Lecture - 12 - Evaluation Standards
Lecture - 12 - Evaluation Standards
Evaluation Standards
Overview
• Why evaluate?
• Evaluation criteria
– Trusted Computer System Evaluation Criteria: TCSEC
(aka Orange Book)
– Federal Information Processing Standards: FIPS 140
– Common Criteria
– System Security Engineering Capability Maturity
Model: SSE-CMM
Background
• Goal of Evaluation: Show that a system meets
specific security requirements under specific
conditions
– Called a trusted system
– Based on specific assurance evidence
• Formal evaluation methodology
– Technique used to provide measurements of trust
based on specific security requirements and
evidence of assurance
Features of an Evaluation Methodology
• Provides set of requirements defining security functionality
for system
• Yellow Book
Methodology for Security Risk Assessment
• Lavendar Book
Database Security Evaluation
TCSEC: 1983–1999
• Heavily influenced by Bell-LaPadula model and
reference monitor concept
• Emphasizes confidentiality
• Original spec Aug 83, revised Dec 85
Evaluation Criteria Classes (Ratings)
Class Description
A1 Verified Design
B3 Security Domains
B2 Structured Protection
B1 Labelled Security Protection
C2 Controlled Access Protection
C1 Discretionary Security Protection
D Minimal Protection
Functional Requirements
• Discretionary access control requirements
– Control sharing of named objects by named
individuals/groups
– Address propagation of access rights, ACLs, granularity of
controls
• Object reuse requirements
– Hinder attacker gathering information from disk or
memory that has been deleted
– Address overwriting data, revoking access rights, and
assignment of resources when data in resource from
previous use is present
Functional Requirements
• Mandatory access control requirements (B1 up)
– Embody simple security condition, *-property
– Description of hierarchy of labels attached to subjects and
objects, represent authorizations and protection
respectively
• Label requirements (B1 up)
– Used to enforce MAC
– Address representation of classifications, clearances,
exporting labeled information, human-readable output
• Identification, authentication requirements
– Address granularity (per group or user) of authentication
data, protecting that data, associating identity with
auditable actions
Functional Requirements
• Audit requirements
– Define what audit records contain, events to be recorded;
set increases as other requirements increase
• Trusted path requirements (B2 up)
– Communications path guaranteed between user, TCB
• System architecture requirements
– Tamperproof reference validation mechanism
– Process isolation
– Enforcement of principle of least privilege
– Well-defined user interfaces
Operational Assurance/Functional Requirements