evaluation - your creative solutions

22
September 27, 2011 12 th ICCC in Malaysia Kenjiro SASAOKA General Manager, Councilor IT Security Center Information-technology Promotion Agency (IPA) Update on Japanese Scheme - Enforcement utilizing certified products for procurement in Japanese Government - Japan Information Technology Security Evaluation and Certification Scheme 1

Upload: others

Post on 11-Feb-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

September 27, 201112th ICCC in Malaysia

Kenjiro SASAOKAGeneral Manager, Councilor

IT Security CenterInformation-technology Promotion Agency (IPA)

Update on Japanese Scheme - Enforcement utilizing certified products for procurement in Japanese Government -

Japan Information Technology Security Evaluation and Certification Scheme

1

Topics

2

1. Legal Basis of JISEC2. Update on IPA3. Overview of JISEC4. Renewal of Scheme Documents5. Hardware (smartcard etc.) Evaluation6. Certification Statistcis7. PP Compliant MFPs8. Reinforcement of National Procurement Policy9. Renewal of JISEC Website10.Collaboration within CCRA for future improvement

1. Legal Basis of JISEC, IPA Certification

3

Information-technology Promotion Agency (IPA) is Incorporated administrative agency, established in 1970 by Japanese Law “Act on Facilitation of Information Processing (Act No.90 of 1970).”

IPA became Certification Body on April 2004 under IT Security Policy of METI, Ministry of Economy, Trade and Industry.Rationale is described in the provision of article 20, paragraph 1, item 5 of “Act on Facilitation of Information Processing”, which was revised on January 5, 2004.

“With the aim to ensure the security and reliability of information processing, evaluates from technical perspective the information processing systems.”

After approval as a Certification Authorizing Participant of CCRA on October 2003, Certification Body transferred from NITE to IPA on April 2004.

NITE is Accreditation Body of JISEC under ASNITE-IT accreditation program, which has the scope of Testing Laboratories for IT security since April 2001.

2. Update on IPA

4

IT Human ResourceDevelopment Headquarters

IT Human ResourceIT Human ResourceDevelopment HeadquartersDevelopment Headquarters

Software EngineeringCenter

Software EngineeringSoftware EngineeringCenterCenter

IT Security CenterIT Security CenterIT Security Center

Open Software CenterOpen Software CenterOpen Software Center

Organization

IPA reviewed the organization structure based on efficiency aspect and ...

IT Skill StandardsCenter

IT Skill StandardsIT Skill StandardsCenterCenter

Japan IT EngineerExamination CenterJapan IT EngineerJapan IT Engineer

Examination CenterExamination Center

ChairmanChairmanChairman

ExecutiveDirectors

ExecutiveExecutiveDirectorsDirectors

Mr. Kazumasa Fujie

Industrial-AcademicCollaboration Center

IndustrialIndustrial--AcademicAcademicCollaboration CenterCollaboration Center

Before 1st July, 2011

2. Update on IPA

5

IT Human ResourceDevelopment Headquarters

IT Human ResourceIT Human ResourceDevelopment HeadquartersDevelopment Headquarters

Software EngineeringCenter

Software EngineeringSoftware EngineeringCenterCenter

IT Security CenterIT Security CenterIT Security Center

Open StandardsPromotion CenterOpen StandardsOpen Standards

Promotion CenterPromotion Center

Organization

Technology Headquarters was established on 1st July, 2011.Software Engineering Center, IT Security Center and Open Standards Promotion Center involved in Technology Headquarters.

Technology HeadquartersTechnology HeadquartersTechnology Headquarters

IT Skill StandardsCenter

IT Skill StandardsIT Skill StandardsCenterCenter

Japan IT EngineerExamination CenterJapan IT EngineerJapan IT Engineer

Examination CenterExamination Center

ChairmanChairmanChairman

ExecutiveDirectors

ExecutiveExecutiveDirectorsDirectors

Mr. Kazumasa Fujie

Industrial-AcademicCollaboration Center

IndustrialIndustrial--AcademicAcademicCollaboration CenterCollaboration Center

As of 1st July, 2011

started 1990. Center established 1997.           

about 100 researchers and staffs.

established 1970. 10 departments & centers.

IT Security Center

Cryptography Research Group

Security Engineering Laboratory(Handling Vulnerability, Virus and Unauthorized Access)

Information Security Certification Office (=JISEC)

Open Standards Promotion Center

Software Engineering Center

Cryptographic Module Validation Program Office(=JCMVP)

Chair: Mr. Fujie

organized  1998.                                                

JISEC  scheme transferred from NITE 2004.                       

14 certifiers. (Including 4 certifiers for H/W certification.)

As of 19th

Aug, 2011

2. Update on IPA IT Security Center (IPA/ISEC)

7

National Institute of Technology and Evaluation (NITE)

National Institute of Technology and Evaluation (NITE)

Information-technology Promotion Agency, JapanInformation-technology Promotion Agency, Japan

Certification

ITSC:IT Security Center, Evaluation Department, ECSEC:Electronic Commerce Security Technology Laboratory Inc. Evaluation Center, MHIR:

Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security, TÜViT:TÜV Informationstechnik GmbH, Evaluation Body for IT-Security

Procurers and Venders ofIT Products and IT SystemsProcurers and Venders of

IT Products and IT Systems

Certification Report

Certification Report

CertificateEvaluation

accreditation of Evaluation Facilities

ISO/IEC 15408ISO/IEC 15408

ITSC、ECSEC MHIR、TÜViT*

Evaluation Technical Report

Application

Target Products

Hardware SoftwareSmartcard IT Systems

Certification Body

Accreditation Body

Sponsor

Approval of Evaluation Facilities

Application

Evaluation Facility

3. Overview of JISEC(Japan IT Security Evaluation and Certification Scheme)

4. Scheme Documents of JISEC

8

Objective: To approve Evaluation Facility for Hardware (smartcard etc.) evaluationTo improve application procedures for certificationTo clarify provisions of Scheme documents

Scheme Documents – Revised on February 2011CCS-01 : IT Security Evaluation and Certification Scheme

Minor RevisionCCM-01 : Organization and Operation manual of the IT Security Certification

Body IT Security (Quality Manual) Minor Revision

CCM-02 : IT Security Certification ProcedureMajor Revision

CCM-03 : Evaluation Facility Approval ProcedureMajor Revision

STM-01 : Security Target Confirmation ProcedureNEW, separated from CCM-02

4. Scheme Documents of JISEC

9

Changes in “CCM-02 : IT Security Certification Procedure”Evaluation Term : Evaluation works shall be completed within 24 months.Extra charge for travel expense:

Extra charge for travel expense of overseas site visit will be collectedbased on the beneficiaries-pay principle.

Non-disclosure agreement:Third party, who will disclose confidential information during evaluation, can concluded NDA with Certification Body, in such cases for CompositeEvaluation of Smartcard, etc.

Clarification: Provision of Obligation for Sponsor of Certified Product was added.

Changes in “CCM-03 : Evaluation Facility Approval Procedure”Product Categories for Software and/or Hardware (Smartcard etc.) was

introduced to specify the scope of Approval as an Evaluation Facility,and the scope of Qualification as an Evaluator.

Extra charge for travel expense of overseas examination to qualify an evaluatorwas introduced.

Charge for Application from Evaluation Facility was introduced.Clarification: Requirements for Evaluation Facility and Evaluator were revived.

5. Hardware (smartcard etc.) Evaluation

10

JISEC is ready for accepting Application of Hardware certification such as Smartcard or Integrated Circuit.

Technical Manager (Hardware) was designated.

Four certifiers were trained as Certifiers (Hardware) , and after trial certification, they will be approved officially.

Training for AVA_VAN.5 with Test Vehicle on going.

Collaborating Technical Community, Attack Database forvulnerability analysis has developed.

5. Hardware (smartcard etc.) Evaluation

11

Two (2) Hardware Evaluations on Going for Trial

Integrated Circuit RS45C claimed Conformance to BSI-PP-0035Assurance Components: EAL5+ ALC_DVS.2, AVA_VAN.5On going evaluation under JISECAfter successful completion of evaluation, qualification of evaluator(s) and

approval of evaluation facility, CC certificate will be issued.Evaluation Facility is required to have Approval and Accreditation for

Evaluation Facility for Hardware (smartcard etc.) products.

T6ND7 Integrated Circuit Version 1.0 claimed Conformance to BSI-PP-0035Assurance Components: EAL4+ ALC_DVS.2, AVA_VAN.5After successful completion of evaluation, qualification of evaluator(s) and

approval of evaluation facility, CC certificate will be issued.

5. Hardware (smartcard etc.) Evaluation

12

Development of Test Vehicle, which enables objective assessment for Evaluator’s skill in vulnerability analysis of Smartcards

Reference Smartcard with appropriate strength for security countermeasures.To assess evaluator’s skill in power analysis technologyTo assess evaluator’s skill in physical analysis technologyTo assess evaluator’s skill in fault analysis technology

Presentation for Test Vehicle at Session No. on Day Two, 28 September 2011Please come to TRACK A room at 14:00.

1) Some Schemes of CCRA are reviewing the Test Vehicle.

We are ready to accept any comments for improvement.

2) Another type of Test Vehicle such as Java Chip is planned for development.

(As of August, 2011)

13

Certification Statistics ‐ Certificates

0

10

20

30

40

50

60

70

Num

ber of Certificates

Certification 0 2 5 17 23 43 62 59 42 34 26

Assurance Continuity 0 0 0 3 10 9 12 13 10 13 3

ST Confirmation 0 3 6 15 3 3 5 8 4 1 0

FY2001 FY2002 FY2003 FY2004 FY2005 FY2006 FY2007 FY2008 FY2009 FY2010Apr-Aug

2011

6. Certification Statistics

(As of August, 2011)

14

Certification Statistics ‐ EALs

0

5

10

15

20

25

30

35

Num

ber of Certificates

EAL1 0 0 1 1 8 10 10 1 2 1

EAL2 0 1 5 9 16 19 18 4 0 2

EAL3 2 2 8 12 19 27 27 32 32 23

EAL4 0 2 3 1 0 6 4 4 0 0

FY2002 FY2003 FY2004 FY2005 FY2006 FY2007 FY2008 FY2009 FY2010 FY2011

6. Certification Statistics

(As of August, 2011)

15

6. Certification Statistics

Product Categories

68%

11%

4%

4%

2%2%

2%1%1%1%1%1%1%1%0%

Digital MFP

Middleware

DBMS

Smartcards and related Products

Firewalls

Application Software

Network Software

PKI Products

Network Devices

Financial Devices

Software Library

OS

Document Management

Digital Still Camera

Biometrics

RICOH COMPANY, LTD. C0246: Ricoh imagio MP 5000 SP/4000 SP with security card Type 9C0285: Ricoh Aficio MP 4001, … etc.C0286: Ricoh Aficio MP 2851, … etc.C0289: Ricoh Aficio MP 6001, … etc.C0299: Ricoh imagio MP C3301 SP/ … etc.C0300: Ricoh Aficio MP C3001/ … etc.C0301: Ricoh imagio MP 5000 SP/ … etc.C0302: Ricoh Aficio MP C4501/ … etc.

Canon Inc. C0287: Canon imageRUNNER ADVANCE C5000 Series 2600.1 model

Fuji Xerox Co., Ltd.C0294: Xerox Color 550/560 Printer

(As of August 2011)

10 Multi-Function Peripherals are certified as IEEE 2600.1 compliant

16

7. PP Compliant MFPs

17

Established by the Information Security Policy Council on April 21, 2011■Security Requirements on IT Systems【Baseline Requirement】When purchasing component products for the Information System, the Chief Information Security Officer shall examine the necessity of selecting the certified products based on "IT Security Evaluation and Certification Scheme“. If it is necessary and there are multiple candidate products which are equipped with required security functions, he/she shall select the certified product which also satisfies the required assurance level.

【Enhanced Requirement】Chief Information Security Officer shall request for ST evaluation and ST confirmation (ST: Security Target, i.e. the Security Functional Design of the System) by the third party if he/she recognizes critical security requirements in the information system being implemented.

■Procurement of equipments【Baseline Requirement】The Chief Information Security Officer shall specify in the selection criteria that certification based on IT Security Evaluation and Certification Scheme shall be taken into consideration when there are Security Functional Requirements and the procurement is made through the General Assessment Tendering System.

■Software Development【Baseline Requirement】Chief Information Security Officer shall request for ST evaluation and ST confirmation (ST: Security Target, i.e. the Security Functional Design of the Software) by the third party if he/she recognizes critical security requirements in the software being developed.

URL http://www.nisc.go.jp/eng/pdf/K304-101e.pdf

Management Standards for Information Security Measures for the Central Government Computer Systems

8. Reinforcement of National Procurement Policy

18

METI April 21, 2011

URL http://www.meti.go.jp/policy/netsecurity/cclistmetisec2011.pdf (written in Japanese)

Smartcards(IC Cards)

Firewalls OS(Server OS only)

Digital MFP(MFP)

IDS/IPSDatabase (DBMS)

Category

Definition

Use

Criteria

GenerallyRequired Security Functions

Standard EAL

Product that embedded IC chip into the plastic card to record information.

Product placed in boundary of the Internet and internal network to filter the packets, according to the predefined rules.

Basic software used for hardware control and operation of computer.

Product that has printer function in standard, and equips with two functions or more of scanner, fax, and copy by standard.

Product that monitors operational status of network and system, reports and defends invasion to computer network of organization from outside.

Product that manages database as shared data and responds to the access request to data.

Basic Resident Registration Card and IC passport, are widely distributed to the people and used for the personal identification and authorization.

System that protects IT systems which handle critical information to beprotected fromunauthorizedaccess.

Operating Systemas basis of IT Systemwhich handlescritical informationto be protected.

Equipment used for copying, digitization, and transmission of the critical information that should be protected.

System that detects and prevents unauthorized access from the Internet by observing the communication on the network.

Software that is used to store the critical information like personal information that should be protected as data base.(only in Server OSenvironment.)

ISO/IEC 15408Common Criteria

ISO/IEC 15408Common Criteria

ISO/IEC 15408Common Criteria

ISO/IEC 15408Common Criteria

ISO/IEC 15408Common Criteria

ISO/IEC 15408Common Criteria

Select security functions according to needs of procurers in the list of catalogue as below;Security audit, Non-repudiation of origin/receipt, Cryptographic functionality, Access control, Data authentication, Export data protection, Information flow control, Input data protection, Internal transfer data protection, Residualinformation protection, Role-back, Stored data integrity, Transfer data confidentiality, Transfer data integrity,Identification and certification, Security management, Privacy Control, Security functionality protection, Resourceutilization management, TOE access control, Trusted path/channels

Refer to IPA website for security functionalities of each certified products.

EAL4+ and over EAL4 and over EAL3 and over EAL3 and over EAL3 and over EAL2 and over

Product Category List in Management Standards for Information Security Measures

8. Reinforcement of National Procurement Policy

9. Renewal of JISEC Website

19

To Utilize the Certified Products List for National Procurement

Certified Products List for ProcurementList was separated according to CC Version

Certified Products List for CCv3.1 was separated from CCv2.3, CCv2.1.Security Functional Requirements

SFRs Table of each certified product enables easy comparison of certified products in same category.

Archived Products ListDiscontinued Products can be found in Archived Products List. Certified Products List contains only the products on the market. Sponsors of Certified products shall report to Certification Body when certified

product will be sold on the market.Procurer can select the certified products from Certified Products List on

JISEC website.

20

Collaborating MFP and Smartcard Technical Communities...

1) MFP is the major product type in JISEC certified products list.

In other words, JISEC has the most experiences in certification of MFPs.

JISEC plans to contribute to develop the new PP and supporting documents with Technical community and related schemes utilizing its experiences and knowledge.

2) Smartcard is the HOT topic in JISEC scheme.

IPA developed so-called “Test Vehicle” for evaluator assessment. ICSS-JC is Technical Community in Japan, and JISEC is collaborating with them on Study for vulnerability analysis, etc.

10. Collaboration within CCRA

Common Criteria is moving to future successPreparing to react to the future changes in CC and Collaborative PPs.Preparing to revise the requirement for Procurement Policy.Collaborating with Technical Communities for appropriate PPs.

Expand Mutual Recognition among CCRAStatement published in 11th ICCC, Certification within CCRA shall expand in order to eliminate the burden of duplicating evaluations of IT products and Protection Profiles.New Participants of CCRA are welcome!!

To support Government ProcurementTo Promote deployment of CC certified products to Government Organization progressively.

21

10. Collaboration within CCRA

JISEC InformationURL:

English: http://www.ipa.go.jp/security/jisec/jisec_e/Japanese: http://www.ipa.go.jp/security/jisec/

Thank you for your attentionThank you for your attention

Kenjiro SASAOKA

General Manager, CouncilorIT Security CenterIPA, Japan

Japan Information Technology Security Evaluation and Certification Scheme

22