[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

(last) Assurance measures: AMA (coping with the speed of OSS development)



Hi!

This is the last part of the saga (for a time at least), as we are
done with all assurance requrements (modulo those concentrating on
ST and PP assurance.)

I hope that at least some of you were listening.
(First I thought there would be some feedback, at least
like "stop it, this is boring!", or "why do you write to a
mailing list which does not even exists?".)


The assurance maintenance class is not an integral
part of the assurance requirement set. It not included in the
EALs, and it seems that no one really cares about it. It might
be okay with commercial software development styles (it isn't:
one can only find outdated versions of software evaluated against
CC), but having only a point release evaluated would just not
fit with open source development methodology.

Unfortunately this class heavily depends on other assurance
classes, some of which open source isn't good at.

AMA_AMP.1 Assurance maintenance plan
AMA_AMP.1.1D The developer shall provide an AM Plan.
	(Let's assume that we don't have any.)
AMA_AMP.1.1C The AM Plan shall contain or reference a brief description
	of the TOE, including the security functionality it provides.
	(Security Target, TOE description (what we also don't have))
AMA_AMP.1.2C The AM Plan shall identify the certified version of the
	TOE, and shall reference the evaluation results.
	(None is available)
AMA_AMP.1.3C The AM Plan shall reference the TOE component
	categorisation report for the certified version of the TOE.
	(We will se this later.)
AMA_AMP.1.4C The AM Plan shall define the scope of changes to the TOE
	that are covered by the plan.
	(The upper bound of possible changes until the next stable
	release. Some OSS projects would benefit from such an upper
	bound anyway: it would made their release cycle more
	controllable.)
AMA_AMP.1.5C The AM Plan shall describe the TOE life-cycle, and shall
	identify the current  plans for any new releases of the TOE,
	together with a brief description of any planned changes that
	are likely to have a significant security impact.
	(The actually planned changes. Some projects have such goals,
	and some don't. They are not meet them, but it isn't expected
	anyway.)
AMA_AMP.1.6C The AM Plan shall describe the assurance maintenance cycle,
	stating and justifying the planned schedule of AM audits and the
	target date of the next re-evaluation of the TOE.
	(The AM schedule should match to the devel cycle. Maybe having
	a defined QA effort concerning itself with the release cycle
	(and this could even be aligned by AM goals), would create
	a pressure to the cycle which could make a balance with the
	developers' pressure (put in this and that also, the release
	goal is just a date without meaning). In debian there is the
	QA group, which does concerned with some issues related,
	but not assume responsibility for 1.6C and more importantly
	for enforcing 1.5C)
AMA_AMP.1.7C The AM Plan shall identify the individual(s) who will
	assume the role of developer security analyst for the TOE.
	(My daylight job includes this. You will sooner or later
	will really hate all developers. And they will hate you
	as well. And both of you will have very good reasons to
	do so:) At least this is the case with commercial developments:
	most of the developers I meet does not even know the
	tools and languages they use, and very upset when I tell
	them that they work is b*llsh*t.)
AMA_AMP.1.8C The AM Plan shall describe how the developer security
	analyst role will ensure that the procedures documented or
	referenced in the AM Plan are followed.
	(I am very interested what is the equivalent of "management
	decision" in OSS:) You know this kind from Dilbert cartoons)
AMA_AMP.1.9C The AM Plan shall describe how the developer security
	analyst role will ensure that all developer actions involved
	in the analysis of the security impact of changes affecting
	the TOE are performed correctly.
	(I looked it up in the CEM trying to figure out what it
	means. I have found the following information: none)
AMA_AMP.1.10C The AM Plan shall justify why the identified developer
	security analyst(s) have sufficient familiarity with the
	security target, functional specification and (where
	appropriate) high-level design of the TOE, and with the
	evaluation results and all applicable assurance requirements for
	the certified version of the TOE.
	(I cannot think of feasible procedural controls (save that the
	security analyst is the same who have written the ST of the
	TOE, which is not always works))
AMA_AMP.1.11C  The AM Plan shall describe or reference the procedures to
	be applied to maintain the assurance in the TOE, which
	shall include the procedures for configuration
	management, maintenance of assurance evidence, performance of
	the analysis of the security impact of changes affecting the
	TOE, and flaw remediation.
	(Good news: "only" maintenance of assurance evidence and
	security impact analysis is what to be done.)

AMA_CAT.1 TOE component categorisation report
AMA_CAT.1.1C   The TOE component categorisation report shall categorise
	each component of the TOE, identifiable in each TSF
	representation from the most abstract to the least abstract,
	according to its relevance to security;  TOE component
	categorisation must indicate whether the component is
	TSP-enforcing or non-TSP- enforcing.
	(Each security function, module, and procedure (e.g.C function
	should be categorized in EAL4)
AMA_CAT.1.2C   The TOE component categorisation report shall describe
	the categorisation scheme used, so that it can be determined how
	to categorise new components introduced into the TOE, and also
	when to re-categorise existing TOE components following changes
	to the TOE or its security target.
	(If a procedure
		-modifies TSF data
		-makes decision based on TSF data
		-does other security relevant activity based on TSF data
		-depends on a TSP-enforcing procedure
	The module contains a TSP-enforcing function.)
AMA_CAT.1.3C   The TOE component categorisation report shall identify
	any tools used in the development environment that, if modified,
	will have an impact on the assurance that the TOE satisfies its
	security target.
	(Which tool is not?)

AMA_EVD.1 Evidence of maintenance process
AMA_EVD.1.1D   The developer security analyst shall provide AM
	documentation for the current version of the TOE.
AMA_EVD.1.1C   The AM documentation shall include a configuration list
	and a list of identified vulnerabilities in the TOE.
	(Packages.gz, DSA list)
AMA_EVD.1.2C   The configuration list shall describe the configuration
	items that comprise the current version of the TOE.
	(See ACM)
AMA_EVD.1.3C   The AM documentation shall provide evidence that the
	procedures documented or referenced in the AM Plan are being
	followed.
	(BTS could be used)
AMA_EVD.1.4C   The list of identified vulnerabilities in the current
	version of the TOE shall show, for each vulnerability, that the
	vulnerability cannot be exploited in the intended environment
	for the TOE.
	(As there is either a fix or a workaround)

AMA_SIA.2 Examination of security impact analysis
AMA_SIA.2.1D   The developer security analyst shall, for the current
	version of the TOE, provide a security impact analysis that
	covers all changes affecting the TOE as compared with the
	certified version.
	(The developer hopefully does it, but rarely document.
	Should have been.)
AMA_SIA.2.1C   The security impact analysis shall identify the certified
	TOE from which the current version of the TOE was derived.
	(Aversion number.)
AMA_SIA.2.2C The security impact analysis shall identify all new and
	modified TOE components that are categorised as TSP-enforcing.
	(diff -u :)
AMA_SIA.2.3C The security impact analysis shall, for each change
	affecting the security target or TSF representations, briefly
	describe the change and any effects it has on lower
	representation levels.
	(One does not change the ST without good reason. I would
	actually 1. come out with an idea, 2. implement it,
	3. draw the ST changes from the idea and changes
	of implementation representation (source code))
AMA_SIA.2.4C The security impact analysis shall, for each change
	affecting the security target or TSF representations, identify
	all IT security functions and all TOE components categorised as
	TSP-enforcing that are affected by the change.
	(It also can easily be drawn from source.)
AMA_SIA.2.5C The security impact analysis shall, for each change which
	results in a modification of the implementation representation
	of the TSF or the IT environment, identify the test evidence
	that shows, to the required level of assurance, that the TSF
	continues to be correctly implemented following the change.
	(Regresion test is a good thing, and it should always be
	done. Just we have to have tests to start with:)
AMA_SIA.2.6C The security impact analysis shall, for each applicable
	assurance requirement in the configuration management (ACM),
	life cycle support (ALC), delivery and operation (ADO) and
	guidance documents (AGD) assurance classes, identify any
	evaluation deliverables that have changed, and provide a brief
	description of each change and its impact on assurance.
	(Diff -u helps a lot:)
AMA_SIA.2.7C The security impact analysis shall, for each applicable
	assurance requirement in the vulnerability assessment (AVA)
	assurance class, identify which evaluation deliverables have
	changed and which have not, and give reasons for the decision
	taken as to whether or not to update the deliverable.
	(One cannot easily avoid thinking if uses CC:)

-- 
GNU GPL: csak tiszta forrásból



Reply to: