system evaluation-信息安全概论-课件-09

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Fact of the Lecture

Most breaches of security in organizations come from within the organizations. Therefore, when looking for the aliens, don’t just point your telescope at the skies.
Orange Book
A U.S. standard Information Technology Security Evaluation Criteria An European standard The most recent international effort to establish a global standard for the evaluation of security systems A combination of all significant previous effort, military and commercial
– – –
Design analysis Test analysis Final review

Evaluation classes

Class D: failure of being certified at any other evaluation classes Class C: DAC





A set of security functional requirements that define the security functionality for the system under evaluation A set of assurance requirements (or required assurance evidence) that define the steps for establishing that the system under evaluation meets its security functional requirements An evaluation process, a methodology that determines whether the system under evaluation meets the security functional requirements based on analysis of the assurance evidence A set of assurance classes or levels, a measure of the evaluation result that indicates how trustworthy the system under evaluation is with respect to the security functional requirements
Copyright © 2008 by Jingsha He ‹#› 4
November 25, 2008
Evaluation Methodology

A formal evaluation methodology is a technique that provides the measurement of trust based on specific security functional requirements and assurance evidence
Copyright © 2008 by Jingsha He ‹#› 6

ITSEC (1991-2001)


The Common Criteria (CC) (1998-present)


November 25, 2008
TCSEC (1)

Functional requirements
Copyright © 2008 by Jingsha He ‹#› 9
November 25, 2008
ITSEC (1)

Functional requirements

Defined by the vendor of a security system or product in the form of a security target Similar to TCSEC Unique requirements
November 25, 2008
Copyright © 2008 by Jingsha He
‹#› 2
Assurance
System Evaluation
November 25, 2008
Copyright © 2008 by Jingsha He
‹#› 3
The Necessity

Perfect security is almost unachievable
Copyright © 2008 by Jingsha He ‹#› 7
November 25, 2008
TCSEC (2)

Evaluation process

Evaluation sponsored by the government Phases

Application Preliminary technical review (PTR) Evaluation
C1 – discretionary protection C2 – controlled access protection B1 – labeled security protection B2 – structured protection B3 – security domain

Class B: MAC


Class A1 - verified protection
Copyright © 2008 by Jingsha He ‹#› 8
November 25, 2008
TCSEC (3)

Significance

First evaluation methodology Precedent for future methodologies

Evaluation classes Assurance requirements

Limitations

Mostly for operating systems

Not well-suited for other types of products or systems
Developed mainly based on the needs of the U.S. government as well as the military

Object reuse Trusted path

Assurance requirements

Configuration management Trusted distribution System architecture Design specification and verification Testing Product documentation
Introduction to Information Security
Prof. Jingsha He School of Software Engineering Beijing University of Technology
‹#› 1
November 25, 2008
Copyright © 2008 by Jingsha He
Copyright © 2008 by Jingsha He ‹#› 5
November 25, 2008
Major Methodologies/Standards

TCSEC (1983-1999)

Trusted Computer System Evaluation Criteria
The

Identification and authentication (I&A) Discretionary access control (DAC) Mandatory access control (MAC)

Security label
Auditing Other requirements

MAC not widely used in commercial systems Only the secrecy requirements No integrity and availability requirements

Complex evaluation process

Criteria creeping Time-consuming
Suitability of requirements Binding of requirements


Assurance requirements


Additional requirements
Correspondence between successive levels of specification Delivery and generation procedures Secure start and operation including recovery Vulnerability analysis

Complexity of systems A measure of confidence that the system meets specific security requirements
Trust is very meaningful
Assessment of the security of a system is a systematic, methodological process



A process in which the evidence for assuring security is gathered and analyzed against criteria for functionality and assurance A methodology to facilitate the development of trusted systems

November 25, 2008
Copyright © 2008 by Jingsha He
‹#› 10
ITSEC (2)

Evaluation process

Evaluation performed by certified, licensed organizations First approval of security target, then evaluation of the submitted product or system against the security target E0: failure of being certified at any other evaluation levels E1: informal description of architecture E2: informal description of the detailed design E3: more stringent requirements on the detailed design & correspondence between source code and security requirements E4: formal model of the security policy & design level vulnerability analysis E5: correspondence between detailed design and source code & source code level vulnerability analysis E6: extensive use of formal methods
相关文档
最新文档