Slide 1

Slide 1 text

A Comparison of Computer Security Evaluation Criteria 433-463 Software Engineering Thesis Michael Papasimeon November 1997

Slide 2

Slide 2 text

Outline Computer Security and Evaluation Criteria Comparison Characteristics The Choice of Evaluation Criteria Description of TCSEC Description of ITSEC Description of CTCPEC Conclusions

Slide 3

Slide 3 text

Computer Security Security Functionality Security Assurance Security Assurance Security Functionality Computer Security

Slide 4

Slide 4 text

Security Functionality Examples include security features such as: Identification Authentication Discretionary and Mandatory Access Control Auditing Encryption

Slide 5

Slide 5 text

Security Assurance Typically involves the use of strict Software Engineering practices with an emphasis on assuring functionality. Security Policy and Security Policy Model Specification System Design Implementation Security Testing Security Documentation Configuration Management Verification and Validation of the development process

Slide 6

Slide 6 text

What are Computer Security Evaluation Criteria? General security standards Provide a set of criteria or requirements relating to security functionality and assurance Criteria are usually divided into “Levels of Trust” or ratings Computer systems are evaluated against a set of criteria and are given the rating or ”Level of Trust” of which they satisfy they have satisfied the requirements. A metric for measuring the level of security provided and confidence in that security provided by a system.

Slide 7

Slide 7 text

Typical Evaluation Process (1) COMPUTER PRODUCT EVALUATION EVALUATED & CRITERIA BODY EVALUATION RATED PRODUCT

Slide 8

Slide 8 text

Typical Evaluation Process (2) RATING = Z PRODUCT 3 EVALUATED RATING = Y PRODUCT 2 EVALUATED RATING = X PRODUCT 1 EVALUATED EVALUATION CRITERIA PURCHSASING ORGANISATION

Slide 9

Slide 9 text

Comparison Characteristics 1. Organisation Structure, Scope, Approach Levels of Trust 2. Security Functionality Accountability – Identification and Authentication Access Control Audit 3. Security Assurance Security Policy System Design Implementation Security Testing Security Documentation Configuration Management

Slide 10

Slide 10 text

Security Evaluation Criteria (1) United States Trusted Computer System Evaluation Criteria (TCSEC) Also known as “Orange Book” Federal Criteria Canada Canadian Trusted Computer Product Evaluation Criteria (CTCPEC)

Slide 11

Slide 11 text

Security Evaluation Criteria (2) Europe UK Systems Security Level UK Commercial Computer Security Centre Evaluation Levels Manual German Criteria for the Evaluation of Trustworthiness of Information Technology Systems French “Blue-White-Red” Book Information Technology Security Evaluation Criteria (ITSEC) [UK, France, Germany, the Netherlands] International Common Criteria (CC)

Slide 12

Slide 12 text

Security Evaluation Criteria Selected for Comparison The most influential and widely used evaluation criteria were selected for the comparison. Trusted Computer System Evaluation Criteria (TCSEC) [Orange Book] Information Technology Security Evaluation Criteria (ITSEC) Canadian Trusted Computer Product Evaluation Criteria (CTCPEC)

Slide 13

Slide 13 text

TCSEC (Orange Book) Classes contain both security functionality and security assurance requirements Scope is very high level Interpretation documents (The Rainbow Series) required for more specific cases. (eg: The Red Book is the Trusted Network Interpretation of the Orange Book).

Slide 14

Slide 14 text

TCSEC – Evaluation Criteria Classes D – Minimal Protection C1 – Discretionary Security Protection C2 – Controlled Access Protection B1 – Labelled Security Protection B2 – Structured Protection B3 – Security Domains A1 – Verified Design

Slide 15

Slide 15 text

TCSEC Class Requirements 1. Security Policy 2. Accountability 3. Assurance 4. Documentation

Slide 16

Slide 16 text

CTCPEC Divides criteria into functionality criteria and asssurance criteria Does not require separate interpretation documents as it has more specific criteria

Slide 17

Slide 17 text

CTCPEC Assurance Levels Assurance Level T0 Assurance Level T1 Assurance Level T2 Assurance Level T3 Assurance Level T4 Assurance Level T5 Assurance Level T6 Assurance Level T7

Slide 18

Slide 18 text

CTCPEC Assurance Levels – Areas of Evaluation Architecture Development Environment Development Evidence Operational Environment Security Documentation Security Testing

Slide 19

Slide 19 text

CTCPEC Functionality Criteria 1. Confidentiality Criteria 2. Integrity Criteria 3. Availability Criteria 4. Accountability Criteria

Slide 20

Slide 20 text

ITSEC Separation of assurance and functionality criteria Security functionality classes are not provided Only examples functionality classes and guidelines are provided Does not depend on external interpretation documents

Slide 21

Slide 21 text

ITSEC Assurance Levels Assurance Level E0 Assurance Level E1 Assurance Level E2 Assurance Level E3 Assurance Level E4 Assurance Level E5 Assurance Level E6

Slide 22

Slide 22 text

ITSEC Assurance Levels – Areas of Evaluation 1. Development Process Requirements Specification Architectural Design Detailed Design Implementation 2. Development Environment Configuaration Control Programming Languages and Compilers Developer’s Security 3. Operational Documentation User Documentation Administrator Documentation 4. Operational Environment Delivery and Configuration Start-up and Operation

Slide 23

Slide 23 text

ITSEC Example Functionality Classes Functionality Class F-C1 Functionality Class F-C2 Functionality Class F-B1 Functionality Class F-B2 Functionality Class F-B3 Functionality Class F-IN Functionality Class F-AV Functionality Class F-DI Functionality Class F-DC Functionality Class F-DX

Slide 24

Slide 24 text

ITSEC Functionality Class Specification Guidelines Identification and Authentication Access Control Audit Object Reuse Accuracy Reliability of Service Data Exchange

Slide 25

Slide 25 text

Consequences

Slide 26

Slide 26 text

Summary