论文标题

使用共同标准定义安全要求:申请,收养和挑战

Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges

论文作者

Sun, Nan, Li, Chang-Tsun, Chan, Hin, Le, Ba Dung, Islam, MD Zahidul, Zhang, Leo Yu, Islam, MD Rafiqul, Armstrong, Warren

论文摘要

新兴信息和通信技术(ICT)技术的进步推动了可能的事情的界限,并为创新的ICT产品和服务打开了新市场。采用具有安全属性的ICT产品和系统取决于消费者对安全功能的信心和市场信任,以及对这些产品应用的保证措施是否符合固有的安全要求。这种信心和信任主要是通过严格的安全要求,验证标准,评估和认证来获得的。信息技术安全评估的通用标准(通常称为常见标准或CC)是用于网络安全认证的国际标准(ISO/IEC 15408)。在本文中,我们对CC标准及其采用进行了系统的审查。还根据对安全评估当前趋势的分析,还研究了CC的采用障碍。具体来说,我们分享了通过最近开发的澳大利亚网络标准评估(DACCA)项目获得的经验和课程,该项目促进了与规格,开发,评估,认证,认证,预订,预订和部署有关的ICT安全产品中的CC之间的CC。提出了有关开发保护概况,建议和未来方向的最佳实践,以实现可信赖的网络安全进步。

Advances of emerging Information and Communications Technology (ICT) technologies push the boundaries of what is possible and open up new markets for innovative ICT products and services. The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these products meet the inherent security requirements. Such confidence and trust are primarily gained through the rigorous development of security requirements, validation criteria, evaluation, and certification. Common Criteria for Information Technology Security Evaluation (often referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for cyber security certification. In this paper, we conduct a systematic review of the CC standards and its adoptions. Adoption barriers of the CC are also investigated based on the analysis of current trends in security evaluation. Specifically, we share the experiences and lessons gained through the recent Development of Australian Cyber Criteria Assessment (DACCA) project that promotes the CC among stakeholders in ICT security products related to specification, development, evaluation, certification and approval, procurement, and deployment. Best practices on developing Protection Profiles, recommendations, and future directions for trusted cybersecurity advancement are presented.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源