Open Source Systems Security Certification
نویسندگان
چکیده
1 What the book is about The major topic of this book is the rationale behind applying software security certifications (e.g. Common Criteria) to open source systems. At first glance, this seems to be a contradiction, because a security certification is usually given to a specific release of a specific software configuration, sometimes even only if running on a specific hardware or for a specific purpose, whereas open source systems like the Linux kernel undergo a constant development process that involves lots of code changes and usage shifts every day. Nevertheless, in order to use common open source products (like the Linux OS) in high-security areas like healthcare or e-government an appropriate security certification must be obtained. The book starts with a broad overview on the core concepts behind every security certification. After introducing the basic notions and paradigms of access control techniques, some in-depth descriptions on test-based security certification and model-checking-based security verification are given. Both fields are involved in typical security certification mechanisms, since they provide detailed information regarding the measurable degree of security a software product gives. Test-based security certification, for instance, can be used to obtain detailed information on whether a given software product can stand the state-of-the-art set of known attacks, and also whether its functionality matches the assumptions thereon. Model checking, on the other hand, provides a provable level of correctness, hence safety, of the software system's behaviour. Nevertheless, both approaches have their deficiencies when being used in a software security certification process. Test-based certification massively depends on the selection and processing of the particular test cases, whereas model checking tends to run into complexity issues known as the state explosion problem .
منابع مشابه
IT Security Certification and Criteria. Progress, Problems and Perspectives
IT security certification and IT security evaluation criteria have changed their character compared with the first efforts ca. 20 years ago. They have also gained more interest within civilian and commercial application areas. Therefore this paper compares them with earlier criticism and with the new challenges in IT security. After an introduction into the concept of security certification the...
متن کاملCommon Criteria certified open source software - fact or fiction?
In 2012 the two open source projects CESeCore and EJBCA were Common Criteria certified [CCP], using open source tools and open source methodologies. As the actual software and its long term evolution is perhaps the most important result for most users, we will look at how certification, distribution and maintenance is managed. Can they be done in an open source way, and is certification always ...
متن کاملSecurity in Open Model Software with Hardware Virtualisation - The Railway Control System Perspective
Using the openETCS initiative as a starting point, we describe how open software can be applied in combination with platform-specific, potentially closedsource extensions, in the development, verification, validation and certification of safety-critical railway control systems. We analyse the safety and security threats presented by this approach and discuss conventional operating system partit...
متن کاملCertification of open-source software: A role for formal methods?
Despite its huge success and increasing incorporation in complex, industrial-strength applications, open source software, by the very nature of its open, unconventional, distributed development model, is hard to assess and certify in an effective, sound and independent way. This makes its use and integration within safety or security-critical systems, a risk. And, simultaneously an opportunity ...
متن کاملReasoning About Information Flow Security of Separation Kernels with Channel-Based Communication
Assurance of information flow security by formal methods is mandated in security certification of separation kernels. As an industrial standard for separation kernels, ARINC 653 has been complied with by mainstream separation kernels. Security of functionalities defined in ARINC 653 is thus very important for the development and certification of separation kernels. This paper presents the first...
متن کامل