12.07.2015 Views

Contributors - CyberSecurity Malaysia

Contributors - CyberSecurity Malaysia

Contributors - CyberSecurity Malaysia

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

33.Case Study: US Government DirectivesConclusionAccording to Alex Ragen [6], the US government and theUS industry have increased their security control in allsecurity aspects including information security since theterrorist attacks on September 11, 2001. In the aspect ofinformation security, Common Criteria has been chosen asthe baseline standard for assuring security in ICT products.Therefore, the US government has taken action byreleasing two directives on the procurement of CC certifiedICT products for US government agencies:1) US National Information Assurance (IA) AcquisitionPolicy [7]The US National Security Telecommunications andInformation Systems Security Committee (NSTISSC), alsoknown as the Committee on National Security Systems(CNSS), has specified in the National InformationAssurance (IA) Acquisition Policy (NSTISSP No. 11), thatany acquisition for ICT products used for entering,processing, storing, displaying or transmitting nationalsecurity information, shall be limited to evaluated andverified products in accordance with Common Criteria,NIAP Evaluation and Validity Programs, or NIST FederalInformation Processing Standards (FIPS). This meansUS Government Departments and Agencies should onlypurchase certified products to protect their valuableassets; products that provide a certain level of assuranceon their reliability. This directive came into effect on July1, 2002.2) US Department of Defense’s Instruction [8]The US Department of Defense (DoD) has instructedthat ICT products that are purchased must comply withthe Protection Profile (PP) which has been approvedby the US government. If no PP exists for the relatedtechnology, the acquiring organisation must have theproduct evaluated and verified under the CommonCriteria scheme before purchase. This directive is onlyenforced throughout the US Department of Defenseonly.The US government has implemented these directives toensure information security is put in place. It shows thatCC is accepted as the standard assurance that a productis reliable in terms of protecting assets and protectingitself from being tampered by attackers. It is time for usto take the same step.Common Criteria is new in <strong>Malaysia</strong>. Structured planningshould be implemented to allow this standard to gainrecognition among the developer community andconsumers. Currently, <strong>CyberSecurity</strong> <strong>Malaysia</strong> is pioneeringthe initiative to establish a CC Scheme in <strong>Malaysia</strong>. A<strong>Malaysia</strong>n Common Criteria Certification Body (MyCB) and<strong>Malaysia</strong>n Security Evaluation Facility (MySEF) have beenestablished under <strong>CyberSecurity</strong> <strong>Malaysia</strong> for executingthe Common Criteria evaluation and certification process.This initiative should be supported and promoted as one ofthe efforts to secure our information security environment,especially our CNII information security environment. •References[1] Idan Ofrat, 2008, “C4 Security Advisory - ABBPCU400 4.4-4.6 Remote Buffer Overflow”, C4 SCADAvulnerability research portal, http://www.scadasecurity.com/vulnerabilities/abb1.html[2] Ministry of Science, Technology and Innovation(MOSTI), ICT Policy Division, 2008, “National <strong>CyberSecurity</strong> Policy”, <strong>Malaysia</strong>’s National Cyber SecurityPolicy, pp. 2-4, http://www.mosti.gov.my/mosti/images/pdf/NCSP-Policy2.pdf[3] <strong>CyberSecurity</strong> <strong>Malaysia</strong>, 2009, “About CNII”, CNIIPortal, http://cnii.cybersecurity.my/en/about.html[4] CCRA, 2009, “About Common Criteria”, CommonCriteria Portal, http://www.commoncriteriaportal.org/index.html[5] <strong>CyberSecurity</strong> <strong>Malaysia</strong>, 2009, “Common Criteria”,MySEF Evaluation Facilities web portal, http://www.cybersecurity.my/en/services/security_assurance/cc/main/detail/1494/index.html[6] Alex Ragen, 2007, “Manager’s Guide to CommonCriteria”, pp. 5[7] National Security Telecommunications andInformation Systems Security Committee (NSTISSC),2003, “National Information Assurance AcquisitionPolicy (NSTISSP) No. 11”, National Policy Governingthe Acquisition of Information Assurance (IA) andIA-Enabled Information Technology (IT) Products,pp. 2-3, http://www.niap-ccevs.org/cc-scheme/nstissp_11_revised_factsheet.pdf[8] Department of Defense (DoD), United Statesof America, 2003, “Information Assurance (IA)Implementation”, Department of Defense Instruction,NUMBER 8500.2, E3.2.5.1, pp. 34, http://www.niapccevs.org/cc-scheme/policy/dod/d85002p.pdfe-Security | <strong>CyberSecurity</strong> <strong>Malaysia</strong> | Volume 21 - (Q4/2009)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!