BSI - Federal Office for Information Security. Evaluation and Certification of IT Security Technology in Germany



Similar documents
Challenges in the Information Age

Update on the German Scheme

ISO The international IT security standard. Marcel Weinand / Marcel Weinand

Protection Profile Digital Tachograph Vehicle Unit (VU PP) Version 1.0 BSI-CC-PP

BSI-DSZ-CC-S for. Dream Chip Technologies GmbH Germany. Dream Chip Technologies GmbH

BSI-DSZ-CC-S for. GLOBALFOUNDRIES Singapore Pte. Ltd. GLOBALFOUNDRIES Singapore Pte. Ltd.

Common Criteria Evaluations for the Biometrics Industry

Spoof Detection and the Common Criteria

Smart grid cyber security certification

CERTIFIED. SECURE SOFTWARE DEVELOPMENT with COMMON CRITERIA

Technical information on the IT security certification of products, protection profiles and sites

ETSI TS : Electronic Signatures and Infrastructures (ESI): Policy

BSI-DSZ-CC for. tru/cos tacho v1.1. from. Trueb AG

The Challenge of Raising Business Value through Objective Evaluation of IT Security, & Japan s IT Security Policy

BSI-PP for. Protection Profile Secure Signature-Creation Device Type 1, Version developed by

Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS

JTEMS A Community for the Evaluation and Certification of Payment Terminals

Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates. Copyright 2010 CyberSecurity Malaysia

Industry Example: The European Market for Electricity

IT Security Certification and Criteria Progress, Problems and Perspectives

Common Criteria Explained Series Common Criteria Guidance for Developers Evaluation Assurance Level 4. January 2013, v 1.42

Orgnisation of the health care system in Germany. Virus Hepatitis Prevention Board Berlin, 13. October Johannes Hallauer, HU Berlin

Cloud Computing - Starting Points for Privacy and Transparency

Common Criteria. Introduction Magnus Ahlbin. Emilie Barse Emilie Barse Magnus Ahlbin

Information Technology Security Evaluation Criteria ( ITSEC ) Critères d'évaluation de la securitie des systémes informatiques

Open Smart Card Infrastructure for Europe

NIAP CC Evaluation & Validation Scheme: Scheme Home. From the United States:

Common Criteria V3.1. Evaluation of IT products and IT systems

How To Understand The History Of Organic Farming In Europe

BSI-DSZ-CC for. IBM Security Access Manager for Enterprise Single Sign-On, Version 8.2. from. IBM Corporation

Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5),

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD

Details for the structure and content of the ETR for Site Certification. Version 1.0

Future for industrial policies

MAKING SENSE OF SMART CARD SECURITY CERTIFICATIONS

Lessons and Insights from

SUSE Linux Enterprise 12 Security Certifications

BSI-DSZ-CC for. Microsoft Forefront Unified Access Gateway 2010 (CC) Version / Build from. Microsoft Corporation

A secure, economic infrastructure for signing of web based documents and financial affairs Overview of a server based, customer-friendly approach.

Duale Hochschule Baden-Württemberg (DHBW) Baden-Wuerttemberg Cooperative State University

Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs

Update Update on the Spanish Evaluation and Certification Scheme

Security Compliance: Making the Proper Decisions

Korea IT Security Evaluation and Certification Scheme

Introducing atsec information security. Helmut Kurth, Sal la Pietra and Staffan Persson

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

National Information Assurance Program (NIAP) Evolution

Preventing fraud in epassports and eids

Smartcard IC Platform Protection Profile

Enterprise Management Solutions Protection Profiles

Constructing Trusted Code Base XIV

BSI-DSZ-CC For. Red Hat Enterprise Linux, Version 5.6 Virtualization with KVM. from. Red Hat, Inc.

National Plan for Information Infrastructure Protection

BSI-DSZ-CC for. IBM Tivoli Access Manager for e-business version FP4 with IBM Tivoli Federated Identity Manager version 6.2.

Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium , Miami Beach FL / USA

BSI-DSZ-CC for. Digital Tachograph EFAS-4.0, Version 02. from. intellic GmbH

Information security audit (IS audit) - A guideline for IS audits based on IT-Grundschutz

ISO/IEC for secure mobile web applications

Start your studies with TestDaF

EN Type Approval & Certification of AMS (QAL1)

Configuration Management. Security related. Software Engineering Processes

Build a CC assurance package dedicated to your risk assessment. Francois GUERIN Security Program Manager francois.guerin@gemalto.

BSI-DSZ-CC for. Oracle Database 11g Release 2 Enterprise Edition. from. Oracle Corporation

On Security Evaluation Testing

EUROPEAN WORKSHOP ON INDUSTRIAL COMPUTER SYSTEMS

22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1

2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee , Bonn

UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME DESCRIPTION OF THE SCHEME

BSI-DSZ-CC for. JBoss Enterprise Application Platform 5 Version and from. Red Hat

The Market for Organic Products in Europe

Are You Prepared to Successfully Pass a PCI-DSS and/or a FISMA Certification Assessment? Fiona Pattinson, SHARE: Seattle 2010

DISCOVER A BOOK FAIR FULL OF OPPORTUNITIES.

Securing VoIP Networks using graded Protection Levels

BSI-DSZ-CC For. Microsoft Windows Server 2008 R2 Hyper-V, Release from. Microsoft Corporation

A Structured Comparison of Security Standards

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?

Smart Meter PKI - Make or Buy?

Coffee Break German. Lesson 03. Study Notes. Coffee Break German: Lesson 03 - Notes page 1 of 15

Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP)

BSI-DSZ-CC for. IBM RACF for z/os, Version 1, Release 12. from. IBM Corporation

This document is a preview generated by EVS

Information & Communication Security (SS 15)

How to Use ISO/IEC with Arbitrary Smart Cards

BSI-DSZ-CC for. PR/SM for IBM zenterprise EC12 GA1 Driver Level D12K. from. IBM Corporation

BSI-DSZ-CC for. Red Hat Enterprise Linux, Version 6.2 with KVM Virtualization for x86 Architectures. from. Red Hat, Inc.

Crisis in Europe Germany s Position in the Crisis

Culture, risk factors and

BSI TR : Secure Transport. Requirements for Service Providers (EMSP) regarding a secure Transport of s

Low Assurance Protection Profile for a VPN gateway

FISMA Implementation Project

Certification Report

The Significance of Common Criteria, Protection Profiles, and Lumeta IPsonar

A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification

Standardising privacy and security for the cloud

smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany

BSI-DSZ-CC for

Protection Profile for UK Dual-Interface Authentication Card

Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX FIPS, MPX FIPS, MPX FIPS appliances

Industry Example: The European Market for Gas

Certification Report

Transcription:

Bernd Kowalski 27.10.2004 Folie 1 BSI - Federal Office for Information Security Evaluation and Certification of IT Security Technology in Germany The BSI - History, Tasks and Services Product Certification Common Criteria Role of Certification in Public Acquisition Future Market Requirements Bernd Kowalski Bundesamt für Sicherheit in der Informationstechnik (BSI) Federal Office for Information Security

Bernd Kowalski 27.10.2004 Folie 2 Office History and Structure History and Figures Office founded by law in 1991. Associated with the Federal Ministery of Interior. Annual budget: 45 Mio. Employees: 380. Location: Bonn. The BSI is the German Federal IT Security Authority associated with national and international partners in the field of Cryptography, Internet-Security and Certification.

Bernd Kowalski 27.10.2004 Folie 3 Tasks and Services Tasks by Law Analysis of IT-threats and -risks. Improve national IT-Security in cooperation with industry. Security Evaluation and Certification of IT systems. Provide the protection of classified information. Operation of central security services like Keymanagement.

Bernd Kowalski 27.10.2004 Folie 4 Tasks and Services BSI as a part of the national IT-Security Environment Federal Government Suppliers Directives National IT-Infrastructure Deliverables Services Initiatives Citizens, Public Sector, Industry Partners

Bernd Kowalski 27.10.2004 Folie 5 Services: Tasks and Services Citizens Webportal service www.bsi-für-bürger.de, information about Internet security issues (consuming IT-Security) Gov`t & Industry: (consuming IT-Security) baseline security standard Grundschutz, for corporate IT-infrastructures with medium-level requ. Critical Information Infrastructure Protection: provide means for extraordinary security events. Warning & Alerting services in case of security events: Federal-CERT serving the German Federal Gov`t. Devices & services to protect classified communication in gov`t & industry. Counter-eavesdropping services&standards for Fed.Gov`t, incl. physical -, emission -, mobile security Manufacturers & Service Prov`s: (offering IT-Security) Security Certification&Approval of IT-Products&Systems

Bernd Kowalski 27.10.2004 Folie 6 Objectives Product Certification Evaluation of security features of IT-Products. Improve both security and quality of IT-infrastructures. Independant and trustworthy product evaluation and certification. Consideration of national security requirements. Strategic support for national IT-Security industry. Legal Framework BSI is the national authority for the German certification scheme. No general legal obligation to purchase certified products. Except: approval of products for the processing of classified information, and special regulated areas.

Bernd Kowalski 27.10.2004 Folie 7 Product Certification Why should manufactures apply for a certificate? Improve product quality and security. Use public product certificate for product marketing. Government requirements in certain areas: German Signature Law, EU- and NATO-Directives etc. Why should Buyers request for a certified product? Product has been evaluated by an independant, accredited body. Manufacturer is responsible for evaluation expenses not the buyer. Certificate may help to provide evidence for resistance against certain threats.

Bernd Kowalski 27.10.2004 Folie 8 Product Certification History S Kriterien für die Bewertung der Sicherheit von Systemen der Informationstechnik (ITSEC) Juni 1991 Certification Criteria 1985: US-Orange Book IT-Security acquisition requirements from the US DoD for special systems. 1989: The BSI Greenbook for Germany. 1991: European Information Technology Security Evaluation Criteria (ITSEC). Common Criteria for Information Technology Security Evaluation Part I: Introduction and general model May 1998 Version 2.0 CCIB-98-026 1999: Common Criteria (CC) V2.1 - the first agreed international certification standard published under ISO/IEC 15408

Zertifizierende und anerkennende Nationen Kanada Australien/ Neuseeland Deutschland Großbritannien USA DCSSI Frankreich CSE BSI CESG NIAP DSD NITE/IAP Japan Common Criteria CCRA Czech. Republik Anerkennende Nationen Ungarn Finnland Griechenland Niederlande Norwegen Schweden Östereich Türkei Bernd Kowalski 27.10.2004 Folie 9 Israel Italien Spanien

Bernd Kowalski 27.10.2004 Folie 10 Product Certification Contributors in the Certification procedure Manufacturer: requests for a certificate provides complete product documentation Evaluation Facility: design evaluation, penetration tests audits in development and production evaluation report to certification body Certification body: develop certif. criteria together with CCRA-partners accept evaluation report, issue product certificate

Bernd Kowalski 27.10.2004 Folie 11 Product Certification Product Certificates recently issued by the BSI: Infineon Smartcard-Controller (Smart Card IC SLE66CX322P) Gemplus Smart Card Betriebssystem(GemXpressoPro E64PK) SuSE Betriebssystem (Linux) IBM Betriebssysteme, Directory-Server, Tivoli Microsoft Firewall GeNUA Firewall Utimaco PC-Sicherheitsprodukte Renesas (Hitachi) Smartcard-Controller (AE43C Version 01) Philips Smartcard-Controller (P16WX064V0C) G + D Tachosmart Card (STARCOS 2.4 Tach.Card Applic.)

Bernd Kowalski 27.10.2004 Folie 12 Common Criteria Number of CC-Certificates issued total number of certificates issued worldwide BSI-Zertifikate 120 100 80 60 40 32 43 p.a. 77 107 CC ITSEC 40 35 30 25 20 15 10 5 0 2 6 6 4 p.a. 18 14 4 4 34 2 CC ITSEC 20 0 23 21 19 13 2000 2001 2002 2003 2000 2001 2002 2003 2004 Prognose evaluation facilities worldwide: 36, Germany: 12 Quelle: CCRA, MC 2003

Bernd Kowalski 27.10.2004 Folie 13 Certificates per Type of Product Common Criteria Total number of certificates per type of product Percentage of certificates per type in rel. To total number p.a. p.a. 120 100 80 60 40 20 0 biometry system PP security products smart card 100% 80% 60% 40% 20% 0% biometry system PP security products smart card 2000 2001 2002 2003 2000 2001 2002 2003 Characteristics: many products are smartcard related certification focussing on components little relevance to customer / end-user solutions therefore: CC not yet usable for End-User marketing Quelle: CCRA, MC 2003

Bernd Kowalski 27.10.2004 Folie 14 Common Criteria Certificate Numbers per Scheme and Evaluation Level 35 30 25 20 15 10 5 0 Australia/NZ Number of certificates per certification scheme (2003) Canada France Characteristics BSI Germany UK US NIAP biometry system PP security products smart card European schemes are leading in smartcards BSI scheme also used by US IT-manufacturers preference for high evaluation levels 30 25 20 15 10 5 0 Number of level certificates of evaluation per evaluation for CC level certificates low EAL high EAL1 EAL1+ EAL2 EAL2+ EAL3 EAL3+ EAL4 EAL4+ EAL5 EAL5+ EAL6 non smart card smart card

Bernd Kowalski 27.10.2004 Folie 15 Role of Certification in Public Acquisition US-Government Obligations to use CC-Certification: FACT SHEET NSTISSP No. 11 National Information Assurance Acquisition Policy CCRA By July 2002 - the acquisition of all COTS IA and IA-enabled IT products to be used on systems specified, shall be limited only to those which have been evaluated and validated [acc to CC, NIST/NSA/NIAP or FIPS program]. Legend: COTS: Commercial of the shelf IA: Information Assurance NST/ISSP: National Security Telco and Info Systems Security Policy The US-Directive #11 might have a significant future impact on the global IT market.

Bernd Kowalski 27.10.2004 Folie 16 Role of Certification in Public Acquisition European/German Situation EU Kommission: Digital Tachograph: EU-Directive (law-level) NATO: Multilateral Defense: Infosec Technical and Implementation Directive on the use of Common Criteria in NATO Airbus A 400M Eurofighter 2000 UN/G8: G8 - Principles on Critical Infrastructure Protection D: German Signature Law Smartcards for German healthcare system European/German aqcuisition in the Public Sector requires CC-approval on a per project basis.

Bernd Kowalski 27.10.2004 Folie 17 Future Market Requirements Problems with present Product Certification Procedures Product Certification is costly and time-consuming. Certification works mainly for components not for end-user products. Present Certification does not include the complete product value chain. Only few Certificates address mass market / COTS products. Number of moderate evaluation levels (EAL 1 or 2) is very low. Product Certification must also meet the requirements of mass market products: low-cost, short time-to-market, based on Common Criteria for international acceptance.

Bernd Kowalski 27.10.2004 Folie 18 Future Market Requirements Results of a BSI investigation on mass market product certification Classic CC-approach does not meet requirements concerning cost and time. There is a big interest among those manufactureres in CC-certification. Action: Development of a draft enhanced certification procedure based on CC. Characteristics of the draft enhanced procedure Evaluation level: EAL1+ combined with additional requirements. Consider additional checks at the manufacturer. Limitation of the certificate validation time. Consider continous Life-Cycle checks at the event of new releases or threats occur. Additional procedures at the manufacturers compensate possible draw-backs from lower evaluation levels.

Bernd Kowalski 27.10.2004 Folie 19 Contact Thank You for Your Attention! Bernd Kowalski Bundesamt für Sicherheit in der Informationstechnik Godesberger Allee 185-189 53175 Bonn Phone: +49 0 228 9582-700 Fax: +49 0 228 9582-455 Bernd.Kowalski@bsi.bund.de www.bsi.de