SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?



Similar documents
SUSE Linux Enterprise 12 Security Certifications

Advanced Systems Management with Machinery

Challenges Implementing a Generic Backup-Restore API for Linux

Implementing Linux Authentication and Authorisation Using SSSD

Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256

Configuration Management in SUSE Manager 3

We are watching SUSE

Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad

Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales

Relax-and-Recover. Johannes Meixner. on SUSE Linux Enterprise 12.

TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla

SUSE Storage. FUT7537 Software Defined Storage Introduction and Roadmap: Getting your tentacles around data growth. Larry Morris

Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction

How To Make A Cloud Work For You

Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project

DevOps and SUSE From check-in to deployment

SUSE Linux uutuudet - kuulumiset SUSECon:sta

Operating System Security Hardening for SAP HANA

Using btrfs Snapshots for Full System Rollback

HO15982 Deploy OpenStack. The SUSE OpenStack Cloud Experience. Alejandro Bonilla. Michael Echavarria. Cameron Seader. Sales Engineer

Certification Report

SUSE Customer Center Roadmap

kgraft Live patching of the Linux kernel

Big Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen

High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications

Software Defined Everything

Wicked Trip into Wicked Network Management

Oracle Products on SUSE Linux Enterprise Server 11

Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW

FIPS Security Policy

Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management

How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open

Wicked A Network Manager Olaf Kirch

Public Cloud. Build, Use, Manage. Robert Schweikert. Public Cloud Architect

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales gnyers@suse.com

Certification Report

SUSE Cloud 5 Private Cloud based on OpenStack

How SUSE Is Helping You Rock The Public Cloud

Certification Report

Certification Report

Certification Report

Certification Report

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

Deploying Hadoop with Manager

Secure Network Communications FIPS Non Proprietary Security Policy

HO5604 Deploying MongoDB. A Scalable, Distributed Database with SUSE Cloud. Alejandro Bonilla. Sales Engineer abonilla@suse.com

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Gábor Nyers Sales

Linux w chmurze publicznej SUSE na platformie Microsoft Azure

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center

Btrfs and Rollback How It Works and How to Avoid Pitfalls

High Availability Storage

How To Evaluate Watchguard And Fireware V11.5.1

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server 12

Of Pets and Cattle and Hearts

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Certification Report

Certification Report

Introducing Director 11

TUT8155 Best Practices: Linux High Availability with VMware Virtual Machines

U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer

Certification Report

Authentication requirement Authentication function MAC Hash function Security of

Certification Report

Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

NIST ITL July 2012 CA Compromise

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Using BroadSAFE TM Technology 07/18/05

CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School

Pulse Secure, LLC. January 9, 2015

SkyRecon Cryptographic Module (SCM)

An Introduction to Cryptography as Applied to the Smart Grid

McAfee Firewall Enterprise 8.2.1

Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs

Leveraging Wikis to Manage SCP Documentation TWiki Novell Technical Services

FIPS Security Policy LogRhythm or Windows System Monitor Agent

Novell Collaboration Vibe OnPrem

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

KVM, OpenStack and the Open Cloud SUSECon November 2015

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

FIPS Security Policy LogRhythm Log Manager

Certification Report

efolder White Paper: The Truth about Data Integrity: 5 Questions to ask your Online Backup Provider

McAfee Firewall Enterprise 8.3.1

SUSE Virtualization Technologies Roadmap

Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0

Transcription:

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? Matthias G. Eckermann Senior Product Manager SUSE Linux Enterprise mge@suse.com

Agenda Evaluation Validation Certification Details on Certifications and Validations Common Criteria Certification FIPS 140-2 NIST SP 800-131A DISA STIG BSI IT Grundschutz Other Certifications and Validations SUSE Linux Enterprise 12 2

Evaluation Validation Certification

Evaluation Validation Certification Validation Compare behavior of the software / module against an existing standard or expected behaviour. Evaluation Examine claims made about a target. Claims do not need to be based on standards. Certification 4

Details on Certifications and Validations

Common Criteria How can I be sure to get the security I need? Common Accepted by 26 countries all over the world The certification is following a worldwide standard, thus e.g. certifications of certification body B (e.g. BSI) are accepted by certification body N (NIAP/NIST) Common Criteria Recognition Arrangement (CCRA) Evaluation Assurance Level 4+ Standardized set of test cases Tested at level 4, '+' is an augmentation (e.g. FLR = Flaw Remediation) The highest level for a commercial O/S 6

Common Criteria (2) Important abbreviations in this context Security Functional Requirement (SFR) Security Assurance Requirement (SAR) Protection Profile (PP) Security Target (ST) Target of Evaluation (TOE) More information https://www.niap-ccevs.org/documents_and_guidance/cc_docs.cfm 7

FIPS 140-2 (US) Federal Information Processing Standard Usage: US FedGov, FISMA, Financial Industry Certificate is issued by NIST and CSEC FIPS 140-2 ensures that Crypto algorithms/modes follow the corresponding standard No obvious crypto weakness exists No out dated algorithms are used Key length is sufficient Vital Definition of cryptographic module (CM), the functional description of the validation target Self test with each invocation of CM Integrity check Checks performed even if module is not in FIPS-140-2 mode! Successor FIPS 140-4 in preparation 8

NIST SP 800-131A Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths Hashing No MD5, no SHA-1 hashing algorithms anymore Use SHA-224, SHA-256, SHA-384, SHA-512 See also: FIPS 180-4 Secure Hash Standard (SHS) Other cryptography HMAC: key length >= 112bits Signing: DSA or RSA, key length >= 2048bits Symmetric encryption: 3DES, AES Public key encryption: RSA, key length >= 2048 bits See also: FIPS 186-4 Digital Signature Standard (DSS) 9

DISA STIG Defense Information Systems Agency (DISA) defines Security Technical Implementation Guide (STIG) Configuration standard Hardening or Lockdown Purpose Secure Installation Secure Maintenance Builds upon other certifications and documentation (e.g. Hardening Guide) 10

BSI IT Grundschutz (ITGS, Germany) Certification of customers' environment and processes Covers more than the Operating System an Operating System cannot be ITGS certified Precondition Common Criteria (CC) Certification and CC documentation SUSE Linux Enterprise Security and Hardening Guide More information https://www.bsi.bund.de/de/themen/itgrundschutz/itgrundschutz_node.html https://www.bsi.bund.de/shareddocs/downloads/en/bsi/publications/bsistandards/standard_100-2_e_pdf.html https://www.bsi.bund.de/shareddocs/downloads/en/bsi/publications/bsistandards/standard_100-3_e_pdf.html 11

PCI DSS (Payment Card Industry) Conformance Certification for a customers environment Covers more than the Operating System an Operating System cannot be PCI DSS certified SUSE Status: Does not require changes on SUSE Linux Enterprise Server itself Builds upon parameters and capabilities of SUSE Linux Enterprise Main source for the certification of customers' and partners' environments according to PCI DSS: SUSE Linux Enterprise Security and Hardening Guide 12

FSTEC (Russia) Achieved for SUSE Linux Enterprise Server 10, SUSE Linux Enterprise Server 10 SP3, SUSE Linux Enterprise Server 11 SP1 Might need refresh according to market needs More information: http://www.globalsecurity.org/military/world/russia/fstec.htm http://www.fstec.ru/ List of certified systems: http://www.fstec.ru/_doc/reestr_sszi/_reestr_sszi.xls 13

Dependencies of Certifications STIG DISA US-Mil PCI DSS Finance BSI IT Grundschutz DE-Gov FSTEC RUS-Gov FIPS 140-2 (Crypto) ARCH¹ RNG² Common Criteria (Security) ¹ ARCH = Security Architecture Document ² RNG = Random Number Generator 14

SUSE Linux Enterprise 12

Common Criteria Certification Formal Details Certification Body: BSI Evaluation Lab: atsec information security Product (TOE, Target of Evaluation) SUSE Linux Enterprise Server 12 Protection Profile: OSPP-BSI at EAL4 with augmentation (Flaw Remediation). Sponsor: SUSE LLC Project Lead: Thomas Biege, CSSLP, Team Leader MaintenanceSecurity at SUSE 16

Common Criteria Certification (2) TOE Configuration Architectures x86-64 s390x other architectures might follow Virtualization (x86-64) KVM and Xen guest KVM host configuration Installation via AutoYaST 17

FIPS 140-2 Architectures x86-64 other architectures might follow Modules 1. Kernel 2. libgcrypt 3. Disk encryption 4. OpenSSL 5. OpenSSH Client 6. OpenSSH Server 7. NSS 8. StrongSWAN (IPSec) 18

Dependencies of FIPS CSMs in SUSE Linux Enterprise 12 A depends on B openssh server openssh client strongswan IKE v1/v2 EDC FIPS 140-2 Level 2 requires an OS with CC EAL2, at least CC EAL4+ libgcrypt openssl initialize IPSec NSS crypto algos PBKDF dm_crypt cryptsetup PBKDF kernel Crypto API initialize block ciphers 19

Your Questions!? Thank you. 20

Corporate Headquarters Maxfeldstrasse 5 90409 Nuremberg Germany +49 911 740 53 0 (Worldwide) www.suse.com Join us on: www.opensuse.org 21

Unpublished Work of SUSE LLC. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary and trade secret information of SUSE LLC. Access to this work is restricted to SUSE employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of SUSE. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. SUSE makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for SUSE products remains at the sole discretion of SUSE. Further, SUSE reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All SUSE marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.