Skip to content

C5-DEC (Common Criteria for Cybersecurity, Cryptography, Clouds – Design, Evaluation and Certification) part of the CyFORT project: a suite of methods and CAD tools dealing with the creation and evaluation of secure IT systems according to the CC standards, capturing SSDLC, V&V, and our cyber-physical system security assessment method

License

Notifications You must be signed in to change notification settings

AbstractionsLab/c5dec

Repository files navigation

C5-DEC

C5-DEC, short for "Common Criteria for Cybersecurity, Cryptography, Clouds – Design, Evaluation and Certification", is a sub-project of the CyFORT project, which in turn stands for "Cloud Cybersecurity Fortress of Open Resources and Tools for Resilience", carried out in the context of the IPCEI-CIS project.

cyfort_logo

C5-DEC CAD, the software component of C5-DEC, is a suite of AI-enabled tools for computer-aided design and development (CAD) enforcing the C5-DEC method. The method mainly deals with the creation and evaluation of secure IT systems following a structured and systematic approach, based on the Common Criteria standards, a secure software development life cycle (SSDLC) method, a software verification and validation model (SVVM), and our cyber-physical system security assessment (CPSSA) method.

This repository contains the source code and full documentation (requirements, technical specifications, schematics, user manual, test case specifications and test reports) of C5-DEC CAD, exemplifying the C5-DEC method, which relies on storing, interlinking and processing all software development life cycle (SDLC) artifacts in a unified manner; see our traceability web page for a concrete example reflecting the technical specifications of C5-DEC CAD itself.

Table of contents

Overview

The overall goal of the C5-DEC method is to bring together and contextualize SSDLC, SVV and CPSSA within the Common Criteria framework while enabling the use of rigorous digital engineering (RDE) tools. This means tackling the problem of building secure systems, while ensuring full traceability between system artifacts spanning the entire DLC and incorporating cryptographic checks as well as threat modelling and system security risk assessment into the design process, all in the context of the Common Criteria framework.

To this end, C5-DEC CAD is aimed at assisting both system/software designers/developers as well as system security analysts with creating and evaluating secure software systems. For instance, it can be used by evaluation laboratories for the execution of impartial assessments of the security of computer systems and software according to the Common Criteria (CC), a set of internationally recognized standards (ISO/IEC 15408), and the complementary ISO/IEC 18045, dealing with a common methodology for computer security evaluation (CEM). CC certification gives users the assurance that a product satisfies the security guarantees and properties it claims to possess.

C5-DEC consists of two key elements that complement each other to form a coherent ensemble: a software component (C5-DEC CAD) and a knowledge base (KB) consisting of SSDLC, SVV and CPSSA methodologies as well as a wiki of key CC concepts.

Knowledge base

As certain parts of our KB reports rely on ISO standards (ISO/IEC/IEEE 12207, ISO 29119:2022 and ISO 29148:2018), if you wish to access them, please contact us at [email protected]. Simply provide evidence that you are eligible for accessing the standard(s), and upon successful verification, we will share the reports.

Features

Design

  • Free/libre and open source;
  • Cross platform: works on GNU/Linux, MacOS and Windows
  • Easily and highly extensible due to a modular design and architecture;
  • Based on open data formats such as Markdown, (La)TeX, YAML, XML, JSON, CSV and HTML;
  • Straightforward integration into well-known Dev(Sec)Ops platforms such as GitHub and GitLab;
  • Import/export from and to open data formats;
  • Containerized development and deployment.

Interfaces

  • A command-line interface (CLI) for efficient user interactions and automation via scripting integration;
  • A user-friendly and efficient graphical user interface (GUI), powered by Flask and Bootstrap;
  • A rich and extensible textual user interface (TUI), powered by asciimatics;
  • VS Code with extensions and devcontainer configurations preinstalled in the C5-DEC CAD dev container.

Common Criteria

  • A comprehensive Common Criteria Toolbox (CCT), with a focus on efficient browsing of the CC database, creating and processing evaluation checklists, including
    • all baseline CC Security Functional Requirements (SFR) and Security Assurance Requirements (SAR);
    • CEM evaluation checklist creation in spreadsheet format;
    • built-in capabilities for assisting the process of generating evaluation technical reports (ETR);
    • ETR document part generation from C5-DEC checklist spreadsheets;
    • an ETR generation solution based on customized Quarto project templates tailored to our ETR part generation function, and
    • a CC wiki capturing the key concepts of Common Criteria (work in progress).
  • An object-oriented model and implementation of CC concepts, with the CC database serialized and stored in Markdown and YAML files, with traceability features built on top of Doorstop.

Secure software development life cycle (SSDLC)

  • The SSDLC report, part of the C5-DEC KB, is inspired by and builds on ISO/IEC/IEEE 12207 - Software life cycle processes, the European Cooperation for Space Standardization (ECSS) standard ECSS-E-ST-40C, ISO/IEC/IEEE 29119:2022 Software testing, ISO/IEC/IEEE 29148:2018 Requirements engineering, the DevSecOps Platform Independent Model (PIM) by the Software Engineering Institute (SEI) of Carnegie Mellon University (CMU), SAFECode, OWASP, as well as McGraw’s publications on software security;
  • Create new project repositories based on C5-DEC (batteries included): a fresh development repository with containerized development artifacts, all dependencies installed, templates, DocEngine, source code and technical specification processing software for enhancing SSDLC and enforcing the C5-DEC method, powered by Doorstop, and AI-enabled approach facilitating the generation and processing of technical specifications, documentation, and design artifacts, including requirements, test cases, and technical reports;
  • C5-DEC DocEngine: a flexible, easily extensible, and complete publishing solution based on Quarto (an open-source scientific and technical publishing system), enhanced by our Quarto configurations, dedicated LaTeX customizations and pre-render and post-render Python scripts providing a baseline automated publishing pipeline (see SSDLC and CCT);
  • Transformer: a suite of integrated tools dedicated to universal document transformation, format conversion, content import/export, publishing, and file management automation based on our customized use of Doorstop, Quarto, pandoc and organize;
  • Another KB element dedicated to software verification and validation (SVV) complementing the SSDLC.

Project (resource) management

  • Chapters in the SSDLC report describing the C5-DEC software project management approach based on the HERMES method, complemented by our interpretation and implementation of templates in open-source software such as OpenProject, GitLab and Nextcloud;
  • Processing of OpenProject time reports and conversion to custom formats;
  • Consolidation of C5-DEC time sheets;
  • Dedicated software for detailed resource and cost computations.

Cyber-Physical System Security Assessment

  • Our CPSSA report, a third KB element, describing the C5-DEC method for Cyber-Physical System Security Assessment (CPSSA);
  • A guide on the use of existing open-source software to enforce the CPSSA method.

Cryptography

  • A containerized and pre-configured deployment of open-source cryptographic software in the development environment for classical cryptography: GnuPG, Kryptor, Cryptomator CLI;
  • A VS Code dev container packaging of OQS-OpenSSL provider for post-quantum cryptography.
  • A guide on the use of the integrated cryptographic software.

User manual

Please see the CAD user manual to learn more about the installation, setup requirements, overall usage and specific modules of C5-DEC CAD. A concise guide for getting quickly started is given below.

Documentation and technical specifications

You can visit our traceability page to view the technical specifications of C5-DEC CAD, which have been published to HTML from the source specification files via the publish CLI command of C5-DEC CAD, which in turn acts as a wrapper for the underlying Doorstop publish feature, offering some enhancements.

Getting Started

C5-DEC CAD can be deployed using any of the following methods:

  1. Deployment using Docker and our shell scripts: build-c5dec.sh and c5dec.sh: our runner script (c5dec.sh) offers a command mode tailored to the use of the Common Criteria Toolbox (CCT) and the Project Management (PM) modules, as well as an interactive session mode (c5dec.sh session) for using the Transformer and Cryptography features and a PQC entrypoint (c5dec.sh pqc).
  2. Deployment in a containerized development environment in VS Code (recommended for advanced usage, development, data science): this mode is the preferred option for effective use of the Quarto-based DocEngine, Cryptography and Transformer modules. Note that all the features available via the CLI, TUI and GUI when using the deployment model (1) would also be available using this second approach.

For more details on the installation options, please see the installation page of the user manual.

Installing C5-DEC CAD via Docker and our scripts

The fastest and most reliable way to deploy and run C5-DEC CAD is to use our already existing Docker definition file, with the build and execution scripts found in the repository. The instructions below work on GNU/Linux, MacOS and WSL.

Simply clone the repository or download a ZIP archive of the project, and then proceed as follows:

  1. Install Docker engine and make sure it is running;
  2. Unzip the archive, switch to the extracted directory (cd foldername) via a terminal running a shell (e.g., bash, zsh) and make the two shell scripts executable: chmod +x script-name.sh;
  3. Build the images by running our build script: ./build-c5dec.sh;
  4. Launch C5-DEC CAD runner script by running ./c5dec.sh, which by default starts the CLI with no arguments and shows the help menu. Run ./c5dec.sh help for usage instructions.

Installing C5-DEC CAD in a containerized development environment

  1. Install Docker Desktop (or Docker engine), Visual Studio Code (VS Code), and the Dev Containers extension for VS Code by Microsoft.
  2. Clone the C5-DEC repository:
git clone https://github.com/AbstractionsLab/c5dec.git 
  1. Start Docker Desktop if not already running and open the project folder in VS Code;
  2. Select the "Reopen in Container" option in the notification that pops up in VS Code; or launch the command palette (Cmd/Ctrl+Shift+P) and select "Dev Containers: Reopen in Container" from the list of available commands. You will then be prompted to select a dev container configuration: the C5-DEC CAD dev container provides the bulk of the functionality, while the C5-DEC CAD cryptography dev container provides an environment with OpenSSL and the OQS-OpenSSL provider installed.

Selecting between C5-DEC dev containers

  1. For the following sections, we assume having selected the C5-DEC CAD dev container. Once selected, wait for the container to build and start. This may take a few minutes, depending on your internet connection and the performance of your machine.
  2. Once the container is up and running, you will see a terminal window open in VS Code, and you can start using C5-DEC CAD. If a terminal window does not open automatically, you can open a new terminal by selecting "Terminal" from the top menu and then "New Terminal". This will open a terminal window inside the container.

Note that the local file system is automatically mapped to that of the GNU/Linux container.

Once installed, the C5-DEC CAD tool can be launched from the VS Code terminal in any of the three modes of operation (CLI, TUI, GUI). Upon opening a VS Code terminal, the currently selected directory will be the project root folder, i.e., /home/alab/c5dec. Change to the c5dec folder inside the former:

cd /home/alab/c5dec/c5dec

To avoid having to precede the commands with poetry run each time, e.g., poetry run c5dec <command>, we recommend running poetry shell to activate the virtual environment; you can then run the commands directly by invoking c5dec:

c5dec -h

Usage

To start C5-DEC CAD through your GNU/Linux/MacOS/WSL terminal, first change your current working directory to the one containing an unpacked copy of the c5dec-main.zip archive. For the sake of this example, we assume that the zip archive is unpacked at the following path /home/user/c5dec:

cd /home/user/c5dec

To access the command line interface (CLI), simply run ./c5dec.sh, which by default shows the help menu if no arguments are provided, i.e., similar to the behavior resulting from the use of the -h flag. You can access the TUI and the GUI by using the -t and -g flags, respectively. The following subsections cover the three interfaces; see the user manual for a more detailed breakdown of features.

Note that for the TUI and the GUI, you can change the CC database prior to launching the software by modifying the selected DB in the c5dec_params.yml YAML file found in the c5dec/assets folder within the project folder.

A summary of the c5dec.sh runner options are provided below:

  • To open the C5-DEC CLI help menu:
./c5dec.sh
  • To run a C5-DEC CLI command:
./c5dec.sh <command>
  • To get help for a C5-DEC CLI command:
./c5dec.sh <command> -h
./c5dec.sh session <workspace>

The argument <workspace> can be optionally used to provide the path to a directory on the user's file system (outside the C5-DEC folder); see the usage section of the start page for more details.

  • To use the OQS-OpenSSL provider for post-quantum cryptography:
./c5dec.sh pqc

C5-DEC CAD command line interface (CLI)

./c5dec.sh

This would display the help menu of the CLI, as shown below. You can then choose one of the available subcommands to execute the desired operation.

C5-DEC CAD CLI

You can for instance invoke the work unit evaluation checklist export to spreadsheet command, e.g., for the ALC class, as follows:

./c5dec.sh export alc-checklist 3R5 -c ALC

or create a new C5-DEC project (batteries included):

./c5dec.sh new

You can define a project name and GNU/Linux username for Dockerized development environment using the -p and -u parameters, e.g., ./c5dec.sh new -p "someproject" -u "someuser"

C5-DEC CAD textual user interface (TUI)

You can launch the TUI using the -t flag.

./c5dec.sh -t

This would launch the TUI and start with the module selection menu, as shown below.

C5-DEC CAD TUI

C5-DEC CAD graphical user interface (GUI)

./c5dec.sh -g

This would launch the GUI, as shown below, starting a web server that listens on port 5432 on the local host, meaning that you can access the application by pointing your browser to 127.0.0.1:5432.

C5-DEC CAD GUI

C5-DEC VS Code workbench and containerized development environment

Finally, using VS Code, you can access the various user interfaces in the same workbench while also benefitting from dedicated VS Code extensions integrated into our containerized development environment (e.g., Code Spell Checker, Quarto, Jupyter, Data Wrangler, Docker) as well as the code editor's own built-in features. The screenshot below highlights an example of how the C5-DEC method lends itself to AI-powered capabilities.

C5-DEC CAD in VS Code

Roadmap

We will continue to enhance C5-DEC CAD with new features and improvements. Some of the planned features include:

  • Integrating locally stored generative AI (GenAI) models and implementing a GenAI assistant for the C5-DEC method enhancing its AI-enabled design and technical specification approach with privacy-aware features and retrieval-augmented generation (RAG) capabilities;
  • Enhancing our cryptographic dependencies (e.g., OQS-OpenSSL, OpenSSH) with verified implementations, e.g., EverCrypt and HACL*.

For further details on our roadmap and features planned for future releases, please see the Wiki section of this repository.

License

Copyright (c) itrust Abstractions Lab and itrust consulting. All rights reserved.

Licensed under the GNU Affero General Public License (AGPL) v3.0 license.

Acknowledgment

The creation of the C5-DEC software tools and its knowledge base is co-funded by the Ministry of the Economy of Luxembourg, in the context of the CyFORT project.

Contact

If you wish to learn more about the project, feel free to contact us at Abstractions Lab: [email protected]

About

C5-DEC (Common Criteria for Cybersecurity, Cryptography, Clouds – Design, Evaluation and Certification) part of the CyFORT project: a suite of methods and CAD tools dealing with the creation and evaluation of secure IT systems according to the CC standards, capturing SSDLC, V&V, and our cyber-physical system security assessment method

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published