Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges

Loading...
Thumbnail Image
File version

Version of Record (VoR)

Author(s)
Sun, Nan
Li, Chang-Tsun
Chan, Hin
Le, Ba Dung
Islam, Md Zahidul
Zhang, Leo Yu
Islam, Md Rafiqul
Armstrong, Warren
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
2022
Size
File type(s)
Location
Abstract

Advances in emerging Information and Communications Technology (ICT) technologies push the boundaries of what is possible and open up new markets for innovative ICT products and services. The adoption of ICT products and systems with security properties depends on consumers’ confidence and markets’ trust in the security functionalities and whether the assurance measures applied to these products meet the inherent security requirements. Such confidence and trust are primarily gained through the rigorous development of security requirements, validation criteria, evaluation, and certification. The Common Criteria for Information Technology Security Evaluation (often referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for cyber security. Motivated by encouraging the adoption of the CC that is used for ICT security evaluation and certification, in this paper, we conduct a systematic review of the CC standard and its adoptions. Adoption barriers of the CC are investigated based on the analysis of current trends in cyber security evaluation. In addition, we share the experiences and lessons gained through the recent Development of Australian Cyber Criteria Assessment (DACCA) project on the development of the Protection Profile that defines security requirements with the CC. Best practices, challenges, and future directions on defining security requirements for trusted cyber security advancement are presented.

Journal Title

IEEE Access

Conference Title
Book Title
Edition
Volume

10

Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/

Item Access Status
Note
Access the data
Related item(s)
Subject

Engineering

Information and computing sciences

Science & Technology

Technology

Computer Science, Information Systems

Engineering, Electrical & Electronic

Telecommunications

Persistent link to this record
Citation

Sun, N; Li, C-T; Chan, H; Le, BD; Islam, MZ; Zhang, LY; Islam, MR; Armstrong, W, Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges, IEEE Access, 2022, 10, pp. 44756-44777

Collections