Towarda Comprehensive Infosec Certification Methodology
نویسندگان
چکیده
Accreditors want to know what vulnerabilities will exist if they decide to turn on a system. TCSEC evaluations address products, not systems. Not only the hardware and software of a system are of concern; the accreditor needs to view these components in relation to the environment in which they operate and in relation to the system’s mission and the threats to it. This paper proposes an informal but comprehensive certification approach that can provide the accreditor with the necessary information. First, we discuss the identification of assumptions and assertions that reflect system INFOSEC requirements. Second, we propose the definition of an assurance strategy to integrate security engineering and system engineering. The assurance strategy initally documents the set of assumptions and assertions derived from the requirements. It is elaborated and refined throughout the development, yielding the assurance argument, delivered with the system, which provides the primary technical basis for the certification decision. With the assurance strategy in place, certification of the trusted system can become an audit of the development process.
منابع مشابه
Naval Postgraduate Schoolcenter for Infosec Studies and Research: Teaching the Science of Computer Security (u)
(U) The Naval Postgraduate School Center for Information Systems Security (INFOSEC) Studies and Research (NPS CISR) is developing a comprehensive program in INFOSEC education and research that can become a resource for DoN/DoD and U.S Government in terms of educational materials and research. A security track within the Computer Science curriculum has been established. Its philosophical core is...
متن کاملThe Unified Information Security (INFOSEC) Architecture (UIA) Gadfly Project
This report captures the development, lessons learned, and future recommendations from a collaborative research and development activity between the Air Force sponsored Comprehensive Approach to Reusable Defense Software (CARDS) Program, the Department of Defense (DoD), and the Software Engineering Institute (SEI). This activity explored innovative but practical techniques for formalizing and a...
متن کاملThe Unified Information Security (INFOSEC) Architecture
This report captures the development, lessons learned, and future recommendations from a collaborative research and development activity between the Air Force sponsored Comprehensive Approach to Reusable Defense Software (CARDS) Program, the Department of Defense (DoD), and the Software Engineering Institute (SEI). This activity explored innovative but practical techniques for formalizing and a...
متن کاملA Multi-dimensional Evaluation Methodology for New Cockpit Systems
It is essential that any system to be introduced to the cockpit for use by the flight crew be thoroughly evaluated. This evaluation must include a comprehensive range of human factors measures designed to provide a multi-dimensional assessment of the system in use. Additionally, the evaluation must be carried out within its unique operational environment. A rigorous assessment methodology is ne...
متن کاملEnforcing Information Security Protection: Risk Propensity and Self-Efficacy Perspectives
Effective information security (InfoSec) management cannot be achieved through only technology; people are the weakest point in security and their behaviors such as inappropriate use of computer and network resources, file sharing habits etc. cannot be controlled by security technologies. Although the importance of individuals’ InfoSec behaviors has been widely recognized, there is limited unde...
متن کامل