Evaluating Systems
Chapter 22
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-1
Evaluating Systems Chapter 22 Computer Security: Art and Science , 2 - - PowerPoint PPT Presentation
Evaluating Systems Chapter 22 Computer Security: Art and Science , 2 nd Edition Version 1.0 Slide 22-1 Outline Goals of formal evaluation Trusted Computer Security Evaluation Criteria (TCSEC), 19831999 International Efforts and
Chapter 22
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-1
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-2
under specific conditions
functional requirements; these usually specify required evidence of assurance
based on analysis of assurance evidence
with respect to security requirements
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-3
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-4
processes
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-5
*-property
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-6
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-7
controlled sharing of named objects by named entities
(eg, security clearances), object labels reflect protection requirements
represent clearances and classifications
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-8
the system and the system must authenticate that identity before the user can use the system
identity with auditable actions
ensuring a new user cannot read previous contents of object when it is reused
between user, TCB
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-9
isolation, well-defined user interfaces, least privilege
separation of operator, administrator roles at B2 or higher; trusted recovery procedures at A1; hardware diagnostics to validate hardware, firmware elements of TCB
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-10
consistent mappings among documentation and code tools for generating TCB
distributed media; acceptance procedures
and other techniques for keeping TCB as small, simple as possible
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-11
evaluation classes
has descriptive top level specification (DTLS)
show FTLS consistent with security policy model, also mapoping between FTLS and source code
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-12
correction of flaws, search for covert channels
description of protection mechanisms, how they interact, how to use them; Trusted Facility Manual is for administrators and says how to run product securely
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-13
discretionary access controls
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-14
restricted to specified set of objects, labelling to support this
model of security policy shown to be consistent with its axioms
labeling expanded, trusted path for login, enforcement of least privilege
management, more stringent documentation, formal security policy model proven to be consistent with its axioms
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-15
requirements for trusted path, constraints on code development (modularity, simplicity, layering, data hiding, etc.)
requirements on DLTS, administrator’s guide, design documentation
design specification, verification, correspondence between code and FTLS, as well as trusted distribution and increased test and design document requirements
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-16
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-17
schedules, development process, etc.
schedule
review board (TRB), which approved that part before next part began
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-18
provided documentation
run
report produced and given to TRB
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-19
rating
perform RAMP process
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-20
based evaluation
requirements and classes, rigor of evaluation process, rigor of review
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-21
types of systems
applications
systems based on TCSEC
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-22
these were published as informal addenda
interpretations
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-23
evaluation teams
evaluation completed
evaluators; charged a fee for evaluation
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-24
methodologies for evaluation
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-25
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-26
is subject of evaluation
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-27
target
implemented them
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-28
development, maintenance of TOE
mechanism whose strength could be measured
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-29
E1: requires ST, informal description of system, testing of system to show it satisfied ST E2: E1 + informal description of detailed design, configuration control, distribution control process, evidence of testing E3: E2 + more stringent requirements on detail design, correspondence between source code and security requirements
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-30
E4: E3 + formal model of security policy, structured approach to design, design level vulnerability analysis E5: E4 + correspondence between detailed design and source code, source code level vulnerability analysis E6: E5 + use of formal methods
with formal model of security policy
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-31
product evaluated against the ST
correct implementation of plan
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-32
the evaluation itself a conflict of interest
insufficient
coverage analysis
followed recommendation of evaluation team
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-33
security targets
made sense
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-34
functional and assurance requirements
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-35
business
class C2
identifying protection measures addressing each threat
management constraints and allowed 1-time passwords; stored passwords had to be hashed; some new auditable events added, discretionary access control attributed audited
workstation and network security requirements)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-36
sector
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-37
products
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-38
evaluation approach
particular to family of systems
threats, intended method of use
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-39
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-40
use
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-41
Module Validation Program (CMVP)
cryptographic logic or processes
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-42
algorithm; must be executed on production-grade equipment
system
system evaluated at EAL2 or better in Common Criteria
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-43
respond unauthorized attempts at physical access
purpose operating system meeting EAL4 or higher
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-44
for FIPS 140-2
module
CMVP
environment and retain its validation
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-45
documentation errors
flaws; more than 65% had documentation errors
cryptographic algorithms validated
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-46
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-47
Certifications in the Field of Information Technology Security
producing) and/or consuming (certification recognizing) members
France, Germany
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-48
Evaluation Assurance Levels (EALs)
used assurance requirements not in any EAL
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-49
strategy
structuring interactions between vendors and evaluators, awarding certifications, etc.
implements Common Criteria Evaluation and Validation Scheme (CCEVS); NIST accredits commercial labs to do the evaluations; NIST then validates the evaluation and awards the EALs
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-50
managed, protected, distributed within a system
system that must be relied on for correct enforcement of TSP
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-51
requirements for category of systems that meet specific consumer needs
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-52
packages
PP claiming conformance is instantiation of the PP while allowing ST or PP claiming conformance to be broader than itself
security requirements (type of strict conformance)
conformance solves generic security problem described in PP
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-53
that are targets of attacks
not defined in CC
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-54
not completely countered by system, organizational policies, assumptions not met by system
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-55
author
and meet, security objectives
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-56
base TOE type
BB by adding new elements or giving more detailed set of elements
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-57
Base-PPs
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-58
Security Target Evaluation
requirements and specifications to be used as basis for evaluation of identified system
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-59
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-60
Introduction section has 4 parts
which ST refers
in evaluated product lists; also states type of TOE (router, firewall, OS, etc.)
understanding its security requirements
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-61
Conformance claims section has 4 parts
conformance
package
those of package plus at least 1 additional requirement
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-62
Conformance claims section has 4 parts
conformance
package
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-63
Conformance claims section, 4th part
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-64
Security Problem Definition: includes
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-65
Security Objectives: two types of objectives
identified threats, organizational policies
back to threats, assumptions, organizational policies not completely met or countered by system
meet assumptions, enforce organizational security policy
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-66
Extended components definition defines components in ST not defined in CC Parts 2 and 3
components
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-67
Security Requirements cover functional, assurance requirements
environment traceable to and meet objectives
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-68
TOE Summary Specification defines instantiation of system security requirements
requirements
logical tampering, bypass
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-69
hierarchy of requirements
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-70
11 classes, each with at least 1 family; family has:
issues for subdivisions, requirements of family
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-71
authentication, rollback, stored data integrity
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-72
expiration
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-73
TOE access history, access banners, system entry constraints
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-74
class FMT that should be considered
addressed if component FAU_GEN is selected in the PP or ST
so if FAU_SSA.1 selected, also must select FAU_GEN.1
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-75
stringent than those of FAU_SSA.1, subsuming requirements
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-76
representation, TSF internals, TOE design, security policy modeling
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-77
security, flaw remediation, tools and techniques, life cycle definition
component, composed TOE testing, composition vulnerability analysis
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-78
using functional and interface specifications, and examination of provided guidance documentation
architecture
vulnerability analysis to show resistance to basic attacks
complete development record might not be available
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-79
function analysis requires architectural description of TOE design
use of development environment controls, configuration management
design, complete interface description, basic modular TOE design, subset of implementation to inputs for security function analysis
to show resistance to enhanced-basic attacks
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-80
design and full implementation to input for security functional analysis; requires semiformal functional specification, modular high-level design; comprehensive configuration management
moderate amount of computer security engineering
model of security policies, semiformal TOE design and functional specification; methodical vulnerability search to address penetration attackers with high potential
to justify cost, effort of development, certification
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-81
functional specification, high-level design; implementation representation used as basis for testing
security engineering
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-82
TCSEC ITSEC CC Other D E0 no equivalent no equivalent no equivalent EAL1 Private lab testing C1 E1 EAL2 OS for FIPS 140-2 L2 C2 E2 EAL3 OS for FIPS 140-2 L3 B1 E3 EAL4 OS for FIPS 140-2 L4 B2 E4 EAL5 B3 E5 EAL6 A1 E6 EAL7
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-83
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-84
they agree to evaluate a product or system
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-85
agreement: mutual recognition agreement between participating government organizations, agencies in EU or European Free Trade Association (EFTA)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-86
and/or consuming (certification recognizing) participation
consuming participants including Austria, Finland, Poland
SOG-IS approved scheme for that level
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-87
in Europe
these areas
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-88
laboratories, vendors, etc.
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-89
evaluation technologies
methodologies
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-90
requirements than older evaluations
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-91
maintains CC, ensures CCRA is operated as defined by its rules
Agreed (worthy of being adopted internationally by CC), Concurred (proposal acceptable, does not violate mutual recognition, but not worthy of international adoption), Disagreed (proposal violates mutual recognition rules
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-92
trustworthiness of product
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-93
following process
managed, measured, controlled, effective
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-94
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-95
11 systems security engineering process areas: Definition of each process area contains goal, set of supporting base practices (total of 61 base practices within all areas)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-96
effort
engineering process
engineering process
support environment
Knowledge
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-97
11 process areas for project, organizational practices (adapted from SE-CMM):
verification issues addressed
across organization
process effectiveness
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-98
process in process area
represented by set of levels of base process
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-99
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-100
Process area Rating
about TCSEC
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 22-101