Trusted Computer System Evaluation Criteria (TCSEC) is a
United States
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
Government
A government is the system or group of people governing an organized community, generally a State (polity), state.
In the case of its broad associative definition, government normally consists of legislature, executive (government), execu ...
Department of Defense
The United States Department of Defense (DoD, USDOD, or DOD) is an executive department of the U.S. federal government charged with coordinating and supervising the six U.S. armed services: the Army, Navy, Marines, Air Force, Space Force, ...
(DoD) standard that sets basic requirements for assessing the effectiveness of
computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
controls built into a
computer system
A computer is a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic sets of operations known as ''programs'', wh ...
. The TCSEC was used to evaluate, classify, and select computer systems being considered for the processing, storage, and retrieval of sensitive or
classified information
Classified information is confidential material that a government deems to be sensitive information which must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted by law or ...
.
The TCSEC, frequently referred to as the Orange Book, is the centerpiece of the DoD ''
Rainbow Series
The Rainbow Series (sometimes known as the Rainbow Books) is a series of computer security standards and guidelines published by the United States government in the 1980s and 1990s. They were originally published by the U.S. Department of Defen ...
'' publications. Initially issued in 1983 by the
National Computer Security Center (NCSC), an arm of the
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
, and then updated in 1985, TCSEC was eventually replaced by the
Common Criteria
The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard (International Organization for Standardization, ISO/International Electrotechnical Commission, IEC 15408) for co ...
international standard, originally published in 2005.
History
By the late 1960s, government agencies, like other computer users, had gone far in the transition from batch processing to multiuser and time-sharing systems. The
US Department of Defense
The United States Department of Defense (DoD, USDOD, or DOD) is an executive department of the U.S. federal government charged with coordinating and supervising the six U.S. armed services: the Army, Navy, Marines, Air Force, Space Force, ...
(DoD) Advanced Research Projects Agency (ARPA), now
DARPA
The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
was a primary funder of research into time-sharing.
By 1970, DoD was planning a major procurement of mainframe computers referred to as the
Worldwide Military Command and Control System (WWMCCS) to support military command operations. The desire to meet the more advanced challenges emerged early. The Air Force's
Military Airlift Command (MAC), for example, provided the military services with a largely unclassified air cargo and passenger service but on rare occasions was required to classify some of its missions using the same aircraft and crews—for example, in cases of military contingencies or special operations. By 1970, MAC had articulated a requirement to process classified information on its soon-to-arrive WWMCCS mainframes while allowing users without security clearance to access classified information (uncleared users) access to the mainframes.
[ ]
The national security community responded to the challenges in two ways: the Office of the Secretary of Defense commissioned a study of the policy and technical issues associated with securing computer systems, while ARPA funded the development of a prototype secure operating system that could process and protect classified information.
The study effort was organized as the Defense Science Board (DSB) Task Force on Computer Security under the chairmanship of the late Willis Ware. Its membership included technologists from the government and defense contractors as well as security officials from the DoD and intelligence community. The task force met between 1967 and 1969 and produced a classified report that was made available to organizations with appropriate security clearance beginning in 1970. The
Ware Report, as the DSB task force report came to be called, provided guidance on the development and operation of multiuser computer systems that would be used to process classified information.
In the early 1970s,
United States Air Force
The United States Air Force (USAF) is the Air force, air service branch of the United States Department of Defense. It is one of the six United States Armed Forces and one of the eight uniformed services of the United States. Tracing its ori ...
requirements for the development of new computer system capabilities were addressed to the Air Force Electronic Systems Division (ESD) later known as the
Electronic Systems Center at
Hanscom Air Force Base in Massachusetts. ESD received technical advice and support of the
Mitre Corporation
The Mitre Corporation (stylized as The MITRE Corporation and MITRE) is an American not-for-profit organization with dual headquarters in Bedford, Massachusetts, and McLean, Virginia. It manages federally funded research and development centers ...
, one of the countries
federally funded research and development centers
Federally funded research and development centers (FFRDCs) are public-private partnerships that conduct research and development for the United States Government. Under Federal Acquisition Regulationbr>§ 35.017 FFRDCs are operated by univers ...
(FFRDC). An early MITRE report
suggested alternative approaches to meeting the MAC requirement without developing a new multilevel secure operating system in hopes that these approaches might avoid the problems the
Ware Report characterized as intractable.
Grace Hammonds Nibaldi while she worked at the
Mitre Corporation
The Mitre Corporation (stylized as The MITRE Corporation and MITRE) is an American not-for-profit organization with dual headquarters in Bedford, Massachusetts, and McLean, Virginia. It manages federally funded research and development centers ...
published a report that laid out the initial plans for the evaluation of
commercial off-the-shelf
Commercial-off-the-shelf or commercially available off-the-shelf (COTS) products are packaged or canned (ready-made) hardware or software, which are adapted aftermarket to the needs of the purchasing organization, rather than the commissioning of ...
operating systems.
[ ] The Nibaldi paper places great emphasis on the importance of mandatory security. Like the Orange Book to follow, it defines seven levels of evaluated products with the lowest, least-secure level (0) reserved for “unevaluated.” In the Nibaldi scheme, all but level 1 (the lowest level that actually undergoes evaluation) must include features for extensive mandatory security.
Work on the Orange book began in 1979. The creation of the Orange Book was a major project spanning the period from Nibaldi's 1979 report
to the official release of the Orange Book in 1983. The first public draft of the evaluation criteria was the Blue Book released in May 1982.
The Orange book was published in August 1983. Sheila Brand was the primary author and several other people were core contributors to its development. These included Grace Hammonds Nibaldi and Peter Tasker of
Mitre Corporation
The Mitre Corporation (stylized as The MITRE Corporation and MITRE) is an American not-for-profit organization with dual headquarters in Bedford, Massachusetts, and McLean, Virginia. It manages federally funded research and development centers ...
; Dan Edwards, Roger Schell, and Marvin Schaeffer of National Computer Security Conference; and Ted Lee of
Univac
UNIVAC (Universal Automatic Computer) was a line of electronic digital stored-program computers starting with the products of the Eckert–Mauchly Computer Corporation. Later the name was applied to a division of the Remington Rand company and ...
. A number of people from government, government contractors, and vendors, including Jim Anderson, Steve Walker, Clark Weissman, and Steve Lipner were cited as reviewers who influenced the content of the final product.
In 1999, the Orange book was replaced by the
International Common Criteria for Information Technology Security Evaluation.
On 24 October 2002, The Orange Book (aka DoDD 5200.28-STD) was canceled by DoDD 8500.1, which was later reissued as DoDI 8500.02, on 14 March 2014.
Fundamental objectives and requirements
Policy
The security policy must be explicit, well-defined, and enforced by the computer system. Three basic security policies are specified:
* Mandatory Security Policy – Enforces
access control
In physical security and information security, access control (AC) is the action of deciding whether a subject should be granted or denied access to an object (for example, a place or a resource). The act of ''accessing'' may mean consuming ...
rules based directly on an individual's clearance, authorization for the information and the confidentiality level of the information being sought. Other indirect factors are physical and environmental. This policy must also accurately reflect the laws, general policies and other relevant guidance from which the rules are derived.
* Marking – Systems designed to enforce a mandatory security policy must store and preserve the integrity of access control labels and retain the labels if the object is exported.
* Discretionary Security Policy – Enforces a consistent set of rules for controlling and limiting access based on identified individuals who have been determined to have a need-to-know for the information.
Accountability
Individual accountability regardless of policy must be enforced. A secure means must exist to ensure the access of an authorized and competent agent that can then evaluate the accountability information within a reasonable amount of time and without undue difficulty. The accountability objective includes three requirements:
* Identification – The process used to recognize an individual user.
* Authentication – The verification of an individual user's authorization to specific categories of information.
* Auditing –
Audit
An audit is an "independent examination of financial information of any entity, whether profit oriented or not, irrespective of its size or legal form when such an examination is conducted with a view to express an opinion thereon." Auditing al ...
information must be selectively kept and protected so that actions affecting security can be traced to the authenticated individual.
Assurance
The computer system must contain hardware/software mechanisms that can be independently evaluated to provide sufficient assurance that the system enforces the above requirements. By extension, assurance must include a guarantee that the trusted portion of the system works only as intended. To accomplish these objectives, two types of assurance are needed with their respective elements:
* Assurance Mechanisms
* Operational Assurance: System Architecture, System Integrity, Covert Channel Analysis, Trusted Facility Management, and Trusted Recovery
* Life-cycle Assurance : Security Testing, Design Specification and Verification, Configuration Management, and Trusted System Distribution
* Continuous Protection Assurance – The trusted mechanisms that enforce these basic requirements must be continuously protected against tampering or unauthorized changes.
Documentation
Within each class, an additional set of documentation addresses the development, deployment, and management of the system rather than its capabilities. This documentation includes:
* Security Features User's Guide, Trusted Facility Manual, Test Documentation, and Design Documentation
Divisions and classes
The TCSEC defines four divisions: D, C, B, and A, where division A has the highest security. Each division represents a significant difference in the trust an individual or organization can place on the evaluated system. Additionally divisions C, B and A are broken into a series of hierarchical subdivisions called classes: C1, C2, B1, B2, B3, and A1.
Each division and class expands or modifies as indicated the requirements of the immediately prior division or class.
D – Minimal protection
* Reserved for those systems that have been evaluated but that fail to meet the requirement for a higher division.
C – Discretionary protection
* C1 – Discretionary Security Protection
** Identification and authentication
** Separation of users and data
**
Discretionary Access Control (DAC) capable of enforcing access limitations on an individual basis
** Required System Documentation and user manuals
* C2 – Controlled Access Protection
** More finely grained DAC
** Individual accountability through login procedures
** Audit trails
** Object reuse
** Resource isolation
** An example of such as system is
HP-UX
HP-UX (from "Hewlett Packard Unix") is a proprietary software, proprietary implementation of the Unix operating system developed by Hewlett Packard Enterprise; current versions support HPE Integrity Servers, based on Intel's Itanium architect ...
B – Mandatory protection
* B1 – Labeled Security Protection
** Informal statement of the security policy model
** Data sensitivity labels
**
Mandatory Access Control (MAC) over selected subjects and objects
** Label exportation capabilities
** Some discovered flaws must be removed or otherwise mitigated
** Design specifications and verification
** An example of such a system was the SEVMS variant of
OpenVMS
OpenVMS, often referred to as just VMS, is a multi-user, multiprocessing and virtual memory-based operating system. It is designed to support time-sharing, batch processing, transaction processing and workstation applications. Customers using Op ...
* B2 – Structured Protection
**
Security policy model clearly defined and formally documented
** DAC and MAC enforcement extended to all subjects and objects
**
Covert storage channels are analyzed for occurrence and bandwidth
** Carefully structured into protection-critical and non-protection-critical elements
** Design and implementation enable more comprehensive testing and review
** Authentication mechanisms are strengthened
** Trusted facility management is provided with administrator and operator segregation
** Strict configuration management controls are imposed
** Operator and Administrator roles are separated
** An example of such a system was
Multics
Multics ("MULTiplexed Information and Computing Service") is an influential early time-sharing operating system based on the concept of a single-level memory.Dennis M. Ritchie, "The Evolution of the Unix Time-sharing System", Communications of t ...
* B3 – Security Domains
** Satisfies
reference monitor requirements
** Structured to exclude code not essential to security policy enforcement
** Significant system engineering directed toward minimizing complexity
** Security administrator role defined
** Audit security-relevant events
** Automated imminent
intrusion detection
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collec ...
, notification, and response
**
Trusted path to the TCB for the user authentication function
** Trusted system recovery procedures
**
Covert timing channels are analyzed for occurrence and bandwidth
** An example of such a system is the XTS-300, a precursor to the
XTS-400
The XTS-400 is a multilevel security, multilevel secure computer operating system. It is multiuser and computer multitasking, multitasking that uses multilevel scheduling in processing data and information. It works in networked environments an ...
A – Verified protection
* A1 – Verified Design
** Functionally identical to B3
** Formal design and verification techniques including a formal top-level specification
** Formal management and distribution procedures
** Examples of A1-class systems are Honeywell's SCOMP, Aesec's GEMSOS, and Boeing's SNS Server. Two that were unevaluated were the production LOCK platform and the cancelled DEC
VAX Security Kernel.
* Beyond A1
** System Architecture demonstrates that the requirements of self-protection and completeness for reference monitors have been implemented in the
Trusted Computing Base
The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the ...
(TCB).
** Security Testing automatically generates test-case from the formal top-level specification or formal lower-level specifications.
** Formal Specification and Verification is where the TCB is verified down to the source code level, using formal verification methods where feasible.
** Trusted Design Environment is where the TCB is designed in a trusted facility with only trusted (cleared) personnel.
Matching classes to environmental requirements
The publication entitled "Army Regulation 380-19" is an example of a guide to determining which system class should be used in a given situation.
See also
*
AR 380-19 superseded by
AR 25-2
AR, Ar, or A&R may refer to:
Arts, entertainment, and media
Music
* Artists and repertoire
* AR (EP), ''AR'' (EP), the debut EP by Addison Rae
Periodicals
* ''Absolute Return + Alpha'', a hedge fund publication
*''The Adelaide Review'', an Au ...
*
Canadian Trusted Computer Product Evaluation Criteria
*
Common Criteria
The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard (International Organization for Standardization, ISO/International Electrotechnical Commission, IEC 15408) for co ...
*
ITSEC The Information Technology Security Evaluation Criteria (ITSEC) is a structured set of criteria for evaluating computer security within products and systems. The ITSEC was first published in May 1990 in France, Germany, the Netherlands, and the Unit ...
*
Rainbow Series
The Rainbow Series (sometimes known as the Rainbow Books) is a series of computer security standards and guidelines published by the United States government in the 1980s and 1990s. They were originally published by the U.S. Department of Defen ...
*
Trusted Platform Module
A Trusted Platform Module (TPM) is a secure cryptoprocessor that implements the ISO/IEC 11889 standard. Common uses are verifying that the boot process starts from a trusted combination of hardware and software and storing disk encryption keys.
...
References
{{reflist, 1
External links
National Security Institute - 5200.28-STD ''Trusted Computer System Evaluation Criteria''*
ttps://seclab.cs.ucdavis.edu/projects/history/papers/niba79.pdf Proposed Technical Evaluation Criteria for Trusted Computer Systems
National Security Agency
Computer security standards
Trusted computing