ADV_SPM - Formal security policy models in practice
The paper examines the ADV_SPM "Security policy modelling" assurance family, which is part of the ADV "Development" assurance class and defined by the ISO/IEC 15408-3-2013 "Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ivannikov Institute for System Programming of the Russian Academy of Sciences
2018-10-01
|
Series: | Труды Института системного программирования РАН |
Subjects: | |
Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/277 |
id |
doaj-6d214d5a7e6741b2af6da11507364076 |
---|---|
record_format |
Article |
spelling |
doaj-6d214d5a7e6741b2af6da115073640762020-11-25T02:56:06Zeng Ivannikov Institute for System Programming of the Russian Academy of SciencesТруды Института системного программирования РАН2079-81562220-64262018-10-01293435610.15514/ISPRAS-2017-29(3)-4277ADV_SPM - Formal security policy models in practiceA. V. Khoroshilov0I. V. Shchepetkov1ИСП РАН; ВМК МГУ; Московский физико-технический институт; НИУ ВШЭИСП РАНThe paper examines the ADV_SPM "Security policy modelling" assurance family, which is part of the ADV "Development" assurance class and defined by the ISO/IEC 15408-3-2013 "Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components" standard. We discuss the objective set by this family, which is to provide additional assurance from the development of a formal security policy model of the target of evaluation security functionality and establishing a correspondence between the functional specification and this security policy model by means of a mathematical proof. We propose an approach to the formalization and verification of security policies using the Event-B modelling notation and the Rodin platform, whose rigour is used to obtain the desired security properties by means of formal machine-checkable proofs. The approach helps to identify and eliminate ambiguous, inconsistent, contradictory, or unenforceable security policy elements. We illustrate this approach with a simplified example of a FRU_PRS "Priority of service" model (defined in the second part of the standard) in which we provide a formal proof that the model contains no inconsistencies, and that an insecure state cannot be reached. We conclude that the approach is applicable for solving practical problems and it can be used to fulfil the requirements of the ADV_SPM assurance family.https://ispranproceedings.elpub.ru/jour/article/view/277информационная безопасностьполитики безопасностиформальные модели |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
A. V. Khoroshilov I. V. Shchepetkov |
spellingShingle |
A. V. Khoroshilov I. V. Shchepetkov ADV_SPM - Formal security policy models in practice Труды Института системного программирования РАН информационная безопасность политики безопасности формальные модели |
author_facet |
A. V. Khoroshilov I. V. Shchepetkov |
author_sort |
A. V. Khoroshilov |
title |
ADV_SPM - Formal security policy models in practice |
title_short |
ADV_SPM - Formal security policy models in practice |
title_full |
ADV_SPM - Formal security policy models in practice |
title_fullStr |
ADV_SPM - Formal security policy models in practice |
title_full_unstemmed |
ADV_SPM - Formal security policy models in practice |
title_sort |
adv_spm - formal security policy models in practice |
publisher |
Ivannikov Institute for System Programming of the Russian Academy of Sciences |
series |
Труды Института системного программирования РАН |
issn |
2079-8156 2220-6426 |
publishDate |
2018-10-01 |
description |
The paper examines the ADV_SPM "Security policy modelling" assurance family, which is part of the ADV "Development" assurance class and defined by the ISO/IEC 15408-3-2013 "Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components" standard. We discuss the objective set by this family, which is to provide additional assurance from the development of a formal security policy model of the target of evaluation security functionality and establishing a correspondence between the functional specification and this security policy model by means of a mathematical proof. We propose an approach to the formalization and verification of security policies using the Event-B modelling notation and the Rodin platform, whose rigour is used to obtain the desired security properties by means of formal machine-checkable proofs. The approach helps to identify and eliminate ambiguous, inconsistent, contradictory, or unenforceable security policy elements. We illustrate this approach with a simplified example of a FRU_PRS "Priority of service" model (defined in the second part of the standard) in which we provide a formal proof that the model contains no inconsistencies, and that an insecure state cannot be reached. We conclude that the approach is applicable for solving practical problems and it can be used to fulfil the requirements of the ADV_SPM assurance family. |
topic |
информационная безопасность политики безопасности формальные модели |
url |
https://ispranproceedings.elpub.ru/jour/article/view/277 |
work_keys_str_mv |
AT avkhoroshilov advspmformalsecuritypolicymodelsinpractice AT ivshchepetkov advspmformalsecuritypolicymodelsinpractice |
_version_ |
1724714211080142848 |