TURKISH COMMON CRITERIA CERTIFICATION SCHEME TSE-CCCS TURKISH NATIONAL UPDATE, 2013



Similar documents
TURKISH COMMON CRITERIA CERTIFICATION SCHEME. Mustafa YILMAZ IT Test and Certification Department, TSE/TURKEY

Certification Report

22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1

Certification Report

Common Criteria. Introduction Magnus Ahlbin. Emilie Barse Emilie Barse Magnus Ahlbin

Embedded Java & Secure Element for high security in IoT systems

Information, Network & Cyber Security

Investor and Analyst Call

Korea IT Security Evaluation and Certification Scheme

Secure software development in the Russian IT Security Certification Scheme. Alexander Barabanov, Alexey Markov, Valentin Tsirlov

The Next Generation of Security Leaders

Bellevue University Cybersecurity Programs & Courses

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD

InfoSec Academy Application & Secure Code Track

CFIR - Finance IT 2015 Cyber security September 2015

Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates. Copyright 2010 CyberSecurity Malaysia

Information Security Attack Tree Modeling for Enhancing Student Learning

Applying Common Criteria to a cloud type payment service

EC-Council. Certified Ethical Hacker. Program Brochure

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

SCADA Security Training

Educational Requirement Analysis for Information Security Professionals in Korea

Cyber Security VTT and the Finnish Approach

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Part-time MSc in Cyber Security from Northumbria University. masters.qa.com

Electronic Document and Records Management System Protection Profile

INFORMATION TECHNOLOGY SECURITY: PORTFOLIO OVERVIEW

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

InfoSec Academy Pen Testing & Hacking Track

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Critical Controls for Cyber Security.

Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT

Secure egovernment Where convenience meets security.

Dept. of Financial Information Security

Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium , Miami Beach FL / USA

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

Hackers are here. Where are you?

What is Really Needed to Secure the Internet of Things?

Common Criteria V3.1. Evaluation of IT products and IT systems

Securing the Service Desk in the Cloud

CESG Certification of Cyber Security Training Courses

EC Council Certified Ethical Hacker V8

MyCC Scheme Overview SECURITY ASSURANCE. Creating Trust & Confidence. Norhazimah Abdul Malek MyCC Scheme Manager zie@cybersecurity.

Developing a new Protection Profile for (U)SIM UICC platforms. ICCC 2008, Korea, Jiju Septembre 2008 JP.Wary/M.Eznack/C.Loiseaux/R.

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

BMC s Security Strategy for ITSM in the SaaS Environment

Access FedVTE online at: fedvte.usalearning.gov

Career Paths in Information Security v6.0

Joint Interpretation Library. Guidance for smartcard evaluation

Jort Kollerie SonicWALL

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX FIPS, MPX FIPS, MPX FIPS appliances

InfoSec Academy Forensics Track

Cyber Security Health Test

CCEVS Approved Assurance Continuity Maintenance Report

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Malta Resources Authority Millennia, Aldo Moro Road, Marsa MRS 9065 Malta Telephone: (356) Fax: (356) Call for Quotations

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Principles of Information Assurance Syllabus

Certified Information Security Manager (CISM)

Unit 3 Cyber security

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Networking: EC Council Network Security Administrator NSA

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

Hackers are here. Where are you?

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

JTEMS A Community for the Evaluation and Certification of Payment Terminals

Chapter 1: Introduction

Introducing atsec information security. Helmut Kurth, Sal la Pietra and Staffan Persson

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

The Changing Threat Surface in. Embedded Computing. Riley Repko. Vice President, Global Cyber Security Strategy

Certification Programs

SECURITY 2.0 LUNCHEON

Spanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008

Protection Profile for UK Dual-Interface Authentication Card

Certification Report

IT Security Evaluation in China

Certification Report

View from a European Trust Service Provider Server Signing: Return of experience and certification strategy

EC-Council Certified Security Analyst (ECSA)

Microsoft Technologies

Identity & Privacy Protection

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Certified Cyber Security Analyst VS-1160

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Transcription:

TURKISH COMMON CRITERIA CERTIFICATION SCHEME TSE-CCCS TURKISH NATIONAL UPDATE, 2013 Mariye Umay Akkaya Director of TK`s CB 14 th ICCC,10.09.2013,Orlando

TURKISH COMMON CRITERIA CERTIFICATION SCHEME-2013

TSE-CCCS, Turkey Up to now: 20 products certified, 2 PPs have been certified 15 PPs are under development. 15 products are under evaluation. Many products are in application. %70 of the products are Smart Cards and Related Devices with EAL 4+ and EAL 5+, the other product categories are Firewalls, PKI, SW Applications, USB Cryptobridge etc. Page 3

TSE-CCCS, Turkey Licensed ITSEFs CC Laboratories 3 licensed ITSEFs. 2 candidate ITSEFs. Page 4

3 licensed ITSEFs: Page 5

Some of the trainings taken by TSE CCCS Certifiers -CISSP -Cyber Security -Network Security -EMV Trainings, -Smart Card Security, -Side Channel Analysis and Inverse Engineering -Cryptology -Certified Ethical Hacker -QWEB Certification etc. Page 6

Product List (1/6)-Certified,Under Evaluation Page 7

Product List (2/6)-Certified,Under Evaluation Page 8

Product List (3/6)-Certified, Under Evaluation Page 9

Product List (4/6)-Certified,Under Evaluation Page 10

Product List (5/6)-Certified,Under Evaluation Page 11

Product List (6/6)-Certified,Under Evaluation Page 12

TSE-CCCS, Turkey Protection Profiles 2 PPs have been certificed KEC_F PP: PP for Smart Card Access Device Firmware PP for IP Cashed Register 15 PPs are being developed, these PPs have new product category types that, until now there have been no similar PPs exist in www.commoncriteriaportal.org. Page 13

TSE-CCCS, Turkey CYBER SECURITY SPECIAL COMMITY, April 2013 CYBER SECURITY SPECIAL COMMITY 3O External independent Experts 23 new Cyber Security projects, 15 of them are PPs Page 14

Projects within the Scope of Cyber Security 1. Secure Web Applications Protection Profile and Secure E- Commerce Criteria 2. Secure EDMS(Electronic Document Management System) Protection Profile 3. Secure GIS (Geographic Information Systems) Protection Profile 4. Basic Level Security Certification 5. Site Security Certification 6. E-Identity Protection Profile 7. GEM Protection Profile 8. Mobile ID Protection Profile 9. Secure IC Protection Profile 10. Embedded Operating System Protection Profile Page 15

Projects within the Scope of Cyber Security 11. Determining Criteria for Software Developers and Test Engineers-SCRUM and ISTQB 12. Cloud Computing Standard,Criteria 13. Health Information Management Systems Protection Profile 14. SSL Criteria 15. Determining administrative criteria for companies and staff which do penetration tests 16. Preparing Test Criteria and Security Requirements for Biometric Products and PP 17. E-Passport 18. E-signature 19. E-driver s license Page 16

Projects within the Scope of Cyber Security 20. Data Centers (System Rooms) Certification 21. IT Products Vulnerability Gap Library Meetings 22. Determining Technical Criteria for Penetration Tests 23. Preparing training content of theoretical and practical Penetration Test Demo Laboratory 24. Web Services PP Page 17

Just Completed Projects within the Scope of Cyber Security Site Security Certification Basic Level Security Certification Page 18

Projects within the Scope of Cyber Security Site Security Certification Two external experts worked for this project Providing the certification of developing campus of products subjects to Common Criteria Certification An approach to reduce cost and time for CC Page 19

Projects within the Scope of Cyber Security Basic Security Certification Two external expert worked for this project A security evaluation program aiming simple,fast and effective evaluation Evaluation time is normally 35 man/days. Total time is 8 weeks for certification. Page 20

Projects within the Scope of Cyber Security Health Information Management Systems PP Six external experts (in different disciplines) have been working for this project Providing a standardization on Health Informatics Systems Page 21

Projects within the Scope of Cyber Security Secure GIS (Geographic Information Systems) Protection Profile Two external experts have been working for this project Providing a standardization on Geographic Informatics Systems and determining minimum security requirements Page 22

Projects within the Scope of Cyber Security Preparing Test Criteria and Security Requirements for Biometric Products One Internal,Six external experts have been working for this project Contribution of the Establishment Turkish National Police Developing new generation biometric sensor,implementing attacks and detecting countermeasures by developing test methods Determining minimum security requriments for biometric products Preparing Protectection Profile for Biometric Products Page 23

Projects within the Scope of Cyber Security Cloud Computing Standard,Criteria Two external experts have been working for this project Developing Cloud IT standard and criteria by analysing security risks,assests. Page 24

Projects within the Scope of Cyber Security Ethical Hacker Certification Evaluating staff and companies which do penetration tests in terms of administrative criteria Checking if white hat hackers provide criteria or not Page 25

SCS-TURKEY SMART CARD SECURITY TURKEY CONSOURTIUM, December 2012 SCS-Turkey`s Members: TSE-CCCS TÜBİTAK BİLGEM UEKAE (Smart Card Developers) TÜBİTAK BİLGEM OKTEM (ITSEF) 3 UNIVERSITIES Many developers Page 26

To summarise CC; % 70 of ongoing and certified products are Smart Cards and Related Devices, 20 products certified 2 PPs are certified 15 ongoing, 4 at application 15 PPs are being developed More contacts with international vendors Page 27

CRYPTO MODUL VALIDATION PROGRAM & CRYPTO ALGORITHM VALIDATION PROGRAM TSE-CMVP TSE-CAVP, Turkey ISO/IEC 19790 and ISO/IEC 24759-Crypto Modul Evaluation and Certifications 3 approved labs. Epoche & Espri Tübitak Bilgem OKTEM Cygnacom Page 28

THANK YOU Mariye Umay Akkaya Zumrut Muftuoglu Turkish Standards Institution Common Criteria Certification Scheme, TURKEY 29