SlideShare a Scribd company logo
1 of 41
Download to read offline
Vishnu Kesarwani
             IMS2007011
MS (Cyber Law & Information Security)
           IIIT-Allahabad
   Introduction
   Assurance Paradigm
   Security Assurance Requirements
   EAL Structure
   Relationship Between Assurances Requirements And Assurance Levels
   Assurance Categorization
   Protection Profile Criteria Overview
   Security Target Criteria Overview
   Class APE: Protection Profile Evaluation
   Class ASE: Security Target Evaluation
   Evaluation Assurance Levels
      Evaluation Assurance Level 1 - Functionally Tested
      Evaluation Assurance Level 2 Structurally Tested
      Evaluation Assurance Level 3 Methodically Tested And Checked
      Evaluation Assurance Level 4 - Methodically Designed, Tested, And Reviewed
      Evaluation Assurance Level 5 - Semiformally Designed And Tested
      Evaluation Assurance Level 6 - Semiformally Verified Design And Tested
      Evaluation Assurance Level 7 - Formally Verified Design And Tested
Part 3 of ISO/IEC 15408
                   (Security Assurance Requirements)

 Catalogues the set of assurance components, families and classes.
 Defines evaluation criteria for Protection Profiles (PPs) and Security
  Targets (STs).
 Presents Evaluation Assurance Levels (EALs) that define the
  predefined ISO/IEC 15408 (Common Criteria-CC) scale for rating
  assurance for Target of Evaluations (TOEs).
 Audience for this part of CC
    Consumers,
    Developers, And
    Evaluators
  of secure IT systems and products.
Defines Security Assurance Requirements:
   A basis for the security assurance requirements
    expressed in a PP or a ST.
   Establishes a standard way of expressing the assurance
    requirements for TOEs.
1. Philosophy
 The threats to security and organizational security policy
  commitments should be clearly articulated
 The proposed security measures should be demonstrably
  sufficient for their intended purpose.
 Measures should be adopted that
   reduce the likelihood of vulnerabilities,
   the ability to exercise a vulnerability, and
   the extent of the damage that could occur from a vulnerability
    being exercised
   facilitate the subsequent identification of vulnerabilities and
    the elimination, mitigation, and/or notification that a
    vulnerability has been exploited or triggered.
2. Assurance Approach
assurance based upon an evaluation of the IT product or system that is to
  be trusted.
                   Assurance Through Evaluation
Evaluation techniques can include
   a) analysis and checking of process(es) and procedure(s);
   b) checking that process(es) and procedure(s) are being applied;
   c) analysis of the correspondence between TOE design representations;
   d) analysis of the TOE design representation against the requirements;
   e) verification of proofs;
   f) analysis of guidance documents;
   g) analysis of functional tests developed and the results provided;
   h) independent functional testing;
   i) analysis for vulnerabilities (including flaw hypothesis);
   j) penetration testing.
Significance of Vulnerabilities
 IT security breaches arise through the intentional exploitation or
  the unintentional triggering of vulnerabilities in the application
  of IT within business concerns.
 Steps to prevent vulnerabilities
    Eliminated
    Minimized
    Monitored


                     Cause of Vulnerabilities
Vulnerabilities can arise through failures in:
    Requirements
    Construction
    operation
3. Evaluation Assurance Scale
This scale provides:
 Greater assurance
 Minimum effort


Level of effort is based upon
 Scope
 Depth
 Rigour
 Protection Profile evaluation
 Relation to the Security Target evaluation criteria
 Evaluator tasks
    Evaluator tasks for an evaluation based on CC requirements
     only




    Evaluator tasks for an CC extended evaluation
 Security Target evaluation
 Relation to the other evaluation criteria in this part of CC
 Evaluator tasks
    Evaluator tasks for an evaluation based on CC requirements only




    Evaluator tasks for a CC extended evaluation
 The goal of a PP evaluation is to demonstrate that the
  PP is complete, consistent and technically sound.

 An evaluated PP is suitable for use as the basis for the
  development of STs.

 Such a PP is eligible for inclusion in a registry.
 Objectives
 Application
    notes
   Dependencies
   Developer
    action elements
   Content and
    presentation of
    evidence
    elements
   Evaluator action
    elements
 The goal of an ST evaluation is to demonstrate that
    the ST is complete, consistent, technically sound, and
    suitable for use as the basis for the corresponding TOE evaluation.

                                                     Objectives
                                                     Application
                                                        notes
                                                       Dependencies
                                                       Developer action
                                                        elements
                                                       Content and
                                                        presentation of
                                                        evidence
                                                        elements
                                                       Evaluator action
                                                        elements
 an increasing scale that balances the level of assurance obtained with
  the cost and feasibility of acquiring that degree of assurance.
Objectives
 EAL1 is applicable where some confidence in correct
  operation is required, but the threats to security are
  not viewed as serious.

 EAL1 provides
   an evaluation of the TOE as made available to the
    customer, including independent testing against a
    specification, and
   an examination of the guidance documentation
    provided.
Assurance components
 EAL1 provides a basic level of assurance by an analysis of
  the security functions using
   a functional and interface specification, and
   guidance documentation,
  to understand the security behaviour.

 The analysis is supported by independent testing of the
  TOE security functions.

 This EAL provides a meaningful increase in assurance over
  an unevaluated IT product or system.
Objectives
 applicable in those circumstances where developers or users require a
  low to moderate level of independently assured security in the absence
  of ready availability of the complete development record,
 requires the co-operation of the developer in terms of the delivery of
  design information and test results

Assurance components
 EAL2 provides assurance by
    an analysis of the security functions using
        a functional and interface specification,
        guidance documentation and
        the high-level design of the TOE,
     to understand the security behaviour.
    a configuration list for the TOE, and
    evidence of secure delivery procedures.
 The analysis is supported by
      independent testing of the TOE security functions,
      evidence of developer testing based on the functional specification,
      selective independent confirmation of the developer test results,
      strength of function analysis, and
      evidence of a developer search for obvious vulnerabilities

 This EAL represents a meaningful increase in assurance from
  EAL1 by requiring
    developer testing,
    a vulnerability analysis, and
    independent testing based upon more detailed TOE specifications.
Objectives
 permits a developer to gain maximum assurance from positive security engineering at the
  design stage without substantial alteration of existing sound development practices.
 applicable in those circumstances where developers or users require a moderate level of
  independently assured security, and require a thorough investigation of the TOE and its
  development without substantial re-engineering.

Assurance components
 EAL3 provides assurance by
    an analysis of the security functions, using
        a functional and interface specification,
        guidance documentation, and
        the high-level design of the TOE,
        to understand the security behaviour.
       the use of
           development environment controls,
           TOE configuration management, and
           evidence of secure delivery procedures.
 The analysis is supported by
   independent testing of the TOE security functions,
   evidence of developer testing based on the functional
    specification and high-level design,
   selective independent confirmation of the developer test
    results,
   strength of function analysis, and
   evidence of a developer search for obvious vulnerabilities.


 This EAL represents a meaningful increase in assurance
  from EAL2 by requiring
    more complete testing coverage of the security functions and
     mechanisms and/or procedures that provide some confidence
     that the TOE will not be tampered with during development.
Objectives
 permits a developer to gain maximum assurance from positive security engineering based
  on good commercial development practices which, though rigorous, do not require
  substantial specialist knowledge, skills, and other resources.
 applicable in those circumstances where developers or users require a moderate to high
  level of independently assured security in conventional commodity TOEs and are
  prepared to incur additional security-specific engineering costs.

Assurance components
 EAL4 provides assurance by
       an analysis of the security functions, using
            a functional and complete interface specification,
            guidance documentation,
            the high-level and low-level design of the TOE,
            a subset of the implementation,
        to understand the security behaviour
       an informal model of the TOE security policy,
       the use of development environment controls ,
       additional TOE configuration management including automation, and
       evidence of secure delivery procedures
 The analysis is supported by
    independent testing of the TOE security functions,
    evidence of developer testing based on the functional specification and
       high-level design,
      selective independent confirmation of the developer test results,
      strength of function analysis,
      evidence of a developer search for vulnerabilities, and
      an independent vulnerability analysis demonstrating resistance to
       penetration attackers with a low attack potential.

This EAL represents a meaningful increase in assurance from EAL3 by
  requiring
 more design description,
 a subset of the implementation, and
 improved mechanisms and/or procedures that provide confidence that the
  TOE will not be tampered with during development or delivery.
Objectives
   permits a developer to gain maximum assurance from security engineering
   Applicable where developers or users require a high level of independently assured security in a planned
    development and require a rigorous development approach without incurring unreasonable costs attributable
    to specialist security engineering techniques.
Assurance components
   EAL5 provides assurance by
      an analysis of the security functions, using
           a functional and complete interface specification,
           guidance documentation,
           the high-level and low-level design of the TOE,
           all of the implementation,
        to understand the security behaviour.
      a formal model of the TOE security policy,
      a semiformal presentation of the functional specification and high-level design, and a semiformal
        demonstration of correspondence between them,
      a modular TOE design,
      the use of
           a development environment controls,
           comprehensive TOE configuration management including automation, and
           evidence of secure delivery procedures.
   The analysis is supported by
        independent testing of the TOE security functions,
        evidence of developer testing based on the functional specification, and high-level design
         and low-level design,
        selective independent confirmation of the developer test results,
        strength of function analysis,
        evidence of a developer search for vulnerabilities,
        an independent vulnerability analysis demonstrating resistance to penetration attackers
         with a moderate attack potential, and
        validation of the developer's covert channel analysis.

   This EAL represents a meaningful increase in assurance from EAL4 by requiring
        semiformal design descriptions,
        the entire implementation,
        a more structured architecture,
        covert channel analysis, and
        improved mechanisms and/or procedures that provide confidence that the TOE will not be
         tampered with during development.
Objectives
 permits developers to gain high assurance from application of security engineering techniques to a
  rigorous development environment in order to produce a premium TOE for protecting high value
  assets against significant risks.
 applicable to the development of security TOEs for application in high risk situations where the value
  of the protected assets justifies the additional costs.

Assurance components
 EAL6 provides assurance by
       an analysis of the security functions, using
             a functional and complete interface specification,
             guidance documentation,
             the high-level and low-level design of the of the TOE,
             a structured presentation of the implementation,
        to understand the security behaviour,
       a formal model of the TOE security policy,
       a semiformal presentation of the functional specification, high-level design, and low-level design and a
        semiformal demonstration of correspondence between them,
       a modular and layered TOE design, and
       the use of
             a structured development process,
             development environment controls,
             comprehensive TOE configuration management including complete automation, and
             evidence of secure delivery procedures.
   The analysis is supported by
        independent testing of the TOE security functions,
        evidence of developer testing based on the functional specification, high-level design and
         low-level design,
        selective independent confirmation of the developer test results,
        strength of function analysis,
        evidence of a developer search for vulnerabilities,
        an independent vulnerability analysis demonstrating resistance to penetration attackers
         with a high attack potential, and
        validation of the developer's systematic covert channel analysis.

   This EAL represents a meaningful increase in assurance from EAL5 by requiring
        more comprehensive analysis,
        a structured representation of the implementation,
        more architectural structure (e.g. layering),
        more comprehensive independent vulnerability analysis,
        systematic covert channel identification, and
        improved configuration management and development environment controls.
Objectives
 applicable to the development of security TOEs for application in extremely high risk situations
  and/or where the high value of the assets justifies the higher costs.

Assurance components
 EAL7 provides assurance by
     an analysis of the security functions, using
         a functional and complete interface specification,
         guidance documentation,
         the high-level and low-level design of the TOE, and
         a structured presentation of the implementation,
       to understand the security behaviour.
     a formal model of the TOE security policy,
     a formal presentation of the functional specification and high-level design,
     a semiformal presentation of the low-level design,
     formal and semiformal demonstration of correspondence between them
     a modular, layered and simple TOE design , and
     the use of
         a structured development process,
         development environment controls,
         comprehensive TOE configuration management including complete automation, and
         evidence of secure delivery procedures.
 The analysis is supported by
    independent testing of the TOE security functions,
    evidence of developer testing based on the functional specification
       high-level design, low-level design and implementation representation,
      complete independent confirmation of the developer test results,
      strength of function analysis,
      evidence of a developer search for vulnerabilities
      an independent vulnerability analysis demonstrating resistance to
       penetration attackers with a high attack potential , and
      validation of the developer‘s systematic covert channel analysis.

 This EAL represents a meaningful increase in assurance from EAL6 by
  requiring
    more comprehensive analysis using formal representations and formal
     correspondence, and
    comprehensive testing.
 Information   Technology  —     Security
 Techniques — Evaluation Criteria For IT
 Security                            Part3:
 Security Assurance Requirements (ISO/IEC
 15408-3)
Information Technology  Security Techniques Evaluation Criteria For It Secrity Part 3 Security Assurance Requirements Iso Iec 15408 3

More Related Content

What's hot

Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacksJoe McCarthy
 
Kiviat diagrams & Goal Structuring Notation
Kiviat diagrams & Goal Structuring NotationKiviat diagrams & Goal Structuring Notation
Kiviat diagrams & Goal Structuring NotationImMe Khan
 
Introduction to Penetration Testing
Introduction to Penetration TestingIntroduction to Penetration Testing
Introduction to Penetration TestingAndrew McNicol
 
Siber Güvenlikte Yapay Zeka Uygulamaları - Webinar
Siber Güvenlikte Yapay Zeka Uygulamaları - WebinarSiber Güvenlikte Yapay Zeka Uygulamaları - Webinar
Siber Güvenlikte Yapay Zeka Uygulamaları - WebinarBGA Cyber Security
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
Step-by-step Development of an Application for the Java Card Connected Platform
Step-by-step Development of an Application for the Java Card Connected PlatformStep-by-step Development of an Application for the Java Card Connected Platform
Step-by-step Development of an Application for the Java Card Connected PlatformEric Vétillard
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Deep Learning for Stock Prediction
Deep Learning for Stock PredictionDeep Learning for Stock Prediction
Deep Learning for Stock PredictionLim Zhi Yuan (Zane)
 
Information Security Career Day Presentation
Information Security Career Day PresentationInformation Security Career Day Presentation
Information Security Career Day Presentationdjglass
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...Criminal IP
 
4 Operations Security
4 Operations Security4 Operations Security
4 Operations SecurityAlfred Ouyang
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam Donald E. Hester
 
Threat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesThreat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesFrédéric Sagez
 
Compare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework TypesCompare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework TypesLearningwithRayYT
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIMESou Jana
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementPriyanka Aash
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacks
 
Kiviat diagrams & Goal Structuring Notation
Kiviat diagrams & Goal Structuring NotationKiviat diagrams & Goal Structuring Notation
Kiviat diagrams & Goal Structuring Notation
 
Introduction to Penetration Testing
Introduction to Penetration TestingIntroduction to Penetration Testing
Introduction to Penetration Testing
 
Siber Güvenlikte Yapay Zeka Uygulamaları - Webinar
Siber Güvenlikte Yapay Zeka Uygulamaları - WebinarSiber Güvenlikte Yapay Zeka Uygulamaları - Webinar
Siber Güvenlikte Yapay Zeka Uygulamaları - Webinar
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Step-by-step Development of an Application for the Java Card Connected Platform
Step-by-step Development of an Application for the Java Card Connected PlatformStep-by-step Development of an Application for the Java Card Connected Platform
Step-by-step Development of an Application for the Java Card Connected Platform
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Deep Learning for Stock Prediction
Deep Learning for Stock PredictionDeep Learning for Stock Prediction
Deep Learning for Stock Prediction
 
Information Security Career Day Presentation
Information Security Career Day PresentationInformation Security Career Day Presentation
Information Security Career Day Presentation
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 
4 Operations Security
4 Operations Security4 Operations Security
4 Operations Security
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
 
Threat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesThreat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devices
 
Seminario iso 27000 pronto
Seminario iso 27000 prontoSeminario iso 27000 pronto
Seminario iso 27000 pronto
 
Compare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework TypesCompare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework Types
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 

Viewers also liked

G321 Marking Criteria
G321 Marking CriteriaG321 Marking Criteria
G321 Marking Criteriajfoster10
 
FITT Toolbox: Evaluation Criteria
FITT Toolbox: Evaluation CriteriaFITT Toolbox: Evaluation Criteria
FITT Toolbox: Evaluation CriteriaFITT
 
Sensory evaluation of essential oil final ppt by shivanand m.r
Sensory evaluation of essential oil final ppt by  shivanand m.rSensory evaluation of essential oil final ppt by  shivanand m.r
Sensory evaluation of essential oil final ppt by shivanand m.rUHS Bagalkot, KRCCH Arabhavi
 
Evaluation of training
Evaluation of trainingEvaluation of training
Evaluation of trainingSelf-employed
 
Training evaluation ppt 6
Training evaluation   ppt 6Training evaluation   ppt 6
Training evaluation ppt 6SBMC Jobs
 

Viewers also liked (7)

G321 Marking Criteria
G321 Marking CriteriaG321 Marking Criteria
G321 Marking Criteria
 
FITT Toolbox: Evaluation Criteria
FITT Toolbox: Evaluation CriteriaFITT Toolbox: Evaluation Criteria
FITT Toolbox: Evaluation Criteria
 
Sensory evaluation of essential oil final ppt by shivanand m.r
Sensory evaluation of essential oil final ppt by  shivanand m.rSensory evaluation of essential oil final ppt by  shivanand m.r
Sensory evaluation of essential oil final ppt by shivanand m.r
 
Thesis evaluation criteria
Thesis evaluation criteriaThesis evaluation criteria
Thesis evaluation criteria
 
Evaluation of training
Evaluation of trainingEvaluation of training
Evaluation of training
 
Training evaluation
Training evaluationTraining evaluation
Training evaluation
 
Training evaluation ppt 6
Training evaluation   ppt 6Training evaluation   ppt 6
Training evaluation ppt 6
 

Similar to Information Technology Security Techniques Evaluation Criteria For It Secrity Part 3 Security Assurance Requirements Iso Iec 15408 3

CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoJinElias52
 
Verifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasiVerifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasirizqiariy
 
Standards for safety and security in avionics
Standards for safety and security in avionicsStandards for safety and security in avionics
Standards for safety and security in avionicsAlessandro Bruni
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...IJNSA Journal
 
QualityAssurance.pdf
QualityAssurance.pdfQualityAssurance.pdf
QualityAssurance.pdfkumari36
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life CycleMaurice Dawson
 
Software Testing and Quality Assurance unit1
Software Testing and Quality Assurance  unit1Software Testing and Quality Assurance  unit1
Software Testing and Quality Assurance unit1Bhagyashree Dhakulkar
 
Edgilis principles of isa may11
Edgilis principles of isa may11Edgilis principles of isa may11
Edgilis principles of isa may11Max Armbruster
 
Profile based security assurance for service
Profile based security assurance for serviceProfile based security assurance for service
Profile based security assurance for serviceIESS
 
ISO_IEC standards_quality.pptx
ISO_IEC standards_quality.pptxISO_IEC standards_quality.pptx
ISO_IEC standards_quality.pptxKamalKamalli1
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...Mark John Lado, MIT
 
Software reliability engineering
Software reliability engineeringSoftware reliability engineering
Software reliability engineeringMark Turner CRP
 
Unit II Software Testing and Quality Assurance
Unit II Software Testing and Quality AssuranceUnit II Software Testing and Quality Assurance
Unit II Software Testing and Quality AssuranceVinothkumaR Ramu
 

Similar to Information Technology Security Techniques Evaluation Criteria For It Secrity Part 3 Security Assurance Requirements Iso Iec 15408 3 (20)

CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
 
Verifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasiVerifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasi
 
Standards for safety and security in avionics
Standards for safety and security in avionicsStandards for safety and security in avionics
Standards for safety and security in avionics
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 
Ijcatr04051006
Ijcatr04051006Ijcatr04051006
Ijcatr04051006
 
QualityAssurance.pdf
QualityAssurance.pdfQualityAssurance.pdf
QualityAssurance.pdf
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
Software Testing and Quality Assurance unit1
Software Testing and Quality Assurance  unit1Software Testing and Quality Assurance  unit1
Software Testing and Quality Assurance unit1
 
Edgilis principles of isa may11
Edgilis principles of isa may11Edgilis principles of isa may11
Edgilis principles of isa may11
 
Profile based security assurance for service
Profile based security assurance for serviceProfile based security assurance for service
Profile based security assurance for service
 
Unit 4 standards.ppt
Unit 4 standards.pptUnit 4 standards.ppt
Unit 4 standards.ppt
 
ISO_IEC standards_quality.pptx
ISO_IEC standards_quality.pptxISO_IEC standards_quality.pptx
ISO_IEC standards_quality.pptx
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
 
Ab04507161167
Ab04507161167Ab04507161167
Ab04507161167
 
Quality Assurance
Quality AssuranceQuality Assurance
Quality Assurance
 
Software reliability engineering
Software reliability engineeringSoftware reliability engineering
Software reliability engineering
 
Unit II Software Testing and Quality Assurance
Unit II Software Testing and Quality AssuranceUnit II Software Testing and Quality Assurance
Unit II Software Testing and Quality Assurance
 
@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Information Technology Security Techniques Evaluation Criteria For It Secrity Part 3 Security Assurance Requirements Iso Iec 15408 3

  • 1. Vishnu Kesarwani IMS2007011 MS (Cyber Law & Information Security) IIIT-Allahabad
  • 2. Introduction  Assurance Paradigm  Security Assurance Requirements  EAL Structure  Relationship Between Assurances Requirements And Assurance Levels  Assurance Categorization  Protection Profile Criteria Overview  Security Target Criteria Overview  Class APE: Protection Profile Evaluation  Class ASE: Security Target Evaluation  Evaluation Assurance Levels  Evaluation Assurance Level 1 - Functionally Tested  Evaluation Assurance Level 2 Structurally Tested  Evaluation Assurance Level 3 Methodically Tested And Checked  Evaluation Assurance Level 4 - Methodically Designed, Tested, And Reviewed  Evaluation Assurance Level 5 - Semiformally Designed And Tested  Evaluation Assurance Level 6 - Semiformally Verified Design And Tested  Evaluation Assurance Level 7 - Formally Verified Design And Tested
  • 3. Part 3 of ISO/IEC 15408 (Security Assurance Requirements)  Catalogues the set of assurance components, families and classes.  Defines evaluation criteria for Protection Profiles (PPs) and Security Targets (STs).  Presents Evaluation Assurance Levels (EALs) that define the predefined ISO/IEC 15408 (Common Criteria-CC) scale for rating assurance for Target of Evaluations (TOEs).  Audience for this part of CC  Consumers,  Developers, And  Evaluators of secure IT systems and products.
  • 4. Defines Security Assurance Requirements:  A basis for the security assurance requirements expressed in a PP or a ST.  Establishes a standard way of expressing the assurance requirements for TOEs.
  • 5. 1. Philosophy  The threats to security and organizational security policy commitments should be clearly articulated  The proposed security measures should be demonstrably sufficient for their intended purpose.  Measures should be adopted that  reduce the likelihood of vulnerabilities,  the ability to exercise a vulnerability, and  the extent of the damage that could occur from a vulnerability being exercised  facilitate the subsequent identification of vulnerabilities and the elimination, mitigation, and/or notification that a vulnerability has been exploited or triggered.
  • 6. 2. Assurance Approach assurance based upon an evaluation of the IT product or system that is to be trusted. Assurance Through Evaluation Evaluation techniques can include a) analysis and checking of process(es) and procedure(s); b) checking that process(es) and procedure(s) are being applied; c) analysis of the correspondence between TOE design representations; d) analysis of the TOE design representation against the requirements; e) verification of proofs; f) analysis of guidance documents; g) analysis of functional tests developed and the results provided; h) independent functional testing; i) analysis for vulnerabilities (including flaw hypothesis); j) penetration testing.
  • 7. Significance of Vulnerabilities  IT security breaches arise through the intentional exploitation or the unintentional triggering of vulnerabilities in the application of IT within business concerns.  Steps to prevent vulnerabilities  Eliminated  Minimized  Monitored Cause of Vulnerabilities Vulnerabilities can arise through failures in:  Requirements  Construction  operation
  • 8. 3. Evaluation Assurance Scale This scale provides:  Greater assurance  Minimum effort Level of effort is based upon  Scope  Depth  Rigour
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.  Protection Profile evaluation  Relation to the Security Target evaluation criteria  Evaluator tasks  Evaluator tasks for an evaluation based on CC requirements only  Evaluator tasks for an CC extended evaluation
  • 14.  Security Target evaluation  Relation to the other evaluation criteria in this part of CC  Evaluator tasks  Evaluator tasks for an evaluation based on CC requirements only  Evaluator tasks for a CC extended evaluation
  • 15.  The goal of a PP evaluation is to demonstrate that the PP is complete, consistent and technically sound.  An evaluated PP is suitable for use as the basis for the development of STs.  Such a PP is eligible for inclusion in a registry.
  • 16.  Objectives  Application notes  Dependencies  Developer action elements  Content and presentation of evidence elements  Evaluator action elements
  • 17.  The goal of an ST evaluation is to demonstrate that  the ST is complete, consistent, technically sound, and  suitable for use as the basis for the corresponding TOE evaluation.  Objectives  Application notes  Dependencies  Developer action elements  Content and presentation of evidence elements  Evaluator action elements
  • 18.  an increasing scale that balances the level of assurance obtained with the cost and feasibility of acquiring that degree of assurance.
  • 19. Objectives  EAL1 is applicable where some confidence in correct operation is required, but the threats to security are not viewed as serious.  EAL1 provides  an evaluation of the TOE as made available to the customer, including independent testing against a specification, and  an examination of the guidance documentation provided.
  • 20. Assurance components  EAL1 provides a basic level of assurance by an analysis of the security functions using  a functional and interface specification, and  guidance documentation, to understand the security behaviour.  The analysis is supported by independent testing of the TOE security functions.  This EAL provides a meaningful increase in assurance over an unevaluated IT product or system.
  • 21.
  • 22. Objectives  applicable in those circumstances where developers or users require a low to moderate level of independently assured security in the absence of ready availability of the complete development record,  requires the co-operation of the developer in terms of the delivery of design information and test results Assurance components  EAL2 provides assurance by  an analysis of the security functions using  a functional and interface specification,  guidance documentation and  the high-level design of the TOE, to understand the security behaviour.  a configuration list for the TOE, and  evidence of secure delivery procedures.
  • 23.  The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification,  selective independent confirmation of the developer test results,  strength of function analysis, and  evidence of a developer search for obvious vulnerabilities  This EAL represents a meaningful increase in assurance from EAL1 by requiring  developer testing,  a vulnerability analysis, and  independent testing based upon more detailed TOE specifications.
  • 24.
  • 25. Objectives  permits a developer to gain maximum assurance from positive security engineering at the design stage without substantial alteration of existing sound development practices.  applicable in those circumstances where developers or users require a moderate level of independently assured security, and require a thorough investigation of the TOE and its development without substantial re-engineering. Assurance components  EAL3 provides assurance by  an analysis of the security functions, using  a functional and interface specification,  guidance documentation, and  the high-level design of the TOE, to understand the security behaviour.  the use of  development environment controls,  TOE configuration management, and  evidence of secure delivery procedures.
  • 26.  The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification and high-level design,  selective independent confirmation of the developer test results,  strength of function analysis, and  evidence of a developer search for obvious vulnerabilities.  This EAL represents a meaningful increase in assurance from EAL2 by requiring  more complete testing coverage of the security functions and mechanisms and/or procedures that provide some confidence that the TOE will not be tampered with during development.
  • 27.
  • 28. Objectives  permits a developer to gain maximum assurance from positive security engineering based on good commercial development practices which, though rigorous, do not require substantial specialist knowledge, skills, and other resources.  applicable in those circumstances where developers or users require a moderate to high level of independently assured security in conventional commodity TOEs and are prepared to incur additional security-specific engineering costs. Assurance components  EAL4 provides assurance by  an analysis of the security functions, using  a functional and complete interface specification,  guidance documentation,  the high-level and low-level design of the TOE,  a subset of the implementation, to understand the security behaviour  an informal model of the TOE security policy,  the use of development environment controls ,  additional TOE configuration management including automation, and  evidence of secure delivery procedures
  • 29.  The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification and high-level design,  selective independent confirmation of the developer test results,  strength of function analysis,  evidence of a developer search for vulnerabilities, and  an independent vulnerability analysis demonstrating resistance to penetration attackers with a low attack potential. This EAL represents a meaningful increase in assurance from EAL3 by requiring  more design description,  a subset of the implementation, and  improved mechanisms and/or procedures that provide confidence that the TOE will not be tampered with during development or delivery.
  • 30.
  • 31. Objectives  permits a developer to gain maximum assurance from security engineering  Applicable where developers or users require a high level of independently assured security in a planned development and require a rigorous development approach without incurring unreasonable costs attributable to specialist security engineering techniques. Assurance components  EAL5 provides assurance by  an analysis of the security functions, using  a functional and complete interface specification,  guidance documentation,  the high-level and low-level design of the TOE,  all of the implementation, to understand the security behaviour.  a formal model of the TOE security policy,  a semiformal presentation of the functional specification and high-level design, and a semiformal demonstration of correspondence between them,  a modular TOE design,  the use of  a development environment controls,  comprehensive TOE configuration management including automation, and  evidence of secure delivery procedures.
  • 32. The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification, and high-level design and low-level design,  selective independent confirmation of the developer test results,  strength of function analysis,  evidence of a developer search for vulnerabilities,  an independent vulnerability analysis demonstrating resistance to penetration attackers with a moderate attack potential, and  validation of the developer's covert channel analysis.  This EAL represents a meaningful increase in assurance from EAL4 by requiring  semiformal design descriptions,  the entire implementation,  a more structured architecture,  covert channel analysis, and  improved mechanisms and/or procedures that provide confidence that the TOE will not be tampered with during development.
  • 33.
  • 34. Objectives  permits developers to gain high assurance from application of security engineering techniques to a rigorous development environment in order to produce a premium TOE for protecting high value assets against significant risks.  applicable to the development of security TOEs for application in high risk situations where the value of the protected assets justifies the additional costs. Assurance components  EAL6 provides assurance by  an analysis of the security functions, using  a functional and complete interface specification,  guidance documentation,  the high-level and low-level design of the of the TOE,  a structured presentation of the implementation, to understand the security behaviour,  a formal model of the TOE security policy,  a semiformal presentation of the functional specification, high-level design, and low-level design and a semiformal demonstration of correspondence between them,  a modular and layered TOE design, and  the use of  a structured development process,  development environment controls,  comprehensive TOE configuration management including complete automation, and  evidence of secure delivery procedures.
  • 35. The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification, high-level design and low-level design,  selective independent confirmation of the developer test results,  strength of function analysis,  evidence of a developer search for vulnerabilities,  an independent vulnerability analysis demonstrating resistance to penetration attackers with a high attack potential, and  validation of the developer's systematic covert channel analysis.  This EAL represents a meaningful increase in assurance from EAL5 by requiring  more comprehensive analysis,  a structured representation of the implementation,  more architectural structure (e.g. layering),  more comprehensive independent vulnerability analysis,  systematic covert channel identification, and  improved configuration management and development environment controls.
  • 36.
  • 37. Objectives  applicable to the development of security TOEs for application in extremely high risk situations and/or where the high value of the assets justifies the higher costs. Assurance components  EAL7 provides assurance by  an analysis of the security functions, using  a functional and complete interface specification,  guidance documentation,  the high-level and low-level design of the TOE, and  a structured presentation of the implementation, to understand the security behaviour.  a formal model of the TOE security policy,  a formal presentation of the functional specification and high-level design,  a semiformal presentation of the low-level design,  formal and semiformal demonstration of correspondence between them  a modular, layered and simple TOE design , and  the use of  a structured development process,  development environment controls,  comprehensive TOE configuration management including complete automation, and  evidence of secure delivery procedures.
  • 38.  The analysis is supported by  independent testing of the TOE security functions,  evidence of developer testing based on the functional specification high-level design, low-level design and implementation representation,  complete independent confirmation of the developer test results,  strength of function analysis,  evidence of a developer search for vulnerabilities  an independent vulnerability analysis demonstrating resistance to penetration attackers with a high attack potential , and  validation of the developer‘s systematic covert channel analysis.  This EAL represents a meaningful increase in assurance from EAL6 by requiring  more comprehensive analysis using formal representations and formal correspondence, and  comprehensive testing.
  • 39.
  • 40.  Information Technology — Security Techniques — Evaluation Criteria For IT Security Part3: Security Assurance Requirements (ISO/IEC 15408-3)