首页 国产 亚洲 小说图片,337p人体粉嫩胞高清视频,久久精品国产72国产精,国产乱理伦片在线观看

不支持Flash
新浪財經

atsec完成IBM z/OS V1R8評估 獲EAL4+級別認證

http://www.sina.com.cn 2007年05月28日 11:29 PRNEWS.cn中國商業電訊

  

atsec完成IBMz/OSV1R8評估獲EAL4+級別認證

  北京 2007-05-28(中國商業電訊)--近日,atsec信息安全完成了IBM z/OS V1R8的通用評估準則(Common Criteria)評估,這也是目前世界上最為大型且復雜的操作系統的評估。

  z/OS的首款經過評估的產品V1R6于2005年在EAL3評估保障級別上完成,并于2006年針對增加的安全特性完成了EAL4級別的重新評估。本次IBM z/OS V1R8在EAL4+級別的重新評估關注于增強的重要安全功能,并提供了產品典型安裝和操作形式的保障。產品的安全目標(ST:Security Target)闡明了評估的目標,該文檔公開在atsec官方網站的CC評估頁面。評估一些重要的特性包括z System服務器包括所有可選的密碼板卡(crypto boards );增加的認證機制:X.509證書、Kerberos tickets、IBM PassTickets、和基于LDAP DNS的認證,這些機制是傳統的密碼機制的增補;安全通訊:除了SSL/TLS和IPSec,可以提供OpenSSH和Kerberos ;包括LDBM和后臺SDBM的完整IBM Tivoli目錄服務器;LDBM提供了可從其它已評估的ITDS產品獲知訪問控制的“傳統的”LDAP 數據庫,而SDBM通過LDAP接口提供RACF用戶管理的訪問;ALC_FLR.3增補,針對維護(maintenance)可實現的最高的保障組件(assurance component);atsec信息安全是世界上首屈一指的大型、復雜

操作系統的評估機構。只有為數不多的評估機構擁有經驗和自信承擔如此巨大的任務。

  IBM的資深工程師和首席System z架構師Jim Porell評論:“z/OS 1.8的通用評估準則(Common Criteria)評估是一項艱巨的工作,需要IBM和atsec保持密切合作。在IBM,我們的目標是提供具有重要的服務器功能和安全能力的操作系統,從而滿足客戶的業務需要。通用評估準則(Common Criteria)提出了針對開發流程和保護輪廓(Protection Profiles)的最佳定義,從而滿足業務需求。對于評估的結果以及和atsec的工作關系,我們感到非常高興。”(原文如下:”The Common Criteria Evaluation of z/OS 1.8 was a complex effort requiring cooperation between IBM and atsec. Our goal, at IBM, has been to deliver an operating system that can provide valuable server functionality and security capabilities to meet our customers' business needs. The Common Criteria provides a good definition of the development processes and protection profiles that can be deployed to satisfy those business needs. We are pleased with the results of this evaluation and our working relationship with atsec.”)

  Marvin Schaefer,前美國安全局(NSA:National Security Agency)國家計算機安全中心(National Computer Security Center)首席科學家,補充道:“IBM的z/OS Version 1 Release 8操作系統由1970年底推出的強大而復雜的MVS操作系統發展而成。當時,其訪問控制機制還比較弱且易于攻破。甚至在之后集成了RACF,當時的系統仍存在安全危機,而且由于其結構和實現的復雜度,基于美國國防部(Department of Defense)的可信計算機系統評估準則(TCSEC:Trusted Computer System Evaluation Criteria,也即桔皮書)去評估其安全策略(Security Policy)和機制,是非常困難和耗時的。它的首次評估由國家計算機安全中心(NCSC)花了多年時間進行,且僅僅成功完成了部分工作。基于以上原因,IBM增加了可觀的投入,開展MVS/RACF的重新構建,將其與支持的硬件安全機制相集成 – 更重要的是,引入了安全策略(Security policy)-- 他們來源于設計、文檔和編程的規范性。目前的z/OS系統比先前的MVS更為豐富且復雜。因為系統安全成為了核心的設計原則,且開發工作與獨立的評估團隊緊密配合,使得識別和分析z/OS的大量接口及其權限管理這項艱巨的任務成為了可能。通過與評估團隊密切協力地工作,z/OS的接口和權限管理已經被文檔化,比如多于一年時間進行的完整嚴格評估的授權許可。此外,最近25年多來,我與IBM和atsec很多高級雇員多次合作,我了解這項評估是全面深入的,而不是僅僅停留在表面,感謝atsec評估團隊成熟的安全原則知識,以及他們識別和挖掘安全脆弱性的技術貢獻。我非常有信心z/OS以及所完成的評估代表了非凡的技術成就。”(原文如下:"IBM's z/OS Version 1 Release 8 operating system evolved from what was, in the late 1970s, the powerful, but complex, MVS operating system. At that time, its access control mechanisms were quite weak and easily defeated. Even with the integration of RACF, the system was not only subject to compromise, but because of the complexity of its structure and implementation, it was extremely difficult and time-consuming to evaluate its security policy and mechanisms against the criteria of the US Department of Defense Trusted Computer System Evaluation Criteria (the Orange Book). Its initial evaluation by the National Computer Security Center (NCSC) took years, and was only partially successful. As a consequence, IBM made a considerable investment in restructuring MVS/RACF and integrating it with supportive hardware security mechanisms -- and more importantly, with a security policy-driven discipline of design, documentation and programming. The resulting system, z/OS, is considerably richer and more complex than its antecedent MVS. Because system security became a central design principle, and because the development effort was closely coordinated with the independent team of evaluators, the formidable task of identifying and analyzing z/OS's large set of interfaces and its management of privilege became tractable. Through close and co-operative work with its evaluators, z/OS's interfaces and management of privilege have been documented such as to permit a full and rigorous assessment to be completed in a little more than a year. Further, over the last quarter century I have collaborated with senior IBM and atsec staff and know that this evaluation was anything but superficial, thanks to the atsec evaluation team's mature knowledge of security principles as well as their corpus of techniques for identifying and exploiting security vulnerabilities. I have full confidence that z/OS and its completed evaluation represent an exceptional technological achievement.")

  操作系統的評估是測評領域最需要技術實力的,從atsec最初作為CC評估實驗室的歷史來看,它在德國BSI和美國CCEVS體系下的操作系統評估領域具有領先的優勢。atsec在此領域的評估記錄包括IBM AIX 5.3(CAPP和LSPP);5個不同平臺的12個Linux版本;IBM z/OS V1R7的EAL4+級別;以及zSeries-based z/VM和PR/SM虛擬機和邏輯分區產品。atsec已經完成了2個IBM PR/SM產品的EAL5級別的評估。

  自從2002年atsec獲得德國BSI的授權成為CC實驗室,atsec共完成了40多個評估項目。隨后2005年完成了美國CCEVS體系的授權,此外2006年atsec獲得瑞典CSEC體系授權的臨時CC實驗室。今天,atsec的安全專家有信心在上述三個體系下提供高質量的結果和最大限度的適應性。

  atsec在CC產業的領導地位同樣表現在對標準研發的貢獻。貢獻的層面不僅僅在新版本標準的測評和體系文獻的發布,也包括推動標準的適用范圍應用于大型、復雜的系統。與德國BSI協同合作,atsec曾經執行了基于處于草稿版本CC v3的保障級別EAL4的Linux多方面原型評估。目前atsec正在執行首例瑞典CSEC體系下的EAL4評估。

  廣泛的經驗以及atsec評估團隊的諸多成功案例已經使得公司在此產業領域具有絕對優勢,可以在令人羨慕的短時間內完成復雜產品的評估。這是至關重要的,因為在CC評估世界里,時間就是金錢。發起者在證書完成時便開始得到投資回報—所以與能夠有效地完成評估流程的合作者協同工作將具有巨大的價值。

  德國atsec信息安全CC實驗室總監Gerald Krummeck補充道:“關于本次成功,我們感到非常自豪:這是至今CC領域最為復雜的評估。IBM和atsec的戰略是首先從EAL3評估工作開始,然后提高至EAL4級別,在此過程中不斷補充有價值的安全功能,使得完整、現實系統的認證成為可能,而且其保障級別滿足了客戶重要業務操作的要求。”(原文如下:“We are very proud about this success: this is the most complex evaluation ever attempted under Common Criteria. IBM's and atsec's strategy to start the evaluation effort at EAL3, then move to EAL4 while constantly adding valuable security functionality made it possible to deliver a certificate for a complete, real-world system with a level of assurance that customers require for their business-critical operations.”)

  除了令人羨慕的成功記錄和復雜評估的及時完成,atsec在評估交付的質量方面建立了國際聲譽。atsec使用CC評估方法為客戶帶來最大的收益。中間過程和最終的報告展示了所呈交的文檔證明資料(Evidence)內容的全面分析,從而為發起者在產品和流程提高上提供了真實的價值(不僅僅是粗略的瀏覽證明文檔或簡單的填寫需求的checklist去獲得證書)。實際項目中,開發人員制定的保障證明是正規的開發流程的一部分,這些文檔也一直融入于atsec評估流程之中。

愛問(iAsk.com)
不支持Flash
不支持Flash
不支持Flash