+ All Categories
Home > Documents > TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Date post: 14-Jan-2016
Category:
Upload: malik-wormington
View: 221 times
Download: 1 times
Share this document with a friend
Popular Tags:
26
TCSEC: The Orange Book
Transcript
Page 1: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

TCSEC: The Orange Book

Page 2: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

TCSEC Purpose

- Establish best practices

- Requirements for assessing the effectiveness of security controls

- Measure computing resource security

- Evaluate, classify, and select systems considered for computing resources

Page 3: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

TCSEC: Purpose

Guidance – provides guidance on how to design a trusted computing system along with their associated data and services

Metrics – provides a metric (classification) for determining the level of trust assigned to a computing system.

Page 4: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Orange Book: Metrics

Measurement of a system's security is quantified using a classification system.

The Classes are:D C1 & C2B1, B2, B3A1

A is more secure than D

2 is more secure than 1.

Page 5: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Orange Book: Metrics

The rating system is hierarchical

D applies to any system that fails to meet any of the higher level security classes.

The other levels have increasing security requirements.

A1 systems would be rare.

Page 6: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Disclaimer

An A1 system is not 100% secure.

The risk level is expected to be lower compared to the other levels

Page 7: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Metrics: C1

• Identification and authentication (user id & password)

• DAC – (Discretionary Access Controls)

– capable of enforcing access controls

– Example: Basic Unix/Linux OS, user, group, other.

Page 8: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Metrics: C2

• C1 plus

• Audit trails

• System documentation and user manuals.

Page 9: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Metrics B1

• C2 plus

• Discovered weaknesses must be mitigated

Page 10: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Metrics B2

• B1 plus

• Security policy must be defined and documented

• Access controls for all subjects and objects

Page 11: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Metrics: B3

• B2 plus

• Automated imminent intrusion detection, notification and response.

Page 12: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Metrics: A1

• B3 +

• System is capable of secure distribution (can be transported and delivered to a client with the assurance of being secure)

Page 13: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Orange Book Security Criteria

Security Policy

Accountability

Assurance

Documentation

Page 14: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

1. Security Policy

The set of rules and practices that regulate how an organization manages, protects, and distributes information.

Page 15: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

1. Security Policy

The policy is organized into subjects and objects.

Subjects act upon objectsSubjects – processes and users.Objects – data, directories, hardware, applications

A well defined access control model determines if a subject can be permitted access to an object.

Page 16: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Security Policy

Top secret, secret, classified, non-classified

Need-to-know, job division, job rotation, NDA, etc.

Page 17: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

2. Accountability

The responsibilities of all who come in contact with the system must be well defined.

Identification (… the process to identify a user)

Auditing (...accumulating and reviewing log information and all actions can be traced to a subject)

Organizational chart

Job description contract, AUP, NDA, SLA

Page 18: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

3. Assurance

The reasonable expectation that the security policy of a trusted system has been implemented correctly and works as intended.

Assurance is organized intoOperational assuranceLife-cycle assurance

Page 19: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

3a. Organizational Assurance

Security policy is maintained in the overall design and operation of the system.Example: Users of the system have an assurance

that access controls are enforced

Page 20: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

3b. Life-cycle Assurance

Insuring the system continues to meet the security requirements over the lifetime of the system. Updates to the software and hardware must be

consideredThe expectation that the system remains

operational (is available) over its lifetimeSustainability-cycle

Page 21: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

4. Documentation Requirements

Security Features User's Guide

Trusted Facility Manual

Test Documentation

Design Documentation

Page 22: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Documentation: Security Features User's Guide

Aimed at the ordinary (non-privileged) users. General usage policy*Instructions on how to effectively use the systemDescription of relevant security features

Page 23: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Documentation: Trusted Facility Manual

Aimed at the S.A. StaffHow the system is configured and maintainedIncludes the day-to-day required activities

• Backups

• Reviewing security logs

Page 24: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Documentation: Test Documentation

Instructions on how to test the required security mechanisms

Page 25: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

Documentation: Design Documentation

Define the boundaries of the system

A complete description of the hardware and software.

Complete system design specifications

Description of access controls

Page 26: TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.

The Orange Book

• The Orange book has been superseded by the Common Criteria


Recommended