FeliCa Approval for Security and Trust (FAST) Overview. Copyright 2018 FeliCa Networks, Inc.

Similar documents
Visa Chip Security Program Security Testing Process

Enhancing the Well-Defined and Successful ETR for Composition Approach

Car2Car Forum Operational Security

MIFARE Plus and DESFire

Assurance Continuity Maintenance Report

The GP Composition Model Maximizing the Efficiency of Security Certifications

Composite Evaluation for Smart Cards and Similar Devices

Firewall Protection Profile V2.0 Certification Report

Joint Interpretation Library

Germany and The Netherlands Certification of cryptographic modules

MasterCard NFC Mobile Device Approval Guide v July 2015

Legal Regulations and Vulnerability Analysis

IT Security Evaluation : Common Criteria

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria

SECURITY CERTIFICATION

System and Practice of Information Security Certification for IT products in China

Spillemyndigheden s Certification Programme. Instructions on Penetration Testing SCP EN.1.1

Applied IT Security. Device Security. Dr. Stephan Spitz 10 Development Security. Applied IT Security, Dr.

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria

Certification Report

Certification Report

COMMON CRITERIA CERTIFICATION REPORT

CC Part 3 and the CEM Security Assurance and Evaluation Methodology. Su-en Yek Australasian CC Scheme

COMMON CRITERIA CERTIFICATION REPORT

Certification Report

COMMON CRITERIA CERTIFICATION REPORT

IT Security Evaluation and Certification Scheme Document

Security Requirements for Crypto Devices

Certification Report

An Attack Surface Driven Approach to Evaluation

Certification Report

Certification Report

Certification Report - Protection Profile Encrypted Storage Device

Mobile Felica on CX Virgo platform Version 5.0

Certification Report. EAL 4+ (ALC_DVS.2) Evaluation of TÜBİTAK BİLGEM UEKAE. AKİS v1.4i PASAPORT

Certification Report

Certification Requirements for High Assurance Systems

About the world-first smart card certificate with EAL7 formal assurances

MILS Multiple Independent Levels of Security. Carol Taylor & Jim Alves-Foss University of Idaho Moscow, Idaho

Procedure for Network and Network-related devices

Certification Report

Certification Report

Certification Report

Challenges and Solutions of Distributed Systems Composition. Tsui, Tsun-Te / Dr. Jeng, Albert B. Telecom Technology Center

Certification Report

Certification Report

Module 6: Network and Information Security and Privacy. Session 3: Information Security Methodology. Presenter: Freddy Tan

IATF - International Automotive Task Force Rules for achieving and maintaining IATF Recognition IATF Rules 5 th Edition Sanctioned Interpretations

COMMON CRITERIA CERTIFICATION REPORT

Certification Report

Certification Report

ISA Security Compliance Institute

Korean National Protection Profile for Electronic Document Encryption V1.0 Certification Report

Protection Profile for Connected Diabetes Devices (CDD PP) Extended Package: Moderate

Certification Report

CERTIFICATION GUIDELINES FOR MANAGEMENT SYSTEM

COMMON CRITERIA CERTIFICATION REPORT

Certification Report

RedCastle v3.0 for Asianux Server 3 Certification Report

Certification Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

Korean National Protection Profile for Single Sign On V1.0 Certification Report

Process for the Evaluation and Acceptance of Building Products in the USA

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

SERTIT-014 CR Certification Report

Certification Report

Network Intrusion Prevention System Protection Profile V1.1 Certification Report

MIFARE Security Evaluation Scheme

EpsonNet ID Print Authentication Print Module Security Target Ver1.11

COMMON CRITERIA CERTIFICATION REPORT

Introduction to GlobalPlatform Compliance Secretariat

Certification Report

Certification Report

Certification Report

TNO CERTIFICATION. NSCIB-CC Certification Report. Fort Fox Hardware Data Diode, version FFHDD2

Predictive Assurance

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme

Certification Report

Certification Report

Diabetes Technology Society

COMMON CRITERIA CERTIFICATION REPORT

Certification Report

Certification Report

Certification Report

Certification Report

Workshop Item 1 - ISO 9001: 2008 migration

Policy for Accrediting Assessment Bodies Operating within the Cradle to Cradle Certified Product Certification Scheme. Version 1.2

Development of Informal Security Policy Models

Certification Report

Certification Report

SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF FOOD SAFETY MANAGEMENT SYSTEMS

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme

Certification Report

Certification Report

Certification Report

COMMON CRITERIA CERTIFICATION REPORT

Policy for Certification of Private Label Products Within the Cradle to Cradle Certified Certification Scheme. Version 1.0.

CERTIFICATE SCHEME THE MATERIAL HEALTH CERTIFICATE PROGRAM. Version 1.1. April 2015

Transcription:

FeliCa Approval for Security and Trust (FAST) Overview

Introduction The security certification scheme called FeliCa Approval for Security and Trust (FAST) has been set up to enable the evaluation and certification of the mobile FeliCa product security aspects. The FAST certification scheme requires the same level of security vulnerability analysis and testing as Common Criteria EAL4 + AVA_VAN.5 certification. Target of Evaluation (TOE) consists of the security IC, the operating system (such as ), and the mobile FeliCa applications (such as payment and transit applications) including relevant crypto libraries for AES and TDES/DES. The main purpose of the TOE is to be the Secure Element for the NFCenabled devices. The FAST certification scheme aims to give a high assurance of security level (i.e., AVA_VAN.5), in a timely manner, to the service providers who deploy mobile FeliCa products for their payment and/or transit services. 1

Intent The intent of the scheme is to provide sufficient assurance for the certified products to protect the assets against potential threats. As an alternative to Common Criteria certification at EAL4 + AVA_VAN.5, this scheme streamlines the process by focusing on specific threats that mobile FeliCa products are exposed to, in the context of a standard design view and, therefore, a largely similar high-level overview. To maintain a consistent and state-of-the-art level of assurance, while reducing the time and cost of certification management, a lightweight certification process is defined. In this certification process, an accredited certifying lab shall assess the evaluation results, and shall then determine whether the products provide sufficient assurance to be certified under this scheme. 2

FAST certification scope and process Certification scope Secure Element FeliCa Applet FeliCa CryptoLib Evaluate under FAST Evaluate under FAST Evaluate under CC or EMVCo Platform evaluation Evaluate under CC or EMVCo IC evaluation Composite certification process FeliCa Applet FeliCa CryptoLib FeliCa CryptoLib CC or EMVCo CC or EMVCo FAST FAST 3

Roles and responsibilities Role Responsibility Certificate Oversee Scheme owner Evaluating Lab Developer Evaluation result Certifying Lab Test plans Reports Source code Samples Manage FAST certification scheme Accredit evaluating lab and certifying lab Publish certified products Approve test plan Approve evaluation report Issue certificate Evaluate FeliCa Applet / FeliCa CryptoLib Submit test plan to certifying lab Submit evaluation report to certifying lab Develop FeliCa Applet / FeliCa CryptoLib Submit samples, source code and the required developer documents 4

Requirements (non-exhaustive list) All requirements for evaluation and certification are defined in the scheme document FeliCa Approval for Security and Trust scheme provided by FeliCa Networks. Key evaluation aspects: Design and source code review Penetration test against high attack potential (AVA_VAN.5) Site security (EMVCo site audit or the site certification under CC scheme can be reused) AES and TDES/DES crypto protocol Certification validity 3 years Validity can be extended by 1.5 years through renewal process 5