Intended audienceThis two-day workshop will be applicable to technical personnel seeking to apply the concepts of the Common Criteria (CC) in the specification and verification of security properties for IT products and systems. It will be presented in a workshop format to maximize interaction and to concentrate on issues and concepts at the pace of the participants. As such, this workshop should be restricted in size to no more than thirty students. Attendees are expected to have an understanding of technical Information Technology security issues and to have knowledge on the CC at least to the level of the one-day seminar. Attendees are expected mostly from government or laboratories in support of government but may be open to inter-government and industry organizations seeking technical knowledge on the application of the CC. Course objectiveCourse attendees will become familiar with the application of the technical concepts of system specification and evaluation in the Common Criteria. The workshop will be split into one-hour sessions with sufficient time set aside for answering questions from the participants and for practical exercises to reinforce the knowledge. The subjects for this seminar will build on the participants understanding, equivalent to the information provided during the one-day introductory seminar, and address the following questions - What is done in evaluation using the CC?
- How does the CC help in performing a threat and risk assessment?
- What goes into developing security specifications using the Common Criteria (Protection Profiles and Security Targets?)
- How is the CC used to specify the functional capabilities in systems?
- How is the CC used to define, specify and assess those capabilities?
- How does the CC apply to complex systems versus individual products?
- What are common misconceptions of and mistakes in using the CC?
Course outlineDay One- 0830 - 0900
- 0900 - 0930
- 0930 - 1000
- CC central terminology and their relationships
- 1000 - 1100
- Protection Profiles and Security Targets
- What they are and how they are related
- What they contain
- How they are developed
- How they are used
- 1100 - 1130
- 1130 - 1230
- The technical underpinnings of the standard
- Security functionality and its relationship to business function
- Independently gained assurance in security functions
- Tradeoffs for secure systems
- 1300 - 1400
- 1400 - 1500
- The security problem
- Risk management and defining the "security problem"
- Determining a "security solution"
- Use of standard method of formulating, expressing, and justifying, a security solution Tailoring security functional requirements
- Requirements versus design constraints
- Relationship of requirements to objectives
- Types of tailoring operations
- 1500 - 1600
- 1600- 1730
- Using CC Part 2 as a catalogue of system security capabilities
- An overview of the types of security functionality
- Interrelationships among security functions
- 1730 - 1800
- Discussion and "overnight thoughts"
Day Two- 0900 - 0930
- Discussion of "overnight thoughts"
- 0930 - 1030
- Class Exercise on choosing and tailoring function requirements
- 1030 - 1100
- 1100 - 1200
- Using CC Part 3 as a catalogue of assessment activities
- An overview of the types of security assurance requirements
- The differences between Part 2 and Part 3
- Overview of evaluator activities
- Achieving impartial, comparable evaluation results
- Types, contents and purpose of evaluation reporting
- 1200 - 1300
- Class exercise in evaluator activities
- 1300 - 1400
- 1400 - 1500
- Methods of combining security requirements
- Definition of the Target of Evaluation
- Packages, including Evaluation Assurance Levels
- 1500 - 1600
- CC Framework support for system specification
- CC definition of system
- Trust relationships and interfaces
- System requirement decomposition and System composition
- Relationship and reuse of subsystem evaluation results
- The role of the CC in design/development/integration test
- Stretching the CC versus breaking the CC for system specification and assessment
- 1600 - 1630
- 1630 - 1730
- System specifications (continued)
- 1730 - 1800
- Closing session and final comments
|