ADV_SPM - Formal security policy models in practice

The paper examines the ADV_SPM "Security policy modelling" assurance family, which is part of the ADV "Development" assurance class and defined by the ISO/IEC 15408-3-2013 "Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security...

Full description

Bibliographic Details
Main Authors: A. V. Khoroshilov, I. V. Shchepetkov
Format: Article
Language:English
Published: Ivannikov Institute for System Programming of the Russian Academy of Sciences 2018-10-01
Series:Труды Института системного программирования РАН
Subjects:
Online Access:https://ispranproceedings.elpub.ru/jour/article/view/277
id doaj-6d214d5a7e6741b2af6da11507364076
record_format Article
spelling doaj-6d214d5a7e6741b2af6da115073640762020-11-25T02:56:06Zeng Ivannikov Institute for System Programming of the Russian Academy of SciencesТруды Института системного программирования РАН2079-81562220-64262018-10-01293435610.15514/ISPRAS-2017-29(3)-4277ADV_SPM - Formal security policy models in practiceA. V. Khoroshilov0I. V. Shchepetkov1ИСП РАН; ВМК МГУ; Московский физико-технический институт; НИУ ВШЭИСП РАНThe paper examines the ADV_SPM "Security policy modelling" assurance family, which is part of the ADV "Development" assurance class and defined by the ISO/IEC 15408-3-2013 "Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components" standard. We discuss the objective set by this family, which is to provide additional assurance from the development of a formal security policy model of the target of evaluation security functionality and establishing a correspondence between the functional specification and this security policy model by means of a mathematical proof. We propose an approach to the formalization and verification of security policies using the Event-B modelling notation and the Rodin platform, whose rigour is used to obtain the desired security properties by means of formal machine-checkable proofs. The approach helps to identify and eliminate ambiguous, inconsistent, contradictory, or unenforceable security policy elements. We illustrate this approach with a simplified example of a FRU_PRS "Priority of service" model (defined in the second part of the standard) in which we provide a formal proof that the model contains no inconsistencies, and that an insecure state cannot be reached. We conclude that the approach is applicable for solving practical problems and it can be used to fulfil the requirements of the ADV_SPM assurance family.https://ispranproceedings.elpub.ru/jour/article/view/277информационная безопасностьполитики безопасностиформальные модели
collection DOAJ
language English
format Article
sources DOAJ
author A. V. Khoroshilov
I. V. Shchepetkov
spellingShingle A. V. Khoroshilov
I. V. Shchepetkov
ADV_SPM - Formal security policy models in practice
Труды Института системного программирования РАН
информационная безопасность
политики безопасности
формальные модели
author_facet A. V. Khoroshilov
I. V. Shchepetkov
author_sort A. V. Khoroshilov
title ADV_SPM - Formal security policy models in practice
title_short ADV_SPM - Formal security policy models in practice
title_full ADV_SPM - Formal security policy models in practice
title_fullStr ADV_SPM - Formal security policy models in practice
title_full_unstemmed ADV_SPM - Formal security policy models in practice
title_sort adv_spm - formal security policy models in practice
publisher Ivannikov Institute for System Programming of the Russian Academy of Sciences
series Труды Института системного программирования РАН
issn 2079-8156
2220-6426
publishDate 2018-10-01
description The paper examines the ADV_SPM "Security policy modelling" assurance family, which is part of the ADV "Development" assurance class and defined by the ISO/IEC 15408-3-2013 "Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components" standard. We discuss the objective set by this family, which is to provide additional assurance from the development of a formal security policy model of the target of evaluation security functionality and establishing a correspondence between the functional specification and this security policy model by means of a mathematical proof. We propose an approach to the formalization and verification of security policies using the Event-B modelling notation and the Rodin platform, whose rigour is used to obtain the desired security properties by means of formal machine-checkable proofs. The approach helps to identify and eliminate ambiguous, inconsistent, contradictory, or unenforceable security policy elements. We illustrate this approach with a simplified example of a FRU_PRS "Priority of service" model (defined in the second part of the standard) in which we provide a formal proof that the model contains no inconsistencies, and that an insecure state cannot be reached. We conclude that the approach is applicable for solving practical problems and it can be used to fulfil the requirements of the ADV_SPM assurance family.
topic информационная безопасность
политики безопасности
формальные модели
url https://ispranproceedings.elpub.ru/jour/article/view/277
work_keys_str_mv AT avkhoroshilov advspmformalsecuritypolicymodelsinpractice
AT ivshchepetkov advspmformalsecuritypolicymodelsinpractice
_version_ 1724714211080142848