ECMA TR 64-1993 Secure Information Processing versus the Concept of Product Evaluation《安全信息处理与产品评价理念》.pdf
《ECMA TR 64-1993 Secure Information Processing versus the Concept of Product Evaluation《安全信息处理与产品评价理念》.pdf》由会员分享,可在线阅读,更多相关《ECMA TR 64-1993 Secure Information Processing versus the Concept of Product Evaluation《安全信息处理与产品评价理念》.pdf(26页珍藏版)》请在麦多课文档分享上搜索。
1、EUROPEAN COMPUTER MANUFACTURERS ASSOCIATIONSecure Information Processingversus the Concept of Product EvaluationECMA TR/64December 1993Free copies of this document are available from ECMA,European Computer Manufacturers Association,114 Rue du Rhne - CH-1204 Geneva (Switzerland)Phone: +41 22 735 36 3
2、4 Fax: +41 22 786 52 31X.400: C=ch, A=arcom, P=ecma, O=genevanet,OU1=ecma, S=helpdeskInternet: helpdeskecma.chEUROPEAN COMPUTER MANUFACTURERS ASSOCIATIONSecure Information Processingversus the Concept of Product EvaluationECMA TR/64December 1993Brief HistoryIn September 1990 the European Commission
3、announced the “Harmonized IT Security Evaluation Criteria“ ITSEC. Thegovernments of France, Germany, Great Britain and the Netherlands had agreed on a common set of criteria for IT securityevaluations. The European Commission proposed these criteria for usage within the European Community.The ITSEC
4、deviated substantially from the US TCSEC, (Trusted Computer System Evaluation Criteria) commonly known asOrange Book, the de-facto standard since 1983.This created a problem for all world-wide operating computer manufacturers who were faced with two problems: to which set of criteria they should dev
5、elop their products, and if a product was developed to one set of criteria, would a customer in a country outside the influence of this set accept theproduct and its evaluation.Users of IT products were confused because they did not know, which set of criteria would meet their requirements.The Europ
6、ean Computer Manufacturers Association, ECMA, was alerted by its members, mostly world-wide operatingcompanies. The ECMA General Assembly therefore decided already in December 1990 to establish an ad hoc group onSecurity. This group started its work in March 1991. Later in 1991 the group became ECMA
7、/TC36 and then TC36/TG1.The group decided to address the problem twofold: First, to write an ECMA Technical Report which positions security evaluations in the context of secure informationprocessing in order to highlight the fact that an evaluated product or system can only guarantee security, when
8、the totalsystem, its environment and its operation are secure. Second, to develop an ECMA Standard for a functionality class which defines a minimum set of requirements forcommercial application. This class was called “Commercially Oriented Functionality Class“ or COFC. It distinguishesitself from t
9、he Orange Book and respective ITSEC functionalities, which are more tuned towards military and governmentrequirements for confidentiality of classified information. Assurance criteria, as addressed on the Orange Book andITSEC, have not been taken into account.Both, the Technical Report and the Stand
10、ard are intended to be a contribution to the ongoing harmonisation process. Theyhighlight commercial requirements, which call for an appropriate evaluation process, ranging from vendor self-testing toaccredited third party testing, and a minimal set of functional requirements, which satisfy commerci
11、al needs.Adopted as an ECMA Technical Report by the General Assembly of December 1993.- i -Table of contents1Scope 12 References 13 Acronyms and abbreviations 14 Introduction 25 Approaching Security: System perspective, Balance, Feedback 25.1 System perspective 25.2 Balance 35.3 Feedback 36 Security
12、 Evaluations: the Practice 47 The Value of Formal Evaluations in the Commercial Market 58 Conclusions 6Annex A - The Concept of Security Evaluations - A Tutorial 7A.1 Introduction 7A.2 Availability, Integrity, Confidentiality 8A.3 Security Target 8A.4 Protection Profile 9A.5 Functional Criteria 9A.6
13、 Assurance Criteria 10A.7 Predefined Functionality Classes 11A.8 The Evolution of Security Evaluation Criteria 11A.9 Evaluation and Certification 13A.10 Harmonization of Criteria 14- ii -1ScopeThis paper examines the value of security evaluation criteria and the accompanying evaluation process in ac
14、ommercial environment. It argues this question must be approached systematically within the context of a fullcomplement of security measures so as to maximize the value from associated investments. It then focuses on thepotential benefit specific to evaluations and makes recommendations as to the pr
15、ocesses for creating an IT securityprogram with special emphasis on security evaluations.Annex A is a review of the history and current status of formal evaluation programs. Readers unfamiliar with thistopic may wish to read this first.2 ReferencesECMA-138 Security in Open Systems - Data Elements an
16、d Service Definitions (1989)ECMA-205 Commercially oriented functionality class for security evaluation (COFC) (1993)ECMA-TR/46 Secutiry in Open Systems - A Security Framework (1988)ECMA-apa Auhentication and Priviliege Attribute Security Application with Related Key DistributionFunctions (in prepara
17、tion)/Lipner 91/ Steven B. Lipner, “Criteria, Evaluation and the International Environment: where have webeen, where are we going?“. Proceedings of the IFIP TC11 Seventh International Conferenceon Information Security: IFIP/SEC91 Brighton, UK, 45-17 May 1991. Edited by David T.Lindsay. Wyn L. Price.
18、 lSBN: 0 444 89219 2./GIS 91/ Information Technology Security Evaluation Criteria - Harmonized Criteria of France,Germany, the Netherlands, the United Kingdom. Provisional. Version 1.2 GermanInformation Security Agency, Bonn, 1991./DOD 85/ Department of Defense: Trusted Computer Systems Evaluation C
19、riteria. DOD 5200.28-STD,USA, 1985./Neumann 91/ Peter G. Neumann and Contributors: Risks to the Public. ACM Software Engineering Notes.Vol. 46, Jan. 1991./Le Roux 90/ Yves Le Roux, “Technical Criteria for Security Evaluation of Information TechnologyProducts“, Digital Equipment Corporation 1990/ECTE
20、L. EUROBIT/ Conformity Testing for IT Products, Second Edition 1992.3 Acronyms and abbreviationsDoD Department of Defense (USA)COFC Commercially Oriented Functionality ClassCTCPEC Canadian Trusted Computer Product Evaluation CriteriaIEC International Electrical CommitteeISO International Standards O
21、rganisationIT Information TechnologyITSEC Information Technology Security Evaluation CriteriaITSEM IT Security Evaluation Methodology ManualJTC1 Joint Technical Committee 1NIST National Institute for Standardization and Technology (USA)NSA National Security Agency (USA)- 2 -TCSEC Trusted Computer Sy
22、stem Evaluation CriteriaTOE Target of EvaluationTR Technical ReportSC27 ISO/IEC JTC1 SC (Sub Committee) 27 “IT Security“WG3 ISO/IEC JTC1/SC27 WG (Working Group) 3 “IT Security Evaluation Criteria“4 IntroductionWe assume the bank will keep our money in a safe, use armoured vehicles for transport, onl
23、y permit authorized peopleto complete a transaction, and audit all transactions. Furthermore, we require banks to adhere to accepted bankingpractices and open their books to independent review. Doing this well can give one bank a competitive edge over itsrivals. Information is the currency in a comm
24、ercial enterprise, and information management is critical to itscompetitive position. How to protect information and the potential role of formally evaluated systems is the subject ofthis paper.In the past 30 years weve seen computer technology revolutionize how we manage information - and its not o
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ECMATR641993SECUREINFORMATIONPROCESSINGVERSUSTHECONCEPTOFPRODUCTEVALUATION 安全 信息处理 产品 评价 理念 PDF

链接地址:http://www.mydoc123.com/p-704871.html