security audit and certification

 


Introduction

The assessment plan of specific security requirements of a given system reports the controls and control improvements to be assessed, established on the goal of the Evaluation, and the developed controls found and discussed in the system security plan. Insecurity audit and certification, the security evaluation process describes the assessment's scope, mainly showing whether a full or partial evaluation will be done and if the assessment aims to support the first pre-authorization activities inter-related with the proposed changed system. Moreover, the security evaluation plan defines the methods used in every control.

In this document, XYZ, an online retail company, has implemented an online store called MyWebstore. The company intends to request common criteria certification for their web-based new system. MyWebstore system operates on top of MySQL database management system (DBMS), which stores the product, user, operational, security, metadata, and development information, in addition, the backend of the newly implemented system runs on top of a no-SQL database that store user reviews. The common criteria in the new web-based system are the consumers, developers, and evaluators in the new system. According to XYZ, the new system backend resides on a Linux-based operating system (Ubuntu), supporting the root user and web application user.

This document has six sections: Introduction, Target of Evaluation (TOE) description, security problems, security objectives, security functional requirements, and security assurance requirements. This section briefly highlights a brief background description of security assessment and the MyWebstore system. The second section entails the target of evaluation overview and description. The third section describes the security problems to be certified in the newly implemented system, including threats and assumptions about the operational environment Of TOE. The security objective section will include objects developing from the problem description. The fifth section describes the functional security requirements, focusing on user data protection and identification and authentication in the MyWebstore system. Finally is security assurance requirements for TOE to enable EAL2 certification.

The target of Evaluation Definition

This section identifies the target of Evaluation, derivative devices configuration possibilities, and the overview of TOE based on the MyWebstore system. The evaluation target is the system or product that is the target topic of the assessment.

TOE identification

The target of Evaluation (TOE) is the Linux (Ubuntu) platform Focal Fossa 20.04, software rev nine and A with a dedicated system MyWebstore.

IC Masket Name

IC Version

Master Identification number

Firmware revision

OST revision

Focal Fossa

20.4

0061h and

0105h

9 and A

0022H

 

In TOE identification, the IC maskset name is referred to the product hardware identification, the maskset version is reconditioned when the whole maskset is changed. The IC version is modernized for any update in hardware. To make a full TOE identification, the product name, IC version, firmware version, and libraries version must be fully described.

In consumer end requirements on the MyWebstore system, various derivative appliances may need to be configured by either system developer during implementation or the by the end-user on settings during personalization exercise. Both consumer requirements use the same hardware design but different master identification numbers. Derivative user settings configuration may impact NVM memory size, available operating system, the availability of the processor, as entailed in derivative devices configuration probability table:

Derivative devices configuration possibilities

Features

Possible Values

Single wire Protocol

Active, Inactive

Serial peripheral interface

Active, Inactive

ISO-7816 Asynchronous Receiver Transmitter

Active, Inactive

Next Step Cryptography Accelerator

Active, Inactive

Enhanced DES accelerator

Active, Inactive

Library protection unit

Active, Inactive

Non-volatile Memory size

Configurable by 128 Kbytes aggregation from 1280 Kbytes – 384 Kbytes

 

Security problem definition

The definition of the security problem to be observed on MyWebstore's new system. According to common criteria (CC), a security problem is obtaining the security problem description that falls outside the CC's scope. The objective goal of the security problem is to denote the security problem planned to be solved by the Target of Evaluation. However, it should be highlighted that the result importance of an assessment strongly relies on the security target, and the importance of the security target (ST) firmly relies on the excellent definition of security problem. Therefore, XYZ company spends tremendous resources on the MyWebstore web-based system, uses properly established processes, and inspects to acquire an excellent security problem.

 

 

Threats

This section of the security problem definition discusses the threats to be faced by the target of Evaluation and its operational environment. In systems, threats include unfortunate actions practiced by a threat agent. In this section, the threats faced by the MyWebstore system and its operational environment include;

Injection Attacks; MyWebstore system is a web-based application that could have vulnerabilities to injection threats through users while they POST feedback in the input field. This could happen by an attacker inputting an attack code and deceiving the server into decoding the codes as a system command and responding as the cybercriminal intended. Injection attacks include Email Header Injection, SQL injections, Cross-Site Scripting, and much more. An injection attack led to unrestricted access to the database and admin privileges.

Data-Modification: this could also be termed as unauthorized data modification. Unauthorized individuals may change the user data stored by the Target of Evaluation. Data modification threat applies to processing the changing codes gotten by the TOE.

Security Misconfiguration: according to the daily analysis collected, security misconfiguration is the most familiar web application security threat globally. The weakness attack exists due to developers and system admins forgetting to use different credentials. Exploiting and detecting default settings has become easy with the new cyber technology; hence implications of such weaknesses can be experienced once the MyWebstore system has been launched.

Unvalidated Redirects and Forwards: every website launched redirects a user to other pages within the website. When the credibility of redirections has been evaluated, the web-based system exposes its vulnerabilities to URL cybercriminals. Unvalidated redirects can easily be seen by a user being redirected by a malicious link to phishing sites or web-holding malware.

System administrator violating user privacy: this could be experienced by an administrator at the MyWebstore system exposing the user information to unauthorized personnel.

 

Assumptions

This section of the security problem definition discusses the assumptions made on the operational environment to provide security functionality. If the evaluation target is positioned in an operational environment that has not attained these assumptions, the TOE may have a problem giving all security functionality. The assumption may be physical, connectivity, or personnel in the operational environment. Xyz company assumptions on physical aspects of the operational environment include;

MyWebstore system's physical operational environment assumed that the TOE servers would be positioned in a room structured to reduce electromagnetic emanations.

Also, it is assumed that the MyWebstore system administrator consoles will be stationed in a closed, restricted access room.

 On personnel aspects of the operational environment, it is assumed that;

The users of the Evaluation target will receive sufficient training on the MyWebstore new system user interface to easily use the Target of Evaluation.

The assumption made from the target of evaluation users is that they are privileged classified information from the TOE.

In addition, it is assumed that customers of the MyWebstore User interface will not be able to copy and paste their passwords while logging in to the system; instead, they will only input by keying in.

It is assumed that operating system administration of platforms where TOE components are running and consumers accessing the local area network is not careless or hostile and will follow and abide by rules and regulations provided by the TOE documentation.

Finally, the connectivity aspect of the operational environment assumption on target of Evaluation include;

It is assumed that the MyWebstore system will require a PC workstation that has at least 10GB of hard disk space for the TOE to run effectively.

It is assumed that the MyWebstore system will not be connected to the untrusted network.

It is assumed that where TOE is located has access to an SQL database server.

In the assessment period, these assumptions are considered; they are true, and they are not put into trial. Therefore, the assumption on TOE can only be assumed in the operational environment.

Security Objectives

The security objective is a brief and abstract simple statement of the prospected solution to the defined problems by the security problem definition.

1.      The target of Evaluation shall maintain the confidentiality of all information transmitted between the system and the servers.

2.      The TOE shall ensure only authorized users and applications access personal data

3.      MyWebstore system shall check user authentication credentials before permitting access to the servers.

4.      MyWebstore system shall not permit accessing data according to the Data Acess policy.

5.      The TOE shall restrict access to external links access to the user interface.

6.      The TOE shall give data encryption, triple data encryption standard, and advanced security functionality standards.

Security objectives rationale

The main goal of this section of the security objective rationale is to include all the security objectives and give a reason or logical basis for a course of action.

Assumption / Threat policy

Rationale

Injection attack

This assumption is addressed by security which ensures that the server has an up-to-date firewall to harden it for any intended attack on the database.

Data modification

The assumption is addressed by user privilege, which ensures that only authorized personnel can edit, search, and update /her data

Security Misconfiguration

This assumption is addressed by an authentication check-up, which ensures no login to the system before the TOE checks credentials from the database and authorizes accessibility.

Unvalidated redirects and forwards

This assumption is addressed by external link access, which ensures that the TOE shall restrict any external link access to the system.

System administrator violating user privacy

This assumption is addressed by consumer data protection, which ensures that the TOE shall give data encryption, triple data encryption standard, and advanced encryption standard for the security functionality.

 

 

 

 

 

 

Security requirements

Security requirements consist of the security functional requirement (SFRs) and the security assurance requirement (SARs).

Security Functional Requirements (SFRs)

These are the translation of the security objectives for the Target of Evaluation. They are a highly detailed level of abstraction, though they have to finish translation and be independent of any particular technological development. The common criteria need this translation into a standardized language. In the TOE, functional security requirements for the security target based on user data protection and identification and authentication consist of the following;

Class heading

Class family

Description

User data Protection

FDP_ACC.1

Subset access control

FDP_ACF.1

Security attribute-based access control

Identification and Authentication

FIA_ATD.1

User attribute definition

FIA_SOS.1

Verification of secrets

FIA_UID.2

User identification before any action

FIA_UAU.2

User authentication before any action

 

User Data Protection

FDP_ACC.1 Subset Access Control

The consumer in the MyWebstore  security function will enforce the [User Access Control SFP] on [

            Subjects: Login, Buy_New_Product, wire_complaint

            Objects: User Privileges, User Account Attribute

            Operations: Create, Read, Delete, Order]

FDP_ACF.1 Security Attribute Based Access Control

The consumer in MyWebstore security function shall enforce the [User Access Control SFP] to object-based.

 

Identification and Authentication (FIA)

FIA_ATD.1 – User Attribute Definition

The TOE security function shall maintain the following list of security attributes belonging to each user

[User identity, Authentication Status, Privileges]

 

FIA_SOS.1 Verification of secrets

The TOE security function shall provide an operation to verify that secret [the following metrics:

            User password length at least five characters, including a number, letter, and symbol

            Admin assigns the user to change password at first session initiation after password

                                    (Administrator)]

FIA_UID.2 User Identification before any Action

The target of evaluation security function shall require every user/consumer to successfully verified and logged in before any other security function on the user

 

FIA_UAU.2 User Authentication before Any Action

The TOE security function shall ask every user to be authenticated before allowing any other target of evaluation security function action on behalf of that user.

Security Assurance Requirements (SARs)

These are illustrations of how the target of Evaluation is to be assessed. The SARs for the assessment target is the assurance components of Evaluation Assurance Level 4 (EAL4) augmented with ALC_FLR.1.

Class Heading

Class Family

Description

Class Heading

Class Family

Description

Class Heading

Class Family

Description

 

ADV_TDS.3

Basic modular design

AGD:

Guidance

Documents

AGD_OPE.1

Operational user guidance

 

AGD_PRE.1

 

Preparative procedures

 

 

 

 

ALC: Lifecycle Support

 

ALC_CMC.4

Production  support,  acceptance  procedures  and

automation

ALC_CMS.4

Problem tracking CM coverage

ALC_DEL.1

Delivery procedures

ALC_DVS.1

Identification of security measures

ALC_FLR.1

Basic flaw remediation

ALC_LCD.1

Developer defined lifecycle model

ALC_TAT.1

Well-defined development tools

 

 

 

AST:

Security Target evaluation

ASE_CCL.1

Conformance claims

ASE_ECD.1

Extended components definition

ASE_INT.1

ST introduction

ASE_OBJ.2

Security objectives

ASE_REQ.2

Derived security requirements

ASE_SPD.1

Security problem definition

ASE_TSS.1

TOE summary specification

 

 

ATE: Tests

ATE_COV.2

Analysis of coverage

ATE_DPT.1

Testing: security enforcing modules

ATE_FUN.1

Functional testing

ATE_IND.2

Independent testing - sample

AVA:

Vulnerability

Analysis

 

 

AVA_VAN.3

 

 

Focused vulnerability analysis

 

 


 

References

Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and general model, Sep 2012, Version 3.1, Revision 4, CCMB-2012-09-001

Comments