Security Domain Separation as Prerequisite for Business Flexibility. Igor Furgel T-Systems



Similar documents
Joint Interpretation Library

Common Criteria v3.1 Vulnerability Assessment: What is new?

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April Version 2.

Lessons learnt in writing PP/ST. Wolfgang Killmann T-Systems

Smartphone applications Common Criteria is going Mobile ICCC2012 Paris

Guidelines for Developer Documentation

Joint Interpretation Library

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Software Modularisation and the Common Criteria

Joint Interpretation Library

Security IC Platform Protection Profile

BSI-DSZ-CC-S for. GLOBALFOUNDRIES Singapore Pte. Ltd. GLOBALFOUNDRIES Singapore Pte. Ltd.

BSI-DSZ-CC-S for. Dream Chip Technologies GmbH Germany. Dream Chip Technologies GmbH

Joint Interpretation Library. Guidance for smartcard evaluation

Security Standards BS7799 and ISO17799

Common Criteria for Information Technology Security Evaluation. Part 3: Security assurance components. September Version 3.

Oracle Business Intelligence Enterprise Edition (OBIEE) Version with Quick Fix running on Oracle Enterprise Linux 4 update 5 x86_64

Enterasys Networks, Inc. Netsight/Network Access Control v Security Target

Courtesy Translation

C038 Certification Report

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. September Version 3.

Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report

Smartcard IC Platform Protection Profile

22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1

C015 Certification Report

Oracle Identity and Access Management 10g Release running on Red Hat Enterprise Linux AS Release 4 Update 5

Secuware Virtual System (SVS)

Principles and characteristics of distributed systems and environments

C033 Certification Report

BSI-DSZ-CC For. Microsoft Windows Server 2008 R2 Hyper-V, Release from. Microsoft Corporation

Trustwave DbProtect Version Security Target

U.S. Government Protection Profile for Database Management Systems

Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February Version 1.

Secure Containers. Jan Imagination Technologies HGI Dec, 2014 p1

Joint Interpretation Library. ETR-lite for composition : Annex A Composite smartcard evaluation : Recommended best practice. IC and ES composition

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

SAMSUNG SDS FIDO Server Solution V1.1 Certification Report

Common Criteria Protection Profile. Electronic Identity Card (ID_Card PP) BSI-CC-PP Approved by the Federal Ministry of Interior. Version 1.

Protection Profile for UK Dual-Interface Authentication Card

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD

The MILS Component Integration Approach To Secure Information Sharing

Protection Profile for Server Virtualization

BSI-DSZ-CC for. tru/cos tacho v1.1. from. Trueb AG

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN

Common Criteria for Information Technology Security Evaluation Protection Profile. General-Purpose Operating System Protection Profile

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition

BSI-DSZ-CC for. NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3. from. NXP Semiconductors Germany GmbH

Writing a Protection Profile for a Security Service Package

Build a CC assurance package dedicated to your risk assessment. Francois GUERIN Security Program Manager francois.guerin@gemalto.

Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT

September 18, Modular development in Magento 2. Igor Miniailo Magento

Certification Report

JMCS Northern Light Video Conferencing System Security Target

Mobile Billing System Security Target

Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX FIPS, MPX FIPS, MPX FIPS appliances

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP Version 1.0

Java Card Protection Profile Open Configuration

More effective protection for your access control system with end-to-end security

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center

Certification Report

Thales e-security Key Isolation for Enterprises and Managed Service Providers

1E POWER AND PATCH MANAGEMENT PACK INCLUDING WAKEUP AND NIGHTWATCHMAN Version 5.6 running on multiple platforms

CardOS V4.4 CNS. Edition 04/2010. Security Target CardOS V4.4 CNS with Application for QES

Common Criteria Protection Profile

Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium , Miami Beach FL / USA

Firewall Protection Profile V

Common Criteria. Introduction Magnus Ahlbin. Emilie Barse Emilie Barse Magnus Ahlbin

Open XML Open Packaging Conventions Low Assurance Security Target

Software Concepts. Uniprocessor Operating Systems. System software structures. CIS 505: Software Systems Architectures of Distributed Systems

How To Understand The Toe

Security Target. Astaro Security Gateway V8 Packet Filter Version Assurance Level EAL4+ Common Criteria v3.1

Client/Server and Distributed Computing

Constructing Trusted Code Base XIV

Effective Java Programming. efficient software development

Certification Report

C013 Certification Report

BSI-DSZ-CC for

Certification Report

Certification Report

3GPP TS V8.0.0 ( )

Patterns for Business Object Model Integration in Process-Driven and Service-Oriented Architectures

BSI-DSZ-CC for. Oracle Database 11g Release 2 Enterprise Edition. from. Oracle Corporation

Information Technology Security Evaluation Criteria. ITSEC Joint Interpretation Library (ITSEC JIL)

Certification Report

EMC Corporation Data Domain Operating System Version Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.

Transcription:

Security Domain Separation as Prerequisite for Business Flexibility Igor Furgel T-Systems

23th-25th September, 2008, page 2 What are we speaking about? What is a Security Domain and what do we need it for? Impact on Security Target Means of Domain Separation Domain Separation and ADV_ARC Responsibility and Evidence: Developer vs. Operator Conclusion

23th-25th September, 2008, page 3 What is a Security Domain? Let us imagine a classical situation: there is a secure/reliable platform and we need to add a non-critical application onto this platform Non-critical Application any impact? Critical Application Operating System IPC Hardware External Bus secure / reliable platform

23th-25th September, 2008, page 4 What is a Security Domain? What is common at such a constellation? => Common is resources sharing, when some applications shall or have to use same resources Resources sharing opens an opportunity of interacting between applications and, hence, their mutual impacting The key idea behind the property Domain Separation is that the TSF creates Security Domains for use by potentially harmful entities and that these domains are kept separate from each other

23th-25th September, 2008, page 5 What is a Security Domain? Good example: field upgrades on mass market products Domain Separation Non-critical Applications Security Domain 1 Critical Applications Operating System IPC Hardware External Bus secure / reliable platform

23th-25th September, 2008, page 6 What is a Security Domain? Heterogeneous security policies enforced by same TOE Security Policy 2 (e.g. moderate attack potential) Security Domain 2 Critical Application 2 Security Policy 1 (e.g. high attack potential) Security Domain 1 Critical Application 1 Operating System IPC Hardware External Bus secure / reliable platform

23th-25th September, 2008, page 7 What is a Security Domain? Formal Definition A security domain is a confined active physical and/or logical unit where a single and homogeneous security policy is valid and applied. This security policy controls the behaviour of security services being provided in the context of this security domain. The main generic characteristics of a security domain are the following: a security domain as a whole represents an encapsulated unit and can be considered as an object; internal and externally visible actions and reactions of this unit represent its well-defined properties; communication between such objects occurs by well-defined (i.e. syntactic and semantic) messages and implements the relationships between the objects. This definition of security domain covers the TSF self-protection as well as the relevant service (resources) offered to other entities.

23th-25th September, 2008, page 8 Impact on Security Target Speaking the Common Criteria language, a security policy for a TOE is defined by a set of security functional and assurance requirements {SFRs + SARs} chosen for this TOE within the Security Target. Hence, a ST defines a homogeneous security policy and, therefore, effectively exactly one security domain within the TOE. Even in this simple case, there are indeed two security domains (from the TOE s point of view): the first one is defined within the TOE by the ST: {SFRs + SARs}, the second, implicit one is the remaining world outside the TOE: this default security domain always exists and shall enforce the security policy as expected by the environmental security objectives stated in the ST. The stripline is the physical/logical scope of the TOE. The TSF shall maintain this shell (=> ADV_ARC).

23th-25th September, 2008, page 9 Impact on Security Target Let us imagine that The values of assets secured by a product are different or A product is physically distributed and its single parts are operated within differently restricted environments (e.g. in open field and inside a company). In such a common case there are two opportunities to define a security policy for this product: either a homogeneous security policy at the most restrictive level (this is the approach of the current CC) or a heterogeneous security policy fittingly to the situation. For a heterogeneous security policy we need different sets of {SFRs + SARs} within a product and, hence, different security domains inside same TOE. For such a case, an effective, TOE-internal separation of these security domains becomes a necessity.

23th-25th September, 2008, page 10 Impact on Security Target Suggestion for the next CC version A Security Target shall permit definition of different security domains for same TOE A dedicated set of {SFRs + SARs} (and, if appropriate, parts of SPD and Security Objectives) shall be attributed to each security domain within the ST (of course, there could be overlapping and hierarchical requirements) If a ST does define different security domains, the family ADV_ARC must be part of the assurance package chosen.

23th-25th September, 2008, page 11 Impact on Security Target Suggestion for the next CC version One Security Target, one TOE Security Policy 2 Security Domain 2 {SFRs + SARs}_2 (e.g. moderate attack potential) Security Policy 1 Security Domain 1 {SFRs + SARs}_1 (e.g. high attack potential) ADV_ARC: Domain Separation

23th-25th September, 2008, page 12 Means of Domain Separation Domain Separation can be achieved on physical and logical ways In case of physical separation, all communication passes through the external bus and the domain separation is trivially defined (but not trivially enforced). In case of logical separation, this requires the operating system to be of a different nature than the applications running on it: The OS itself shall provide special services enforcing a Domain Separation.

23th-25th September, 2008, page 13 Means of Domain Separation: Physical Separation Security Domain 1 A1 1 OS Security Domain 1 Application A 1 1 (single module) Operating system (OS) maintains resources Hardware (HW) provides physical protection and may support OS (e.g. NMI) HW External Bus Segregating modules: Keeping security through well-defined interfaces (external separ.)

23th-25th September, 2008, page 14 Means of Domain Separation: Logical Separation Security Domain 2 A2 1 Domain Separation IPC OS HW Segregating modules: Security Domain 3 A3 A3 1 2 IPC External Bus Security Domain 2 Application A 2 1 does not trust A 3 1 + A3 2 Security Domain 3 Applications A 3 1 + A3 2 do not trust A 2 1 Operating system manages all resources incl. IPC Hardware provides physical protection and must support OS (MMU) Maintaining security through well-defined interfaces (external separ.) Divide-et-Impera state-space of complex applications (internal domain separation)

23th-25th September, 2008, page 15 Means of Domain Separation Technical means may be used for Domain Separation: Access Control on the domain resources Information Flow Control on inter-domain communication Temporarily confined use of shared resources ( object reuse ) Physical protection Organisational prerequisites being helpful for Domain Separation: Comprehensive architectural concept Controlled usage of well-defined design and programming rules Object-oriented hard- and software design Well-defined inter-domain communication format(s)

23th-25th September, 2008, page 16 Security Domain Separation and ADV_ARC An effective security domain separation is one of the crucial architectural decisions. Firstly, it encompasses other architectural security properties like Self-Protection being one of the means for Domain Separation, and Non-Bypassing being one of the effects of Domain Separation Secondly, a domain separation decision may significantly impact the general security design concept of the TOE by impacting the entire life cycle of and, hence, the business model for the product (e.g. SW upgrades), influencing the design specification (ADV_TDS), and representing an important input for vulnerability analysis (AVA_VAN)

23th-25th September, 2008, page 17 Security Domain Separation and ADV_ARC So, it is evident that an evaluator needs a description how the domain separation is achieved (separation mechanisms) in order to understand efficiency of the separation and to become able to perform vulnerability analysis. The current assurance component ADV_ARC.1 finally requires the evaluator to determine that the developer's description of the security domains takes into account all of the SFRs claimed by the TOE (cf. CEM) There is no formal requirement to analyse how the domain separation is achieved (merely a hint in Application Notes in CEM).

23th-25th September, 2008, page 18 Security Domain Separation and ADV_ARC Suggestion for the next CC revision/version ADV_ARC.1.2C (Part 3): The security architecture description shall describe the security domains maintained by the TSF consistently with the SFRs and how the domain separation is achieved. ADV_ARC.1-2 (CEM): The evaluator shall examine the security architecture description to determine that it describes the security domains maintained by the TSF and how the domain separation is achieved. Since Self-Protection is one of the means for Domain Separation, and Non-Bypassing is one of the effects of Domain Separation, we also suggest including the content of ADV_ARC.1.4C and ADV_ARC.1.5C in ADV_ARC.1.2C.

23th-25th September, 2008, page 19 Responsibility and Evidence: TOE Developer vs. TOE Operator Who is responsible for Domain Separation and who brings evidence for its security properties/reliability? The TOE Developer implements an Abstract Machine managing resources to be shared among applications and communication between them. This Abstract Machine shall enforce domain separation; an application is usually not able to manage all these resources by its own means.

23th-25th September, 2008, page 20 Responsibility and Evidence: TOE Developer vs. TOE Operator If the relevant separation mechanisms are in the scope of a security evaluation, the evaluation and certification bring the evidence for the domain separation. I.e. the TOE Developer brings this evidence in this case. The Security Domain Provider (installing and configuring the Security Domain) and the TOE Operator shall merely follow the respective instructions of the TOE Developer.

23th-25th September, 2008, page 21 Responsibility and Evidence: TOE Developer vs. TOE Operator Domain Separation: Evidence by the TOE Developer (CC certificate) TOE Critical Applications Non-critical Applications Security Domain 1 Operating System Hardware IPC Abstract Machine External Bus

23th-25th September, 2008, page 22 Responsibility and Evidence: TOE Developer vs. TOE Operator If the relevant separation mechanisms are assumed being provided by the TOE s IT environment, the entire responsibility lies on the TOE Operator He has to operate an Abstract Machine (TOE s IT environment) evidently separating Security Domains on a sufficient security level (i.e. according to the security policy for the entire product/system which also might include an AVA_VAN assurance requirement). But how can the TOE Operator get such an evidence for the TOE s IT environment? Again, rather by a security certification of the related domain separation mechanisms (the context: operating licence)! There is no way to circumvent an appropriate certification of the separation mechanisms. The only question is who provides the evidence: the TOE Developer or the TOE Operator!

23th-25th September, 2008, page 23 Responsibility and Evidence: TOE Developer vs. TOE Operator Domain Separation: Evidence by the TOE Operator (operating licence) TOE Critical Applications Non-critical Applications Security Domain 1 Operating System Hardware IPC Abstract Machine External Bus

23th-25th September, 2008, page 24 Domain Separation and Business Flexibility Domain Separation facilitates business and service flexibility by free-hand adding additional and modifying/deleting existing applications on a running trusted platform without security re-certification and without recall of the product(s). These modifications can be done directly in the field by the product operator or in a trusted environment by the service provider (depends on business model) Opportunity for heterogeneous Security Policies within same ST This approach enables defining merely one ST for a product where different security needs really exist (e.g. medium and high resistant domains within same TOE). It also enables issuing merely one security certificate for this TOE. Price to be paid Additional implementation of separation mechanisms or/and special architecture (e.g. physical separation) as well as Additional evidence for effectiveness of the domain separation The benefits are worth the price!

23th-25th September, 2008, page 25 Thank you for your attention! Dr. Igor Furgel T-Systems GEI GmbH ICT Security Rabinstrasse 8 53111 Bonn +49 (228) 98410 igor.furgel@t-systems.com