Formal Specifications of Security Policy Models



Similar documents
Joint Interpretation Library

Computer and Network Security

Common Criteria v3.1 Vulnerability Assessment: What is new?

CHAPTER 7 GENERAL PROOF SYSTEMS

BSI-PP for. Protection Profile Secure Signature-Creation Device Type 1, Version developed by

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April Version 2.

Neighborhood Data and Database Security

Rigorous Software Development CSCI-GA

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

Introducing Formal Methods. Software Engineering and Formal Methods

Low Assurance Protection Profile for a VPN gateway

Protection Profile for UK Dual-Interface Authentication Card

Mobile Billing System Security Target

Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs

BSI-PP for. Smart Card Security User Group Smart Card Protection Profile (SCSUG-SCPP) Version 3.0. developed by

A Propositional Dynamic Logic for CCS Programs

This asserts two sets are equal iff they have the same elements, that is, a set is determined by its elements.

Low Assurance Protection Profile for a VoIP Infrastructure

Automated Theorem Proving - summary of lecture 1

System Assurance C H A P T E R 12

Summary Last Lecture. Automated Reasoning. Outline of the Lecture. Definition sequent calculus. Theorem (Normalisation and Strong Normalisation)

BSI-DSZ-CC-S for. Dream Chip Technologies GmbH Germany. Dream Chip Technologies GmbH

BSI-DSZ-CC-S for. GLOBALFOUNDRIES Singapore Pte. Ltd. GLOBALFOUNDRIES Singapore Pte. Ltd.

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. September Version 3.

Schedule. Logic (master program) Literature & Online Material. gic. Time and Place. Literature. Exercises & Exam. Online Material

Compucat Research Pty Limited 14 Wales St, Belconnen ACT 2617 ABN

Computer Security. Evaluation Methodology CIS Value of Independent Analysis. Evaluating Systems Chapter 21

Security Domain Separation as Prerequisite for Business Flexibility. Igor Furgel T-Systems

Set theory as a foundation for mathematics

Certification Report BSI-DSZ-CC for. Renesas AE45C1 (HD65145C1) Smartcard Integrated Circuit Version 01. from. Renesas Technology Corp.

JMCS Northern Light Video Conferencing System Security Target

WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT?

Chapter II. Controlling Cars on a Bridge

3. Mathematical Induction

Security Target for Cisco Secure PIX Firewall 515, 520, 525 Version 5.2(3)

Relations: their uses in programming and computational specifications

WOLLONGONG COLLEGE AUSTRALIA. Diploma in Information Technology

Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report

Rigorous Methods for Software Engineering (F21RS1) High Integrity Software Development

TRUSTED SECURITY FILTER SECURITY TARGET

MIFARE DESFire EV1 MF3ICD81

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Common Criteria for IT security evaluation

Remarks on Non-Fregean Logic

Lecture 13 of 41. More Propositional and Predicate Logic

Security Target. McAfee Enterprise Mobility Management 9.7. Document Version 0.9. July 5, 2012

Security Target. Astaro Security Gateway V8 Packet Filter Version Assurance Level EAL4+ Common Criteria v3.1

def: An axiom is a statement that is assumed to be true, or in the case of a mathematical system, is used to specify the system.

CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs

IBM WebSphere Message Broker Security Target

This chapter is all about cardinality of sets. At first this looks like a

PROTECTION PROFILE DEVELOPMENT

2. The Language of First-order Logic

Beyond Propositional Logic Lukasiewicz s System

isas Security Target Lite EWSE23EN

Forefront Identity Manager (FIM) 2010

! " # The Logic of Descriptions. Logics for Data and Knowledge Representation. Terminology. Overview. Three Basic Features. Some History on DLs

Fixed-Point Logics and Computation

Secuware Virtual System (SVS)

Verifying Specifications with Proof Scores in CafeOBJ

ETSI TS : Electronic Signatures and Infrastructures (ESI): Policy

Software Modeling and Verification

C038 Certification Report

Certification Report

Turing Degrees and Definability of the Jump. Theodore A. Slaman. University of California, Berkeley. CJuly, 2005

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. August Version 2.

Information Technology Security Evaluation Criteria. ITSEC Joint Interpretation Library (ITSEC JIL)

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

Constructing Trusted Code Base XIV

Foundational Proof Certificates

Math 231b Lecture 35. G. Quick

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0

Automata and Formal Languages

Security Standards BS7799 and ISO17799

Computer-Assisted Theorem Proving for Assuring the Correct Operation of Software

Low Assurance Security Target for a Cisco VoIP Telephony System

University of Ostrava. Reasoning in Description Logic with Semantic Tableau Binary Trees

Today s Agenda. Automata and Logic. Quiz 4 Temporal Logic. Introduction Buchi Automata Linear Time Logic Summary

Security Target. McAfee Enterprise Mobility Management Document Version 1.16

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. September Version 3.

EAL4+ Security Target

From Workflow Design Patterns to Logical Specifications

Math 55: Discrete Mathematics

Specification and Analysis of Contracts Lecture 1 Introduction

How To Protect Your Computer From Being Hacked

MATHEMATICAL INDUCTION. Mathematical Induction. This is a powerful method to prove properties of positive integers.

Firewall Protection Profile

EMC Corporation Data Domain Operating System Version Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.

Note on some explicit formulae for twin prime counting function

Integer roots of quadratic and cubic polynomials with integer coefficients

Transcription:

Wolfgang Thumser T-Systems GEI GmbH

Overview and Motivation Structure of talk Position of FSPM within CC 3.1 and CEM 3.1 CC Requirements CEM Requirements National Scheme Realization of FSPM in terms of Features and Properties Security Functionality Security Functional Requirements Formal Systems Formal Proof of Security and Consistency Proof of Concept (An FSPM Example) Summary 2/22

Position of Formal Security Policy Model (CC 3.1) Form of Presentation ADV_SPM.1 Informal TSP-Model ADV_SPM.2 Semiformal TSP-Model ADV_SPM.3 ADV_SPM.1 Formal TSP-Model TSP Modeled Policies Principles Rules (Rules) Characteristics ADV_SPM.1.1C ADV_SPM.1.2C Content of Presentation TSP-Model Properties Features ADV_SPM.1.1D ADV_FSP.1.4C ST TSF SFR TSF ADV_SPM.1.3,4,5C FSP Relationships among ADV constructs and SPM 3/22

Position of Formal Security Policy Model (CEM 3.1) Section 11.7 (ADV_SPM) of CEM 3.1: Evaluation of sub-activity (ADV_SPM.1, section 11.7.1 ) There is no general guidance; the scheme should be consulted on this sub-activity The national scheme of Germany by BSI provides AIS 34: Evaluation Methodology for CC Assurance Classes for EAL5+ Effective for CC Version 2.1 and CEM Version 1.0 Adaption necessary for CEM Version 3.1 Ideas based on... 4/22

Position of Formal Security Policy Model (Scheme) The following Interpretation by BSI is effective (Germany): AIS 39: Guideline for the Development and Evaluation of formal security policy models in the scope of ITSEC and Common Criteria, Version 1.1 Provides terminology and guidance Relates to CC Version 2.1 and CEM Version 1.0 Needs adaption to CC 3.1 and CEM 3.1 Proved useful in former evaluations of FSPMs 5/22

Realization of FSPM (Features & Properties) Syntax (formal) and Semantics (informal) classify Features and Properties as the formal counterpart of Characteristics and Rules, which constitute the SPM The terms are related by interpretation To show that The Characteristics enforce the Principles (Rules) one transforms the terms into their formal counterpart and formally proves that The Features imply the Properties We achieve Rigor, Precision and Consistency by formal treatment 6/22

Realization of FSPM (Example) The Characteristic that only the administrator may modify the access rights of an object is interpreting the following Feature x Sub y Obj : acc(mod( x, y)) acc( y) admi( x) where other axioms determine the behavior of predicate admi(), operation mod() and function in First order Predicate Logic acc() 7/22

Security Functionality According to definition of section 4 of part 1 in CC 3.1: The TSF as a subset of the TOE ensures correct enforcement of the SFRs The SFP (Security Function Policy) is expressible as a set of SFRs Which elements of TSF support which SFRs? Question can be answered by means of a table 8/22

Security Functionality Defined in TSF element SFRs 1 2 3 4 5 6 7 8 9 10 PP FDP_IFC.1 X FDP_ITT.1 X FMT_LIM.1 X FRU_FLT.2 X X ST FPT_ACC.1 X FDP_ACF.1 X FMT_SMF.1 X Table: Relation of SFRs and SFs to the formal model 9/22

Security Functional Requirements SFRs are being mapped to the respective Security Policy Description consisting of Characteristics and Rules (Principles) along with their formal counterparts Security Invariant Description determined by Features and Properties by means of the following table 10/22

Security Functional Requirements TSF element SFR Security Policy Description (informal in section #) Security Invariant Description (formal in section #) Characteristic Principle Feature Property SF1 FRU_FLT.2.1 char_1 in sec1 prin_1 in sec1 feat_e in sec1 prop_e in sec1 SF2 FMT_LIM.1.1 n/a n/a SF4 FDP_IFC.1 FDP_ITT.1 SF6 FDP_ACC.1.1 char_e in section 3 prin_e in section 3 feat_e in section 3 prop_e in section 3 SF8 FDP_ACF.1.1 FDP_ACF.1.2 SF9 SF10 FMT_SMF.1 FRU_FLT.2.1 Table 2: Relation of SFRs and SFs to the formal model 11/22

Security Functional Requirements The developer should have to argue if she abstains from formally modeling certain SFRs some of the SFRs are not covered by the model According to state of the art IFC can always be modeled (if addressed in ST) strong arguments needed in case of abstention from modeling ACC as outlined in former CC version 2.1 12/22

Formal Systems According to CC 3.1, part 3, section A.5 Development: A Formal Specification consists of Formal System based upon well-established Mathematical Concepts well-defined Semantics Syntax Formal System Formal Language over some finite Alphabet Logical and Non-logical Axioms Rules of Inference to construct Formal Derivations of Theorems can be combinatorially manipulated and controlled 13/22

Formal Systems Realizations of Formal Systems include First Order Predicate Logic Intuitionistic Logic Modal Logic Temporal Logic of Actions Verification tools for Formal Systems include Isabelle MetaMath B-Method VSE II Autofocus 14/22

Formal Systems (Formal Proof of Security) ADV_SPM.1.2C of CC 3.1 requires: For all policies that are modelled, the model shall define security for the TOE and provide a formal proof that the TOE cannot reach a state that is not secure. In terms of Formal Systems this translates to: feat _ e : = { Ax1, Ax2,..., AxN} prop _ e = : thm where denotes the derivation operator and thm _ e formalizes secure state maintenance _ e, 15/22

Formal Systems (Consistency) Regarding Consistency 268 of CC 3.1 states: The confidence in the model is accompanied by a proof that it contains no inconsistencies. To achieve Consistency in spite of the incompleteness phenomenon: Conservative extensions by definition of and Interpretations (Models) of theories within consistent theories are consistent. So consistency can be obtained by literature reference. 16/22

Proof of Concept (FSPM Example) As an easy example of access control (FDP_ACC.1.1): Emergency supply consisting of seven power engines P1 P2 P3 P4 P5 P6 P7 S1 S2 S3 S4 S5 S6 Characteristics: Subjects: Power switches changing power state of adjacent power engines Objects: Power engines Operatns: Change power state of adjacent engines Initially: All engines turned on Principles: Cannot run into insecure state (all engines turned off) 17/22

Proof of Concept (FSPM Example) To formalize the Security Policy we take some first order theory SET equipped with: logical and nonlogical axioms for finite sets. classical rules of inference (modus ponens, tnt, etc.) for SET we may take e.g. ZF with Axiom of Infinity replaced by its negation equivalent to first order Peano Arithmetics (PA) well known to be consistent: PRA + Ind( ε 0 ) Cons( SET ) SET proves induction for first order formulas is easy to operate with (e.g. formalizable in Isabelle) 18/22

Proof of Concept (FSPM Example) Consider the following extension by definition of theory SET formalizing the characteristics in terms of features feat_e: Ax1: S = {s s : {1,2,,7} -> {0,1}} (state definition from objects) Ax2: s 0 ε S k ε {1,2,,7}: s 0 (k) = 0 s 1 ε S k ε {1,2,,7}: s 1 (k) = 1 (insecure and secure state) Ax3: X: Sec(X) s 0 ε X (secure set) Ax4: s ε S i ε {1,2,,6} k ε {1,2,,7}: (k=i k=i+1 op(i,s)(k)=1 s(k)) ( k=i k=i+1 op(i,s)(k) = s(k)) (state operation of subjects) Ax5: A 0 = {s 1 } n A n+1 = A n i ε {1,2,,6} op(i,a n ) A = i ε N A i (achievable states) 19/22

Proof of Concept (FSPM Example) Proof of Security Let prop_e consist of Thm_e: Thm_e: Sec(A) Prove that {Ax1,,Ax5} - Sec(A) in SET (Sketch of proof) Consider Def1: s ε S: odd(s) n ε N: s(1) + + s(7) = 2n+1 Def2: X S: Odd(X) s ε X: odd(s) We prove by induction on n using Ind: feat_e - n ε N: Odd(A n ) yielding feat_e - Odd(A) (by definition of A) (*) feat_e - X S: Odd(X) Sec(X), (**) since feat_e - odd(s 0 ) feat_e - Odd(A) Sec(A) (by Subst. from (**)) (***) feat_e - Sec(A) (by modus ponens from (*),(***)), q.e.d. 20/22

Proof of Concept (FSPM Example) Proof of Consistency SET + feat_e is consistent since Ax1 to Ax5 are extensions by definition of SET and SET is consistent in the first place Conservation of consistency for most well established mathematical theories, which are known to be consistent Fulfillment of requirement 268 of CC 3.1 21/22

Summary Impact of CC 3.1 requirements on formal security policy models Contribution to Security Functionality and Requirements Formalize Security Characteristics and Principles Formally prove properties of SPM Proof of Consistency of FSPM Developer has to show evidence Proof of concept by means of Example Topics not covered yet Formal Demonstration of Correspondence SPM <-> FSP 22/22