Yeah, really helpful and educational. As a linux hobbyist with an interest in security I was wondering if it's possible to tag along on your engagements? Do you have informal gatherings we noobs can attend?
http://wehavedayjobs.blogspot.com --- On Wed, 11/5/08, Edel SM <[EMAIL PROTECTED]> wrote: > From: Edel SM <[EMAIL PROTECTED]> > Subject: Re: [plug] Common Criteria and OWASP > To: "Philippine Linux Users' Group (PLUG) Technical Discussion List" > <[email protected]> > Date: Wednesday, November 5, 2008, 11:55 AM > hello, > > wow. salamat naman at may mga ganitong discussions. really > helpful. > medyo nakakahilo lang. :D > > On Wed, Nov 5, 2008 at 4:47 PM, Drexx Laggui [personal] > <[EMAIL PROTECTED]> wrote: > > 05Nov2008 (UTC +8) > > > > Magandang araw po muli! > > > > > > On 11/5/08, Christian Masancay > <[EMAIL PROTECTED]> wrote: > >> Good afternoon, > >> > >> Hi Drexx, I'm not actually new with Common > Criteria. I just don't deal > >> with this standard on an everyday basis..=) > > > > I went back to some of my previous e-mails and > *I'm sorry* that I have > > only begun to realize that I've been too > passionate about OWASP and > > Common Criteria :) > > > > I just believe that both these two are important to > making the > > Internet a better place, yet so *misunderstood* that > it's disregarded > > by many (ignorance is bliss?) --and I got triggered. > Hindi naman kasi > > talaga madaling tanggapin ng marami ang CC, pero > pasalamat naman ako > > na medyo sinuwerte ng kaunti nuong nasa Check Point > Software Tech ako, > > as the engineer working on VPN-1/Firewall-1 para > tanggapin ng > > Singapore government... kasama ko dati si Alex Ragen > sa trabaho at > > siya ang project lead namin. Took us about a year to > do it each time. > > > > Ngayon naman ay nag-umpisa (on academic level, at > least) ako with > > fellow CC consultants in Modi'in (Israel) at San > Luis Obispo (Ca, USA) > > to merge both OWASP and Common Criteria as practice, > and then later > > publish STs for common web applications as an > open-source document. > > We're doing this only on our free time only > though. > > > > Closer to home, I've presented using Common > Criteria to some > > government offices and their commissioners (pro bono > pa nga eh, para > > lang may mangyari) but sadly, it's one of the > controls that is first > > dropped just so they can "meet deadlines". > It seems auditing source > > code (even if developed in-house), is not a recognized > issue here. > > It's a nice-to-have daw, pero hindi daw > importante. <sigh!> I guess > > that at the root of this, risk is a poorly understood > abstract. > > > > [...] > >> About the statement ""Trust, but > verify." Which as a side note, is the > >> paradigm that IT auditors subscribe to.", > I'm not sure where you got > >> this statement, but this is not true. I have been > with the > >> IT/Financial controls and assurance practice for > quite awhile and > >> believe me, there has always been emphasis on > being "independent in > >> mind and in appearance" and part of this is > maintaining professional > >> skepticism in any type of assurance or > attestation engagements.[...] > > > > I read this with interest, as well as everything you > wrote in support > > of this. "Trust, but verify" comes from the > realization that IT > > auditors are involved only after IT systems have been > put in place > > already. IT auditors are not involved in the SDLC > until after all > > things are all set and done. However, IT auditors > *maybe* consulted > > (only) by the developers in the early stages of the > SDLC, for the > > developers to ask what audit-related controls they > need to be in the > > IT system. IT auditors ideally are only involved after > the SDLC so as > > to maintain their professional and organization > independence. Am I > > mistaken in this? > > > > The concept is that end-users "trust" the > new IT system first, > > *before* IT auditors come in to "verify" > that the required information > > security controls are in place. Thus, "trust, but > verify." > > > >> There is no such thing as "Trust" in > the auditing profession except in > >> the following context - "The auditor must > maintain an attitude of > >> professional skepticism concurrently with a > working level of Trust > >> during the course of the audit.". > > > > True that. The context of "trust" here > however, is about the > > trustworthiness of information assets > --"trust" being a measure of the > > comfort level, or assurance, that an IT system will do > what it's > > supposed to do: no more, no less. > > > > > >> Anyway, it's nice to have these discussions > and sharing valuable > >> perspectives regarding various topics. Thanks, > Drexx. > > > > Pleasure is all mine, kind sir :) > > > > > >> On Wed, Nov 5, 2008 at 1:24 AM, Drexx Laggui > [personal] <[EMAIL PROTECTED]> wrote: > >> > >>> 04Nov2008 (UTC +8) > >>> > >>> Hiya Cris! > >>> > >>> I'm glad you got us going in this > conversation, for it's a good > >>> opportunity to create more awareness about > OWASP and Common Criteria > >>> (i.e. ISO/IEC 15408). I guess you and I > believe that, like the > >>> business requirements being documented during > an SDLC's Systems > >>> Analysis and Design phase, security > requirements should also be > >>> formally recognized and addressed at that > early stage. > >>> > >>> Let me help clarify some misconceptions that I > think I see here, and > >>> help ease everybody's acceptance of both > Common Criteria (also > >>> referred to as ISO/IEC 15408) and OWASP at the > *same* time. Because if > >>> developers did their thing correct the first > time, the world (e.g. > >>> Internet) would be a much less chaotic place > to be in. > >>> > >>> > >>> On 11/4/08, Christian Masancay > <[EMAIL PROTECTED]> wrote: > >>> [...] > >>>> Although I believe that the Common > Criteria is overkill for this or > >>>> may even be irrelevant > >>> > >>> I don't fault you for thinking that, > it's a common impression for > >>> anyone new at this. Did you know you can write > a Security Target in > >>> the morning, that is designed to achieve only > EAL1 (Evaluation and > >>> Assurance Level 1), and be done with the test > project before the end > >>> of the day? I didn't know that either, but > that was 10 years ago. > >>> > >>> EAL1 is basically just getting the hardware or > software through some > >>> functional testing (example, user interfaces > work as mentioned in the > >>> brochures), then comparing the developer's > high-level description (of > >>> the hardware or software) to a prepared > high-level checklist by an > >>> auditor. > >>> > >>> As you can see, EAL1 is pretty much *useless*. > There is very little > >>> assurance to be gained in that exercise. EAL3 > or EAL4, are the least > >>> levels that a hardware / software user should > be concerned about to > >>> get that level of comfort required before > trust can be given, but also > >>> without costing too much during the hardware / > software development. > >>> > >>> EAL7 is the highest level, but as you say, > maybe overkill for a > >>> typical web application. > >>> > >>> > >>> As for the relevance of Common Criteria and > OWASP to a web > >>> application, there is plenty. What the OWASP > Guide actually provides, > >>> as what you mention below, are SFRs (Security > Functional Requirements) > >>> in Common Criteria parlance... or in simpler > English, SFRs are > >>> information security features of a hardware or > software product that > >>> enable it to protect *itself* from threats. > >>> > >>> For example, the strong authentication > required for mission-critical > >>> web applications, or the controls used to > protect against SQL > >>> injection, or the error-handling & logging > features of the software, > >>> are all SFRs... which must be tested to verify > for correctness in > >>> implementation and thus get the assurance and > trustworthiness > >>> required. > >>> > >>> Yes, that's right, the underlying > principle of the Common Criteria is: > >>> "Verify, then trust". (Not the other > way around, like the popular > >>> saying that is attributed to Ronald Reagan: > "Trust, but verify." Which > >>> as a side note, is the paradigm that IT > auditors subscribe to.) > >>> > >>>> (At the bottom of my silly mind, the TOE > is not > >>>> even a security product), > >>> > >>> Au contraire, but it is. The TOE (Target Of > Evaluation) is the > >>> hardware or software itself. Or, for a more > definitive example using > >>> the previous case, the TOE refers to the *set* > of SFR's coded in the > >>> web application (that has the Joomla CMS in > it). > >>> > >>> > >>> Just to clarify: The "IT security > product" that the Common Criteria > >>> refers to in its thick and boring > documentation is practically any > >>> hardware or software, whether commercial or a > one-time custom web > >>> application. An "IT security > product" is something that can provide > >>> information security features (or controls, in > auditor linggo) either > >>> for its environment (like firewalls and > intrusion detection systems), > >>> or for itself (like O/S'es, or database > systems, or other kinds of > >>> applications). > >>> > >>>> you can surely try to audit your > >>>> implementation based on that standard..=) > >>> > >>> Yes, that will be ideal :) > >>> > >>>> Maybe having a defined PP, > >>>> SFRs, ST, plus a nice level of > confidence/QA (SARs and EAL) would be > >>>> ok..just kidding, I think I know what you > mean...=) > >>> > >>> It'll be more than ok, because it's > required. A PP (Protection > >>> Profile) or an ST (Security Target) are both > essential because well, > >>> no auditor can audit anything without having a > documented basis for > >>> the audit undertaking. > >>> > >>> PPs and STs are the same in that both are > central documents that > >>> describe the evaluation process, defines the > security features (SFRs) > >>> of the application, the threats it is subject > to, the security > >>> objectives that gives it reason for being, the > environment which the > >>> application is used, the Security Assurance > Requirements (SARs) to > >>> give the end-user the confidence that the > evaluated application is > >>> exactly the same thing that was audited, and > the targeted EAL > >>> (Evaluation Assurance Level). > >>> > >>> The only difference between a PP and an ST, is > that a PP is usually > >>> written by a vendor or the developer, while an > ST is written by an > >>> end-user who needs a solution for their > sensitive information assets. > >>> (To put it differently, an ST can be put out > in an RFP (Request For > >>> Proposals) but the document is organized like > how the Common Criteria > >>> says it should be.) > >>> > >>> > >>> By the way, what do you mean by > "QA"? I don't understand that term, > >>> nor does it exist in any definitions by Common > Criteria, ISO/IEC 15408 > >>> and 18045. If you mean Quality Assurance, then > it's another subject > >>> matter. Strictly speaking, EAL != QA. > >>> > >>>> Aside from the OWASP Development Guide as > guidance, you can also > >>>> suggest the OWASP Testing Guide > >>>> > http://www.owasp.org/index.php/OWASP_Testing_Guide_v2_Table_of_Contents > >>>> to your customers for conducting > tests/audits to validate their > >>>> remediation implementation on their web > applications. > >>> > > > > Drexx Laggui -- CISA, CISSP, CFE Associate, ISO27001 > LA, CCSI, CSA > > http://www.laggui.com ( Singapore / Manila / > California ) > > Computer forensics; Penetration testing; QMS & > ISMS developers; K-Transfer > > PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4 8363 FFEC > 3976 FF31 8A4E > > _________________________________________________ > > Philippine Linux Users' Group (PLUG) Mailing List > > http://lists.linux.org.ph/mailman/listinfo/plug > > Searchable Archives: http://archives.free.net.ph > > > > > > -- > edel > _________________________________________________ > Philippine Linux Users' Group (PLUG) Mailing List > http://lists.linux.org.ph/mailman/listinfo/plug > Searchable Archives: http://archives.free.net.ph _________________________________________________ Philippine Linux Users' Group (PLUG) Mailing List http://lists.linux.org.ph/mailman/listinfo/plug Searchable Archives: http://archives.free.net.ph

