Abstract
The data diodes are very often used to protect users’ networks and sensitive data and that is why additional assurance of those devices is demanded. This assurance can be obtained by applying the Common Criteria security development process. The process is very difficult and time-consuming specially for those not familiar with the standard. Although there are many guidelines and templates telling how to define the security problem still there is a lack of computer aiding tools. This paper describes the plug-in application which supports identification of protected assets, threats, security objectives and security functions – the main elements of security specification. The tool facilitates and speeds up the security development process of IT products.
Chapter PDF
Similar content being viewed by others
References
Fort Fox Hardware Data Diode, https://www.fox-it.com/en/products/datadiode
Filbico Data Diode, http://www.filbico.pl/index.php/pl/zno
Waterfall Security Solutions USA, http://www.waterfallsecurity.com/technology
Owl Computing Technologies, http://www.owlcti.com/dualdiode_technology.html
VS-diode, http://www.genua.eu/produkte/datendiode/index.en.html
Common Criteria for Information Technology Security Evaluation (Ver. 3.1, Revision 4) Part 1: Introduction and general model (ISO/IEC 15408-1) (September 2012)
Common Criteria for Information Technology Security Evaluation (Ver. 3.1, Revision 4) Part 2: Security functional requirements (ISO/IEC 15408-2) (September 2012)
Common Criteria for Information Technology Security Evaluation (Ver. 3.1, Revision 4) Part 3: Security assurance requirements (ISO/IEC 15408-3) (September 2012)
The Common Criteria Portal, http://www.commoncriteriaportal.org
Certification Report EAL4+ – NSCIB-CC-09-11025-CR, Fort Fox Hardware Data Diode, version FFHDD2+, TNO certification (September 3, 2009)
Certification Report EAL7+ – NSCIB-CC-09-11025-CR2, Fort Fox Hardware Data Diode, version FFHDD2+, TNO certification (June 16, 2010)
Common Methodology for Information Technology Security Evaluation (Version 3.1, Revision 4). Evaluation Methodology (September 2012)
Białas, A.: Patterns Improving the Common Criteria Compliant IT Security Development Process. In: Zamojski, W., Kacprzyk, J., Mazurkiewicz, J., Sugier, J., Walkowiak, T. (eds.) Dependable Computer Systems. AISC, vol. 97, pp. 1–16. Springer, Heidelberg (2011)
Rogowski, D., Nowak, P.: Pattern Based Support for Site Certification. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J., et al. (eds.) Complex Systems and Dependability. AISC, vol. 170, pp. 179–193. Springer, Heidelberg (2012)
Białas, A. (ed.): Applying design patterns in security development process according to the Common Criteria standard. Original Polish title: Zastosowanie wzorców projektowych w konstruowaniu zabezpieczeń informatycznych zgodnych ze standardem Common Criteria. Wydawnictwo Instytutu Technik Innowacyjnych EMAG, financed by UE POIG 1.3.1, Katowice (2011) ISBN 978-83-932737-2-0
ISO/IEC TR 15446: Information technology – security techniques – guide for the production of Protection Profiles and Security Targets (2009)
BSI: The PP/ST guide, Version 1, Revision 6.2 (August 2007)
BSI: Guidelines for developer documentation according to CC Version 3.1 (2007)
BSI: Guidelines for evaluation reports according to Common Criteria Version 3.1, Version 2.00 for CCv3.1 rev. 3 (2010)
Higaki, W.H.: Successful Common Criteria evaluations. A practical guide for vendors. Create Space Independent Publishing Platform (2010)
Rogowski, D.: Computer-aided tool based on Common Criteria related design patterns. In: Korczak, J., Dudycz, H., Dyczkowski, M. (eds.) Business Informatics, vol. 3(29), pp. 111–127. Wrocław University of Economics Research Papers (2013)
CCMODE Project (Common Criteria compliant, Modular, Open IT security Development Environment), http://www.commoncriteria.pl/
Białas A.: Security-related design patterns for intelligent sensors requiring measurable assurance. Electrical Review (Przegląd Elektrotechniczny) 85(R.85(7)), 92–99 (2009) ISSN 0033-2097
Bialas, A.: Common Criteria Related Security Design Patterns for Intelligent Sensors – Knowledge Engineering-Based Implementation. Sensors (August 2011)
Białas, A.: Ontological approach to the motion sensor security development. Electrical Review (Przegląd Elektrotechniczny) 85(R.85(11)), 36–44 (2009) ISSN 0033-2097
Bialas, A.: Common Criteria Related Security Design Patterns – Validation on the Intelligent Sensor Example Designed for Mine Environment. Sensors (April 2010)
Bialas, A.: How to develop a biometric system with claimed assurance. In: Proceedings of the 2013 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 775–780. IEEE Xplore Digital Library (2013)
Rogowski, D.: Software Implementation of Common Criteria Related Design Patterns. In: Proceedings of the 2013 Federated Conference on Computer Science and Information Systems (FedCSIS), Annals of Computer Science and Information Systems, pp. 1147–1152. IEEE Xplore Digital Library (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Rogowski, D. (2014). Software Support for Common Criteria Security Development Process on the Example of a Data Diode. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30 – July 4, 2014, Brunów, Poland. Advances in Intelligent Systems and Computing, vol 286. Springer, Cham. https://doi.org/10.1007/978-3-319-07013-1_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-07013-1_35
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07012-4
Online ISBN: 978-3-319-07013-1
eBook Packages: EngineeringEngineering (R0)