+ All Categories
Home > Documents > From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion...

From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion...

Date post: 18-Jan-2021
Category:
Upload: others
View: 4 times
Download: 0 times
Share this document with a friend
37
From FIPS 140-2 to CC Yi Mao PH.D. CISSP, PCI QSA atsec Information Security Cooperation www.atsec.com 12 th ICCC, 27-29 September 2011, Selangor, Malaysia © atsec information security, 2011 [email protected]
Transcript
Page 1: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

From FIPS 140-2 to CC

Yi MaoPH.D. CISSP, PCI QSAatsec Information Security Cooperationwww.atsec.com12th ICCC, 27-29 September 2011, Selangor, Malaysia © atsec information security, 2011

[email protected]

Page 2: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Agenda

• A secure product from the CC perspectivep p p

• A secure product from the FIPS 140-2 perspectiveperspective

• The common security checkpoints in CC and FIPS 140 2FIPS 140-2

• Viewing FIPS 140-2 as a pseudo Protection Profile (PP)

• The benefits gained from a FIPS 140-2 certifiedThe benefits gained from a FIPS 140 2 certified Cryptographic Module (CM)

• Conclusion12th ICCC, 27-29 September 2011, Selangor, Malaysia

© atsec information security, 2011 2

• Conclusion

Page 3: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

A S P d tA Secure Productfrom the CC Perspective

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 3

Page 4: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

About the Product

What is the TOE to be evaluated?What is the TOE to be evaluated?E.g.

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 4

Page 5: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

About the Process

Is the development process wellIs the development process well controlled?

VS.

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 5

Page 6: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

About the Environment

Where and how is the TOE to be used?Put any restrictions in the ECGPut any restrictions in the ECG.

VS.

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 6

Page 7: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Inspecting the Product Detailsp g

Is the design secure?Does the implementation reflect the design?design?

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 7

Page 8: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

A Secure Design Means ...• A well-defined external interface

– TSFITSFI

• A high-degree of modularity– TOE decomposed into components– A component decomposed into modules

• Identifiable security components/modules/functions– Separation of security enforcing/supporting functions from security non-

interfering ones

• Protecting itself against interference, tampering and bypassProtecting itself against interference, tampering and bypass– TOE protection

• Protecting TSF data and user data from unauthorized disclosure and modification

• Vulnerability analysis

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 8

Page 9: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Security Functional Requirements(from the CC V3.1 Part II)

1. FAU (Security Audit)U (Secu ty ud t)2. FCO (Communication)3. FCS (Cryptographic Support)3. FCS (Cryptographic Support)4. FDP (User Data Protection)5 FIA (Identification and Authentication)5. FIA (Identification and Authentication)6. FMT (Security Management)7 FPR (Privacy)7. FPR (Privacy)8. FPT (Protection of the TSF)9 FRU (Resource Utilisation)9. FRU (Resource Utilisation)10. FTA (TOE Access)11 FTP (Trusted Path/Channels)

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 99

11. FTP (Trusted Path/Channels)

Page 10: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Mapping to Basic Security Concepts(from the CBK for CISSP Certification)

• Confidentiality: FCS, FDP, FTP• Integrity: FCS, FMT, FPT• Availability: FRU• Accountability: FAU, FIA• Privacy: FPR• Identification: FIA• Authentication: FIA• Authorization: FTA• Auditing: FAU• Nonrepudiation: FCS, FCO

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 10

Page 11: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

A S P d tA Secure ProductFrom the FIPS 140-2 Perspective

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 11

Page 12: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

FIPS 140-2 and CMVPFIPS 140 2 and CMVP

• FIPS 140-2 is the current version of the NIST (National Institute of Standards and Technology) and CSEC (Communications Security Establishment Canada)(Communications Security Establishment Canada) mandatory standard that specifies the security requirements for Cryptographic Modules, and is

li bl t ll f d l i i th US d thapplicable to all federal agencies in the US and the Government of Canada that use cryptographic-based security system.security system.

• Cryptographic Module Validation Program (CMVP) is a yp g p g ( )joint effort between NIST and CSEC that oversees the FIPS 140-2 conformance through a module validation process

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 12

process.

Page 13: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

A Birds-eye View of FIPS 140-2• FIPS 140-2 security requirements cover 11 areas. • For each area, a CM receives a security level rating (1-4, from , y g ( ,

lowest to highest) depending on what requirements are met.• An overall rating is issued for the CM that is the minimum of the

independent ratings received in all areas.• FIPS 140-2 annexes specify approved security functions,

protection profiles random number generators and keyprotection profiles, random number generators, and key establishment techniques.

• CM validation testing is performed using the Derived Test g p gRequirement (DTR) for FIPS 140-2.

• The CM must implement at least one FIPS-Approved security f ti Th i l d d t hi l ithfunction. The involved approved cryptographic algorithms are tested under Cryptographic Algorithm Validation Program (CAVP).

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 13

Page 14: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Security Areas Covered i FIPS 140 2in FIPS 140-2

1. Cryptographic Module Specification yp g p p2. Cryptographic Module Ports and Interfaces3. Roles, Services, and Authentication4. Finite State Model5. Physical Security6. Operational Environment7. Cryptographic Key Management8. Electromagnetic Interference/Electromagnetic

Compatibility (EMI/EMC)9 S lf T t9. Self Tests10. Design Assurance11 Mitigation of Other Attacks

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 14

11. Mitigation of Other Attacks

Page 15: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Mapping to Product/Process/Environment

Module Specification, Port and Interface, Roles/Services and Authentication, FSM, Physical S it EMI/EMC K M t S lf T tSecurity, EMI/EMC, Key Management, Self-Tests, Mitigation of Attacks

Design Assurance

Operational Environment

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 15

Page 16: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

A Secure Design Means ...g

• A well-defined external interface– Port and Interface

• A high-degree of modularityModule Specification FSM– Module Specification, FSM

• Identifiable security components/modules/functions– Separation of cryptographic functions from othersp yp g p

• Protecting itself against interference, tampering and bypass– Physical Security, Self-Tests

• Protecting CSPs (Cryptographic Sensitive Parameters) from unauthorized disclosure and modification

Roles Services and Authentication Key Management– Roles, Services, and Authentication, Key Management

• Vulnerability analysis– Mitigation of other attacks

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 16

g

Page 17: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Requirements for Key Managementq y g(from the FIPS 140-2 DTR Chapter 7)

• General Key Protection Mechanism• Random Number Generators• Key Generation• Key Establishment• Key Entry and Output• Key Storagey g• Key Zeroization

All of the requirements reflect the well-known CIA security concepts.

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 17

Page 18: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Th h k i tThe common checkpoints in CC and FIPS 140-2

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 18

Page 19: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Counterparts between CC and FIPS 140-2

CC FIPS 140-2

Target of Evaluation (TOE) Implementation under Test g ( ) p(IUT)

Cryptographic Module (CM)Security Target (ST) Security Policy (SP)

Security Functions Cryptographic security functions

TOE Security Function (TSF) data and user data

Keys and Cryptographic Sensitive Parameters (CSPs)( )

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 19

Page 20: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

A Common Tripod Strategy of Product-Process-Environment

Evaluate the design and implementation of a CM/TOE: what is it and how does it work?

Check its development process: how is it made?

Inspect its operational environment: how is it to be used?

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 20

Page 21: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Same Set of Questions AddressedSame Set of Questions Addressed

• What is the scope and boundary of CM or TOE? y• Does it have a well-defined external interface?• Does it have a high-degree of modularity?• Does it have identifiable security functions?

– (e.g. authentication, authorization, access control, data encryption)

H d it t t it lf i t i t f t i d• How does it protect itself against interference, tampering and bypass?

• Does it meet the data (TOE assets vs FIPS CSP) protectionDoes it meet the data (TOE assets vs. FIPS CSP) protection requirements?

– protection against unauthorized disclosure/modification/ unauthorized b tit ti f d tsubstitution of data

• Are there any vulnerabilities? What are the countermeasures?– Vulnerability analysis in CC vs. Mitigation of other attacks in FIPS

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 21

Vulnerability analysis in CC vs. Mitigation of other attacks in FIPS

Page 22: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Assuring the Data ProtectionAssuring the Data Protection

Requirements in

FIPS 140-2

SFRs in CC

Roles, Services, and Authentication

Key Storage

Access control policy and functions (FDP_ACC and FDP_ACF)

Key Entry

Key Exit

Import from outside of the TOE (FDP_ITC)

Export from the TOE (FDP ETC)Export from the TOE (FDP_ETC)

Key Generation

Key Establishment

Inter-TSF user data confidentiality transfer protection (FDP_UCT)

Inter TSF user data integrity transferCryptographic functions

Inter-TSF user data integrity transfer protection (FDP_UIT)

Key Zeroization Residual information protection (FDP_RIP)

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 22

Page 23: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Viewing FIPS 140-2 as a Pseudo Protection ProfilePseudo Protection Profile

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 23

Page 24: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Relating FIPS 140-2 to CCg

In reality:• FIPS 140-2 is a standalone standard distinct to CC family standards.• When the operational environment of a CM is modifiable, the operating

system requirements of the CC are applicable at FIPS Security Levels 2 y q pp yand above.

The analysis shows:• Although FIPS 140-2 is specialized to address the security requirements for

the cryptographic modules, it has much in common with CC.

Possible comparisons:Possible comparisons:• FIPS 140-2 requirements could be interpreted as a prescribed “protection

profile” (in essence, rather than in format) for cryptographic modules. • The definition of a PP turns the CC evaluation of products from the same

product category into a de-facto conformance testing and FIPS 140-2 by definition is just that -- a conformance test.

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 24

Page 25: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

BSI PPs for Cryptographic ModulesBSI PPs for Cryptographic Modules

• BSI-CC-PP-0044 (dated on 28th October 2008)( )Common Criteria Protection ProfileCryptographic Modules, Security Level “Low”yp g p , y

• BSI-CC-PP-0042 (dated on 7th March 2008)Common Criteria Protection ProfileCryptographic Modules, Security Level “Moderate”

• BSI-CC-PP-0045 (dated on 24th July 2008)( y )Common Criteria Protection ProfileCryptographic Modules, Security Level “Enhanced”

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 25

yp g p , y

Page 26: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

SFRs in BSI CM PPsSFRs in BSI CM PPs

SFRs in PP 0044

SL “Low”

FCS_CKM

FCS_COP

FCS_RNG

FIA_ATD

FIA_UID

FIA_UAU

FDP_ACC

FDP_ACF

FDP_ITC

FMT_SMF

FMT_SMR

FMT_MOF

FPT_STM

FPT_TDC

FPT_FLS

FTP ITC

FIA_USB

FIA_AFL

FDP_ETC

FDP_UCT

FDP UIT

FMT_MTD

FMT_MSA

FPT_EMSEC

FPT_PHP

FPT RVMFTP_ITC FDP_UIT

FDP_RIP

FPT_RVM

FPT_SEP

FPT_TST

Additi l SFR FMT MOF f FAU GENAdditional SFRs in PP 0042

SL “Moderate”

FMT_MOF for Adm

FMT_MTD for Audit

FAU_GEN

FAU_SAR

FAU_STG

Stronger SFRs in PP 0045

SL “Enhanced”

FMT_MSA FAU_STG.4

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 26

Page 27: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

G i d B fit f FIPS 140 2Gained Benefits of a FIPS 140-2 Certified CM Applied to a CC evaluation

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 27

Page 28: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Crypto Requirements in US NDPP (10 December 2010 Version 1 0)(10 December 2010, Version 1.0)

SFRs of FCS in NDPP Referenced Crypto standards

FCS CKM FIPS 140 2 (S it R i t f CM)FCS_CKM

FCS_COP

FCS RBG EXT

FIPS 140-2 (Security Requirements for CM)

ANSI X9.80 (Prime Number Generation and Testing)

ANIS X9.31 Appendix 2.4 using AES_ _

FCS_COMM_PROT_EXT

pp g

NIST SP 800-57 (Recommendation for Key Management)

NIST SP 800-56A (Recommendation for RSA-based Key Establishment Schemes)Establishment Schemes)

NIST SP 800-56B (Recommendation for elliptic curve-based Key Establishment Schemes)

FIPS PUB 186-3 (Digital Signature Standard)

FIPS PUB 197 (Advanced Encryption Standard)

NIST SP 800-38A/B/C/D/ENIST SP 800 38A/B/C/D/E

NIST SP 800-90 (Deterministic Random Bit Generator)

CAVP Validation System (AESVS, RSAVS, DSAVS, ECDSAVS, HMACVS RNGVS etc )

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 28

HMACVS, RNGVS, etc.)

Page 29: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Crypto Requirements in US NDPP(C ti d)(Continued)

FMT MTD TSF d t i l di t i f ti• FMT_MTD, TSF data including crypto information• FMT_SMF, managing the TOE updates by verifying the digital

signature of the updatesg• FPT_ITT, using FCS-specified service to protect TSF data from

disclosure and to detect modification of TSF dataFPT TUD (EXT) using FCS specified digital signature or hash• FPT_TUD_(EXT), using FCS-specified digital signature or hash function to verify the TOE updates

• FTP_ITC, using FCS-specified service to provide a trusted communication channel between itself and authorized IT entities to protect from data disclosure and to detect data modification

• FTP TRP using FCS-specified service to provide a trusted• FTP_TRP, using FCS-specified service to provide a trusted communication path between itself and remote administrators to protect from data disclosure and to detect data modification

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 29

Page 30: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

A Working Example

S O SSL lik C t lib i “ b ”Suppose an OpenSSL-like Crypto library version “a.b.c” was:

• Implemented the following cryptographic algorithms and protocolT i l DES– Triple-DES

– AES– HMAC– SHA– RSA KeyGen, SignGen and SignVer– DRBG– DRBG– DH key establishment protocol

• Certified under FIPS 140-2 for a software module at SL 1• Embedded in a type of network device products, say routers, to

primarily provide IPSec functionality.

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 30

Page 31: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

A Working Example(Continued)

Suppose that kind of routers version “x y z” was:Suppose that kind of routers version x.y.z was:

• to be US NDPP compliant• to be certified under CC• to be certified under CC

Question:How much can having a FIPS 140-2 certified crypto component contribute toward its containing TOE becoming CC-certified?becoming CC-certified?

Note:Th ki l h th CM it t f th TOE d th i• The working example has the CM as its core component of the TOE and their boundary could be more or less the same.

• The larger the crypto portion of the TOE the more benefit you will have from the FIPS certification of the CM The flip side of this is also true

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 31

the FIPS certification of the CM. The flip side of this is also true.

Page 32: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Gained Benefits

Th f ll i i d t l t d SFR i th US NDPPThe following required crypto-related SFRs in the US NDPP are satisfied:• FCS CKM (Crypto Key Management including generation and zeroization)FCS_CKM (Crypto Key Management including generation and zeroization)• FCS_COP (Cryptographic Operation)• FCS_RBG_EXT (Random Bit Generation)• FCS COMM PROT EXT (Communications Protection)_ _ _ ( )• FMT_MTD (Management of TSF Data)• FMT_SMF (Specification of Management Functions)• FPT_ITT (Internal TSF Data Transfer Protection)• FPT_TUD_(EXT) (Trusted Update)• FTP_ITC (Inter-TSF Trusted Channel)• FTP_TRP (Trusted Path)

The required self test SFR in the US NDPP is also satisfied:• FPT_TST.(EXT) (TSF Testing during initial start-up)

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 32

Page 33: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Gained Benefits(Continued)

Th i d SAR i th US NDPP t b th t libThe required SARs in the US NDPP are met by the crypto library component and hence, are partially satisfied:• ADV FSP.1 (Basic Functional Specification)ADV_FSP.1 (Basic Functional Specification)

The Security Policy of the CM can serve as the FSP during CC evaluation.• AGD_OPE.1 and AGD_PRE.1 (Operational and Preparative user guidance)

Crypto officer and user guidance documentation for the Operational Environment requirements in FIPS 140-2 can be re-used for the AGD class during CC evaluation.

• ATE_IND.1 (Independent testing - conformance)Covered by the functional test done for the FIPS 140-2 conformance test.

• AVA VAN 1 (Vulnerability analysis)• AVA_VAN.1 (Vulnerability analysis)The thorough review on design documentation and source code, the functional and penetration test conducted contributes to the vulnerability analysis.

• ALC CMC.1 and ALC CMS.1 (Labeling of the TOE and its CM coverage)ALC_CMC.1 and ALC_CMS.1 (Labeling of the TOE and its CM coverage)The section of Design Assurance in FIPS 140-2 checks the healthy of the develop process including unique labeling of the component and the usage of configuration management system.

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 33

Page 34: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

ConclusionConclusion

• A FIPS 140-2 conformance test and a CC evaluation can go• A FIPS 140-2 conformance test and a CC evaluation can go hand in hand.

• While achieving FIPS 140-2 certification has its own merits inWhile achieving FIPS 140 2 certification has its own merits, in the meantime, it can also serve as a stepping stone to reach a CC certification, especially for organizations new to compliance with security standardscompliance with security standards.

• Those who desire to archive CC certification for products containing a crypto module should consider to get the CMcontaining a crypto module should consider to get the CM FIPS 140-2 validated.

• Those who have got a FIPS 140-2 certificate for their cryptoThose who have got a FIPS 140 2 certificate for their crypto module could consider to advance to CC certification for products containing the certified CM.

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 34

Page 35: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

ReferencesReferences1. Erin Connor, FIPS 140 & CC – How do they get along, the 11th ICCC

2. Eugene Polulyakh, FIPS and the Common Criteria finding the least common denominator, the 11th ICCC

3 Security Requirements for Network Devices (pp nd v1 0 pdf) 10 December 20103. Security Requirements for Network Devices (pp_nd_v1.0.pdf), 10 December 2010, Version 1.0, IAD

4. Common Criteria Protection Profile Cryptographic Modules, Security Level “Low”, BSI-CC PP 0044 V1 0 28 O t b 2008CC-PP-0044, V1.0, 28 October 2008

5. Common Criteria Protection Profile Cryptographic Modules, Security Level “Moderate”, BSI-CC-PP-0042, V1.01, 7 March 2008

6. Common Criteria Protection Profile Cryptographic Modules, Security Level “Enhanced”, BSI-CC-PP-0045, V1.01, 24 July 2008

S S f C7. FIPS PUB 140-2 Security Requirements for Cryptographic Modules, Issued May 25, 2001

8. Derived Test Requirements for FIPS PUB 140-2, 4 January 2011, Draft

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 35

Page 36: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

AcknowledgementsAcknowledgements

A special thanks goes to: • Ingo Hahlen for pointing me to the set of BSI

t hi M d l t ti filcryptographic Module protection profiles• Apostol Vassilev for reviewing the slides and for

helpful commentshelpful comments• Courtney Cavness for the language editing

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 36

Page 37: From FIPS 140-2 to CC · FIPS 140FIPS 140-2andCMVP2 and CMVP • FIPS 140-2 is the currentversion of the NIST (National Institute of Standards and Technology) and CSEC

Thank you for yyour attention!your attention!

12th ICCC, 27-29 September 2011, Selangor, Malaysia© atsec information security, 2011 37


Recommended