Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges

被引:11
|
作者
Sun, Nan [1 ,2 ]
Li, Chang-Tsun [3 ]
Chan, Hin [4 ]
Le, Ba Dung [2 ,5 ]
Islam, Md Zahidul [6 ]
Zhang, Leo Yu [3 ]
Islam, Md Rafiqul [7 ]
Armstrong, Warren [8 ]
机构
[1] Univ New South Wales, Sch Engn & Informat Technol, Canberra, ACT 2612, Australia
[2] Cyber Secur Cooperat Res Ctr, Joondalup, WA 6027, Australia
[3] Deakin Univ, Sch Informat Technol, Waurn Ponds, Vic 3216, Australia
[4] Australian Cyber Secur Ctr, Kingston, ACT 2604, Australia
[5] Charles Sturt Univ, Sch Comp Math & Engn, Wagga Wagga, NSW 2678, Australia
[6] Charles Sturt Univ, Sch Comp Math & Engn, Bathurst, NSW 2795, Australia
[7] Charles Sturt Univ, Sch Comp Math & Engn, Albury, NSW 2640, Australia
[8] QuintessenceLabs Pty Ltd, Canberra, ACT 2609, Australia
关键词
Security; Computer crime; Standards; Certification; Australia; Sun; Market research; Common criteria; cyber security; protection profile; security standard and certification; trusted system; KEY MANAGEMENT; CYBERSECURITY;
D O I
10.1109/ACCESS.2022.3168716
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in emerging Information and Communications Technology (ICT) technologies push the boundaries of what is possible and open up new markets for innovative ICT products and services. The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these products meet the inherent security requirements. Such confidence and trust are primarily gained through the rigorous development of security requirements, validation criteria, evaluation, and certification. The Common Criteria for Information Technology Security Evaluation (often referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for cyber security. Motivated by encouraging the adoption of the CC that is used for ICT security evaluation and certification, in this paper, we conduct a systematic review of the CC standard and its adoptions. Adoption barriers of the CC are investigated based on the analysis of current trends in cyber security evaluation. In addition, we share the experiences and lessons gained through the recent Development of Australian Cyber Criteria Assessment (DACCA) project on the development of the Protection Profile that defines security requirements with the CC. Best practices, challenges, and future directions on defining security requirements for trusted cyber security advancement are presented.
引用
收藏
页码:44756 / 44777
页数:22
相关论文
共 50 条
  • [1] Measuring IT security - A method based on common criteria's security functional requirements
    Hunstad, A
    Hallberg, J
    Andersson, R
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 226 - 233
  • [2] Using the common criteria to elicit security requirements with use cases
    Ware, Michael S.
    Bowles, John B.
    Eastman, Caroline M.
    PROCEEDINGS OF THE IEEE SOUTHEASTCON 2006, 2006, : 273 - 278
  • [3] Security Requirements Elicitation Using Method Weaving and Common Criteria
    Saeki, Motoshi
    Kaiya, Haruhiko
    MODELS IN SOFTWARE ENGINEERING, 2009, 5421 : 185 - +
  • [4] Ontological mapping of common criteria's security assurance requirements
    Ekelhart, Andreas
    Fenz, Stefan
    Goluch, Gernot
    Wcippl, Edgar
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 85 - +
  • [5] A comparison of the common criteria with proposals of information systems security requirements
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 654 - +
  • [6] Security Requirements and Challenges of 6G Technologies and Applications
    Hakeem, Shimaa A. Abdel
    Hussein, Hanan H.
    Kim, HyungWon
    SENSORS, 2022, 22 (05)
  • [7] Common Criteria approach to J2ME CLDC security requirements
    Catena Corporation; et al.; Iwate Prefectural University; Sangikyo Corporation; The Institute of Software Development (ISD); University of Laval, 1600, (2006):
  • [8] Common Criteria Approach to J2ME CLDC Security Requirements
    Debbabi, M.
    Saleh, M.
    Talhi, Chamseddine
    Zhioua, Sami
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2006, 147 : 177 - 194
  • [9] Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec
    Houmb, Siv Hilde
    Islam, Shareeful
    Knauss, Eric
    Jurjens, Jan
    Schneider, Kurt
    REQUIREMENTS ENGINEERING, 2010, 15 (01) : 63 - 93
  • [10] A common criteria based security requirements engineering process for the development of secure information systems
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 244 - 253