common criteria paradigm (cc) - acsa) - c · 15 security environment considerations – purpose and...

34
Common Criteria Paradigm (CC) Marvella L. Towns December 2000

Upload: others

Post on 13-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

Common Criteria Paradigm (CC)

Marvella L. TownsDecember 2000

Page 2: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

2

Contents

� CC Purpose and Potential Uses

� CC – Part I

• Introduction & General Model– Part 2

• Functional Requirements– Part 3

• Assurance Requirements

Page 3: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

3

The Common Criteria (CC)

The CC is a collection of generic security requirements (statements) to aid in the specification of product or

system security attributes (Functional and Assurance)

Page 4: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

4

Users of the Common Criteria (CC)

Consumers - to support the procurement of products/systems with IT security features

Product Developers and Integrators - as a basis for the development of products/systems with IT security features

Evaluators - as the basis for the evaluation of IT security products/systems

Auditors, Certifiers, Accreditors, ANYONE - to support specific needs for security specifications

Page 5: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

5

Intended CC Application/Scope

� A paradigm used to specify security properties of IT products and systems that address– unauthorized disclosure (confidentiality, privacy)– unauthorized modification (integrity)– loss of use (availability)

� The basis for comparison of the results of independent evaluations

� Applicable to IT security functions implemented by hardware, software, and firmware

Page 6: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

6

Out-of-Scope for the CC

� “People-based” and physical security implementations

� CC Application Processes– Administrative, Legal, Procedural– Accreditation & Certification – Mutual recognition arrangements

� Evaluation methodology– Companion Methodology Document

• Common Evaluation Methodology for Information Technology Security Evaluation (CEM)

� Cryptographic algorithm definition– CC addresses use of cryptography

Page 7: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

7

CC Documents

� Part 1 - Introduction and General Model� Part 2 - Security Functional Requirements� Part 3 - Security Assurance Requirements

Page 8: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

8

CC Part 1: Introduction & General Model

� Scope, Glossary, Overview

� Security Context & CC Approach

� Security Concepts, Environment & Objectives

� Evaluation Results

� Appendix A: History

� Appendix B: Specification of Protection Profiles (PPs)

� Appendix C: Specification of Security Targets (STs)

Page 9: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

9

Key Common Criteria Definitions

� Target of Evaluation (TOE)– An IT product or system and its associated administrator

and user guidance documentation that is the subject of an evaluation

� Protection Profile (PP)– An implementation-independent set of security requirements

for a category of TOEs that meet specific consumer needs• “goal” specification

� Security Target (ST)– An implementation-dependent set of security requirements

and specifications used as the basis for evaluation of the identified TOE

• ~ as-built specification

Page 10: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

10

Protection Profiles

� Answers the question:

“What do I need in a security solution?”� Implementation independent for a class of products or

systems

� Protection Profile authors:

– anyone who wants to state IT security needs (e.g., commercial consumer, consumer groups)

– anyone who supplies products which support IT security needs

– anyone ...

Page 11: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

11

Security Targets

� Answers the question:

“What does a developer provide in a security solution?”

� Implementation dependent and version specific

� Security Target authors:

– Product vendors, developers, integrators

• Knowledge of implementation details required

Page 12: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

12

Example of PPs and STs

� PP makes a statement of implementation independent

security needs

- a generic OS with DAC, Audit, and I&A� ST defines the implementation dependent capabilities of

a specific product, e.g.

- Microsoft NT 4.0.0.2 (TOE)

- Sun OS 4.7.4 (TOE)

Page 13: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

13

PP/ST Contents/Comparison

� Identification� Overview� TOE Description� Security Environment

– Assumptions, Threats, Policies� Security Objectives� Security Requirements

– Functional, Assurance (EAL)� Rationale

� Identification� Overview � TOE Description� Security Environment

– Assumptions, Threats, Policies� Security Objectives� Security Requirements

– Functional, Assurance (EAL)� Rationale

Protection Profile Security Target

� TOE Summary Specification� CC Conformance Claim� PP Claims

Page 14: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

14

Security Environment

Page 15: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

15

Security Environment� Considerations

– purpose and function of the TOE– IT and Non-IT environment– Assets to be protected

� Assumptions– The security aspects of the environment in which the TOE

will be used or is intended to be used.

� Threats – The ability to exploit a vulnerability by a threat agent.

� Organizational Security Policies (OSPs)– A set of rules, procedures, practices, or guidelines imposed

by an organization upon its operations and to which the TOE may have to comply.

Page 16: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

16

Security Objectives

Page 17: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

17

Security Objectives

� Objectives establish the basis for the selection of security requirements (functional & assurance)

� Objective are completely based upon the statement of the Security Environment

� Objectives– Support Assumptions– Counter Threats (eliminate, minimize, monitor)– Enforce OSPs

Page 18: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

18

Security Objectives

Threats

Policies

SecurityObjectives

Assumptions

IT EnvironmentRequirements

Non-IT EnvironmentRequirements

TOE Requirements

Page 19: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

19

Security Requirements

Page 20: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

20

CC Documents

� Part 1 - Introduction and General Model

� Part 2 - Security Functional Requirements� Part 3 - Security Assurance Requirements

Page 21: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

21

Security Functional Requirements

Levied upon functions of the TOE that support IT security; their behavior can generally be

observed

Page 22: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

22

Functional Requirement Classes

� Security Audit (FAU)� Communication (FCO)� Cryptographic Support (FCS)� User Data Protection (FDP)� Identification & Authentication (FIA)� Security Management (FMT)� Privacy (FPR) � Protection of the TOE Security Functions (FPT)� Resource Utilization (FRU)� TOE Access (FTA)� Trusted Path/Channels (FTP)

Page 23: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

23

Functional Requirement Names

FIA_UID.1.1

F=FunctionalA=Assurance

SpecificClass

FamilyName

ComponentNumber

ElementNumber

Identification and AuthenticationUser Identification

Page 24: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

24

Using Functional Components

� The CC defines 2 types of component relationships– Dependency relationship - other component support

(functional & assurance)– Hierarchy relationship - between components within a

class

� The CC provides 4 types of operations on functional components– Assignment - “fill in the blank”– Selection - “select from a list”– Iteration - “repetitive use”– Refinement - “tailor/modify”

Page 25: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

25

CC Documents

� Part 1 - Introduction and General Model� Part 2 - Security Functional Requirements

� Part 3 - Security Assurance Requirements

Page 26: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

26

What is Assurance?

CC Definition:

Grounds for confidence that an IT product or system meets its security objectives.

Page 27: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

27

Assurance Classes

� Configuration Management (ACM)

� Delivery and Operation (ADO)

� Development Documentation (ADV)

� Guidance Documents (AGD)� Life-Cycle Support (ALC)� Testing (ATE)� Vulnerability Assessment

(AVA)

� Maintenance of Assurance (AMA)

� Protection Profile Evaluation (APE)

� Security Target Evaluation (ASE)

TOE Assurance Specification Assurance

Page 28: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

28

Interpreting Assurance Requirement Names

ADV_LLD.3.1(D,C,E)

F=FunctionalA=Assurance

SpecificClass

FamilyName Component

Number

ElementNumber

ElementIdentifier

Development Low-level Design

Page 29: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

29

Assurance Packages

� Basic Assurance Level - EAL 1 & 2– Limited vendor involvement – Functional & independent testing

� Medium Assurance Level - EAL 3 & 4 – Development environment controls– High-level design documentation

� High Assurance Level - EAL 5, 6, & 7– Additional CM requirements– Analysis based on entire TSF implementation– Covert channel analysis– Modular and layered TOE design– Automated CM– Formal methods of functional specification & high-level

design

Page 30: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

30

PP/ST FrameworkSecurity

Environment

SecurityObjectives

SecurityRequirements

TOE SummarySpecification

Assumptions OSPsThreats

Non-IT

Functional

SecurityFunctions

ITTOE

Assurance Functional Assurance

Security Target Only

Page 31: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

31

CC ---> CEM RelationshipCommonCriteria

CLASS

FAMILY

EVALUATORACTION

CommonEvaluation Methodology

ACTIVITY

SUB-ACTIVITY

WORK-UNIT

Page 32: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

32

Automated Tool - cctoolbox

� Questions– CC Toolbox - [email protected]– CC Profiling Knowledge Base - [email protected]

� Download CC Toolbox and CC Profiling Knowledge Base– http://niap.nist.gov/tools/cctool.html

Page 33: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

33

Visit our Internet Websites:

http://niap.nist.gov/cchttp://niap.nist.gov/cchttp://niap.nist.gov/cchttp://niap.nist.gov/cc--schemescheme

http://www.radium.ncsc.mil/tpephttp://www.radium.ncsc.mil/tpep

CC Course InformationCC Course Information(410) 854(410) 854--44584458

Page 34: Common Criteria Paradigm (CC) - ACSA) - c · 15 Security Environment Considerations – purpose and function of the TOE – IT and Non-IT environment – Assets to be protected Assumptions

34