Information Assurance
National Partnership Offers Benefits, but Faces Considerable Challenges
Gao ID: GAO-06-392 March 24, 2006
In 1997, the National Security Agency and the National Institute of Standards and Technology formed the National Information Assurance Partnership (NIAP) to boost federal agencies' and consumers' confidence in information security products manufactured by vendors. To facilitate this goal, NIAP developed a national program that requires accredited laboratories to independently evaluate and validate the security of these products for use in national security systems. These systems are those under control of the U.S. government that contain classified information or involve intelligence activities. GAO was asked to identify (1) the governmentwide benefits and challenges of the NIAP evaluation process on national security systems, and (2) the potential benefits and challenges of expanding the requirement of NIAP to non-national security systems, including sensitive but unclassified systems.
While NIAP process participants--vendors, laboratories, and federal agencies--indicated that the process offers benefits for use in national security systems, its effectiveness has not been measured or documented, and considerable challenges to acquiring and using NIAP-evaluated products exist. Specific benefits included independent testing and evaluation of products and accreditation of the performing laboratories, the discovery and correction of product flaws, and improvements to vendor development processes. However, process participants also face several challenges, including difficulty in matching agencies' needs with the availability of NIAP-evaluated products, vendors' lack of awareness regarding the evaluation process, and a lack of performance measures and difficulty in documenting the effectiveness of the NIAP evaluation process. Collectively, these challenges hinder the effective use of the NIAP evaluation process by vendors and agencies. Expanding the requirement of the NIAP evaluation process to non-national security systems is likely to yield similar benefits and challenges as those experienced by current process participants. For example, a current benefit--independent testing and evaluation of IT products--gives agencies confidence that validated features of a product will perform as claimed by the vendor. However, federal policy already allows agencies with non-national security systems to consider acquiring NIAP-evaluated products for those systems, and requiring that they do so may further exacerbate current resource constraints related to the evaluation and validation of products. In the absence of such a requirement, agencies seeking information assurance (measures that defend and protect information and information systems by ensuring their confidentiality, integrity, authenticity, availability, and utility) for their non-national security systems have other federal guidance and standards available to them.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-06-392, Information Assurance: National Partnership Offers Benefits, but Faces Considerable Challenges
This is the accessible text file for GAO report number GAO-06-392
entitled 'Information Assurance: National Partnership Offers Benefits,
but Faces Considerable Challenges' which was released on March 27,
2006.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to the Honorable William Lacy Clay, House of Representatives:
March 2006:
Information Assurance:
National Partnership Offers Benefits, but Faces Considerable
Challenges:
GAO-06-392:
GAO Highlights:
Highlights of GAO-06-392, a report to the Honorable William Lacy Clay,
House of Representatives:
Why GAO Did This Study:
In 1997, the National Security Agency and the National Institute of
Standards and Technology formed the National Information Assurance
Partnership (NIAP) to boost federal agencies‘ and consumers‘ confidence
in information security products manufactured by vendors. To facilitate
this goal, NIAP developed a national program that requires accredited
laboratories to independently evaluate and validate the security of
these products for use in national security systems. These systems are
those under control of the U.S. government that contain classified
information or involve intelligence activities.
GAO was asked to identify (1) the governmentwide benefits and
challenges of the NIAP evaluation process on national security systems,
and (2) the potential benefits and challenges of expanding the
requirement of NIAP to non-national security systems, including
sensitive but unclassified systems.
What GAO Found:
While NIAP process participants”vendors, laboratories, and federal
agencies”indicated that the process (see figure below) offers benefits
for use in national security systems, its effectiveness has not been
measured or documented, and considerable challenges to acquiring and
using NIAP-evaluated products exist. Specific benefits included
independent testing and evaluation of products and accreditation of the
performing laboratories, the discovery and correction of product flaws,
and improvements to vendor development processes. However, process
participants also face several challenges, including difficulty in
matching agencies‘ needs with the availability of NIAP-evaluated
products, vendors‘ lack of awareness regarding the evaluation process,
and a lack of performance measures and difficulty in documenting the
effectiveness of the NIAP evaluation process. Collectively, these
challenges hinder the effective use of the NIAP evaluation process by
vendors and agencies.
Simplified Overview of NIAP Evaluation Process:
[See PDF for image]
[End of figure]
Expanding the requirement of the NIAP evaluation process to non
national security systems is likely to yield similar benefits and
challenges as those experienced by current process participants. For
example, a current benefit”independent testing and evaluation of IT
products”gives agencies confidence that validated features of a product
will perform as claimed by the vendor. However, federal policy already
allows agencies with non-national security systems to consider
acquiring NIAP-evaluated products for those systems, and requiring that
they do so may further exacerbate current resource constraints related
to the evaluation and validation of products. In the absence of such a
requirement, agencies seeking information assurance (measures that
defend and protect information and information systems by ensuring
their confidentiality, integrity, authenticity, availability, and
utility) for their non-national security systems have other federal
guidance and standards available to them.
What GAO Recommends:
GAO is making two recommendations to address challenges with the NIAP
evaluation process, including establishing and documenting performance
measures on process effectiveness. The Department of Defense concurred
with one of our recommendations and partially concurred with the other.
www.gao.gov/cgi-bin/getrpt?GAO-06-392. To view the full product,
including the scope and methodology, click on the link above. For more
information, contact Gregory C. Wilshusen at (202) 512-6244 or
wilshuseng@gao.gov.
[End of section]
Contents:
Letter:
Results in Brief:
Background:
NIAP Offers Benefits for Use in National Security Systems, but Process
Faces Considerable Challenges:
Expanding NIAP Requirement to Non-national Security Systems May Yield
Many of the Same Benefits and Challenges and Could Exacerbate Resource
Constraints:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendixes:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: Common Criteria Evaluation Assurance Levels:
Appendix III: Comments from the Department of Defense:
Appendix IV: GAO Contact and Staff Acknowledgments:
Table:
Table 1: Summary of the Common Criteria Evaluation Assurance Levels:
Figures:
Figure 1: The NIAP Evaluation Process:
Figure 2: Range of Sample Cost of NIAP Evaluations to Vendors by
Evaluation Assurance Level:
Figure 3: Laboratory Accreditation Process:
Figure 4: Range of Time Required for Completing Product Evaluations at
Various Evaluation Assurance Levels:
Abbreviations:
IT: information technology:
NIAP: National Information Assurance Partnership:
NIST: National Institute of Standards and Technology:
NVLAP: National Voluntary Laboratory Accreditation Program:
Letter March 24, 2006:
The Honorable William Lacy Clay:
House of Representatives:
Dear Mr. Clay:
The sophistication and effectiveness of cybersecurity attacks have
advanced steadily over the past few years and have drastically changed
the way we think about protecting our information and information
systems, including national security systems.[Footnote 1] Commercial-
off-the-shelf information assurance products and information assurance-
enabled products or technologies[Footnote 2] are readily available to
agencies as well as consumers providing needed security services.
Acquiring such products for use on national security systems that
perform as claimed by the vendors who manufacture these products is a
governmentwide challenge.
In 1997, the National Information Assurance Partnership (NIAP) was
formed by the National Security Agency and the National Institute of
Standards and Technology (NIST) to boost federal agencies' and
consumers' confidence in commercial-off-the-shelf products. To
facilitate this goal, NIAP developed a national program that uses
accredited laboratories to independently evaluate and validate the
security of vendor products using standardized processes. The NIAP
program allows the U.S. to meet federal agency needs by participating
in an international arrangement to validate security products using
standardized processes. In addition, the Committee on National Security
Systems established a federal policy which mandates, among other
things, the use of NIAP-evaluated products for national security
systems. Further, the policy allows but does not require users of non-
national security systems to acquire NIAP-evaluated products.
Our objectives were to identify (1) the governmentwide benefits and
challenges of the NIAP evaluation process for national security systems
and (2) the potential benefits and challenges of expanding the
requirement of using NIAP-evaluated products for non-national security
systems, including sensitive but unclassified systems. To address these
objectives, we obtained perspectives from selected industry groups and
various NIAP process participants, such as vendors, accredited
laboratories, and government officials. We also developed and submitted
a survey questionnaire to the 24 federal agencies--also process
participants--cited in the Chief Financial Officer's Act of 1990
(Public Law 101-576) to determine their use of, and perspectives on,
NIAP-evaluated products. In addition, we analyzed documentation related
to NIAP evaluation and validation policies and processes, test and
evaluation criteria, and laboratory accreditation processes. We
conducted our work in Washington, D.C., from May 2005 through February
2006, in accordance with generally accepted government auditing
standards. See appendix I for more details about our objectives, scope,
and methodology.
Results in Brief:
While the NIAP process offers benefits to national security systems,
its effectiveness has not been measured or documented, and considerable
challenges to acquiring and using NIAP-evaluated products exist.
Specific benefits include:
* independent testing and evaluation of products and accreditation of
the performing laboratories, which can increase agencies' confidence
that products will perform as claimed;
* the ability to participate in an international arrangement of
recognized products, which gives agencies broader product selection and
reduces vendor workload;
* the discovery and correction of product flaws, which help to give
agencies greater confidence that the product will perform as claimed;
and:
* improvements to vendor development processes, which can result in
quality improvements to current and future products.
However, the NIAP process also faces several challenges, including:
* difficulty in matching agencies' needs with the availability of NIAP-
evaluated products;
* vendors' lack of awareness regarding the evaluation process;
* a reduction in the number of validators to certify products; and:
* a lack of performance measures and difficulty in documenting the
effectiveness of the NIAP process.
Collectively, these challenges hinder the effective use of the NIAP
process by vendors and agencies.
Expanding the requirement of the NIAP evaluation process to non-
national security systems is likely to yield the same benefits and
challenges as those experienced by current process participants. While
federal policy allows agencies with non-national security systems to
consider using the NIAP process to acquire evaluated and validated
products, requiring that they do so may further exacerbate current
resource constraints related to the evaluation and validation of
products. In the absence of such a requirement, agencies seeking
information assurance for their non-national security systems have
other federal guidance and standards available to them.
We are making recommendations to assist NIAP officials in addressing
process challenges, including developing awareness training workshops
for program participants and establishing and documenting performance
measures on process effectiveness.
In providing written comments on a draft of this report, the Deputy
Assistant Secretary of Defense (Deputy Chief Information Officer)
partially agreed with one of our recommendations, agreed with the
other, and described ongoing and planned efforts to address them. The
Deputy Assistant Secretary's comments are reprinted in appendix III.
The Department of Defense and the Department of Homeland Security also
provided technical comments, which we considered and addressed in our
report, as appropriate.
Background:
The growing sophistication and effectiveness of cyber attacks, and the
increase of information assurance and information assurance-enabled
information technology (IT) products available for use on national
security systems, have heightened federal attention to the need for
information assurance.[Footnote 3] As a result of these trends,
acquiring commercial IT products that perform as vendors claim on
national security systems has become a governmentwide challenge. While
not a complete solution, an important way to increase confidence in
commercial IT products is through independent testing and evaluation of
their security features and functions during design and development.
Federal Partnership Formed to Promote the Use of Evaluated IT Products:
In 1997, NIST and the National Security Agency[Footnote 4] collaborated
to form the NIAP. The purpose of the partnership is to boost consumers'
and federal agencies' confidence in information security products and
enhance the ability of U.S. companies to gain international recognition
and acceptance for their products. The five main goals of NIAP are to:
* promote the development and use of evaluated IT products and systems;
* champion the development and use of national and international
standards for IT security;
* foster research and development in IT security requirements
definition, test methods, tools, techniques, and assurance metrics;
* support a framework for international recognition and acceptance of
IT security testing and evaluations; and:
* facilitate development and growth of a commercial security testing
industry within the U.S.
To facilitate achievement of these goals, NIAP developed a national
program called the Common Criteria Evaluation and Validation Scheme.
The program is based on an international standard of general concepts
and principles of IT security evaluations[Footnote 5] for the
international community. The program evaluates, through various
evaluation assurance levels (see app. II),[Footnote 6] commercial-off-
the-shelf information assurance and information assurance-enabled
products for the federal government. These products can be items of
hardware, software, or firmware.[Footnote 7] As part of the evaluation,
agencies can specify a degree of confidence desired in a product
through protection profiles.[Footnote 8] While a protection profile is
not required in order to have a product evaluated, a vendor is required
to develop a security target.[Footnote 9]
NIAP evaluations are performed by accredited Common Criteria testing
laboratories.[Footnote 10] While a product is undergoing evaluation,
the NIAP validation body--an activity currently managed by the National
Security Agency--approves participation of security testing
laboratories in accordance with accreditation policies and
procedures.[Footnote 11] It also reviews the results of the security
evaluations performed by the laboratories and issues a validation
report, which summarizes and provides independent validation of the
results. A product is considered NIAP-certified only after it is both
evaluated by an accredited laboratory and validated by the validation
body. Upon successful completion of these requirements, the validation
body issues a Common Criteria certificate for the evaluated product.
All evaluated products that receive a NIAP Common Criteria certificate
appear on a validated products list available on NIAP's Web site.
According to the Committee on National Security Systems[Footnote 12]--
a forum for the discussion of policy issues that sets federal policy
and promulgates direction, operational procedures, and guidance for the
security of national security systems--the fact that a product appears
on the validated products list does not by itself mean that it is
secure. A product's listing on any Common Criteria validated products
list means that the product was evaluated against its security claims
and that it has met those claims.[Footnote 13] Figure 1 outlines the
NIAP evaluation process.
Figure 1: The NIAP Evaluation Process:
[See PDF for image]
[End of figure]
In order to maintain the validity of an evaluation when a product
upgrades to its next version, a vendor can request either a re-
evaluation of the entire new product version or validation of only the
changes in the product. To request the latter, a vendor must
participate in the NIAP Assurance Maintenance Program. To participate
in this program, a vendor must submit a request that addresses how it
plans to maintain the product and a report of what will be maintained.
Vendors can select any one of the 10 accredited commercial testing
laboratories to perform product evaluations.[Footnote 14] The vendor
and testing laboratory negotiate evaluation costs, which can vary
according to the laboratory and the assurance level the product is
tested against[Footnote 15] (see fig. 2).
Figure 2: Range of Sample Cost of NIAP Evaluations to Vendors by
Evaluation Assurance Level:
[See PDF for image]
[End of figure]
Other factors that influence the overall cost of NIAP product
evaluations include:
* the scope of evaluation--the tendency of vendors to include elements
in their security target that agencies may not require introduces
additional costs; and:
* the design of the product--if a product is designed so that its
security functions are performed by a small number of modules, it may
be possible to limit the portion of the product that must be examined.
Federal Policy Requires Evaluated Products for National Security
Systems:
In January 2000, as revised in June 2003, a federal policy was
established that required the use of evaluated products for national
security systems. Specifically, the Committee on National Security
Systems established National Security Telecommunications and
Information Systems Security Policy Number 11.[Footnote 16] The policy
required, effective July 1, 2002, that all commercial-off-the-shelf
information assurance and information assurance-enabled IT products
acquired for use on national security systems be evaluated and
validated in accordance with one of the following criteria:
1. The International Common Criteria for Information Security
Technology Evaluation Recognition Arrangement,[Footnote 17]
2. The NIAP Common Criteria Evaluation and Validation Scheme,
3. The NIST Federal Information Processing Standards Cryptographic
Module Validation Program.[Footnote 18]
The objective of the policy is to ensure that these products, which are
acquired by the federal government, undergo a standardized evaluation
validating that a product either performs as its claims or meets the
user's security requirements. The policy requires that the evaluation
and validation of such products be conducted by accredited commercial
laboratories or by the National Security Agency for government off-the
shelf products. It does not require mandatory compliance for
information assurance products acquired prior to July 1, 2002, and
includes a provision for deferred compliance, on a case-by-case basis,
when information assurance-evaluated products do not cover the full
range of potential user application, or do not incorporate the most
current technology.
Moreover, while not a requirement, the federal policy includes
provisions for departments and agencies who may wish to consider using
the NIAP process for the acquisition and appropriate implementation of
evaluated and validated products for non-national security systems.
NIAP Evaluation Process Contributes to System Security, but Is Not a
Complete Solution:
The use of commercial products that have been independently tested and
evaluated is only a part of a security solution that contributes to the
overall information assurance of a product. Other complementary
controls are needed, including sound operating procedures, adequate
information security training, overall system certification and
accreditation,[Footnote 19] sound security policies, and well-designed
system architectures. According to the Committee on National Security
Systems, the protection of systems encompasses more than just acquiring
the right product. The committee notes that once acquired, these
products must be integrated properly and subjected to a system
accreditation process, as discussed above, which will help to ensure
the integrity of the information and systems to be protected.
For federal agencies, such an overall security solution is spelled out
by the Federal Information Security Management Act. The act requires
federal agencies to protect and maintain the confidentiality,
integrity, and availability of their information and information
systems. Among other things, the act requires each agency (including
agencies with national security systems) to develop, document, and
implement agencywide information security programs to provide
information security for the information and information systems that
support the operations and assets of the agency, including those
provided or managed by another agency, contractor, or other source.
More specifically, the Federal Information Security Management Act
stipulates that the head of each agency operating or exercising control
of a national security system is responsible for providing information
security protections commensurate with the risk and magnitude of harm
that could result should a security breach occur. The act also
stipulates that agency heads are responsible for implementing
information security policies and practices as required by standards
and guidelines for national security systems. The Department of Defense
and the Director of Central Intelligence have authority under the act
to develop policies, guidelines, and standards for national security
systems.
The Federal Information Security Management Act also requires NIST,
among other things, to provide technical assistance to agencies; to
evaluate private sector security policies and practices; to evaluate
commercially available IT, as well as practices developed for national
security systems; and to assess the potential application by agencies
to strengthen information security for non-national systems.
NIAP Offers Benefits for Use in National Security Systems, but Process
Faces Considerable Challenges:
While the NIAP evaluation process offers benefits to national security
systems, its effectiveness has not been measured or documented, and
considerable challenges to acquiring and using NIAP-evaluated products
exist.
NIAP Evaluation Process Offers Benefits:
NIAP process participants--vendors, laboratories, federal agencies, and
NIAP officials--identified benefits to using the process for use in
national security systems, including:
* independent testing and evaluation of IT products and accreditation
of the performing laboratories, which can give agencies confidence that
the products will perform as claimed;
* international recognition of evaluated products, which provides
agencies broader product selection and reduces vendor burden;
* discovery of software flaws in product security features and
functions, which can cause vendors to fix them; and:
* improvements to vendor development processes, which help to improve
the overall quality of current and future products.
Independent Testing and Evaluation of Products and Accreditation of
Laboratories Can Increase Product Assurance:
Independent testing and evaluation of commercial IT products and
accreditation of the laboratories that perform the test and evaluations
can give agencies increased assurance that the products will perform as
vendors claim. Independent testing is a best practice for assuring
conformance to functional, performance, reliability, and
interoperability specifications--especially for systems requiring
elevated levels of security or trust. As discussed previously, NIAP
requires vendors to obtain independent testing and evaluation of
specific security features and functions that are built into their
products. Agencies are able to use the results of validation reports to
distinguish between competing products and thus make better-informed IT
procurement decisions. Further, the Committee on National Security
Systems encourages agencies to review the security target of a product
and determine its appropriateness for the environment in which the
product will operate.
In our survey, 15 of 18 federal agencies[Footnote 20] reported that
they have derived benefits from acquiring and using products evaluated
by the NIAP process. Of these 15 agencies,
* 11 reported that the availability of evaluated products helped the
agency make IT procurement decisions;
* 9 reported that the process provided their agency with thorough and
accurate product documentation; and:
* 1 reported that evaluated products provided a common method of
performing a particular security service that is implemented in
different types of security or security-enabled devices, potentially
resulting in a greater degree of standardization of elements (such as
audit entries).
Moreover, the NIST-administered National Voluntary Laboratory
Accreditation Program (NVLAP) reviews laboratories annually to ensure
competence and compliance with standards. Accreditation is granted to
laboratories following their successful completion of a process that
includes an application submission and fee payment by the laboratory,
an on-site assessment, participation in proficiency testing, resolution
of any deficiencies identified during the process, and a technical
evaluation. The issuance of a certificate formally signifies that a
laboratory has demonstrated that it meets all NVLAP requirements and
operates in accordance with management and the technical requirements
of the relevant standards. However, the accreditation does not imply
any guarantee of laboratory performance or test and calibration data;
it is solely a finding of laboratory competence and compliance with
standards. Figure 3 shows the laboratory accreditation process.
Figure 3: Laboratory Accreditation Process:
[See PDF for image]
[End of figure]
NIAP Membership in International Recognition Arrangement Gives Agencies
Broader Product Selection and Reduces Vendor Burden:
Another benefit of the NIAP evaluation process is NIAP's membership in
the Arrangement on the Recognition of Common Criteria Certificates in
the Field of IT Security. As part of the goals of the arrangement,
members can increase the availability of evaluated IT products and
protection profiles for national use and eliminate duplicate
evaluations of IT products and protection profiles, thus giving
agencies a broader selection of evaluated products from which to
choose. Agencies have the ability to acquire products that have been
evaluated at evaluation assurance levels 1 through 4 from any of the
countries that have an evaluation scheme. As of February 2006, there
were 22 global signatories[Footnote 21] to the recognition arrangement,
and 247 evaluated products available.
The recognition arrangement also reduces the burden on vendors by
limiting the number of criteria to which their products must conform
and the number of evaluations that a vendor needs to complete in order
to sell a product internationally. Because NIAP evaluations (evaluation
assurance levels 1-4) are accepted by the arrangement, vendors that go
through the NIAP process can sell their evaluated products in any of
the 22 member countries. Vendors are able to save time and money since
they do not need to complete multiple evaluations to sell their product
in different countries.
Product Evaluations Can Uncover Flaws and Cause Vendors to Fix Them:
Another benefit of the NIAP process is that it uncovers flaws during
product evaluations and can cause vendors to fix them. NIAP, vendor,
and laboratory officials stated that the NIAP evaluation process has
uncovered flaws and vulnerabilities in evaluated products. According to
NIAP officials, software flaws are found in nearly all evaluated
products, with an evaluation resulting in an average of two to three
fixes. According to the four vendors included in our review, the NIAP
evaluation process discovered flaws or vulnerabilities in their
products or their product documentation. Also, officials from one of
the laboratories included in our review stated that out of the 90
products they have evaluated, all of them had documentation flaws.
Although vendors have the option of removing from the evaluation
security features or functions in which flaws have been identified, any
flaws in the remaining security features or functions must be fixed in
order to successfully complete the product evaluation. Nonetheless,
agencies procuring NIAP-evaluated products have a higher level of
assurance that the product's security features and functions will
perform as claimed in the validation report.
Product Evaluations Can Result in Improvements to Vendors' Development
Processes:
Product evaluations can influence vendors to make improvements to their
development processes that raise the overall quality of their current
and future products. To complete a successful evaluation, vendors
submit to laboratories their development documentation, which describes
various processes related to security, such as software configuration
controls. Officials at six of the seven vendors we visited stated that
product evaluations had a positive influence on their development
process. According to one of the six vendors, completed product
evaluations that result in improvements to their development process
would likely transfer to the development process of other products and
help improve the overall quality of their products. Laboratory
officials also stated that NIAP evaluations often result in vendors
improving their software development process because vendors adopt some
of the methodologies used to pass evaluation, such as test methods and
documentation, for their own quality assurance processes. Additionally,
we previously reported that vendors who are proactive and adopt
effective development processes and practices can drastically reduce
the number of flaws in their products.[Footnote 22]
NIAP Evaluation Process Faces Challenges:
NIAP process participants--NIAP officials and selected vendors,
laboratories, and federal agencies--identified challenges to acquiring
and using NIAP-evaluated products.
* NIAP-evaluated products do not always meet agencies' needs, which
limit agencies' acquisition and use of these products.
* A lack of vendor awareness of the NIAP evaluation process impacts the
timely completion of the evaluation and validation of products.
* A reduction in the number of validators available to certify products
could contribute to delays in validating products for agency use; and:
* A lack of performance measures and difficulty in documenting the
effectiveness of the NIAP process makes it difficult to demonstrate the
program's usefulness or improvements made to products' security
features and functions or improvements to vendors' development
processes.
Collectively, these challenges hinder the effective use of the NIAP
evaluation process by vendors and agencies.
NIAP-Evaluated Products Do Not Always Meet Agencies' Needs:
Meeting agency needs for NIAP-evaluated products for use in national
security systems can be a challenge. According to agency responses to
our survey, 10 of 18 agencies[Footnote 23] that purchased NIAP-
evaluated products reported experiencing challenges in acquiring those
products. Specifically,
* 10 agencies noted that products on the NIAP-evaluated product list
were not the most current versions; and:
* 7 agencies noted that products needed by their agency were not
included on the NIAP-evaluated product list.
Agencies also reported additional challenges for acquiring NIAP--
evaluated products. Specifically,
* choices for evaluated products are somewhat limited compared to the
general product marketplace; and:
* the length of time required for a product to complete the evaluation
process can delay availability of the most up-to-date technology.
However, opportunities exist to better match agency needs with the
availability of NIAP-evaluated products:
* Agencies can write protection profiles to define the exact security
parameter specifications that they need. For example, two of the
vendors we visited stated that they had their products evaluated
against the Controlled Access Protection Profile, which provides
agencies with a set of security functional and assurance requirements
for their IT products and also provides a level of protection against
threats of inadvertent or casual attempts to breach the system
security.
* Vendors can enter the evaluation process before their products are
publicly released, which can allow consumers to acquire the most up-to-
date technology. One vendor we visited had taken such a proactive
approach.
* Agencies can use the NIAP-validated products list to identify
products that meet their needs. Because the number of available NIAP-
evaluated products is increasing, agencies now have a variety of
products from which to choose. In January 2002, there were about 20
evaluated products. As of February 2006, there were 127 evaluated
products and 142 products in evaluation. These evaluated products span
across 26 categories of information assurance products and information
assurance-enabled products from which to choose, including operating
systems and firewalls. As products continue to enter evaluation,
agencies' needs may be better met.
* Vendors can, by participating in the NIAP Assurance Maintenance
Program, maintain the validity of an evaluation when a product upgrades
to its next version by either requesting a re-evaluation of the entire
new product version or validation of only the changes in the product.
Vendors' participation in this program may allow agencies to have the
most recent products available to them.
* Agencies can increase their selection of products through the Common
Criteria Recognition Arrangement--available on the Common Criteria
portal Web site--which currently has 247 evaluated products available.
The products listed on the Web site give agencies more choices of
products evaluated at evaluation assurance levels 4 and below.
Lack of Vendors Awareness of NIAP Evaluation Process Affects Efficiency
of Evaluations:
Another challenge faced by the NIAP process is the lack of vendor
awareness regarding the requirements of the evaluation process. For
example, vendors who are new to the evaluation process are not aware of
the extensive documentation requirements. Creating documentation to
meet evaluation requirements can be an expensive and time-consuming
process. According to laboratory officials, about six months is the
average time for vendors to complete the required documentation before
test and evaluation can begin. However, if vendors consistently
maintain their documentation, subsequent evaluations can be faster and
less expensive since the vendor has previously produced the
documentation and is already familiar with the process.
Also, some vendors are not as active as others in the evaluation
process, which can cause varying lengths of time for completing the
evaluation. Vendors who are actively involved in the process are
usually able to complete the process more quickly, including fixing
flaws, than those who are not actively involved. According to one
laboratory, the more active a vendor is in the evaluation process, the
faster and less expensive it will be for the vendor. As such, the
amount of involvement by the vendor during the process and the
timeliness with which it fixes discovered flaws affects the length of
time the product is in evaluation.
Furthermore, some vendors and laboratories do not have the same
perception of the length of time required to perform the evaluation.
According to laboratory officials, the length of time needed for
conducting product evaluations varies depending on the type of product
being evaluated and the evaluation assurance level (see fig. 4).
Vendors are often not aware of these requirements and tend to
underestimate the length of time required for evaluations.
Figure 4: Range of Time Required for Completing Product Evaluations at
Various Evaluation Assurance Levels:
[See PDF for image]
[End of figure]
Vendors and laboratories also perceive the length of evaluations
differently because they punctuate start and end dates differently.
Vendors measure the length of an evaluation from the day they decide to
go into evaluation to the day they receive their product certificate.
Their measurement includes selecting and negotiating with a laboratory,
preparing required documentation, and testing the security features and
functions. Laboratories, on the other hand, consider the length of an
evaluation to be from the day they sign a contract with the vendor to
the day they complete testing.
While Common Criteria user forums for program participants have been
held, which NIAP participated in, NIAP itself has not developed
education and training workshops that focus on educating participants
on specific requirements--such as the documentation requirements. These
workshops could help ensure that vendors and laboratories are aware of
the NIAP process and could contribute to the efficiency of product
evaluations. NIAP officials acknowledge that such educational offerings
could be beneficial.
Reduction in the Number of Validators May Affect Timeliness of
Certifications:
Over the last year, NIAP has seen a reduction in the number of
qualified validators. NIAP officials stated that one of the most
significant challenges the NIAP process faces is hiring and maintaining
qualified personnel to validate products. In fiscal year 2005, the NIAP
program lost approximately four government validators and six
contractor validators. According to the NIAP Director, maintaining
qualified personnel to perform validation tasks is difficult largely
because many validators are nearing retirement age and the job is not
an attractive position for recent college graduates. Validators have a
complex job with tasks that span the entire evaluation process; they
incrementally review the results of the various tests of functional and
assurance requirements as they are completed by the laboratory. As a
result, once validators are hired, it typically takes 12 to 24 months
to train new validators to become proficient in performing validation
tasks.
If the NIAP program continues to see a reduction in validators, there
could be an increased risk that a backlog of products needing to obtain
NIAP certifications will develop, which could also impact the already
lengthy evaluation process. The number of products entering evaluation
is steadily increasing (in fiscal year 2002 there were approximately 20
products in evaluation and as of February 2006, there were 142 products
in evaluation). Additionally, approximately five to seven products
enter into evaluation each month. To address the widening gap between
the number of products entering the process and the number of
validators available to review products, NIAP intends to pursue
legislation allowing it to recoup the costs of validations and hire
additional staff.
Lack of Performance Measures and Difficulty in Documenting the
Effectiveness of the NIAP Process:
A best practice in public and private organizations is the use of
performance measurements to gain insight into--and make adjustments to-
-the effectiveness and efficiency of programs, processes, and
people.[Footnote 24] Performance measurement is a process of assessing
progress toward achieving predetermined goals, and includes gathering
information on the efficiency with which resources are transformed into
goods and services, the quality of those outputs, and the effectiveness
of government operations in terms of their specific contributions to
program objectives. Establishing, updating, and collecting performance
metrics to measure and track progress can assist organizations in
determining whether they are fulfilling their vision and meeting their
customer-focused strategic goals.
The NIAP program lacks performance metrics to measure process
effectiveness and thus faces difficulty in documenting its
effectiveness. The program has not collected and analyzed data on the
findings, flaws, and fixes resulting from product tests and
evaluations. NIAP officials pointed out that nondisclosure agreements
between laboratories and vendors make it difficult to collect and
document such data. According to NIAP officials, there is existing
laboratory information on findings, flaws, and fixes, but it has not
been collected because of nondisclosure agreements. Nondisclosure
agreements are important for protecting vendors' proprietary data from
being released to the public and competitors. However, releasing
summary laboratory information on findings, flaws and fixes, while at
the same time considering the requirements of nondisclosure agreements,
could be beneficial to determining the effectiveness of the NIAP
program. Without this type of information, NIAP will have difficulty
demonstrating its effectiveness and will be challenged to know and to
demonstrate whether the process is meeting its goals.
Expanding NIAP Requirement to Non-national Security Systems May Yield
Many of the Same Benefits and Challenges and Could Exacerbate Resource
Constraints:
While the National Security Telecommunications and Information Systems
Security Policy Number 11 already allows agencies with non-national
security systems to acquire NIAP-evaluated products, expanding the
policy to mandate that such systems acquire NIAP-evaluated products may
yield many of the same benefits and challenges experienced by current
process participants, and could further exacerbate resources. For
example, one identified benefit for national security systems--
independent testing and evaluation of IT products--gives agencies
confidence that validated features of a product, whether acquired for
national or non-national security systems, will perform as claimed by
the vendor. Similarly, one challenge--a reduction in the number of
validators for certifying products--could contribute to delays in
validating products, whether for national or non-nation security
systems. Further, expanding the requirement to mandate the policy for
non-national security systems may further exacerbate current resource
constraints, related to hiring and maintaining qualified personnel to
validate products.
Nevertheless, agencies with non-national security systems have in fact
acquired NIAP-evaluated products. Specifically, ten of the federal
agencies we surveyed indicated that they have used the NIAP process to
acquire evaluated products for non-national security systems, even
though they are not required to do so. One agency is considering the
use of NIAP-evaluated products during its product reviews, and is also
considering including NIAP-evaluated products as part of its
procurement strategy.
Moreover, agencies seeking information assurance for their non-national
security systems, but who do not acquire NIAP-evaluated products, have
guidance and standards available to them. Specifically, as required by
the Federal Information Security Management Act, NIST has developed and
issued standards and guidelines, including minimum information security
requirements, for the acquisition and use of security-related IT
products for non-national security systems.[Footnote 25] These
standards and guidelines are to be complementary with those established
for the protection of national security systems and information
contained in such systems. Further, NIST issued additional guidance to
agencies for incorporating security into all phases of the system
development life cycle process[Footnote 26] as a framework for
selecting and acquiring cost-effective security controls. In August
2000, NIST also issued guidance on security assurance for non-national
security systems in NIST Special Publication 800-23: Guideline to
Federal Organizations on Security Assurance and Acquisition/Use of
Tested/Evaluated Products.
Conclusions:
While a range of controls are needed to protect national security
systems against increasingly sophisticated cyber attacks, establishing
effective policies and processes for acquiring products that have been
validated by an independent party is important to the federal
government's ability to procure and deploy the right technologies.
Acquiring NIAP-evaluated products can increase the federal government's
confidence that its IT products and systems will perform security
features and functions as claimed. Despite the benefits of acquiring
and using IT products that have gone through the rigorous tests and
evaluations of NIAP, the program faces considerable challenges that
hinder its effective use by vendors and agencies. These challenges
include the difficulty in matching agencies' needs with the
availability of NIAP-evaluated products, vendors' lack of awareness
regarding the evaluation process, a reduction in the number of
validators to certify products, and difficulty in measuring and
documenting the effectiveness of the NIAP process. Until these
challenges are addressed, they will continue to undermine the efficacy
of NIAP. Regarding expanding the NIAP requirement to non-national
security systems, pursing this approach may further exacerbate current
resource constraints.
Recommendations for Executive Action:
To assist the NIAP in documenting the effectiveness of the NIAP
evaluation process, we recommend that the Secretary of Defense direct
the Director of the National Security Agency, in coordination with NIST
under the provisions of the NIAP partnership, to take the following two
actions:
1. Coordinate with vendors, laboratories, and various industry
associations that have knowledge of the evaluation process to develop
awareness training workshops for program participants.
2. Consider collecting, analyzing, and reporting metrics on the
effectiveness of NIAP tests and evaluations. Such metrics could include
summary information on the number of findings, flaws, and associated
fixes.
Agency Comments and Our Evaluation:
In providing written comments on a draft of this report (reprinted in
app. III), the Deputy Assistant Secretary of Defense (Deputy Chief
Information Officer), partially agreed with one of our recommendations,
agreed with the other, and described ongoing and planned efforts to
address them. While the Deputy Assistant Secretary agreed with our
recommendation to develop awareness training workshops for NIAP program
participants, she stated that the NIAP must also live with the
realities of the challenges that we identified in our report. The
Deputy Assistant Secretary noted that, as our report highlights, the
NIAP program is facing considerable challenges with resources and
funding to sustain the current day-to-day running of the program and
that it is not feasible for the NIAP office to increase its current
efforts in developing and hosting the recommended training and
education. Nonetheless, she also noted that the Secretary of Defense
should direct the Director of the National Security Agency, in
coordination with the NIST under the provisions of the NIAP, to
coordinate with the vendors, laboratories, and various industry
associations that have knowledge of the evaluation process to develop
awareness training workshops for program participants within the
current constraints and to work with the commercial laboratories,
vendors, and others to identify ways that organizations outside of NIAP
can further this initiative. We agree that NIAP should continue its
efforts in awareness and education training, and endorse increasing
such efforts as resources permit.
The Deputy Assistant Secretary agreed with our recommendation to
collect, analyze, and report metrics on the effectiveness of NIAP tests
and evaluations, and stated that the NIAP has already started
researching ways to institute metrics to help determine the
effectiveness of the evaluation program. She noted that the goal of
collecting metrics is to demonstrate to the NIAP constituency that NIAP
evaluations do provide value by improving the security of the evaluated
products and by providing the end customer with assurance that these
products perform their security functions as intended even when faced
with adverse conditions.
The Department of Defense and the Department of Homeland Security also
provided technical comments, which we considered and addressed in our
report, as appropriate.
We are sending copies of this report to the Departments of Commerce
(National Institute of Standards and Technology), Defense, and Homeland
Security; the Office of Management and Budget; the General Services
Administration, and to other interested parties. In addition, the
report will be available at no charge on the GAO Web site at
http://www.gao.gov.
If you or your staff have any questions about this report, please
contact me at (202) 512-6244 or [Hyperlink, wilshuseng@gao.gov].
Contact points for our Offices of Congressional Relations and Public
Affairs may be found on the last page of this report. GAO staff who
made major contributions to this report are listed in appendix IV.
Sincerely yours,
Signed by:
Gregory C. Wilshusen:
Director, Information Security Issues:
[End of section]
Appendixes:
Appendix I: Objectives, Scope, and Methodology:
Our objectives were to identify (1) the governmentwide benefits and
challenges of the National Information Assurance Partnership (NIAP)
evaluation process; and (2) the potential benefits and challenges of
expanding the requirement of NIAP to non-national security systems,
including sensitive but unclassified systems.
To determine the benefits and challenges for both objectives, we
analyzed and reviewed a number of policy documents and reports from
both industry and government. We also reviewed relevant federal
policies relating to information security issues. To gain insight into
the NIAP evaluation process, we met with software vendors and
certification laboratories to discuss their experiences with NIAP,
their applicable processes, and reviewed their relevant documentation.
We selected vendors based on broad or distinguishing product
capabilities demonstrating a range of features, brand recognition based
on high ratings received in reviews conducted by information security
magazines, and vendors mentioned more frequently in various discussions
with industry experts and in information security literature. Vendors
selected represented different information technology (IT) market
sectors, are considered leaders in their field, and varied in size.
To determine the industrywide perspective on NIAP, we met with two IT
industry groups: The Information Technology Association of America and
Cyber Security Industry Alliance. We selected these industry groups
because they represent a cross-section of the IT industry as a whole.
To gain insight into the program's functions and usefulness to
agencies, we spoke with government officials from the Department of
Commerce (specifically the National Institute of Standards and
Technology), Department of Defense, Department of Homeland Security,
General Services Administration, and the Office of Management and
Budget. We also surveyed officials from the 24 federal agencies
designated under the Chief Financial Officers Act of 1990 to determine
their current use of NIAP-evaluated products, the perceived usefulness
of the program, and the benefits and challenges associated with
acquiring and using NIAP-evaluated products.
For each agency survey, we identified the office of the chief
information officer, notified them of our work, and distributed the
survey instrument to each via an e-mail attachment. In addition, we
discussed the purpose and content of the survey instrument with agency
officials when requested. All 24 agencies responded to our survey. We
did not verify the accuracy of the agencies' responses; however, we
reviewed supporting documentation that agencies provided to validate
their responses. We contacted agency officials when necessary for
follow-up information. We then analyzed the agencies' responses.
Although this was not a sample survey, and, therefore, there were no
sampling errors, conducting any survey may introduce other kinds of
errors. For example, difficulties in how a particular question is
interpreted, in the sources of information that are available to
respondents, or in how the data are entered into a database (or were
analyzed) can introduce unwanted variability into the survey results.
We took steps in the development of the survey instrument, the data
collection, and the data analysis to minimize these survey-related
errors. For example, we developed the questionnaire in two stages.
First, we had a survey specialist design the survey instrument in
collaboration with subject-matter experts. Then, we pretested the
instrument at two federal departments and internally at GAO to ensure
that questions were relevant, clearly stated, and easy to answer.
We conducted our work in Washington, D.C., from May 2005 through
February 2006, in accordance with generally accepted government
auditing standards.
[End of section]
Appendix II: Common Criteria Evaluation Assurance Levels:
Table 1: Summary of the Common Criteria Evaluation Assurance Levels:
Evaluation assurance level: 1;
What is tested: Functionality;
Description: Evaluation provides independent testing against a
specification and an examination of the guidance documentation. Used
when confidence in correct operation is required but the threats to
security are not viewed as serious.
Evaluation assurance level: 2;
What is tested: Structure;
Description: Evaluation provides a low to moderate level of
independently assured security as required by vendors or users.
Evaluation assurance level: 3;
What is tested: Methodology;
Description: Evaluation provides an analysis supported by testing,
selective independent confirmation of the vendor test results, and
evidence of a vendor search for obvious vulnerabilities.
Evaluation assurance level: 4;
What is tested: Methodology and Design;
Description: Evaluation provides a moderate to high level of
independently assured security in conventional commodity products.
Testing is supported by an independent search for obvious
vulnerabilities.
Evaluation assurance level: 5;
What is tested: Semiformal Design;
Description: Evaluation provides a high level of independently assured
security in a planned development, with a rigorous development
approach. The search for vulnerabilities must ensure resistance to
penetration attackers with a moderate attack potential.
Evaluation assurance level: 6;
What is tested: Semiformal Verified Design;
Description: Used for the development of specialized security products,
for application in high risk situations. The independent search for
vulnerabilities must ensure resistance to penetration attackers with a
high attack potential.
Evaluation assurance level: 7;
What is tested: Formal Design;
Description: Used in the development of security products for
application in extremely high risk situations. Evidence of vendor
testing and complete independent confirmation of vendor test results
are required.
Source: GAO analysis of Common Criteria data.
[End of table]
[End of section]
Appendix III: Comments from the Department of Defense:
DEPARTMENT OF DEFENSE:
CHIEF INFORMATION OFFICER:
6000 DEFENSE PENTAGON:
WASHINGTON, DC 20301-6000:
March 21, 2006:
Mr. Gregory C. Wilshusen:
Director, Information Security Issues:
U.S. Government Accountability Office:
441 G Street, N.W.
Washington, D.C. 20548:
Dear Mr. Wilshusen:
This is the Department of Defense (DoD) response to the GAO Draft
Report, GAO-06-392, "INFORMATION ASSURANCE: National Partnership Offers
Benefits, but Faces Considerable Challenges," dated March 10, 2006, GAO
Code 310551. The DoD has reviewed the report and concurs with the
findings, partially concurs with Recommendation 1, and concurs with
Recommendation 2.
Enclosure 1 contains the DoD response and rationale for the report's
two recommendations to the Secretary of Defense. Enclosure 2 contains
general administrative comments offered by the DoD reviewers of the
draft report.
Sincerely,
Signed for:
Priscilla E. Guthrie:
Deputy Assistant Secretary of Defense (Deputy CIO):
GAO DRAFT REPORT DATED MARCH 10, 2006 GAO-06-392 (GAO CODES 310551):
"INFORMATION ASSURANCE: NATIONAL PARTNERSHIP OFFERS BENEFITS, BUT FACES
CONSIDERABLE CHALLENGES"
DEPARTMENT OF DEFENSE COMMENTS TO THE GAO RECOMMENDATION:
RECOMMENDATION 1: The GAO recommended that the Secretary of Defense
direct the Director of the National Security Agency, in coordination
with the National Institute of Standards and Technology under the
provisions of the National Information Assurance Partnership (NIAP) to
coordinate with the vendors, laboratories, and various industry
associations that have knowledge of the evaluation process to develop
awareness training workshops for program participants. (p. 29/GAO Draft
Report):
DOD RESPONSE: Partial Concur:
While DoD agrees with the recommendation to promote awareness training
and understanding of the NIAP CCEVS, we also must live with the
realities of the challenges identified in the GAO report. NIAP has and
will continue to work with vendors, labs and industry associations to
provide awareness training and education. Over the past year, the NIAP
has provided briefings at a wide variety of for a, such as the Federal
Information Assurance Conference, the DoD Identity Management
Conference, the Cross Domain Solutions Workshop, and the Annual
Computer Security Applications Conference. The NIAP has also been
working closely with the Common Criteria User's Forum and the newly
established Common Criteria Vendor's Forum on education and awareness
efforts. Unfortunately, as the report highlights, the NIAP program is
facing considerable challenges with resources and funding to sustain
the current day-to-day running of the program. When coupled with the
significant loss of support for the NIAP from KIST due to higher
priorities within NIST, and increasing pressures on DoD resources to
support current military operations supporting the Global. War On
Terrorism, it is not feasible for the NIAP office to increase its
current efforts in developing and hosting the recommended awareness
training and education. The Secretary of Defense should direct the
Director of the National Security Agency, in coordination with the
NIST, under the provisions of the NIAP, to coordinate with the vendors,
laboratories, and various industry associations that have knowledge of
the evaluation process to develop awareness training workshops for
program participants within the current constraints and to work with
the commercial labs, vendors, and others to identify ways that
organizations outside of NIAP can further this initiative.
RECOMMENDATION 2: The GAO recommended that the Secretary of Defense
direct the Director of the National Security Agency, in coordination
with the National Institute of Standards and Technology under the
provisions of the NIAP to consider collecting, analyzing, and reporting
metrics on the effectiveness of NIAP tests and evaluations; such
metrics could include summary information on the number of findings,
flaws, and associated fixes. (p. 29/GAO Draft Report):
DOD RESPONSE: Concur.
NIAP CCEVS has already started researching ways to institute metrics to
help determine the effectiveness of the evaluation program. NIAP CCEVS
has already begun collecting metrics on the effectiveness of NIAP
testing. In CY 2004 and 2005, most of the metrics collected were based
on informal queries to the NIAP labs and were gathered to provide some
general statistics during NIAP presentations. Since that time, based on
requests from the Committee for National Security Systems, NIAP CCEVS
has begun collecting additional general metrics and anecdotes from
their commercial labs on how evaluations have improved vendor products.
NIAP CCEVS has also begun collecting specific detailed metrics through
their NIAP Monthly Status Reports, which are required for each
evaluation in progress. In addition, NIAP CCEVS is developing a
template for a comprehensive end-of-evaluation report which will detail
all changes or improvements made to the product or the vendor's
processes during the evaluation process. This will include fixes to
critical user documentation, improvements to vendor processes, and
changes to the product itself. The goal of collecting these metrics is
to demonstrate to the NIAP constituency that NIAP evaluations provide
value by improving the security of the evaluated products and by
providing the end customer with assurance that these products perform
their security functions as intended, even when faced with adverse
conditions.
[End of section]
Appendix IV: GAO Contact and Staff Acknowledgments:
GAO Contact:
Gregory C. Wilshusen, Director, Information Security Issues, (202) 512-
6244:
Staff Acknowledgments:
In addition to the individual named above, Jenniffer Wilson (Assistant
Director), Neil Doherty, Jennifer Franks, Joel Grossman, Matthew Grote,
Min Hyun, Anjalique Lawrence, J. Paul Nicholas, Karen Talley, and Amos
Tevelow were key contributors to this report.
(310551):
FOOTNOTES
[1] National security systems are telecommunications and information
systems under control of the United States government which contain
classified information or the function, operation, or use of which
involves intelligence activities, cryptologic activities related to
national security, command and control of military forces, equipment
that is an integral part of a weapon or weapon system; or is critical
to the direct fulfillment of military or intelligence missions.
[2] An information assurance product is an information technology (IT)
product or technology that primarily provides security services (such
as confidentiality and integrity), corrects known vulnerabilities, and
provides layered defense against various categories of non-authorized
and malicious penetration of information systems or networks. An
information assurance-enabled product is an IT product or technology
that provides security services as an associated feature of its
intended operating capabilities, rather than as its primary role.
[3] Information assurance refers to measures that defend and protect
information and information systems by ensuring their confidentiality,
integrity, authenticity, availability, and utility.
[4] The Director of the National Security Agency is the Department of
Defense focal point for National Information Assurance Partnership
(NIAP).
[5] Known as the Common Criteria, the international standard contains
IT security requirements, constructs for describing IT security
objectives, and a framework for writing high-level security
specifications for a product. It specifies functional security
requirements and seven predefined assurance packages, referred to as
evaluation assurance levels.
[6] Evaluation assurance levels provide a reference for the amount of
analysis and testing performed on a product.
[7] Computer programs that are stored in read-only memory are called
firmware.
[8] Protection profiles define a security problem for a given
collection of systems or products and delineate security requirements
to address that problem without specifying how these requirements will
be implemented. U.S. government protection profiles are developed into
one of three robustness levels--basic, medium, and high.
[9] A security target is a specifications document that describes the
security functionality of a product and the environment in which it
will operate. The security target details the desired evaluation
assurance levels that the vendor wants the product to be tested
against. Vendors can also claim conformance to a protection profile in
their security targets.
[10] The National Voluntary Laboratory Accreditation Program (NVLAP) is
administered by the National Institute of Standards and Technology
(NIST), and operates as an unbiased third-party to accredit testing and
calibration laboratories in many fields. NVLAP operates on a cost-
reimbursable basis from fees paid by participating laboratories.
[11] According to NIAP, as the initiative has evolved, the National
Security Agency has assumed all of the validation responsibilities;
NIST no longer participates in discharging these responsibilities.
[12] The Committee on National Security Systems consists of
representatives from 20 U.S. government departments and agencies who
are given voting privileges on all committee activities. National
Security Directive 42 specifies the membership of the committee. The
Assistant Secretary of Defense for Networks and Information
Integration/Department of Defense Chief Information Officer serves as
the chair of the committee.
[13] Federal agencies and consumers should review the security targets
that describe the threats, objectives, and requirements against which
the product has been tested to determine if the product is appropriate
for a particular application or system and that it provides adequate
information security protections for the intended operational
environment.
[14] Products whose evaluations have assurance components above
assurance level 4 must be tested by the National Security Agency for
that portion of the product's features and function that are above
level 4.
[15] NVLAP identifies NVLAP-accredited laboratories on its Web site.
Accreditation criteria are established in accordance with the U.S. Code
of Federal Regulations (CFR, Title 15, Part 285), NVLAP Procedures and
General Requirements, and encompass the requirements of ISO/IEC 17025
and the relevant requirements of ISO 9002.
[16] The Committee on National Security Systems was formerly known as
the National Security Telecommunications and Information Systems
Security Committee.
[17] In October 1998, the U.S., Canada, France, Germany, and the United
Kingdom signed an arrangement for Common-Criteria-based security
evaluations covering evaluated assurance levels 1-4 known as the
Arrangement on the Recognition of Common Criteria Certificates in the
Field of IT Security. The arrangement sought to create a situation in
which IT products and protection profiles that earn a Common Criteria
certificate in one arrangement member country can be procured or used
without the need for further evaluation in other arrangement member
countries.
[18] The policy requires that any commercial off-the-shelf information
assurance or information assurance-enabled product using cryptographic
technology be certified by the Cryptographic Module Validation Program,
which evaluates products for conformance to FIPS 140-2, Security
Requirements for Cryptographic Modules.
[19] Certification is a comprehensive evaluation of security controls
that provides the necessary information for a designated approving
authority to formally declare that a system is approved to operate at
an acceptable level of risk. Accreditation is the authorization of an
information system to process, store, or transmit information that
provides a form of quality control. The accreditation decision, which
is supported by the certification, provides the necessary information
for a designated approving authority to formally declare that a system
is approved to operate.
[20] Twenty-four agencies completed the survey: fifteen agencies
identified benefits; three did not; the remaining six agencies did not
purchase any NIAP-evaluated products.
[21] The 22 countries include the certificate-authorizing countries--
Australia, Canada, France, Germany, Japan, New Zealand, The
Netherlands, United Kingdom, and the United States; and certificate-
consuming countries--Austria, Czech Republic, Finland, Greece, Hungary,
India, Israel, Italy, Norway, Republic of Singapore, Spain, Sweden and
Turkey. Of the 22 signatories, 9 have evaluation schemes that authorize
them to certify products in accordance with the arrangement. The
remaining signatories do not have a scheme but have agreed to accept
the certificates authorized by countries with schemes.
[22] GAO, Information Security: Continued Action Needed to Improve
Software Patch Management, GAO-04-706 (Washington, D.C.: June 2004).
[23] Although 24 agencies completed the survey, 18 purchased NIAP-
evaluated products; the remaining 6 agencies did not.
[24] National Performance Review, Serving the American Public: Best
Practices in Performance Measurement, June 1997,
http://govinfo.library.unt.edu/npr/library/papers/benchmrk/nprbook.html.
[25] In February 2005, NIST issued "Recommended Security Controls for
Federal Information Systems" (Special Publication 800-53) to provide
guidelines for selecting and specifying security controls for
information systems categorized in accordance with FIPS Publication
199, "Standards for Security Categorization of Federal Information and
Information Systems," issued in February 2004.
[26] The phases of a system life cycle, as defined by NIST, are:
initiation, development/acquisition, implementation, operation and
maintenance, and disposition.
GAO's Mission:
The Government Accountability Office, the investigative arm of
Congress, exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO's commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as "Today's Reports," on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order
GAO Products" heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office
441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm
E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director,
NelliganJ@gao.gov
(202) 512-4800
U.S. Government Accountability Office,
441 G Street NW, Room 7149
Washington, D.C. 20548: