I would suggest defining High Assurance in terms of FIPS-140-2 Level 4. Of course FIPS 140-2 refers to the Common Criteria AL4 or higher, but does offer specific criteria to be used in the evaluation. That being said, however, while the stated goal is for a high assurance API, there is nothing in principal which limits the API to high assurance applications.
I would also point out that the Orange Book (as was the entire original Rainbow series) was targeted at information processing systems. These systems were essentially large data bases with many users gaining access via dedicated terminals, and there are those who would argue that the old assurance levels, were also not that well defined. As these system evolved and internet access was introdouced there was additional volumes created to address some of the security issues involved. I would argue that nothing in the Rainbow series specifically addressed security requirements or assurance levels for cryptographic modules. One advantage of the Common Criteria, is that the meaning of any given Assurance Level for a given application (e.g. a Cryptographic module) can be defined through an evaluation profile. Another advantage is that it is an internationally recognized set of criteria with a group of international evaluation/certification bodies. ________________________________________ From: Davidson, John A. [[email protected]] Sent: Friday, May 13, 2011 1:34 PM To: CICM Discussion List Subject: Re: [cicm] BoF Request for CICM at IETF 81 Lev, I am wondering if we need to (or even can) clarify what we mean by High Assurance. Assurance levels were fairly well-defined under the Orange Book but that has been grayed out by the move to international flavored Common Criteria. Today when we say we are addressing HA, it is no longer clear to me whether we mean to restrict our view to approaches that are logically "closed form," or if we mean just a better version of "best effort," whatever that is. In my mind, there are IA critical capabilities we can support with one that may be ruled out by the other. Thanks, John -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Novikov, Lev Sent: Friday, May 13, 2011 10:01 AM To: [email protected] Cc: CICM Discussion List ([email protected]) Subject: [cicm] BoF Request for CICM at IETF 81 I'm formally requesting a BoF at IETF 81 to form a CICM WG based on the draft charter below. Updated version at: http://code.google.com/p/ietf-cicm/wiki/WGCharter Discussion also at: [email protected] Thanks, Lev Draft CICM Working Group Charter = Description of Working Group = The Common Interface to Cryptographic Modules (CICM) API provides high assurance crypto applications with a security framework that accommodates the needs of a high assurance environment including security domain separation, and enhanced module, key, and channel management capabilities. The purpose of the CICM Working Group is to shepherd the CICM specification documents to publication and provide guidance for any new submissions related to high assurance cryptos. Specifically, the Working Group will: * Complete existing requests: * replace algorithm strings with OIDs * use ABNF notation for unique identifiers syntax * add module events for symmetric and asymmetric key filled * Shepard the following documents to publication: * draft-lanz-cicm * draft-lanz-cicm-lm * draft-lanz-cicm-mm * draft-lanz-cicm-km * draft-lanz-cicm-cm = Goals and Milestones = TBD WGLC on draft-lanz-cicm-lm TBD WGLC on draft-lanz-cicm TBD WGLC on draft-lanz-cicm-mm TBD WGLC on draft-lanz-cicm-km TBD Submit draft-lanz-cicm to the IESG as Proposed Standard _______________________________________________ cicm mailing list [email protected] https://www.ietf.org/mailman/listinfo/cicm _______________________________________________ cicm mailing list [email protected] https://www.ietf.org/mailman/listinfo/cicm
