Book - Chapter 13 Flashcards
What is the Trusted Computer Security Evaluation Criteria?
The Trusted Computer Security Evaluation Criteria (TCSEC, Orange Book) were the first evaluation criteria to gain wide acceptance. Several criteria have since been developed to react to perceived shortcomings of the Orange Book and to the changes in the use of IT systems. The desire to unify the different criteria that have arisen has led to the Common Criteria
What is a product?
off-the-shelf components that can be used in a variety of applications and have to meet generic security equirements (e.g. an operating system)
What is a system?
collections of products assembled to meet the specific requirements of a given application
What situations should evaluation methods prevent from arising?
- An evaluated product is later found to contain a serious flaw.
- Different evaluations of the same product disagree in their assessment of the product.
Repeatability (re-evaluation by the same team gives the same result) and reproducibility (re-evaluation by a different team gives the same result) are therefore often stated as requirements of an evaluation methodology.
What are some different evaluation methods?
Security evaluation can be product-oriented or process-oriented.
Product-oriented (investigational) methods examine and test the product. They may tell more about the product than process-oriented methods, but different evaluations may well give different results.
Process (audit) oriented methods look at documentation and the process of product development. They are cheaper and it is much easier to achieve repeatable results, but the results themselves may not be very valuable.
What is evaluation criteria?
Evaluation criteria capture the procedures to follow when performing security tests.
With regards to the Orange Book, what do the terms evaluation, certification and accreditation mean?
- evaluation – assessing whether a product has the security properties claimed for it; this is the test of a security product;
- certification – assessing whether an (evaluated) product is suitable for a given application; this is the best practice recommendation;
- accreditation – deciding that a (certified) product will be used in a given application; this is the executive decision.
What assurance does a security evaluation aim for?
Security evaluation aims to give assurance that a product/system is secure. Security and assurance may be related to:
- functionality – the security features of a system, e.g. discretionary access control, mandatory access control, authentication, auditing.
- effectiveness – are the mechanisms used appropriate for the given security requirements? For example, is user authentication by password sufficient or does the application require a cryptographic challenge-response protocol?
- assurance – the thoroughness of the evaluation.
What does security evaluation examine?
Security evaluation examines the security-relevant part of a system, i.e. the trusted computing base
With regards to the Orange Book, how many security divisions and security classes are there?
There are four security divisions and seven security classes. The security classes are defined incrementally. All requirements of one class are automatically included in the requirements of all higher classes. Products in higher security classes provide more security mechanisms and higher assurance through more rigorous analysis.
What are the four security divisions in regards to the Orange Book?
In regards to the Orange Book, what do C2 systems provide?
C2 systems make users individually accountable for their actions, enforcing discretionary access control at the granularity of single users. C2 was regarded as the most reasonable class for commercial applications although intrinsically giving rather weak assurance guarantees. Most major vendors offered C2-evaluated versions of their operating systems or database management systems
In regards to the Orange Book, what is division B intended for?
Division B is intended for products that enforce mandatory access control policies on classified data. Testing and documentation have to be much more thorough than for
division C. An informal or formal model of the security policy is required. All flaws uncovered in testing must be removed.
In regards to the Orange Book, what do B1 systems provide?
Class B1 is not very demanding with respect
to the structure of the TCB. Hence, complex software systems such as multi-level secure Unix systems – System V/MLS (from AT&T) and operating systems from vendors like Hewlett-Packard, DEC, and Unisys – or database management systems – Trusted
Oracle 7, INFORMIX-Online/Secure, and Secure SQL Server (from Sybase) – received B1 certificates.
In regards to the Orange Book, what do B2 systems provide?
Class B2 increases assurance requirements. A formal model of the security policy and a Descriptive Top Level Specification (DTLS) of the system are required, as is a modular system architecture. The TCB shall provide distinct address spaces to isolate processes, with support at the hardware level. A covert channel analysis has to be conducted and events potentially creating a covert channel have to be audited. Security testing shall establish that the TCB is relatively resistant to penetration. The Trusted XENIX operating system from Trusted Information Systems was rated B2.