openPR Logo
Press release

atsec information security evaluates IBM z/OS V1R8 - Common Criteria Certification at EAL4+

05-24-2007 10:56 PM CET | IT, New Media & Software

Press release from: atsec information security

Left to right: Bernd Kowalski (BSI), William Penny (project manager z/OS), Helmut Kurth (atsec)

Left to right: Bernd Kowalski (BSI), William Penny (project manager z/OS), Helmut Kurth (atsec)

atsec information security recently completed the evaluation of IBM’s z/OS V1R8 in the world's largest and most complex operating system evaluation.

The first evaluation of z/OS, at V1R6, was performed in 2005 at EAL3, followed by a re-evaluation of V1R7 in 2006 at EAL4 with added security features. The current re-evaluation of IBM z/OS V1R8 at EAL4+ addressed significantly enhanced security functions and provides assurance of the product in a format that is typically installed and operated. The Security Target specifying the target of evaluation is publicly available at atsec’s Common Criteria evaluations page. Some noteable features of the evaluation include:

- z System servers with all optional crypto boards

- Additional authentication mechanisms: X.509 certificates, Kerberos tickets, IBM PassTickets, and authentication based on LDAP DNS in addition to the traditional password mechanism

- Secure communications: in addition to SSL/TLS and IPSec, OpenSSH and Kerberos are available

- Full IBM Tivoli Directory Server with LDBM and SDBM back ends; LDBM provides a “traditional” LDAP database with access control known from other evaluated ITDS products, while SDBM provides access to RACF user management via LDAP interfaces

- Augmentation to ALC_FLR.3, the highest achievable assurance component for maintenance

There are only a small number of evaluation facilities with the experience and confidence needed to take on a task of this magnitude. Among that small set of evaluation laboratories, atsec information security is the world’s leading evaluator of large, complex operating systems.

Jim Porell, IBM Distinguished Engineer and Chief Architect for System z Software, commented: “The Common Criteria Evaluation of z/OS 1.8 was a complex effort requiring cooperation between IBM and atsec. Our goal, at IBM, has been to deliver an operating system that can provide valuable server functionality and security capabilities to meet our customers' business needs. The Common Criteria provides a good definition of the development processes and protection profiles that can be deployed to satisfy those business needs. We are pleased with the results of this evaluation and our working relationship with atsec.”

Marvin Schaefer, Former Chief Scientist at the National Computer Security Center at the NSA, adds: "IBM's z/OS Version 1 Release 8 operating system evolved from what was, in the late 1970s, the powerful, but complex, MVS operating system. At that time, its access control mechanisms were quite weak and easily defeated. Even with the integration of RACF, the system was not only subject to compromise, but because of the complexity of its structure and implementation, it was extremely difficult and time-consuming to evaluate its security policy and mechanisms against the criteria of the US Department of Defense Trusted Computer System Evaluation Criteria (the Orange Book). Its initial evaluation by the National Computer Security Center (NCSC) took years, and was only partially successful. As a consequence, IBM made a considerable investment in restructuring MVS/RACF and integrating it with supportive hardware security mechanisms -- and more importantly, with a security policy-driven discipline of design, documentation and programming. The resulting system, z/OS, is considerably richer and more complex than its antecedent MVS. Because system security became a central design principle, and because the development effort was closely coordinated with the independent team of evaluators, the formidable task of identifying and analyzing z/OS's large set of interfaces and its management of privilege became tractable. Through close and co-operative work with its evaluators, z/OS's interfaces and management of privilege have been documented such as to permit a full and rigorous assessment to be completed in a little more than a year. Further, over the last quarter century I have collaborated with senior IBM and atsec staff and know that this evaluation was anything but superficial, thanks to the atsec evaluation team's mature knowledge of security principles as well as their corpus of techniques for identifying and exploiting security vulnerabilities. I have full confidence that z/OS and its completed evaluation represent an exceptional technological achievement."

Operating system evaluation is the greatest test of competence in the field, and from early on in its history as a Common Criteria evaluation laboratory, atsec has led the way in operating system evaluations under both the German BSI and U.S. CCEVS Schemes. atsec’s record of evaluation at this level includes evaluations of IBM AIX 5.3 (CAPP and LSPP); twelve Linux versions on five different platforms; IBM z/OS V1R7 at the EAL4+ level, as well as the zSeries-based z/VM and PR/SM virtual machine and logical partitioning products. atsec has already completed two EAL5 evaluations of IBM PR/SM products.

atsec has completed a total of more than 40 evaluations since its initial accreditation as a Common Criteria lab by the German BSI Scheme in 2002. Accreditation by the U.S. CCEVS Scheme followed in 2005, and in 2006 atsec received provisional CC lab status under the Swedish CSEC scheme. Today, the company’s security experts work with confidence under all three schemes to offer quality results and maximum flexibility.

atsec’s leadership in the Common Criteria industry is also demonstrated by its commitment to helping shape the standard itself. This level of involvement not only includes helping to test new versions of the standard and contribute to Scheme publications, but also includes pushing the boundaries of the standard by applying it to large, complex systems. In partnership with BSI, atsec performed a prototype evaluation of Linux for the main aspects of the assurance level EAL4 as a test of what was the draft version of the Common Criteria v.3 standard. atsec is also performing the first EAL4 evaluation under the Swedish CSEC scheme.

The extensive experience and many successes of atsec’s evaluation staff have built the company’s industry-leading ability to delivery complex evaluations in enviably short time frames. This is important because in the world of Common Criteria evaluations, time is very definitely money. Sponsors begin to earn back their investment when the certification is finished – so there is tremendous value in working with a partner who can complete the process efficiently.

Gerald Krummeck, Common Criteria Lab Director for atsec information security GmbH, added: “We are very proud about this success: this is the most complex evaluation ever attempted under Common Criteria. IBM's and atsec's strategy to start the evaluation effort at EAL3, then move to EAL4 while constantly adding valuable security functionality made it possible to deliver a certificate for a complete, real-world system with a level of assurance that customers require for their business-critical operations.”

Beyond its enviable record of successful and timely completion of complex evaluations, atsec has also built its reputation on the quality of its evaluation deliverables. atsec’s modus operandi uses the Common Criteria methodology to the advantage of the customer. Interim and final evaluation reports reveal thoughtful analysis of the content of document evidence presented which provides real value to sponsors in the form of product and process improvements (not just a cursory look at the titles of documentation evidence or simply filling out a checklist of requirements to achieve certification). Looking at the real-world assurance evidence produced by developers as part of their regular development process has always been a feature of atsec’s evaluation process.

About atsec information security
atsec information security is an independent, standards-based IT (information technology) security consulting and evaluation services company that combines a business-oriented approach to information security with in-depth technical knowledge and global experience. atsec was founded in Munich (Germany) in January 2000 and has extensive international operations with offices in the US, Germany, Sweden, the UK, and China. atsec leverages its deep security, process, and standards expertise to consult on a wide range of IT security needs, enabling clients to establish integrated security management procedures in order to manage security risk and improve data, product, and business process reliability. atsec works with leading global companies such as IBM, HP, Oracle, Cray, BMW, SGI, Vodafone, Swisscom, RWE, and Wincor-Nixdorf. For more information, please visit www.atsec.com.

Media Contact:
Andreas Fabis, fabis@atsec.com
Marketing Director
atsec information security
(512) 615-7317

atsec information security corporation
9130 Jollyville Road, Suite 260
Austin, TX 78759
USA
Phone: 1-512-615-7300
Telefax: 1-512-615-7301
eMail: info@atsec.com

This release was published on openPR.

Permanent link to this press release:

Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.

You can edit or delete your press release atsec information security evaluates IBM z/OS V1R8 - Common Criteria Certification at EAL4+ here

News-ID: 21060 • Views:

More Releases from atsec information security

atsec information security is now operating a Certification Body accredited according to ISO/IEC 17065
atsec information security is now operating a Certification Body accredited acco …
AUSTIN, TX - atsec is pleased to announce that atsec information security AB has been accredited as a certification body by SWEDAC, the national accreditation body in Sweden, to provide Common Criteria (CC) certifications of IT products. With over 20 years of experience as a CC evaluation lab, atsec has taken the step to become a CC certification body. We have an experienced and knowledgeable team, that has helped many national schemes
Call for Papers for the Second International Cryptographic Module Conference
Mark Your Calendar: ICMC 2014, November 19-21, Hilton Washington D.C., Rockville, MD ICMC brings together experts from around the world to confer on the topic of cryptographic modules, with emphasis on their secure design, implementation, assurance, and use, referencing both new and established standards such as FIPS 140-2 and ISO/IEC 19790. We are focused on attracting participants from the engineering and research community, test laboratories, government organizations, the procurers, deployers and administrators
atsec information security Opens South East Asia Office
atsec information security Opens South East Asia Office
Bangkok, Thailand – atsec information security is pleased to announce the opening of its atsec South East Asia (atsec SEA) office in Bangkok, Thailand. Since the year 2000, the atsec group of companies have been established experts in information security including Common Criteria, FIPS 140-2, PCI, ISO 27001, and hardware testing. As part of the atsec group of companies, atsec SEA’s objective is to promote information security and information assurance in
atsec completes FIPS 140-2 testing of Watchdata's WatchKey USB Token at Security Level 2
atsec completes FIPS 140-2 testing of Watchdata's WatchKey USB Token at Security …
Austin, TX - atsec information security is pleased to announce that its customer, Watchdata Technologies Pte Ltd. (branded as “Watchdata”), received a FIPS 140-2 validation certificate #1640 for the WatchKey USB Token under the CMVP (Cryptographic Module Validation Program) by the National Institute of Standards and Technology (NIST), USA and the Communication Security Establishment of Canada (CSEC). The successful validation result is published on the CMVP’s official website at: http://csrc.nist.gov/groups/STM/cmvp/validation.html The issued

All 5 Releases


More Releases for IBM

Cloud Microservices Market to Remain Competitive | Major Giants: AWS, CA Technol …
Advance Market Analytics released the research report of Global Cloud Microservices Market, offers a detailed overview of the factors influencing the global business scope. Global Cloud Microservices Market research report shows the latest market insights with upcoming trends and breakdown of the products and services. The report provides key statistics on the market status, size, share, growth factors of the Global Cloud Microservices. This Report covers the emerging player's data,
Global IBM Bluemix Services Market|ibm bluemix service status, ibm bluemix devop …
In order to study the various trends and patterns prevailing in the concerned market, Market Research Reports Search Engine (MRRSE) has included a new report titled “IBM Bluemix Services Market” to its wide online database. This research assessment offers a clear insight about the influential factors that are expected to transform the global market in the near future. Request for Sample Copy click here @ https://www.mrrse.com/sample/16385 The “IBM Bluemix Services Market – Global
Global Government Cloud Market 2018 Analysis by Players - Microsoft, IBM, Google …
Gen Market Insights published latest research on Global Government Cloud Market Research Report 2018 study major consideration after performing various different reasonable and immense analysis on Government Cloud industry. Top to bottom examination of Government Cloud Market is a vital thing for different partners like financial specialists, merchants, providers, CEOs, and others. Government Cloud Market Research Report 2018 provides an rare tool for analyzing the market in terms of strengths and
Global Government Cloud Market 2018 - IBM, Google, IBM, Oracle
Apex market reports, recently published a detailed market research study focused on the Government Cloud Market across the global, regional and country level. The report provides 360° analysis of Government Cloud Market from view of manufacturers, regions, product types and end industries. The research report analyses and provides the historical data along with current performance of the global Government Cloud industry, and estimates the future trend of Government Cloud market
Digital Defense, Inc. Receives IBM PartnerWorld’s Ready for IBM Security Intel …
SAN ANTONIO, TX (April 17, 2017) – Digital Defense, Inc., a leading provider of Vulnerability Management as a Service (VMaaS™), today announced it has received IBM PartnerWorld’s Ready for IBM Security Intelligence designation for its Frontline™ Vulnerability Manager. As a result, Digital Defense’s Frontline Vulnerability Manager has been validated to integrate with IBM Security products to help better protect customers around the world. "We're very excited to combine IBM's industry
direct/ datango validated by IBM as Ready for IBM WebSphere Portal Software
datango´s Electronic Performance Support System provides benefits for IBM WebSphere Portal implementations Berlin, October 24, 2007 - datango AG, provider of eLearning and Electronic Per¬formance Support (EPSS) solutions, has been validated for IBM WebSphere Portal software and has earned the "Ready for IBM WebSphere Portal Software" emblem for its datango knowledge suite (dks). The Ready for WebSphere Portal Software emblem means that IBM WebSphere customers and business partners can integrate to