50
고려대학교정보보호대학원 고려대학교 정보보호대학원 Security Evaluation Standards

Security Evaluation Standards

Embed Size (px)

Citation preview

Page 1: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

고려대학교정보보호대학원

Security Evaluation Standards

Page 2: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

Page 3: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집Security Engineering vs. CC Evaluation

Page 4: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

4

In 1967, realized that ( ) system posed security issues that went beyond the traditional concerns for secure communications. ( ) (@ NSA) talked 3 important issues :

Security Evaluation Begins

Page 5: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

5

DoD’s TCSEC

In ( ), DoD’s TCSEC (Trusted Computer System Evaluation Criteria, a.k.a Orange Book) was made.

Specifies evaluation classes ( )

A1 : ( )

It had been expected that a higher, A2, incorporating ( ), would eventually be added, but the addition was never made.

Page 6: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

6

In ( ), DoD CSEC was elevated to NSA NCSC ( ) because :

The growing interconnection of computers into networks ( ) between COMSEC and COPUSEC.

High-level computer security market was never really as large as people expected. They need to ( ) by including in it sectors that were nonmilitary but had computer security concerns : Other departments of government and the commercial sector, especially banking.

Rise of NSA NCSC

Page 7: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

7

In Mid 80s - Mid 90s

The Red Book (Trusted Network Interpretation (TNI) of the Orange Book)

Series that expanded on Orange Book in specific areas was called “( )”.

Canada, UK, European Community develop standards similar to and beyond the Orange Book.

Page 8: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

8

CMVP : to test and validate cryptographic modules to

FIPS 140-1 (1994, developed by a government and industry working group)

FIPS 140-2 (2001, supersedes FIPS 140-1)

Draft FIPS 140-3 (Revised Draft 09/11/09, will supersede FIPS 140-2)

11 Security Sections 4 Security Assurance Levels

Joint effort between NIST and the Communications Security Establishment (CSE) of the Government of Canada.

All cryptographic modules used by US Federal Government to protect ( )information go through CMVP validation program.

CMVP

Page 9: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

9

Works jointly with the NIST ( ). ( ) algorithmic validation is a ( ) for

( ) module validation.

International Standards Organization

ISO/IEC 19790 Security Requirements for Cryptographic Modules

Published March 2006

ISO/IEC 24759 Test requirements for cryptographic modules

Published July 2008

( ) was the editor for both international standards.

CMVP

Page 10: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

10

CMVP

Page 11: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

11

Country CST Lab

USA

•ÆGISOLVE, INC. (USA - CA)• Aspect Labs, a division of BKP Security, Inc. (USA - CA)• atsec Information Security Corporation (USA - TX)• CEAL: a CygnaCom Solutions Laboratory (USA - VA)• COACT Inc. CAFE Laboratory (USA - MD)• Computer Sciences Corporation (USA - MD)• ICSA Labs, An Independent Division of Verizon Business (USA - PA)• InfoGard Laboratories, Inc. (USA - CA)• SAIC Accredited Testing & Evaluation (AT&E) Labs (USA - MD)• SAIC Accredited Testing & Evaluation (AT&E) Labs (USA - VA)•Underwriters Laboratories, Inc. (USA - IL)

Canada•DOMUS IT Security Laboratory (Canada)• EWA - Canada IT Security Evaluation & Test Facility (Canada)

Germany • TÜV Informationstechnik GmbH (Germany)

Japan• ECSEC Laboratory Inc. (Japan)• Information Technology Security Center (Japan)

Spain • Epoche & Espri (Spain)

Taiwan • TTC IT Security Evaluation Laboratory (Taiwan, R.O.C.)

※ http://csrc.nist.gov/groups/STM/testing_labs/index.html

※ CST Lab : Cryptographic and Security Testing Lab accredited by NVLAP(National VoluntaryLaboratory Accreditation Program)

CMVP

Page 12: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

12

The international CC ( ) emerged because :

Extending the computer security market by internationalizing the market.

The orange book had serious flaw : The problem with bundling functionality and assurance.

It ruled out systems that had simple functions but high assurance of the correctness of those functions.

Thus CC reflects the ( ) unbundled approach rather than ( ) bundled one, although there is a provision for bundled PPs.

International Standard, CC

Page 13: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

13

International Standard, CC

Page 14: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

14

Common Criteria

Part 1 : General Information.

Part 2 : Catalogue of FunctionalRequirements. What are the Security Functions?

Part 3 : Catalogue of AssuranceRequirements. How deeply and rigorous are Security Functions

evaluated(designed & implemented)?

CC Structure

Page 15: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

15

CC Structure

CC Part 3

* Assurance Classes

* Assurance Components

CC Part 2Security Functional Requirements

* Functional Classes

* Functional Families

* Functional Components

* Detailed Req.

* Functional Packages

CC Part 1Introduction and General Model

* Assurance Families

* Detailed Req.

* Eval. Assur. Levels

Security Assurance Requirements

CC Part 3

* General Concepts

* Evaluation Model

Page 16: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

16

Part 1 : Defines general concepts and principles of IT security evaluation and presents a general model of evaluation. Part 1 also defines PP and ST.

Part 2 : Establishes a set of security functional components as a standard way of expressing the security requirements for IT products and systems.

Part 3 : Produces a catalog of establishes set of assurance components that can be used as a standard way of expressing the assurance requirements for IT products and systems. Part 3 also presents the 7 EALs, which are predefined packages of assurance components that make up the CC scale for rating confidence in the security of IT products and systems.

CC Structure

Page 17: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

17

Common Criteria Evaluation Methodology(CEM)

Evaluation methodology to which the criteria is applied.

Primarily for evaluators reviewing vendor assurance measures and for validators confirming evaluator activities/ findings.

( )

A report submitted to the Certification Board summarizing the results of the evaluation and forming the basis of the certification.

Because the ETR contains sensitive information, it is not a public document but its distribution is subject to the rules of the national scheme.

CC Structure

Page 18: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

18

( )

Each country has a Scheme.

CC Structure

Page 19: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

Scope, Depth,Rigor

Evaluation Levels

Page 20: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

20

Time and Expense

Page 21: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

21

International agreement between CC certificate producing and/or consuming nations to recognize CC evaluations for ( ).

Eliminates ( ) of IT products and PPs.

This saves vendors and users time and resources.

CAP( ) and CCP ( )

CAP : Certificate Authorizing Participants Unanimity of the whole CCRA members

CCP : Certificate Consuming Participants

International Agreement, CCRA

Page 22: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

22

Limited to the first four security levels of the CC : ( ).

International Agreement, CCRA

Page 23: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

23

The 17 CAP (Certificate Authorizing Participants) Countries :

Australia, Canada, France, Germany, India, Italy, Japan, Malaysia, Netherlands, New Zealand, Norway, Republic of Korea, Spain, Sweden, Turkey, UK, US

The 9 CCP(Certificate Consuming Participants) Countries :

Austria, Czech, Denmark, Finland, Greece, Hungary, Israel, Pakistan, Singapore

International Agreement, CCRA

Page 24: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

24

Common Criteria Portal

Page 25: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

25

Sample Products Evaluated by CC

VMware® ESXi Server 3.5 and VirtualCenter 2.5 EAL4+ 24-FEB-10

Microsoft Windows Mobile 6.5 EAL4+ 09-FEB-10

Apple Mac OS X 10.6 EAL3+ 08-JAN-10

Red Hat Enterprise Linux Ver. 5.3 on Dell 11G Family

Servers

EAL4+23-DEC-09

Windows Vista Enterprise; Windows Server 2008

Standard Edition; Windows Server 2008 Enterprise

Edition; Windows Server 2008 Datacenter Edition

EAL4+

ALC_FLR.3

31-AUG-09

Oracle Enterprise Linux Version 5 Update 1 EAL4+

ALC_FLR.3

15-OCT-08

Green Hills Software INTEGRITY-178B Separation

Kernel, comprising: INTEGRITY-178B Real Time

Operating System (RTOS),

EAL6+ 01-SEP-08

Page 26: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집Sample Products Evaluated by CC

Page 27: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

[1] “Smart TV Security - #1984 in 21st century”, SeungJin (beist) Lee et al., CanSecWest 2013

[2] “Hacking, Surveilling, and Deceiving Victims on Smart TV”,SeungJin (beist) Lee et al., Black Hat USA 2013

[3] “Developing a Protection Profile for Smart TV”,Minsu Park et al., International Common Criteria Conference 2014

[4] “(The First Experimental) Study on Smart TV Forensics”,Heesoo Kang et al., Journal of the KIISC, 2014 (in Korean)

2013.3

2013.7

2014.9

2014.10

[5] (R&D with LG electronics) we got TTA-verifiedsecurity certification for Smart TV from TTA

2015.12

[6] ”Further Analysis on Smart TV Forensics",Minsu Park et al., Journal of Internet Technology (SCI-Indexed Journal),2016.11 (Accepted for Publication)

2016.11

[7] (R&D with LG electronics) We received 'world-first' Common Criteria EAL2 certificationfor home appliances (Smart TV). 2017.4

[8] “Are you watching TV now? Is it real?: Hacking of smart TV with 0-day”JongHo Lee et al., Hack in Paris 2017 2017.6

[10] “LG vs. Samsung Smart TV: Which Is Better for Tracking You?”Sangmin Lee et al., CODE BLUE 2017

2017.11[9] “How to Obtain Common Criteria Certification of Smart TV for Home IoT

Security and Reliability”, Sooyoung Kang et al., Symmetry-Basel (SCI-Indexed Journal)

2017.10

Sample Products Evaluated by CC

Page 28: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

28

The Role of FIPS, CC, and DoD UC APL

Page 29: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

29

Crypto algorithms implemented in security products

“Algorithm”

H/W Security, EMI/EMC, etc.

Various security functions of IT security product

“Product”

Identification & Authentication function, etc.

“Module”

“System”

“Environment”

After CC, C&A

Page 30: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

30

Design

Implement Adapt

After CC, C&A

Page 31: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

31

Title III of the E-Government Act (Public Law 107-347), entitled ( ), requires that all federal agencies develop and implement an agency-wide information security program designed to safeguard IT assets and data of the respective agency.

C&A

Page 32: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

32

There are generally 3 methodologies used by government organizations in order to satisfy the requirements set forth by ( ) :

C&A

Page 33: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

33

C&A

Page 34: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

34

Processes used to evaluate and approve a system for government or military use

Or a highly regulated industry like pharmaceuticals or aeronautics

Not normally used in businesses

C&A

Page 35: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

35

It is a process for ( ) that a given system is safe to operate (security-wise) in its ( ).

A process that ensures systems maintain their ( ) throughout their ( ).

C&A

Page 36: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

36

C&A

Page 37: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

37

Page 38: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

38

An international standard covering everyaspect of information security :

Equipment

Management policies

Human resources

Legal aspects

After CC, BS7799/ISO 17799

Page 39: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

39

After CC, BS7799/ISO 17799

1995

1998

BS 7799 Part 1

BS 7799 Part 2

Swedish standards SS 62 77 99 Parts 1 and 21999

Updated version of BS 7799 Parts 1 and 2

December 2000 ISO/IEC 17799:2000

2001Review of BS 7799-2

September 2002 Updated version of BS 7799-2 (revised and corrected)

Page 40: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

40

Complementarity with Other ISO Standards

After CC, BS7799/ISO 17799

Code of practice for information

security management

ISO 17799

Guidelines for the management

of IT security

ISO13335 (GMITS)

Products and systems certified

by ISO 15408(CC)

Page 41: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

41

CC, even at EAL7(“formally verified design and tested), relies on ( ).

Although mathematical proofs are required for security properties of the system’s API, there is no proof that these properties hold for the actual implementation. This is why testing is still required.

Testing, as Dijkstra famously stated, ( )

Hence, even a system certified at EAL7 must be suspected to contain security flaws.

But Testing Is Still Required…

Page 42: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

42

Formal Proofs are ( )

It does not matter which process was used to implement the software.

Shifting from ( ) to ( ) certification has an immense potential for simplification, saving costs, and making certification more meaningful at the same time.

But Testing Is Still Required…

Page 43: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

43

Now The World Goes for High-EALs

Page 44: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

44

Now The World Goes for High-EALs

Page 45: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

45

Security Engineering vs. CC Evaluation

Page 46: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

46

Hack-Proof Drones Possible with HACMS(High Assurance Cyber Military Systems) Technology

Now DARPA Goes for…

Page 47: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

47

Any Others?

Page 48: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

48

The CC is not alone.

Many evaluation programs exist (30+).

Let’s take a look at them…. briefly!

Security Assurance Landscape

Page 49: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

49

Page 50: Security Evaluation Standards

고려대학교정보보호대학원

마스터제목스타일편집

고려대학교정보보호대학원

Security Evaluation Standards