View
213
Download
0
Tags:
Embed Size (px)
Citation preview
© 1999 SPYRUS
Common Criteria Protection Common Criteria Protection Profiles for PKI ProductsProfiles for PKI Products
Eric RosenfeldEric Rosenfeld
SPYRUSSPYRUS
8 November 19998 November 1999CACR Information Security WorkshopCACR Information Security Workshop
Third-Party Evaluation CriteriaThird-Party Evaluation Criteria
© 1999 SPYRUS
SPYRUSSPYRUS Project Goal Project Goal
Develop a single security evaluation standard against which all major Certificate Issuing and Management System (CIMS) products and service implementations can be evaluated
© 1999 SPYRUS
A Single Evaluation StandardA Single Evaluation Standard
Customers want evaluation of products against a common standard Provides for fair comparison of competing products Use of evaluated products shows due diligence
Benefits vendors Lets all compete on a level playing field Should be usable to evaluate implementations of
service providers Evaluations against “custom criteria” defined
in Security Targets (STs) do not allow comparison of “apples to apples”
© 1999 SPYRUS
Why Use Protection Profiles?Why Use Protection Profiles?
Common Criteria (CC) or Blank Sheet of Paper CC gaining acceptance CC is flexible enough to cover most PKI issues Other CC work in PKI area:
Cloud Cover PPs (UK) SPYRUS PP (Australia) Entrust STs (US, UK, & Canada) NIST security requirements (US)
Protection Profiles (PPs) offer best unbiased description of a technology family
© 1999 SPYRUS
PP Scope Decisions PP Scope Decisions (1 of 4)(1 of 4)
Functions of a CIMS: Required:
Registration Initialization Certification Revocation
Optional (although many products implement): Key generation Key update Cross-certification Certificate revocation notice distribution/publication Certificate usage
© 1999 SPYRUS
PP Scope Decisions PP Scope Decisions (2 of 4)(2 of 4)
System versus Component A Registration Authority is responsible for
assisting in the registration process How the CIMS functions are divided is left up
to the developer of a given CIMS product For example, key generation may be done by the
CA or the RA The PPs do not reject any partitioning of CIMS
functions which result in the security requirements being met
Approach: CA system, because separate CA and RA profiles are not meaningful
© 1999 SPYRUS
PP Scope Decisions PP Scope Decisions (3 of 4)(3 of 4)
Operating System and Hardware: In or Out of Target Of Evaluation (TOE)? Traditionally, TOE included the OS and hardware
This can increase the cost of an evaluation
Use of products developed by other companies means that evaluators may not have access to the required evidence
Approach: Define required OS and hardware features as part of Security Environment/Security Assumptions
Evaluators determine that OS provides required features, by
Reference to an existing evaluation of the OS, or By examining the required OS features themselves
© 1999 SPYRUS
PP Scope Decisions PP Scope Decisions (4 of 4)(4 of 4)
How to Handle Cryptography CC sections on Cryptography are insufficient Approach:
Cryptographic module outside of TOE; must be evaluated against FIPS 140-1 or equivalent standard
This allows vendors to get a single evaluation that is covered by the Mutual Recognition Agreement
Cryptographic modules can then be evaluated in each country using the relevant standards
Potentially some cryptographic functions in TOE (e.g., key distribution)
Have to fit in some CC requirements for these functions
© 1999 SPYRUS
ThreatsThreats
Threat categories: Threats from the CA Threats from privileged users of the system
(System Administrator) Threats from the RA Threats from “incidental bystanders” Threats from attackers on the network Threats from malicious subscribers Threats from developers
© 1999 SPYRUS
IT Security ObjectivesIT Security Objectives
IT Security objectives for the TOE and/or its platform: Identification/Authentication of users Control of access to CIMS resources Audit Object reuse/residual information Correct operation TOE health checks Data confidentiality Data integrity
© 1999 SPYRUS
SPYRUSSPYRUS Approach Approach
Protection Profiles for Four Levels of Products Modeled after FIPS 140-1 structure Increasing Functionality and Assurance
Requirements Designed to meet increasing levels of threat
Level 1: resists no/minimal threats by itself Level 2: resists some threats over network Level 3: resists most network threats; some threats
from malicious local users Level 4: resists most threats from network and local
users
© 1999 SPYRUS
Level 1 Level 1 (1 of 2)(1 of 2)
Not resistant to any significant threat Relies entirely on its Operating System and
Environment for protection FIPS 140-1 level 1 cryptographic module Relatively easy to achieve by developers
who document their processes and procedures
Evaluation should be quick, easy, and inexpensive
© 1999 SPYRUS
Level 1 Level 1 (2 of 2)(2 of 2)
Minimal Functional Security Requirements FAU_GEN.1 Audit data generation FAU_GEN.2 User identity association FAU_SAR.1 Audit review FAU_SAR.2 Restricted audit review FAU_STG.1 Protected audit trail storage FCO_NRO.1 Selective proof of origin FIA_AFL.1 Authentication failure handling FIA_UAU.2 User authentication before any action FIA_UID.2 User identification before any action FMT_SMR.1 Security roles FPT_STM.1 Reliable time stamps
© 1999 SPYRUS
Level 2 Level 2 (1 of 2)(1 of 2)
Resists some threats occurring over the network Relies on its OS and Environment for
protection from all local threats FIPS 140-1 level 2 cryptographic module Achievable by developers today, but
with some additional effort Evaluations should be relatively quick
and relatively inexpensive
© 1999 SPYRUS
Level 2 Level 2 (2 of 2)(2 of 2)
Increased Functional Security Requirements Additions to Level 1:
FAU_SEL.1 Selective audit FDP_ACC.1 Subset access control FDP_ACF.1 Security attribute based access control FDP_IFC.1 Subset information flow control FDP_IFF.1 Simple security attributes FDP_ITT.1 Basic internal transfer protection FDP_ITT.3 Integrity monitoring FMT_MSA.1 Management of security attributes FMT_MTD.1 Management of TSF data FPT_AMT.1 Abstract machine testing
© 1999 SPYRUS
Level 3 Level 3 (1 of 2)(1 of 2)
Resists most threats occurring over the network, and some threats from malicious local users Relies on OS and Environment for protection
from rest of the local threats FIPS 140-1 level 2 cryptographic module Difficult today, but achievable in high
assurance development environments Evaluation should be straightforward, but
will be more time consuming and more expensive
© 1999 SPYRUS
Level 3 Level 3 (2 of 2)(2 of 2)
Increased Functional Security Requirements Additions to Level 2:
FAU_SEL.1 Selective audit FDP_RIP.1 Subset residual information protection FDP_SDI.1 Stored data integrity monitoring FDP_DAU.1 Basic data authentication FDP_ETC.1 Export of user data without security
attributes FDP_ITC.1 Import of user data without security
attributes FTP_TRP.1 Trusted path
© 1999 SPYRUS
Level 4 Level 4 (1 of 2)(1 of 2)
Resists most threats occurring over the network and from local users Minimal reliance on OS and Environment for
protection from local threats FIPS 140-1 level 3 cryptographic module Stretch level; probably not achievable
today, but may be achievable within five years
Evaluation will be complicated, will take many months, and cost a significant amount
© 1999 SPYRUS
Level 4 Level 4 (2 of 2)(2 of 2)
Stringent Functional Requirements Increased from Level 3:
FDP_ACC.2 Complete access control From FDP_ACC.1 Subset access control
FDP_IFC.2 Complete information flow control From FDP_IFC.1 Subset information flow control
FDP_RIP.2 Full residual information protection From FDP_RIP.1 Subset residual information protection
FDP_SDI.2 Stored data integrity monitoring and action
From FDP_SDI.1 Stored data integrity monitoring
Additions to Level 3: FMT_MSA.2 Secure security attributes FMT_MSA.3 Static attribute initialization
© 1999 SPYRUS
Assurance PackagesAssurance Packages
Based on CC Assurance Packages Level 1: Low assurance EAL-1 +
EAL-1 plus ATE_FUN.1, Functional Testing
Level 2: Moderate assurance EAL-3 - All of EAL-3 except ALC_DVS.1,
Identification of Security Measures
Level 3: High assurance EAL-4 EAL-4 (no additions or subtractions) Also recommend ADV_INT.1, Modularity
Level 4: Advanced assurance EAL-6 - All of EAL-6 except AVA_CCA.2,
Systematic Covert Channel Analysis
© 1999 SPYRUS
StatusStatus
Second draft of PPs completed 15 March 99
Sent for review to interested parties: Microsoft SAIC Entrust NIST NSA
Interaction and feedback Comments generally positive
© 1999 SPYRUS
Future PlansFuture Plans
Proposing an ANSI X9 New Work Item Register PPs with NIAP (NIST/NSA) once
registration process is developed Gain international acceptance
© 1999 SPYRUS
Getting the DocumentsGetting the Documents
Documents available at: http://www.spyrus.com/documents/index.html
© 1999 SPYRUS
For more informationFor more information
(408) 327-1901(408) 327-1901Santa Clara, CASanta Clara, CA
[email protected]@spyrus.com
http://www.spyrus.comhttp://www.spyrus.com