© Crown Copyright (2000) Module 2.2 Development Representations.

13
© Crown Copyright (2000) Module 2.2 Development Representations

Transcript of © Crown Copyright (2000) Module 2.2 Development Representations.

Page 1: © Crown Copyright (2000) Module 2.2 Development Representations.

© Crown Copyright (2000)

Module 2.2

Development

Representations

Page 2: © Crown Copyright (2000) Module 2.2 Development Representations.

“You Are Here”

M2.1 Requirements

M2.2 Development Representations

M2.3 Functional Testing

M2.4 Development Environment

M2.5 Operational Environment

M2.6 Vulnerability Analysis

M2.7 Penetration Testing

M2.8 Assurance Maintenance/Composition

MODULE 2 - ASSURANCE

Page 3: © Crown Copyright (2000) Module 2.2 Development Representations.

Introduction

• Refinement

• Traceability Analysis

• Separation

• Specification Styles

Page 4: © Crown Copyright (2000) Module 2.2 Development Representations.

Refinement

• High Level (Architectural )Design

• Low Level (Detailed ) Design

• Implementation Representation (e.g. source code or hardware drawings)

• Depth of Refinement (Commensurate with Assurance)

Page 5: © Crown Copyright (2000) Module 2.2 Development Representations.

Traceability Analysis

• Validate correctness of refinement• Security Function to High Level (Architectural)

Design to Low Level (Detailed) Design to Implementation

Security Function

High LevelDesign

Low LevelDesign

Page 6: © Crown Copyright (2000) Module 2.2 Development Representations.

Separation

• Ideally integrated into design of product/system• Focus on limited areas• Physical, logical, temporal, others

Page 7: © Crown Copyright (2000) Module 2.2 Development Representations.

Specification Styles

• Various styles

• More assurance from greater formality

Page 8: © Crown Copyright (2000) Module 2.2 Development Representations.

ITSEC Requirements

Aspect E1 E2 E3 E4 E5 E6

Architectural Design I I I S S F

Detailed Design I I S S S

Modularity of Design

Source code /hardware drawings

Page 9: © Crown Copyright (2000) Module 2.2 Development Representations.

CC Requirements

Aspect EAL1

EAL2

EAL3

EAL4

EAL5

EAL6

EAL7

Functional Specification I I I I S S F

High-level Design I I I S S F

Low-level Design I I S S

TOE Internals

ImplementationRepresentation

%

Page 10: © Crown Copyright (2000) Module 2.2 Development Representations.

Evaluation Reporting

• Examination of documentation– show how and where requirements are satisfied– demonstrate traceability

Page 11: © Crown Copyright (2000) Module 2.2 Development Representations.

Summary

• Refinement

• Traceability

• Separation

• Specification

Page 12: © Crown Copyright (2000) Module 2.2 Development Representations.

Further Reading

ITSEC Evaluation

• UK SP 05 Part III, Chapters 5-7

CC Evaluation

• CC Part 3, Sections 2.6.3 and 10

• CEM Part 2, Chapters 5-8 (ADV sections)

Page 13: © Crown Copyright (2000) Module 2.2 Development Representations.

Exercise - Design

• Split into two syndicates

• Write a High Level (Architectural) or Low Level (Detailed) design for a Security Function

• Swap over the designs

• Evaluate the designs

• Discuss findings