Common Criteria Methodology

  1. Tutorial Overview
    1. Lab Resources
    2. Preliminary Questions
    3. Lab Objective
  2. General Evaluation Guidelines
    1. PP Evaluation
    2. ST Evaluation
    3. TOE Evaluation
    4. Evaluation Methodology
    5. Evaluation Verdicts
    6. Evaluation Example
    7. CC / CEM Relationship
  3. Evaluation of Functional Requirements of TOE
    1. Audit Function
    2. Security Management Function
    3. Resource Utilization Function
    4. User Data Protection Function
    5. Cryptographic Support
    6. Identification and Authentication Functions
    7. Authentication
    8. User Attributes
    9. Protected Data Transfer
    10. Session Locking Functions
    11. Validation Action Guidelines
  4. Lab Report
    1. Questions
  5. References

Tutorial Overview

This tutorial will introduce you to The Common Criteria (CC), which comprises two parts. The first part is a structure and language for expressing product/system IT security requirements (Part 1). The second part is a catalog of standardized IT security requirement components and packages (Parts 2 and 3). In this tutorial you will evaluate a Protection Profile (PP), Security Target (ST), and Target of Evaluation (TOE), which require you to use CC Part 1. After evaluating a product you will have to generate your own ST for a product.

This tutorial is divided into five sections. The first goes over what resources is required to complete this tutorial and asks some preliminary questions. The second describes general evaluation guidelines, that include PP, ST, and TOE. The third section covers the evaluation of functional requirements of TOE. The final two sections are the tutorial questions and references. This lab is used in IS2820/TELECOM2813 Security Management.

Lab Resources

To complete this tutorial you will need the following:

•   PC running on the Windows 2000 operating system with Administrator privileges.
•   Access to the Internet is also required to view resources.

Preliminary Questions

1.   What is the difference between Protection Profile (PP) and Security Target (ST)? CC provides a common ground on which products may be evaluated. The PP and ST play major roles in determining the functional as well as assurance requirements. What purposes do PP an ST serve?
2.   How is the Evaluation Assurance Level (EAL) of a product determined? Products may be evaluated for various levels of assurance depending upon the capability of the product. What are the factors that help determine the appropriate EAL level for which any product should be evaluated?
3.   What is the process of validating a product? CC follows a rigorous methodology in validating a product called the CEM. How is the methodology used to ensure that the validation is correct and complete?
4.   How is the TOE Security Function (TSF) for a product evaluated? The activities involved in validating a product comprises of evaluating whether or not the product satisfies the TSFs. What are the work units that are performed in this process?

Lab Objectives

Part A: Evaluation of PP, ST, and TOE

1.   Evaluate a given PP from [1]. (refer to Part IV, section A for evaluation guidelines)
2.   Evaluate a given ST from [2]. (refer to Part IV, section A for evaluation guidelines)
3.   Evaluate the TSF of Windows 2000 operating system using the ST given in [2]. (refer to Part IV, section B for TSF evaluation guidelines)

Part B: Generation of ST

1.   Generate ST for the product: Cisco PIX 501 Firewall, given PP from [1]. (refer to CC documentation – also discussed in class)

General Evaluation Guidelines

There are three types of evaluations, which are PP, ST, and TOE evaluation. They will be explained in detail below.

PP Evaluation

The PP evaluation is carried out against the evaluation criteria for PPs contained in CC Part 3. The goal of such an evaluation is to demonstrate that the PP is complete, consistent, and technically sound and suitable for use as a statement of requirements for a TOE.

ST Evaluation

The evaluation of the ST for the TOE is carried out against the evaluation criteria for STs contained in Part 3. The goal of such an evaluation is twofold: first to demonstrate that the ST is complete, consistent, and technically sound and hence suitable for use as the basis for the corresponding TOE evaluation; second, in the case where an ST claims conformance to a PP, to demonstrate that the ST properly meets the requirements of the PP.

TOE Evaluation

The TOE evaluation is carried out against the evaluation criteria contained in CC Part 3 using a substantially complete ST as the basis. A substantially complete ST reduces the risk of problems later on in the evaluation process and is where all sections have been completed to an extent acceptable by the evaluation scheme and for which no significant evaluation hurdles are foreseen. The result of a TOE evaluation is to demonstrate that the TOE meets the security requirements contained in the evaluated ST.

Evaluation Methodology

Evaluation methodology can be obtained from the CEM official version from [3].

Evaluation Verdicts

The CEM recognizes three mutually exclusive verdict states:

All verdicts are initially inconclusive and remain so until either a pass or fail verdict is assigned. The overall verdict is pass if and only if all the constituent verdicts are also pass. If the verdict for one evaluator action element is fail then the verdicts for the corresponding assurance component, assurance class, and overall verdict are also fail.

Evaluation Example

The following example provides three TOEs, all of which are based upon the same virtual private networking (VPN) firewall product, but which yield different evaluation results because of the differences in the STs.

Case 1:

A VPN-firewall, which is configured in such, a way that the VPN functionality is turned off. All threats in the ST are concerned with access to the safe network from the unsafe network.

Figure
Figure 1: Evaluation Context

The TOE is the VPN-firewall configured in such a way that the VPN functionality is turned off. If the administrator were to configure the firewall such that some or all VPN functions were enabled, the product would not be in an evaluated configuration; it would therefore be considered to be unevaluated, and so nothing could be stated about its security.

Case 2:

A VPN-firewall, where all threats in the ST are concerned with access to the safe network from the unsafe network. The TOE is the entire VPN-firewall. The VPN functions are part of the TOE, so one of the things to be determined during the evaluation would be whether there are means to gain access to the safe network from the unsafe network through the VPN functions.

Case 3:

A VPN-firewall, where all threats in the ST are concerned with either access to the safe network from the unsafe network or confidentiality of traffic on the unsafe network. The TOE is the entire VPN-firewall. The VPN functions are part of the TOE, so one of the things to be determined during the evaluation would be whether the VPN functions permit the realization of any of the threats described in the ST.

CC / CEM Relationship

CC validation is based on the evaluation criteria, the evaluation method as well as the evaluation scheme as shown in Figure 1. There is a distinct mapping between the CC specifications with the activities in the CEM as shown in Figure 2. Different parties involved in the CC validation may use the mapping in order to cross-validate correctness and completeness of the validation and the validation methodology.

Figure
Figure 2: Mapping of CC and CEM structures

Evaluation of Functional Requirements of TOE

Audit Function

The Audit Function in the Microsoft Windows 2000 Server serves as a TSF function to perform the following basic functions. By default, at installation, only application logs and error logs are collected and stored by the Audit function. The server administrator must enable security auditing on the machine.

Security Management Function

Security management is performed using several security management functions as well as roles.

Resource Utilization Function

Disk space resources in the computer’s storage devices may be controlled using a disk-space quota management tool. By default this control is disabled. Users with the administrative rights can enable quota management.

User Data Protection Function

Data Protection for the user is provided through cryptographic and access control methods. The Controlled Access PP (CAPP) requires that the cryptographic support be in the form of FIPS compliant encrypting/decrypting algorithms. The access control has to be Discretionary Access Control.

Cryptographic Support

Microsoft Windows 2000 provides an option to use FIPS compliant algorithms for encryption and decryption. This can be enabled to comply with the requirement.

Identification and Authentication Functions

Identification and authentication are very important security functions. The requirements put forward are of the following categories:

Authentication

Users that are trying to get authenticated should have a limited number of attempts. If these attempts exceed a pre-configured limit then the account they are trying to log into should be disabled. Windows allows the Administrator to set the number of attempts that a user can make to authenticate himself, after which the account can be disabled for some pre-defined time.

User Attributes

The user’s security attributes should be stored along with user information. The significant user attribute are user identity, group memberships, authentication data, security-relevant roles, private keys, privileges and logon rights.

Protected Data Transfer

The Microsoft Windows systems use IPSec for protected data transfer between different parts of the system. IPSec settings can be fixed in the Policy editors.

Session Locking Functions

Session Locking Functions fulfill protected session access and management functions. The functions that the exercises will cover are:

Validation Action Guidelines

Evaluation is carried out by policy configurations of the system. Two methods can be used to validate all of the above functional requirements.

Lab Report

The lab report for this laboratory should include the following

  1. Evaluation reports for PP, ST and TOE.
  2. ST for Cisco PIX 501 (basic framework).
  3. Answers to the Lab Questionnaire.

Questions

  1. Which users/groups have access to audit logs?
  2. Why are audit policies disabled by default?
  3. What is the difference between security logs and system logs?
  4. What is the minimum size of the log allowed?
  5. Why is the default size very different from the minimum?
  6. What size would you choose as the maximum?
  7. Which other user can access the even viewer?
  8. Why is the audit view limited to specific users only?
  9. Does the local policies cover security management functions for administrators also?
  10. Can different security functions be created for each user?
  11. Which of the above mentioned security management functions can be performed by user other than the administrator group? within the network?
  12. Can the user data be situated at a remote machine in a trusted domain within the network?
  13. How does the group policy relate to local policy?
  14. Why are policies for administrator in user-configuration and computer-configuration different?
  15. Which other user other than from the administrator group enable or disable quota management?
  16. Is the quota limit applicable to all the users? Is there any user that is not limited by the quota management?
  17. What encryption function is used by operating system?
  18. Does it provide any information about what the password could be? Or whether even the username was correct?
  19. How are all the security-relevant information captured in the displayed information?
  20. Can anyone else unlock the computer apart from the user who locked it?
  21. What is the difference between the User Ticket and Service Ticket?
  22. Do you think it is more important to have a service Ticket timeout than a User Ticket timeout?

References

  1. http://www.commoncriteriaportal.org/public/files/cemv2.3.pdf
  2. http://msdn.microsoft.com/
  3. http://www.cisco.com/