Certification & Accreditation Frameworks & Standards
Belgian Defence is increasingly relying on software, both in terms of pure software applications as well as in the form of cyber-physical systems. When this software suffers from defects, vulnerabilities and weaknesses, attackers might exploit its inherent vulnerabilities and tamper with mission critical systems or exfiltrate sensitive information. In order to mitigate this risk and ensure that software is dependable and trustworthy, certification and accreditation activities have traditionally been integrated into the software lifecycle.
Software assurance through certification and accreditation suffers from the fact that these processes are extremely resource and time consuming, and therefore represent an obstacle that blocks the adoption of more agile DevOps development methodologies as well as the rapid implementation of bug fixes and security patches. A structured and to a large extent automated approach must therefore be developed that reconciles the requirement for more frequent software updates on the one hand and the need to ensure that the software is trustworthy and dependable on the other.
It is precisely the goal of this project to develop a methodology for performing automated certification and accreditation, assemble a set of tools that support this methodology, and validate the methodology on two typical Defence related use cases. The first use case is an in-house developed Advanced Persistent Threat (APT) detection tool for protecting government and military networks, while the second is a weapon-system piece of software.
AMC3 is a collaboration between UCLOUVAIN, CETIC, FN Herstal and the Cyber Defence Lab of the Royal Military Academy. It aims to design and prototype a flexible (incremental) certification methodology and prototype platform to automatically (re-)generate evidence, curate this evidence and (re)create assurance cases for product certification schemes such as the Common Criteria (CC). Evaluation assurance levels (EAL) define the extent of verification by describing the depth and rigor of an evaluation. The methodology should be able to manage different EAL from non-critical to critical security requirements. To create such a methodology the following research sub-objectives are defined. A first group of sub-objectives focus on automated generation of evidence: