The 7 Year Itch - Time To Commit Or Time To Move On? Shaun Lee Security Evaluations Manager, Global Product Security.

Slides:



Advertisements
Similar presentations
Policies and Procedures for Civil Society Participation in GEF Programme and Projects presented by GEF NGO Network ECW.
Advertisements

INTERNATIONAL UNION FOR CONSERVATION OF NATURE. 2 Implemented in 12 countries of Africa, Asia, Latin America and the Middle East, through IUCN regional.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Public Engagement in a Multi-Stakeholder World Don Lenihan June 2008.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
ACT Integrated Managed Support 2013 ITSMF USA Project of the Year Assurant’s Unconventional Approach, Uncommon Results AIMS.
DfES/MIAP Unique Learner Number Consultation: 1st December th March Briefing on the consultation into the feasibility of the Unique Learner.
Public Relations, Publicity, and Corporate Advertising © 2007 McGraw-Hill Companies, Inc., McGraw-Hill/Irwin.
Benchmarking as a management tool for continuous improvement in public services u Presentation to Ministry of Culture of the Russian Federation u Peter.
Viewpoint Consulting – Committed to your success.
Health Informatics Series
Applied Software Project Management 1 Introduction Dr. Mengxia Zhu Computer Science Department Southern Illinois University Carbondale.
TESTING THE WATERS: USING COLLECTIVE REAL OPTIONS TO MANAGE THE SOCIAL DILEMMA OF STRATEGIC ALLIANCES Presented by Jong-kyung Park MATTHEW W. MCCARTER,
THE PRINCIPLES OF QUALITY MANAGEMENT. DEFINING QUALITY Good Appearance? High Price? The Best? Particular Specification? Not necessarily, but always: Fitness.
OPTIONS AND REQUIREMENTS FOR ENGAGEMENT OF CIVIL SOCIETY IN GEF PROJECTS AND PROGRAMMES presented by Faizal Parish Regional/Central Focal Point GEF NGO.
15-1 Copyright  2012 McGraw-Hill Australia Pty Ltd PowerPoint Slides t/a Advertising and Promotion 2e by Belch, Belch, Kerr & Powell Chapter 15 Public.
Doing An Internal Analysis
21 – 22 September 2006, Kuala Lumpur Savings Banks and Foundations, contribution for a sustainable society Laurel E Grossman, Chief Executive Officer,
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Assurance Continuity: What and How? Nithya Rachamadugu September 25, 2007.
System Implementation. System Implementation and Seven major activities Coding Testing Installation Documentation Training Support Purpose To convert.
Lessons Learned in Smart Grid Cyber Security
1 Anthony Apted/ James Arnold 26 September 2007 Has the Common Criteria Delivered?
Innovation Leadership Training Goals and Metrics February 5, 2009 All materials © NetCentrics 2008 unless otherwise noted.
Stakeholder Objectives
University of Palestine software engineering department Testing of Software Systems Fundamentals of testing instructor: Tasneem Darwish.
Test Organization and Management
Chapter 2 The process Process, Methods, and Tools
Information Systems Security Computer System Life Cycle Security.
Updates on Korean Scheme IT Security Certification Center, National Intelligence Service The 8 th ICCC in Rome, Italy.
Topics → Business strategy must set goals → Partners selection → Criteria for selecting partners → Structure must maximize cooperation → Incentives for.
Regulatory Innovation: EMSs as Environmental Regulatory Tools Jason Morrison Pacific Institute for Studies in Development, Environment, and Security (
PART A – QUALITY CONTROL ISSUES AS (3.3) Apply business knowledge to address a complex problem in a given global business context.
NGO’s Strategy for CSR: Building a Responsible Solution Nona Pooroe Utomo.
Project Management : Techniques and Tools (60-499) Fall 2014 / Winter 2015.
ENTERPRISE RESOURCE PLANNING.  ERP is a Enterprise Resource Planning, used by company to help them to store and manage dataevery stage of business and.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Quality Control Project Management Unit Credit Value : 4 Essential
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
1 Omissions and errors in the CC Who got it right? 8ICCC Denise Cater.
This chapter is extracted from Sommerville’s slides. Text book chapter
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Clarity Today – Confidence Tomorrow IT Certification Skills Clarity Today – Confidence Tomorrow switchboard:
CSCE 522 Secure Software Development Best Practices.
Jeff Birch, Acting Director Al Muñoz, CFCM, PMP US Department of Agriculture Meeting the Challenge of Better Outcomes February 5, pm.
N5 Bus Man – 1.2: Business Influences © BEST Ltd Business Management (National 5) Understanding Business 1.2 – Influences on Business Activity.
Software Testing and Maintenance 1 Code Review  Introduction  How to Conduct Code Review  Practical Tips  Tool Support  Summary.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER NINE SYSTEMS DEVELOPMENT AND PROJECT MANAGEMENT CHAPTER.
PEFC certification and the combat against illegal logging Follow up to Meeting on 22 February 2007 Mike Clark, Chairman PEFC Council CHATHAM HOUSE, 10.
1 EE29B Feisal Mohammed EE29B: Introduction to Software Engineering Feisal Mohammed Ph: x3156.
Policies and Procedures for Civil Society Participation in GEF Programme and Projects presented by GEF NGO Network ECW.
CSCE 201 Secure Software Development Best Practices.
PLANNING CYCLE An Overview. CONTENT Expected achievements Expected achievements Why IWRM Planning? Why IWRM Planning? Why a strategic approach? Why a.
Aspect Oriented Security Tim Hollebeek, Ph.D.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Reporting on the main discussion points Rapporteur Mr Jan Maarten de Vet, Ecorys High Level Tripartite Strategic Forum on construction 14th April 2016.
9 th International Common Criteria Conference Report to IEEE P2600 WG Brian Smithson Ricoh Americas Corporation 10/24/2008.
Welcome to the ICT Department Unit 3_5 Security Policies.
Corporate Social Responsibility
CSCE 548 Secure Software Development Penetration Testing.
Security Testing Methods
Civil society demands for key changes in GEF 5 Faizal Parish GEC, Central Focal Point GEF NGO Network GEF-NGO Consultation Washington DC 9 November.
COMPTIA CAS-003 Dumps VCE
SMART Objectives Are in addition to day-to-day accountabilities
9th International Common Criteria Conference Report to IEEE P2600 WG
Implementation of the Services Directive
Project Management How to access the power of projects!
FINANCING NATURA 2000 Agenda item 2.1 CGBN Co-ordination Group
Presentation transcript:

The 7 Year Itch - Time To Commit Or Time To Move On? Shaun Lee Security Evaluations Manager, Global Product Security

Agenda Setting the Scene Discussions and Dilemmas Conclusions

Why we perform Evaluations Benefits to the Consumer Evaluations are standard and independent measures of assurance Fulfils procurement requirements Improved product security Benefits to Oracle Better products Confirms the security of the development process Contributes to culture of security Competitive advantage

The Drawbacks Costly Typically several hundred thousand $ to evaluate a complex product to EAL4 Time consuming Can be 2-3 years first time through, for EAL months once proficient Traditional security analysis, e.g.: Benign network assumptions permitted * Hacker style penetration testing can be avoided ‘Unrealistic’ configurations permitted * Lots of ‘academic’ proof documents to produce * Some schemes are tightening up on these

Oracle and Common Criteria Evaluating under 3 different national schemes Each national scheme has a perceived image / reputation Differences in policies, interpretation, oversight Different labs for different schemes

Agenda Setting the Scene Discussions and Dilemmas Conclusions

“Under attack: Common Criteria has loads of critics, but is it getting a bum rap?” (GCN, 13-Aug-2007) “Common Criteria is dead.” Colin Williams, SBL, UK (ICCC, Berlin, 2004)

CC and Criticism Vendors issue updates to certified products soon after a product has achieved certification. The CC does not credit vendors for investing in and using tools & methods for identifying insecure coding errors, like static source code scanners. The length of time and the cost of evaluations Certification does not mean vulnerability free Unrealistic Protection Profiles being written and evaluated. CC not prepared to acknowledge other official international standards Certifications are for benign environments. CC being updated without vendors input or buy in. Just a paperwork exercise

Do we still agree with this? “This is not to say that vendors should be allowed to "get away with anything". They should not. But evaluation processes should take into account differences among vendors, the need to repair flaws, and the likely impossibility of preventing them totally. They should also allow for process improvement -- a key ingredient in the quest for improved product quality that will yield better security. ”

Countering a Criticism The CC paradigm is not at fault, rather the national Schemes for allowing: Benign environments The exclusion of Buffer Overflows, SQL injections (Media driven customer concerns) The abuse of the CC’s flexible language Various national scheme interpretations Possible Reason: Trying to address the criticism on length of time and cost for an evaluation CC flexibility makes it difficult not to allow

Realistic Environments Realistic Environments require: Realistic Protection Profile environments not just Department of Defence environments Vendors performing more penetration testing as a result of the change to the Threat environment Evaluators to perform more realistic penetration testing Perception / Danger More realistic environment will cost more money and extend the length of time for an evaluation further. Real penetration testers better value for money.

Static source code scanners Currently Pinpoint insecure coding errors Tools are not endorsed by national schemes Should reduce vendors’ evaluation costs and time, but actually slows evaluation down because the activity is additional work Future CC Scope should take into account the use of static source code scanners Schemes should force evaluators to look at these tools CC officially approved tool ‘collections’

Agenda Setting the Scene Discussions and Dilemmas Conclusions

ICCC (2000) – ICCC (2007): 7 Years of Progress? Major revision of CC, now at V3.1 CCRA now at 23 participants Little take-up away from government arena Continued criticism

2000: Why Common Criteria? Mutual Recognition Evaluate once, recognised everywhere Saves repeating work Saves time and money We wanted To show our commitment to evaluations A world first To set a high standard for DBMS vendors

2000: What was our conclusion? Delta ITSEC to CC evaluations Solid foundation of ITSEC and TCSEC More work for vendor, less for evaluator CEM introduces criteria creep Other sources (National Scheme rules, Interpretations) introducing criteria creep Mutual recognition makes it all worthwhile!

What is the position in 2007? Criteria Creep less of a problem But raising the bar is done through the mechanism of PPs, apparently by people with insufficient product set knowledge, and with little consultation. We have the criticisms and other issues to concern us CCRA Alternative assurance schemes Management of the CC Mutual recognition still makes it all worthwhile – for now!

The Seven Year Itch – Answering the Question It’s not time to move on (abandon), but: the stakeholders need to work harder and together to get the commitment to move on (make progress). However failure to engage sufficiently with vendors and raising the bar too high too quickly especially above the level of CCRA may cause vendors to experience “negative cost recovery”, which could be an issue if the market for evaluated product remains restricted

For More Information Oracle Security Evaluations: General Oracle Security information:

A Q &

Do we still agree with this? IFIP-SEC ’91 Keynote: Criteria, Evaluation and the International Environment: where have we been, where are we going? Steve Lipner, Digital Equipment Corporation