Download presentation
Presentation is loading. Please wait.
Published byEdward Sullivan Modified over 9 years ago
1
SAM-101 Standards and Evaluation
2
SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can: –Trust manufacturer (not always a good idea) –Test system themselves (expertise may not be available and costly) –Rely on impartial third party assessment (evaluation)
3
SAM-103 Introduction The Trusted Computer Security Evaluation Criteria (TCSEC) were the first generally accepted criteria for evaluating secure products It provides method to rate products on a simple scale Other criteria developed since, but still relate their schemes back to Orange Book
4
SAM-104 Target of an evaluation Evaluating criteria over products (operating system) and systems (collection of products) for a specific use Product evaluation needs a set of generic requirements – provided by classes of TCSEC and profiles of ITSEC System evaluation needs requirements capture to be part of evaluation – covered by ITSEC
5
SAM-105 Purpose of an evaluation Orange Book distinguish between: –Evaluation assessing whether a product has claimed security properties –Certification to establish the extent in which a particular design and implementation meets the set of specified security requirements.
6
SAM-106 Purpose of an evaluation Accreditation A formal declaration by a Designated Approving Authority (DAA) where an information system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk.
7
SAM-107 Method of an evaluation Evaluation credibility depends on evaluation methods Need to prevent situations where –Evaluated product later found to contain a serious flaw –Different evaluations of same product disagree in assessment (requirement for repeatability and reproducibility in method)
8
SAM-108 Product-oriented versus process-oriented evaluation Evaluation methods can be product or process oriented Product-oriented evaluations test the product Process-oriented evaluations look at product development process
9
SAM-109 Structure of the evaluation criteria The product evaluated on aspects: –Functionality: secure features of the product, MAC, DAC, authentication, auditing etc. –Effectiveness: the appropriateness of the functionality for the security requirements –Assurance: degree of certainty in the correctness of the implementation of the functionality
10
SAM-1010 Structure of the evaluation criteria Orange Book looks at all aspects at the same time ITSEC is more flexible
11
SAM-1011 Organizational framework Evaluation should give an independent verdict on products Independent evaluation facility can be a government agency or a licensed agency Both cases a government agency backs the evaluation process and issues certificate
12
SAM-1012 Government versus commercial If done by government, result should be consistent but may take a long time If evaluation done privately, then checks need be carried out to ensure consistency. Precise formulation of criteria becomes very important. Danger of commercial pressures influence the end result.
13
SAM-1013 Contracts and procedures Contractual relationship needed between the sponsor of the evaluation, the product manufacturer, and the evaluation facility Procedures needed for start of an evaluation, for issuing evaluation certificates, and for re-evaluation of modifications of evaluated products.
14
SAM-1014 Costs and benefits The cost would include both the evaluation fee and the indirect costs (time to gather and produce evidence, liaise with evaluation teams) For off-the-shelf software, cost can spread over many customers For customised systems, the sponsor to bear all costs
15
SAM-1015 Information Security Management System It provides a systematic approach to manage sensitive information in order to protect it. It encompasses employees, processes, and information systems It should include an evaluation method, safeguards and a documentation and revision process
16
SAM-1016 Getting certified Compliance: a self assessment to check if the system implemented complies with a standard Certification (registration): confer by an accredited certification body when an organisation successfully completes an independent audit
17
SAM-1017 Getting certified Accreditation: an authorised body (the accreditation body) officially recognises the authority of a certification body to evaluate, certify and register an organisation with regard to published standards
18
SAM-1018 ISO/IEC 17799 and BS 7799 The best reference for information security management system. A structured and internationally recognised guide with recommendations devoted to information security Not a product-oriented or technological standard
19
SAM-1019 Contents Published in 2 parts: ISO/IEC 17799 Part 1: Code of Practice for Information Security Management BS 7799 Part 2: Information Security Management
20
SAM-1020 10 domains of ISO/IEC 17799 (Part 1) Security policy Organisation policy Asset classification and control Personnel security Physical and environmental security Communications and operations management
21
SAM-1021 10 domains of ISO/IEC 17799 (Part 1) Access control Systems development and management Business continuity management Compliance
22
SAM-1022 Steps in implementing an ISMS Project initiation Definition of the ISMS Risk assessment Risk treatment Training and awareness Audit preparation Audit Control and Continual improvement
23
SAM-1023 Documentation required Security manual: policy, scope, risk assessment, statement of applicability Procedures: who, what, when, where Working instructions, checklists, forms etc: describe how tasks and specific activities are done Records: provide objective evidence of compliance with ISMS requirements
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.