22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

56 Lotus Security Handbook<br />

► Part 3, Security assurance requirements, establishes a set of assurance<br />

components as a standard way of expressing the assurance requirements for<br />

TOEs. Part 3 catalogues the set of assurance components, families, and<br />

classes. It also defines evaluation criteria for Protection Profiles (PPs) and<br />

Security Targets (STs) and presents evaluation assurance levels that define<br />

the predefined CC scale for rating assurance for TOEs, called the Evaluation<br />

Assurance Levels (EALs).<br />

In support of the three parts of the CC listed here, some other types of<br />

documents have been published, some being guidance documents. Other<br />

documents are planned for publication, including technical rationale material and<br />

guidance documents.<br />

Complete information on the Common Criteria, including copies of the Common<br />

Criteria documents (available as PDF files), are available at the following URL:<br />

http://www.commoncriteria.org/<br />

Even though the Common Criteria has some very useful information, we will<br />

nonetheless look at other methodologies and utilize some of their contents. We<br />

recommend that you take the time to read further on the Common Criteria and<br />

assess the suitability of using it to address specific security requirements and<br />

needs unique to your organization.<br />

2.4 Method for Architecting Secure Solutions (MASS)<br />

<strong>IBM</strong> has a method used by <strong>IBM</strong> Global Services (IGS) employees for security<br />

architecture engagements. It is call the Method for Architecting Secure Solutions<br />

(MASS). It helps analyze and categorize security-related problems and<br />

discussion in today’s e-business driven enterprise IT infrastructures. The<br />

contents of this section were originally posted in a special edition of the <strong>IBM</strong><br />

Systems Journal on End-to-End Security, Volume 40, No 3. The article is<br />

available at the following URL:<br />

http://www.research.ibm.com/journal/sj/403/whitmore.html<br />

2.4.1 Problem statement<br />

A systematic approach for applying security throughout information technology<br />

solutions is necessary in order to ensure that all reasonable measures are<br />

considered by designers, and that the resulting computing systems will function<br />

and can be operated in a correct and reliable manner.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!