1 Common Criteria Discussions CCSDS Security Working Group Spring 2008 Meeting 11-12 March 2008 Washington DC (Marriott Courtyard Crystal City, Virginia)

Slides:



Advertisements
Similar presentations
Computer Security Computer Security is defined as:
Advertisements

FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Effective Design of Trusted Information Systems Luděk Novák,
IT Security Evaluation By Sandeep Joshi
Data Ownership Responsibilities & Procedures
1 Executive Office of Public Safety. 2 National Incident Management System.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Security Controls – What Works
Building a Successful Security Infrastructure
POS/ATM Protection Profile for a Common European Banking Industry Approval Scheme Common Approval Scheme POI Working Group SRC Security Research & Consulting.
FIT3105 Smart card based authentication and identity management Lecture 4.
Chapter 12 Strategies for Managing the Technology Infrastructure.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Telecommunications Project Management Chapters 1 and 7 – Sherif Text.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
National Smartcard Project Work Package 8 – Security Issues Report.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Presented to: Aerospace Control and Guidance Systems Committee By: Stan Pszczolkowski, Manager, System Analysis Division Date: March 1, 2006 Federal Aviation.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
EOSC Generic Application Security Framework
Slide 1 What is a Computer Network? A computer network is a linked set of computer systems capable of sharing computer power and resources such as printers,
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
1 Security Policy Framework & CCSDS Common Criteria Use CCSDS Security WG Fall 2005 Atlanta, GA USA Howard Weiss NASA/JPL/SPARTA
IT Terminology Quiz VSB 1002: Business Dynamics II Spring 2009.
NIST Special Publication Revision 1
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Lecture 15 Page 1 CS 236 Online Evaluating System Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Background. History TCSEC Issues non-standard inflexible not scalable.
ECE Lecture 1 Security Services.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Lecture 7: Requirements Engineering
Symbol Technologies Security Forum - Airline Security
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
03/11/021 Spaceport Vision Team Members. 03/11/022 Systems Definition Spaceport System Spaceport Stakeholder Needs High-Level Trade Study Performance.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
TM8104 IT Security EvaluationAutumn CC – Common Criteria (for IT Security Evaluation) The CC permits comparability between the results of independent.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
ICC Copyright 2005 Ifield Computer Consultancy Ltd., Commercial in Confidence Ifield Computer Consultancy Limited Grapevine Texas November 2005 Delivering.
Network Security & Accounting
Presented to: By: Date: Federal Aviation Administration NextGen Network Enabled Weather Capability Evaluations Demonstration and Prototyping Information.
1 Information Security Planning Guide CCSDS Security WG Spring 2005 Athens, GR Howard Weiss NASA/JPL/SPARTA April 2005.
1 Common Criteria Discussions CCSDS Security Working Group Fall 2007 Meeting 3-5 October 2007 ESA/ESOC, Darmstadt Germany (Hotel am Bruchsee, Heppenheim)
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
NATIONAL INCIDENT MANAGEMENT SYSTEM Department of Homeland Security Executive Office of Public Safety.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
03/20/021 Spaceport Vision Team Members Organizations that contributed: Air Force NASA NCSS FAA Industry University Etc.
A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link. Typically, connected.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Network Security Overview
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Dr. Ir. Yeffry Handoko Putra
Common Criteria Discussions CCSDS Security Working Group Spring 2008 Meeting March 2008 Washington DC (Marriott Courtyard Crystal City, Virginia)
Software Configuration Management
Telecommunication ELEC503
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
Security Policies and Implementation Issues
Presentation transcript:

1 Common Criteria Discussions CCSDS Security Working Group Spring 2008 Meeting March 2008 Washington DC (Marriott Courtyard Crystal City, Virginia)

2 Background ISO – Common Criteria for Information Technology Security Evaluation – International standard – Security requirements – Common evaluation methodology – Mutual evaluation recognition (25 countries) Protection Profiles – Designed as an “acquisition” document » Desired security services Security Targets – Designed as a vendor “technical delivery” specification » Documents the security services provided in a product with respect to a Protection Profile

3 Type of PPs Already Written Access control devices Boundary protection devices/systems (aka firewalls) Databases Detection devices/systems (IDS) ICs, Smart Cards, devices and systems Key Management systems Network and Network-related devices/systems Operating systems Other devices/systems (e.g., ATM, biometric, certificate issuing) Digital Signature products

4 Why Common Criteria? Advocate the use of PPs to specify (in standardized terms) the full extent of a system’s security requirements.

5 Space PPs What would a space PP consist of? – Profiles of mission security requirements? » Formalization, in CC terms, of security requirements, by mission type, a la security architecture? – PPs for space ‘unique’ systems, e.g., » C&DH/command & control » Solid state recorders » Shared bus » Others?

6 Example – Cash Machine 1 This Protection Profile has been developed to specify the requirements in terms of functionalities and levels of assurance applicable to ACDs/ATMs. Many transactions can be carried out via an ACD/ATM. The target has therefore been deliberately restricted to matters connected with the use of a card, the identification of the cardholder (the confidentiality of the PIN, etc) and the dispensing of cash (the integrity of the interfaces with the server, etc). The target of evaluation comprises: a central processing unit (the “brain” which conditions or coordinates its overall operation), a cash dispenser (a hardware device for taking banknotes from cash cassettes and delivering them to the cardholder), a card reader (for smart cards and possibly stripe cards), an input device for the cardholder to use (subsequently termed the “keypad”). The Protection Profile relates mainly to interchanges between these various components, which are normally grouped together within a single hardware enclosure (see the diagram above), but any other architecture may be considered. 1 Bull, Dassault, Diebold, NCR, Siemens Nixdorf, Wang Global

7 Discussion Does this make sense? Should we attempt to do this? Will anyone use it – or even care about it? Do the National Space Agencies use the Common Criteria – or should they? – US requires FISMA (Federal Information Security Management Act) » NIST Federal Information Processing standards » No mention of CC evaluated products – What about everyone else?

8 Example: US Federal Aviation Administration (FAA) FAA has developed a Protection Profile library of templates Three PP classes (characteristics) resulting in 18 different PPs – Mission: » Mission critical National Airspace System (NAS) » Mission support/administrative – Technology and Security Enclave: » Wide area network » Local area network/facility communications » Applications system – Risk: » High risk/critical system » Moderate risk/essential system » Low risk/routine system FAA PP Library Link

9

10 National Airspace System (NAS) NAS is very much akin to a distributed mission control center From the FAA PP for high risk WAN: – The TOE is a high risk WAN that will operate within the U.S. National Airspace System (NAS). The NAS is defined as “the common network of U.S. airspace; air navigation facilities, equipment and services; airports or landing areas; aeronautical charts, information and services; rules, regulations and procedures; technical information; and manpower and material. The NAS encompasses everything and everyone providing FAA-regulated flight operations support services to aviators in airspace for which the United States has jurisdiction or responsibility. Included are system components shared jointly with the military. The NAS is an evolving system of technologies, procedures, and people intended to meet the needs of NAS users and service providers. In short, the NAS is a system of systems that executes a safety-critical mission on a 7x24 basis nationwide.

11 Example: FAA PP Assets & Sensitivities InformationSecurity Classification I. FAA Operational Voice and Data 1.1 Air to Ground VoiceSBU 1.2 Air to Ground DataSBU 1.3 Ground to Ground VoiceSBU 1.4 Ground to Ground Data SBU 1.5 Ground to Air VoiceSBU 1.6 Ground to Air DataSBU II. System Hardware, Software, Firmware 2.1 Cryptographic Keys, other security credentialsSSI 2.2 Cryptographic EquipmentSSI 2.3 Application System (hardware, software, firmware)FOUO 2.4 LAN/WAN telecommunications infrastructure (hardware, software, firmware)FOUO/SSI 2.5 System Operation and Management hardware, software, firmwareFOUO/SSI 2.6 Security management hardware, software, firmwareFOUO/SSI 2.7 End-user system hardware, software, firmwareFOUO/SSI 2.8 Interfaces to Military, Law Enforcement, and Other Government AgenciesFOUO/SSI Key: NR - not rated, public information SBU - sensitive but unclassified FOUO - for official use only SSI - security sensitive information

12 Way Forward? Write a space system Protection Profile? – What program/system? – Should we/can we write a “system” PP? » ISS » Constellation » ATV » Planetary explorer » Near-earth explorer » Meteorological » Other? – Or should we write a PP to cover a segment of a system? » Mission control system » Launch control system » Public data dissemination system » Other? If this is a good thing do we have volunteers?

13 Discussion/Direction