Top Banner
© Crown Copyright (2000) Module 1 Evaluation Overview
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: © Crown Copyright (2000) Module 1 Evaluation Overview.

© Crown Copyright (2000)

Module 1

Evaluation Overview

Page 2: © Crown Copyright (2000) Module 1 Evaluation Overview.

“You Are Here”

MODULE 3SCHEME RULES &

PROCEDURES

MODULE 2ASSURANCE

MODULE 1EVALUATION OVERVIEW

Page 3: © Crown Copyright (2000) Module 1 Evaluation Overview.

Introduction

• Why is IT Security needed?

• What is IT security evaluation?

• What is Assurance?

• What are the Scheme Rules?

Page 4: © Crown Copyright (2000) Module 1 Evaluation Overview.

What Protection ?

Salaries Database

Page 5: © Crown Copyright (2000) Module 1 Evaluation Overview.

Aspects of IT Security

• Confidentiality - protection against unauthorised disclosure of information

• Integrity - protection against unauthorised modification of information or loss of accuracy

• Availability - protection against unauthorised withholding of information or resources

Page 6: © Crown Copyright (2000) Module 1 Evaluation Overview.

Assets and Threats

• Assets– valuable organisational resources– disclosure or compromise or loss would be

inconvenient or harmful

• Threats– a potentially harmful action affecting

confidentiality, integrity or availability of assets

Page 7: © Crown Copyright (2000) Module 1 Evaluation Overview.

Countermeasures

• A measure put in place to counter, or help counter, an identified threat to an asset

• Countermeasures can be:– IT, i.e. implemented by hardware, firmware or

software; or– non-IT, e.g. physical or procedural measures

Page 8: © Crown Copyright (2000) Module 1 Evaluation Overview.

Types of Countermeasure

• Preventative– place restrictions on who can do what

• Detective– provide means to detect events which indicate a

potential compromise of assets

• Corrective– take action in response to undesirable events

Page 9: © Crown Copyright (2000) Module 1 Evaluation Overview.

Countermeasure Examples

• Preventative:– access control (physical or logical)– data encryption

• Detective– auditing of security relevant events– data integrity measures, e.g. checksums

• Corrective– user account lockout after login failures– suspension of inactive user sessions

Page 10: © Crown Copyright (2000) Module 1 Evaluation Overview.

Vulnerabilities and Risks

• Vulnerabilities– a security weakness that may allow realisation

of a threat to compromise an asset

• Risk– likelihood of a threat exploiting a

vulnerability to harm an asset and/or cause loss

Page 11: © Crown Copyright (2000) Module 1 Evaluation Overview.

Castle Example

Page 12: © Crown Copyright (2000) Module 1 Evaluation Overview.

Sources of Vulnerabilities

Vulnerabilities can arise from:• Inappropriate selection of countermeasures• Errors in their design or implementation• Conflict between countermeasures• Loopholes allowing circumvention of

countermeasures• Misuse of countermeasures

Page 13: © Crown Copyright (2000) Module 1 Evaluation Overview.

Impact of Vulnerabilities

Vulnerabilities can be:

• Exploitable– given sufficient time, resources and expertise

an attacker could break through in practice

• Non-Exploitable– an attacker will be unable in practice to exploit

it to compromise an asset

Page 14: © Crown Copyright (2000) Module 1 Evaluation Overview.

What is Evaluation ?

• An independent assessment of a Target of Evaluation (TOE) involving– analysis– testing

• Scope of work is defined in a Security Target

• Aimed at establishing a required level of assurance

Page 15: © Crown Copyright (2000) Module 1 Evaluation Overview.

What is Assurance?

• A measure of confidence that a TOE meets its security objectives– risk to assets reduced to acceptable level

• Assurance is governed by– depth of evaluator analysis– degree of developer and evaluator testing– formality / rigour of developer evidence

• Leads to concept of Assurance Levels

Page 16: © Crown Copyright (2000) Module 1 Evaluation Overview.

Scope of Evaluation

• Product - an IT package that can be purchased and deployed in a number of different operational environments

• System - a specific IT installation with a particular purpose and a known operational environment

Page 17: © Crown Copyright (2000) Module 1 Evaluation Overview.

Security Target

• This defines:– the assets, threats– assumptions– environment . . . . . etc.

• Everything you need to know about the TOE– including the IT countermeasures or security

functions

Page 18: © Crown Copyright (2000) Module 1 Evaluation Overview.

Evaluation Criteria

• European, 1991 – Information Technology Security Evaluation

Criteria (ITSEC)

• World-wide (ISO standard), 1998– Common Criteria (CC)

Page 19: © Crown Copyright (2000) Module 1 Evaluation Overview.

Evaluation Methodology

• How we do evaluations– defined in ITSEM and CEM

• Defines techniques for the various activities:– Refinement Analysis– TOE life-cycle assessment– Vulnerability Analysis– Testing of TOE

Page 20: © Crown Copyright (2000) Module 1 Evaluation Overview.

The UK Scheme

• Scheme rules cover– quality and management– security / confidentiality– training– appointment and accreditation

Page 21: © Crown Copyright (2000) Module 1 Evaluation Overview.

Evaluation Parties • Developer - produces the TOE

• Sponsor - pays for the evaluation

• Evaluator - performs the evaluation

• Certifier - oversees the evaluation and issues certificates where appropriate

• Accreditor - relevant to systems only

Page 22: © Crown Copyright (2000) Module 1 Evaluation Overview.

Evaluation ProcessDeveloper / Sponsor

CLEF

Certification Body

Accreditor / Sponsor

TOE Definition

Evaluation Technical Report

Certification Report

Deliverables

Problem Reports

Page 23: © Crown Copyright (2000) Module 1 Evaluation Overview.

Evaluation Conduct

• Impartiality- what interest do you have in the outcome?

• Repeatability- could you get the same results?

• Reproducibility- would other CLEFs get the same results?

• Objectivity- minimise subjective judgement

Page 24: © Crown Copyright (2000) Module 1 Evaluation Overview.

Summary - 1

• Need IT Security to protect assets from threats using adequate countermeasures

• Evaluation allows a Target Of Evaluation to be independently assessed

• Assurance gives a level of confidence that a TOE meets its security objectives

Page 25: © Crown Copyright (2000) Module 1 Evaluation Overview.

Summary - 2

• Evaluation Criteria - ITSEC and CC

• Evaluation Methodology - ITSEM and CEM

• Scheme Rules and Interpretations– quality, management, security, training– application of criteria and methodology

• Evaluation Conduct– impartial, repeatable, reproducible and objective

Page 26: © Crown Copyright (2000) Module 1 Evaluation Overview.

Further Reading

• UKSP 01

• UKSP 04 Part 1

• ITSEC, Sections 0 and 1

• Common Criteria Part 1, Section 4