SlideShare a Scribd company logo
SPANISH CATALOGUE OF QUALIFIED
PRODUCTS: A NEW WAY OF USING CC
FOR PROCUREMENT
• Who are we?
• Worldwide Procurement Initiatives
• Why a Product Catalogue?
• CPSTIC - Catalogue
• Conclusions
Index
Who are we?
Who are we?
• Jose Ruiz – CTO at jtsec
• jtsec – CC and FIPS 140-2 Consultancy company - Based in
Spain
• CCGEN Developers – Common Criteria Documentation
Development tool
• More than 10 years of experience working with different
labs and CBs as evaluator, lab manager and consultant
Why are we here?
• We support companies to meet their business
expectations. e.g.- sales to governments
• We like initiatives that make life easier
• We think that could be useful for other countries
• My father wanted to visit Canada ;)
The importance of procurement as a
prevention tool
Prevention ResponseDetección
Image
TrustworthyReputation
Business
Prestige
DoS
Data
leakage
Integrity
Brand value
Detection
Worldwide Procurement Initiatives
Worldwide Procurement Initiatives
• US Government Requirements
 CC is mandatory for all IT products with security
features that are deployed in U.S. National
Security Systems (NSS)
 Products are to be selected from the NIAP
PCL, meaning they have met a NIAP
approved Protection Profile
 DoD’s Information Network Approved Products
List (DoDIN APL)
 Common Criteria and very likely FIPS 140-2
validation are required
Worldwide Procurement Initiatives
• Australian Government Requirements
 CC is mandatory for all products providing
security functions within all Australian
Government systems, unless the risks of not
using CC products has been appropriately
accepted and documented.
 Products may be selected from the Australian
Evaluated Products List (EPL) or the CC portal.
Worldwide Procurement Initiatives
• Canadian Government Requirements
 CC should be included as a requirement in
Government of Canada RFPs/contracts
whenever possible.
 Certified products evaluated against the
Protection Profile for a given technology class
may be selected
Worldwide Procurement Initiatives
• French Government Requirements
 Types of certification used for procurement
 Common Criteria Certification
 First Level Security Certification – CSPN
 Acquisition Policy:
 CSPN for elementary qualification
 EAL3+VAN.3+FLR.3 for standard qualification or
 EAL4+VAN.5 +IMP.2+ DVS.2+FLR.3 for
reinforced qualification
Worldwide Procurement Initiatives
• UK Government Requirements
 Types of certification used for procurement
 Common Criteria Certification
 Commercial Product Assurance - CPA
 CPA: A security product that passes assessment is
awarded Foundation Grade certification -
demonstrate good commercial security practice
and suitable for lower threat environments.
 Should we just use CC? Ideally, yes
x CC does not always represent a necessary or
sufficient level of product assurance for the UK
public.
¿Why a product catalogue?
Legislation - IT Security products - ENS
• Legal framework
 RD 03/2010, 8th January
 RD 951/2015, 23rd October by modification
of RD 3/2010 -> ENS – National Security
Scheme
• Objective:
 To establish basic principles and minimum
requirements for the protection of
information
• Scope of application
 Public administration
Legislation - IT Security products - ENS
• Information protection. Security dimensions:
 Confidentiality
 Integrity
 Availability
 Traceability
 Authenticity
• System category:
 High
 Medium
 Basic
Legislation - IT Security products - ENS
• Current situation:
RD 951/2015 of 23rd October, amending RD
3/2010 regulating the ENS in the field of
Electronic Administration, ART. 18: “for the
procurement of information and
communication technology security
products to be used by public
administrations, those that have certified
the security functions related to the object
of their procurement shall be used in a
manner proportionate to the
category of the system and the level
of security identified…”
Legislation - IT Security products - ENS
• Moreover, for “High” products category in the ENS:
“RD 03/2010 of 8th January, regulated by the National
Security Scheme (ENS) in the field of electronic
administration. Annex 2. section 4.1.5 Certified
components: Products or equipment whose safety
features and level have been assessed in
accordance to European or International
standards and which are certified by
independent bodies of recognised standing shall
preferably be used. “
Why is not CC the answer?
• What does it mean that a product is certified?
 The product has been evaluated taking into
account the SFRs and SARs defined in the
Security Target
• Who performs the Security Target?
 The manufacturer
Why a product catalogue?
• Certified product Qualified for use in
administration?
• Only it is suitable if:
 The Security Target is complete, consistent and
technically accurate.
WARNING:
The ST is performed by the
manufacturer!
The CPSTIC. For what?
• Certified product Qualified for
use in administration?
• Only it is suitable if:
 The TOE involves the main
security functionality of the
product.
 Unfortunately, sometimes this
is not the case
Product
TOE
The CPSTIC. For what?
• Corollary: In order to be able to check if one product is
adequately certified, the government agency must have
the capacity to:
 Require product certification
 Check that the ST is technically suitable
 Check that it is complete
A catalogue will ease this task.
The CPSTIC
The CPSTIC
• The CPSTIC is the reference catalogue for the acquisition of IT products
in public organisms affected by the National Security Scheme (ENS).
• Scope:
 Qualified products. Sensitive information
 Approved products. Classified information
Qualified
Approved
Approved
encrypted
products
(CCN_STIC-
103)
The CPSTIC
• Scope:
 Which products are suitable to be included?
 The products that implement security
functionalities in a system in an active manner
The CPSTIC
• Related legislation:
 CCN-STIC-106. Inclusion
procedure of IT products
qualified in the CPSTIC
 CCN-STIC-140. Reference
taxonomies for IT security
products
 CCN-STIC-105. CPSTIC
CCN-
STIC-
106
CCNS
-STIC-
140
CCN-
STIC-
105
The CPSTIC
• CCN-STIC-106. Inclusion requirements:
 Common Criteria certified products. Low EAL
level required. The Security Target shall be
checked for compliance with the SFR.
 If you do not have Common Criteria certification,
an accredited laboratory will perform the
evaluation.
• CC certification may not be required where:
 The product is promoted by the Administration.
 It has a strategic interest.
 There are no substitute products on the market.
 A STIC evaluation could be applied.
The CPSTIC
• Inclusion procedure in the catalogue
Request for
product
recommendation
for use in
administration
Is there an
operational need
without CC
Are all ESR
included?
Is there a
recommended
PP?
CC
Certification
according to
recommended
PP
STIC
Methodology
Evaluation
Covering ESR
CC
Certification
ST Compliant
Is it certified by
CC?
ST review and
Certification
Report
New ST which it
is ESR
conformance
CPSTIC
The CPSTIC - Taxonomy
• CCN-STIC-140. Reference taxonomy. Two levels: Category/Family.
There are 6 categories and 33 families. Example:
•Network access control devices
•Biometric Devices
•Single Sign-On Devices
•Authentication Severs
•One-Time Password devices
Access Control
•Anti-Virus
•Endpoint Detection and Response tools
•Network management tools
•System update tools
•…
Operational Security
• IDS, IPS
• Honeypot/Honeynet
• Monitoring and traffic analysis
Security Monitoring
• For each family, Mandatory Security Requirements have been
defined.
ESR
ESR
ESR
The CPSTIC - Taxonomy
• CCN-STIC-140: Example:
•Routers
•Switches
•Firewalls
•Proxies
•Wireless network devices
•…
Communication
Protection
•Encrypted data storage devices
•Offline encryption devices
•Secure erasing tools
•Data leakage prevention systems
•…
Protection of
information and
information support
• Mobile devices
• Operating Systems
• Anti-spam tools
• Smartcards
Device/Service
protection
ESR
ESR
ESR
The CPSTIC – Family Description
• Requirements for each family:
 Product family description:
 Functionality
 Usage case
 Device’s scope
 CC evaluation requirements
 Threats analysis
 Environmental hypothesis
 Assets
 Threats
 Mandatory Security Requirements (MSR)
The CPSTIC. Example - Firewall
• “Firewall” family from “Communication Protection” category.
Options provided by the catalog:
 Evaluation according to the protection profiles
internationally defined for this type of product.
 Evaluation with EAL2 evaluation level or higher including the
SFRs listed in the Protection Profiles
 CCRA certificates are recognized (obviously)
 YOU CAN BE LISTED IN THE CATALOGUE!!!
The CPSTIC. Example – Secure Erase Tools
• “Secure Erasure Tools” family from “Information Protection and
Information Media”:
 No protection profiles have been published for this family
 The catalog includes the ESRs to be assessed during the
evaluation
 And the evaluation level required (e.g.EAL1)
The CPSTIC - Current status
If you need to consult it… Where can you find it?
 CCN-STIC-105 guide. STIC product catalogue
(CPSTIC).
(https://oc.ccn.cni.es/index.php/en/cis-product-
catalogue)
Periodically will be updated on CCN website
 Certification Body Web. (https://oc.ccn.cni.es)
 108 qualified products and 18 approved.
 18 different families.
 18 manufacturers.
 Continuous growth!
CPSTIC first version published in Dic2017
Conclusions
Conclusions
 Procurement is a key tool for prevention of vulnerabilities
 There are multiple government initiatives worldwide
 Just Common Criteria is unfortunately not the answer
 The CPSTIC is an innovative and flexible mechanism to solve
this issue
 It is compatible with cPPs avoiding the delays and the cost
of cPPs development
 Allow other evaluation methodologies to be used and
 Allow quick adoption of new technologies
jtsec: Beyond IT Security
c/ Abeto s/n Edificio CEG Oficina 2B
CP 18230 Granada – Atarfe – Spain
hello@jtsec.es
@jtsecES
www.jtsec.es
“Any fool can make something complicated. It
takes a genius to make it simple.”
Woody Guthrie
Annex 1. Summary of regulations and interest contacts
 For qualified products. (HIGH ENS).
 CCN-STIC-105 guide. Security Products Catalogue
 CCN-STIC-140 guide. Reference taxonomy for security
products
 CCN-STIC-106 guide. Addition procedure of qualified security
products in the CPSTIC.
 Available in:
 CCN-Cert site: https://www.ccn-
cert.cni.es/guias.html
 Certification Body site:
https://oc.ccn.cni.es

More Related Content

What's hot

Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCSDay2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Maitena Ilardia
 
security in development lifecycle
security in development lifecyclesecurity in development lifecycle
security in development lifecycle
TelecomValley
 
Projects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the CenterProjects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the Center
MITRE ATT&CK
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectivessombat nirund
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
Ollie Whitehouse
 
cybersecurity es
cybersecurity escybersecurity es
cybersecurity es
Nithyesh Panathula
 
Intel Education on the Need for Standards | Education Metadata Meetup
Intel Education on the Need for Standards | Education Metadata MeetupIntel Education on the Need for Standards | Education Metadata Meetup
Intel Education on the Need for Standards | Education Metadata Meetup
AAP PreK-12 Learning Group
 
Digital Security by Design Vision
Digital Security by Design VisionDigital Security by Design Vision
Digital Security by Design Vision
KTN
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
automatskicorporation
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
Dr David Probert
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
CableLabs
 
Mohamed waleed Cv
Mohamed waleed CvMohamed waleed Cv
Mohamed waleed Cv
Mohamed Waleed
 
Secure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real worldSecure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real world
Ollie Whitehouse
 
Big Crypto for Little Things
Big Crypto for Little ThingsBig Crypto for Little Things
Big Crypto for Little Things
H4Diadmin
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
ChaitanyaS
 
First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...
MEDINA
 
Sport && Wellness Hackathon
Sport && Wellness  HackathonSport && Wellness  Hackathon
Sport && Wellness Hackathon
NECST Lab @ Politecnico di Milano
 
Networking Training in Chandigarh
Networking Training in ChandigarhNetworking Training in Chandigarh
Networking Training in Chandigarh
E2Matrix
 
AI in Manufacturing & the Proposed EU Artificial Intelligence Act
AI in Manufacturing & the Proposed EU Artificial Intelligence ActAI in Manufacturing & the Proposed EU Artificial Intelligence Act
AI in Manufacturing & the Proposed EU Artificial Intelligence Act
Barry O'Sullivan
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 

What's hot (20)

Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCSDay2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
 
security in development lifecycle
security in development lifecyclesecurity in development lifecycle
security in development lifecycle
 
Projects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the CenterProjects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the Center
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
 
cybersecurity es
cybersecurity escybersecurity es
cybersecurity es
 
Intel Education on the Need for Standards | Education Metadata Meetup
Intel Education on the Need for Standards | Education Metadata MeetupIntel Education on the Need for Standards | Education Metadata Meetup
Intel Education on the Need for Standards | Education Metadata Meetup
 
Digital Security by Design Vision
Digital Security by Design VisionDigital Security by Design Vision
Digital Security by Design Vision
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Mohamed waleed Cv
Mohamed waleed CvMohamed waleed Cv
Mohamed waleed Cv
 
Secure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real worldSecure App Aspirations: Why it is very difficult in the real world
Secure App Aspirations: Why it is very difficult in the real world
 
Big Crypto for Little Things
Big Crypto for Little ThingsBig Crypto for Little Things
Big Crypto for Little Things
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 
First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...
 
Sport && Wellness Hackathon
Sport && Wellness  HackathonSport && Wellness  Hackathon
Sport && Wellness Hackathon
 
Networking Training in Chandigarh
Networking Training in ChandigarhNetworking Training in Chandigarh
Networking Training in Chandigarh
 
AI in Manufacturing & the Proposed EU Artificial Intelligence Act
AI in Manufacturing & the Proposed EU Artificial Intelligence ActAI in Manufacturing & the Proposed EU Artificial Intelligence Act
AI in Manufacturing & the Proposed EU Artificial Intelligence Act
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 

Similar to Spanish catalogue of qualified products - a new way of using CC for procurement

Experiences evaluating cloud services and products
Experiences evaluating cloud services and productsExperiences evaluating cloud services and products
Experiences evaluating cloud services and products
Javier Tallón
 
Common Criteria service overview for Developers - jtsec a CC consultancy company
Common Criteria service overview for Developers - jtsec a CC consultancy companyCommon Criteria service overview for Developers - jtsec a CC consultancy company
Common Criteria service overview for Developers - jtsec a CC consultancy company
Javier Tallón
 
Servizi di mappatura per magazzini
Servizi di mappatura per magazziniServizi di mappatura per magazzini
Servizi di mappatura per magazzini
Claudia Marchi
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
Koenig Solutions Ltd.
 
Standards for protection of data on storage device are emerging from both the...
Standards for protection of data on storage device are emerging from both the...Standards for protection of data on storage device are emerging from both the...
Standards for protection of data on storage device are emerging from both the...
CMG - The Digital Transformation Association
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
newbie2019
 
德國TSI公司簡報-2
德國TSI公司簡報-2德國TSI公司簡報-2
德國TSI公司簡報-2
俠客科技
 
CompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineCompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE Outline
Examcollection
 
How to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded SystemsHow to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded Systems
evatjohnson
 
How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsHow to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded Systems
Intland Software GmbH
 
What is pca pdf
What is pca pdfWhat is pca pdf
What is pca pdf
Mugula Joseph
 
Exporting to Uganda ? What is PvOC ?
Exporting to Uganda ? What is PvOC ?Exporting to Uganda ? What is PvOC ?
Exporting to Uganda ? What is PvOC ?
Mugula Joseph
 
SIL Awareness | Introduction to Safety Life-Cycle | IEC - 61508 & IEC- 61511 ...
SIL Awareness | Introduction to Safety Life-Cycle | IEC - 61508 & IEC- 61511 ...SIL Awareness | Introduction to Safety Life-Cycle | IEC - 61508 & IEC- 61511 ...
SIL Awareness | Introduction to Safety Life-Cycle | IEC - 61508 & IEC- 61511 ...
Gaurav Singh Rajput
 
Riskmitigationwhitepaperweb 1
Riskmitigationwhitepaperweb 1Riskmitigationwhitepaperweb 1
Riskmitigationwhitepaperweb 1Yasmin AbdelAziz
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
CSA Group
 
How to Prepare for the New EU Medical Device Regulations (MDR)
How to Prepare for the New EU Medical Device Regulations (MDR)How to Prepare for the New EU Medical Device Regulations (MDR)
How to Prepare for the New EU Medical Device Regulations (MDR)
Greenlight Guru
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
Nithin Sai
 

Similar to Spanish catalogue of qualified products - a new way of using CC for procurement (20)

Experiences evaluating cloud services and products
Experiences evaluating cloud services and productsExperiences evaluating cloud services and products
Experiences evaluating cloud services and products
 
Common Criteria service overview for Developers - jtsec a CC consultancy company
Common Criteria service overview for Developers - jtsec a CC consultancy companyCommon Criteria service overview for Developers - jtsec a CC consultancy company
Common Criteria service overview for Developers - jtsec a CC consultancy company
 
Png w23
Png w23Png w23
Png w23
 
Servizi di mappatura per magazzini
Servizi di mappatura per magazziniServizi di mappatura per magazzini
Servizi di mappatura per magazzini
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
 
Standards for protection of data on storage device are emerging from both the...
Standards for protection of data on storage device are emerging from both the...Standards for protection of data on storage device are emerging from both the...
Standards for protection of data on storage device are emerging from both the...
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
德國TSI公司簡報-2
德國TSI公司簡報-2德國TSI公司簡報-2
德國TSI公司簡報-2
 
CompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineCompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE Outline
 
How to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded SystemsHow to Achieve Functional Safety in Safety-Citical Embedded Systems
How to Achieve Functional Safety in Safety-Citical Embedded Systems
 
How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsHow to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded Systems
 
What is pca pdf
What is pca pdfWhat is pca pdf
What is pca pdf
 
Exporting to Uganda ? What is PvOC ?
Exporting to Uganda ? What is PvOC ?Exporting to Uganda ? What is PvOC ?
Exporting to Uganda ? What is PvOC ?
 
SIL Awareness | Introduction to Safety Life-Cycle | IEC - 61508 & IEC- 61511 ...
SIL Awareness | Introduction to Safety Life-Cycle | IEC - 61508 & IEC- 61511 ...SIL Awareness | Introduction to Safety Life-Cycle | IEC - 61508 & IEC- 61511 ...
SIL Awareness | Introduction to Safety Life-Cycle | IEC - 61508 & IEC- 61511 ...
 
Riskmitigationwhitepaperweb 1
Riskmitigationwhitepaperweb 1Riskmitigationwhitepaperweb 1
Riskmitigationwhitepaperweb 1
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
 
How to Prepare for the New EU Medical Device Regulations (MDR)
How to Prepare for the New EU Medical Device Regulations (MDR)How to Prepare for the New EU Medical Device Regulations (MDR)
How to Prepare for the New EU Medical Device Regulations (MDR)
 
Cyber-Security Certifications
Cyber-Security CertificationsCyber-Security Certifications
Cyber-Security Certifications
 

More from Javier Tallón

Evolucionando la evaluación criptográfica - Episodio II
Evolucionando la evaluación criptográfica - Episodio IIEvolucionando la evaluación criptográfica - Episodio II
Evolucionando la evaluación criptográfica - Episodio II
Javier Tallón
 
Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...
Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...
Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...
Javier Tallón
 
ICCC2023 Statistics Report, has Common Criteria reached its peak?
ICCC2023 Statistics Report, has Common Criteria reached its peak?ICCC2023 Statistics Report, has Common Criteria reached its peak?
ICCC2023 Statistics Report, has Common Criteria reached its peak?
Javier Tallón
 
ICCC23 -The new cryptographic evaluation methodology created by CCN
ICCC23 -The new cryptographic evaluation methodology created by CCNICCC23 -The new cryptographic evaluation methodology created by CCN
ICCC23 -The new cryptographic evaluation methodology created by CCN
Javier Tallón
 
TAICS - Cybersecurity Certification for European Market.pptx
TAICS - Cybersecurity Certification for European Market.pptxTAICS - Cybersecurity Certification for European Market.pptx
TAICS - Cybersecurity Certification for European Market.pptx
Javier Tallón
 
La ventaja de implementar una solución de ciberseguridad certificada por el C...
La ventaja de implementar una solución de ciberseguridad certificada por el C...La ventaja de implementar una solución de ciberseguridad certificada por el C...
La ventaja de implementar una solución de ciberseguridad certificada por el C...
Javier Tallón
 
EUCA23 - Evolution of cryptographic evaluation in Europe.pdf
EUCA23 - Evolution of cryptographic evaluation in Europe.pdfEUCA23 - Evolution of cryptographic evaluation in Europe.pdf
EUCA23 - Evolution of cryptographic evaluation in Europe.pdf
Javier Tallón
 
Hacking your jeta.pdf
Hacking your jeta.pdfHacking your jeta.pdf
Hacking your jeta.pdf
Javier Tallón
 
Evolucionado la evaluación Criptográfica
Evolucionado la evaluación CriptográficaEvolucionado la evaluación Criptográfica
Evolucionado la evaluación Criptográfica
Javier Tallón
 
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
Javier Tallón
 
EUCA 22 - Let's harmonize labs competence ISO 19896
EUCA 22 - Let's harmonize labs competence ISO 19896EUCA 22 - Let's harmonize labs competence ISO 19896
EUCA 22 - Let's harmonize labs competence ISO 19896
Javier Tallón
 
EUCA22 Panel Discussion: Differences between lightweight certification schemes
EUCA22 Panel Discussion: Differences between lightweight certification schemesEUCA22 Panel Discussion: Differences between lightweight certification schemes
EUCA22 Panel Discussion: Differences between lightweight certification schemes
Javier Tallón
 
EUCA22 - Patch Management ISO_IEC 15408 & 18045
EUCA22 - Patch Management ISO_IEC 15408 & 18045EUCA22 - Patch Management ISO_IEC 15408 & 18045
EUCA22 - Patch Management ISO_IEC 15408 & 18045
Javier Tallón
 
Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...
Javier Tallón
 
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?
Javier Tallón
 
Is Automation Necessary for the CC Survival?
Is Automation Necessary for the CC Survival?Is Automation Necessary for the CC Survival?
Is Automation Necessary for the CC Survival?
Javier Tallón
 
CCCAB tool - Making CABs life easy - Chapter 2
CCCAB tool - Making CABs life easy - Chapter 2CCCAB tool - Making CABs life easy - Chapter 2
CCCAB tool - Making CABs life easy - Chapter 2
Javier Tallón
 
2022 CC Statistics report: will this year beat last year's record number of c...
2022 CC Statistics report: will this year beat last year's record number of c...2022 CC Statistics report: will this year beat last year's record number of c...
2022 CC Statistics report: will this year beat last year's record number of c...
Javier Tallón
 
CCCAB, la apuesta europea por la automatización de los Organismos de Certific...
CCCAB, la apuesta europea por la automatización de los Organismos de Certific...CCCAB, la apuesta europea por la automatización de los Organismos de Certific...
CCCAB, la apuesta europea por la automatización de los Organismos de Certific...
Javier Tallón
 
Automating Common Criteria
Automating Common Criteria Automating Common Criteria
Automating Common Criteria
Javier Tallón
 

More from Javier Tallón (20)

Evolucionando la evaluación criptográfica - Episodio II
Evolucionando la evaluación criptográfica - Episodio IIEvolucionando la evaluación criptográfica - Episodio II
Evolucionando la evaluación criptográfica - Episodio II
 
Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...
Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...
Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...
 
ICCC2023 Statistics Report, has Common Criteria reached its peak?
ICCC2023 Statistics Report, has Common Criteria reached its peak?ICCC2023 Statistics Report, has Common Criteria reached its peak?
ICCC2023 Statistics Report, has Common Criteria reached its peak?
 
ICCC23 -The new cryptographic evaluation methodology created by CCN
ICCC23 -The new cryptographic evaluation methodology created by CCNICCC23 -The new cryptographic evaluation methodology created by CCN
ICCC23 -The new cryptographic evaluation methodology created by CCN
 
TAICS - Cybersecurity Certification for European Market.pptx
TAICS - Cybersecurity Certification for European Market.pptxTAICS - Cybersecurity Certification for European Market.pptx
TAICS - Cybersecurity Certification for European Market.pptx
 
La ventaja de implementar una solución de ciberseguridad certificada por el C...
La ventaja de implementar una solución de ciberseguridad certificada por el C...La ventaja de implementar una solución de ciberseguridad certificada por el C...
La ventaja de implementar una solución de ciberseguridad certificada por el C...
 
EUCA23 - Evolution of cryptographic evaluation in Europe.pdf
EUCA23 - Evolution of cryptographic evaluation in Europe.pdfEUCA23 - Evolution of cryptographic evaluation in Europe.pdf
EUCA23 - Evolution of cryptographic evaluation in Europe.pdf
 
Hacking your jeta.pdf
Hacking your jeta.pdfHacking your jeta.pdf
Hacking your jeta.pdf
 
Evolucionado la evaluación Criptográfica
Evolucionado la evaluación CriptográficaEvolucionado la evaluación Criptográfica
Evolucionado la evaluación Criptográfica
 
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
 
EUCA 22 - Let's harmonize labs competence ISO 19896
EUCA 22 - Let's harmonize labs competence ISO 19896EUCA 22 - Let's harmonize labs competence ISO 19896
EUCA 22 - Let's harmonize labs competence ISO 19896
 
EUCA22 Panel Discussion: Differences between lightweight certification schemes
EUCA22 Panel Discussion: Differences between lightweight certification schemesEUCA22 Panel Discussion: Differences between lightweight certification schemes
EUCA22 Panel Discussion: Differences between lightweight certification schemes
 
EUCA22 - Patch Management ISO_IEC 15408 & 18045
EUCA22 - Patch Management ISO_IEC 15408 & 18045EUCA22 - Patch Management ISO_IEC 15408 & 18045
EUCA22 - Patch Management ISO_IEC 15408 & 18045
 
Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...
 
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?
 
Is Automation Necessary for the CC Survival?
Is Automation Necessary for the CC Survival?Is Automation Necessary for the CC Survival?
Is Automation Necessary for the CC Survival?
 
CCCAB tool - Making CABs life easy - Chapter 2
CCCAB tool - Making CABs life easy - Chapter 2CCCAB tool - Making CABs life easy - Chapter 2
CCCAB tool - Making CABs life easy - Chapter 2
 
2022 CC Statistics report: will this year beat last year's record number of c...
2022 CC Statistics report: will this year beat last year's record number of c...2022 CC Statistics report: will this year beat last year's record number of c...
2022 CC Statistics report: will this year beat last year's record number of c...
 
CCCAB, la apuesta europea por la automatización de los Organismos de Certific...
CCCAB, la apuesta europea por la automatización de los Organismos de Certific...CCCAB, la apuesta europea por la automatización de los Organismos de Certific...
CCCAB, la apuesta europea por la automatización de los Organismos de Certific...
 
Automating Common Criteria
Automating Common Criteria Automating Common Criteria
Automating Common Criteria
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Spanish catalogue of qualified products - a new way of using CC for procurement

  • 1. SPANISH CATALOGUE OF QUALIFIED PRODUCTS: A NEW WAY OF USING CC FOR PROCUREMENT
  • 2. • Who are we? • Worldwide Procurement Initiatives • Why a Product Catalogue? • CPSTIC - Catalogue • Conclusions Index
  • 4. Who are we? • Jose Ruiz – CTO at jtsec • jtsec – CC and FIPS 140-2 Consultancy company - Based in Spain • CCGEN Developers – Common Criteria Documentation Development tool • More than 10 years of experience working with different labs and CBs as evaluator, lab manager and consultant
  • 5. Why are we here? • We support companies to meet their business expectations. e.g.- sales to governments • We like initiatives that make life easier • We think that could be useful for other countries • My father wanted to visit Canada ;)
  • 6. The importance of procurement as a prevention tool Prevention ResponseDetección Image TrustworthyReputation Business Prestige DoS Data leakage Integrity Brand value Detection
  • 8. Worldwide Procurement Initiatives • US Government Requirements  CC is mandatory for all IT products with security features that are deployed in U.S. National Security Systems (NSS)  Products are to be selected from the NIAP PCL, meaning they have met a NIAP approved Protection Profile  DoD’s Information Network Approved Products List (DoDIN APL)  Common Criteria and very likely FIPS 140-2 validation are required
  • 9. Worldwide Procurement Initiatives • Australian Government Requirements  CC is mandatory for all products providing security functions within all Australian Government systems, unless the risks of not using CC products has been appropriately accepted and documented.  Products may be selected from the Australian Evaluated Products List (EPL) or the CC portal.
  • 10. Worldwide Procurement Initiatives • Canadian Government Requirements  CC should be included as a requirement in Government of Canada RFPs/contracts whenever possible.  Certified products evaluated against the Protection Profile for a given technology class may be selected
  • 11. Worldwide Procurement Initiatives • French Government Requirements  Types of certification used for procurement  Common Criteria Certification  First Level Security Certification – CSPN  Acquisition Policy:  CSPN for elementary qualification  EAL3+VAN.3+FLR.3 for standard qualification or  EAL4+VAN.5 +IMP.2+ DVS.2+FLR.3 for reinforced qualification
  • 12. Worldwide Procurement Initiatives • UK Government Requirements  Types of certification used for procurement  Common Criteria Certification  Commercial Product Assurance - CPA  CPA: A security product that passes assessment is awarded Foundation Grade certification - demonstrate good commercial security practice and suitable for lower threat environments.  Should we just use CC? Ideally, yes x CC does not always represent a necessary or sufficient level of product assurance for the UK public.
  • 13. ¿Why a product catalogue?
  • 14. Legislation - IT Security products - ENS • Legal framework  RD 03/2010, 8th January  RD 951/2015, 23rd October by modification of RD 3/2010 -> ENS – National Security Scheme • Objective:  To establish basic principles and minimum requirements for the protection of information • Scope of application  Public administration
  • 15. Legislation - IT Security products - ENS • Information protection. Security dimensions:  Confidentiality  Integrity  Availability  Traceability  Authenticity • System category:  High  Medium  Basic
  • 16. Legislation - IT Security products - ENS • Current situation: RD 951/2015 of 23rd October, amending RD 3/2010 regulating the ENS in the field of Electronic Administration, ART. 18: “for the procurement of information and communication technology security products to be used by public administrations, those that have certified the security functions related to the object of their procurement shall be used in a manner proportionate to the category of the system and the level of security identified…”
  • 17. Legislation - IT Security products - ENS • Moreover, for “High” products category in the ENS: “RD 03/2010 of 8th January, regulated by the National Security Scheme (ENS) in the field of electronic administration. Annex 2. section 4.1.5 Certified components: Products or equipment whose safety features and level have been assessed in accordance to European or International standards and which are certified by independent bodies of recognised standing shall preferably be used. “
  • 18. Why is not CC the answer? • What does it mean that a product is certified?  The product has been evaluated taking into account the SFRs and SARs defined in the Security Target • Who performs the Security Target?  The manufacturer
  • 19. Why a product catalogue? • Certified product Qualified for use in administration? • Only it is suitable if:  The Security Target is complete, consistent and technically accurate. WARNING: The ST is performed by the manufacturer!
  • 20. The CPSTIC. For what? • Certified product Qualified for use in administration? • Only it is suitable if:  The TOE involves the main security functionality of the product.  Unfortunately, sometimes this is not the case Product TOE
  • 21. The CPSTIC. For what? • Corollary: In order to be able to check if one product is adequately certified, the government agency must have the capacity to:  Require product certification  Check that the ST is technically suitable  Check that it is complete A catalogue will ease this task.
  • 23. The CPSTIC • The CPSTIC is the reference catalogue for the acquisition of IT products in public organisms affected by the National Security Scheme (ENS). • Scope:  Qualified products. Sensitive information  Approved products. Classified information Qualified Approved Approved encrypted products (CCN_STIC- 103)
  • 24. The CPSTIC • Scope:  Which products are suitable to be included?  The products that implement security functionalities in a system in an active manner
  • 25. The CPSTIC • Related legislation:  CCN-STIC-106. Inclusion procedure of IT products qualified in the CPSTIC  CCN-STIC-140. Reference taxonomies for IT security products  CCN-STIC-105. CPSTIC CCN- STIC- 106 CCNS -STIC- 140 CCN- STIC- 105
  • 26. The CPSTIC • CCN-STIC-106. Inclusion requirements:  Common Criteria certified products. Low EAL level required. The Security Target shall be checked for compliance with the SFR.  If you do not have Common Criteria certification, an accredited laboratory will perform the evaluation. • CC certification may not be required where:  The product is promoted by the Administration.  It has a strategic interest.  There are no substitute products on the market.  A STIC evaluation could be applied.
  • 27. The CPSTIC • Inclusion procedure in the catalogue Request for product recommendation for use in administration Is there an operational need without CC Are all ESR included? Is there a recommended PP? CC Certification according to recommended PP STIC Methodology Evaluation Covering ESR CC Certification ST Compliant Is it certified by CC? ST review and Certification Report New ST which it is ESR conformance CPSTIC
  • 28. The CPSTIC - Taxonomy • CCN-STIC-140. Reference taxonomy. Two levels: Category/Family. There are 6 categories and 33 families. Example: •Network access control devices •Biometric Devices •Single Sign-On Devices •Authentication Severs •One-Time Password devices Access Control •Anti-Virus •Endpoint Detection and Response tools •Network management tools •System update tools •… Operational Security • IDS, IPS • Honeypot/Honeynet • Monitoring and traffic analysis Security Monitoring • For each family, Mandatory Security Requirements have been defined. ESR ESR ESR
  • 29. The CPSTIC - Taxonomy • CCN-STIC-140: Example: •Routers •Switches •Firewalls •Proxies •Wireless network devices •… Communication Protection •Encrypted data storage devices •Offline encryption devices •Secure erasing tools •Data leakage prevention systems •… Protection of information and information support • Mobile devices • Operating Systems • Anti-spam tools • Smartcards Device/Service protection ESR ESR ESR
  • 30. The CPSTIC – Family Description • Requirements for each family:  Product family description:  Functionality  Usage case  Device’s scope  CC evaluation requirements  Threats analysis  Environmental hypothesis  Assets  Threats  Mandatory Security Requirements (MSR)
  • 31. The CPSTIC. Example - Firewall • “Firewall” family from “Communication Protection” category. Options provided by the catalog:  Evaluation according to the protection profiles internationally defined for this type of product.  Evaluation with EAL2 evaluation level or higher including the SFRs listed in the Protection Profiles  CCRA certificates are recognized (obviously)  YOU CAN BE LISTED IN THE CATALOGUE!!!
  • 32. The CPSTIC. Example – Secure Erase Tools • “Secure Erasure Tools” family from “Information Protection and Information Media”:  No protection profiles have been published for this family  The catalog includes the ESRs to be assessed during the evaluation  And the evaluation level required (e.g.EAL1)
  • 33. The CPSTIC - Current status If you need to consult it… Where can you find it?  CCN-STIC-105 guide. STIC product catalogue (CPSTIC). (https://oc.ccn.cni.es/index.php/en/cis-product- catalogue) Periodically will be updated on CCN website  Certification Body Web. (https://oc.ccn.cni.es)  108 qualified products and 18 approved.  18 different families.  18 manufacturers.  Continuous growth! CPSTIC first version published in Dic2017
  • 35. Conclusions  Procurement is a key tool for prevention of vulnerabilities  There are multiple government initiatives worldwide  Just Common Criteria is unfortunately not the answer  The CPSTIC is an innovative and flexible mechanism to solve this issue  It is compatible with cPPs avoiding the delays and the cost of cPPs development  Allow other evaluation methodologies to be used and  Allow quick adoption of new technologies
  • 36. jtsec: Beyond IT Security c/ Abeto s/n Edificio CEG Oficina 2B CP 18230 Granada – Atarfe – Spain hello@jtsec.es @jtsecES www.jtsec.es “Any fool can make something complicated. It takes a genius to make it simple.” Woody Guthrie
  • 37. Annex 1. Summary of regulations and interest contacts  For qualified products. (HIGH ENS).  CCN-STIC-105 guide. Security Products Catalogue  CCN-STIC-140 guide. Reference taxonomy for security products  CCN-STIC-106 guide. Addition procedure of qualified security products in the CPSTIC.  Available in:  CCN-Cert site: https://www.ccn- cert.cni.es/guias.html  Certification Body site: https://oc.ccn.cni.es