|
|
|
|
Role of the System Security Concept |
|
Aspects of the System Security Concept |
|
ADV_FSP: The Functional Specification |
|
ADV_SPM: The Security Policy Model |
|
|
|
|
Describe the TOE Security Characteristics as
Seen From the Outside |
|
Provide the Basis For Correlating the TOE
Capabilities with the ST Security Function Requirements |
|
Provide the Basis For Developing Tests of the
Security Functions |
|
|
|
|
|
Definition |
|
Aspects |
|
Components |
|
Informal Functional Specification |
|
Fully Defined External Interfaces |
|
Semiformal Functional Specification |
|
Formal Functional Specification |
|
|
|
|
|
Describe the collection of TOE Security
Functions (TSF) that satisfy the ST SFRs |
|
Describe the External Interfaces to the TSF |
|
Syntax and behavior of callable interfaces |
|
Content of information interfaces (e.g. audit
logs) |
|
Levels Reflect Increasing: |
|
Formalism of the interface specification
notation |
|
Coverage of the TOE interfaces |
|
|
|
|
Purpose |
|
Method of use |
|
Effects |
|
Exceptions |
|
Error messages |
|
|
|
|
A description of the role of the TSF in
realizing the ST requirements |
|
Can be interleaved with descriptions of any
non-security roles of the TSF in the TOE |
|
|
|
|
|
A Description of When and How the Interface is
used, comprised of: |
|
The TSF invoked through the interface |
|
Syntax (signature) for invoking the interface |
|
Name and meaning of the security-relevant input
parameters |
|
Name and meaning of security-relevant
system-wide options that act as implicit parameters |
|
|
|
|
|
Describe the Usual Result of Invoking the
Interface |
|
Name and meaning of explicit return values |
|
Describe affect of interface invocation on
system security state |
|
Describe processing that occurs when function is
invoked and how input parameters and system-wide options affect that
processing |
|
Pre- and post-conditions for invoking the
interface (especially for more formal FSPs) |
|
|
|
|
|
Describe Conditions Under Which Interface
Behaves Differently |
|
E.g., in presence of security privileges |
|
Use same format as Effects |
|
|
|
|
|
Describe Conditions Under Which Interface
Invocation Will Not Complete Successfully |
|
Affect of Such Failure On |
|
System security state |
|
Explicit return values |
|
|
|
|
|
Informal – Natural Language Prose |
|
Semi-Formal – Restricted Natural Language |
|
Precise, consistent definition and use of terms |
|
Stereotyped use of grammar |
|
Formal – Specialized Specification Language That |
|
Is unambiguous and precise |
|
Facilitates reasoning about the correctness of
implementations of the specification |
|
|
|
|
“describe the TSF and its external interfaces
using informal style” |
|
“internally consistent” |
|
“describe the purpose and method of use of all
external TSF interfaces, providing details of effects, exceptions, and
error messages, as appropriate” |
|
“completely represent the TSF” |
|
|
|
|
“describe the purpose and method of use of all
external TSF interfaces, providing complete details of all effects,
exceptions, and error messages, as appropriate” |
|
“include rationale that TSF is completely
represented” |
|
|
|
|
“describe the TSF and its external interfaces
using a semiformal style, supported by informal, explanatory text where
appropriate” |
|
|
|
|
“describe the TSF and its external interfaces
using a formal style, supported by informal, explanatory text where
appropriate” |
|
|
|
|
|
Definition |
|
Aspects |
|
Components |
|
Informal TOE Security Policy (TSP) Model |
|
Semiformal TSP Model |
|
Formal TSP Model |
|
|
|
|
Description of the security rules and
characteristics that determine the operation of the TOE Security Functions,
as accessed through the external TOE interfaces |
|
|
|
|
Rules and Characteristics of All Policies That
Can be Modeled |
|
TOE Security Policy (TSP) Model Rationale |
|
Demonstrate Correspondence Between the Model and the TSF and Interfaces
Described In the Functional Specification |
|
|
|
|
|
System Security State is defined by |
|
Resources that will be kept in a secure state |
|
Definition of secure state for each resource |
|
Enumeration of, or criteria for, secure states |
|
Active entities that can cause changes in the
security state of secured resources |
|
Enumeration of, or allowed algorithms for,
transitions among secure states |
|
|
|
|
|
Link TSP Model to ST |
|
ST Security Functional Requirements define
explicit policies that must be modeled |
|
Show that all policies that can be modeled are
completely modeled |
|
Show that SPM is consistent with the policies
that can, and have, been modeled |
|
Granularity of policy matches granularity of ST
Security Functional Requirements |
|
|
|
|
|
Link TSP Model to Functional Specification |
|
Show that, with respect to the TSP Model, the
external interfaces in the Functional Specification are all |
|
Consistent – i.e., implement the modeled
semantics of security |
|
Complete – i.e., all elements of the TSP model
are realized in at least one external interface |
|
|
|
|
“The TSP model shall be informal” |
|
“…describe rules and characteristics of all
policies of TSP that can be modeled” |
|
“…include a rationale that demonstrates that it
(the TSP Model) is consistent and complete with respect to all TSP policies
that can be modeled” |
|
“The demonstration of correspondence … shall
show that all security functions in FSP are consistent and complete with
respect to the TSP model |
|
|
|
|
“The TSP model shall be semiformal” |
|
“Where the functional specification is at least
semiformal, the demonstration of correspondence between the TSP Model and
the functional specification shall be semiformal” |
|
|
|
|
The TSP model shall be formal” |
|
“Where the functional specification is
at least semiformal, the demonstration of correspondence between the TSP
Model and the functional specification shall be semiformal” |
|
“Where the functional specification is formal,
the proof of correspondence between the TSP Model and the functional
specification shall be formal” |
|