Security certification research highlighted at the International Common Criteria Conference

Jan 14, 2025 | Featured News, News

By Martin Ukrop

Common Criteria (CC) certification provides quantifiable levels of assurance that a technology product meets security expectations, which is critical for safety and regulatory compliance. CC is the widest available mutual recognition of secure IT products: a high-level CC certification provides independent verification that a product meets specific security requirements for highly sensitive computing environments. For both customers and vendors, the efficacy of certification frameworks like CC has a direct impact on their ability to address real-world security challenges.

In November 2024, Red Hat Research, Red Hat Security Compliance engineers headed by Vice President of Product Security Vincent Danen, and researchers from Masaryk University joined the International Common Criteria Conference (ICCC) in Qatar to discuss the ecosystem of security certifications, including current operations and trends and potential directions for efficiency and security improvements. 

Data-driven approaches to security

Complex products and systems, resource constraints, and a constant flood of new vulnerabilities can make vulnerability management feel impossible. Many regulatory frameworks, including Common Criteria, seek to verify that certified products do not contain known vulnerabilities, but the problem is not that simple. 

For example, since new vulnerabilities pop up all the time, evaluating and updating complex software products is challenging, taking a lot of time and money. Yet we know that not all vulnerabilities pose the same risk, and some vulnerabilities simply don’t matter. Shouldn’t we focus on really harmful and known exploitable vulnerabilities? That was the question posed by Vincent Danen’s keynote talk, “Vulnerability and compliance,” at ICCC.  As Danen pointed out, both the severity of impact and the risk of exploitation should factor into prioritizing how vulnerabilities are addressed. What if instead of patching everything, we invested in preventing serious vulnerabilities and elevating the overall security of certified products? This focus, Danen argued, would reduce risk to critical security systems while preventing the deceleration of innovation. (Slides from Danen’s keynote are available for review.)

The official logo of Centre for Research On Cryptography and Security (CRoCS)

Evaluating risk requires good, accessible data. The sec-certs project, demoed at ICCC, aims to provide a one-stop shop to explore the CC/FIPS 140 certification ecosystem and enable a data-driven approach to vulnerability management. The project aggregates and annotates certification data to allow unified searches, trend analyses, and investigation of vulnerabilities affecting certified products.  Researchers, vendors, certification labs, and certification agencies can search the full dataset of certification files enhanced with layers of metadata. Sec-certs is a fully open source project of the Centre for Research on Cryptography and Security (CROCS) at Masaryk University with support from Red Hat Research, and it is a part of the Cybersecurity Excellence Hub in Estonia and South Moravia (CHESS), which brings together a consortium of universities, private companies, government agencies, and NGOs to strengthen cybersecurity in the European Union. 

Making the certification ecosystem more transparent through tools like sec-certs benefits both security professionals and end users by fostering trust and accountability and by making it easier to verify the impact of certification on real-world security. Research like that done by Professor Vashek Matyas (Masaryk University), untangling the references among CC certified products, is made possible by the transparency sec-certs helps provide. As Matyas noted in his presentation at ICCC, enhancing certification documentation for automated processing would go a long way toward enabling this kind of analysis.  (Slides from Vashek Matyas’ presentation are available to review.)

Learn more

Interested in learning more about how Red Hat is supporting research into data-driven approaches to IT security? Reach out to Red Hat Principal Research Software Engineer Martin Ukrop and subscribe to the Red Hat Research Quarterly. You can find an introduction to sec-certs work in the RHRQ article “A data-driven approach for analyzing Common Criteria and FIPS 140 security certificates.”

CHESS is funded by the European Union under Grant Agreement No. 101087529Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or European Research Executive Agency. Neither the European Union nor the granting authority can be held responsible for them.

Related Stories

Red Hat extends partnership with Masaryk University

Red Hat extends partnership with Masaryk University

Many years of successful partnership with the Faculty of Informatics at Masaryk University has led to an extraordinary five-year contract confirming Red Hat’s long-term intention to support and develop research cooperation in cybersecurity. Red Hat also plans to...

Red Hat welcomes BU prof Orran Krieger to lead AI platform initiative

Red Hat welcomes BU prof Orran Krieger to lead AI platform initiative

Red Hat Research has periodically been fortunate to have faculty from Boston-area universities spend their sabbaticals working with our team. We’re happy to announce that in June 2024 we took this relationship to the next level by welcoming Boston University professor...

MGHPCC receives $16 million to deploy neutral atom quantum computer

MGHPCC receives $16 million to deploy neutral atom quantum computer

The Massachusetts Green High Performance Computing Center (MGHPCC) has received nearly $5 million from the state of Massachusetts and $11 million from QuEra Computing to create a natural atom quantum computing complex. The MOC Alliance will make the quantum computer...

AI, LLMs, and hybrid cloud get the spotlight at DevConf.US

AI, LLMs, and hybrid cloud get the spotlight at DevConf.US

Members of the Red Hat Research team and several of our collaborators are presenting at DevConf.US at Boston University, held August 14-16, 2024. This is the sixth annual convening of this Red Hat-sponsored technology conference for community projects and professional...

How to find Red Hat Research and our partners at DevConf.CZ 2024

How to find Red Hat Research and our partners at DevConf.CZ 2024

DevConf.CZ 2024 , held June 13-15 in Brno, features a packed agenda with talks on AI and data science, IoT and edge computing, security and cryptography, DevOps, and much more. As usual, many presentations feature the work of Red Hat Research and our research...