17
Common Criteria methodology for Smart Cards and Similar Devices an overview of ISCI achievements ICCC 2012 PARIS 1 ISCI-WG1 - Eurosmart Speaker : Alain Boudou [email protected]

Common Criteria methodology for Smart Cards and … from CC Communities... · Common Criteria methodology for Smart Cards and Similar Devices an overview of ISCI achievements ICCC

Embed Size (px)

Citation preview

Common Criteria methodology for Smart

Cards and Similar Devices

an overview of ISCI achievements

ICCC 2012 PARIS 1

ISCI-WG1 - Eurosmart

Speaker : Alain Boudou

[email protected]

2012 September 18th ICCC 2012 PARIS 2

SOG-IS Mutual Recognition Agreement

Joint Interpretation

Working Group (JIWG)

Smart Card & Similar Devices

Technical Domain

ISCI - WG1

Methodology

(ISCI-WG2) JHAS

Attacks

Supporting

Documents

CCDB

Common Criteria

Recognition Arrangement

2012 September 18th 1CCC 2012 Paris 3

ISCI is a Eurosmart initiative

Continuous improvement of the efficiency and cost effectiveness of the process

Sharing a common objective with JIWG:

Consistent application of the criteria and methods between national schemes

ISCI WG1 Contributors

2012 September 18th ICCC 2012 PARIS 4

ISCI WG1: one common way of working

• A common objective:

efficiency improvement, consistent application

• A concensus on the needs: which direction?

• A concensus on the methods: how to interpret CC?

• An implementation keeping the process applicable

• A common understanding and agreement

expressed in supporting documents

• An environment promoting the emergence of

usefull and applicable PPs

2012 September 18th ICCC 2012 PARIS 5

Smart Cards & Similar Devices Technical Domain

Which is the direction of the technology evolution?

2012 September 18th ICCC 2012 PARIS 6

Embedded SW

on Chip

Applications

on O.S.

on Chip

Over The Air loading of

Applications

on O.S.

on Chip 2 Developers N Developers

Introduction of new actors and new roles

Increased complexity of the lifecycle, i.e. of the supply chain

Multiplication of the on-the-field configurations mixing

secure and non-secure applications

Fast renewal of products (versioning, customization, porting) Optimization

Modification of

the trust model

Modification of the trust model

• Distributed responsibility in the Smart Cards & SD supply chain:

Trust model is a chain of trust.

CC certificates are guarantees along this chain

2012 September 18th ICCC 2012 PARIS 7

Chip

O.S.

Applications

Assets

AGD AVA

AGD AVA

AGD AVA

Loading

Attacks

in

usage

phase composite evaluation

composite evaluation

Modification of the trust model

2012 September 18th ICCC 2012 PARIS 8

Developer

Developer

Certifier

Certifier

Lab

Lab

Developer

Certifier

Lab

Card Issuer

Tru

st c

hain

Su

pply

ch

ain

Usage phase

From …

Modification of the trust model

2012 September 18th ICCC 2012 PARIS 9

Card Issuer

Developer

Developer

Certifier

Certifier

Lab

Lab

Developer

Certifier

Lab

Tru

st c

hain

Su

pply

ch

ain

Usage phase

Secure Appli Provider

Developer

Certifier

Lab

Secure Appli Provider

Other appli providers Other appli providers

TSM

Developer

Suitable protocols

Respect of guidance

for card administration

proof

TO …

Modification of the trust model

2012 September 18th ICCC 2012 PARIS 10

1. A certificate applies to a TOE in a given configuration of the product

2. Application domain separation may suffer exceptions

3. Application may be loaded after the product delivery

4. Application may be unknown at evaluation time

How to manage addition of applications to a certified product

without certificate invalidation ?

Objectives for the TOE

Objectives for the environment

Domain Separation

Verification Secure loading

Load protection

pre-issuance

with

known

applis

2012 September 18th 1CCC 2012 Paris 11

with

applis

unknown

Domain Separation

Verification Secure loading

Load protection

Guidance

Certificate usage restrictions

Risk manager’s responsibility

Secure loading

Guidance

Domain Separation

Verification Secure loading

Load protection with

known

applis

post-issuance

Guidance

Certificate usage restrictions

Risk manager’s responsibility

Secure loading

Addition of other types of applications

Modification of the trust model

• ANSSI Application Note to be JIWG supporting documents

– Certification of « open » smart card products

Requirements for a platform or an application on a platform to be

certfied with various types of applications

• Known / Unknown

• Pre-issuance / Post-issuance

Define the responsibilities of the product risk manager

– Independent certificate

For the specific case where all applications are considered as unknown

2012 September 18th ICCC 2012 PARIS 12

Optimization: mutualization of appli evaluation

2012 September 18th ICCC 2012 PARIS 13

Card Issuer

Developer

Developer

Certifier

Certifier

Lab

Lab

Developer

Certifier

Lab

Tru

st c

hain

Secure Appli Provider

Lab

Certifier

Lab

Certifier

Developer

Lab

Certifier

Developer

Card Issuer

Tru

st c

hain

At this conference: Reuse of evidences and evaluation results

by Carolina Lavatelli

What must

be done?

What could be transfered

for optimization?

Optimization: mutualization of ALC evaluation

2012 September 18th ICCC 2012 PARIS 14

Same Developper

different products

different Labs / Schemes

different development sites

By product ALC evaluation

But some processes are common between sites and between products

Site A

Site B Product 1

Product 2

Mutualization of ALC evaluation

Mutualization of ALC evaluation

Work units (from CEM) are classified (from AIS38)

– Generic: reusable

– Specific: evidences must be checked for each product

Principle

• Site visit

– Generic ALC docs: processes & supporting activities of the site

– Mutualization Report able to be transferred to other Labs

• Product evaluation

– Specific ALC docs reference the used processes / sites

– Evidences for specific work units

– ALC report consolidation from the Mutualization Reports

Benefit

– Avoid redundancy between products and labs

– Different schedules for products and sites

– Homogenization of the ALC treatment between Labs / Schemes

2012 September 18th ICCC 2012 PARIS 15

Harmonization: security of development environment

2012 September 18th ICCC 2012 PARIS 16

Product security policy Info to be kept confidential

Material to be protected against

unauthorized modification

People allowed to access

Site security measures Physical

Logical

Procedural

Personnel

• ALC_DVS Objectives:

– Security measures shall be adequate to provide the integrity and confidentiality

of the TOE design & implementation

– Integrity & confidentiality that is necessary to ensure that secure operation of

the TOE is not compromised

Sufficiency?

Interpretations

by Labs

•Smart Cards & Similar Devices TD

•AVA_VAN.5 •Minimum requirements

•Based on standard practices YES

At this conference: Minimum Site Requirements for the smart secure

device supply chain by J.Noller & W Gutau

18 September 2012 17

The End

Questions?

ICCC 2012 PARIS