© Crown Copyright (2000) Module 3.1 Evaluation Process.

Slides:



Advertisements
Similar presentations
© Crown Copyright (2000) Module 2.6 Vulnerability Analysis.
Advertisements

ENTITIES FOR A UN SYSTEM EVALUATION FRAMEWORK 17th MEETING OF SENIOR FELLOWSHIP OFFICERS OF THE UNITED NATIONS SYSTEM AND HOST COUNTRY AGENCIES BY DAVIDE.
Financial Management and Control Annual Meeting of ISPA PARTNERS 2003 Preparation for post-accession Management of Community Funds : Nicholas Martyn Regional.
© Crown Copyright (2000) Module 2.3 Functional Testing.
16 August 2010© Crown Copyright (2010)1 Module 2.8 Assurance Continuity and Composition.
© Crown Copyright (2000) Module 2.4 Development Environment.
Security Requirements
© Crown Copyright (2000) Module 2.5 Operational Environment.
Module 1 Evaluation Overview © Crown Copyright (2000)
© Crown Copyright (2000) Module 3.2 Evaluation Management.
© Crown Copyright (2000) Module 2.7 Penetration Testing.
MODELING THE TESTING PROCESS Formal Testing (1.0) Requirements Software Design Risk Data Approved, Debugged, Eng. Tested Code Automated Test Tools Tested.
Software Quality Assurance Plan
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Adjusting EPLC to your Project Colleen Robinson & Teresa Kinley Friday, February 6, 2009.
Auditing A Risk-Based Approach To Conducting A Quality Audit
Slide 1 Test Assurance – Ensuring Stakeholders get What They Want Paul Gerrard Gerrard Consulting PO Box 347 Maidenhead Berkshire SL6 2GU UK e:
Responding to Inspection Findings
CPA is a UKAS company The Assessment Process 2014 Seminars.
Internal Auditing and Outsourcing
PROPOSALS THE REVIEW OF THE 1958 AGREEMENT AND THE INTRODUCTION OF INTERNATIONAL WHOLE VEHICLE TYPE APPROVAL (IWVTA) IWVTA Informal Group WP th Session.
What is Business Analysis Planning & Monitoring?
Assurance Continuity: What and How? Nithya Rachamadugu September 25, 2007.
NIST Special Publication Revision 1
Verification: Quality Assurance in Assessment Verification is the main quality assurance process associated with assessment systems and practice - whether.
ISO 9001: 2000 Certified Audit Process What to do.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
ISM 5316 Week 3 Learning Objectives You should be able to: u Define and list issues and steps in Project Integration u List and describe the components.
Main Requirements on Different Stages of the Licensing Process for New Nuclear Facilities Module 4.1 Steps in the Licensing Process Geoff Vaughan University.
Process Assessment Method
Monitoring & Evaluation. Objective Learn the why, what and how-to approach to monitoring Review monitoring techniques and define the roles monitoring.
Gulana Hajiyeva Environmental Specialist World Bank Moscow Safeguards Training, May 30 – June 1, 2012.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Develop Project Charter
Workshop on Implementing Audit Quality Practices Working Group on Audit Manuals and Methods March 2006 Vilnius (Lithuania) Hungarian Experiences.
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
Test status report Test status report is important to track the important project issues, accomplishments of the projects, pending work and milestone analysis(
BSBPMG501A Manage Application of Project Integrative Processes Manage Project Integrative Processes Unit Guide Diploma of Project Management Qualification.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
© Michael Crosby and Charles Sacker, 2001 Systematic Software Reviews Software reviews are a “quality improvement process for written material”.
State of Georgia Release Management Training
ANALYSIS PHASE OF BUSINESS SYSTEM DEVELOPMENT METHODOLOGY.
Web Analytics & Social Media Monitoring Assignment Briefing June and September 2013 Clive Whysall CAM Examiner.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
Sample Fit-Gap Kick-off
process and procedures for assessments
Software Project Configuration Management
ISO/IEC
Juan Vázquez Sanz EUROCONTROL SRU
GUIDELINES Evaluation of National Rural Networks
2017/8 NomCom Review: Status Update
Software Configuration Management
Project Management Lifecycle Phases
UNIT V QUALITY SYSTEMS.
Version 0.1Assessment Method Overview - 1 Process Assessment Method An objective model-independent method to assess the capability of an organization to.
Standards and Certification Training
Americas Aerospace Quality Group
Informal document GRVA nd GRVA, 28 Jan Feb. 2019
Conducting the Assurance Engagement
MODULE B - PROCESS SUBMODULES B1. Organizational Structure
How to conduct Effective Stage-1 Audit
QA Reviews Lecture # 6.
Overview of the recommendations regarding approximation of the Law on personal data protection to the new EU General data protection regulation Valerija.
Candidate Registration & Induction
Overview of the recommendations on software updates
(Project) SIGN OFF PROCESS MONTH DAY, YEAR
Software Reviews.
Presentation transcript:

© Crown Copyright (2000) Module 3.1 Evaluation Process

You Are Here M3.1 Evaluation Process M3.2 Evaluation Management MODULE 3 - SCHEME RULES AND PROCEDURES

People Involved Sponsor Developer Evaluator Certification Body Accreditor

Role of Sponsor Pay for the evaluation Sponsor may also be the developer Point of contact between CLEF and Developer Produce/Help in production of deliverables Resolution of Problem Reports

Role of Developer Provision of TOE Design/Development Documentation Guidance Documents Support during evaluator testing Support during Development Environment Assessment Resolution of Problem Reports

Role of Evaluator Assess evaluation deliverables to identify whether they meet criteria requirements Assess, through the deliverables provided for the appropriate level of assurance, whether the TOE meets the security requirements specified in the Security Target

Role of Certification Body Oversight of evaluations conducted under UK Scheme Guidance on evaluation methodology Provide Certification Report/Certificate

Role of Accreditor Responsibility for granting authority to operate a system processing protectively marked data Mandates security requirements of system and level of assurance required May use results of an evaluation on which to base decision to grant Accreditation

Evaluation Process Preparation Phase Conduct Phase Conclusion Phase

Preparation Phase Inputs –Security Target –Certification Body Questionnaire –UKSP 06 Entry Task Start-Up Meeting Outputs –Acceptance into Scheme

Conduct Phase Inputs –Deliverables Evaluation Progress Meetings Outputs –Observation Reports –Work Package Reports

Conduct Phase - Deliverables Deliverables List Schedule Management –under configuration control –timescales and impact on evaluation

Conduct Phase - Evaluation Progress Meetings Standard Agenda Who attends Purpose: –discuss issues affecting evaluation progress or results –keep all parties informed of progress

Conduct Phase - Observation Reports Types –Level 1 –Level 2 –Level 3 –Level 4 Raised by Evaluators and sent to: –CB, Developer, Sponsor May force change to TOE or deliverables

Conduct Phase - Work Package Reports One for each Work Package (Activity) Results of evaluator actions –Evidence of why the conclusion was reached Observation Reports –identify where an observation report has been raised –provide justification for satisfactory resolution

Conclusion Phase Evaluation Technical Report –includes Work Package Reports –main input into Certification process Certification Report/Certificate –summary of evaluation results –recommendations for use UKSP06 Entry –update to indicate result of evaluation

Certification Process Results from ETR –discuss any concerns/queries with CLEF Outstanding Observation Reports Constraints/Limitations of evaluation Report to Accreditor, if required

CLEF Quality Manual UKAS - Categories 0 and 1 Procedures, minimum: –Review of evaluation outputs –Handling of evaluation items –Records –Handling of Complaints/Anomalies –Security (covered in later slide) –Site Testing

CLEF Security Manual Security Operating Procedures: –Task separation: need to know principle –Document security: Storage of deliverables and results –Physical security: access to CLEF/Task Cells

Summary - 1 Security Target - (Developer/Sponsor) Deliverables - (Sponsor/Developer) Observation Reports - (Evaluator) Evaluation Technical Report (Evaluator) Certification Report/Certificate (CB)

Further Reading UKSP 01 UKSP 04 Part 1 UKSP 05 Part 1 CEM Part 2, Chapter 2