Evaluating Systems Information Assurance Fall 2010.

Slides:



Advertisements
Similar presentations
Security Requirements
Advertisements

University of Tulsa - Center for Information Security Common Criteria Dawn Schulte Leigh Anne Winters.
Common Criteria Evaluation and Validation Scheme Syed Naqvi XtreemOS Training Day.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 5.2: Evaluation of Secure Information Systems.
TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #18-1 Chapter 18: Evaluating Systems Goals Trusted Computer System Evaluation.
4/28/20151 Computer Security Security Evaluation.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #17-1 Chapter 17: Introduction to Assurance Overview Why assurance? Trust and.
CS526Topic 22: TCSEC and Common Criteria 1 Information Security CS 526 Topic 22: TCSEC and Common Criteria.
Chapter 6 Security Kernels.
IT Security Evaluation By Sandeep Joshi
1 norshahnizakamalbashah CEM v3.1: Chapter 10 Security Target Evaluation.
Computer Security: Principles and Practice Chapter 10 – Trusted Computing and Multilevel Security.
The Common Criteria Cs5493(7493). CC: Background The need for independently evaluated IT security products and systems led to the TCSEC Rainbow series.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 10 – Trusted Computing.
Trusted Hardware: Can it be Trustworthy? Design Automation Conference 5 June 2007 Karl Levitt National Science Foundation Cynthia E. Irvine Naval Postgraduate.
Security Models and Architecture
Secure Operating Systems Lesson 0x11h: Systems Assurance.
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security.
1 Information Security Standards Gary Gaskell © 2001.
COEN 351: E-Commerce Security Public Key Infrastructure Assessment and Accreditation.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Stephen S. Yau CSE , Fall Evaluating Systems for Functionality and Assurance.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
Cryptography and Network Security Chapter 20 Fourth Edition by William Stallings.
Information Systems Security Security Architecture Domain #5.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Gurpreet Dhillon Virginia Commonwealth University
Principles of Information System Security: Text and Cases
IS 2620: Developing Secure Systems Assurance and Evaluation Lecture 8 March 15, 2012.
Information Systems Security Computer System Life Cycle Security.
ISA 562 Internet Security Theory & Practice
Lecture 15 Page 1 CS 236 Online Evaluating System Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Background. History TCSEC Issues non-standard inflexible not scalable.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Lecture 9 Page 1 CS 236 Online Assurance of Trusted Operating Systems How do I know that I should trust someone’s operating system? What methods can I.
CMSC : Common Criteria for Computer/IT Systems
TM8104 IT Security EvaluationAutumn CC – Common Criteria (for IT Security Evaluation) The CC permits comparability between the results of independent.
1 Common Evaluation Methodology for IT Security Part 2: Evaluation Methodology chapter 5-8 Marie Elisabeth Gaup Moe 06/12/04.
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
CSCE 548 Secure Software Development Security Operations.
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
Verification Formal Verification & Formal Evaluation Derived from Purdue: Cerias.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
TM8104 IT Security EvaluationAutumn Evaluation - the Main Road to IT Security Assurance CC Part 3.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Chapter 8: Principles of Security Models, Design, and Capabilities
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
CSCE 727 Awareness and Training Secure System Development and Monitoring.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
1 Trusted OS Design CS461/ECE Reading Material Section 5.4 of Security in Computing.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
Information Security Principles and Practices
TCSEC: The Orange Book.
Ch.18 Evaluating Systems - Part 2 -
Introduction to Assurance
Official levels of Computer Security
Chapter 19: Building Systems with Assurance
THE ORANGE BOOK Ravi Sandhu
Assurance of Trusted Operating Systems
Computer Security: Art and Science, 2nd Edition
Presentation transcript:

Evaluating Systems Information Assurance Fall 2010

Reading Material Chapter 21 Computer Security: Art and Science The orange book and the whole rainbow series – xt xt The common criteria –Lists all evaluated protection profiles and products –

Outline Motivation for system evaluation Specific evaluation systems –TCSEC/Orange Book –Interim systems –Common Criteria

Evaluation Goals Oriented to purchaser/user of system Assurance that system operates as advertised

Evaluation Options Rely on vendor/developer evidence –Self-evaluate vendor design docs, test results, etc –Base on reputation of vendor Rely on an expert –Read product evaluations from trusted source –Penetration testing

Formal Evaluation Provide a systematic framework for system evaluation –More consistent evaluation –Better basis for comparing similar product Trusted third party system for evaluation Originally driven by needs of government and military

TCSEC: Trusted Computer System Evaluation Criteria (TCSEC) also called the Orange Book –Specifies evaluation classes (C1, C2, B1, B2, B3, A1) –Specifies functionality and assurance requirements for each class Functional Model builds on –BLP (mandatory labeling) –Reference Monitors

Reference Monitor Reference Monitor – abstract machine that mediates all access to objects by subjects Reference Validation Mechanism (RVM) – Implementation of a Reference Monitor –Tamper-proof –Well defined –Never bypassed –Small enough for analysis and testing

Trusted Computing Base (TCB) Includes all protection mechanisms including HW, firmware, and software responsible for enforcing the security policy Strong boundary around the TCB is critical –Any code trusted by element of TCB must be part of TCB too. –If portion of TCB is corrupted, must consider that all of the TCB can be corrupted

TCSEC Functional Requirements DAC Object Reuse –Sufficient clearing of objects between uses in resource pool –E.g. zero pages in memory system MAC and Labels Identification and Authentication Audit –requirements increase at higher classes Trusted Path –Non-spoofable means to interact with TCB –Ctl-Alt-Del in Windows

TCSEC Assurance Requirements Configuration Management –For TCB Trusted Distribution –Integrity of mapping between master and installations System Architecture –Small and modular Design Specification – vary between classes Verification – Vary between classes Testing Product Documentation

TCSEC Classes D – Catch all C1 – Discretionary Protection –Identification and authentication and DAC –Minimal Assurance C2 – Control access protection –Adds object reuse and auditing –More testing requirements –Windows NT 3.5 evaluated C2

TCSEC Classes B1 – Labeled Security Protection –Adds MAC for some objects –Stronger testing requirements. Information model of security policy. –Trusted Unixes tended to be B1 B2 – Structured protection –MAC for all objects. Additional logging. Trusted Path. Least privilege. –Covert channel analysis, configuration management, more documentation, formal model of security policy

TCSEC Classes B3 – Security Domains –Implements full RVM. Requirements on code modularity, layering, simplicity. –More stringent testing and documentation. A1 – verified protection –Same functional requirements as B3 –Significant use of formal methods in assurance –Honeywell’s SCOMP

TCSEC Evaluation process Originally controlled by government –No fee to vendor –May reject evaluation application if product not of interest to government Later introduced fee-based evaluation labs Evaluation phases –Design analysis – no source code access –Test analysis –Final review

TCSEC Evaluation Issues Evaluating a specific configuration –E.g., Window NT, no applications installed, no network –New patches, versions require re-certification RAMP introduced to ease re-certifications Long time for evaluation –Sometimes product was obsolete before evaluation finished Criteria Creep –B1 means something more in 1999 than it did in 1989

Interim Efforts in the ’90s Canadian Trusted Computer Product Evaluation Criteria (CTCPEC) Information Technology Security Evaluation Criteria (ITSEC) – Western Europe Commercial International Security Requirements (CISR) – AmEx and EDS Federal Criteria – NSA and NIST

FIPS 140 Framework for evaluating Cryptographic Modules Still in Use Addresses –Functionality –Assurance –Physical security

FIPS Security Levels Security Level 1 – Uses a FIPS-approved crypto algorithm. Security Level 2 – Adds physical security requirements, e.g. Tamper-evident coatings Security Level 3 – Greater physical security. Protect data hardware falls into the wrong hands. Security Level 4 – Greatest physical security. Detects and responds to environmental and unauthorized attacks.

Common Criteria – 1998 to today Pulls together international evaluation efforts –Evaluations mean something between countries Three top level documents –Common Criteria Documents Describe functional and assurance requirements. Defines Evaluation Assurance Levels (EALs) –CC Evaluation Methodology (CEM) More details on the valuation. Complete through EAL5 (at least) –Evaluation Scheme National specific rules for how CC evals are performed in that country Directed by NIST in US

CC Terminology Target of Evaluation (TOE) –The product being evaluated TOE Security Policy (TSP) –Rules that regulate how assets are managed, protected, and distributed in a product TOE Security Functions (TSF) –Implementation of the TSP –Generalization of the TCB

Protection Profile (PP) Profile that describes the security requirements for a class of products –List of evaluated PP’s – Replaces the fixed set of classes from TCSEC ISSO created some initial profiles to match TCSEC classes –Controlled Access Protection Profile (CAPP) corresponds to C2 –Labeled Security Protection Profile (LSPP) corresponds to B1

Product evaluation Define a security target (ST) –May leverage an evaluated protection profile Evaluated with respect to the ST

CC Functional Requirements Defined in a taxonomy –Top level 11 classes E.g., FAU – Security audit and FDP – User Data Protection –Each class divided into families E.g., FDP_ACC – Access control policy –Each family divided into components E.g., FDP_ACC.2 – Complete access control –Each component contains requirements and dependencies on other requirements

CC Assurance Requirements Similar class, family, component taxonomy Eight product oriented assurance classes –ACM – Configuration Management –ADO – Delivery and Operation –ADV – Development –AGD – Guidance Documentation –ALC – Life Cycle –ATE – Tests –AVA – Vulnerability Analysis –AMA – Maintenance of Assurance

Evaluation Assurance Levels 7 fixed EALs –EAL1 – Functionality Tested –EAL2 – Structurally Tested –EAL3 – Methodically tested and checked Analogous to C2 –EAL4 – Methodically Designed, Tested, and Reviewed –EAL5 – Semiformally Designed and Tested –EAL6 – Semiformally Verified Design and Tested –EAL7 – Formally Verified Design and Tested

CC Evaluation Process in US NIST provides accreditation of third party evaluation labs –Vendor pays lab –Lab works with oversight board Evaluate both PP’s and Products List of evaluated products – html html

Certifying Process Gain assurance from knowledge of developers process –ISO 9000 –SEI's Capability Maturity Model(CMM) –System Security Engineering Capability Maturity Model (SSE-CMM)

System Security Engineering Capability Maturity Model SSE-CMM - –Based on SEI’s SE-CMM Divide software development into process areas (which are further divided into processes) –E.g., Assess Threat, Coordinate Security, Assess impact Plus some process areas from base SE-CMM –E.g., Ensure Quality, Plan Technical Effort

Capability Maturity Levels An organization is evaluated at a maturity level for these process areas and processes –Performed informally –Planned and tracked –Well-defined –Quantitatively controlled –Continuously improving

Key Points Evaluation for the benefit of the customer Product Evaluations –Functional Requirements –Assurance Requirements Process Evaluation