1 / 15

IT Security Evaluation and Certification Standards and Personal Information

IT Security Evaluation and Certification Standards and Personal Information. Current challenges and future needs in a multilateral perspective Giovanni Iachello College of Computing, Georgia Inst. of Technology giac@cc.gatech.edu. Evaluation and Certification: Why?.

cicily
Download Presentation

IT Security Evaluation and Certification Standards and Personal Information

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT Security Evaluation and Certification Standards and Personal Information Current challenges and future needs in a multilateral perspective Giovanni Iachello College of Computing, Georgia Inst. of Technology giac@cc.gatech.edu Privacy and Security: Totally Committed

  2. Evaluation and Certification: Why? • Verify and validate conformance to requirements • Increase information fluidity • Compare among competitors • Better informed decisions • Independent quality assessment • Increase credibility • Marketing • Increase confidence • Regulation (in the future) • Higher protection standards Privacy and Security: Totally Committed

  3. Model for Information Security Information Security Technology Process Management Principles Legislation Requirements Techniques Best Practices Privacy and Security: Totally Committed

  4. Merchant Financial services Bank Government Customer Telecoms Personal Information Complicates Things • Multiple interests • Subject • Controller • DPA, government • Different concerns/risks • Different security goals • Need for multilateral security Privacy and Security: Totally Committed

  5. Common Criteria and PETs • Context • Modular security requirements framework • Addresses products and systems • Evaluation and certification • Address SW HW FW • Derives from 20+ years experience (TCSEC, ITSEC) • Security = Functionality + Assurance • Functional requirements “What can the system do to be secure?” • Assurance requirements “What was done to assure that the TOE does what it shall do / does not what it shouldn't do?” • Why use the Common Criteria (CC)? • Accredited evaluation facilities already exist • Evaluations can be recognized by participating countries • Integrate PET evaluation with security evaluation Privacy and Security: Totally Committed

  6. Common Criteria and PETs • Older criteria – no privacy! • ITSEC: “security = integrity, confidentiality and availability” (1991) • Common Criteria FPR class: good… • Privacy requirements (a.k.a. the “Freiburg class”) • Support anonymity, pseudonymity, unobservability (1995-) • …but not enough! • Information collection, use, retention • Non-security requirements • Unlinkability, trust distribution Privacy and Security: Totally Committed

  7. Enhancing the Common Criteria • Derive functional and assurance requirements from FIPs (PETTEP 2001-2002) • One functional family for each Fair Information Practice • Each requirement supports one or more practices • Use abstract properties (Trust, Linkability) to derive functional requirements (IIG Freiburg 1998-1999) • Trust allocation in multiple administrative domains • Unlinkability • Information retention • At the proposal stage – Real world testing is needed Privacy and Security: Totally Committed

  8. Shortcomings of PET Certification • Conflicting requirements • Structured to protect centralized systems • New requirements can be inconsistent with old ones • Trust • Advanced PETs distribute information so that no trustee can abuse it • Distinct administrative domains, awkward to state within the CC • Need to “step out of the box” • Technology is only as good as how it is used • Safeguards can be circumvented or ignored • Information has an inherent strategic value • How to protect a system from its own administrators? Privacy and Security: Totally Committed

  9. PET Evaluation/Certification Costs • Currently evaluated products • Mass-market products • Evaluation paid by the manufacturer • Custom products with special security requirements • Evaluation paid by the customer as part of the contract • Formal evaluation • Very costly • Impractical in patchwork systems • Impractical for consumer products •  Unlikely that formal PET evaluation can be made mandatory in the short term Privacy and Security: Totally Committed

  10. …let’s look at the Management side • Management and process definition can be used to increase personal information protection • How can personal data management be assessed? • Voluntary self-evaluation • U.S. Safe Harbor • Japan Requirements for Personal Information Protection • European Data Protection Laws • Independent assessments Privacy and Security: Totally Committed

  11. IT Security Management Evaluation and Certification – ISO 17799 • Widely used for many years as British Standard 7799 • ISO standardized in 2000 • Part 1: Code of practice • Best practices and application guidelines • Policy, infrastructure, asset control, personnel, physical, communications, access control, development & maintenance, compliance • Part 2: Specification • What requirements are needed for certification • Not yet ISO standard Privacy and Security: Totally Committed

  12. IS17799 and Personal Information • IS17799 has no provision for personal data management • Needs support for privacy requirements • Personal data privacy policy • Accountability • Identification of data protection roles, responsibilities • Management • How and why of personal data lifecycle • Communication • With the data subject and the data protection authority • Challenge Compliance • In development, needs to be tested Privacy and Security: Totally Committed

  13. Pros and Cons of Management Certification • Advantages • Provides assurance on how really the organization is doing in managing the data • Can inform sound management practices • Does not require to evaluate/change installed technology • Drawbacks • Not the perfect solution (e.g. “locked closet” and “dusty shelf” problems of ISO9000) • Done on a per-organization basis • Must be regularly repeated • Cultural resistance Privacy and Security: Totally Committed

  14. Summary • Personal Information Management Evaluation • Integration of COTS • Legacy systems • Data transfer to third parties • how does the system inform the subject about the data transfer? • Definition of system parameters • how long may information be retained? • Privacy Enhancing Technology Evaluation • Enforcement of PDC (Personal data constraints) • Automatic purging • Labeling attributes • Control on processing activities • Must be designed into the product • Does not work well with patchwork systems Privacy and Security: Totally Committed

  15. Conclusions • PETs evaluation / certification can help… • … but management evaluation is equally important! • Could be more effective in the short run • Could help DPAs to assess organizations • Could help organizations with their privacy management needs and problems • Sound process design is fundamental • Acknowledgements: IIG, IFIP WG9.6, Altoprofilo • giac@cc.gatech.edu Privacy and Security: Totally Committed

More Related