NIST division launches programs for testing product security

When you manage to configure a new encryption package or firewall without breaking anything, it's time to congratulate yourself and head home to sleep more soundly.

By Edward RobackSpecial to GCNWhen you manage to configure a new encryption package or firewall without breaking anything, it's time to congratulate yourself and head home to sleep more soundly.Or is it? Does the secure icon on the screen mean that sensitive information is being encrypted correctly? Is the firewall keeping out intruders as the vendor claimed?Confidence in the correct operation of some information technology products is easy. When you send a document to a printer, you can tell pretty quickly whether the printer works. When you pick up a phone, you know at once whether it can dial a call. Put a diskette in a drive, and the document either reads in or it doesn't, aside from format issues.For many security functions, however, it's not that straightforward.Consider encryption. A necessary condition for protecting your information is correctly implementing a secure algorithm. Encryption keys must be generated and protected properly, and users must be up to speed.Or consider access controls. For example, a user sets up a calendar application and clicks on the 'private' box so that private appointments cannot be read by anyone else. Is the information really private?The fundamental question is this: How can an organization tell whether the security features in commercial IT products work as intended and meet specifications?In computer security terminology, security assurance provides the basis for such confidence. Varying degrees of assurance are supported by conformance testing, security evaluations and vendor claims.Products with an appropriate degree of assurance contribute to system security as a whole. This should be an important factor in making IT procurement decisions.Of course, other complementary and interdependent controls are also needed. They include sound operating procedures, adequate training, comprehensive policies, security architectures and a risk management program.The Computer Security Division of the IT Laboratory at the National Institute of Standards and Technology has set up two programs for product evaluation and testing: the National Information Assurance Partnership (NIAP) Common Criteria Evaluation and Validation Scheme and the Cryptographic Module Validation Program (CMVP). Both use accredited private laboratories to conduct testing and issue government certificates after successful completion of tests.The NIAP evaluation program, jointly led by the National Security Agency and NIST, focuses on evaluations of products such as firewalls or operating systems against a set of security specifications, which are drawn from the International Standards Organization's Common Criteria.The Common Criteria serve as a catalog of security requirements with which you can develop a set of specifications for a particular type of product such as a firewall or router. A lab can then test the product against the requirements of the profile or target.Depending on the degree of confidence needed, testing can be detailed and rigorous. The Common Criteria specify seven predefined assurance levels to help you strike a cost-effective risk balance. A listing of products evaluated in accordance with the NIAP Common Criteria Evaluation and Validation Scheme appears on the Web, at .Users and organizations do not have to develop their own security specifications. As NIAP progresses, broadly applicable specifications will evolve from industry and government groups that focus on specific technologies. NIST and the Canadian government's security establishment jointly manage CMVP. Its testing provides assurance that: 1) a cryptographic module meets one of the four security specification levels of Federal Information Processing Standard 140-1; and 2) the FIPS-approved algorithms for encryption or digital signatures are correctly implemented. Higher-level modules do not imply stronger or better encryption, but they do give more protection to the secret keys held by the modules. About 100 modules have been validated under the CMVP to date.Federal agencies should use FIPS 140-1 to protect their sensitive, unclassified applications. Look for the FIPS 140-1 logo on products you buy. The CMVP's validated products list appears at .Assurance of proper functioning by cryptographic modules and algorithms is critical for sensitive data that is transmitted over untrusted paths such as the Internet. Unauthorized disclosure of information and its consequences might not be apparent for some time, in contrast with, say, the immediate public awareness when an agency home page is defaced.Cryptographic modules are often integrated into products with noncryptographic functions, such as Web browsers. The CMVP's assurance about a cryptographic module does not extend to other aspects of a product that incorporates the module.See more about NIST's recommendations in a draft publication entitled . The draft is posted at .
Computer Security Division uses accredited labs for Common Criteria and cryptographic evaluations































niap.nist.gov/cc-scheme/ValidatedProducts.html

Evolving specs







csrc.nist.gov/cryptval





NIST Guidelines to Federal Organizations on Security Assurance and Acquisitioncsrc.nist.gov/publications/drafts.html

Edward Roback is acting chief of NIST's Computer Security Division.
X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.