Standards for Product Security Assessment
István Zsolt Berta, Levente Buttyán, and István VAJDA, Budapest University of Technology and Economics, Hungary
Introduction
Approaches for Assessing Security
Approaches
How Can We Assess the Security of a Production?
Overview of Standards
Two Groups of Standards
Common Criteria Paradigm
Scope of Common Criteria
Approach
Security Requirements
Derivation of Requirements
Evaluation Assurance Levels
Common Criteria in Practice
Common Evaluation Methodology (CEM)
Common Criteria Recognition Arrangement (CCRA)
Trends in Evaluations
Criticisms of CC
Conclusion
Glossary
Cross References
References
INTRODUCTION
Defining the concept of a “security product” is a difficult issue. Certain products are designed with security as their primary purpose. For example, the existence of firewalls, smart cards, or intrusion detection systems can only be explained by security reasons. On the other hand, products such as operating systems, word processors, or e-mail clients have other functionalities they must fulfill; otherwise, they cannot be sold, regardless of their security. However, security is still a critical issue in this latter group, too. Security is often not a product by itself, but a requirement that all products should fulfill to a certain degree. In this sense, every IT product can be considered a security product.
It might be relatively easy to evaluate the usability of a product by testing some of the most frequent scenarios. However, the security ...
Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.