Você está na página 1de 20

UK IT security evaluation

© Crown Copyright 2002


& certification scheme
Contents Contact Addresses
UK IT Security Evaluation
and Certification Body
CESG
Room 10/4W14
Priors Road
Cheltenham
Gloucestershire GL52 5AJ
Information Security The Key to Success 3
Tel: + 44 (0) 1242 238739
Fax: + 44 (0) 1242 235233
Basic Security Measures 4
http://www.cesg.gov.uk
email:iacs@cesg.gsi.gov.uk
Common Criteria - The Family Tree 5
CLEFS:
An International Standard 6
CMG (CLEF) Syntegra (CLEF)
Kings Court, Guidion House,
IT Evaluation Services in the UK 7 91-93 High Street Harvest Crescent
Camberley, Ancells Park,
Surrey GU15 3RN Fleet,
Evaluation and Commercial Evaluation Facilities 8 Hants GU13 8UZ
Tel: + 44(0)1276 686678
Fax: + 44(0)1276 691029 Tel: + 44 (0) 1252 778837
Fax: + 44 (0) 1252 811635
Step by Step Guide to Evaluation 10 Contact: Ralph Worswick
ralph.worswick@cmgplc.com Contact: Janet Scruby
Clef@syntegra.com
- Preparation 10 Logica UK Ltd (CLEF)
Chaucer House, IBM Global Services (CLEF)
The Office Park Meudon House,
- Evaluation 11 Springfield Drive, Meudon Avenue
Leatherhead Farnborough,
Surrey KT22 7LP Hants GU14 7NB
- Certification and the Certification Body 13
Tel: + 44 (0)1372 369831 Tel: + 44 (0) 1252 558472
Fax: + 44 (0)1372 369834 Fax: + 44 (0) 1252 558001
- Re-evaluation 14
Contact: Simon Milford Contact: Matthew Vale
MilfordS@logica.com Clef@uk.ibm.com
- Certification Maintenance 14
EDS Ltd (CLEF)
Wavendon Tower,
Wavendon
Evaluation Assurance Levels 15 Milton Keynes,
Bucks MK17 8LX
For Further Information 18 Tel: + 44(0)1908 284234
Fax: + 44(0)1908 284393

Contacts 19 Contact: Richard Selby


richard.selby@eds.com

2
two
19
nineteen
For Further Information... Information Security
- The Key to Success

This guide is intended as an introductory overview to certification in the UK against Common Now, more than ever, information is a key
element in the success of any business.
Three essential
Criteria. Further reading is recommended for developers or product sponsors intending to enter
evaluation. All of these documents may be obtained free of charge from the Certification Body. Information security is as important as the elements of
more traditional doors and locks for
safeguarding the assets of a company. As Information Security
UKSP 01 Description of the Scheme updated 2002 more information is created, stored and
moved around using computers, so the Confidentiality - ensuring that only
associated risk increases. In particular appropriate access is allowed to data -
UKSP 04 Developer's Guide updated 2002 using networks or the Internet to share or both from inside or outside the
move information increases the organisation
vulnerability of data.
Common Criteria Evaluation Methodology Part II version 1.0 August 1999 Integrity - ensuring that no
Electronic business is expanding rapidly, unauthorised changes are made to data -
bringing opportunity and risk in equal either in storage or transmission
Common Criteria User Guide October 1999 measure. E-commerce will flourish only
where the security of the transaction is Availability - ensuring that data is
Certification against Common Criteria is one of a suite of services offered by CESG's Infosec assured. Trading partners need to have accessible as required.
Assurance and Certification Services. Further information on these schemes may be obtained confidence in the security of the
via the website www.cesg.gov.uk, e-mail enquiries@cesg.gov.uk information they exchange as well as in the
subsequent storage and handling of that
data.

The demands of information security are


not confined to commercial businesses.
Service industries are now searching for
more direct ways to respond to their
customer needs. Public organisations have
to be sensitive to the privacy requirements
of their clients and have a duty to ensure
that appropriate precautions are taken to
ensure the confidentiality and accuracy of
personal records. Any security-dependent
organisation, such as MOD, must ensure
that its IT protection is continuously
updated and re-aligned to cope with
changing demands and the evolving threat.

18
eighteen 3
three
Basic Security
Measures

All organisations need to Underpinning all of these Because information EAL5 Semiformally EAL7 Formally Verified
protect their information by security measures is the technology extends beyond Designed and Tested Design and Tested
adopting appropriate security assurance provided national boundaries it is
security measures. These by the software or the IT also vital that security Analysis includes all of the implementation. Here the formal model is supplemented
can be organisational, system itself. The security assurance is defined using Assurance is supplemented by a formal by a formal presentation of the
physical, technical or features offered by software internationally accepted model, a semiformal presentation of the functional specification and high level
educational. Such measures are aimed at ensuring the terms and standards - that functional specification and high level design, showing correspondence.
must be based on a three essential elements of way everyone has a clear design and a semiformal demonstration of
Evidence of developer 'white box'
coherent security policy. Confidentiality, Integrity and understanding of what correspondence. The search for
This policy must be derived Availability. What is assurance is being offered. vulnerabilities must ensure resistance to testing and complete independent
from a sound assessment of required is an objective This benefits both users and penetration attackers with a moderate confirmation of developer test results
the threat to an assessment of these developers: attack potential. Covert channel analysis are required. EAL7 is applicable
organisation's information features to determine how and modular design are also required. where a specialised security TOE is
and the impact of well they perform their - Users can easily EAL5 is applicable where the requirement required for extremely high risk
corruption or loss of that stated security functions. compare one product to is for a high level of security in a planned situations.
information. Advice on another to see what development coupled with a rigorous
constructing and Any such assessment must parts of the security development approach.
implementing a security be carried out against functionality have been
policy is available in the clearly defined methods and tested to what levels. EAL6 Semiformally
Code of Practice for objectives. The results Verified Design and Tested
Information Security must be documented and - Developers can
Management, BS7799, and repeatable. The assurance demonstrate to an Analysis is supported by a modular
in the DTI's Information level awarded must have international market that approach to design and a structured
Security Assurance meaningful parameters. their product has gained presentation of the implementation. The
Guidelines for the The end result must be to an objective independent search for vulnerabilities must
Commercial Sector. provide a level of assurance confirmation of the ensure resistance to penetration attackers
with a high attack potential. There must
which is commensurate with validity of its security
be a systematic search for covert
the environmental risk and claims.
channels. Development environment and
within realistic financial configuration management controls are
boundaries. further strengthened. EAL6 is applicable
where a specialised security TOE is
required for high risk situations.

4
four
17
seventeen
Common Criteria -
The Family Tree

EAL1 Functionally tested EAL3 Methodically tested Recognising the need for The Common Criteria are a These previous schemes
and checked independent and objective development of previous evolved and influenced
Analysis is supported by independent testing, the United Kingdom standards and schemes each other as countries
testing of a sample of the security has been working closely used by various nations: reacted to changing
Analysis is supported by 'grey box' testing,
functions in order to understand the with other countries to standards in the IT
selective independent confirmation of the
security behaviour. EAL1 is applicable formulate the rules under The Unites States - environment and in
developer test results and evidence of a
where confidence in correct operation is developer search for obvious which this testing should be Trusted Computer System response to changing
required but the security threat vulnerabilities. Development environment carried out. Since 1990, Evaluation Criteria (TCSEC) threats or attacks.
assessment is low. This assurance controls and TOE configuration work has been going on to and the draft Federal Development was aimed at
package is particularly suitable for legacy management are also required. EAL3 is bring together a number of Criteria. increasing the flexibility of
systems as it should be achievable without applicable where the requirement is for a national and international the various criteria and
the assistance of the developer. moderate level of independently assured schemes in one mutually Canada - Canadian Trusted ensuring that testing
security, with a thorough investigation of accepted framework for Computer Product remained relevant and
the TOE and its development, without testing IT security Evaluation Criteria effective.
EAL2 Structurally tested incurring substantial re-engineering costs. functionality. The national (CTCPEC)
communications security Common Criteria version
Analysis of the security functions exercises authorities of the United Europe - Information
2.1 is now
Kingdom, the United States, Technology Security
a functional and interface specification and EAL4 Methodically an International Standard -
the high-level design of the subsystems of Canada, France, Germany Evaluation Criteria (ITSEC)
Designed, Tested and and the Netherlands ISO 15408
the TOE. There is independent testing of
the security functions and evidence is Reviewed collaborated with the
required of developer 'black box' testing International Standards
and development search for obvious Analysis is supported by the low-level Organisation (ISO) in this
vulnerabilities. EAL2 is applicable where a design of the modules of the TOE and a project which culminated in
low to moderate level of independently subset of the implementation. Testing is the publication of the CC Certificates issued by the UK are recognised
assured security is required. supported by an independent search for Common Criteria (CC). internationally as follows:-
obvious vulnerabilities. Development CC version 2.1 has now
controls are supported by a life-cycle been recognised as a formal EAL1-4 US, Canada, Australia, New Zealand, France,
model, identification of tools and standard - ISO 15408. Germany, Finland, Greece, Israel,Italy,
automated configuration management.
Netherlands, Norway, Spain, Sweden,
EAL4 is applicable where a moderate to
Switzerland
high level of security is required, although
some additional security-specific
EAL5-7 France, Finland, Greece, Italy, Netherlands,
engineering costs may be incurred. Norway, Spain, Sweden, Switzerland

16
sixteen
5
five
An International Assurance Levels
Standard

The Common Criteria aim to Common Criteria provide Although the Common
harness the strengths of two catalogues of Criteria form a new Functionality and Assurance Classes
Common Criteria have 11 functionality classes and 10 assurance classes as follows:
previous standards. The components to allow the standard based on previous
TCSEC Scheme maintained assurance and functionality testing regimes, this does Functionality Assurance
that functionality and requirements to be specified not mean that certificates Audit Protection Profile evaluation
assurance were indivisible - using standard terminology. awarded under previous Cryptographic Support Security Target evaluation
the same standard specified In this way the Common criteria are invalid. While Communications Configuration Management
User Data Protection Delivery and Operation
both what an operating Criteria unite the best the demand exists, Identification and Authentication Development
system must do, and how to methodology for IT security evaluations will be available Privacy Guidance Documents
check the implementation. testing as developed by its in the UK under the ITSEC Protection of TOE Security Functions Life Cycle Support
The strength of this premier exponents over the formula and the resultant Resource Utilisation Maintenance of Assurance
Security Management Tests
approach was the past decade. certificates will continue to TOE Access Vulnerability Assessment
production of functional be recognised by the Trusted Path/Channels
standards for operating Because Common Criteria European partners and
systems (the CI - AI ratings). certificates are recognised Australia and New Zealand. Each of these is broken down into families and then into components.
The weakness lay in the fact by all the signatory nations, Where required, a dual This gives great flexibility in describing the functional and assurance requirements.
it was cumbersome to adapt IT developers no longer certification can be carried
the standard to address new have to go through different out to both CC and ITSEC
requirements. With ITSEC, evaluation processes in simultaneously. The UK
the standard only prescribed different countries. Certification Body is also
assurance activities. Evaluation is more happy to discuss
The Common Criteria have seven Evaluation Assurance Levels (EALs), from EAL1 to a maximum
Security functional straightforward and no effort conversion to Common
level of EAL7. These have an approximate correspondence to the ITSEC levels as shown below:
properties were specified in is wasted in duplication. Criteria with developers of
the Security Target as part products certified under
of a specific evaluation. The ITSEC. By making
advantage of this approach substantial re-use of the
Common Criteria EAL1 EAL2 EAL3 EAL4 EAL5 EAL6 EAL7
was that it adapted readily original ITSEC evaluation
to new types of product, but this offers a cost effective
ITSEC - E1 E2 E3 E4 E5 E6
the downside was that it option for developers who
was less easy for wish to extend the market
consumers to compare the reach of their certified
functionality offered by two product. These assurance packages are designed to provide a balanced grouping of assurance elements
certified products. for general use. The levels represent ascending levels of confidence that can be placed in the
Target of Evaluation (TOE) meeting its security objectives. The higher the level, the greater the
degree of rigour applied in assessing whether the TOE has met its security requirements, for
example, by intensifying the analysis and search for security vulnerabilities.

6
six 15fifteen
IT Evaluation Services in the
United Kingdom

Certification Trusted Service Cost Effective Timely Service


Service
The Certifier reviews the The UK Scheme was We have always recognised The UK Certification Body
What is a TOE?
ETR and raises comments established in 1991 as a however, that security has is committed to working
A Target of Evaluation. This covers the parts of
on areas where additional joint effort by the financial implications and alongside developers in
a product and its documentation that provide the
explanation might be functionality to counter the threats defined in its Department of Trade and since its inception, the order to meet their
needed or test results are Security Target. Industry and the Certification Body has timescales. Developments
unclear. All the Communications-Electronics worked alongside in communications and IT
documentary evidence Security Group (CESG). commercial laboratories to software are constant and
provided by the evaluators is minimised during the first rapid evolution or products The UK IT Security , provide a technically rapid for developers, so it is
taken into account and test evaluation by classifying and the environment will Evaluation and Certification stringent testing service that important that evaluation
results are compared to the product components introduce the possibility of Body is itself part of CESG, is competitive and cost and certification take place
Security Target to ensure all according to their influence vulnerabilities that had not the government organisation effective. Developers can within a reasonable
objectives have been met. on the security features. been envisaged at the time charged with ensuring the choose from five testing timeframe.
Comments are passed to Whenever changes are of the original certification. security of all government laboratories ensuring
the CLEF and to the made to the evaluated Countries participating in and military competitive tendering for The UK CB is committed
developer and their product, the developer can the development of the communications. CESG evaluations. to matching developers'
responses assessed. use the classification to Common Criteria are in the Certifiers operate to the efforts in obtaining timely
When the Certifier is determine the impact on process of formalising an highest standards of The provision of a cost certification
satisfied with the body of certification more easily and assurance maintenance professional competence, effective service is one of
evidence presented to him identify appropriate action. process comparable with technical objectivity and the UK CB's highest
he writes a Certification the Certificate Maintenance commercial confidentiality. priorities
Report and a Certificate is Vulnerabilities can be Scheme offered by the UK All personnel are subject to
granted. discovered in products Certification Body for comprehensive background
which have already been ITSEC certificates. This checks and the Certification
evaluated. In such cases it maintenance is projected to Body itself is housed in a
Re-Evaluation and is normal practice for the be under the control of the secure site. The
Certificate developer to issue a patch. developer, either directly or Certification Body has
Maintenance Where a product is in the via a CLEF. achieved accreditation to the
Certificate Maintenance EN45011 (ISO Guide 25)
Inevitably IT products Scheme the issue of a standard for certification
develop and it is sensible to patch, or patches, does not bodies.
take steps to develop the invalidate the certificate. It
certificate in tandem. The is a consequence of a The UK has a decade's
Certification Body will advise graded scheme that experience of operating a
on whether a re-evaluation moderate level assurances commercial evaluation and
is necessary if a product has do not detect and remove certification scheme.
been modified. The work all vulnerabilities. It must
involved can be also be recognised that the

14
fourteen
7
seven
Evaluation
and CLEFs

IT security testing as part of A list of UK CLEFs with their To date, the UK Scheme Certification Body
an evaluation is carried out full contact details is on has issued ITSEC or CC role during
under the supervision of the page 19. Certificates for over 230 evaluation What is a Security Target?
Certification Body by products and secure This is the specification of the security
accredited laboratories The UK Scheme has systems with 70 currently in The Certification Body is functionality and assurance and the environment
known as CLEFs: successfully tested and evaluation. active at all stages of the in which this is designed to work.
CommerciaL Evaluation certified a wide range of evaluation, although the
Facilities. The CLEFs carry commercial products and bulk of the work is done by
out the analysis of design, secure systems. the CLEF and the
implementation, Developers using the developer. The Certification conclusions and the
development, production Scheme have included Body approves the Security appropriate testing must
and distribution against Argus, Baltimore, Compaq, Target and the Evaluation have been carried out to
agreed security standards. IBM, Sun, Microsoft and Work Programmes. With justify the claimed
CLEFs are appointed after a Oracle. Developers are the exception of EAL1 evaluation assurance level.
rigorous process which generally internationally evaluations the Certifier
ensures that they meet the based and the Scheme has attends a task start-up The Certifier may attend
required standards of welcomed evaluations from meeting with the CLEF and one or more evaluation
technical expertise and the United States, Canada, the developer in order to progress meetings where
operating procedures to Europe and the Far East. discuss the evaluation and the conduct of the
carry out evaluations. All As new products enter agree the schedules for evaluation is reviewed, and
the CLEFs are evaluation or gain activity. Potential problems on complicated evaluations,
well-established companies certification their details are can be identified here and new work schedules
which have provided updated on the Scheme actions agreed to remedy agreed. The Certifier also
computer hardware and website (www.itsec.gov.uk). them. normally attends penetration
software services over many Certification Reports and testing.
years. In each case, their some Security Targets are As testing progresses the
operations cover both the available to download. Certifier monitors the The evaluation process
public and private sectors Here you can also find activities undertaken and culminates in the
and all have practical details of products examines any observation preparation by the CLEF of
experience of the issues evaluated under ITSEC and reports together with their an Evaluation Technical
associated with signposts to other resolution. A key objective Report (ETR). This totals
implementing sophisticated CC products certified by of the Certification Body is all the CLEF findings and
secure systems and Schemes recognised by the to check that the evaluation presents the test evidence.
networks. Each CLEF is UK. For information on has been conducted in The ETR is then sent to the
inspected annually by the other services offered by accordance with the Certification Body.
UK Accreditation Service CESG please access the methodology laid out in the
(UKAS) and conforms to the general website Common Criteria. The
EN 45001 (ISO Guide 25) (www.cesg.gov.uk). evidence provided must
standard for test facilities. support the evaluation

8
eight 13
thirteen
The Evaluation
Process

A commercial be weighed the benefits of dependent on demonstrating


What is a Protection Profile? decision access to a broader market a high level certification.
and gaining a competitive Certification can give you
For a developer advantage for the product. the edge in the national or
Put simply a Protection Profile is a set of requirements designed for a set of
contemplating evaluation the As IT users become more international marketplace.
circumstances. It consists of:-
decision can only be made aware of the risks to their
A list of threats after an assessment of the information then the Once the decision has been
commercial factors involved. demand for tested and taken to seek evaluation
A list of functional requirements Success in putting a product certified products increases. then the UK Certification
through the Common Legislative measures in Body, or any of the CLEFs,
A list of assurance activities Criteria testing process is many countries now are on hand to offer advice
linked to quality stipulate certification for and to assist in preparing
A justification that these address the threat development procedures, certain applications and the product for evaluation.
careful documentation and access to the traditional
Protection Profiles can be designed by a group of prospective consumers who have adequate resourcing. high security defence
similar IT security needs, or by the software developer himself. Against any cost market can be
implications must
A Protection Profile is not related to any given product or system, rather it defines a
user's needs independent of any specific product. Certification against a Protection
Profile will specify the extent to which requirements of the Profile have been met.

A Protection Profile is particularly useful in assisting the formulation of procurement


specifications. A number have already been written and more are in preparation.
The Evaluation Process
Protection Profiles already issued include:
Vendor provides evidence including technical support
Controlled Access
CLEF performs assessment of product against security target
Role Based Access Control
CLEF raises problem reports and notifies Certification Body
Labelled Security
Vendor resolves problems
Oracle Commercial Database Management System
CLEF documents results as work proceeds
Oracle Government Database Management System
CLEF completes evaluation and submits ETR to Certification Body and vendor
Application level Firewall
Certification Body reviews ETR to confirm certification can proceed
Traffic filter Firewall
Certificate issued
Visa and SCSUG Smart Card - in draft
Maintenance

12
twelve 9
nine
Step by Step Guide to
Evaluation

Preparation Evaluation

Define the product for Specify the assurance level Prepare the Once a CLEF has been Assessment of the to overcome the fault. If the
evaluation - claimed - evidence - engaged and agreement operational environment evaluators discover flaws
reached with the Certification which could be exploited by
There may be different These range from EAL1 up Some of this, such as the Body on the suitability of the Checking for known an attacker then the
versions of a product in to EAL7. Each assurance design documentation, is a product for evaluation, then vulnerabilities Certification Body must be
production or preparation. level places increasing normal product of the the testing process begins in notified. It is our policy that
Evaluation can start on one demands on the developer development cycle. earnest. There are several Penetration testing such flaws must be rectified
release of a product and for evidence and testing. The production of a Security stages to evaluation covering before a certificate can be
then progress through a the following activities: Production of
Target is a key part of the granted.
second release. Or parts of comprehensive evaluation
Obtain costings from CLEF evaluation process. In it the
a product may already have Production of Evaluation reports
and Certification Body - developer defines the Other observation reports
been evaluated under security functions and Work Programme may detail aspects of a
different schemes - for This is where the various We strongly recommend
The CLEFs are competitive assurance measures to be product that have no current
example under ITSEC or US stages of the work to be that the developer or
commercial organisations. assessed in the evaluation. impact but which may
TCSEC. In some cases, carried out are identified. sponsor appoint a project
Quotes should be obtained The Security Target will become significant in future
evidence from past testing The time schedule laid out manager to coordinate all
and carefully compared become a publicly available evaluations. This may
can be incorporated into for the testing should be the evaluation activities.
before a choice is made. document (we can work with include comments on the
new evaluations to cut costs realistic. Our experience has shown
The Certification Body is a you to ensure that no development environment or
and timescales. Bear in that close cooperation
Government organisation proprietary information is instances of unusual coding
mind that the CC Certificate Assessment of the between CLEF and
and is required to recover disclosed) so that end users practices. Such problems
will only apply to the precise Security Target developer is the key to a
its costs. A questionnaire can see exactly what parts of are not necessarily a bar to
version of the product in its This is fundamental as all smooth evaluation and a
should be obtained from the a product have been certification.
tested configuration running evaluation work is clearly defined point of
CB and a quote for evaluated and can match this
on the supporting platforms performed against this contact facilitates that
certification services will be to their own security needs.
specified. document. The ST should cooperation.
issued based on the Consultancy is
information supplied. available either from a CLEF be clear, consistent and
demonstrate how the TOE As testing progresses the
Specify the functionality - or from an independent
counters the identified evaluators produce detailed
specialist, to assist in the
threats. reports on the assessments
The functionality required is production of the Security
and the results obtained.
dependent on the demands Target or in the review of
Assessment of system The minor faults discovered
of the marketplace and will other product documentation
correctness during testing are notified in
evolve in line with perceived prior to evaluation.
the observation reports.
threats. Customers will
Testing for evidence of These provide useful
have their own requirements
security feedback in highlighting
which may have been
problem areas. The impact
defined in a Protection
Assessment of the of these faults is assessed
Profile.
development environment in the context of how the
product is to be used and
any advice provided by the

10 11
developer

ten eleven
Step by Step Guide to
Evaluation

Preparation Evaluation

Define the product for Specify the assurance level Prepare the Once a CLEF has been Assessment of the to overcome the fault. If the
evaluation - claimed - evidence - engaged and agreement operational environment evaluators discover flaws
reached with the Certification which could be exploited by
There may be different These range from EAL1 up Some of this, such as the Body on the suitability of the Checking for known an attacker then the
versions of a product in to EAL7. Each assurance design documentation, is a product for evaluation, then vulnerabilities Certification Body must be
production or preparation. level places increasing normal product of the the testing process begins in notified. It is our policy that
Evaluation can start on one demands on the developer development cycle. earnest. There are several Penetration testing such flaws must be rectified
release of a product and for evidence and testing. The production of a Security stages to evaluation covering before a certificate can be
then progress through a the following activities: Production of
Target is a key part of the granted.
second release. Or parts of comprehensive evaluation
Obtain costings from CLEF evaluation process. In it the
a product may already have Production of Evaluation reports
and Certification Body - developer defines the Other observation reports
been evaluated under security functions and Work Programme may detail aspects of a
different schemes - for This is where the various We strongly recommend
The CLEFs are competitive assurance measures to be product that have no current
example under ITSEC or US stages of the work to be that the developer or
commercial organisations. assessed in the evaluation. impact but which may
TCSEC. In some cases, carried out are identified. sponsor appoint a project
Quotes should be obtained The Security Target will become significant in future
evidence from past testing The time schedule laid out manager to coordinate all
and carefully compared become a publicly available evaluations. This may
can be incorporated into for the testing should be the evaluation activities.
before a choice is made. document (we can work with include comments on the
new evaluations to cut costs realistic. Our experience has shown
The Certification Body is a you to ensure that no development environment or
and timescales. Bear in that close cooperation
Government organisation proprietary information is instances of unusual coding
mind that the CC Certificate Assessment of the between CLEF and
and is required to recover disclosed) so that end users practices. Such problems
will only apply to the precise Security Target developer is the key to a
its costs. A questionnaire can see exactly what parts of are not necessarily a bar to
version of the product in its This is fundamental as all smooth evaluation and a
should be obtained from the a product have been certification.
tested configuration running evaluation work is clearly defined point of
CB and a quote for evaluated and can match this
on the supporting platforms performed against this contact facilitates that
certification services will be to their own security needs.
specified. document. The ST should cooperation.
issued based on the Consultancy is
information supplied. available either from a CLEF be clear, consistent and
demonstrate how the TOE As testing progresses the
Specify the functionality - or from an independent
counters the identified evaluators produce detailed
specialist, to assist in the
threats. reports on the assessments
The functionality required is production of the Security
and the results obtained.
dependent on the demands Target or in the review of
Assessment of system The minor faults discovered
of the marketplace and will other product documentation
correctness during testing are notified in
evolve in line with perceived prior to evaluation.
the observation reports.
threats. Customers will
Testing for evidence of These provide useful
have their own requirements
security feedback in highlighting
which may have been
problem areas. The impact
defined in a Protection
Assessment of the of these faults is assessed
Profile.
development environment in the context of how the
product is to be used and
any advice provided by the

10 11
developer

ten eleven
The Evaluation
Process

A commercial be weighed the benefits of dependent on demonstrating


What is a Protection Profile? decision access to a broader market a high level certification.
and gaining a competitive Certification can give you
For a developer advantage for the product. the edge in the national or
Put simply a Protection Profile is a set of requirements designed for a set of
contemplating evaluation the As IT users become more international marketplace.
circumstances. It consists of:-
decision can only be made aware of the risks to their
A list of threats after an assessment of the information then the Once the decision has been
commercial factors involved. demand for tested and taken to seek evaluation
A list of functional requirements Success in putting a product certified products increases. then the UK Certification
through the Common Legislative measures in Body, or any of the CLEFs,
A list of assurance activities Criteria testing process is many countries now are on hand to offer advice
linked to quality stipulate certification for and to assist in preparing
A justification that these address the threat development procedures, certain applications and the product for evaluation.
careful documentation and access to the traditional
Protection Profiles can be designed by a group of prospective consumers who have adequate resourcing. high security defence
similar IT security needs, or by the software developer himself. Against any cost market can be
implications must
A Protection Profile is not related to any given product or system, rather it defines a
user's needs independent of any specific product. Certification against a Protection
Profile will specify the extent to which requirements of the Profile have been met.

A Protection Profile is particularly useful in assisting the formulation of procurement


specifications. A number have already been written and more are in preparation.
The Evaluation Process
Protection Profiles already issued include:
Vendor provides evidence including technical support
Controlled Access
CLEF performs assessment of product against security target
Role Based Access Control
CLEF raises problem reports and notifies Certification Body
Labelled Security
Vendor resolves problems
Oracle Commercial Database Management System
CLEF documents results as work proceeds
Oracle Government Database Management System
CLEF completes evaluation and submits ETR to Certification Body and vendor
Application level Firewall
Certification Body reviews ETR to confirm certification can proceed
Traffic filter Firewall
Certificate issued
Visa and SCSUG Smart Card - in draft
Maintenance

12
twelve 9
nine
Evaluation
and CLEFs

IT security testing as part of A list of UK CLEFs with their To date, the UK Scheme Certification Body
an evaluation is carried out full contact details is on has issued ITSEC or CC role during
under the supervision of the page 19. Certificates for over 230 evaluation What is a Security Target?
Certification Body by products and secure This is the specification of the security
accredited laboratories The UK Scheme has systems with 70 currently in The Certification Body is functionality and assurance and the environment
known as CLEFs: successfully tested and evaluation. active at all stages of the in which this is designed to work.
CommerciaL Evaluation certified a wide range of evaluation, although the
Facilities. The CLEFs carry commercial products and bulk of the work is done by
out the analysis of design, secure systems. the CLEF and the
implementation, Developers using the developer. The Certification conclusions and the
development, production Scheme have included Body approves the Security appropriate testing must
and distribution against Argus, Baltimore, Compaq, Target and the Evaluation have been carried out to
agreed security standards. IBM, Sun, Microsoft and Work Programmes. With justify the claimed
CLEFs are appointed after a Oracle. Developers are the exception of EAL1 evaluation assurance level.
rigorous process which generally internationally evaluations the Certifier
ensures that they meet the based and the Scheme has attends a task start-up The Certifier may attend
required standards of welcomed evaluations from meeting with the CLEF and one or more evaluation
technical expertise and the United States, Canada, the developer in order to progress meetings where
operating procedures to Europe and the Far East. discuss the evaluation and the conduct of the
carry out evaluations. All As new products enter agree the schedules for evaluation is reviewed, and
the CLEFs are evaluation or gain activity. Potential problems on complicated evaluations,
well-established companies certification their details are can be identified here and new work schedules
which have provided updated on the Scheme actions agreed to remedy agreed. The Certifier also
computer hardware and website (www.itsec.gov.uk). them. normally attends penetration
software services over many Certification Reports and testing.
years. In each case, their some Security Targets are As testing progresses the
operations cover both the available to download. Certifier monitors the The evaluation process
public and private sectors Here you can also find activities undertaken and culminates in the
and all have practical details of products examines any observation preparation by the CLEF of
experience of the issues evaluated under ITSEC and reports together with their an Evaluation Technical
associated with signposts to other resolution. A key objective Report (ETR). This totals
implementing sophisticated CC products certified by of the Certification Body is all the CLEF findings and
secure systems and Schemes recognised by the to check that the evaluation presents the test evidence.
networks. Each CLEF is UK. For information on has been conducted in The ETR is then sent to the
inspected annually by the other services offered by accordance with the Certification Body.
UK Accreditation Service CESG please access the methodology laid out in the
(UKAS) and conforms to the general website Common Criteria. The
EN 45001 (ISO Guide 25) (www.cesg.gov.uk). evidence provided must
standard for test facilities. support the evaluation

8
eight 13
thirteen
IT Evaluation Services in the
United Kingdom

Certification Trusted Service Cost Effective Timely Service


Service
The Certifier reviews the The UK Scheme was We have always recognised The UK Certification Body
What is a TOE?
ETR and raises comments established in 1991 as a however, that security has is committed to working
A Target of Evaluation. This covers the parts of
on areas where additional joint effort by the financial implications and alongside developers in
a product and its documentation that provide the
explanation might be functionality to counter the threats defined in its Department of Trade and since its inception, the order to meet their
needed or test results are Security Target. Industry and the Certification Body has timescales. Developments
unclear. All the Communications-Electronics worked alongside in communications and IT
documentary evidence Security Group (CESG). commercial laboratories to software are constant and
provided by the evaluators is minimised during the first rapid evolution or products The UK IT Security , provide a technically rapid for developers, so it is
taken into account and test evaluation by classifying and the environment will Evaluation and Certification stringent testing service that important that evaluation
results are compared to the product components introduce the possibility of Body is itself part of CESG, is competitive and cost and certification take place
Security Target to ensure all according to their influence vulnerabilities that had not the government organisation effective. Developers can within a reasonable
objectives have been met. on the security features. been envisaged at the time charged with ensuring the choose from five testing timeframe.
Comments are passed to Whenever changes are of the original certification. security of all government laboratories ensuring
the CLEF and to the made to the evaluated Countries participating in and military competitive tendering for The UK CB is committed
developer and their product, the developer can the development of the communications. CESG evaluations. to matching developers'
responses assessed. use the classification to Common Criteria are in the Certifiers operate to the efforts in obtaining timely
When the Certifier is determine the impact on process of formalising an highest standards of The provision of a cost certification
satisfied with the body of certification more easily and assurance maintenance professional competence, effective service is one of
evidence presented to him identify appropriate action. process comparable with technical objectivity and the UK CB's highest
he writes a Certification the Certificate Maintenance commercial confidentiality. priorities
Report and a Certificate is Vulnerabilities can be Scheme offered by the UK All personnel are subject to
granted. discovered in products Certification Body for comprehensive background
which have already been ITSEC certificates. This checks and the Certification
evaluated. In such cases it maintenance is projected to Body itself is housed in a
Re-Evaluation and is normal practice for the be under the control of the secure site. The
Certificate developer to issue a patch. developer, either directly or Certification Body has
Maintenance Where a product is in the via a CLEF. achieved accreditation to the
Certificate Maintenance EN45011 (ISO Guide 25)
Inevitably IT products Scheme the issue of a standard for certification
develop and it is sensible to patch, or patches, does not bodies.
take steps to develop the invalidate the certificate. It
certificate in tandem. The is a consequence of a The UK has a decade's
Certification Body will advise graded scheme that experience of operating a
on whether a re-evaluation moderate level assurances commercial evaluation and
is necessary if a product has do not detect and remove certification scheme.
been modified. The work all vulnerabilities. It must
involved can be also be recognised that the

14
fourteen
7
seven
An International Assurance Levels
Standard

The Common Criteria aim to Common Criteria provide Although the Common
harness the strengths of two catalogues of Criteria form a new Functionality and Assurance Classes
Common Criteria have 11 functionality classes and 10 assurance classes as follows:
previous standards. The components to allow the standard based on previous
TCSEC Scheme maintained assurance and functionality testing regimes, this does Functionality Assurance
that functionality and requirements to be specified not mean that certificates Audit Protection Profile evaluation
assurance were indivisible - using standard terminology. awarded under previous Cryptographic Support Security Target evaluation
the same standard specified In this way the Common criteria are invalid. While Communications Configuration Management
User Data Protection Delivery and Operation
both what an operating Criteria unite the best the demand exists, Identification and Authentication Development
system must do, and how to methodology for IT security evaluations will be available Privacy Guidance Documents
check the implementation. testing as developed by its in the UK under the ITSEC Protection of TOE Security Functions Life Cycle Support
The strength of this premier exponents over the formula and the resultant Resource Utilisation Maintenance of Assurance
Security Management Tests
approach was the past decade. certificates will continue to TOE Access Vulnerability Assessment
production of functional be recognised by the Trusted Path/Channels
standards for operating Because Common Criteria European partners and
systems (the CI - AI ratings). certificates are recognised Australia and New Zealand. Each of these is broken down into families and then into components.
The weakness lay in the fact by all the signatory nations, Where required, a dual This gives great flexibility in describing the functional and assurance requirements.
it was cumbersome to adapt IT developers no longer certification can be carried
the standard to address new have to go through different out to both CC and ITSEC
requirements. With ITSEC, evaluation processes in simultaneously. The UK
the standard only prescribed different countries. Certification Body is also
assurance activities. Evaluation is more happy to discuss
The Common Criteria have seven Evaluation Assurance Levels (EALs), from EAL1 to a maximum
Security functional straightforward and no effort conversion to Common
level of EAL7. These have an approximate correspondence to the ITSEC levels as shown below:
properties were specified in is wasted in duplication. Criteria with developers of
the Security Target as part products certified under
of a specific evaluation. The ITSEC. By making
advantage of this approach substantial re-use of the
Common Criteria EAL1 EAL2 EAL3 EAL4 EAL5 EAL6 EAL7
was that it adapted readily original ITSEC evaluation
to new types of product, but this offers a cost effective
ITSEC - E1 E2 E3 E4 E5 E6
the downside was that it option for developers who
was less easy for wish to extend the market
consumers to compare the reach of their certified
functionality offered by two product. These assurance packages are designed to provide a balanced grouping of assurance elements
certified products. for general use. The levels represent ascending levels of confidence that can be placed in the
Target of Evaluation (TOE) meeting its security objectives. The higher the level, the greater the
degree of rigour applied in assessing whether the TOE has met its security requirements, for
example, by intensifying the analysis and search for security vulnerabilities.

6
six 15fifteen
Common Criteria -
The Family Tree

EAL1 Functionally tested EAL3 Methodically tested Recognising the need for The Common Criteria are a These previous schemes
and checked independent and objective development of previous evolved and influenced
Analysis is supported by independent testing, the United Kingdom standards and schemes each other as countries
testing of a sample of the security has been working closely used by various nations: reacted to changing
Analysis is supported by 'grey box' testing,
functions in order to understand the with other countries to standards in the IT
selective independent confirmation of the
security behaviour. EAL1 is applicable formulate the rules under The Unites States - environment and in
developer test results and evidence of a
where confidence in correct operation is developer search for obvious which this testing should be Trusted Computer System response to changing
required but the security threat vulnerabilities. Development environment carried out. Since 1990, Evaluation Criteria (TCSEC) threats or attacks.
assessment is low. This assurance controls and TOE configuration work has been going on to and the draft Federal Development was aimed at
package is particularly suitable for legacy management are also required. EAL3 is bring together a number of Criteria. increasing the flexibility of
systems as it should be achievable without applicable where the requirement is for a national and international the various criteria and
the assistance of the developer. moderate level of independently assured schemes in one mutually Canada - Canadian Trusted ensuring that testing
security, with a thorough investigation of accepted framework for Computer Product remained relevant and
the TOE and its development, without testing IT security Evaluation Criteria effective.
EAL2 Structurally tested incurring substantial re-engineering costs. functionality. The national (CTCPEC)
communications security Common Criteria version
Analysis of the security functions exercises authorities of the United Europe - Information
2.1 is now
Kingdom, the United States, Technology Security
a functional and interface specification and EAL4 Methodically an International Standard -
the high-level design of the subsystems of Canada, France, Germany Evaluation Criteria (ITSEC)
Designed, Tested and and the Netherlands ISO 15408
the TOE. There is independent testing of
the security functions and evidence is Reviewed collaborated with the
required of developer 'black box' testing International Standards
and development search for obvious Analysis is supported by the low-level Organisation (ISO) in this
vulnerabilities. EAL2 is applicable where a design of the modules of the TOE and a project which culminated in
low to moderate level of independently subset of the implementation. Testing is the publication of the CC Certificates issued by the UK are recognised
assured security is required. supported by an independent search for Common Criteria (CC). internationally as follows:-
obvious vulnerabilities. Development CC version 2.1 has now
controls are supported by a life-cycle been recognised as a formal EAL1-4 US, Canada, Australia, New Zealand, France,
model, identification of tools and standard - ISO 15408. Germany, Finland, Greece, Israel,Italy,
automated configuration management.
Netherlands, Norway, Spain, Sweden,
EAL4 is applicable where a moderate to
Switzerland
high level of security is required, although
some additional security-specific
EAL5-7 France, Finland, Greece, Italy, Netherlands,
engineering costs may be incurred. Norway, Spain, Sweden, Switzerland

16
sixteen
5
five
Basic Security
Measures

All organisations need to Underpinning all of these Because information EAL5 Semiformally EAL7 Formally Verified
protect their information by security measures is the technology extends beyond Designed and Tested Design and Tested
adopting appropriate security assurance provided national boundaries it is
security measures. These by the software or the IT also vital that security Analysis includes all of the implementation. Here the formal model is supplemented
can be organisational, system itself. The security assurance is defined using Assurance is supplemented by a formal by a formal presentation of the
physical, technical or features offered by software internationally accepted model, a semiformal presentation of the functional specification and high level
educational. Such measures are aimed at ensuring the terms and standards - that functional specification and high level design, showing correspondence.
must be based on a three essential elements of way everyone has a clear design and a semiformal demonstration of
Evidence of developer 'white box'
coherent security policy. Confidentiality, Integrity and understanding of what correspondence. The search for
This policy must be derived Availability. What is assurance is being offered. vulnerabilities must ensure resistance to testing and complete independent
from a sound assessment of required is an objective This benefits both users and penetration attackers with a moderate confirmation of developer test results
the threat to an assessment of these developers: attack potential. Covert channel analysis are required. EAL7 is applicable
organisation's information features to determine how and modular design are also required. where a specialised security TOE is
and the impact of well they perform their - Users can easily EAL5 is applicable where the requirement required for extremely high risk
corruption or loss of that stated security functions. compare one product to is for a high level of security in a planned situations.
information. Advice on another to see what development coupled with a rigorous
constructing and Any such assessment must parts of the security development approach.
implementing a security be carried out against functionality have been
policy is available in the clearly defined methods and tested to what levels. EAL6 Semiformally
Code of Practice for objectives. The results Verified Design and Tested
Information Security must be documented and - Developers can
Management, BS7799, and repeatable. The assurance demonstrate to an Analysis is supported by a modular
in the DTI's Information level awarded must have international market that approach to design and a structured
Security Assurance meaningful parameters. their product has gained presentation of the implementation. The
Guidelines for the The end result must be to an objective independent search for vulnerabilities must
Commercial Sector. provide a level of assurance confirmation of the ensure resistance to penetration attackers
with a high attack potential. There must
which is commensurate with validity of its security
be a systematic search for covert
the environmental risk and claims.
channels. Development environment and
within realistic financial configuration management controls are
boundaries. further strengthened. EAL6 is applicable
where a specialised security TOE is
required for high risk situations.

4
four
17
seventeen
For Further Information... Information Security
- The Key to Success

This guide is intended as an introductory overview to certification in the UK against Common Now, more than ever, information is a key
element in the success of any business.
Three essential
Criteria. Further reading is recommended for developers or product sponsors intending to enter
evaluation. All of these documents may be obtained free of charge from the Certification Body. Information security is as important as the elements of
more traditional doors and locks for
safeguarding the assets of a company. As Information Security
UKSP 01 Description of the Scheme updated 2002 more information is created, stored and
moved around using computers, so the Confidentiality - ensuring that only
associated risk increases. In particular appropriate access is allowed to data -
UKSP 04 Developer's Guide updated 2002 using networks or the Internet to share or both from inside or outside the
move information increases the organisation
vulnerability of data.
Common Criteria Evaluation Methodology Part II version 1.0 August 1999 Integrity - ensuring that no
Electronic business is expanding rapidly, unauthorised changes are made to data -
bringing opportunity and risk in equal either in storage or transmission
Common Criteria User Guide October 1999 measure. E-commerce will flourish only
where the security of the transaction is Availability - ensuring that data is
Certification against Common Criteria is one of a suite of services offered by CESG's Infosec assured. Trading partners need to have accessible as required.
Assurance and Certification Services. Further information on these schemes may be obtained confidence in the security of the
via the website www.cesg.gov.uk, e-mail enquiries@cesg.gov.uk information they exchange as well as in the
subsequent storage and handling of that
data.

The demands of information security are


not confined to commercial businesses.
Service industries are now searching for
more direct ways to respond to their
customer needs. Public organisations have
to be sensitive to the privacy requirements
of their clients and have a duty to ensure
that appropriate precautions are taken to
ensure the confidentiality and accuracy of
personal records. Any security-dependent
organisation, such as MOD, must ensure
that its IT protection is continuously
updated and re-aligned to cope with
changing demands and the evolving threat.

18
eighteen 3
three
Contents Contact Addresses
UK IT Security Evaluation
and Certification Body
CESG
Room 10/4W14
Priors Road
Cheltenham
Gloucestershire GL52 5AJ
Information Security The Key to Success 3
Tel: + 44 (0) 1242 238739
Fax: + 44 (0) 1242 235233
Basic Security Measures 4
http://www.cesg.gov.uk
email:iacs@cesg.gsi.gov.uk
Common Criteria - The Family Tree 5
CLEFS:
An International Standard 6
CMG (CLEF) Syntegra (CLEF)
Kings Court, Guidion House,
IT Evaluation Services in the UK 7 91-93 High Street Harvest Crescent
Camberley, Ancells Park,
Surrey GU15 3RN Fleet,
Evaluation and Commercial Evaluation Facilities 8 Hants GU13 8UZ
Tel: + 44(0)1276 686678
Fax: + 44(0)1276 691029 Tel: + 44 (0) 1252 778837
Fax: + 44 (0) 1252 811635
Step by Step Guide to Evaluation 10 Contact: Ralph Worswick
ralph.worswick@cmgplc.com Contact: Janet Scruby
Clef@syntegra.com
- Preparation 10 Logica UK Ltd (CLEF)
Chaucer House, IBM Global Services (CLEF)
The Office Park Meudon House,
- Evaluation 11 Springfield Drive, Meudon Avenue
Leatherhead Farnborough,
Surrey KT22 7LP Hants GU14 7NB
- Certification and the Certification Body 13
Tel: + 44 (0)1372 369831 Tel: + 44 (0) 1252 558472
Fax: + 44 (0)1372 369834 Fax: + 44 (0) 1252 558001
- Re-evaluation 14
Contact: Simon Milford Contact: Matthew Vale
MilfordS@logica.com Clef@uk.ibm.com
- Certification Maintenance 14
EDS Ltd (CLEF)
Wavendon Tower,
Wavendon
Evaluation Assurance Levels 15 Milton Keynes,
Bucks MK17 8LX
For Further Information 18 Tel: + 44(0)1908 284234
Fax: + 44(0)1908 284393

Contacts 19 Contact: Richard Selby


richard.selby@eds.com

2
two
19
nineteen
UK IT security evaluation
© Crown Copyright 2002
& certification scheme

Você também pode gostar