Extending AADL for Security Design Assurance of the Internet of Things
|
|
|
- Gervais Ryan
- 10 years ago
- Views:
Transcription
1 Extending AADL for Security Design Assurance of the Internet of Things Presented by Rick Kazman, PhD Team: Carol Woody (PI), Rick Kazman, Robert Ellison, John Hudak, Allen Householder Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213
2 Copyright 2015 Carnegie Mellon University This material is based upon work funded and supported by the Department of Defense under Contract No. FA C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Department of Defense. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This material has been approved for public release and unlimited distribution except as restricted below. This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at [email protected]. DM
3 Agenda Security Modeling and AADL IoT Case Study Conclusions 3
4 Agenda Security Modeling and AADL IoT Case Study Conclusions 4
5 Value of Security Formal Modeling Crucial security decisions to address threats are made in the architecture. Analyzing an architecture for is a huge opportunity for improving security. Formal modeling provides a means to verify a design. Resolve Design Flaws Identify Threats Create Architecture Candidate Find Security Design Flaws Model Architecture 5
6 Using AADL to Model Architectures AADL (Architecture Analysis and Design Language): specifies a static representation of a system architecture can model logical flows, binding of software to hardware is strongly typed, allowing a consistency checks via a modeling tool set. 6
7 AADL for Modeling Security Properties AADL has properties to capture component characteristics. Example: a component that performs encryption can have one property for latency (e.g. 3 ms.), and another for type of encryption, e.g. RSA. 7
8 AADL for Modeling Security Properties AADL supports the addition of modeling formalisms beyond the capabilities of the core language. 8
9 Agenda Security Modeling and AADL IoT Case Study Conclusions 9
10 Extending AADL for Security Our goal was to extend AADL to better address security in the architecture. To drive this analysis we began by specifying threats in the context of a real-world IoT (internet of things) problem: automotive electronics. 10
11 Using STRIDE to Determine Threats We employed the STRIDE model. STRIDE is a way to walk through categories of threats and determine their potential consequences. 11
12 Using STRIDE to Determine Threats 12
13 Using STRIDE to Determine Threats We instantiated STRIDE in the context of the automotive electronics example. For each category we described: 1. how the threat might be realized 2. the implications of this threat on the automotive example 3. the risks that arose from this threat analysis 4. questions about the architecture that drive the design 5. the security property violated 13
14 Modeling the Automotive Electronics System Engine Status engine_status Clock throttle_setting Throttle Actuator timing_pulse Wheel Motion wheel_pulse data_via_can_bus Cruise Control System data_via_can_bus Brake Pedal brake_status set_speed cc_on_indicator resume Operator Buttons increase_speed decrease_speed cc_system_on_off Indicator Display data_via_can_bus Activates brake Presses buttons DRIVER Radio Station Receive radio signals Digital Radio 14
15 Modeling STRIDE Attack Types in AADL We did an in-depth AADL-based analysis of several attack types from the STRIDE model. Consider Information Disclosure. To guard against inadvertent information disclosure you need to authenticate and authorize components. This establishes who can access what data, with what rights. 15
16 Modeling Information Disclosure in AADL We made the following architectural design decisions: For component A to communicate data to component B, they must be of the same group. To support this, we define a property AccessGroup: a list of groups. In addition we ensure that A and B have the proper access rights for the data being communicated. We created a user-defined AADL property, AccessMode, that has one the following values: r for read access, w for write access, rw for read-write access, and x for execute. Finally we create a compound rule that checks AccessGroup and AccessMode properties of each component to ensure they are consistent. 16
17 Analyzing Security Properties To reason about the satisfaction of security properties in a system architecture we need to: 1. Specify the properties, and the architectural elements they are associated with in AADL; and then 2. Analyze claims over those properties. To analyze claims we use the Resolute model-checker. AADL Model Resolute 17
18 Model Problem Specified in AADL A subset of automotive electronics includes sensors (WheelRotation, BrakePedal), actuators (ThrottleActuator), and control application software (Cruise Control and Infotainment). 18
19 Semantics of Access Privileges For example, a vehicle speed sensor can write to a global data area from which multiple control systems of a vehicle can read the vehicle speed. The data would be annotated with an AccessMode of r and a list of subsystems that are allowed to read that data, for example, the cruise control system. A malicious application could attempt to write to the vehicle speed and overwrite the true speed value with a lower value, causing the cruise control to rapidly accelerate the vehicle. 19
20 Semantics of Access Privileges Thus we need to specify that only certain applications can write speed data, and that only certain applications can read speed data. To accomplish this, we check the AccessGroup that contains the list of components that can access the data. 20
21 Semantics of Access Privileges We formally specify this in AADL as follows: property set Security_Trust is AccessMode: enumeration (r, w, rw, x) applies to (all); AccessGroup: enumeration (CC, ABS) applies to (all); end Security_Trust; 21
22 Semantics of Access Privileges An architect would annotate a data type with properties as follows: data VehicleSpeed properties Security_Trust::AccessMode => r; Security_Trust::AccessGroup => CC; end VehicleSpeed; data ThrottlePosition properties Security_Trust::AccessMode => w; Security_Trust::AccessGroup => CC; end ThrottlePosition; 22
23 Running the Resolute Checker Running the Resolute model checker requires that the model be instantiated. Resolute walks the instantiated model hierarchy looking for components specified in its claims and checks those components according to the logic encoded in the claim. 23
24 Running the Resolute Checker For example we want to ensure that data being read by the cruise control has AccessMode properties properly specified. We also run the command execution check on incoming data to see if data is properly specified as executable. The read and write privilege checks both failed but the execution check passed. The VehicleSpeed data AccessMode property was set to w on the incoming port and for the ThrottlePosition AccessMode property was set to r causing both checks to fail. 24
25 Agenda Security Modeling and AADL IoT Case Study Conclusions 25
26 Limitations An AADL model does not necessarily support security validation. Is the system sufficiently secure for the planned usage? A weakness external to the model enables an attacker to operate outside the model. Example: A buffer overflow vulnerability or successful phishing can enable an attacker to obtain privileges without authentication. Specifications may be correct but not provide the desired level of security assurance. Example: An architect claims that a component sufficiently verifies input data to eliminate the risk of a SQL-injection. But CWE 89 recommends alternative mitigations with a higher level of assurance than input verification, such as component output verification. 26
27 Conclusions Architectural security modeling has several benefits: guides an architect to reason and design in terms of systemwide security properties provides a framework for checking that such properties are maintained during system maintenance and evolution But it has limitations; it should be considered part of a complete approach to security. This research has also resulted in many collaborations: Prof. Mel Rosso-Llopart (CMU/IRS) / Malware Analysis Prof. Jungwoo Ryoo (Penn State) / Architecture Analysis for Security (AAFS) method Prof. Yuanfang Cai (Drexel U.) / Titan architecture analysis tool 27
28 28
29 29
Supply-Chain Risk Management Framework
Supply-Chain Risk Management Framework Carol Woody March 2010 Scope of SEI Work Context Significantly reduce the risk (any where in the supply chain) that an unauthorized party can change the behavior
Applying Software Quality Models to Software Security
Applying Software Quality Models to Software Security Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Carol Woody, Ph.D. April 21, 2015 Copyright 2015 Carnegie Mellon University
Moving Target Reference Implementation
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Moving Target Reference Implementation Software Engineering Institute, Carnegie Mellon University Andrew O. Mellinger December 17, 2014
Exploring the Interactions Between Network Data Analysis and Security Information/Event Management
Exploring the Interactions Between Network Data Analysis and Security Information/Event Management Timothy J. Shimeall CERT Network Situational Awareness (NetSA) Group January 2011 2011 Carnegie Mellon
VoIP in Flow A Beginning
VoIP in Flow A Beginning Nathan Dell CERT/NetSA 2013 Carnegie Mellon University Legal Copyright 2013 Carnegie Mellon University This material is based upon work funded and supported by the Department of
Contracting Officer s Representative (COR) Interactive SharePoint Wiki
Contracting Officer s Representative (COR) Interactive SharePoint Wiki James Smith Andy Boyd Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material
Building Resilient Systems: The Secure Software Development Lifecycle
Building Resilient Systems: The Secure Software Development Lifecycle Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT [email protected]
2012 CyberSecurity Watch Survey
2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division James Stevens is a senior member of the technical staff
Cyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
A Systematic Method for Big Data Technology Selection
A Systematic Method for Big Data Technology Selection John Klein Software Solutions Conference 2015 November 16 18, 2015 Copyright 2015 Carnegie Mellon University This material is based upon work funded
How To Ensure Security In A System
Software Assurance vs. Security Compliance: Why is Compliance Not Enough? Carol Woody, Ph.D. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2012 Carnegie Mellon University
Buyer Beware: How To Be a Better Consumer of Security Maturity Models
Buyer Beware: How To Be a Better Consumer of Security Maturity Models SESSION ID: GRC-R01 Julia Allen Software Engineering Institute Carnegie Mellon University [email protected] Nader Mehravari Software
Software Assurance Competency Model
Software Assurance Competency Model Thomas Hilburn, Embry-Riddle Aeronautical University Mark Ardis, Stevens Institute of Technology Glenn Johnson, (ISC) 2 Andrew Kornecki, Embry-Riddle Aeronautical University
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Agile Development and Software Architecture: Understanding Scale and Risk
Agile Development and Software Architecture: Understanding Scale and Risk Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Robert L. Nord SSTC, April 2012 In collaboration
emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge
emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge Soumya Simanta Gene Cahill Ed Morris Motivation Situational Awareness First responders and others operating in
How To Use Elasticsearch
Elasticsearch, Logstash, and Kibana (ELK) Dwight Beaver [email protected] Sean Hutchison [email protected] January 2015 2014 Carnegie Mellon University This material is based upon work funded and supported
Software Security Engineering: A Guide for Project Managers
Software Security Engineering: A Guide for Project Managers Gary McGraw Julia H. Allen Nancy Mead Robert J. Ellison Sean Barnum May 2013 ABSTRACT: Software is ubiquitous. Many of the products, services,
Abuse of CPE Devices and Recommended Fixes
Abuse of CPE Devices and Recommended Fixes Dr. Paul Vixie (Farsight Security, Inc.) Chris Hallenbeck (US-CERT, DHS) Jonathan Spring (CERT/CC, Carnegie Mellon) August 7, 2014 Black Hat USA 2014 2014 Carnegie
Network Monitoring for Cyber Security
Network Monitoring for Cyber Security Paul Krystosek, PhD CERT Network Situational Awareness 2006 Carnegie Mellon University What s Coming Up The scope of network monitoring Cast of characters Descriptions
Network Analysis with isilk
Network Analysis with isilk Presented at FloCon 2011 Ron Bandes CERT Network Situational Awareness (NetSA) Group 2011 Carnegie Mellon University 2011 Carnegie Mellon University NO WARRANTY THIS MATERIAL
Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.
KVM and Hypervisor Security David Shepard and Matt Gaston CMU/SEI Cyber Innovation Center February 2012 2012 by Carnegie Mellon University. Published SEI PROPRIETARY INFORMATION. Distribution: Director
Data Management Maturity (DMM) Model Update
Data Management Maturity (DMM) Model Update Rawdon Young November 2012 Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Contents / Agenda The DMM SEI Observations on Core
Deriving Software Security Measures from Information Security Standards of Practice
Deriving Software Measures from Standards of Practice Julia Allen Christopher Alberts Robert Stoddard February 2012 2012 Carnegie Mellon University Copyright 2012 Carnegie Mellon University. This material
Assurance Cases for Design Analysis of Complex System of Systems Software
Assurance Cases for Design Analysis of Complex System of Systems Software Presented at AIAA Infotech@Aerospace Conference Software Assurance Session 8 April 2009 Stephen Blanchette, Jr. Problem: SoS are
Risk Management Framework
Risk Management Framework Christopher J. Alberts Audrey J. Dorofee August 2010 TECHNICAL REPORT CMU/SEI-2010-TR-017 ESC-TR-2010-017 Acquisition Support Program Unlimited distribution subject to the copyright.
Service Measurement Index Framework Version 2.1
Service Measurement Index Framework Version 2.1 July 2014 CSMIC Carnegie Mellon University Silicon Valley Moffett Field, CA USA Introducing the Service Measurement Index (SMI) The Service Measurement Index
Penetration Testing Tools
Penetration Testing Tools Ken van Wyk January 2007 ABSTRACT: This article provides a primer on the most commonly used tools for traditional penetration testing. (A related article provides an overview
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
SOA for Healthcare: Promises and Pitfalls
SOA for Healthcare: Promises and Pitfalls Dennis B. Smith [email protected] SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The
CERT Virtual Flow Collection and Analysis
CERT Virtual Flow Collection and Analysis For Training and Simulation George Warnagiris 2011 Carnegie Mellon University Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
$100 SiLK Network Flow Sensor
$100 SiLK Network Flow Sensor Ron Bandes John Badertscher Dwight Beaver 1 Copyright 2014 Carnegie Mellon University This material is based upon work funded and supported by the Department of Defense under
Monitoring Trends in Network Flow for Situational Awareness
Monitoring Trends in Network Flow for Situational Awareness SEI CERT NetSA 2011 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0
Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0 Christopher J. Alberts Sandra G. Behrens Richard D. Pethia William R. Wilson June 1999 TECHNICAL
Adaptive Cruise Control System Overview
5th Meeting of the U.S. Software System Safety Working Group April 12th-14th 2005 @ Anaheim, California USA 1 Introduction Adaptive Cruise System Overview Adaptive Cruise () is an automotive feature that
Dynamic Vulnerability Assessment
SANDIA REPORT SAND2004-4712 Unlimited Release Printed September 2004 Dynamic Vulnerability Assessment Cynthia L. Nelson Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore,
A Study of Systems Engineering Effectiveness. Building a Business Case for Systems Engineering
Building a Business Case for Systems Engineering NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES
Created by: Austin Davis Neel Iyer Darcie Jones Sascha Schwarz
EMGT 587 Systems Engineering Created by: Austin Davis Neel Iyer Darcie Jones Sascha Schwarz Table of Contents Introduction... 3 Operational Scenarios... 4 1. User sets and cancels cruise control:... 4
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Common Testing Problems: Pitfalls to Prevent and Mitigate
: Pitfalls to Prevent and Mitigate AIAA Case Conference 12 September 2012 Donald Firesmith Software Engineering Institute (SEI) Carnegie Mellon University Pittsburgh, PA 15213 Clarification and Caveat
Understanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
CERT Resilience Management Model (CERT -RMM) V1.1: NIST Special Publication 800-66 Crosswalk
CERT Resilience Management Model (CERT -RMM) V1.1: NIST Special Publication 800-66 Crosswalk Lisa R. Young, Software Engineering Institute Ma-Nyahn Kromah, SunGard Availability Services October 2013 TECHNICAL
Getting Started with Service- Oriented Architecture (SOA) Terminology
Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a
Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division
Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division Matthew Butkovic is a Technical Manager Cybersecurity Assurance
Cutting Edge Practices for Secure Software Engineering
Cutting Edge Practices for Secure Software Engineering Kanchan Hans Amity Institute of Information Technology Amity University, Noida, 201301, India [email protected] Abstract Security has become a high
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support Technology Concepts and Business Considerations Abstract Encryption plays an increasingly important role in IT infrastructure
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri
Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing
Introduction to the OCTAVE Approach
Introduction to the OCTAVE Approach Christopher Alberts Audrey Dorofee James Stevens Carol Woody August 2003 Pittsburgh, PA 15213-3890 Introduction to the OCTAVE Approach Christopher Alberts Audree Dorofee
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
An Application of an Iterative Approach to DoD Software Migration Planning
An Application of an Iterative Approach to DoD Software Migration Planning John Bergey Liam O Brien Dennis Smith September 2002 Product Line Practice Initiative Unlimited distribution subject to the copyright.
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
Incident Management Capability Metrics Version 0.1
Incident Management Capability Metrics Version 0.1 Audrey Dorofee Georgia Killcrece Robin Ruefle Mark Zajicek April 2007 TECHNICAL REPORT CMU/SEI-2007-TR-008 ESC-TR-2007-008 CERT Program Unlimited distribution
Cloud Computing Security in the Tactical Environment the Difference a Year Makes
Cloud Computing Security in the Tactical Environment the Difference a Year Makes Panel Coordinator / Moderator: Noel Ellis (Eli) Johnson 260-429-5457 Email: [email protected] This document does
CMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update
CMMI for SCAMPI SM Class A 2011 End-Year Update Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 1 Outline Introduction Current Status Community Trends Organizational Trends
The Road from Software Testing to Theorem Proving
The Road from Software Testing to Theorem Proving A Short Compendium of my Favorite Software Verification Techniques Frédéric Painchaud DRDC Valcartier / Robustness and Software Analysis Group December
Discovering passwords in the memory
Discovering passwords in the memory Abhishek Kumar ([email protected]) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org
SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management
Symantec ESM Agent For IBM iseries AS/400
Symantec ESM Agent For IBM iseries AS/400 Version 6.5 Release Notes Legal Notice Copyright 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Symantec Enterprise Security
Sustaining Operational Resiliency: A Process Improvement Approach to Security Management
Sustaining Operational Resiliency: A Process Improvement Approach to Security Management Author Richard A. Caralli Principle Contributors James F. Stevens Charles M. Wallen, Financial Services Technology
CRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1
CRR Supplemental Resource Guide Volume 5 Incident Management Version 1.1 Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security
Trends and New Directions in Software Architecture
Trends and New Directions in Software Architecture Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Chief Scientist, Software Solutions Division SEI Fellow Copyright 2015
Network Security Audit. Vulnerability Assessment (VA)
Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.
A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification
, pp. 131-142 http://dx.doi.org/10.14257/ijseia.2015.9.10.13 A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification Min-gyu Lee 1, Hyo-jung Sohn 2, Baek-min Seong
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
The CERT Top 10 List for Winning the Battle Against Insider Threats
The CERT Top 10 List for Winning the Battle Against Insider Threats Dawn Cappelli CERT Insider Threat Center Software Engineering Institute Carnegie Mellon University Session ID: STAR-203 Session Classification:
EPI SUITE 6 INSTALLATION INSTRUCTIONS
EPI SUITE 6 INSTALLATION INSTRUCTIONS Instructions on how to install EPI Suite 6 for Windows XP, Vista, 7, 8 and 8.1 VERSION 1.0 BUILD 6.3.030 ImageWare Systems, Inc. 10815 Rancho Bernardo Rd., Suite 310
Automotive Software Development Challenges Virtualisation and Embedded Security
Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Defending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
MEANINGFUL USE DESK AUDIT
MEANINGFUL USE DESK AUDIT October 2015 Protect Electronic Health Information HIPAA Risk Management 1680 E. Joyce Blvd Fayetteville, AR 72704 (800) 501-8973 www.hipaarisk.com Copyright 2015 by HRM Services,
Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1
Fidelis XPS Power Tools Gaining Visibility Into Your Cloud: Cloud Services Security February 2012 PAGE 1 PAGE 1 Introduction Enterprises worldwide are increasing their reliance on Cloud Service providers
Threat Modeling. 1. Some Common Definition (RFC 2828)
Threat Modeling Threat modeling and analysis provides a complete view about the security of a system. It is performed by a systematic and strategic way for identifying and enumerating threats to a system.
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
