SlideShare a Scribd company logo
1 of 41
Download to read offline
Vishnu Kesarwani
             IMS2007011
MS (Cyber Law & Information Security)
           IIIT-Allahabad
   Introduction
   Assurance Paradigm
   Security Assurance Requirements
   EAL Structure
   Relationship Between Assurances Requirements And Assurance Levels
   Assurance Categorization
   Protection Profile Criteria Overview
   Security Target Criteria Overview
   Class APE: Protection Profile Evaluation
   Class ASE: Security Target Evaluation
   Evaluation Assurance Levels
      Evaluation Assurance Level 1 - Functionally Tested
      Evaluation Assurance Level 2 Structurally Tested
      Evaluation Assurance Level 3 Methodically Tested And Checked
      Evaluation Assurance Level 4 - Methodically Designed, Tested, And Reviewed
      Evaluation Assurance Level 5 - Semiformally Designed And Tested
      Evaluation Assurance Level 6 - Semiformally Verified Design And Tested
      Evaluation Assurance Level 7 - Formally Verified Design And Tested
Part 3 of ISO/IEC 15408
                   (Security Assurance Requirements)

 Catalogues the set of assurance components, families and classes.
 Defines evaluation criteria for Protection Profiles (PPs) and Security
  Targets (STs).
 Presents Evaluation Assurance Levels (EALs) that define the
  predefined ISO/IEC 15408 (Common Criteria-CC) scale for rating
  assurance for Target of Evaluations (TOEs).
 Audience for this part of CC
    Consumers,
    Developers, And
    Evaluators
  of secure IT systems and products.
Defines Security Assurance Requirements:
   A basis for the security assurance requirements
    expressed in a PP or a ST.
   Establishes a standard way of expressing the assurance
    requirements for TOEs.
1. Philosophy
 The threats to security and organizational security policy
  commitments should be clearly articulated
 The proposed security measures should be demonstrably
  sufficient for their intended purpose.
 Measures should be adopted that
   reduce the likelihood of vulnerabilities,
   the ability to exercise a vulnerability, and
   the extent of the damage that could occur from a vulnerability
    being exercised
   facilitate the subsequent identification of vulnerabilities and
    the elimination, mitigation, and/or notification that a
    vulnerability has been exploited or triggered.
2. Assurance Approach
assurance based upon an evaluation of the IT product or system that is to
  be trusted.
                   Assurance Through Evaluation
Evaluation techniques can include
   a) analysis and checking of process(es) and procedure(s);
   b) checking that process(es) and procedure(s) are being applied;
   c) analysis of the correspondence between TOE design representations;
   d) analysis of the TOE design representation against the requirements;
   e) verification of proofs;
   f) analysis of guidance documents;
   g) analysis of functional tests developed and the results provided;
   h) independent functional testing;
   i) analysis for vulnerabilities (including flaw hypothesis);
   j) penetration testing.
Significance of Vulnerabilities
 IT security breaches arise through the intentional exploitation or
  the unintentional triggering of vulnerabilities in the application
  of IT within business concerns.
 Steps to prevent vulnerabilities
    Eliminated
    Minimized
    Monitored


                     Cause of Vulnerabilities
Vulnerabilities can arise through failures in:
    Requirements
    Construction
    operation
3. Evaluation Assurance Scale
This scale provides:
 Greater assurance
 Minimum effort


Level of effort is based upon
 Scope
 Depth
 Rigour
 Protection Profile evaluation
 Relation to the Security Target evaluation criteria
 Evaluator tasks
    Evaluator tasks for an evaluation based on CC requirements
     only




    Evaluator tasks for an CC extended evaluation
 Security Target evaluation
 Relation to the other evaluation criteria in this part of CC
 Evaluator tasks
    Evaluator tasks for an evaluation based on CC requirements only




    Evaluator tasks for a CC extended evaluation
 The goal of a PP evaluation is to demonstrate that the
  PP is complete, consistent and technically sound.

 An evaluated PP is suitable for use as the basis for the
  development of STs.

 Such a PP is eligible for inclusion in a registry.
 Objectives
 Application
    notes
   Dependencies
   Developer
    action elements
   Content and
    presentation of
    evidence
    elements
   Evaluator action
    elements
 The goal of an ST evaluation is to demonstrate that
    the ST is complete, consistent, technically sound, and
    suitable for use as the basis for the corresponding TOE evaluation.

                                                     Objectives
                                                     Application
                                                        notes
                                                       Dependencies
                                                       Developer action
                                                        elements
                                                       Content and
                                                        presentation of
                                                        evidence
                                                        elements
                                                       Evaluator action
                                                        elements
 an increasing scale that balances the level of assurance obtained with
  the cost and feasibility of acquiring that degree of assurance.
Objectives
 EAL1 is applicable where some confidence in correct
  operation is required, but the threats to security are
  not viewed as serious.

 EAL1 provides
   an evaluation of the TOE as made available to the
    customer, including independent testing against a
    specification, and
   an examination of the guidance documentation
    provided.
Assurance components
 EAL1 provides a basic level of assurance by an analysis of
  the security functions using
   a functional and interface specification, and
   guidance documentation,
  to understand the security behaviour.

 The analysis is supported by independent testing of the
  TOE security functions.

 This EAL provides a meaningful increase in assurance over
  an unevaluated IT product or system.
Objectives
 applicable in those circumstances where developers or users require a
  low to moderate level of independently assured security in the absence
  of ready availability of the complete development record,
 requires the co-operation of the developer in terms of the delivery of
  design information and test results

Assurance components
 EAL2 provides assurance by
    an analysis of the security functions using
        a functional and interface specification,
        guidance documentation and
        the high-level design of the TOE,
     to understand the security behaviour.
    a configuration list for the TOE, and
    evidence of secure delivery procedures.
 The analysis is supported by
      independent testing of the TOE security functions,
      evidence of developer testing based on the functional specification,
      selective independent confirmation of the developer test results,
      strength of function analysis, and
      evidence of a developer search for obvious vulnerabilities

 This EAL represents a meaningful increase in assurance from
  EAL1 by requiring
    developer testing,
    a vulnerability analysis, and
    independent testing based upon more detailed TOE specifications.
Objectives
 permits a developer to gain maximum assurance from positive security engineering at the
  design stage without substantial alteration of existing sound development practices.
 applicable in those circumstances where developers or users require a moderate level of
  independently assured security, and require a thorough investigation of the TOE and its
  development without substantial re-engineering.

Assurance components
 EAL3 provides assurance by
    an analysis of the security functions, using
        a functional and interface specification,
        guidance documentation, and
        the high-level design of the TOE,
        to understand the security behaviour.
       the use of
           development environment controls,
           TOE configuration management, and
           evidence of secure delivery procedures.
 The analysis is supported by
   independent testing of the TOE security functions,
   evidence of developer testing based on the functional
    specification and high-level design,
   selective independent confirmation of the developer test
    results,
   strength of function analysis, and
   evidence of a developer search for obvious vulnerabilities.


 This EAL represents a meaningful increase in assurance
  from EAL2 by requiring
    more complete testing coverage of the security functions and
     mechanisms and/or procedures that provide some confidence
     that the TOE will not be tampered with during development.
Objectives
 permits a developer to gain maximum assurance from positive security engineering based
  on good commercial development practices which, though rigorous, do not require
  substantial specialist knowledge, skills, and other resources.
 applicable in those circumstances where developers or users require a moderate to high
  level of independently assured security in conventional commodity TOEs and are
  prepared to incur additional security-specific engineering costs.

Assurance components
 EAL4 provides assurance by
       an analysis of the security functions, using
            a functional and complete interface specification,
            guidance documentation,
            the high-level and low-level design of the TOE,
            a subset of the implementation,
        to understand the security behaviour
       an informal model of the TOE security policy,
       the use of development environment controls ,
       additional TOE configuration management including automation, and
       evidence of secure delivery procedures
 The analysis is supported by
    independent testing of the TOE security functions,
    evidence of developer testing based on the functional specification and
       high-level design,
      selective independent confirmation of the developer test results,
      strength of function analysis,
      evidence of a developer search for vulnerabilities, and
      an independent vulnerability analysis demonstrating resistance to
       penetration attackers with a low attack potential.

This EAL represents a meaningful increase in assurance from EAL3 by
  requiring
 more design description,
 a subset of the implementation, and
 improved mechanisms and/or procedures that provide confidence that the
  TOE will not be tampered with during development or delivery.
Objectives
   permits a developer to gain maximum assurance from security engineering
   Applicable where developers or users require a high level of independently assured security in a planned
    development and require a rigorous development approach without incurring unreasonable costs attributable
    to specialist security engineering techniques.
Assurance components
   EAL5 provides assurance by
      an analysis of the security functions, using
           a functional and complete interface specification,
           guidance documentation,
           the high-level and low-level design of the TOE,
           all of the implementation,
        to understand the security behaviour.
      a formal model of the TOE security policy,
      a semiformal presentation of the functional specification and high-level design, and a semiformal
        demonstration of correspondence between them,
      a modular TOE design,
      the use of
           a development environment controls,
           comprehensive TOE configuration management including automation, and
           evidence of secure delivery procedures.
   The analysis is supported by
        independent testing of the TOE security functions,
        evidence of developer testing based on the functional specification, and high-level design
         and low-level design,
        selective independent confirmation of the developer test results,
        strength of function analysis,
        evidence of a developer search for vulnerabilities,
        an independent vulnerability analysis demonstrating resistance to penetration attackers
         with a moderate attack potential, and
        validation of the developer's covert channel analysis.

   This EAL represents a meaningful increase in assurance from EAL4 by requiring
        semiformal design descriptions,
        the entire implementation,
        a more structured architecture,
        covert channel analysis, and
        improved mechanisms and/or procedures that provide confidence that the TOE will not be
         tampered with during development.
Objectives
 permits developers to gain high assurance from application of security engineering techniques to a
  rigorous development environment in order to produce a premium TOE for protecting high value
  assets against significant risks.
 applicable to the development of security TOEs for application in high risk situations where the value
  of the protected assets justifies the additional costs.

Assurance components
 EAL6 provides assurance by
       an analysis of the security functions, using
             a functional and complete interface specification,
             guidance documentation,
             the high-level and low-level design of the of the TOE,
             a structured presentation of the implementation,
        to understand the security behaviour,
       a formal model of the TOE security policy,
       a semiformal presentation of the functional specification, high-level design, and low-level design and a
        semiformal demonstration of correspondence between them,
       a modular and layered TOE design, and
       the use of
             a structured development process,
             development environment controls,
             comprehensive TOE configuration management including complete automation, and
             evidence of secure delivery procedures.
   The analysis is supported by
        independent testing of the TOE security functions,
        evidence of developer testing based on the functional specification, high-level design and
         low-level design,
        selective independent confirmation of the developer test results,
        strength of function analysis,
        evidence of a developer search for vulnerabilities,
        an independent vulnerability analysis demonstrating resistance to penetration attackers
         with a high attack potential, and
        validation of the developer's systematic covert channel analysis.

   This EAL represents a meaningful increase in assurance from EAL5 by requiring
        more comprehensive analysis,
        a structured representation of the implementation,
        more architectural structure (e.g. layering),
        more comprehensive independent vulnerability analysis,
        systematic covert channel identification, and
        improved configuration management and development environment controls.
Objectives
 applicable to the development of security TOEs for application in extremely high risk situations
  and/or where the high value of the assets justifies the higher costs.

Assurance components
 EAL7 provides assurance by
     an analysis of the security functions, using
         a functional and complete interface specification,
         guidance documentation,
         the high-level and low-level design of the TOE, and
         a structured presentation of the implementation,
       to understand the security behaviour.
     a formal model of the TOE security policy,
     a formal presentation of the functional specification and high-level design,
     a semiformal presentation of the low-level design,
     formal and semiformal demonstration of correspondence between them
     a modular, layered and simple TOE design , and
     the use of
         a structured development process,
         development environment controls,
         comprehensive TOE configuration management including complete automation, and
         evidence of secure delivery procedures.
 The analysis is supported by
    independent testing of the TOE security functions,
    evidence of developer testing based on the functional specification
       high-level design, low-level design and implementation representation,
      complete independent confirmation of the developer test results,
      strength of function analysis,
      evidence of a developer search for vulnerabilities
      an independent vulnerability analysis demonstrating resistance to
       penetration attackers with a high attack potential , and
      validation of the developer‘s systematic covert channel analysis.

 This EAL represents a meaningful increase in assurance from EAL6 by
  requiring
    more comprehensive analysis using formal representations and formal
     correspondence, and
    comprehensive testing.
 Information   Technology  —     Security
 Techniques — Evaluation Criteria For IT
 Security                            Part3:
 Security Assurance Requirements (ISO/IEC
 15408-3)
Understanding Security Assurance Requirements and Evaluation Levels

More Related Content

What's hot

Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC FrameworkRishi Kant
 
Unit testing and scaffolding
Unit testing and scaffoldingUnit testing and scaffolding
Unit testing and scaffoldingValerio Maggio
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
 
V model presentation
V model presentationV model presentation
V model presentationNiat Murad
 
Structural and functional testing
Structural and functional testingStructural and functional testing
Structural and functional testingHimanshu
 
Aspect Oriented Software Development
Aspect Oriented Software DevelopmentAspect Oriented Software Development
Aspect Oriented Software DevelopmentJignesh Patel
 
system-design-interview-an-insiders-guide-2nbsped-9798664653403.pdf
system-design-interview-an-insiders-guide-2nbsped-9798664653403.pdfsystem-design-interview-an-insiders-guide-2nbsped-9798664653403.pdf
system-design-interview-an-insiders-guide-2nbsped-9798664653403.pdfParthNavale
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxkumari36
 
SOFTWARE TESTING UNIT-4
SOFTWARE TESTING UNIT-4  SOFTWARE TESTING UNIT-4
SOFTWARE TESTING UNIT-4 Mohammad Faizan
 
2.2. language evaluation criteria
2.2. language evaluation criteria2.2. language evaluation criteria
2.2. language evaluation criteriaannahallare_
 
Software testing regression testing
Software testing  regression testingSoftware testing  regression testing
Software testing regression testingGaneshKumarKanthiah
 
Software testing & Quality Assurance
Software testing & Quality Assurance Software testing & Quality Assurance
Software testing & Quality Assurance Webtech Learning
 
Software Quality Attributes
Software Quality AttributesSoftware Quality Attributes
Software Quality AttributesHayim Makabee
 
Software Testing Strategies
Software Testing StrategiesSoftware Testing Strategies
Software Testing StrategiesNayyabMirTahir
 
Software Development Software development process
Software Development Software development processSoftware Development Software development process
Software Development Software development processimtiazalijoono
 
Acceptance testing
Acceptance testingAcceptance testing
Acceptance testingCOEPD HR
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9Ian Sommerville
 

What's hot (20)

Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
Unit testing and scaffolding
Unit testing and scaffoldingUnit testing and scaffolding
Unit testing and scaffolding
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
V model presentation
V model presentationV model presentation
V model presentation
 
Structural and functional testing
Structural and functional testingStructural and functional testing
Structural and functional testing
 
Aspect Oriented Software Development
Aspect Oriented Software DevelopmentAspect Oriented Software Development
Aspect Oriented Software Development
 
system-design-interview-an-insiders-guide-2nbsped-9798664653403.pdf
system-design-interview-an-insiders-guide-2nbsped-9798664653403.pdfsystem-design-interview-an-insiders-guide-2nbsped-9798664653403.pdf
system-design-interview-an-insiders-guide-2nbsped-9798664653403.pdf
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
 
SOFTWARE TESTING UNIT-4
SOFTWARE TESTING UNIT-4  SOFTWARE TESTING UNIT-4
SOFTWARE TESTING UNIT-4
 
Security testing
Security testingSecurity testing
Security testing
 
2.2. language evaluation criteria
2.2. language evaluation criteria2.2. language evaluation criteria
2.2. language evaluation criteria
 
Software testing regression testing
Software testing  regression testingSoftware testing  regression testing
Software testing regression testing
 
Software testing & Quality Assurance
Software testing & Quality Assurance Software testing & Quality Assurance
Software testing & Quality Assurance
 
Software Quality Attributes
Software Quality AttributesSoftware Quality Attributes
Software Quality Attributes
 
Software Testing Strategies
Software Testing StrategiesSoftware Testing Strategies
Software Testing Strategies
 
Software Development Software development process
Software Development Software development processSoftware Development Software development process
Software Development Software development process
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Acceptance testing
Acceptance testingAcceptance testing
Acceptance testing
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9
 
Software Verification & Validation
Software Verification & ValidationSoftware Verification & Validation
Software Verification & Validation
 

Viewers also liked

G321 Marking Criteria
G321 Marking CriteriaG321 Marking Criteria
G321 Marking Criteriajfoster10
 
FITT Toolbox: Evaluation Criteria
FITT Toolbox: Evaluation CriteriaFITT Toolbox: Evaluation Criteria
FITT Toolbox: Evaluation CriteriaFITT
 
Sensory evaluation of essential oil final ppt by shivanand m.r
Sensory evaluation of essential oil final ppt by  shivanand m.rSensory evaluation of essential oil final ppt by  shivanand m.r
Sensory evaluation of essential oil final ppt by shivanand m.rUHS Bagalkot, KRCCH Arabhavi
 
Evaluation of training
Evaluation of trainingEvaluation of training
Evaluation of trainingSelf-employed
 
Training evaluation ppt 6
Training evaluation   ppt 6Training evaluation   ppt 6
Training evaluation ppt 6SBMC Jobs
 

Viewers also liked (7)

G321 Marking Criteria
G321 Marking CriteriaG321 Marking Criteria
G321 Marking Criteria
 
FITT Toolbox: Evaluation Criteria
FITT Toolbox: Evaluation CriteriaFITT Toolbox: Evaluation Criteria
FITT Toolbox: Evaluation Criteria
 
Sensory evaluation of essential oil final ppt by shivanand m.r
Sensory evaluation of essential oil final ppt by  shivanand m.rSensory evaluation of essential oil final ppt by  shivanand m.r
Sensory evaluation of essential oil final ppt by shivanand m.r
 
Thesis evaluation criteria
Thesis evaluation criteriaThesis evaluation criteria
Thesis evaluation criteria
 
Evaluation of training
Evaluation of trainingEvaluation of training
Evaluation of training
 
Training evaluation
Training evaluationTraining evaluation
Training evaluation
 
Training evaluation ppt 6
Training evaluation   ppt 6Training evaluation   ppt 6
Training evaluation ppt 6
 

Similar to Understanding Security Assurance Requirements and Evaluation Levels

CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoJinElias52
 
Verifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasiVerifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasirizqiariy
 
Standards for safety and security in avionics
Standards for safety and security in avionicsStandards for safety and security in avionics
Standards for safety and security in avionicsAlessandro Bruni
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...IJNSA Journal
 
QualityAssurance.pdf
QualityAssurance.pdfQualityAssurance.pdf
QualityAssurance.pdfkumari36
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life CycleMaurice Dawson
 
Software Testing and Quality Assurance unit1
Software Testing and Quality Assurance  unit1Software Testing and Quality Assurance  unit1
Software Testing and Quality Assurance unit1Bhagyashree Dhakulkar
 
Edgilis principles of isa may11
Edgilis principles of isa may11Edgilis principles of isa may11
Edgilis principles of isa may11Max Armbruster
 
Profile based security assurance for service
Profile based security assurance for serviceProfile based security assurance for service
Profile based security assurance for serviceIESS
 
ISO_IEC standards_quality.pptx
ISO_IEC standards_quality.pptxISO_IEC standards_quality.pptx
ISO_IEC standards_quality.pptxKamalKamalli1
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...Mark John Lado, MIT
 
Software reliability engineering
Software reliability engineeringSoftware reliability engineering
Software reliability engineeringMark Turner CRP
 
Unit II Software Testing and Quality Assurance
Unit II Software Testing and Quality AssuranceUnit II Software Testing and Quality Assurance
Unit II Software Testing and Quality AssuranceVinothkumaR Ramu
 

Similar to Understanding Security Assurance Requirements and Evaluation Levels (20)

CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
 
Verifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasiVerifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasi
 
Standards for safety and security in avionics
Standards for safety and security in avionicsStandards for safety and security in avionics
Standards for safety and security in avionics
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 
Ijcatr04051006
Ijcatr04051006Ijcatr04051006
Ijcatr04051006
 
QualityAssurance.pdf
QualityAssurance.pdfQualityAssurance.pdf
QualityAssurance.pdf
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
Software Testing and Quality Assurance unit1
Software Testing and Quality Assurance  unit1Software Testing and Quality Assurance  unit1
Software Testing and Quality Assurance unit1
 
Edgilis principles of isa may11
Edgilis principles of isa may11Edgilis principles of isa may11
Edgilis principles of isa may11
 
Profile based security assurance for service
Profile based security assurance for serviceProfile based security assurance for service
Profile based security assurance for service
 
Unit 4 standards.ppt
Unit 4 standards.pptUnit 4 standards.ppt
Unit 4 standards.ppt
 
ISO_IEC standards_quality.pptx
ISO_IEC standards_quality.pptxISO_IEC standards_quality.pptx
ISO_IEC standards_quality.pptx
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
 
Ab04507161167
Ab04507161167Ab04507161167
Ab04507161167
 
Quality Assurance
Quality AssuranceQuality Assurance
Quality Assurance
 
Software reliability engineering
Software reliability engineeringSoftware reliability engineering
Software reliability engineering
 
Unit II Software Testing and Quality Assurance
Unit II Software Testing and Quality AssuranceUnit II Software Testing and Quality Assurance
Unit II Software Testing and Quality Assurance
 
@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Understanding Security Assurance Requirements and Evaluation Levels

  • 1. Vishnu Kesarwani IMS2007011 MS (Cyber Law & Information Security) IIIT-Allahabad
  • 2. Introduction  Assurance Paradigm  Security Assurance Requirements  EAL Structure  Relationship Between Assurances Requirements And Assurance Levels  Assurance Categorization  Protection Profile Criteria Overview  Security Target Criteria Overview  Class APE: Protection Profile Evaluation  Class ASE: Security Target Evaluation  Evaluation Assurance Levels  Evaluation Assurance Level 1 - Functionally Tested  Evaluation Assurance Level 2 Structurally Tested  Evaluation Assurance Level 3 Methodically Tested And Checked  Evaluation Assurance Level 4 - Methodically Designed, Tested, And Reviewed  Evaluation Assurance Level 5 - Semiformally Designed And Tested  Evaluation Assurance Level 6 - Semiformally Verified Design And Tested  Evaluation Assurance Level 7 - Formally Verified Design And Tested
  • 3. Part 3 of ISO/IEC 15408 (Security Assurance Requirements)  Catalogues the set of assurance components, families and classes.  Defines evaluation criteria for Protection Profiles (PPs) and Security Targets (STs).  Presents Evaluation Assurance Levels (EALs) that define the predefined ISO/IEC 15408 (Common Criteria-CC) scale for rating assurance for Target of Evaluations (TOEs).  Audience for this part of CC  Consumers,  Developers, And  Evaluators of secure IT systems and products.
  • 4. Defines Security Assurance Requirements:  A basis for the security assurance requirements expressed in a PP or a ST.  Establishes a standard way of expressing the assurance requirements for TOEs.
  • 5. 1. Philosophy  The threats to security and organizational security policy commitments should be clearly articulated  The proposed security measures should be demonstrably sufficient for their intended purpose.  Measures should be adopted that  reduce the likelihood of vulnerabilities,  the ability to exercise a vulnerability, and  the extent of the damage that could occur from a vulnerability being exercised  facilitate the subsequent identification of vulnerabilities and the elimination, mitigation, and/or notification that a vulnerability has been exploited or triggered.
  • 6. 2. Assurance Approach assurance based upon an evaluation of the IT product or system that is to be trusted. Assurance Through Evaluation Evaluation techniques can include a) analysis and checking of process(es) and procedure(s); b) checking that process(es) and procedure(s) are being applied; c) analysis of the correspondence between TOE design representations; d) analysis of the TOE design representation against the requirements; e) verification of proofs; f) analysis of guidance documents; g) analysis of functional tests developed and the results provided; h) independent functional testing; i) analysis for vulnerabilities (including flaw hypothesis); j) penetration testing.
  • 7. Significance of Vulnerabilities  IT security breaches arise through the intentional exploitation or the unintentional triggering of vulnerabilities in the application of IT within business concerns.  Steps to prevent vulnerabilities  Eliminated  Minimized  Monitored Cause of Vulnerabilities Vulnerabilities can arise through failures in:  Requirements  Construction  operation
  • 8. 3. Evaluation Assurance Scale This scale provides:  Greater assurance  Minimum effort Level of effort is based upon  Scope  Depth  Rigour
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.  Protection Profile evaluation  Relation to the Security Target evaluation criteria  Evaluator tasks  Evaluator tasks for an evaluation based on CC requirements only  Evaluator tasks for an CC extended evaluation
  • 14.  Security Target evaluation  Relation to the other evaluation criteria in this part of CC  Evaluator tasks  Evaluator tasks for an evaluation based on CC requirements only  Evaluator tasks for a CC extended evaluation
  • 15.  The goal of a PP evaluation is to demonstrate that the PP is complete, consistent and technically sound.  An evaluated PP is suitable for use as the basis for the development of STs.  Such a PP is eligible for inclusion in a registry.
  • 16.  Objectives  Application notes  Dependencies  Developer action elements  Content and presentation of evidence elements  Evaluator action elements
  • 17.  The goal of an ST evaluation is to demonstrate that  the ST is complete, consistent, technically sound, and  suitable for use as the basis for the corresponding TOE evaluation.  Objectives  Application notes  Dependencies  Developer action elements  Content and presentation of evidence elements  Evaluator action elements
  • 18.  an increasing scale that balances the level of assurance obtained with the cost and feasibility of acquiring that degree of assurance.
  • 19. Objectives  EAL1 is applicable where some confidence in correct operation is required, but the threats to security are not viewed as serious.  EAL1 provides  an evaluation of the TOE as made available to the customer, including independent testing against a specification, and  an examination of the guidance documentation provided.
  • 20. Assurance components  EAL1 provides a basic level of assurance by an analysis of the security functions using  a functional and interface specification, and  guidance documentation, to understand the security behaviour.  The analysis is supported by independent testing of the TOE security functions.  This EAL provides a meaningful increase in assurance over an unevaluated IT product or system.
  • 21.
  • 22. Objectives  applicable in those circumstances where developers or users require a low to moderate level of independently assured security in the absence of ready availability of the complete development record,  requires the co-operation of the developer in terms of the delivery of design information and test results Assurance components  EAL2 provides assurance by  an analysis of the security functions using  a functional and interface specification,  guidance documentation and  the high-level design of the TOE, to understand the security behaviour.  a configuration list for the TOE, and  evidence of secure delivery procedures.
  • 23.  The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification,  selective independent confirmation of the developer test results,  strength of function analysis, and  evidence of a developer search for obvious vulnerabilities  This EAL represents a meaningful increase in assurance from EAL1 by requiring  developer testing,  a vulnerability analysis, and  independent testing based upon more detailed TOE specifications.
  • 24.
  • 25. Objectives  permits a developer to gain maximum assurance from positive security engineering at the design stage without substantial alteration of existing sound development practices.  applicable in those circumstances where developers or users require a moderate level of independently assured security, and require a thorough investigation of the TOE and its development without substantial re-engineering. Assurance components  EAL3 provides assurance by  an analysis of the security functions, using  a functional and interface specification,  guidance documentation, and  the high-level design of the TOE, to understand the security behaviour.  the use of  development environment controls,  TOE configuration management, and  evidence of secure delivery procedures.
  • 26.  The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification and high-level design,  selective independent confirmation of the developer test results,  strength of function analysis, and  evidence of a developer search for obvious vulnerabilities.  This EAL represents a meaningful increase in assurance from EAL2 by requiring  more complete testing coverage of the security functions and mechanisms and/or procedures that provide some confidence that the TOE will not be tampered with during development.
  • 27.
  • 28. Objectives  permits a developer to gain maximum assurance from positive security engineering based on good commercial development practices which, though rigorous, do not require substantial specialist knowledge, skills, and other resources.  applicable in those circumstances where developers or users require a moderate to high level of independently assured security in conventional commodity TOEs and are prepared to incur additional security-specific engineering costs. Assurance components  EAL4 provides assurance by  an analysis of the security functions, using  a functional and complete interface specification,  guidance documentation,  the high-level and low-level design of the TOE,  a subset of the implementation, to understand the security behaviour  an informal model of the TOE security policy,  the use of development environment controls ,  additional TOE configuration management including automation, and  evidence of secure delivery procedures
  • 29.  The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification and high-level design,  selective independent confirmation of the developer test results,  strength of function analysis,  evidence of a developer search for vulnerabilities, and  an independent vulnerability analysis demonstrating resistance to penetration attackers with a low attack potential. This EAL represents a meaningful increase in assurance from EAL3 by requiring  more design description,  a subset of the implementation, and  improved mechanisms and/or procedures that provide confidence that the TOE will not be tampered with during development or delivery.
  • 30.
  • 31. Objectives  permits a developer to gain maximum assurance from security engineering  Applicable where developers or users require a high level of independently assured security in a planned development and require a rigorous development approach without incurring unreasonable costs attributable to specialist security engineering techniques. Assurance components  EAL5 provides assurance by  an analysis of the security functions, using  a functional and complete interface specification,  guidance documentation,  the high-level and low-level design of the TOE,  all of the implementation, to understand the security behaviour.  a formal model of the TOE security policy,  a semiformal presentation of the functional specification and high-level design, and a semiformal demonstration of correspondence between them,  a modular TOE design,  the use of  a development environment controls,  comprehensive TOE configuration management including automation, and  evidence of secure delivery procedures.
  • 32. The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification, and high-level design and low-level design,  selective independent confirmation of the developer test results,  strength of function analysis,  evidence of a developer search for vulnerabilities,  an independent vulnerability analysis demonstrating resistance to penetration attackers with a moderate attack potential, and  validation of the developer's covert channel analysis.  This EAL represents a meaningful increase in assurance from EAL4 by requiring  semiformal design descriptions,  the entire implementation,  a more structured architecture,  covert channel analysis, and  improved mechanisms and/or procedures that provide confidence that the TOE will not be tampered with during development.
  • 33.
  • 34. Objectives  permits developers to gain high assurance from application of security engineering techniques to a rigorous development environment in order to produce a premium TOE for protecting high value assets against significant risks.  applicable to the development of security TOEs for application in high risk situations where the value of the protected assets justifies the additional costs. Assurance components  EAL6 provides assurance by  an analysis of the security functions, using  a functional and complete interface specification,  guidance documentation,  the high-level and low-level design of the of the TOE,  a structured presentation of the implementation, to understand the security behaviour,  a formal model of the TOE security policy,  a semiformal presentation of the functional specification, high-level design, and low-level design and a semiformal demonstration of correspondence between them,  a modular and layered TOE design, and  the use of  a structured development process,  development environment controls,  comprehensive TOE configuration management including complete automation, and  evidence of secure delivery procedures.
  • 35. The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification, high-level design and low-level design,  selective independent confirmation of the developer test results,  strength of function analysis,  evidence of a developer search for vulnerabilities,  an independent vulnerability analysis demonstrating resistance to penetration attackers with a high attack potential, and  validation of the developer's systematic covert channel analysis.  This EAL represents a meaningful increase in assurance from EAL5 by requiring  more comprehensive analysis,  a structured representation of the implementation,  more architectural structure (e.g. layering),  more comprehensive independent vulnerability analysis,  systematic covert channel identification, and  improved configuration management and development environment controls.
  • 36.
  • 37. Objectives  applicable to the development of security TOEs for application in extremely high risk situations and/or where the high value of the assets justifies the higher costs. Assurance components  EAL7 provides assurance by  an analysis of the security functions, using  a functional and complete interface specification,  guidance documentation,  the high-level and low-level design of the TOE, and  a structured presentation of the implementation, to understand the security behaviour.  a formal model of the TOE security policy,  a formal presentation of the functional specification and high-level design,  a semiformal presentation of the low-level design,  formal and semiformal demonstration of correspondence between them  a modular, layered and simple TOE design , and  the use of  a structured development process,  development environment controls,  comprehensive TOE configuration management including complete automation, and  evidence of secure delivery procedures.
  • 38.  The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification high-level design, low-level design and implementation representation,  complete independent confirmation of the developer test results,  strength of function analysis,  evidence of a developer search for vulnerabilities  an independent vulnerability analysis demonstrating resistance to penetration attackers with a high attack potential , and  validation of the developer‘s systematic covert channel analysis.  This EAL represents a meaningful increase in assurance from EAL6 by requiring  more comprehensive analysis using formal representations and formal correspondence, and  comprehensive testing.
  • 39.
  • 40.  Information Technology — Security Techniques — Evaluation Criteria For IT Security Part3: Security Assurance Requirements (ISO/IEC 15408-3)