Separating Hypervisor Trusted Computing Base Supported by Hardware

Total Page:16

File Type:pdf, Size:1020Kb

Separating Hypervisor Trusted Computing Base Supported by Hardware Separating Hypervisor Trusted Computing Base Supported by Hardware Carl Gebhardt Chris I. Dalton Allan Tomlinson Information Security Group Hewlett-Packard Labs Information Security Group Royal Holloway, University of Bristol, BS34 8QZ, UK Royal Holloway, University of London, TW20 0EX, UK [email protected] London, TW20 0EX, UK [email protected] [email protected] ABSTRACT of interest in virtualisation and its application in a security In this paper we explore how recent advances in virtuali- context, numerous researchers [8, 17, 19] have investigated sation support for commodity hardware could be utilised to how the TCB can be reduced and security critical functions reduce the Trusted Computing Base (TCB) and improve the could be isolated. This separation of privileged code, or dis- code separation of a hypervisor. To achieve this, we reassess aggregation, is well known and an actively discussed concept on the definition of the TCB and illustrate how segregation of, for instance, XEN-based systems [19]. of different code blocks could be enforced by hardware pro- Moreover, some researchers have argued that a virtualised tection mechanisms. We argue that many software-based system is more secure than a non-virtualised system, al- efforts in TCB reduction and separation can benefit from though it adds code to the TCB [5]. This is based on the utilising those hardware capabilities. isolation properties and fault containment introduced with virtualisation. In this sense, virtualisation is just a coarse grained isolation scheme which, in contrast to traditional Categories and Subject Descriptors OS isolation, does not operate on a process, but below the D.4.6 [Software]: Operating Systems—Security and Pro- kernel level. Arguably, the security gains are based on the tection fact that a hypervisor controls resources and executes out- side the control, beneath the traditional OS kernel. This, however, does shift the burden of separation and isolation General Terms from the OS kernel to the hypervisor. Currently, hypervisors Design, Security are still considered more trustworthy than traditional OSes based on their smaller TCB, but they are growing fast in Keywords functionality and size. Consequently this trust may become misplaced, and alternative methods are required to reduce Virtualisation, hardware extension, Trusted Computing Base the TCB. In this paper we explore the possibility of using the cur- 1. INTRODUCTION rently unused hardware protection mechanism of modern Numerous researchers suggested the use of virtualisation virtualisation-enabled CPUs. We suggest making use of for security, fault isolation or assurance [5, 14]. The ar- those currently unused protection modes to separate and iso- gument to use virtualisation for security improvements is late security critical functions within a hypervisor.Wewant based on the reduction in the code base which has to be to emphasise that TCB reduction is not a new idea, but trusted. Rather than trusting an Operating System (OS) that recent developments in virtualisation technology have to isolate processes and share resources, in a virtualised created new challenges and opportunities. Consequently, we system a hypervisor is entrusted with those tasks. A hy- want to seize the moment to learn from past mistakes and pervisor consists of only a few hundred of thousand lines outline possible directions of future virtualisation research. of code as opposed to the millions of lines of source code (SLOC) in a modern OS and thus potentially offers bet- 2. MOTIVATION ter security guarantees. Reducing the Trusted Computing Base (TCB) is not a novel idea and is a well understood Unfortunately, from a security perspective, functionality and discussed concept in past and present system security often takes precedence over secure design, leaving security to research [5, 11, 17, 19, 23, 25]. With the recent resurgence be retrofitted afterwards. As outlined in Section 4.1, there areprotectionmechanismsinmodernCPU’swhicharenot utilised at all. The historical decisions taken not to use all protection mechanisms have resulted in legacy system sup- Permission to make digital or hard copies of all or part of this work for port issues for today’s designers. Changing this, and util- personal or classroom use is granted without fee provided that copies are ising the unused protection modes is possible, but inflicts not made or distributed for profit or commercial advantage and that copies a significant amount of development and maintenance work bear this notice and the full citation on the first page. To copy otherwise, to for software developers. On the positive side, CPU man- republish, to post on servers or to redistribute to lists, requires prior specific ufacturers are increasingly addressing security concerns in permission and/or a fee. STC’10, October 4, 2010, Chicago, Illinois, USA. hardware and are willing to trade chip real estate for secu- Copyright 2010 ACM 978-1-4503-0095-7/10/10 ...$10.00. rity functions. For instance, modern platforms are able to 79 support an alternative way to dynamically boot a trusted (i.e. one that can undermine the security of the system) hypervisor or OS kernel. Those platforms are able to dy- may be invoked with arbitrary input.”. Further the authors namically reset and measure their state without performing conclude that all code which may undermine the systems’ a traditional reboot and initialisation through a BIOS [9]. security should be trustworthy. The borders of the TCB To enable this so-called Dynamic Root of Trust for Measure- also may become blurred, particularly when availability and ment (DRTM), the CPU, chipset and platform manufactur- robustness are paramount. A platform can contain code ers had to accommodate many changes to the underlying which is designed to detect, contain and recover from a fail- hardware and software infrastructure. ure. This code might not be security critical according to the However, a secure system still requires a harmonised col- previous discussion. However, this code provides the basis laboration between hardware and software components. The for a operational trusted platform. We therefore distinguish recent resurgence of interest and advances in virtualisation between ‘operational dependable code’ and ‘trusted code’. hardware development, has created a window of opportunity It is however arguable, whether operational code should be for creative security solutions. Consequently, we propose to included in the TCB or not. make full use of the existing protection mechanisms avail- Further, it is difficult to evaluate the quality of a given able in the new, hardware assisted, virtualisation chips at code base. It is a common belief, that the amount of SLOC this early stage of hypervisor development. is a good measure for the quality of a TCB [11, 27]. This measure seems too coarse grained and immediately raises 3. BACKGROUND the question of which lines of code to trust? Do all lines of code need to be trusted, or is it sufficient to trust only code 3.1 Trusted Computing Base which performs sensitive operations? Moreover, it is also clear that a poor interfaces design or poor code separation The many platform components, technologies and con- will not result in a more trustworthy system just because it cepts which are responsible for the correct functionality and has less amount of code than any other system. security of a computing platform, constitute the Trusted Therefore, as discussed in the remainder of this paper, Computing Base (TCB). In other words, a platform solely the overall trustworthiness of a system can be elevated by relies on the TCB components for functionality and security separating and containerising security critical functions, es- enforcement and therefore to evaluate a platform’s trustwor- pecially if this can be supported and enforced by hardware. thiness it is necessary to assess its TCB. In the following, we want to discuss the definition of the TCB and in Section 4 outline our TCB model for hardware assisted virtualisation. 3.2 Ring Protection The Trusted Computer System Evaluation Criteria [6], The ring protection scheme is based on a 2-bit privilege better known as the ‘orange book’, defines a TCB as fol- level, enabling the CPU to determine four different separate lows: “The heart of a trusted computer system is the Trusted levels of privilege - from ring 0, with the most privileges, Computing Base (TCB) which contains all of the elements to ring 3, with the least privileges. Depending on which of the system responsible for supporting the security pol- ring level code is being executed, the program has access to icy and supporting the isolation of objects (code and data) different CPU functionalities and features. Traditionally, an on which the protection is based.”. The criteria further de- OS kernel, including device drivers, runs with the highest mands the TCB to be as small as possible: “[...] a TCB privileges and no restrictions in ring 0. Applications are should be as simple as possible consistent with the functions placed inside ring 3, the least privileged level. Rings 1 and 2 it has to perform.” are generally unused. Modern OSes however, support a feature-rich set of func- Unfortunately, the monolithic design of commodity OSes tionality and an increasingly complex security policy model, does not only pose a security threat, but also turns out to be which unfortunately, increases the complexity of its TCB. a technical hurdle for virtualisation. In a virtualised envi- Moreover, the perception of the TCB may also differ from ronment, a guest OS must not be allowed to run directly on a user’s, a software vendor’s as well as a platform supplier’s hardware and interfere with the CPU state directly. Virtu- point of view. Reducing the TCB is a well understood con- alisation therefore requires placing a hypervisor layer under cept to increase the trustworthiness and reliability of a com- the OS, in order to trap privileged instructions. puter system [2, 4, 11, 18, 19, 23, 25, 27].
Recommended publications
  • Trusted Platform Module (TPM) TCG 1.2 / 2.0
    Trusted Platform Module (TPM) TCG 1.2 / 2.0 USER GUIDE Revision 1.20 The information in this user's guide has been carefully reviewed and is believed to be accurate. The vendor assumes no responsibility for any inaccuracies that may be contained in this document, and makes no commitment to update or to keep current the information in this manual, or to notify any person or organization of the updates. Please Note: For the most up-to-date version of this manual, please see our website at www.supermicro.com. Super Micro Computer, Inc. ("Supermicro") reserves the right to make changes to the product described in this manual at any time and without notice. This product, including software and documentation, is the property of Supermicro and/ or its licensors, and is supplied only under a license. Any use or reproduction of this product is not allowed, except as expressly permitted by the terms of said license. IN NO EVENT WILL SUPER MICRO COMPUTER, INC. BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, SPECULATIVE OR CONSEQUENTIAL DAMAGES ARISING FROM THE USE OR INABILITY TO USE THIS PRODUCT OR DOCUMENTATION, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN PARTICULAR, SUPER MICRO COMPUTER, INC. SHALL NOT HAVE LIABILITY FOR ANY HARDWARE, SOFTWARE, OR DATA STORED OR USED WITH THE PRODUCT, INCLUDING THE COSTS OF REPAIRING, REPLACING, INTEGRATING, INSTALLING OR RECOVERING SUCH HARDWARE, SOFTWARE, OR DATA. Any disputes arising between manufacturer and customer shall be governed by the laws of Santa Clara County in the State of California, USA. The State of California, County of Santa Clara shall be the exclusive venue for the resolution of any such disputes.
    [Show full text]
  • Introduction to Trusted Computing: TPM 101
    Introduction to Trusted Computing: TPM 101 Ariel Segall [email protected] Day 1 Approved for Public Release: 12-2749. Distribution unlimited Day 1 Approved for Public Release: 12-2749. Distribution unlimited 1 Ariel Segall [email protected] () TPM 101 / 1 License All materials are licensed under a Creative Commons \Share Alike" license. http://creativecommons.org/licenses/by-sa/3.0 Day 1 Approved for Public Release: 12-2749. Distribution unlimited 2 Ariel Segall [email protected] () TPM 101 / 1 What We'll Be Covering In this section: What is a TPM? What does it do? What's it good for? Some TPM myths (and the truths behind them) Why enterprises should care about TPMs All at a high level{ deep dive this afternoon. Day 1 Approved for Public Release: 12-2749. Distribution unlimited 3 Ariel Segall [email protected] () TPM 101 / 1 What is a TPM? Trusted Platform Module Inexpensive (<$1, usually) chip on almost all motherboards today Not in Macs Only some servers have them{ ask. Hardware basis for platform trust In secrets In platform state Combined with a Root of Trust for Measurement1 In platform identity Current version is 1.2 Unless otherwise specified, we'll always refer to 1.2 TPMs Previous version 1.1; next, 2.0. 1We'll get to these in a little while Day 1 Approved for Public Release: 12-2749. Distribution unlimited 4 Ariel Segall [email protected] () TPM 101 / 1 What's In a TPM? TPM Non−Volatile Memory Cryptographic Co−Processor Volatile Memory Execution Engine (Processor) Random Number Generator Day 1 Approved for Public Release: 12-2749.
    [Show full text]
  • Trusted Platforms UEFI, PI and TCG-Based Firmware
    White Paper by Intel Corporation and IBM Corporation Trusted Platforms UEFI, PI and TCG-based firmware Vincent J. Zimmer Intel Corporation Shiva R. Dasari Sean P. Brogan IBM September 2009 Executive Summary This document provides an overview of the interactions of the Trusted Computing Group (TCG) [TCG Overview], the firmware standards work within the Unified Extensible Firmware Interface (UEFI) Forum, and implementation practices of UEFI PI-based [UEFI Book][UEFI Shell Book][UEFI Overview] implementations. In addition, this paper will provide some use-cases and implementation examples of this technology in addition to the industry threats that motivate the design of this class of technology. This paper is mainly intended for Hardware, firmware, software, and BIOS engineers. But beyond this audience, some of the information in this paper will be valuable for IT decision makers, marketing, and other parties. The goal of the paper is to take away an understanding of the motivations behind trusted platform design, the terminology of trust, how to navigate the Trusted Computing Group set of specifications and technology that relate to platform, impact on platform firmware and UEFI, instances of deployment in the market, and some future possible directions for hardware and firmware. ii Table of Contents Overview ............................................................................................................2 Problems to solve ...........................................................................................3 Security architecture
    [Show full text]
  • Open Source TPM Support
    Open Source TPM support Open source application and support software for TPM is available for several operating systems like Linux, Android and in different programming languages supporting the following scenarios: - embedded Systems - servers - mobile communication and portable devices (e.g. tablet computer or smartphone) Open source implementations can also be ported to other platforms and processors and may be act as a starting point for the development of new applications. Some open source projects from the following list are supported by Infineon while other packages are separately developed by independent parties. The following list of Open Source software utilizing Trusted Computing and/or TPM software makes no claim to be complete and represents a limited number of projects: 1. Linux TPM Driver ( http://www.kernel.org ) Linux device driver for Trusted Platform Modules (TPM) in standard kernel (Vanilla). 2. I2C driver for TPM The driver is available on Linux kernel.org ( https://lkml.org/lkml/2011/7/22/137 ) 3. Trusted GRUB ( http://sourceforge.net/projects/trustedgrub ) Trusted GRUB extends the GRUB bootloader for Linux platforms with TPM support. This makes it possible to provide a secure Bootstrap architecture; Code is in general useful for initializing a Trusted Platform Module and execute integrity measurement based on Trusted Computing. 4. UBoot based on TPM with I2C ( http://git.chromium.org/gitweb/?p=chromiumos/third_party/u- boot.git;a=tree;f=drivers/tpm/slb9635_i2c;hb=chromeos-v2011.03 ) UBoot involving TPM using I2C interface. 5. The TROUSERS project ( http://sourceforge.net/projects/trousers ): An open-source TCG Software Stack implementation created and released by IBM.
    [Show full text]
  • Inspecting Data from the Safety of Your Trusted Execution Environment
    Inspecting data from the safety of your trusted execution environment John Williams johnwwil [at] u.washington.edu June, 2015 Abstract: This paper presents a proof of concept that uses ARM TrustZone to perform introspection of a Linux kernel running in the normal world from within a secure-world system. Techniques from existing volatile-memory analysis applications are repurposed for application in real-time through asynchronous introspection of the normal world. The solution presented here leverages open-source software that is actively being developed to support additional architectures. 1 INTRODUCTION As technology becomes more prevalent in our day-to-day lives, we increasingly rely on mobile devices for both business and personal purposes. Emerging security threats, such as rootkits that can scan memory for protected PCI information, have been responsible for large-scale breaches. It has been predicted that targeted exploit kits and attack services will soon exist for mobile platforms, which could enable the exploitation of mobile devices on an unprecedented scale [1]. Techniques for mitigating such threats to mobile devices have largely evolved in parallel with industry demand for them. While some companies have indeed made progress through continued addition of product features that increase the security of devices, other companies have simply pivoted their marketing efforts to emphasize or recast certain aspects of their existing capabilities. In order to select the right products and features for protecting sensitive data and activities, effective segmentation is key. While segmentation within devices has traditionally been implemented at the operating system level, in recent years architectural modification at the chip level has emerged as a way to provide hard segmentation between execution environments.
    [Show full text]
  • Leveraging ARM Trustzone and Verifiable Computing to Provide Auditable Mobile Functions Nuno O
    Leveraging ARM TrustZone and Verifiable Computing to Provide Auditable Mobile Functions Nuno O. Duarte Sileshi Demesie Yalew INESC-ID / IST, University of Lisbon KTH Royal Institute of Technology [email protected] [email protected] Nuno Santos Miguel Correia INESC-ID / IST, University of Lisbon INESC-ID / IST, University of Lisbon [email protected] [email protected] ABSTRACT 1 INTRODUCTION The increase of personal data on mobile devices has been fol- For over 30 years [5], an important problem that has fasci- lowed by legislation that forces service providers to process nated the research community is about trusting the result of and maintain users’ data under strict data protection policies. computations performed on untrusted platforms. Since the In this paper, we propose a new primitive for mobile applica- advent of cloud computing, this interest has further grown tions called auditable mobile function (AMF) to help service in obtaining proofs of code execution on untrusted clouds. providers enforcing such policies by enabling them to process An approach to address this problem that has garnered sensitive data within users’ devices and collecting proofs of particular attention is verifiable computing. At a high-level, function execution integrity. We present SafeChecker, a com- verifiable computing consists of studying how a prover can putation verification system that provides mobile application convince a verifier of a mathematical assertion. The main support for AMFs, and evaluate the practicality of different obstacle faced by this field has been practicality, as the costs usage scenario AMFs on TrustZone-enabled hardware. of computing and verifying proofs over general computa- tions tend to be very high [21].
    [Show full text]
  • Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
    Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed mobile storage encryption solutions for Windows environments were either too costly, required users to carry a key-resident device, or relied on keys residing on local disk. Sometimes the best solution under these circumstances was the presence of administrative controls (i.e. policies) prohibiting users from storing sensitive information on local laptop drives. With the proliferation of TPM 1.2 across most laptop platforms and the release of Microsoft Windows Vista, most roadblocks to laptop data encryption have been removed. In this paper, I explore the challenges facing security managers responsible for laptop data security, TPM technology, and how the features of a TPM can integrate with Microsoft’s Bitlocker and Active Directory technologies to provide for more secure data on the road. The Challenges Vulnerable Laptop Data When a mobile user’s laptop is stolen, a variety of data might be potentially exposed. The following is a short list of some of the most common types of sensitive information that might be found on a laptop drive: ¾ ePHI – Electronic Protected Health Information, protected under the HIPAA, is any information that can be used to uniquely identify a health care recipient. ¾ PII – Essentially, Personally Identifiable Information is any data that can be used to steal a person’s identity. Most states have passed laws requiring businesses to take steps to protect this information as well as to notify and assist victims if this information is compromised.
    [Show full text]
  • Trusted Computing Serving an Anonymity Service
    Trusted Computing Serving an Anonymity Service Alexander Böttcher Bernhard Kauer Hermann Härtig Technische Universität Dresden Department of Computer Science Operating Systems Group {boettcher, kauer, haertig}@os.inf.tu-dresden.de Abstract [15] in the authors’ group, will show. An unknown crim- inal to be investigated was supposed to use an anonymity We leveraged trusted computing technology to service. The police and later on the German Federal Bu- counteract certain insider attacks. Furthermore, we reau of Criminal Investigation (FBCI) required to investi- show with one of the rare server based scenarios that gate a criminal that uses a known URL. In order to enable an anonymity service can profit from trusted comput- criminal prosecution by a given warrant the software was ing. We based our design on the Nizza Architecture extended to log connection data [6, 5]. This function of [14] with its small kernel and minimal multi-server the anonymity software [3] was used only with a warrant OS. We even avoided Nizza’s legacy container and but without directly notifying the users. After the warrant got a much smaller, robust and hopefully more secure was reversed the FBCI showed up with a delivery warrant system, since we believe that minimizing the trusted for a log record (which were later on reversed illegal [4]), computing base is an essential requirement for trust first at the institute and later on at the institute’s directors into software. private home. This incident shows a whole class of attacks on the 1 Introduction anonymity and more general every computing service. Vendor and providers under constraint can reveal the ser- Anonymity while using the Internet is widely considered vice because of insider knowledge and physical access a legitimate and - for many use cases - essential require- to those services.
    [Show full text]
  • The Nizza Secure-System Architecture
    Appears in the proceedings of CollaborateCom 2005, San Jose, CA, USA The Nizza Secure-System Architecture Hermann Härtig Michael Hohmuth Norman Feske Christian Helmuth Adam Lackorzynski Frank Mehnert Michael Peter Technische Universität Dresden Institute for System Architecture D-01062 Dresden, Germany [email protected] Abstract rely on a standard OS (including the kernel) to assure their security properties. The trusted computing bases (TCBs) of applications run- To address the conflicting requirements of complete ning on today’s commodity operating systems have become functionality and the protection of security-sensitive data, extremely large. This paper presents an architecture that researchers have devised system architectures that reduce allows to build applications with a much smaller TCB. It the system’s TCB by running kernels in untrusted mode is based on a kernelized architecture and on the reuse of in a secure compartment on top of a small security kernel; legacy software using trusted wrappers. We discuss the de- security-sensitive services run alongside the OS in isolated sign principles, the architecture and some components, and compartments of their own. This architecture is widely re- a number of usage examples. ferred to as kernelized standard OS or kernelized system. In this paper, we describe Nizza, a new kernelized- system architecture. In the design of Nizza, we set out to answer the question of how small the TCB can be made. 1 Introduction We have argued in previous work that the (hardware and software) technologies needed to build small secure-system Desktop and hand-held computers are used for many platforms have become much more mature since earlier at- functions, often in parallel, some of which are security tempts [8].
    [Show full text]
  • Attestation and Trusted Computing
    Attestation and Trusted Computing Abstract A look at the cryptographic techniques and protocols used in trusted computing with particular attention to remote attestation. CSEP 590: Practical Aspects of Modern Cryptography March 2006 J. Christopher Bare Introduction Trusted computing, in some form, is almost certain to become part of the computing landscape over the next few years. This is because email viruses, trojans, spyware, phishing scams, key-stroke loggers, and security exploits are so much a part of the landscape already. The current computing infrastructure was built with a premium on openness and interoperability which has paid huge dividends in terms of creativity and innovation. But, the same openness is somewhat problematic for security. Experience has shown that the access control model of present operating systems is inadequate against many types of attacks particularly in the hands of inexpert users. Previous attempts to roll out cryptographic infrastructure to a mass-market have met with limited success.[10] The various competing visions of trusted computing seek to strike a workable balance between enhanced security and openness and backward-compatibility. One component of trusted computing that has attracted particular attention is remote attestation. Attestation allows a program to authenticate itself and remote attestation is a means for one system to make reliable statements about the software it is running to another system. The remote party can then make authorization decisions based on that information. This paper will look at the cryptographic techniques and protocols used in trusted computing with particular attention to remote attestation. Trusted Computing The term trusted computing applies to a number of distinct proposals and initiatives with the general goal of engineering more security into commodity computing systems.
    [Show full text]
  • Reducing TCB Size by Using Untrusted Components — Small Kernels Versus Virtual-Machine Monitors
    To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth Michael Peter Hermann Hartig¨ Jonathan S. Shapiro Technische Universitat¨ Dresden Johns Hopkins University Department of Computer Science Department of Computer Science Operating Systems Group Systems Research Laboratory hohmuth,peter,haertig ¡ @os.inf.tu-dresden.de [email protected] Abstract tems, such as message passing and memory sharing, the overall size of the TCB (which includes all components an Secure systems are best built on top of a small trusted oper- application relies on) can actually be reduced for a large class ating system: The smaller the operating system, the easier it of applications. can be assured or verified for correctness. Another assumption we address in this paper is that all In this paper, we oppose the view that virtual-machine components on which an application has operational depen- monitors (VMMs) are the smallest systems that provide se- dencies must be in this application’s TCB. This presumption cure isolation because they have been specifically designed leads to the unnecessary inclusion of many (protocol and de- to provide little more than this property. The problem with vice) drivers into the TCB. this assertion is that VMMs typically do not support inter- The basic idea for reducing TCB size is to extract sys- process communication, complicating the use of untrusted tem components from the TCB and consider them as un- components inside a secure systems. trusted without violating the security requirements of user We propose extending traditional VMMs with features for applications.
    [Show full text]
  • Trusted Computer System Evaluation Criteria
    DoD 5200.28-STD Supersedes CSC-STD-00l-83, dtd l5 Aug 83 Library No. S225,7ll DEPARTMENT OF DEFENSE STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA DECEMBER l985 December 26, l985 Page 1 FOREWORD This publication, DoD 5200.28-STD, "Department of Defense Trusted Computer System Evaluation Criteria," is issued under the authority of an in accordance with DoD Directive 5200.28, "Security Requirements for Automatic Data Processing (ADP) Systems," and in furtherance of responsibilities assigned by DoD Directive 52l5.l, "Computer Security Evaluation Center." Its purpose is to provide technical hardware/firmware/software security criteria and associated technical evaluation methodologies in support of the overall ADP system security policy, evaluation and approval/accreditation responsibilities promulgated by DoD Directive 5200.28. The provisions of this document apply to the Office of the Secretary of Defense (ASD), the Military Departments, the Organization of the Joint Chiefs of Staff, the Unified and Specified Commands, the Defense Agencies and activities administratively supported by OSD (hereafter called "DoD Components"). This publication is effective immediately and is mandatory for use by all DoD Components in carrying out ADP system technical security evaluation activities applicable to the processing and storage of classified and other sensitive DoD information and applications as set forth herein. Recommendations for revisions to this publication are encouraged and will be reviewed biannually by the National Computer Security Center through a formal review process. Address all proposals for revision through appropriate channels to: National Computer Security Center, Attention: Chief, Computer Security Standards. DoD Components may obtain copies of this publication through their own publications channels.
    [Show full text]