Information technology — Security techniques — Security assurance framework — Part 1: Introduction and concepts

ISO/IEC TR 15443-1:2012 defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of the concepts and principles central to ISO/IEC TR 15443 across its user communities. It provides information fundamental to users of ISO/IEC TR 15443-2.

Technologies de l'information — Techniques de sécurité — Assurance de la sécurité cadre — Partie 1: Introduction et concepts

General Information

Status
Published
Publication Date
18-Nov-2012
Current Stage
9093 - International Standard confirmed
Completion Date
09-Jul-2018
Ref Project

Relations

Buy Standard

Technical report
ISO/IEC TR 15443-1:2012 - Information technology -- Security techniques -- Security assurance framework
English language
51 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

TECHNICAL ISO/IEC
REPORT TR
15443-1
Second edition
2012-11-15


Information technology — Security
techniques — Security assurance
framework —
Part 1:
Introduction and concepts
Technologies de l'information — Techniques de sécurité — Assurance
de la sécurité cadre —
Partie 1: Introduction et concepts




Reference number
ISO/IEC TR 15443-1:2012(E)
©
ISO/IEC 2012

---------------------- Page: 1 ----------------------
ISO/IEC TR 15443-1:2012(E)

COPYRIGHT PROTECTED DOCUMENT


©  ISO/IEC 2012
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56  CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland

ii © ISO/IEC 2012 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC TR 15443-1:2012(E)
Contents Page
Foreword . v
Introduction . vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated Terms . 6
5 Concepts of security assurance . 8
5.1 Security assurance . 8
5.2 Assurance is distinguishable from confidence . 9
5.3 The need for security assurance . 9
5.4 Security assurance is intangible . 10
5.5 Security assurance reduces security risk . 10
5.6 Security assurance provided is related to the effort expended . 10
5.7 Security assurance does not improve the product . 11
5.8 Security assurance stakeholders . 11
5.8.1 Those requiring confidence in SACA results . 11
5.8.2 Approval and assurance authorities . 11
5.9 Security assurance pervasiveness . 12
5.9.1 Pass-through security assurance . 14
5.9.2 Boundaries of deliverables . 14
5.9.3 Transfer of deliverables . 18
5.10 Organisational aspects of SACA . 18
6 The structure of security assurance . 19
6.1 Security assurance requirements specification . 20
6.2 Security assurance cases . 20
6.2.1 Developing a security assurance case . 21
6.2.2 Communicating a security assurance case . 21
6.3 Security assurance evidence . 21
6.4 Security assurance claims . 21
6.5 Security assurance arguments . 22
7 SACA techniques . 23
7.1 Techniques . 23
7.1.1 Effectiveness (or evaluation) . 24
7.1.2 Correctness (or conformance) . 24
7.1.3 Predictive assurance . 24
7.2 Selecting security assurance techniques . 24
7.2.1 Optimisation considerations . 25
8 SACA methods . 26
8.1 Security Assurance Conformity Assessment (SACA) Methods . 26
8.1.2 The composition of a security assurance conformance assessment method . 27
8.1.3 Methods specific to security assurance . 28
8.1.4 Methods not specific to security assurance . 29
8.2 Approaches of SACA methods . 29
8.2.1 Approach types . 29
8.2.2 Combining approaches . 30
8.3 Coverage of life cycle phases . 31
8.3.1 Security assurance conformity assessors . 32
8.3.2 Efficiency of a SACA method . 32
© ISO/IEC 2012 – All rights reserved iii

---------------------- Page: 3 ----------------------
ISO/IEC TR 15443-1:2012(E)
8.4 The relationship between security criteria and assessment methods .33
8.5 Security assurance ratings .33
8.6 SACA tools .34
8.7 Outputs from the application of SACA methods .34
9 CASCO .35
9.1 Standards supporting conformity assessment .35
10 SACA Paradigms .36
10.1 SACA schemes .36
10.2 SACA conformity assessment bodies .37
10.2.1 Type A conformity assessments .37
10.2.2 Second party conformity assessment bodies .37
10.2.3 Third party conformity assessment bodies .38
10.3 Example models of SACA paradigms.38
10.3.1 Common Criteria .38
10.3.2 The Cryptographic Module Validation Program (CMVP) .39
10.3.3 The Payment Card Industry .40
11 Aspects of the composition of security assurance .41
11.1 Developing an assurance case in a compositional setting .42
11.1.1 General problems of composition .43
11.1.2 General aspects of composition re-use .43
11.1.3 Composition using different assurance techniques .44
11.2 Types of composition .44
11.2.1 Layering .44
11.2.2 Network .46
11.2.3 Component .48
11.3 Further activities .49
Bibliography .50

iv © ISO/IEC 2012 – All rights reserved

---------------------- Page: 4 ----------------------
ISO/IEC TR 15443-1:2012(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies
(ISO member bodies). The work of preparing International Standards is normally carried out through ISO
technical committees. Each member body interested in a subject for which a technical committee has been
established has the right to be represented on that committee. International organizations, governmental and
non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the
International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of technical committees is to prepare International Standards. Draft International Standards
adopted by the technical committees are circulated to the member bodies for voting. Publication as an
International Standard requires approval by at least 75 % of the member bodies casting a vote.
In exceptional circumstances, when a technical committee has collected data of a different kind from that
which is normally published as an International Standard (“state of the art”, for example), it may decide by a
simple majority vote of its participating members to publish a Technical Report. A Technical Report is entirely
informative in nature and does not have to be reviewed until the data it provides are considered to be no
longer valid or useful.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO/IEC TR 15443-1 was prepared by Joint Technical Committee ISO/IEC JTC1, Information technology,
Subcommittee SC 27, Security techniques.
This second edition cancels and replaces the first edition (ISO/IEC TR 15443-1:2005), which has been
technically revised. It also replaces ISO/IEC TR 15443-3.
ISO/IEC TR 15443 consists of the following parts, under the general title Information technology — Security
techniques — Security assurance framework:
 Part 1: Introduction and concepts
 Part 2: Analysis
© ISO/IEC 2012 – All rights reserved v

---------------------- Page: 5 ----------------------
ISO/IEC TR 15443-1:2012(E)
Introduction
At the plenary meeting of ISO/IEC JTC 1/SC 27 in November 1994, a study group was set up to consider the
question of testing and assessment methods which contribute to assurance that IT products and systems
conform to security standards from SC 27 and elsewhere (e.g. SC 21 and ETSI; and some Internet standards
contain security aspects). In parallel, the Common Criteria project created a working group on assurances
approaches in early 1996. ISO/IEC TR 15443 resulted from these two activities. Since then the subject of
security assurance has advanced and matured. This second edition of ISO/IEC TR 15443 reflects the current
state of the art in this topic.
Assurance in general may extend to include many properties of IT systems such as usability, interoperability,
quality, reliability and so on and are discussed in other complementary documents such as ISO/IEC 15026
"Systems and software engineering — Systems and software assurance". Hence a detailed discussion of
these properties is outside the scope of this Technical Report which focuses on IT security assurance.
The objective of ISO/IEC TR 15443 is to describe the topic of security assurance, providing the fundamental
concepts of the topic and present the various security assurance techniques. Provision of a framework in
which an appropriate security assurance case can be made is given. The framework provides guidance to the
IT Security Professional in the use of security assurance to achieve confidence that a given deliverable
satisfies its stated IT security assurance requirements. This report examines security assurance techniques,
and security assurance methods proposed by various types of organisations whether they are de-jure or de-
facto in nature.
In pursuit of this objective, ISO/IEC TR 15443 comprises the following:
a) the terms and definitions relating to the topic of security assurance
b) the fundamental concepts relating to security assurance
c) guidance to the selection, application, composition and recognition of assurance methods.
d) a presentation of common and unique properties specific to assurance methods;
e) a framework model to position existing assurance methods and to show their relationships;
ISO/IEC TR 15443 is organised in two parts to address the analysis of security assurance techniques as
follows:
In this part, the introduction and concepts provides an overview of the definitions, fundamental concepts and a
general description of security assurance. This material is aimed at providing the fundamental knowledge
necessary to use the framework for analysis presented in ISO/IEC TR 15443-2 appropriately.
This part of ISO/IEC TR 15443 targets:
a) security assurance authorities, i.e. those responsible for decisions related to a deliverable's security
assurance,
b) those responsible for developing deliverables with security functionality, such as security officers, IT
security architects, developers and integrators,
c) those who are responsible for determining the security assurance of a deliverable, for example through
the use of SACA methods such as those offered by ISO/IEC 27001, ISO/IEC 15408 and ISO/IEC 19790,
This audience may include government agencies, suppliers and integrators.
vi © ISO/IEC 2012 – All rights reserved

---------------------- Page: 6 ----------------------
ISO/IEC TR 15443-1:2012(E)
d) consumers of IT security assurance such as those acquirers and end-users who are responsible for
procuring or using deliverables that make claims about their security properties.
ISO/IEC TR 15443 -2, Analysis, describes a security assurance framework model that can be used to assess
a variety of assurance methods and approaches and relates them to ISO/IEC TR 15443-1. The emphasis is to
identify qualitative properties of the security assurance methods that contribute to security assurance. This
material is catering to an IT security professional to provide understanding of how to obtain security assurance
in a given life cycle stage of a deliverable.
ISO/IEC TR 15443 is relevant to security assurance methods that may not be unique to IT security; however,
guidance given in ISO/IEC TR 15443 will be limited to IT security requirements. A Technical Report,
ISO/IEC TR 15026, covers the related topic of systems and software assurance.
Similarly, additional terms and concepts defined in other International standardisation initiatives (i.e. CASCO)
and International guides (e.g., ISO/IEC 17000) will be incorporated; however, guidance will be provided
specific to the field of IT security and is not intended for general quality management and assessment, or IT
conformity.
© ISO/IEC 2012 – All rights reserved vii

---------------------- Page: 7 ----------------------
TECHNICAL REPORT ISO/IEC TR 15443-1:2012(E)

Information technology — Security techniques — Security
assurance framework —
Part 1:
Introduction and concepts
1 Scope
This part of ISO/IEC TR 15443 defines terms and establishes an extensive and organised set of concepts and
their relationships for understanding IT security assurance, thereby establishing a basis for shared
understanding of the concepts and principles central to ISO/IEC TR 15443 across its user communities. It
provides information fundamental to users of ISO/IEC TR 15443-2.
2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and are
indispensable for its application. For dated references, only the edition cited applies. For undated references,
the latest edition of the referenced document (including any amendments) applies.
ISO/IEC TR 15026-1:2010, Systems and software engineering — Systems and software assurance — Part 1:
Concepts and vocabulary
ISO/IEC 17000:2004, Conformity assessment — Vocabulary and general principles
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 17000, ISO/IEC TR 15026-1
and the following apply.
NOTE Defining terms for a generic security assurance framework is a difficult task since many security assurance
terms have been coined to satisfy the needs of specific security assurance needs. In many cases, similar terms have
different definitions making it difficult to construct a generic language for the security assurance framework. Owing to
these difficulties, definitions in conflict are reproduced below, and the term's preferred definition in the context of this
Technical Report indicated. In particular, definitions from ISO/IEC 17000, ISO/IEC TR 15026, ISO/IEC 15408 part 1 and
the ISO/IEC 27000 series may be reproduced below.
3.1
accreditation
third-party attestation related to a conformity assessment body conveying formal demonstration of its
competence to carry out specific conformity assessment results
[SOURCE: ISO/IEC 17000:2004, definition 5.6]
3.2
accreditation
formal declaration by a designated approving authority that a system is approved to operate in a particular
security mode using a prescribed set of safeguards
© ISO/IEC 2012 – All rights reserved 1

---------------------- Page: 8 ----------------------
ISO/IEC TR 15443-1:2012(E)
NOTE 1 The definition of the term "accreditation" adopted for this standard is from ISO/IEC 17000:2004, definition 5.6.
NOTE 2 Note 1 is not part of the definition from ISO/IEC 21827.
[SOURCE: ISO/IEC 21827:2008, definition 3.2]
3.3
approval authority
SACA approval authority
entity with the authority to decide that the assurance case and the extent of assurance it provides are
satisfactory
NOTE 1 The approval authority may include multiple entities, e.g. individuals or organizations. These can include
different entitles with different levels of approval and/or different areas of interest.
NOTE 2 Two-party situations; approval authority often rests with the acquirer. In regulatory situations, the approval
authority may be a third party such as a governmental organization or its agent. In other situations, e.g. the purchase of
off-the-shelf products developed by a single-party, the independence of the approval authority can be a relevant issue to
the acquirer.
[SOURCE: Adapted from ISO/IEC 15026-1:2010, definition 2.3]
3.4
approval authority
any national or international organization/authority mandated to approve and/or evaluate security functions
NOTE 1 An approval authority in the context of this definition evaluates and approves security functions based on their
cryptographic or mathematical merits but is not the testing entity which would test for conformance to this International
Standard and ISO/IEC 19790:2006.
[SOURCE: ISO/IEC 19790:2006, definition 3.1]
3.5
assessment
verification of a product, system or service against a standard using the corresponding assessment method to
establish compliance and determine the assurance
[SOURCE: ISO/IEC 21827, definition 3.3]
3.6
assurance
grounds for justified confidence that a claim has been or will be achieved
[SOURCE: ISO/IEC TR 15026-1:2010, definition 2.1]
3.7
assurance
grounds for justified confidence that a TOE meets the SFRs
[SOURCE: ISO/IEC 15408-1:2009, definition 3.1.4]
3.8
assurance authority
individual or organization responsible for specifying security assurance requirements for which assurance is to
be obtained
NOTE 1 An assurance authority may be the same individual or organization as the approval authority in definition 3.3.
2 © ISO/IEC 2012 – All rights reserved

---------------------- Page: 9 ----------------------
ISO/IEC TR 15443-1:2012(E)
3.9
assurance case
representation of a claim or claims, and the support for these claims
NOTE 1 An assurance case is a reasoned, auditable artefact created to support the contention its claim or claims are
satisfied. It contains the following and their relationships:
 one or more claims about properties;
 arguments that logically link the evidence and any assumptions to the claim(s);
 a body of evidence and possibly assumptions supporting these arguments for the claim(s).
[SOURCE: ISO/IEC TR 15026-1, definition 2.2]
3.10
assurance claim
assertion or supporting assertion that a system meets a stated security need
NOTE 1 Claims address both direct threats (e.g. system data are protected from attacks by outsiders) and indirect
threats (e.g. system code has minimal flaws).
NOTE 2 Compare with the definition of "claim" in definition 3.11.
[SOURCE: Adapted from ISO/IEC 21827, definition 3.7]
3.11
certification
third-party attestation related to products, processes, systems or persons
NOTE 1 Certification of a management system is some-times also called registration.
NOTE 2 Certification is applicable to all objects of conformity assessment except for conformity assessment bodies
themselves, to which accreditation is applicable.
[SOURCE: ISO/IEC 17000:2004, definition 5.5]
3.12
claim
statement of something to be true including associated conditions and limitations
NOTE 1 The statement of a claim does not mean that the only possible intent or desire is to show it is true. Sometimes
claims are made for the purpose of evaluating whether they are true or false or undertaking an effort to establish what is
true.
NOTE 2 In its entirety, a claim conforming to ISO/IEC 15026-2 is an unambiguous declaration of an assertion with any
associated conditionality giving explicit details including limitations on values and uncertainty. It could be about the future,
present, or past.
[SOURCE: ISO/IEC 15026-1:2010,definition 2.4]
3.13
conformity assessment scheme
conformity assessment programme
conformity assessment system related to specified objects of conformity assessment, to which the same
specified requirements, specific rules and procedures apply
NOTE 1 Conformity assessment schemes may be operated at international, regional, national or sub-national level.
[SOURCE: ISO/IEC 17000:2010, definition 2.8]
© ISO/IEC 2012 – All rights reserved 3

---------------------- Page: 10 ----------------------
ISO/IEC TR 15443-1:2012(E)
3.14
deliverable
component, product, system, service, process, organization or personnel that has a security objective
NOTE 1 A deliverable's boundary may include one or many components including the processors, and peripherals,
associated communication technologies, peripheral services, the environment in which it operates, associated
organizational processes as well as the personnel responsible for developing, operating, maintaining and using it.
3.15
evaluation
systematic determination of the extent to which an entity meets its specified criteria
[SOURCE: ISO/IEC 12207:2007, definition 4.12]
3.16
evaluation
assessment of a PP, an ST or a TOE against defined criteria
[SOURCE: ISO/IEC 15408–1:2009, definition 3.1.26]
3.17
evaluation scheme
the administrative and regulatory framework under which ISO/IEC 15408 is applied by an evaluation authority
within a specific community
NOTE 1 Compare with [ISO/IEC 17000, definition 2.8 "conformity assessment scheme"].
[SOURCE: Adapted from ISO/IEC 15408–1:2009, definition 3.1.29]
3.18
mark
assurance argument that substantiates the assurance claim
NOTE 1 ISO/IEC 17030:2003 gives general requirements for third party marks of conformity.
3.19
predictive assurance
recognition of the vendor’s consistent repeatability to provide deliverables that satisfy its security policy or to
perform as claimed
3.20
secure
not vulnerable to most attacks, are able to tolerate many of the attacks that they are vulnerable to, and that
can recover quickly with a minimum of damage from the few attacks that successfully exploit their
vulnerabilities
3.21
security
property of a system by which confidentiality, integrity, availability, accountability, authenticity, and reliability
are achieved
3.22
security
the capability of the software product to protect information and data so that unauthorised persons or systems
cannot read or modify them and authorised persons or systems are not denied access to them
[SOURCE: ISO/IEC 12207:2007, definition 4.39]
4 © ISO/IEC 2012 – All rights reserved

---------------------- Page: 11 ----------------------
ISO/IEC TR 15443-1:2012(E)
3.23
security assurance
grounds for justified confidence that a claim about meeting security objectives has been or will be achieved
[SOURCE: Adapted from ISO/IEC 15026-1:2010, definition 2.1]
3.24
security assurance argument
set of structured security assurance claims, supported by evidence and reasoning, that demonstrate clearly
how security assurance needs have been satisfied
3.25
security assurance evidence
data on which a judgment or conclusion about an security assurance claim may be based
NOTE 1 The evidence may consist of observation, test results, analysis results, evaluation and appraisals.
[SOURCE: Adapted from ISO/IEC 21827, definition 3.8]
3.26
Security assurance conformance assessment method
SACA method
systematic process, procedure or technique for obtaining security assurance evidence and consistently
verifying security assurance claims
NOTE 1 Compare with conformity assessment scheme, definition 2.8 in ISO/IEC 17000.
3.27
Security assurance conformance assessment paradigm
SACA paradigm
comple
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.