Protection Profile

Protection Profile

A Protection Profile (PP) is a document used as part of the certification process according to the Common Criteria (CC). As the generic form of a Security Target (ST), it is typically created by a user or user community and provides is an implementation independent specification of information assurance security requirements. A PP is a combination of threats, security objectives, assumptions, security functional requirements (SFRs), security assurance requirements (SFRs) and rationales.

A PP specifies generic security evaluation criteria to substantiate vendors' claims of a given family of information system products. Among others, it typically specifies the Evaluation Assurance Level (EAL), a number 1 through 7, indicating the depth and rigor of the security evaluation, usually in the form of supporting documentation and testing, that a product meets the security requirements specified in the PP.

The National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) have agreed to cooperate on the development of validated U.S. government PPs.

Purpose

A PP states a security problem rigorously for a given collection of system or products, known as the Target of Evaluation (TOE) and to specify security requirements to address that problem without dictating how these requirements will be implemented. A PP may inherit requirements from one or more other PPs.

In order to get a product evaluated and certified according to the CC, the product vendor has to define a Security Target (ST) which may comply with one or more PPs. In this way a PP may serve as a template for the product's ST.

Problem Areas

Although the EAL is easiest for a laymen to compare, its simplicity is deceptive because this number is rather meaningless without an understanding the security implications of the PP(s) and ST used for the evaluation. Technically, comparing evaluated products requires assessing both the EAL and the functional requirements. Unfortunately, interpreting the security implications of the PP for the intended application requires very strong IT security expertise. Evaluating a product is one thing, but deciding if some product's CC evaluation is adequate for a particular application is quite another. It is not obvious what trusted agency possesses the depth in IT security expertise needed to evaluate "systems" applicability of Common Criteria evaluated products.

The problem of applying evaluations is not new. This problem was addressed decades ago by a massive research project that defined software features that could protect information, evaluated their strength, and mapped security features needed for specific operating environment risks. The results were documented in the Rainbow Series. Rather than separating the EAL and functional requirements, the Orange Book followed a less advances approach defining functional protection capabilities and appropriate assurance requirements as single category. Seven such categories were defined in this way. Further, the Yellow Book defined a matrix of security environments and assessed the risk of each. It then established precisely what security environment was valid for each of the Orange Book categories. This approach produced an unambiguous layman's cookbook for how to determine whether a product was usable in a particular application. Loss of this application technology seems to have been an unintended consequence of the superseding of the Orange Book by the Common Criteria.

Security devices with PPs

Validated US Government PP

*Anti-Virus
*Key Recovery
*PKI/KMI
*Biometrics
*Certificate Management
*Tokens
*DBMS
*Firewalls
*Operating System
*IDS/IPS
*Peripheral Switch

Draft US Government PP

*Switches and Routers
*Biometrics
*Remote Access
*Mobile Code
*Secure Messaging
*Multiple Domain Solutions
*VPN
*Wireless LAN
*Guards
*Single-Level Web Server
*Separation Kernel

Validated Non-U.S. Government PP

*Smart Cards

External links

* [http://www.niap-ccevs.org/pp/ NIAP Protection Profiles]
* [http://www.cio.gov/archive/computer_security_act_jan_1998.html Computer Security Act of 1987]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Protection Profile — Im Kontext von IT Sicherheitsrichtlinien (z. B. Common Criteria oder ITSEC) ist ein Schutzprofil definiert als eine implementierungs unabhängige Menge von Sicherheitsanforderungen an eine Gruppe oder eine Kategorie von zu untersuchenden IT… …   Deutsch Wikipedia

  • Labeled Security Protection Profile — (LSPP) is a protection profile within the common criteria; it s a set of security functional and assurance requirements for IT products. The LSPP requirements is derived from the B1 class of the US Department of Defense security standard called… …   Wikipedia

  • Profil de Protection — Un profil de protection (en anglais, protection profile, ou PP) est un document dans le domaine de la sécurité des systèmes d information. Ce document définit un ensemble d objectifs et d exigences de sécurité, indépendant de l implémentation,… …   Wikipédia en Français

  • Profil de protection — Un profil de protection (en anglais, protection profile, ou PP) est un document dans le domaine de la sécurité des systèmes d information. Ce document définit un ensemble d objectifs et d exigences de sécurité, indépendant de l implémentation,… …   Wikipédia en Français

  • Profils de protection — Profil de protection Un profil de protection (en anglais, protection profile, ou PP) est un document dans le domaine de la sécurité des systèmes d information. Ce document définit un ensemble d objectifs et d exigences de sécurité, indépendant de …   Wikipédia en Français

  • Roaming user profile — C:Documents and Settings{username}   Application Data   …   Wikipedia

  • Acolytes Protection Agency — Infobox Wrestling team article name=Acolytes Protection Agency type=T caption= Faarooq (left) and Bradshaw members=Faarooq Bradshaw names=Hell s Henchmen The Acolytes Acolytes Protection Agency (A.P.A.) heights=Faarooq: height|ft=6|in=2cite… …   Wikipedia

  • Social Protection — ▪ 2006 Introduction With medical costs skyrocketing and government programs scaled back, citizens bore more responsibility for their health care costs; irregular migration, human trafficking, and migrant smuggling posed challenges for… …   Universalium

  • Critical infrastructure protection — Public infrastructure Assets and facilities Airports · Bridges · Broadband& …   Wikipedia

  • Critical Infrastructure Protection — or CIP is a national program to assure the security of vulnerable and interconnected infrastructures of the United States. In May 1998, President Bill Clinton issued Presidential directive PDD 63 [ [http://www.fas.org/irp/offdocs/pdd/pdd 63.htm… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”