A Cryptome DVD is offered by Cryptome. Donate $25 for a DVD of the Cryptome 11-years archives of 41,000 files from June 1996 to June 2007 (~4.4 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost.


27 June 2007


[Federal Register: June 26, 2007 (Volume 72, Number 122)]
[Notices]               
[Page 35036-35042]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr26jn07-24]                         

-----------------------------------------------------------------------

DEPARTMENT OF DEFENSE

Office of the Secretary

[DoD-2007-OS-0066]

 
National Information Assurance Program

AGENCY: Department of Defense; National Security Agency.

ACTION: Notice of new fees.

-----------------------------------------------------------------------

SUMMARY: Section 933 of Pub. L. 109-364, the John Warner National 
Defense Authorization Act for Fiscal Year 2007, provides that the 
Director, National Security Agency, may collect charges for evaluating, 
certifying, or validating information assurance products under the 
National Information Assurance Program (NIAP) or successor program. 
Table A sets forth the Fee-For-Service rates that will be assessed to 
NIAP accredited commercial Common Criteria Testing Labs (CCTLs) for 
``validation'' services performed by NIAP validator personnel on 
information technology (IT) security products being evaluated by the 
NIAP CCTLs pursuant to the Common Criteria Evaluation and Validation 
Scheme (CCEVS).

DATES: Comments must be received on or before August 27, 2007. Do not 
submit comments directly to the point of contact or mail your comments 
to any address other than what is shown below. Doing so will delay the 
posting of the submission.

ADDRESSES: You may submit comments, identified by docket number and or 
RIN number and title, by any of the following methods:
     Federal eRulemaking Portal: http://www.regulations.gov. 

Follow the instructions for submitting comments.
     Mail: Federal Docket Management System Office, 1160 
Defense Pentagon, Washington, DC 20301-1160.
    Instructions: All submissions received must include the agency name 
and docket number or Regulatory Information Number (RIN) for this 
Federal Register document. The general policy for comments and other 
submissions from members of the public is to make these submissions 
available for public viewing on the Internet at http://regulations.gov 

as they are received without change, including any personal identifiers 
or contact information.

FOR FURTHER INFORMATION CONTACT: Audrey M. Dale, 410-854-4458.

SUPPLEMENTARY INFORMATION: NSA and the National Institute of Standards 
and Technology (NIST) formed the NIAP in order to promote information 
security in various ways, including the evaluation of IT security 
products. Commercial IT security product vendors initiate the NIAP 
evaluation process through submission of their IT security product to a 
nationally accredited commercial CCTL for evaluation against the 
internationally recognized Common Criteria (CC) Standard for 
Information Technology Security Evaluation (ISO Standard 15408). NIAP 
evaluation is voluntary for IT security products that are acquired by 
United States Government (USG) civil agencies and non-USG entities, but 
as per National Security Telecommunications & Information Systems 
Security Policy (NSTISSP) No. 11, mandatory for IT

[[Page 35037]]

security products purchased for use on systems that process national 
security information. Additionally, per DoD Instruction 8500.2 the DoD 
mandates the use of CC or NIAP evaluated IT security products on all 
DoD networks.
    Evaluations are conducted by NIAP accredited commercial CCTLs, with 
oversight provided by NIAP validator personnel who are NSA government 
employees, Federally Funded Research & Development Center (FFRDCs) 
personnel or contractors. Prior to the enactment of Sec 933, NSA paid 
for all validation costs. Sec 933 shifts the costs for this validation 
oversight from NSA to the commercial CCTLs (who may, in turn, will pass 
these fees onto the product vendors seeking NIAP evaluation of their IT 
security products). This change will ensure that NIAP can keep pace 
with the commercial demand for IT security product evaluations and will 
not be constrained by NSA's program budget for validation services.
    Fee Schedule: TABLE A delineates the NIAP Validation Oversight Fee 
Schedule which will be assessed to CCTLs for validation services 
provided in support of their NIAP evaluations. Fees are predicated on a 
per hourly basis by validator skill type and are a function of the 
Evaluation Assurance Levels (EALs) along with the type and complexity 
of the product technology. The CC standard used for NIAP evaluations is 
broken down into increasingly more rigorous Evaluation Assurance Levels 
(EALs) beginning at EAL 1 and moving up to the highest possible 
assurance at EAL 7.
    The two primary factors used in developing the Validation Fee 
Schedules were the EALs of the evaluations and the complexity (simple, 
moderately complex, and complex) of the product being evaluated. Higher 
EALs require more rigorous and thus more costly evaluations. More 
complex products typically take more time to analyze resulting in 
longer and more costly evaluations. The complexity factor takes into 
account size of the product in terms of lines of code but must also 
reflect the fact that new technologies will require additional 
analysis. Simple products would include basic routers, switches or file 
encryptors. Products of moderate complexity would include simple 
firewalls or general application software. Complex products would 
include standard operating systems and new/unique IA products or 
technologies.
    While validation oversight occurs throughout the course of an 
evaluation, the majority of this oversight is focused on Validation 
Oversight Reviews (VORs). These reviews take place at critical points 
during the evaluation. Evaluations require Initial, Test and Final 
VORs. The VOR process typically consists of three phases: the 
preparation phase where validators review documents pertaining to that 
specific VOR, the actual VOR meeting (attended by the validators and 
lab personnel), and the Issue Resolution and Wrap-Up phase. During this 
final phase all relevant issues are addressed by the CCTL then the VOR 
report is finalized. At EAL 3s and above, witnessing of testing by 
validator personnel may also be required.
    An additional factor that will affect the validation oversight 
costs is the length of the evaluation since monthly validation fees 
will be applied to cover validator coordination and guidance costs 
throughout the course of the evaluation.
    The final section of the fee schedule depicts costs for assurance 
maintenance which is the process vendors use to maintain the currency 
of their product evaluations. Vendors submit rationale for why changes 
to their product did not impact their evaluated product's security. The 
vendor proposals are reviewed by a NIAP senior validator who determines 
if their rationale is sound and makes a recommendation to NIAP 
management who then renders a verdict on the vendor assurance 
maintenance proposal.

    Dated June 19, 2007.
L.M. Bynum,
Alternate OSD Federal Register Liaison Officer, DoD.
BILLING CODE 5001-06-P

[[Page 35038]]

[GRAPHIC] [TIFF OMITTED] TN26JN07.000


[[Page 35039]]


[GRAPHIC] [TIFF OMITTED] TN26JN07.001


[[Page 35040]]


[GRAPHIC] [TIFF OMITTED] TN26JN07.002


[[Page 35041]]


[GRAPHIC] [TIFF OMITTED] TN26JN07.003


[[Page 35042]]


[GRAPHIC] [TIFF OMITTED] TN26JN07.004

[FR Doc. 07-3114 Filed 6-25-07; 8:45 am]

BILLING CODE 5001-06-C