tcsec: the orange book. tcsec trusted computer system evaluation criteria

26
TCSEC: The Orange Book

Upload: malik-wormington

Post on 14-Jan-2016

223 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

TCSEC: The Orange Book

Page 2: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

TCSEC Purpose

- Establish best practices

- Requirements for assessing the effectiveness of security controls

- Measure computing resource security

- Evaluate, classify, and select systems considered for computing resources

Page 3: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

TCSEC: Purpose

Guidance – provides guidance on how to design a trusted computing system along with their associated data and services

Metrics – provides a metric (classification) for determining the level of trust assigned to a computing system.

Page 4: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Orange Book: Metrics

Measurement of a system's security is quantified using a classification system.

The Classes are:D C1 & C2B1, B2, B3A1

A is more secure than D

2 is more secure than 1.

Page 5: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Orange Book: Metrics

The rating system is hierarchical

D applies to any system that fails to meet any of the higher level security classes.

The other levels have increasing security requirements.

A1 systems would be rare.

Page 6: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Disclaimer

An A1 system is not 100% secure.

The risk level is expected to be lower compared to the other levels

Page 7: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Metrics: C1

• Identification and authentication (user id & password)

• DAC – (Discretionary Access Controls)

– capable of enforcing access controls

– Example: Basic Unix/Linux OS, user, group, other.

Page 8: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Metrics: C2

• C1 plus

• Audit trails

• System documentation and user manuals.

Page 9: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Metrics B1

• C2 plus

• Discovered weaknesses must be mitigated

Page 10: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Metrics B2

• B1 plus

• Security policy must be defined and documented

• Access controls for all subjects and objects

Page 11: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Metrics: B3

• B2 plus

• Automated imminent intrusion detection, notification and response.

Page 12: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Metrics: A1

• B3 +

• System is capable of secure distribution (can be transported and delivered to a client with the assurance of being secure)

Page 13: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Orange Book Security Criteria

Security Policy

Accountability

Assurance

Documentation

Page 14: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

1. Security Policy

The set of rules and practices that regulate how an organization manages, protects, and distributes information.

Page 15: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

1. Security Policy

The policy is organized into subjects and objects.

Subjects act upon objectsSubjects – processes and users.Objects – data, directories, hardware, applications

A well defined access control model determines if a subject can be permitted access to an object.

Page 16: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Security Policy

Top secret, secret, classified, non-classified

Need-to-know, job division, job rotation, NDA, etc.

Page 17: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

2. Accountability

The responsibilities of all who come in contact with the system must be well defined.

Identification (… the process to identify a user)

Auditing (...accumulating and reviewing log information and all actions can be traced to a subject)

Organizational chart

Job description contract, AUP, NDA, SLA

Page 18: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

3. Assurance

The reasonable expectation that the security policy of a trusted system has been implemented correctly and works as intended.

Assurance is organized intoOperational assuranceLife-cycle assurance

Page 19: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

3a. Organizational Assurance

Security policy is maintained in the overall design and operation of the system.Example: Users of the system have an assurance

that access controls are enforced

Page 20: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

3b. Life-cycle Assurance

Insuring the system continues to meet the security requirements over the lifetime of the system. Updates to the software and hardware must be

consideredThe expectation that the system remains

operational (is available) over its lifetimeSustainability-cycle

Page 21: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

4. Documentation Requirements

Security Features User's Guide

Trusted Facility Manual

Test Documentation

Design Documentation

Page 22: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Documentation: Security Features User's Guide

Aimed at the ordinary (non-privileged) users. General usage policy*Instructions on how to effectively use the systemDescription of relevant security features

Page 23: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Documentation: Trusted Facility Manual

Aimed at the S.A. StaffHow the system is configured and maintainedIncludes the day-to-day required activities

• Backups

• Reviewing security logs

Page 24: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Documentation: Test Documentation

Instructions on how to test the required security mechanisms

Page 25: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

Documentation: Design Documentation

Define the boundaries of the system

A complete description of the hardware and software.

Complete system design specifications

Description of access controls

Page 26: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria

The Orange Book

• The Orange book has been superseded by the Common Criteria