ISO/IEC. Third edition. Information technology — Security techniques — Evaluation criteria for IT security —. Part 2: Security functional. ISO/IEC (E). PDF disclaimer. This PDF file may contain embedded typefaces. In accordance with Adobe’s licensing policy, this file. The Common Criteria for Information Technology Security Evaluation is an international standard (ISO/IEC ) for computer security certification.
|Published (Last):||1 March 2015|
|PDF File Size:||3.15 Mb|
|ePub File Size:||12.80 Mb|
|Price:||Free* [*Free Regsitration Required]|
Evaluations activities are therefore only performed to a certain depth, use of time, and resources and offer reasonable assurance for the intended environment. ISO standards by standard number.
Common Criteria certification is sometimes specified for IT procurement. Other standards containing, e. There are no security requirements that address the need to trust external systems or the communications links to such systems. In Sept ofthe Common Criteria published a Vision Statement implementing to a large extent Chris Salter’s thoughts from the previous year.
The UK has also produced a number of alternative schemes when the timescales, costs and overheads of mutual recognition have been found to be impeding the operation of the market:.
Retrieved from 51408-2 https: List of International Electrotechnical Commission standards. Evaluations at EAL5 and above tend to involve the security requirements of the host nation’s government.
Vendors can then 154408-2 or make claims about the security attributes is their products, and testing laboratories can evaluate the products to determine if they actually meet the claims. In other words, products evaluated against a Common Criteria standard exhibit a clear chain of evidence that the process of specification, implementation, and evaluation has been conducted in a rigorous and standard manner.
The TOE is applicable 15408-22 networked or distributed environments only if the entire network operates under the same constraints and resides within a single management domain.
In a research paper, computer specialist David A. In other words, Common Criteria provides assurance that the process of specification, implementation and evaluation of a computer security product has been conducted in a rigorous and standard and repeatable 1540-2 at a level that is commensurate with the target environment isk use. Although some have argued that both paradigms do not align well,  others have attempted to reconcile both paradigms.
More recently, PP authors are including cryptographic requirements for CC evaluations that would typically be covered by FIPS evaluations, broadening the bounds of the CC through scheme-specific interpretations.
If any of these security vulnerabilities are exploitable in the product’s evaluated configuration, the product’s Common Criteria certification should be voluntarily withdrawn by the vendor. Some national evaluation schemes are phasing out EAL-based evaluations and only accept products for evaluation that claim strict conformance with an approved PP.
Standard ISO/IEC , CC v Release 4
CC was produced by unifying these pre-existing standards, predominantly so that companies selling computer products for the government market mainly for Defence or Intelligence 154408-2 would only need to have them evaluated against one set of standards.
Archived from the original PDF on April 17, There is some concern that this may have a negative impact on mutual recognition. The evaluation process also tries to establish the level of confidence that may be placed in jso product’s security features through quality assurance processes:.
This page was last edited on 6 Decemberat Objections outlined in the article include:. Instead, national standards, like FIPS give the specifications for cryptographic modules, and various standards specify the cryptographic algorithms in use. As well as the Common Criteria standard, there is also a sub-treaty level Common Criteria MRA Mutual Recognition Arrangementwhereby each party thereto recognizes evaluations against the Common Criteria standard done by other parties.
Computer security standards Evaluation of computers ISO standards.
This is possible because the process of obtaining a Common Criteria certification allows a vendor to restrict the analysis to certain security features and to make certain assumptions about the operating environment and the strength of threats faced by the product in that environment. In Septembera majority of members of the CCRA produced a vision statement whereby mutual recognition of 15408–2 evaluated products will be lowered to EAL 2 Including augmentation with flaw remediation.
Key elements of the Vision included:. Views Read Edit View history. Wheeler suggested that the Common Criteria process discriminates against free and open-source software FOSS -centric organizations and development models.
Common Criteria – Wikipedia
From Wikipedia, the free encyclopedia. This shows both the limitation and strength of an evaluated configuration. In this approach, communities of interest form around technology types which in turn develop protection profiles that define the evaluation methodology for the technology type. Various Microsoft Windows versions, including Windows Server and Windows XPhave been certifiedbut security patches to address security vulnerabilities are still getting published by Microsoft for these Windows systems.
Archived from the original on August 1, Common Criteria certification cannot guarantee security, but it can ensure that claims about the security attributes of the evaluated product were independently verified. Based on this and other assumptions, which may not be realistic for the common use of general-purpose operating systems, the claimed security functions of the Windows products are evaluated. Failure by the vendor to take either of these steps would result in involuntary withdrawal of the product’s certification by the certification body of the country in which the product was evaluated.
Alternatively, the vendor should re-evaluate the product to include the application of patches to fix the security vulnerabilities within the oso configuration.