22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

381<br />

Figure 2. Passive missile defence information exchange scenario<br />

III. Security requirements<br />

The security requirements introduced by the HAAG have been captured<br />

in a form of protection profile (PP) compliant with the Common Criteria (CC)<br />

Version 3.1 Release 3 framework [9]. This approach has been taken by the authors<br />

already earlier, when designing the medium assurance XML-Labelling Guard<br />

(XLG) [1].<br />

Although the HAAG PP is based on the XLG PP, the HAAG introduces<br />

several new functional <strong>and</strong> assurance requirements when compared to the XLG.<br />

New functional security requirements are related, e.g., to need for authentication<br />

of originators or requestors of mediated information flows, in order to provide<br />

stronger accountability when compared to XLG. Other new security functional<br />

requirements are related to integration with the cyber defence framework <strong>and</strong> to<br />

use of more complex CPR security policies.<br />

When compared to [1], most of the new security assurance requirements<br />

(SARs) are related to the need to assure secure lifecycle for the HAAG. The approach<br />

taken in the HAAG PP in order to assure the trustworthiness of the HAAG throughout<br />

its lifecycle is largely compatible with the U.S. Government Protection Profile<br />

for Separation Kernels in Environments Requiring High Robustness (SKPP) [10].<br />

The main conceptual difference is that SKPP focuses on operating system <strong>and</strong> does<br />

not address trustworthiness of the application software running on top of the operating<br />

system. The HAAG PP applies the paradigms adapted from the SKPP to<br />

the application layer. In the HAAG PP, the assumption is that underlying operating<br />

system can be trusted (e.g., because it was evaluated according to the SKPP) <strong>and</strong><br />

the focus is on providing sufficient evidence that functionality implemented on top<br />

of the OS, i.e. the HAAG application, configuration <strong>and</strong> other TOE components,<br />

can be also trusted to a level commensurate with the value of protected resources.<br />

In addition to this conceptual difference, the formal differences are related mainly<br />

to the fact that SKPP v 1.03 was based on the CC v. 2.3 <strong>and</strong> the HAAG PP is based<br />

on the CC v. 3.1 R3. Some of the SARs, which were predefined in the CC v. 2.3 <strong>and</strong><br />

used within the SKPP, were removed in the CC v. 3.1 [9].

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!