140 likes | 279 Views
IT SECURITY EVALUATION ACCORDING TO HARMONIZED AND APPROVED CRITERIA. Roland Mueller T ÜViT, Inc. 8716 North Mopac Austin, TX 78731 phone: (512) 795-0494 email: roland@tuvit.net URL: http:\www.tuvit.net. Presentation Plan. History of Harmonization Evaluations within QM Scheme
E N D
IT SECURITY EVALUATION ACCORDING TO HARMONIZED AND APPROVED CRITERIA Roland Mueller TÜViT, Inc. 8716 North Mopac Austin, TX 78731 phone: (512) 795-0494 email: roland@tuvit.net URL: http:\\www.tuvit.net
Presentation Plan • History of Harmonization • Evaluations within QM Scheme • Characteristics of an Evaluation Process • Main Goal of an Evaluation • Types of Evaluations • Scaled Security • Basic Approach • Evaluated IT Components / Systems
Orange Book (TCSEC) 1985 Canadian Criteria (CTCPEC) 1993 UK Confidence Levels 1989 Federal Criteria Draft 1993 Common Criteria 1998ISO/IEC 15408 ITSEC1991 German Criteria 1989 French Criteria 1989 HISTORY OF HARMONIZATION
EVALUATIONS WITHIN THE QM-SCHEME TGA Certificate Accreditation Body(EN 45002/3) Evaluation Body(EN 45001) Certification Body(EN 45011) Manufacturer/Product( ISO 9001)
CHARACTERISTICS OF AN EVALUATION PROCESS Impartiality Objectivity Repeatability Reproducibility
MAIN GOAL OF AN EVALUATION CONFIDENCE in implemented Security Measures
collaterally afterwards Re-Evaluation TYPES OF EVALUATIONS
SCALED SECURITY Security Functionality technical security measures designed with a specific security purpose Assurance Level confidence in the correctness of the security functionality Effectiveness Level confidence in the robustness of the security functionality
Integrity Confidentiality Availability SECURITY FUNCTIONALITY (I): DEFINITION
Generic Headings I&A Access Control Accountability ... ITSEC CC SECURITY FUNCTIONALITY (II): PRESENTATION FunctionalRequirements (Part II) • modular • hierarchical • dependencies • or • manufacturer requirements
ITSEC CC ASSURANCE LEVEL E6EAL7 E5EAL6 E4EAL5 E3EAL4 formallyverifieddesignandtested E2EAL3 semi-formallyverifieddesign andtested E1EAL2 semi-formallydesignedandtested methodically designed,tested and reviewed methodically tested andchecked EAL1 structurally tested functionally tested
EFFECTIVENESS LEVEL protection against casual breach basic protection against straightforward or intentional breach medium protection against deliberatelyplanned or organized breach high
BASIC APPROACH Security Target(Protection Profile) Installation Tests Configuration Specification Start Up Design Security Analyses Operation Implementation Operational Environment Development Environment
EVALUATED IT COMPONENTS / SYSTEMS • Smart card Operating Systems (E3 - E4, high) • PC Security Products (E1, basic - E3, high) • Smart card Readers (E1 - E2, basic) • Personalization Systems (E2, medium) • Security Modules (E3, high) • Security Controller (Chip-Hardware) (E4, high) • Technical Components According to SigG (E2, high / E4, high) • ... „TÜViT History“