However, the motives for cyberattacks play no role at all (or only a subordinate one) in the Common Criteria, because actors are assigned roles that make them tangible as a threat. A distinction is made whether a user compromises a system unintentionally or whether an attacker (referred to by the Common Criteria as a threat agent) attacks a system deliberately. But this only matters insofar as these categories are considered from the perspective of the damage and the "assets to be defended" (specifically, the components of a system).
How a Common Criteria Certification Works
Consider a manufacturer - system integrator - of interactive kiosks who wants to certify a new series of kiosks. The kiosk, consisting of hardware (SoC, payment terminal and a display), and software (the operating system, a hardware abstraction layer, and the applications for ordering goods and pay over the network), will be examined in its entirety for this purpose.
This is because anyone who certifies against Common Criteria has an entire system, or IT product/embedded system (referred to in Common Criteria as a Target of Evaluation, or TOE for short), that must be protected against damage from actors described above. This includes – but not necessarily – the hardware, which must be protected against physical misuse such as theft, manipulation and the like, and the software, which must be evaluated according to certain paradigms. However, other security goals can also be proclaimed.
The system integrator is not alone. Another entity – usually a testing laboratory – assists with certification, and an authority – usually governmental – awards the certification.
All conceivable and plausible actors involved with the system will be identified, such as the users (customers), programmers (who could possibly install a Trojan horse for whatever motives), but also people who wantonly damage the kiosk. All conceivable attacks by these actors will be named and assigned in the language of the Common Criteria. Countermeasures will be pointed out on how the damage of such attacks can be eliminated or minimized so that the components (assets) are protected. Finally, the authority – e.g., the German Federal Office for Information Security (BSI) – will verify whether the certification can be awarded, and then will award or deny it.
The Philosophy of the Common Criteria
The Common Criteria is a current and regularly maintained, generic security certification. It is designed in such a way that it can be used as generally as possible and therefore as appropriately as possible everywhere, in contrast to the specific DO-356A / ED-203A security certification, for example, which was designed for avionics systems and is only used there (i.e., in aircraft). The Common Criteria is explicitly designed so that findings coming from IT security research can be incorporated into it, as the structure is flexible enough to be extended or modified. The flexibility also allows much of the requirements to be used for specific certifications such as the DO-356A / ED-203A. Thus, on the one hand, it is possible to transfer already certified artifacts comparatively conveniently to new projects, no matter which specific certification is desired, and on the other hand, a system pre-certified in this way can be used as a basis for new projects. This makes a lot of sense for operating system manufacturers, since it is not clear here whether the operating system will be used in a car, a drone, an industrial robot, an exoskeleton or a satellite.
Consider an aircraft manufacturer who wants to have their avionics system certified according to DO-356A / ED-203A, using a real-time operating system to guarantee that applications are deterministic - rudders must and will react within a certain time. In this case there are few requirements that are not covered by the Common Criteria. Indeed, Common Criteria and DO-356A / ED-203A share a total of 32 requirements that are fully or at least mostly in agreement and only 7 requirements are not applicable.
For the comparatively new ISO/SAE 21343 standard, designed for electronic systems in vehicles, there are 93 congruent or nearly congruent requirements and only 9 that are not covered by the Common Criteria. Each congruent requirement can be mapped to the corresponding requirement of a specific security certification. This is no coincidence: most specific security certifications trace their roots to the Common Criteria. It may well be called the mother of safety certifications par excellence.
Coming back to the example of the aircraft manufacturer: it is clear that in this age of government-backed hacking attacks and extortion gangs threatening to crash airplanes, cybersecurity and functional safety are now inextricably intertwined. This calls for software that is designed for safety as well as security, and can demonstrate operation with integrity through the appropriate certifications. In this case, certification against DO-356A / ED-203A as well as against the safety standard DO-178C is therefore necessary. Thus, a system integrator looking for a suitable foundation for their project will save a lot of time, effort and money by choosing an operating system which is certified (or easily certifiable) against the relevant industry safety standard, and is also certified against the Common Criteria to a high enough level to cover the applicable industry-specific cybersecurity standard.
The Security Evaluation