SlideShare a Scribd company logo
1 of 41
Download to read offline
Vishnu Kesarwani
             IMS2007011
MS (Cyber Law & Information Security)
           IIIT-Allahabad
   Introduction
   Assurance Paradigm
   Security Assurance Requirements
   EAL Structure
   Relationship Between Assurances Requirements And Assurance Levels
   Assurance Categorization
   Protection Profile Criteria Overview
   Security Target Criteria Overview
   Class APE: Protection Profile Evaluation
   Class ASE: Security Target Evaluation
   Evaluation Assurance Levels
      Evaluation Assurance Level 1 - Functionally Tested
      Evaluation Assurance Level 2 Structurally Tested
      Evaluation Assurance Level 3 Methodically Tested And Checked
      Evaluation Assurance Level 4 - Methodically Designed, Tested, And Reviewed
      Evaluation Assurance Level 5 - Semiformally Designed And Tested
      Evaluation Assurance Level 6 - Semiformally Verified Design And Tested
      Evaluation Assurance Level 7 - Formally Verified Design And Tested
Part 3 of ISO/IEC 15408
                   (Security Assurance Requirements)

 Catalogues the set of assurance components, families and classes.
 Defines evaluation criteria for Protection Profiles (PPs) and Security
  Targets (STs).
 Presents Evaluation Assurance Levels (EALs) that define the
  predefined ISO/IEC 15408 (Common Criteria-CC) scale for rating
  assurance for Target of Evaluations (TOEs).
 Audience for this part of CC
    Consumers,
    Developers, And
    Evaluators
  of secure IT systems and products.
Defines Security Assurance Requirements:
   A basis for the security assurance requirements
    expressed in a PP or a ST.
   Establishes a standard way of expressing the assurance
    requirements for TOEs.
1. Philosophy
 The threats to security and organizational security policy
  commitments should be clearly articulated
 The proposed security measures should be demonstrably
  sufficient for their intended purpose.
 Measures should be adopted that
   reduce the likelihood of vulnerabilities,
   the ability to exercise a vulnerability, and
   the extent of the damage that could occur from a vulnerability
    being exercised
   facilitate the subsequent identification of vulnerabilities and
    the elimination, mitigation, and/or notification that a
    vulnerability has been exploited or triggered.
2. Assurance Approach
assurance based upon an evaluation of the IT product or system that is to
  be trusted.
                   Assurance Through Evaluation
Evaluation techniques can include
   a) analysis and checking of process(es) and procedure(s);
   b) checking that process(es) and procedure(s) are being applied;
   c) analysis of the correspondence between TOE design representations;
   d) analysis of the TOE design representation against the requirements;
   e) verification of proofs;
   f) analysis of guidance documents;
   g) analysis of functional tests developed and the results provided;
   h) independent functional testing;
   i) analysis for vulnerabilities (including flaw hypothesis);
   j) penetration testing.
Significance of Vulnerabilities
 IT security breaches arise through the intentional exploitation or
  the unintentional triggering of vulnerabilities in the application
  of IT within business concerns.
 Steps to prevent vulnerabilities
    Eliminated
    Minimized
    Monitored


                     Cause of Vulnerabilities
Vulnerabilities can arise through failures in:
    Requirements
    Construction
    operation
3. Evaluation Assurance Scale
This scale provides:
 Greater assurance
 Minimum effort


Level of effort is based upon
 Scope
 Depth
 Rigour
 Protection Profile evaluation
 Relation to the Security Target evaluation criteria
 Evaluator tasks
    Evaluator tasks for an evaluation based on CC requirements
     only




    Evaluator tasks for an CC extended evaluation
 Security Target evaluation
 Relation to the other evaluation criteria in this part of CC
 Evaluator tasks
    Evaluator tasks for an evaluation based on CC requirements only




    Evaluator tasks for a CC extended evaluation
 The goal of a PP evaluation is to demonstrate that the
  PP is complete, consistent and technically sound.

 An evaluated PP is suitable for use as the basis for the
  development of STs.

 Such a PP is eligible for inclusion in a registry.
 Objectives
 Application
    notes
   Dependencies
   Developer
    action elements
   Content and
    presentation of
    evidence
    elements
   Evaluator action
    elements
 The goal of an ST evaluation is to demonstrate that
    the ST is complete, consistent, technically sound, and
    suitable for use as the basis for the corresponding TOE evaluation.

                                                     Objectives
                                                     Application
                                                        notes
                                                       Dependencies
                                                       Developer action
                                                        elements
                                                       Content and
                                                        presentation of
                                                        evidence
                                                        elements
                                                       Evaluator action
                                                        elements
 an increasing scale that balances the level of assurance obtained with
  the cost and feasibility of acquiring that degree of assurance.
Objectives
 EAL1 is applicable where some confidence in correct
  operation is required, but the threats to security are
  not viewed as serious.

 EAL1 provides
   an evaluation of the TOE as made available to the
    customer, including independent testing against a
    specification, and
   an examination of the guidance documentation
    provided.
Assurance components
 EAL1 provides a basic level of assurance by an analysis of
  the security functions using
   a functional and interface specification, and
   guidance documentation,
  to understand the security behaviour.

 The analysis is supported by independent testing of the
  TOE security functions.

 This EAL provides a meaningful increase in assurance over
  an unevaluated IT product or system.
Objectives
 applicable in those circumstances where developers or users require a
  low to moderate level of independently assured security in the absence
  of ready availability of the complete development record,
 requires the co-operation of the developer in terms of the delivery of
  design information and test results

Assurance components
 EAL2 provides assurance by
    an analysis of the security functions using
        a functional and interface specification,
        guidance documentation and
        the high-level design of the TOE,
     to understand the security behaviour.
    a configuration list for the TOE, and
    evidence of secure delivery procedures.
 The analysis is supported by
      independent testing of the TOE security functions,
      evidence of developer testing based on the functional specification,
      selective independent confirmation of the developer test results,
      strength of function analysis, and
      evidence of a developer search for obvious vulnerabilities

 This EAL represents a meaningful increase in assurance from
  EAL1 by requiring
    developer testing,
    a vulnerability analysis, and
    independent testing based upon more detailed TOE specifications.
Objectives
 permits a developer to gain maximum assurance from positive security engineering at the
  design stage without substantial alteration of existing sound development practices.
 applicable in those circumstances where developers or users require a moderate level of
  independently assured security, and require a thorough investigation of the TOE and its
  development without substantial re-engineering.

Assurance components
 EAL3 provides assurance by
    an analysis of the security functions, using
        a functional and interface specification,
        guidance documentation, and
        the high-level design of the TOE,
        to understand the security behaviour.
       the use of
           development environment controls,
           TOE configuration management, and
           evidence of secure delivery procedures.
 The analysis is supported by
   independent testing of the TOE security functions,
   evidence of developer testing based on the functional
    specification and high-level design,
   selective independent confirmation of the developer test
    results,
   strength of function analysis, and
   evidence of a developer search for obvious vulnerabilities.


 This EAL represents a meaningful increase in assurance
  from EAL2 by requiring
    more complete testing coverage of the security functions and
     mechanisms and/or procedures that provide some confidence
     that the TOE will not be tampered with during development.
Objectives
 permits a developer to gain maximum assurance from positive security engineering based
  on good commercial development practices which, though rigorous, do not require
  substantial specialist knowledge, skills, and other resources.
 applicable in those circumstances where developers or users require a moderate to high
  level of independently assured security in conventional commodity TOEs and are
  prepared to incur additional security-specific engineering costs.

Assurance components
 EAL4 provides assurance by
       an analysis of the security functions, using
            a functional and complete interface specification,
            guidance documentation,
            the high-level and low-level design of the TOE,
            a subset of the implementation,
        to understand the security behaviour
       an informal model of the TOE security policy,
       the use of development environment controls ,
       additional TOE configuration management including automation, and
       evidence of secure delivery procedures
 The analysis is supported by
    independent testing of the TOE security functions,
    evidence of developer testing based on the functional specification and
       high-level design,
      selective independent confirmation of the developer test results,
      strength of function analysis,
      evidence of a developer search for vulnerabilities, and
      an independent vulnerability analysis demonstrating resistance to
       penetration attackers with a low attack potential.

This EAL represents a meaningful increase in assurance from EAL3 by
  requiring
 more design description,
 a subset of the implementation, and
 improved mechanisms and/or procedures that provide confidence that the
  TOE will not be tampered with during development or delivery.
Objectives
   permits a developer to gain maximum assurance from security engineering
   Applicable where developers or users require a high level of independently assured security in a planned
    development and require a rigorous development approach without incurring unreasonable costs attributable
    to specialist security engineering techniques.
Assurance components
   EAL5 provides assurance by
      an analysis of the security functions, using
           a functional and complete interface specification,
           guidance documentation,
           the high-level and low-level design of the TOE,
           all of the implementation,
        to understand the security behaviour.
      a formal model of the TOE security policy,
      a semiformal presentation of the functional specification and high-level design, and a semiformal
        demonstration of correspondence between them,
      a modular TOE design,
      the use of
           a development environment controls,
           comprehensive TOE configuration management including automation, and
           evidence of secure delivery procedures.
   The analysis is supported by
        independent testing of the TOE security functions,
        evidence of developer testing based on the functional specification, and high-level design
         and low-level design,
        selective independent confirmation of the developer test results,
        strength of function analysis,
        evidence of a developer search for vulnerabilities,
        an independent vulnerability analysis demonstrating resistance to penetration attackers
         with a moderate attack potential, and
        validation of the developer's covert channel analysis.

   This EAL represents a meaningful increase in assurance from EAL4 by requiring
        semiformal design descriptions,
        the entire implementation,
        a more structured architecture,
        covert channel analysis, and
        improved mechanisms and/or procedures that provide confidence that the TOE will not be
         tampered with during development.
Objectives
 permits developers to gain high assurance from application of security engineering techniques to a
  rigorous development environment in order to produce a premium TOE for protecting high value
  assets against significant risks.
 applicable to the development of security TOEs for application in high risk situations where the value
  of the protected assets justifies the additional costs.

Assurance components
 EAL6 provides assurance by
       an analysis of the security functions, using
             a functional and complete interface specification,
             guidance documentation,
             the high-level and low-level design of the of the TOE,
             a structured presentation of the implementation,
        to understand the security behaviour,
       a formal model of the TOE security policy,
       a semiformal presentation of the functional specification, high-level design, and low-level design and a
        semiformal demonstration of correspondence between them,
       a modular and layered TOE design, and
       the use of
             a structured development process,
             development environment controls,
             comprehensive TOE configuration management including complete automation, and
             evidence of secure delivery procedures.
   The analysis is supported by
        independent testing of the TOE security functions,
        evidence of developer testing based on the functional specification, high-level design and
         low-level design,
        selective independent confirmation of the developer test results,
        strength of function analysis,
        evidence of a developer search for vulnerabilities,
        an independent vulnerability analysis demonstrating resistance to penetration attackers
         with a high attack potential, and
        validation of the developer's systematic covert channel analysis.

   This EAL represents a meaningful increase in assurance from EAL5 by requiring
        more comprehensive analysis,
        a structured representation of the implementation,
        more architectural structure (e.g. layering),
        more comprehensive independent vulnerability analysis,
        systematic covert channel identification, and
        improved configuration management and development environment controls.
Objectives
 applicable to the development of security TOEs for application in extremely high risk situations
  and/or where the high value of the assets justifies the higher costs.

Assurance components
 EAL7 provides assurance by
     an analysis of the security functions, using
         a functional and complete interface specification,
         guidance documentation,
         the high-level and low-level design of the TOE, and
         a structured presentation of the implementation,
       to understand the security behaviour.
     a formal model of the TOE security policy,
     a formal presentation of the functional specification and high-level design,
     a semiformal presentation of the low-level design,
     formal and semiformal demonstration of correspondence between them
     a modular, layered and simple TOE design , and
     the use of
         a structured development process,
         development environment controls,
         comprehensive TOE configuration management including complete automation, and
         evidence of secure delivery procedures.
 The analysis is supported by
    independent testing of the TOE security functions,
    evidence of developer testing based on the functional specification
       high-level design, low-level design and implementation representation,
      complete independent confirmation of the developer test results,
      strength of function analysis,
      evidence of a developer search for vulnerabilities
      an independent vulnerability analysis demonstrating resistance to
       penetration attackers with a high attack potential , and
      validation of the developer‘s systematic covert channel analysis.

 This EAL represents a meaningful increase in assurance from EAL6 by
  requiring
    more comprehensive analysis using formal representations and formal
     correspondence, and
    comprehensive testing.
 Information   Technology  —     Security
 Techniques — Evaluation Criteria For IT
 Security                            Part3:
 Security Assurance Requirements (ISO/IEC
 15408-3)
Information Technology  Security Techniques Evaluation Criteria For It Secrity Part 3 Security Assurance Requirements Iso Iec 15408 3

More Related Content

What's hot

Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP CertificationSam Bowne
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Automotive Cybersecurity Best Practices
Automotive Cybersecurity Best PracticesAutomotive Cybersecurity Best Practices
Automotive Cybersecurity Best PracticesBamboo Apps
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologiesSalih Islam
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Maganathin Veeraragaloo
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Examkoidis
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+DesignAlfred Ouyang
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

What's hot (20)

Cissp Training PPT
Cissp Training PPTCissp Training PPT
Cissp Training PPT
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP Certification
 
information security management
information security managementinformation security management
information security management
 
Automotive Cybersecurity Best Practices
Automotive Cybersecurity Best PracticesAutomotive Cybersecurity Best Practices
Automotive Cybersecurity Best Practices
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
IT compliance
IT complianceIT compliance
IT compliance
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Security tools
Security toolsSecurity tools
Security tools
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Information Security
Information SecurityInformation Security
Information Security
 
How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Exam
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Security policy
Security policySecurity policy
Security policy
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Viewers also liked

G321 Marking Criteria
G321 Marking CriteriaG321 Marking Criteria
G321 Marking Criteriajfoster10
 
FITT Toolbox: Evaluation Criteria
FITT Toolbox: Evaluation CriteriaFITT Toolbox: Evaluation Criteria
FITT Toolbox: Evaluation CriteriaFITT
 
Sensory evaluation of essential oil final ppt by shivanand m.r
Sensory evaluation of essential oil final ppt by  shivanand m.rSensory evaluation of essential oil final ppt by  shivanand m.r
Sensory evaluation of essential oil final ppt by shivanand m.rUHS Bagalkot, KRCCH Arabhavi
 
Evaluation of training
Evaluation of trainingEvaluation of training
Evaluation of trainingSelf-employed
 
Training evaluation ppt 6
Training evaluation   ppt 6Training evaluation   ppt 6
Training evaluation ppt 6SBMC Jobs
 

Viewers also liked (7)

G321 Marking Criteria
G321 Marking CriteriaG321 Marking Criteria
G321 Marking Criteria
 
FITT Toolbox: Evaluation Criteria
FITT Toolbox: Evaluation CriteriaFITT Toolbox: Evaluation Criteria
FITT Toolbox: Evaluation Criteria
 
Sensory evaluation of essential oil final ppt by shivanand m.r
Sensory evaluation of essential oil final ppt by  shivanand m.rSensory evaluation of essential oil final ppt by  shivanand m.r
Sensory evaluation of essential oil final ppt by shivanand m.r
 
Thesis evaluation criteria
Thesis evaluation criteriaThesis evaluation criteria
Thesis evaluation criteria
 
Evaluation of training
Evaluation of trainingEvaluation of training
Evaluation of training
 
Training evaluation
Training evaluationTraining evaluation
Training evaluation
 
Training evaluation ppt 6
Training evaluation   ppt 6Training evaluation   ppt 6
Training evaluation ppt 6
 

Similar to Information Technology Security Techniques Evaluation Criteria For It Secrity Part 3 Security Assurance Requirements Iso Iec 15408 3

CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoJinElias52
 
Verifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasiVerifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasirizqiariy
 
Standards for safety and security in avionics
Standards for safety and security in avionicsStandards for safety and security in avionics
Standards for safety and security in avionicsAlessandro Bruni
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...IJNSA Journal
 
QualityAssurance.pdf
QualityAssurance.pdfQualityAssurance.pdf
QualityAssurance.pdfkumari36
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life CycleMaurice Dawson
 
Software Testing and Quality Assurance unit1
Software Testing and Quality Assurance  unit1Software Testing and Quality Assurance  unit1
Software Testing and Quality Assurance unit1Bhagyashree Dhakulkar
 
Edgilis principles of isa may11
Edgilis principles of isa may11Edgilis principles of isa may11
Edgilis principles of isa may11Max Armbruster
 
Profile based security assurance for service
Profile based security assurance for serviceProfile based security assurance for service
Profile based security assurance for serviceIESS
 
ISO_IEC standards_quality.pptx
ISO_IEC standards_quality.pptxISO_IEC standards_quality.pptx
ISO_IEC standards_quality.pptxKamalKamalli1
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...Mark John Lado, MIT
 
Software reliability engineering
Software reliability engineeringSoftware reliability engineering
Software reliability engineeringMark Turner CRP
 
Unit II Software Testing and Quality Assurance
Unit II Software Testing and Quality AssuranceUnit II Software Testing and Quality Assurance
Unit II Software Testing and Quality AssuranceVinothkumaR Ramu
 

Similar to Information Technology Security Techniques Evaluation Criteria For It Secrity Part 3 Security Assurance Requirements Iso Iec 15408 3 (20)

CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
 
Verifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasiVerifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasi
 
Standards for safety and security in avionics
Standards for safety and security in avionicsStandards for safety and security in avionics
Standards for safety and security in avionics
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 
Ijcatr04051006
Ijcatr04051006Ijcatr04051006
Ijcatr04051006
 
QualityAssurance.pdf
QualityAssurance.pdfQualityAssurance.pdf
QualityAssurance.pdf
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
Software Testing and Quality Assurance unit1
Software Testing and Quality Assurance  unit1Software Testing and Quality Assurance  unit1
Software Testing and Quality Assurance unit1
 
Edgilis principles of isa may11
Edgilis principles of isa may11Edgilis principles of isa may11
Edgilis principles of isa may11
 
Profile based security assurance for service
Profile based security assurance for serviceProfile based security assurance for service
Profile based security assurance for service
 
Unit 4 standards.ppt
Unit 4 standards.pptUnit 4 standards.ppt
Unit 4 standards.ppt
 
ISO_IEC standards_quality.pptx
ISO_IEC standards_quality.pptxISO_IEC standards_quality.pptx
ISO_IEC standards_quality.pptx
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
 
Ab04507161167
Ab04507161167Ab04507161167
Ab04507161167
 
Quality Assurance
Quality AssuranceQuality Assurance
Quality Assurance
 
Software reliability engineering
Software reliability engineeringSoftware reliability engineering
Software reliability engineering
 
Unit II Software Testing and Quality Assurance
Unit II Software Testing and Quality AssuranceUnit II Software Testing and Quality Assurance
Unit II Software Testing and Quality Assurance
 
@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Information Technology Security Techniques Evaluation Criteria For It Secrity Part 3 Security Assurance Requirements Iso Iec 15408 3

  • 1. Vishnu Kesarwani IMS2007011 MS (Cyber Law & Information Security) IIIT-Allahabad
  • 2. Introduction  Assurance Paradigm  Security Assurance Requirements  EAL Structure  Relationship Between Assurances Requirements And Assurance Levels  Assurance Categorization  Protection Profile Criteria Overview  Security Target Criteria Overview  Class APE: Protection Profile Evaluation  Class ASE: Security Target Evaluation  Evaluation Assurance Levels  Evaluation Assurance Level 1 - Functionally Tested  Evaluation Assurance Level 2 Structurally Tested  Evaluation Assurance Level 3 Methodically Tested And Checked  Evaluation Assurance Level 4 - Methodically Designed, Tested, And Reviewed  Evaluation Assurance Level 5 - Semiformally Designed And Tested  Evaluation Assurance Level 6 - Semiformally Verified Design And Tested  Evaluation Assurance Level 7 - Formally Verified Design And Tested
  • 3. Part 3 of ISO/IEC 15408 (Security Assurance Requirements)  Catalogues the set of assurance components, families and classes.  Defines evaluation criteria for Protection Profiles (PPs) and Security Targets (STs).  Presents Evaluation Assurance Levels (EALs) that define the predefined ISO/IEC 15408 (Common Criteria-CC) scale for rating assurance for Target of Evaluations (TOEs).  Audience for this part of CC  Consumers,  Developers, And  Evaluators of secure IT systems and products.
  • 4. Defines Security Assurance Requirements:  A basis for the security assurance requirements expressed in a PP or a ST.  Establishes a standard way of expressing the assurance requirements for TOEs.
  • 5. 1. Philosophy  The threats to security and organizational security policy commitments should be clearly articulated  The proposed security measures should be demonstrably sufficient for their intended purpose.  Measures should be adopted that  reduce the likelihood of vulnerabilities,  the ability to exercise a vulnerability, and  the extent of the damage that could occur from a vulnerability being exercised  facilitate the subsequent identification of vulnerabilities and the elimination, mitigation, and/or notification that a vulnerability has been exploited or triggered.
  • 6. 2. Assurance Approach assurance based upon an evaluation of the IT product or system that is to be trusted. Assurance Through Evaluation Evaluation techniques can include a) analysis and checking of process(es) and procedure(s); b) checking that process(es) and procedure(s) are being applied; c) analysis of the correspondence between TOE design representations; d) analysis of the TOE design representation against the requirements; e) verification of proofs; f) analysis of guidance documents; g) analysis of functional tests developed and the results provided; h) independent functional testing; i) analysis for vulnerabilities (including flaw hypothesis); j) penetration testing.
  • 7. Significance of Vulnerabilities  IT security breaches arise through the intentional exploitation or the unintentional triggering of vulnerabilities in the application of IT within business concerns.  Steps to prevent vulnerabilities  Eliminated  Minimized  Monitored Cause of Vulnerabilities Vulnerabilities can arise through failures in:  Requirements  Construction  operation
  • 8. 3. Evaluation Assurance Scale This scale provides:  Greater assurance  Minimum effort Level of effort is based upon  Scope  Depth  Rigour
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.  Protection Profile evaluation  Relation to the Security Target evaluation criteria  Evaluator tasks  Evaluator tasks for an evaluation based on CC requirements only  Evaluator tasks for an CC extended evaluation
  • 14.  Security Target evaluation  Relation to the other evaluation criteria in this part of CC  Evaluator tasks  Evaluator tasks for an evaluation based on CC requirements only  Evaluator tasks for a CC extended evaluation
  • 15.  The goal of a PP evaluation is to demonstrate that the PP is complete, consistent and technically sound.  An evaluated PP is suitable for use as the basis for the development of STs.  Such a PP is eligible for inclusion in a registry.
  • 16.  Objectives  Application notes  Dependencies  Developer action elements  Content and presentation of evidence elements  Evaluator action elements
  • 17.  The goal of an ST evaluation is to demonstrate that  the ST is complete, consistent, technically sound, and  suitable for use as the basis for the corresponding TOE evaluation.  Objectives  Application notes  Dependencies  Developer action elements  Content and presentation of evidence elements  Evaluator action elements
  • 18.  an increasing scale that balances the level of assurance obtained with the cost and feasibility of acquiring that degree of assurance.
  • 19. Objectives  EAL1 is applicable where some confidence in correct operation is required, but the threats to security are not viewed as serious.  EAL1 provides  an evaluation of the TOE as made available to the customer, including independent testing against a specification, and  an examination of the guidance documentation provided.
  • 20. Assurance components  EAL1 provides a basic level of assurance by an analysis of the security functions using  a functional and interface specification, and  guidance documentation, to understand the security behaviour.  The analysis is supported by independent testing of the TOE security functions.  This EAL provides a meaningful increase in assurance over an unevaluated IT product or system.
  • 21.
  • 22. Objectives  applicable in those circumstances where developers or users require a low to moderate level of independently assured security in the absence of ready availability of the complete development record,  requires the co-operation of the developer in terms of the delivery of design information and test results Assurance components  EAL2 provides assurance by  an analysis of the security functions using  a functional and interface specification,  guidance documentation and  the high-level design of the TOE, to understand the security behaviour.  a configuration list for the TOE, and  evidence of secure delivery procedures.
  • 23.  The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification,  selective independent confirmation of the developer test results,  strength of function analysis, and  evidence of a developer search for obvious vulnerabilities  This EAL represents a meaningful increase in assurance from EAL1 by requiring  developer testing,  a vulnerability analysis, and  independent testing based upon more detailed TOE specifications.
  • 24.
  • 25. Objectives  permits a developer to gain maximum assurance from positive security engineering at the design stage without substantial alteration of existing sound development practices.  applicable in those circumstances where developers or users require a moderate level of independently assured security, and require a thorough investigation of the TOE and its development without substantial re-engineering. Assurance components  EAL3 provides assurance by  an analysis of the security functions, using  a functional and interface specification,  guidance documentation, and  the high-level design of the TOE, to understand the security behaviour.  the use of  development environment controls,  TOE configuration management, and  evidence of secure delivery procedures.
  • 26.  The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification and high-level design,  selective independent confirmation of the developer test results,  strength of function analysis, and  evidence of a developer search for obvious vulnerabilities.  This EAL represents a meaningful increase in assurance from EAL2 by requiring  more complete testing coverage of the security functions and mechanisms and/or procedures that provide some confidence that the TOE will not be tampered with during development.
  • 27.
  • 28. Objectives  permits a developer to gain maximum assurance from positive security engineering based on good commercial development practices which, though rigorous, do not require substantial specialist knowledge, skills, and other resources.  applicable in those circumstances where developers or users require a moderate to high level of independently assured security in conventional commodity TOEs and are prepared to incur additional security-specific engineering costs. Assurance components  EAL4 provides assurance by  an analysis of the security functions, using  a functional and complete interface specification,  guidance documentation,  the high-level and low-level design of the TOE,  a subset of the implementation, to understand the security behaviour  an informal model of the TOE security policy,  the use of development environment controls ,  additional TOE configuration management including automation, and  evidence of secure delivery procedures
  • 29.  The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification and high-level design,  selective independent confirmation of the developer test results,  strength of function analysis,  evidence of a developer search for vulnerabilities, and  an independent vulnerability analysis demonstrating resistance to penetration attackers with a low attack potential. This EAL represents a meaningful increase in assurance from EAL3 by requiring  more design description,  a subset of the implementation, and  improved mechanisms and/or procedures that provide confidence that the TOE will not be tampered with during development or delivery.
  • 30.
  • 31. Objectives  permits a developer to gain maximum assurance from security engineering  Applicable where developers or users require a high level of independently assured security in a planned development and require a rigorous development approach without incurring unreasonable costs attributable to specialist security engineering techniques. Assurance components  EAL5 provides assurance by  an analysis of the security functions, using  a functional and complete interface specification,  guidance documentation,  the high-level and low-level design of the TOE,  all of the implementation, to understand the security behaviour.  a formal model of the TOE security policy,  a semiformal presentation of the functional specification and high-level design, and a semiformal demonstration of correspondence between them,  a modular TOE design,  the use of  a development environment controls,  comprehensive TOE configuration management including automation, and  evidence of secure delivery procedures.
  • 32. The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification, and high-level design and low-level design,  selective independent confirmation of the developer test results,  strength of function analysis,  evidence of a developer search for vulnerabilities,  an independent vulnerability analysis demonstrating resistance to penetration attackers with a moderate attack potential, and  validation of the developer's covert channel analysis.  This EAL represents a meaningful increase in assurance from EAL4 by requiring  semiformal design descriptions,  the entire implementation,  a more structured architecture,  covert channel analysis, and  improved mechanisms and/or procedures that provide confidence that the TOE will not be tampered with during development.
  • 33.
  • 34. Objectives  permits developers to gain high assurance from application of security engineering techniques to a rigorous development environment in order to produce a premium TOE for protecting high value assets against significant risks.  applicable to the development of security TOEs for application in high risk situations where the value of the protected assets justifies the additional costs. Assurance components  EAL6 provides assurance by  an analysis of the security functions, using  a functional and complete interface specification,  guidance documentation,  the high-level and low-level design of the of the TOE,  a structured presentation of the implementation, to understand the security behaviour,  a formal model of the TOE security policy,  a semiformal presentation of the functional specification, high-level design, and low-level design and a semiformal demonstration of correspondence between them,  a modular and layered TOE design, and  the use of  a structured development process,  development environment controls,  comprehensive TOE configuration management including complete automation, and  evidence of secure delivery procedures.
  • 35. The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification, high-level design and low-level design,  selective independent confirmation of the developer test results,  strength of function analysis,  evidence of a developer search for vulnerabilities,  an independent vulnerability analysis demonstrating resistance to penetration attackers with a high attack potential, and  validation of the developer's systematic covert channel analysis.  This EAL represents a meaningful increase in assurance from EAL5 by requiring  more comprehensive analysis,  a structured representation of the implementation,  more architectural structure (e.g. layering),  more comprehensive independent vulnerability analysis,  systematic covert channel identification, and  improved configuration management and development environment controls.
  • 36.
  • 37. Objectives  applicable to the development of security TOEs for application in extremely high risk situations and/or where the high value of the assets justifies the higher costs. Assurance components  EAL7 provides assurance by  an analysis of the security functions, using  a functional and complete interface specification,  guidance documentation,  the high-level and low-level design of the TOE, and  a structured presentation of the implementation, to understand the security behaviour.  a formal model of the TOE security policy,  a formal presentation of the functional specification and high-level design,  a semiformal presentation of the low-level design,  formal and semiformal demonstration of correspondence between them  a modular, layered and simple TOE design , and  the use of  a structured development process,  development environment controls,  comprehensive TOE configuration management including complete automation, and  evidence of secure delivery procedures.
  • 38.  The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification high-level design, low-level design and implementation representation,  complete independent confirmation of the developer test results,  strength of function analysis,  evidence of a developer search for vulnerabilities  an independent vulnerability analysis demonstrating resistance to penetration attackers with a high attack potential , and  validation of the developer‘s systematic covert channel analysis.  This EAL represents a meaningful increase in assurance from EAL6 by requiring  more comprehensive analysis using formal representations and formal correspondence, and  comprehensive testing.
  • 39.
  • 40.  Information Technology — Security Techniques — Evaluation Criteria For IT Security Part3: Security Assurance Requirements (ISO/IEC 15408-3)