Writing a Protection Profile for a Security Service Package



Similar documents
Computer and Network Security

Oracle Identity and Access Management 10g Release running on Red Hat Enterprise Linux AS Release 4 Update 5

Security Target. McAfee Host Intrusion Prevention 8 and epolicy Orchestrator 4.5. Document Version 1.1. September 9, 2011

Oracle Business Intelligence Enterprise Edition (OBIEE) Version with Quick Fix running on Oracle Enterprise Linux 4 update 5 x86_64

Security Standards BS7799 and ISO17799

Protection Profile for UK Dual-Interface Authentication Card

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report

Common Criteria. Introduction Magnus Ahlbin. Emilie Barse Emilie Barse Magnus Ahlbin

Protection Profile Digital Tachograph Vehicle Unit (VU PP) Version 1.0 BSI-CC-PP

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP Version 1.0

Common Criteria for Information Technology Security Evaluation Protection Profile. General-Purpose Operating System Protection Profile

Extended Package for Mobile Device Management Agents

Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Computer Security. Evaluation Methodology CIS Value of Independent Analysis. Evaluating Systems Chapter 21

Common Criteria Evaluations for the Biometrics Industry

Certification Report

solutions Biometrics integration

Certification Report

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments

Certification Report

Version Control Using Subversion. 12 May 2013 OSU CSE 1

The Costs of Managed PKI:

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Common Criteria Security Target

McAfee Firewall Enterprise

Certification Report

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. August Version 2.

Joint Interpretation Library

UCI FISMA Core Program Procedures & Processes Frequently Asked Questions (FAQs)

Certification Report

Certification Report

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

Certification Report

IT Audit and Compliance

Appendix B7. Master Data Management Business and Technical Requirements Solicitation No.: YH Page 229

Enterasys Networks, Inc. Netsight/Network Access Control v Security Target

C033 Certification Report

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0

Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX FIPS, MPX FIPS, MPX FIPS appliances

CERTIFICATION REPORT No. CRP271

Certification Report

Intrusion, Inc. SecureNet Pro Intrusion Detection System Version 4.1 SP1 Security Target December 20, 2002 Document No.

The Convergence of IT Security and Physical Access Control

Protection Profile for Full Disk Encryption

Understanding changes to the Trust Services Principles for SOC 2 reporting

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

C015 Certification Report

Smartcard IC Platform Protection Profile

Certification Report

U.S. Government Protection Profile for Database Management Systems

Certification Report

Certification Report

Consolidated Audit Program (CAP) A multi-compliance approach

This policy is not designed to use systems backup for the following purposes:

Security Target. McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 4.5. Document Version 1.3. October 12, 2011

NetWrix USB Blocker Version 3.6 Quick Start Guide

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN

Security Domain Separation as Prerequisite for Business Flexibility. Igor Furgel T-Systems

The Convergence of IT Security and Physical Access Control

Java Card Protection Profile Open Configuration

Security Target Microsoft SQL Server Team

MIFARE DESFire EV1 MF3ICD81

Citrix Systems, Inc. NetScaler Platinum Edition Load Balancer Version 9.1 Security Target

Configuration Management: Best Practices White Paper

Certification Report

SECURITY TARGET FOR CENTRIFY SUITE VERSION

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Certification Report

Certification Report

ESKISP Conduct security testing, under supervision

Oracle Audit Vault Oracle FLEXCUBE Universal Banking Release [April] [2014]

Cloud Computing Governance & Security. Security Risks in the Cloud

Common Criteria Security Target For NetScaler Platinum Edition Load Balancer Version 10.0

CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

Security Target. Symantec TM Network Access Control Version Document Version February 14, 2013

System Security Plan University of Texas Health Science Center School of Public Health

IndustrialIT System 800xA AC 870P/Melody Engineering

Data Governance And Modeling Best Practices Axis Software Designs, Inc. All Rights Reserved

Secuware Virtual System (SVS)

Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February Version 1.

Security Target for. Security Evaluations Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065

Certification Report

Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.

Overview. System Definition Webster s Dictionary. System Engineering Hierarchy. System Engineering. Computer-Based Systems [PRE2005]

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

Provide access control with innovative solutions from IBM.

Transcription:

Writing a Protection Profile for a Security Service Package Donald Marks, John Hale Center for Information Security University of Tulsa Donald-marks@utulsa.edu John-hale@utulsa.edu hale@utulsa.edu

Disclaimer This is not an official position of any organization These are personal reflections based upon experiences in working with Protection Profiles for Security Service Packages (SSPs)

Experiences Develop a testable methodology for security service packages (SSP) Develop a security target for a smart card Teach CC to a graduate class Graduate class project to write PP for an SSP

Outline of Talk Background SSP features Differences between PPs & SSPs Testing an SSP Case study: Smart Card Conclusions

CC Organization CC/PP Class1 Class2 Family Family Family SFR/SAR SFR/SAR SFR/SAR SFR/SAR SFR/SAR SFR/SAR SFR/SAR

Common Criteria The CC is viewed as a dictionary of possible security and assurance functions CC lists smallest possible increments of these security and assurance functions CC organized hierarchically by function Wide choice in building PPs, and STs

Protection Profiles Protection Profiles (PPs) define an implementation- independent set of security requirements for a class of TOEs. Protection Profile document structure (same structure for an SSP) 1. PP Introduction 2. TOE Description 3. TOE Security Environment (Threat, Assumption, Policy) 4. Security Objectives 5. Security Requirements (Functional and Assurance) 6. Application Notes 7. Rationale But, users may need a grouping by purpose, objectives, or services services

Assurance Grouping Assurance requirements grouped in Consistency Instruction Manuals (CIMs CIMs) Basic, medium robustness, etc Grouping makes PPs easier to write We need to group security functional requirements into services services Then write a PP for those Security Service Packages (SSPs SSPs)

Security Service Packages SSPs are distinct forms of Protection Profiles in that they are not intended to identify a concrete or complete set of threats for a TOE. SSPs aim at meeting a set of security objectives Designed as modular elements for constructing PPs SSP organization - identical to that of a regular PP SSP contents and narrative text broadly characterize essential elements of a security service

PP/SSP Elements SSP PP

Features of Security Service The CC meets all possible situations, a PP meets a specific class of situations, a security service is in between these in generality Meets a set of specific security objectives, defining threats is less important. Should be a specific service, not a general property

Examples Access Control CC classes for a specific class of use Security auditing for Sarbanes-Oxley compliance Any sort of security engineering template Other Examples Authentication for military systems Non repudiation for e-mail Confidentiality for HIPAA

Example: Access Control SSP Requirements User identification User authentication Validate access requests System management of security features Protection of security system Supplemental requirements Auditing Role and domain management Session security

Scope of Protection Profile for SSP The SSP can rarely be used, without modification,, in any real PP Minimum case: all systems implementing access control must have these functions PPs for most real systems will require additional security functional requirements Normal case: requirements for the most common implementation of this function PPs for some systems will require deletion (or more rarely, addition) of some security functional requirements

Testable Methodology Protection Profiles are tested for completeness and accuracy Common Evaluation Methodology (CEM) Requires a level of completeness not found in SSPs Consistency Instruction Manual (CIM) Lacks necessary detail for evaluating security functional requirements Methods updated, applied, integrated, and changes suggested for SSP CEM preferred for a formal evaluation

Case Study: Smart Card ST Cryptoflex smart card identification function Access control needed to prevent changing credentials

Case Study: Cryptoflex CryptoFlex incorporates a limited OS to manage smart card resources User memory CPU, internal memories Security features Features it offers to a reader A secure file architecture A communication interface A set of commands based on ISO 7816-3,4 standards

Use of Access Control SSP Cryptoflex is Minimal system only required 60% of the SFRs in the PP written for a typical typical system Still easier than writing PP from scratch

Case Study: Minimal AC Access control implementation lacking Banners Clocks and time stamps Audit mechanisms Interactive sessions As a result. Deleted or modified related Assumptions Policies Objectives SFRs

Case Study: Observations STs for some systems will require augmenting SSP security requirements; others (such as the smart card) will require deleting requirements SSP for AC limited the number of objectives and requirements that had to be considered Promoted consistency in development and writing processes (should promote consistency across STs as well) Saved an estimated 30% on development time

Findings, Recommendations and Conclusions SSPs cannot simply be inserted into PPs or STs, they must be modified to fit the situation SSPs should address a small set of stated objectives SSPs may include threat classes, not specific threats SSPs may address a typical or a minimal system SSPs should not be used as procurement specifications SSPs simplify writing PPs and STs Additionally, these documents are more uniform and thus easier to understand and evaluate Evaluation similar to conventional evaluation