University of Tulsa - Center for Information Security Common Criteria Dawn Schulte Leigh Anne Winters.

Slides:



Advertisements
Similar presentations
© Crown Copyright (2000) Module 2.4 Development Environment.
Advertisements

© Crown Copyright (2000) Module 2.5 Operational Environment.
Module 1 Evaluation Overview © Crown Copyright (2000)
PRINCIPLES OF A CALIBRATION MANAGEMENT SYSTEM
National Information Assurance Partnership Paul Mansfield January 2013
Common Criteria Evaluation and Validation Scheme Syed Naqvi XtreemOS Training Day.
IT Audit Methodologies
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 5.2: Evaluation of Secure Information Systems.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Information Security of Embedded Systems : Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Common Criteria Richard Newman. What is the Common Criteria Cooperative effort among Canada, France, Germany, the Netherlands, UK, USA (NSA, NIST) Defines.
IT Security Evaluation By Sandeep Joshi
1 norshahnizakamalbashah CEM v3.1: Chapter 10 Security Target Evaluation.
Computer Security: Principles and Practice Chapter 10 – Trusted Computing and Multilevel Security.
The Common Criteria Cs5493(7493). CC: Background The need for independently evaluated IT security products and systems led to the TCSEC Rainbow series.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 10 – Trusted Computing.
An Overview of Common Criteria Protection Profiles María M. Larrondo Petrie, PhD March 26, 2004.
October 3, Partnerships for VoIP Security VoIP Protection Profiles David Smith Co-Chair, DoD VoIP Information Assurance Working Group NSA Information.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
, Name, Folie 1 IT Audit Methodologies.
Dr. Julian Lo Consulting Director ITIL v3 Expert
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security.
Security Controls – What Works
8 November Common Criteria Protection Profiles and the NSA Strategy for Their Use Within the U.S. Department of Defense Louis.
© 1999 SPYRUS Common Criteria Protection Profiles for PKI Products Eric Rosenfeld SPYRUS 8 November 1999 CACR Information Security Workshop Third-Party.
COEN 351: E-Commerce Security Public Key Infrastructure Assessment and Accreditation.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
Fraud Prevention and Risk Management
1 A Common-Criteria Based Approach for COTS Component Selection Wes J. Lloyd Colorado State University Young Researchers Workshop (YRW) 2004.
Assurance Continuity: What and How? Nithya Rachamadugu September 25, 2007.
1 Anthony Apted/ James Arnold 26 September 2007 Has the Common Criteria Delivered?
A Security Business Case for the Common Criteria Marty Ferris Ferris & Associates, Inc
Information Systems Security Computer System Life Cycle Security.
Evaluating Systems Information Assurance Fall 2010.
Updates on Korean Scheme IT Security Certification Center, National Intelligence Service The 8 th ICCC in Rome, Italy.
Chapter Three IT Risks and Controls.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
Background. History TCSEC Issues non-standard inflexible not scalable.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 13 “Trusted Computing and.
CACR CC Briefing Stephen Booth Computer and System Security Section Communications Security Establishment
CMSC : Common Criteria for Computer/IT Systems
TM8104 IT Security EvaluationAutumn CC – Common Criteria (for IT Security Evaluation) The CC permits comparability between the results of independent.
1 Common Evaluation Methodology for IT Security Part 2: Evaluation Methodology chapter 5-8 Marie Elisabeth Gaup Moe 06/12/04.
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
TM8104 IT Security EvaluationAutumn Evaluation - the Main Road to IT Security Assurance CC Part 3.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
SE513 Software Quality Assurance Lecture12: Software Reliability and Quality Management Standards.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
CSCE 727 Awareness and Training Secure System Development and Monitoring.
9 th International Common Criteria Conference Report to IEEE P2600 WG Brian Smithson Ricoh Americas Corporation 10/24/2008.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
1 Trusted OS Design CS461/ECE Reading Material Section 5.4 of Security in Computing.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Ch.18 Evaluating Systems - Part 2 -
Partnerships for VoIP Security VoIP Protection Profiles
UNIT V QUALITY SYSTEMS.
2006 Annual Research Review & Executive Forum
CLINICAL INFORMATION SYSTEM
9th International Common Criteria Conference Report to IEEE P2600 WG
Presentation transcript:

University of Tulsa - Center for Information Security Common Criteria Dawn Schulte Leigh Anne Winters

University of Tulsa - Center for Information Security Outline What is the Common Criteria? Origins of the Common Criteria Common Criteria Basics Security Functional Requirements Security Assurance Requirements Evaluation Assurance Levels Common Criteria in the US Common Criteria and C&A Centralized Certified Products List

University of Tulsa - Center for Information Security What is the Common Criteria? The Common Criteria represents the outcome of a series of efforts to develop criteria for evaluation of IT security that are broadly useful within the international community. Standardizes –Security Functionality –Evaluation Assurance

University of Tulsa - Center for Information Security Origins of the Common Criteria Netherlands United States Canada France United Kingdom Germany

University of Tulsa - Center for Information Security Origins of the Common Criteria

University of Tulsa - Center for Information Security Origins of the Common Criteria Version 1.0 (Jan 1996) – published for comment Version 2.0 (May 1998) – takes account of extensive review Version 2.0 (1999) – adopted by ISO as ISO 15408

University of Tulsa - Center for Information Security Pop Quiz!! 1.Name one of the two areas that CC standardizes. 2.Name one of the six countries that participates in the CC

University of Tulsa - Center for Information Security Common Criteria: Three Parts Part 1: Intro and General Model Part 2: Security Functional Requirements Part 3: Security Assurance Requirements

University of Tulsa - Center for Information Security Intro and General Model: Definitions Target of Evaluation (TOE) – an IT product or system and its associated administrator and user guidance documentation that is the subject of evaluation Protection Profile (PP) – an implementation- independent set of security requirements for a category of TOEs that meet specific consumer needs. Security Target (ST) – a set of security requirements and specifications to be used as the basis for evaluation of an identified TOE.

University of Tulsa - Center for Information Security Common Criteria Users UserUses of Common Criteria ConsumersTo find requirements for security features that match their own risk assessment. To shop for products that have ratings with those features. To publish their security requirements so that vendors can design products that meet them. DevelopersTo select security requirements that they wish to include in their products. To design and build a product in a way that can prove to evaluators that the product meets requirements. To determine their responsibilities in supporting and evaluating their product. EvaluatorsTo judge whether or not a product meets its security requirements. Provide a yardstick against which evaluations can be performed. Provide input when forming specific evaluation methods.

University of Tulsa - Center for Information Security Pop Quiz!! 1.True or False: The Protection Profile answers the question “What will I provide?” 2.List one interested party in the CC. 3.Name one part of the CC.

University of Tulsa - Center for Information Security Security Functional Requirements Security Functional Requirements describe the expected behavior of a TOE

University of Tulsa - Center for Information Security Security Functionality: Organization The CC security requirements are organized into the hierarchy of –Class-Family-Component This hierarchy is provided to help consumers to locate specific security requirements and the right components to combat threats.

University of Tulsa - Center for Information Security Security Functionality: Functional Requirement Classes Audit (FAU) Cryptographic Support (FCS) Communications (FCO) User Data Protection (FDP) Identification and Authentication (FIA) Security Management (FMT) Privacy (FPR) Protection of the TOE Security Functions (FPT) Resource Utilization (FRU) TOE Access (FTA) Trusted Path/Channels (FTP)

University of Tulsa - Center for Information Security Pop Quiz!! 1.Name the levels of the hierarchy. 2.Security Functional Requirements describe the _____ ______ of a TOE. 3.Name one Functional Requirement Class.

University of Tulsa - Center for Information Security Security Assurance Grounds for confidence that an IT product or system meets its security objectives.

University of Tulsa - Center for Information Security Security Assurance: How to gain assurance… Evaluation Analysis –Design representations –Flaws –Functional tests and results –Guidance documents –Processes procedures –Penetration testing

University of Tulsa - Center for Information Security Security Assurance: Assurance Requirement Classes Evaluation of PPs and STs –Protection Profile Evaluation (APE) –Security Target Evaluation (ASE) Evaluation Assurance Classes –Configuration Management (ACM) –Delivery and Operation (ADO) –Development (ADV) –Guidance documents (AGD) –Life Cycle Support (ALC) –Tests (ATE) –Vulnerability Assessment (AVA) Assurance Maintenance Class –Maintenance of Assurance (AMA)

University of Tulsa - Center for Information Security Pop Quiz!! 1.Fill in the blank…. Grounds for confidence that an IT product or system meets its _________. 2. How can you gain assurance? 3. Name one Assurance Requirement Class.

University of Tulsa - Center for Information Security Why go through the process? Internationally recognized Independent quality mark Some customers may desire a CC Certificate Good marketing

University of Tulsa - Center for Information Security Evaluation Assurance Levels 7 Evaluation Assurance Levels (EAL) –Each level offers an increasing level of assurance EAL1-EAL2: Basic Level Assurance EAL3- EAL4: Moderate Level Assurance EAL5-EAL7: High Level Assurance –Cost and time required increases with each level –Only Levels 1-4 are mutually recognized

University of Tulsa - Center for Information Security EAL1 & EAL2: Basic Level Assurance EAL1 – Functionally Tested –Applicable where threats to security are not viewed as serious –Provides an evaluation of the TOE as made available to the consumer Independent testing against specification Examination of documentation EAL2 – Structurally Tested –Applicable where consumers or designers require a low to moderate level of independently assured security –Complete development record not available –Legacy Systems, limited developer access, etc.

University of Tulsa - Center for Information Security EAL3 & EAL4: Moderate Level Assurance EAL3 – Methodically Tested and Checked –Applicable when developers or user require a moderate level of independently assured security. –Thorough investigation of the TOE and its development. EAL4 – Methodically Designed, Tested and Reviewed –Highest level at which it is likely to be economically feasible to certify an existing product. –Developers must be prepared to incur additional security- specific engineering costs.

University of Tulsa - Center for Information Security EAL5 - EAL7: High Level Assurance EAL5 – Semiformally Designed and Tested EAL6 – Semiformally Verified Design and Tested EAL7 – Formally Verified Design and Tested NOTE: No product has been evaluated at EAL5-7 at this time.

University of Tulsa - Center for Information Security Pop Quiz!! 1.Give one reason why a developer should have a product CC certified. 2.Which EAL offers basic assurance with minimal cost and involvement of the developer? 3. Which EALs are mutually recognized?

University of Tulsa - Center for Information Security Common Criteria in the US National Information Assurance Partnership (NIAP) –established 1997 –Partnership between NSA and NIST –Promote the development of technically sound security requirements for IT products and systems and appropriate metrics for evaluating those products and systems –Common Criteria Evaluation and Validation Scheme (CCEVS) NSTISSP No. 11 –Effective July 2002, COTS products must be validated by: NIAP CCEVS NIST FIPS Cryptomodule Validation Program

University of Tulsa - Center for Information Security Common Criteria and C&A 2 Parallel Security Processes: –Certification ad Accreditation (C&A) –Evaluation C&A: –Provides information to make a decision about the risk of operating an information system. Evaluation: –Determines whether an information technology product complies with established standards. –Can be used in the DITSCAP process.

University of Tulsa - Center for Information Security Common Criteria and C&A Part of all phases of the DITSCAP process C “When the Phase 2 initial certification analysis is completed the system should have a documented security specification,” … “COTS and GOTS products used in the system design must be evaluated to ensure that they have been integrated properly and that their functionality meets the security and operational needs of the system.” »DITSCAP APPLICATION MANUAL

University of Tulsa - Center for Information Security Pop Quiz!! 1.What does CCEVS stand for? 2.What two agencies form the National Information Assurance Partnership? 3.Certification and Accreditation provides information to make a decision about the _______ of operating an information system.

University of Tulsa - Center for Information Security Centralized Certified Products List Centralized Certified Products List (CCPL) is produced to assist in the selection of products that will provide an appropriate level of information security. Types of Products: –Firewalls, operating systems, switchs, VPNs, PKI, guards, biometrics, smart cards, etc. Total list can be found at:

University of Tulsa - Center for Information Security Evaluated Operating Systems

University of Tulsa - Center for Information Security Last Pop Quiz!!! 1.If you were going to purchase a security product where could you find the products that had been evaluated by the Common Criteria? 2.Name two types of products that have been evaluated.

University of Tulsa - Center for Information Security For Further Information … Common Criteria: NIAP: NSA: United Kingdom:

University of Tulsa - Center for Information Security Questions?