Скачать презентацию Computer Science CSC 474 Information Systems Security Topic Скачать презентацию Computer Science CSC 474 Information Systems Security Topic

1fc7f65a50154447da35f62f7bc87d42.ppt

  • Количество слайдов: 35

Computer Science CSC 474 Information Systems Security Topic 5. 2: Evaluation of Secure Information Computer Science CSC 474 Information Systems Security Topic 5. 2: Evaluation of Secure Information Systems CSC 474 Dr. Peng Ning 1

What are Security Criteria? • (User view) A way to define Information Technology (IT) What are Security Criteria? • (User view) A way to define Information Technology (IT) security requirements for some IT products: – Hardware – Software – Combinations of above • (Developer view) A way to describe security capabilities of their specific product • (Evaluator view) A tool to measure the confidence we may place in the security of a product. Computer Science CSC 474 Dr. Peng Ning 2

History of IT Security Criteria Orange Book (TCSEC) 1985 Canadian Criteria (CTCPEC) 1993 Federal History of IT Security Criteria Orange Book (TCSEC) 1985 Canadian Criteria (CTCPEC) 1993 Federal Criteria Draft 1993 UK Confidence Levels 1989 ITSEC 1991 German Criteria Common Criteria v 1. 0 1996 v 2. 0 1998 ISO FDIS 15408 ‘ 99 French Criteria Computer Science CSC 474 Dr. Peng Ning 3

Trusted Computer System Evaluation Criterion (“The Orange Book”) • Issued under authority of and Trusted Computer System Evaluation Criterion (“The Orange Book”) • Issued under authority of and in accordance with Do. D Directive 5200. 28, Security Requirements for Automatic Data Processing (ADP) Systems • Purpose is to provide technical hardware/firmware/software security criteria and associated technical evaluation methodologies in support of overall ADP system security policy, evaluation and approval/accreditation responsibilities promulgated by Do. D Computer Science CSC 474 Dr. Peng Ning 4

Fundamental Computer Security Requirements • What it really means to call a computer system Fundamental Computer Security Requirements • What it really means to call a computer system "secure" • Secure systems control access to information – Only properly authorized individuals, or processes operating on their behalf may: • • Read Write Create Delete • Two sets of requirements: – Four deal with what needs to be provided to control access to information – Two deal with how one can obtain credible assurances that this is accomplished in a trusted computer system Computer Science CSC 474 Dr. Peng Ning 5

Orange Book Classes HIGH SECURITY NO SECURITY • • • A 1 Verified Design Orange Book Classes HIGH SECURITY NO SECURITY • • • A 1 Verified Design B 3 Security Domains B 2 Structured Protection B 1 Labeled Security Protection C 2 Controlled Access Protection C 1 Discretionary Security Protection • D Minimal Protection Computer Science CSC 474 Dr. Peng Ning 6

Functionality v. Assurance • functionality is multidimensional • assurance has a linear progression Computer Functionality v. Assurance • functionality is multidimensional • assurance has a linear progression Computer Science CSC 474 Dr. Peng Ning 7

Orange Book Classes — Unofficial View • C 1, C 2 Simple enhancement of Orange Book Classes — Unofficial View • C 1, C 2 Simple enhancement of existing systems. No breakage of applications • B 1 Relatively simple enhancement of existing systems. Will break some applications. • B 2 Relatively major enhancement of existing systems. Will break many applications. • B 3 Failed A 1 • A 1 Top down design and implementation of a new system from scratch Computer Science CSC 474 Dr. Peng Ning 8

NCSC Rainbow Series — Selected Titles • Orange Trusted Computer System Evaluation Criteria • NCSC Rainbow Series — Selected Titles • Orange Trusted Computer System Evaluation Criteria • Yellow Guidance for Applying the Orange Book • Red Trusted Network Interpretation • Lavender Trusted Database Interpretation Computer Science CSC 474 Dr. Peng Ning 9

Orange Book Criticisms • Mixes various levels of abstraction in a single document • Orange Book Criticisms • Mixes various levels of abstraction in a single document • Does not address integrity of data • Combines functionality and assurance in a single linear rating scale – They are indeed other combinations. Computer Science CSC 474 Dr. Peng Ning 10

International Criteria ORANGE BOOK More Flexibility in Application to Non-Military Use Broader Functionality Broader International Criteria ORANGE BOOK More Flexibility in Application to Non-Military Use Broader Functionality Broader Assurance ITSEC Address Functionality Directly Broader Assurance CTCPEC Broader Functionality Broader Assurance Computer Science CSC 474 Dr. Peng Ning 11

Why New International Criteria? INTERNATIONAL COMPUTER MARKET TRENDS DRIVING FACTORS SECURITY CRITERIA & PRODUCT Why New International Criteria? INTERNATIONAL COMPUTER MARKET TRENDS DRIVING FACTORS SECURITY CRITERIA & PRODUCT EVALUATION MUTUAL RECOGNITION OF SECURITY PRODUCT EVALUATIONS EVOLUTION AND ADAPTATION OF ORANGE BOOK SYSTEM SECURITY CHALLENGES OF THE 90'S A LARGER WORLD-VIEW IS NEEDED Computer Science CSC 474 Dr. Peng Ning 12

CC Project • In Spring 1993, the following governments agreed to develop a “Common CC Project • In Spring 1993, the following governments agreed to develop a “Common Information Technology Security Criteria” – – – Canada France Germany Netherlands UK USA - NIST and NSA • Objectives – Common evaluation methodology – Mutual recognition Computer Science CSC 474 Dr. Peng Ning 13

CC • Three major drafts – v 0. 6 - circulated for comments by CC • Three major drafts – v 0. 6 - circulated for comments by a limited audience in 4/94 – v 0. 9 - Published in 11/94 for public review – v 0. 1 - More definitive version in 2/96 for trial use • CC Version 2. 0 – Accepted as an International Standards Organization (ISO) security standard in 5/98 (ISO International Standard 15408) – US, Canada, France, Germany, and UK officially agreed on mutual recognition in 10/98 Computer Science CSC 474 Dr. Peng Ning 14

Common Criteria (CC) • Part 1: Introduction and General Model – Terminology, derivation of Common Criteria (CC) • Part 1: Introduction and General Model – Terminology, derivation of requirements and specifications, PP & ST Normative • Part 2: Security Functional Requirements – Desired information technology security behavior • Part 3: Security Assurance Requirements – Measures providing confidence that the security functionality is effectively and correctly implemented. Computer Science CSC 474 Dr. Peng Ning 15

Within Scope of CC • Basis for evaluation of security properties of IT products Within Scope of CC • Basis for evaluation of security properties of IT products and systems • Allows independent evaluations to be compared • Addresses protection of information from – unauthorized disclose (confidentiality) – modification (integrity), – loss of use (availability) • Applicable to IT security measures implemented in HW, SW, and firmware. Computer Science CSC 474 Dr. Peng Ning 16

Outside Scope of CC • • Administrative and legal application of CC Administrative security Outside Scope of CC • • Administrative and legal application of CC Administrative security measures Physical aspects of IT security Evaluation methodology Mutual recognition arrangements Cryptographic algorithms Accreditation & certification processes Computer Science CSC 474 Dr. Peng Ning 17

Terminology • Protection profile (PP) • Security target (ST) • Target of evaluation (TOE) Terminology • Protection profile (PP) • Security target (ST) • Target of evaluation (TOE) Computer Science CSC 474 Dr. Peng Ning 18

Protection Profile • Answer the question: – “This is what I want or need. Protection Profile • Answer the question: – “This is what I want or need. ” • Implementation independent • Protection profile authors: – Anyone who wants to state IT security needs (e. g. , commercial consumer, consumer groups) – Anyone who supplies products which support IT security needs – Others (security officers, auditors, accreditors, etc. ) Computer Science CSC 474 Dr. Peng Ning 19

Security Target • Answer the question: – “This is what I have. ” • Security Target • Answer the question: – “This is what I have. ” • Implementation dependent • Security target authors – Product vendors – Product developers – Product integrators Computer Science CSC 474 Dr. Peng Ning 20

PP and ST Examples • PP makes a statement of implementation independent security needs PP and ST Examples • PP makes a statement of implementation independent security needs – A generic OS with DAC, audit, identification and authentication • ST defines the implementation dependent capabilities of a specific product – Microsoft NT 4. 0. 02 (TOE) – Sun OS 4. 7. 4 (TOE) Computer Science CSC 474 Dr. Peng Ning 21

Security Functional Requirements • Security functional requirements describe the security behavior expected of a Security Functional Requirements • Security functional requirements describe the security behavior expected of a TOE and they meet the security objectives as stated in a PP or ST • Their behavior can generally be observed. Computer Science CSC 474 Dr. Peng Ning 22

Functional Requirement Classes • • • Security Audit (FAU) Communication (FCO) Cryptographic Support (FCS) Functional Requirement Classes • • • Security Audit (FAU) Communication (FCO) Cryptographic Support (FCS) User Data Protection (FDP) Identification & Authentication (FIA) Security Management (FMT) Privacy (FPR) Protection of the TOE Security Functions (FPT) Resource Utilization (FRU) TOE Access (FTA) Trusted Path (FTP) Computer Science CSC 474 Dr. Peng Ning 23

Security Functional Requirements Organization Class 1 Family 1 Component 1 Element 1 Class n Security Functional Requirements Organization Class 1 Family 1 Component 1 Element 1 Class n Family n Component n Element 1 Computer Science CSC 474 Element 2 Dr. Peng Ning 24

Definitions • Class – for organizational purposes; all members share a common focus – Definitions • Class – for organizational purposes; all members share a common focus – e. g. , audit • Family – for organizational purposes; all members share security objectives but may differ in emphasis – e. g. , audit event definition, audit event review • Component – contains a set of security requirements. – A component is the smallest selectable requirement set. • Element – members of a component. – Elements cannot be selected individually. Computer Science CSC 474 Dr. Peng Ning 25

Component Hierarchy • Each family contains one or more components • The relationship between Component Hierarchy • Each family contains one or more components • The relationship between components can be either – No relationship, or – A hierarchical relationship • A hierarchical component – Can satisfy a dependency on the component it is hierarchical to – May provide more security than a component it is hierarchical to • Hierarchical components are not selected together. Computer Science CSC 474 Dr. Peng Ning 26

Component Hierarchy Examples FIA_UID User Identification 1 2 Component 2 is hierarchical to component Component Hierarchy Examples FIA_UID User Identification 1 2 Component 2 is hierarchical to component 1. Either 1 or 2 may be selected, but not both. 1 FIA_SAR Security Audit Review 2 3 There are no hierarchical relationship between components 1, 2, and 3. Any combination of them may be selected. Computer Science CSC 474 Dr. Peng Ning 27

Security Assurance Requirements • Grounds for confidence that an IT product or system meets Security Assurance Requirements • Grounds for confidence that an IT product or system meets its security objectives. Computer Science CSC 474 Dr. Peng Ning 28

Assurance Requirement Classes • • • Configuration Management (ACM) Delivery and operation (ADO) Development Assurance Requirement Classes • • • Configuration Management (ACM) Delivery and operation (ADO) Development (ADV) Guidance documents (AGD) Life cycle support (ALC) Tests (ATE) Vulnerability assessment (AVA) Maintenance of assurance (AMA) Evaluation criteria of PP and ST (APE, ASE) Computer Science CSC 474 Dr. Peng Ning 29

Security Assurance Requirements Organization Class 1 Family 1 Component 1 Element 1 Class n Security Assurance Requirements Organization Class 1 Family 1 Component 1 Element 1 Class n Family n Component n Element 1 Computer Science CSC 474 Element 2 Dr. Peng Ning 30

Assurance Packages • Reusable set of functional or assurance components combined together to satisfy Assurance Packages • Reusable set of functional or assurance components combined together to satisfy a set of identified security objectives • Currently, there are 7 assurance packages called Evaluation Assurance Levels (EAL 1 – EAL 7) Computer Science CSC 474 Dr. Peng Ning 31

Evaluation Assurance Levels • • EAL 0 - Inadequate assurance EAL 1 - Functionally Evaluation Assurance Levels • • EAL 0 - Inadequate assurance EAL 1 - Functionally tested EAL 2 - Structurally tested EAL 3 - Methodically tested and checked EAL 4 - Methodically designed, tested and reviewed EAL 5 - Semiformally designed and tested EAL 6 - Semiformally verified designed and tested EAL 7 - Formally verified designed and tested Computer Science CSC 474 Dr. Peng Ning 32

Relationship to TCSEC • With respect to assurance, roughly – EAL 0 and EAL Relationship to TCSEC • With respect to assurance, roughly – EAL 0 and EAL 1 ~ D – EAL 2 ~ C 1 – EAL 3 ~ C 2 – EAL 4 ~ B 1 – EAL 5 ~ B 2 – EAL 6 ~ B 3 – EAL 7 ~ A 1 Computer Science CSC 474 Dr. Peng Ning 33

TCSEC Status and Migration to CC • Kenneth A. Minihan, Director of NSA, signed TCSEC Status and Migration to CC • Kenneth A. Minihan, Director of NSA, signed an Advisory Memorandum in April 1999 – By the end of 2001, all products which were formerly evaluated against the TCSEC will have either become obsolete or, if they have maintained their TCSEC rating and are still in use, will be transitioned to a CC rating. Computer Science CSC 474 Dr. Peng Ning 34

Mutual Recognition • As of 18 October 1999 – US – Canada – France Mutual Recognition • As of 18 October 1999 – US – Canada – France – Germany – Australia – New Zealand – UK Computer Science CSC 474 Dr. Peng Ning 35