You are on page 1of 12

This article was downloaded by: 10.3.97.

143
On: 09 May 2023
Access details: subscription number
Publisher: CRC Press
Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: 5 Howick Place, London SW1P 1WG, UK

Encyclopedia of Information Assurance

Rebecca Herold, Marcus K Rogers

Common Criteria: IT Security Evaluation

Publication details
https://www.routledgehandbooks.com/doi/10.1081/E-EIA-120046535
Debra S. Herrmann
Published online on: 21 Dec 2010

How to cite :- Debra S. Herrmann. 21 Dec 2010, Common Criteria: IT Security Evaluation from:
Encyclopedia of Information Assurance CRC Press
Accessed on: 09 May 2023
https://www.routledgehandbooks.com/doi/10.1081/E-EIA-120046535

PLEASE SCROLL DOWN FOR DOCUMENT

Full terms and conditions of use: https://www.routledgehandbooks.com/legal-notices/terms

This Document PDF may be used for research, teaching and private study purposes. Any substantial or systematic reproductions,
re-distribution, re-selling, loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden.

The publisher does not give any warranty express or implied or make any representation that the contents will be complete or
accurate or up to date. The publisher shall not be liable for an loss, actions, claims, proceedings, demand or costs or damages
whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material.
Common Criteria: IT Security Evaluation

Debra S. Herrmann
Technical Advisor for Information Security and Software Safety, Office of the Chief Scientist,
Federal Aviation Administration (FAA), Washington, District of Columbia, U.S.A.
Downloaded By: 10.3.97.143 At: 23:06 09 May 2023; For: 9781351235808, entry61, 10.1081/E-EIA-120046535

Abstract
This entry introduces the Common Criteria (CC) by describing the historical events that led to their
development, delineating the purpose and intended use of the CC and, conversely, situations not covered
by the CC, explaining the major concepts and components of the CC methodology and how they work,
discussing the CC user community and stakeholders, looking at the future of the CC.

HISTORY testing and coordination.”[2] The result was the publication


of CSC-STD-001–83, the Trusted Computer System Eva-
The Common Criteria, referred to as “the standard for luation Criteria (TCSEC),[4] commonly known as the
information security,”[1] represent the culmination of a 30 Orange Book, in 1983. A second version of this standard
year saga involving multiple organizations from around the was issued in 1985.[5]
world. The major events are discussed below and summar- The Orange Book proposed a layered approach for rat-
ized in Table 1. A common misperception is that computer ing the strength of COMPUSEC features, similar to the
and network security began with the Internet. In fact, the layered approach used by the Software Engineering
need for and interest in computer security or COMPUSEC Institute (SEI) Capability Maturity Model (CMM) to rate
have been around as long as computers. Likewise, the the robustness of software engineering processes. As
Orange Book is often cited as the progenitor of the com- shown in Table 2, four evaluation divisions composed of
mon criteria (CC); actually, the foundation for the CC was seven classes were defined. Division A class Al was the
laid a decade earlier. One of the first COMPUSEC stan- highest rating, while division D class Dl was the lowest.
dards, DoD 5200.28-M,[2] Techniques and Procedures for The divisions measured the extent of security protection
Implementing, Deactivating, Testing, and Evaluating provided, with each class and division building upon and
Secure Resource-Sharing ADP Systems, was issued in strengthening the provisions of its predecessors. Twenty-
January 1973. An amended version was issued June seven specific criteria were evaluated. These criteria were
1979.[3] DoD 5200.28-M defined the purpose of security grouped into four categories: security policy, accountabil-
testing and evaluation as:[2] ity, assurance, and documentation. The Orange Book also
introduced the concepts of a reference monitor, formal
Common –

 To develop and acquire methodologies, techniques, security policy model, trusted computing base, and
Controls

and standards for the analysis, testing, and evaluation assurance.


of the security features of ADP systems The Orange Book was oriented toward custom software,
 To assist in the analysis, testing, and evaluation of the particularly defense and intelligence applications, operating
security features of ADP systems by developing factors on a mainframe computer that was the predominant technol-
for the Designated Approval Authority concerning the ogy of the time. Guidance documents were issued; however,
effectiveness of measures used to secure the ADP sys- it was difficult to interpret or apply the Orange Book to
tem in accordance with Section VI of DoD Directive networks or database management systems. When distribu-
5200.28 and the provisions of this Manual ted processing became the norm, additional standards were
 To minimize duplication and overlapping effort, issued to supplement the Orange Book, such as the Trusted
improve the effectiveness and economy of security Network Interpretation and the Trusted Database
operations, and provide for the approval and joint Management System Interpretation. Each standard had a
use of security testing and evaluation tools and different color cover, and collectively they became known
equipment as the Rainbow Series. In addition, the Federal Criteria for
Information Technology Security was issued by NIST and
As shown in the next section, these goals are quite similar NSA in December 1992, but it was short-lived.
to those of the Common Criteria. At the same time, similar developments were proceeding
The standard stated that the security testing and evalua- outside the United States. Between 1990 and 1993, the
tion procedures “will be published following additional Commission of the European Communities, the European
Encyclopedia of Information Assurance DOI: 10.1081/E-EIA-120046535
506 Copyright # 2011 by Taylor & Francis. All rights reserved.
Downloaded By: 10.3.97.143 At: 23:06 09 May 2023; For: 9781351235808, entry61, 10.1081/E-EIA-120046535

Table 1 Timeline of events leading to the development of the CC.


Year Lead organization Standard/Project Short name
1/73 U.S. DoD DoD 5200.28M, ADP Computer Security Manual—Techniques and Procedures for Implementing,Deactivating, Testing, and —
Evaluating Secure Resource Sharing ADP Systems
6/79 U.S. DoD DoD 5200.28M, ADP Computer Security Manual—Techniques and Procedures for Implementing, Deactivating, Testing, and —
Evaluating Secure Resource Sharing ADP Systems, with 1st Amendment
8/83 U.S. DoD CSC-STD-001–83, Trusted Computer System Evaluation Criteria, National Computer Security Center TCSEC or Orange Book
12/85 U.S. DoD DoD 5200.28-STD, Trusted Computer System Evaluation Criteria, National Computer Security Center TCSEC or Orange Book
7/87 U.S. DoD NCSC-TG-005, Version 1, Trusted Network Interpretation of the TCSEC, National Computer Security Center TNI, part of Rainbow Series
8/90 U.S. DoD NCSC-TG-011, Version 1, Trusted Network Interpretation of the TCSEC, National Computer Security Center TNI, part of Rainbow Series
Common Criteria: IT Security Evaluation

1990 ISO/IEC JTC1 SC27 WG3 formed —


3/91 U.K. CESG UKSP01, UK IT Security Evaluation Scheme: Description of the Scheme, Communications–Electronics Security Group —
4/91 U.S. DoD NCSC-TG-021, Version 1, Trusted DBMS Interpretation of the TCSEC, National Computer Security Center Part of Rainbow Series
6/91 European Communities Information Technology Security Evaluation Criteria (ITSEC), Version 1.2, Office for Official Publications of the European ITSEC
Communities
11/92 OECD Guidelines for the Security of Information Systems, Organization for Economic Cooperation and Development —
12/92 U.S. NIST and NSA Federal Criteria for Information Technology Security, Version 1.0, Volumes I and II Federal criteria
1/93 Canadian CSE The Canadian Trusted Computer Product Evaluation Criteria (CTCPEC), Canadian System Security Centre, Communications CTCPEC
Security Establishment, Version 3.oe
6/93 CC Sponsoring CC Editing Board established CCEB
Organizations
12/93 ECMA Secure Information Processing vs. the Concept of Product Evaluation, Technical Report ECMA TR/64, European Computer ECMA TR/64
Manufacturers’ Association
1/96 CCEB Committee draft 1.0 released CC
1/96 to — Public review, trial evaluations —
10/97
10/97 CCIMB Committee draft 2.0 beta released CC
11/97 CEMEB CEM-97/017, Common Methodology for Information Technology Security, Part 1: Introduction and General Model, Version 0.6 CEM Part 1
10/97 to CCIMB with ISO/IEC Formal comment resolution and balloting CC
12/99 JTC1 SC27 WG3
8/99 CEMEB CEM-99/045, Common Methodology for Information Technology Security Evaluation, Part 2: Evaluation Methodology, Version 1.0 CEM Part 2
12/99 ISO/IEC ISO/IEC 15408, Information technology—Security techniques—Evaluation criteria for IT security, Parts 1–3 released CC Parts 1–3
12/99 CCIMB Respond to requests for interpretations (RIs), issue final interpretations, incorporate final interpretations —
forward
5/00 Multiple Common Criteria Recognition Agreement signed CCRA
8/01 CEMEB CEM-2001/0015, Common Methodology for Information Technology Security Evaluation, Part 2: Evaluation Methodology, CEM Part 2 supplement
Supplement: ALC_FLR—Flaw Remediation, Version 1.0
507

Common –
Controls
508 Common Criteria: IT Security Evaluation

Table 2 Summary of Orange Book Trusted Computer System Evaluation Criteria (TCSEC) divisions.
Evaluation division Evaluation class Degree of trust
A—Verified protection A1—Verified design Highest
B—Mandatory protection B3—Security domains
B2—Structured protection
B1—Labeled security protection
C—Discretionary protection C2—Controlled access protection
C1—Discretionary security protection
Downloaded By: 10.3.97.143 At: 23:06 09 May 2023; For: 9781351235808, entry61, 10.1081/E-EIA-120046535

D—Minimal protection D1—Minimal protection Lowest

Computer Manufacturers Association (ECMA), the 2. ISO/IEC 15408-2(1999-12-01), Information technol-


Organization for Economic Cooperation and Development ogy—Security techniques—Evaluation criteria for
(OECD), the U.K. Communications–Electronics Security IT security—Part 2: Security functional requirements
Group, and the Canadian Communication Security 3. ISO/IEC 15408-3(1999-12-01), Information technol-
Establishment (CSE) all issued computer security standards ogy—Security techniques—Evaluation criteria for
or technical reports. These efforts and the evolution of the IT security—Part 3: Security assurance requirements
Rainbow Series were driven by three main factors:[6]
Parallel to this effort was the development and release
1. The rapid change in technology, which led to the of the Common Evaluation Methodology, referred to as the
need to merge communications security (COMSEC) CEM or CM, by the Common Evaluation Methodology
and computer security (COMPUSEC) Editing Board (CEMEB):
2. The more universal use of information technology (IT)
outside the defense and intelligence communities  CEM-97/017, Common Methodology for Information
3. The desire to foster a cost-effective commercial Technology Security Evaluation, Part 1: Introduction
approach to developing and evaluating IT security and General Model, v0.6, November 1997
that would be applicable to multiple industrial  CEM-99/045, Common Methodology for Information
sectors Technology Security Evaluation, Part 2: Evaluation
Methodology, vl.0, August 1999
 CEM-2001/0015, Common Methodology for Infor-
These organizations decided to pool their resources to
mation Technology Security Evaluation, Part 2:
meet the evolving security challenge. ISO/IEC Joint
Evaluation Methodology, Supplement: ALC_FLR—
Technical Committee One (JTC1) Subcommittee 27
Flaw Remediation, vl.0, August 2001.
(SC27) Working Group Three (WG3) was formed in
1990. Canada, France, Germany, the Netherlands, the
As the CEM becomes more mature, it too will become
Common –

United Kingdom, and the United States, which collectively


Controls

became known as the CC Sponsoring Organizations, an ISO/IEC standard.


initiated the CC Project in 1993, while maintaining a
close liaison with ISO/IEC JTC1 SC27 WG3. The CC
Editing Board (CCEB), with the approval of ISO/IEC PURPOSE AND INTENDED USE
JTC1 SC27 WG3, released the first committee draft of
the CC for public comment and review in 1996. The CC The goal of the CC project was to develop a standar-
Implementation Management Board (CCIMB), again with dized methodology for specifying, designing, and eval-
the approval of ISO/IEC JTC1 SC27 WG3, incorporated uating IT products that perform security functions
the comments and observations gained from the first draft which would be widely recognized and yield consis-
to create the second committee draft. tent, repeatable results. In other words, the goal was to
It was released for public comment and review in 1997. develop a full life-cycle, consensus-based security
Following a formal comment resolution and balloting engineering standard. Once this was achieved, it was
period, the CC were issued as ISO/IEC 15408 in three thought, organizations could turn to commercial ven-
parts: dors for their security needs rather than having to rely
solely on custom products that had lengthy develop-
1. ISO/IEC 15408-1(1999-12-01), Information technol- ment and evaluation cycles with unpredictable results.
ogy—Security techniques—Evaluation criteria for The quantity, quality, and cost effectiveness of com-
IT security—Part 1: Introduction and general model mercially available IT security products would
Common Criteria: IT Security Evaluation 509

increase; and the time to evaluate them would addressed in a very limited context—that of restrictions
decrease, especially given the emergence of the global on unauthorized physical access to security equipment and
economy. prevention of and resistance to unauthorized physical mod-
There has been some confusion that the term IT product ification or substitution of such equipment.[6] Personnel
only refers to plug-and-play commercial off-the-shelf security issues are not covered at all; instead, they are
(COTS) products. In fact, the CC interprets the term IT generally handled by assumptions made in the PP. The
product quite broadly, to include a single product or multi- CC/CEM does not address C&A processes or criteria.
ple IT products configured as an IT system or network. This was specifically left to each country and/or govern-
The standard lists several items that are not covered and ment agency to define. However, it is expected that CC/
considered out of scope:[7] CEM evaluation results will be used as input to C&A. The
Downloaded By: 10.3.97.143 At: 23:06 09 May 2023; For: 9781351235808, entry61, 10.1081/E-EIA-120046535

robustness of cryptographic algorithms, or even which


 Administrative security measures and procedural algorithms are acceptable, is not discussed in the CC/
controls CEM. Rather, the CC/CEM limits itself to defining
 Physical security requirements for key management and cryptographic
 Personnel security operation. Many issues not handled by the CC/CEM are
 Use of evaluation results within a wider system assess- covered by other national and international standards.
ment, such as certification and accreditation (C&A)
 Qualities of specific cryptographic algorithms

Administrative security measures and procedural con- MAJOR COMPONENTS OF THE METHODOLOGY
trols generally associated with operational security AND HOW THEY WORK
(OPSEC) are not addressed by the CC/CEM. Likewise,
the CC/CEM does not define how risk assessments should The three-part CC standard (ISO/IEC 15408) and the CEM
be conducted, even though the results of a risk assessment are the two major components of the CC methodology, as
are required as an input to a PP.[7] Physical security is shown in Fig. 1.

I. The Common Criteria

ISO/IEC 15408 Part 1


- Terminology and concepts
- Description of CC Methodology
- History of development
- CC Sponsoring organizations

ISO/IEC 15408 Part 2 ISO/IEC 15408 Part 3


- Catalog of security functional - Catalog of security assurance
classes, families, components, classes, families, components,

Common –
Controls
and elements and elements
- Definition of standard EAL
packages

II. The Common Evaluation Methodology

CEM-97/017 Part 1
- Terminology and concepts
- Description of CEM
- Evaluation principles and roles

CEM-99/045 Part 2
- Standardized application and
execution of CC Part 3
requirements
- Evaluation tasks, activities, and
work units

CEM-2001/015 Part 2 Supplement


- Flaw remediation
Fig. 1 Major components of the CC and CEM.
510 Common Criteria: IT Security Evaluation

The CC expected of a TOE, 2) meet the security objectives stated in


a PP or ST, 3) specify security properties that users
Part 1 of ISO/IEC 15408 provides a brief history of the can detect by direct interaction with the TOE or by the
development of the CC and identifies the CC sponsoring TOE’s response to stimulus, 4) counter threats in the
organizations. Basic concepts and terminology are intro- intended operational environment of the TOE, and
duced. The CC methodology and how it corresponds to a 5) cover any identified organizational security policies
generic system development life cycle are described. This and assumptions.
information forms the foundation necessary for under- The CC organizes SFRs in a hierarchical structure of
standing and applying Parts 2 and 3. Four key concepts security functionality:
are presented in Part 1:
Downloaded By: 10.3.97.143 At: 23:06 09 May 2023; For: 9781351235808, entry61, 10.1081/E-EIA-120046535

 Classes
 Protection Profiles (PPs)  Families
 Security Targets (STs)  Components
 Targets of Evaluation (TOEs)  Elements
 Packages
Eleven security functional classes, 67 security func-
A Protection Profile, or PP, is a formal document that tional families, 138 security functional components, and
expresses an implementation-independent set of security 250 security functional elements are defined in Part 2.
requirements, both functional and assurance, for an IT Fig. 2 illustrates the relationship between classes, families,
product that meets specific consumer needs.[7] The process components, and elements.
of developing a PP helps a consumer to elucidate, define, A class is a grouping of security requirements that share
and validate their security requirements, the end result of a common focus; members of a class are referred to as
which is used to 1) communicate these requirements to families.[7] Each functional class is assigned a long name
potential developers and 2) provide a foundation from and a short three-character mnemonic beginning with an
which a security target can be developed and an evaluation “F.” The purpose of the functional class is described and a
conducted. structure diagram is provided that depicts the family mem-
A Security Target, or ST, is an implementation- bers. ISO/IEC 15408-2 defines 11 security functional
dependent response to a PP that is used as the basis classes. These classes are lateral toone another; there is
for developing a TOE. In other words, the PP specifies no hierarchical relationship among them. Accordingly, the
security functional and assurance requirements, while standard presents the classes in alphabetical order. Classes
an ST provides a design that incorporates security represent the broadest spectrum of potential security func-
mechanisms, features, and functions to fulfill these tions that a consumer may need in an IT product. Classes
requirements. are the highest-level entity from which a consumer begins
A Target of Evaluation, or TOE, is an IT product, to select security functional requirements. It is not
system, or network and its associated administrator and expected that a single IT product will contain SFRs from
user guidance documentation that is the subject of an all classes. Table 3 lists the security functional classes.
evaluation.[7–9] A TOE is the physical implementation of A functional family is a grouping of SFRs that share
Common –
Controls

an ST. There are three types of TOEs: monolithic, compo- security objectives but may differ in emphasis or rigor. The
nent, and composite. A monolithic TOE is self-contained; members of a family are referred to as components.[7] Each
it has no higher or lower divisions. A component TOE is
the lowest-level TOE in an IT product or system; it forms
part of a composite TOE. In contrast, a composite TOE is
Class A
the highest-level TOE in an IT product or system; it is
composed of multiple component TOEs.
A package is a set of components that are combined
together to satisfy a subset of identified security objec- Family 1 Family 2 Family x
tives.[7] Packages are used to build PPs and STs.
Packages can be a collection of functional or assurance
requirements. Because they are a collection of low-level
Component 1 Component 2 Component x
requirements or a subset of the total requirements for an IT
product or system, packages are intended to be reusable.
Evaluation assurance levels (EALs) are examples of
predefined packages. Element 1 Element 2 Element x
Part 2 of ISO/IEC 15408 is a catalog of standardized
security functional requirements, or SFRs. SFRs serve Fig. 2 Relationship between classes, families, components, and
many purposes. They[7–9] 1) describe the security behavior elements.
Common Criteria: IT Security Evaluation 511

Table 3 Functional security classes.


Short name Long name Purpose[8]
FAU Security audit Monitor, capture, store, analyze, and report information related to security events
FCO Communication Assure the identity of originators and recipients of transmitted information; non-repudiation
FCS Cryptographic support Management and operational use of cryptographic keys
FDP User data protection Protect 1) user data and the associated security attributes within a TOE and 2) data that is
imported, exported, and stored
FIA Identification and Ensure unambiguous identification of authorized users and the correct association of security
authentication attributes with users and subjects
Downloaded By: 10.3.97.143 At: 23:06 09 May 2023; For: 9781351235808, entry61, 10.1081/E-EIA-120046535

FMT Security management Management of security attributes, data, and functions and definition of security roles
FPR Privacy Protect users against discovery and misuse of their identity
FPT Protection of the TSF Maintain the integrity of the TSF management functions and data
FRU Resource utilization Ensure availability of system resources through fault tolerance and the allocation of services by
priority
FTA TOE access Controlling user session establishment
FTP Trusted path/channels Provide a trusted communication path between users and the TSF and between the TSF and
other trusted IT products

functional family is assigned a long name and a assurance families, and 93 security assurance components
three-character mnemonic that is appended to the func- are defined in Part 3.
tional class mnemonic. Family behavior is described. A class is a grouping of security requirements that
Hierarchics or ordering, if any, between family members share a common focus; members of a class are referred
is explained. Suggestions are made about potential OPSEC to as families.[7] Each assurance class is assigned a long
management activities and security events that are candi- name and a short three-character mnemonic beginning
dates to be audited. with an “A.” The purpose of the assurance class is
Components are a specific set of security requirements described and a structure diagram is provided that depicts
that are constructed from elements; they are the smallest the family members. There are three types of assurance
selectable set of elements that can be included in a classes: 1) those that are used for Protection Profile or
Protection Profile, Security Target, or a package.[7] Security Target validation, 2) those that are used for TOE
Components are assigned a long name and described. conformance evaluation, and 3) those that are used to
Hierarchical relationships between one component and maintain security assurance after certification. ISO/IEC
another are identified. The short name for components 15408-3 defines ten security assurance classes. Two
consists of the class mnemonic, the family mnemonic, classes, APE and ASE, evaluate PPs and STs, respec-
and a unique number. tively. Seven classes verify that a TOE conforms to its

Common –
Controls
An element is an indivisible security requirement that PP and ST. One class, AMA, verifies that security assur-
can be verified by an evaluation, and it is the lowest-level ance is maintained between certification cycles. These
security requirement from which components are con- classes are lateral to one another; there is no hierarchical
structed.[7] One or more elements are stated verbatim for relationship among them. Accordingly, the standard
each component. Each element has a unique number that is presents the classes in alphabetical order. Classes repre-
appended to the component identifier. If a component has sent the broadest spectrum of potential security assurance
more than one element, all of them must be used. measures that a consumer may need to verify the integrity
Dependencies between elements are listed. Elements are
the building blocks from which functional security require-
ments are specified in a protection profile. Fig. 3 illustrates
the standard CC notation for security functional classes,
families, components, and elements.
Part 3 of ISO/IEC 15408 is a catalog of standardized functional 3-letter 1-digit
security assurance requirements or SARs. SARs define the requirement family code element
number
criteria for evaluating PPs, STs, and TOEs and the security 2-letter 1-digit
assurance responsibilities and activities of developers and class code component
number
evaluators. The CC organize SARs in a hierarchical struc-
ture of security assurance classes, families, components, Fig. 3 Standard notation for classes, families, components, and
and elements. Ten security assurance classes, 42 security elements.
512 Common Criteria: IT Security Evaluation

of the security functions performed by an IT product. An element is an indivisible security requirement that
Classes are the highest-level entity from which a consu- can be verified by an evaluation, and it is the lowest-level
mer begins to select security assurance requirements. security requirement from which components are con-
Table 4 lists the security assurance classes in alphabetical structed.[7] One or more elements are stated verbatim for
order and indicates their type. each component. If a component has more than one
An assurance family is a grouping of SARs that share element, all of them must be used. Dependencies between
security objectives. The members of a family are referred elements are listed. Elements are the building blocks from
to as components.[7] Each assurance family is assigned a which a PP or ST is created. Each assurance element has a
long name and a three-character mnemonic that is unique number that is appended to the component identi-
appended to the assurance class mnemonic. Family beha- fier and a one-character code. A “D” indicates assurance
Downloaded By: 10.3.97.143 At: 23:06 09 May 2023; For: 9781351235808, entry61, 10.1081/E-EIA-120046535

vior is described. Unlike functional families, the members actions to be taken by the TOE developer. A “C” explains
of an assurance family only exhibit linear hierarchical the content and presentation criteria for assurance
relationships, with an increasing emphasis on scope, evidence, that is, what must be demonstrated.[7] An “E”
depth, and rigor. Some families contain application notes identifies actions to be taken or analyses to be performed
that provide additional background information and con- by the evaluator to confirm that evidence requirements
siderations concerning the use of a family or the informa- have been met. Fig. 4 illustrates the standard notation for
tion it generates during evaluation activities. assurance classes, families, components, and elements.
Components are a specific set of security requirements Part 3 of ISO/IEC 15408 also defines seven hierarchical
that are constructed from elements; they are the smallest evaluation assurance levels, or EALs. An EAL is a group-
selectable set of elements that can be included in a Protection ing of assurance components that represents a point on the
Profile, Security Target, or a package.[7] Components are predefined assurance scale.[7] In short, an EAL is an assur-
assigned a long name and described. Hierarchical relation- ance package. The intent is to ensure that a TOE is not
ships between one component and another are identified. over- or underprotected by balancing the level of assurance
The short name for components consists of the class against cost, schedule, technical, and mission constraints.
mnemonic, the family mnemonic, and a unique number. Each EAL has a long name and a short name, which
Again, application notes may be included to convey addi- consists of “EAL” and a number from 1 to 7. The seven
tional background information and considerations. EALs add new and higher assurance components as

Table 4 Security assurance classes.


Short
name Long name Type Purpose
APE Protection profile PP/ST Demonstrate that the PP is complete, consistent, and technically sound
evaluation
ASE Security target PP/ST Demonstrate that the ST is complete, consistent, technically sound, and suitable for use as the
evaluation basis for a TOE evaluation
Common –

ACM Configuration TOE Control the process by which a TOE and its related documentation is developed, refined, and
Controls

management modified
ADO Delivery and TOE Ensure correct delivery, installation, generation, and initialization of the TOE
operation
ADV Development TOE Ensure that the development process is methodical by requiring various levels of specification
and design and evaluating the consistency between them
AGD Guidance TOE Ensure that all relevant aspects of the secure operation and use of the TOE are documented in
documents user and administrator guidance
ALC Lifecycle support TOE Ensure that methodical processes are followed during the operations and maintenance phase
so that security integrity is not disrupted
ATE Tests TOE Ensure adequate test coverage, test depth, functional and independent testing
AVA Vulnerability TOE Analyze the existence of latent vulnerabilities, such as exploitable covert channels, misuse or
assessment incorrect configuration of the TOE, the ability to defeat, bypass, or compromise security
credentials
AMA Maintenance of AMA Essure that the TOE will continue to meet its security target as changes are made to the TOE
assurance or its environment
PP/ST—Protection Profile or Security Target evaluation.
TOE—TOE conformance evaluation.
AMA—Maintenance of assurance after certification.
Common Criteria: IT Security Evaluation 513

ISO/IEC 15408-1 defines the CC/CEM generic user


1-digit
action community to consist of:
element type
assurance 3-letter 1-digit  Consumers
requirement family code element
number  Developers
2-letter 1-digit  Evaluators
class code component
number
Consumers are those organizations and individuals who
Fig. 4 Standard notation for assurance classes, families, are interested in acquiring a security solution that meets their
specific needs. Consumers state their security functional and
Downloaded By: 10.3.97.143 At: 23:06 09 May 2023; For: 9781351235808, entry61, 10.1081/E-EIA-120046535

components, and elements.


assurance requirements in a PP. This mechanism is used to
communicate with potential developers by conveying
security objectives become more rigorous. Application requirements in an implementation-independent manner
notes discuss limitations on evaluator actions and/or the and information about how a product will be evaluated.
use of information generated. Table 5 cites the seven stan- Developers are organizations and individuals who
dard EALs. design, build, and sell IT security products. Developers
respond to a consumer’s PP with an implementation-
The CEM dependent detailed design in the form of an ST. In addition,
developers prove through the ST that all requirements from
The Common Methodology for Information Technology the PP have been satisfied, including the specific activities
Security Evaluation, known as the CEM (or CM), was levied on developers by SARs.
created to provide concrete guidance to evaluators on how Evaluators perform independent evaluations of PPs,
to apply and interpret SARs and their developer, content and STs, and TOEs using the CC/CEM, specifically the eva-
presentation, and evaluator actions, so that evaluations are luator activities stated in SARs. The results are formally
consistent and repeatable. To date, the CEM consists of two documented and distributed to the appropriate entities.
parts and a supplement. Part 1 of the CEM defines the Consequently, consumers do not have to rely only on a
underlying principles of evaluations and delineates the developer’s claims—they are privy to independent assess-
roles of sponsors, developers, evaluators, and national eva- ments from which they can evaluate and compare IT
luation authorities. Part 2 of the CEM specifies the evalua- security products. As the standard[7] states:
tion methodology in terms of evaluator tasks, subtasks,
activities, subactivities, actions, and work units, all of The CC is written to ensure that evaluations fulfill the
which tie back to the assurance classes. A supplement was needs of consumers—this is the fundamental purpose
issued to Part 2 in 2001 that provides evaluation guidance and justification for the evaluation process.
for the ALC_FLR family. Like the CC, the CEM will
become an ISO/IEC standard in the near future. The Common Criteria Recognition Agreement
(CCRA),[10] signed by 15 countries to date, formally
assigns roles and responsibilities to specific organizations:

Common –
Controls
CC USER COMMUNITY AND STAKEHOLDERS  Customers or end users
 IT product vendors
The CC user community and stakeholders can be viewed  Sponsors
from two different constructs: 1) generic groups of users,  Common Criteria Testing Laboratories (CCTLs)
and 2) formal organizational entities that are responsible  National Evaluation Authorities
for overseeing and implementing the CC/ CEM worldwide  Common Criteria Implementation Management Board
(see Table 6). (CCIMB)

Table 5 Standard EAL packages.


Short name Long name Level of confidence
EAL 1 Functionally tested Lowest
EAL 2 Structurally tested
EAL 3 Methodically tested and checked
EAL 4 Methodically designed, tested, and reviewed Medium
EAL 5 Semi-formally designed and tested
EAL 6 Semi-formally verified design and tested
EAL 7 Formally verified design and tested Highest
514 Common Criteria: IT Security Evaluation

Table 6 Roles and responsibilities of CC/CEM stakeholders.


Category Roles and responsibilities
a
I. Generic Users
Consumers Specify requirements
Inform developers how IT product will be evaluated
Use PP, ST, and TOE evaluation results to compare products
Developers Respond to consumer’s requirements
Prove that all requirements have been met
Evaluators Conduct independent evaluations using standardized criteria
Downloaded By: 10.3.97.143 At: 23:06 09 May 2023; For: 9781351235808, entry61, 10.1081/E-EIA-120046535

b
II. Specific Organizations
Customer or end user Specify requirements
Inform vendors how IT product will be evaluated
Use PP, ST, and TOE evaluation results to compare IT products
IT product vendor Respond to customer’s requirements
Prove that all requirements have been met
Deliver evidence to sponsor
Sponsor Contract with CCTL for IT product to be evaluated
Deliver evidence to CCTL
Common Criteria Testing Request accreditation from National Evaluation Authority
Laboratory (CCTL) Receive evidence from sponsor
Conduct evaluations according to CC/CEM
Produce Evaluation Technical Reports
Make certification recommendation to National Evaluation Authority
National Evaluation Define and manage national evaluation scheme
Authority Accredit CCTLs
Monitor CCTL evaluations
Issue guidance to CCTLs
Issue and recognize CC certificates
Maintain Evaluated Products Lists and PP Registry
Common Criteria Facilitate consistent interpretation and application of the CC/CEM
Implementation Oversee National Evaluation Authorities
Management Render decisions in response to Requests for Interpretations (RIs)
Board (CCIMB)
Maintain the CC/CEM
Common –
Controls

Coordinate with ISO/IEC JTC1 SC27 WG3 and CEMEB


a
ISO/IEC 15408-1(1999-12-01), Information technology—Security techniques—Evaluation criteria for IT security—Part 1: Introduction and
general model; Part 2: Security functional requirements; Part 3: Security assurance requirements.
b
Arrangement on the Recognition of Common Criteria Certificates in the Field of Information Technology Security, May 23, 2000.

Customers or end users perform the same role as functional and assurance requirements specified in the
consumers in the generic model. They specify their PP have been satisfied by their ST and TOE. This proof
security functional and assurance requirements in a PP. and related development documentation is delivered to
By defining an assurance package, they inform develo- the Sponsor.
pers how the IT product will be evaluated. Finally, they A new role introduced by the CCRA is that of the
use PP, ST, and TOE evaluation results to compare IT Sponsor. A Sponsor locates an appropriate CCTL and
products and determine which best meets their specific makes contractual arrangements with them to conduct an
needs and will work best in their particular operational evaluation of an IT product. They are responsible for
environment. delivering the PP, ST, or TOE and related documentation
IT product vendors perform the same role as develo- to the CCTL and coordinating any pre-evaluation activ-
pers in the generic model. They respond to customer ities. A Sponsor may represent the customer or the IT
requirements by developing an ST and corresponding product vendor, or be a neutral third party such as a system
TOE. In addition, they provide proof that all security integrator.
Common Criteria: IT Security Evaluation 515

The CCRA divides the generic evaluator role into three maintains the current version of the CC/CEM and coordi-
hierarchical functions: Common Criteria Testing nates with ISO/IEC JTC1 SC27 WG3 and the CEMEB
Laboratories (CCTLs), National Evaluation Authorities, concerning new releases of the CC/CEM and related
and the Common Criteria Implementation Management standards.
Board (CCIMB).
CCTLs must meet accreditation standards and are
subject to regular audit and oversight activities to ensure
that their evaluations conform to the CC/CEM. CCTLs FUTURE OF CC
receive the PP, ST, or TOE and the associated documenta-
tion from the Sponsor. They conduct a formal evaluation of As mentioned earlier, the CC/CEM is the result of a
Downloaded By: 10.3.97.143 At: 23:06 09 May 2023; For: 9781351235808, entry61, 10.1081/E-EIA-120046535

the PP, ST, or TOE according to the CC/CEM and the 30 year evolutionary process. The CC/CEM and the pro-
assurance package specified in the PP. If missing, ambig- cesses governing it have been designed so that CC/CEM
uous, or incorrect information is uncovered during the will continue to evolve and not become obsolete when
course of an evaluation, the CCTL issues an Observation technology changes, like the Orange Book did. Given
Report (OR) to the sponsor requesting clarification. The that and the fact that 15 countries have signed the CCRA,
results are documented in an Evaluation Technical Report the CC/CEM will be with us for the long term. Two near-
(ETR), which is sent to the National Evaluation Authority term events to watch for are the issuance of both the CEM
along with a recommendation that the IT product be and the SSE-CMM as ISO/IEC standards.
certified (or not). The CCIMB has set in place a process to ensure
Each country that is a signatory to the CCRA has a consistent interpretations of the CC/CEM and to capture
National Evaluation Authority. The National Evaluation any needed corrections or enhancements to the methodol-
Authority is the focal point for CC activities within its ogy. Both situations are dealt with through what is known
jurisdiction. A National Evaluation Authority may take as the Request for Interpretation (RI) process. The first step
one of two forms—that of a Certificate Consuming in this process is for a developer, sponsor, or CCTL to
Participant or that of a Certificate Authorizing Participant. formulate a question. This question or RI may be triggered
A Certificate Consuming Participant recognizes CC certifi- by four different scenarios. The organization submitting
cates issued by other entities but, at present, does not issue the RI:[10]
any certificates itself. It is not uncommon for a country to
sign on to the CCRA as a Certificate Consuming Participant, 1. Perceives an error in the CC or CEM
then switch to a Certificate Authorizing Participant later, 2. Perceives the need for additional material in the CC
after it has established a national evaluation scheme and or CEM
accredited some CCTLs. 3. Proposes a new application of the CC or CEM and
A Certificate Authorizing Participant is responsible for wants this new approach to be validated
defining and managing the evaluation scheme within its 4. Requests help in understanding part of the CC or
jurisdiction. This is the administrative and regulatory CEM
framework by which CCTLs are initially accredited and
subsequently maintain their accreditation. The National The RI cites the relevant CC or CEM reference and

Common –
states the problem or question.

Controls
Evaluation Authority issues guidance to CCTLs about
standard practices and procedures and monitors evaluation The ISO/IEC has a 5 year reaffirm, update, or
results to ensure their objectivity, repeatability, and withdrawal cycle for standards. This means that the
conformance to the CC/CEM. The National Evaluation next version of ISO/IEC 15408, which will include all
Authority issues official CC certificates, if they agree of the final interpretations in effect at that time, should be
with the CCTL recommendation, and recognizes released near the end of 2004. The CCIMB has indicated
CC certificates issued by other National Evaluation that it may issue an interim version of the CC or CEM,
Authorities. In addition, the National Evaluation prior to the release of the new ISO/IEC 15408 version, if
Authority maintains the Evaluated Products List and PP the volume and magnitude of final interpretations war-
Registry for its jurisdiction. rant such an action. However, the CCIMB makes it clear
The Common Criteria Implementation Management that it remains dedicated to support the ISO/IEC
Board (CCIMB) is composed of representatives from process.[1]
each country that is a party to the CCRA. The CCIMB
has the ultimate responsibility for facilitating the consistent
interpretation and application of the CC/CEM across all REFERENCES
CCTLs and National Evaluation Authorities. Accordingly,
the CCIMB monitors and oversees the National Evaluation 1. Centralized resource for current information about the
Authorities. The CCIMB renders decisions in response to Common Criteria standards, members, and events, http://
Requests for Interpretations (RIs). Finally, the CCIMB www.commoncriteria.org.
516 Common Criteria: IT Security Evaluation

2. DoD 5200.28M. ADP Computer Security Manual— 6. Herrmann, D. A Practical Guide to Security Engineering
Techniques and Procedures for Implementing, Deactivating, and Information Assurance, Auerbach Publications: Boca
Testing, and Evaluating Secure Resource-Sharing ADP Raton, FL, 2001.
Systems, U.S. Department of Defense, January, 1973. 7. ISO/IEC 15408-1(1999-12-01). Information technology—
3. DoD 5200.28M. ADP Computer Security Manual— Security techniques—Evaluation criteria for IT security—
Techniques and Procedures for Implementing, Part 1: Introduction and general model.
Deactivating, Testing, and Evaluating Secure Resource- 8. ISO/IEC 15408-2(1999-12-01). Information technology—
Sharing ADP Systems, with 1st Amendment, U.S. Security techniques—Evaluation criteria for IT security—
Department of Defense, June 25, 1979. Part 2: Security functional requirements.
4. CSC-STD-001-83. Trusted Computer System Evaluation 9. ISO/IEC 15408-3(1999-12-01). Information technology—
Criteria (TCSEC), National Computer Security Center, Security techniques—Evaluation criteria for IT security—
Downloaded By: 10.3.97.143 At: 23:06 09 May 2023; For: 9781351235808, entry61, 10.1081/E-EIA-120046535

U.S. Department of Defense, August 15, 1983. Part 3: Security assurance requirements.
5. DoD 5200.28-STD. Trusted Computer System Evaluation 10. Arrangement on the Recognition of Common Criteria
Criteria (TCSEC), National Computer Security Center, U.S. Certificates in the Field of Information Technology
Department of Defense, December, 1985. Security, May 23, 2000.
Common –
Controls

You might also like