and meaningful results across labs/schemes (Testable) Assurance Activities – tailored CEM Assurance of product compliance Address specific threats Created and maintained by Technical Communities (TCs) PPs are achievable, repeatable, and testable PPs should be completed within a 4-6 month time frame instead of years, which drastically cuts down time and costs. PPs include a set of tailored technology-specific threats derived from operational knowledge and technical expertise along with a set of core functional requirements necessary to mitigate those threats. There is only one evaluation level, PP compliant, so that all products that have been evaluated are to the same standards. Comparable and meaningful results are produced. They establish a basic level of security for a particular technology and include assurance activities so that the evaluations become repeatable across labs, require less documentation, and become more time effective. Requires vendors to disclose only information pertinent to evaluation and safeguards their proprietary information. PPs are have less subjective requirements/test criteria. Vendors and labs can no longer choose only a few requirements to be evaluated against; they must adhere to all assurance activities (e.g., testing requirements), so that a product will be truly PP compliant. Tailored CEM (Common Evaluation Methodology) PPs are created and maintained by Technical Communities (TCs) so that all requirements can be met by all vendor types, thereby giving a larger role to industry and providing greater incentive to participate.

Collaborative environment to create requirements and standards for PPs What Exactly Are TCs? Any participating vendor, country, critical infrastructure, evaluator or lab Collaborative environment to create requirements and standards for PPs Ultimate creator of PPs with NIAP guidance TCs consist of any vendor, country, critical infrastructure, evaluator, or lab that wishes to participate. TCs are a collaborative environment where all involved help in creating the requirements and standards set forth by a PP. NIAP will continue to be the forefront of the PP, helping to guide and write the PPs, but it will ultimately be the TC that will set the requirements, thus allowing an equal opportunity for all to meet these requirements.

ST vs. PP Example (click) 1.) You have some device that you wish to have evaluated. (click) *SFR – Security Functional Requirement **SAR – Security Assurance Requirement ***TAA – Tailored Assurance Activity

ST vs. PP Example Protection Profile Security Target *SFR 1 *SFR 1 Functional Package Functional Package **SAR 01 SAR 02 SAR 03 SAR .... SAR 24 **SAR 01 SAR 02 TAA 03 TAA .... TAA 10 (click) 2.) The device will either go against an EAL a Security Target (ST) or a Protection Profile (PP). A vendor ST can claim any valid “Functional Package”, i.e. any valid combination of security functional requirements. A vendor ST can claim any valid “Assurance Package”, i.e. any valid combination of security assurance requirement. Assurance Package Assurance Package *SFR – Security Functional Requirement **SAR – Security Assurance Requirement ***TAA – Tailored Assurance Activity

ST vs. PP Example Protection Profile Security Target *SFR 1 *SFR 1 Functional Package Functional Package **SAR 01 SAR 02 SAR 03 SAR .... SAR 24 **SAR 01 SAR 02 TAA 03 TAA .... TAA 10 (click) However, some product vendors only claim minimal security functionality in their ST and continue to claim an assurance package of EAL4 (Evaluation Assurance Level 4). This approach can be deceiving to the consumer who assume or equate a higher assurance package level as being more secure. In fact, it is the security functionality present in a product that provides the security AND the assurance package provides an indication of the confidence that has been gained through evaluation that the security functionality works as intended. 4.) As a result, the product can obtain the “assurance package” EAL4 stamp but only test against a subset of “security functional” requirements. (click) Assurance Package Assurance Package *SFR – Security Functional Requirement **SAR – Security Assurance Requirement ***TAA – Tailored Assurance Activity

ST vs. PP Example Protection Profile Security Target *SFR 1 *SFR 1 Functional Package Functional Package **SAR 01 SAR 02 SAR 03 SAR .... SAR 24 **SAR 01 SAR 02 TAA 03 TAA .... TAA 10 (click) 3.) However, not all of the security functional requirements may be relevant to a product technology type also not all the assurance requirements in an assurance package, e.g. EAL 4, may be relevant to the product technology type, and therefore not apply. (click) 5.) A product technology type PP can be constructed with an agreed: - specification of security functional requirements, i.e. “Functional Package” - specification of security assurance requirements, i.e. “Assurance Package” and A product must pass ALL of the PP functional and assurance requirements (click) 6.) So, although a product technology type PP may have fewer security assurance requirements and therefore perhaps assumed to equate to a lower EAL. However, the PP is more considered in the choice of the security assurance requirements appropriate for a product technology type. Together with the added specificity of the security assurance requirements through a process of refinement or “Tailoring” there can be greater confidence that the assurance activities are adequate and appropriate for that product technology type. “Secure” is a combination of the security functional requirements which provide the security features in a product technology type, and the assurance security requirements are appropriate for a product technology type and that their correct application provide the appropriate confidence that the security functions operate as intended. Therefore, an agreed product technology type PP claim is less open to security functional or assurance requirements misinterpretation, than an ST for a product that may have only minimal security functional requirements and an inappropriate EAL claim. Assurance Package Assurance Package *SFR – Security Functional Requirement **SAR – Security Assurance Requirement ***TAA – Tailored Assurance Activity

Technical Community Key to PP Development and Maintenance Any participating CCRA nation, vendor, critical infrastructure industry, academia, evaluator, or lab Collaborative environment to create requirements and testing standards for PPs TCs consist of any vendor, country, critical infrastructure, evaluator, or lab that wishes to participate. TCs are a collaborative environment where all involved help in creating the requirements and standards set forth by a PP. NIAP will continue to be the forefront of the PP, helping to guide and write the PPs, but it will ultimately be the TC that will set the requirements, thus allowing an equal opportunity for all to meet these requirements.

Published Protection Profiles Full Disk Encryption USB Flash Drive Hardcopy Device (MFP) Stateful Firewall Network Devices 1.1 ESM Policy Management ESM Access Control ESM Identity & Credential Mgt. Mobility Endpoint OS Mobility Endpoint VoIP App SIP Server Wireless LAN Access System Wireless LAN Client VPN Client Peripheral Sharing Switch Located at www.niap-ccevs.org/pp/

Protection Profiles Under Development NDPP V2 VPN Gateway Extended Package BIOS MFP v2 USB v2 Hardware Security Module Virtualization Storage Area Network File Encryption Mobile Device Management

Contact Information NIAP website: http://www.niap-ccevs.org/ Contact info: Mark Loepker – msloepk@nsa.gov Paul Mansfield – pbmansf@nsa.gov Email: scheme-comments@niap-ccevs.org Telephone: 410.854.4458

Questions?

NIAP Evolution Progress IA Products Must be CC Evaluated & Validated – U.S. National Policy (NSTISSP-11) Not the case in most other CC-nations No longer accepting traditional (EAL4) evaluations Evaluations must go against NIAP Approved PP Created Technical Communities Network, Firewall, ESM Published 12 Standard PP (December 2012) Continuing Outreach to Gov’t & International Partners, Industry, Labs, Academia