79

CACR CC Briefing

  • Upload
    elie

  • View
    52

  • Download
    2

Embed Size (px)

DESCRIPTION

CACR CC Briefing. Stephen Booth Computer and System Security Section Communications Security Establishment Stephen [email protected]. Presentation Objectives. I intend to provide: an overview of the CC Project the Current Status of the CC and CEM a description of the CC MRA - PowerPoint PPT Presentation

Citation preview

Page 1: CACR CC Briefing
Page 2: CACR CC Briefing

CACR CC Briefing

Stephen Booth

Computer and System Security Section

Communications Security Establishment

Stephen [email protected]

Page 3: CACR CC Briefing

November 8, 1999 CACR Briefing 3

Presentation Objectives

• I intend to provide:– an overview of the CC Project– the Current Status of the CC and CEM– a description of the CC MRA– a high level description of the CC - how it is

structured– a description of the Canadian CC Scheme

Page 4: CACR CC Briefing

November 8, 1999 CACR Briefing 4

Terms Used• CC - Common Criteria• CCEF - (CCE Approved) CC Evaluation Facility• CCS - Canadian CC Evaluation and Certification Scheme• CEM - Common Evaluation Methodology• EAL - Evaluation Assurance Level• MRA Mutual Recognition Arrangement• PP - Protection Profile ( what the buyer needs)• ST - Security Target ( what the vendor has)• TOE - Target of Evaluation (the product)• TSF - TOE Security Functions

Page 5: CACR CC Briefing

November 8, 1999 CACR Briefing 5

CC PPs and STs/TOEsProtection Profile

(What I Need)

Target of Evaluation(the Product)

Security Target(What I Have)

Customer

Vendor

Page 6: CACR CC Briefing

November 8, 1999 CACR Briefing 6

History of Evaluation Criteria• ‘83/85: Trusted Computer System

Evaluation Criteria (TCSEC) • ‘91: Information Technology Security

Evaluation Criteria (ITSEC)• ‘93: Canadian Trusted Computer

Evaluation Criteria (CTCPEC)• ‘96: Common Criteria (CC)

Page 7: CACR CC Briefing

November 8, 1999 CACR Briefing 7

TCSEC• Trusted Computer System Evaluation

Criteria (orange book) DoD 5200.28-STD, December 1983

• Four trust rating divisions (classes): – D, C (C1, C2), B (B1, B2, B3), A (A1)

• Three basic requirements:• specific security functionality requirement• assurance requirement• documentation requirement

Page 8: CACR CC Briefing

November 8, 1999 CACR Briefing 8

ITSEC• Information Technology Security Evaluation

Criteria (France, Germany, Netherlands and UK) v1.2, 1991

• focus is on assurance regardless of functionality

• product evaluated to perform as indicated in documentation

Page 9: CACR CC Briefing

November 8, 1999 CACR Briefing 9

CTCPEC• Canadian Trusted Computer Product

Evaluation Criteria, Version 3.0, Jan. 1993• two types of requirements are delineated:

• functionality requirements

• assurance requirements (T-0 to T-7)

• functionality: four policy-oriented criteria - Confidentiality, Integrity, Availability and Accountability

Page 10: CACR CC Briefing

November 8, 1999 CACR Briefing 10

Common Criteria (CC)• Common Criteria Version 1.0 (CC) 31 Jan 1996• aligned the evaluation criteria of nations (ie. TCSEC,

FC (USA), CTCPEC (Canada), ITSEC (Europe), ISO)• compatible with existing evaluation criteria• one product evaluated against it (Milkyway Black Hole

firewall)• CC version 2.0 (May 1998) now superceded by• CC Version 2.1 which is identical to ISO 17408

Page 11: CACR CC Briefing

November 8, 1999 CACR Briefing 11

CEM

• What is the CEM?

– Common Methodology for information technology security evaluation

– An common understanding of what the CC assurance requirements mean and the minimum work necessary to satisfy them

– Supports mutual recognition of evaluation results

Page 12: CACR CC Briefing

November 8, 1999 CACR Briefing 12

Purpose of the CEM

• Defines specific evaluator work units• Common approach to satisfying assurance

requirements defined in CC Part 3• Primary audience is evaluators and certifiers

overseeing evaluator work• Counter balances commercial pressures to

reduce evaluation effort

Page 13: CACR CC Briefing

November 8, 1999 CACR Briefing 13

Progress to date on the CEM

• Part 1, Introduction and general model, release January 97

• Part 2, Evaluation methodology, first released January 99 (ver 0.6) (1003 comments received)

• Part 2, re-released, August 99 (ver 1.0)

– Incorporated large majority of comments

• Working document for next 12 to 18 months

• MRA requirement to use for evaluations commencing Jan 2000

Page 14: CACR CC Briefing

November 8, 1999 CACR Briefing 14

Future work on the CEM• Methodology for augmentations beyond predefined

assurance packages

• Evaluations need not be performed using pre-define assurance packages

• Methodology for maintenance of certificates

• How to extend evaluation results to future releases

• Methodology for high assurance requirements

• Current CEM covers assurance requirements in low to medium assurance category

Page 15: CACR CC Briefing

November 8, 1999 CACR Briefing 15

Mutual Recognition Arrangement

• attempted to document a “gentleman’s agreement” to accept each others evaluation results

• started as an agreement but that meant it was staffed and signed as an international treaty

• fundamental concept of the CC project

• if there is no effective MRA then the CC project has failed!

Page 16: CACR CC Briefing

November 8, 1999 CACR Briefing 16

What do we need for MRA?

• Common and agreed upon standard

• Common and agreed upon evaluation methodology

• Trust / comfort that the other signatories are doing things if not the same way then at least in a consistent way

• Willingness of all the partners to take some risks

Page 17: CACR CC Briefing

November 8, 1999 CACR Briefing 17

What do we have that let us sign MRA?

• CC

• CEM

• require evaluation facilities to be accredited to ISO 25

• require CBs to meet the requirements of ISO 65

• Technical discussion group that meets to talk about how each of our schemes work

• a commitment to undergo voluntary periodic assessments

• Are we all totally comfortable?

Page 18: CACR CC Briefing

November 8, 1999 CACR Briefing 18

What do we have that let us sign MRA?

• Risk takers and mitigation steps

– accepted each other “on faith” and before CEM was completed

– we accept EAL 1 to 4 for now

• a commitment to make MRA and the CC project work

Page 19: CACR CC Briefing

November 8, 1999 CACR Briefing 19

MRA Signing

• Arrangement on the Mutual Recognition of Common Criteria Certificates in the Field of Information Technology Security

– signed October 8,1998

– Germany, UK, Canada, US and France

– expanded this year (September )to include the Australasian Scheme

Page 20: CACR CC Briefing

November 8, 1999 CACR Briefing 20

What does it mean?

• Extracts from the MRA document

Page 21: CACR CC Briefing

November 8, 1999 CACR Briefing 21

MRA Future

• expand both signatories and scope ( >EAL 4)

• initiatives underway to expand to Europe

• work on CEM for higher assurance levels

• stepping up the schedule of “voluntary assessments”

Page 22: CACR CC Briefing

November 8, 1999 CACR Briefing 22

CC Document Structure

• Part 1 Introduction and general model

• Part 2 Security functional requirements

• Part 3 Security assurance requirements

Page 23: CACR CC Briefing

November 8, 1999 CACR Briefing 23

CC Part 1

• Introduction to the rest of the documents

• A general model of evaluation

• Common Criteria evaluation results

• Structure for expressing requirements and specifications

Page 24: CACR CC Briefing

November 8, 1999 CACR Briefing 24

CC Part 2

• Class, family, and component structure

• Operations

• Catalogue of functional requirements

• Application notes (housed in a separate volume)

Page 25: CACR CC Briefing

November 8, 1999 CACR Briefing 25

CC Part 3• Assurance requirements of the criteria:

– CC Assurance Paradigm

– Evaluation criteria for PPs (Class APE)

– Evaluation criteria for STs (Class ASE)

– Catalogue of assurance requirements

– Evaluation assurance levels (EALs)

Page 26: CACR CC Briefing

CC Functionality

Page 27: CACR CC Briefing

November 8, 1999 CACR Briefing 27

Functional Requirements

• Describe the desired security behavior of the TOE

• Intended to protect confidentiality, integrity and availability of assets, as required

• May be customized for inclusion in a PP/ST

Page 28: CACR CC Briefing

November 8, 1999 CACR Briefing 28

ComponentComponent

Requirements Structure Class

FamilyFamily

ElementElement

FamilyFamily

ElementElement

ComponentComponent

Page 29: CACR CC Briefing

November 8, 1999 CACR Briefing 29

Interpreting Functional Requirement Names

FIA_UID.1.2

F=FunctionalA=Assurance

SpecificClass

FamilyName

ComponentNumber

ElementNumber

Page 30: CACR CC Briefing

November 8, 1999 CACR Briefing 30

CC Functional Classes (1)

• Security audit (FAU)

• Communication (FCO)

• Cryptographic support (FCS)

• User data protection (FDP)

• Identification and authentication (FIA)

• Security management (FMT)

Page 31: CACR CC Briefing

November 8, 1999 CACR Briefing 31

CC Functional Classes (2)

• Privacy (FPR)

• Protection of the TOE Security Functions (FPT)

• Resource utilisation (FRU)

• TOE access (FTA)

• Trusted path/channels (FTP)

Page 32: CACR CC Briefing

November 8, 1999 CACR Briefing 32

Functional Components

• It is the collection of functional components in a PP/ST that defines the functionality

• Each component contains a list of evaluatable statements, called “elements”

• All elements must be successfully evaluated within a component

Page 33: CACR CC Briefing

November 8, 1999 CACR Briefing 33

FIA: Identification and authentication

• Addresses requirements for functions to establish and verify a claimed user identity

• FIA deals with:– user identification and authentication– authentication failures– user attributes (e.g., clearances, roles)– constraints on quality of authentication data

(e.g. minimum password size)

Page 34: CACR CC Briefing

November 8, 1999 CACR Briefing 34

Selected FIA families

• FIA_UID: User identification

• FIA_UAU:User authentication

• FIA_SOS: Specification of secrets

Page 35: CACR CC Briefing

November 8, 1999 CACR Briefing 35

FAU: Security Audit

• Security auditing involves recognising, recording, storing, and analysing information related to security relevant events.

• Post event examination of which security events took place, and which user (if applicable) is responsible.

Page 36: CACR CC Briefing

November 8, 1999 CACR Briefing 36

Selected FAU families

• FAU_GEN: Security Audit Data Generation• FAU_SEL: Security Audit Event Selection• FAU_STG: Security Audit Event Storage• FAU_SAR: Security Audit Review• FAU_SAA: Security Audit Analysis

Page 37: CACR CC Briefing

November 8, 1999 CACR Briefing 37

FMT: Security Management

• management of TSF data (e.g. banners)• management of security attributes (ACL’s)• management of functions of the TSF (e.g.

selection of functions, setting rules, etc.)• definition of security roles

Page 38: CACR CC Briefing

November 8, 1999 CACR Briefing 38

Selected FMT families

• FMT_MSA: Management of Security Attributes– attribute: used for enforcement of TSP

• FMT_MTD: Management of TSF Data– data: created by and for the TOE

• FMT_SMR: Security Management Roles

Page 39: CACR CC Briefing

November 8, 1999 CACR Briefing 39

FCO:Communications

• Address the functions that are concerned with assuring the identity of a party participating in a data exchange– proof of origin – proof of receipt

Page 40: CACR CC Briefing

November 8, 1999 CACR Briefing 40

FCO Families

• FCO_NRO: Non-repudaition of origin• FCO_NRR: Non-repudiation of receipt

Page 41: CACR CC Briefing

November 8, 1999 CACR Briefing 41

FDP: User data protection• Specifies requirements for policies and functions related

to user data protection• FDP deals with:

– security function policies for user data protection (access control, information flow)

– forms of user data protection– off-line storage, import and export– inter-TSF communication

Page 42: CACR CC Briefing

November 8, 1999 CACR Briefing 42

Selected FDP families

• FDP_ACC: Access control policy

• FDP_ACF: Access control functions

• FDP_RIP: Residual information protection

• FDP_ROL: Rollback

• FDP_SDI: Stored data integrity

Page 43: CACR CC Briefing

November 8, 1999 CACR Briefing 43

FPR: Privacy• Addresses those functions that protect

against discovery and misuse of identity by others

Page 44: CACR CC Briefing

November 8, 1999 CACR Briefing 44

FPR Families• FPR_ANO: Anonymity

• FPR_PSE: Pseudonymity

• FRP_UNL: Unlinkability

• FPR: Unobservability

Page 45: CACR CC Briefing

November 8, 1999 CACR Briefing 45

FRU: Resource utilization

• Supports the availability of required resources (processing capability, storage capacity)

• FRU deals with:– fault tolerance– prioritization of services– resource allocation

Page 46: CACR CC Briefing

November 8, 1999 CACR Briefing 46

Selected FRU family

• FRU_RSA: Resource allocation

Page 47: CACR CC Briefing

November 8, 1999 CACR Briefing 47

FPT: Protection of the TOE Security Functions

• 3 significant portions of the TSF:– abstract machine

• what does the TOE “sit upon”

– implementation• the mechanisms that enforce the TSP

– TSF data• the transient rules and data of the TOE

Page 48: CACR CC Briefing

November 8, 1999 CACR Briefing 48

Selected FPT families

• FPT_FLS: Fail Secure• FPT_RCV: Trusted Recovery• FPT_RVM: Reference Mediation• FPT_SEP: Domain Separation

Page 49: CACR CC Briefing

November 8, 1999 CACR Briefing 49

FTA: TOE Access

• Addresses functional requirements for controlling the establishment of a user’s session

Page 50: CACR CC Briefing

November 8, 1999 CACR Briefing 50

FTA Families

• FTA_LSA: Limitation on scope of slectable attributes

• FTA_MCS: Limitation on multiple concurrent sessions

• FTA_SSL: Session locking

• FTA_TAB: TOE Access banners

• FTA_TAH: TOE Access history

• FTA_TSE: TOE Session establishment

Page 51: CACR CC Briefing

November 8, 1999 CACR Briefing 51

FTP:Trusted Path/Channels

• Addresses functional requirements for – trusted communications path between users

and the TSF and– trusted channel between TSF and other

trusted IT products

Page 52: CACR CC Briefing

November 8, 1999 CACR Briefing 52

FTP Families

• FTP_ITC: Inter TSF trusted channel• FTP_TRP: Trusted path

– a direct path between users and the TSF

Page 53: CACR CC Briefing

November 8, 1999 CACR Briefing 53

FCS: Cryptographic support• Addresses TOEs which employ cryptographic

functionality• FCS deals with:

– cryptographic key generation, distribution, access and destruction

– cryptographic operations performed by the TOE (e.g., encryption, decryption, digital signatures, checksums, secure hash, etc.)

Page 54: CACR CC Briefing

November 8, 1999 CACR Briefing 54

FCS families

• FCS_CKM: Cryptographic key management

• FCS_COP: Cryptographic operation

Page 55: CACR CC Briefing

November 8, 1999 CACR Briefing 55

FCS_CKM: Cryptographic key management (1)

• This family supports the management of cryptographic keys throughout their life cycle

• Each of the components allow for claims to be made that particular standards are met

• FCS_CKM.1 requires that the TSF generate cryptographic keys; operations are completed for the key generation algorithm and key size

Page 56: CACR CC Briefing

November 8, 1999 CACR Briefing 56

FCS_CKM: Cryptographic key management (2)

• FCS_CKM.2 defines how the TSF distributes cryptographic keys (operations)

• FCS_CKM.3 specifies the types of cryptographic access (with associated methods) employed by the TSF (operations)

• FCS_CKM.4 defines how the TSF destroys cryptographic keys (operations)

Page 57: CACR CC Briefing

November 8, 1999 CACR Briefing 57

FCS_COP: Cryptographic operation (1)

• This family contains only one component: FCS_COP.1

• This family identifies which cryptographic operations (e.g., data encryption, digital signature) are performed by the TOE, and using which cryptographic algorithms, and key sizes

Page 58: CACR CC Briefing

November 8, 1999 CACR Briefing 58

FCS_COP: Cryptographic operation (2)

• Although strength of cryptographic algorithms is outside the scope of the CC, the correct implementation of the cryptographic algorithms must still be verified by the evaluator

Page 59: CACR CC Briefing

November 8, 1999 CACR Briefing 59

CC Assurance

• Configuration Management

• Delivery & Operation

• Development

• Guidance Documents

• Life Cycle Support

• Tests

• Vulnerability Assessment

Page 60: CACR CC Briefing

November 8, 1999 CACR Briefing 60

Different Levels of Assurance

• The CC Provides for 7 different “Evaluation Assurance Levels” (EALs)– Starts at EAL1 (Low Assurance)– EAL3 & EAL4 (Medium Assurance)– EAL5 & EAL6 (High Assurance)– EAL7 (State of the Art)

Page 61: CACR CC Briefing

Assurance Class AssuranceFamily

Components

EAL1 EAL2 EAL3 EAL4 EAL5 EAL6 EAL7Configuration ACM_AUT 1 1 2 2Management ACM_CAP 1 2 3 4 4 5 5

ACM_SCP 1 1 2 2 2 3Delivery & ADO_DEL 1 1 2 2 2 3Operation ADO_IGS 1 1 1 1 1 1 1

Development ADV_FSP 1 1 1 2 3 3 4ADV_HLD 1 2 2 3 4 5ADV_IMP 1 2 3 3ADV_INT 1 2 3ADV_LLD 1 1 2 2ADV_RCR 1 1 1 1 2 2 3ADV_SPM 1 3 3 3

Guidance AGD_ADM 1 1 1 1 1 1 1documents AGD_USR 1 1 1 1 1 1 1

Life cycle support ALC_DVS 1 1 1 2 2ALC_FLR (Flaw remediation procedures )ALC_LCD 1 2 2 3ALC_TAT 1 1 3 3

Tests ATE_COV 1 2 2 2 3 3ATE_DPT 1 1 2 2 3ATE_FUN 1 1 1 1 2 2ATE_IND 1 2 2 2 2 2 3

Vulnerability AVA_CCA 1 2 2assessment AVA_MSU 1 2 2 3 3

AVA_SOF 1 1 1 1 1 1AVA_VLA 1 1 2 3 4 4

Page 62: CACR CC Briefing

November 8, 1999 CACR Briefing 62

Objective of EAL 1• Security requirements are traced into the design

• testing verifies behavior is as expected

• This provides assurance because;

– if a product behaves IAW with security requirements, and

– if security requirements are effective to solve security problem, then

– product will effectively solve security problem

Page 63: CACR CC Briefing

November 8, 1999 CACR Briefing 63

Why EAL 1 is considered basic• So little is known about the product’s design

– correct behavior does not mean vulnerability free• Nothing is known about the development process

– poor development practices often means poor security, or

– good security cannot be assured in the absence of good development practices

Page 64: CACR CC Briefing

November 8, 1999 CACR Briefing 64

EAL1 versus EAL3

• EAL1 (Low Assurance)

– “Functionally Tested”

– Given a product with Installation, Admin & User Guides.

– Does it do what the Guides said it would?

• EAL3 (Medium Assurance)

– EAL1 plus…

– High Level Design

– Test Plan, Procedures, Results, Coverage, Depth, Independent

– Misuse, SOF, Obvious Vulnerabilities

Page 65: CACR CC Briefing

November 8, 1999 CACR Briefing 65

Canadian Common Criteria Evaluation and Certification

Scheme

Page 66: CACR CC Briefing

November 8, 1999 CACR Briefing 66

CCS Purpose• To provide a cost effective, expandable IT

security evaluation capability in Canada• ensure quality of evaluations• improve availability of evaluated products• improve efficiency and cost effectiveness of

evaluation and certification processes

Page 67: CACR CC Briefing

November 8, 1999 CACR Briefing 67

CCS Framework

• SCC Accreditation of IT E&T Facilities• CSE Approval of CCS ITSEFs >>CCEFs• CCEFs will Evaluate IT products• CSE will Certify CCEF results

Page 68: CACR CC Briefing

November 8, 1999 CACR Briefing 68

General requirements for the Competence of Calibration& Testing Laboratories: ISO Guide 25, CAN-P-4

A Framework for Commercial ITS Evaluation and Testing

• Basic Quality System• Management Structure • Documented Procedures

Page 69: CACR CC Briefing

November 8, 1999 CACR Briefing 69

General requirements for the Competence of Calibration& Testing Laboratories: ISO Guide 25, CAN-P-4

Guidelines for the Accreditation of ITS Evaluation and Testing Facilities (CAN-P-1591)

A Framework for Commercial ITS Evaluation and Testing

• ITS Knowledge and Skills

Page 70: CACR CC Briefing

November 8, 1999 CACR Briefing 70

General requirements for the Competence of Calibration& Testing Laboratories: ISO Guide 25, CAN-P-4

Guidelines for the Accreditation of ITS Evaluation and Testing Facilities (CAN-P-1591)

A Framework for Commercial ITS Evaluation and Testing

CC Based

Product(Phase I)

and

System(Phase II)

Evaluationsand

Certifications

•The Canadian CCS will be the first program to build on this “foundation” in Canada

Page 71: CACR CC Briefing

November 8, 1999 CACR Briefing 71

General requirements for the Competence of Calibration& Testing Laboratories: ISO Guide 25, CAN-P-4

SecureElectronicBusinessTesting /

Approvals?

SystemVulnerability

Analysis?

BiometricTesting /

Approvals?CBA

Testing?

Guidelines for the Accreditation of ITS Evaluation and Testing Facilities (CAN-P-1591)

A Framework for Commercial ITS Evaluation and Testing

CC Based

Product(Phase I)

and

System(Phase II)

Evaluationsand

Certifications

PKI Certificate

PolicyApprovals?

Page 72: CACR CC Briefing

November 8, 1999 CACR Briefing 72

CSE as the Certification Body

• approve prospective CCEFs• provide advice & guidance to the CCEFs• monitor the conduct of evaluations• certify conformance of evaluation results• provide international liaison - the MRA

Page 73: CACR CC Briefing

November 8, 1999 CACR Briefing 73

Certification - 3 Pillars

• Performance of Evaluator Activities– Independently perform & compare

• Observation of Evaluator Activities– First hand observe Evaluator Activities

• Examination of Evaluation deliverables– Approval of final results (e.g. ETR, PCR)

Page 74: CACR CC Briefing

November 8, 1999 CACR Briefing 74

The Big PictureVendor CCEF CCS Consumer

Produces Evaluates Certifies Acquires

IT Product& ST

IT Product& ST

EvaluationResults

Security &Assurance

Page 75: CACR CC Briefing

November 8, 1999 CACR Briefing 75

Summary

• IT Products Evaluated by a Trusted & Qualified 3rd Party are of Value.

• The CC is the New World Standard (ISO 15408)

• The CCS and the CCEF’s are here today to help you acquire Security and Assurance.

Page 76: CACR CC Briefing

November 8, 1999 CACR Briefing 76

Points of Contact / Info

• CSE & CCS: http://www.cse-cst.gc.ca

• SCC: http://www.scc.ca/palcan/itset.html

• EWA: http://www.ewa-canada.com/

– has evaluated at EAL1 http://www.signal9.com/

• LGS/Domus: http://www.domus.com/itss/

– is evaluating http://www.winmagic.com/product.html

• CGI: http://www.cgi.ca/e/solutions/expertise/infosecurity/

– has evaluated at EAL1 http://www.entrust.com/truedelete/index.htm

Page 77: CACR CC Briefing

November 8, 1999 CACR Briefing 77

Links• Common Criteria Support Environment

– ccse.cesg.gov.uk/

• Protection Profiles - WEB site

– www.radium.ncsc.mil/tpep/library/protection_profiles

– csrc.nist.gov/cc/pp/pplist.htm

– www.cesg.gov.uk/cchtml/ippr/

• CC Resource WEB sites

– http://www.cse.dnd.ca/cse/english/cc.html

– ftp://ftp.cse.dnd.ca/pub/criteria

– http://csrc.nist.gov/cc

Page 78: CACR CC Briefing

November 8, 1999 CACR Briefing 78

CSE Approved CCEFs CGI Information Systems and Management Consultants Inc. • POC: Mr Andrew Pridham Tel: (613) 234-2155• E-mail: [email protected]

DOMUS ITSL, a division of LGS Group Inc. • POC: Mr Bill Dziadyk Tel: (613) 230 - 6285• E-mail: [email protected]

EWA - Canada Ltd, • POC: Mr Paul Zatychec Tel: (613) 230 - 6067 Ex. 227• E-mail: [email protected]

Page 79: CACR CC Briefing

November 8, 1999 CACR Briefing 79

Questions?