SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
❑ Automate everything!
❑ Less time to obtain the certificate
❑ Lower economic cost for everyone
❑ Meet the market expectations
❑ Increased number of Common Criteria
certifications
❑ Fast pace in the evolution of IT
❑ Lack of talent
Why automation tools for Common Criteria?
❑ The CSA brings a new paradigm
❑ Regulation (EC) No 765/2008: ‘conformity
assessment body’ shall mean a body that performs
conformity assessment activities including
calibration, testing, certification and inspection;
❑ EUCC v1.1.1 further refines this concept:
❑ CAB = CB + ITSEF
❑ CB: issues certificate
❑ ITSEF: calibrates / tests / samples
CSA & EUCC Context
❑ CCCAB is co-financed by the Connecting Europe Facility of the European Union.
❑ ISCOM (OSCI), CCN (OC-CCN) and jtsec
Brief & Stakeholders
❑ Improve current schemes capabilities to support the high
assurance certifications defined in the EUCC
❑ Build up CAB capabilities for newcomers and for private CABs
that will operate under the EUCC for level substantial
❑ Share good practices between CABs for high and support peer
reviews by sharing the same tool
❑ Enhance the communication flow with ENISA, ITSEFs,
manufacturers…
❑ Allow focus on validation of the reports
Objectives
❑ CCCAB provides a framework to manage EUCC
certifications smoothing the process and saving around
25% of the certification effort for existing CABs.
❑ CCCAB will ease the creation of EUCC CABs around
Europe given that it will be very easy to deploy the
required IT system to manage a CAB.
❑ CCCAB will be a free open-source tool that could be
potentially adapted to be used in other future schemes.
Therefore, it could be a key factor for a successful
adoption of the EU Cybersecurity Certification
framework.
Why is CCCAB needed?
CCCAB as a part of a framework
Main technologies used
Features
❑ Project Management: CCCAB will allow you to have a global view
of all projects in progress, helping in the overall management of
the project.
❑ Simple installation: Can be used from anywhere without the
need to install any software. Online and offline.
❑ Web Edition, docx/pdf Output: CCCAB will allow the generation
in DOCX or PDF format.
Features
Document
Generator
❑ Presentation engine
❑ Access control (I&A, 2FA, …) and
authorization subsystem (PGP,
PAdES, XAdES)
❑ Evidence and versioning
subsystem
❑ CC Analysis Engine & Expert tips
❑ ITSEF non-conformities subsystem
Features
Validation Framework
CC Analysis
Engine Smart Validation System
Presentation
Engine
Access control & Authorizations
CC3.1R5
Non - Conformities Evidences & Versioning
❑ Smart Validation System
❑ ITSEF communications parser
❑ Manufacturers communications
parser
❑ Automagic filling
Features
Validation Framework
CC Analysis
Engine Smart Validation System
Presentation
Engine
Access control & Authorizations
CC3.1R5
ITSEF
Comm.
Manufact.
Comm.
Non - Conformities Evidences & Versioning
ITSEFs
Manufacturers
Features
❑ Adaptation to the EUCC
❑ Communications with ENISA website
❑ Compliance System
❑ Vulnerability Inbox
❑ Vulnerability Monitoring
Features
Validation Framework
CC Analysis
Engine Smart Validation System
Presentation
Engine
Access control & Authorizations
CC3.1R5
Non - Conformities Evidences & Versioning
Vulnerability inbox
How it works?
CCCAB Specification
• Analysis of
current tools
used by CBs
• Information flows
identification
• Information
Exchange
languages
specification
Validation
Framework
• Access Control and PM
system
• Interface development
• Evidence management
• Report printing
• NCs Management
• Version Management
Smart Validation
System
• ITSEF
Communications
parser
• Manufacturer
communications
parser
• Autofill
• Expert tips
Adaptation to the
EUCC scheme
• Communication
module with
ENISA website
• Compliance
Monitoring
System and non-
compliance
handling
Validation
• Full Project using
CCCAB
• Guidance
development
• Final version
release
Action plan
CCCAB website
❑ https://www.cccab.eu/
CCCAB website
❑ Define the Open Source licensing model
❑ Release the source code
❑ Test the tool properly in a real use cases with the
partners
❑ Develop the connection with the ENISA website, which is
not yet up and running
❑ Making stakeholders aware of the tool
Conclusions & ToDos
jtsec Beyond IT Security
Granada & Madrid – Spain
hello@jtsec.es
@jtsecES
www.jtsec.es
Contact
“Any fool can make something complicated. It takes a
genius to make it simple.”
Woody Guthrie

Contenu connexe

Similaire à CCCAB tool - Making CABs life easy - Chapter 2

Cognizant_DevOps_AWS Event Flyer ART
Cognizant_DevOps_AWS Event Flyer ARTCognizant_DevOps_AWS Event Flyer ART
Cognizant_DevOps_AWS Event Flyer ART
Elangovan Anbalagan
 

Similaire à CCCAB tool - Making CABs life easy - Chapter 2 (20)

ICCC21 2021 statistics report
ICCC21 2021 statistics reportICCC21 2021 statistics report
ICCC21 2021 statistics report
 
Test Automation in the Cloud - Key to Accelerated Development
Test Automation in the Cloud - Key to Accelerated DevelopmentTest Automation in the Cloud - Key to Accelerated Development
Test Automation in the Cloud - Key to Accelerated Development
 
LFN Dev and Testing Forum 2022 CNF Certification Tutorial
LFN Dev and Testing Forum 2022 CNF Certification TutorialLFN Dev and Testing Forum 2022 CNF Certification Tutorial
LFN Dev and Testing Forum 2022 CNF Certification Tutorial
 
Quick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearQuick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, Opengear
 
Automating Common Criteria
Automating Common Criteria Automating Common Criteria
Automating Common Criteria
 
Components of CI/CD in DevOps
Components of CI/CD in DevOpsComponents of CI/CD in DevOps
Components of CI/CD in DevOps
 
Resume_Sahida Sultana
Resume_Sahida SultanaResume_Sahida Sultana
Resume_Sahida Sultana
 
Resume
ResumeResume
Resume
 
Navaneethan Balakrishnan_Resume
Navaneethan Balakrishnan_ResumeNavaneethan Balakrishnan_Resume
Navaneethan Balakrishnan_Resume
 
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityJourney Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment Maturity
 
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
Cloud and Network Transformation using DevOps methodology : Cisco Live 2015
 
Testwarez 2009 Use Proper Tool
Testwarez 2009 Use Proper ToolTestwarez 2009 Use Proper Tool
Testwarez 2009 Use Proper Tool
 
Cognizant_DevOps_AWS Event Flyer ART
Cognizant_DevOps_AWS Event Flyer ARTCognizant_DevOps_AWS Event Flyer ART
Cognizant_DevOps_AWS Event Flyer ART
 
Navaneethan Balakrishnan_Resume
Navaneethan Balakrishnan_ResumeNavaneethan Balakrishnan_Resume
Navaneethan Balakrishnan_Resume
 
Pivotal CloudFoundry on Google cloud platform
Pivotal CloudFoundry on Google cloud platformPivotal CloudFoundry on Google cloud platform
Pivotal CloudFoundry on Google cloud platform
 
Enterprise QA and Application Testing Services
Enterprise QA and Application Testing ServicesEnterprise QA and Application Testing Services
Enterprise QA and Application Testing Services
 
Enterprise QA and Application Testing Services
Enterprise QA and Application Testing ServicesEnterprise QA and Application Testing Services
Enterprise QA and Application Testing Services
 
Service Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and HowService Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and How
 
Presentation on 3 Pillars of DevOps - Kovair DevOps
Presentation on 3 Pillars of DevOps - Kovair DevOpsPresentation on 3 Pillars of DevOps - Kovair DevOps
Presentation on 3 Pillars of DevOps - Kovair DevOps
 
imagic 2.pptx
imagic 2.pptximagic 2.pptx
imagic 2.pptx
 

Plus de Javier Tallón

Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...
Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...
Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...
Javier Tallón
 
ICCC23 -The new cryptographic evaluation methodology created by CCN
ICCC23 -The new cryptographic evaluation methodology created by CCNICCC23 -The new cryptographic evaluation methodology created by CCN
ICCC23 -The new cryptographic evaluation methodology created by CCN
Javier Tallón
 
Experiences evaluating cloud services and products
Experiences evaluating cloud services and productsExperiences evaluating cloud services and products
Experiences evaluating cloud services and products
Javier Tallón
 
Evolucionado la evaluación Criptográfica
Evolucionado la evaluación CriptográficaEvolucionado la evaluación Criptográfica
Evolucionado la evaluación Criptográfica
Javier Tallón
 
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
Javier Tallón
 
Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...
Javier Tallón
 

Plus de Javier Tallón (20)

Evolucionando la evaluación criptográfica - Episodio II
Evolucionando la evaluación criptográfica - Episodio IIEvolucionando la evaluación criptográfica - Episodio II
Evolucionando la evaluación criptográfica - Episodio II
 
Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...
Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...
Cómo evaluar soluciones biométricas para incluir productos de videoidentifica...
 
ICCC2023 Statistics Report, has Common Criteria reached its peak?
ICCC2023 Statistics Report, has Common Criteria reached its peak?ICCC2023 Statistics Report, has Common Criteria reached its peak?
ICCC2023 Statistics Report, has Common Criteria reached its peak?
 
ICCC23 -The new cryptographic evaluation methodology created by CCN
ICCC23 -The new cryptographic evaluation methodology created by CCNICCC23 -The new cryptographic evaluation methodology created by CCN
ICCC23 -The new cryptographic evaluation methodology created by CCN
 
Experiences evaluating cloud services and products
Experiences evaluating cloud services and productsExperiences evaluating cloud services and products
Experiences evaluating cloud services and products
 
TAICS - Cybersecurity Certification for European Market.pptx
TAICS - Cybersecurity Certification for European Market.pptxTAICS - Cybersecurity Certification for European Market.pptx
TAICS - Cybersecurity Certification for European Market.pptx
 
La ventaja de implementar una solución de ciberseguridad certificada por el C...
La ventaja de implementar una solución de ciberseguridad certificada por el C...La ventaja de implementar una solución de ciberseguridad certificada por el C...
La ventaja de implementar una solución de ciberseguridad certificada por el C...
 
EUCA23 - Evolution of cryptographic evaluation in Europe.pdf
EUCA23 - Evolution of cryptographic evaluation in Europe.pdfEUCA23 - Evolution of cryptographic evaluation in Europe.pdf
EUCA23 - Evolution of cryptographic evaluation in Europe.pdf
 
Hacking your jeta.pdf
Hacking your jeta.pdfHacking your jeta.pdf
Hacking your jeta.pdf
 
Evolucionado la evaluación Criptográfica
Evolucionado la evaluación CriptográficaEvolucionado la evaluación Criptográfica
Evolucionado la evaluación Criptográfica
 
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
 
EUCA 22 - Let's harmonize labs competence ISO 19896
EUCA 22 - Let's harmonize labs competence ISO 19896EUCA 22 - Let's harmonize labs competence ISO 19896
EUCA 22 - Let's harmonize labs competence ISO 19896
 
EUCA22 Panel Discussion: Differences between lightweight certification schemes
EUCA22 Panel Discussion: Differences between lightweight certification schemesEUCA22 Panel Discussion: Differences between lightweight certification schemes
EUCA22 Panel Discussion: Differences between lightweight certification schemes
 
EUCA22 - Patch Management ISO_IEC 15408 & 18045
EUCA22 - Patch Management ISO_IEC 15408 & 18045EUCA22 - Patch Management ISO_IEC 15408 & 18045
EUCA22 - Patch Management ISO_IEC 15408 & 18045
 
Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...
 
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?
 
Is Automation Necessary for the CC Survival?
Is Automation Necessary for the CC Survival?Is Automation Necessary for the CC Survival?
Is Automation Necessary for the CC Survival?
 
2022 CC Statistics report: will this year beat last year's record number of c...
2022 CC Statistics report: will this year beat last year's record number of c...2022 CC Statistics report: will this year beat last year's record number of c...
2022 CC Statistics report: will this year beat last year's record number of c...
 
CCCAB, la apuesta europea por la automatización de los Organismos de Certific...
CCCAB, la apuesta europea por la automatización de los Organismos de Certific...CCCAB, la apuesta europea por la automatización de los Organismos de Certific...
CCCAB, la apuesta europea por la automatización de los Organismos de Certific...
 
jtsec Arqus Alliance presentation
jtsec Arqus Alliance presentationjtsec Arqus Alliance presentation
jtsec Arqus Alliance presentation
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

CCCAB tool - Making CABs life easy - Chapter 2

  • 1.
  • 2.
  • 3. ❑ Automate everything! ❑ Less time to obtain the certificate ❑ Lower economic cost for everyone ❑ Meet the market expectations ❑ Increased number of Common Criteria certifications ❑ Fast pace in the evolution of IT ❑ Lack of talent Why automation tools for Common Criteria?
  • 4. ❑ The CSA brings a new paradigm ❑ Regulation (EC) No 765/2008: ‘conformity assessment body’ shall mean a body that performs conformity assessment activities including calibration, testing, certification and inspection; ❑ EUCC v1.1.1 further refines this concept: ❑ CAB = CB + ITSEF ❑ CB: issues certificate ❑ ITSEF: calibrates / tests / samples CSA & EUCC Context
  • 5. ❑ CCCAB is co-financed by the Connecting Europe Facility of the European Union. ❑ ISCOM (OSCI), CCN (OC-CCN) and jtsec Brief & Stakeholders
  • 6.
  • 7. ❑ Improve current schemes capabilities to support the high assurance certifications defined in the EUCC ❑ Build up CAB capabilities for newcomers and for private CABs that will operate under the EUCC for level substantial ❑ Share good practices between CABs for high and support peer reviews by sharing the same tool ❑ Enhance the communication flow with ENISA, ITSEFs, manufacturers… ❑ Allow focus on validation of the reports Objectives
  • 8. ❑ CCCAB provides a framework to manage EUCC certifications smoothing the process and saving around 25% of the certification effort for existing CABs. ❑ CCCAB will ease the creation of EUCC CABs around Europe given that it will be very easy to deploy the required IT system to manage a CAB. ❑ CCCAB will be a free open-source tool that could be potentially adapted to be used in other future schemes. Therefore, it could be a key factor for a successful adoption of the EU Cybersecurity Certification framework. Why is CCCAB needed?
  • 9. CCCAB as a part of a framework
  • 12. ❑ Project Management: CCCAB will allow you to have a global view of all projects in progress, helping in the overall management of the project. ❑ Simple installation: Can be used from anywhere without the need to install any software. Online and offline. ❑ Web Edition, docx/pdf Output: CCCAB will allow the generation in DOCX or PDF format. Features Document Generator
  • 13. ❑ Presentation engine ❑ Access control (I&A, 2FA, …) and authorization subsystem (PGP, PAdES, XAdES) ❑ Evidence and versioning subsystem ❑ CC Analysis Engine & Expert tips ❑ ITSEF non-conformities subsystem Features Validation Framework CC Analysis Engine Smart Validation System Presentation Engine Access control & Authorizations CC3.1R5 Non - Conformities Evidences & Versioning
  • 14. ❑ Smart Validation System ❑ ITSEF communications parser ❑ Manufacturers communications parser ❑ Automagic filling Features Validation Framework CC Analysis Engine Smart Validation System Presentation Engine Access control & Authorizations CC3.1R5 ITSEF Comm. Manufact. Comm. Non - Conformities Evidences & Versioning ITSEFs Manufacturers
  • 16. ❑ Adaptation to the EUCC ❑ Communications with ENISA website ❑ Compliance System ❑ Vulnerability Inbox ❑ Vulnerability Monitoring Features Validation Framework CC Analysis Engine Smart Validation System Presentation Engine Access control & Authorizations CC3.1R5 Non - Conformities Evidences & Versioning Vulnerability inbox
  • 18. CCCAB Specification • Analysis of current tools used by CBs • Information flows identification • Information Exchange languages specification Validation Framework • Access Control and PM system • Interface development • Evidence management • Report printing • NCs Management • Version Management Smart Validation System • ITSEF Communications parser • Manufacturer communications parser • Autofill • Expert tips Adaptation to the EUCC scheme • Communication module with ENISA website • Compliance Monitoring System and non- compliance handling Validation • Full Project using CCCAB • Guidance development • Final version release Action plan
  • 21. ❑ Define the Open Source licensing model ❑ Release the source code ❑ Test the tool properly in a real use cases with the partners ❑ Develop the connection with the ENISA website, which is not yet up and running ❑ Making stakeholders aware of the tool Conclusions & ToDos
  • 22. jtsec Beyond IT Security Granada & Madrid – Spain hello@jtsec.es @jtsecES www.jtsec.es Contact “Any fool can make something complicated. It takes a genius to make it simple.” Woody Guthrie