© crown copyright (2000) module 2.6 vulnerability analysis

24
© Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Upload: claire-mckinnon

Post on 26-Mar-2015

222 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

© Crown Copyright (2000)

Module 2.6

Vulnerability Analysis

Page 2: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

“You Are Here”

M2.1 Security Requirements

M2.2 Development Representations

M2.3 Functional Testing

M2.4 Development Environment

M2.5 Operational Environment

M2.6 Vulnerability Analysis

M2.7 Penetration Testing

M2.8 Assurance Maintenance/Composition

MODULE 2 - ASSURANCE

Page 3: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

What is Vulnerability Analysis?

• A search for vulnerabilities in the TOE or its intended operation

• Analysis of their impact

• Input to penetration testing

• Involves– assessment of developer’s analysis– evaluator analysis based on previous results

Page 4: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Vulnerabilities - A Few Terms

• potential vulnerability– suspected, not proven

• known vulnerability– demonstrated by developer or evaluator

• exploitable vulnerability– leading to compromise of assets

• non-exploitable vulnerability– assets will not be compromised in practice

Page 5: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Sources of Vulnerability

The security functions could be

• inadequate to counter the threats

• incorrectly implemented

• bypassed

• tampered with

• directly attacked

• misused

Page 6: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Bypassing Attacks

• Avoid monitored interface

• Inherit privilege to bypass

• Access unprotected area

Attacker AssetSecurity Function

Page 7: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Covert Channels

Subject ‘A’

Resource Subject ‘B’Reads

Reads

Modifies AccessDenied

Unclassified

Secret

Page 8: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Tampering Attacks

• Modify/spoof/read critical data

• Undermine assumptions/dependencies

• De-activate, disable or delay enforcement

Attacker AssetSecurity Function

Page 9: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Direct Attacks

• Security function behaves as specified

• Attacker manipulates input/outputs

Attacker AssetSecurity Function

Page 10: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Misuse

• Consider all modes of operation

• Examine potential for insecure states:– mis-configuration of security functions– insecure use of TOE

• Can insecure states be detected or prevented?

• Repeat/witness TOE installation procedures

Page 11: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Exploitability

• Are known vulnerabilities exploitable?

• Suitable countermeasures– procedural– technical

• Relevance to Security Target?

• Within attacker capabilities?

Page 12: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Strength Determination - 1

• Confirm minimum strength met

Level Resistant to

Basic Casual unsophisticated attacks

Medium Knowledgeable attackers with limitedopportunities or resources

High Beyond normal practicality to defeat

Page 13: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Strength Determination - 2

STRENGTHRATING

Detection

Equipment

Time Collusion

Expertise

Chance

Page 14: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

ITSEC Requirements - 1

Effectiveness Analysis

• Developer Analysis– Binding– Strength of Mechanisms– Ease of Use– Construction & Operational Vulnerability

Assessment

• Independent Vulnerability Analysis

Page 15: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Binding Analysis

• Analysis of mechanism interactions– permissible– mandatory– forbidden

• Protection against indirect attack

• Absence of conflict

ITSEC Requirements - 2

Page 16: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

ITSEC Requirements - 3

• ITSEC Figure 4

Aspect E1 E2 E3 E4 E5 E6

Security Target

Formal SPM

Architectural Design

Detailed Design

Code/hardware drawings

Operational documentation

Page 17: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Common Criteria Requirements

Aspect EAL1 EAL2 EAL3 EAL4 EAL5 EAL6 EAL7

Misuse - Developer

Misuse - Evaluator

SOF

Covert Channels

Developer VulnerabilityAnalysis

IndependentVulnerability Analysis

Page 18: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Evaluation Reporting

• Examination of documentation– show how & where requirements satisfied

• Analysis– demonstrate completeness with respect to

vulnerabilities considered– justify non-exploitability

Page 19: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Summary

• Methodical search for vulnerabilities– checklist approach

• Validation of developer analysis– confirm absence of exploitable vulnerabilities

• Independent analysis by evaluators

• Input to penetration testing

Page 20: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Further Reading - 1

ITSEC Evaluation

• UKSP 05 Part III, Chapter 3

• UKSP 05 Part V

• UKSP 04 Part III, Chapter 4

• ITSEM, Annex 6.C

Page 21: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Further Reading - 2

CC Evaluation

• CC Part 3, Sections 2.6.7 and 14

• CEM Part 2, Chapters 6-8 (AVA sections) & Annex B

• UKSP 05 Part V

Page 22: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Exercise 1 - Vulnerabilities

Client ObjectServer

Mechanism

access

request notify

object

mediates

subject(client)

object

details

Page 23: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Exercise 2 - Strength

• Password mechanism can be defeated by– manual attack, taking 20 days– automated attack, taking 5 minutes

• What is the strength of this mechanism?

• How might the strength be improved?

Page 24: © Crown Copyright (2000) Module 2.6 Vulnerability Analysis

Exercise 3 - Misuse

• Should lamp be lit in– CIPHER mode?– CLEAR mode?

CRYPTODEVICEDATA

CIPHER Encrypted

CLEAR Cleartext