130 likes | 336 Views
Common Criteria V3 Overview. Presented to P2600 October 25 2005 Brian Smithson. What have they done!?. Summary Conceptual model Structural changes. Summary of changes. Part 1 More consistent terminology introduced
E N D
Common Criteria V3 Overview Presented to P2600 October 25 2005 Brian Smithson
What have they done!? • Summary • Conceptual model • Structural changes
Summary of changes • Part 1 • More consistent terminology introduced • Changes in the ASE (Security Target Evaluation) and APE (Protection Profile Evaluation) assurance classes • Part 2 • Complicated terms simplified or removed • Concepts simplified and clarified • Underlying model developed • Reduced 11 classes to 6, 67 families to 45, 354 pages to 130
Summary (2) • Part 3 • ASE and APE reorganized and rewritten to give a higher assurance-to-work ratio • ACM/ADO/AGD/ALC classes rearranged with clearer purpose into ALC and AGD • ADV also gives more assurance for less work • ATE updated to reflect the new ADV • ABA merged Strength of Function (SOF) with Vulnerability Analysis (VLA), and merged Misuse (MSU) into AGD • A new class, ACO, deals with composition
Summary (3) • CEM • New CEM is presented according to class, not EAL, and methodology is provided for all components up to EAL5 • EAL1 is now easier • You can do a “low assurance level” PP and ST • Just do SFRs, SARs, no Security Problem Definition
Conceptual model • Security in the operational environment • Security in the development environment • Evaluation
Security in the operational environment • Assets in the operational environment are defined in terms of value to the owners • Key factors: • Risk • Countermeasures
How are these countermeasures evaluated? • Countermeasures must be: • Sufficient (in conjunction with countermeasures in the operational environment) to counter the threats • Correct in that they don’t contain vulnerabilities which could prevent it from working
Sufficiency of the TOE • Starts with a Security Problem Definition: • Assets and threats to those assets • Relevant Organizational Security Policies • Relevant Assumptions about the operational environment • Describe a partwise solution • Solution provided by the TOE • Solution provided by the operational environment • The parts provided by the TOE are Security Functional Requirements (SFRs) • The collection of SFRs is the TOE Security Policy (TSP) • A TOE which fulfills the TSP is sufficient, as long as the TOE has been correctly designed and implemented
Security in the development environment • Correctness of implementation depends on the development environment • Assets in the development environment are defined in terms of value to the developers
Correctness of the TOE implementation • Starts with a Security Problem Definition • Assets (in the development environment) and threats to those assets • Relevant Organizational Security Policies that apply to the development environment • Solutions to the problem are Security Assurance Requirements (SARs) • If all SARs are met, then there is assurance that the TOE is implemented correctly
Evaluation model • Key concepts: • Risk • Countermeasures • Assurance