hello, wow. salamat naman at may mga ganitong discussions. really helpful. medyo nakakahilo lang. :D
On Wed, Nov 5, 2008 at 4:47 PM, Drexx Laggui [personal] <[EMAIL PROTECTED]> wrote: > 05Nov2008 (UTC +8) > > Magandang araw po muli! > > > On 11/5/08, Christian Masancay <[EMAIL PROTECTED]> wrote: >> Good afternoon, >> >> Hi Drexx, I'm not actually new with Common Criteria. I just don't deal >> with this standard on an everyday basis..=) > > I went back to some of my previous e-mails and *I'm sorry* that I have > only begun to realize that I've been too passionate about OWASP and > Common Criteria :) > > I just believe that both these two are important to making the > Internet a better place, yet so *misunderstood* that it's disregarded > by many (ignorance is bliss?) --and I got triggered. Hindi naman kasi > talaga madaling tanggapin ng marami ang CC, pero pasalamat naman ako > na medyo sinuwerte ng kaunti nuong nasa Check Point Software Tech ako, > as the engineer working on VPN-1/Firewall-1 para tanggapin ng > Singapore government... kasama ko dati si Alex Ragen sa trabaho at > siya ang project lead namin. Took us about a year to do it each time. > > Ngayon naman ay nag-umpisa (on academic level, at least) ako with > fellow CC consultants in Modi'in (Israel) at San Luis Obispo (Ca, USA) > to merge both OWASP and Common Criteria as practice, and then later > publish STs for common web applications as an open-source document. > We're doing this only on our free time only though. > > Closer to home, I've presented using Common Criteria to some > government offices and their commissioners (pro bono pa nga eh, para > lang may mangyari) but sadly, it's one of the controls that is first > dropped just so they can "meet deadlines". It seems auditing source > code (even if developed in-house), is not a recognized issue here. > It's a nice-to-have daw, pero hindi daw importante. <sigh!> I guess > that at the root of this, risk is a poorly understood abstract. > > [...] >> About the statement ""Trust, but verify." Which as a side note, is the >> paradigm that IT auditors subscribe to.", I'm not sure where you got >> this statement, but this is not true. I have been with the >> IT/Financial controls and assurance practice for quite awhile and >> believe me, there has always been emphasis on being "independent in >> mind and in appearance" and part of this is maintaining professional >> skepticism in any type of assurance or attestation engagements.[...] > > I read this with interest, as well as everything you wrote in support > of this. "Trust, but verify" comes from the realization that IT > auditors are involved only after IT systems have been put in place > already. IT auditors are not involved in the SDLC until after all > things are all set and done. However, IT auditors *maybe* consulted > (only) by the developers in the early stages of the SDLC, for the > developers to ask what audit-related controls they need to be in the > IT system. IT auditors ideally are only involved after the SDLC so as > to maintain their professional and organization independence. Am I > mistaken in this? > > The concept is that end-users "trust" the new IT system first, > *before* IT auditors come in to "verify" that the required information > security controls are in place. Thus, "trust, but verify." > >> There is no such thing as "Trust" in the auditing profession except in >> the following context - "The auditor must maintain an attitude of >> professional skepticism concurrently with a working level of Trust >> during the course of the audit.". > > True that. The context of "trust" here however, is about the > trustworthiness of information assets --"trust" being a measure of the > comfort level, or assurance, that an IT system will do what it's > supposed to do: no more, no less. > > >> Anyway, it's nice to have these discussions and sharing valuable >> perspectives regarding various topics. Thanks, Drexx. > > Pleasure is all mine, kind sir :) > > >> On Wed, Nov 5, 2008 at 1:24 AM, Drexx Laggui [personal] <[EMAIL PROTECTED]> >> wrote: >> >>> 04Nov2008 (UTC +8) >>> >>> Hiya Cris! >>> >>> I'm glad you got us going in this conversation, for it's a good >>> opportunity to create more awareness about OWASP and Common Criteria >>> (i.e. ISO/IEC 15408). I guess you and I believe that, like the >>> business requirements being documented during an SDLC's Systems >>> Analysis and Design phase, security requirements should also be >>> formally recognized and addressed at that early stage. >>> >>> Let me help clarify some misconceptions that I think I see here, and >>> help ease everybody's acceptance of both Common Criteria (also >>> referred to as ISO/IEC 15408) and OWASP at the *same* time. Because if >>> developers did their thing correct the first time, the world (e.g. >>> Internet) would be a much less chaotic place to be in. >>> >>> >>> On 11/4/08, Christian Masancay <[EMAIL PROTECTED]> wrote: >>> [...] >>>> Although I believe that the Common Criteria is overkill for this or >>>> may even be irrelevant >>> >>> I don't fault you for thinking that, it's a common impression for >>> anyone new at this. Did you know you can write a Security Target in >>> the morning, that is designed to achieve only EAL1 (Evaluation and >>> Assurance Level 1), and be done with the test project before the end >>> of the day? I didn't know that either, but that was 10 years ago. >>> >>> EAL1 is basically just getting the hardware or software through some >>> functional testing (example, user interfaces work as mentioned in the >>> brochures), then comparing the developer's high-level description (of >>> the hardware or software) to a prepared high-level checklist by an >>> auditor. >>> >>> As you can see, EAL1 is pretty much *useless*. There is very little >>> assurance to be gained in that exercise. EAL3 or EAL4, are the least >>> levels that a hardware / software user should be concerned about to >>> get that level of comfort required before trust can be given, but also >>> without costing too much during the hardware / software development. >>> >>> EAL7 is the highest level, but as you say, maybe overkill for a >>> typical web application. >>> >>> >>> As for the relevance of Common Criteria and OWASP to a web >>> application, there is plenty. What the OWASP Guide actually provides, >>> as what you mention below, are SFRs (Security Functional Requirements) >>> in Common Criteria parlance... or in simpler English, SFRs are >>> information security features of a hardware or software product that >>> enable it to protect *itself* from threats. >>> >>> For example, the strong authentication required for mission-critical >>> web applications, or the controls used to protect against SQL >>> injection, or the error-handling & logging features of the software, >>> are all SFRs... which must be tested to verify for correctness in >>> implementation and thus get the assurance and trustworthiness >>> required. >>> >>> Yes, that's right, the underlying principle of the Common Criteria is: >>> "Verify, then trust". (Not the other way around, like the popular >>> saying that is attributed to Ronald Reagan: "Trust, but verify." Which >>> as a side note, is the paradigm that IT auditors subscribe to.) >>> >>>> (At the bottom of my silly mind, the TOE is not >>>> even a security product), >>> >>> Au contraire, but it is. The TOE (Target Of Evaluation) is the >>> hardware or software itself. Or, for a more definitive example using >>> the previous case, the TOE refers to the *set* of SFR's coded in the >>> web application (that has the Joomla CMS in it). >>> >>> >>> Just to clarify: The "IT security product" that the Common Criteria >>> refers to in its thick and boring documentation is practically any >>> hardware or software, whether commercial or a one-time custom web >>> application. An "IT security product" is something that can provide >>> information security features (or controls, in auditor linggo) either >>> for its environment (like firewalls and intrusion detection systems), >>> or for itself (like O/S'es, or database systems, or other kinds of >>> applications). >>> >>>> you can surely try to audit your >>>> implementation based on that standard..=) >>> >>> Yes, that will be ideal :) >>> >>>> Maybe having a defined PP, >>>> SFRs, ST, plus a nice level of confidence/QA (SARs and EAL) would be >>>> ok..just kidding, I think I know what you mean...=) >>> >>> It'll be more than ok, because it's required. A PP (Protection >>> Profile) or an ST (Security Target) are both essential because well, >>> no auditor can audit anything without having a documented basis for >>> the audit undertaking. >>> >>> PPs and STs are the same in that both are central documents that >>> describe the evaluation process, defines the security features (SFRs) >>> of the application, the threats it is subject to, the security >>> objectives that gives it reason for being, the environment which the >>> application is used, the Security Assurance Requirements (SARs) to >>> give the end-user the confidence that the evaluated application is >>> exactly the same thing that was audited, and the targeted EAL >>> (Evaluation Assurance Level). >>> >>> The only difference between a PP and an ST, is that a PP is usually >>> written by a vendor or the developer, while an ST is written by an >>> end-user who needs a solution for their sensitive information assets. >>> (To put it differently, an ST can be put out in an RFP (Request For >>> Proposals) but the document is organized like how the Common Criteria >>> says it should be.) >>> >>> >>> By the way, what do you mean by "QA"? I don't understand that term, >>> nor does it exist in any definitions by Common Criteria, ISO/IEC 15408 >>> and 18045. If you mean Quality Assurance, then it's another subject >>> matter. Strictly speaking, EAL != QA. >>> >>>> Aside from the OWASP Development Guide as guidance, you can also >>>> suggest the OWASP Testing Guide >>>> http://www.owasp.org/index.php/OWASP_Testing_Guide_v2_Table_of_Contents >>>> to your customers for conducting tests/audits to validate their >>>> remediation implementation on their web applications. >>> > > Drexx Laggui -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI, CSA > http://www.laggui.com ( Singapore / Manila / California ) > Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer > PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4 8363 FFEC 3976 FF31 8A4E > _________________________________________________ > Philippine Linux Users' Group (PLUG) Mailing List > http://lists.linux.org.ph/mailman/listinfo/plug > Searchable Archives: http://archives.free.net.ph > -- edel _________________________________________________ Philippine Linux Users' Group (PLUG) Mailing List http://lists.linux.org.ph/mailman/listinfo/plug Searchable Archives: http://archives.free.net.ph

