Industrial Internet Security Framework v 1.0 | Page 128

Security Framework Annex A: Industrial Security Standards
A. 3
METHODOLOGIES TO ASSESS SECURITY PROGRAMS
Several methodologies exist to assess security programs, the security posture of organizations and their process for secure development and maintenance of their products. They include the Cyber-Security Capability Maturity Model( C2M2) 1 and its vertical-specific variants( ES-C2M2 and ONG-C2M2 for energy and oil and gas subsectors, respectively), the tiers of the NIST framework focused on critical infrastructures, the CERT Resilience Management Model( CERT-RMM) focused on operational resilience management and the Building Security In Maturity Model( BSIMM) focused on secure software development. They work best when tailored for the organization. 2
A. 4
STANDARDS FOR EVALUATING SECURITY PRODUCTS
Common criteria and Federal Information Processing Standard( FIPS) standards, briefly discussed below, focus on certification of security products rather than evaluating security processes or policies. Within this context, these standards allow technical evaluations by third parties such as trusted labs.
Use of such evaluation approaches requires extra care, especially in terms of how they adapt to change and respond to the progress in attack technologies. There are many products with practically meaningless evaluations, because they’ ve been evaluated in very restricted configurations, or because only some of their basic features have been evaluated.
A. 4.1 COMMON CRITERIA
Common Criteria for Information Technology Security Evaluation, a. k. a. Common Criteria( CC), is an international standard( ISO / IEC 15408 3) used to evaluate security capabilities of IT products, including secure integrated circuits, operating systems and application software. CC is used to assess a product’ s ability to meet security requirements utilizing two key notions: evaluation assurance levels and protection profiles.
The rigor with which an assessment is carried out is referred to as the Evaluation Assurance Level( EAL), which ranges from EAL1 up to EAL7. As an example, functional testing is sufficient to meet EAL1 requirements but to achieve EAL7 thorough testing as well as formally verified designs are required.
A protection profile consists of security requirements and their rationale as well as an EAL. A protection profile should describe objectives, assumptions and both functional and assurance requirements. When customers( i. e., owners or operators) plan to buy a product that has Common Criteria Evaluation, they should ensure that they understand and agree with the protection profile against which the product has been evaluated.
1
See [ ENER-C2M2 ] and Annex B
2
See [ CERT-RMM ] and [ BSIMM ]
3
See [ ISO-15408 ]
IIC: PUB: G4: V1.0: PB: 20160926- 128-