Security Arch Flashcards
Common Criteria
ISO 15408
CC - intermediate combination of security
requirement components
package
ITSEC and TCSEC mapping
F1+E1C1 F2+E2C2 F3+E3B1 F4+E4B2 F5+E5B3 F5+E6A1
trusted recovery, reference monitor, security admin role clearly defined, design should not be too complex
B3
Structured - Covert timing channels and SOD, trusted facility management (TFM)
B2
operational assurance requirements specified in the Orange Book
System Architecture System integrity Covert channel analysis Trusted facility management Trusted recovery
life cycle assurance requirements specified in the Orange Book
Security testing
Design specification and testing
Configuration Management
Trusted Distribution
Clark Wilson - integrity rules
Integrity-monitoring
rules are called certification rules, and integrity-preserving rules are called
enforcement rules.
Custodian
Preserves the information’s CIA