Hi! This is the last part of the saga (for a time at least), as we are done with all assurance requrements (modulo those concentrating on ST and PP assurance.)
I hope that at least some of you were listening. (First I thought there would be some feedback, at least like "stop it, this is boring!", or "why do you write to a mailing list which does not even exists?".) The assurance maintenance class is not an integral part of the assurance requirement set. It not included in the EALs, and it seems that no one really cares about it. It might be okay with commercial software development styles (it isn't: one can only find outdated versions of software evaluated against CC), but having only a point release evaluated would just not fit with open source development methodology. Unfortunately this class heavily depends on other assurance classes, some of which open source isn't good at. AMA_AMP.1 Assurance maintenance plan AMA_AMP.1.1D The developer shall provide an AM Plan. (Let's assume that we don't have any.) AMA_AMP.1.1C The AM Plan shall contain or reference a brief description of the TOE, including the security functionality it provides. (Security Target, TOE description (what we also don't have)) AMA_AMP.1.2C The AM Plan shall identify the certified version of the TOE, and shall reference the evaluation results. (None is available) AMA_AMP.1.3C The AM Plan shall reference the TOE component categorisation report for the certified version of the TOE. (We will se this later.) AMA_AMP.1.4C The AM Plan shall define the scope of changes to the TOE that are covered by the plan. (The upper bound of possible changes until the next stable release. Some OSS projects would benefit from such an upper bound anyway: it would made their release cycle more controllable.) AMA_AMP.1.5C The AM Plan shall describe the TOE life-cycle, and shall identify the current plans for any new releases of the TOE, together with a brief description of any planned changes that are likely to have a significant security impact. (The actually planned changes. Some projects have such goals, and some don't. They are not meet them, but it isn't expected anyway.) AMA_AMP.1.6C The AM Plan shall describe the assurance maintenance cycle, stating and justifying the planned schedule of AM audits and the target date of the next re-evaluation of the TOE. (The AM schedule should match to the devel cycle. Maybe having a defined QA effort concerning itself with the release cycle (and this could even be aligned by AM goals), would create a pressure to the cycle which could make a balance with the developers' pressure (put in this and that also, the release goal is just a date without meaning). In debian there is the QA group, which does concerned with some issues related, but not assume responsibility for 1.6C and more importantly for enforcing 1.5C) AMA_AMP.1.7C The AM Plan shall identify the individual(s) who will assume the role of developer security analyst for the TOE. (My daylight job includes this. You will sooner or later will really hate all developers. And they will hate you as well. And both of you will have very good reasons to do so:) At least this is the case with commercial developments: most of the developers I meet does not even know the tools and languages they use, and very upset when I tell them that they work is b*llsh*t.) AMA_AMP.1.8C The AM Plan shall describe how the developer security analyst role will ensure that the procedures documented or referenced in the AM Plan are followed. (I am very interested what is the equivalent of "management decision" in OSS:) You know this kind from Dilbert cartoons) AMA_AMP.1.9C The AM Plan shall describe how the developer security analyst role will ensure that all developer actions involved in the analysis of the security impact of changes affecting the TOE are performed correctly. (I looked it up in the CEM trying to figure out what it means. I have found the following information: none) AMA_AMP.1.10C The AM Plan shall justify why the identified developer security analyst(s) have sufficient familiarity with the security target, functional specification and (where appropriate) high-level design of the TOE, and with the evaluation results and all applicable assurance requirements for the certified version of the TOE. (I cannot think of feasible procedural controls (save that the security analyst is the same who have written the ST of the TOE, which is not always works)) AMA_AMP.1.11C The AM Plan shall describe or reference the procedures to be applied to maintain the assurance in the TOE, which shall include the procedures for configuration management, maintenance of assurance evidence, performance of the analysis of the security impact of changes affecting the TOE, and flaw remediation. (Good news: "only" maintenance of assurance evidence and security impact analysis is what to be done.) AMA_CAT.1 TOE component categorisation report AMA_CAT.1.1C The TOE component categorisation report shall categorise each component of the TOE, identifiable in each TSF representation from the most abstract to the least abstract, according to its relevance to security; TOE component categorisation must indicate whether the component is TSP-enforcing or non-TSP- enforcing. (Each security function, module, and procedure (e.g.C function should be categorized in EAL4) AMA_CAT.1.2C The TOE component categorisation report shall describe the categorisation scheme used, so that it can be determined how to categorise new components introduced into the TOE, and also when to re-categorise existing TOE components following changes to the TOE or its security target. (If a procedure -modifies TSF data -makes decision based on TSF data -does other security relevant activity based on TSF data -depends on a TSP-enforcing procedure The module contains a TSP-enforcing function.) AMA_CAT.1.3C The TOE component categorisation report shall identify any tools used in the development environment that, if modified, will have an impact on the assurance that the TOE satisfies its security target. (Which tool is not?) AMA_EVD.1 Evidence of maintenance process AMA_EVD.1.1D The developer security analyst shall provide AM documentation for the current version of the TOE. AMA_EVD.1.1C The AM documentation shall include a configuration list and a list of identified vulnerabilities in the TOE. (Packages.gz, DSA list) AMA_EVD.1.2C The configuration list shall describe the configuration items that comprise the current version of the TOE. (See ACM) AMA_EVD.1.3C The AM documentation shall provide evidence that the procedures documented or referenced in the AM Plan are being followed. (BTS could be used) AMA_EVD.1.4C The list of identified vulnerabilities in the current version of the TOE shall show, for each vulnerability, that the vulnerability cannot be exploited in the intended environment for the TOE. (As there is either a fix or a workaround) AMA_SIA.2 Examination of security impact analysis AMA_SIA.2.1D The developer security analyst shall, for the current version of the TOE, provide a security impact analysis that covers all changes affecting the TOE as compared with the certified version. (The developer hopefully does it, but rarely document. Should have been.) AMA_SIA.2.1C The security impact analysis shall identify the certified TOE from which the current version of the TOE was derived. (Aversion number.) AMA_SIA.2.2C The security impact analysis shall identify all new and modified TOE components that are categorised as TSP-enforcing. (diff -u :) AMA_SIA.2.3C The security impact analysis shall, for each change affecting the security target or TSF representations, briefly describe the change and any effects it has on lower representation levels. (One does not change the ST without good reason. I would actually 1. come out with an idea, 2. implement it, 3. draw the ST changes from the idea and changes of implementation representation (source code)) AMA_SIA.2.4C The security impact analysis shall, for each change affecting the security target or TSF representations, identify all IT security functions and all TOE components categorised as TSP-enforcing that are affected by the change. (It also can easily be drawn from source.) AMA_SIA.2.5C The security impact analysis shall, for each change which results in a modification of the implementation representation of the TSF or the IT environment, identify the test evidence that shows, to the required level of assurance, that the TSF continues to be correctly implemented following the change. (Regresion test is a good thing, and it should always be done. Just we have to have tests to start with:) AMA_SIA.2.6C The security impact analysis shall, for each applicable assurance requirement in the configuration management (ACM), life cycle support (ALC), delivery and operation (ADO) and guidance documents (AGD) assurance classes, identify any evaluation deliverables that have changed, and provide a brief description of each change and its impact on assurance. (Diff -u helps a lot:) AMA_SIA.2.7C The security impact analysis shall, for each applicable assurance requirement in the vulnerability assessment (AVA) assurance class, identify which evaluation deliverables have changed and which have not, and give reasons for the decision taken as to whether or not to update the deliverable. (One cannot easily avoid thinking if uses CC:) -- GNU GPL: csak tiszta forrásból