370 likes | 1.03k Views
FIPS Overview . Larry Wagner Sr. Director of Engineering. What is FIPS?. FIPS (Federal Information Processing Standard) A standard for the protection of valuable and sensitive but unclassified information throughout the government and DOD (Department of Defense). Why is FIPS Important?.
E N D
FIPS Overview Larry Wagner Sr. Director of Engineering
What is FIPS? FIPS (Federal Information Processing Standard) A standard for the protection of valuable and sensitive but unclassified information throughout the government and DOD (Department of Defense) CONFIDENTIAL All Rights Reserved
Why is FIPS Important? • Protection from unauthorized use • Protection of critical security parameters • Prevention of undetected modification • Use of approved security methods • Indication of module operational status • Detection and indication of errors CONFIDENTIAL All Rights Reserved
Who requires FIPS? • All U.S. Federal Agencies • Department of Defense (DOD) • Financial Institutions • Postal Authorities • Adapted by the Canadian and UK Governments • Private sector (encouraged but not required) CONFIDENTIAL All Rights Reserved
Who’s behind the FIPS standard? Cryptographic Module Validation Program (CMVP) • Established by the National Institute of Standards and Technology (NIST) and the Communications Security Establishment (CSE) in 1995 • Oversees the validation testing of cryptographic modules and algorithms • Manages the National Voluntary Accreditation Program (NVLAP) accredited testing laboratories • Issues Validation Certificates • Maintains a list of validated modules and algorithms http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140InProcess.pdf CONFIDENTIAL All Rights Reserved
FIPS Security Levels The FIPS Security Standard (Publication 140-2, aka FIPS 140-2) defines 4 levels of security Level 4 Level 3 Level 2 Increasing Security Level 1 CONFIDENTIAL All Rights Reserved
FIPS Security Levels FIPS Publication 140-2 Level 1 • Very limited requirements • FIPS approved Crypto Module • Allows crypto functions to be done on a PC • No physical security requirements • All components must be “production grade” Example: PC encryption board Increasing Security Level 1: Basic security requirements CONFIDENTIAL All Rights Reserved
FIPS Security Levels FIPS Publication 140-2 Level 2 (industry standard) • Tamper evident seals or locks • Role-based authentication • Stringent Cryptography Algorithms • Allows cryptography in multi-user timeshared systems on a trusted operating system Level 2: Physical Tamper evidence, role based authentication Increasing Security Examples: Network Appliances, secure data storage devices, secure cell phones CONFIDENTIAL All Rights Reserved
FIPS Security Levels FIPS Publication 140-2 Level 3 (less than 7% of all certificates) Examples: STMicro HDD SoC RISC Processor PriviaTech OmniPass Level 3: Enhanced physical security, user based authentication • Attempts to prevent intruders from gaining access to “critical security parameters” • Identity-based authentication • Requires a physical or logical separation between the interfaces by which "critical security parameters" enter and leave the module, and its other interfaces Increasing Security CONFIDENTIAL All Rights Reserved
FIPS Security Levels FIPS Publication 140-2 Level 4 (less than 1% of all certificates) Level 4: Envelope and environmental protection • Must detect & respond to all unauthorized attempts at physical access. • Requires circuitry that zeroizes all plain text critical security parameters (CSPs) when the removable covers/door are opened • Environmental protection for THB (Temperature/Humidity/Bias) Increasing Security Examples: HP – Atalla Crypto Subsystems (ACS) HP – Atalla security processors CONFIDENTIAL All Rights Reserved
FIPS Security Levels FIPS Publication 140-2 (last updated in Dec 2002) Level 4: Envelope and environmental protection < 8% Used for highly sensitive applications (ex. PrivaTechnologies) Level 3: Enhanced physical security, user based authentication Level 2: Physical Tamper evidence, role based authentication Level 1: Basic security requirements CONFIDENTIAL All Rights Reserved
FIPS Security Areas 11 Specific Security Areas • Cryptographic Module Specification • Cryptographic Module ports and interfaces • Roles, services, authentication • Finite state model • Physical security • Operational environment • Cryptographic key management • EMI/EMC Regulatory • Self-Tests • Design Assurance • Mitigation of Attacks CONFIDENTIAL All Rights Reserved
FIPS Requirements Summary CONFIDENTIAL All Rights Reserved
FIPS Certification Process Q1 Q2 Q3 Q4 Q5 Q6 FW & Compatible HW Available Algorithm Testing In-Evaluation Status Design Assessment Source Code Review Operational Testing Report Submission Issuance of Certificate 3-6 mo after submission Challenge • Year long process • Done in parallel with design • Managing the FW issues • HW Design finalization • Common Criteria has a dependency on FIPS CONFIDENTIAL All Rights Reserved
SonicWall and FIPS SonicWall is dedicated to the FIPS program Currently Approved: • TZ 170 running SonicOS 3.1e • PRO 3060 and PRO 4060 running SonicOS 3.1e • SSL-RX running 4.1 In the NIST queue since 2/08 awaiting certificate (in-evaluation status since 9/07): • TZ 180 Series running SonicOS 5.0 • TZ 190 Series running SonicOS 5.0 • NSA E-Class (7500/6500/5500) running SonicOS 5.0 • NSA 3500/4500/5000 running SonicOS 5.0 CONFIDENTIAL All Rights Reserved
Future of SonicWall and FIPS Plans for 2008: • All NSA platforms running SonicOS 5.0 • Maintenance upgrades for SonicOS 5.x and beyond • Assessment of FIPS 140-3. Updated standard to be ratified in 2009. In discussion for 2009: • E-Class SSL-VPN (Aventail) 1H09 submission • Next generation platforms CONFIDENTIAL All Rights Reserved