BSI - Federal Office for Information Security. Evaluation and Certification of IT Security Technology in Germany
|
|
|
- Lindsay Daniel
- 9 years ago
- Views:
Transcription
1 Bernd Kowalski Folie 1 BSI - Federal Office for Information Security Evaluation and Certification of IT Security Technology in Germany The BSI - History, Tasks and Services Product Certification Common Criteria Role of Certification in Public Acquisition Future Market Requirements Bernd Kowalski Bundesamt für Sicherheit in der Informationstechnik (BSI) Federal Office for Information Security
2 Bernd Kowalski Folie 2 Office History and Structure History and Figures Office founded by law in Associated with the Federal Ministery of Interior. Annual budget: 45 Mio. Employees: 380. Location: Bonn. The BSI is the German Federal IT Security Authority associated with national and international partners in the field of Cryptography, Internet-Security and Certification.
3 Bernd Kowalski Folie 3 Tasks and Services Tasks by Law Analysis of IT-threats and -risks. Improve national IT-Security in cooperation with industry. Security Evaluation and Certification of IT systems. Provide the protection of classified information. Operation of central security services like Keymanagement.
4 Bernd Kowalski Folie 4 Tasks and Services BSI as a part of the national IT-Security Environment Federal Government Suppliers Directives National IT-Infrastructure Deliverables Services Initiatives Citizens, Public Sector, Industry Partners
5 Bernd Kowalski Folie 5 Services: Tasks and Services Citizens Webportal service information about Internet security issues (consuming IT-Security) Gov`t & Industry: (consuming IT-Security) baseline security standard Grundschutz, for corporate IT-infrastructures with medium-level requ. Critical Information Infrastructure Protection: provide means for extraordinary security events. Warning & Alerting services in case of security events: Federal-CERT serving the German Federal Gov`t. Devices & services to protect classified communication in gov`t & industry. Counter-eavesdropping services&standards for Fed.Gov`t, incl. physical -, emission -, mobile security Manufacturers & Service Prov`s: (offering IT-Security) Security Certification&Approval of IT-Products&Systems
6 Bernd Kowalski Folie 6 Objectives Product Certification Evaluation of security features of IT-Products. Improve both security and quality of IT-infrastructures. Independant and trustworthy product evaluation and certification. Consideration of national security requirements. Strategic support for national IT-Security industry. Legal Framework BSI is the national authority for the German certification scheme. No general legal obligation to purchase certified products. Except: approval of products for the processing of classified information, and special regulated areas.
7 Bernd Kowalski Folie 7 Product Certification Why should manufactures apply for a certificate? Improve product quality and security. Use public product certificate for product marketing. Government requirements in certain areas: German Signature Law, EU- and NATO-Directives etc. Why should Buyers request for a certified product? Product has been evaluated by an independant, accredited body. Manufacturer is responsible for evaluation expenses not the buyer. Certificate may help to provide evidence for resistance against certain threats.
8 Bernd Kowalski Folie 8 Product Certification History S Kriterien für die Bewertung der Sicherheit von Systemen der Informationstechnik (ITSEC) Juni 1991 Certification Criteria 1985: US-Orange Book IT-Security acquisition requirements from the US DoD for special systems. 1989: The BSI Greenbook for Germany. 1991: European Information Technology Security Evaluation Criteria (ITSEC). Common Criteria for Information Technology Security Evaluation Part I: Introduction and general model May 1998 Version 2.0 CCIB : Common Criteria (CC) V2.1 - the first agreed international certification standard published under ISO/IEC 15408
9 Zertifizierende und anerkennende Nationen Kanada Australien/ Neuseeland Deutschland Großbritannien USA DCSSI Frankreich CSE BSI CESG NIAP DSD NITE/IAP Japan Common Criteria CCRA Czech. Republik Anerkennende Nationen Ungarn Finnland Griechenland Niederlande Norwegen Schweden Östereich Türkei Bernd Kowalski Folie 9 Israel Italien Spanien
10 Bernd Kowalski Folie 10 Product Certification Contributors in the Certification procedure Manufacturer: requests for a certificate provides complete product documentation Evaluation Facility: design evaluation, penetration tests audits in development and production evaluation report to certification body Certification body: develop certif. criteria together with CCRA-partners accept evaluation report, issue product certificate
11 Bernd Kowalski Folie 11 Product Certification Product Certificates recently issued by the BSI: Infineon Smartcard-Controller (Smart Card IC SLE66CX322P) Gemplus Smart Card Betriebssystem(GemXpressoPro E64PK) SuSE Betriebssystem (Linux) IBM Betriebssysteme, Directory-Server, Tivoli Microsoft Firewall GeNUA Firewall Utimaco PC-Sicherheitsprodukte Renesas (Hitachi) Smartcard-Controller (AE43C Version 01) Philips Smartcard-Controller (P16WX064V0C) G + D Tachosmart Card (STARCOS 2.4 Tach.Card Applic.)
12 Bernd Kowalski Folie 12 Common Criteria Number of CC-Certificates issued total number of certificates issued worldwide BSI-Zertifikate p.a CC ITSEC p.a CC ITSEC Prognose evaluation facilities worldwide: 36, Germany: 12 Quelle: CCRA, MC 2003
13 Bernd Kowalski Folie 13 Certificates per Type of Product Common Criteria Total number of certificates per type of product Percentage of certificates per type in rel. To total number p.a. p.a biometry system PP security products smart card 100% 80% 60% 40% 20% 0% biometry system PP security products smart card Characteristics: many products are smartcard related certification focussing on components little relevance to customer / end-user solutions therefore: CC not yet usable for End-User marketing Quelle: CCRA, MC 2003
14 Bernd Kowalski Folie 14 Common Criteria Certificate Numbers per Scheme and Evaluation Level Australia/NZ Number of certificates per certification scheme (2003) Canada France Characteristics BSI Germany UK US NIAP biometry system PP security products smart card European schemes are leading in smartcards BSI scheme also used by US IT-manufacturers preference for high evaluation levels Number of level certificates of evaluation per evaluation for CC level certificates low EAL high EAL1 EAL1+ EAL2 EAL2+ EAL3 EAL3+ EAL4 EAL4+ EAL5 EAL5+ EAL6 non smart card smart card
15 Bernd Kowalski Folie 15 Role of Certification in Public Acquisition US-Government Obligations to use CC-Certification: FACT SHEET NSTISSP No. 11 National Information Assurance Acquisition Policy CCRA By July the acquisition of all COTS IA and IA-enabled IT products to be used on systems specified, shall be limited only to those which have been evaluated and validated [acc to CC, NIST/NSA/NIAP or FIPS program]. Legend: COTS: Commercial of the shelf IA: Information Assurance NST/ISSP: National Security Telco and Info Systems Security Policy The US-Directive #11 might have a significant future impact on the global IT market.
16 Bernd Kowalski Folie 16 Role of Certification in Public Acquisition European/German Situation EU Kommission: Digital Tachograph: EU-Directive (law-level) NATO: Multilateral Defense: Infosec Technical and Implementation Directive on the use of Common Criteria in NATO Airbus A 400M Eurofighter 2000 UN/G8: G8 - Principles on Critical Infrastructure Protection D: German Signature Law Smartcards for German healthcare system European/German aqcuisition in the Public Sector requires CC-approval on a per project basis.
17 Bernd Kowalski Folie 17 Future Market Requirements Problems with present Product Certification Procedures Product Certification is costly and time-consuming. Certification works mainly for components not for end-user products. Present Certification does not include the complete product value chain. Only few Certificates address mass market / COTS products. Number of moderate evaluation levels (EAL 1 or 2) is very low. Product Certification must also meet the requirements of mass market products: low-cost, short time-to-market, based on Common Criteria for international acceptance.
18 Bernd Kowalski Folie 18 Future Market Requirements Results of a BSI investigation on mass market product certification Classic CC-approach does not meet requirements concerning cost and time. There is a big interest among those manufactureres in CC-certification. Action: Development of a draft enhanced certification procedure based on CC. Characteristics of the draft enhanced procedure Evaluation level: EAL1+ combined with additional requirements. Consider additional checks at the manufacturer. Limitation of the certificate validation time. Consider continous Life-Cycle checks at the event of new releases or threats occur. Additional procedures at the manufacturers compensate possible draw-backs from lower evaluation levels.
19 Bernd Kowalski Folie 19 Contact Thank You for Your Attention! Bernd Kowalski Bundesamt für Sicherheit in der Informationstechnik Godesberger Allee Bonn Phone: Fax: [email protected]
ISO 15408. The international IT security standard. Marcel Weinand. 049-228/9582-152 [email protected]. Marcel Weinand
The international IT security standard ISO 15408 1 049-228/9582-152 [email protected] History of IT-Security Criteria Canada CTCPEC 3 USA 93 2 US TCSEC 83, 85 Germany France UK Netherlands Federal
Protection Profile Digital Tachograph Vehicle Unit (VU PP) Version 1.0 BSI-CC-PP-0057-2010
Protection Profile Digital Tachograph Vehicle Unit (VU PP) Version 1.0 BSI-CC-PP-0057-2010 Dipl.-Phys. Certification Federal Office for Information Security (BSI), Germany Topics of VU-PP CC 3.1 R3 Overview
BSI-DSZ-CC-S-0040-2015. for. Dream Chip Technologies GmbH Germany. Dream Chip Technologies GmbH
BSI-DSZ-CC-S-0040-2015 for Dream Chip Technologies GmbH Germany of Dream Chip Technologies GmbH BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 (0)228
BSI-DSZ-CC-S-0035-2014. for. GLOBALFOUNDRIES Singapore Pte. Ltd. GLOBALFOUNDRIES Singapore Pte. Ltd.
BSI-DSZ-CC-S-0035-2014 for GLOBALFOUNDRIES Singapore Pte. Ltd. of GLOBALFOUNDRIES Singapore Pte. Ltd. BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49
Common Criteria Evaluations for the Biometrics Industry
Common Criteria Evaluations for the Biometrics Industry Kathy Malnick Senior Manager Criterian Independent Labs An initiative of the WVHTC Foundation Presentation outline Common Criteria defined Common
Spoof Detection and the Common Criteria
Spoof Detection and the Common Criteria Ralph Breithaupt (BSI) Nils Tekampe (TÜViT) Content Today s situation The BSI projects LifeFinger I & II Spoofing The definition Spoof Detection in Common Criteria
Smart grid cyber security certification
Smart grid cyber security certification 1 Introduction On 30th September 2014 ENISA organised a workshop where the results of the report on Smart grid security certification (to be published by end of
Technical information on the IT security certification of products, protection profiles and sites
Technical information on the IT security certification of products, protection profiles and sites (including confirmations in accordance with SigG) BSI 7138 Version 2.1, as per 5 November 2012 Document
ETSI TS 102 042: Electronic Signatures and Infrastructures (ESI): Policy
Abbreviations AIS BGBl BNetzA BSI CC CEM CSP DAR DATech DIN EAL ETR ETSI ISO IT ITSEC ITSEF ITSEM JIL PP SF SigG SigV SOF Anwendungshinweise und Interpretationen zum Schema [Guidance and Interpretations
BSI-DSZ-CC-0889-2013. for. tru/cos tacho v1.1. from. Trueb AG
BSI-DSZ-CC-0889-2013 for tru/cos tacho v1.1 from Trueb AG BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 (0)228 99 9582-0, Fax +49 (0)228 9582-5477,
BSI-PP-0004-2002. for. Protection Profile Secure Signature-Creation Device Type 1, Version 1.05. developed by
BSI-PP-0004-2002 for Protection Profile Secure Signature-Creation Device Type 1, Version 1.05 developed by CEN/ISSS Information Society Standardization System, Workshop on Electronic Signatures - Bundesamt
Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276
Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276 702500 [email protected] Agenda Background and
JTEMS A Community for the Evaluation and Certification of Payment Terminals
JTEMS A Community for the Evaluation and Certification of Payment Terminals Jürgen Blum, Federal Office for Information Security (BSI), Germany 14 th ICCC, USA Outline Brief overview: What is JTEMS? Who
Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates. Copyright 2010 CyberSecurity Malaysia
Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates Copyright 2010 CyberSecurity Malaysia Agenda 1. Understand Why we need product evaluation and certification ICT
Industry Example: The European Market for Electricity
Industry Example: The European Market for Electricity Professur für BWL, insb. Internationale Wirtschaft Folie 1 Agenda 1. Some theory 2. The National Markets for Electricity 3. EU Liberalization Policy
Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin
Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden [email protected] www.combitech.se
Information Technology Security Evaluation Criteria ( ITSEC ) Critères d'évaluation de la securitie des systémes informatiques
Information Technology Security Evaluation Criteria ( ITSEC ) Critères d'évaluation de la securitie des systémes informatiques Kriterien für die Bewertung der Sicherheit von Systemen der Informationstechnik
NIAP CC Evaluation & Validation Scheme: Scheme Home. From the United States:
Pagina 1 di 5 The following information technology (IT) products and protection p evaluated and certified/validated in accordance with the provisi Common Criteria Evaluation and Validation Scheme and the
Common Criteria V3.1. Evaluation of IT products and IT systems
Common Criteria V3.1 Evaluation of IT products and IT systems Contents 1 Background... 1 2 Benefits of Evaluations... 3 3 Levels of Assurance... 3 3.1 EAL1 - Functionally Tested... 4 3.2 EAL2 - Structurally
Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5), 46-49.
Safeguards Frameworks and Controls Theory of Secure Information Systems Features: Safeguards and Controls Richard Baskerville T 1 F 1 O 1 T 2 F 2 O 2 T 3 F 3 O 3 T 4... T n...... F l O m T F O Security
Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD
TÜV Rheinland Nederland B.V. Version 20101101 Certification Report NXP Secure Smart Card Controller P40C012/040/072 VD Sponsor and developer: NXP Semiconductors Germany GmbH, Business Unit Identification
Details for the structure and content of the ETR for Site Certification. Version 1.0
Details for the structure and content of the ETR for Site Certification Version 1.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 22899 9582-111 E-Mail: [email protected]
Future for industrial policies
Future for industrial policies Dr. Alexander Tettenborn Federal Ministry of Economics and Energy The German Digital Economy 228 bn. Sales volume (ICT branch) 79 bn. Sales volume (internet economy) 4.9
MAKING SENSE OF SMART CARD SECURITY CERTIFICATIONS
MAKING SENSE OF SMART CARD SECURITY CERTIFICATIONS Jason Reid, Mark Looi Information Security Research Centre - Queensland University of Technology [email protected], [email protected] Abstract
Lessons and Insights from
Lessons and Insights from Germany Workshop Strategies to Acchieve Pro-Poor Growth in Brazil, China, India and Europe Dr. Rita Nikolai, Junior Research Group Education and Transitions into the Labour Market
SUSE Linux Enterprise 12 Security Certifications
SUSE Linux Enterprise 12 Security Certifications Common Criteria, FIPS, PCI DSS, DISA STIG,... What's All This About? Thomas Biege Team Lead Maintenance/Security [email protected] 2 Evaluation Validation
Duale Hochschule Baden-Württemberg (DHBW) Baden-Wuerttemberg Cooperative State University
How to combine theory and corporate experiences: Models, organisation, perspectives (DHBW) Baden-Wuerttemberg Cooperative State University www.dhbw.de AGENDA DHBW: Key Features of Dual Studies: How Does
Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs
Joint Interpretation Library Security Evaluation and Certification of Digital Tachographs JIL interpretation of the Security Certification according to Commission Regulation (EC) 1360/2002, Annex 1B Version
Korea IT Security Evaluation and Certification Scheme
Korea IT Security Evaluation and Certification Scheme 2005. 9. 28 Korea Certification Body Dae Ho, Lee Agenda I KECS Introduction II Role and Responsibility of CB III Evaluation and Certification Procedure
Introducing atsec information security. Helmut Kurth, Sal la Pietra and Staffan Persson
Introducing atsec information security Helmut Kurth, Sal la Pietra and Staffan Persson Who are we? atsec information security is a government accredited lab for testing information assurance (IA) and IA-enabled
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
National Information Assurance Program (NIAP) Evolution
National Information Assurance Program (NIAP) Evolution 28 September 2010 Brian Henderson NSA Commercial Solutions Center A Historical Perspective 1983-1997 NSA s National Computer Security Center (NCSC)
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
Smartcard IC Platform Protection Profile
Smartcard IC Platform Protection Profile Version 1.0 July 2001 developed by Atmel Smart Card ICs Hitachi Europe Ltd. Infineon Technologies AG Philips Semiconductors Registered and Certified by Bundesamt
Enterprise Management Solutions Protection Profiles
Enterprise Management Solutions Protection Profiles Eric Winterton, Booz Allen Hamilton Joshua Brickman, CA Inc. September 2008 Copyright 2008 CA, Inc. and Booz Allen Hamilton. All rights reserved. All
Constructing Trusted Code Base XIV
Constructing Trusted Code Base XIV Certification Aleksy Schubert & Jacek Chrząszcz Today s news (on tvn24bis.pl) (June 6th on BBC) security vulnerability CVE-2014-0224 was discovered by Masashi Kikuchi
National Plan for Information Infrastructure Protection
National Plan for Information Infrastructure Protection www.bmi.bund.de Contents 1 Introduction 2 1.1 Germany s information infrastructures 2 1.2 Threats and risks to our information infrastructures 3
BSI-DSZ-CC-0636-2012. for. IBM Tivoli Access Manager for e-business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.
BSI-DSZ-CC-0636-2012 for IBM Tivoli Access Manager for e-business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2 from IBM Corporation BSI - Bundesamt für Sicherheit in der
Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA
Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA Dr. Stephan Beirer [email protected] Sichere ebusiness
BSI-DSZ-CC-0726-2012. for. Digital Tachograph EFAS-4.0, Version 02. from. intellic GmbH
BSI-DSZ-CC-0726-2012 for Digital Tachograph EFAS-4.0, Version 02 from intellic GmbH BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 (0)228 99 9582-0,
Information security audit (IS audit) - A guideline for IS audits based on IT-Grundschutz
Information security audit (IS audit) - A guideline for IS audits based on IT-Grundschutz German Federal Office for Information Security Postfach 20 03 63 53133 Bonn Tel.: +49 22899 9582-0 E-Mail: [email protected]
ISO/IEC 24727 for secure mobile web applications
ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, [email protected] 2 Infineon Technologies AG, [email protected]
Start your studies with TestDaF
Start your studies with TestDaF Whatever or wherever you want to study: The TestDaF is accepted by all institutions of higher education in Germany as a certificate of language proficiency. Photo: Claudia
EN 15267 Type Approval & Certification of AMS (QAL1)
EN 15267 Type Approval & Certification of AMS (QAL1) Mr. Karsten Pletscher TÜV Rheinland Energie und Umwelt GmbH Am Grauen Stein, 51105 Cologne Germany Phone: ++49 221 806 2592 [email protected]
Configuration Management. Security related. Software Engineering Processes
Configuration Management in Security related Software Engineering Processes Klaus Keus, Thomas Gast * Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, D - 53133 Bonn * e-mail: {gast,
Build a CC assurance package dedicated to your risk assessment. Francois GUERIN Security Program Manager francois.guerin@gemalto.
Build a CC assurance package dedicated to your risk assessment Francois GUERIN Security Program Manager [email protected] Gemplus & Axalto merge into Gemalto 1.7 billion in combined pro-forma
BSI-DSZ-CC-0766-2012. for. Oracle Database 11g Release 2 Enterprise Edition. from. Oracle Corporation
BSI-DSZ-CC-0766-2012 for Oracle Database 11g Release 2 Enterprise Edition from Oracle Corporation BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 (0)228
On Security Evaluation Testing
On Security Evaluation Testing Kerstin Lemke-Rust Hochschule Bonn-Rhein-Sieg Workshop: Provable Security against Physical Attacks Lorentz Center, 19 Feb 2010 Kerstin Lemke-Rust (H BRS) On Security Evaluation
22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1
22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1 Introduction of IPA Copyright 2010 Information-Technology
2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn
2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn Contents Contents 1 Introduction 1.1 Version History 1.2 Objective 1.3 Target group 1.4 Application
BSI-DSZ-CC-0687-2011. for. JBoss Enterprise Application Platform 5 Version 5.1.0 and 5.1.1. from. Red Hat
BSI-DSZ-CC-0687-2011 for JBoss Enterprise Application Platform 5 Version 5.1.0 and 5.1.1 from Red Hat BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49
The Market for Organic Products in Europe
The Market for Organic Products in Europe Focus: Animal Production Dr. Toralf Richter, Archiviert unter: http://orgprints.org/00002616/ Organic Market Europe Table of Contents Table of Contents General
Are You Prepared to Successfully Pass a PCI-DSS and/or a FISMA Certification Assessment? Fiona Pattinson, SHARE: Seattle 2010
Are You Prepared to Successfully Pass a PCI-DSS and/or a FISMA Certification Assessment? Fiona Pattinson, SHARE: Seattle 2010 atsec information security, 2010 About This Presentation About PCI assessment
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
BSI-DSZ-CC-0755-2012. For. Microsoft Windows Server 2008 R2 Hyper-V, Release 6.1.7600. from. Microsoft Corporation
BSI-DSZ-CC-0755-2012 For Microsoft Windows Server 2008 R2 Hyper-V, Release 6.1.7600 from Microsoft Corporation BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn
A Structured Comparison of Security Standards
A Structured Comparison of Security Standards Kristian Beckers 1, Isabelle Côté 3, Stefan Fenz 2, Denis Hatebur 1,3, and Maritta Heisel 1 1 paluno - The Ruhr Institute for Software Technology - University
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? Matthias G. Eckermann Senior Product Manager SUSE Linux Enterprise [email protected] Agenda Evaluation
Smart Meter PKI - Make or Buy?
ID WORLD Frankfurt 20.11.2014 11:15 11:45 Uhr Smart Meter PKI - Make or Buy? Dr.-Ing. Lutz Martiny achelos GmbH Paderborn Why PKI? Legal Background: Energiewirtschaftsgesetz Technical Background: Technical
Coffee Break German. Lesson 03. Study Notes. Coffee Break German: Lesson 03 - Notes page 1 of 15
Coffee Break German Lesson 03 Study Notes Coffee Break German: Lesson 03 - Notes page 1 of 15 LESSON NOTES ICH KOMME AUS DEUTSCHLAND. UND SIE? In this lesson of Coffee Break German we will learn to talk
Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP)
Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) Schutzprofil für das Sicherheitsmodul der Kommunikationseinheit eines intelligenten Messsystems für Stoff- und Energiemengen
This document is a preview generated by EVS
EESTI STANDARD EVS-EN ISO 18104:2004 Health Informatics - Integration of a reference terminology model for nursing Health Informatics - Integration of a reference terminology model for nursing EESTI STANDARDIKESKUS
Information & Communication Security (SS 15)
Information & Communication Security (SS 15) Electronic Signatures Dr. Jetzabel Serna-Olvera @sernaolverajm Chair of Mobile Business & Multilateral Security Goethe University Frankfurt www.m-chair.de Agenda
How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards
How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards Detlef Hühnlein 1 and Manuel Bach 2 1 secunet Security Networks AG, Sudetenstraße 16, 96247 Michelau, Germany [email protected] 2 Federal
BSI-DSZ-CC-0754-2012. for. Red Hat Enterprise Linux, Version 6.2 with KVM Virtualization for x86 Architectures. from. Red Hat, Inc.
BSI-DSZ-CC-0754-2012 for Red Hat Enterprise Linux, Version 6.2 with KVM Virtualization for x86 Architectures from Red Hat, Inc. BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03
BSI TR-03108-1: Secure E-Mail Transport. Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails
BSI TR-03108-1: Secure E-Mail Transport Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails Version: 1.0 Date: 05/12/2016 Document history Version Date Editor Description
Low Assurance Protection Profile for a VPN gateway
LAPP VPN gateway Low Assurance Protection Profile for a VPN gateway Version: 1.4 Date: 29/04/2005 Filename: lapp4_14 Product: VPN gateway Sponsor: SRC Security Research & Consulting GmbH, Graurheindorfer
FISMA Implementation Project
FISMA Implementation Project The Associated Security Standards and Guidelines Dr. Ron Ross Computer Security Division Information Technology Laboratory 1 Today s Climate Highly interactive environment
Certification Report
Certification Report EAL 4 Evaluation of Desktop: Enterprise Whole Disk Encryption Only Edition, Version 9.10.0 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria
A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification
, pp. 131-142 http://dx.doi.org/10.14257/ijseia.2015.9.10.13 A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification Min-gyu Lee 1, Hyo-jung Sohn 2, Baek-min Seong
smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany
smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany TÜV SÜD AG Embedded Systems TÜV SÜD Akademie GmbH About the Conference To
BSI-DSZ-CC-0698-2012. for
BSI-DSZ-CC-0698-2012 for Database Engine of Microsoft SQL Server 2008 R2 Enterprise Edition and Datacenter Edition (English) x64, Version 10.50.2500.0 from Microsoft Corporation BSI - Bundesamt für Sicherheit
Protection Profile for UK Dual-Interface Authentication Card
Protection Profile for UK Dual-Interface Authentication Card Version 1-0 10 th July 2009 Reference: UNKT-DO-0002 Introduction This document defines a Protection Profile to express security, evaluation
Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances
122 CERTIFICATION REPORT No. CRP294 Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances Issue 1.0 November 2015
Industry Example: The European Market for Gas
Industry Example: The European Market for Gas Professur für BWL, insb. Internationale Wirtschaft Folie 1 Agenda 1. Characteristics of the gas market 2. The National Markets for gas 3. EU Liberalization
Certification Report
Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
