National Information Assurance Partnership (NIAP) 2017 Report. PPs Completed in CY2017

Similar documents
Progress Report National Information Assurance Partnership

Building an Assurance Foundation for 21 st Century Information Systems and Networks

NIAP Update. Dianne Hale National Information Assurance Partnership

DoD Mobility Mobility Product Security Certification Processes

Defining IT Security Requirements for Federal Systems and Networks

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017

Common Criteria Certification (ISO15408) Update

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

The Global Context of Sustainable Development Data

Cryptography and the Common Criteria (ISO/IEC 15408) by Kirill Sinitski

DoDD DoDI

DoD Mobility briefing for the AFCEA Mobility Summit

ANZPAA National Institute of Forensic Science BUSINESS PLAN

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

The Office of Infrastructure Protection

National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products

Cyber Partnership Blueprint: An Outline

Federal Mobility: A Year in Review

Solutions Technology, Inc. (STI) Corporate Capability Brief

White paper. Combatant command (COCOM) next-generation security architecture

DIACAP and the GIG IA Architecture. 10 th ICCRTS June 16, 2005 Jenifer M. Wierum (O) (C)

Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients

Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA?

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition

COMMON CRITERIA CERTIFICATION REPORT

The Value of ANSI Accreditation. Top 10 Advantages. of accredited third-party conformity assessment

INFORMATION ASSURANCE DIRECTORATE

Mobile Derived Credentials Purebred Information Brief

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

Joint Federated Assurance Center (JFAC): 2018 Update. What Is the JFAC?

Synergies of the Common Criteria with Other Standards

The German IT Security Certification Scheme. Joachim Weber

The US National Near-Earth Object Preparedness Strategy and Action Plan

Verizon Software Defined Perimeter (SDP).

Seagate Supply Chain Standards and Operational Systems

What is Suite B? How does it relate to Government Certifications?

NIST Security Certification and Accreditation Project

SECURING MOBILITY. Through the Canadian Medium Assurance Solutions Program. ICMC May Greg Hills Director, Architecture and Technology Assurance

FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates

Biometric Standards for DoD Operational Requirements

SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ

International Nonproliferation Export Control Program (INECP) Government Outreach for Enterprise Compliance

Certification Report

Measurement Challenges and Opportunities for Developing Smart Grid Testbeds

COMMON CRITERIA CERTIFICATION REPORT

RESOLUTION 47 (Rev. Buenos Aires, 2017)

Accelerate Your Enterprise Private Cloud Initiative

National Cybersecurity Center of Excellence

Office for Interoperability and Compatibility Emergency Interoperable Standards Efforts

Requirements for Building Effective Government WLANs

Click to edit Master title style

PARTNERING WITH THE REGULATORS: The Role for 3rd Party Accreditation in Food Safety

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

Enterprise SM VOLUME 1, SECTION 5.4: ANTI-VIRUS MANAGEMENT SERVICE

Headquarters U.S. Air Force

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Certification Report

Understanding how MRA works and realizing the benefits for both Customs and Trade

Medical Device Cybersecurity: FDA Perspective

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. for

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

COMMON CRITERIA CERTIFICATION REPORT

Appendix 12 Risk Assessment Plan

Google Cloud & the General Data Protection Regulation (GDPR)

COMMON CRITERIA CERTIFICATION REPORT

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign

Systems Engineering for Software Assurance

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

IMPROVING CYBERSECURITY AND RESILIENCE THROUGH ACQUISITION

preparation of National Action Plans on youth employment the process of developing the NAP

INFORMATION ASSURANCE DIRECTORATE

Appendix 12 Risk Assessment Plan

Introduction to GlobalPlatform Compliance Secretariat

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme

Forcepoint NGFW 6.3.1

CCISO Blueprint v1. EC-Council

Security and Privacy Governance Program Guidelines

SBL Professional Services

Integrated Cyber Defense Working Group (ICD WG) Introduction

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. for

EXAM PREPARATION GUIDE

COMMON CRITERIA CERTIFICATION REPORT

IT Security Evaluation and Certification Scheme Document

Department of Defense. Installation Energy Resilience

CLOSING IN FEDERAL ENDPOINT SECURITY

COMMON CRITERIA CERTIFICATION REPORT

Updates to the NIST Cybersecurity Framework

CCEVS APPROVED ASSURANCE CONTINUITY MAINTENANCE REPORT

National Cybersecurity Challenges and NIST. Matthew Scholl Chief Computer Security Division

UNICOS/mp Common Criteria Evaluation

INFORMATION ASSURANCE DIRECTORATE

COMMON CRITERIA CERTIFICATION REPORT

TEL2813/IS2621 Security Management

COMMON CRITERIA CERTIFICATION REPORT

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Cloud Security Alliance Quantum-safe Security Working Group

Transcription:

National Information Assurance Partnership (NIAP) 2017 Report NIAP continued to grow and make a difference in 2017 from increasing the number of evaluated products available for U.S. National Security System (NSS) procurement, to further collaboration with industry and U.S. government (USG), and to representing the U.S. in the international Common Criteria Recognition Arrangement (CCRA), including serving as the CCRA Development Board chair. Protection Profiles (PPs) In 2017, NIAP published 6 updates to existing Protection Profiles (PPs), which define security requirements and test activities for a wide range of commercial technologies: 1 conversion of an Extended Package to a Module, (in alignment with Common Criteria v3.1 Release 5), 4 minor revisions to existing Protection Profiles, and 1 internationally developed major revision to the Network Device collaborative Protection Profile. PPs Completed in CY2017 Product New/Revision Technology Type VPN Gateways EP (v2.1) Minor Revision Virtual Private Network collaborative PP for Network Devices (v2.0) Major Revision Network Device Intrusion Prevention Systems EP (v2.11) Minor Revision IDS/IPS Mobile Device Fundamentals (v3.1) Minor Revision Mobility VPN Client PP-Module (v2.1) Minor Revision Virtual Private Network Certificate Authorities (v2.1) Minor Revision Certificate Authority Figure 1. 2017 Completed Protection Profiles Evaluated Products A total of 63 evaluations were completed in 2017 (a 21% increase from 2016): 1 st quarter 12 evaluations, 2 nd quarter 16 evaluations, 3 rd quarter 18 evaluations, and 4 th quarter 17 evaluations. NIAP continued to implement strategies to streamline and improve both the evaluation and validation processes. These strategies ensured consistency among evaluations, increased output, and made more products eligible for NSS procurement. Network devices comprised the majority of evaluations this year, though a significant portion of validated products were in the mobility technology area. This indicates the continued priority of ensuring any device installed on the network will behave and can be trusted to do no harm, regardless of the ultimate security purpose of the device.

COMPLETED VALIDATIONS BY TECHNOLOGY TYPE Voice/Video over IP, 2 Server Virtualization, 1 Peripheral Sharing Switch, 1 Hard Copy Device, 2 Firewall, 1 Full Disc Encryption, 2 Virtual Private Network, 8 Mobility, 10 App Software, 7 Network Device, 24 Enterprise Security Mgmt, 5 Figure 2. 2017 Completed Validations by Technology Type Common Criteria Recognition Arrangement (CCRA) collaborative Protection Profiles (cpps) NIAP continued to fully support development of cpps according to the terms of the CCRA. During 2017, industry continued to lead cpp development in international Technical Communities (itcs) serving as itc leads, technical editors, participating through regular teleconferences, and setting and driving cpp development schedules. This active industry participation and collaboration with government underpins the value of the CCRA, and serves to keep it relevant and viable. Network Device and Stateful Traffic Filter Firewall cpps 2017 marked the second consecutive year that contributing member nations evaluated products against the international cpps. NIAP completed 24 evaluations against the Network Device (ND) cpp, comprising 89% of all Network Device evaluations completed in the CCRA; with 24 more Network Device evaluations currently in process. NIAP was the first scheme to complete an evaluation against the Stateful Traffic Filter Firewall cpp; finishing 2 evaluations against the cpp this year with 3 Stateful Traffic Filter Firewall evaluations currently in process.

NIAP s validation of products against cpps is significant in two ways: it provides NSS users with assurance in validated commercial products, while furthering the CCRA objective of allowing industry to evaluate a product once and sell to many nations. During the course of the ND cpp evaluations, NIAP s Network Device Technical Rapid Response Team received numerous inquiries on the cpp. NIAP worked with the Network itc and the Network itc Interpretation Team (NIT) and forwarded 15 requests for interpretation this year, far more than any other scheme. NIAP also published 44 Network Device Interpretation Team (NIT) Technical Decisions applicable in our scheme, making these available for all evaluations against the ND cpp. Collaboration with the NIT to resolve cpp questions ensures consistent and clear interpretation of cpp requirements and evaluation activities among all CCRA member nations and across numerous evaluations. Full Drive Encryption cpps NIAP participated in the Full Drive Encryption (FDE) itc, which began work on an enterprise management use case and need for NSS users. The FDE itc stood up an Interpretations Team (FIT) to address questions on the cpps. NIAP collaborated closely with the itc and the FIT to resolve questions on the cpps to ensure consistent application of the requirements during product evaluations. NIAP is currently preparing for evaluations against these cpps and will validate evaluations beginning in 2018. Ongoing international Technical Communities NIAP continued participation in both the Dedicated Security Component and Software Application itcs by collaborating with industry to define security functionality and test activities for these technologies. These itcs are industry-led, demonstrating a firm commitment to industry and government collaboration. Commercial Solutions for Classified NIAP Protection Profiles Validated Products CSfC Capability Packages Integrators Solutions Layered solutions to protect classified information NIAP continued to validate products used in Commercial Solutions for Classified (CSfC) by demonstrating the value of NIAP-validated products for NSS users. As part of this effort, NIAP provided information, lessons-learned, and support to other CCRA nations exploring the composition of Common Criteriavalidated commercial products in securing IT systems.

A NIAP validation is the foundational requirement for a product to be included as part of the CSfC program. Vendors who wish to have their products eligible as CSfC components of a composed, layered Information Assurance (IA) solution must build their products in accordance with the applicable NIAP-approved Protection Profile(s) and have their product evaluated according to NIAP requirements. The Central Intelligence Agency (CIA), Department of Homeland Security (DHS), and Southern Combatant Command (SOCOM) are all utilizing CSfC components and NIAP-certified products within their mobility infrastructure, and have registered use case solutions against CSfC s Mobile Access Capability Package. Collaboration with DHS NIAP collaborated with the DHS to define security requirements for commercial mobility technology used throughout the USG. NIAP collaborated with DHS on a report to Congress, entitled Study on Mobile Device Security, detailing current and emerging threats to USG use of mobile devices and recommends security improvements to the mobile device ecosystem. Mandated by the Cybersecurity Act of 2015, the study also relied on significant input from mobile industry vendors, carriers, service providers and academic researchers. It recommends adoption of mobile security criteria found in NIAP Protection Profiles as a way to provide increased assurance for mobile devices. NIAP s collaboration with DHS also included a pilot for automated development of applications that comply with the NIAP Application Software Protection Profile, resulting in increased assurance for this growing technology area throughout the USG. Collaboration with the National Institute of Standards and Technology (NIST) NIST and NIAP continued collaboration in 2017 to align NIAP validation processes with the NIST Cryptographic Algorithm Validation Program (CAVP) and Cryptographic Module Validation Program (CMVP) commonly referred to as FIPS. NIAP evaluations require that each product s cryptography have at least a CAVP certificate and preferably a CMVP certificate. NIAP PPs are written so that they can be used internationally by nations that do not participate in FIPS, but a CAVP or CMVP certificate eliminates the need for the Common Criteria Test Lab to conduct some of the PP assurance tests. By eliminating redundant cryptographic testing, CC evaluations are expedited, saving government and industry both time and money. As a result of the NIAP/NIST alignment, during 2017: The NIAP/NIST alignment continues to ensure current evaluated products are available for NSS users by leveraging the results of NIST cryptographic algorithm and module validation programs in NIAP evaluations. NIAP continued to support and participate in NIST's CMVP Industry Collaboration Working Group (CMVPWG). The CMVPWG, comprised of both industry and government representatives, met

regularly throughout the year to explore opportunities for streamlining the CMVP evaluation timeline to improve the operational impact of FIPS 140 validated modules. Working group activities included research and documentation of processes for design, development, testing, and maintenance of cryptographic implementations, as well as prototypes of new testing techniques and processes that may be implemented in future releases of CMVP. The emphasis is on automated solutions that produce artifacts or evidence that can be verified efficiently by test laboratories. NIAP participated in the 2017 NIST Crypto Algorithm Validation Program and Crypto Module Validation Program (CAVP/CMVP) and Chemical Science and Technology Laboratory (CSTL) Manager meeting. NIAP s participation was valuable in providing updates on NIST's CAVP and CMVP programs, advance information about updates to NIST Implementation Guidance and Derived Test Requirements, updates on new Special Publications, and the current status of NIST's efforts to automate CAVP testing. NIAP's attendance strengthened our efforts as we continue to use NIST's CAVP and CMVP programs to satisfy the cryptographic security functionality requirements in NIAP Common Criteria evaluations. NIAP briefed 3 sessions at the 2017 International Cryptographic Module Conference. The conference provided an opportunity to collaborate with vendors, test labs, various policy makers and end users on cryptographic certification and the effect of technology advancements on our current paradigms. NIST continued to support NIAP at the CCRA Cryptographic Working Group (WG) meeting in Bonn, Germany. The CCRA Cryptographic WG develops internationally accepted cryptographic evaluation requirements and assurance activities. NIST continued to provide WG participants with much-needed insight into NIST's current CAVP and CMVP testing programs as well as efforts toward the development of automated solutions for algorithm and module testing. The information provided by NIST assists the WG in the continued development of security requirements and evaluation activities for incorporation into cpps. Outreach Throughout 2017, NIAP continued outreach efforts to ensure the commercial IT security needs of the NSS Community are met through collaborative development of commercial product security requirements and evaluation of products against those requirements. Outreach focused on delivering tailored messages suitable for the intended audience in different environments. NIAP participated in several security conferences and forums in 2017 to engage directly with users, developers, and Common Criteria Users Forum delegates. These engagements helped bridge the gap between user requirements and product capabilities; and enabled NIAP to explain its process as well as provide updates to NIAP policies and procedures. Notable conferences attended included RSA, the International Cryptographic Module Conference, the Information Assurance Symposium, as well as a number of Armed Forces Communications and Electronics Association (AFCEA) TechNets. This year, NIAP briefed 2 classes of future Information Security Officers and Designated Accrediting Authorities at the National Defense University. Students gained an appreciation for integrating certified products in their enterprises ensuring their security requirements are met.

Outreach activities also included workshops and boot camps for members of our evaluation and validation communities to improve consistency, and present policy and procedural changes both at the national and international level. Other significant outreach activities included participation at an Information Assurance Tech Expo hosted by the National Security Agency (NSA) and included participation from CSfC, NIST, and other NSA organizations. This unclassified event gave vendors an opportunity to learn about unclassified technologies and standards developed or used by NSA and improve their chances of developing or selling technologies to NSA and the DoD. NIAP personnel engaged with over 100 industry reps who wanted to learn more about the NIAP mission and how it relates to CSfC and NIST, and how NIAP-validated products keep NSS customers compliant with national policy. Process Improvements NIAP continued to focus on infrastructure improvements through website enhancements and development of web tools used to assist in the evaluation process. NIAP completed beta testing of the Evaluation Consistency Review (ECR) tool and officially rolled out the tool for all new product evaluations. The tool serves multiple purposes for the NIAP program, including increased Validator consistency, protection of proprietary data, and increased visibility into NIAP project details, which facilitates metrics collection and process improvements. NIAP also rolled out a new Technical Decision (TD) Digest tool to assist with customer outreach efforts and increase program transparency. This tool allows NIAP to easily share the latest updates made to Protection Profiles, providing Common Criteria Testing Labs (CCTLs) and vendors with the current information needed to successfully evaluate commercial products for use in NSS. These features have improved communications and increased evaluation efficiency. The development of these web support tools has assisted NIAP in its goal to streamline, improve, and ensure consistency of all evaluations. The result is significant validation time has dropped from up to 3 years to 90 days. International Organization for Standardization (ISO) Common Criteria Update The Common Criteria is an international standard (ISO 15408) that provides the specification language used to define security functional requirements and test activities for evaluation of commercial IT products. The standard is used by NIAP to develop Protection Profiles used in evaluation of commercial products eligible for NSS procurement. The ISO working group (WG3) solicited comments on the first working drafts of the updated standard, with the goal of sufficiently addressing the evolution of security functionality in commercial IT products. NIAP reviewed and provided comments on the working drafts to ensure USG interests are embodied in the update. Looking Forward NIAP projects steady increases in the number of evaluated commercial products eligible for procurement during 2018. We will continue to foster collaboration with industry and other CCRA partners to develop Protection Profiles for evaluating COTS products needed for U.S. National Security Systems.