SlideShare a Scribd company logo
1 of 25
Russian IT Security Certification 
Scheme: Steps Toward 
Common Criteria Approach 
Alexander Barabanov, Alexey Markov, Valentin Tsirlov
Agenda 
2 
 Brief overview 
 Current status of the Russian IT Security 
Certification Scheme 
 Steps Toward Common Criteria Approach 
 Final Remarks
Brief overview: 
Historical Perspective 
requirements for 
antiviruses 
(based on CC) 
3 
Establishment of 
Russian IT Security 
Certification Scheme 
1995 
1997 
Mandatory 
requirements for 
firewall and access 
control systems 
1999 2003 
Guidance based 
on CC v.2.1 
Mandatory 
Mandatory 
requirements for 
IPS/IDS 
(based on CC) 
Mandatory 
requirements for 
source code 
analysis 
2012 2013
Brief overview: 
who takes part in the certification process? 
4
Brief overview: typical timeline 
5 
Obtaining FSTEC ID 
Normally 1 month 
Evaluation provided by Laboratory 
3-4 months 
Certification by Certification Body 
1 month and more – 
there may be delays: 
- for solutions that will 
be used for protection 
of classified 
information; 
- If a state-owned 
Certification authority 
was chosen by FSTEC 
Obtaining a certificate 
from FSTEC of Russia 
Normally 1 month
Brief overview: 
Accredited Evaluation Laboratories 
6
Brief overview: 
Accredited Certification Bodies 
7
Brief overview: 
Classical Major Approaches to Evaluation 
8 
Evaluation of the security functionality 
• Black box testing to ensure that TOE works as it should 
Evaluation for the absence of non-declared 
functions 
• Testing of source code for the absence of software 
vulnerabilities
Current status of the Russian Scheme: 
Products 
9
Current status of the Russian Scheme: 
Certified Products by Types (1) 
10 
2011-2013 
Evaluation Timeline
Current status of the Russian Scheme: 
Certified Products by Types (2) 
11
Current status of the Russian Scheme: 
Russian vs. Non-Russian Developers 
12
Current status of the Russian Scheme: 
Non-Russian Developers (1) 
13 13
Current status of the Russian Scheme: 
Non-Russian Developers (2) 
2011-2013 Evaluation 
Timeline 
14
Current status of the Russian Scheme: 
Russian Developers 
2011-2013 Evaluation 
Timeline 
15
Steps Toward Common Criteria Approach: 
Step #1 (1) 
16
Steps Toward Common Criteria Approach: 
Step #1 (2) 
17
Steps Toward Common Criteria Approach: 
Step #1 (3) 
2003-2013 Evaluation 
Timeline 
18
Steps Toward Common Criteria Approach: 
Step #2 (1) 
19
Steps Toward Common Criteria Approach: 
Step #2 (2) 
20
Steps Toward Common Criteria Approach: 
Certified Products, Russian 
21 
TOE Developer Approved PP 
Kaspersky 
Endpoint Security 
Kaspersky Lab. Host IDS, Antivirus, 
Security Level 2 
Kaspersky 
Antivirus for 
Novell NetWare 
Kaspersky Lab. Antivirus, 
Security Level 2 
Security Studio 
Endpoint 
Protection 
Security Code Host IDS, Antivirus, 
Security Level 4 (~ EAL3+) 
Kaspersky 
Security Center 
Kaspersky Lab. Antivirus, 
Security Level 2 
Continent 3.7 Security Code Network IDS, Security Level 3
Steps Toward Common Criteria Approach: 
Certified Products, Non-Russian 
22 
TOE Developer Approved PP 
Deep Security 8.0 Trend Micro Host IDS, Antivirus, 
Security Level 4 (~ EAL3+) 
McAfee NSP 7.1 McAfee Network IDS, 
Security Level 5 (~ EAL2+) 
Office Scan 10.6 Trend Micro Host IDS, Antivirus, 
Security Level 4 (~ EAL3+) 
McAfee Web 
Gateway 7.4 
McAfee Antivirus, 
Security Level 5 (~ EAL2+)
Final Remarks 
1. First certifications according to the new requirements are 
23 
certifications of non-Russian products. 
2. More and more leading non-Russian developers provide 
the Russian Evaluations Laboratories with access to their 
source code, and this tendency shall be observed in 
future. 
3. Efficiency in detection of vulnerabilities in software 
submitted for certification will enhance. 
4. Russian developers will pay more for certification. 
5. The number of actively working Evaluations Laboratories 
will reduce.
Contact Information 
24 
 Alexander Barabanov, CISSP, CSSLP 
Head of Certification and Testing Department 
NPO Echelon 
ab@cnpo.ru 
 Alexey Markov, Ph.D, CISSP 
CEO of NPO Echelon 
am@cnpo.ru 
 Valentin Tsirlov, Ph.D, CISSP, CISM 
Executive Director of NPO Echelon 
z@cnpo.ru
25 
Thank you for your attention!

More Related Content

What's hot

The Impact of Test Ownership and Team Structure on the Reliability and Effect...
The Impact of Test Ownership and Team Structure on the Reliability and Effect...The Impact of Test Ownership and Team Structure on the Reliability and Effect...
The Impact of Test Ownership and Team Structure on the Reliability and Effect...
Kim Herzig
 
It's Not a Bug, It's a Feature — How Misclassification Impacts Bug Prediction
It's Not a Bug, It's a Feature — How Misclassification Impacts Bug PredictionIt's Not a Bug, It's a Feature — How Misclassification Impacts Bug Prediction
It's Not a Bug, It's a Feature — How Misclassification Impacts Bug Prediction
sjust
 
Empircal Studies of Performance Bugs & Performance Analysis Approaches for La...
Empircal Studies of Performance Bugs & Performance Analysis Approaches for La...Empircal Studies of Performance Bugs & Performance Analysis Approaches for La...
Empircal Studies of Performance Bugs & Performance Analysis Approaches for La...
SAIL_QU
 
Dissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
Dissecting State-of-the-Art Android Malware Using Static and Dynamic AnalysisDissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
Dissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
CHOOSE
 

What's hot (13)

The Impact of Test Ownership and Team Structure on the Reliability and Effect...
The Impact of Test Ownership and Team Structure on the Reliability and Effect...The Impact of Test Ownership and Team Structure on the Reliability and Effect...
The Impact of Test Ownership and Team Structure on the Reliability and Effect...
 
It's Not a Bug, It's a Feature — How Misclassification Impacts Bug Prediction
It's Not a Bug, It's a Feature — How Misclassification Impacts Bug PredictionIt's Not a Bug, It's a Feature — How Misclassification Impacts Bug Prediction
It's Not a Bug, It's a Feature — How Misclassification Impacts Bug Prediction
 
Empircal Studies of Performance Bugs & Performance Analysis Approaches for La...
Empircal Studies of Performance Bugs & Performance Analysis Approaches for La...Empircal Studies of Performance Bugs & Performance Analysis Approaches for La...
Empircal Studies of Performance Bugs & Performance Analysis Approaches for La...
 
Issre2014 test defectprediction
Issre2014 test defectpredictionIssre2014 test defectprediction
Issre2014 test defectprediction
 
Robustness testing
Robustness testingRobustness testing
Robustness testing
 
Dissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
Dissecting State-of-the-Art Android Malware Using Static and Dynamic AnalysisDissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
Dissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
 
SpecTRM
SpecTRMSpecTRM
SpecTRM
 
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
 
Levels of testing
Levels of testingLevels of testing
Levels of testing
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Semi-Automated Security Testing of Web applications
Semi-Automated Security Testing of Web applicationsSemi-Automated Security Testing of Web applications
Semi-Automated Security Testing of Web applications
 
Testy dymne, integracyjne i jednostkowe w Laravel
Testy dymne, integracyjne i jednostkowe w LaravelTesty dymne, integracyjne i jednostkowe w Laravel
Testy dymne, integracyjne i jednostkowe w Laravel
 
Understanding the Rationale for Updating a Function's Comment
Understanding the Rationale for Updating a Function's CommentUnderstanding the Rationale for Updating a Function's Comment
Understanding the Rationale for Updating a Function's Comment
 

Similar to Barabanov iccc 2014 (2)

Would Static Analysis Tools Help Developers with Code Reviews?
Would Static Analysis Tools Help Developers with Code Reviews?Would Static Analysis Tools Help Developers with Code Reviews?
Would Static Analysis Tools Help Developers with Code Reviews?
Sebastiano Panichella
 
GenerationRFID_Corp_2015_02
GenerationRFID_Corp_2015_02GenerationRFID_Corp_2015_02
GenerationRFID_Corp_2015_02
Albert Escala
 
Standards for safety and security in avionics
Standards for safety and security in avionicsStandards for safety and security in avionics
Standards for safety and security in avionics
Alessandro Bruni
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
A Subbiah
 
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
Takanori Suzuki
 

Similar to Barabanov iccc 2014 (2) (20)

Would Static Analysis Tools Help Developers with Code Reviews?
Would Static Analysis Tools Help Developers with Code Reviews?Would Static Analysis Tools Help Developers with Code Reviews?
Would Static Analysis Tools Help Developers with Code Reviews?
 
X41-TUF-Audit-2022-Final-Report-PUBLIC.pdf
X41-TUF-Audit-2022-Final-Report-PUBLIC.pdfX41-TUF-Audit-2022-Final-Report-PUBLIC.pdf
X41-TUF-Audit-2022-Final-Report-PUBLIC.pdf
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
 
GenerationRFID_Corp_2015_02
GenerationRFID_Corp_2015_02GenerationRFID_Corp_2015_02
GenerationRFID_Corp_2015_02
 
Standards for safety and security in avionics
Standards for safety and security in avionicsStandards for safety and security in avionics
Standards for safety and security in avionics
 
Basic of Software Testing.pptx
Basic of Software Testing.pptxBasic of Software Testing.pptx
Basic of Software Testing.pptx
 
Manual Testing Guide1.pdf
Manual Testing Guide1.pdfManual Testing Guide1.pdf
Manual Testing Guide1.pdf
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
IRJET- Research Study on Testing Mantle in SDLC
IRJET- Research Study on Testing Mantle in SDLCIRJET- Research Study on Testing Mantle in SDLC
IRJET- Research Study on Testing Mantle in SDLC
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
Software development life cycle
Software development life cycleSoftware development life cycle
Software development life cycle
 
Unit 2 unit testing
Unit 2   unit testingUnit 2   unit testing
Unit 2 unit testing
 
Unit 2 Unit Testing
Unit 2   Unit TestingUnit 2   Unit Testing
Unit 2 Unit Testing
 
00.pdf
00.pdf00.pdf
00.pdf
 
Zero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedZero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically Guaranteed
 
Traps detection during migration of C and C++ code to 64-bit Windows
Traps detection during migration of C and C++ code to 64-bit WindowsTraps detection during migration of C and C++ code to 64-bit Windows
Traps detection during migration of C and C++ code to 64-bit Windows
 
Test-Driven Code Review: An Empirical Study
Test-Driven Code Review: An Empirical StudyTest-Driven Code Review: An Empirical Study
Test-Driven Code Review: An Empirical Study
 
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
5WCSQ - Quality Improvement by the Real-Time Detection of the Problems
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Sw qual joint webinar deck (5)
Sw qual joint webinar deck (5)Sw qual joint webinar deck (5)
Sw qual joint webinar deck (5)
 

Recently uploaded

If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 

Recently uploaded (18)

Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 

Barabanov iccc 2014 (2)

  • 1. Russian IT Security Certification Scheme: Steps Toward Common Criteria Approach Alexander Barabanov, Alexey Markov, Valentin Tsirlov
  • 2. Agenda 2  Brief overview  Current status of the Russian IT Security Certification Scheme  Steps Toward Common Criteria Approach  Final Remarks
  • 3. Brief overview: Historical Perspective requirements for antiviruses (based on CC) 3 Establishment of Russian IT Security Certification Scheme 1995 1997 Mandatory requirements for firewall and access control systems 1999 2003 Guidance based on CC v.2.1 Mandatory Mandatory requirements for IPS/IDS (based on CC) Mandatory requirements for source code analysis 2012 2013
  • 4. Brief overview: who takes part in the certification process? 4
  • 5. Brief overview: typical timeline 5 Obtaining FSTEC ID Normally 1 month Evaluation provided by Laboratory 3-4 months Certification by Certification Body 1 month and more – there may be delays: - for solutions that will be used for protection of classified information; - If a state-owned Certification authority was chosen by FSTEC Obtaining a certificate from FSTEC of Russia Normally 1 month
  • 6. Brief overview: Accredited Evaluation Laboratories 6
  • 7. Brief overview: Accredited Certification Bodies 7
  • 8. Brief overview: Classical Major Approaches to Evaluation 8 Evaluation of the security functionality • Black box testing to ensure that TOE works as it should Evaluation for the absence of non-declared functions • Testing of source code for the absence of software vulnerabilities
  • 9. Current status of the Russian Scheme: Products 9
  • 10. Current status of the Russian Scheme: Certified Products by Types (1) 10 2011-2013 Evaluation Timeline
  • 11. Current status of the Russian Scheme: Certified Products by Types (2) 11
  • 12. Current status of the Russian Scheme: Russian vs. Non-Russian Developers 12
  • 13. Current status of the Russian Scheme: Non-Russian Developers (1) 13 13
  • 14. Current status of the Russian Scheme: Non-Russian Developers (2) 2011-2013 Evaluation Timeline 14
  • 15. Current status of the Russian Scheme: Russian Developers 2011-2013 Evaluation Timeline 15
  • 16. Steps Toward Common Criteria Approach: Step #1 (1) 16
  • 17. Steps Toward Common Criteria Approach: Step #1 (2) 17
  • 18. Steps Toward Common Criteria Approach: Step #1 (3) 2003-2013 Evaluation Timeline 18
  • 19. Steps Toward Common Criteria Approach: Step #2 (1) 19
  • 20. Steps Toward Common Criteria Approach: Step #2 (2) 20
  • 21. Steps Toward Common Criteria Approach: Certified Products, Russian 21 TOE Developer Approved PP Kaspersky Endpoint Security Kaspersky Lab. Host IDS, Antivirus, Security Level 2 Kaspersky Antivirus for Novell NetWare Kaspersky Lab. Antivirus, Security Level 2 Security Studio Endpoint Protection Security Code Host IDS, Antivirus, Security Level 4 (~ EAL3+) Kaspersky Security Center Kaspersky Lab. Antivirus, Security Level 2 Continent 3.7 Security Code Network IDS, Security Level 3
  • 22. Steps Toward Common Criteria Approach: Certified Products, Non-Russian 22 TOE Developer Approved PP Deep Security 8.0 Trend Micro Host IDS, Antivirus, Security Level 4 (~ EAL3+) McAfee NSP 7.1 McAfee Network IDS, Security Level 5 (~ EAL2+) Office Scan 10.6 Trend Micro Host IDS, Antivirus, Security Level 4 (~ EAL3+) McAfee Web Gateway 7.4 McAfee Antivirus, Security Level 5 (~ EAL2+)
  • 23. Final Remarks 1. First certifications according to the new requirements are 23 certifications of non-Russian products. 2. More and more leading non-Russian developers provide the Russian Evaluations Laboratories with access to their source code, and this tendency shall be observed in future. 3. Efficiency in detection of vulnerabilities in software submitted for certification will enhance. 4. Russian developers will pay more for certification. 5. The number of actively working Evaluations Laboratories will reduce.
  • 24. Contact Information 24  Alexander Barabanov, CISSP, CSSLP Head of Certification and Testing Department NPO Echelon ab@cnpo.ru  Alexey Markov, Ph.D, CISSP CEO of NPO Echelon am@cnpo.ru  Valentin Tsirlov, Ph.D, CISSP, CISM Executive Director of NPO Echelon z@cnpo.ru
  • 25. 25 Thank you for your attention!