ECMA 205-1993 Commercially Oriented Functionality Class for Security Evaluation (COFC)《安全性评估用面向商业的功能性类别(COFC)》.pdf
《ECMA 205-1993 Commercially Oriented Functionality Class for Security Evaluation (COFC)《安全性评估用面向商业的功能性类别(COFC)》.pdf》由会员分享,可在线阅读,更多相关《ECMA 205-1993 Commercially Oriented Functionality Class for Security Evaluation (COFC)《安全性评估用面向商业的功能性类别(COFC)》.pdf(24页珍藏版)》请在麦多课文档分享上搜索。
1、EUROPEAN COMPUTER MANUFACTURERS ASSOCIATIONSTANDARD ECMA - 205Commercially oriented functionality classfor security evaluation(COFC)December 1993Free copies of this document are available from ECMA,European Computer Manufacturers Association,114 Rue du Rhne - CH-1204 Geneva (Switzerland)Phone: +41 2
2、2 735 36 34 Fax: +41 22 786 52 31X.400: C=ch, A=arcom, P=ecma, O=genevanet,OU1=ecma, S=helpdeskInternet: helpdeskecma.chEUROPEAN COMPUTER MANUFACTURERS ASSOCIATIONSTANDARD ECMA - 205Commercially oriented functionality classfor security evaluation(COFC)December 1993Brief HistoryIn September 1990 the
3、European Commission announced the “Harmonized IT Security Evaluation Criteria“ ITSEC. Thegovernments of France, Germany, Great Britain and the Netherlands had agreed on a common set of criteria for IT securityevaluations. The European Commission proposed these criteria for usage within the European
4、Community.The ITSEC deviated substantially from the US TCSEC, (Trusted Computer System Evaluation Criteria) commonly knownas Orange Book, the de-facto standard since 1983.This created a problem for all world-wide operating computer manufacturers who were faced with two problems: to which set of crit
5、eria they should develop their products, and if a product was developed to one set of criteria, would a customer in a country outside the influence of this set acceptthe product and its evaluation.Users of IT products were confused because they did not know, which set of criteria would meet their re
6、quirements.The European Computer Manufacturers Association, ECMA, was alerted by its members, mostly world-wide operatingcompanies. The ECMA General Assembly therefore decided already in December 1990 to establish an ad hoc group onSecurity. This group started its work in March 1991. Later in 1991 t
7、he group became ECMA/TC36 and then TC36/TG1.The group decided to address the problem twofold: First, to write an ECMA Technical Report which positions security evaluations in the context of secure informationprocessing in order to highlight the fact that an evaluated product or system can only guara
8、ntee security, when the totalsystem, its environment and its operation are secure. Second, to develop an ECMA Standard for a functionality class which defines a minimum set of requirements forcommercial application. This class was called “Commercially Oriented Functionality Class“ or COFC. It distin
9、guishesitself from the Orange Book and respective ITSEC functionalities, which are more tuned towards military andgovernment requirements for confidentiality of classified information. Assurance criteria, as addressed on the OrangeBook and ITSEC, have not been taken into account.Both, the Technical
10、Report and the Standard are intended to be a contribution to the ongoing harmonisation process. Theyhighlight commercial requirements, which call for an appropriate evaluation process, ranging from vendor self-testing toaccredited third party testing, and a minimal set of functional requirements, wh
11、ich satisfy commercial needs.This ECMA Standard has been adopted by the ECMA General Assembly of December 1993.- i -Table of contents1 Scope 12 Conformance 23 References 24 Definitions 24.1 Terms defined in this document 24.1.1 Access right 24.1.2 Administration 24.1.3 Customer-specifiable 24.1.4 Id
12、entification 24.1.5 User identifier 24.2 Terms defined in other documents 35 Acronyms 36 Specification of security enforcing functions 36.1 Identification and Authentication 36.1.1 Unique Identification and Authentication 36.1.2 Identification and Authentication prior to all other interactions 36.1.
13、3 Associate information to users 36.1.4 Logon message 36.1.5 Number of logon trials 36.1.6 Expiration of unused user identifiers 46.1.7 Disable users temporarily 46.1.8 User status information 46.1.9 Authentication information protection 46.1.10 Authentication information independence 46.1.11 Authen
14、tication information aging 46.2 Access Control 46.2.1 Authenticated user identification 46.2.2 Individual user 46.2.3 User groups 46.2.4 Objects 46.2.5 Types of access rights 56.2.6 Default access rights 56.2.7 Precedence of access rights 56.2.8 Date of modification 56.2.9 Verification of rights 56.
15、2.10 Application controlled access rights 56.3 Accountability and audit 5- ii -6.3.1 Associate actions and users 56.3.2 Logging 56.3.4 Copy audit trails 66.3.5 Alarm if unable to record 66.3.6 Select users 66.3.7 Dynamic control 76.4 Object Reuse 76.5 Accuracy 76.5.1 TOE software integrity 76.5.2 Da
16、ta integrity 76.5.3 Security parameters status report 76.6 Reliability of service 76.6.1 Recovery 76.6.2 Data backup 77 Password specific requirements 77.1 User-changeable password 77.2 Password aging 77.3 Password expiration notification 77.4 Password reuse 77.5 Password complexity 87.6 Password lo
17、gging 87.7 Default passwords 8Annex A (informative) Access control model 9Annex B (informative) Terms defined in other documents 111 ScopeThe objective of this ECMA Standard is to define a widely accepted basic security functionality class for thecommercial market. It is articulated in a structured
18、way consistent with TCSEC, ITSEC and MSFR concepts.Readers unfamiliar with security and these concepts are encouraged to read TCSEC, ITSEC and MSFR if they wishto understand fully this text.This standard addresses only IT security. Other security areas like personnel security, physical security andp
19、rocedural security are not covered.This standard defines a basic functionality class for the commercial market. It addresses multi-user, stand-alone IT-systems without considering networking or remote access. The areas networking, distributed processing, anonymity,pseudonymity, unlinkability, unobse
20、rvability are still evolving. Once these matters are better understood additionalrequirements will be defined as an add-on, in a new version of this class or in a new extended class. Multi-processorsystems however are covered as long as a single system image is provided.Table 1 shows the security en
21、forcing functions by which the major assumed threats are countered.Table 1. Major assumed threats countered by security enforcing functionsTHREAT SECURITY ENFORCING FUNCTIONOutsider attack - Unauthorized access to the TOE 6.1.2 Identification and Authentication prior toall other interactionsInsider
22、attack - Individual responsibility 6.1.1 Unique Identification and Authentication6.3 Accountability6.4 AuditAutomatic logon attacks 6.1.5 Number of logon trialsDisclosure of authentication information 6.1.9 Authentication information protection6.1.10 Authentication information sharing6.1.11 Authenti
23、cation information agingDisclosure of information 6.2 Access Control6.5 Object ReuseManipulation of information (accidental orintentional)6.2 Access Control6.6 AccuracyTOE failure 6.7.1 RecoveryNatural disasters 6.7.2 Data backupThis Standard defines minimum functional requirements independent of an
24、y platform. It focuses on functions andnot on mechanisms or implementation specific details. Where mechanisms are addressed, e.g. “Password specificrequirements,“ they are clearly separated. Examples are introduced with the phrase “As an example .“; they are forillustration purposes only.- 2 -2 Conf
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ECMA2051993COMMERCIALLYORIENTEDFUNCTIONALITYCLASSFORSECURITYEVALUATIONCOFC 安全性 评估 面向 商业 功能 类别 COFCPDF

链接地址:http://www.mydoc123.com/p-704672.html