ORANGE BOOK Operating Systerm Security

12.2. COMMON CRITERIA 173

A Class A1 system is a secure operating system that has been semi-formally verified to satisfy the reference monitor guarantees. Building a Class A1 system requires diligence from the outset of the development process to build and verify the formal specifications of the system design FTLS, the security policy, and the TCB of the system. No Class A1 operating systems are commercially available, although custom systems, such as BLACKER [ 330 ] based on GEMSOS [ 290 ], have been evaluated at A1, and the VAXVMM system see Section 11.2 was designed and implemented to be evaluated at Class A1. Beyond Class A1 The Class A1 requirements include exceptions that permit informal verification where no formal analysis tool exist. In particular, research in the 1980s indicated that formal veri- fication of security properties down to the level of the source code may be possible, so the Beyond Class A1 left open the possibility that security requirements could be verified more precisely. Formal verification tools that can prove the satisfaction of the variety of security properties required for large source code bases, such as operating systems, have not become practical. As a result, no further classes were defined.

12.2 COMMON CRITERIA

While the Orange Book defined targets for security features and assurance, the linking of features and assurance requirements became cumbersome. A detailed formal assurance may be performed for systems that do not provide all of the features in B3 e.g., covert channel protection. Also, the six classes of security features themselves were constraining. The market may determine combinations of security features that do not neatly fit into one of these classes. Out of this desire for a more flexible assurance approach, the Common Criteria emerged [ 60 , 61 ]. In the early 1990s, independent approaches for system assurance were be developed in Europe and Canada. The Information Technology Security Evaluation Criteria ITSEC version 1.2 was released in 1991 as a joint standard used by France, Germany, the Netherlands, and the United Kingdom [ 147 ]. ITSEC defines a set of criteria for evaluating a system, called the target of evaluation, to verify the presence of a set of security features and to verify its defenses against a comprehensive set of penetration tests. The set of security features implemented by a system need not conform to a specific TCSEC class, but rather can be defined as part of the evaluation, called the security target. The amount of evaluation effort determines a confidence level in the target of evaluation, called evaluation levels that range from E0 lowest to E6 highest. In Canada, the Canadian Trusted Computer Product Evaluation Criteria CTCPEC defined its evaluation approach in 1993 [ 41 , 194 ]. CTCPEC leverages the security feature requirements of the Orange Book while incorporating the notion of distinct assurance levels of the ITSEC approach. Inspired by facets of each of these evaluation approaches, the Common Criteria approach was developed [ 60 ]. Like the ITSEC and CTCPEC approaches, the Common Criteria separates the assurance effort from the security features being assured. Like the Orange Book, the Common Cri- 174 CHAPTER 12. SYSTEM ASSURANCE teria defines security feature configurations that would lead to a meaningful assurance for developers and consumers.

12.2.1 COMMON CRITERIA CONCEPTS

An overview of the Common Criteria approach is shown in Figure 12.1. The Common Criteria Figure 12.1: Common Criteria Overview: A target of evaluation is converted to a security target that defines the features and assurance being evaluated. The protection profile specifies the security features required and the assurance levels define a set of possible assurance requirements for those features. consists of four major concepts: 1 the target of evaluation TOE which is the system that is the subject of evaluation; 2 the protection profile PP which specifies a required set of security features and assurance requirements for systems to satisfy that profile; 3 the security target ST which defines the functional and assurance measures of the TOE security that are to be evaluated, perhaps satisfying one or more PPs; and 4 the evaluation assurance level EAL which identifies the level of assurance that the TOE satisfies the ST. In a Common Criteria evaluation, the TOE’s security threats, security objectives, features, and assurance measures are collected in an ST for that system. The ST may claim to satisfy the requirements of one or more PPs which defines a set of requirements on the ST. The PPs typically indicate a minimum EAL that can be assured using its assurance requirements, but the ST may exceed these assurance requirements to satisfy the requirements of a higher EAL. We examine these concepts in more detail below.

Dokumen yang terkait

Pengaruh Hutang, Operating Ratio, Earning Power of Total Invesment, Rate of Return for Owners , Working Capital, Quick Ratio terhadap Dividen Tunai pada Perusahaan Perkebunan yang Terdaftar di BEI Periode 2009-2013

3 49 100

Pengaruh Liquidity Ratio (Quick Ratio), Profitability Ratio (ROA dan ROE) Terhadap Dividend Payout Ratio pada Perusahaan Perbankan yang Terdaftar Di Bursa Efek Indonesia

4 64 101

Sikap Dan Perilaku Room Attendant Dalam Melaksanakan Standard Operating Procedure Bagian Kamar Di J.W.Marriott Hotel Medan

21 300 74

Pengaruh Likuiditas, Laba, Kebijakan Hutang, dan Operating Leverage Terhadap Price To Book Value pada Perusahaan Real Estate dan Property yang Terdaftar di Bursa Efek Indonesia (BEI)

1 43 77

Pengaruh Cash Dividend Coverage, Operating Cashflow Per Share, Return On Equity, Return On Assets, Total Assets Turnover, dan Earning Per Share terhadap Harga Saham pada Perusahaan Manufaktur yang Terdaftar di BEI

1 39 84

Analisis pengaruh Gross Profit Margin (GPM), Operating Profit Margin (OPM), Net Profit Margin (NPM), dan Return On Asset (ROA) terhadap harga saham: studi empiris pada perusahaan manufaktur sektor industri barang konsumsi Tahun 2008 -2012.

3 51 124

Analisis Dan Perancangan Site-To-Site Virtual Private Network (VPN) Berbasis IP Security Menggunakan Mikrotik Router Operating System

4 22 144

Pengaruh Operating Leverage, Financial Leverage, dan Compound Leverage Terhadap Risiko Sistematik

0 8 113

PENGARUH OPERATING ASSETS TURNOVER DAN OPERATING PROFIT MARGIN TERHADAP EARNING POWER.

2 6 48

Operating a forklift

0 0 1