Search /
Docfinder:
Advanced search  |  Help  |  Site map
RESEARCH CENTERS
SITE RESOURCES
Click for Layer 8! No, really, click NOW!
Networking for Small Business
TODAY'S NEWS
While Heartbleed distracts, hackers hit US universities
How Apple's billion dollar sapphire bet will pay off
US to vote on sharp increase in broadband subsidies
iPhone 6 rumor rollup for the week ending April 18
NSA spying revelations have tired out China's Huawei
Arista co-founder may have switch maker by its jewels
Apple kicks off public OS X beta testing
Open source pitfalls – and how to avoid them
AT&T's expanded 1 Gbps fiber rollout could go head to head with Google
BlackBerry Releases BES 10 Security Update to Address 'Heartbleed' Flaw
Verizon: Web apps are the security punching bag of the Internet
Cisco announces security service linked with new operations centers
Dell launches virtual storage accelerator, aims to boost SAN performance
Free OS X Mavericks now powers half of all Macs
Even the most secure cloud storage may not be so secure, study finds  
3D printing will transform these five industries
Most but not all sites have fixed Heartbleed flaw
NEC launches face-recognition protection for PCs
Hundreds of medical professionals targeted in multi-state tax scam
Super-high frequencies could one day deliver your mobile video
Americans cool with lab-grown organs, but not designer babies
IT Departments Not Losing Ground to Managed Service Providers (Yet)
Where's my gigabit Internet, anyway?
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
/

Common Criteria for increasing confidence in security


In the wake of recent denial-of-service attacks, companies are spending millions on security gear. But can you be confident the products will work as advertised?

To ensure a positive answer to this question, vendors including Cisco, Check Point Software, Lucent, IBM and Oracle have begun specifying the security features of their products according to the Common Criteria (CC) - a new security standard that provides a common way to state both consumers' security needs and products' security specifications. These products are then tested at a new breed of accredited commercial security testing labs, which independently verify - at a specific level of confidence - that the products conform to their security claims.

The CC includes a two-part catalog of basic requirements for security functions and for assurances about the proper implementation of these functions. Consumers use the catalog to develop profiles of their security needs and state the level of confidence they want in the products they're looking to buy. Vendors use the CC to define their products and show how they meet the consumers' requirements. Testing laboratories use common test methods from a companion CC standard to verify that vendor security implementations are correct, complete and compliant to specifications. And the National Information Assurance Partnership - which helped author the scheme for using the CC - can validate testing results and "brand" successfully tested products for international markets.

At the First International CC Conference this May (niap.nist.gov/cc-scheme/iccc/program.html), many of the world's biggest IT building and buying nations are expected to sign multilateral agreements embracing the CC specification, testing and validation scheme. These agreements will allow vendors from any country to sell their wares with CC certificates in foreign markets with no product retesting - a benefit to both vendors and consumers.

The financial world is using the CC scheme to build confidence in its electronic services, simplify security product comparison and reduce testing costs. Led by Visa, the major credit card companies and smart card vendors are drafting CC-based profiles of security requirements for smart cards and common test suites to unify the current hodgepodge of customer/vendor-specific testing.

The health care sector is following suit. Vendors and providers can use the CC scheme to demonstrate their compliance with new patient information privacy laws associated with the Health Insurance Portability and Accountability Act. This will reduce liability, according to Gartner Group.

The telecom marketplace is eyeing the CC for improving consumer confidence in the security features of PBXs and telecom switches that interact with the Internet. The feds are also turning to products tested according to the CC scheme.

While nothing's a panacea in the security world, being able to buy security products that provide the level of confidence you want is a giant step in the right direction. Trust in security and privacy products is what will facilitate the growth of electronic commerce and services for all types of enterprises.

Brusil is a freelance security and network management consultant in Beverly, Mass. He can be reached at brusil@nist.gov.

RELATED LINKS


NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.