ITSEC
ITSEC
• Audience:
• Targets a broad audience including developers, evaluators, managers,
purchasers, installers, configurators, operators, and users.
The Security Target Overview
• Contents:
a) System Security Policy or Product Rationale:
• Overview of security policies or rationale for product functionalities.
b) Specification of Security Enforcing Functions:
• Details functions necessary to meet security objectives.
c) Definition of Required Security Mechanisms (Optional):
• Explanation of specific mechanisms implementing security functions.
d) Claimed Rating of Minimum Strength of Mechanisms:
• Minimum strength level claimed for security mechanisms.
e) Target Evaluation Level:
• Specifies the desired evaluation level for the TOE.
The Security Target Overview
• Requirements:
• Presentation and content requirements vary based on the target evaluation
level.
• Single or multiple documents allowed with clear indication of
relationships.
• Responsibility:
• The sponsor is responsible for accuracy and provision of the security
target.
Product Rationale and Security Enforcing
Functions
• Product Rationale
• Informs purchasers about the product's use and its alignment with system security
objectives.
• Includes details on intended use, environment, assumed threats, security features,
and dependencies on external factors.
• Specification of Security Enforcing Functions:
• Included in the security target.
• May reference predefined functionality classes or standards defining security
functionality.
• For systems, correlates functions with security objectives.
• For products, correlates functions with intended use and environmental
assumptions.
• Informal style for all; semiformal or formal style for higher evaluation levels.
Mechanisms, Strength Rating, and Evaluation Level
• Definition of Required Security Mechanisms:
• Optional but may specify mechanisms correlating with security functions.
• Developer's task to implement prescribed mechanisms.
• Claimed Rating of Minimum Strength:
• Specifies the minimum strength against direct attack (basic, medium, or high).
• Target Evaluation Level:
• Specifies the desired evaluation level (E1 to E6).
• Examples of Use of Existing Security Policy Documents:
• Allows existing documents as part of the security target.
• Examples include System Security Policy (SSP), System Electronic Information Security
Policy (SEISP), and Security Policy Model (SPM) in the UK.
• Claims Document for product security targets, using a semi-formal style.
• Flexibility in Document Structure:
Accommodates different document structures based on existing styles.
Supplementary documents may be required to complete information for the security target.
Generic Headings
• Objective:
• Record and link user/process actions for accountability.
• Accountability Functions (2.40):
• Record relevant information about user/process actions.
• Enable linking actions to specific users.
• Functional Coverage (2.41):
• Collection, protection, and analysis of accountable information.
• Overlap with Auditability (2.42):
• Functions may satisfy both accountability and auditability.
• Cross-referencing between headings as needed
Audit
• Objective:
• Record information about routine and exceptional events.
• Enable investigations for security violation detection.
• Auditability Functions (2.44):
• Detect and investigate events posing a threat to security.
• Functional Coverage (2.45):
• Collection, protection, and analysis of event information.
• Trend analysis for potential security violations.
• Overlap with Accountability (2.45):
• Functions may satisfy both auditability and accountability.
• Cross-referencing between headings as needed.
Object Reuse
• Objective:
• Facilitate resource reuse (main memory, disk storage) while preserving
security.
• Functions:
• Control the reuse of data objects (2.47).
• Initialize or clear unallocated or reallocated data objects (2.48).
• Clear reusable media (e.g., magnetic tapes) and output devices when not in
use.
Data Accuracy and Integrity
• Objective:
• Maintain accurate relationships between data, ensuring data integrity during
transfers.
• Functions:
• Ensure data remains unmodified in an unauthorized manner (2.50).
• Establish and maintain accuracy of relationships between related data (2.51).
• Detect or prevent loss, addition, or alteration during data transfer
Reliability of Service
• Objective:
• Ensure time-critical tasks are performed as needed, prevent unnecessary
resource requests.
• Functions:
• Ensure resources are accessible on demand by authorized entities (2.53).
• Implement error detection and recovery functions (2.54).
• Incorporate scheduling functions to optimize TOE operation and minimize
disruption.
Predefined Classes
• Objective:
• Utilize common sets of security functions through predefined classes for system
and product security targets.
• Functions:
• Reference predefined classes to define part or all of security enforcing functions
(2.59).
• Standards for predefined functionality classes are desirable for consistency (2.59).
• Each predefined class specifies objectives, envisaged use, reasons for function
choice (2.61).
• Use of Predefined Classes:
• Not obligatory; sponsors may choose not to use or may not be applicable (2.62).
• Can be used individually or in combination with one or more predefined classes
(2.62).
• Ten example predefined classes provided in Annex A, derived from [ZSIEC]
(2.63).
Example Predefined Classes
• Hierarchically Ordered Confidentiality Classes:
• F-C1, F-C2, F-B1, F-B2, F-B3, corresponding to TCSEC classes C1 to A1 [TCSEC].
• High Integrity Requirements for Data and Programs:
• F-IN, suitable for TOEs with high integrity requirements, e.g., database systems.
• High Availability Requirements:
• F-AV, sets high availability requirements, significant for TOEs controlling
manufacturing processes.
• Safeguarding Data Integrity during Data Communication:
• F-DI, sets high requirements for data integrity during data communication.
• High Demands on Confidentiality of Data during Data Communication:
• F-DC, intended for TOEs with high demands on data confidentiality during
communication.
• Networks with High Demands on Confidentiality and Integrity:
• F-DX, for networks with high demands on confidentiality and integrity of
communicated information.
Specification Style
• Objective:
• Provide flexibility in specifying security functions using three types of styles: informal,
semiformal, and formal.
• Styles Identified:
• Informal Specification:
• Written in natural language.
• Prone to ambiguity.
• Supported by parallel semiformal or formal specification at higher evaluation
levels (2.70-2.71).
• Semiformal Specification:
• Requires restricted notation.
• Allows specification of function effects and exceptional conditions.
• Examples include data-flow diagrams, state transition diagrams, and structured
design methods (2.72-2.74).
Specification Style
• Formal Specification:
• Written in formal notation based on mathematical concepts.
• Requires precise syntactic and semantic rules.
• Examples include VDM, Z, and ISO protocol specification language (2.76-
2.78).
Consistency of Parallel Specifications
• Consistency Requirement:
• Parallel specifications must be clear, consistent, and address the same points (2.79).
• Error Resolution:
• Ambiguities in informal specifications resolved by corresponding semiformal or
formal specifications (2.80).
• Errors in consistency between parallel specifications must be resolved through
external information and amendments (2.80).
• Presentation:
• Parallel specifications may be separate documents or interleaved in a single
document (2.79).
Note:
• Specification technique or style for security objectives and prescribed mechanisms
is outside the scope (2.67).
• Predefined classes may replace or complement style-specific specifications (2.68)
Overview of Formal Models of Security
Policy
• E4 and Above Requirement:
• TOE must implement an underlying model of security policy.
• Abstract statement of key security principles.
• Expressed in a Formal Style:
• Formal model of security policy.
• Styles include informal, semiformal, or formal (2.81).
• Implementation/Reference:
• Reference published models or provide one in the security target.
Scope and Examples of Formal Models
• Objective:
• Evaluate the effectiveness aspect of assurance for a Target of Evaluation (TOE).
• Baseline:
• Security target defined in Chapter 2.
• Simultaneous Evaluation:
• Evaluation for effectiveness and correctness concurrently.
• Chapters:
• Effectiveness criteria outlined in this chapter.
• Correctness criteria addressed in Chapter 4.
Approach Description
Assessment of effectiveness involves consideration of the following aspects of the TOE:
a) the suitability of the TOE's security enforcing functions to counter the threats to the
security of the TOE identified in the security target;
b) the ability of the TOE's security enforcing functions and mechanisms to bind
together in a way that is mutually supportive and provides an integrated and effective
whole;
c) the ability of the TOE's security mechanisms to withstand direct attack;
d) whether known security vulnerabilities in the construction of the TOE could in
practice compromise the security of the TOE;
e) that the TOE cannot be configured or used in a manner which is insecure but which
an administrator or end-user of the TOE would reasonably believe to be secure;
f) whether known security vulnerabilities in the operation of the TOE could in practice
compromise the security of the TOE.
Systems and Products
There are different requirements and options for the content of a security target for a
TOE, depending on whether the TOE is being evaluated as a system or product.
These differences are set out under Construction –
The sponsor shall provide the following documentation in addition to that required for
evaluation of correctness:
- Suitability Analysis
- Binding Analysis
- Strength of Mechanisms Analysis
- List of Known Vulnerabilities in Construction.
Aspect 1 - Suitability of Functionality:
• Definition:
• Security Target provided by the sponsor for correctness evaluation.
• Assessment Focus:
• Determine if TOE's functions and mechanisms effectively counter identified
threats.
• Content and Presentation Requirements:
• Linkage: Relate security functions and mechanisms to enumerated threats in the
security target.
• Evidence Requirements:
• Demonstration: Illustrate how each threat is countered by specific security
functions.
Aspect 1 - Suitability of Functionality:
• Evaluator Actions:
• Verification: Confirm compliance with content, presentation, and evidence
standards.
• Information Utilization: Ensure consideration of all relevant details specified for
the evaluation level.
• Purpose:
• Evaluate the adequacy of security enforcing functions in addressing identified
threats.
Note: This assessment ensures the suitability of functionality against specified threats in
the security target.
Aspect 2 - Binding of Functionality:
• Definition:
• Investigates how security enforcing functions and mechanisms work together for
mutual support and an integrated, effective whole.
• Content and Presentation Requirements:
• Analysis Scope: Examine potential interrelationships among all security enforcing
functions.
• Evidence Requirements:
• Conflict Avoidance: Demonstrate that no function or mechanism conflicts with
others.
Aspect 2 - Binding of Functionality:
• Evaluator Actions:
• Verification: Confirm compliance with content, presentation, and evidence
standards.
• Comprehensive Analysis: Ensure consideration of all relevant details specified for
the evaluation level.
• Purpose:
• Evaluate the coherence and synergy of security functions and mechanisms within
the TOE.
Note: This assessment ensures that all security enforcing functions and mechanisms
complement each other, avoiding conflicts and contradictions.
Aspect 3 - Strength of Mechanisms:
• Definition:
• Evaluates the ability of security enforcing mechanisms to resist direct attacks,
considering the underlying algorithms, principles, and properties.
• Content and Presentation Requirements:
• Critical Mechanisms Identification: List all critical security enforcing
mechanisms.
• Algorithm Analysis: Include or reference analyses of underlying algorithms,
principles, and properties.
• Evidence Requirements:
• Minimum Strength Confirmation: Confirm critical mechanisms meet the
claimed minimum strength rating (basic, medium, high).
• Cryptographic Mechanisms: Provide a statement from the appropriate national
body for cryptographic mechanisms.
Aspect 3 - Strength of Mechanisms:
• Evaluator Actions:
• Verification: Confirm critical mechanisms identification and compliance with
content, presentation, and evidence standards.
• Analysis Review: Ensure consideration of all relevant details specified for the
evaluation level.
• Penetration Testing: Conduct where necessary to validate claimed minimum
strength.
• Purpose:
• Assess the robustness of critical mechanisms against direct attacks, factoring in
resource requirements.
Note: This analysis aims to ensure that critical mechanisms can withstand direct
attacks, considering the level of resources needed for a successful attack
Aspect 4 - Construction Vulnerability
Assessment
• Definition:
• Assesses known vulnerabilities in the construction of the TOE to determine their
potential impact on TOE security, considering deactivation, bypassing, corruption,
or circumvention of security functions.
• Content and Presentation Requirements:
• Sponsor's List: Identify and analyze all known vulnerabilities in the TOE's
construction.
• Impact Analysis: Provide potential impact analysis for each vulnerability and
countermeasure details.
• Evidence Requirements:
• Exploitation Prevention: Demonstrate that known vulnerabilities cannot be
exploited in the intended TOE environment.
• External Measures: Show how vulnerabilities are covered by uncompromised
Aspect 4 - Construction Vulnerability
Assessment
• Evaluator Actions:
• Verification: Confirm compliance with content, presentation, and evidence standards for the list of
known vulnerabilities.
• Independent Analysis: Conduct an independent vulnerability analysis, considering listed and
additional construction vulnerabilities.
• Comprehensive Coverage: Verify addressing all combinations of known vulnerabilities.
• Assumption Review: Ensure no undocumented or unreasonable assumptions about the intended
environment.
• Penetration Testing: Confirm practical exploitability of known vulnerabilities.
• Purpose:
• Assess the impact and exploitability of known construction vulnerabilities to ensure they do not
compromise TOE security, considering both listed vulnerabilities and additional findings.
Note: This analysis aims to confirm that known vulnerabilities, including potential impacts and
countermeasures, do not compromise the intended security of the TOE.
Effectiveness Criteria – Operation
The sponsor shall provide the following documentation in addition to that required for
evaluation of correctness:
• Definition:
• Investigates whether the TOE can be insecurely configured or used in a manner that
an administrator or end-user might reasonably believe to be secure.
• Content and Presentation Requirements:
• Operation Modes: Identify possible TOE operation modes, including post-failure
or operational error scenarios and implications for secure operation.
• Evidence Requirements:
• Detectability: Show that any human or operational error deactivating or disabling
security functions is easily detectable.
• Configuration Security: Confirm that insecure TOE configuration or usage,
contrary to the security target, is easily detectable by end-users or administrators.
Aspect 1 - Ease of Use:
• Evaluator Actions:
• Analysis Verification: Ensure ease of use analysis meets all content, presentation,
and evidence requirements.
• Assumption Review: Check for undocumented or unreasonable assumptions about
the intended environment.
• External Measures: Verify documentation of external security measures
(procedural, physical, personnel controls).
• Operational Testing: Repeat configuration and installation procedures to confirm
secure TOE usage. Perform additional testing as needed.
• Purpose:
• Assess whether the TOE is prone to insecure configuration or usage that could be
perceived as secure by users or administrators, ensuring detectability of errors and
vulnerabilities.
Note: This analysis aims to confirm that potential insecure configurations or operations
of the TOE, contrary to the security target, are easily detectable by end-users or
administrators.
Aspect 2 - Operational Vulnerability
Assessment:
• Definition:
• Assesses known vulnerabilities in the operation of the TOE to determine if they could
compromise TOE security as specified in the security target.
• Content and Presentation Requirements:
• Known Vulnerabilities List: Sponsor provides a list of known operational vulnerabilities, each
with an impact analysis and proposed countermeasures.
• Evidence Requirements:
• Exploitation Prevention: Analysis must demonstrate that known vulnerabilities can't be
exploited in the intended TOE environment.
• Coverage by External Measures: Vulnerabilities should be covered by uncompromised
external security measures or proven irrelevant to the security target.
Aspect 2 - Operational Vulnerability Assessment:
• Evaluator Actions:
• Comprehensive Review: Check the list of known vulnerabilities, ensuring it meets
content, presentation, and evidence requirements.
• Impact Analysis Verification: Ensure the analysis of potential impacts considers
all information for the evaluation level.
• Independent Vulnerability Analysis: Perform an independent analysis,
considering listed and any additional known operational vulnerabilities.
• Coverage Confirmation: Check that all combinations of known vulnerabilities are
addressed and external security measures are appropriately documented.
• Testing: Conduct penetration testing to confirm or disprove the actual
exploitability of known vulnerabilities in practice.
• Purpose:
• Verify that known operational vulnerabilities, identified during TOE evaluation,
cannot be exploited in the intended environment and are adequately addressed by
external security measures.
Note: This assessment aims to confirm that identified vulnerabilities in the operation of
the TOE, known to the sponsor and evaluator, do not pose practical risks to TOE
security, considering external security measures.
INFORMATION
OBTAINED FROM A
CORRECTNESS
ASSESSMENT
WHICH IS USED
TO PERFORM A
VULNERABILITY
ANALYSIS
Correctness Assurance Overview
Objective:
Address the correctness aspect of assurance for a TOE.
Baseline for Evaluation:
Security target defined in Chapter 2.
Elements include target evaluation level and claimed rating for minimum strength
of mechanisms.
Differentiation:
Effectiveness aspect covered in Chapter 3.
Conclusion:
Correctness assurance focuses on TOE evaluation based on the specified security
target.
Evaluation Levels Overview
1. Evaluation Levels:
1. Seven levels denoted from E0 to E6.
2. Represent confidence in the correctness of a TOE.
2. Characterization:
1. E0: Inadequate assurance.
2. E1: Security target, informal architectural design, functional testing.
3. E2: Adds informal detailed design, evaluated functional testing, config control, distribution.
4. E3: Adds evaluation of source code/hardware drawings, testing evidence.
5. E4: Adds formal model of security policy, semiformal spec for functions/design.
Evaluation Levels Overview
3. Characterization (Contd.):
3. E5: Adds close correspondence between detailed design and source code/hardware.
4. E6: Adds formal style for security functions/architectural design, consistent with
the formal model.
4. Conclusion:
3. Evaluation levels progress from basic assurance (E0) to the highest (E6) with
formal security policy models and specifications.
5. Note:
3. Each level builds on the requirements of the previous level.
4. Criteria include security target, design descriptions, testing evidence, and formality
of specifications
Approach to Descriptions Overview
Construction vs. Operation:
Criteria distinguish between construction and operation phases.
Criteria are categorized under various phases and aspects for each evaluation level.
Documentation Breakdown:
For each aspect or phase, criteria breakdown includes:
Identification of required documentation.
Requirements for content, presentation, procedures, and standards.
Evidence needed to demonstrate criteria fulfillment.
Actions to be taken by the evaluator.
Level-specific Criteria:
Criteria for each evaluation level are presented separately.
New or modified criteria at each level are highlighted in bold.
Rigor and depth of evidence increase with higher evaluation levels.
Sponsor and Evaluator Responsibilities
Responsibilities:
Burden for evidence provision is on the sponsor, except at E1.
Independent action by the evaluator is required for confidence.
Testing is part of quality assurance; a Quality Assurance Programme is assumed
throughout the TOE lifecycle.
Testing Emphasis:
Testing is one aspect of quality assurance.
Sponsor provides evidence of normal development process testing.
Evaluator verifies completeness, comprehensiveness, and accuracy of sponsor-
supplied testing through independent tests.
Quality Assurance Programme:
Assumed to be active throughout the TOE lifecycle.
Criteria guide assessors in evaluating the adequacy of the Quality Assurance
Programme for the targeted evaluation level.
Construction - Development Process
Overview Phases of Development:
1.