Page 526 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 526

perfect. As with other evaluation criteria, the CC guidelines do nothing
               to make sure that how users act on data is also secure. The CC

               guidelines also do not address administrative issues outside the
               specific purview of security. As with other evaluation criteria, the CC
               guidelines do not include evaluation of security in situ—that is, they do
               not address controls related to personnel, organizational practices and
               procedures, or physical security. Likewise, controls over
               electromagnetic emissions are not addressed, nor are the criteria for
               rating the strength of cryptographic algorithms explicitly laid out.

               Nevertheless, the CC guidelines represent some of the best techniques
               whereby systems may be rated for security. To conclude this
               discussion of security evaluation standards, Table 8.4 summarizes
               how various ratings from the TCSEC, ITSEC, and the CC can be
               compared. Table 8.4 shows that ratings from each standard have

               similar, but not identical evaluation criteria.

               TABLE 8.4 Comparing security evaluation standards

                TCSEC ITSEC             CC
                                        description

                D           F-D+E0 EAL0, EAL1                  Minimal/no protection

                C1          F-C1+E1 EAL2                       Discretionary security
                                                               mechanisms

                C2          F-          EAL3                   Controlled access protection
                            C2+E2

                B1          F-          EAL4                   Labeled security protection
                            B1+E3

                B2          F-          EAL5                   Structured security protection
                            B2+E4

                B3          F-          EAL6                   Security domains
                            B3+E5

                A1          F-          EAL7                   Verified security design
                            B3+E6



               Industry and International Security Implementation
   521   522   523   524   525   526   527   528   529   530   531