My Authors
Read all threads
I've read several misconceptions about Common Criteria certifications. Typically:
- "Components producers pay for certification"
- "Certifications test only against a known set of predefined scenarios"
- "Certifications are not a replacement for independant review"

Thread👇
(2/n)
In a Common Criteria Certification process (for a circuit). There are 4 actors:
1. The sponsor (SP)
2. The chip manufacturer (CM)
3. The 3rd party evaluation lab (lab)
4. The Certification body (CB)
(3/n)
Often SP and CM is the same entity, but not always.

The lab is an independant security eval entity accredited by the CB. There's no commercial relationship between lab and the CB. Regularly, the CB audits the lab to verify its skills.

Labs can lose their accreditation.
(4/n)
The CBs are national entities funded by states (for financial independance). A mutual recognition exists for CC certificates but only for a few CB (sogis.eu)

The CBs audit themselves to verify skills and independance. Recently one member has been kicked of.
(5/n)
SP requests an eval. It selects a lab accredited by a CB. The SP pays for the independant evaluation.

The lab:
- audits the Security Target (threat model)
- does functionnal testing
- audits the Life Cycle: who dev, manufactures, tests, pacakage? what are the processes?...
(6/n)
- audits carefully the code (all the dev evidence are provided by the CM - Firmware, Verilog, tests, dev env, Functionnal/Architecture/Implem spec)
- does a vulnerability analysis: from the evidences, what are the possible attack paths.
- emits a Test plan
(7/n)
- launches the actual test campaign. It often modifies the initial test plan, based on the findings. It includes *at least* SCA, FA, Hardware reverse, software attacks

Then the lab reports the found vulns to the CM (there are always some).
(8/n)
The CM tries to fix them (when possible), on the firmware side, or on the hardware side (a new version of the chip must be manufactured).

When, there are no more vulnerability. The lab sends the evaluation report to the CB.
(9/n) The CB audits the reports and can ask for complementary tests. When the CB is satisfied, the chip is then certified.
(10/n)
- CM do not pay for Certification - They pay for independant evaluation
- Cert process is not a push button approach - It's vulnerability analysis based.
- Cert is not a replacement for a independant review - it's actually true. Independant review is necessary for cert
Missing some Tweet in this thread? You can try to force a refresh.

Enjoying this thread?

Keep Current with Charles Guillemet

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!