SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

EMS Checklist (ISO model)
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Environmental Management Systems Refresher
ISO 9001:2000 Documentation Requirements
The International Security Standard
Ensuring Better Services and Fair Value “Introduction and roadmap to implementation of ISO in Zambia’s water utilities” Kasenga Hara March 2015.
The New TNI Laboratory Accreditation Standards Requirements for an Accreditation Body.
ORGANIZATION. 2 Purchasing & Inventory Assessment Occurrence Management Information Management Process Improvement Customer Service Facilities & Safety.
Chapter 16: Standardization and Security Criteria: Security Evaluation of Computer Products Guide to Computer Network Security.
Effective Design of Trusted Information Systems Luděk Novák,
Auditing Computer Systems
Auditing Computer-Based Information Systems
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Dr. Julian Lo Consulting Director ITIL v3 Expert
Security Controls – What Works
EMS Auditing Definitions
COEN 351: E-Commerce Security Public Key Infrastructure Assessment and Accreditation.
Information Systems Security Officer
Environmental Management Systems Refresher
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
First Practice - Information Security Management System Implementation and ISO Certification.
Purpose of the Standards
Prepared by Long Island Quality Associates, Inc. ISO 9001:2000 Documentation Requirements Based on ISO/TC 176/SC 2 March 2001.
FPSC Safety, LLC ISO AUDIT.
ASPEC Internal Auditor Training Version
THE PRINCIPLES OF QUALITY MANAGEMENT. DEFINING QUALITY Good Appearance? High Price? The Best? Particular Specification? Not necessarily, but always: Fitness.
Fraud Prevention and Risk Management
Quality Management Systems P.Suriya Prakash Final Mech Vcet
Gurpreet Dhillon Virginia Commonwealth University
Introduction to Software Quality Assurance (SQA)
Ship Recycling Facility Management System IMO Guideline A.962
Postgraduate Educational Course in radiation protection and the Safety of Radiation sources PGEC Part IV The International System of Radiation Protection.
Occupational Health and Safety
Basics of OHSAS Occupational Health & Safety Management System
WHY CONFORMITY ASSESSMENT?. What is conformity assessment?  Conformity assessment is the name given to processes that are used to demonstrate that a.
1 DOE IMPLEMENTATION WORKSHOP ASSESSING MY EMS Steven R. Woodbury
Chapter 3 資訊安全管理系統. 4.1 General Requirements Develop, implement, maintain and continually improve a documented ISMS Process based on PDCA.
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
10/20/ The ISMS Compliance in 2009 GRC-ISMS Module for ISO Certification.
ISO / IEC : 2012 Conformity assessment – Requirements for the operation of various types of bodies performing inspection.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
FOURTH EUROPEAN QUALITY ASSURANCE FORUM "CREATIVITY AND DIVERSITY: CHALLENGES FOR QUALITY ASSURANCE BEYOND 2010", COPENHAGEN, NOVEMBER IV FORUM-
QUALITY MANAGEMENT STATEMENT
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
ISSAI 400 Compliance Auditing
 Definition of a quality Audit  Types of audit  Qualifications of quality auditors  The audit process.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
~ pertemuan 4 ~ Oleh: Ir. Abdul Hayat, MTI 20-Mar-2009 [Abdul Hayat, [4]Project Integration Management, Semester Genap 2008/2009] 1 PROJECT INTEGRATION.
Chapter 3-Auditing Computer-based Information Systems.
Pertemuan 14 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
Technology Services – National Institute of Standards and Technology Conformity Assessment ANSI-HSSP Workshop Emergency Communications December 2, 2004.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Integrated permitting and inspections
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
ISO/IEC
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
Learn Your Information Security Management System
UNIT V QUALITY SYSTEMS.
Training Course on Integrated Management System for Regulatory Body
Testing and Certification according to ISO and ISO 17065
ACCREDITATION PROCESS
GSBPM AND ISO AS QUALITY MANAGEMENT SYSTEM TOOLS: AZERBAIJAN EXPERIENCE Yusif Yusifov, Deputy Chairman of the State Statistical Committee of the Republic.
Presentation transcript:

SAM-101 Standards and Evaluation

SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can: –Trust manufacturer (not always a good idea) –Test system themselves (expertise may not be available and costly) –Rely on impartial third party assessment (evaluation)

SAM-103 Introduction The Trusted Computer Security Evaluation Criteria (TCSEC) were the first generally accepted criteria for evaluating secure products It provides method to rate products on a simple scale Other criteria developed since, but still relate their schemes back to Orange Book

SAM-104 Target of an evaluation Evaluating criteria over products (operating system) and systems (collection of products) for a specific use Product evaluation needs a set of generic requirements – provided by classes of TCSEC and profiles of ITSEC System evaluation needs requirements capture to be part of evaluation – covered by ITSEC

SAM-105 Purpose of an evaluation Orange Book distinguish between: –Evaluation assessing whether a product has claimed security properties –Certification to establish the extent in which a particular design and implementation meets the set of specified security requirements.

SAM-106 Purpose of an evaluation Accreditation A formal declaration by a Designated Approving Authority (DAA) where an information system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk.

SAM-107 Method of an evaluation Evaluation credibility depends on evaluation methods Need to prevent situations where –Evaluated product later found to contain a serious flaw –Different evaluations of same product disagree in assessment (requirement for repeatability and reproducibility in method)

SAM-108 Product-oriented versus process-oriented evaluation Evaluation methods can be product or process oriented Product-oriented evaluations test the product Process-oriented evaluations look at product development process

SAM-109 Structure of the evaluation criteria The product evaluated on aspects: –Functionality: secure features of the product, MAC, DAC, authentication, auditing etc. –Effectiveness: the appropriateness of the functionality for the security requirements –Assurance: degree of certainty in the correctness of the implementation of the functionality

SAM-1010 Structure of the evaluation criteria Orange Book looks at all aspects at the same time ITSEC is more flexible

SAM-1011 Organizational framework Evaluation should give an independent verdict on products Independent evaluation facility can be a government agency or a licensed agency Both cases a government agency backs the evaluation process and issues certificate

SAM-1012 Government versus commercial If done by government, result should be consistent but may take a long time If evaluation done privately, then checks need be carried out to ensure consistency. Precise formulation of criteria becomes very important. Danger of commercial pressures influence the end result.

SAM-1013 Contracts and procedures Contractual relationship needed between the sponsor of the evaluation, the product manufacturer, and the evaluation facility Procedures needed for start of an evaluation, for issuing evaluation certificates, and for re-evaluation of modifications of evaluated products.

SAM-1014 Costs and benefits The cost would include both the evaluation fee and the indirect costs (time to gather and produce evidence, liaise with evaluation teams) For off-the-shelf software, cost can spread over many customers For customised systems, the sponsor to bear all costs

SAM-1015 Information Security Management System It provides a systematic approach to manage sensitive information in order to protect it. It encompasses employees, processes, and information systems It should include an evaluation method, safeguards and a documentation and revision process

SAM-1016 Getting certified Compliance: a self assessment to check if the system implemented complies with a standard Certification (registration): confer by an accredited certification body when an organisation successfully completes an independent audit

SAM-1017 Getting certified Accreditation: an authorised body (the accreditation body) officially recognises the authority of a certification body to evaluate, certify and register an organisation with regard to published standards

SAM-1018 ISO/IEC and BS 7799 The best reference for information security management system. A structured and internationally recognised guide with recommendations devoted to information security Not a product-oriented or technological standard

SAM-1019 Contents Published in 2 parts: ISO/IEC Part 1: Code of Practice for Information Security Management BS 7799 Part 2: Information Security Management

SAM domains of ISO/IEC (Part 1) Security policy Organisation policy Asset classification and control Personnel security Physical and environmental security Communications and operations management

SAM domains of ISO/IEC (Part 1) Access control Systems development and management Business continuity management Compliance

SAM-1022 Steps in implementing an ISMS Project initiation Definition of the ISMS Risk assessment Risk treatment Training and awareness Audit preparation Audit Control and Continual improvement

SAM-1023 Documentation required Security manual: policy, scope, risk assessment, statement of applicability Procedures: who, what, when, where Working instructions, checklists, forms etc: describe how tasks and specific activities are done Records: provide objective evidence of compliance with ISMS requirements