Good afternoon,

Hi Drexx, I'm not actually new with Common Criteria. I just don't deal
with this standard on an everyday basis..=) Yup, I agree with you that
a TOE is not necessarily a security-related product, but a system
offering a certain level of security features. I meant "Quality
Assurance" and it is not in the common criteria definition. I'm
referring to "QA Processes" by which we obtain the "reasonable level
of confidence/assurance" on the SFRs in the STs of the TOE under
evaluation. The SARs should be incorporated on these "QA" processes
(this is documented in the PP and ST). This is similar to how
financial/IT auditors test the design and operating effectiveness of
technical/business "controls" (security features of the TOE in infosec
parlance) to gain reasonable assurance or a certain level of reliance
that the controls are working effectively as designed over the period
of reliance (normally one calendar year).

Common Criteria gives a reasonable amount of flexibility in the
requirements specification, implementation, and evaluation process.
Similar TOEs may be evaluate on a different set of criteria depending
on the specified security requirements, what features the vendor has
actually implemented on the product, and which of these features a
certifying body (a laboratory) may evaluate to validate the vendor's
marketing stuff..=)

About the statement ""Trust, but verify." Which as a side note, is the
paradigm that IT auditors subscribe to.", I'm not sure where you got
this statement, but this is not true. I have been with the
IT/Financial controls and assurance practice for quite awhile and
believe me, there has always been emphasis on being "independent in
mind and in appearance" and part of this is maintaining professional
skepticism in any type of assurance or attestation engagements. You
can ask any auditor from any auditing firm including anyone from the
big four about what "professional skepticism" means to them. It's
defined in the standards issued by the International Federation of
Accountants (IFAC) which were the same standards adopted here in the
Philippines. I still remember this when I took my oath as a Certified
Public Accountant (CPA):

"(a) Independence of mind--the state of mind that permits the
provision of an opinion without being affected by influences that
impair professional judgment, allowing an individual to act with
integrity, and exercise objectivity and professional skepticism and
(b) Independence in appearance--the avoidance of facts and
circumstances that are so significant that a reasonable and informed
third party, having knowledge of all relevant information, would
reasonably conclude a firm's, or a member of the assurance team's,
integrity, objectivity or professional skepticism had been
unacceptably impaired."

It's also included in the ISACA IS Auditing Standards if you have the
Certified Information Systems Auditor (CISA) certification
(incidentally, we both have this certification):

"IS Auditing Standard - Irregularities and Illegal Acts - S9 - 04 The
IS auditor should maintain an attitude of professional skepticism
during the audit, recognising the possibility that material
misstatements due to irregularities and illegal acts could exist,
irrespective of his/her evaluation of the risk of irregularities and
illegal acts."

There is no such thing as "Trust" in the auditing profession except in
the following context - "The auditor must maintain an attitude of
professional skepticism concurrently with a working level of Trust
during the course of the audit.".

Anyway, it's nice to have these discussions and sharing valuable
perspectives regarding various topics. Thanks, Drexx.

-- 
Sincerely yours,

Cris

On Wed, Nov 5, 2008 at 1:24 AM, Drexx Laggui [personal]
<[EMAIL PROTECTED]> wrote:
> 04Nov2008 (UTC +8)
>
> Hiya Cris!
>
> I'm glad you got us going in this conversation, for it's a good
> opportunity to create more awareness about OWASP and Common Criteria
> (i.e. ISO/IEC 15408). I guess you and I believe that, like the
> business requirements being documented during an SDLC's Systems
> Analysis and Design phase, security requirements should also be
> formally recognized and addressed at that early stage.
>
> Let me help clarify some misconceptions that I think I see here, and
> help ease everybody's acceptance of both Common Criteria (also
> referred to as ISO/IEC 15408) and OWASP at the *same* time. Because if
> developers did their thing correct the first time, the world (e.g.
> Internet) would be a much less chaotic place to be in.
>
>
> On 11/4/08, Christian Masancay <[EMAIL PROTECTED]> wrote:
> [...]
>>  Although I believe that the Common Criteria is overkill for this or
>>  may even be irrelevant
>
> I don't fault you for thinking that, it's a common impression for
> anyone new at this. Did you know you can write a Security Target in
> the morning, that is designed to achieve only EAL1 (Evaluation and
> Assurance Level 1), and be done with the test project before the end
> of the day? I didn't know that either, but that was 10 years ago.
>
> EAL1 is basically just getting the hardware or software through some
> functional testing (example, user interfaces work as mentioned in the
> brochures), then comparing the developer's high-level description (of
> the hardware or software) to a prepared high-level checklist by an
> auditor.
>
> As you can see, EAL1 is pretty much *useless*. There is very little
> assurance to be gained in that exercise. EAL3 or EAL4, are the least
> levels that a hardware / software user should be concerned about to
> get that level of comfort required before trust can be given, but also
> without costing too much during the hardware / software development.
>
> EAL7 is the highest level, but as you say, maybe overkill for a
> typical web application.
>
>
> As for the relevance of Common Criteria and OWASP to a web
> application, there is plenty. What the OWASP Guide actually provides,
> as what you mention below, are SFRs (Security Functional Requirements)
> in Common Criteria parlance... or in simpler English, SFRs are
> information security features of a hardware or software product that
> enable it to protect *itself* from threats.
>
> For example, the strong authentication required for mission-critical
> web applications, or the controls used to protect against SQL
> injection, or the error-handling & logging features of the software,
> are all SFRs... which must be tested to verify for correctness in
> implementation and thus get the assurance and trustworthiness
> required.
>
> Yes, that's right, the underlying principle of the Common Criteria is:
> "Verify, then trust". (Not the other way around, like the popular
> saying that is attributed to Ronald Reagan: "Trust, but verify." Which
> as a side note, is the paradigm that IT auditors subscribe to.)
>
>
>> (At the bottom of my silly mind, the TOE is not
>>  even a security product),
>
> Au contraire, but it is. The TOE (Target Of Evaluation) is the
> hardware or software itself. Or, for a more definitive example using
> the previous case, the TOE refers to the *set* of SFR's coded in the
> web application (that has the Joomla CMS in it).
>
>
> Just to clarify: The "IT security product" that the Common Criteria
> refers to in its thick and boring documentation is practically any
> hardware or software, whether commercial or a one-time custom web
> application. An "IT security product" is something that can provide
> information security features (or controls, in auditor linggo) either
> for its environment (like firewalls and intrusion detection systems),
> or for itself (like O/S'es, or database systems, or other kinds of
> applications).
>
>> you can surely try to audit your
>>  implementation based on that standard..=)
>
> Yes, that will be ideal :)
>
>
>> Maybe having a defined PP,
>>  SFRs, ST, plus a nice level of confidence/QA (SARs and EAL) would be
>>  ok..just kidding, I think I know what you mean...=)
>
> It'll be more than ok, because it's required. A PP (Protection
> Profile) or an ST (Security Target) are both essential because well,
> no auditor can audit anything without having a documented basis for
> the audit undertaking.
>
> PPs and STs are the same in that both are central documents that
> describe the evaluation process, defines the security features (SFRs)
> of the application, the threats it is subject to, the security
> objectives that gives it reason for being, the environment which the
> application is used, the Security Assurance Requirements (SARs) to
> give the end-user the confidence that the evaluated application is
> exactly the same thing that was audited, and the targeted EAL
> (Evaluation Assurance Level).
>
> The only difference between a PP and an ST, is that a PP is usually
> written by a vendor or the developer, while an ST is written by an
> end-user who needs a solution for their sensitive information assets.
> (To put it differently, an ST can be put out in an RFP (Request For
> Proposals) but the document is organized like how the Common Criteria
> says it should be.)
>
>
> By the way, what do you mean by "QA"? I don't understand that term,
> nor does it exist in any definitions by Common Criteria, ISO/IEC 15408
> and 18045. If you mean Quality Assurance, then it's another subject
> matter. Strictly speaking, EAL != QA.
>
>
>>  Aside from the OWASP Development Guide as guidance, you can also
>>  suggest the OWASP Testing Guide
>>  http://www.owasp.org/index.php/OWASP_Testing_Guide_v2_Table_of_Contents
>>  to your customers for conducting tests/audits to validate their
>>  remediation implementation on their web applications.
>
>
> Hope this helps !
>
>
>
> Drexx Laggui  -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI, CSA
> http://www.laggui.com  ( Singapore / Manila / California )
> Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer
> PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4  8363 FFEC 3976 FF31 8A4E
> _________________________________________________
> Philippine Linux Users' Group (PLUG) Mailing List
> http://lists.linux.org.ph/mailman/listinfo/plug
> Searchable Archives: http://archives.free.net.ph
>
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to