Robustness Strategy Teri Arber Deb Cooley Steve Hirsch Martha - - PowerPoint PPT Presentation

robustness strategy
SMART_READER_LITE
LIVE PREVIEW

Robustness Strategy Teri Arber Deb Cooley Steve Hirsch Martha - - PowerPoint PPT Presentation

Information Assurance Technical Framework: Robustness Strategy Teri Arber Deb Cooley Steve Hirsch Martha Mahan Jim Osterritter 8 December 99 Context Network Security Framework (NSF) Definition of Robustness Defense in Depth


slide-1
SLIDE 1

8 December 99

Information Assurance Technical Framework:

Robustness Strategy

Teri Arber Deb Cooley Steve Hirsch Martha Mahan Jim Osterritter

slide-2
SLIDE 2

8 December 99 IATF: Robustness Strategy

Context

✔Network Security Framework (NSF) ✔Definition of Robustness ✔Defense in Depth

➔Layered Security

✔Defense Information Assurance Program

➔Information Assurance Solutions (IAS)

slide-3
SLIDE 3

8 December 99 IATF: Robustness Strategy

Purpose

✔A strategy to:

➔Provide guidance ➔Aid in defining solution requirements ➔Aid in risk management ➔Stimulate research

✔Can be used for:

➔Component parts ➔Configured systems

slide-4
SLIDE 4

8 December 99 IATF: Robustness Strategy

Assumptions

✔Trained Information System Security

Engineer (ISSE) is available

✔The Security Policy is known ✔More than one acceptable solution ✔There will be countermeasure evolution

slide-5
SLIDE 5

8 December 99 IATF: Robustness Strategy

General Process

✔Determine the Value of Information and

Threat Environment

✔Determine the Degree of Robustness ✔Select Security Services ✔Select Security Mechanisms ✔Assess Residual Risk

slide-6
SLIDE 6

8 December 99 IATF: Robustness Strategy

Information Value

✔Define levels of Information Value by the

consequences of violating policy:

➔V1: Negligible adverse effects ➔V2: Minimal damage ➔V3: Some damage ➔V4: Serious damage ➔V5: Exceptionally grave damage

slide-7
SLIDE 7

8 December 99 IATF: Robustness Strategy

Threat Environment

✔Define levels of Threat Environment:

➔T1: Inadvertent or accidental ➔T2: Casual adversary, minimal resources, little risk ➔T3: Adversary, minimal resources, significant risk ➔T4: Sophisticated, moderate resources, little risk ➔T5: Sophisticated, moderate resources, signif. risk ➔T6: Very sophisticated, abundant resources, lit. risk ➔T7: Very sophist., abundant resources, signif. risk

slide-8
SLIDE 8

8 December 99 IATF: Robustness Strategy

Degree of Robustness

Threat Levels Info. Value T1 T2 T3 T4 T5 T6 T7 V1 SML1 EAL1 SML1 EAL1 SML1 EAL1 SML1 EAL2 SML1 EAL2 SML1 EAL2 SML1 EAL2 V2 SML1 EAL1 SML1 EAL1 SML1 EAL1 SML2 EAL2 SML2 EAL2 SML2 EAL3 SML2 EAL3 V3 SML1 EAL1 SML1 EAL2 SML1 EAL2 SML2 EAL3 SML2 EAL3 SML2 EAL4 SML2 EAL4 V4 SML2 EAL1 SML2 EAL2 SML2 EAL3 SML3 EAL4 SML3 EAL5 SML3 EAL5 SML3 EAL6 V5 SML2 EAL2 SML2 EAL3 SML3 EAL4 SML3 EAL5 SML3 EAL6 SML3 EAL6 SML3 EAL7

slide-9
SLIDE 9

8 December 99 IATF: Robustness Strategy

Strength of Mechanism

✔Series of tables by Security Service ✔Levels of Strength

➔ SML1: Basic strength (third from highest) ➔ SML2: Medium strength

(second from highest)

➔ SML3: High strength (highest)

slide-10
SLIDE 10

8 December 99 IATF: Robustness Strategy

Security Services

✔ Security Management ✔ Access Control ✔ Accountability ✔ Confidentiality ✔ Integrity ✔ Availability ✔ Identification and Authentication ✔ Non-Repudiation

slide-11
SLIDE 11

8 December 99 IATF: Robustness Strategy

Level of Assurance

✔Utilize the Common Criteria for security

assurance

✔Additions might include

➔Failsafe design and analysis ➔Anti-Tamper design and analysis ➔TEMPEST design and analysis ➔Process Assurance (CMM)

slide-12
SLIDE 12

8 December 99 IATF: Robustness Strategy

Summary

✔The Strategy is not a ‘cookbook’ ✔It does provide guidance ✔It is a starting point

slide-13
SLIDE 13

8 December 99 IATF: Robustness Strategy

For More Information

✔Robustness Strategy Team

➔Teri Arber - tarber@radium.ncsc.mil ➔Deb Cooley - dcooley@radium.ncsc.mil ➔Steve Hirsch - sjhirsc@aztech.ba.md.us ➔Martha Mahan - mmmahan@suslol.demon.co.uk ➔Jim Osterritter - josterri@radium.ncsc.mil

✔ Information Assurance Technical Framework

➔http://www.iatf.net/