1 lecture 8 security evaluation. 2 contents u introduction u the orange book u tni-the trusted...

53
1 Lecture 8 Security Evaluation

Post on 18-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

1

Lecture 8

Security Evaluation

Page 2: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

2

Contents Introduction The Orange Book TNI-The Trusted Network Interpretation Information Technology Security Evaluation

Criteria The Common Criteria Security Analysis

Page 3: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

3

What is an Evaluation? Independent Verification and Validation

(IV&V) by an accredited and competent Trusted Third Party

Provides a basis for international Certification against specific formal standards (i.e. CC) by national authorities

Page 4: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

4

Evaluation Process

Assurance Techniques

IndependentEvaluations

Assurance

Produce provide formal evidence of

PrivacyRequirements

that

are

Properly Managed

Privacy Rights

to protect

InformationAsset Owners Confidence

require

giving

Page 5: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

5

The target of the evaluation

Products, e.g., operating systems, which will be used in a variety of applications and have to meet the generic security requirements.

Systems, i.e., a collection of products assembled to meet the specific requirements of a given application.

Page 6: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

6

The purpose of the evaluation

Evaluation: assessing whether a product has the security properties claimed for it.

Certification: assessing whether a product is suitable for a given application.

Accreditation: deciding that a product will be used in a given application.

Page 7: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

7

The method of the evaluation A method must prevent from:

The product is later found to contain a serious flaw Different evaluations of the same product disagree in

their assessment Product-Oriented:

Examine and test the product. Different evaluations may give different results.

Process-Oriented: Look at the documentation and the process of

product development. Easier to achieve repeatable results, but may not be

very useful

Page 8: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

8

The structure of the evaluation criteria

Functionality: The security features of a system, e.g.,

DAC (Discretionary), MAC (Mandate), authentication, auditing

Effectiveness: The mechanisms used appropriate for the

given security requirements? Assurance:

The thoroughness of the evaluation

Page 9: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

9

Organizations of the evaluation process

Government agency: backs the evaluation process and issues the certification

Accredited private enterprise: enforce the consistency of evaluations (repeatability and reproducibility)

Page 10: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

10

What Do CC Evaluations Give Us?-Benefits

Confidence & Trust in privacy and security characteristics of products and the processes used to develop and support them (full product life cycle)

Build official assurance arguments Prove technologies are indeed privacy enhancing as

claimed formal, independently verifiable and repeatable

methods Provide basis for international certification Provide Certification Report Differentiate products Formally support demonstrable due diligence/care

Page 11: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

11

The costs of evaluation

Costs: Fee paid to evaluation; Time to collect required evidences Time and money of training of evaluators Time and efforts of liaising with the

evaluation team

Page 12: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

12

The Orange Book Trusted Computer Security Evaluation

Criteria (1985) A yardstick for users to assess the degree

of trust that can be placed in a computer security systems;

Guidance for manufacturers of computer security systems;

A basis for specifying security requirements when acquire a computer security system

Page 13: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

13

Security and evaluation categories

Security policy: mandatory and discretionary access control

policies expressed in terms of subjects and objects

Marking of objects: Labels specify the sensitivity of objects

Identification of subjects: Individual subjects must be identified and

authenticated Accountability:

audit logs of security relevant events have to be kept.

Page 14: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

14

Security and evaluation categories (Cont’d)

Assurance: Operational: architecture Life cycle: design, test, and configuration

management

Documentation: Required by system managers, users and

evaluators

Continuous protection: Security mechanisms cannot be tampered with.

Page 15: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

15

Four security divisions D: Minimal protection C: Discretionary protection B: Mandatory protection A: Verified protection

Page 16: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

16

Orange Book Ratings D: Minimal Protection

Did not qualify for higher C1: Discretionary Security Protection

Resources protected by ACLs, memory overwrites prevented C2: Controlled Access Protection

Access control at user level, clear memory when released B1: Labeled Security Protection

Users, files, processes, etc, must be labeled B2: Structured Security Protection

Big step, covert channels, secure kernel, etc. B3: Security Domains

Auditing, secure crash A1: Verified Design

Same requirements, more rigorous implementation

Page 17: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

17

TNI-The Trusted Network Interpretation-The Red Book

Two kinds of networks Networks of independent components, with

different jurisdictions, policies, management, etc. Centralized networks with single accredited

authority, policy and network trusted computing base

The red book only considers the 2nd type. The vulnerability of the communication paths Concurrent and asynchronous operation of the

network components

Page 18: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

18

Red book Policy Security policies deal with secrecy and integrity.

Node names as DAC group identifiers in C1 Audit trails should log the user of cryptographic keys.

In the red book, integrity refers to The protection of data and labels against

unauthorized modification The correctness of message transmission,

authentication of source and destination of a message.

Labels indicate whether an object had ever been transmitted between nodes

Page 19: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

19

Other Security Services in the Red Book

Describe Services Functionality Strength: how well it is expected to meet its

objective Assurance: derived from theory, testing, SE

practice, validation and verification. Rating

None Minimum (C1) Fair(C2) Good (B2) Not offered - present

Page 20: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

20

Services in the red book Communication integrity

Authentication Communication field integrity Non-repudiation

Denial of Service Continuity of operation Protocol-based protection Network management

Compromise protection Data confidentiality Traffic confidentiality

Page 21: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

21

Windows NT security rating

Windows NT is only secure for such purposes (e.g. - "C2 Certified") if: Run the particular Compaq or Digital hardware

models specified by NIST, Run the particular version of Windows NT (3.50)

specified by NIST, Remove the floppy drive from the computer, and Remove network connectivity, and Configure Windows NT as specified by NIST.

Page 22: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

22

UNIX security rating The Unix system is only as secure as the C1

criterion provides only discretionary security protection

(DSP) against browsers or non-programmer users AT&T, Gould and Honeywell made vital changes to

the kernel and file system in order to produce a C2 rated Unix operating system.

Have to sacrifice some of the portability of the Unix system. It is hoped that in the near future a Unix system with an A1 classification will be realized, though not at the expense of losing its valued portability.

http://secinf.net/unix_security/Unix_System_Security_Issues.html

Page 23: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

23

ITSEC: Information Technology Security Evaluation Criteria

A harmonized European criteria refers to (1991) Effectiveness: how well a system is suited

for countering the threats envisaged. And correctness: assurance aspects

relating to the development and operation of a system.

Page 24: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

24

The Evaluation Process TOE (Target of Evaluation)

An IT system, part of a system or product that has been identified as requiring security evaluation; ie, that which is being evaluated.

A Target of Evaluation (TOE) is the specific IT product or system that is subject to evaluation.

It is particularly relevant to, and part of the standard terms within, Common Criteria and ITSEC.

A Security Target (ST) contains the IT security objectives and requirements as pertaining to a specific target of evaluation with the definition of its functional and assurance measures. http://www.itsecurity.com/papers/border.htm

Page 25: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

25

Security target All aspects of the TOE that are relevant for evaluation

Security objectives Statements about the system environment Assumptions about the TOE environment Security functions Rationale for security functions Required security mechanisms Required evaluation level Claimed rating of the minimum strength of mechanisms http://www.rycombe.com/itsec.htm

Definition (Matt Bishop, 2003): A security target is a set of security requirements and

specifications to be used as the basis for evaluation of an identified product or system.

Page 26: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

26

Security Functionality Security functionality description:

Security objectives: Why is the functionality wanted?

Security functions: What is actually done?

Security mechanisms: How is it done?

Page 27: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

27

Security functions in ITSEC Identification and authentication Access control Accountability: record the exercise of rights Audit: detect and investigate events that might

represent threats to security Object reuse Accuracy: correctness and consistency of

data Reliability: consistency and availability of

service Data exchange: referring to the International

standard ISO 7498-2

Page 28: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

28

Security rating in ITSEC F1: C1 Discretionary security protection F2: C2 Controlled Access Protection F3: B1 Labeled Security Protection F4: B2 Structured Protection F5: B3 & A1 Security domain and verified design F6: high integrity F7: high availability F8: data integrity during communication F9: for high confidentiality (cryptographic devices) F10: for networks with high demands on

confidentiality and integrity

Page 29: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

29

Assurance of Effectiveness

An assessment of effectiveness should examine Suitability of functionality Binding of functionality (compatibility) Strength of mechanism Ease of use Assessment of security vulnerabilities within the

construction of the TOE, e.g., ways of bypassing or corrupting security enforcing functions

Assessment of security vulnerabilities within the operation of the TOE.

Page 30: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

30

Assurance of Correctness Seven levels E0-E6 specify the list of

documents that have to be provided by the sponsor and the actions to be performed by the evaluator. Development Process:

Following the stages of a top-down methodology, security requirements, architectural design, detailed design, and implementation are considered.

Development evaluation: includes configuration control and, from class E2

upwards, developer security, e.g., the confidentiality of documents association.

Operation: Refers to operational document, including delivery,

configuration, star-up and operation.

Page 31: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

31

Seven Evaluation classes E0: fail E1:a security target and an informal description of the

target E2:+informal description of detailed design, configuration

control and a controlled distribution process E3: + a detailed design and the source code

corresponding to the security functions shall be provided E4: formal model of the security policy; rigorous approach

and notation for architectural and detailed design, vulnerability analysis

E5: close correspondence between detailed design and source code, vulnerability based on source code

E6: formal description of the security architecture of the TOE, consistent formal model of security policy, possible to relate portions of the executable form of TOE to the source code

Page 32: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

32

Correspondence between Orange Book and ITSEC

OB ITSEC

D E0

C1 F1+E1

C2 F2+E2

B1 F3+E3

B2 F4+E4

B3 F5+E5

A1 F5+E6

Page 33: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

33

Common Criteria ISO 15408

International ISO IT Security standard for formally specifying IT Security Requirements and how these are to be independently evaluated and tested so products may be formally certified as being trustworthy (1991)

3-Part Standard, plus evaluation methodology

http://www.corsec.com/ccc_faq.php

Page 34: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

34

CC Evaluations Involve: ANALYSIS

Product Documentation Product Design (Security & Privacy Focus) Development Processes & Procedures Operation & Administration Guidance and

Procedures Vulnerability Assessments

TESTING Independent & Witnessed Fully Documented & Repeatable

REPORTS Lead to International Certification

Page 35: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

35

Types of Common Criteria evaluations Categories of Evaluations

* Typically as the first step in an EAL.

Protection Profile

Protection Profile

*Security Target

*Security Target

Evaluation Assurance

Levels (EALs)

Evaluation Assurance

Levels (EALs)

Page 36: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

36

Scope Interviews Full Documentation Review Independent Testing Witness of Developer Testing Observation Reports When Required Deliverables:

Security/Privacy Target or Protection Profile Evaluation Technical Report Certification Report (published by CSE, and

recognized by NSA and other Certification Bodies)

Page 37: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

37

Protection Profiles A Protection Profile (PP) is an implementation-

independent statement of security requirements that is shown to address threats that exist in a specified environment.

A PP would be appropriate in the following cases: A consumer group wishes to specify security requirements for

an application type A government wishes to specify security requirements for a

class of security products An organization wishes to purchase an IT system to address its

security requirements A certified protection profile is one that a recognized

Certification Body asserts as having been evaluated by a laboratory competent in the field of IT security evaluation to the requirements of the Common Criteria and Common Methodology for Information Technology Security Evaluation.

Page 38: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

38

The evaluation process

DocumentationPreparation

-------------------Vendor

Consultant

DevelopSecurityTarget

--------------------Vendor

Consultant or Lab

ConductEvaluation

--------------------Lab

VendorNIAP CCEVS

NIAPIssues

Certificate--------------------NIAP CCEVS

Work not necessarily performed by the CCTL: Documentation preparation

Writing the Security Target Other consulting

Evaluations must be performed by lab personnel

•CCTL: Common Criteria Test Labs•CCEVS (Common Criteria Evaluations)•The National Information Assurance Partnership (NIAP) is the governing body for all CCTLs in the U.S.

Page 39: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

39

Required evaluation materials

Security Target TOE (target of evaluation) Configuration Management documentation Functionality Specification High and low level design documentation User and Administrator’s guides Life-cycle documentation Development tool documentation Security Policy model Correspondence analyses Installation and start-up procedures Delivery procedures

Page 40: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

40

Steps in the evaluation process

0

10

20

30

40

50

60

70

80

Input Task CM Development Life-cyclesupport

Testing Output Task

EAL2

EAL4

Evaluation assurance levels (EAL)

Page 41: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

41

Results of the evaluation process

Outcomes of Common Criteria Testing

In U.S. this follows approval of lab test results Public posting of ST, validation report, and certificate

Validation Certificate

Validation Certificate

Page 42: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

42

How the Process Works1. Privacy (and security) requirements for

a technology and associated claims are precisely specified using the CC

2. Technology is built, documented and tested to these requirements

3. Technology is submitted to nationally accredited labs for evaluation against the standards

4. Evaluation is conducted under the oversight of national authority

Page 43: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

43

Process (Continued)

5. Once vendor claims are proven, national authority confers certification and publishes a Certification Report

6. Results are internationally recognized under a Mutual Recognition Arrangement

Page 44: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

44

Evaluation assurance levels (EAL)

To meet the great variation in required levels of security within and between both government and commercial interests, there are seven levels of evaluation (EAL-1 through EAL-7).

Only the first four levels can be evaluated by commercial laboratories.

Page 45: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

45

EAL (Cont’d) EAL-1 examines the product and its documentation

for conformity, establishing that the Target does what its documentation claims.

EAL-2 tests the structure of the product through an evaluation, which includes the product’s design history and testing.

EAL-3 evaluates a product in design stage, with independent verification of the developer’s testing results, and evaluates the developer’s checks for vulnerabilities, the development environmental controls, and the Target’s configuration management.

EAL-4 is an even greater in-depth analysis of the development and implementation of the Target and may require more significant security engineering costs.

Page 46: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

46

EAL (Cont’d) EALs 5-7 require even more formality in the

design process and implementation, analysis of the Target’s ability to handle attacks and prevent covert channels, for products in high-risk environments.

In the United States, evaluation to EALs 5-7 must be done by the National Security Agency (NSA) for the U.S. government.

Page 47: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

47

Correspondences

OB ITSEC CC

D E0 NA

NA NA EAL1

C1 F1+E1 EAL2

C2 F2+E2 EAL3

B1 F3+E3 EAL4

B2 F4+E4 EAL5

B3 F5+E5 EAL6

A1 F5+E6 EAL7

Page 48: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

48

International evaluations history TCSEC (1980)

Trusted Computer System Evaluation Criteria (U.S.)

ITSEC (1991) Information Technology Security

Evaluation and Certification Scheme (Europe)

CTCPEC (1993) Canadian Trusted Computer

Product Evaluation Criteria (CTCPEC)

Page 49: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

49

TCSEC – U.S.(Orange Book) 1985

U.K. Confidence Levels1989

German Criteria

French Criteria

Federal CriteriaDraft 1993

Canadian Criteria1993

ITSEC1991

Common CriteriaV1 1996V2 1998

www.commoncriteria.org

International evaluations history

Page 50: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

50

Common Criteria participating countries

Certificate producing countries

Australia New Zealand Canada France Germany United Kingdom United States

Certificate consuming countries Austria Finland Greece Israel Italy Netherlands Norway Spain Sweden

Page 51: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

51

Security Analysis Phases:

Identification of the system and its assets Valuation of the assets

security levels Identification of vulnerabilities and threats Valuation of vulnerabilities and threats Assessment of risks on assets

depending on security levels and misuse likelihoods stop, if all risks are bearable

Planning and design of countermeasures Analysis of the extended system

countermeasures are also vulnerable

Page 52: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

52

Security Analysis Common Criteria Trust Concept: Owner of an asset has to trust countermeasures built up by

audits concept is insufficient since it does not concentrate on parts of the

audited system! Potentially Trusted System Parts:

Principals with access to an asset all principals may be benevolent

Asset itself free of vulnerabilities

Countermeasures sufficient protection immune against attacks on itself

Reduction of the analysis process by considering trust in system parts

Page 53: 1 Lecture 8 Security Evaluation. 2 Contents u Introduction u The Orange Book u TNI-The Trusted Network Interpretation u Information Technology Security

53

Summary Introduction The Orange Book TNI-The Trusted Network Interpretation Information Technology Security Evaluation

Criteria The Common Criteria Security Analysis